Info
Warning
Danger

Accounting Expert Answers, Study Resources & Learning Aids

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
4.Figure TB-4.7 shows several systems flowchart routines that intentionally violate good flowchart construction procedures. Required: Redraw each of the routines so that they conform to the guidelines and other techniques presented in the text for drawing systems flowcharts. HINT: Be alert to the description of each routine; the descriptions should govern your.
6 Views
View Answer
21.A description of a portion of a schema is referred to as a(n) ____________________. 22.A(n) ____________________ language is used to access a database and to produce inquiry reports. 23.______________________________ is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data. 24._________________________ refers to the.
15 Views
View Answer
41.Running an applications approach to sales and inventory programs leads to a.a central database b.data redundancy c.higher efficiencies d.reports that are easier to query 42.Data flows that mirror and monitor business operations are called ____ flows. a.horizontal data b.vertical data c.sequential d.master data 43.Data flows that provide a basis for managerial decisions are called ____ information flows. a.horizontal data b.vertical data c.sequential data d.master.
10 Views
View Answer
COMPLETION 1.Business process such as hiring employees, purchasing inventory, and collecting cash from customers are called ____________________. 2._________________________ systems capture a complete description of each event and permanently store the individual descriptions of the event. 3.Analyzing collected historical data with multidimensional analytic tools and exploratory techniques is called _________________________. 4.A collection of related characters,.
15 Views
View Answer
21.Those events that could have a negative impact on objectives. a.controls b.impacts c.risks d.opportunities 22.The section of Sarbanes Oxley that establishes an independent board to oversee public company audits is: a.Title I – Public Company Accounting Oversight Board b.Title II – Auditor Independence c.Title III – Corporate Responsibility d.Title IV – Enhanced Financial Disclosures 23.The section of Sarbanes Oxley that.
7 Views
View Answer
TRUE/FALSE 1.Business processes such as hiring employees, purchasing inventory, and collecting cash from customers are called events. 2.The traditional applications approach to business event processing view of business event processing concentrates on the process being performed. 3.The database approach to business event processing, in which facts about events are stored in relational database.
18 Views
View Answer
51.Assuring that the accounts receivable master data reflects all cash collections recorded in the cash receipts event data addresses the control goal of: a.ensure input accuracy b.ensure input completeness c.ensure update accuracy d.ensure update completeness 52.Assuring that cash collections recorded in the cash receipts event data are credited to the right customer in the accounts.
7 Views
View Answer
41.A computer abuse technique called a ____ involves a program that replicates itself on disks, in memory, or across networks. a.worm b.trap door c.logic bomb d.Trojan horse 42.Program code that can attach itself to other programs (including macros within word processing documents), thereby infecting those programs and macros, is a.worm b.virus c.logic bomb d.Trojan horse 43.A measure of success in.
7 Views
View Answer
3.Based on the following abbreviated description of Avery University's course scheduling and student advising procedures, prepare an Entity-Relationship (E-R) diagram that reflects the key entities and relationships. Course Scheduling: In consultation with the vice-president of Academic Affairs and the Registrar's Office, each academic department chair decides which courses will be offered each.
15 Views
View Answer
11.Risks are those events that could have a negative impact on organization objectives. 12.Opportunities are events that could have a positive impact on organization objectives. 13.Risk assessment is the entity's identification and analysis of relevant risks to achievement of its objectives, forming a basis for determining how the risks should be managed. 14.The.
10 Views
View Answer
5.The following narrative describes the order entry process at Adams, Inc.: Adams, Inc. customers mail their orders to the Adams customer service center where clerks open the orders and review them for accuracy. The clerks then key orders into the computer. As the clerk is entering data the computer populates the.
8 Views
View Answer
COMPLETION 1.A(n) ____________________ in an accounting system can be classified as a resource, event, agent, or location. 2.A(n) ____________________ is an item of data that characterizes an entity or relationship. 3.Attributes that consist of multiple subattributes are referred to as _________________________. 4.A(n) _________________________ is the attribute whose value is unique for every entity that.
10 Views
View Answer
11.An extra character added to a numeric code as a device to test the accuracy of data entered into a computer system is called a: a.control digit b.self-checking digit c.mnemonic digit d.significant digit 12.Assigning numbers to objects in chronological sequence is known as: a.block coding b.mnemonic coding c.serial coding or sequential coding d.self-checking digit coding 13.The file management system where.
10 Views
View Answer
21.Which of the following is not a function that a database management system performs? a.Defining the data. b.Defining the relations among data. c.Interfacing with the operating system for storage of the data on the physical media. d.Mapping one view of the data. 22.Which of the following functions would not normally be performed by a database.
13 Views
View Answer
MULTIPLE CHOICE 1.A process by which organizations select objectives, establish processes to achieve objectives, and monitor performance is a.enterprise risk management b.internal control c.organizational governance d.risk assessment 2.A process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may effect.
13 Views
View Answer
61.Which of the following database types has dominance in contemporary systems? a.relational b.object oriented c.network d.hierarchical 62.The relationship that appears in the diamond symbol within an E-R that shows the degree to which each entity participates in the relationship is known as a.maximum cardinality b.identifier c.cardinality d.none of the above 63.An information system that is designed to assist individual managers.
10 Views
View Answer
51.________________________________________ are information systems that assist managers with unstructured decisions and over the years have become almost synonymous with financial modeling and ad hoc querying. 52._____________________________________________, considered a subset of decision support systems, provide managers with information in a format suitable for making a particular decision without requiring that the manager.
15 Views
View Answer
31.Which of the following relational commands would a manager use to combine the data from two related relations into a third relation? a. select b. project c. join d. display 32.In a relational database, the entity is represented as a(n): a. table b. network c. field d. attribute 33.Which is not a step in creating a relation using SQL? a. assign the relation a name b. assign each attribute a name c. specify the.
10 Views
View Answer
21.A set of data that describes an instance of the entity represented by a relation is known as a(n) ____. a. tuple b. resource c. agent d. event 22.Legacy systems do not usually have which of the following characteristics? a. developed on previous hardware (and/or software) platforms b. are easily adaptable to enterprise systems c. have been used by an organization for a long period.
9 Views
View Answer
31.The control goal of ensuring input materiality strives to prevent fictitious items from entering an information system. 32.An invalid item is an object or event that is not authorized, never occurred, or is otherwise not genuine. 33.The control goal of input accuracy is concerned with the correctness of the transaction data that.
9 Views
View Answer
11.Which component of the ERM framework is best described here: Internal and external circumstances and incidents affecting achievement of an entity’s objectives must be recognized, distinguishing between risks and opportunities. Opportunities are channeled back to management’s strategy or objective-setting processes. a.control activities b.event identification c.risk assessment d.risk response 12.This component of the ERM framework encompasses.
8 Views
View Answer
11.The uniform product codes (UPCs) used by supermarkets and other retailers are examples of a block coding scheme. 12.Both the mnemonic and the hierarchical coding schemes attach specific meaning to particular character positions. 13.Because it uses alphabetic characters, a sequential coding system is most understandable to human beings. 14.A self checking digit code.
11 Views
View Answer
5.List 1 lists terms related to intelligent systems and knowledge management, while List 2 contains descriptions. List 1 - Coding Types A.data mining B.data warehousing C.decision support system D.executive information system E.expert system F.group support system G.intelligent agent H.knowledge management I.neural network List 2 - Descriptions 1.This applies expertise extracted from a human expert to provide specific recommendations on problems or decisions..
11 Views
View Answer
21.Data warehousing is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data. 22.Data redundancy allows non-technical users to bypass the programmer and to access the database directly. 23.Data mining refers to the exploration, aggregation, and analysis of large quantities of varied data.
9 Views
View Answer
11.__________________________________________________ are integrated software packages designed to provide complete integration of an organization's business information processing systems and all related data. 12.A collection of data representing multiple occurrences of a resource, event, or agent is known as a(n) ____________________. 13.A set of data that describes an instance of the entity represented by.
11 Views
View Answer
7.The figure below contains 14 symbols used in constructing data flow diagrams or system flowcharts. Each symbol has been assigned a capital letter (A through N) for identification in this problem. The following is a list of 14 data flow diagram or flowcharting symbols: 1.File (in a data flow diagram) 2.Process (in.
7 Views
View Answer
PROBLEM 1.List 1 shows the coding schemes discussed and illustrated in Chapter 5, while List 2 contains eight coding examples. List 1 - Coding Types A.Sequential (serial) B.Block C.Significant digit D.Hierarchical E.Mnemonic F.Self-checking digit G.Color List 2 - Coding Examples 1.Sue Smith is taking three college courses this semester--AC 340, FI 101, and EN 280. When you check with the Registrar's.
12 Views
View Answer
8.For each of the following, indicate whether it is a characteristic of a A. physical data flow diagram B. logical data flow diagram C. systems flowchart 1.A graphical representation of a system showing the system’s processes, data stores, and the flows of data into and out of the processes and data stores. 2.A logical and.
6 Views
View Answer
PROBLEM 1.The following table is a view of BILLING_HOURS from the various data elements in ABC's relational database: BILLING_HOURS Employee_No Client_No Date Hours Billing_Rate B122 F11555 990823 8 150 A632 F11555 990823 8 100 B122 F11555 990824 8 150 A632 F11555 990824 8 100 B122 F11555 990825 8 150 A632 F11555 990825 8 100 B122 H12456 990826 8 150 A632 H12456 990826 8 100 A356 F11555 990826 8 57 A432 H12456 990826 8 57 A491 H12456 990826 8 57 B122 F11555 990827 8 150 A632 H12456 990827 8 100 A356 F11555 990827 8 57 B432 H12456 990827 8 57 B491 H12456 990827 8 57 Required: a. Using proper SQL commands, develop a query to extract billing data for Fleet Services (client number F11555), showing the employee number, date,  hours, and billing rate. b. Design a table showing the output that would be.
11 Views
View Answer
21.A missing value is called a non-null. 22.The secondary key is specified to identity each tuple in the relation. 23.SQL is a powerful database language that can be used to define database systems, query the database for information, generate reports from the database, and access databases from within programs using embedded commands. 24.Referential.
14 Views
View Answer
MULTIPLE CHOICE 1.Event data processing is the process whereby: a.event related data are collected and stored b.information is communicated to external users c.event related data are disseminated to all stakeholders d.information is used for decision making 2.Which of the following statements related to event-driven systems is false? a.A system captures a complete description of each event. b.The system.
15 Views
View Answer
11.A recursive relationship is created when there is an employee being supervised, and another employee is the supervisor. 12.Cardinality constraints relate to the specification of how many occurrences of an entity can participate in a given relationship with any one occurrence of the other entity in the relationship. 13.The cardinality constraint is.
14 Views
View Answer
41.A(n) ____________________ table contains repeating attributes (or fields) within each row (or record). 42.A relation is in ______________________________ if it does not contain repeating groups. 1NF 43._________________________ are problems in a relation table caused by the existence of functional dependencies. 44.A relation is in ______________________________ if it is in first normal form and no.
15 Views
View Answer
COMPLETION 1.________________________________________ is a process for organizational governance. 2.___________________________________ is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance. 3.____________________ is the possibility that an event will occur. 4.____________________ is a deliberate act or untruth intended to obtain unfair or unlawful gain. 5.____________________ are those events that would have.
7 Views
View Answer
31.According to PCAOB Auditing Standard No. 2 and SOX Section 404, as part of the annual audit, each company’s independent auditor must assess the management report and the company’s system of internal control by a.Documenting significant processes, including the flow of transactions from initiation through recording and reporting, and related control.
11 Views
View Answer
MULTIPLE CHOICE 1.An entity can be classified as all of the following except a. resource b. event c. tuple d. agent 2.A(n) ____ of an entity is anything in which we are interested that exists independently. a. agent b. composite attribute c. attribute d. instance 3.A(n) ____ is an item of data that characterizes an entity or relationship a. agent b. composite attribute c. attribute d. instance 4.Which of the following is the entity or agent? a. client b. client number c. client name d. client.
15 Views
View Answer
TRUE/FALSE 1.Organizational governance is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance. 2.Fraud is the possibility that an event or action will cause an organization to fail to meet its objectives (or goals). 3.Management is legally responsible for establishing and maintaining an adequate system of internal.
17 Views
View Answer
41.Each relationship has a characteristic, called a cardinality, that shows the degree to which each entity participates in the relationship. 42.Maximum cardinality is used to specify the minimum level of participation that one entity can have with another entity. 43.A collection of data representing multiple occurrences of an object, event, or agent.
10 Views
View Answer
21.PCAOB Auditing Standard No. 2 requires that auditors evaluate all controls specifically intended to address risks of fraud. 22.According to the 2006 Report to the Nation on Occupational Fraud and Abuse, frauds are more likely to be detected by audits or internal controls than through tips. 23.A computer crime technique called worm.
7 Views
View Answer
31.____ databases include abstract data types that allow users to define data to be stored in the database. a.hierarchical b.relational c.network d.object-oriented 32.In a(n) ____ database model, data are logically organized into two-dimensional tables. a.hierarchical b.relational c.network d.object-oriented 33.A disadvantage of the ____ database model is that it requires more computer memory and processing time than other data models. a.hierarchical b.relational c.network d.object-oriented 34.In an.
12 Views
View Answer
TRUE/FALSE 1.An entity in an accounting system can be classified as a resource, event, agent, or location. 2.A field is an item of data that characterizes an entity or relationship. 3.Attributes that consist of multiple subattributes are referred to as primary attributes. 4.A key attribute is the attribute whose value is unique for every.
16 Views
View Answer
11.The mapping of the relationships between entities would be used in the development of a(n): a. context diagram b. logical DFD c. physical DFD d. REA Model 12.The sequence of steps in identifying relationships in a model is: a. evaluate entities as pairs, identify user existing and desired information, evaluate each entity to determine if there is any need for two.
10 Views
View Answer
31.In a network database model, data are logically organized into two-dimensional tables. 32.An object oriented database system is a database that allows both simple and complex objects to be stored using abstract data types, inheritance, and encapsulation. 33.The normalization process involves various steps (called normal forms) that transform an original database design.
13 Views
View Answer
61.Control plans that relate to a multitude of goals and applications are called: a.business process control plans b.internal control systems c.pervasive control plans d.management control systems 62.A control plan requires that a manager sign his/her approval of timecards for employees in that department. This control plan is an example of: a.a systems control b.the control environment c.a pervasive.
14 Views
View Answer
31._____________________________________________ is another name for query language. 32.A(n) _________________________ uniquely identifies any row within a relational table. 33.A(n) ______________________________ is equivalent to a field and may also be known as a column. 34.In a(n) ____________________ database model, all record relationships are 1:N. 35.In a(n) ____________________ database model, a "child" record may have more than.
20 Views
View Answer
51.The model that only works well for simple data structures is the a.hierarchical database model b.network database model c.relational database model d.object-oriented database model 52.The model that logically organizes data into two-dimensional tables is the a.hierarchical database model b.network database model c.relational database model d.object-oriented database model 53.The model that includes abstract types that allow users to define data to.
11 Views
View Answer
11.The uniform product codes (UPCs) used by supermarkets and other retailers are examples of a(n) ____________________ coding scheme. 12. ____________________ coding schemes attach specific meaning to particular character positions by organizing data in descending order with each successive rank order is a subset of the rank above it. 13.Because it uses alphabetic.
11 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*