3.99 See Answer

Question: Comment on each of the following scenarios


Comment on each of the following scenarios in light of chapter materials. Hint: Use the references at the end of this chapter to help you.
a. A legitimate student calls the computer help desk from her cell phone because she has
b. An employee at a building supply company is caught downloading pornographic materials to his office computer. He is reprimanded by his boss, asked to remove the offending materials, and told never to do it again. The employee refuses on the grounds that (1) there is no company policy forbidding these activities, (2) he performed all his downloads during his lunch breaks, (3) his work reviews indicate that he is performing “above average,” and (4) the discoveries themselves were performed without a search warrant and therefore violate his right to privacy.
c. The local community college installed a new, campus-wide local area network that requires all staff members to enter a login name and password. Users can choose their own passwords. Some pick the names of their pets or spouses as passwords, while others tape their passwords to their computer monitors to help remember them.
d. An employee in a hospital was hardly ever at his desk, but almost always reachable through his cell phone. When the department replaced his old computer with a new one, his boss scanned the old hard drive and made the startling discovery that this employee had a full-time second job as a beer distributer.
e. A routine audit of the computer payroll records of the local manufacturing plant reveals that the address of over 20 employees in different departments is the same empty lot in the city.
f. An analysis of online bidding on eBay reveals that one seller has bid on several of his own items in an effort to increase the final sales price of his items.
g. A retailer sues a Web hosting company when it discovers that the employees of the Web company have been visiting sites on which the retailer advertises. The retailer pays a fee of $1 every time someone clicks on these advertising links.


> The Espy Company recently had an outside consulting firm perform an audit of its information systems department. One of the consultants identified some business risks and their probability of occurrence. Estimates of the potential losses and estimated cont

> Use the Customers table in the BSN database that accompanies this book and the Report Wiz-ard to create the report in Figure 16-14. Note that you will have to reformat and perhaps reposition several labels, and add both labels and a graphic in the header

> Using the Customers table in the BSN database that accompanies this book, and following the directions in this chapter, create the report in Figure 16-8. Note that you will have to reformat and perhaps reposition several labels, and add both labels and a

> If you have not done so already, use the Customers table in the BSN database that accompanies this book and the directions in this chapter to create the form in Figure 16-1. Make sure that you reformat the default positions of the various textboxes as sh

> Using the Customers table in the BSN database that accompanies this book, and following the directions in this chapter, create the form in Figure 16-1. Make sure that you reformat the default positions of the various textboxes as shown in the ï¬

> Provide a short explanation of the difference between each of the following sets of terms: a. bound control versus unbound control b. design mode versus run mode c. ◀ symbol versus ▶ symbol on a form’s navigation bar d. form versus subform e. normal data

> A database report has seven major sections. a. Identify each one and provide a short explanation of each section. b. Identify a report that a database application might generate, and indicate what data might be found in each section of the report for you

> A form’s navigation bar has five symbols on it. Identify each one and indicate its use.

> Barra Concrete specializes in creating driveways and curbs for the residential market. Its accounting software uses exclusive OR (XOR) operations to convert the individual bits of a plaintext message into ciphertext. The rules are as follows: In other

> Consider the employee record in Figure 15-4, which illustrates the data structure of an employee table. Given the importance of this information, it is likely that the database developer would install validation tests to ensure its accuracy. Some possibl

> The information in Figure 15-18 is for the employees of the Marcia Felix Corporation. a. Use a DBMS software package to create a database for this figure. b. What is the average pay rate for these employees? c. What is the average pay rate

> Use the Web to find current examples of data warehousing software. Why do companies create data warehouses, and what are some accounting uses of such warehouses?

> The Query Corporation employs the individuals listed in Figure 15-17. Use Access or another DBMS as required by your instructor to create a database of this information and then perform the following queries. a. List all employees in Department 5. b. Lis

> Create a Salesperson table and a Customer Order table. The salesperson table should include the salesperson number, first name, last name, commission rate, and date of last sale. The customer order table includes the order number, customer

> Bonadio Electrical Supplies distributes electrical components to the construction industry. The company began as a local supplier 15 years ago and has grown rapidly to become a major competitor in the north central United States. As the business grew and

> The quotation at the beginning of this chapter suggested that very few checks are made to check the database is not doing things it should not be doing.” What are some things that accounting database should not do? Compile a list of items, and for each o

> Give some examples of attributes you would include in a Customer table. Would you use one data field or two for the customer name? Why?

> Draw an entity–relationship diagram for the following: An accounting firm holds recruiting events for college students. At these events, recruiters are seeking students with particular skills.

> Draw an entity–relationship diagram for the following: Sales of inventory are made to customers by salespeople. After the sale, cash is received by cashiers.

> The Anderson Manufacturing Company (AMC) is located in Las Vegas, Nevada, and manufactures specialty parts for high-end sports cars. The company currently has an accounting information system, but over time, has found that it would like its system to do

> Describe the meaning of each of the entity– relationship diagrams shown in Figure 14-17. Figure 14-17: Тeach Course a. Course + H Teacher b. H Patient Surgery + Doctor Nurse Sale Customer С. Item

> What attributes (i.e., table columns) would you be likely to include in a Cash table and in a Cash Receipts table?

> An internal auditor should have a sound understanding of basic data processing concepts such as data organization and storage in order to adequately evaluate systems and make use of retrieval software. a. Define the following terms as used in a data proce

> Do you understand Gantt charts? Use Figure 13-11 and test your understanding by answering the following questions. a. When is the activity “convert data files” scheduled to begin and end? b. When is the

> Do you understand PERT charts? Refer back to Figure 13-10 and answer the following questions: a. Which activity or activities must be completed before activity C can begin? b. Which activity or activities must be completed before activity G can begin? c.

> Identify a particular information system that is not working very well and perform a preliminary investigation of it. In your work, be sure to talk to (1) at least one external “customer” who is affected by the system, (2) one employee who uses the syste

> Are software developers cheap or expensive? That’s important because developing custom software for your accounting system depends in part on how much such labor will cost. To find out, access government statistics from the Bureau of Labor Statistic’s Occ

> Cook Consultants is currently in the process of completing the systems implementation activities for converting Samuel Company’s old system to a new one. Because of unexpected delays in performing specific implementation activities, Jerry Hazen, the proje

> Guess Right Consultants is a New Zealand business that helps clients with financial planning—especially preparing wills, creating trusts, and allocating funds among competing investment categories. It’s not an unusual business, but the company has not bee

> Jay Beck works for the AAZ Consulting Firm. His friend, Hank Henley, is the general manager and majority stockholder of the Pacific Worldwinds, a professional football team. Hank asked Jay to design an online, real time computer system for “the efficient o

> Even if you are now only a student with limited or no work experience, it is not too early to begin building a professional identity and your own company—Me, Inc. This is an identity that you’ll want to post and carefully cultivate on some of the popular

> Stevenson Apparel is a manufacturer of fashion apparel that has just opened its first large retail store for selling in-season clothes at regular prices. The company’s competitive strategy depends on a comprehensive point of-sale (POS) system supporting o

> The Chris Hall Company manufactures and distributes low-priced bottled wines to retailers. You are hired as a management consultant to help this company solve some of its systems problems. Describe the types of decision-making information that probably w

> Visit the website “How Flowcharts Help Companies Save Money, Get Accurate Audits, and Satisfy the Government” at: http://mapthink .blogspot.com/2012/10/how-flowcharts-help -companies-save.html. According to this site, how do flowcharts help save companies

> Follow the directions in Problem 12-11 to access Excel’s drawing tools, and then recreate the two program flowcharts shown in Figure 12-21. Draw each flowchart on a separate work sheet. Rename the ï&no

> The Bridget Joyce Company is an office products distributor that must decide what to do with delinquent credit-sales accounts. Mr. Bob Smith, the credit manager, divides accounts into the following categories: (1) accounts not past due, (2) accounts 30 da

> The Jeffrey Getelman Publishing Company maintains an online database of subscriber records, which it uses for preparing magazine labels, billing renewals, and so forth. New subscription orders and subscription renewals are keyed into a computer file from

> The LeVitre and Swezey Credit Union maintains separate bank accounts for each of its 20,000 customers. Three major files are the customer master file, the transaction file of deposits and withdrawal information, and a monthly statement file that shows a cust

> The order-writing department at the Winston Beauchamp Company is managed by Alan Most. The department keeps two types of computer files: (1) a customer file of authorized credit customers and (2) a product file of items currently sold by the company. Both o

> Amanda M is a regional manufacturer and wholesaler of high-quality chocolate candies. The company’s sales and collection process is as follows. Amanda M makes use of an enterprise-wide information system with electronic data interchange (EDI) capability.

> The data-entry department of the Ron Mitchell Manufacturing Company is responsible for converting all of the company’s shipping and receiving information to computer records. Because accuracy in this conversion is essential, the firm employs a strict veri

> There are many accounting blogs on the Internet. Here are some examples. Education Accounting Coach (www.accountingcoach.com/blog) The Accounting Onion (www.accountingonion.com) Sleep on CPA (http://sleeponcpa.blogspot.com/) Fraud The Forensic Accounting

> The Garcia-Lanoue Company produces industrial goods. The company receives purchase orders from its customers and ships goods accordingly. Assuming that the following conditions apply, develop a document flowchart for this company: a. The company receives

> Develop a document flowchart for the following information flow. The individual stores in the Mark Goodwin convenience chain prepare two copies of a goods requisition form (GRF) when they need to order merchandise from the central warehouse. After these fo

> Draw a document flowchart to depict each of the following situations. a. An individual from the marketing department of a wholesale company prepares five copies of a sales invoice, and each copy is sent to a different department. b. The individual invoices

> To view the flowchart shapes in Microsoft Excel, select the following options from the main menu: Insert\Shapes. There should be many of them (using Excel 2016), including many flowcharting symbols. If you allow your mouse t

> Download a copy of the Association of Certified Fraud Examiners Fraud Prevention Checkup, which is available at: www.acfe .com/uploaded Files/ACFE_ Website/Content/ documents/Fraud_Prev_Checkup_DL.pdf. On a separate piece of paper, list the seven areas an

> What company policies or procedures would you recommend to prevent each of the following activities? a. A clerk in the human relations department creates a fictitious employee in the personnel computer file. When this employee’s payroll check is received f

> The U.S. Department of Justice, Office of the U.S. Attorney press release site (www.justice .gove/usao/pressreleases) is a good source for current cybercrimes and fraud. Find a description of a cybercrime not already discussed in this chapter and prepare

> Assume that you started your own law practice 10 years ago, specializing in estate planning, and you currently employ five attorneys, two legal assistants, one legal secretary, and a bookkeeper/receptionist. The firm has always used a manual accounting sys

> How, assume that you work in the internal audit function at a large hospital that is considering a software package to automate the process of complying with the requirements of the American Recovery and Reinvestment Act of 2009 (commonly referred to as

> The following stated policies pertain to the-commerce website for Small Computers, Inc., a personal and handheld computer manufacturer and seller. Privacy Statement We will only use information collected on this website for legitimate business purposes.

> Describe the differences between general-use software and generalized audit software. How might you use spreadsheet software, database software, and word processing software in conducting an audit of fixed assets?

> Choose an industry described in this chapter and find out what vertical market accounting software is available for that industry. You may use resources such as the Internet, trade associations, interviews with organizations within the industry, or interv

> Save Today is a national discount retail store chain with annual revenues of more than $1 billion. It’s a typical bricks-and-mortar operation with accounting software that records sales transactions in real time and tracks inventories on a perpetual basi

> Figure 8-14 is a system flow chart for P. Miesing and Company’s purchase order preparation. Prepare a narrative to accompany the flow chart describing this purchase order preparation process. Include in you

> Novelty Gadgets is a marketer of inexpensive toys and novelties that it sells to retail stores, specialty stores, and catalog companies. As an accountant working for the company, you have been asked to design a product code for the company. In analyzing

> Listed below are several types of accounting data to be coded. For each data item, recommend a type of code (mnemonic, sequence, block, or group) and support your choice. a. Employee identification number on a computer file b. Product number for a sales ca

> To achieve effective separation of duties within a company’s IT environment, the company’s accounting and information processing subsystems should be separate from the departments that use data and perform operational activities. Discuss some of the ways

> Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems. a. A bank deposit transaction was accidentally coded with a withdrawal code. b. The key-entry ope

> The Blatz Furniture Company uses an online data input system for processing its sales invoice data, salesperson data, inventory control, and purchase order data. Representative data for each of these applications are shown in Figure 7-14. Identify speci&

> Disgruntled employees can be a significant source of problems for any company as we indicate in this problem. Andi Boyd is a very accomplished computer programmer, but she had a grudge against the company because she did not get a promotion that she thoug

> Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems. a. Leslie Thomas, a secretary at the university, indicated that she had worked 40 hours on her re

> Pucinneli Supermarkets is similar to most other grocery store chains that use the 12-digit UPC code on packages to check out customers. For a variety of reasons, it is important that the computer systems using these codes validate them for accuracy and c

> The management of Wiley Coyote Inc. decided that they needed an outside consultant to help them determine which application controls should be implemented for the company’s accounting data processing. In one of the workshops, the seminar leader, Margaret

> Susan Boyd graduated summa cum laude from State University as an accounting major and is now working for a medium-size company. Susan was very clever and quickly realized that she could set up several dummy companies that would direct the company compute

> You have been retained as a consultant to the Bentley Company, and the primary reason they think they need your expertise is to networked PCs. The company maintains fairly extensive databases regarding its customers. These databases include customer profi

> Ron Mitchell is currently working his first day as a ticket seller and cashier at the First Run Movie Theater. When a customer walks up to the ticket booth, Ron collects the required admission charge and issues the movie patron a ticket. To be admitted in

> Listed are 12 internal control procedures or requirements for the expenditure cycle (purchasing, payroll, accounts payable, and cash disbursements) of a manufacturing enterprise. For each of the following, identify the error or misstatement that would be

> The Ashland Company recently hired you to review its control procedures for the purchase, receipt, storage, and issuance of raw materials. You prepared the following comments, which describe Ashland’s procedures. • Raw materials, which consist mainly of

> Rogers, North, & Housour, LLC, is a large, regional CPA firm. There are 74 employees at their Glen Allen, SC office. The administrative assistant at this office approached Mr. Rogers, one of the partners, to express her concerns about the inventory of misce

> The Goochland Company manufactures various types of clothing products for women. To accumulate the costs of manufacturing these products, the company’s accountants have established a computerized cost accounting system. Every Monday morning, the prior we

> Why do ERP systems fail? Perform an Internet search on this topic and identify a new ERP failure not listed in Figure 5-8. Prepare a one page report describing the failure and providing reasons why it happened. Be sure to include information about the co

> Visit a website such as www.top10erp.org that compares several alternative ERP systems. Select a company with which you are familiar and examine the recommended choices for your company’s industry. How do the packages you’ve selected compare to one anoth

> The Lobs, Love & Lessons Tennis Club is a large, regional chain of full-service tennis clubs that cater to the demographics of the region (about 60% of all adults are single in most locations). The clubs each have an indoor swimming pool, exercise equipm

> B&R, Inc. is one of the world’s largest manufacturers and distributors of consumer products, including house hold cleaning supplies and health and beauty products. Last year, their net sales revenues exceeded $5 billion. B&R has multiple information syst

> Tom O’Neal always wanted to own his own business. When he was in high school, he worked evenings and most weekends at a neighborhood bicycle shop. When Tom went to college at the nearby State University, he still came home in the summers and worked at th

> Define the concept of “scalability.” Explain why it might be a good idea for owners of small businesses—and managers in larger businesses—to understand this concept.

> Visit the software websites of two low-end accounting software package vendors and then two ERP vendors. Analyze the descriptions of the software and then describe the differences you see between the low-end packages and the ERP systems.

> Which accounting software features are likely to be most important for the following businesses? Search the Internet for an example of an accounting information system that you would recommend for each of these owners and include your rationale for that

> IBM’s Watson captivated pop culture when it beat two of Jeopardy’s most successful champions. Using your favorite search engine, find an example of how Watson is being used in a business context to improve business outcomes.

> Using your favorite search engine, search for “Gartner Magic Quadrant for Business Intelligence and Analytics Platforms.” Pick one of the vendors from the “Visionaries” quadrant. Research their data analytics/data visualization product offering. What do

> Deceptive Apartments has a policy that requires new tenants to “like” it on Facebook. Some renters don’t mind, but others object because it was not a requirement when they moved it. Further, some argue, the policy is unreasonable because it creates a fal

> List five examples of personal productivity software. For each example you name, also provide an example of how that particular application can help an accountant perform his or her job better, more easily, or more accurately.

> Assume that you are shopping for a new desktop computer. Log onto the Dell Corporation’s website at www.dell.com and develop your own computer system. Include in your system a monitor, keyboard, mouse, and printer, plus whatever additional hardware and s

> It was Friday afternoon, and Dr. Tammy Pucini had seen her last patient for the day. As she sat in her office, staring at the gloomy afternoon sky, she realized that she was both tired and happy. She thought, for example, about how much she had worried th

> Select a type of computer hardware that interests you and write a one-page report on three possible choices of it. Examples include monitors, USB drives, external hard drives, or computer tablets. Your report should include a table similar to the one sho

> Your state has recently decided to install an RFID system for its toll roads. The current plan is to sell nonrefundable transponders for $20 and allow users to deposit up to $1,000 in their accounts. To assist the IT personnel, the system’s planners want

> Brian Fry Products manufactures a variety of machine tools and parts used primarily in industrial tasks. To control production, the company requires the information listed as follows. Design an efficient record format for Brian Fry Products. a. Order numb

> All of the following are acronyms discussed in this chapter. What words were used to form each one and what does each term mean? a. POS b. CPU c. OCR d. MICR e. ATM f. RAM g. ALU h. MIPS i. OS j. MHz k. Pixel l. RGB m. CD-ROM n. Worm o. Modem p. LAN q. S

> Are the following input equipment, output equipment, CPU components, secondary storage devices, or data communications related? a. CRT screen b. ALU c. CD-ROM d. Keyboard e. Modem f. Dot-matrix printer g. Audio speaker h. POS device i. MICR reader j. La

> In Discussion Question 2-1, you discussed intranets and extranets, and identified the importance of each to accountants. Now, assume that you are a partner in a medium sized, local CPA firm. Your firm has 4 partners,10 staff accountants, 1 research assistan

> Visit the home page of a DTSS. How much does your service charge? Do you think these fees are reasonable? Why or why not?

> A number of accounting journals now post back issues or even publish their entire journals online. Access the Journal of Accountancy website at www.aicpa.org (or another website selected by your instructor). Select an article that pertains to a topic in

> The messages below were encrypted using the technique illustrated in Figure 2-11 (using displacement keys other than 5). Using trial and error, decode them. Hint: This task becomes easy if you use an Excel spreadsheet and V Look Up formulas that referenc

> The Internet uses many acronyms. Within the context of the present chapter, what words were used to form each of the following? a. B2B b. B2C c. C2C d. DNS e. EC f. EDI g. Email h. HTTP i. ICANN j. IDEA k. IDS l. IETF m. IoT n. IP address o. ISP p. SaaS

> Springsteen, Inc. is a large furniture manufacturer located in Asbury Park, New Jersey. It sells to furniture wholesalers across the United States and internationally. Revenues last year exceeded $500 million. Currently, the company has over 100 legacy i

> The business models of the breakthrough Internet companies in Figure 2-6 have often been controversial. For example, homeowners often violate local rules governing the rental of their private dwellings, Tesla’s plans to sell cars throug

> Select three Internet websites whose owners sell goods or services and create a table similar to Figure 2-6. Classify each of your websites as B2B, B2C, or C2C. If you are not sure, feel free to use more than one classification. How does t

> Write a one-page paper on each of the following topics as they relate to XBRL: a. What is the history of XBRL? What professional accounting organization helped in the early stages of this concept? b. What is an XBRL specification, and what is the latest v

3.99

See Answer