2.99 See Answer

Question: To view the flowchart shapes in Microsoft

To view the flowchart shapes in Microsoft Excel, select the following options from the main menu: Insert\Shapes. There should be many of them (using Excel 2016), including many flowcharting symbols. If you allow your mouse to hover over a specific symbol, its title and meaning will appear in a tool-tip box. Finally, if you click on a specific symbol, your mouse icon will change to a cross-hair, and you will be able to draw this symbol on your spreadsheet. Create a list with items similar to the following one that contains all the flowchart symbols in your version of Excel.
To view the flowchart shapes in Microsoft Excel, select the following options from the main menu: Insert\Shapes. There should be many of them (using Excel 2016), including many flowcharting symbols. If you allow your mouse to hover over a specific symbol, its title and meaning will appear in a tool-tip box. Finally, if you click on a specific symbol, your mouse icon will change to a cross-hair, and you will be able to draw this symbol on your spreadsheet. Create a list with items similar to the following one that contains all the flowchart symbols in your version of Excel.





Transcribed Image Text:

Predefined Process


> Continuous auditing has the potential to reduce labor costs associated with auditing. It also can provide audit assurance closer to the occurrence of a transaction, which improves the reliability of frequent or real-time financial reports. Using an Intern

> Savage Motors sells and leases commercial automobiles, vans, and trucks to customers in southern California. Most of the company’s administrative staff work in the main office. The company has been in business for 35 year

> Information systems auditors sometimes use tools or information they can download from the Internet. These tools or information may include software, audit guides, or computer security advisories. Locate some examples from the Internet of audit tools, au

> Visit www.isaca.org, the website for the Information Systems Audit and Control Association. Investigate the Certified Information Systems Auditor (CISA) credential. Describe the purpose of the credential and the types of auditing CISAs perform.

> The Espy Company recently had an outside consulting firm perform an audit of its information systems department. One of the consultants identified some business risks and their probability of occurrence. Estimates of the potential losses and estimated cont

> Use the Customers table in the BSN database that accompanies this book and the Report Wiz-ard to create the report in Figure 16-14. Note that you will have to reformat and perhaps reposition several labels, and add both labels and a graphic in the header

> Using the Customers table in the BSN database that accompanies this book, and following the directions in this chapter, create the report in Figure 16-8. Note that you will have to reformat and perhaps reposition several labels, and add both labels and a

> If you have not done so already, use the Customers table in the BSN database that accompanies this book and the directions in this chapter to create the form in Figure 16-1. Make sure that you reformat the default positions of the various textboxes as sh

> Using the Customers table in the BSN database that accompanies this book, and following the directions in this chapter, create the form in Figure 16-1. Make sure that you reformat the default positions of the various textboxes as shown in the ï¬

> Provide a short explanation of the difference between each of the following sets of terms: a. bound control versus unbound control b. design mode versus run mode c. ◀ symbol versus ▶ symbol on a form’s navigation bar d. form versus subform e. normal data

> A database report has seven major sections. a. Identify each one and provide a short explanation of each section. b. Identify a report that a database application might generate, and indicate what data might be found in each section of the report for you

> A form’s navigation bar has five symbols on it. Identify each one and indicate its use.

> Barra Concrete specializes in creating driveways and curbs for the residential market. Its accounting software uses exclusive OR (XOR) operations to convert the individual bits of a plaintext message into ciphertext. The rules are as follows: In other

> Consider the employee record in Figure 15-4, which illustrates the data structure of an employee table. Given the importance of this information, it is likely that the database developer would install validation tests to ensure its accuracy. Some possibl

> The information in Figure 15-18 is for the employees of the Marcia Felix Corporation. a. Use a DBMS software package to create a database for this figure. b. What is the average pay rate for these employees? c. What is the average pay rate

> Use the Web to find current examples of data warehousing software. Why do companies create data warehouses, and what are some accounting uses of such warehouses?

> The Query Corporation employs the individuals listed in Figure 15-17. Use Access or another DBMS as required by your instructor to create a database of this information and then perform the following queries. a. List all employees in Department 5. b. Lis

> Create a Salesperson table and a Customer Order table. The salesperson table should include the salesperson number, first name, last name, commission rate, and date of last sale. The customer order table includes the order number, customer

> Bonadio Electrical Supplies distributes electrical components to the construction industry. The company began as a local supplier 15 years ago and has grown rapidly to become a major competitor in the north central United States. As the business grew and

> The quotation at the beginning of this chapter suggested that very few checks are made to check the database is not doing things it should not be doing.” What are some things that accounting database should not do? Compile a list of items, and for each o

> Give some examples of attributes you would include in a Customer table. Would you use one data field or two for the customer name? Why?

> Draw an entity–relationship diagram for the following: An accounting firm holds recruiting events for college students. At these events, recruiters are seeking students with particular skills.

> Draw an entity–relationship diagram for the following: Sales of inventory are made to customers by salespeople. After the sale, cash is received by cashiers.

> The Anderson Manufacturing Company (AMC) is located in Las Vegas, Nevada, and manufactures specialty parts for high-end sports cars. The company currently has an accounting information system, but over time, has found that it would like its system to do

> Describe the meaning of each of the entity– relationship diagrams shown in Figure 14-17. Figure 14-17: Тeach Course a. Course + H Teacher b. H Patient Surgery + Doctor Nurse Sale Customer С. Item

> What attributes (i.e., table columns) would you be likely to include in a Cash table and in a Cash Receipts table?

> An internal auditor should have a sound understanding of basic data processing concepts such as data organization and storage in order to adequately evaluate systems and make use of retrieval software. a. Define the following terms as used in a data proce

> Do you understand Gantt charts? Use Figure 13-11 and test your understanding by answering the following questions. a. When is the activity “convert data files” scheduled to begin and end? b. When is the

> Do you understand PERT charts? Refer back to Figure 13-10 and answer the following questions: a. Which activity or activities must be completed before activity C can begin? b. Which activity or activities must be completed before activity G can begin? c.

> Identify a particular information system that is not working very well and perform a preliminary investigation of it. In your work, be sure to talk to (1) at least one external “customer” who is affected by the system, (2) one employee who uses the syste

> Are software developers cheap or expensive? That’s important because developing custom software for your accounting system depends in part on how much such labor will cost. To find out, access government statistics from the Bureau of Labor Statistic’s Occ

> Cook Consultants is currently in the process of completing the systems implementation activities for converting Samuel Company’s old system to a new one. Because of unexpected delays in performing specific implementation activities, Jerry Hazen, the proje

> Guess Right Consultants is a New Zealand business that helps clients with financial planning—especially preparing wills, creating trusts, and allocating funds among competing investment categories. It’s not an unusual business, but the company has not bee

> Jay Beck works for the AAZ Consulting Firm. His friend, Hank Henley, is the general manager and majority stockholder of the Pacific Worldwinds, a professional football team. Hank asked Jay to design an online, real time computer system for “the efficient o

> Even if you are now only a student with limited or no work experience, it is not too early to begin building a professional identity and your own company—Me, Inc. This is an identity that you’ll want to post and carefully cultivate on some of the popular

> Stevenson Apparel is a manufacturer of fashion apparel that has just opened its first large retail store for selling in-season clothes at regular prices. The company’s competitive strategy depends on a comprehensive point of-sale (POS) system supporting o

> The Chris Hall Company manufactures and distributes low-priced bottled wines to retailers. You are hired as a management consultant to help this company solve some of its systems problems. Describe the types of decision-making information that probably w

> Visit the website “How Flowcharts Help Companies Save Money, Get Accurate Audits, and Satisfy the Government” at: http://mapthink .blogspot.com/2012/10/how-flowcharts-help -companies-save.html. According to this site, how do flowcharts help save companies

> Follow the directions in Problem 12-11 to access Excel’s drawing tools, and then recreate the two program flowcharts shown in Figure 12-21. Draw each flowchart on a separate work sheet. Rename the ï&no

> The Bridget Joyce Company is an office products distributor that must decide what to do with delinquent credit-sales accounts. Mr. Bob Smith, the credit manager, divides accounts into the following categories: (1) accounts not past due, (2) accounts 30 da

> The Jeffrey Getelman Publishing Company maintains an online database of subscriber records, which it uses for preparing magazine labels, billing renewals, and so forth. New subscription orders and subscription renewals are keyed into a computer file from

> The LeVitre and Swezey Credit Union maintains separate bank accounts for each of its 20,000 customers. Three major files are the customer master file, the transaction file of deposits and withdrawal information, and a monthly statement file that shows a cust

> The order-writing department at the Winston Beauchamp Company is managed by Alan Most. The department keeps two types of computer files: (1) a customer file of authorized credit customers and (2) a product file of items currently sold by the company. Both o

> Amanda M is a regional manufacturer and wholesaler of high-quality chocolate candies. The company’s sales and collection process is as follows. Amanda M makes use of an enterprise-wide information system with electronic data interchange (EDI) capability.

> The data-entry department of the Ron Mitchell Manufacturing Company is responsible for converting all of the company’s shipping and receiving information to computer records. Because accuracy in this conversion is essential, the firm employs a strict veri

> There are many accounting blogs on the Internet. Here are some examples. Education Accounting Coach (www.accountingcoach.com/blog) The Accounting Onion (www.accountingonion.com) Sleep on CPA (http://sleeponcpa.blogspot.com/) Fraud The Forensic Accounting

> The Garcia-Lanoue Company produces industrial goods. The company receives purchase orders from its customers and ships goods accordingly. Assuming that the following conditions apply, develop a document flowchart for this company: a. The company receives

> Develop a document flowchart for the following information flow. The individual stores in the Mark Goodwin convenience chain prepare two copies of a goods requisition form (GRF) when they need to order merchandise from the central warehouse. After these fo

> Draw a document flowchart to depict each of the following situations. a. An individual from the marketing department of a wholesale company prepares five copies of a sales invoice, and each copy is sent to a different department. b. The individual invoices

> Download a copy of the Association of Certified Fraud Examiners Fraud Prevention Checkup, which is available at: www.acfe .com/uploaded Files/ACFE_ Website/Content/ documents/Fraud_Prev_Checkup_DL.pdf. On a separate piece of paper, list the seven areas an

> What company policies or procedures would you recommend to prevent each of the following activities? a. A clerk in the human relations department creates a fictitious employee in the personnel computer file. When this employee’s payroll check is received f

> The U.S. Department of Justice, Office of the U.S. Attorney press release site (www.justice .gove/usao/pressreleases) is a good source for current cybercrimes and fraud. Find a description of a cybercrime not already discussed in this chapter and prepare

> Comment on each of the following scenarios in light of chapter materials. Hint: Use the references at the end of this chapter to help you. a. A legitimate student calls the computer help desk from her cell phone because she has b. An employee at a buildi

> Assume that you started your own law practice 10 years ago, specializing in estate planning, and you currently employ five attorneys, two legal assistants, one legal secretary, and a bookkeeper/receptionist. The firm has always used a manual accounting sys

> How, assume that you work in the internal audit function at a large hospital that is considering a software package to automate the process of complying with the requirements of the American Recovery and Reinvestment Act of 2009 (commonly referred to as

> The following stated policies pertain to the-commerce website for Small Computers, Inc., a personal and handheld computer manufacturer and seller. Privacy Statement We will only use information collected on this website for legitimate business purposes.

> Describe the differences between general-use software and generalized audit software. How might you use spreadsheet software, database software, and word processing software in conducting an audit of fixed assets?

> Choose an industry described in this chapter and find out what vertical market accounting software is available for that industry. You may use resources such as the Internet, trade associations, interviews with organizations within the industry, or interv

> Save Today is a national discount retail store chain with annual revenues of more than $1 billion. It’s a typical bricks-and-mortar operation with accounting software that records sales transactions in real time and tracks inventories on a perpetual basi

> Figure 8-14 is a system flow chart for P. Miesing and Company’s purchase order preparation. Prepare a narrative to accompany the flow chart describing this purchase order preparation process. Include in you

> Novelty Gadgets is a marketer of inexpensive toys and novelties that it sells to retail stores, specialty stores, and catalog companies. As an accountant working for the company, you have been asked to design a product code for the company. In analyzing

> Listed below are several types of accounting data to be coded. For each data item, recommend a type of code (mnemonic, sequence, block, or group) and support your choice. a. Employee identification number on a computer file b. Product number for a sales ca

> To achieve effective separation of duties within a company’s IT environment, the company’s accounting and information processing subsystems should be separate from the departments that use data and perform operational activities. Discuss some of the ways

> Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems. a. A bank deposit transaction was accidentally coded with a withdrawal code. b. The key-entry ope

> The Blatz Furniture Company uses an online data input system for processing its sales invoice data, salesperson data, inventory control, and purchase order data. Representative data for each of these applications are shown in Figure 7-14. Identify speci&

> Disgruntled employees can be a significant source of problems for any company as we indicate in this problem. Andi Boyd is a very accomplished computer programmer, but she had a grudge against the company because she did not get a promotion that she thoug

> Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems. a. Leslie Thomas, a secretary at the university, indicated that she had worked 40 hours on her re

> Pucinneli Supermarkets is similar to most other grocery store chains that use the 12-digit UPC code on packages to check out customers. For a variety of reasons, it is important that the computer systems using these codes validate them for accuracy and c

> The management of Wiley Coyote Inc. decided that they needed an outside consultant to help them determine which application controls should be implemented for the company’s accounting data processing. In one of the workshops, the seminar leader, Margaret

> Susan Boyd graduated summa cum laude from State University as an accounting major and is now working for a medium-size company. Susan was very clever and quickly realized that she could set up several dummy companies that would direct the company compute

> You have been retained as a consultant to the Bentley Company, and the primary reason they think they need your expertise is to networked PCs. The company maintains fairly extensive databases regarding its customers. These databases include customer profi

> Ron Mitchell is currently working his first day as a ticket seller and cashier at the First Run Movie Theater. When a customer walks up to the ticket booth, Ron collects the required admission charge and issues the movie patron a ticket. To be admitted in

> Listed are 12 internal control procedures or requirements for the expenditure cycle (purchasing, payroll, accounts payable, and cash disbursements) of a manufacturing enterprise. For each of the following, identify the error or misstatement that would be

> The Ashland Company recently hired you to review its control procedures for the purchase, receipt, storage, and issuance of raw materials. You prepared the following comments, which describe Ashland’s procedures. • Raw materials, which consist mainly of

> Rogers, North, & Housour, LLC, is a large, regional CPA firm. There are 74 employees at their Glen Allen, SC office. The administrative assistant at this office approached Mr. Rogers, one of the partners, to express her concerns about the inventory of misce

> The Goochland Company manufactures various types of clothing products for women. To accumulate the costs of manufacturing these products, the company’s accountants have established a computerized cost accounting system. Every Monday morning, the prior we

> Why do ERP systems fail? Perform an Internet search on this topic and identify a new ERP failure not listed in Figure 5-8. Prepare a one page report describing the failure and providing reasons why it happened. Be sure to include information about the co

> Visit a website such as www.top10erp.org that compares several alternative ERP systems. Select a company with which you are familiar and examine the recommended choices for your company’s industry. How do the packages you’ve selected compare to one anoth

> The Lobs, Love & Lessons Tennis Club is a large, regional chain of full-service tennis clubs that cater to the demographics of the region (about 60% of all adults are single in most locations). The clubs each have an indoor swimming pool, exercise equipm

> B&R, Inc. is one of the world’s largest manufacturers and distributors of consumer products, including house hold cleaning supplies and health and beauty products. Last year, their net sales revenues exceeded $5 billion. B&R has multiple information syst

> Tom O’Neal always wanted to own his own business. When he was in high school, he worked evenings and most weekends at a neighborhood bicycle shop. When Tom went to college at the nearby State University, he still came home in the summers and worked at th

> Define the concept of “scalability.” Explain why it might be a good idea for owners of small businesses—and managers in larger businesses—to understand this concept.

> Visit the software websites of two low-end accounting software package vendors and then two ERP vendors. Analyze the descriptions of the software and then describe the differences you see between the low-end packages and the ERP systems.

> Which accounting software features are likely to be most important for the following businesses? Search the Internet for an example of an accounting information system that you would recommend for each of these owners and include your rationale for that

> IBM’s Watson captivated pop culture when it beat two of Jeopardy’s most successful champions. Using your favorite search engine, find an example of how Watson is being used in a business context to improve business outcomes.

> Using your favorite search engine, search for “Gartner Magic Quadrant for Business Intelligence and Analytics Platforms.” Pick one of the vendors from the “Visionaries” quadrant. Research their data analytics/data visualization product offering. What do

> Deceptive Apartments has a policy that requires new tenants to “like” it on Facebook. Some renters don’t mind, but others object because it was not a requirement when they moved it. Further, some argue, the policy is unreasonable because it creates a fal

> List five examples of personal productivity software. For each example you name, also provide an example of how that particular application can help an accountant perform his or her job better, more easily, or more accurately.

> Assume that you are shopping for a new desktop computer. Log onto the Dell Corporation’s website at www.dell.com and develop your own computer system. Include in your system a monitor, keyboard, mouse, and printer, plus whatever additional hardware and s

> It was Friday afternoon, and Dr. Tammy Pucini had seen her last patient for the day. As she sat in her office, staring at the gloomy afternoon sky, she realized that she was both tired and happy. She thought, for example, about how much she had worried th

> Select a type of computer hardware that interests you and write a one-page report on three possible choices of it. Examples include monitors, USB drives, external hard drives, or computer tablets. Your report should include a table similar to the one sho

> Your state has recently decided to install an RFID system for its toll roads. The current plan is to sell nonrefundable transponders for $20 and allow users to deposit up to $1,000 in their accounts. To assist the IT personnel, the system’s planners want

> Brian Fry Products manufactures a variety of machine tools and parts used primarily in industrial tasks. To control production, the company requires the information listed as follows. Design an efficient record format for Brian Fry Products. a. Order numb

> All of the following are acronyms discussed in this chapter. What words were used to form each one and what does each term mean? a. POS b. CPU c. OCR d. MICR e. ATM f. RAM g. ALU h. MIPS i. OS j. MHz k. Pixel l. RGB m. CD-ROM n. Worm o. Modem p. LAN q. S

> Are the following input equipment, output equipment, CPU components, secondary storage devices, or data communications related? a. CRT screen b. ALU c. CD-ROM d. Keyboard e. Modem f. Dot-matrix printer g. Audio speaker h. POS device i. MICR reader j. La

> In Discussion Question 2-1, you discussed intranets and extranets, and identified the importance of each to accountants. Now, assume that you are a partner in a medium sized, local CPA firm. Your firm has 4 partners,10 staff accountants, 1 research assistan

> Visit the home page of a DTSS. How much does your service charge? Do you think these fees are reasonable? Why or why not?

> A number of accounting journals now post back issues or even publish their entire journals online. Access the Journal of Accountancy website at www.aicpa.org (or another website selected by your instructor). Select an article that pertains to a topic in

> The messages below were encrypted using the technique illustrated in Figure 2-11 (using displacement keys other than 5). Using trial and error, decode them. Hint: This task becomes easy if you use an Excel spreadsheet and V Look Up formulas that referenc

> The Internet uses many acronyms. Within the context of the present chapter, what words were used to form each of the following? a. B2B b. B2C c. C2C d. DNS e. EC f. EDI g. Email h. HTTP i. ICANN j. IDEA k. IDS l. IETF m. IoT n. IP address o. ISP p. SaaS

2.99

See Answer