Pkg Acc Infor Systems MS VISIO CD
10th Edition
ISBN: 9781133935940
Author: Ulric J. Gelinas
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 5DQ
Summary Introduction
To determine: The difference between bubble 3.1 and bubble 3.2 in the above diagram.
Introduction:
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Which of the following is a control that can be used to ensure that all of the components of an
invoice number are input by a data entry person?
dependency check
O procedures for rejected inputs
preformatted screens
O turnaround documents
1.
Data under a traditional ledger system is
authenticated by a central authority while
data under a blockchain is authenticated
through
Select one:
a. central authority.
b. a party outside the blockchain.
C. mass collaboration.
d. an external audit.
2
Analyzing data with the purpose of
determining a casual relationship refers to
Select one:
a. predictive analytics.
b. descriptive analytics.
c. diagnostic analytics.
d. prescriptive analytics.
3.
Which of the following items is not an
application of blockchain?
Select one:
a. joining ERP systems from multinational
subsidaries.
b. continual updating of real-time data on
customer preferences.
C. continual updating of financial statements
with new transactions.
d. joining ERP systems from different
companies.
Please answer with reason for all why the option is correct and why the other options are incorrect
Chapter 12 Solutions
Pkg Acc Infor Systems MS VISIO CD
Ch. 12 - Prob. 1RQCh. 12 - What primary functions does the purchasing process...Ch. 12 - Prob. 3RQCh. 12 - What are the fundamental responsibilities of each...Ch. 12 - Describe supply chain management (SCM).Ch. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - What types of frauds are typically found in the...Ch. 12 - What are the typical effectiveness goals of the...Ch. 12 - What characterizes a valid PO input? What...Ch. 12 - Prob. 15RQCh. 12 - Describe the impact that entity-level controls...Ch. 12 - Prob. 1DQCh. 12 - Explain why ambiguities and conflicts exist among...Ch. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 1SPCh. 12 - Prob. 2SPCh. 12 - Prob. 3SPCh. 12 - Prob. 4SPCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6P
Knowledge Booster
Similar questions
- After a receipt is uploaded into QBO, the user will need to ______ the data and ensure the receipt is properly categorized and classified. Select one: a. Sort b. Save c. Journalize d. Reviewarrow_forwardA sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted. A control procedure that would serve as a preventive control for this situation would be: Select one: O a. Hash total O b. Check digit O c. Validity test O d. Either B or Carrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forward
- How do you analyze the QUICKBOOK Software to analyze the customer and vendor’sPayments and Receipts? Justify the figures using QuickBooks.arrow_forwardDescribe the three types of anomalies associated with database tables that have not been normalized. Using and Inventory table as an example, explain the operational implications of each anomaly.arrow_forwardWhich of the following is considered an ethical use of third-party data? More than one answer may be correct. Check All That Apply to collect data from individuals for CRM purpose if it is clearly communicated to users and they have agreed to not inform users of how their data is shared with third parties collecting data from users who have not agreed to the site's data collection terms to sell the data to third parties who use it for market and demographic analysis if it is clearly communicated to users and they have agreed Helparrow_forward
- Briefly provide your opinion whether an auditor wishing to assess the adequacy of separation of functions examine a data flow diagram or system flowchart. Why.arrow_forwardReliability means that data are reasonably complete and accurate. Accuracy refers to the extent that recorded data reflect the actual underlying information. In this regard which of the following is the suitable example of reliability of the data? O a. Information may be more reliable when it is obtained from dependent sources outside the entity O b. Information may be more reliable when it is obtained from independent sources outside the entity O c Information may be more reliable when it is obtained from the management of the entity O d. Information may be more reliable when it is obtained from engagement team membersarrow_forwardControl Objectives and Procedures Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15). Make a copy of the exhibit page and complete the following requirements.Requireda. Opposite the examples of transaction errors lettered a–g, write the name of the transaction assertion clients wish to achieve to prevent, detect, or correct the error.b. Opposite each numbered control procedure, place an “X” in the column that identifies the error(s) the procedure is likely to control by prevention, detection, or correction.arrow_forward
- Refer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.arrow_forwardThe computer processing portion of a sales order system is represented by the flowchart. Answer the following questions.a. What type of data processing system is this? Explain, and be specific.b. The auditor suggests that this system can be greatly simplified by changing to direct access files. Explain the major operational changes that would occur in the system if this were done.c. The auditor warns of control implications from this change that must be considered. Explain the nature of the control implications.d. Sketch a flowchart (the computerized portion only) of the proposed new system. Use correct symbols and label the diagram.arrow_forwardBriefly describe record counts, batch totals, and hash totals. What types of errors in input would each of these controls likely identify?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub