Info
Warning
Danger

Accounting Expert Answers, Study Resources & Learning Aids

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
56. A set of data that describes a single instance of the entity represented by a relation is known as a(n) ____. A. TupleB. ResourceC. AgentD. Event 57. Legacy systems do not usually have which of the following characteristics? A. developed on previous hardware (and/or software) platformsB. are easily adaptable to enterprise systemsC. have been used by an organization for a long.
6 Views
View Answer
92. Running an applications approach to sales and inventory programs leads to: A. a central database B. data redundancy C. higher efficiencies D. reports that are easier to query 93. Data flows that mirror and monitor business operations are called ____ flows. A. horizontal information B. vertical information C. Sequential D. master data 94. Data flows that provide.
5 Views
View Answer
103. Based on the following abbreviated description of Avery University's course scheduling and student advising procedures, prepare an Entity-Relationship (E-R) diagram that reflects the key entities and relationships.Course Scheduling:In consultation with the vice-president of Academic Affairs and the Registrar's Office, each academic department chair decides which courses will be offered each.
11 Views
View Answer
126. Adams, Inc. customers mail their orders to the Adams customer service center where clerks open the orders and review them for accuracy. The clerks then key orders into the computer. As the clerk is entering data the computer populates the order input screen with data from the applicable customer and.
13 Views
View Answer
127. The figure below contains 14 symbols used in constructing data flow diagrams or system flowcharts. Each symbol has been assigned a capital letter (A through N) for identification in this problem. The following is a list of 14 data flow diagram or flowcharting symbols: (1) Data store (in a data flow diagram) (8) Display (2) Entity.
11 Views
View Answer
128. For each of the following, indicate whether it is a characteristic of a A. physical data flow diagram B. logical data flow diagram C. systems flowchart 1. A graphical representation of a system showing the system's processes, data stores, and the flows of data into and out of the processes and data stores. 2. Used by auditors and managers to.
11 Views
View Answer
36. An entity can be classified as all of the following except: A. resourceB. eventC. tupleD. agent 37. A(n) ____ of an entity is one specific thing of the type defined by the entity. A. agentB. composite attributeC. attributeD. instance 38. A(n) ____ is an item of data that characterizes an entity or relationship. A. agentB. composite attributeC. attributeD. instance 39. Which of the following is the entity or agent? A. ClientB. client numberC. client nameD. client.
8 Views
View Answer
1. Organizational governance is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance. 2. Fraud is the possibility that an event or action will cause an organization to fail to meet its objectives (or goals). 3. Management is responsible for establishing and maintaining an.
27 Views
View Answer
31. Valid input data are appropriately authorized and represent actual economic events and objects. 32. The control goal of input accuracy is concerned with the correctness of the transaction data that are entered into a system. 33. Business process control plans relate to those controls particular to a specific process.
4 Views
View Answer
119. A meaningful change in the state of an enterprise such as hiring employees, purchasing inventory, and collecting cash from customers are called ______________________________. 120. The ______________________________ approach to database design attempts to describe all aspects of the business events and processes under consideration. 121. Analyzing collected historical data with.
9 Views
View Answer
11. The uniform product codes (UPCs) used by supermarkets and other retailers are examples of a block coding scheme. 12. Both the mnemonic and the hierarchical coding schemes attach specific meaning to particular character positions. 13. Because it uses alphabetic characters, a sequential coding system is most understandable to human.
10 Views
View Answer
87. Why is there usually no control goal called update validity? A. Input and update completeness achieve update validity. B. Input validity guarantees update validity. C. Update accuracy guarantees update validity. D. Input accuracy achieves update validity. 88. A programming error causes the sale of an inventory item to be added to the quantity.
9 Views
View Answer
72. Which of the following is not a function that a database management system performs? A. Defining the data. B. Defining the relations among data. C. Interfacing with the operating system for storage of the data on the physical media. D. Coordinates access to data stored in the applications programs. 73. The exploration, aggregation,.
10 Views
View Answer
41. Each relationship has a characteristic, called a cardinality that shows the degree to which each entity participates in the relationship. 42. Maximum cardinality is used to specify the minimum level of participation that one entity can have with another entity. 43. In set theory, a two-dimensional collection of information.
11 Views
View Answer
11. Risks are those events that could have a negative impact on organization objectives. 12. Opportunities are events that could have a positive impact on organization objectives. 13. Risk assessment is the entity's identification and analysis of relevant risks to the achievement of its objectives, forming a basis for determining.
12 Views
View Answer
129. Because it uses alphabetic characters, a(n) ______________________________ coding system makes it easier for human beings to remember the codes. 130. A(n) ______________________________ is a code that includes an extra digit that can be used to check the accuracy of the code. 131. The ______________________________ approach to business event processing.
7 Views
View Answer
139. ______________________________ is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data. 140. ______________________________ refers to the exploration, aggregation, and analysis of large quantities of varied data from across the organization. 141. ______________________________ is the most popular data modeling approach..
7 Views
View Answer
76. A(n) ______________________________ in an accounting system can be classified as a resource, event, or agent about which data is collected. 77. A(n) ______________________________ is an item of data that characterizes an entity or relationship. 78. Attributes that consist of multiple subattributes are referred to as ______________________________. 79. A(n) ______________________________.
6 Views
View Answer
122. Figure TB-4.3 shows a context diagram of a cash sales system. The diagram intentionally violates several of the guidelines and other techniques presented in the text for drawing data flow diagrams.Required:Identify as many of the errors in data flow diagram construction as you can. In the diagram, place consecutive numbers.
8 Views
View Answer
171. List 1 shows the coding schemes discussed and illustrated in Chapter 5, while List 2 contains eight coding examples. List 1 - Coding Schemes A. Sequential (serial) D. Hierarchical B. Block E. Mnemonic C. Significant digit F. Check digit List 2 - Coding Examples 1. Sue Smith is taking three college courses this semester¾AC 340, FI 101, and EN 280. When you check with the Registrar's.
11 Views
View Answer
47. Which component of the ERM framework is best described here: Internal and external events affecting achievement of an entity's objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management's strategy or objective-setting processes. A. control activities B. event identification C. risk assessment D. risk response 48. This component.
7 Views
View Answer
123. Figure TB-4.5 shows a level 0 logical data flow diagram for a billing system. Also shown for reference is the context diagram for the system. The logical data flow diagram intentionally violates several of the guidelines and other techniques presented in the text for drawing data flow diagrams.Required:Identify as many.
8 Views
View Answer
174. Transform the relation in Figure TB 5.5 to third normal form (3NF). Label each new relation with a name that describes the attributes. 175. Given the following: List 1 - Terms A. data mining F. group support system B. data warehousing G. intelligent agent C. decision support system H. knowledge management D. executive information system I. neural network E. expert system List 2 - Descriptions 1. This applies expertise extracted from a human expert.
9 Views
View Answer
82. ____ databases include abstract data types that allow users to define characteristics of the data to be stored when developing an application. A. hierarchical B. relational C. network D. object-oriented 83. In a(n) ____ database model, data are logically organized into two-dimensional tables. A. hierarchical B. relational C. network D. object-oriented 84. The use of information systems.
7 Views
View Answer
21. Data warehousing is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data. 22. Data redundancy allows non-technical users to bypass the programmer and to access the database directly. 23. Data mining refers to the exploration, aggregation, and analysis of.
13 Views
View Answer
159. A(n) ______________________________ is the attribute whose value is unique for every entity that will appear in the database. 160. ______________________________ is a measure of the highest level of participation that one entity can have in another entity. 161. In set theory, a two-dimensional collection of information is called a(n).
9 Views
View Answer
52. Data redundancy: A. occurs when data is stored in multiple locations B. is eliminated by using the applications approach C. reduces labor and storage costs D. improves consistency between applications 53. Which of the following statements related to the event-driven approach is false? A. It attempts to describe all aspects of business events. B..
11 Views
View Answer
46. The mapping of the relationships between entities would be used in the development of a(n): A. context diagramB. logical DFDC. physical DFDD. REA Model 47. The sequence of steps in identifying relationships in a model is: A. evaluate entities as pairs, identify user existing and desired information, evaluate each entity to determine if there is any need for two.
5 Views
View Answer
101. The following table is a view of BILLING_HOURS from the various data elements in ABC's relational database: BILLING_HOURS Employee_No Client_No Date Hours Billing_Rate B122 F11555 990823 8 150 A632 F11555 990823 8 100 B122 F11555 990824 8 150 A632 F11555 990824 8 100 B122 F11555 990825 8 150 A632 F11555 990825 8 100 B122 H12456 990826 8 150 A632 H12456 990826 8 100 A356 F11555 990826 8 57 A432 H12456 990826 8 57 A491 H12456 990826 8 57 B122 F11555 990827 8 150 A632 H12456 990827 8 100 A356 F11555 990827 8 57 B432 H12456 990827 8 57 B491 H12456 990827 8 57 Required: a. Using proper SQL commands, develop a query to extract billing data for Fleet Services (client number F11555), showing the employee number, date, hours, and billing rate. b. Design a table showing the output that would be.
6 Views
View Answer
37. A process by which organizations select objectives, establish processes to achieve objectives, and monitor performance is: A. enterprise risk management B. internal control C. organizational governance D. risk assessment 38. A process, effected by an entity's board of directors, management and other personnel, applied in strategy settings and across the enterprise, designed to.
7 Views
View Answer
67. ____ are the policies and procedures that help ensure that the risk responses are effectively carried out. A. Control environment B. Risk assessment C. Control activities D. Monitoring 68. ____ is a process that evaluates the quality of internal control performance over time. A. Control environment B. Risk assessment C. Control activities D. Monitoring 69. Which of.
9 Views
View Answer
86. ______________________________ values waste memory space and may cause problems when running queries. 87. A collection of data representing multiple occurrences of a resource, event, or agent is known as a(n) ______________________________. 88. A set of data that describes a single instance of the entity represented by a relation is.
7 Views
View Answer
11. A recursive relationship is created when there is an employee being supervised, and another employee is the supervisor. 12. The cardinality constraint is used less frequently than the participation constraint. 13. The cardinality constraint is used to specify both the minimum and maximum participation of one entity in the.
8 Views
View Answer
125. The following narrative describes the order entry process at Adams, Inc.:Narrative DescriptionAdams, Inc. customers mail their orders to the Adams customer service center where clerks open the orders and review them for accuracy. The clerks then key orders into the computer. As the clerk is entering data the computer populates.
9 Views
View Answer
66. Which of the following relational commands would a manager use to combine the data from two related relations into a third relation? A. SelectB. ProjectC. JoinD. Display 67. In a relational database, the entity is represented as a(n): A. TableB. NetworkC. FieldD. Attribute 68. Which is not a step in creating a relation using SQL? A. assign the relation a nameB. assign each attribute a nameC. specify the.
5 Views
View Answer
100. ______________________________ is a process, effected by an entity's board of directors, management and other personnel, applied in strategy settings and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement.
6 Views
View Answer
77. Establishing a viable internal control system is primarily the responsibility of: A. the external auditors B. management C. programmers D. government authorities 78. As a result of an inadequate design, a production process yields an abnormally high amount of raw material scrapped. Which control goal is being violated? A. ensure effectiveness of operations B..
9 Views
View Answer
124. Figure TB-4.7 shows several systems flowchart routines that intentionally violate good flowchart construction procedures.Required:Redraw each of the routines so that they conform to the guidelines and other techniques presented in the text for drawing systems flowcharts. HINT: Be alert to the description of each routine; the descriptions should govern your.
6 Views
View Answer
149. In a(n) ______________________________ database model, a child record may have more than one parent. 150. In a(n) ______________________________ database model, data are logically organized into two-dimensional tables. 151. A(n) ______________________________ database model allows both simple and complex objects, including video clips and pictures, to be stored. 152. The goal.
9 Views
View Answer
1. Business processes, such as hiring employees, purchasing inventory, and collecting cash from customers, are called events. 2. The traditional applications approach to business event processing concentrates on the process being performed. 3. The centralized database approach to business event processing, in which facts about events are stored in relational.
24 Views
View Answer
102. The model that logically organizes data into two-dimensional tables is the: A. hierarchical database model B. network database model C. relational database model D. object-oriented database model 103. The model that includes abstract types that allow users to define data to be stored in the database is the: A. hierarchical database model B. network.
11 Views
View Answer
31. In a network database model, data are logically organized into two-dimensional tables. 32. An object-oriented database system is a database that allows both simple and complex objects to be stored using abstract data types. 33. The normalization process involves the application of various rules (called normal forms) that yields.
9 Views
View Answer
121. Figure TB-4.1 is a "generic" level 0 data flow diagram (DFD), taken from Figure 4.5 in the text.Required:Using good data flow diagram construction techniques draw a diagram to explode bubble 3.0 to its next lower level. Diagram 3.0 should contain three processes, appropriately numbered, and should contain the following data.
8 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*