Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 10MCQ
To determine
Determine the correct statement.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
In a relational database, what is a foreign key?
a) A key that uniquely identifies a record within its table
b) A key that is used to speed up searches
c) A key used to link two tables together
d) A key that can accept null values\
A transitive dependencya. is a database condition that is resolved through special monitoring software.b. is a name given to one of the three anomalies that result from unnormalized database tables.c. can exist only in a table with a composite primary key.d. cannot exist in tables that are normalized at the 2NF level.e. is none of the above.
Which statement is true about a hashing structure? a. The same address could be calculated for two records. b. Storage space is used efficiently. c. Records cannot be accessed rapidly. d. A separate index is required.
Chapter 2 Solutions
Accounting Information Systems
Ch. 2 - Prob. 1RQCh. 2 - Prob. 2RQCh. 2 - Prob. 3RQCh. 2 - Prob. 4RQCh. 2 - Name the major subsystems of the revenue cycle.Ch. 2 - Prob. 6RQCh. 2 - Name the two types of journals.Ch. 2 - Distinguish between a general journal and journal...Ch. 2 - Name the two types of ledgers.Ch. 2 - Prob. 10RQ
Ch. 2 - Prob. 11RQCh. 2 - Prob. 12RQCh. 2 - Prob. 13RQCh. 2 - Prob. 14RQCh. 2 - Prob. 15RQCh. 2 - Prob. 16RQCh. 2 - Prob. 17RQCh. 2 - Prob. 18RQCh. 2 - Prob. 19RQCh. 2 - Distinguish between batch and real-time...Ch. 2 - Prob. 21RQCh. 2 - Prob. 22RQCh. 2 - Prob. 23RQCh. 2 - Prob. 24RQCh. 2 - Prob. 25RQCh. 2 - Prob. 26RQCh. 2 - Prob. 27RQCh. 2 - Prob. 28RQCh. 2 - Prob. 29RQCh. 2 - Prob. 30RQCh. 2 - Prob. 31RQCh. 2 - Prob. 32RQCh. 2 - Prob. 33RQCh. 2 - Prob. 34RQCh. 2 - Prob. 35RQCh. 2 - Prob. 36RQCh. 2 - Prob. 37RQCh. 2 - Prob. 38RQCh. 2 - Discuss the flow of cash through the transaction...Ch. 2 - Explain whether the cost accounting system...Ch. 2 - Prob. 3DQCh. 2 - Prob. 4DQCh. 2 - Would the writing down of obsolete inventory be...Ch. 2 - Are both registers and special journals necessary?Ch. 2 - Discuss the relationship between the balance in...Ch. 2 - Prob. 8DQCh. 2 - Prob. 9DQCh. 2 - Are large batch sizes preferable to small batch...Ch. 2 - Prob. 11DQCh. 2 - Prob. 12DQCh. 2 - Prob. 13DQCh. 2 - Prob. 14DQCh. 2 - Prob. 15DQCh. 2 - Prob. 16DQCh. 2 - Prob. 17DQCh. 2 - Prob. 18DQCh. 2 - Prob. 19DQCh. 2 - Prob. 1MCQCh. 2 - Prob. 2MCQCh. 2 - Prob. 3MCQCh. 2 - Prob. 4MCQCh. 2 - Prob. 5MCQCh. 2 - Prob. 6MCQCh. 2 - Which of the following is NOT a true statement? a....Ch. 2 - Which of the following is true of the relationship...Ch. 2 - Prob. 9MCQCh. 2 - Prob. 10MCQCh. 2 - Prob. 11MCQCh. 2 - Prob. 12MCQCh. 2 - Prob. 13MCQCh. 2 - Prob. 14MCQCh. 2 - Prob. 15MCQCh. 2 - Prob. 16MCQCh. 2 - Prob. 17MCQCh. 2 - Prob. 18MCQCh. 2 - Prob. 19MCQCh. 2 - The production subsystem of the conversion cycle...Ch. 2 - Prob. 21MCQCh. 2 - Prob. 22MCQCh. 2 - Prob. 1PCh. 2 - Prob. 2PCh. 2 - Prob. 3PCh. 2 - Prob. 4PCh. 2 - Prob. 5PCh. 2 - Prob. 6PCh. 2 - Prob. 7PCh. 2 - Prob. 8PCh. 2 - Prob. 9PCh. 2 - Prob. 10PCh. 2 - Prob. 11PCh. 2 - Prob. 12PCh. 2 - Prob. 13PCh. 2 - Prob. 14PCh. 2 - Prob. 15PCh. 2 - Prob. 16PCh. 2 - Prob. 17PCh. 2 - Prob. 18PCh. 2 - Prob. 19PCh. 2 - The following describes the payroll procedures for...Ch. 2 - Prob. 21PCh. 2 - Prob. 22PCh. 2 - Prob. 23PCh. 2 - Prob. 24PCh. 2 - Prob. 25PCh. 2 - Prob. 26PCh. 2 - CODING SCHEME Devise a coding scheme using block...
Knowledge Booster
Similar questions
- Repeating group dataa. is a form of data redundancy common to replicated databases in a distributed database environment.b. is a name given to one of the three anomalies that result from unnormalized database tables.c. can exist only in a table with a composite primary key.d. cannot exist in tables that are normalized at the 2NF level.e. is none of the above.arrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forwardA sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted. A control procedure that would serve as a preventive control for this situation would be: Select one: O a. Hash total O b. Check digit O c. Validity test O d. Either B or Carrow_forward
- An advantage of a physical address pointer is thata. it points directly to the actual disk storage location.b. it is easily recovered if it is inadvertently lost.c. it remains unchanged when disks are reorganized.d. all of the above are advantages of the physical address pointer.arrow_forwardIn a hashing structurea. two records can be stored at the same address.b. pointers are used to indicate the location of all records.c. pointers are used to indicate location of a record with the same address as another record.d. all locations on the disk are used for record storage.arrow_forwardWhich statement is NOT correct? The indexed sequential access methoda. is used for very large files that need both direct access and batch processing.b. may use an overflow area for records.c. provides an exact physical address for each record.d. is appropriate for files that require few inser- tions or deletions.arrow_forward
- Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully capturesarrow_forwardCipher text is a. an encryption algorithm b. a plain text c. non repudiation agreement d. a gibberish e. encrypted with the hash creator's private keyarrow_forwardThe installation of a database management system is likely to have the least impact ona. data redundancy.b. entity-wide sharing of common data.c. exclusive ownership of data.d. the logic needed to solve a problem in an application program.e. the internal controls over data access.arrow_forward
- Sequential file processing will not permita. data to be edited on a separate computer run.b. the use of a database structure.c. data to be edited in an offline mode.d. batch processing to be initiated from a terminal.e. data to be edited on a real-time basis.arrow_forwardDatabases maximize this means independence; applications cannot access data associated with other applications independence; applications and data are not linked to each other, so all applications are able to access the same data isolation; applications and data are not linked to each other, so all applications are able to access the same data isolation; applications cannot access data associated with other applicationsarrow_forwardWhich statement is NOT correct?a. Indexed random files are dispersed throughout the storage device without regard for physical proximity with related records.b. Indexed random files use disk storage space efficiently.c. Indexed random files are efficient when processing a large portion of a file at one time.d. Indexed random files are easy to maintain in terms of adding records.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,