Info
Warning
Danger

Study Resources (Accounting)

Chapter 12—Electronic Commerce Systems TRUE/FALSE 1.Electronic commerce refers only to direct consumer marketing on the Internet. 2.The standard format for an e-mail address is DOMAIN NAME@USER NAME. 3.The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access. 4.Business risk is.
16 Views
View Answer
12.Explain the role of accountants in the conceptual design stage. 13.Classify each of the following as either a one-time or recurring costs: training personnel initial programming and testing system design-one hardware costs software maintenance costs site preparation rent for facilities data conversion from old system to new system insurance costs installation of original equipment hardware upgrades 14.What is competency analysis and why do.
8 Views
View Answer
6.What is meant by “object-oriented design?” What does it mean for systems design? 7.List three advantages and one disadvantage of commercial software. 8.What is the purpose of the Request for Proposal (RFP)? 9.Explain how a benchmark problem is used to measure the performance of two different commercial software packages. 10.Contrast the structured and object-oriented.
8 Views
View Answer
11.Instead of implementing an application in a single “big-bang” release, modern systems are delivered in parts continuously and quickly 12.When the nature of the project and the needs of the user permit, most organizations will seek a pre-coded commercial software package rather than develop a systems in-house. 13.All of the steps in.
8 Views
View Answer
11.Sniffer software is a.software used by malicious Web sites to sniff data from cookies stored on the user’s hard drive b.used by network administrators to analyze network traffic c.used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions d.illegal programs downloaded from the Net to sniff.
10 Views
View Answer
21.The degree of compatibility between the firm’s existing procedures and personnel skills and the requirements of the new system is called a.technical feasibility b.operational feasibility c.schedule feasibility d.legal feasibility 22.The ability of a system to protect individual privacy and confidentiality is an example of a.schedule feasibility b.operational feasibility c.legal feasibility d.economic feasibility 23.The systems project proposal a.provides management with a basis.
6 Views
View Answer
MULTIPLE CHOICE 1.What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area? a.LAN b.decentralized network c.multidrop network d.Intranet 2.Network protocols fulfill all of the following objectives except a.facilitate physical connection between network devices b.provide a basis for error checking and measuring network performance c.promote compatibility.
7 Views
View Answer
31.Which statement is not true? A systems design walkthrough a.is conducted by a quality assurance group b.occurs just after system implementation c.simulates the operation of the system in order to uncover errors and omissions d.reduces costs by reducing the amount of reprogramming 32.System documentation is designed for all of the following groups except a.systems designers and.
6 Views
View Answer
MULTIPLE CHOICE 1.Which statement is not true? a.prototypes do not include internal control features b.a prototype is an inexpensive, simplified model of a system c.a throwaway prototype is discarded after the requirements are established d.systems designers always discard prototypes and do not develop them into finished systems 2.Which statement is not true? Computer Aided Software Engineering.
16 Views
View Answer
21.The output of the detailed design phase of the Systems Development Life Cycle (SDLC) is a a.fully documented system report b.systems selection report c.detailed system design report d.systems analysis report 22.The detailed design report contains all of the following except a.input screen formats b.alternative conceptual designs c.report layouts d.process logic 23.When each element of information supports the user’s decision or.
6 Views
View Answer
21.Correctly designed, processing modules are tightly coupled and have strong cohesion. 22.A system walkthrough occurs after the system is implemented. 23.The detailed design report is the “blueprint” which guides programmers and database administrators in constructing the physical system. 24.When a program module is tested, both good and bad data are included with the.
8 Views
View Answer
16.Describe the three-tier client server model. 17.Why must a data warehouse include both detail and summary data? 18.How does a data warehouse help the external auditor perform the audit? 19.What is the closed database architecture? 20.What is meant by the OLAP term - consolidation .
8 Views
View Answer
Chapter 14—Construct, Deliver, and Maintain Systems Projects TRUE/FALSE 1.The detailed design phase of the Systems Development Life Cycle is a linear process with each of five steps occurring once and in its proper sequence. 2.In a Computer Aided Software Engineering (CASE) environment, the most important use of a data flow diagram is to.
14 Views
View Answer
11.Which statement is not correct? The structured design approach a.is a top-down approach b.is documented by data flow diagrams and structure diagrams c.assembles reusable modules rather than creating systems from scratch d.starts with an abstract description of the system and redefines it to produce a more detailed description of the system 12.The benefits of the.
5 Views
View Answer
SHORT .Why is it important that the systems professionals who design a project not perform the detailed feasibility study of the project? 2.List at least three one-time costs and three recurring costs in system development. 3.____________________ benefits can be measured and expressed in financial terms, while ____________________ benefits cannot be easily measured.
5 Views
View Answer
Chapter 13—Managing the Systems Development Life Cycle TRUE/FALSE 1.The majority of the cost of a system is incurred in the new systems development phase of the life cycle. 2.According to the text, a stakeholder is an end user of a system. 3.The objective of systems planning is to link systems projects to the strategic.
16 Views
View Answer
MULTIPLE CHOICE 1.When studying the detailed feasibility of a new project a.prototyping does not affect the schedule feasibility analysis b.the need for user training will influence the schedule feasibility analysis c.protection from fraud and errors will influence the schedule feasibility analysis d.a cost-benefit review will affect the schedule feasibility analysis 2.Protection from inadvertent disclosures of confidential.
8 Views
View Answer
11.In the object-oriented approach to systems design, when an operation is performed on an object, an attribute will always be changed. 12.In the object-oriented approach to systems design, inheritance means that each object instance inherits the attributes and operations of the class to which it belongs. 13.In the object-oriented approach to systems.
10 Views
View Answer
3.Define the feasibility measures that should be considered during project analysis and give an example of each. 4.Explain the role of accountants in the conceptual design stage. 5.Contrast the feasibility study performed in the systems analysis phase of the Systems Development Life Cycle (SDLC) with the study performed in the systems selection.
5 Views
View Answer
21.Which of the following statements is correct? TCP/IP a.is the basic protocol that permits communication between Internet sites. b.controls Web browsers that access the WWW. c.is the file format used to produce Web pages. d.is a low-level encryption scheme used to secure transmissions in HTTP format. 22.FTP a.is the document format used to produce Web pages. b.controls.
8 Views
View Answer
9.Why is the announcement of a new systems project so critical to project success? 10.Contrast the preliminary project feasibility study with the feasibility study performed in the systems evaluation and selection phase of the SDLC. 11.Part of systems planning is a project feasibility study. Several feasibility issues can be raised. What are.
4 Views
View Answer
11.A tangible benefit a.can be measured and expressed in financial terms b.might increase revenues c.might decrease costs d.all of the above 12.Intangible benefits a.are easily measured b.are of relatively little importance in making information system decisions c.are sometimes estimated using customer satisfaction surveys d.when measured, do not lend themselves to manipulation 13.Which technique is least likely to be used to.
5 Views
View Answer
ESSAY 1.How are OLTP and OLAP different? Give examples of their use. 2.Why does the data warehouse need to be separate from the operational databases? 3.If an auditor suspected an “unusual” relationship between a purchasing agent and certain suppliers, how could “drill-down” be used to collect data? 4.Why must an organization expect the implementation.
5 Views
View Answer
11.The phrase “.com” has become an Internet buzz word. It refers to a top-level domain name for communications organizations. 12.The client-server model can only be applied to ring and star topologies. 13. Only two types motivation drive Dos attacks:  1) to punish an organization with which the perpetrator had a grievance; and.
7 Views
View Answer
11.List four types of facts that should be gathered during an analysis of a system. 12.What is the Internal Business Process Perspective? 13.What is the Learning and Growth Perspective? 14.When a company is doing financially well, why is the Customer Perspective measure important? 15.Distinguish between escapable and inescapable costs. Give an example. 16.Why is cost-benefit.
7 Views
View Answer
ESSAY 1.Contrast a LAN and a WAN. Typically, who owns and maintains a WAN? 2.Describe the basic differences between the star, ring, and bus topologies. 3.What security questions must be considered with regard to Internet commerce? 4.What is the World Wide Web? 5.Discuss the three levels of Internet business models. .
8 Views
View Answer
21.Closed database architecture is a.a control technique intended to prevent unauthorized access from trading partners. b.a limitation inherent in traditional information systems that prevents data sharing. c.a data warehouse control that prevents unclean data from entering the warehouse. d.a technique used to restrict access to data marts. e.a database structure that many of the leading.
5 Views
View Answer
SHORT ANSWER 1.Using Computer Aided Software Engineering (CASE) tools, the structure diagram can be transformed into machine code. Describe a disadvantage associated with this procedure. 2.Using Computer Aided Software Engineering (CASE) tools, the structure diagram can be transformed into machine code. Describe an advantage associated with this procedure. 3.What is prototyping? Why is.
6 Views
View Answer
21.What is meant by the OLAP term - Drill-down? 22.What is meant by the OLAP term - Slicing and dicing? 23.What should management do to assess the potential benefits from implementing an ERP 24.Internal efficiency is cited as one reasone for separating the data warehouse from the operational database. Explain. 25.Why are data in.
8 Views
View Answer
6.Distinguish between the two-tier and three-tier client server model. Describe when each would be used? 7.Data in a data warehouse are in a stable state. Explain how this can hamper data mining analysis? What can an organization do to alleviate this problem? 8.This chapter stressed the importance of data normalization when constructing.
5 Views
View Answer
11.Auditors of ERP systems a.need not worry about segregation of duties. b.may feel that the data warehouse is too clean and free from errors. c.find independent verification easy. d.need not worry about system access since the ERP determines it. 12.Legacy systems are a.old manual systems that are still in place. b.flat file mainframe systems developed before client-server.
6 Views
View Answer
21.In a hierarchical topology, network nodes communicate with each other via a central host computer. 22.Polling is one technique used to control data collisions. 23.The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to an intruder.  To overcome this problem, private key.
7 Views
View Answer
31.The accountant’s role in systems analysis includes all of the following except a.specify audit trail requirements b.prepare data gathering questionnaires c.suggest inclusion of advanced audit features d.ensure mandated procedures are part of the design 32.The role of the steering committee includes a.designing the system outputs b.resolving conflicts that arise from a new system c.selecting the programming techniques to.
6 Views
View Answer
6.Contrast reactive and proactive management styles. 7.Explain why accountants are interested in the legal feasibility of a new systems project. 8.Explain an advantage of surveying the current system when preparing a systems analysis for a new systems project. 9.What are two purposes of the systems project proposal? 10.List two ways that a systems project.
8 Views
View Answer