MIS 16788

subject Type Homework Help
subject Pages 6
subject Words 421
subject Authors Mark G. Simkin

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A good audit trail is an important element within a company's internal control system.
Answer:
In the "AIS at Work" case, Mar-Bal installed an integrated accounting package rather
than an ERP system.
Answer:
Process maps are a special kind of flowchart.
Answer:
A sale is an example of an event in the REA accounting framework.
page-pf2
Answer:
The implementation and initial operation phase of a systems study is also known as the
"action" phase of a systems study.
Answer:
Each computer record on a hard disk is composed of sub-elements called "data fields."
Answer:
Use of test data is not recommended when evaluating integrated online systems.
Answer:
page-pf3
A legacy system is an example of an older computer system, typically running on a
mainframe computer.
Answer:
The keying operation that transfers payroll change requests directly to floppy disk is
called an off-line job entry system.
Answer:
A shipping notice is a source document that accompanies goods sent to a customer.
Answer:
page-pf4
An example of a soft-copy report is one that identifies slow-moving items where
demand is soft.
Answer:
One thing that can go wrong during systems implementation is implementing a system
that has not been completely tested.
Answer:
According to the chapter, a computer virus is an example of a type of cybercrime called
"denial of service."
Answer:
In the United States, trafficking in passwords is immoral, but not illegal.
page-pf5
Answer:
Database designers typically store employee Social Security numbers as "Long Integer"
data types.
Answer:
The fingerprints of identical twins are also identical.
Answer:
One reason why computer crime is important to AISs is because, according to a
Computer Security Institute survey, the average cost of a computer-abuse incident is
about $500,000.
page-pf6
Answer:
A template that you can create in Microsoft Access and that prompts users for expected
values is called a "mask."
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.