Search
Info
Warning
Danger

Study Resources (Chemistry)

10-7 An enterprise system supports a business process by: a. Facilitating the functioning of the business process. b. Providing records that business events have occurred. c. Storing data for decision making. Describe how the enterprise system depicted in Figure 10.11 provides support in these three areas. .
2 Views
View Answer
8-9 “Contracting for a hot site is too cost-prohibitive except in the rarest of circumstances. Therefore, the vast majority of companies should think in terms of providing for a cold site at most.” Discuss fully. 8-10 “Preventing the unauthorized disclosure and loss of data has become almost impossible. Employees and others.
0 Views
View Answer
10-1 Explain how and where the control goals for effectiveness of operations would be shown in the control goal columns of a control matrix prepared for the OE/S process. At a minimum, include the following topics from Chapter 7 in your discussion: a. Differentiate between control goals for the operations process.
6 Views
View Answer
7-1 Recently, the U.S. federal government and the American Institute of Certified Public Accountants (AICPA) have taken aggressive steps aimed at ensuring the quality of organizational governance. What are these changes, how might they change organizational governance procedures, and do you believe that these actions will really improve internal control.
3 Views
View Answer
9-9“Technology Summary 9.1 seems to indicate that the business process and application control plans in this chapter cannot be relied on.” Do you agree? Discuss fully. 9-10“If a business process is implemented with OLRT processing, we do not need to worry about update completeness and update accuracy.” Do you agree?.
2 Views
View Answer
7-3 “If it weren’t for the potential of computer crime, the emphasis on controlling computer systems would decline significantly in importance.” Do you agree? Discuss fully. 7-4 Provide five examples of potential conflict between the control goals of ensuring effectiveness of operations and of ensuring efficient employment of resources. .
0 Views
View Answer
9-7Referring to Appendix 9A, discuss fully the following statement: “Protecting the private key is a critical element in public key cryptography.” 9-8On October 2, 2002, a clerk at Bear Stearns had erroneously entered an order to sell nearly $4 billion worth of securities. The trader had sent an order to.
2 Views
View Answer
10-2 “A control plan that helps to attain operational effectiveness by ‘providing assurance of creditworthiness of customers’ also helps to achieve the information process control goal of sales order input validity.” Do you agree? Discuss fully. 10-3 Examine the systems flowchart in Figure 10.11. Discuss how this process implements the concept.
2 Views
View Answer
7-5 Discuss how the efficiency and effectiveness of a mass-transit system in a large city can be measured. 7-6 “If input data are entered into the system completely and accurately, then the information system control goals of ensuring update completeness and of ensuring update accuracy will be automatically achieved.” Do.
0 Views
View Answer
8-7 A key control concern described in Table 8.2 regarding the systems development manager is that “systems development can develop and implement systems without management approval.” Discuss a control described in this chapter that reduces the risk that unauthorized systems will be implemented. 8-8 Debate the following point: “Business continuity planning.
0 Views
View Answer
7-8 How does this text’s definition of internal control differ from COSO? How does it differ from the controls that are subject to review under Section 404 of SOX? 7-9 What, if anything, is wrong with the following control hierarchy? Discuss fully. Highest level of control Pervasive control plans The control environment Application.
0 Views
View Answer
5-2How has the technological availability and implementation of DBMSs benefited decision makers in organizations? 5-3What is data independence? Why is it important in a comparison of the application and centralized database approaches to storing data? 5-4How is a DBMS different from a database? .
0 Views
View Answer
6-8 Although SQL is the de facto standard database language, there are many variations of the language. Using the Internet (or other sources), answer the following questions. What is a de facto standard? Provide examples (other than SQL) of such standards. How does SQL (the primary database language) being a.
0 Views
View Answer
3-9 One of Amazon.com’s marketing strengths is the capability to collect and analyze customer purchase data. How does this add value to the company? From the customer’s perspective, is value added? 3-10 Some potential e-business customers have security concerns regarding online purchases. How do Internet security certifications attempt to address these.
0 Views
View Answer
11-6 a. Discuss the conditions under which each of the following billing processes are most appropriate: (1) pre-billing system, and (2) post-billing system. b. Discuss the relative advantages of each of the billing processes mentioned in part a, from the standpoint of both the selling company and the customer. 11-7 “Pre-billing.
2 Views
View Answer
5-12What are the comparative advantages of the various data coding types discussed in Technology Summary 5.2 when applied to each of the following? Discuss fully. Note: In the following answer, we do not separate the discussion of employee, vendor, and customer ID numbers because the factors that one would consider.
0 Views
View Answer
8-3 “No matter how sophisticated a system of internal control is, its success ultimately requires that you place your trust in certain key personnel.” Do you agree? Discuss fully. 8-4 “If personnel hiring is done correctly, the other personnel control plans are not needed.” Do you agree? Discuss fully. .
0 Views
View Answer
9-3In evaluating business process controls and application controls, some auditors differentiate between the point in the system at which the control is “established” and the later point at which that control is “exercised.” Speculate about the meaning of the terms “establish a control” and “exercise a control” by discussing.
3 Views
View Answer