Info
Warning
Danger

Accounting Expert Answers, Study Resources & Learning Aids

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
11.3   Essay Questions 1) List the major functions of the IS department. 2) Describe the CIO's typical reporting relationships. 3) Describe the typical responsibilities of a CTO. 4) Name the four groups found in a typical IS department and explain the major responsibilities of each. 5) Explain the major IS planning functions. .
7 Views
View Answer
31) Encryption is an example of a technical safeguard. 32) In symmetric encryption, two different keys are used to encode and decode a message. 33) Symmetric encryption is simpler and much faster than asymmetric encryption. 34) Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption. 35) Viruses and worms.
12 Views
View Answer
13.3   Essay Questions 1) Briefly explain the two major ways in which thinking about competitive strategies has changed in the emerging global economy. 2) List the issues that need to be addressed when localizing a computer program. 3) How are international processes likely to be developed to overcome the challenges presented by the.
15 Views
View Answer
47) Which of the following statements best describes Moore's Law? A) A computer processor becomes obsolete within 18 months. B) The speed of a computer processor doubles every 18 months. C) The number of transistors per square inch on an integrated chip doubles every 18 months. D) The total number of transistors produced in.
13 Views
View Answer
12.1   True/False Questions 1) As problems caused by human errors are accidental and not malicious, they are not considered as security threats to the information system. 2) A computer crime is committed if an employee inadvertently installs an old database on top of the current one. 3) Unauthorized data disclosures are possible due.
22 Views
View Answer
31) In asymmetric encryption, each site has a ________ for encoding messages. A) botnet B) private key C) public key D) cookie 32) With ________, the sender and receiver transmit a message using different keys. A) asymmetric encryption B) block cipher C) symmetric encryption D) stream cipher 33) Secure Socket Layer is also known as ________. A) application layer B) transport layer.
13 Views
View Answer
21) Changes in structured processes are easy to implement. 22) Control is critical in structured processes. 23) Innovation is not expected in structured processes, but it is required in dynamic processes. 24) Effectiveness is an important characteristic of both structured and dynamic processes. 25) Procedures for dynamic processes typically delimit what the users of.
7 Views
View Answer
1) Business processes involve resources, such as people, computers, and data and document collections. 2) All repositories are databases. 3) Most businesses choose not to standardize business processes in order to avoid inconsistencies in results. 4) Standardized business processes reduce risks. 5) The five-component framework is present in every information system, from the.
21 Views
View Answer
41) Unlike data, information remains constant from person to person. 42) Good information is conceived from accurate, correct, and complete data. 43) Data must be accurate in order to improve the quality of information. 44) Information system users ought to rely on data if it appears in the context of a Web page. 45).
10 Views
View Answer
11) Describe the loss of control associated with outsourcing. 12) Explain how the benefits of outsourcing are outweighed by its long-term costs. 13) Explain the risks associated with ending an outsourcing agreement. 14) List any four rights of users of information systems. 15) List any four responsibilities of users of information systems. .
17 Views
View Answer
21) Nonword passwords are also vulnerable to brute force attacks. 22) Even short passwords with no special characters can make strong passwords. 23) It is safer to use the same password for all the Web sites. 24) The senior management must establish a company-wide security policy that states the organization's posture regarding the.
12 Views
View Answer
31) A business that selects a differentiation strategy would necessarily structure itself around least-cost activities. 32) A business with a differentiation strategy will add cost to an activity as long as the activity has a positive margin. 33) The difference between the value that an activity generates and the cost of the.
9 Views
View Answer
61) Which of the following components of a functioning information system includes the computer, keyboard, and monitor? A) software B) procedures C) data D) hardware 62) Which of the following components of an information system functions as a bridge between the human side and the machine side of the information system framework? A) data B) hardware C) software D).
11 Views
View Answer
11) The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies. A) data administration B) data warehousing C) data mining D) data communication 12) A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps.
8 Views
View Answer
11) When a hacker floods a Web server with millions of bogus service requests so that it cannot service legitimate requests, it is called a denial-of-service attack. 12) Natural disasters present the largest risk for infrastructure loss. 13) In the context of information security, safeguards increase work efficiency by making common.
14 Views
View Answer
41) Supporting functions of the value chain add value indirectly, and hence do not incur costs. 42) It is difficult to calculate the margin of supporting activities because the specific value added by supporting activities is difficult to know. 43) Manufacturing systems use linkages to reduce inventory costs. 44) Value chains and linkages.
9 Views
View Answer
21) Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost. A) bookmarks B) pop-ups C) cookies D) toolbars 22) Which of the following is a critical security function that the senior management should address in an organization? A) sharing the private key with.
10 Views
View Answer
12.2   Multiple-Choice Questions 1) A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) target B) vulnerability C) threat D) key escrow 2) Which of the following is considered a threat caused by human error? A).
15 Views
View Answer
31) Human intuition does not play any role in a dynamic process. 32) Efficiency means accomplishing the process with minimum resources. 33) The instructions of a dynamic process are more rigid when compared to a structured process. 34) Rather than being controlled, dynamic processes are adaptive. 35) Information systems that support a dynamic process.
14 Views
View Answer
21) Which of the following statements is true about the steering committee of an IS department? A) The steering committee is comprised exclusively of employees from the IS department in an organization. B) The steering committee's membership is determined by the IS department. C) The steering committee's schedule and agenda are typically set.
7 Views
View Answer
51) A(n) ________ is referred to as a sequence of activities for accomplishing a function. A) value chain B) information system C) business process D) repository 52) A(n) ________ is referred to as a task within a business process. A) activity B) schedule C) role D) plan 53) A ________ is referred to as a subset of the activities in.
13 Views
View Answer
11) An information system is a collection of components, including a computer, that stores and retrieves data and produces information. 12) A process may use multiple information systems, and an information system may touch many different processes. 13) Information systems are typically acquired off-the-shelf in time of need. 14) Like business processes, information.
10 Views
View Answer
11) Which of the following best describes the bullwhip effect? A) the value of a telecommunications network is proportional to the square of the number of users connected to the system B) the performance improvement to be gained from using some faster mode of execution is limited by the fraction of the.
12 Views
View Answer
11) ________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. A) Pretexting B) Phishing C) Hacking D) Spoofing 12) Which of the following is most likely to be a result of hacking? A) certain Web sites being censored.
11 Views
View Answer
81) Dynamic processes are evaluated on effectiveness more than efficiency because ________. A) they are difficult to change B) the efficient use of resources does not matter in the case of such processes C) they are highly controlled and standardized D) they change so fast that it is often not possible to measure efficiency.
9 Views
View Answer
51) ________ involve the people and procedure components of information systems. A) Firewalls B) Technical safeguards C) Human safeguards D) Payloads 52) Which of the following statements is true about human safeguards for employees? A) Security screening in an organization is a one-time process and applies only to new employees. B) User accounts should be defined to.
8 Views
View Answer
11.2   Multiple-Choice Questions 1) Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department. A) human resources B) information systems C) marketing D) manufacturing 2) Which of the following statements is true of an IS department? A) If the IS primarily supports accounting and finance activities, the CFO is appointed as.
6 Views
View Answer
6) Describe a steering committee and explain the CIO's role with regard to it. 7) What is outsourcing? Explain the management advantages of outsourcing. 8) How does outsourcing help reduce costs? 9) How does outsourcing facilitate risk reduction? 10) Describe the different outsourcing alternatives for hardware, software, data, and procedures. .
11 Views
View Answer
96) How is the five-component framework used to estimate the scope of new information systems? 97) Arrange the components of an information system in the correct order based on difficulty and disruption. 98) Explain the role of procedures. 99) Explain the two broad categories of processes with relevant examples. .
6 Views
View Answer
21) Competition from rivals is particularly high when industry growth is slow and when exit barriers are high. 22) The strength of the bargaining power of suppliers and customers depends on the switching costs and product differentiation. 23) A company that states a strategy of low cost leadership and a differentiation on.
8 Views
View Answer
86) State Moore's Law and describe its effects on the business environment. 87) What is abstract reasoning and systems thinking? Give an example for each. 88) Explain the meaning of collaboration and experimentation with the help of examples. 89) Define management information systems. 90) What are processes, information systems, and information? .
7 Views
View Answer
41) If a backup of the database contents is made, the database is completely protected. 42) Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss. 43) Employee termination is a potential security threat for an organization. 44) The existence of accounts that are no.
13 Views
View Answer
11) The five-component framework can be used when assessing the scope of new systems. 12) Changing the structure of existing databases is an easy task. 13) Ordering additional hardware for an information system is a complex task. 14) Procedures link information systems to processes. 15) A process cannot be supported by more than one.
30 Views
View Answer
71) Which of the following statements is true about processes and procedures of an information system? A) Each information system has a different procedure for every process it supports. B) A process will have the same procedure for every information system. C) Changes to an information system will not affect the processes that.
75 Views
View Answer
31) Which of the following is an example of outsourcing an entire business function? A) acquiring licensed security software instead of developing it in-house B) making customizations to licensed software C) outsourcing the function of arranging employee travel D) outsourcing the payroll function 32) In 2005, Marrion International chose a human resources consulting agency to.
7 Views
View Answer
13.1   True/False Questions 1) The global economy has intensified rivalry by increasing product and vendor choices and by accelerating the flow of information about price, product, availability, and service. 2) Unlike business processes, information systems procedures need not reflect local cultural values and norms. 3) Distributed database processing refers to the processing of.
21 Views
View Answer
41) A ________ is a type of virus that propagates using the Internet or other computer networks. A) worm B) sniffer C) Trojan horse D) phisher 42) ________ is similar to spyware but it watches user activity and produces pop-ups. A) A cookie B) Adware C) A payload D) Shareware 43) Which of the following is likely to be accepted.
8 Views
View Answer
13.2   Multiple-Choice Questions 1) Which of the following statements is true of the impact of globalization on value chains and business processes? A) International companies are now required to conduct sales and marketing efforts entirely in the parent country. B) Companies prefer to perform all their processes in-house, as it is more cost-effective.
17 Views
View Answer
57) Ellen is the marketing manager of Qtopia Inc. She often develops ideas and plans with the help of her colleagues, and provides and receives critical feedback. According to Reich's four critical skills, Ellen is displaying ________ skills. A) collaboration B) systems thinking C) abstract reasoning D) experimentation 58) ________ is defined as making a.
10 Views
View Answer
67) Which of the following is an industry barrier for new entrants in an established market? A) low financial investments B) government policies C) low customer switching costs D) accessible distribution channels 68) Willoughby Inc., a large chain of superstores, sources its products from thousands of suppliers who have limited product differentiation. The products stored.
9 Views
View Answer
41) The organization should protect a user's computer and its files. 42) IS users are restricted from participating in requirements meetings for new applications that they will use and for major changes to applications that they currently use. 43) It is reasonable for IS users to expect to receive repetitive training and.
20 Views
View Answer
95) Define value, margin, and value chain. 96) What are the primary activities in the value chain? 97) What are the support activities of a value chain? 98) How does Porter define procurement, technology, human resources, and firm infrastructure? 99) Explain the meaning of value chain linkages with the help of an example. 100) Define.
8 Views
View Answer
12.3   Essay Questions 1) Define threat, vulnerability, safeguard, and target. 2) What are the three general sources of security threats? 3) What is meant by denial of service? 4) Describe the magnitude of security problems in the present day. 5) List various personal security safeguards. .
7 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*