All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
accounting information systems
Questions and Answers of
Accounting Information Systems
REA Associations Bentley Restorations Company restores and sells top-end classic and antique automobiles.Most of its customers are private collectors, but some are investors who buy multiple cars and
REA Associations Based on the data in Problem 2, which of the following relationships in the next page properlymodels the entity associations for Bentley Restorations? Explain your answer. A B
REA Associations Based on the data in Problem 2, which of the relationships below properly models the entity associations for this situation? Explain your answer. A Sell B Sell C Sell Problem: 4 REA
REA Model Extract Prepare an REA model depicting the issuance of raw materials into the manufacturing process.Identify the resource, event, and agent entities. Show the cardinalities in the
REA Model—Horizon Books Horizon Books is a bookstore in downtown Philadelphia. It carries an inventory of approximately 5,000 books. Customers come in and browse the shelves, select their books,
REA Model—Feinman Computers Feinman Computers sells desktop computer systems that it manufactures from parts and software that third-party vendors provide. Customers are both private consumers and
REA Model—K Cannon, Inc.K Cannon, Inc., is a manufacturer of portable CD players. The company purchases raw materials such as plastics and computer chips for its conversion cycle. The following
REA Model—Payroll System Every two weeks, employees for a manufacturing firm submit their time cards to the supervisor, who reviews and approves them. They are the submitted to the payroll
REA Model—Fixed Asset System Asset acquisition begins when the department manager recognizes the need to obtain or replace an existing fixed asset. The manager prepares two copies of a purchase
What is the client-server model?
Describe the two-tier client-server model.
Describe the three-tier client-server model.
What is bolt-on software?
What is data mining?
What is the drill-down approach?
Closed database architecture isa. a control technique intended to prevent unauthorized access from trading partners.b. a limitation inherent in traditional information systems that prevents data
Which statement is most correct?a. SAP is more suited to service industries than manufacturing clients.b. J.D. Edwards’s ERP is designed to accept the best practices modules of other vendors.c.
Data Warehouse Access Control You are the CEO of a large organization that implemented a data warehouse for internal analysis of corporate data. The operations manager has written you a memo
Project Implementation Your organization is planning to implement an ERP system. Some managers in the organization favor the big bang approach. Others are advocating a phased-in approach.The CEO has
Selecting a Consultant You are the chief information officer for a midsized organization that has decided to implement an ERP system. The CEO has met with a consulting ERP firm based on a
Auditing ERP Databases You are an independent auditor attending an engagement interview with the client. The client’s organization has recently implemented a data warehouse. Management is concerned
Big Bang vs. Phased-in The Nevada Department of Motor Vehicles is the agency responsible for licensing both drivers and vehicles in the state of Nevada. Until recently, legacy systems were used for
ERP Failure When an ERP implementation fails, who is to blame? Is it the software manufacture, the client firm, or the implementation strategy?Required:Research this issue and write a brief paper
ERP Market Growth Because many large corporations implemented ERP systems prior to 2000, what direction will growth of the ERP market take?Required:Research this issue and write a brief paper
ERP Consultants Do an Internet search of complaints about ERP consultants. Write a report about the most common complaints and cite examples.
ERP Bolt-on Software Go to 10 websites of companies that supply bolt-on software. Write a report containing URLs that briefly describes the software features and its compatibility with specific ERP
1. What is the purpose of the TCP portion of TCP/IP?
What is XML?
What is XBRL?
Which of the following statements is true?a. Cookies were originally intended to facilitate advertising on the web.b. Cookies always contain encrypted data.c. Cookies are text files and never contain
A DDos attacka. is more intensive than a Dos attack because it emanates from single source.b. may take the form of either a SYN flood or smurf attack.c. is so named because it affects many victims
1. A ping signal is used to initiatea. URL masquerading.b. digital signature forging.c. Internet protocol spoofing.d. a smurf attacke. a SYN-ACK packet.
Encryption The coded message that follows is an encrypted message from Brutus to the Roman Senate. It was produced using the Caesar cipher method, in which each letter is shifted by a fixed number of
Encryptiona. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by
Seals of Assurance Visit 10 websites that sell products or services and record the following for each:a. The URL.b. Did the site issue you a cookie?c. Did the site have a published privacy policy?d.
1. Certification Authority Licensing Research the current state of certification authority licensing in the United States and Europe. Write a brief report of your findings.
Privacy Visit 10 websites that sell products or services and record the URL of each. Evaluate each site’s published privacy policy in terms of the conditions needed for compliance with the Safe
Electronic Data Interchange The purchase order for one firm is the source document for the sales order of another firm.Consider the following purchase order and sales order data elements stored for
Internal Controls Assessment and Electronic Data Interchange: Gresko Toys Factory(Prepared by Robertos Karahannas, Lehigh University)Mr. and Mrs. Gresko started Gresko Toys in the early 1960s.
Electronic Fraud In a recent financial fraud case, city employees in Brooklyn, New York, accessed electronic databases to defraud the city of $20 million.Several employees in collusion with the
Santa’sAttic.com Santa’sAttic.com is an online retailer/manufacturer of children’s toys. Its main competitors are larger electronic commerce toy companies including Amazon.com; Yahoo Shopping,
1. What are the primary fact-gathering techniques?
1. What is the primary objective of conceptual design?
1. What is the accountant’s primary role in conceptual design?
1. Distinguish between tangible and intangible benefits.
A feasibility study for a new computer system shoulda. consider costs, savings, controls, profit improvement, and other benefits analyzed by application area.b. provide the preliminary plan for
Which of the following is the most important factor in planning for a system change?a. Having an auditor as a member of the design team.b. Using state-of-the-art techniques.c. Concentrating on
In the context of the TELOS acronym, technical feasibility refers to whethera. a proposed system is attainable, given the existing technology.b. the systems manager can coordinate and control the
Which of the following steps is NOT considered to be part of this systems survey?a. Interviews are conducted with operating people and managers.b. The complete documentation of the system is obtained
A systems development approach that starts with broad organizational goals and the types of decisions organizational executives make is calleda. bottom-up.b. network.c. top-down.d. strategic.e.
The TELOS study that determines whether a project can be completed in an acceptable time frame isa. a schedule feasibility study.b. a time frame feasibility study.c. an on-time feasibility study.d.
The TELOS acronym is often used for determining the need for system changes. Which of the following types of feasibility studies are elements of TELOS?a. legal, environmental, and economicb.
What name is given to the time value of money technique that discounts the after-tax cash flows for a project over its life to time period zero using the company’s minimum desired rate of return?a.
Which of the following aspects of a cost-benefit study would have the greatest uncertainty as to its precise value?a. the tangible costsb. the intangible costsc. the tangible benefitsd. the
Systems Planning A new systems development project is being planned for Reindeer Christmas Supplies Company.The invoicing, cash receipts, and accounts payable modules are all going to be updated.The
Problem Identification Classify each of the following as a problem or a symptom. If it is a symptom, give two examples of a possible underlying problem. If it is a problem, give two examples of a
Systems Development and User Involvement Kruger Designs hired a consulting firm three months ago to redesign the information system that the architects use. The architects will be able to use
Fact-Gathering Techniques Your company, Tractors, Inc., is employing the SDLC for its new information system. You have been chosen as a member of the development team because of your strong
Systems Selection Your company, Kitchen Works, is employing the SDLC for its new information system. The company is currently performing a number of feasibility studies, including the economic
Cost-Benefit Analysis Listed on the next page are some probability estimates of the costs and benefits associated with two competing projects.a. Compute the net present value of each alternative.
Balanced Scorecard An organization’s IT function has the following goals:• Improve the quality of IT solutions and services to its internal users.• Increase the ratio of planned-to-realized
SOX contains many sections. Which sections are the focus of this chapter?
Which of the following is NOT a requirement in management’s report on the effectiveness of internal controls over financial reporting?a. A statement of management’s responsibility for
Which of the following is NOT an implication of Section 302 of SOX?a. Auditors must determine whether changes in internal control have, or are likely to, materially affect internal control over
Which of the following risks does the auditor least control?a. inherent riskb. control riskc. detection riskd. all are equally controllable
Internal Control Gustave, CPA, during its preliminary review of the financial statements of Comet, Inc., found a lack of proper segregation of duties between the programming and operating
Separation of Duties Transferring people from job to job within the organization is the philosophy at Arcadia Plastics.Management feels that job rotation deters employees from feeling that they are
Disaster Recover Service Providers Visit SunGard’s website, http://www.sungard.com, and research its recovery services offered for the following classes: High Availability, System Recovery, and
Internal Control and Distributed System Until a year ago, Dagwood Printing Company had always operated in a centralized computer environment. Now, 75 percent of the office employees have a PC. Users
1.. What are the most common forms of contra security behavior?
1.. Explain how a Trojan horse may be used to penetrate a system.
1.. What are some tests of data communications controls?
1.. Does every organization that has a LAN need a firewall?
1.. Describe three ways in which IPS can be used to protect against DDos attacks.
1.. An integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n)a. operating system.b. database management system.c. utility
1.. Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd.
1.. Operating System and Network Control Describe a well-controlled system in terms of access controls for a major insurance company that equips each salesperson (life, property, and investments)
Operation System Controls In 2002, Mr. Rollerball started Mighty Mouse, Inc., a small, 75-employee firm that produces and sells wireless keyboards and other devices to vendors through its
Internal Control and Fraud Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 pm unless the overtime has been approved. Charles has recently found himself
Input Controls and Networking A global manufacturing company has over 100 subsidiaries worldwide reporting to it each month. The reporting units prepare the basic financial statements and other key
Preventive Controls Listed below are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a preventive control.a. An intruder taps into a telecommunications device
Operating System Exposures and Controls Listed below are five scenarios. For each scenario, discuss the potential consequences and give a prevention technique.a. The systems operator opened a bag of
Database Authorization Table The following information is stored in two relational database files:Employee Master File Social Security number Name Address Date hired Hourly wage rate Marital status
Security and Control Assessment Brew Bottle Company (BBC) is in the process of planning a more advanced computer-based information system. Slavish & Moore, LLP, BBC’s consulting firm, have recently
What is a run-to-run control?
1.. Explain how an embedded audit module works.
Input Validation Describe the types of application control used for the following data in a payroll system.a. Employee nameb. Employee numberc. Social Security numberd. Rate per hour or salarye.
Computer Fraud and Controls Although the threat to security via external penetration is often seen as the greatest threat, many threats are internal. Computer frauds include (1) input manipulation,
Processing Controls A well-designed system can prevent both intentional and unintentional alteration and destruction of data. These data controls can be classified as (1) input controls, (2)
Input Controls and Data Processing A catalog company has hired you to computerize its sales order entry forms. Approximately 60 percent of all orders are received over the telephone, with the
Audit Plan Rainbow Paint Company, a medium-sized manufacturing firm, has no internal auditing department. It recently hired a new accounting firm to perform the external audit.Required:Outline an
Audit Plan The auditors for Golden Gate Company have a gut feeling that liabilities may be unrecorded. Their initial suspicions stem from a radical decline in accrued liabilities from last year.
Risk Identification and Plan of Action Two years ago, an external auditing firm supervised the programming of embedded audit modules for Previts Office Equipment Company. During the audit process
Risk Identification and Plan of Action The internal auditors of Brown Electrical Company report to the controller. Due to changes made in the past year to several of the transaction processing
Risk Identification and Plan of Action As the manager of the external audit team, you realize that the embedded audit module only writes material invoices to the audit file for the accounts
Audit Objectives and Procedures You are conducting substantive tests on the accounts receivable file to verify its accuracy.The file is large, and you decide to test only a sample of the records.
Systems Development and Program Changes Avatar Financials, Inc., located on Madison Avenue in New York, is a company that provides financial advice to individuals and small to mid-sized businesses.
Computer-Assisted Audit Tools and Techniques (CAATTs)Required:a. Explain the advantages of using GAS to assist with audits and give several examples of how it may be used.b. Describe the audit
Audit of Systems Development The Balcar Company’s auditors are developing an audit plan to review the company’s systems development procedures. Their audit objectives are to ensure that 1.the
Payroll Application Control Using this supplemental information, analyze the flowchart on the following page.• The personnel department determines the wage rate of all employees. To start the
Showing 100 - 200
of 5298
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last