Questions from Accounting Information Systems


Q: Describe a situation in which information would be shared between two of

Describe a situation in which information would be shared between two of the “silos” in Figure 2.2. What data would be shared? Why would the data be shared?

See Answer

Q: Assume that a computerized credit-checking procedure operates as follows:

Assume that a computerized credit-checking procedure operates as follows: As orders are entered into the computer by a CSR, the computer calculates the total of the customer order and adds to this the...

See Answer

Q: The following is a list of six control plans from this chapter

The following is a list of six control plans from this chapter or from Chapter 9. These are followed by a list of six statements describing either a control goal or a system deficiency. Match the five...

See Answer

Q: There are many opportunities for fraud within the OE/S process

There are many opportunities for fraud within the OE/S process. One of these opportunities is the use of the system to fraudulently ship goods to an employee, posing as a customer. Describe the contro...

See Answer

Q: Match the items in the following two lists by matching the letter

Match the items in the following two lists by matching the letter (or letters) of the information quality (qualities) that best describes the information quality violation presented in the second colu...

See Answer

Q: Consider the inventory of a retailer. Describe how the qualities of

Consider the inventory of a retailer. Describe how the qualities of information presented in this chapter, can help enable the efficiency and effectiveness of the organization?

See Answer

Q: Provide an example of a business event. Explain how an enterprise

Provide an example of a business event. Explain how an enterprise system can provide the ability to share information and make the execution of the event efficient. Also, describe the various aspects...

See Answer

Q: Fraud is sometimes discovered when looking at one piece of information within

Fraud is sometimes discovered when looking at one piece of information within the context of overall data. For example, sales entered into the system after a store closes. Describe how using an Enterp...

See Answer

Q: The following is a list of six control plans from this chapter

The following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a...

See Answer

Q: Examine Figure 1.1. /

Examine Figure 1.1. Based on any work experience you have had, with which elements are you least comfortable? With which are you most comfortable? Discuss your answers.

See Answer