Info
Warning
Danger

Study Resources (Accounting)

Objective 1 1) Accounting professionals are often the end users of the accounting system. 2) Database developers design and write the software for applications, such as accounting software. 3)  System development life cycle is the order and timing of when the SDLC phases are completed. 4) ________ uses techniques to organize and streamline.
15 Views
View Answer
Match the normalization rule to the appropriate definition. A) No field can have multiple values. B) The table identifier (primary key) should not be a composite key. C) Every identifier should be a candidate key 22) Rule 1: First Normal Form (1NF) 23) Rule 2. Second Normal Form (2NF) 24) Rule 3. Boyce-Codd Normal Form (BCNF) 25).
4 Views
View Answer
11) ________ depicts the relationship among entities in the database. 12) A specific customer, such as Vincent, is an entity ________. 13) All the entity identifiers that uniquely identify the entity are called ________ keys in the database builder realm. 14) In a one-to-many relationship in an ERD, the entity.
5 Views
View Answer
11) In ERM risk assessment, ________ may refer to assessing likelihood using qualitative measures, such as high, medium, or low. 12) In ERM risk assessment, ________ may refer to assessing likelihood using a quantitative measure, such as percentages. 13) In the context of enterprise risk management, ________ refers to the process.
4 Views
View Answer
Objective 5 1) The network administrator must know how to identify potential vulnerabilities and troubleshoot effectively. 2) ________ is the electrical transmission of data through analog or digital transmission media. 3) Network cyberattacks typically target ________ because they offer access to the network. 4) ________ firewall is a special type of firewall located.
3 Views
View Answer
11) In which phase of the SDLC is a need identified that a new system would address? A) Design B) Analyze C) Build D) Plan 12) Which phase in the SDLC typically takes the longest? A) Buy/Build B) Deploy C) Plan D) Design 13) Which activity is a cross-life-cycle activity? A) Testing B) Presentations C) Documentation D) B and C 14) Which of the activities.
3 Views
View Answer
Objective 11 1) Symmetric cryptography uses two keys with one key used to encode and a second related, but different, key to decode the message. 2) Encryption is a useful tool for protecting data in transit and stored in databases. 3) Encryption is a method of converting plaintext data into an unreadable form.
4 Views
View Answer
Objective 4 1) Sustainability practices offer a solution to reduce risk. 2) Effective implementation of ERM requires a robust discussion of the potential impact of not mitigating risks and the likelihood that the risk will impact the organization. 3) ________ practices offer a solution to reduce risk. 4) Focusing on ________ operations reduces.
5 Views
View Answer
11) List three encryption methods. Briefly describe how they work. Objective 12 1) The IT used in an enterprise can actually create vulnerabilities to cyberattacks on this confidential accounting data. 2) New IT security technology A) Is usually worth the investment B) Is less vulnerable to cyberattacks C) May create vulnerabilities and risks to.
5 Views
View Answer
Objective 6 1) A ________ is a hardware device containing a password generator protocol that creates a new password each time the token is used. 2) Which access control threat are programs or devices that examine traffic on the enterprise network? A) Password attack B) Network sniffer C) Identify theft D) Spoofing at log-on 3) Which.
4 Views
View Answer
21) In value chain analysis, what is the activity of arranging the delivery of products to customers called? A) outbound logistics B) inbound logistics C) shipping D) delivery 22) An AIS provides value by A) improving products or services through information that increases quality and reduces costs. B) providing timely.
3 Views
View Answer
11) Database modeling consists of preparing a pictorial representation of the accounting database. 12) Design feasibility includes operational, economic, technical, schedule, cultural, and risk feasibility of the proposed IT architecture for the new system. 13) Economic feasibility assesses the probability of successful implementation and use of the new system, including any.
5 Views
View Answer
Match the malware with the appropriate definition. A) Tiny piece(s) of programming code that install themselves on the infected computer called a Zombie B) Similar to a virus except it does not need a host application to function or reproduce C) Code is disguised as a legitimate program, that can be downloaded and.
3 Views
View Answer
Objective 4 1) In SQL, Data Definition Language statements select, insert, update, and delete database records. 2) SQL DML statements are used to build queries required for accounting and financial applications. 3) ________ is a fourth generation, nonprocedural language designed to define and manipulate relational database objects. 4) In SQL, ________.
6 Views
View Answer
Match the ERM component name to the appropriate definition. A) This ensures that the enterprise has a process for setting goals that are consistent with the entity's mission and risk appetite. B) This involves ensuring relevant data is captured and communicated effectively throughout the organization to appropriate individuals in a timely manner. C).
4 Views
View Answer
Objective 4 1) The SDLC provides a common language for communicating with programmers, system analysts, database administrators, and other IT professionals engaged in accounting system development. 2) The plan phase of a SDLC involves designing new system models to satisfy user requirements, either by creating a new model or by modifying.
6 Views
View Answer
39) How many times does the deploy phase occur in the ABC methodology of software development? A) 0 B) 3 C) 1 D) 2 40) Which category in Weatherbe's PIECES framework relates to confidentiality, integrity (accuracy and completeness), or availability of data? A) Information problem B) Control problem C) Efficiency problem D) Performance problem 41) Which category in Weatherbe's PIECES.
6 Views
View Answer
9) In addition to filename, location, and purpose, what other information should be recorded for improved spreadsheet risk management? 10) What control objectives are met by storing spreadsheets on a network server? How are these objectives met? 11) The company where you work is implementing risk management for spreadsheets. This includes adding.
9 Views
View Answer
21) A ________ analysis identifies any difference between the specifications of the baseline accounting system and the enterprise-specific user requirements. 22) According to Weatherbe's PIECES framework for problem analysis, a problem that relates to system issues, such as system availability, is classified as a ________ problem. Match the category in Weatherbe's.
4 Views
View Answer
11) Which software methodology more closely reflects the methodology used in practice today for most systems development? A) Prototyping methodology B) ABC methodology C) Spiral methodology D) Waterfall methodology 12) Which of the following is an advantage of the ABC methodology of software development over the waterfall methodology? A) It more closely reflects the methodology used.
4 Views
View Answer
Objective 3 1) Risk assessment is the acceptable level of variation in attaining objectives. 2) In ERM risk assessment, possibility may refer to assessing likelihood using a quantitative measure, such as percentages. 3) When risk responses are being considered, the costs and benefits of options may play a major role in the final.
4 Views
View Answer
9) What are the main functions of an accounting system? 10) What type of IT professionals are involved in the design and development of the accounting system? 11) Why do accountants need to know about the processes IT professionals use for system development? 12) What type of technology is typically used in an.
6 Views
View Answer
31) Inventory information is provided in real time by a firm's accounting information system. The accuracy of this information is questionable, however, since the production manager often reports stock outs of components that the system indicates are in stock. Which of the following characteristics of useful information is absent in.
2 Views
View Answer
Match the design feasibility name to the appropriate definition. A) Assesses whether the new system IT architecture can interact with the existing IT architecture that will remain in use B) Evaluates whether the current IT personnel and enterprise users can run the new system hardware and software C) Assesses the probability of successful.
5 Views
View Answer
Objective 3 1) The system development life cycle lists what steps to complete. 2) The waterfall methodology of software development consists of two stages: Baseline and Customization. 3) In the prototyping methodology of software development, all the user requirements are gathered and analyzed before the product is built. 4) A ________ determines the specific.
4 Views
View Answer
11) The ________ database structure is used by data warehouses. 12) ________ is a piece of information about events and objects. 13) Database anomalies are removed through ________ and/or database modeling. 14) The database ________ creates the database model. 15) The database ________ creates the database. Match the database integrity rule to the.
7 Views
View Answer
21) How can a risk management philosophy provide consistency in risk attitudes throughout an organization? A) By anticipating all possible risks B) By providing event specific examples C) By being well-developed and articulated D) By setting employee expectations 22) Strategic objectives, also called ________, establish an organization's purpose. A) Mission B) Goal C) Vision D) A and C 23) Strategic.
6 Views
View Answer
Objective 2 1) An entity occurrence describes a property of the entity (an object or event). 2) Entity identifiers are attributes that uniquely identify an entity occurrence. 3) For a single occurrence of one entity (one customer), cardinality defines the maximum and minimum number of occurrences that might relate to the other entity.
5 Views
View Answer
11) Which REA diagraming rule states at least two agent entities are required for an event entity. A) Rule 1. Resource-event relationship B) Rule 2. Event-event relationship C) Rule 3. Agent-event relationship D) Rule 4. Agent-agent relationship 12) What are the four rules for designing an REA diagram? Include a definition for each. 13) You are.
5 Views
View Answer
Objective 1 1) Controls are risk driven, so understanding risk is a prerequisite to the appreciation and application of control. 2) Risk intelligence moves beyond just managing risk to using risk intelligently to create value for the enterprise. 3) Enterprise risk management (ERM) goes beyond just security and controls. 4) Identifying, assessing, and.
16 Views
View Answer
46) What project management activities are typically conducted in the planning phase of the SDLC? 47) List and define the categories in Weatherbe's PIECES framework for problem analysis. 48) After the system design phase is complete, the system proposal is submitted to the client for approval. What information is included in the.
11 Views
View Answer
Match the database realm to the appropriate activity. A) Update data B) Create database tables C) Create database model 20) Database designer realm 21) Database builder realm 22) Database user realm 23) Which database architecture is typically used for operational databases? A) Dimensional B) XBRL C) Relational D) Network 24) Which database architecture is typically used for data warehouses? A) Dimensional B) XBRL C) Relational D).
6 Views
View Answer
Objective 1 1) Well-designed databases and queries determine whether accounting professionals are able to retrieve accurate accounting data. 2) The database design impact how well the database serves the needs of the enterprise. 3) The database integrity rule Referential Integrity states that field values must be from a predefined domain. 4) The database integrity.
16 Views
View Answer
Objective 2 1) The COSO Enterprise Risk Management framework replaces the COSO framework for internal control. 2) ERM Operational objectives relate to goals that support the entity's mission. 3) It is possible for a company to be 100% risk free. 4) ________ is a COSO framework that provides guidance for managing risk..
3 Views
View Answer
31) What is risk tolerance? Provide an example. 32) What are the important questions to ask when assessing a risk's impact? 33) What are the important questions to ask with assessing a risk's likelihood of occurring? 34) Assessment techniques used to assess risk are grouped into two categories. What are these categories? Define.
10 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

d
Let us boost your grade together!

Get 24/7 homework help from Experts

Let our knowledge be your backup

1

Submit your homework question or assignment

2

Receive a quote & Make the Payment

3

Sit Back & Relax to Earn Better Grades!

Drag files here or Browse your Device

Maximum file size 10MB
17,475 Accounting Questions Answered! Get Answer

We are The Best Because

  • On Time Delivery
  • Plagiarism ReportFree
  • Unlimited RevisionsFree
  • 100% Privacy & Confidential
  • 24/7 Live Chat Support
4.9 (16129 Ratings)
You can communicate directly with your expert until the solution quality is delivered to your complete satisfaction.
Looking for writing help?
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!