Signin/Signup
Signin/Signup
Info
Warning
Danger

Accounting Expert Answers, Study Resources & Learning Aids

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
1. IT governance is a process that ensures that the organization's IT sustains and extends the organization's strategies and objectives. 2. According to COBIT, IT resources include applications, information, infrastructure, and people. 3. According to COBIT, IT resources must be managed by IT control processes to ensure that an organization.
29 Views
View Answer
41. Access control software ensures that only authorized users gain access to a system through a process of identification and authentication. 42. Threat monitoring is a technique to protect one network from another "untrusted" network. 43. Application controls restrict access to data, programs, and documentation. 44. An intrusion-detection systems (IDS).
9 Views
View Answer
158. Figure TB-7.1 depicts the objective setting process shown in Chapter 7 but with all labels removed.Required:Complete Figure TB-7.1 by inserting the following labels where they belong in the model: Box Title Box Description A. Related objectives E. e.g., to be in the top quartile of product sales for retailers of our products B. Strategy F. e.g., to be the leading.
11 Views
View Answer
140. A(n) ______________________________ item is an object or event that is not authorized, never occurred, or is otherwise not genuine. 141. The control goal that is concerned with the correctness of the transaction data that are entered into a system is called ensure ______________________________. 142. A missing data field on.
6 Views
View Answer
158. The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications.Required:On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system.
9 Views
View Answer
77. When they are sent to a customer and returned with the payment, remittance advices are examples of: A. batch control totals B. computer-prepared documents C. written approval controls D. turnaround documents 78. Which of the following activities is not part of the computer agreement of batch totals? A. a batch total is manually.
9 Views
View Answer
1. The order entry/sales (OE/S) process includes the first four steps in the order-to-cash process: presales activities; sales order processing; picking and packing the goods; and shipping. 2. The first step in the order-to-cash process is sales order processing. 3. A customer request for goods might take the physical form.
19 Views
View Answer
113. The ______________________________ function provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation. 114. The ______________________________ maintains custody of and controls access to programs, files, and documentation. 115. Combining the functions of authorizing and executing.
6 Views
View Answer
58. ____ can consist of many computers and related equipment connected together via a network. A. PCs B. Servers C. LAN D. Firewall 59. In an information systems organization, which of the following reporting relationships makes the least sense? A. The data center manager reports to the CIO. B. The systems development manager reports to.
10 Views
View Answer
104. The control plan called ______________________________ is designed to reduce the possibility that data will be misread or miskeyed during data entry. 105. A(n) ______________________________ authenticates a system user's identity and verifies the integrity of a message transmitted by that user. 106. A(n) ______________________________ and ______________________________ report is a computer-generated.
6 Views
View Answer
155. Below is a list of ten functional titles for the information systems organization structure shown in Chapter 8. The second list contains descriptions (some partial) of the duties and responsibilities of ten of the functions.Required:On the blank line to the left of each numbered description, place the capital letter of.
8 Views
View Answer
156. The four events-processing functions that constitute the segregation of duties control plan are: A. Authorizing events B. Executing events C. Recording events D. Safeguarding resources Required:Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each.
4 Views
View Answer
84. Specifying ______________________________ is the first step in preparing a control matrix. 85. In the control matrix the P stands for ______________________________ controls. 86. A(n) ______________________________ is a tool that assists in evaluating the potential effectiveness of controls in a particular business process by matching control goals with relevant control.
7 Views
View Answer
134. The following is a list of 10 control plans: Control Plans A. Populate input screens with master data B. Cumulative sequence check C. Turnaround documents D. Document/record counts E. Document design F. Preformatted screens G. Compare input data with master data H. Hash total I. Tickler file J. Automated data entry Required:Listed below are ten statements describing a control. On the blank line to the left of each number, insert the capital.
6 Views
View Answer
143. Periodic cleaning, testing, and adjusting of computer equipment is referred to as ______________________________. 144. ______________________________ is the intentional unauthorized access of an organization's computer system, accomplished by bypassing the system's access security controls. 145. Copies of important stored data, programs, and documentation made periodically are called ______________________________. 146. The.
6 Views
View Answer
94. A control plan that makes it easier to prepare the document initially and later to input data from the document is called ______________________________. 95. ______________________________ takes the form of a signature or initials on a document to indicate that the proper person has authorized the event. 96. ______________________________ control.
5 Views
View Answer
133. The following is a list of 10 control plans. Control Plans A. Enter data close to the originating source B. Preformatted screens C. Confirm input acceptance D. Check digit E. Document design F. Key verification G. Written approvals H. Digital signatures I. Procedures for rejected inputs J. Compare input data with master data Required:Listed below are ten system failures that have control implications. On the blank line to the left of each.
5 Views
View Answer
31. Batch control plans regulate information processing by calculating control totals at various points in a processing run and subsequently comparing those totals. 32. In order to implement a batch sequence check transactions must be captured on documents that are randomly numbered. 33. Dollar totals are a summarization of the.
7 Views
View Answer
78. An outside auditing firm annually supervises a physical count of the items in a retail store's shelf inventory. This is an example of: A. authorizing events B. executing events C. recording events D. safeguarding resources 79. A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then.
5 Views
View Answer
68. The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions? A. data control B. data entry C. data librarian D. database administration 69. The controlled access to data, programs, and documentation is a principal responsibility of which of the.
7 Views
View Answer
131. The control plan computer agreement of batch totals is described in Chapter 9. Below is a description of a particular example of that plan: · Billing clerks batch sources documents and calculate batch totals. · The batch of source documents and batch totals are forwarded to the data entry unit of the data center.
6 Views
View Answer
31. Business continuity planning is the process that identifies events that may threaten an organization and provide a framework whereby the organization will continue to operate when the threatened event occurs or resume operations with a minimum of disruption. 32. Business continuity is the process of using backup measures to.
4 Views
View Answer
159. The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications.Required:On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system.
10 Views
View Answer
11. Within the data center, the data control group is responsible for routing all work into and out of the data center, correcting errors, and monitoring error correction. 12. The systems development function provides efficient and effective operation of the computer equipment. 13. Within the data center, the data librarian.
17 Views
View Answer
21. The control plan called key verification is designed to reduce the possibility that data will be misread or miskeyed during data entry. 22. A dependency check authenticates the identity of a message's sender and verifies the integrity of a transmitted message. 23. A digital signature tests whether the contents.
9 Views
View Answer
130. A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks. 131. A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of.
6 Views
View Answer
135. At Winsted Company the following procedures are used to enter purchase requisitions (PRs).Clerks in the purchasing department receive purchase requisitions (PRs) from departments throughout Winsted's home office. The PRs are handwritten on forms specially designed for this purpose. The clerks enter these into preformatted screens on PCs that are connected.
6 Views
View Answer
157. Listed below are several pervasive control plans discussed in Chapter 8. On the blank line to the left of each control plan, insert a "P" (preventive), "D" (detective), or "C" (corrective) to best classify that control. If you think that more than one code could apply to a particular plan,.
10 Views
View Answer
120. COSO's ______________________________ is the entity's identification and analysis of relevant risks to the achievement of its objectives, forming a basis for determining how the risks should be managed. 121. COSO's ______________________________ sets the tone of the organization, influencing the control consciousness of its people. 122. COSO's ______________________________ are the.
8 Views
View Answer
103. ______________________________ is a process that ensures that the enterprise's IT sustains and extends the organization's strategies and objectives. 104. ______________________________ controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented. 105. ______________________________ is a process that employs.
7 Views
View Answer
67. Digital signatures address all of the following control goals except: A. ensure security of resources B. ensure input completeness C. ensure input validity D. ensure input accuracy 68. A sales representative enters the customer's account number and the system retrieves certain data about the customer from master data. This control plan addresses all.
8 Views
View Answer
159. Listed below are 13 specific fraud examples taken from some well-known fraud cases: MiniScribe, ZZZZ Best Carpet Cleaning, Lesley Fay, and Equity Funding.Required:For each fraud example, enter a letter corresponding to which information control goal was initially violated¾Validity, Completeness, or Accuracy. Some examples might involve more than one violation.NOTE: When.
9 Views
View Answer
124. The shipping clerk compares each line on the shipping document to the items to be shipped, called ______________________________, to ensure that the shipment is accurate. 125. When a clerk enters the identification code for an entity, such as a customer, and the system retrieves data about that entity from.
6 Views
View Answer
110. The section of Sarbanes Oxley that requires a company's CEO and CFO to certify quarterly and annual reports is ______________________________. 111. The section of Sarbanes Oxley that requires each annual report filed with the SEC to include an internal control report is ______________________________. 112. The section of Sarbanes Oxley.
9 Views
View Answer
133. ______________________________ is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party. 134. With the data replication strategy known as ______________________________ all data changes are data stamped and saved to secondary systems as the changes.
8 Views
View Answer
123. A(n) ______________________________ indemnifies a company in case it suffers losses from defalcations committed by its employees. 124. The ______________________________ covers the progression of information systems through the systems development process, from birth, through implementation, to ongoing use and modification. 125. Computer software that is used to facilitate the execution.
6 Views
View Answer
47. In the control matrix, the rows represent: A. control goals of the operations process B. recommended control plans including both present and missing controls C. control goals of the information process D. control goals of the management process 48. Having too many control plans directed at the same control goal is called: A..
9 Views
View Answer
150. Control plans that relate to a multitude of goals and processes are called ______________________________. 151. ______________________________ is software designed specifically to damage or disrupt computer systems. 152. A(n) ______________________________ is program code that can attach itself to other programs or macros thereby infecting those programs and macros. 153. Three.
8 Views
View Answer
114. "Confirm input acceptance" addresses the information process control of ______________________________. 115. In a(n) ______________________________ a computer program sorts the transactions into numerical order; checks the documents against the sequence number range; and reports missing, duplicate, and out-of-range event data. 116. The ______________________________ provides input control in those situations in.
15 Views
View Answer
160. The CFO of Exeter Corporation is very uncomfortable with its current risk exposure related to the possibility of business disruptions. Specifically, Exeter is heavily involved with e-business and its internal information systems are tightly interlinked with its key customers' systems. The CFO has estimated that every hour of system downtime.
17 Views
View Answer
156. Below is a list of sources of information and guidance on internal controls. The second list contains descriptions or information provided by these sources.Required:On the blank line to the left of each numbered item, place the capital letter of the source that best matches that description. HINT: Some letters may.
7 Views
View Answer
37. The two primary steps in preparing the control matrix include: A. specifying control goals, identifying recommended control plans B. specifying control plans, specifying input goals C. specifying the control environment, identifying information process goals D. specifying control procedures, identifying process goals 38. The purpose of ____ control goals is to ensure the successful.
8 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*