Info
Warning
Danger

Accounting Expert Answers, Study Resources & Learning Aids

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
76.An analytical technique commonly used to analyze and examine an internal control process is known as a(n): a.  control flowchart b.  internal control questionnaire c.  exposure checklist d.  segregation of duties 77.An exposure is: a.  synonymous with risk b.  equal to risk multiplied times the likelihood of detection c.  equal to risk multiplied times the financial consequences d.  not.
5 Views
View Answer
TRUE/FALSE QUESTIONS 1.Groups of computers connected together electronically are known as networks. 2.A WAN is a network that spans a single city or metropolitan area. 3.One reason for the worldwide popularity of the Internet is that it has brought universal standards of communication to all networks. 4.The RAND Corporation created one of the earliest.
22 Views
View Answer
ESSAYS 107.Name the four basic symbols used in analytic flowcharting, and briefly define them. 108.Name the four basic symbols used in data flow diagrams, and briefly define them. 109.Discuss one major characteristic of logical data flow diagrams which may be an advantage over analytic flowcharts in some situations. 110.One broad type of resource utilization analysis.
6 Views
View Answer
102.Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms. Required:  Match the letter next to each definition with the appropriate term. Each answer will be used only once. _____  1. ActiveX _____  2. Firewall _____  3. Internet _____  4. XML _____  5. SET protocol _____  6. URL _____  7..
8 Views
View Answer
111.Metaluna, Inc., is a new software company that recently began operations in 2003. Metaluna’s stock is publicly traded. Listed below are several statements made recently by the CEO and Chairman of the Board of Metaluna at a directors meeting. Required: Please comment on each statement in light of the requirements imposed by.
7 Views
View Answer
56.A defrauder substitutes his own version of a company’s master file for the real one. This method of computer fraud is known as: a.  direct file alteration b.  data theft c.  misappropriation of information resources d.  Answers b and c above are both correct. 57.Sometimes computer programs are use to commit acts of sabotage. A.
6 Views
View Answer
116.Discuss why a fraud examiner needs to be educated in the fields of accounting, law, and criminology to properly perform a fraud investigation. 117.What is corporate culture? Why might someone argue that the corporate culture has more influence over ethical behavior in a firm than the corporate ethics code of conduct? .
8 Views
View Answer
111.Describe the purpose and nature of the following types of flowcharts: Systems Program or block Analytic Document Forms distribution 112.Discuss the main activities in each systems development phase: systems analysis, systems design, and systems implementation. Include two systems techniques in each phase. 113.How do systems techniques help in auditing? Suggested answer: .
13 Views
View Answer
104.Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms. Required:  Match the letter next to each definition with the appropriate term. Each answer will be used only once. _____  1. FCPA _____  2. Audit committee _____  3. Collusion _____  4. Application controls matrix _____  5. Internal auditing _____ .
5 Views
View Answer
81.Which feature below would  be considered a highly convenient feature for consumers of an Internet store transaction? a.  Consumers usually must wait for delivery of items purchased via delivery by third      parties. b.  Internet store transactions can be completed without any human intervention on the      part of the vendor. c.  Internet.
5 Views
View Answer
MATCHING QUESTIONS 103.Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms. Required:  Match the letter next to each definition with the appropriate term. Each answer will be used only once. _____  1. Fidelity bond _____  2. Tickler file _____  3. Suspense account _____  4. Anticipation _____  5. Corrective.
6 Views
View Answer
66.What is an example of fault tolerance applied at the transaction level? a.  consensus-based protocols b.  read-after-write checks c.  database shadowing d.  flagging 67.Disk shadowing is an example of a fault tolerance applied at what level? a.  Network communications b.  DASD c.  Transaction d.  CPU processor 68.An example of a fault tolerance at the network communications level is: a.  a watchdog.
4 Views
View Answer
31.Collusion occurs when a white-collar individual attempts to commit fraud within an organization. 32.A negative answer given to a question on an internal control questionnaire almost always indicates a weakness in an internal control process area. 33.A structured form of analysis relevant to internal control reviews is an applications control matrix. 34.Someone who.
6 Views
View Answer
FILL-IN-THE-BLANK QUESTIONS 31.Networks of computers, which span at least two metropolitan areas, are known as __________. 32._____ is the protocol used to divide electronic messages into “packets” of information which are then reassembled at the receiving end. 33.When the intranets of two or more companies are linked together a(n) __________ is formed. 34.A robot-type.
9 Views
View Answer
PROBLEMS 108.Listed below are several examples of internal control procedures. Required: For the following internal control procedures, give the reason or objective of the control: a.  Checks are mailed by someone other than the person who prepares and signs a check. b.  The accounting department matches invoices received to receiving reports prior to     .
4 Views
View Answer
MULTIPLE-CHOICE QUESTIONS 51.Networks are sometimes classified according to the distance they span. A network that spans a single city or metropolitan area is known as a: a.  WAN b.  MAN c.  LAN d.  TCP 52.Which factor below was  a consideration of the RAND Corporation when it was charged with the problem of finding a reliable means.
7 Views
View Answer
TRUE/FALSE QUESTIONS 1.An information security system has the basic elements of any information system: hardware, software, databases, procedures, and reports. 2.The objective of the first phase of the security system life cycle is to design risk control measures such as various security measures and contingency plans. 3.One of the duties of the CSO.
7 Views
View Answer
11.Some believe that every corporation has its own corporate culture, and it is such a culture that ultimately either promotes or hinders ethical behavior within the corporation. 12.Most control processes can function irrespective of the competence of employees. 13.The board of directors serves as an interface between the stockholders of an organization.
8 Views
View Answer
76.General security procedures are essential in Internet security. One especially important weakness that hackers may attempt to exploit in this area is to: a.  guess at passwords b.  rewrite computer source code c.  alter log files to “cover their tracks” d.  steal the hard drives of personal computers used as Web servers 77.Which item listed.
6 Views
View Answer
21.In an internal audit function, the nature of independence is different than that of an external auditor. 22.General controls can be a substitute for application controls. 23.The computer operations supervisor has a good attendance record, which demonstrates the general operating procedure of competency of personnel. 24.A list of changes to on-line computer files.
6 Views
View Answer
106.Listed below are various controls found in a system of internal control. Required: Label each of the following controls as preventive (P), detective (D), or corrective (C). _____  1. Transaction detail _____  2. Rotation of duties _____  3. Reconciliation _____  4. Visual verification _____  5. Batch controls _____  6. Endorsement _____  7. Redundant processing _____  8. Rotation of duties _____ .
6 Views
View Answer
MATCHING QUESTIONS 97.Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms. Required:  Match the letter next to each definition with the appropriate term. Each answer will be used only once. _____  1. Biometric authentication device _____  2. Archive bit _____  3. System console _____  4. Trapdoor _____  5..
9 Views
View Answer
61.The protocol that specifies the format of all documents on the World Wide Web is: a.  HTML b.  hyperlinks c.  URL d.  ciphertext 62.Certain software allows clients to use exchange information with accounting programs and databases that may reside on the server’s computer. Such software is called: a.  CGI b.  ActiveX c.  JAVA d.  All of these answers are.
8 Views
View Answer
PROBLEMS 103.The following data is related to the time required to post checks drawn by the Last National Bank’s depositors: Number of checks posted780 Total elapsed minutes520 Rest period minutes  10 Interruption minutes  16 Required: a.  Calculate the standard posting time per check. b.  Calculate the combined rest and interruption time as a percentage of the       standard time.
8 Views
View Answer
41.The verification of a digital signature involves the use of a(n) __________ algorithm. 42.Whereas __________ signatures are relatively easy to forge, __________ signatures are next to impossible to forge. 43.A sufficiently long key is a useful countermeasure against a __________ __________. 44.Digital IDs are issued by a __________ __________. 45.A(n) __________ key that has.
9 Views
View Answer
FILL-IN THE BLANK QUESTIONS 41.__________ tend to reduce __________, but they rarely affect the causes. 42.An exposure is a(n) __________ times its __________ consequences. 43.Deficient revenues and excessive costs reduce __________. 44.The diversion or misrepresentation of assets from either employees or third parties is known as __________ __________. 45.Fraud examination draws on the fields of.
5 Views
View Answer
71.Which statement below regarding keys is false? a.  Each user should create his or her own public and private keys. b.  Using a central office authority to create and distribute keys is highly recommended. c.  The longer the life of the key, the more security that must be applied to protect it. d.  Sensitive.
6 Views
View Answer
11.A digital signature occurs when someone encrypts a message with his or her own private key. 12.Under Internet law, digital signatures are legally binding. 13.A guessed plaintext attack will succeed even though the sender adds a few random numbers at the end of a message. 14.Another name for a digital ID is a.
15 Views
View Answer
86.Which of the following is an ideal password? a.  ABC123 b.  DOG&bone c.  sky&CAT d.  2s&Ytc8x 87.If users are permitted to choose their own passwords, the best procedure is to: a.  forbid users from choosing certain “easy-to-guess” passwords b.  forbid users to change their passwords later c.  allow users to choose passwords they can easily remember d.  allow users.
7 Views
View Answer
105.Complete the limited-entry decision table below to document credit card purchase authorization procedures for The Whodunit Bookshop. A purchase under $75 is approved automatically.  Purchases between $75 and $500 (inclusive) are given an authorization number.  For purchases over $500, a hold is placed on the customer’s account as well as an authorization.
7 Views
View Answer
98.Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms. Required:  Match the letter next to each definition with the appropriate term. Each answer will be used only once. _____  1. Database shadowing _____  2. Logic bomb _____  3. Information security system _____  4. Risk management _____  5..
7 Views
View Answer
MATCHING QUESTIONS 101.Presented below is a list of terms relating to accounting information systems, followed by definitions of those terms. Required:  Match the letter next to each definition with the appropriate term. Each answer will be used only once. _____  1. Spoofing _____  2. Ciphertext _____  3. LAN _____  4. FTP _____  5. JAVA _____  6. POP _____  7..
7 Views
View Answer
FILL-IN THE BLANK QUESTIONS 31.The information security system is the __________ of the organization that controls special risks associated with computer-based information systems. 32.The method of risk assessment for computer systems where system vulnerabilities and threats are listed and subjectively ranked is known as the __________ approach. 33.The Treadway Commission has linked _______.
5 Views
View Answer
11.A serious business problem today is the theft of data. 12.A trapdoor is a portion of a computer program that, upon detecting an intruder, “traps” the intruder by activating a firewall to prevent unauthorized access to critical data. 13.Logic bombs are dormant pieces of code placed in programs for activation at a.
9 Views
View Answer
21.No software should be installed on any computer without prior approval of security. 22.System-access controls prevent unauthorized individuals from physically accessing computer resources. 23.The ideal password should consist of easy-to-remember names such as banana, kitty, IBM, password, or Friday. 24.No password system is of much value unless the passwords themselves are protected. 25.A program.
9 Views
View Answer
MULTIPLE-CHOICE QUESTIONS 56.Which of the items below would  be considered a possible common exposure for a corporation? a.  Excessive prices are paid for goods for use in the organization. b.  The corporation never was billed for a sale of merchandise shipped to a customer. c.  A flash flood destroys the merchandise contained in a.
11 Views
View Answer
110.Listed below are four examples of possible exposures found in the various business cycles of a certain business. Required: For each example, identify the transaction cycle control objective and give a solution which will help to reduce the possible exposure found in each example. a.  There is no written policy regarding access to.
4 Views
View Answer
ESSAYS 105.Name four types of smart cards that are used for electronic payments, and describe the functions of each card. 106.Explain the difference between a “server” and a “client.” List and describe the four types of servers. 107.Describe at least three ways in which the privacy of a company’s communications may be violated.
8 Views
View Answer
PROBLEMS 103.Give the e-mail address for DJ Jack (his user name is djjac) who works for radio station WXYZ (the station’s domain). WXYZ is a privately held corporation. 104.Give the e-mail address for Red Duke (his user name is reddu), who is an instructor at Badlands Community Technical School (whose domain is.
8 Views
View Answer
107.Presented below are ten control features, followed by ten statements describing either the achievement of a control feature (i.e., a system success) or a system deficiency. Required: On the answer line to the left of each control feature, insert the capital letter from the list of the most closely related.
4 Views
View Answer
TRUE/FALSE QUESTIONS 1.The term risk is synonymous with exposure. 2.All expenditures made by an organization are potentially excessive. 3.There are five basic forms of theft that occur in white-collar crime. 4.Financial accounting is concerned with the prevention and detection of fraud and white-collar crime. 5.Recent survey results indicate that the most frequent reason frauds are.
27 Views
View Answer
86.The marking of a form or document to direct or restrict its further processing is called: a.  an endorsement b.  a restriction c.  blocking d.  a cancellation 87.Identifying transaction documents to prevent their further or repeated use after they have performed their function is known as: a.  cancellation b.  restriction c.  blocking d.  endorsement 88.The general term for any type of.
5 Views
View Answer
96.An audit committee: a.  is composed only of an organization’s shareholders b.  should be primarily composed of only external board members (a NYSE requirement) c.  ideally should be composed only of members who are also high-level executives in the      organization d.  ideally should report directly to the controller 97.The FCPA requires that a system.
7 Views
View Answer
66.The component of internal control that is the foundation for all other components is: a.  risk assessment b.  information and communication c.  control activities d.  control environment 67.One way in which a company can produce a corporate culture that supports ethical behavior is through: a.  emphasis on sales quotas and deadlines b.  emphasis on short-run goals and.
6 Views
View Answer
105.Listed below is a list of terms relating to internal control processes, followed by definitions of those terms. Required:  Match the letter next to each definition with the appropriate term. Each answer will be used only once. _____  1. Check digit _____  2. Upstream resubmission _____  3. Exposure _____  4. Control register _____  5. Hash total _____ .
6 Views
View Answer
MULTIPLE-CHOICE QUESTIONS 46.A significant benefit of quantitative approach to risk assessment is that: a.  often the most likely threat to occur is not the one with the largest exposure b.  the relevant cost of the loss’s occurrence is an estimate c.  the likelihood of a given failure requires predicting the future d.  the approach estimates.
5 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*