Info
Warning
Danger

Study Resources (Accounting)

11.Within the data center, the data control group is responsible for routing all work into and out of the data center, correcting errors, and monitoring error correction. 12.The IS function of systems development provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes and disks,.
8 Views
View Answer
21.The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions? a.data control b.data preparation (data entry) c.data librarian d.database administration 22.The controlled access to files, programs, and documentation is a principal responsibility of which of the following functions? a.data control b.data preparation (data.
5 Views
View Answer
11.____ can consist of many computers and related equipment connected together via a network. a.PCs b.Servers c.LAN d.firewall 12.In an information systems organization, which of the following reporting relationships makes the least sense? a.the data center manager reports to the CIO. b.systems development manager reports to the data center manager. c.database administration reports to the technical services manager. d.data.
5 Views
View Answer
3.Listed below are several pervasive control plans discussed in Chapter 8. On the blank line to the left of each control plan, insert a "P" (preventive), "D" (detective), or "C" (corrective) to best classify that control. If you think that more than one code could apply to a particular plan,.
7 Views
View Answer
TRUE/FALSE 1.Specifying control goals is the first step in building a control matrix. 2.In the control matrix the M stands for present controls. 3.A control matrix is a tool that assists in evaluating the control goals and recommended control plans of an information system. 4.Control efficiency addresses whether the control goals are being achieved. 5.Control.
16 Views
View Answer
51.Control plans that relate to a multitude of goals and applications are called ________________________________________. 52.A control plan requires that a manager sign his/her approval of timecards for employees in that department. This control plan is an example of a ________________________________________. 53.A batch of business events is accurately entered into a business event.
7 Views
View Answer
31.Digital signatures addresses all of the following control goals except: a.ensure security of resources b.ensure input completeness c.ensure input validity d.ensure input accuracy 32.A sales representative enters the customer's account number and the system retrieves certain data about the customer from master data. This control plan addresses all of the control goals except: a.ensure efficient employment.
10 Views
View Answer
COMPLETION 1.______________________________ consists of the leadership, organizational structures, and processes that ensure that the enterprises’s IT sustains and extends the organization’s strategies and objectives. 2.Data in all their forms that are input, processed, and output by information systems is the IT resource ____________________. 3.IT resource that are automated systems and manual procedures that.
6 Views
View Answer
11.The information systems function ______________________________ provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation. 12.Within the data center, the ______________________________ function grants access to programs, data, and documentation to authorized personnel only. 13.Combining the functions of authorizing.
6 Views
View Answer
PROBLEM 1.Below is an alphabetical list of sources with information and guidance on internal controls. The second list contains descriptions or information provided by these sources. Required: On the blank line to the left of each numbered item, place the capital letter of the source that best matches that description. HINT: Some letters.
7 Views
View Answer
2.The four events-processing functions that constitute the segregation of duties control plan are: A. Authorizing events B. Executing events C. Recording events D. Safeguarding resources resulting from consummating events Required: Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and five relating to the cycle for a purchase.
5 Views
View Answer
41.When they are sent to a customer and returned with the payment, remittance advices are examples of: a.batch control totals b.computer-prepared documents c.written approval controls d.turnaround documents 42.Which of the following activities is not part of the computer agreement of batch totals: a.a batch total is manually computed prior to data entry. b.data shown on source documents.
10 Views
View Answer
41.In an online computing environment, the operating system software generally includes a(n) security module designed to restrict access to programs and data. 42.In an online computing environment, the accumulation of access activity and its review by the security officer is called threat monitoring. 43.Application controls restrict access to data, programs, and documentation. 44.Intrusion-detection.
5 Views
View Answer
31.Batch control plans regulate information processing by calculating control totals at various points in a processing run and subsequently comparing those totals. 32.In order to implement either a batch sequence check or cumulative sequence check, transactions must be captured on prenumbered documents. 33.Dollar totals are a summarization of the dollar value of.
8 Views
View Answer
31.An outside auditing firm annually supervises a physical count of the items in a retail store's shelf inventory. This is an example of: a.authorizing events b.executing events c.recording events d.safeguarding resources 32.A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs it authorizing the removal of the.
6 Views
View Answer
5.The following is a list of 10 control plans: Control Plans A. Populate input screens with master data B. Cumulative sequence check C. Turnaround documents D. Document/record counts E. Document design F. Preformatted screens G. Input/master data dependency check H. Hash total I. Tickler file J. Automated data entry Required: Listed below are ten statements describing a control. On the blank line to.
11 Views
View Answer
41.A(n) ____________________ item is an object or event that is not authorized, never occurred, or is otherwise not genuine. 42.The control goal that is concerned with the correctness of the transaction data that are entered into a system is called ensure _________________________. 43.A missing data field on a source document or computer.
6 Views
View Answer
11.A control plan that makes it easier to prepare the document initially and later to input data from the document is called ______________________________. 12.______________________________ takes the form of a signature or initials on a document to indicate that the proper person has authorized the event. 13.______________________________ control the online entry of data.
8 Views
View Answer
COMPLETION 1.Specifying _________________________ is the first step in building a control matrix. 2.In the control matrix the P stands for ____________________ controls. 3.A ___________________________________ is a tool that assists in evaluating the potential effectiveness of controls in a particular business process by matching control goals with relevant control plans. 4.Control ____________________ addresses whether the.
8 Views
View Answer
51.Which of the following statements related to denial of service attacks is false? a.Insurance is available to offset the losses suffered by denial of service attacks. b.A denial of service attack is designed to overwhelm a web site, making it incapable of performing normal functions. c.Web sites can employ filters to detect multiple.
6 Views
View Answer
21.Forced vacations is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place. 22.A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its employees. 23.The product life cycle is a formal set of activities, or.
8 Views
View Answer
31.The terms contingency planning, disaster recovery planning, business interruption planning, and business continuity planning have all been used to describe the process that identifies events that may threaten an organization and provide a framework whereby the organization will continue to operate or resume operations with a minimum of disruption. 32.Continuity is.
5 Views
View Answer
MULTIPLE CHOICE 1.The two primary steps in preparing the control matrix include a.specifying control goals, identifying recommended control plans b.specifying control plans, specifying input goals c.specifying the control environment, identifying information process goals d.specifying control procedures, identifying process goals 2.The purpose of ____ control goals is to ensure the successful accomplishment of the goals set forth.
11 Views
View Answer
5.The CFO of Exeter Corporation is very uncomfortable with its current risk exposure related to the possibility of business disruptions. Specifically, Exeter is heavily involved with e-Business and its internal information systems are tightly interlinked with its key customers’ systems. The CFO has estimated that every hour of system downtime.
9 Views
View Answer
4.The following is a list of 10 control plans. Control Plans A. Enter data close to the originating source B. Preformatted screens C. Confirm input acceptance D. Programmed edit checks E. Document design F. Key verification G. Written approvals H. Digital signatures I. Procedures for rejected inputs J. Compare input data with master data Required: Listed below are ten system failures that have control implications. On the blank line to the left of.
6 Views
View Answer
21.The control plan called ______________________________ is designed to reduce the possibility that one person will misread or mis-key data. 22.A(n) ______________________________ employs data encryption--specifically public-key cryptography--to authenticate a system user's identity and to verify the integrity of a message transmitted by that user. 23.A(n) ____________________ and ____________________ report is a computer-generated report.
8 Views
View Answer
TRUE/FALSE 1.IT governance leads to better organizational performance such as profitability. 2.As an IT resource, information includes data in all their forms that are input, processed and output by information systems. 3.As an IT resource, applications are automated systems and manual procedures that process information. 4.The system of controls used in this text consists.
14 Views
View Answer
11.Sell-side systems use the Internet to automate and manage corporate vendors and purchases. 12.Buy-side systems are designed to allow a company to market sell deliver and service goods and services to customers throughout the world via the Internet. 13.The buzzword in CRM which means the grouping of customers into categories based on.
9 Views
View Answer
31.______________________________ are a summarization of the dollar value of items in the batch. 32.In a(n) ________________________________________ a computer program sorts the transactions into numerical order, checks the documents against the sequence number range, and reports missing, duplicate, and out-of-range event data. 33.The _____________________________________________ provides input control in those situations in which the.
5 Views
View Answer
3.Figure TB-7.1 depicts the objective setting process shown in Chapter 7 but with all labels removed. Required: Complete Figure TB-7.1 by inserting the following labels where they belong in the model: Box Title Box Description ? Related objectives ? e.g., to be in the top quartile of product sales for retailers of our products ? Strategy ? e.g., to be the.
5 Views
View Answer
MULTIPLE CHOICE 1.The use of IT resources for enterprise systems and e-business a.magnifies the importance of protecting the resources both within and outside of the organization from risks b.magnifies the importance of protecting the resources both within but not outside the of the organization from risks c.makes it easier to provide internal control risk.
7 Views
View Answer
31.The completed picking ticket file provides an audit trail of authorized inventory transfers made between the warehouse and the shipping department. 32.Records in the sales order master data are created upon the completion of a sales order and are updated when the goods are shipped. 33.OCR devices that use light reflection to.
7 Views
View Answer
MULTIPLE CHOICE 1.The order entry/sales (OE/S) process is part of the ____ process. a.order-to-cash b.purchase-to-pay c.human resources d.general ledger/financial reporting 2.The order entry/sales (OE/S) process handles the processing and shipment of a customer order while another process actually bills the customer. With such a configuration, you would not expect the OE/S system to interface directly with.
8 Views
View Answer
21.The OE/S process sends the sales order notification to the billing/accounts receivable/cash receipts process to notify that process of a pending shipment. 22.If a customer refuses to accept a back order, then the sales order is terminated and the sales order is accepted. 23.A customer acknowledgement is sent to the customer to.
6 Views
View Answer
41.A mechanism by which a company is reimbursed for any loss that occurs when an employee commits fraud is called a: a.segregation of duties b.fidelity bond c.personnel planning control d.termination control plan 42.Which of the following personnel security control plans is corrective in nature as opposed to being a preventive or detective control plan? a.rotation of.
5 Views
View Answer
PROBLEM 1.Below is an alphabetical list of ten functional titles for the information systems organization structure shown in Chapter 8. The second list contains descriptions (some partial) of the duties and responsibilities of ten of the functions. Required: On the blank line to the left of each numbered description, place the capital letter.
6 Views
View Answer
41.Periodic cleaning, testing, and adjusting of computer equipment is referred to as ______________________________. 42.______________________________ is the intentional penetration of an organization's computer system, accomplished by bypassing the system's access security controls. 43.We periodically make copies of important stored data, programs, and documentation. These copies are called ____________________. 44.The process whereby we restore lost.
9 Views
View Answer
21.A(n) ______________________________ indemnifies a company in case it suffers losses from defalcations committed by its employees. 22.The ______________________________ is a formal set of activities, or a process, used to develop and implement a new or modified information system. 23.Computer software that is used to facilitate the execution of a given business process.
7 Views
View Answer
21.The control plan called data verification is designed to reduce the possibility that one person will misread or mis-key data. 22.A dependency check employs data encryption--specifically public-key cryptography--to authenticate a system user's identity and to verify the integrity of a message transmitted by that user. 23.A digital signature tests whether the contents.
8 Views
View Answer
3.Figure TB-9.3 shows eight flowchart segments taken from the Chapter 9 flowcharts. The segments--identified A through I--have been stripped of almost all labels. Required: On the blank line to the left of each numbered description that follows, place the capital letter of the flowchart segment from Figure TB-9.4 that best matches that.
7 Views
View Answer
PROBLEM 1.The control plan computer agreement of batch totals is described in Chapter 9. Below is a description of a particular example of that plan: ? First, one or more of the batch totals discussed in Chapter 9 are established manually (assume this is done in the billing department). ? Then, the manually prepared total.
7 Views
View Answer
11.In the control matrix, the rows represent: a.control goals of the operations system b.recommended control plans including present and missing controls c.control goals of the information system d.control goals of the management system 12.Having too many control plans directed at the same control goal is called: a.control efficiency b.control effectiveness c.control redundancy d.control completeness 13.Which of the following control plans.
8 Views
View Answer
TRUE/FALSE 1.The order entry/sales (OE/S) process includes the first four steps in the order to cash process. 2.The first step in the order-cash process is sales order processing. 3.Customers expect convenient and timely access to information about their order from order initiation to product delivery. 4.The OE/S process helps support the decision needs of.
19 Views
View Answer
31.A technique known as ___________________________________ uses a service whereby data changes made on a computer are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party. 32.The data replication strategy known as ________________________________________ whereby all data changes are saved to secondary systems as.
8 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

Let us boost your grade together!

Get 24/7 homework help from Experts

Let our knowledge be your backup

1

Submit your homework question or assignment

2

Receive a quote & Make the Payment

3

Sit Back & Relax to Earn Better Grades!

Drag files here or Browse your Device

Maximum file size 10MB
2,048,528 Questions Answered! Get Answer

We are The Best Because

  • On Time Delivery
  • Plagiarism ReportFree
  • Unlimited RevisionsFree
  • 100% Privacy & Confidential
  • 24/7 Live Chat Support
4.9 (17175 Ratings)
You can communicate directly with your expert until the solution quality is delivered to your complete satisfaction.
Looking for writing help?
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!