MIS 30866

subject Type Homework Help
subject Pages 7
subject Words 486
subject Authors Mark G. Simkin

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A PERT network diagram reflects the logical sequence of systems implementation
activities.
Answer:
Controls are rarely established during the implementation of a new computer systemthis
must wait for the first audit of the system.
Answer:
Project management software allows users to perform "what-if" analysis-for example,
to determine how different work schedules might lower the time to install a new
computer system.
Answer:
"Integrated accounting software" means software that includes the major software
page-pf2
modules needed by a businesse.g., accounts payable, accounts receivable, inventory,
general ledger, and payroll.
Answer:
An operating system is a set of computer programs that helps a computer run itself.
Answer:
A data dictionary is a computer file describing the data items of an accounting database.
Answer:
XBRL is an acronym for "extensive business reports and liabilities."
page-pf3
Answer:
A gigabyte of computer storage is equal to one million bytes.
Answer:
A good internal control system will contribute towards detecting accidental errors made
by employees.
Answer:
The term 'scalability" refers to the ability of an organization to ramp up processing
volume, number of simultaneous users, and similar items as a company and its
accounting transactions grows.
Answer:
page-pf4
A document flowchart describes the physical flow of data through an accounting
information system.
Answer:
ERP I systems are mostly back-office systems; ERP II systems are front-office
information systems.
Answer:
Public companies are required to adopt the Control Objectives for Information and
Related Technology framework under SOX.
Answer:
page-pf5
Businesses can use social networking sites to better understand the reactions to new
products or services.
Answer:
The Internet can be a great tool in learning about specialized accounting software
options.
Answer:
A database is in second normal form if all of its records are in first normal form, and a
second, duplicate record exists for each of them.
Answer:
page-pf6
Lockout systems disconnect telephone connections if users fail to provide a correct
password in a set number of tries.
Answer:
The Internet Protocol address is a numerical translation of the text-based domain
address.
Answer:
The term "blog" is an acronym that stands for "binary login."
Answer:
page-pf7
Two types of firewall policies are protection by (1) inclusion, and (2) exclusion.
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.