SlideShare a Scribd company logo
1 of 73
ACC 564 Entire Course
FOR MORE CLASSES VISIT
www.acc564nerd.com
Please check the details below
ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS
ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2
David Miller
ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2
Papers)
ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-
Oxley Act (SOX)
ACC 564 Week 4 DQ 1 The Cloud Effect and DQ 2 Securing Data
ACC 564 Week 4 Assignment Hacking the AIS (2 Papers)
ACC 564 Week 5 DQ 1 Integrity vs. Availability and DQ 2 The 21st
Century Auditor
ACC 564 Week 6 DQ 1 Revenue Cycle and DQ 2 Expenditure Cycle
ACC 564 Week 7 DQ 1 Professional Service Organizations and DQ 2
General Ledger and Reporting Systems
ACC 564 Week 7 Assignment 3 Fraud in the AIS (2 Papers)
ACC 564 Week 8 DQ 1 Relational Databases and DQ 2 The REA Data
Model
ACC 564 Week 9 DQ 1 Systems Analysis and DQ 2 AIS
ACC 564 Week 10 DQ 1 Implementation and DQ 2 Operation
ACC 564 Week 10 Assignment 4 Changing the AIS (2 Papers)
ACC 564 Week 11 DQ 1 Looking Back and DQ 2 Looking Ahead
ACC 564 Week 3 Quiz 1
ACC 564 Week 5 Quiz 2
ACC 564 Week 8 Quiz 3
ACC 564 Week 9 Quiz 4
ACC 564 Final Exam Part 1
ACC 564 Final Exam Part 2
==============================================
ACC 564 Final Exam Part 1
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Final Exam Part 1
Course Accounting Info Systems
Question 1 .
An accounting information system (AIS) processes ________ to provide
users with ________.
. Question 2 .
Paid time-off policies, job descriptions, and procedures manuals are
examples of information needed to support key decisions in what
business process?
. Question 3 .
Which of the following is a primary activity in the value chain?
. Question 4 .
A change in the AIS that makes information more easily accessible and
widely available within an organization is most likely to first influence
the
. Question 5 .
A frantic StroFrinzel called the home office from Des Moines. "You
have got to help me. I am about to close a great sale, but I have to be
able to guarantee delivery by the fourteenth. I can't get through to the
company Web site to verify delivery!" "Thank you for calling. Your call
is very important to us. However, all of our lines are currently in use.
Please try again later." Which of the following characteristics of useful
information is absent in the situation described above?
. Question 6 .
The coding technique most likely used for sales orders is called a
. Question 7 .
The quality assurance department at a large manufacturing business
enters data into the AIS that is used to produce a weekly report that
summarizes the proportion of defective units in each product line. This
is an example of
Question 8 .
A specialized journal
. Question 9 .
Data must be collected about three facets of each business activity. What
are they?
. Question 10 .
A specialized journal would be most likely to be used to enter
. Question 11 .
The Union Soup Kitchen is a non-profit organization that collects,
stores, prepares and provides food to the homeless in Erie, Pennsylvania.
Donations of food are recorded in a database and a receipt is provided to
the donor. When food is used, the database is updated so that it always
reflects the amounts and types of food that are available. In a data flow
diagram, which type of symbol would be used to represent the flow of
data from the donor into the system?
. Question 12 .
A flowchart that depicts the relationships among the input, processing,
and output of an AIS is
. Question 13 .
In a data flow diagram of the customer payment process, "Customer
payment" will appear above or in
. Question 14 .
In general, a data destination will be shown by
. Question 15 .
In preparing a DFD, when data are transformed through a process, the
symbol used should be
. Question 16 .
When the human resources manager wants to gather data about vacation
and personal day usage by employees and by departments, the manager
would use which language?
. Question 17 .
The potential inconsistency that could occur when there are multiple
occurrences of a specific data item in a database is called the
. Question 18 .
The schema that provides an organization-wide view of the entire
database is known as the
. Question 19 .
The database requirement that foreign keys must be null or have a value
corresponding to the value of a primary key in another table is formally
called the
. Question 20 .
In a relational database, requiring that every record in a table have a
unique identifier is called the
. Question 21 .
Which of the following is an opportunity that could contribute to
employee fraud?
. Question 22 .
Which of the following is the greatest risk to information systems and
causes the greatest dollar losses?
. Question 23 .
One fraudulent scheme covers up a theft by creating cash through the
transfer of money between banks. This is known as
. Question 24 .
Most frauds are detected by
. Question 25 .
The most efficient way to conceal asset misappropriation is to
. Question 26 .
A fraud technique that slices off tiny amounts from many projects is
called the ________ technique.
. Question 27 .
Computer fraud perpetrators that modify programs during systems
development, allowing access into the system that bypasses normal
system controls are using
. Question 28 .
A fraud technique that allows a perpetrator to bypass normal system
controls and enter a secured system is called
. Question 29 .
Computer fraud perpetrators who use telephone lines to commit fraud
and other illegal acts are typically called
. Question 30 .
A ________ is similar to a ________,except that it is a program rather
than a code segment hidden in a host program.
. Question 31 .
________ controls prevent, detect and correct transaction errors and
fraud.
. Question 32 .
According to the ERM, these objectives help ensure the accuracy,
completeness and reliability of internal and external company reports.
. Question 33 .
Generally in a risk assessment process, the first step is to
. Question 34 .
The process that a business uses to safeguard assets, provide accurate
and reliable information, and promote and improve operational
efficiency is known as
. Question 35 .
According to the ERM, these help the company address all applicable
laws and regulations.
. Question 36 .
Which of the following is an example of a corrective control?
. Question 37 .
The process of turning off unnecessary features in the system is known
as
. Question 38 .
The process that screens individual IP packets based solely on the
contents of the source and/or destination fields in the packet header is
known as
. Question 39 .
According to the Trust Services Framework, the reliability principle of
integrity is achieved when the system produces data that
. Question 40 .
Compatibility tests utilize a(n) ________,which is a list of authorized
users, programs, and data files the users are authorized to access or
manipulate.
. Question 41 .
Which of the following is not one of the three important factors
determining the strength of any encryption system?
. Question 42 .
Which of the following descriptions is not associated with symmetric
encryption?
. Question 43 .
An electronic document that certifies the identity of the owner of a
particular public key.
. Question 44 .
Which of the following is not one of the 10 internationally recognized
best practices for protecting the privacy of customers' personal
information?
. Question 45 .
These are used to create digital signatures.
. Question 46 .
This determines the correctness of the logical relationship between two
data items.
. Question 47 .
This determines if characters are of the proper type.
. Question 48 .
Check digit verification is an example of a(n)
. Question 49 .
This batch processing data entry control sums a non-financial numeric
field.
. Question 50 .
What is the most effective way to ensure information system
availability?
==============================================
ACC 564 Final Exam Part 2
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Final Exam Part 2
Question 1
In the ________ stage of an operational audit, the auditor measures the
actual system against an ideal standard.
Question 2
An auditor finds that employee absentee rates are significantly higher on
Mondays and Fridays than on other work days. This is an example
collecting audit evidence by
Question 3
The ________ to auditing provides auditors with a clear understanding
of possible errors and irregularities and the related risks and exposures.
Question 4
According to the risk-based auditing approach, when a control
deficiency is identified, the auditor should inquire about
Question 5
Control risk is defined as the
Question 6
During the sales order entry process, a ________ is performed to verify
that each transaction record contains all appropriate data items.
Question 7
The shipping department at Squishy Things Toy Company follows
policies that determine which carrier will deliver orders according to the
size, weight, and destination of the shipment. It maintains standing
agreements with shippers that specify legal responsibility for the
shipment while it is in transit. The terms of the agreements are
documented on
Question 8
When an ERP is used, it is assumed that there will be increases in
efficiency and the effectiveness of the activities related to the revenue
cycle. However, what must be in place and functioning well to fully
realize these benefits?
Question 9
Which of the following documents would normally trigger the process to
record a customer payment?
Question 10
A type of business document in which part of the original document is
returned to the source for further processing is called a ________
document.
Question 11
Duties in the expenditure cycle should be properly segregated to
promote internal control. This means that the authorization function is
performed by ________,the recording function is performed by
________,and cash handling is performed by the ________.
Question 12
Procurement cards differ from corporate credit cards in which of the
following ways?
Question 13
What control should be put in place that assigns responsibility for EFT
payments made to vendors?
Question 14
Economic Order Quantity (EOQ) includes several variables that must be
taken into consideration when calculating the optimal order size. One
variable, the costs associated with holding inventory, is referred to as
Question 15
The traditional approach to inventory management to ensure sufficient
quantity on hand to maintain production is known as
Question 16
When using electronic documents, ________ increase the accuracy of
data entry.
Question 17
Which department should have the sole ability to provide information to
the AIS about hiring, terminations, and pay rate changes?
Question 18
The document that lists each employee's gross pay, payroll deductions,
and net pay in a multicolumn format is called
Question 19
Companies that specialize in processing payroll are known as
Question 20
Which of the following will limit a firm's potential loss exposure from
paycheck forgery?
Question 21
Recording interest earned on an investment is an example of which type
of adjusting journal entry?
Question 22
Departments that mostly provide services to other units and charge those
units for services rendered should be evaluated as ________ centers.
Question 23
Cheryl Liao is an accountant at Folding Squid Technologies. While
making an adjusting entry to the general ledger, she received the
following error message, "Your journal entry must be a numeric value.
Please reenter." This message was the result of a
Question 24
Budgets and performance reports should be developed on the basis of
Question 25
An adjusting entry made at the end of an accounting period that reflects
the exchange of cash prior to performance of a related event is classified
as a(n)
Question 26
Each event in an REA model will in most cases have at least one
________ agent and one ________ agent involved with the event.
Question 27
The REA data model
Question 28
Which of the following transactions is represented by the diagram
below?
Question 29
An entity-relationship (E-R) diagram
Question 30
Relationships that affect the quantity of a resource are sometimes
referred to as ________ relationships.
Question 31
Refer to the table below, which shows the results of payback, net present
value, and internal rate of return analysis of four projects. Which is
preferred by the net present value criterion?
Question 32
When using the payback method to determine economic feasibility of
projects, the company usually accepts the project with the
Question 33
Who is responsible for preparing the specifications that are used to
create the programs?
Question 34
Refer to the table below, which shows the results of payback, net present
value, and internal rate of return analysis of four projects. Which is
preferred by the payback criterion?
Question 35
The capital budgeting technique where estimated future cash flows are
discounted back to the present is referred to as
Question 36
When canned software is used for systems acquisition, the maintenance
aspect of the operations and maintenance phase of the SDLC
Question 37
BenathirDonathat, director of the project committee, has received
approval from management for implementation of a new accounting
information system. After putting out an RFP, the committee settled on a
vendor that will provide an industry standard software package and post-
sale technical support. The committee decided to go with
Question 38
The ________ method calculates and compares the processing times of
different AIS to compare system performance.
Question 39
End-user computing is likely to result in a(n)
Question 40
What would be one duty of second-line help desk personnel?
Question 41
One process used to uncover and eliminate program errors is known as
Question 42
Who is responsible for identifying such risk factors in an
implementation plan?
Question 43
Which of the following describes a phase-in conversion?
Question 44
Phil in Marketing got a call from Chuck in ITS. "Phil, the system just
generated a stock-out report. I wanted to give you a heads up. I'm
sending it right over." This is an example of a
Question 45
Chuck in ITS got a call from Phil in Marketing. "Chuck, I need you to
do something for me. Query sales data for the first quarter and pull out
all of the invoices that include the snow blower discount. I need a count
and the total amount of the discount. Thanks." This is an example of a
==============================================
ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 1 Discussion Questions
Week 1 Discussion 1
"Value of Information" Please respond to the following:
Firms realize that in order to make money, they have to invest money.
This can be attributed to the information that the firm relies on. As
discussed in the text, there are seven characteristics of useful
information. From the first e-Activity and assuming that you are CFO of
University, identify the top-three characteristics you would rely on the
most for improving the profitability of the firm. Provide an example of
how each characteristic would directly help the firm in terms of
profitability.
On the other hand, public and private firms are accountable to a wide
range of regulators and stakeholders. Of the seven characteristics,
identify the top three that would be applicable to meeting the needs of
regulators and stakeholders. Provide an example of how each
characteristic would directly help the firm in terms of meeting the
needs of these key regulators and stakeholders.
Week 1 Discussion 2
"Impact of Design of an Accounting Information System (AIS)" Please
respond to the following:
Some of the world’s most successful companies (Fortune 500) operate
multiple lines of business. Despite this fact, many of these firms rely on
a single AIS. From the second e-Activity, for the business you
researched, examine how its lines of business would affect the design
of a AIS.
If the business was selecting a AIS, examine how the business model
would affect the design of a AIS.
==============================================
ACC 564 Week 2 Assignment 1 Information Needs for the
AIS (2 Papers)
FOR MORE CLASSES VISIT
www.acc564nerd.com
This Tutorial contains 2 Different Papers
ACC 564 Week 2 Assignment 1 -
Assignment 1: Information Needs for the AIS
In 1967, Russell Ackoff presented a classical analysis of misinformation
in management (Ackoff’s Management Misinformation Systems, Case
1-2, located in your Blackboard course shell). Now, you need to fast-
forward to the present. After reading the case, craft your own version of
misinformation in management by developing five (5) key incorrect
assumptions that management makes about its accounting information
systems.
For this assignment, research the Internet or databases for information
related to improper assumptions concerning accounting information
systems.
Write a five to seven (5-7) page paper in which you:
Based on your research, assess how corporate leaders may make
improper assumptions related to accounting information systems and the
related information. Indicate the most negative potential impacts on
business operations related to these assumptions. Provide support for
your rationale.
Suggest three to four (3-4) ways in which organizational performance
may be improved when information is properly managed within a
business system. Provide support for your rationale.
Evaluate the level of system security (i.e., high, medium, low) needed to
ensure information integrity within automated business systems. Provide
support for your evaluation.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times Roman font (size 12), with one-
inch margins on all sides; citations and references must follow APA or
school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Examine and use data flow diagrams and flowcharts to understand,
evaluate, and design information systems.
Evaluate the approaches and techniques that are used to commit and
prevent computer fraud.
Use technology and information resources to research issues in
accounting information systems.
Write clearly and concisely about accounting information systems using
proper writing mechanics.
==============================================
ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools
and DQ 2 David Miller
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 2 Discussion Questions –
Week 2 Discussion 1
"Evaluation of Documentation Tools" Please respond to the following:
You have been assigned to analyze the accounting information for a
Fortune 500 corporation. From the e-Activity, evaluate which tools you
would use to analyze its business processes, indicating your rationale.
On the other hand, resources, such as accountants, business analysts, and
I/T specialists who rely on documentation tools, will need proper
training on these tools. You have been given the responsibility of
familiarizing your team with these tools. Evaluate which techniques, in
terms of their appropriateness, you would use to get your team ready for
its first assignment—the evaluation of a firm’s internal control structure.
Week 2 Discussion 2
"David Miller" Please respond to the following:
Read the David Miller case from Chapter 5. After reading the case,
describe a reason why someone who has been entrusted with the firm’s
assets would commit a fraudulent act against the company. Based upon
your understanding of the case and your professional and personal
experience, recommend a series of actions that should have been taken
in order to prevent this.
Now that the damage has been done by Mr. Miller after his last episode,
the blame game begins. Review all of the parties who contributed to his
ability to commit these acts, recommend who should be held liable, and
suggest the punishment for the liable party / parties.
==============================================
ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the
Sarbanes-Oxley Act (SOX)
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 3 Discussion Questions –
Week 3 Discussion 1
"Attacks" Please respond to the following:
You have been hired by the CFO of University to develop a plan to
protect its accounting and financial systems at a reasonable cost. Suggest
a high-level plan for the CFO. Provide support for your suggestion.
Based on your security plan recommendation, determine the system
aspect that is most likely to be violated.
Week 3 Discussion 2
"Revamping the Sarbanes-Oxley Act (SOX)" Please respond to the
following:
We know that the Sarbanes-Oxley Act was created as the result of
several high-profile fraud cases. Now that the act is over 10 years old,
many think that it needs to be updated to reflect the changing times.
From the e-Activity, identify and discuss at least three changes that
should be made to the act, indicating why these changes are necessary.
Create an argument supporting three items in the act that you would not
change.
==============================================
ACC 564 Week 3 Quiz 1
.FOR MORE CLASSES VISIT
www.acc564nerd.com
Question 1
A well-designed AIS can improve the decision-making function within
the organization. Which statement below would describe a limitation,
rather than a benefit, of an efficient AIS?
Question 2
The transaction cycle that includes the events of hiring employees and
paying them is known as the
Question 3
Paid time-off policies, job descriptions, and procedures manuals are
examples of information needed to support key decisions in what
business process?
Question 4
Which of the following is a primary activity in the value chain?
Question 5
The business owners obtain financing from outside investors, which
results in an inflow of cash into the company. This transaction is
considered to be part of which cycle?
Question 6
Changing an employee's hourly wage rate would be recorded in which
file?
Question 7
When the sum of all entries in the subsidiary ledger equals the balance in
the corresponding general ledger account, it is assumed that
Question 8
Which of the following is conceptually similar to a journal in a manual
AIS?
Question 9
In an ERP system, the module used to record data about transactions in
the revenue cycle is called
Question 10
An audit trail
Question 11
In general, a data destination will be shown by
Question 12
Chas Mulligan has been hired by Yardley Security as an assistant to the
internal auditor. He has been asked to thoroughly document the existing
accounting information system in preparation for making
recommendations for improvements to internal controls. He decides to
begin with a description of the information stored in paper records, their
sources, and their destinations. The documentation tool that he should
employ for this purpose is a
Question 13
In a payroll processing DFD, the "prepare reports" activity will be
represented by ________,the "employee payroll file" will be
represented by ________,and the "management" will be represented by
________.
Question 14
The correct label for Shape 2 in the flowchart below is
Question 15
Chuck and Jill Scruggs travel in their motor home six months of the year
and buy unique artifacts. Within hours after the Scruggs make a
purchase, they have photographed it, written a description of it, and
posted it for sale on eBay with a reservation price. Anything that does
not sell within a week is shipped back to Austin, Texas, for display in
The House of Curiosities, a retail business that the Scruggs operate
during the balance of the year. Which symbol should be used to
represent the transfer of data to eBay in a context diagram of this
process?
Question 16
Most frauds are detected by
Question 17
Which characteristic of the fraud triangle often stems from a lack of
internal controls within an organization?
Question 18
Why is computer fraud often more difficult to detect than other types of
fraud?
Question 19
Which of the following is a financial pressure that could cause an
employee to commit fraud?
Question 20
One fraudulent scheme covers up a theft by creating cash through the
transfer of money between banks. This is known as
==============================================
ACC 564 Week 4 Assignment Hacking the AIS (2 Papers)
FOR MORE CLASSES VISIT
www.acc564nerd.com
This Tutorial contains 2 Different Papers
ACC 564 Week 4 Assignment 2 -
Assignment 2: Hacking the AIS
Due Week 4 and worth 240 points
In today’s technology environment, hackers present a substantial risk to
a firm’s accounting or business system. As the result of these attacks,
firms suffer huge losses, ranging from financial losses to losses in
confidence by consumers, creditors, and suppliers. Firms may have
made a significant investment in financial and non-financial resources to
secure these systems.
For this assignment, research the Internet or databases for information
related to business systems that have been hacked.
Write a five to seven (5-7) page paper in which you:
Based on the information you researched, evaluate the level of
responsibility of the company in terms of the effectiveness of the
response to the security breach. Provide support for your rationale.
Imagine that the company that you researched uses a third-party
accounting system. Assess the level of responsibility of the software
provider to both the business and its clients. Provide support for your
rationale.
Create an argument for additional regulation as a preventative measure
against businesses being hacked. Provide support for your argument.
Provide at least three (3) recommendations for businesses to secure their
systems and assets from hackers. Provide support for your
recommendation.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times Roman font (size 12), with one-
inch margins on all sides; citations and references must follow APA or
school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Examine control and security concepts related to accounting information
systems to ensure data integrity and safety.
Use technology and information resources to research issues in
accounting information systems.
Write clearly and concisely about accounting information systems using
proper writing mechanics.
==============================================
ACC 564 Week 4 DQ 1 The Cloud Effect and DQ 2 Securing
Data
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 4 Discussion Questions –
Week 4 Discussion 1
"The Cloud Effect" Please respond to the following:
Many firms are relying on cloud computing, also known as “the cloud,”
to perform key business functions. By moving transactional processing
to the cloud, firms are exposing themselves to additional attacks as well
as to tighter scrutiny from regulators and stakeholders. From the e-
Activity, assume that you are the CFO of Amazon.com. Create an
argument indicating how your firm will be able to balance the needs of
security with the desire of being a dominant player in the global market.
As the CFO, describe your top-three fears in competing in the global
market, and how you plan to overcome those fears. Provide support for
your rationale.
Week 4 Discussion 2
"Securing Data" Please respond to the following:
In this global age of information, suggest which threats are posed to the
principles of confidentiality and privacy, related to offshore outsourcing
of various information systems functions. Provide support for your
rationale.
Determine who should be held liable for any breaches that occur, and
indicate the course(s) of action that should be taken.
==============================================
ACC 564 Week 5 DQ 1 Integrity vs. Availability and DQ 2
The 21st Century Auditor
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 5 Discussion Questions –
Week 5 Discussion
"Integrity vs. Availability" Please respond to the following:
In the global enterprise, firms are insistent that their accounting
information systems (AIS) and other key systems are available 100% of
the time, and that these systems are the highest in integrity. Evaluate
how a firm manages the balance of high availability with high integrity
in these days of tight budgets and additional oversight from regulators.
As a student taking online classes or relying on online resources such as
libraries and tech support, evaluate the benefits of the school providing
you with 24 / 7 access to these resources in relation to the costs incurred
by the school itself.
Week 5 DB 2: "The 21st Century Auditor"
• The 21st century auditor requires knowledge of technology and
accounting information systems in addition to his / her understanding of
accounting concepts and guidelines. The degree of knowledge in
technology and AIS will vary with each auditor. Recommend the top-
five technology and AIS skills that the 21st century auditor should have.
Justify your recommendations.
Now, recommend a series of actions that need to be taken by auditors
and their firms to ensure that the auditors maintain their skills.
RELATED TUTORIALS
==============================================
ACC 564 Week 5 Quiz 2
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 5 Quiz 2
Question 1
Illegally obtaining and using confidential information about a person for
economic gain is known as
Question 2
The deceptive method by which a perpetrator gains access to the system
by pretending to be an authorized user is called
Question 3
Developers of computer systems often include a user name and
password that is hidden in the system, just in case they need to get into
the system and correct problems in the future. This is referred to as a
Question 4
A fraud technique that allows a perpetrator to bypass normal system
controls and enter a secured system is called
Question 5
When a computer criminal gains access to a system by searching records
or the trash of the target company, this is referred to as
Question 6
Generally in a risk assessment process, the first step is to
Question 7
Congress passed this federal law for the purpose of preventing financial
statement fraud, to make financial reports more transparent and to
strengthen the internal control of public companies.
Question 8
Corporate policy that requires a purchasing agent and purchasing
department manager to sign off on asset purchases over $1,500 is an
example of
Question 9
A ________ is created to guide and oversee systems development and
acquisition.
Question 10
What is one reason why AIS threats are increasing?
Question 11
When new employees are hired by Folding Squid Technologies, they are
assigned user names and appropriate permissions are entered into the
information system's access control matrix. This is an example of a(an)
Question 12
This protocol specifies the procedures for dividing files and documents
into packets to be sent over the Internet.
Question 13
Which of the following is an example of a preventive control?
Question 14
Multi-factor authentication
Question 15
Restricting access of users to specific portions of the system as well as
specific tasks, is
Question 16
Jeff Davis took a call from a client. "Jeff, I need to interact online and
real time with our affiliate in India, and I want to make sure that our
communications aren't intercepted. What do you suggest?" Jeff
responded "The best solution will be to implement
Question 17
Jeff Davis took a call from a client. "Jeff, I need for my customers to
make payments online using credit cards, but I want to make sure that
the credit card data isn't intercepted. What do you suggest?" Jeff
responded "The best solution will be to implement
Question 18
Which of the following is not associated with asymmetric encryption?
Question 19
Which of the following descriptions is not associated with symmetric
encryption?
Question 20
In developing policies related to personal information about customers,
Folding Squid Technologies adhered to the Trust Services framework.
The standard applicable to these policies is
==============================================
ACC 564 Week 6 DQ 1 Revenue Cycle and DQ 2
Expenditure Cycle
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 6 Discussion Questions –
Week 6 Discussion 1
"Revenue Cycle" Please respond to the following:
From the e-Activity, examine the steps necessary to complete a sale and
discuss how the sales order process is integrated with other processes
(credit and collections, delivery, etc.). Indicate your overall satisfaction
with the process.
From the e-Activity, recommend at least one improvement in the
Website’s sales order process you would implement to make it more
efficient in order to improve the customer experience. Then, assess
whether the recommendation meant to benefits the clients warrants the
potential cost of implementation for the company. Provide specific
examples to support your response.
Week 6 Discussion 2
"Expenditure Cycle" Please respond to the following:
Using your own present or previous place of work as an example,
propose a method for mitigating the problem of separate departments
(e.g., academics, student services, information technology, etc.) ordering
the same item.
From the proposal above, discuss the possible issues that implementing
the proposed method would cause to the organization. Suggest
additional controls that you would put into place to overcome the issues.
Provide specific examples to support your response.
==============================================
ACC 564 Week 7 Assignment 3 Fraud in the AIS (2 Papers)
FOR MORE CLASSES VISIT
www.acc564nerd.com
This Tutorial contains 2 Different Papers
ACC 564 Week 7 Assignment 3 –
Assignment 3: Fraud in the AIS
Due Week 7 and worth 280 points
For this assignment, research the Internet or databases to locate a firm
that was involved in a fraud and / or embezzlement case.
Explain how the firm’s accounting information system (i.e., components
and functions) contributed to the fraud and / or embezzlement. You will
need to focus on how each component / function of the accounting
information system failed, which resulted in the scandal / case.
Write a ten to twelve (10-12) page paper in which you:
Based on the information you researched, assess the failure of the firm’s
accounting information system to prevent the related fraud /
embezzlement.
Imagine that the company that you researched uses a third-party
accounting system. Evaluate the effectiveness of the firm’s stakeholder
in the event that a third-party accounting system suffers a breach.
Include an assessment of the level of responsibility of the software
provider to the business and its clients. Provide support for your
rationale.
Determine what advances in accounting and / or information technology
could have prevented the event from occurring. Provide support for your
argument.
Evaluate what changes should be made to both the Sarbanes-Oxley Act
of 2002 and other current laws in order to make them more effective in
deterring companies from committing crimes.
Recommend a strategy that the company you indicated may use to
prevent future business information failures. Indicate how the company
should approach the implementation of your recommended strategy.
Provide support for your recommendation.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times Roman font (size 12), with one-
inch margins on all sides; citations and references must follow APA or
school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Analyze the business activities that comprise an accounting information
system to determine the information needs to support decision-making
function.
Use technology and information resources to research issues in
accounting information systems.
Write clearly and concisely about accounting information systems using
proper writing mechanics.
==============================================
ACC 564 Week 7 DQ 1 Professional Service Organizations
and DQ 2 General Ledger and Reporting Systems
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 7 Discussion Questions –
Week 7 Discussion 1
"Professional Service Organizations" Please respond to the following:
You have been asked by the CFO of the company where you work or
previously worked to evaluate the use of a professional service
organization for processing the company’s payroll. Identify the top-three
issues that should be discussed when considering contracting the
services of a payroll service provider. Evaluate the impact, both positive
and negative, of each issue on the process in question. Provide specific
examples to support your response.
Using the information from the e-Activity, identify the key elements of a
plan to outsource your firm’s payroll function. For each element of the
plan, describe the impact of each element. Be sure that the elements
address the necessary controls needed to safeguard your firm’s personnel
data. Provide specific examples to support your rationale.
Week 7 Discussion 2
"General Ledger and Reporting Systems" Please respond to the
following:
Your firm is planning to move to International Financial Reporting
Standards (IFRS) reporting within the next fiscal year. Analyze the risks
and rewards by moving to IFRS and the impact that technology will
have on the change. Include the advantages and disadvantages of IRFS
compared to the Generally Accepted Accounting Principles (GAAP).
Provide specific examples to support your analysis.
Develop a proposal for migrating your firm to IFRS from GAAP.
Discuss how you will educate your users in IFRS.
==============================================
ACC 564 Week 8 DQ 1 Relational Databases and DQ 2 The
REA Data Model
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 8 Discussion Questions –
Week 8 Discussion 1
"Relational Databases" Please respond to the following:
From the e-Activity, assess the advantages and disadvantages of the
continued use of the traditional relational database and then decide if
businesses should be moving toward relational databases in the cloud.
Justify your decision and provide specific examples to support your
response.
Determine whether a company has an ethical obligation to share with
external clients that key information about them is being stored in the
cloud. Speculate how external clients would react if they were told in
advance or it was kept from them and they found out another way.
Week 8 Discussion 2
"The REA Data Model" Please respond to the following:
Your firm wants to move from a relational database model to the REA
data model. Explain to your senior management the risks and rewards of
such of a move. Be sure to provide specific examples to support your
response.
As we know, the REA data model is an emerging technology change.
Make five recommendations for creating useful entity-relationship (E-R)
diagrams. Rank them in level of importance, and then justify your
ranking.
==============================================
ACC 564 Week 8 Quiz 3
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 8 Quiz 3
Question 1
A validity check is an example of a(n)
Question 2
________ involves copying only the data items that have changed since
the last partial backup.
Question 3
Data matching is an example of a(n)
Question 4
This tests a numerical amount to ensure that it does not exceed a
predetermined value nor fall below another predetermined value.
Question 5
A facility that contains all the computing equipment the organization
needs to perform its essential business activities is known as a
Question 6
The evidence collection method that examines all supporting documents
to determine the validity of a transaction is called
Question 7
With which stage in the auditing process are the consideration of risk
factors and materiality most associated?
Question 8
An auditor must be willing to accept some degree of risk that the audit
conclusion is incorrect. Accordingly, the auditor's objective is to seek
________ that no material error exists in the information audited.
Question 9
The information systems audit objective that pertains to source data
being processed into some form of output is known as
Question 10
An auditor manually calculates accumulated depreciation on a delivery
van and compares her calculation with accounting records. This is an
example collecting audit evidence by
Question 11
Key differences exist when an integrated Enterprise Resource Planning
system (ERP) replaces an existing AIS or legacy system. For example,
________ are more accurate and timely, enabling sales order entry staff
to provide customers more accurate information about delivery dates.
Question 12
A way to incorporate the advantages of Electronic Data Interchange with
the Electronic Funds Transfer is
Question 13
How is credit approval generally handled for established customers with
a documented payment history?
Question 14
The manager of Callow Youth Clothing was entering an order online
from Sad Clown Pajamas. He ordered 100 one-size fits all pajama
bottoms, but when he ordered 1000 one-size fits all pajama tops, the
following error message popped up: "Did you mean to enter a quantity
of 1000 for your order?" This message is the result of a
Question 15
The activities involved in soliciting and processing customer orders
within the revenue cycle are known as the ________.
Question 16
What is the key difference between the MRP and JIT inventory
management approaches?
Question 17
A(n) ________ system posts an approved invoice to the vendor account
and stores it in an open invoice file until payment is made by check.
Question 18
Bob Chum is the sales manager at Folding Squid Technologies. At lunch
with the company CEO, he proudly announced that he had received a
________ from a client to buy a large quantity of components from
Folding Squid.
Question 19
One of the basic activities in the expenditure cycle is the receiving and
storage of goods, supplies, and services. What is the counterpart of this
activity in the revenue cycle?
Question 20
One of the major responsibilities of the receiving department is
==============================================
ACC 564 Week 9 DQ 1 Systems Analysis and DQ 2 AIS
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 9 Discussion Questions – Week 9 Discussion 1
"Systems Analysis" Please respond to the following: Implementing a
AIS system could prove to be beneficial or detrimental to an
organization’s IT infrastructure. Assess the risks associated with
integrating a AIS system and suggest what management can do to
minimize those risks. You have been selected as the change agent for
the implementation of a AIS system that will ultimately affect the way
all employees complete their daily tasks. The AIS system will also
require online approvals for all source documents. This will result in
significant cost savings for the firm; however, in the past, employees
have been resistant to radical changes such as this. Evaluate the risks and
rewards of such a move by the firm. Provide specific examples to
support your response. Week 9 Discussion 2 "AIS" Please respond to
the following: You are part of a project management team evaluating
accounting software packages that could be used by S&S (i.e., the case
company referenced in Chapters 1 through 4), which would incorporate
its four basic transaction cycles. Suggest five factors that the team
should consider when selecting the package. Rank the factors in order of
importance, and then justify your ranking. From the e-Activity, evaluate
two different software packages and propose how you would promote
one package over the other to the management committee. Provide
specific examples to support your response.
RELATED TUTORIALS
==============================================
ACC 564 Week 9 Quiz 4
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 9 Quiz 4
Question 1
Shandra Bundawi is a new graduate who has been hired by an old-line,
family-owned furniture manufacturing company in the northeast. She
has been asked to analyze the company's accounting information system
and to recommend cost-effective improvements. After noting that the
production and sales departments use database systems that are entirely
separated, she recommends that they be combined. Implementation of
her recommendation would benefit the company by contributing to data
Question 2
Record layouts, definitions, addresses, and indexes will be stored at the
________ level schema.
Question 3
The database requirement that foreign keys must be null or have a value
corresponding to the value of a primary key in another table is formally
called the
Question 4
The ________ handles the link between the way data are physically
stored and each user's logical view of that data.
Question 5
The combination of the database, the DBMS, and the application
programs that access the database through the DBMS is referred to as
the
Question 6
Which type of payroll report includes the details of the current paycheck
and deductions as well as year-to-date totals?
Question 7
The average annual middle-management salary at Folding Squid
Technologies is $60,000. If the average turnover rate for middle
management is ten employees per year, what is the approximate average
annual cost of turnover?
Question 8
What is the purpose of a general ledger payroll clearing account?
Question 9
Which of the following is a control that can be implemented to help
prevent paychecks being issued to a "phantom" or "ghost" employee?
Question 10
The results of an internal audit finds that there is a problem with
inaccurate time data being entered into the payroll system. What is an
applicable control that can help prevent this event from occurring in the
future?
Question 11
Cheryl Liao is an accountant at Folding Squid Technologies. While
making an adjusting entry to the general ledger, she received the
following error message when she tried to save her entry, "The data you
have entered does not include a source reference code. Please enter this
data before saving." This message was the result of a
Question 12
Entries to update the general ledger are often documented by which of
the following?
Question 13
Immediately after the adjusting entries are posted, the next step in the
general ledger and reporting system is to prepare
Question 14
A type of data entry control that would ensure that adjusting entries are
posted to existing general ledger accounts is called a(n) ________ check.
Question 15
Performance reports for cost centers should compare actual versus
budget ________ costs.
Question 16
The "get" event represents an activity which
Question 17
Which of the following transactions is represented by the diagram
below?
Question 18
The "give" event represents an activity which
Question 19
Which of the following graphical symbols represents a minimum
cardinality of one and a maximum cardinality of many?
Question 20
An REA diagram must link every event to at least one ________ and
two ________.
==============================================
ACC 564 Week 10 Assignment 4 Changing the AIS (2
Papers)
FOR MORE CLASSES VISIT
www.acc564nerd.com
This Tutorial contains 2 Different Papers
ACC 564 Week 10 Assignment 4 –
Assignment 4: Changing the AIS
Due Week 10 and worth 320 points
Migrating to a accounting information system is not an easy task. Many
firms have struggled with this process, even though our textbook makes
the process seem quite straightforward. Recently, IBM recapped some of
the lessons learned in migrating to a accounting information system
within the federal government. These lessons can be applied to any
accounting information system project. Others have developed their own
recommendations for best practices and lessons learned involving
implementing accounting information systems. However, in order to
appreciate what IBM and others are proposing, we need to apply lessons
learned to a real-life situation involving the failure to implement an
accounting system properly.
For this assignment, research the Internet or databases for information
related to a real-life accounting information system failure and best
practices, as well as lessons learned from implementing the accounting
system. In addition to information that you may find during your
research, please use the following IBM article to complete the
assignment: (http://www-
304.ibm.com/industries/publicsector/fileserve?contentid=242410).
Write a ten to twelve (10-12) page paper in which you:
Identify three to five (3-5) factors that contributed to the accounting
information system failure within the business that you have identified.
Indicate the impact to the business. Provide support for your rationale.
Assess senior management responsibility for the failure in question.
Specify what the senior management could have done differently to
avoid the failure. Provide support for your rationale.
Evaluate whether the most significant failure occurred within the system
design, implementation, or operational phase of the process. Indicate
what the company could have done to avoid the failed outcome. Provide
support for your rationale.
Evaluate how implementing best practices would have reduced the
chances for failure. Provide support for your rationale.
Based on your research, develop a list of between four (4) and six (6)
best practices that organizations should use today to reduce the chances
for failure. Provide support for your rationale.
Using the information provided by IBM and others, indicate which of
the principles designed to provide insight into effective and efficient
strategies on how to best deploy financial management systems, which
were outlined within the related article, should serve as an example of
what not to do when establishing the foundation for a firm to follow.
Your proposed foundation should consist of at least two (2) principles,
but no more than six (6). Provide support for your rationale.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times Roman font (size 12), with one-
inch margins on all sides; citations and references must follow APA or
school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Analyze the business activities that comprise an accounting information
system to determine the information needs to support decision-making
function.
Examine the phases of the systems development life cycle and key
issues related to systems analysis.
Analyze the systems design, implementation, and operational process.
Use technology and information resources to research issues in
accounting information systems.
Write clearly and concisely about accounting information systems using
proper writing mechanics.
==============================================
ACC 564 Week 10 DQ 1 Implementation and DQ 2
Operation
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 10 Discussion Questions –
Week 10 Discussion 1
"Implementation" Please respond to the following:
You are the manager of a payroll system. Your company is going to
replace the legacy payroll system with a more robust, Web-based
version. Suggest two approaches that would minimize downtime and
interruption to the payroll process. Provide specific examples to support
your response.
Propose a process for evaluating the success of the system and a
procedure for implementing software fixes and enhancements. Provide
specific examples to support your response.
Week 10 Discussion 2
"Operation" Please respond to the following:
From the e-Activity, predict the effects that changes in one industry
could have on modifying and updating a system of the business. Include
any trickle-down effects that the changes would have on the business as
well. Provide specific examples to support your response.
From a managerial perspective, assess the greatest systems operational
challenge. Then, recommend what management can do to overcome the
challenge that you identified. Support your response with specific
examples or evidence.
==============================================
ACC 564 Week 11 DQ 1 Looking Back and DQ 2 Looking
Ahead
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Week 11 Discussion Questions –
Week 11 Discussion 1
"Looking Back" Please respond to the following:
The AICPA would like for you to deliver a speech at one of its
upcoming conferences on the future of accounting information systems.
From the first e-Activity, select one conference and formulate the
takeaway message and key points that you would want your audience to
remember from your speech.
After delivering your speech, you have been approached by
representatives from Oracle (Oracle Financials) and Microsoft
(Microsoft Dynamics) regarding your key points. From the second e-
Activity, evaluate how your message can be used to enhance their
product line and vision
Week 11 Discussion 2
"Looking Ahead" Please respond to the following:
Evaluate the top-three concepts covered in this course that provided the
most value to you and how you might incorporate those concepts or
processes into your current job or future endeavors.
Evaluate the top-three concepts in this course that you found difficult to
comprehend. Propose a recommendation to the author of the textbook on
how he / she could have made that process or concept easier to
understand.
==============================================

More Related Content

What's hot

Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016alicalland
 
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Melissa Moody
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...IRJET Journal
 
E-commerce online review for detecting influencing factors users perception
E-commerce online review for detecting influencing factors users perceptionE-commerce online review for detecting influencing factors users perception
E-commerce online review for detecting influencing factors users perceptionjournalBEEI
 
Data discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmentData discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmenteSAT Publishing House
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Conference Papers
 
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsCredit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsHariteja Bodepudi
 
BUS 107 Technology levels--snaptutorial.com
BUS 107 Technology levels--snaptutorial.comBUS 107 Technology levels--snaptutorial.com
BUS 107 Technology levels--snaptutorial.comsholingarjosh38
 

What's hot (11)

Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Enterprise Software Architecture Project
Enterprise Software Architecture ProjectEnterprise Software Architecture Project
Enterprise Software Architecture Project
 
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
E-commerce online review for detecting influencing factors users perception
E-commerce online review for detecting influencing factors users perceptionE-commerce online review for detecting influencing factors users perception
E-commerce online review for detecting influencing factors users perception
 
Data discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmentData discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managment
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...
 
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsCredit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
 
BUS 107 Technology levels--snaptutorial.com
BUS 107 Technology levels--snaptutorial.comBUS 107 Technology levels--snaptutorial.com
BUS 107 Technology levels--snaptutorial.com
 

Similar to ACC 564 NERD Education for Service--acc564nerd.com

Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016powellabril
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016powellabril
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016sergejsvolkovs10
 
Acc 564 entire course accounting information systems
Acc 564 entire course accounting information systemsAcc 564 entire course accounting information systems
Acc 564 entire course accounting information systemsChristopherOjeda123
 
Acc 564 entire course accounting information systems
Acc 564 entire course accounting information systemsAcc 564 entire course accounting information systems
Acc 564 entire course accounting information systemsShariAdamson
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   bellflower46
 
ACC 564 Final Exam
ACC 564 Final ExamACC 564 Final Exam
ACC 564 Final Exammonsterr06
 
Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)lifesgood11
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com amaranthbeg147
 
Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)prasaaanna2
 
Cis 333 Enhance teaching / snaptutorial.com
Cis 333   Enhance teaching / snaptutorial.comCis 333   Enhance teaching / snaptutorial.com
Cis 333 Enhance teaching / snaptutorial.comDavis104
 
CIS 333 Final Exam (3 Sets)
CIS 333 Final Exam (3 Sets)CIS 333 Final Exam (3 Sets)
CIS 333 Final Exam (3 Sets)critter02
 
CIS 333 Effective Communication - tutorialrank.com
CIS 333  Effective Communication - tutorialrank.comCIS 333  Effective Communication - tutorialrank.com
CIS 333 Effective Communication - tutorialrank.comBartholomew19
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.comBaileya82
 
CIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.comCIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.comdonaldzs97
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.comjonhson185
 
CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Life of the Mind/newtonhelp.com   CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Life of the Mind/newtonhelp.com   bellflower3
 
CIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.comCIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.combellflower85
 
Strayer cis 333 week 11 final exam set 1 new
Strayer cis 333 week 11 final exam set 1 newStrayer cis 333 week 11 final exam set 1 new
Strayer cis 333 week 11 final exam set 1 newolivergeorg
 

Similar to ACC 564 NERD Education for Service--acc564nerd.com (20)

Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Acc 564 entire course accounting information systems
Acc 564 entire course accounting information systemsAcc 564 entire course accounting information systems
Acc 564 entire course accounting information systems
 
Acc 564 entire course accounting information systems
Acc 564 entire course accounting information systemsAcc 564 entire course accounting information systems
Acc 564 entire course accounting information systems
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
 
ACC 564 Final Exam
ACC 564 Final ExamACC 564 Final Exam
ACC 564 Final Exam
 
Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
 
Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)
 
Cis 333 Enhance teaching / snaptutorial.com
Cis 333   Enhance teaching / snaptutorial.comCis 333   Enhance teaching / snaptutorial.com
Cis 333 Enhance teaching / snaptutorial.com
 
CIS 333 Final Exam (3 Sets)
CIS 333 Final Exam (3 Sets)CIS 333 Final Exam (3 Sets)
CIS 333 Final Exam (3 Sets)
 
CIS 333 Effective Communication - tutorialrank.com
CIS 333  Effective Communication - tutorialrank.comCIS 333  Effective Communication - tutorialrank.com
CIS 333 Effective Communication - tutorialrank.com
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.com
 
CIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.comCIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.com
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
 
CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Life of the Mind/newtonhelp.com   CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Life of the Mind/newtonhelp.com   
 
CIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.comCIS 333 Focus Dreams/newtonhelp.com
CIS 333 Focus Dreams/newtonhelp.com
 
Acc 564 final exam part 2
Acc 564 final exam part 2Acc 564 final exam part 2
Acc 564 final exam part 2
 
Strayer cis 333 week 11 final exam set 1 new
Strayer cis 333 week 11 final exam set 1 newStrayer cis 333 week 11 final exam set 1 new
Strayer cis 333 week 11 final exam set 1 new
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

ACC 564 NERD Education for Service--acc564nerd.com

  • 1. ACC 564 Entire Course FOR MORE CLASSES VISIT www.acc564nerd.com Please check the details below ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers) ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes- Oxley Act (SOX) ACC 564 Week 4 DQ 1 The Cloud Effect and DQ 2 Securing Data ACC 564 Week 4 Assignment Hacking the AIS (2 Papers)
  • 2. ACC 564 Week 5 DQ 1 Integrity vs. Availability and DQ 2 The 21st Century Auditor ACC 564 Week 6 DQ 1 Revenue Cycle and DQ 2 Expenditure Cycle ACC 564 Week 7 DQ 1 Professional Service Organizations and DQ 2 General Ledger and Reporting Systems ACC 564 Week 7 Assignment 3 Fraud in the AIS (2 Papers) ACC 564 Week 8 DQ 1 Relational Databases and DQ 2 The REA Data Model ACC 564 Week 9 DQ 1 Systems Analysis and DQ 2 AIS ACC 564 Week 10 DQ 1 Implementation and DQ 2 Operation ACC 564 Week 10 Assignment 4 Changing the AIS (2 Papers) ACC 564 Week 11 DQ 1 Looking Back and DQ 2 Looking Ahead
  • 3. ACC 564 Week 3 Quiz 1 ACC 564 Week 5 Quiz 2 ACC 564 Week 8 Quiz 3 ACC 564 Week 9 Quiz 4 ACC 564 Final Exam Part 1 ACC 564 Final Exam Part 2 ============================================== ACC 564 Final Exam Part 1 FOR MORE CLASSES VISIT www.acc564nerd.com
  • 4. ACC 564 Final Exam Part 1 Course Accounting Info Systems Question 1 . An accounting information system (AIS) processes ________ to provide users with ________. . Question 2 . Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process? . Question 3 . Which of the following is a primary activity in the value chain? . Question 4 .
  • 5. A change in the AIS that makes information more easily accessible and widely available within an organization is most likely to first influence the . Question 5 . A frantic StroFrinzel called the home office from Des Moines. "You have got to help me. I am about to close a great sale, but I have to be able to guarantee delivery by the fourteenth. I can't get through to the company Web site to verify delivery!" "Thank you for calling. Your call is very important to us. However, all of our lines are currently in use. Please try again later." Which of the following characteristics of useful information is absent in the situation described above? . Question 6 . The coding technique most likely used for sales orders is called a . Question 7 . The quality assurance department at a large manufacturing business enters data into the AIS that is used to produce a weekly report that summarizes the proportion of defective units in each product line. This is an example of
  • 6. Question 8 . A specialized journal . Question 9 . Data must be collected about three facets of each business activity. What are they? . Question 10 . A specialized journal would be most likely to be used to enter . Question 11 . The Union Soup Kitchen is a non-profit organization that collects, stores, prepares and provides food to the homeless in Erie, Pennsylvania. Donations of food are recorded in a database and a receipt is provided to the donor. When food is used, the database is updated so that it always reflects the amounts and types of food that are available. In a data flow diagram, which type of symbol would be used to represent the flow of data from the donor into the system?
  • 7. . Question 12 . A flowchart that depicts the relationships among the input, processing, and output of an AIS is . Question 13 . In a data flow diagram of the customer payment process, "Customer payment" will appear above or in . Question 14 . In general, a data destination will be shown by . Question 15 . In preparing a DFD, when data are transformed through a process, the symbol used should be . Question 16 .
  • 8. When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language? . Question 17 . The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is called the . Question 18 . The schema that provides an organization-wide view of the entire database is known as the . Question 19 . The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the . Question 20 .
  • 9. In a relational database, requiring that every record in a table have a unique identifier is called the . Question 21 . Which of the following is an opportunity that could contribute to employee fraud? . Question 22 . Which of the following is the greatest risk to information systems and causes the greatest dollar losses? . Question 23 . One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as . Question 24 . Most frauds are detected by
  • 10. . Question 25 . The most efficient way to conceal asset misappropriation is to . Question 26 . A fraud technique that slices off tiny amounts from many projects is called the ________ technique. . Question 27 . Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using . Question 28 . A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called . Question 29 .
  • 11. Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called . Question 30 . A ________ is similar to a ________,except that it is a program rather than a code segment hidden in a host program. . Question 31 . ________ controls prevent, detect and correct transaction errors and fraud. . Question 32 . According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports. . Question 33 . Generally in a risk assessment process, the first step is to
  • 12. . Question 34 . The process that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve operational efficiency is known as . Question 35 . According to the ERM, these help the company address all applicable laws and regulations. . Question 36 . Which of the following is an example of a corrective control? . Question 37 . The process of turning off unnecessary features in the system is known as . Question 38 .
  • 13. The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as . Question 39 . According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that . Question 40 . Compatibility tests utilize a(n) ________,which is a list of authorized users, programs, and data files the users are authorized to access or manipulate. . Question 41 . Which of the following is not one of the three important factors determining the strength of any encryption system? . Question 42 .
  • 14. Which of the following descriptions is not associated with symmetric encryption? . Question 43 . An electronic document that certifies the identity of the owner of a particular public key. . Question 44 . Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information? . Question 45 . These are used to create digital signatures. . Question 46 . This determines the correctness of the logical relationship between two data items.
  • 15. . Question 47 . This determines if characters are of the proper type. . Question 48 . Check digit verification is an example of a(n) . Question 49 . This batch processing data entry control sums a non-financial numeric field. . Question 50 . What is the most effective way to ensure information system availability? ============================================== ACC 564 Final Exam Part 2
  • 16. FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Final Exam Part 2 Question 1 In the ________ stage of an operational audit, the auditor measures the actual system against an ideal standard. Question 2 An auditor finds that employee absentee rates are significantly higher on Mondays and Fridays than on other work days. This is an example collecting audit evidence by Question 3 The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures.
  • 17. Question 4 According to the risk-based auditing approach, when a control deficiency is identified, the auditor should inquire about Question 5 Control risk is defined as the Question 6 During the sales order entry process, a ________ is performed to verify that each transaction record contains all appropriate data items. Question 7 The shipping department at Squishy Things Toy Company follows policies that determine which carrier will deliver orders according to the size, weight, and destination of the shipment. It maintains standing agreements with shippers that specify legal responsibility for the shipment while it is in transit. The terms of the agreements are documented on
  • 18. Question 8 When an ERP is used, it is assumed that there will be increases in efficiency and the effectiveness of the activities related to the revenue cycle. However, what must be in place and functioning well to fully realize these benefits? Question 9 Which of the following documents would normally trigger the process to record a customer payment? Question 10 A type of business document in which part of the original document is returned to the source for further processing is called a ________ document. Question 11 Duties in the expenditure cycle should be properly segregated to promote internal control. This means that the authorization function is performed by ________,the recording function is performed by ________,and cash handling is performed by the ________.
  • 19. Question 12 Procurement cards differ from corporate credit cards in which of the following ways? Question 13 What control should be put in place that assigns responsibility for EFT payments made to vendors? Question 14 Economic Order Quantity (EOQ) includes several variables that must be taken into consideration when calculating the optimal order size. One variable, the costs associated with holding inventory, is referred to as Question 15 The traditional approach to inventory management to ensure sufficient quantity on hand to maintain production is known as
  • 20. Question 16 When using electronic documents, ________ increase the accuracy of data entry. Question 17 Which department should have the sole ability to provide information to the AIS about hiring, terminations, and pay rate changes? Question 18 The document that lists each employee's gross pay, payroll deductions, and net pay in a multicolumn format is called Question 19 Companies that specialize in processing payroll are known as Question 20
  • 21. Which of the following will limit a firm's potential loss exposure from paycheck forgery? Question 21 Recording interest earned on an investment is an example of which type of adjusting journal entry? Question 22 Departments that mostly provide services to other units and charge those units for services rendered should be evaluated as ________ centers. Question 23 Cheryl Liao is an accountant at Folding Squid Technologies. While making an adjusting entry to the general ledger, she received the following error message, "Your journal entry must be a numeric value. Please reenter." This message was the result of a Question 24 Budgets and performance reports should be developed on the basis of
  • 22. Question 25 An adjusting entry made at the end of an accounting period that reflects the exchange of cash prior to performance of a related event is classified as a(n) Question 26 Each event in an REA model will in most cases have at least one ________ agent and one ________ agent involved with the event. Question 27 The REA data model Question 28 Which of the following transactions is represented by the diagram below? Question 29
  • 23. An entity-relationship (E-R) diagram Question 30 Relationships that affect the quantity of a resource are sometimes referred to as ________ relationships. Question 31 Refer to the table below, which shows the results of payback, net present value, and internal rate of return analysis of four projects. Which is preferred by the net present value criterion? Question 32 When using the payback method to determine economic feasibility of projects, the company usually accepts the project with the Question 33
  • 24. Who is responsible for preparing the specifications that are used to create the programs? Question 34 Refer to the table below, which shows the results of payback, net present value, and internal rate of return analysis of four projects. Which is preferred by the payback criterion? Question 35 The capital budgeting technique where estimated future cash flows are discounted back to the present is referred to as Question 36 When canned software is used for systems acquisition, the maintenance aspect of the operations and maintenance phase of the SDLC Question 37 BenathirDonathat, director of the project committee, has received approval from management for implementation of a new accounting information system. After putting out an RFP, the committee settled on a vendor that will provide an industry standard software package and post- sale technical support. The committee decided to go with
  • 25. Question 38 The ________ method calculates and compares the processing times of different AIS to compare system performance. Question 39 End-user computing is likely to result in a(n) Question 40 What would be one duty of second-line help desk personnel? Question 41 One process used to uncover and eliminate program errors is known as Question 42 Who is responsible for identifying such risk factors in an implementation plan? Question 43 Which of the following describes a phase-in conversion? Question 44
  • 26. Phil in Marketing got a call from Chuck in ITS. "Phil, the system just generated a stock-out report. I wanted to give you a heads up. I'm sending it right over." This is an example of a Question 45 Chuck in ITS got a call from Phil in Marketing. "Chuck, I need you to do something for me. Query sales data for the first quarter and pull out all of the invoices that include the snow blower discount. I need a count and the total amount of the discount. Thanks." This is an example of a ============================================== ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 1 Discussion Questions Week 1 Discussion 1 "Value of Information" Please respond to the following: Firms realize that in order to make money, they have to invest money. This can be attributed to the information that the firm relies on. As discussed in the text, there are seven characteristics of useful information. From the first e-Activity and assuming that you are CFO of
  • 27. University, identify the top-three characteristics you would rely on the most for improving the profitability of the firm. Provide an example of how each characteristic would directly help the firm in terms of profitability. On the other hand, public and private firms are accountable to a wide range of regulators and stakeholders. Of the seven characteristics, identify the top three that would be applicable to meeting the needs of regulators and stakeholders. Provide an example of how each characteristic would directly help the firm in terms of meeting the needs of these key regulators and stakeholders. Week 1 Discussion 2 "Impact of Design of an Accounting Information System (AIS)" Please respond to the following: Some of the world’s most successful companies (Fortune 500) operate multiple lines of business. Despite this fact, many of these firms rely on a single AIS. From the second e-Activity, for the business you researched, examine how its lines of business would affect the design of a AIS. If the business was selecting a AIS, examine how the business model would affect the design of a AIS. ============================================== ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers)
  • 28. FOR MORE CLASSES VISIT www.acc564nerd.com This Tutorial contains 2 Different Papers ACC 564 Week 2 Assignment 1 - Assignment 1: Information Needs for the AIS In 1967, Russell Ackoff presented a classical analysis of misinformation in management (Ackoff’s Management Misinformation Systems, Case 1-2, located in your Blackboard course shell). Now, you need to fast- forward to the present. After reading the case, craft your own version of misinformation in management by developing five (5) key incorrect assumptions that management makes about its accounting information systems. For this assignment, research the Internet or databases for information related to improper assumptions concerning accounting information systems. Write a five to seven (5-7) page paper in which you:
  • 29. Based on your research, assess how corporate leaders may make improper assumptions related to accounting information systems and the related information. Indicate the most negative potential impacts on business operations related to these assumptions. Provide support for your rationale. Suggest three to four (3-4) ways in which organizational performance may be improved when information is properly managed within a business system. Provide support for your rationale. Evaluate the level of system security (i.e., high, medium, low) needed to ensure information integrity within automated business systems. Provide support for your evaluation. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times Roman font (size 12), with one- inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are:
  • 30. Examine and use data flow diagrams and flowcharts to understand, evaluate, and design information systems. Evaluate the approaches and techniques that are used to commit and prevent computer fraud. Use technology and information resources to research issues in accounting information systems. Write clearly and concisely about accounting information systems using proper writing mechanics. ============================================== ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 2 Discussion Questions – Week 2 Discussion 1 "Evaluation of Documentation Tools" Please respond to the following:
  • 31. You have been assigned to analyze the accounting information for a Fortune 500 corporation. From the e-Activity, evaluate which tools you would use to analyze its business processes, indicating your rationale. On the other hand, resources, such as accountants, business analysts, and I/T specialists who rely on documentation tools, will need proper training on these tools. You have been given the responsibility of familiarizing your team with these tools. Evaluate which techniques, in terms of their appropriateness, you would use to get your team ready for its first assignment—the evaluation of a firm’s internal control structure. Week 2 Discussion 2 "David Miller" Please respond to the following: Read the David Miller case from Chapter 5. After reading the case, describe a reason why someone who has been entrusted with the firm’s assets would commit a fraudulent act against the company. Based upon your understanding of the case and your professional and personal experience, recommend a series of actions that should have been taken in order to prevent this. Now that the damage has been done by Mr. Miller after his last episode, the blame game begins. Review all of the parties who contributed to his
  • 32. ability to commit these acts, recommend who should be held liable, and suggest the punishment for the liable party / parties. ============================================== ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-Oxley Act (SOX) FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 3 Discussion Questions – Week 3 Discussion 1 "Attacks" Please respond to the following: You have been hired by the CFO of University to develop a plan to protect its accounting and financial systems at a reasonable cost. Suggest a high-level plan for the CFO. Provide support for your suggestion. Based on your security plan recommendation, determine the system aspect that is most likely to be violated.
  • 33. Week 3 Discussion 2 "Revamping the Sarbanes-Oxley Act (SOX)" Please respond to the following: We know that the Sarbanes-Oxley Act was created as the result of several high-profile fraud cases. Now that the act is over 10 years old, many think that it needs to be updated to reflect the changing times. From the e-Activity, identify and discuss at least three changes that should be made to the act, indicating why these changes are necessary. Create an argument supporting three items in the act that you would not change. ============================================== ACC 564 Week 3 Quiz 1 .FOR MORE CLASSES VISIT www.acc564nerd.com Question 1
  • 34. A well-designed AIS can improve the decision-making function within the organization. Which statement below would describe a limitation, rather than a benefit, of an efficient AIS? Question 2 The transaction cycle that includes the events of hiring employees and paying them is known as the Question 3 Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process? Question 4 Which of the following is a primary activity in the value chain? Question 5
  • 35. The business owners obtain financing from outside investors, which results in an inflow of cash into the company. This transaction is considered to be part of which cycle? Question 6 Changing an employee's hourly wage rate would be recorded in which file? Question 7 When the sum of all entries in the subsidiary ledger equals the balance in the corresponding general ledger account, it is assumed that Question 8 Which of the following is conceptually similar to a journal in a manual AIS? Question 9 In an ERP system, the module used to record data about transactions in the revenue cycle is called
  • 36. Question 10 An audit trail Question 11 In general, a data destination will be shown by Question 12 Chas Mulligan has been hired by Yardley Security as an assistant to the internal auditor. He has been asked to thoroughly document the existing accounting information system in preparation for making recommendations for improvements to internal controls. He decides to begin with a description of the information stored in paper records, their sources, and their destinations. The documentation tool that he should employ for this purpose is a Question 13
  • 37. In a payroll processing DFD, the "prepare reports" activity will be represented by ________,the "employee payroll file" will be represented by ________,and the "management" will be represented by ________. Question 14 The correct label for Shape 2 in the flowchart below is Question 15 Chuck and Jill Scruggs travel in their motor home six months of the year and buy unique artifacts. Within hours after the Scruggs make a purchase, they have photographed it, written a description of it, and posted it for sale on eBay with a reservation price. Anything that does not sell within a week is shipped back to Austin, Texas, for display in The House of Curiosities, a retail business that the Scruggs operate during the balance of the year. Which symbol should be used to represent the transfer of data to eBay in a context diagram of this process? Question 16 Most frauds are detected by
  • 38. Question 17 Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization? Question 18 Why is computer fraud often more difficult to detect than other types of fraud? Question 19 Which of the following is a financial pressure that could cause an employee to commit fraud? Question 20 One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as ============================================== ACC 564 Week 4 Assignment Hacking the AIS (2 Papers)
  • 39. FOR MORE CLASSES VISIT www.acc564nerd.com This Tutorial contains 2 Different Papers ACC 564 Week 4 Assignment 2 - Assignment 2: Hacking the AIS Due Week 4 and worth 240 points In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or databases for information related to business systems that have been hacked.
  • 40. Write a five to seven (5-7) page paper in which you: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times Roman font (size 12), with one- inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover
  • 41. page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Examine control and security concepts related to accounting information systems to ensure data integrity and safety. Use technology and information resources to research issues in accounting information systems. Write clearly and concisely about accounting information systems using proper writing mechanics. ============================================== ACC 564 Week 4 DQ 1 The Cloud Effect and DQ 2 Securing Data FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 4 Discussion Questions –
  • 42. Week 4 Discussion 1 "The Cloud Effect" Please respond to the following: Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e- Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire of being a dominant player in the global market. As the CFO, describe your top-three fears in competing in the global market, and how you plan to overcome those fears. Provide support for your rationale. Week 4 Discussion 2 "Securing Data" Please respond to the following: In this global age of information, suggest which threats are posed to the principles of confidentiality and privacy, related to offshore outsourcing of various information systems functions. Provide support for your rationale.
  • 43. Determine who should be held liable for any breaches that occur, and indicate the course(s) of action that should be taken. ============================================== ACC 564 Week 5 DQ 1 Integrity vs. Availability and DQ 2 The 21st Century Auditor FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 5 Discussion Questions – Week 5 Discussion "Integrity vs. Availability" Please respond to the following: In the global enterprise, firms are insistent that their accounting information systems (AIS) and other key systems are available 100% of the time, and that these systems are the highest in integrity. Evaluate how a firm manages the balance of high availability with high integrity in these days of tight budgets and additional oversight from regulators.
  • 44. As a student taking online classes or relying on online resources such as libraries and tech support, evaluate the benefits of the school providing you with 24 / 7 access to these resources in relation to the costs incurred by the school itself. Week 5 DB 2: "The 21st Century Auditor" • The 21st century auditor requires knowledge of technology and accounting information systems in addition to his / her understanding of accounting concepts and guidelines. The degree of knowledge in technology and AIS will vary with each auditor. Recommend the top- five technology and AIS skills that the 21st century auditor should have. Justify your recommendations. Now, recommend a series of actions that need to be taken by auditors and their firms to ensure that the auditors maintain their skills. RELATED TUTORIALS ============================================== ACC 564 Week 5 Quiz 2 FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 5 Quiz 2
  • 45. Question 1 Illegally obtaining and using confidential information about a person for economic gain is known as Question 2 The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called Question 3 Developers of computer systems often include a user name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a Question 4 A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called Question 5
  • 46. When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as Question 6 Generally in a risk assessment process, the first step is to Question 7 Congress passed this federal law for the purpose of preventing financial statement fraud, to make financial reports more transparent and to strengthen the internal control of public companies. Question 8 Corporate policy that requires a purchasing agent and purchasing department manager to sign off on asset purchases over $1,500 is an example of Question 9 A ________ is created to guide and oversee systems development and acquisition. Question 10 What is one reason why AIS threats are increasing?
  • 47. Question 11 When new employees are hired by Folding Squid Technologies, they are assigned user names and appropriate permissions are entered into the information system's access control matrix. This is an example of a(an) Question 12 This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet. Question 13 Which of the following is an example of a preventive control? Question 14 Multi-factor authentication Question 15 Restricting access of users to specific portions of the system as well as specific tasks, is Question 16
  • 48. Jeff Davis took a call from a client. "Jeff, I need to interact online and real time with our affiliate in India, and I want to make sure that our communications aren't intercepted. What do you suggest?" Jeff responded "The best solution will be to implement Question 17 Jeff Davis took a call from a client. "Jeff, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn't intercepted. What do you suggest?" Jeff responded "The best solution will be to implement Question 18 Which of the following is not associated with asymmetric encryption? Question 19 Which of the following descriptions is not associated with symmetric encryption? Question 20 In developing policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is
  • 49. ============================================== ACC 564 Week 6 DQ 1 Revenue Cycle and DQ 2 Expenditure Cycle FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 6 Discussion Questions – Week 6 Discussion 1 "Revenue Cycle" Please respond to the following: From the e-Activity, examine the steps necessary to complete a sale and discuss how the sales order process is integrated with other processes (credit and collections, delivery, etc.). Indicate your overall satisfaction with the process. From the e-Activity, recommend at least one improvement in the Website’s sales order process you would implement to make it more efficient in order to improve the customer experience. Then, assess
  • 50. whether the recommendation meant to benefits the clients warrants the potential cost of implementation for the company. Provide specific examples to support your response. Week 6 Discussion 2 "Expenditure Cycle" Please respond to the following: Using your own present or previous place of work as an example, propose a method for mitigating the problem of separate departments (e.g., academics, student services, information technology, etc.) ordering the same item. From the proposal above, discuss the possible issues that implementing the proposed method would cause to the organization. Suggest additional controls that you would put into place to overcome the issues. Provide specific examples to support your response. ============================================== ACC 564 Week 7 Assignment 3 Fraud in the AIS (2 Papers) FOR MORE CLASSES VISIT www.acc564nerd.com
  • 51. This Tutorial contains 2 Different Papers ACC 564 Week 7 Assignment 3 – Assignment 3: Fraud in the AIS Due Week 7 and worth 280 points For this assignment, research the Internet or databases to locate a firm that was involved in a fraud and / or embezzlement case. Explain how the firm’s accounting information system (i.e., components and functions) contributed to the fraud and / or embezzlement. You will need to focus on how each component / function of the accounting information system failed, which resulted in the scandal / case. Write a ten to twelve (10-12) page paper in which you: Based on the information you researched, assess the failure of the firm’s accounting information system to prevent the related fraud / embezzlement. Imagine that the company that you researched uses a third-party accounting system. Evaluate the effectiveness of the firm’s stakeholder
  • 52. in the event that a third-party accounting system suffers a breach. Include an assessment of the level of responsibility of the software provider to the business and its clients. Provide support for your rationale. Determine what advances in accounting and / or information technology could have prevented the event from occurring. Provide support for your argument. Evaluate what changes should be made to both the Sarbanes-Oxley Act of 2002 and other current laws in order to make them more effective in deterring companies from committing crimes. Recommend a strategy that the company you indicated may use to prevent future business information failures. Indicate how the company should approach the implementation of your recommended strategy. Provide support for your recommendation. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times Roman font (size 12), with one- inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • 53. The specific course learning outcomes associated with this assignment are: Analyze the business activities that comprise an accounting information system to determine the information needs to support decision-making function. Use technology and information resources to research issues in accounting information systems. Write clearly and concisely about accounting information systems using proper writing mechanics. ============================================== ACC 564 Week 7 DQ 1 Professional Service Organizations and DQ 2 General Ledger and Reporting Systems FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 7 Discussion Questions – Week 7 Discussion 1
  • 54. "Professional Service Organizations" Please respond to the following: You have been asked by the CFO of the company where you work or previously worked to evaluate the use of a professional service organization for processing the company’s payroll. Identify the top-three issues that should be discussed when considering contracting the services of a payroll service provider. Evaluate the impact, both positive and negative, of each issue on the process in question. Provide specific examples to support your response. Using the information from the e-Activity, identify the key elements of a plan to outsource your firm’s payroll function. For each element of the plan, describe the impact of each element. Be sure that the elements address the necessary controls needed to safeguard your firm’s personnel data. Provide specific examples to support your rationale. Week 7 Discussion 2 "General Ledger and Reporting Systems" Please respond to the following: Your firm is planning to move to International Financial Reporting Standards (IFRS) reporting within the next fiscal year. Analyze the risks and rewards by moving to IFRS and the impact that technology will have on the change. Include the advantages and disadvantages of IRFS
  • 55. compared to the Generally Accepted Accounting Principles (GAAP). Provide specific examples to support your analysis. Develop a proposal for migrating your firm to IFRS from GAAP. Discuss how you will educate your users in IFRS. ============================================== ACC 564 Week 8 DQ 1 Relational Databases and DQ 2 The REA Data Model FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 8 Discussion Questions – Week 8 Discussion 1 "Relational Databases" Please respond to the following: From the e-Activity, assess the advantages and disadvantages of the continued use of the traditional relational database and then decide if
  • 56. businesses should be moving toward relational databases in the cloud. Justify your decision and provide specific examples to support your response. Determine whether a company has an ethical obligation to share with external clients that key information about them is being stored in the cloud. Speculate how external clients would react if they were told in advance or it was kept from them and they found out another way. Week 8 Discussion 2 "The REA Data Model" Please respond to the following: Your firm wants to move from a relational database model to the REA data model. Explain to your senior management the risks and rewards of such of a move. Be sure to provide specific examples to support your response. As we know, the REA data model is an emerging technology change. Make five recommendations for creating useful entity-relationship (E-R) diagrams. Rank them in level of importance, and then justify your ranking. ============================================== ACC 564 Week 8 Quiz 3
  • 57. FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 8 Quiz 3 Question 1 A validity check is an example of a(n) Question 2 ________ involves copying only the data items that have changed since the last partial backup. Question 3 Data matching is an example of a(n) Question 4 This tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value.
  • 58. Question 5 A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a Question 6 The evidence collection method that examines all supporting documents to determine the validity of a transaction is called Question 7 With which stage in the auditing process are the consideration of risk factors and materiality most associated? Question 8 An auditor must be willing to accept some degree of risk that the audit conclusion is incorrect. Accordingly, the auditor's objective is to seek ________ that no material error exists in the information audited. Question 9 The information systems audit objective that pertains to source data being processed into some form of output is known as Question 10
  • 59. An auditor manually calculates accumulated depreciation on a delivery van and compares her calculation with accounting records. This is an example collecting audit evidence by Question 11 Key differences exist when an integrated Enterprise Resource Planning system (ERP) replaces an existing AIS or legacy system. For example, ________ are more accurate and timely, enabling sales order entry staff to provide customers more accurate information about delivery dates. Question 12 A way to incorporate the advantages of Electronic Data Interchange with the Electronic Funds Transfer is Question 13 How is credit approval generally handled for established customers with a documented payment history? Question 14 The manager of Callow Youth Clothing was entering an order online from Sad Clown Pajamas. He ordered 100 one-size fits all pajama bottoms, but when he ordered 1000 one-size fits all pajama tops, the following error message popped up: "Did you mean to enter a quantity of 1000 for your order?" This message is the result of a
  • 60. Question 15 The activities involved in soliciting and processing customer orders within the revenue cycle are known as the ________. Question 16 What is the key difference between the MRP and JIT inventory management approaches? Question 17 A(n) ________ system posts an approved invoice to the vendor account and stores it in an open invoice file until payment is made by check. Question 18 Bob Chum is the sales manager at Folding Squid Technologies. At lunch with the company CEO, he proudly announced that he had received a ________ from a client to buy a large quantity of components from Folding Squid. Question 19
  • 61. One of the basic activities in the expenditure cycle is the receiving and storage of goods, supplies, and services. What is the counterpart of this activity in the revenue cycle? Question 20 One of the major responsibilities of the receiving department is ============================================== ACC 564 Week 9 DQ 1 Systems Analysis and DQ 2 AIS FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 9 Discussion Questions – Week 9 Discussion 1 "Systems Analysis" Please respond to the following: Implementing a AIS system could prove to be beneficial or detrimental to an organization’s IT infrastructure. Assess the risks associated with integrating a AIS system and suggest what management can do to minimize those risks. You have been selected as the change agent for the implementation of a AIS system that will ultimately affect the way all employees complete their daily tasks. The AIS system will also require online approvals for all source documents. This will result in significant cost savings for the firm; however, in the past, employees have been resistant to radical changes such as this. Evaluate the risks and rewards of such a move by the firm. Provide specific examples to
  • 62. support your response. Week 9 Discussion 2 "AIS" Please respond to the following: You are part of a project management team evaluating accounting software packages that could be used by S&S (i.e., the case company referenced in Chapters 1 through 4), which would incorporate its four basic transaction cycles. Suggest five factors that the team should consider when selecting the package. Rank the factors in order of importance, and then justify your ranking. From the e-Activity, evaluate two different software packages and propose how you would promote one package over the other to the management committee. Provide specific examples to support your response. RELATED TUTORIALS ============================================== ACC 564 Week 9 Quiz 4 FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 9 Quiz 4 Question 1 Shandra Bundawi is a new graduate who has been hired by an old-line, family-owned furniture manufacturing company in the northeast. She has been asked to analyze the company's accounting information system and to recommend cost-effective improvements. After noting that the production and sales departments use database systems that are entirely
  • 63. separated, she recommends that they be combined. Implementation of her recommendation would benefit the company by contributing to data Question 2 Record layouts, definitions, addresses, and indexes will be stored at the ________ level schema. Question 3 The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the Question 4 The ________ handles the link between the way data are physically stored and each user's logical view of that data. Question 5 The combination of the database, the DBMS, and the application programs that access the database through the DBMS is referred to as the Question 6
  • 64. Which type of payroll report includes the details of the current paycheck and deductions as well as year-to-date totals? Question 7 The average annual middle-management salary at Folding Squid Technologies is $60,000. If the average turnover rate for middle management is ten employees per year, what is the approximate average annual cost of turnover? Question 8 What is the purpose of a general ledger payroll clearing account? Question 9 Which of the following is a control that can be implemented to help prevent paychecks being issued to a "phantom" or "ghost" employee? Question 10 The results of an internal audit finds that there is a problem with inaccurate time data being entered into the payroll system. What is an applicable control that can help prevent this event from occurring in the future?
  • 65. Question 11 Cheryl Liao is an accountant at Folding Squid Technologies. While making an adjusting entry to the general ledger, she received the following error message when she tried to save her entry, "The data you have entered does not include a source reference code. Please enter this data before saving." This message was the result of a Question 12 Entries to update the general ledger are often documented by which of the following? Question 13 Immediately after the adjusting entries are posted, the next step in the general ledger and reporting system is to prepare Question 14 A type of data entry control that would ensure that adjusting entries are posted to existing general ledger accounts is called a(n) ________ check. Question 15 Performance reports for cost centers should compare actual versus budget ________ costs. Question 16
  • 66. The "get" event represents an activity which Question 17 Which of the following transactions is represented by the diagram below? Question 18 The "give" event represents an activity which Question 19 Which of the following graphical symbols represents a minimum cardinality of one and a maximum cardinality of many? Question 20 An REA diagram must link every event to at least one ________ and two ________. ============================================== ACC 564 Week 10 Assignment 4 Changing the AIS (2 Papers)
  • 67. FOR MORE CLASSES VISIT www.acc564nerd.com This Tutorial contains 2 Different Papers ACC 564 Week 10 Assignment 4 – Assignment 4: Changing the AIS Due Week 10 and worth 320 points Migrating to a accounting information system is not an easy task. Many firms have struggled with this process, even though our textbook makes the process seem quite straightforward. Recently, IBM recapped some of the lessons learned in migrating to a accounting information system within the federal government. These lessons can be applied to any accounting information system project. Others have developed their own recommendations for best practices and lessons learned involving implementing accounting information systems. However, in order to appreciate what IBM and others are proposing, we need to apply lessons learned to a real-life situation involving the failure to implement an accounting system properly.
  • 68. For this assignment, research the Internet or databases for information related to a real-life accounting information system failure and best practices, as well as lessons learned from implementing the accounting system. In addition to information that you may find during your research, please use the following IBM article to complete the assignment: (http://www- 304.ibm.com/industries/publicsector/fileserve?contentid=242410). Write a ten to twelve (10-12) page paper in which you: Identify three to five (3-5) factors that contributed to the accounting information system failure within the business that you have identified. Indicate the impact to the business. Provide support for your rationale. Assess senior management responsibility for the failure in question. Specify what the senior management could have done differently to avoid the failure. Provide support for your rationale. Evaluate whether the most significant failure occurred within the system design, implementation, or operational phase of the process. Indicate what the company could have done to avoid the failed outcome. Provide support for your rationale. Evaluate how implementing best practices would have reduced the chances for failure. Provide support for your rationale. Based on your research, develop a list of between four (4) and six (6) best practices that organizations should use today to reduce the chances for failure. Provide support for your rationale. Using the information provided by IBM and others, indicate which of the principles designed to provide insight into effective and efficient strategies on how to best deploy financial management systems, which
  • 69. were outlined within the related article, should serve as an example of what not to do when establishing the foundation for a firm to follow. Your proposed foundation should consist of at least two (2) principles, but no more than six (6). Provide support for your rationale. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times Roman font (size 12), with one- inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Analyze the business activities that comprise an accounting information system to determine the information needs to support decision-making function.
  • 70. Examine the phases of the systems development life cycle and key issues related to systems analysis. Analyze the systems design, implementation, and operational process. Use technology and information resources to research issues in accounting information systems. Write clearly and concisely about accounting information systems using proper writing mechanics. ============================================== ACC 564 Week 10 DQ 1 Implementation and DQ 2 Operation FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 10 Discussion Questions – Week 10 Discussion 1 "Implementation" Please respond to the following:
  • 71. You are the manager of a payroll system. Your company is going to replace the legacy payroll system with a more robust, Web-based version. Suggest two approaches that would minimize downtime and interruption to the payroll process. Provide specific examples to support your response. Propose a process for evaluating the success of the system and a procedure for implementing software fixes and enhancements. Provide specific examples to support your response. Week 10 Discussion 2 "Operation" Please respond to the following: From the e-Activity, predict the effects that changes in one industry could have on modifying and updating a system of the business. Include any trickle-down effects that the changes would have on the business as well. Provide specific examples to support your response. From a managerial perspective, assess the greatest systems operational challenge. Then, recommend what management can do to overcome the challenge that you identified. Support your response with specific examples or evidence. ==============================================
  • 72. ACC 564 Week 11 DQ 1 Looking Back and DQ 2 Looking Ahead FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Week 11 Discussion Questions – Week 11 Discussion 1 "Looking Back" Please respond to the following: The AICPA would like for you to deliver a speech at one of its upcoming conferences on the future of accounting information systems. From the first e-Activity, select one conference and formulate the takeaway message and key points that you would want your audience to remember from your speech. After delivering your speech, you have been approached by representatives from Oracle (Oracle Financials) and Microsoft (Microsoft Dynamics) regarding your key points. From the second e- Activity, evaluate how your message can be used to enhance their product line and vision
  • 73. Week 11 Discussion 2 "Looking Ahead" Please respond to the following: Evaluate the top-three concepts covered in this course that provided the most value to you and how you might incorporate those concepts or processes into your current job or future endeavors. Evaluate the top-three concepts in this course that you found difficult to comprehend. Propose a recommendation to the author of the textbook on how he / she could have made that process or concept easier to understand. ==============================================