1)
To determine: Whether anyone can read the message.
Introduction:
1)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
Here,
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether anyone can read the message:
Not everyone can read the message. Only the person who has the private key of Person S can be able to open the message.
2)
To determine: Whether Person S can be sure that the message is from Person H.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
2)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether Person S can be sure that the message is from Person H:
Anyone with the public key of Person S can be able to send the message
3)
To determine: Whether digital signature message is secret.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether a digital signature message is secret:
Anyone with the public key of Person H can be able to open the digital signature message.
4)
To determine: Whether someone other than Person H can send the digital signature message.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether someone other than Person H can send the digital signature message:
A person with the private key of Person H can be able to send the digital signature message.
5)
To determine: How Person S know that the message has not been corrupted in transit.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine how Person S know that the message has not been corrupted in transit:
If the hash total of digital signature equals the hash total that Person S calculated from the message then the message has not been corrupted in transit.
6)
To determine: The sub-part that is related to authenticity.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
6)

Explanation of Solution
Determine the subpart that is related to authenticity:
Subpart (2) and Subpart (4) are about authenticity.
7)
To determine: The sub-part that is related to integrity.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
7)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine the subpart that is related to integrity:
Subpart (5) is about integrity.
8)
To determine: The sub-part that is related to confidentiality.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
8)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine the subpart that is related to confidentiality:
Subpart (1) and Subpart (3) are about the confidentially.
Want to see more full solutions like this?
Chapter 9 Solutions
ACCT INFO SYSTEMS (ACCESS CODE)
- if image is blurr or data is not clear in image please comment i will write data or upload new image. Don't use chatgpt. confirm i will give unhelpful if answer with using incorrect data .arrow_forwardBright wood Seating sells reclining chairs for $55.00 per unit. The variable cost is 322 per unit. Each reclining chair requires 5 direct labor hours and 3 machine hours to produce. atribution margin pegmachine home* Wrightwood Manufacturing has a break-even point of 1,500 units. The sales price per unit is $18, and the variable cost per u 13. If the company sells 3,500 units, what will its net income be? Creatwood Industries provides the following budget data for its Processing Department for the year 2022: ⚫ Manufacturing Overhead Costs=$250,400 . Direct Labor Costs $1,234,500 Determine the manufacturing overhead application rate underthe base of Direct Labor Costs. Modesto Accessories manufactures two types of wallets leather and canvas. The company allocates manufacturing overhead using a single plant wide rate with direct labor cost as the allocation base. $48 Estimated Overhead Costs = 30,600 Direct Labor Cost per Leather Wallet Direct Labor Cost per Canvas Wallet = $52 Number of…arrow_forwardPlease don't use AI . Chatgpt giving wrong answer . confirm i will give unhelpharrow_forward
- Anti-Pandemic Pharma Co. Ltd. reports the following information inits income statement:Sales = $5,250,000;Costs = $2, 173,000;Other expenses = $187,400;Depreciation expense = $79,000;Interest expense= $53,555;Taxes = $76,000;Dividends = $69,000.$136,700 worth of new shares were also issued during the year andlong-term debt worth $65,300 was redeemed.a) Compute the cash flow from assetsb) Compute the net change in working capital Show all calculations. Please no spreadsheet so that I can clearly understandarrow_forwardAnswer this question Using the Google drive liink below it hhas the case study In the scenario, Sharp’s employer has been putting more emphasis on controlling costsfor the various businesses. With the slowing of overall spending in the construction sector,Travolta had ordered managers to closely monitor expenses. He had sold several companiesand has given vice presidents greater responsibility for statements of financial positions. Whatpositive and negative consequences might this pose to the company in future fraud prevention?Outline at least three of each type. Please use sources and insert intext citiations Apa 7 format in the answer and provide the links and references below. https://docs.google.com/document/d/1MpthrFl3eAnMKR-EprYRP9sMo8Ll0WtbhxhpGtLbdcw/edit?usp=sharingarrow_forwardfile:///C:/Users/rafan/Downloads/Assignment%201%20Paving%20Company%20Case%20S2%202024%20to%202025.pdf Using the link for the fraud case answer only this question below. b) As discussed in units 1 to 4, all frauds involve key elements. Identify and describe usingexamples, the elements of Sharp’s fraud.arrow_forward
- Option should be match experts are giving incorrect answer they are using AI /Chatgpt that is generating wrong answer. i will give unhelpful if answer will not match in option. dont use AI alsoarrow_forwardOption should be match. please don't use ai if option will not match means answer is incorrect . Ai giving incorrect answerarrow_forwardOption should be match. please don't use ai if option will not match means answer is incorrect . Ai giving incorrect answerarrow_forward
- all frauds involve key elements. Identify and describe usingexamples the elements of fraudarrow_forwardSolve for maturity value, discount period, bank discount, and proceeds. Assume a bank discount rate of 9%. Use the ordinary interest method. (Use Days in a year table.) Note: Do not round intermediate calculations. Round your final answers to the nearest cent. face value(principal) $50000rate interest:11%length of note: 95 days maturity value: ?date of note: june 10date note discounted: July 18discount period:?bank discount:?proceeds:?arrow_forwardWhat are the different types of audits and different types of auditors? WHat is an example of each type of audit? What is the significance of each from the perspective of different stakeholders?arrow_forward
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning


