10 -1 Discussion Topic Audit
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
IT 505
Subject
Accounting
Date
Jan 9, 2024
Type
docx
Pages
3
Uploaded by CaptainMusic12916
Jamika S Needom
IT 505
10-1:Discussion Topic Audit
November 24, 2023
1)
What topics or themes occurred in a majority of your discussion posts? a)
The topics and themes that reoccurred during the course were networking, security of information, and basic programming. These are the basis of information technology, but they also steer into data analysis because data needs to be secured and shared in a safe and reliable technological environment.
2)
Were you a supportive classmate, and did you provide constructive feedback to your peers?
b) I supported topics and discussions to further my peers' understanding and knowledge of specific issues. If we do not challenge the thinking of others, we will not seek additional information to widen our views and learning opportunities.
3) What discussions did you value most, and how did you feel these contributed to your learning in this course?
c) I valued the discussion on whether you know where your data is. Working in the technology sector in my current job, I work with data all day and teach others how to access, manipulate, and analyze information that drives their organization's work. Teaching others to use data can help them create projects and build relationships with others. It comes with learning that data is clean and, if not, how do we make journeys to
update the information we store.
4) What would you do differently in the discussions if you had a chance?
d) I would have used other sources and provided more context to my initial posts and replies to others.
5) What questions do you still have now that the course has concluded?
e) I still ponder how big corporations scrub data from their databases to maintain data integrity. Do they use other databases to update the information they store without our
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation:
Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?
Will different system access levels for different users be incorporated?
Will customer orders be received via the Internet?
Has the company identified an off‐site alternative computer processing location?
Does the project budget include line items for an upgraded, uninterrupted power source and firewall?
Required: In a two (2) page response, describe the control purpose for each point presented in the case.
arrow_forward
By taking into account information from the latest programme of Walmart (ethics and compliance) and the new GDPR data protection legislation, provide a summary of your key concerns about ethical, legal and professional implications associated with information handling and security 900 words
arrow_forward
Uploaded
arrow_forward
research data analytics in accounting information systems or emerging technologies in the accounting industry. Your presentation should focus on the impact of the selected topic on accounting information systems, internal controls, and benefits and challenges associated with its implementation.
As a PowerPoint presentation with voiceover.
The presentation should be 6-8 slides, not including the title page and the reference page.
Speaker Notes should be submitted as a Word Document. On the Word document, include a header for each slide followed by your notes.
Use this guide, APA7 Visual Presentations - CSU Global LibraryLinks to an external site., to record your voiceover for your presentation. You can also use Zoom to record your voiceover.
Your presentation should include the following headers:
Introduction – brief overview of the topic and its relevance to accounting information systems and/or emerging technologies
Impact on Accounting Information Systems – how this topic…
arrow_forward
answer quickly
arrow_forward
Q1: Write an e-mail to technical support team of your college to retrieve your login
credentials. In order to make your e- mail effective mention all the important details and
reasons to prioritize your response
arrow_forward
As the user company's external auditor, which SOC report will you require your client to obtain?
Multiple Choice
SOC1 Type 2 report.
SOC 2 Type 1 report.
SOC 3 Type 2 report.
SOC 2 Type 2 report.
arrow_forward
I need help with a and b
arrow_forward
Please answer multichoice question in photo
arrow_forward
Discuss the potential aggravations you might face as a student as a result of your university using a flat-file data management environment.
arrow_forward
Audit concerns and implications on risk assessment are two important factorsthat must be addressed in a computer information system environment.Discuss the above statement.
dear tutor, kindly assist me to solve this question
arrow_forward
Sh6
Please help me.
Thankyou.
arrow_forward
Systems Analysis
Consider the following dialogue between a systems professional, Joe Pugh, and a manager of a department targeted for a new information system, Lars Meyer: Pugh: The way to go about the analysis is to first examine the old system, such as reviewing key documents and observing the workers perform their tasks. Then we can determine which aspects are working well and which should be preserved. Meyer: We have been through these types of projects before and what always ends up happening is that we do not get the new system we are promised; we get a modified version of the old system. Pugh: Well, I can assure you that will not happen this time. We just want a thorough understanding of what is working well and what is not. Meyer: I would feel much more comfortable if we first started with a list of our requirements. We should spend some time up-front determining exactly what we want the system to do for my department. Then you systems people can come in and determine what…
arrow_forward
Macmillan Learning
In a study of data derived from a variety of natural phenomena, F. A. Benford formulated an empirical law regarding the
frequency of occurrence of the first digit d in a set of numbers. Researchers have recognized Benford's law, also known as the
first-digits law, as an important tool in data analysis for diverse arenas such as forensic accounting, online social networking,
climate modeling, and gene sequencing.
For specific data sets, Benford observed that the frequencies of occurrence of d were approximated by the probability
distribution shown in the table.
d
1
2
3
4
5
6
7
8
9
P(d) .301 .176 .125 .097 .079 .067
.058
.051
.046
Use Benford's Law to find P (d 3). Express each result as a decimal rounded to three places.
P(d 3) =
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Related Questions
- Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection? Will different system access levels for different users be incorporated? Will customer orders be received via the Internet? Has the company identified an off‐site alternative computer processing location? Does the project budget include line items for an upgraded, uninterrupted power source and firewall? Required: In a two (2) page response, describe the control purpose for each point presented in the case.arrow_forwardBy taking into account information from the latest programme of Walmart (ethics and compliance) and the new GDPR data protection legislation, provide a summary of your key concerns about ethical, legal and professional implications associated with information handling and security 900 wordsarrow_forwardUploadedarrow_forward
- research data analytics in accounting information systems or emerging technologies in the accounting industry. Your presentation should focus on the impact of the selected topic on accounting information systems, internal controls, and benefits and challenges associated with its implementation. As a PowerPoint presentation with voiceover. The presentation should be 6-8 slides, not including the title page and the reference page. Speaker Notes should be submitted as a Word Document. On the Word document, include a header for each slide followed by your notes. Use this guide, APA7 Visual Presentations - CSU Global LibraryLinks to an external site., to record your voiceover for your presentation. You can also use Zoom to record your voiceover. Your presentation should include the following headers: Introduction – brief overview of the topic and its relevance to accounting information systems and/or emerging technologies Impact on Accounting Information Systems – how this topic…arrow_forwardanswer quicklyarrow_forwardQ1: Write an e-mail to technical support team of your college to retrieve your login credentials. In order to make your e- mail effective mention all the important details and reasons to prioritize your responsearrow_forward
- As the user company's external auditor, which SOC report will you require your client to obtain? Multiple Choice SOC1 Type 2 report. SOC 2 Type 1 report. SOC 3 Type 2 report. SOC 2 Type 2 report.arrow_forwardI need help with a and barrow_forwardPlease answer multichoice question in photoarrow_forward
- Discuss the potential aggravations you might face as a student as a result of your university using a flat-file data management environment.arrow_forwardAudit concerns and implications on risk assessment are two important factorsthat must be addressed in a computer information system environment.Discuss the above statement. dear tutor, kindly assist me to solve this questionarrow_forwardSh6 Please help me. Thankyou.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L