2.99 See Answer

Question: Why would perpetual inventory records be preferable


Why would perpetual inventory records be preferable to periodic inventory records in a manufacturing company?


> What are the objectives of a system of internal control?

> What is the underlying purpose of the restrictions on CPA firms in Section 201 of the Sarbanes–Oxley Act?

> Is there a difference between ethical obligations and legal obligations with regard to online privacy?

> What are some of the ethical obligations of companies related to e-commerce?

> In what ways are XBRL financial statements advantageous compared with traditional paper financial statements?

> Why is the use of XML advantageous in Internet EDI?

> What types of controls should be used to properly limit access in intranets and extranets?

> Which type of users should have access to an extranet?

> Which type of users should have access to an intranet?

> What are the three levels of network platforms that are utilized in e-business, and which groups use each level?

> How are activities in the supply chain interdependent?

> Which functions within the supply chain can be enhanced through the use of e-business?

> There are four methods of system conversion: parallel, direct cutover, pilot, and phase‐in. Describe these four methods and how they differ.

> Why is it important to ensure an efficient flow of goods throughout the supply chain?

> Describe the concept of a supply chain.

> What is meant by “monitoring and enforcement” regarding online privacy practices?

> If you could condense the ten areas of Online Privacy in the AICPA Trust Services Principles, into a shorter list (three-, four-, or five-point list), how would you word that list?

> According to the Online Privacy section of the AICPA Trust Services Principles, what types of personal information should be protected?

> What are the differences between bricks-and mortar retailers and clicks-and-mortar retailers?

> Which types of costs can be reduced when a company decides to engage in B2C e-commerce on the Internet?

> How quickly did Internet usage by the public grow after the Internet was opened to business transactions in 1994?

> Why is a standard protocol necessary in computer networks?

> Why was ARPANET designed with many different alternative routes for network traffic?

> Describe the purpose of business process reengineering during the system analysis phase.

> What was the original purpose of the network of computers that eventually became the Internet?

> Why is data considered a valuable resource worthy of extensive protection?

> What are the first three rules of normalization? What is meant by the statement that the rules of normalization are additive?

> Which type of database model has the most flexibility for querying? How does this flexibility assist management?

> What language is used to access data from a relational database? Why is the language advantageous when accessing data?

> How is the primary key used in a relational database?

> Within a hierarchical database, what is the name for the built‐in linkages in data tables? Which data relationships can be contained in a hierarchical database?

> What four conditions are required for all types of databases?

> What is the term for the software program(s) that monitors and organizes the database and controls access and use of data? Describe how this software controls shared access.

> Differentiate between data redundancy and concurrency.

> Briefly explain a situation at your home, university, or job in which you think somebody used computers unethically. Be sure to include an explanation of why you think it was unethical.

> Which type of data storage medium is most appropriate when a single record of data must be accessed frequently and quickly?

> How does data differ from information?

> Explain the importance of full disclosure in source of capital processes.

> How do processes with large volumes of transactions make fraudulent behavior easier?

> How does time horizon affect the type of information in internal reports?

> In an IT accounting system, which IT controls ensure the security of the general ledger?

> How is a special journal different from a general journal?

> Why are internal controls less effective in capital and investment processes?

> How are IT systems potentially useful in monitoring funds flow?

> How does the specific authorization and management oversight of source of capital processes affect internal controls?

> Application controls include input, processing, and output controls. One type of input control is source document controls. Briefly explain the importance of each of the following source document controls: a. Form design b. Form authorization and contr

> How would you describe capital?

> When IT systems are used in conversion processes, what are some of the resulting advantages to the organization?

> Which three activities in the conversion process should require specific authorization before they are begun?

> What should be done when unfavorable variances are discovered?

> What is the purpose of determining standard costs?

> What is the purpose of the quality control department?

> What is the overall goal of the inventory control department?

> What is the purpose of an inventory status report?

> What are the conversion responsibilities of the maintenance and control, inventory control, inventory stores, and human resources departments?

> Explain the risk categories for cloud computing and how these risks may differ from a company that maintains its own IT hardware, software, and data.

> Differentiate between a routing slip and an inventory status report.

> What types of information must be taken into consideration when scheduling production?

> What are the two types of documents or reports that are likely to trigger the conversion process?

> Differentiate between the roles of the engineering and the research and development departments.

> Differentiate between a bill of materials and an operations list.

> Why are conversion activities typically considered routine data processes?

> Do conversion processes occur in manufacturing companies only? Why, or why not?

> What are the three resources that an organization must have to conduct a conversion (or transformation) process?

> How does the misclassification of fixed asset expenditures result in misstatement of financial statements?

> Why might a supervisor collude with an employee to falsify time cards?

> For each of the following parts of an IT system of a company, write a one‐sentence description of how unauthorized users could use this as an entry point: a. A local area network (LAN) b. A wireless network c. A telecommuting worker d. A company webs

> What negative things might occur if fixed asset software systems lacked appropriate access controls?

> Why is the beginning of a fiscal year the best time to implement a fixed asset software system?

> Explain why a real‐time update of fixed asset records might be preferable to batch processing of fixed asset changes.

> Why are some fixed assets susceptible to theft?

> Why is it important to conduct an investment analysis prior to the purchase of fixed assets?

> Fixed assets are purchased and retired frequently. Given this frequent change, why are clear accounting records of fixed assets necessary?

> What are the advantages of outsourcing payroll?

> What are the advantages of automated time keeping such as bar code readers, or ID badges that are swiped through a reader?

> Why do payroll processes result in sensitive information, and what is the sensitive information?

> Why is it important to use an independent paymaster to distribute paychecks?

> For each AICPA Trust Services Principles category shown, list a potential risk and a corresponding control that would lessen the risk. An example is provided. EXAMPLE Security: Risk: A hacker could alter data. Control: Use a firewall to limit unauthori

> What is the purpose of supervisory review of employee time cards?

> Explain the reasons for an organization having a separate bank account established for payroll.

> Why is it important that the human resources department maintain records authorizing the various deductions from an employee’s paycheck?

> Even though payroll and fixed asset processes may not be as routine as revenue processes, why are they just as important?

> What techniques can a company use to reveal problems concerning potential exposure to unauthorized access to its systems?

> Identify three ways that buyers and sellers may be linked electronically.

> Identify each category of risk that can be reduced by using authority tables, computer logs, passwords, and firewalls.

> What is typically the most time‐consuming aspect of the expenditures process?

> What paper document is eliminated when ERS is used?

> What can a company do to protect itself from business interruptions due to power outages?

> Each of the given situations is independent of the other. For each, list the programmed input validation check that would prevent or detect the error. a. The ZIP code field was left blank on an input screen requesting a mailing address. b. A state abbr

> How is an audit trail maintained in an IT system where no paper documents are generated?

> Explain how system availability problems could cause cash management problems.

> List three examples of BPR used in the expenditures processes.

> What are the advantages of BPR?

> What accounting records are used by accounts payable personnel to keep track of amounts owed to each vendor?

> Why should accountants periodically review the sequence of checks issued?

> During the process of reconciling the bank account, why is it necessary to review the dates, payees, and signatures on the canceled checks?

> Why would some checks need to include two signatures?

> Which department is responsible for making sure that payments are made in time to take advantage of vendor discounts?

> Under what circumstances would it be necessary to manually update accounts payable prior to the receipt of a vendor’s invoice?

> Discuss the accuracy of the following statements regarding internal control: • The more computerized applications exist within a company’s accounting system, the lower the risk will be that fraud or errors will occur. • The more involved top management

2.99

See Answer