Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 8, Problem 6MCQ
To determine
Identify which is not data analytics security issue.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
A message that is contrived to appear to be coming from a trusted or authorized source is calleda. a denial of service attack.b. digital signature forging.c. Internet protocol spoofing.d. URL masquerading.e. a SYN-ACK packet.
Which of the following statements regarding authentication in conducting e-business is incorrect?
Multiple Choice
It is a process that establishes the origin of information or determines the identity of a user, process, or device
We need to use asymmetric-key encryption to authenticate the sender of a document or data set
Only one key is used for encryption and decryption purposes in the authentication process.
Successful authentication can prevent repudiation in electronic transactions.
Computers remove a fundamental separation of functions between authorizing and processing transactions, and there is also a risk of the integrity of accounting records. What do you think, how can management control these risks?
Chapter 8 Solutions
Accounting Information Systems
Ch. 8 - What information is contained in a journal...Ch. 8 - How are journal vouchers used as a control...Ch. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - What is the purpose of a responsibility center...Ch. 8 - Prob. 6RQCh. 8 - Name, in order, the 11 steps of the financial...Ch. 8 - Prob. 8RQCh. 8 - When are adjusting entries made, and what is their...Ch. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - Prob. 14RQCh. 8 - What is an XBRL taxonomy?Ch. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Explain how the formalization of tasks promotes...Ch. 8 - Prob. 19RQCh. 8 - Distinguish between narrow and wide span of...Ch. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Contrast the four decision typesstrategic...Ch. 8 - Prob. 24RQCh. 8 - What management levels are more likely to deal...Ch. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - What are the two phases of responsibility...Ch. 8 - What are the three most common forms of...Ch. 8 - What is goal congruence?Ch. 8 - Prob. 32RQCh. 8 - Prob. 33RQCh. 8 - Prob. 34RQCh. 8 - Explain some reporting techniques that may cause...Ch. 8 - Prob. 36RQCh. 8 - What types of variances are found on cost center...Ch. 8 - Distinguish between a profit center and an...Ch. 8 - Prob. 39RQCh. 8 - Prob. 40RQCh. 8 - Prob. 41RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - Explain how erroneous journal vouchers may lead to...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Prob. 8DQCh. 8 - If management control and strategic planning...Ch. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - Prob. 12DQCh. 8 - Prob. 13DQCh. 8 - Prob. 14DQCh. 8 - Prob. 15DQCh. 8 - Why are cost centers considered to be more...Ch. 8 - Explain how a production quota used to evaluate a...Ch. 8 - Prob. 18DQCh. 8 - Prob. 19DQCh. 8 - Prob. 20DQCh. 8 - Prob. 21DQCh. 8 - Prob. 22DQCh. 8 - Which of the following statements best describes a...Ch. 8 - Prob. 2MCQCh. 8 - Which of the following is NOT an output report of...Ch. 8 - Prob. 4MCQCh. 8 - Prob. 5MCQCh. 8 - Prob. 6MCQCh. 8 - Hercules Inc. uses a performance reporting system...Ch. 8 - Prob. 8MCQCh. 8 - Which of the following statements is true? a....Ch. 8 - Which of the following budgeting processes is...Ch. 8 - Prob. 11MCQCh. 8 - At what level of management is the long-range...Ch. 8 - Which is the fundamental purpose of responsibility...Ch. 8 - Prob. 14MCQCh. 8 - An investment center is described best by which of...Ch. 8 - Prob. 1PCh. 8 - FINANCIAL REPORTING PROCESS The following contains...Ch. 8 - Prob. 3PCh. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 6PCh. 8 - Prob. 7PCh. 8 - ORGANIZATIONAL CHART Prepare an organizational...Ch. 8 - DECISION LEVEL Classify the following decisions as...Ch. 8 - Prob. 10PCh. 8 - ORGANIZATION STRUCTURE AND SPAN OF CONTROL Refer...Ch. 8 - ORGANIZATION STRUCTURE AND SPAN OF CONTROL Refer...Ch. 8 - CMA-ADAPTED ORGANIZATIONAL STRUCTURE While...Ch. 8 - CMA-ADAPTED PERFORMANCE MEASURES The Star Paper...Ch. 8 - Prob. 15PCh. 8 - MANAGEMENT BY EXCEPTION A variety of quantitative...Ch. 8 - Prob. 17P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardWhich of the following statements is correct? a. TCP/IP is the basic protocol that permits communication between Internet sites. b. TCP/IP controls Web browsers that access the Web. c. TCP/IP is the document format used to produce Web pages. d. TCP/IP is used to transfer text files, programs, spreadsheets, and databases across the Internet. e. TCP/IP is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.arrow_forwardWhat is meant by data mining, and why must technical analysts be careful not to engage in it?arrow_forward
- Communication via the internet is fraught with major security problems. When it comes to Internet communications, which of these aspects poses the biggest security risk?arrow_forwardSTUDY QUESTIONS Why is human behavior considered one of the biggest potential threats to operating system integrity? What are the issues that need to be considered before implementing keystroke monitoring? Describe the three ways on how an audit trail can be used to support security objectives. Explain how poorly designed audit trail logs can actually be dysfunctional. Why would a systems programmer create a back door if he or she has access to the program in his or her day-to-day tasks? PROBLEMS Problem 1: Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) can be used to help detect this type of fraud? Problem 2: In 2002, Mr. Rollerball started Mighty Mouse,…arrow_forwardWhich of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.arrow_forward
- What are some enterprise system failures?arrow_forward1. Automated controls in a computerized system are always more reliable than manual controls. true or false 2. The risk of fraud in a computerized system is lower than in a manual system because of the use of automated controls. 3. What is a potential risk associated with computerized systems? a. Inefficient use of resources b. Unauthorized access to data c. Excessive use of paper-based documents d. Lack of user training 4. The use of computer systems in financial reporting increases the risk of material misstatements. true or false 5. Which of the following is a potential limitation of computer-based systems? a. Increased risk of data loss b. Reduced need for user training c. Reduced need for internal controls d. Increased efficiency and accuracyarrow_forward5 Which of the following creates an audit trail that protects both consumers and businesses from fraud, serving as a solution to digital fraud and privacy breaches in various industries? Oa. Predictive analytics Ob. Blockchain OC. Cookies d. Big data Oe. Technology disruptionarrow_forward
- Which statement is NOT correct?a. Legacy systems may process financially significant transactions.b. Some legacy systems use database technology.c. Mainframes are exclusive to legacy systems, while modern systems use only the client-server model.d. All the above are true.arrow_forwardWhat are the computer ethical issues regarding privacy?arrow_forwardRefer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L