Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 12P
Summary Introduction
To determine: Five most common ways to classify and code the data and discuss the strength and weakness of each example.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Match each of the numbered descriptions with the principle, component, or descriptor that it best reflects. Indicate your answer by entering the letter A through J in the blank provided. A. Control principle B. Relevance principle C. Compatibility principle D. Flexibility principle E. Cost-benefit principle F. Source documents G. Input devices H. Information processors I. Information storage J. Output devices 1. Capture information from source documents and transfer to information processing. 2. Keeps data accessible to information processors. 3. Systems that summarize information for use. 4. Means to take information out of an accounting system and make it available to users. 5. Provide the information processed by the accounting system. 6. Prescribes that benefits from an activity in a system outweigh the costs. 7. Prescribes that a system be adaptable to changes in the company, environment, and user needs. 8. Prescribes that a system conform with a company’s activities, personnel,…
Identify five major considerations that are introduced when the client uses information technology
Match the two lists, below, by placing the capital letter from List 1 in each of the cells
preceding the five descriptions in List 2 to which they best relate.
One description in List 2 can be answered with 2 matches from List 1. Therefore, you should
have 2 letters left over from List 1.
List 1: Concepts
A. Application (i.e., automated) control.
B. Corrective control.
C. Control environment.
D. Input validity.
E. Input completeness.
F. Input accuracy
G. Update completeness.
H. Efficient use of resources.
List 1: Capital letter
List 2: Definitions/Descriptions
1. Insurance policy reimburses a company for losses due to
a fire in a warehouse.
2. Shipping notices have a serial number that is tracked to
ensure that they are all input.
3.
Computer reviews each input to ensure that all the
required data are included.
4. Inventory movements are tracked with a scanner to
reduce manual counting.
5. Purchase orders are signed to approve the purchase.
Chapter 5 Solutions
Accounting Information Systems
Ch. 5 - Prob. 1RQCh. 5 - Prob. 2RQCh. 5 - Prob. 3RQCh. 5 - What are the most important limitations of the...Ch. 5 - Prob. 5RQCh. 5 - Prob. 6RQCh. 5 - Prob. 7RQCh. 5 - Prob. 8RQCh. 5 - Prob. 9RQCh. 5 - Prob. 10RQ
Ch. 5 - Prob. 11RQCh. 5 - Prob. 12RQCh. 5 - Prob. 13RQCh. 5 - What is a partial dependency?Ch. 5 - Prob. 15RQCh. 5 - Prob. 16RQCh. 5 - Prob. 17RQCh. 5 - What factors distinguish DSS from EIS?Ch. 5 - Describe the basic differences between ES and NN.Ch. 5 - What role do intelligent agents play in the...Ch. 5 - Why have knowledge management systems become so...Ch. 5 - Prob. 22RQCh. 5 - Prob. 23RQCh. 5 - Prob. 1DQCh. 5 - How has the technological availability and...Ch. 5 - Prob. 3DQCh. 5 - Prob. 4DQCh. 5 - What are the differences between a logical view...Ch. 5 - Prob. 6DQCh. 5 - Prob. 7DQCh. 5 - Prob. 8DQCh. 5 - Prob. 9DQCh. 5 - Prob. 10DQCh. 5 - Prob. 11DQCh. 5 - Prob. 12DQCh. 5 - Prob. 1SPCh. 5 - Prob. 2SPCh. 5 - Prob. 7PCh. 5 - Prob. 12PCh. 5 - Use the Internet to research knowledge management...
Knowledge Booster
Similar questions
- Following are activities for a provider of online education. Classify each activity as unit level, batch level, service level, or facility level. Activity 1. Scheduling instructors 2. Controlling course data 3. Receiving supply shipments 4. Registering a student 5. Creating a new course 6. Maintaining course websites 7. Providing electricity 8. Delivering an online course Levelarrow_forwardDiscuss the importance of the role of data administrator. In the flat-fie environment, why is such a rolenot necessary? What tasks does the DBA perform?arrow_forwardMatch six of the terms (a-j) with the definitions provided below (1-6).a. Application controlsb. Error listingc. General controlsd. Hardware controlse. Input controlsf. Output controlsg. Parallel simulationh. Parallel testingi. Pilot testingj. Processing controls________ 1. The new and old systems operate simultaneously in all locations.________ 2. Controls that relate to all aspects of the IT system.________ 3. Controls such as review of data for reasonableness, designed to assure that data generated by thecomputer is valid, accurate, complete, and distributed only to authorized people.________ 4. Controls that apply to processing of transactions.________ 5. A new system is implemented in one part of the organization while other locations continue to rely onthe old system.________ 6. Controls such as proper authorization of documents, check digits, and adequate documentation,designed to assure that the information to be entered into the computer is authorized, complete, and accurate.arrow_forward
- An organization’s IT function has the following goals: Improve the quality of IT solutions and services to its internal users. Increase the ratio of planned-to-realized benefits from systems solutions. Fully match IT strategy with enterprise strategies.Integrate information systems architectures to minimize database redundancy and increase systems reusability across the user community.RequiredDevelop a BSC depicting specific measures for each of the four BSC perspectives.arrow_forwardApply the P.R.O.F.I.T. model to identify Infosys capabilities. Identify from the case study information the core competencies of Infosys.arrow_forwardDiscuss the characteristics of a computerized information system that make it different from the manual system.arrow_forward
- Write a research paper explaining how the T Account process worksarrow_forwardERP functionality falls into two general groups of applications, including coreapplications and business analytical applications. Based on our tutorial discussion, summarise these twogeneral groups of applications.arrow_forwardWhat is the name given to the systems development approach used to quickly produce a model of user interfaces, user interactions with the system, and process logic?a. neural networkingb. prototypingc. reengineeringd. application generationarrow_forward
- Integration is the buzzword for all systems including the Accounting Information Systems (AIS). Give TEN (10) reasons how an integrated AIS will benefit an organization. Provide examples appropriately. Please give explanation in details with example for each point.arrow_forwardAn engineering company is looking for a software solution to manage their inventory and distribution.Name the four main activities of systems analysis that could be applied in the given situation.arrow_forwardCreate a concept map about PAS/IAS 2 Inventories.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,