Questions from Accounting Information Systems


Q: Why is depreciation not represented as an event in the REA data

Why is depreciation not represented as an event in the REA data model?

See Answer

Q: How would you model the acquisition of a digital asset, such

How would you model the acquisition of a digital asset, such as the purchase of software online (the software is downloaded and then installed on the purchaser’s computer)?

See Answer

Q: How are the similarities and differences between the purchase of services,

How are the similarities and differences between the purchase of services, such as telephone service, and the purchase of raw materials reflected in an REA data model?

See Answer

Q: How would you modify the expenditure cycle REA diagram in Figure 19

How would you modify the expenditure cycle REA diagram in Figure 19-4 to include the return of defective products to suppliers for credit?

See Answer

Q: The approach to long-range AIS planning described in

The approach to long-range AIS planning described in this chapter is important for large organizations with extensive investments in computer facilities. Should small organizations with far fewer in...

See Answer

Q: You are a consultant advising a firm on the design and implementation

You are a consultant advising a firm on the design and implementation of a new system. Management has decided to let several employees go after the system is implemented. Some have many years of compa...

See Answer

Q: While reviewing a list of benefits from a computer vendor‟s

While reviewing a list of benefits from a computer vendor‟s proposal, you note an item that reads, “Improvements in management decision making—$50,000 per year.” How would you interpret this item? Wha...

See Answer

Q: For each of the following, discuss which data-gathering method

For each of the following, discuss which data-gathering method(s) are most appropriate and why: a. Examining the adequacy of internal controls in the purchase requisition procedure b. Identifying th...

See Answer

Q: The following problem situations occurred in a manufacturing firm. What questions

The following problem situations occurred in a manufacturing firm. What questions should you ask to understand the problem? Customer complaints about product quality have increased. Accounting sees a...

See Answer

Q: The chapter briefly discussed the following three common attacks against applications

The chapter briefly discussed the following three common attacks against applications a. Buffer overflows b. SQL injection c. Cross-site scripting Required Research each of these three attacks an...

See Answer