Questions from Accounting Information Systems


Q: MonsterMed Inc. (MMI) is an online pharmaceutical firm.

MonsterMed Inc. (MMI) is an online pharmaceutical firm. MMI has a small systems staff that designs and writes MMI’s customized software. The data center is installed in the basement of its two-story h...

See Answer

Q: When U.S. Leasing (USL) computers began acting

When U.S. Leasing (USL) computers began acting sluggishly, computer operators were relieved when a software troubleshooter from IBM called. When he offered to correct the problem they were having, he...

See Answer

Q: Explain what an event is. Using the Internet as a resource

Explain what an event is. Using the Internet as a resource, create a list of some of the many internal and external factors that COSO indicated could influence events and affect a company’s ability t...

See Answer

Q: Environmental, institutional, or individual pressures and opportune situations, which

Environmental, institutional, or individual pressures and opportune situations, which are present to some degree in all companies, motivate individuals and companies to engage in fraudulent financial...

See Answer

Q: a. Why should USAA collect data on which auto parts are

a. Why should USAA collect data on which auto parts are fixed most frequently? What could it do with this data? b. Even though USAA offered to waive the deductible, the repair shops still managed to c...

See Answer

Q: 1. Figure 5-4 shows the employees and external parties

1. Figure 5-4 shows the employees and external parties that deal with Heirloom. Explain how Heirloom could defraud the bank and how each internal and external party except the bank could defraud Heirl...

See Answer

Q: What is the relationship between COSO, COBIT 5, and the

What is the relationship between COSO, COBIT 5, and the AICPA’s Trust Services frameworks?

See Answer

Q: With respect to the data processing cycle, explain the phrase “

With respect to the data processing cycle, explain the phrase “garbage in, garbage out.” How can you prevent this from happening?

See Answer

Q: Explain why an organization would want to use all of the following

Explain why an organization would want to use all of the following information security controls: firewalls, intrusion prevention systems, intrusion detection systems, and a CIRT.

See Answer

Q: What are the advantages and disadvantages of having the person responsible for

What are the advantages and disadvantages of having the person responsible for information security report directly to the chief information officer (CIO), who has overall responsibility for all aspec...

See Answer