Why are calculated fields created with database queries? Why not create them directly with reports?
> What is the function of secondary storage? Describe three types of secondary storage media, and describe the advantages and disadvantages of each type.
> Robert Berry is the managing partner for Berry & Associates (B&A), LLP. He was recently reviewing the firm’s income statement for the previous quarter, which showed that auditing revenues were about 5% below last year’s totals while tax revenues were abou
> How does information technology auditing differ from financial auditing? Make a list of the skills you think are important for financial auditors and for IT auditors. Do you think all auditors should have all the skills on both lists? Why or why not?
> Identify several types of printers. What are the advantages and disadvantages of each type?
> Identify the three sections of a CPU, and describe the functions of each component. How are microprocessor speeds measured? Why are such speeds rarely important to AISs?
> How do you feel about red-light cameras? Should cities be allowed to use them? Why or why not?
> Name several types of computer input devices, and explain in general terms how each one functions.
> Why do most AISs try to avoid data transcription?
> Why is information technology important to accountants?
> The Business Software Alliance (www.BSA.org) is a non profit organization dedicated to fighting illegal software copying (software piracy). The organization estimates that one in five software programs is unlicensed and therefore illegal. Is copying a sprea
> What are computer programming languages? Name some specific languages, and describe briefly an advantage of each.
> Name some general classes of application software. What tasks do each of your software classes perform?
> What are windowing operating systems, multitasking operating systems, and graphical user interfaces? Why are they useful to AISs?
> Blazer Interactive is a software company that focuses on first-person player video games. In 2013, Blazer’s CEO, Alexander James, introduced a revolutionary new gaming console to his company’s product line. The z/Station’s primary draw was a virtual reali
> What are the names of some current cloud computing vendors other than those discussed in the text? Should all firms use cloud vendors, or are there some reasons why they should be avoided?
> What is client/server computing? How does it differ from host/mainframe computing? What are some of the advantages and disadvantages of client/server systems?
> What are local area networks? What advantages do LANs offer accounting applications?
> What are data communication protocols? Why are they important?
> Why is it important to view an AIS as a combination of hardware, software, people, data, and procedures?
> What is EDI? Why do companies use EDI?
> Describe some important uses of electronic commerce and explain why electronic commerce is important to accountants.
> How does XBRL compare to the IDEA database?
> What is HTML? How does it differ from XML and XBRL? (Note: For a more comprehensive description of the differences, you may want to search the Internet.)
> How are the comments on social media sites useful to businesses? How are these sites useful to accountants?
> Mattie and Jaime have been friends since grammar school, but they now both attend State University. As agreed, they met under the big tree—a common meeting place for students. “How did your interview go at Forest Meadows?” asked Mattie as they both sat d
> Is bitcoin still a viable currency? Use an Internet search engine to find out. If so, what is the exchange rate for one bitcoin in the currency of your country? Would you buy a bitcoin? If so, why? If not, why not?
> What are blogs? How are they used? Who is using them?
> What is click fraud? Who benefits and who loses when click fraud occurs?
> Most retail sales websites require customers to use their credit cards to make purchases online. How comfortable are you in providing your credit card number in such applications? Why do you feel this way?
> Analysts claim that businesses can increase sales on the Internet, but not profits. What evidence does this chapter provide to support or refute this claim? Discuss.
> What are digital signatures? Why do businesses use them? How can businesses use a digital certificate for Internet security?
> Describe and contrast the three types of authentication. Can you think of a business situation where someone would need to use a combination of all three levels to gain access to information?
> What is data encryption? What techniques are used for data encryption?
> What are Internet firewalls and proxy servers? How are they created? How do businesses use them for Internet security?
> What is spamming? How is spam related to accounting information systems? Should all spamming be illegal? Why or why not?
> Implementation of a new AIS went smoothly, for the most part. It is 15 years later, and now HMC is interested in mapping a variety of their business processes to determine whether improvements can be made and whether business process reengineering should
> In this chapter we talked about predictive analytics and big data. Using the Internet and your research skills, identify the skills and abilities accounting majors might need (i.e., what type of courses should you take while at your university) to levera
> This chapter stressed the importance of IT for understanding how AISs operate. But is this the only skill valued by employers? How important do you think “analytical thinking skills” or writing skills” are? Discuss.
> This chapter described several career opportunities available to students who combine a study of accounting with course work in information systems, and/or computer science. Can you think of other jobs where these skill sets would be desirable?
> What are electronic payments? How are they different from credit card payments?
> Would you rather use the Report Wizard to create the format of a report or design one yourself from scratch? Why?
> Do you think that we will still use hard-copy reports in the future, or will they be replaced with soft-copy ones? Defend your answer.
> The chapter suggested that it is important to design the format of a report before creating the report itself. Do you agree or disagree?
> What is the purpose of a database report? What information do such reports contain?
> Why do database developers customize forms? Why isn’t it sufficient to use the form as initially created by the Form Wizard?
> What is a sub form? Why do forms have sub forms? How do you create sub forms in Access?
> Dick Hammaker has been fascinated with Corvette cars, especially convertibles, since he was a teenager. Dick grew up in Michigan and worked part-time through his high school and college years at a car manufacturer, so he knew the business well. Not surpr
> To create a form, would you rather use the Form Wizard in Access or create the form from scratch? Why?
> Would you rather use a form or a datasheet for entering data into a database table? Why?
> What is a calculated field in a report? Provide some examples. Why do reports contain calculated fields?
> What are some of the advantages and disadvantages of database forms?
> What is SQL? How is SQL like an Access query? How is it different?
> What are data manipulation languages? How are these languages related to database management systems? How are these languages related to databases?
> A data-entry clerk at Watanabe and Associates recently questioned the need for validation rules in database tables. “After all,” he stated, “if you make a mistake entering data, you can always go back and fix it later—if someone discovers your mistake.” D
> What is data validation? Why is it important? Give some examples of how to validate data inputs using Access.
> Why do database developers link tables together? How is this done using Access?
> Bill Barnes and Tom Freeman opened their BSN bicycle shop in 2010. Not counting Jake—a friend who helps out occasionally at the store—Bill and Tom are the only employees. The shop occupies a small commercial space that was once a restaurant. The former k
> What are data definition languages (DDLs)? How are they related to DBMSs?
> What are database management systems? Are they the same as databases?
> Identify the different data types available for creating data fields in Microsoft Access. Similarly, identify the different types of numbers (e.g., Long integer) you can use if you define a field as a number. (Hint: Create a data field in a throwaway databas
> Suppose that a data modeler creates a database that includes a Sales table and a Salesperson table. Would you be likely to need a relationship table to link these two entities? Why or why not?
> What is the REA model? How does REA differ from more traditional accounting views of data collection and storage? Hint: Would a traditional accounting database store data about personnel matters?
> Describe each of the following database issues that are relevant to accounting systems, and give an example of each: (1) data integrity, (2) transaction accuracy and completeness, (3) concurrency processing, and (4) security.
> Name some specific accounting files and a potential primary key for each one.
> What are primary keys in accounting databases and what purpose(s) do they serve?
> What is the hierarchy of data in databases? Provide an example for a particular accounting application.
> Amazon designed its Echo devices to listen, and respond to, voice commands. But in December of 2016, police in Arkansas sought the audio recordings of Victor Collins for another reason—to help them solve his murder. As the case unfolded, it because clear
> Jason Saving is an IT auditor for a large, public accounting firm. His manager has assigned him to the Consolidated Company audit. The IT auditors must complete several evaluating and testing procedures in order to help determine the scope of financial aud
> What is the process of normalization? What levels are there, and why do database developers seek to normalize data?
> Why are databases important for accounting information systems? Describe some concerns, and explain why each one is important.
> Three methods for implementing a new system in an organization are direct conversion, parallel conversion, and modular conversion. Discuss the advantages and disadvantages of using each of these three systems implementation methods.
> When implementing a new computer system, two activities required are to (1) establish controls and (2) convert data files. What is the rationale for performing activity 1 before activity 2?
> What is the purpose of a systems specifications report? In what ways, if any, do the data included in this report differ from the data accumulated by the design team during their feasibility evaluation work?
> What is prototyping? Under what circumstances should prototyping be used? Under what circumstances should it not be used?
> Discuss some of the annual cash benefits and annual cash costs that a company might have when it creates an online ordering system on the World Wide Web.
> What is the purpose of a systems feasibility evaluation? Should this activity precede or follow the preparation of a systems specifications report for computer vendor evaluation? Explain.
> A systems study team should understand three levels of corporate goals: general systems goals, top management systems goals, and operating management systems goals. If you had to select one of these categories of systems goals as the most important to th
> What is a steering committee? Discuss its role in a systems study performed by a consulting firm.
> Tiffany Martin is an audit manager in a medium-sized public accounting firm. Tiffany graduated from college 7 years ago with a degree in accounting. She obtained her CPA certification soon after she joined the firm where she currently works. Tiffany is a fin
> What is the difference between “outsourcing” and “off shoring?” Why might this difference be important to managers?
> What is the difference between business process outsourcing (BPO) and knowledge process outsourcing (KPO)? Why do many organizations outsource at least some of their accounting functions?
> Discuss the two major ways that a company’s software can be acquired. Which of these ways for acquiring software do you recommend? Explain your reasoning.
> What is the purpose of follow-up in a systems study? Describe some of the specific activities that the management implementation team would perform in their follow-up work.
> What is a PERT chart? What is a Gantt chart? Discuss the advantages and disadvantages of using PERT network diagrams versus Gantt charts for planning and controlling the activities involved in implementing an information system.
> Discuss the major differences between the planning, analysis, and design phases of a systems study.
> What are CASE tools? How are they used? How do CASE tools create documentation for AISs? If you were a systems analyst, would you use a CASE tool?
> What is the purpose of a decision table? How might decision tables be useful to accountants?
> Look at the process map in Figure 12-13. Trace the steps in the order fulfillment process. Do you think this figure is more helpful than a narrative would be in understanding the flow of events in the process?
> Why are data flow diagrams developed in a hierarchy? What are the names of some levels in the hierarchy?
> Kara and Scott Baker own a small retail company, Basic Requirements, with one store located in a small college town and a website through which customers can make purchases. The store sells traditional but up-to-date clothing for young women such as tee-
> What are document flowcharts? How does a document flowchart assist each of the following individuals: (1) a systems analyst, (2) a systems designer, (3) a computer programmer, (4) an auditor, and (5) a data security expert?
> Distinguish between document flow charts, system flow charts, data flow diagrams, and program flow charts. How are they similar? How are they different?
> What is end-user computing? Why is documentation important to end-user computing? What guidelines should companies develop to control end-user computing?
> Why is documentation important to accounting information systems? Why should accountants be interested in AIS documentation?
> What cybercrimes are committed on the Internet? What assets are involved? What can be done to safeguard these assets?
> How can educating employees help stop cybercrime?
> What is a computer virus?
> Consider the number of IoT devices you own. Have you taken appropriate steps to secure them from becoming compromised? Do you believe that consumers have an obligation to secure these?
> What enabled the employees at TRW to get away with their crime? What controls might have prevented the crime from occurring?
> Does a company have the right to collect, store, and disseminate information about your purchasing activities without your permission?