2.99 See Answer

Question: To be of any value, a modern


To be of any value, a modern information process must assist all levels of management.” Discuss.


> Examine the REA model for Hera Industrial Supply that appears in Figure 6.18. Figure 6.18: Determine the maximum cardinalities for each of the eight relationships indicated in the model. State any assumptions you needed to make, and be prepared to d

> Examine Figure 6.18, which contains the REA model for Hera Industrial Supply (HIS). The model is partially completed; it includes all entities and relationships, but it does not include cardinalities or descriptions of the relationships (which would appe

> Using the vendor and purchase order tables from Short Problem 6-3 and SQL commands, create a query to find out the date of each purchase order and the vendor by name each purchase order was sent to.

> Using SQL commands, create a vendor table and purchase order table, and populate them with data.

> Develop the REA data model from Short Problem 6-1 into an E-R diagram with maximum cardinalities. Assume that each inventory item can be ordered multiple times. Draw the model using Microsoft Visio (or other software).

> Describe how an enterprise system can assist an organization in optimizing its value system.

> Develop an REA data model for ordering inventory. Consider this a single event. You will need to identify the associated resource(s) and agent(s). Draw the model using Microsoft Visio (or other software).

> Using database software (e.g., Access) and the database tables implemented in SP 5-3, run a query identifying customers by name and the inventory item(s) they received by description. Obtain a printout of the query design and the results.

> Implement the E-R diagram from SP 5-1 as tables in a database software package, such as Access. Once the tables are created, link the tables together in relationships. Finally, populate the tables with several instances of each entity. To do this, it wil

> Using the E-R diagram in from SP 5-1, write a description for each of the relationships in the diagram. In your description, include the cardinalities. For example, you might describe the relationship between CUSTOMERS and SHIPMENTS as: “Shipments are ma

> Using Microsoft Visio (or an alternative software), create an E-R diagram with maximum cardinalities for the shipping of inventory to customers. Show this diagram as an REA model identifying resources, events, and agents.

> Historically, many businesses served only local customers. That model usually limited customers to a small geographic area. Identify a specific type of business, and compare/contrast the opportunities and risks for the business pre-Internet, and in today

> Identify a specific situation in which periodic processing is sufficient to support the business process, and a second situation where immediate processing is necessary to adequately support the process.

> E-business has allowed companies to reduce inventory while simultaneously offering a wide variety of items. Amazon.com is an example of such a company. Identify another organization that has expanded or improved (or could potentially expand or improve) b

> Provide an example of a business where the evolution of communication (i.e., face-to-face, phone, e-mail, etc.) has altered its business activities. What are the advantages and disadvantages associated with these changes?

> Some people believe that an automated accounting system is always better than a manual system. Describe circumstances, and provide examples, where you would recommend a manual system rather than automated solution.

> Periodically, you will read in the news about one company in the ERP industry acquiring another company in that industry. Discuss the pros and cons of consolidation of the ERP software industry.

> Enterprise systems may provide better information than nonintegrated systems for management decisions. Provide specific examples that support (or refute) this claim.

> Consider the business event–processing activity, entering a customer’s order. Identify the key business event data (who, what, where, and when) you would want to capture. (For an example of the event you may refer to F

> Find the most current listing of the AICPA’s or CPA Canada’s Top Technology Initiatives Survey. Research and write a paper on the accounting and business implications for the number one item on the list. Include any external pressures that may impact the

> Identify the skills required to be a forensic accountant. How does the knowledge of technology and AIS help enable or augment those skills?

> Find the most current listing of the AICPA’s or CPA Canada’s Top Technology Initiatives Survey. Compare the listing to prior years’ listings. Identify and discuss trends among the years. Your professor will tell you how long your paper should be.

> About three decades ago, in his first address as Chairman of the Board of the American Institute of Certified Public Accountants (AICPA), Robert K. Elliott said: Knowledge leveraging will shape a wide range of CPA services. CPAs will be able to identify

> The following is a brief description of the financial statement assertions from PCAOB Auditing Standards Section AU 326, Evidential Matter: A. Existence or occurrence: Assets or liabilities of the entity exist at a given date (existence) or recorded tran

> The following is a list of 12 control plans from this chapter, followed by a list of 10 examples of System Failures or problem situations that have control implications: Match the 10 system failures with a control plan that would best prevent the system

> The following narrative describes the processing of customer mail orders at Eye-Dee-A-Pet, Inc.: Eye-Dee-A-Pet, Inc. is a small manufacturing operation engaged in the selling of digital identification chips that can be implanted into household pets, such

> Research the Internet, newspapers, magazines, and journals to find recent incidences of denial-of-service attacks on one or more Web sites. Develop a report (format and length to be determined by your instructor) providing a general overview of the incid

> The Tigris Company is considering taking customers’ orders on its Web site. a. What information would Tigris collect from the customer during this process? b. What information would need to come from Tigris’ Web and back-end systems to complete the order

> Research the Internet, newspapers, magazines, and journals to find recent incidences of outages of one or more Web sites. Develop a report (format and length to be determined by your instructor) providing a general overview of the incident(s), including

> Examine the last column in Table 8.2 (p. 280) for the following personnel only: access control officer, chief information officer (CIO), structural security/disaster recovery manager, testing/quality assurance, and database administrator. For each of the

> AS5 outlines the processes for “An Audit of Internal Control over Financial Reporting That Is Integrated with an Audit of Financial Statements.” Paragraph 24 of this document lists eight entity-level controls. Entity-level controls are comparable to the

> Personnel at C&P Company must perform the following functions: 1. Receive checks and remittance advice from customers. 2. Approve vendor invoices for payment and prepare checks. 3. Approve credit memoranda for customer sales returns. 4. Record collection

> Assume that accounts payable are processed on a computer and that the options in the accounts payable system module are as follows: 1. Maintain vendor master data (i.e., add, change, or delete vendors in the vendor master data). 2. Record vendor invoices

> The following is a list of 13 control plans from this chapter, followed by a list of 10 situations that have control implications. Match the 10 situations with the control plan that would best prevent the system failure from occurring. Because there are

> Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could

> The following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. a. Criminals posing as small business owners obtai

> Figure 7.8: depicts the adaptation of a sample control matrix from a PricewaterhouseCoopers guide for Section 404 of the Sarbanes-Oxley Act of 2004.28 We have added some data from the Suprina Company example to the first row of the matrix. Compare the

> The CFO of PKD Corporation is very uncomfortable with its current risk exposure related to the possibility of business disruptions. Specifically, PKD is heavily involved in E-business, and its internal information systems are tightly interlinked with its

> After the core of an ERP system has been implemented, any of the modules may then be implemented separately. What is the implication of being able to implement an ERP system on a piece-by-piece basis?

> In the following first list are 10 examples of the items described in the second list. Match the two lists by placing the capital letter from the first list on the blank line preceding the description to which it best relates. You should have two letters

> Following is a list of eight generic control goals from the chapter, followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve control goals). List

> Conduct research to determine management’s responsibility for establishing and maintaining an adequate system of internal control. Create a written report, in a manner prescribed by your instructor, describing applicable statutory and professional guidan

> Match the concept in List 1 with the definition or description in List 2. There is only one correct or best answer for each match. Therefore, you should have two letters left over from List 1. List 1—Concepts A. Application (i.e., automated) control B. C

> The following E-R diagram (Figure 6.19) Figure 6.19: Represents students registering for classes for a single semester. Assume that the Registration table can hold a complete history of each individual student’s registration events.

> Using the REA model in Figure 6.18 (pg. 222) Figure 6.18: And your answers to Discussion Questions 6-2, 6-3, and 6-4, create a database for HIS in the software package of your choice. This will require that you do the following: a. Create tables for

> This problem is a continuation of Problem 6-3 but requires use of a spreadsheet package that is capable of reading data from your database package (e.g., Excel can import data from an Access database). a. Using your spreadsheet package, construct SQL que

> Note: This problem is a continuation of Problem 6-3 but requires access to the Internet, a site for posting the database on the Web, and an understanding of Internet access. a. Take the database developed in Problem 6-3 and place it on the Internet (or y

> Using the information from Figure 6.12 (pg. 212) and Figure 6.13 create the database in the software package of your choice. This will require three steps: Implement the relations from Figure 6.13. Insert the data from Figure 6.13 into the relational tab

> Human Resources department needs the work time, vacation time, and sick time for Greg Kinman (see the EMPLOYEE table in Figure 6.13). What SQL command(s) would you use to extract this information from the tables in Figure 6.13?

> What SQL command(s) would you use to add the date on which an employee was hired to the EMPLOYEE table represented in Figure 6.13 (pg. 213)? Name this new attribute Employment_Date. Assume that the employees were hired on the following dates, using a yea

> Transform the database structure that appears in Figure 5.15 into 3NF. Be sure to show your intermediate steps of 1NF and 2NF.

> This problem asks you to research the literature for applications of intelligent systems. Your instructor will guide you regarding the number of pages required for each part. a. Develop a paper that outlines the use of ES in accounting and tax applicatio

> Review the E-R diagram in Figure 5.14 (pg. 189) and: a. List the resources, events, and agents that are represented as entities in this diagram. b. Write a description for each of the six relationships in the diagram. In your description, include the car

> A local accounting firm that is growing rapidly has asked for your help. The firm has four partners who are primarily responsible for developing new business. In addition to developing new business, the partners are very busy with their management tasks,

> Use the database structure and sample data in Figure 5.10 to: a. Combine the tables to obtain a complete record of orders and shipments. Obtain a printout of the algorithm(s) used to combine the tables and a printout of the list of these records. b. Writ

> Using the database structure and sample data in Figure 5.10 (pg. 169) as a starting point (rather than Figure 5.2), complete the requirements of Problems 5-1 through 5-3 (or whatever portions of those problems your instructor may indicate).

> Note: This problem is a continuation of Problem 5-1. a. Write a “program” to enter customer order amounts into the database and to have the system either warn the user if the new order places the customer over his or her credit limit or advise the user i

> a. “Search” the database for all customers with a specific state (choose a state that is common to at least two but not to all of your customers). Obtain a printout of your search algorithm and a list of customers whose records met the search parameter.

> Using a spreadsheet (e.g., Excel), design a decision aid to help you complete the following task. You are looking for a new apartment and decided to go through a realtor instead of shopping for the apartment through advertisements. Avbel Realty provided

> Describe two structured decisions and two unstructured decisions. Discuss the relative amount of structure in each decision.

> Use the Internet to research knowledge management systems. Specifically, (1) find one example of a knowledge management system, (2) identify the provider or vendor, (3) provide the Web site URL, and (4) list the features of the system found that help an

> Technology Summary 5.2 (pp. 159–160) uses examples of employee ID codes to illustrate five data coding types. Refer to those examples. Create student ID codes that illustrate each of the five coding schemes. Discuss the strengths and weaknesses of each e

> Use the Internet to research the database integration features of an ERP software package and a CRM software package. The number of pages will be indicated by your instructor. a. Learn about the ERP products of SAP and the CRM products of Oracle’s Siebel

> Figure 5.16 (pg. 191) is a sample from a spreadsheet used to record donors for a small college. You have been asked to design and implement a database to allow easy inputting, updating, and reporting of contribution data. Figure 5.16: a. Transform the

> Before starting this problem, you should consult the customer master data record layout in Figure 5.2 (pg. 148). Figure 5.2: Using the database software indicated by your instructor: a. Create the “structure” for th

> The chapter describes how a batch processing system works with a used book shop as an example. Looking at Figure 3.2 and its description of how the system works, identify another type of business that might use a similar batch processing system, and desc

> Use the Internet to locate www.cia.gov and www.Amazon.com. Find the privacy and security policies for each. Compare and contrast the use of privacy statements, encryption, SSL, and cookie policies.

> Using the Internet, find and describe an Internet market exchange or Internet auction market. Your discussion should include the products and services available and the type of buyers and sellers you expect to participate. If you choose a private market,

> Explain how EDMhas been (or could be) used in your AIS class to eliminate all paper flow between the students and professor. Include in your explanation what technologies were (would be) necessary to enable your plan. (Your professor will direct you rega

> Develop a research paper on the use of the Internet to support EDI between companies. Your paper should consider how companies set up communications over the Internet to maintain the same security and standardization that are achieved using VANs for non-

> Comparing relevance and reliability, which information quality is most important? Support your answer with examples.

> Identify a business venture that you believe could be successful using only Internet commerce. Explain how you would design your Web page, how you would capture business event data, and the mode of processing you would use. Provide a report detailing sup

> Consider a business you might want to start on the Internet using e-mail to communicate with customers and capture business data. Explain why e-mail would be a good approach for your business. Draft a brief business plan evaluating the advantages and dis

> Technology Summary 3.4 briefly describes cloud computing. Write a report on the opportunities and concerns relating to a company using the cloud for mission critical software applications. (Your professor will direct you regarding the length of the repor

> Using the four methods of conducting E-business (e-mail, EDM, EDI, and Internet commerce), select a business of your choice and describe how each method is currently integrated into their business or how each method could be incorporated into their busin

> Find a merchandising business on the Internet (other than the Eddie Bauer or Amazon.com examples used in this chapter). Explore its Web page and how the order processing system works. a. Is there any information provided on how secure the Web page is? Wh

> There are several organizations that provide Internet assurance services. Although WebTrust was created by CPAs and has been in existence for several years, it has met limited acceptance by business. If Internet assurance is truly important, why do you t

> Imagine that you are conducting a field-based research project for your AIS class in a small local business. Assume that the business is a custom furniture manufacturer. In the course of your project, you tell the owner that you are using SAP in your AIS

> Choose a familiar Web site, such as Dell, Amazon.com, or Walmart. Describe the order-to-cash process from the customer’s perspective as illustrated by that site.

> Conduct research on the Web sites of either CIO Magazine or CFO Magazine (or another that your instructor suggests) for stories about ERP implementation successes and failures. Using specific examples, describe the reasons for the successes and failures.

> Choose (or you instructor may designate) an ERP add-on module (such as CRM, SCM, PLM, or SRM). Describe how Airgas (or another organization selected by your instructor) might use the module to support its business value chain.

> Regarding financial reporting, which quality of information do you think should be superior to all other qualities? Discuss your answer.

> I just want to be a good accountant, technology does not interest me.” Comment on this statement, considering today’s technology environment.

> How do you explain why investment falls as the interest rate rises?

> According to classical economists, does Say’s Law hold in a money economy? Explain your answer.

> Beginning in long-run equilibrium, explain what happens to the price level and Real GDP in the short run and in the long run as a result of; (a) A decline in AD, (b) A rise in AD, (c) A decline in SRAS, (d) A rise in SRAS.

> Jim says, “I think it’s a little like when you have a cold or the flu. You don’t need to see a doctor. In time your body heals itself. That’s sort of the way the economy works too. We don’t really need government coming to our rescue every time the econo

> Yvonne is telling her friend Wendy that wages are rising but that so is the unemployment rate. She tells Wendy that she (Yvonne) may be the next person to be fired at her company and that she may have to move back in with her parents. What does the econo

> Suppose that the economy is self-regulating, that the price level is 110, that the quantity demanded of Real GDP is $4 trillion, that the quantity supplied of Real GDP in the short run is $4.9 trillion, and that the quantity supplied of Real GDP in the l

> Suppose that the economy is self-regulating, that the price level is 132, that the quantity demanded of Real GDP is $4 trillion, that the quantity supplied of Real GDP in the short run is $3.9 trillion, and that the quantity supplied of Real GDP in the l

> Explain the importance of the real balance, interest rate, and international trade effects to long-run (equilibrium) adjustment in the economy.

> If wage rates are not flexible, can the economy be self-regulating? Explain your answer.

> According to economists who believe in a self-regulating economy, what happens—step by step—when the economy is in a recessionary gap? What happens when the economy is in an inflationary gap?

> When speeding tickets were $100, usually 500 speeders on the roads each month in a given city; when ticket prices were raised to $250, usually 215 speeders were on the roads in the city each month. Can you find any economics in this observation?

> Explain how the economy can operate beyond its institutional PPF but not beyond its physical PPF.

> What is the classical economics position with respect to; (a) Wages, (b) Prices, and (c) Interest rates?

> Explain how expectations about future sales will affect investment.

> Explain how expectations about future prices and incomes will affect consumption.

> Explain what is likely to happen to U.S. export and import spending as a result of the dollar depreciating in value.

> Explain what happens to aggregate demand in each of the following cases: (a) The interest rate rises; (b) Wealth falls; (c) The dollar depreciates relative to foreign currencies; (d) Households expect lower prices in the future; (e) Business taxes r

2.99

See Answer