2.99 See Answer

Question: How does data differ from information?


How does data differ from information?


> Why is a private cloud less risky than a public cloud?

> How can a redundant array of independent disks (RAID) help protect the data of an organization?

> Why was there so much growth in the sales of ERP systems in the late 1990s?

> Describe how sales data is captured and recorded at a restaurant such as Applebee’s.

> Describe some recent news stories you have seen or heard regarding computer viruses.

> What is two factor authentication with regard to smart cards or security tokens?

> What are the factors that limit the effectiveness of internal controls?

> Provide examples of continuous monitoring and periodic monitoring.

> Many companies have mandatory vacation and periodic job rotation policies. Discuss how these practices can be useful in strengthening internal controls.

> Due to cost/benefit considerations, many business organizations are unable to achieve complete segregation of duties. What else could they do to minimize risks?

> Name the COSO report’s five internal control activities.

> Identify the COSO report’s five interrelated components of internal controls.

> How does documenting a system through a pictorial representation offer benefits?

> What are the objectives of a system of internal control?

> What is the underlying purpose of the restrictions on CPA firms in Section 201 of the Sarbanes–Oxley Act?

> Is there a difference between ethical obligations and legal obligations with regard to online privacy?

> What are some of the ethical obligations of companies related to e-commerce?

> In what ways are XBRL financial statements advantageous compared with traditional paper financial statements?

> Why is the use of XML advantageous in Internet EDI?

> What types of controls should be used to properly limit access in intranets and extranets?

> Which type of users should have access to an extranet?

> Which type of users should have access to an intranet?

> What are the three levels of network platforms that are utilized in e-business, and which groups use each level?

> How are activities in the supply chain interdependent?

> Which functions within the supply chain can be enhanced through the use of e-business?

> There are four methods of system conversion: parallel, direct cutover, pilot, and phase‐in. Describe these four methods and how they differ.

> Why is it important to ensure an efficient flow of goods throughout the supply chain?

> Describe the concept of a supply chain.

> What is meant by “monitoring and enforcement” regarding online privacy practices?

> If you could condense the ten areas of Online Privacy in the AICPA Trust Services Principles, into a shorter list (three-, four-, or five-point list), how would you word that list?

> According to the Online Privacy section of the AICPA Trust Services Principles, what types of personal information should be protected?

> What are the differences between bricks-and mortar retailers and clicks-and-mortar retailers?

> Which types of costs can be reduced when a company decides to engage in B2C e-commerce on the Internet?

> How quickly did Internet usage by the public grow after the Internet was opened to business transactions in 1994?

> Why is a standard protocol necessary in computer networks?

> Why was ARPANET designed with many different alternative routes for network traffic?

> Describe the purpose of business process reengineering during the system analysis phase.

> What was the original purpose of the network of computers that eventually became the Internet?

> Why is data considered a valuable resource worthy of extensive protection?

> What are the first three rules of normalization? What is meant by the statement that the rules of normalization are additive?

> Which type of database model has the most flexibility for querying? How does this flexibility assist management?

> What language is used to access data from a relational database? Why is the language advantageous when accessing data?

> How is the primary key used in a relational database?

> Within a hierarchical database, what is the name for the built‐in linkages in data tables? Which data relationships can be contained in a hierarchical database?

> What four conditions are required for all types of databases?

> What is the term for the software program(s) that monitors and organizes the database and controls access and use of data? Describe how this software controls shared access.

> Differentiate between data redundancy and concurrency.

> Briefly explain a situation at your home, university, or job in which you think somebody used computers unethically. Be sure to include an explanation of why you think it was unethical.

> Which type of data storage medium is most appropriate when a single record of data must be accessed frequently and quickly?

> Explain the importance of full disclosure in source of capital processes.

> How do processes with large volumes of transactions make fraudulent behavior easier?

> How does time horizon affect the type of information in internal reports?

> In an IT accounting system, which IT controls ensure the security of the general ledger?

> How is a special journal different from a general journal?

> Why are internal controls less effective in capital and investment processes?

> How are IT systems potentially useful in monitoring funds flow?

> How does the specific authorization and management oversight of source of capital processes affect internal controls?

> Application controls include input, processing, and output controls. One type of input control is source document controls. Briefly explain the importance of each of the following source document controls: a. Form design b. Form authorization and contr

> How would you describe capital?

> When IT systems are used in conversion processes, what are some of the resulting advantages to the organization?

> Which three activities in the conversion process should require specific authorization before they are begun?

> Why would perpetual inventory records be preferable to periodic inventory records in a manufacturing company?

> What should be done when unfavorable variances are discovered?

> What is the purpose of determining standard costs?

> What is the purpose of the quality control department?

> What is the overall goal of the inventory control department?

> What is the purpose of an inventory status report?

> What are the conversion responsibilities of the maintenance and control, inventory control, inventory stores, and human resources departments?

> Explain the risk categories for cloud computing and how these risks may differ from a company that maintains its own IT hardware, software, and data.

> Differentiate between a routing slip and an inventory status report.

> What types of information must be taken into consideration when scheduling production?

> What are the two types of documents or reports that are likely to trigger the conversion process?

> Differentiate between the roles of the engineering and the research and development departments.

> Differentiate between a bill of materials and an operations list.

> Why are conversion activities typically considered routine data processes?

> Do conversion processes occur in manufacturing companies only? Why, or why not?

> What are the three resources that an organization must have to conduct a conversion (or transformation) process?

> How does the misclassification of fixed asset expenditures result in misstatement of financial statements?

> Why might a supervisor collude with an employee to falsify time cards?

> For each of the following parts of an IT system of a company, write a one‐sentence description of how unauthorized users could use this as an entry point: a. A local area network (LAN) b. A wireless network c. A telecommuting worker d. A company webs

> What negative things might occur if fixed asset software systems lacked appropriate access controls?

> Why is the beginning of a fiscal year the best time to implement a fixed asset software system?

> Explain why a real‐time update of fixed asset records might be preferable to batch processing of fixed asset changes.

> Why are some fixed assets susceptible to theft?

> Why is it important to conduct an investment analysis prior to the purchase of fixed assets?

> Fixed assets are purchased and retired frequently. Given this frequent change, why are clear accounting records of fixed assets necessary?

> What are the advantages of outsourcing payroll?

> What are the advantages of automated time keeping such as bar code readers, or ID badges that are swiped through a reader?

> Why do payroll processes result in sensitive information, and what is the sensitive information?

> Why is it important to use an independent paymaster to distribute paychecks?

> For each AICPA Trust Services Principles category shown, list a potential risk and a corresponding control that would lessen the risk. An example is provided. EXAMPLE Security: Risk: A hacker could alter data. Control: Use a firewall to limit unauthori

> What is the purpose of supervisory review of employee time cards?

> Explain the reasons for an organization having a separate bank account established for payroll.

> Why is it important that the human resources department maintain records authorizing the various deductions from an employee’s paycheck?

> Even though payroll and fixed asset processes may not be as routine as revenue processes, why are they just as important?

> What techniques can a company use to reveal problems concerning potential exposure to unauthorized access to its systems?

> Identify three ways that buyers and sellers may be linked electronically.

> Identify each category of risk that can be reduced by using authority tables, computer logs, passwords, and firewalls.

> What is typically the most time‐consuming aspect of the expenditures process?

> What paper document is eliminated when ERS is used?

2.99

See Answer