Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 12MCQ
To determine
Identify the incorrect statement.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which statement is NOT correct?a. Legacy systems may process financially significant transactions.b. Some legacy systems use database technology.c. Mainframes are exclusive to legacy systems, while modern systems use only the client-server model.d. All the above are true.
The installation of a database management system is likely to have the least impact ona. data redundancy.b. entity-wide sharing of common data.c. exclusive ownership of data.d. the logic needed to solve a problem in an application program.e. the internal controls over data access.
Databases maximize
this means
independence; applications cannot access data associated with other applications
independence; applications and data are not linked to each other, so all applications are able to access the same data
isolation; applications and data are not linked to each other, so all applications are able to access the same data
isolation; applications cannot access data associated with other applications
Chapter 2 Solutions
Accounting Information Systems
Ch. 2 - Prob. 1RQCh. 2 - Prob. 2RQCh. 2 - Prob. 3RQCh. 2 - Prob. 4RQCh. 2 - Name the major subsystems of the revenue cycle.Ch. 2 - Prob. 6RQCh. 2 - Name the two types of journals.Ch. 2 - Distinguish between a general journal and journal...Ch. 2 - Name the two types of ledgers.Ch. 2 - Prob. 10RQ
Ch. 2 - Prob. 11RQCh. 2 - Prob. 12RQCh. 2 - Prob. 13RQCh. 2 - Prob. 14RQCh. 2 - Prob. 15RQCh. 2 - Prob. 16RQCh. 2 - Prob. 17RQCh. 2 - Prob. 18RQCh. 2 - Prob. 19RQCh. 2 - Distinguish between batch and real-time...Ch. 2 - Prob. 21RQCh. 2 - Prob. 22RQCh. 2 - Prob. 23RQCh. 2 - Prob. 24RQCh. 2 - Prob. 25RQCh. 2 - Prob. 26RQCh. 2 - Prob. 27RQCh. 2 - Prob. 28RQCh. 2 - Prob. 29RQCh. 2 - Prob. 30RQCh. 2 - Prob. 31RQCh. 2 - Prob. 32RQCh. 2 - Prob. 33RQCh. 2 - Prob. 34RQCh. 2 - Prob. 35RQCh. 2 - Prob. 36RQCh. 2 - Prob. 37RQCh. 2 - Prob. 38RQCh. 2 - Discuss the flow of cash through the transaction...Ch. 2 - Explain whether the cost accounting system...Ch. 2 - Prob. 3DQCh. 2 - Prob. 4DQCh. 2 - Would the writing down of obsolete inventory be...Ch. 2 - Are both registers and special journals necessary?Ch. 2 - Discuss the relationship between the balance in...Ch. 2 - Prob. 8DQCh. 2 - Prob. 9DQCh. 2 - Are large batch sizes preferable to small batch...Ch. 2 - Prob. 11DQCh. 2 - Prob. 12DQCh. 2 - Prob. 13DQCh. 2 - Prob. 14DQCh. 2 - Prob. 15DQCh. 2 - Prob. 16DQCh. 2 - Prob. 17DQCh. 2 - Prob. 18DQCh. 2 - Prob. 19DQCh. 2 - Prob. 1MCQCh. 2 - Prob. 2MCQCh. 2 - Prob. 3MCQCh. 2 - Prob. 4MCQCh. 2 - Prob. 5MCQCh. 2 - Prob. 6MCQCh. 2 - Which of the following is NOT a true statement? a....Ch. 2 - Which of the following is true of the relationship...Ch. 2 - Prob. 9MCQCh. 2 - Prob. 10MCQCh. 2 - Prob. 11MCQCh. 2 - Prob. 12MCQCh. 2 - Prob. 13MCQCh. 2 - Prob. 14MCQCh. 2 - Prob. 15MCQCh. 2 - Prob. 16MCQCh. 2 - Prob. 17MCQCh. 2 - Prob. 18MCQCh. 2 - Prob. 19MCQCh. 2 - The production subsystem of the conversion cycle...Ch. 2 - Prob. 21MCQCh. 2 - Prob. 22MCQCh. 2 - Prob. 1PCh. 2 - Prob. 2PCh. 2 - Prob. 3PCh. 2 - Prob. 4PCh. 2 - Prob. 5PCh. 2 - Prob. 6PCh. 2 - Prob. 7PCh. 2 - Prob. 8PCh. 2 - Prob. 9PCh. 2 - Prob. 10PCh. 2 - Prob. 11PCh. 2 - Prob. 12PCh. 2 - Prob. 13PCh. 2 - Prob. 14PCh. 2 - Prob. 15PCh. 2 - Prob. 16PCh. 2 - Prob. 17PCh. 2 - Prob. 18PCh. 2 - Prob. 19PCh. 2 - The following describes the payroll procedures for...Ch. 2 - Prob. 21PCh. 2 - Prob. 22PCh. 2 - Prob. 23PCh. 2 - Prob. 24PCh. 2 - Prob. 25PCh. 2 - Prob. 26PCh. 2 - CODING SCHEME Devise a coding scheme using block...
Knowledge Booster
Similar questions
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardWhich of the following statements is not correct? a.The database approach uses one common database to promote the concept of single user view. b.Database systems resolve task data dependency. c.The flat-file model encourages data redundancy. d.A primary goal of databasesystems is to minimize data redundancy. e.Database systems provide increased accessibility to data and data integration.arrow_forwardWhich statement is NOT true? a. Drill-down capability is an OLAP feature of data mining tools available to the user. b. The data warehouse should be separate from operational systems. c. Denormalization of data involves dividing the data into very small tables that support detailed analysis. d. Some decisions supported by a data warehouse are not fundamentally different from those that are supported by traditional databases. e. Data cleansing involves transforming data into standard business terms with standard data values.arrow_forward
- Which statement is NOT true?a. In a typical two-tier client-server architecture, the server handles both application and database duties.b. Client computers are responsible for presenting data to the user and passing user input back to the server.c. Two-tier architecture is for local area network applications where the demand on the server is restricted to a relatively small population of users.d. The database and application functions are separated in the three-tier model. e. In three-tier client-server architectures, one tier is for user presentation, one is for database and applications access, and the third is for Internet access.arrow_forwardThe database approach has several unique characteristics not found in traditional (flat-file) systems. Which of the following statements does not apply to the database model? a. Database systems have data independence; that is, the data and the programs are maintained separately except during processing. b. Database systems contain a data-definition language that helps describe each schema and subschema. c. The database administrator is the part of the software package that instructs the operating aspects of the program when data are retrieved. d. A primary goal of database systems is to minimize data redundancy. e. Database systems provide increased accessibility to data and flexibility in its usage.arrow_forwardIts specifics have been extensively implemented in third- and fourth-generation database management systems. The Three Schema Architecture does not conform to this rule. why?arrow_forward
- Which of the following is an advantage of a computer-based system for transactionprocessing over a manual system? A computer-based system(1) does not require as stringent a set of internal controls.(2) will produce a more accurate set of financial statements.(3) will be more efficient in generating financial statements.(4) eliminates the need to reconcile control accounts and subsidiary ledgersarrow_forwardComputers remove a fundamental separation of functions between authorizing and processing transactions, and there is also a risk of the integrity of accounting records. What do you think, how can management control these risks?arrow_forwardData in a data warehouse are in a stable state. Explain how this can hamper data mining analysis. What can an organization do to alleviate this problem?arrow_forward
- Replicated databases create considerable data redundancy, which is in conflict with the database concept. Explain the justification of this approach.arrow_forwardSuppose your company has built a database application that runs on a centralized database, but even with a high-end computer and appropriate indices created on the data, the system is not able to handle the transaction load, leading to slow processing of queries. What would be some of your options to allow the application to handle the transaction load?arrow_forwardWhich of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully capturesarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning