Questions from Accounting Information Systems


Q: Contracting for a hot site is too cost-prohibitive except in

Contracting for a hot site is too cost-prohibitive except in the rarest of circumstances. Therefore, the vast majority of companies should think in terms of providing for a cold site at most.” Discuss...

See Answer

Q: Preventing the unauthorized disclosure and loss of data has become almost impossible

Preventing the unauthorized disclosure and loss of data has become almost impossible. Employees and others can use iPods, flash drives, cameras, and PDAs, such as iPhones, to download data and remove...

See Answer

Q: Discuss why the control matrix is custom-tailored for each business

Discuss why the control matrix is custom-tailored for each business process.

See Answer

Q: Technology Summary 9.1 seems to indicate that the business process

Technology Summary 9.1 seems to indicate that the business process and application control plans in this chapter cannot be relied on.” Do you agree? Discuss fully.

See Answer

Q: If a business process is implemented with OLRT processing, we do

If a business process is implemented with OLRT processing, we do not need to worry about update completeness and update accuracy.” Do you agree? Discuss fully.

See Answer

Q: Examine Figure 1.9. / Discuss

Examine Figure 1.9. Discuss how vertical information flows may be important to the executive director of an organization that is a public charity.

See Answer

Q: Explain why input controls are so important. Discuss fully.

Explain why input controls are so important. Discuss fully.

See Answer

Q: Describe the similarities and differences between limit checks and reasonable checks

Describe the similarities and differences between limit checks and reasonable checks. Give examples where each may be appropriate.

See Answer

Q: In evaluating business process controls and application controls, some auditors differentiate

In evaluating business process controls and application controls, some auditors differentiate between the point in the system at which the control is “established” and the later point at which that co...

See Answer

Q: The mere fact that event data appear on a prenumbered document is

The mere fact that event data appear on a prenumbered document is no proof of the validity of the event. Someone intent on defrauding a system by introducing a fictitious event probably would be cleve...

See Answer