Principles of Accounting Volume 1
19th Edition
ISBN: 9781947172685
Author: OpenStax
Publisher: OpenStax College
expand_more
expand_more
format_list_bulleted
Textbook Question
thumb_up100%
Chapter 7, Problem 27MC
Which of the following is not a way to prevent your computer from being attacked by ransomware?
A. making sure your antivirus security programs are up to date
B. opening all attachments from emails from unknown senders
C. using secure (password protected) networks and backing up your files regularly
D. not using open Wi-Fi (nonpassword, nonencrypted) in public locations
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Sniffer software isa. used by malicious Web sites to sniff data from cookies stored on the user’s hard drive. b. used by network administrators to analyze net- work traffic. c. used by bus topology intranets to sniff for carriers before transmitting a message to avoid data collisions. d. an illegal program downloaded from the Web to sniff passwords from the encrypted data of Internet customers. e. illegal software for decoding encrypted messages transmitted over a shared intranet channel.
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(c) A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.
Listed here are two scenarios. For each scenario, discuss the possible damages that can occur.Suggest a preventive control.A. An intruder taps into a telecommunications device and retrieves the identifying codes andpersonal identification numbers for ATM cardholders. (The user subsequently codes thisinformation onto a magnetic coding device and places this strip on a blank bank card.)B. Because of occasional noise on a transmission line, electronic messages received are extremelygarbled.Problem # 4 (30
Chapter 7 Solutions
Principles of Accounting Volume 1
Ch. 7 - So far, computer systems cannot yet ________. A....Ch. 7 - Any device used to provide the results of...Ch. 7 - Source documents ________. A. are input devices B....Ch. 7 - All of the following can provide source data...Ch. 7 - A document that asks you to return an identifying...Ch. 7 - Which of the following is false about accounting...Ch. 7 - An unhappy customer just returned $50 of the items...Ch. 7 - A customer just charged $150 of merchandise on the...Ch. 7 - A customer just charged $150 of merchandise using...Ch. 7 - The company just took a physical count of...
Ch. 7 - Your company paid rent of $1,000 for the month...Ch. 7 - On January 1, Incredible Infants sold goods to...Ch. 7 - Received a check for $72 from a customer, Mr....Ch. 7 - You returned damaged goods you had previously...Ch. 7 - Sold goods for $650 cash. Which journal would the...Ch. 7 - Sandren Co. purchased inventory on credit from...Ch. 7 - Sold goods for $650, credit terms net 30 days....Ch. 7 - You returned damaged goods to C.C. Rogers Inc. and...Ch. 7 - The sum of all the accounts in the accounts...Ch. 7 - AB Inc. purchased inventory on account from YZ...Ch. 7 - You just posted a debit to ABC Co. in the accounts...Ch. 7 - You just posted a credit to Stars Inc. in the...Ch. 7 - You just posted a debit to Cash in the general...Ch. 7 - You just posted a credit to Accounts Receivable....Ch. 7 - You just posted a credit to Sales and a debit to...Ch. 7 - An enterprise resource planning (ERP) system...Ch. 7 - Which of the following is not a way to prevent...Ch. 7 - Big data is mined ________. A. to find business...Ch. 7 - Artificial intelligence refers to ________. A....Ch. 7 - Blockchain is a technology that ________. A. is in...Ch. 7 - Which of the following is not true about...Ch. 7 - Why does a student need to understand how to use a...Ch. 7 - Provide an example of how paper-based accounting...Ch. 7 - Why are scanners better than keyboards?Ch. 7 - Why are there so many different accounting...Ch. 7 - Which area of accounting needs a computerized...Ch. 7 - The American Institute of Certified Public...Ch. 7 - Which special journals also require an entry to a...Ch. 7 - What is a schedule of accounts receivable?Ch. 7 - How often do we post the cash column in the cash...Ch. 7 - The schedule of accounts payable should equal...Ch. 7 - Which amounts do we post daily and which do we...Ch. 7 - Why are special journals used?Ch. 7 - Name the four main special journals.Ch. 7 - A journal entry that requires a debit to Accounts...Ch. 7 - The purchase of equipment for cash would be...Ch. 7 - Can a sales journal be used to record sales on...Ch. 7 - When should entries from the sales journal be...Ch. 7 - We record a sale on account that involves sales...Ch. 7 - We record purchases of inventory for cash in which...Ch. 7 - Should the purchases journal have a column that is...Ch. 7 - Forensic means suitable for use in a court of law....Ch. 7 - For each of the following, indicate if the...Ch. 7 - All of the following information pertains to...Ch. 7 - Match the special journal you would use to record...Ch. 7 - For each of the transactions, state which special...Ch. 7 - Catherines Cookies has a beginning balance in the...Ch. 7 - Record the following transactions in the sales...Ch. 7 - Record the following transactions in the cash...Ch. 7 - Maddie Inc. has the following transactions for its...Ch. 7 - For each of the following, indicate if the...Ch. 7 - The following information pertains to Crossroads...Ch. 7 - Match the special journal you would use to record...Ch. 7 - For each of the following transactions, state...Ch. 7 - Catherines Cookies has a beginning balance in the...Ch. 7 - Record the following transactions in the purchases...Ch. 7 - Record the following transactions in the cash...Ch. 7 - Piedmont Inc. has the following transactions for...Ch. 7 - On June 30, Oscar Inc.s bookkeeper is preparing to...Ch. 7 - Evie Inc. has the following transactions during...Ch. 7 - Use the journals and ledgers that follow. Total...Ch. 7 - Brown Inc. records purchases in a purchases...Ch. 7 - On June 30, Isner Inc.s bookkeeper is preparing to...Ch. 7 - Use the journals and ledgers that follows. Total...Ch. 7 - Why must the Accounts Receivable account in the...Ch. 7 - Why would a company use a subsidiary ledger for...Ch. 7 - If a customer owed your company $100 on the first...
Additional Business Textbook Solutions
Find more solutions based on key concepts
How does the desire for personal control affect managers, and how can they balance it with organizational contr...
Principles of Management
Ravenna Candles recently purchased candleholders for resale in its shops. Which of the following costs would be...
Financial Accounting (12th Edition) (What's New in Accounting)
Define costvolumeprofit analysis.
Cost Accounting (15th Edition)
What does it indicate when a superintendent has to write a lot of stopgap purchase orders? How would you addres...
Construction Accounting And Financial Management (4th Edition)
E6-14 Using accounting vocabulary
Learning Objective 1, 2
Match the accounting terms with the corresponding d...
Horngren's Accounting (11th Edition)
Discussion Questions 1. What characteristics of the product or manufacturing process would lead a company to us...
Managerial Accounting (4th Edition)
Knowledge Booster
Similar questions
- Please answer multichoice question in photoarrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true? a. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data b. The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud c. The biggest cause of data breaches is organized by hacker groups. d. Losses from the theft of physical assets are much greater than those from the electronic theft of data e. In the absence of controls, it is not hard for a dishonest employee to steal data.arrow_forwardAlejandro reviewed the user access protocols for Ponder Products. Alejandro is concerned that the accounting system could be subject to malicious attacks on user accounts that are currently protected with a username and password. The system has the capability to send a message to a user's cell phone or email address. How could Alejandro use the messaging capabilities of the system to further protect it from attack? Enable two-factor authentication Enable fingerprint scanners Enable read-only access for all users Enable administrator access for all usersarrow_forward
- Select the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true about computer fraud perpetrators? a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community. b. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money. c. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold. d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.arrow_forwardWhat is a good response to? Small businesses are increasingly vulnerable to cyber-attacks, which can cause serious disruptions to daily routines and significant financial losses (Sutch, 2023). One of the most damaging types of attack is a denial-of-service attack, also known as a DoS attack. This type of attack is launched against a network or website in an attempt to overwhelm it with traffic, which can cause it to become unavailable for legitimate users. This can have a crippling effect on small businesses, as they often lack the resources to be able to prevent or mitigate such incidents effectively (Sutch, 2023). If a website or online service is unavailable due to a denial-of-service attack, customers may be unable to purchase products or services, resulting in lost revenue for the business (Sutch, 2023). For small businesses, this type of attack can cost them over $120,000. For enterprise corporations, DoS attacks have risen to over $2 million in costs. Not only do…arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.arrow_forward
- A message that is contrived to appear to be coming from a trusted or authorized source is calleda. a denial of service attack.b. digital signature forging.c. Internet protocol spoofing.d. URL masquerading.e. a SYN-ACK packet.arrow_forwardSTUDY QUESTIONS Why is human behavior considered one of the biggest potential threats to operating system integrity? What are the issues that need to be considered before implementing keystroke monitoring? Describe the three ways on how an audit trail can be used to support security objectives. Explain how poorly designed audit trail logs can actually be dysfunctional. Why would a systems programmer create a back door if he or she has access to the program in his or her day-to-day tasks? PROBLEMS Problem 1: Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) can be used to help detect this type of fraud? Problem 2: In 2002, Mr. Rollerball started Mighty Mouse,…arrow_forwardListed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a preventive control.a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. (The user subsequently codes this information ontoa magnetic coding device and places this strip on a piece of cardboard.)b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled.c. Because of occasional noise on a transmission line, data being transferred is lost or garbled.d. An intruder is temporarily delaying important strategic messages over the telecommunications lines.e. An intruder is altering electronic messages before the user receives them.arrow_forward
- Accounting 1. what measures QuickBooks software implements to prevent cybersecurity breaches.arrow_forwardWhich of the following statements regarding authentication in conducting e-business is incorrect? Multiple Choice It is a process that establishes the origin of information or determines the identity of a user, process, or device We need to use asymmetric-key encryption to authenticate the sender of a document or data set Only one key is used for encryption and decryption purposes in the authentication process. Successful authentication can prevent repudiation in electronic transactions.arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (g) Attackers broke into the company’s information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LBusiness Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:Cengage
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage