Info
Warning
Danger

Accounting Expert Answers, Study Resources & Learning Aids

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
41) There are ________ simple shapes used in Data Flow Diagrams. 42) Process models can create ________ when they help individuals develop an improved understanding of the process as a whole and become more process aware. 43) ________ is the most popular application used by data modeling practitioners. 44) The lowest amount of.
16 Views
View Answer
81) ________ occurs when an intruder uses another site's IP address as if it were their own. 82) Unauthorized data disclosure can occur by simple human ________ when someone inadvertently releases data in violation of a policy. 83) Phishing is an example of unauthorized data ________. 84) A(n) ________ is an operation or.
7 Views
View Answer
31) MS Visio files have the file extension A) (.exe). B) (.osd). C) (.vsd). D) (.DFD). E) (.doc). 32) Every process should have at least one data flow ________ coming into it and out of it. A) diagram B) entity C) positive D) connector E) MS Visio file 33) Data stores cannot be directly connected to an external A) data store. B) entity. C).
12 Views
View Answer
71) ________ is an organization-wide function that is in charge of developing data policies and enforcing data standards. A) Data contents protection B) Data safeguarding C) Data integrity D) Data administration E) Data rights administration 72) User accounts should be given (the) ________ to perform their jobs. A) least possible privileges needed B) most possible privileges needed C) administrator.
7 Views
View Answer
101) In the SDLC, acquisition begins with a ________ process that identifies the need for a new system. 102) What are the steps to acquire information system? 1)System definition 2)Requirements analysis 3)Component design 4)Implementation 5)System maintenance 103) What is an IT project? 104) What are three areas that affect IT project risk? 105) What is ITPM? 106) Why are project.
15 Views
View Answer
31) Be sure and purchase your antispyware program from a(n) ________ vendor, because some free programs in the past were actually malware programs in disguise. A) reasonable B) reputable C) entrepreneurial D) inexpensive E) illegitimate 32) Users should scan their computers with anti-malware programs at least A) once a year. B) biannually. C) once a week. D) daily. E) once a.
8 Views
View Answer
31) Access displays the ________of a field as help text on forms. A) description B) data type C) name D) colour E) attribute 32) ________ is one of many reserved words in the Access environment. A) "Value" B) "Data" C) "Colour" D) "Name" E) "Variable" 33) It is possible to create a primary key composed of ________ columns or fields. A) relational B) linked C).
11 Views
View Answer
71) ISACA has become a leader in A) IT alignment. B) financial and accounting audits. C) developing new information systems. D) IT audits and IT governance. E) IS architecture development. 72) A financial audit can be defined as an examination and verification of a company's ________ and accounting records by an accredited professional. 73) The ________ framework.
8 Views
View Answer
11) The Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 90 000 professionals. 12) The purpose of an information systems audit is to verify organizations' information systems policies and procedures. 13) An IT architecture is like a plan for a city that lays out.
13 Views
View Answer
1) Before the advent of computers accountants used paper spreadsheets. 2) Today the term spreadsheet almost always refers to electronic models. 3) The Save As option allows you to rename the current file. 4) The tabs in Excel control the contents of the ribbon. 5) The FORMULAS tab in Excel is used to format.
22 Views
View Answer
81) Data ________ problems make your database unreliable. 82) Entities have a(an) ________, which is an attribute whose value is related to one and only one entity instance. 83) Describe how normalization works. 84) What are the stages in developing a database application? At what point is it easiest to make changes? 85).
11 Views
View Answer
51) Understanding how to interpret E-R diagrams will help you interpret ________ with a bit of study. A) flow diagrams B) relational models C) UML models D) O-O models E) workflow models 52) On difficulty with designing database is the ________ number of possibilities of what to include. A) small B) minimal C) large D) fixed E) known 53) Database developers ________.
6 Views
View Answer
31) A person, place or object would be represented in a database application as a(n) A) entity. B) record. C) table. D) class. E) object. 32) A(n) ________ diagram is like a blueprint of a database application. A) flowchart B) O-O C) workflow D) Entity-Relationship (E-R) E) O-R 33) ________ is (are) the most popular diagramming tool(s) for database applications. A) O-O B) E-R.
5 Views
View Answer
61) One reason that governance is important is A) to ensure that an organization's internal processes can't be verified. B) to maintain the benefits of an organization's IT investments. C) to develop reporting structures and review processes. D) to develop inconsistent management policies. E) to ensure that an organization produces good results while working to.
7 Views
View Answer
41) ________ would be the best identifier attribute for an employee table. A) Birth Date B) Social Insurance number C) Last Name D) Phone number E) First Name and Last Name 42) ________ is the last step in developing a database application. A) Designing the tables with the keys B) Getting the information requirements C) Reviewing the data model.
5 Views
View Answer
31) The Zachman framework divides systems into two dimensions: one is based on reasons for communication and the other is based on ________. 32) Which of the following are in the stakeholder groups listed in the Zachman framework? A) Owner, planner, designer, government, worker B) Worker, government, designer, planner, owner C) Designer, the public,.
8 Views
View Answer
61) Information Technology Project Management skills are central to the skills needed by organizations to ________ (to) an increasingly complex business environment. A) keep up B) manage C) adapt D) remain competitive in E) forge ahead in 62) Organizations that understand the ________ before acquiring new applications are more likely to be successful in integrating software.
20 Views
View Answer
81) A firm that matches its organizational objectives with its IT architecture is said to be in ________. 82) To align organizational strategy with information systems, you need to match the IT ________ with organizational objectives. 83) Bill 198 is known as the ________. 84) The SOX act and Bill 198 both require.
8 Views
View Answer
51) Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment. A) central B) air-conditioned C) high-tech D) fire-resistant E) easily accessible 52) A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster. A) web farm B) development.
9 Views
View Answer
21) Workbooks are made up of multiple pages called A) text. B) arithmetic symbols. C) formulas. D) numbers. E) worksheets. 22) The first thing a user should do once they start to work within an Excel file is to A) save the workbook. B) create a new worksheet. C) add text. D) create the model. E) add formulas. 23) To place a.
7 Views
View Answer
31) It is ________ best to use references to cell rather than number in your spreadsheet formulas. A) rarely B) never C) sometimes D) always E) usually 32) The most frequently used tools and selections can be found in the ________ tab. A) INSERT B) DATA C) CELLS D) HOME E) VIEW 33) To display a preview in Excel click the FILE.
7 Views
View Answer
41) In order to prioritize their activities and protect an organization from possible risk and loss, security personnel must document the position ________ of all employees. A) riskiness B) data access C) controls D) level E) sensitivity 42) ________ considerations should be part of the hiring process. A) Weight B) Position C) Gender D) Age E) Security 43) A company should clearly.
7 Views
View Answer
61) Users often resist biometric identification because they feel it is A) expensive. B) ineffective. C) too technical. D) invasive. E) hard to use. 62) The web site ________ lists simple things to do to lower your risk of identity theft. A) www.wordpress.com B) www.google.ca C) www.safecanada.com D) www.priv.gc.da E) www.equifax.com 63) PIPEDA stands for A) Personal Information Protection and Electronic Disclosure Act. B).
8 Views
View Answer
11) The notation N:N indicates a many-to-many relationship. 12) In E-R diagrams, attributes can be represented with crow's feet. 13) Normalization is a process that helps ensure that the tables from the database design process are well structured. 14) In a 1:N type of relationship, the foreign key is stored on the "1".
15 Views
View Answer
11) Biometric authentication has been around for some time, and because of weaknesses is not likely to see much usage in the future. 12) Technical safeguards involve the hardware and software components of an information system. 13) Malware protection is an example of a technical safeguard. 14) Encryption is one of several technical.
8 Views
View Answer
101) One aspect of security programs is how an organization establishes ________ that provide checks and balances for the people in charge of sensitive data and applications. 102) Enforcement consists of three interdependent factors: (1) responsibility, (2) accountability and (3) ________. 103) What is an unauthorized data disclosure? 104) What is pretexting? 105) What.
19 Views
View Answer
91) ________ occurs when a person gains unauthorized access to a computer system. 92) By starting a computationally intense application at the wrong time, users can inadvertently shut down a network or web server resulting in a(n) ________. 93) A computer ________ is a program that infiltrates networks and generates so much.
7 Views
View Answer
1) Competitive strategy is supported through activities in the value chain, which consist of collection of business processes supported by information systems. 2) Competitive strategy is supported by operational plans. 3) The triple bottom line for organizations includes measuring profitability, social performance and employee satisfaction. 4) The Zachman framework describes competitive forces in.
27 Views
View Answer
21) Data flow diagrams are used by approximately ________ of all process modeling practitioners. A) 78% B) 55% C) 18% D) 42% E) 60% 22) Process modeling practitioners most often use A) Oracle Developer. B) Page Layout. C) Rational Rose. D) MS Visio. E) MS Excel. 23) DFD shapes include A) process, octagons and interface. B) interface, neural, and connector. C) connector, data store.
8 Views
View Answer
1) Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data, such as account numbers. 2) Spoofing is a technique for intercepting computer communications. 3) People who intentionally gain unauthorized access to computer systems are called hackers. 4) Drive-by sniffers take computers with wireless connections.
18 Views
View Answer
41) What is the relationship between an organization's competitive strategy and information system planning? 42) The IT structure is like a A) city building. B) city plan. C) enterprise project. D) enterprise design. E) governmental design. 43) What is information technology architecture? A) A set of photographs of all an organization's existing hardware B) A basic framework for all.
7 Views
View Answer
21) ________ are used by the user to enter data in to an Access database. A) Queries B) Modules C) Tables D) Forms E) Reports 22) ________ ask questions about the data. A) Reports B) Queries C) Modules D) Forms E) Tables 23) You build the links between tables using the ________ window. A) relationships B) relationship wizard C) database diagram D) mapping E) database relationships 24) The.
13 Views
View Answer
21) The need to report and disclose IS operational information will require all employees to become familiar with the issues facing IT management. 22) E-cycling is one of the most important issues in green IT. 23) Green IT means using information technology resources to better support the triple bottom line. 24) Whistle blowers.
34 Views
View Answer
71) The single most important criterion for information systems success is for users to take ________ of their systems. A) on the success B) on the use C) on the task of development D) on the growth E) ownership 72) ________ is the second phase of the SDLC. A) Requirement analysis B) Component design C) Maintenance D) implementation E) System definition 73).
56 Views
View Answer
51) Senior management often justifies reducing the time schedules for system projects by A) saying that they want to reduce the budget. B) saying that the tighter schedules make workers work more efficiently. C) saying that they want to look good to their bosses. D) saying that the workers lack proper motivation. E) saying that.
24 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*