1)
To determine: Whether anyone can read the message.
Introduction:
1)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
Here,
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether anyone can read the message:
Not everyone can read the message. Only the person who has the private key of Person S can be able to open the message.
2)
To determine: Whether Person S can be sure that the message is from Person H.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
2)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether Person S can be sure that the message is from Person H:
Anyone with the public key of Person S can be able to send the message
3)
To determine: Whether digital signature message is secret.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether a digital signature message is secret:
Anyone with the public key of Person H can be able to open the digital signature message.
4)
To determine: Whether someone other than Person H can send the digital signature message.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether someone other than Person H can send the digital signature message:
A person with the private key of Person H can be able to send the digital signature message.
5)
To determine: How Person S know that the message has not been corrupted in transit.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine how Person S know that the message has not been corrupted in transit:
If the hash total of digital signature equals the hash total that Person S calculated from the message then the message has not been corrupted in transit.
6)
To determine: The sub-part that is related to authenticity.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
6)

Explanation of Solution
Determine the subpart that is related to authenticity:
Subpart (2) and Subpart (4) are about authenticity.
7)
To determine: The sub-part that is related to integrity.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
7)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine the subpart that is related to integrity:
Subpart (5) is about integrity.
8)
To determine: The sub-part that is related to confidentiality.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
8)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine the subpart that is related to confidentiality:
Subpart (1) and Subpart (3) are about the confidentially.
Want to see more full solutions like this?
Chapter 9 Solutions
Accounting Information Systems
- What does a company’s price-to-earnings (P/E) ratio indicate? A) The return on investment for shareholders B) The company’s profitability relative to its stock price C) The company’s debt relative to its equity D) The company’s dividend payout ratioarrow_forwardDon't use chatgpt! What is the main purpose of diversification in an investment portfolio? A) To maximize returns B) To reduce risk C) To increase market share D) To monitor stock performancearrow_forwardNo chatgpt! Which type of financial instrument represents a loan made by an investor to a borrower? A) Stock B) Bond C) Derivative D) Optionarrow_forward
- Which of the following is a primary market transaction in finance? A) Buying shares on the stock exchange B) Issuance of new shares by a company C) Trading of bonds D) Purchase of mutual fund unitsarrow_forwardI need help in this question! What is the main purpose of diversification in an investment portfolio? A) To maximize returns B) To reduce risk C) To increase market share D) To monitor stock performancearrow_forwardWhich type of financial instrument represents a loan made by an investor to a borrower? A) Stock B) Bond C) Derivative D) Optionarrow_forward
- No use ai! Which of the following is NOT a type of derivative in finance?a) Futuresb) Optionsc) Bondsd) Swapsarrow_forwardWhat is the main purpose of diversification in an investment portfolio? A) To maximize returns B) To reduce risk C) To increase market share D) To monitor stock performancearrow_forwardDon't use ai tool. Danyal Systems has variable costs equal to 40% of sales. The company is considering an online marketing campaign costing $52,000. If sales are expected to increase by $130,000, what is the expected change in net income? a. $26,000 b. $78,000 c. $48,000 d. $26,800arrow_forward
- Danyal Systems has variable costs equal to 40% of sales. The company is considering an online marketing campaign costing $52,000. If sales are expected to increase by $130,000, what is the expected change in net income? a. $26,000 b. $78,000 c. $48,000 d. $26,800 no aiarrow_forwardWhat is the term for the difference between a bond's face value and its market price in finance?a) Yieldb) Premium or discountc) Principald) Accrued interestarrow_forwardWhat is the term for the difference between a bond's face value and its market price in finance?a) Yieldb) Premium or discountc) Principald) Accrued interest need help!arrow_forward
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning


