Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

TRUE/FALSE. Write T if the statement is true and 'F' if the statement is false. 1) An accounting information system requires at least one computer.

image text in transcribedimage text in transcribedimage text in transcribed

TRUE/FALSE. Write "T if the statement is true and 'F' if the statement is false. 1) An accounting information system requires at least one computer. 2) It is important that a firm's AIS collect and integrate financial and non-financial information about the organization's activities if the firm uses its AIS to gain a competitive advantage. 3) It is relatively easy to train employees to learn how to use an ERP system. 4) Traditionally, accounting information systems have been used to collect, process, store and report non-financial information. 5) In the data flow diagram below, a customer order must be approved before the company checks to make sure the inventory is available. 6) Data dictionary can be used as part of the audit trail. 7) The activist hacker group called Anonymous played Santa Claus one Christmas, indicating they were "granting wishes to people who are less fortunate than most." They were inundated with requests for iPads, iPhones, pizzas, and hundreds of other things. They hacked into banks and sent over $1 million worth of virtual credit cards to people. 8) Identify theft has always been a federal crime. 9) In a system with effective separation of duties, it is difficult for any single employee to embezzle successfully. 10) Security is a technology issue and not just a management issue. 11) It is impossible to encrypt information transmitted over the Internet. 12) Best practice requires backups be retained indefinitely. 13) A credit sale should always be denied if it exceeds the customer's credit limit. 14) The EOQ approach to managing inventory has been gaining popularity in recent years. 15) Maintaining physical custody of the raw materials and finished goods inventories is the responsibility of the accounting department. 16) When properly deployed, accounting information systems can provide firms with a competitive advantage. 17) A properly configured enterprise resource planning (ERP) system uses a decentralized database to share information across business processes and coordinate activities. 18) In order to maintain uniformity and enhance comparability, there are a fixed number of symbols that can be used in drawing a Business Process Diagram (BPD). 19) A disgruntled employee in Australia hacked into a sewage system, causing a quarter of a million gallons of raw sewage to flood a hotel and a park. 20) Law enforcement uses key logging software, a form of malware, to detect crime. 21) Detecting fraud where two or more people are in collusion to override controls is less difficult because it is much easier to for one or more fraud perpetrators to reveal the fraud. 22) Social engineering attacks often take place over the Internet. 23) Encryption is one of the many ways to protect information in transit over the internet. 24) Training can also reduce the risk of system downtime. 25) The bill of lading is a legal contract that defines responsibility for the goods in the company's warehouse. 26) Under the EOQ inventory approach, carrying costs are usually ignored for low-cost/low-usage items. 27) Implementing a modern costing approach often results in short-term declines in profitability. 28) Corporate strategy should affect the way a firm deploys an accounting information system. 29) The existence of relevant data guarantees the data are useful. 30) The Sarbanes-Oxley Act requires auditors to create flowcharts to document business processes. 31) A 16-year-old hacker was able to access the systems of U.S. Missile Command and accidently launched a small nuclear missile, which fortunately, failed to detonate. 32) Steganography malware uses encryption to increase its effectiveness. 33) Preventive controls are usually superior to detective controls 34) Many corrective controls rely on human judgment. 35) Encryption is not a panacea to protecting confidential information

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Analytics For Accounting

Authors: Vernon Richardson

3rd Edition

1264444907, 9781264444908

More Books

Students also viewed these Accounting questions