All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
accounting information systems
Questions and Answers of
Accounting Information Systems
Discuss some of the risks from subversive threats and how they can be controlled.
Why might an individual launch a denial of service attack on a company's Internet connection?
Discuss the various ways in which data encryption may be used. Which way provides the most control?
Explain the triple-DES encryption techniques know as EEE3 and EDE3.
Discuss the unique control problems created by EDI.
"In an EDI system, only the customer needs to verify that the order being placed is from a valid supplier and not vice versa." Do you agree with this statement? Why or why not?
The database attributes that individual users have permission to access are defined in thea. operating system.b. user manual.c. database schema.d. user view.e. application listing.
An integrated group of programs that supports the applications and facilitates their access to t specified resources is called a (an)a. operating system.b. database management system.c. utility
The purpose of a checkpoint procedure is facilitate restarting aftera. data processing errors.b. data input errors.c. the failure to have all input data ready on time.d. computer operator
A user's application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an
A program that attaches to another legitimate program but does not replicate itself is called aa. virus.b. worm.c. Trojan horse.d. logic bomb.
Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd.
Reviewing database authority tables is a(n)a. access control.b. organizational structure control.c. data resource control.d. operating resource control.
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique calleda. spoofing.b. spooling.c. dual-homed.d.
Transmitting numerous SYN packets to a targeted receiver, but not responding to an ACK, isa. a DES message.b. the request-response technique.c. a denial of service attack.d. a call-back device.
During the system design phase of the SDLC, input interfaces or input views must be sketched out so programmers can capture necessary elements when they program the interfaces the system will use to
The detailed dataflow diagram in Figure 14-16 decomposes the DFD for the expenditure cycle in Figure 14-15. Further decompose the process numbered 1.4.4, Receive Invoice, in detail.
In a recent financial fraud case, city employees in Brooklyn, New York, accessed electronic databases to defraud the city of $20 million. Several employees in collusion with the former deputy tax
What functions do CASE tools serve?
Distinguish between turnkey and backbone systems. Which is more flexible?
Are direct input systems (i.e., point-of-sale using bar codes) error free? Why or why not?
Who conducts the post-implementation review? When should it be conducted? If an outside consulting firm were hired to design and implement the new system, or a canned software package were purchased,
The proper sequence of activities in the systems development life cycle isa. Design, analysis, implementation, and operation.b. Design, implementation, analysis, and operation.c. Analysis, design,
The process of developing specifications for hardware, software, personnel hours, data resources, and information products required to develop a system is referred to asa. systems analysis.b. systems
Which of the following is NOT an output attribute?a. relevanceb. exception orientationc. zonesd. accuracy
Which of the following is NOT a principle feature of a PERT chart?a. starting and ending datesb. eventsc. pathsd. activities
Which of the following is the most appropriate activity for an internal auditor to perform during a review of systems development activity?a. Serve on the MIS steering committee that determines what
The least risky strategy for converting from a manual to a computerized accounts receivable system would be aa. direct conversion.b. parallel conversion.c. pilot conversion.d. database conversion.e.
Errors are most costly to correct duringa. programming.b. conceptual design.c. analysis.d. detailed design.e. implementation.
A useful tool for formatting computer input and file records is aa. document flowchart.b. printer layout chart.c. record layout sheet.d. work distribution analysis.e. decision table.
User acceptance testing is more important in an object-oriented development process than in a traditional environment because of the implications of thea. absence of traditional design documents.b.
Characteristics of an accounting application that might influence the selection of data entry devices and media for a computerized accounting system area. Timing of feedback needs relative to input,
A systems development approach used to quickly produce a model of user interfaces, user interactions with the system, and process logic is called: .a. neural networking.b. prototyping.c.
The program evaluation and review technique (PERT) is widely used to plan and measure progress toward scheduled events. PERT is combined with cost data to produce a PERT- cost analysis toa. calculate
All of the following are included in the systems implementation process except:a. Training.b. documentation.c. systems design.d. Testing and correction.
When using the PERT method for network analysis, the critical path through the network is thea. shortest path through the network.b. longest path through the network.c. path with the most slack.d.
Reeve Lumber Company has a small information systems department consisting of five people. A backlog of approximately 15 months exists for requests for new systems applications to even be considered.
Sawicki Music Supply is a mail-order business that accepts merchandise orders by telephone and mail.All payments must be prepaid with a major credit card. Once an order is received, the item is
Examine the context and intermediate (Level 1)dataflow diagrams on the next page and indicate what is incorrect about them.
Robin Alper, a manager of the credit collections department for ACME Building Supplies, is extremely unhappy with a new system that was installed three months ago. Her complaint is that the dataflows
Robert Hamilton was hired six months ago as the controller of a small oil and gas exploration and development company, Gusher, Inc., headquartered in Beaumont, Texas. Before working at Gusher,
The Peabody Coal Corporation recently completed the final feasibility report for a new general ledger accounting system. It has hired a consulting firm to program and install the new system. The
The lottery commission of a state with about$500 million a year in revenue has looked to modern technology for increasing lottery sales. The strategy is to place self-service sales machines around
Accountants understand their jobs very well.Programmers also understand their jobs.Unfortunately, accountants are rarely programmers and programmers are rarely accountants. While an accountant does
Silver Aviation assembles small aircraft for commercial use. The majority of Silver’s business is with small freight airlines serving areas where the airport does not accommodate larger planes. The
On page 718 is an ER diagram for the expenditure cycle.Required:a. List the entity database tables and describe which entities need representing from an AIS perspective.b. For each item identified as
Vince Malloy and Katy Smith, both systems personnel at Shamrock Steelworks, are designing a new expenditure cycle system. Vince has worked for Shamrock for 12 years and has been involved in many
Classify each of the following as a problem or a symptom. If it is a symptom, give two examples of a possible underlying problem. If it is a problem, give two examples of a possible symptom that may
Kruger Designs hired a consulting firm three months ago to redesign the information system used by the architects. The architects will be able to use state-of-the-art CAD programs to help in
Consider the following dialogue between a systems professional, Joe Pugh, and a manager of a department targeted for a new information system, Lars Meyer: Pugh: The way to go about the analysis is to
Your company, Kitchen Works, is employing the SDLC for its new information system. The company is currently performing a number of feasibility stud- ies, including the economic feasibility study. A
Listed below are some probability estimates of the costs and benefits associated with two competing projects.a. Compute the net present value of each alterna- tive. Round the cost projections to the
An organization's IT function has the following goals:• Improve the quality of IT solutions and services to its internal users.• Increase the ratio of planned-to-realized benefits from systems
Which of the following statements is correct?a. TCP/IP is the basic protocol that permits communication between Internet sites.b. TCP/IP controls Web browsers that access the Web.c. TCP/IP is the
Which of the following best describes a system of computers that connects the internal users of an organization distributed over a wide geo graphic area?a. LANb. Internetc. decentralized networkd.
Sniffer software isa. used by malicious Web sites to sniff data from cookies stored on the user's hard drive.b. used by network administrators to analyze network traffic.c. used by bus topology
Which of the following statements is true?a. Cookies were originally intended to facilitate advertising on the Web.b. Cookies always contain encrypted data.c. Cookies are text files and never contain
A message that is contrived to appear to be coming from a trusted or authorized source is calleda. a denial of service attack.b. digital signature forging.c. Internet protocol spoofing.d. URL
A digital signaturea. is the encrypted mathematical value of the message sender's name.b. is derived from the digest of a document that has been encrypted with the sender's private key.c. is derived
Which of the following statements about the client-server model is correct?a. It is best suited to the token-ring topology because the random-access method used by this topology detects data
Which of the following statements is correct?a. A bridge is used to connect a LAN and a WAN.b. Packet switching combines the messages of multiple users into a "packet" for transmission. At the
The coded message that follows is an encrypted message from Brutus to the Roman Senate. It was produced using the Caesar Cipher method in which each letter is shifted by a fixed number of places
a. Develop a Caesar Cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the
John Ozment, director of special projects and anal- ysis for Ozment's company, is responsible for preparing corporate financial analyses and monthly statements and reviewing and presenting to upper
Visit 10 Web sites that sell products or services and record the URL of each. Evaluate each site's published privacy policy in terms of the conditions need for compliance with the Safe Harbor
The purchase order for one firm is the source doc- ument for the sales order of another firm. Consider the following purchase order and sales order data elements stored for two firms. Discuss any
Gresko Toys was started in the early 1960s by Mr. and Mrs. Gresko. Initially, the company was small and few toys were produced. The talent and skills of Mr. Gresko were by far the major assets of the
Santa's Attic.com is an online retailer/manufacturer of children's toys. Its main competitors are larger EC toy companies including Amazon.com; Yahoo Shopping, which includes ToysRUs.com and
Explain why a survey of the current system may serve no purpose when an organization is planning to implement an ERP
What purposes do system objectives serve? Should they be broadly or narrowly defined? Why?
Should the systems development tasks be performed by users of the system or by systems professionals who are trained specifically in systems development techniques? Why?
Some may argue that a company's financial bottom line is all important. Comment on this from the financial perspective of the balanced scorecard approach.
A lack of support by top management has led to the downfall of many new systems projects during the implementation phase. Why is this support so important?
All of the following individuals would likely be SDLC participants except:a. accountants.b. shareholders.c. management.d. programmers.e. all of the above.
Which of the following represents the correct order in problem resolution?a. Define the problem, recognize the problem, perform feasibility studies, specify system objectives, and prepare a project
In reviewing a feasibility study for a new computer system, the auditor should ascertain that the studya. considered costs, savings, controls, profit improvement, and other benefits analyzed by
The most important factor in planning for a system change isa. having an auditor as a member of the design team.b. using state-of-the-art techniques.c. concentrating on software rather than
In the context of a feasibility study, technical feasibility refers to whethera. a proposed system is attainable, given the existing technology.b. the systems manager can coordinate and control the
A systems survey is being conducted to obtain an accurate perspective on the existing system and to identify weaknesses that can be corrected by the new system. Which of the following steps is NOT
Kesta Company is doing a systems development study. The study started with broad orga- nizational goals and the types of decisions made by organizational executives. This study supports a model of
The study that determines whether a project can be completed in an acceptable time frame is:a. a schedule feasibility study.b. a technical feasibility study.c. an operational feasibility study.d. an
Which of the following is least likely to be an accountant's role in the SDLC?a. User.b. Consultant.c. Auditor.d. Programmer.e. All of these are likely roles.
In determining the need for system changes, several types of feasibility studies can be made. The most commonly recognized feasibility studies area. legal, environmental, and economic.b.
The technique that recognizes the time value of money by discounting the after-tax cash flows for a project over its life to time period zero using the company's minimum desired rate of return is
One-time costs of system development include all of the following except:a. Site preparation.b. Hardware maintenance.c. Programming.d. Hardware acquisition.e. Data conversion. Questions 13 and 14 are
The estimated category that ordinarily would have the greatest uncertainty as to its precise value isa. the tangible costs.b. the intangible costs.c. the tangible benefits.d. the intangible
Which of the following statements best describes what is usually true regarding the estimates included in feasibility studies?a. Development time and cost are usually less than estimated; benefits
Closed database architecture isa. a control technique intended to prevent unauthorized access from trading partners.b. a limitation inherent in traditional information systems that prevents data
Each of the following is a necessary element for the successful warehousing of data except:a. cleansing extracted data.b. transforming data.c. modeling data.d. loading data.e. all of the above are
Which of the following is typically not part of an ERP's OLAP applications?a. decision support systemsb. information retrievalc. ad hoc reporting/analysisd. logisticse. what-if analysis
There are a number of risks that may be associated with ERP implementation. Which of the following was not stated as a risk in the chapter?a. A drop in firm performance after implementation because
Which statement is not true?a. In a typical two-tier client-server architecture, the server handles both application and database duties.b. Client computers are responsible for presenting data to the
SAP, one of the leading ERP producers, makes several modules available to adopters. Which of the following is not a SAP module?a. Business Process Supportb. Internet Development Supportc.
Auditors of ERP systemsa. need not be concerned about segregation of duties because these systems possess strong computer controls.b. focus on output controls such as independent verification to
Which statement is most correct?a. SAP is more suited to service industries than manufacturing clients.b. J.D. Edwards' ERP is designed to accept the best practices modules of other vendors.c. Oracle
You are the CEO of a large organization that implemented a data warehouse for internal analysis of corporate data. The operations manager has written you a memo advocating opening the data warehouse
Your organization is planning to implement an ERP system. Some managers in the organization favor the big bang approach. Others are advocating a phased-in approach. The CEO has asked you, as project
For each of the following processes state whether OLTP or OLAP is appropriate and why.a. An order entry system that retrieves customer information, invoice information, and inventory information for
You are the chief information officer for a midsized organization that has decided to implement an ERP system. The CEO has met with a consulting ERP firm based on a recommendation from a personal
You are an independent auditor attending an engagement interview with the client. The client organization has recently implemented a data warehouse. Management is concerned that the audit tests that
Showing 1100 - 1200
of 5298
First
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Last