Questions from Accounting Information Systems


Q: Why is control over unauthorized access so important in a database environment

Why is control over unauthorized access so important in a database environment?

See Answer

Q: What are some internal control measures that could prevent a hacker from

What are some internal control measures that could prevent a hacker from altering data in your company’s database?

See Answer

Q: How might the sales and cash collection process at Boeing Co.

How might the sales and cash collection process at Boeing Co. (maker of commercial passenger jets) differ from the sales and cash collection processes at McDonald’s?

See Answer

Q: Describe automated matching in the purchasing process and explain how this IT

Describe automated matching in the purchasing process and explain how this IT enablement has improved efficiency in companies.

See Answer

Q: How do e-commerce and e-business differ?

How do e-commerce and e-business differ?

See Answer

Q: Describe the relationship between national backbone providers, regional ISPs, and

Describe the relationship between national backbone providers, regional ISPs, and local ISPs.

See Answer

Q: What is the importance of a standard formatting language for Web pages

What is the importance of a standard formatting language for Web pages and a standard addressing system?

See Answer

Q: Assume that you are the manager of the project team that is

Assume that you are the manager of the project team that is engaged in a systems analysis. The company is a large, national retailer with several stores and warehouses located throughout the United St...

See Answer

Q: CEEMCO Corp. is a small, privately owned manufacturing company in

CEEMCO Corp. is a small, privately owned manufacturing company in Cincinnati. CEEMCO manufactures custom products as well as store display products to sell to other companies such as retailers. Using...

See Answer

Q: There are several approaches to applying an SDLC methodology to IT system

There are several approaches to applying an SDLC methodology to IT system change. Using an Internet search engine, search for these terms: SDLC, waterfall, JAD (joint application development), RAD (ra...

See Answer