Questions from Accounting Information Systems


Q: What are electronic payments? How are they different from credit card

What are electronic payments? How are they different from credit card payments?

See Answer

Q: This chapter described several career opportunities available to students who combine a

This chapter described several career opportunities available to students who combine a study of accounting with course work in information systems, and/or computer science. Can you think of other job...

See Answer

Q: This chapter stressed the importance of IT for understanding how AISs operate

This chapter stressed the importance of IT for understanding how AISs operate. But is this the only skill valued by employers? How important do you think “analytical thinking skills” or writing skills...

See Answer

Q: In this chapter we talked about predictive analytics and big data.

In this chapter we talked about predictive analytics and big data. Using the Internet and your research skills, identify the skills and abilities accounting majors might need (i.e., what type of cours...

See Answer

Q: Implementation of a new AIS went smoothly, for the most part

Implementation of a new AIS went smoothly, for the most part. It is 15 years later, and now HMC is interested in mapping a variety of their business processes to determine whether improvements can be...

See Answer

Q: What is spamming? How is spam related to accounting information systems

What is spamming? How is spam related to accounting information systems? Should all spamming be illegal? Why or why not?

See Answer

Q: What are Internet firewalls and proxy servers? How are they created

What are Internet firewalls and proxy servers? How are they created? How do businesses use them for Internet security?

See Answer

Q: What is data encryption? What techniques are used for data encryption

What is data encryption? What techniques are used for data encryption?

See Answer

Q: Describe and contrast the three types of authentication. Can you think

Describe and contrast the three types of authentication. Can you think of a business situation where someone would need to use a combination of all three levels to gain access to information?

See Answer

Q: What are digital signatures? Why do businesses use them? How

What are digital signatures? Why do businesses use them? How can businesses use a digital certificate for Internet security?

See Answer