Search
Info
Warning
Danger

Study Resources (Accounting)

  Multiple Choice Questions 6.The term phishing is used to describe:                             e-mails that include personal information.                            e-mails from retailers with coupons.                             e-mails that ask for sensitive information by pretending to be a legitimate request from an organization.                            e-mails that are sent from fishing wholesalers. 7.You can password protect all of the following files.
1 Views
View Answer
                                                       41.The information system that is intended for an organizational level rather than a business area is the:                             finance information system.                            human resources information system.                             information services information system.                            executive information system. 42.Which subsystem is the fifth ingredient of the marketing mix?                             product subsystem                            place subsystem                             integrated-mix subsystem                            promotion subsystem 43.Which.
1 Views
View Answer
True-False Questions 1.The desired state identifies the standards for what the system should achieve. 2.The difference between the current state and the desired state represents the optimal state. 3.External constraints take the form of pressures from various environmental elements that restrict the flow of resources into and out of the firm. 4.A symptom is.
4 Views
View Answer
Chapter 10 Ethical Implications of Information Technology True-False Questions 1.Morals are a suite of guiding beliefs, standards, or ideals that pervades an individual or a group or community of people. 2.Morals are a social institution with a history and a list of rules. 3.Software that is illegally copied and then used or sold is referred.
4 Views
View Answer
  Essay Questions 16.What are the disadvantages of creating a Web page with a text editor? 17.What are the advantages to coding HTML in Notepad? 18.Why should managers be informed consumers of the Web page development process? 19.Name three types of links and their usage on a Web page. .
1 Views
View Answer
Fill in the Blanks 61.The ____________ mix consists of four main ingredients that management manages in order to meet customers’ needs at a profit. 62.The ____________ provides information about the firm’s distribution network. 63.A data mart is a database that contains data describing only a segment of the firm’s operations. 64.The ____________ process combines.
1 Views
View Answer
Fill in the Blanks 61.____________ is the activity of providing such machines as computers with the ability to display behavior that would be regarded as intelligent if it were observed in humans. 62.A ____________ is a rule of thumb or a rule of good guessing. 63.A ____________ is a condition produced by the.
2 Views
View Answer
  Essay Questions 16.Why is it important that you be able to establish the version of the application software on your computer? 17.Explain what e-mail etiquette is at work? 18.What are the two types of protection available for your computer against antivirus and antispyware? 19.How can you password protect a Word document, Excel spreadsheet or.
1 Views
View Answer
                                                       51.Which of the following is not a characteristic of data warehouses?                             The storage capacity is very large scale.                            The data is very easily retrievable.                             The data describes only a segment of the firm’s operations.                            The data is used solely for decision making. 52.A database that contains data describing only.
1 Views
View Answer
41.Which one of the following is not an expected security-related practice for retailers that Visa has established?                             Install and maintain a firewall.                            Encrypt stored data.                             Screen employees who have access to data.                            Use and update antivirus software. 42.Which one of the following is not a general practice that retailers should follow.
0 Views
View Answer
Fill in the Blanks 61.A ____________ is a signal that things are going better or worse than planned. 62.A ____________ is a condition that is produced by the problem and is usually more obvious than the root cause of the problem. 63.____________ prepares the problem solver by providing a systems orientation. 64.A ____________ is.
1 Views
View Answer
  Multiple Choice Questions 6.Which statement is false regarding drop-down menus?                             Drop-down menus offer mutually exclusive choices.                            Drop-down menus take up more space on the screen than do radio buttons.                             Drop-down menus are superior to radio buttons when there are numerous choices.                            Drop-down menus do not display all of the choice options.
3 Views
View Answer
41.In the corporate credo for Security Pacific Corporation, who is the first commitment to?                             commitment to employee                            commitment to customer                             commitment of employee to employee                            commitment to communities 42.The analysis of the nature and social impact of computer technology as well as the corresponding formulation and justification of policies for the.
1 Views
View Answer
  Fill in the Blanks 11.Knowing how to create a ____________ in a Web page is an important skill. 12.Microsoft FrontPage has many ____________ that can perform the same operations with a single click of the mouse. 13.____________ can be powerful communications on a Web page. 14.If you move the cursor over an icon and.
1 Views
View Answer
True-False Questions 1.Lists, images, links, and tables are standard features in Web pages. 2.In the design of Web pages, it may sometimes be better to have a single, long Web page instead of several short Web pages. 3.HTML pages are comprised of the “head,” the “body,” and the “footer.” 4.You can successfully view your.
4 Views
View Answer
21.Formal controls include education and training programs and management development programs in the firm. 22.COBIT focuses on the process that a firm can follow in developing standards, paying special attention to the writing and maintaining of the documentation. 23.GASSP is a product of the International Standards Organization and it provides a list.
0 Views
View Answer
11.The human resources information system provides information to managers throughout the firm concerning the firm’s human resources. 12.An executive information system has the drill across ability so the user can bring up a summary display and then successively display lower levels of detail. 13.The primary data sources of a data warehouse are.
2 Views
View Answer
51.Which type of control is recognized as being the best bet for security?                             technical control                            access control                             cryptographic control                            physical control 52.Which type of control establishes codes of conduct, documentation of expected procedures and practices, and monitoring and preventing behavior that varies from the established guidelines?                             technical control                            access control                             formal.
0 Views
View Answer
  Multiple Choice Questions 6.An ordered list implies:                             more than one choice.                            the most important item is listed first.                             you can choose more than one item.                            there are more than two choices. 7.You can change the title of the project by choosing the:                             “Different name” command.                            “Change” command.                             “Title” command.                            “File” command. 8.The following.
2 Views
View Answer
Multiple Choice Questions 31.When the firm seeks to protect its data and information from disclosure to unauthorized persons, the information security objective is:                             confidentiality.                            availability.                             accuracy.                            integrity. 32.When all of the information systems should provide an accurate representation of the physical systems that they represent, the information security objective is:                             confidentiality.                            availability.                            .
0 Views
View Answer
Fill in the Blanks 61.The ____________ is a recommended level of security that in normal circumstances should offer reasonable protection against unauthorized intrusion. 62.The term ____________ is used to describe the protection of both computer and non-computer equipment, facilities, data, and information from misuse by unauthorized parties. 63.A ____________ is a computer program.
0 Views
View Answer
  Multiple Choice Questions 6.What format is used to save a Web page in Notepad?                             HTM                            HTML                             TEXT                            DOC 7.Which section of an HTML document includes the title of the Web page?                             header                            footer                             head                            body 8.Which of the following lines of code represents an anchor command?                             <anchor> name=“top_of_page”                            <anchor> name=“top_of_page”<anchor>                             <a>name=“top_of_page”</a>                            <a name=“top_of_page”> 9.The.
2 Views
View Answer
  Multiple Choice Questions 31.The term used to define a response to things going good as well as things going bad is:                             problem solving.                            a problem.                             decision making.                            a decision. 32.According to Herbert Simon, which problem-solving phase incorporates inventing, developing, and analyzing possible courses of action?                             intelligence activity                            design activity                             choice activity                            review.
1 Views
View Answer
True-False Questions 1.Most people find it fairly easy to use FrontPage to create a Web page. 2.A disadvantage of using FrontPage to create a Web page is the unknown language. 3.The disadvantage of using FrontPage to create a Web page is the inefficient HTML code that is generated. 4.Knowing how to create a table.
3 Views
View Answer
21.A concurrent audit is the same as a financial audit except that the concurrent audit is ongoing. 22.Internal auditors should participate in systems development because they can offer expertise that can improve the quality of the system. 23.In meeting the control requirements imposed by NCR, the CIO must ensure that such controls.
1 Views
View Answer
41.The type of decisions that are “novel, unstructured, and unusually consequential” are referred to as:                             programmed decisions.                            semistructured decisions.                             nonprogrammed decisions.                            unstructured decisions. 42.What term does Robert Anthony use to describe the middle level of management?                             strategic planning level                            tactical planning level                             management control level                            operational control level 43.What term does Robert.
1 Views
View Answer
  Essay Questions 16.What is the greatest advantage and disadvantage of creating a Web page using Microsoft FrontPage? 17.How do you start the Microsoft FrontPage program? 18.The link “Go to Top of Page” is a navigation aid that provides what kind of help? 19.How do you change the title of the project? .
1 Views
View Answer
  Fill in the Blanks 11.The ____________ section contains the part most people think of as the Web page. 12.The ____________ section of an HTML document determines what the user will see displayed on the screen. 13.The ____________ section of an HTML document conveys information to the Web browser software. 14.Once the ____________ has been.
1 Views
View Answer
True-False Questions 1.Text areas allow multiple lines while a text field allows only a single line. 2.The <form> command tells the Web browser that the Web page will engage in capturing information from the user. 3.The word “checked” causes the Web page to have that choice as the default. 4.For the choices to be.
5 Views
View Answer
True-False Questions 1.The transaction processing system has a responsibility to furnish information on each environmental element. 2.An example of a transaction processing system is a distribution system. 3.All organizations are in the distribution business in one form or another. 4.A context diagram presents the system in the context of its environment. 5.Data flows in a.
4 Views
View Answer
                            41.Which of the following is not a stage in developing an evolutionary prototype?                             Identify user needs.                            Develop a prototype.                             Use the prototype.                            Code the operational system. 42.Which of the following is not a stage in developing a requirements prototype?                             Identify user needs.                            Develop a prototype.                             Determine if the prototype is.
1 Views
View Answer
                            51.During which stage of phased development does training occur?                             design                            preliminary construction                             final construction                            system test and installation 52.Which BPR process had its origin in business intelligence?                             information engineering                            reverse engineering                             restructuring                            reengineering 53.The BPR process that is the transformation of a system into another form without changing its functionality is:                            .
1 Views
View Answer
51.Which type of auditing activity verifies the accuracy of the firm’s records and is the type of activity performed by external auditors?                             financial audit                            operational audit                             concurrent audit                            internal control systems design 52.The system feature that is audited to see if the system’s operations are carried out to achieve the greatest.
1 Views
View Answer
11.James Moor has defined computer ethics as the analysis of the nature and social impact of computer technology, as well as the corresponding formulation and justification of policies for the ethical use of such technology. 12.James Moor believes that the two main reasons for society’s high level of interest in computer.
1 Views
View Answer
Essay Questions 76.What are the major systems and the subsystems of a distribution system? 77.Define customer relationship management and the CRM system. 78.Describe what happens to data as it goes through the staging area in a data warehouse. 79.Explain the relationship between OLAP, ROLAP, and MOLAP. .
1 Views
View Answer
  Fill in the Blanks 61.____________ is a collection of guiding beliefs, standards, or ideals that pervades an individual or a group or community of people. 62.____________ is software that is illegally copied and then used or sold. 63.____________ are formal rules of conduct that a sovereign authority, such as a government, imposes on.
1 Views
View Answer
Multiple Choice Questions 31.Which statement is false concerning transaction processing systems?                             The system gathers data describing the firm’s activities.                            The system transforms data into information.                             The system makes the information available to users inside and outside the firm.                            The system was the first computerized business application to be installed in the.
1 Views
View Answer
11.A model is an abstraction of something. 12.All business communications are physical models. 13.A model only represents its entity and never matches it exactly. 14.A satisficing model is one that selects the best solution among the alternatives. 15.The term scenario is used to describe the conditions that influence a simulation. 16.The iterative process of trying.
1 Views
View Answer
Essay Questions 76.Explain the five things that the systems view does to increase its value to the manager. 77.Identify and define the three approaches Henry Mintzberg suggests for selecting the best solution. 78.What are the three dimensions that can be used to classify mathematical models? 79.Explain the four advantages of modeling. .
1 Views
View Answer
21.The final element in the data warehousing system is the information delivery system. 22.The process of drilling through the data in a data warehouse originated with executive information systems. 23.OLAP refers to online application processing. 24.MOLAP utilizes a special multidimensional database management system. 25.ROLAP can easily produce outputs at detailed levels and at a.
1 Views
View Answer
True-False Questions 1.Microsoft Windows is the most popular operating system for microcomputers. 2.You don’t need to be concerned with Microsoft’s releases of service packs for its operating systems. 3.Many managers and professionals use the Microsoft Office suite of products to complete their everyday tasks. 4.As a manager and professional, you don’t need to be.
4 Views
View Answer
Multiple Choice Questions 31.Traditions of belief about right and wrong conduct are:                             ethics.                            computer ethics.                             laws.                            morals. 32.Formal rules of conduct that a sovereign authority, such as a government, imposes on its subjects or citizens are:                             laws.                            computer ethics.                             morals.                            ethics. 33.Which of the following laws was passed in the 1970s dealing with.
1 Views
View Answer
21.A spreadsheet lends itself to playing the what-if game because the user can manipulate one or more variables to see the effect of the outcome of the simulation. 22.Artificial intelligence can mimic human reasoning with 100% accuracy. 23.The most popular type of knowledge-based system is the expert system. 24.The user interface of an.
1 Views
View Answer
11.Impact severity can be classified as having a major impact when breakdowns that are typical of day-to-day operations occur. 12.When the level of impact is determined to be minor and the vulnerability is determined to be low, then vulnerability analysis is unnecessary. 13.The final step in writing a risk analysis report should.
1 Views
View Answer
True-False Questions 1.The term systems security is used to describe the protection of both computer and noncomputer equipment, facilities, data, and information from misuse by unauthorized parties. 2.The information security objective of confidentiality means that the firm seeks to protect its data and information from disclosure to unauthorized persons. 3.Information security management is.
3 Views
View Answer
51.Which type of model has predictive capability?                             narrative model                            graphic model                             physical model                            mathematical model 52.The model that does not include probabilities is referred to as a(n):                             probabilistic model.                            deterministic model.                             optimizing model.                            suboptimizing model. 53.The act of using a model is called:                             optimizing.                            suboptimizing.                             satisficing.                            simulation. 54.Which statement is false regarding mathematical.
1 Views
View Answer
  Fill in the Blanks 11.____________ are continually trying to find ways to break into the operating system and take control of your computer. 12.The computer progam that runs all the other programs on your computer is the ____________. 13.A ____________ is a collection of updates that fixes errors in the code that affect.
1 Views
View Answer