Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 8, Problem 6MCQ
To determine
Identify which is not data analytics security issue.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully captures
A message that is contrived to appear to be coming from a trusted or authorized source is calleda. a denial of service attack.b. digital signature forging.c. Internet protocol spoofing.d. URL masquerading.e. a SYN-ACK packet.
Which of the following statements regarding authentication in conducting e-business is incorrect?
Multiple Choice
It is a process that establishes the origin of information or determines the identity of a user, process, or device
We need to use asymmetric-key encryption to authenticate the sender of a document or data set
Only one key is used for encryption and decryption purposes in the authentication process.
Successful authentication can prevent repudiation in electronic transactions.
Chapter 8 Solutions
Accounting Information Systems
Ch. 8 - What information is contained in a journal...Ch. 8 - How are journal vouchers used as a control...Ch. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - What is the purpose of a responsibility center...Ch. 8 - Prob. 6RQCh. 8 - Name, in order, the 11 steps of the financial...Ch. 8 - Prob. 8RQCh. 8 - When are adjusting entries made, and what is their...Ch. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - Prob. 14RQCh. 8 - What is an XBRL taxonomy?Ch. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Explain how the formalization of tasks promotes...Ch. 8 - Prob. 19RQCh. 8 - Distinguish between narrow and wide span of...Ch. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Contrast the four decision typesstrategic...Ch. 8 - Prob. 24RQCh. 8 - What management levels are more likely to deal...Ch. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - What are the two phases of responsibility...Ch. 8 - What are the three most common forms of...Ch. 8 - What is goal congruence?Ch. 8 - Prob. 32RQCh. 8 - Prob. 33RQCh. 8 - Prob. 34RQCh. 8 - Explain some reporting techniques that may cause...Ch. 8 - Prob. 36RQCh. 8 - What types of variances are found on cost center...Ch. 8 - Distinguish between a profit center and an...Ch. 8 - Prob. 39RQCh. 8 - Prob. 40RQCh. 8 - Prob. 41RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - Explain how erroneous journal vouchers may lead to...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8DQCh. 8 - If management control and strategic planning...Ch. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - Prob. 12DQCh. 8 - Prob. 13DQCh. 8 - Prob. 14DQCh. 8 - Prob. 15DQCh. 8 - Why are cost centers considered to be more...Ch. 8 - Explain how a production quota used to evaluate a...Ch. 8 - Prob. 18DQCh. 8 - Prob. 19DQCh. 8 - Prob. 20DQCh. 8 - Prob. 21DQCh. 8 - Prob. 22DQCh. 8 - Which of the following statements best describes a...Ch. 8 - Prob. 2MCQCh. 8 - Which of the following is NOT an output report of...Ch. 8 - Prob. 4MCQCh. 8 - Prob. 5MCQCh. 8 - Prob. 6MCQCh. 8 - Hercules Inc. uses a performance reporting system...Ch. 8 - Prob. 8MCQCh. 8 - Which of the following statements is true? a....Ch. 8 - Which of the following budgeting processes is...Ch. 8 - Prob. 11MCQCh. 8 - At what level of management is the long-range...Ch. 8 - Which is the fundamental purpose of responsibility...Ch. 8 - Prob. 14MCQCh. 8 - An investment center is described best by which of...Ch. 8 - Prob. 1PCh. 8 - FINANCIAL REPORTING PROCESS The following contains...Ch. 8 - Prob. 3PCh. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 6PCh. 8 - Prob. 7PCh. 8 - ORGANIZATIONAL CHART Prepare an organizational...Ch. 8 - DECISION LEVEL Classify the following decisions as...Ch. 8 - Prob. 10PCh. 8 - ORGANIZATION STRUCTURE AND SPAN OF CONTROL Refer...Ch. 8 - ORGANIZATION STRUCTURE AND SPAN OF CONTROL Refer...Ch. 8 - CMA-ADAPTED ORGANIZATIONAL STRUCTURE While...Ch. 8 - CMA-ADAPTED PERFORMANCE MEASURES The Star Paper...Ch. 8 - Prob. 15PCh. 8 - MANAGEMENT BY EXCEPTION A variety of quantitative...Ch. 8 - Prob. 17P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardControls over data management systems fall into two categories: access controls and backup controls. In the shared database environment, access control risks include corruption, theft, misuse, and destruction of data. These threats originate from both unauthorized intruders and authorized users who exceed their access privileges. Which of the following options is not part of controls over data management systems? a. Employees that sharing the same computers need restriction for access to specific directories, programs, and data files by using multilevel password control.b. To recover data from disaster, organizations must implement policies and procedures and routinely provide backup copies of critical files.c. Database Administrator works closely with users and systems designers has primary responsibility for user view design and works closely with users and systems designers.d. Access to confidential data must be properly managed. Inference controls prevent users from inferring,…arrow_forwardWhich of the following statements is correct? a. TCP/IP is the basic protocol that permits communication between Internet sites. b. TCP/IP controls Web browsers that access the Web. c. TCP/IP is the document format used to produce Web pages. d. TCP/IP is used to transfer text files, programs, spreadsheets, and databases across the Internet. e. TCP/IP is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.arrow_forward
- What is meant by data mining, and why must technical analysts be careful not to engage in it?arrow_forwardCommunication via the internet is fraught with major security problems. When it comes to Internet communications, which of these aspects poses the biggest security risk?arrow_forwardThe four fundamental characteristics of blockchain ( decentralization, immutability,security, and transparency)create a system with: Distrust inthe quality of its data Trust, for asystem without the need forcentralized authority The needfor a lot of oversight Two manyusers to make it effectivearrow_forward
- STUDY QUESTIONS Why is human behavior considered one of the biggest potential threats to operating system integrity? What are the issues that need to be considered before implementing keystroke monitoring? Describe the three ways on how an audit trail can be used to support security objectives. Explain how poorly designed audit trail logs can actually be dysfunctional. Why would a systems programmer create a back door if he or she has access to the program in his or her day-to-day tasks? PROBLEMS Problem 1: Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) can be used to help detect this type of fraud? Problem 2: In 2002, Mr. Rollerball started Mighty Mouse,…arrow_forwardWhich of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.arrow_forwardWhich of the following exists as an inherent risk even in the best designed systems a. Authorization b. Collusion c. Independent checks d. Detective controlarrow_forward
- What are some enterprise system failures?arrow_forward5 Which of the following creates an audit trail that protects both consumers and businesses from fraud, serving as a solution to digital fraud and privacy breaches in various industries? Oa. Predictive analytics Ob. Blockchain OC. Cookies d. Big data Oe. Technology disruptionarrow_forwardWhich statement is NOT correct?a. Legacy systems may process financially significant transactions.b. Some legacy systems use database technology.c. Mainframes are exclusive to legacy systems, while modern systems use only the client-server model.d. All the above are true.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L