x
Info
x
Warning
x
Danger

Accounting Expert Answers & Study Resources : Page 585

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Expert Answers

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
150245 Resources
0 Students Benefited

COMPLETION 1.A(n) ____________________ in an accounting system can be classified as a resource, event, or agent about which data is collected. 2.A(n) ____________________ is an item of data that characterizes an entity or relationship. 3.Attributes that consist of multiple subattributes are referred to as _________________________. 4.A(n) _________________________ is the attribute whose value is unique.

Homework Answers
23 Views
  • COMPLETION 1.A(n) ____________________ in an accounting system can be classified as
  • Accounting
Homework Answers
View Answer

41.Access control software ensures that only authorized users gain access to a system through a process  of identification and authentication. 42.Threat monitoring is a technique to protect one network from another “untrusted” network. 43.Application controls restrict access to data, programs, and documentation. 44.An intrusion-detection systems (IDS) logs and monitors who is on or.

Homework Answers
24 Views
  • 41.Access control software ensures that only authorized users gain access
  • Accounting
Homework Answers
View Answer

41.              A(n) ___________________________________ is the attribute whose value is unique for every entity that will appear in the database. 42.              _________________________ is a measure of the highest level of participation that one entity can have in another entity. 43.              In set theory, a two-dimensional collection of information is called a(n) ____________________. 44.              ____________________.

Homework Answers
25 Views
  • 41.              A(n) ___________________________________ the attribute whose value unique for every
  • Accounting
Homework Answers
View Answer

COMPLETION 1.              Business process such as hiring employees, purchasing inventory, and collecting cash from customers are called ____________________. 2.              The ____________________ approach attempts to describe all aspects of the business events and processes under consideration. 3.              Analyzing collected historical data with multidimensional analytic tools and exploratory techniques is called _________________________. 4.              Primary key ______________.

Homework Answers
25 Views
  • COMPLETION 1.              Business process such as hiring employees, purchasing inventory, and
  • Accounting
Homework Answers
View Answer

21.              ______________________________ is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data. 22.              _________________________ refers to the exploration, aggregation, and analysis of large quantities of varied data from across the organization. 23.              ____________________ is the most popular data modeling approach. 24.              In developing.

Homework Answers
23 Views
  • 21.              ______________________________ the use of information systems facilities to focus
  • Accounting
Homework Answers
View Answer

4.Listed below are 13 specific fraud examples taken from some well-known fraud cases: MiniScribe, ZZZZ Best Carpet Cleaning, Lesley Fay, and Equity Funding. Required: For each fraud example, enter a letter corresponding to which information control goal was initially violated--Validity, Completeness, or Accuracy. Some examples might involve more than one violation. NOTE:.

Homework Answers
24 Views
  • 4.Listed below 13 specific fraud examples taken from some well-known
  • Accounting
Homework Answers
View Answer

11.Risks are those events that could have a negative impact on organization objectives. 12.Opportunities are events that could have a positive impact on organization objectives. 13.Risk assessment is the entity's identification and analysis of relevant risks to achievement of its objectives, forming a basis for determining how the risks should be managed. 14.The.

Homework Answers
30 Views
  • 11.Risks those events that could have a negative impact organization
  • Accounting
Homework Answers
View Answer

21.A set of data that describes an instance of the entity represented by a relation is known as a(n) ____. a.tuple b.resource c.agent d.event 22.Legacy systems do not usually have which of the following characteristics? a.developed on previous hardware (and/or software) platforms b.are easily adaptable to enterprise systems c.have been used by an organization for a long period.

Homework Answers
19 Views
  • 21.A set of data that describes an instance of the
  • Accounting
Homework Answers
View Answer

61.              Each relationship in an E-R diagram has a ___________ that shows the degree to which each entity participates in the relationship. a.              maximum cardinality b.              identifier c.              cardinality d.              primary key 62.              A decision maker prepares a presentation in a suitable format for a given decision at a given point in time when using.

Homework Answers
26 Views
  • 61.              Each relationship in an E-R diagram has a ___________
  • Accounting
Homework Answers
View Answer

31.Business continuity planning is the process that identifies events that may threaten an organization and provide a framework whereby the organization will continue to operate or resume operations with a minimum of disruption. 32.Continuity is the process of using backup measures to restore lost data and resume operations. 33.With continuous data protection.

Homework Answers
24 Views
  • 31.Business continuity planning the process that identifies events that may
  • Accounting
Homework Answers
View Answer

11.The information systems function ______________________________ provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation. 12.The ______________________________ maintains custody of and controls access to programs, files, and documentation. 13.Combining the functions of authorizing and executing events is a violation.

Homework Answers
24 Views
  • 11.The information systems function ______________________________ provides efficient and effective operation
  • Accounting
Homework Answers
View Answer

41.A mechanism by which a company is reimbursed for any loss that occurs when an employee commits fraud is called a: a.segregation of duties b.fidelity bond c.personnel planning control d.termination control plan 42.Which of the following personnel security control plans is corrective in nature as opposed to being a preventive or detective control plan? a.rotation of.

Homework Answers
25 Views
  • 41.A mechanism by which a company reimbursed for any loss
  • Accounting
Homework Answers
View Answer

11.____ can consist of many computers and related equipment connected together via a network. a.PCs b.Servers c.LAN d.Firewall 12.In an information systems organization, which of the following reporting relationships makes the least sense? a.the data center manager reports to the CIO. b.the systems development manager reports to the data center manager. c.database administration reports to the technical services.

Homework Answers
22 Views
  • 11.____ can consist of many computers and related equipment connected
  • Accounting
Homework Answers
View Answer

11.The section of Sarbanes Oxley that requires a company’s CEO and CFO to certify quarterly and annual reports is _____________________________________________. 12.The section of Sarbanes Oxley that requires each annual report filed with the SEC to include an internal control report is _____________________________________________. 13.The section of Sarbanes Oxley that requires financial analysts to.

Homework Answers
29 Views
  • 11.The section of Sarbanes Oxley that requires a company’s CEO
  • Accounting
Homework Answers
View Answer

31.              In a(n) ____________________ database model, a child record may have more than one parent. 32.              In a(n) ____________________ database model, data are logically organized into two-dimensional tables. 33.              A(n) _______________________________database model allows both simple and complex objects, including video clips and pictures, to be stored. 34.              The goal of ____________________ is to.

Homework Answers
22 Views
  • 31.              In a(n) ____________________ database model, a child record may
  • Accounting
Homework Answers
View Answer

31.____ are the policies and procedures that help ensure that management directives are carried out. a.Control environment b.Risk assessment c.Control activities d.Monitoring 32.____ is a process that assesses the quality of internal control performance over time. a.Control environment b.Risk assessment c.Control activities d.Monitoring 33.Which of the following statements regarding internal controls systems is false? a.Effective internal control systems provide complete.

Homework Answers
23 Views
  • 31.____ the policies and procedures that help ensure that management
  • Accounting
Homework Answers
View Answer

MULTIPLE CHOICE 1.A process by which organizations select objectives, establish processes to achieve objectives, and monitor performance is a.enterprise risk management b.internal control c.organizational governance d.risk assessment 2.A process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may effect.

Homework Answers
21 Views
  • MULTIPLE CHOICE 1.A process by which organizations select objectives, establish processes
  • Accounting
Homework Answers
View Answer

51.  Why is there usually no control goal called update validity? a.Update completeness achieves update validity. b.Input validity guarantees update validity. c.Update accuracy guarantees update validity. d.Input accuracy achieves update validity. 52.A programming error causes the sale of an inventory item to be added to the quantity on hand attribute in the inventory master data..

Homework Answers
21 Views
  • 51.  Why there usually no control goal called update validity? a.Update
  • Accounting
Homework Answers
View Answer

PROBLEMS 1.The following table is a view of BILLING_HOURS from the various data elements in ABC's relational database: BILLING_HOURS Employee_No Client_No Date Hours Billing_Rate B122 F11555 990823 8 150 A632 F11555 990823 8 100 B122 F11555 990824 8 150 A632 F11555 990824 8 100 B122 F11555 990825 8 150 A632 F11555 990825 8 100 B122 H12456 990826 8 150 A632 H12456 990826 8 100 A356 F11555 990826 8 57 A432 H12456 990826 8 57 A491 H12456 990826 8 57 B122 F11555 990827 8 150 A632 H12456 990827 8 100 A356 F11555 990827 8 57 B432 H12456 990827 8 57 B491 H12456 990827 8 57 Required: a. Using proper SQL commands, develop a query to extract billing data for Fleet Services (client number F11555), showing the employee number, date, hours, and billing rate. b. Design a table showing the output that would be.

Homework Answers
20 Views
  • PROBLEMS 1.The following table a view of BILLING_HOURS from the various
  • Accounting
Homework Answers
View Answer

21.The section of Sarbanes Oxley that prohibits a CPA firm that audits a public company from engaging in certain non-audit services with the same client is: a.Title I – Public Company Accounting Oversight Board b.Title II – Auditor Independence c.Title III – Corporate Responsibility d.Title IV – Enhanced Financial Disclosures 22.The section of Sarbanes Oxley.

Homework Answers
25 Views
  • 21.The section of Sarbanes Oxley that prohibits a CPA firm
  • Accounting
Homework Answers
View Answer

11.              Because it uses alphabetic characters, a(n) ____________________ coding system makes it easier for human beings to remember the codes. 12.              A(n) ______________________________ is a code that includes an extra digit that can be used to check the accuracy of the code. 13.              The ____________________ approach to data management concentrates on the.

Homework Answers
27 Views
  • 11.              Because it uses alphabetic characters, a(n) ____________________ coding system
  • Accounting
Homework Answers
View Answer

PROBLEMS 1.List 1 shows the coding schemes discussed and illustrated in Chapter 5, while List 2 contains eight coding examples. List 1 - Coding Schemes A. Sequential (serial) B. Block C. Significant digit D. Hierarchical E. Mnemonic F. Check digit G. Color List 2 - Coding Examples 1. Sue Smith is taking three college courses this semester--AC 340, FI 101, and EN 280. When you check with the Registrar's.

Homework Answers
27 Views
  • PROBLEMS 1.List 1 shows the coding schemes discussed and illustrated in
  • Accounting
Homework Answers
View Answer

COMPLETION 1.______________________________ is a process that ensures that the enterprises’s IT sustains and extends the organization’s strategies and objectives. 2.Data in all their forms that are input, processed, and output by information systems is the IT resource ____________________. 3.IT resource that are automated systems and manual procedures that process information _________________________. 4. ______________________________ are.

Homework Answers
26 Views
  • COMPLETION 1.______________________________ a process that ensures that the enterprises’s IT sustains
  • Accounting
Homework Answers
View Answer

11.___________ values waste memory space and may cause problems when running queries. 12.A collection of data representing multiple occurrences of a resource, event, or agent is known as a(n) ____________________. 13.A set of data that describes a single instance of the entity represented by a relation is known as a(n) ____________________. 14.The _________________________.

Homework Answers
19 Views
  • 11.___________ values waste memory space and may cause problems when
  • Accounting
Homework Answers
View Answer

41.Establishing a viable internal control system is primarily the responsibility of: a.the external auditors b.management c.programmers d.government authorities 42.As a result of an inadequate design, a production process yields an abnormally high amount of raw material scrapped. Which control goal is being violated? a.ensure effectiveness of operations b.ensure efficient employment of resources c.ensure security of resources d.ensure input.

Homework Answers
23 Views
  • 41.Establishing a viable internal control system primarily the responsibility of: a.the
  • Accounting
Homework Answers
View Answer

51.Control plans that relate to a multitude of goals and processes are called ________________________________________. 52.A control plan requires that a manager sign his/her approval of timecards for employees in that department. This control plan is an example of a ________________________________________. 53.A batch of business events is accurately entered into a business event.

Homework Answers
20 Views
  • 51.Control plans that relate to a multitude of goals and
  • Accounting
Homework Answers
View Answer

21.The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions? a.data control b.data entry c.data librarian d.database administration 22.The controlled access to data, programs, and documentation is a principal responsibility of which of the following functions? a.data control b.data preparation (data entry) c.data librarian d.computer.

Homework Answers
23 Views
  • 21.The control concern that there will be a high risk
  • Accounting
Homework Answers
View Answer

51.              The model that logically organizes data into two-dimensional tables is the a.              hierarchical database model b.              network database model c.              relational database model d.              object-oriented database model 52.              The model that includes abstract types that allow users to define data to be stored in the database is the a.              hierarchical database model b.              network database model c.             .

Homework Answers
24 Views
  • 51.              The model that logically organizes data into two-dimensional tables
  • Accounting
Homework Answers
View Answer

3.Based on the following abbreviated description of Avery University's course scheduling and student advising procedures, prepare an Entity-Relationship (E-R) diagram that reflects the key entities and relationships. Course Scheduling: In consultation with the vice-president of Academic Affairs and the Registrar's Office, each academic department chair decides which courses will be offered each.

Homework Answers
17 Views
  • 3.Based the following abbreviated description of Avery University's course scheduling
  • Accounting
Homework Answers
View Answer

MULTIPLE CHOICE 1.An entity can be classified as all of the following except a.resource b.event c.tuple d.agent 2.A(n) ____ of an entity is on specific thing of the type defined by the entity. a.agent b.composite attribute c.attribute d.instance 3.A(n) ____ is an item of data that characterizes an entity or relationship a.agent b.composite attribute c.attribute d.instance 4.Which of the following is the entity or agent? a.client b.client number c.client.

Homework Answers
78 Views
  • MULTIPLE CHOICE 1.An entity can be classified as all of the
  • Accounting
Homework Answers
View Answer

21.______________________________ is the entity's identification and analysis of relevant risks to achievement of its objectives, forming a basis for determining how the risks should be managed. 22.The _________________________ sets the tone of the organization, influencing the control consciousness of its people. 23.______________________________ are the policies and procedures that help ensure that management.

Homework Answers
27 Views
  • 21.______________________________ the entity's identification and analysis of relevant risks to
  • Accounting
Homework Answers
View Answer

11.A recursive relationship is created when there is an employee being supervised, and another employee is the supervisor. 12.The cardinality constraint is used less frequently than the participation constraint. 13.The cardinality constraint is used to specify both the minimum and maximum participation of one entity in the relationship with the other entity. 14.The.

Homework Answers
23 Views
  • 11.A recursive relationship created when there an employee being supervised,
  • Accounting
Homework Answers
View Answer

COMPLETION 1.________________________________________ is a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may effect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of .

Homework Answers
24 Views
  • COMPLETION 1.________________________________________ a process, effected by an entity’s board of directors,
  • Accounting
Homework Answers
View Answer

TRUE/FALSE 1.Organizational governance is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance. 2.Fraud is the possibility that an event or action will cause an organization to fail to meet its objectives (or goals). 3.Management is responsible for establishing and maintaining an adequate system of internal control 4.A.

Homework Answers
23 Views
  • TRUE/FALSE 1.Organizational governance a process by which organizations select objectives, establish
  • Accounting
Homework Answers
View Answer

31.Which of the following relational commands would a manager use to combine the data from two related relations into a third relation? a.select b.project c.join d.display 32.In a relational database, the entity is represented as a(n): a.table b.network c.field d.attribute 33.Which is not a step in creating a relation using SQL? a.assign the relation a name b.assign each attribute a name c.specify the.

Homework Answers
19 Views
  • 31.Which of the following relational commands would a manager use
  • Accounting
Homework Answers
View Answer

31.A computer abuse technique called a ____________________ involves a program that replicates itself on disks, in memory, and across networks. 32.A computer abuse technique called a(n) _________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the.

Homework Answers
20 Views
  • 31.A computer abuse technique called a ____________________ involves a program
  • Accounting
Homework Answers
View Answer

11.Which component of the ERM framework is best described here: Internal and external events affecting achievement of an entity’s objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management’s strategy or objective-setting processes. a.control activities b.event identification c.risk assessment d.risk response 12.This component of the ERM framework encompasses the tone.

Homework Answers
22 Views
  • 11.Which component of the ERM framework best described here: Internal
  • Accounting
Homework Answers
View Answer

TRUE/FALSE 1.IT governance leads to better organizational performance such as profitability. 2.As an IT resource, information includes data in all their forms that are input, processed and output by information systems. 3.As an IT resource, applications are automated systems and manual procedures that process information. 4.The system of controls used in this text consists.

Homework Answers
37 Views
  • TRUE/FALSE 1.IT governance leads to better organizational performance such as profitability. 2.As
  • Accounting
Homework Answers
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*