Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12, Problem 12.14CS12
Explanation of Solution
Find who is most likely to bear the consequences of the Cover Oregon mistakes:
- Most of the employees in Cover Oregon held Governor Kitzhaber responsible in a survey for the mistakes.
- But he was re-elected in 2015 and resigned amid an unrelated influence-peddling scandal.
- It was observed that Bruce Goldberg was fired but continued to draw a full salary...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Damon Davis was creating the Drano Plumbing Company's spreadsheet. According to his estimates, the net revenue would be $50,000. Who knows what the most probable cause of this mismatch was, but his Total Balance Sheet Columns showed a deficit of $400,000 and a credit of $300,000, which he summed together and calculated as follows: Why shouldn't this be the case, and what should he do to locate the issue's root cause?
In the office of Drano Plumbing, Damon Davis was finishing off some paperwork. A net profit of $50,000 was predicted by him. The Balance Sheet showed a deficit of $400,000 and a credit of $300,000 when he added up the two columns. So, what do you think caused the findings to be so different? What more might he check to see whether that's the issue, if this wasn't the cause?
Damon Davis was doing the paperwork for Drano Plumbing. He estimated a net profit of $50,000. He discovered that the debit column on the balance sheet totaled $400,000 and the credit column, $300,000, when he added up the columns. What was the difference in the results' most likely cause? What should he do if this wasn't the root of the problem? How can he find out where it came from?
Chapter 12 Solutions
Using MIS (10th Edition)
Ch. 12.4 - Prob. 1EGDQCh. 12.4 - Prob. 2EGDQCh. 12.4 - Prob. 3EGDQCh. 12.4 - Prob. 4EGDQCh. 12.4 - Prob. 6EGDQCh. 12.4 - Prob. 7EGDQCh. 12.4 - Prob. 8EGDQCh. 12.4 - Prob. 9EGDQCh. 12.4 - Prob. 10EGDQCh. 12.6 - Sports are one area in which the collection and...
Ch. 12.6 - Prob. 2BOIQCh. 12.6 - Prob. 3BOIQCh. 12.6 - Prob. 4BOIQCh. 12.7 - Prob. 1SGDQCh. 12.7 - Prob. 2SGDQCh. 12.7 - Prob. 3SGDQCh. 12.7 - Prob. 4SGDQCh. 12.7 - Prob. 5SGDQCh. 12.7 - Prob. 6SGDQCh. 12.7 - Prob. 7SGDQCh. 12.7 - Prob. 1CGDQCh. 12.7 - Prob. 2CGDQCh. 12.7 - Prob. 3CGDQCh. 12.7 - Prob. 4CGDQCh. 12.7 - Prob. 5CGDQCh. 12.7 - Prob. 12.1ARQCh. 12.7 - Prob. 12.2ARQCh. 12.7 - Prob. 12.3ARQCh. 12.7 - What are the phases in the systems development...Ch. 12.7 - What are the keys for successful SDLC projects?...Ch. 12.7 - How can scrum overcome the problems of the SDLC?...Ch. 12.7 - Prob. 12.7ARQCh. 12 - Prob. 12.1UYKCh. 12 - Prob. 12.4UYKCh. 12 - Prob. 12.5UYKCh. 12 - Prob. 12.6CE12Ch. 12 - Prob. 12.7CE12Ch. 12 - Prob. 12.8CE12Ch. 12 - Prob. 12.9CE12Ch. 12 - Describe three reasons why cases like this will...Ch. 12 - Prob. 12.11CS12Ch. 12 - Prob. 12.12CS12Ch. 12 - The project was known to be in trouble, but it...Ch. 12 - Prob. 12.14CS12
Knowledge Booster
Similar questions
- 9 Which of the following statements is FALSE when discussing separation of duties? Which of the following statements is FALSE when discussing separation of duties? Separation of duties spreads responsibilities out over an organization so no single individual becomes the indispensable individual with all of the "keys to the kingdom" or unique knowledge about how to make everything work. Separation of duties is a principle employed in many organizations to ensure that no single individual has the ability to conduct transactions alone. Separation of duties as a security tool is a good practice and should be implemented to the greatest extent possible. Employing separation of duties means that the level of trust in any one individual is lessened, and the ability for any individual to cause catastrophic damage to the organization is also lessened.arrow_forwardIn 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…arrow_forwardDamon Davis was putting the finishing touches on the paperwork for Drano Plumbing. He estimated that the net profit would be $50,000. When he tallied the columns on the Balance Sheet, he saw that the debit column equaled $400,000 and the credit column totaled $300,000. What was the most likely reason for the discrepancy in results? If this was not the root of the problem, what should he do to identify the source of the problem?arrow_forward
- Week 3: Discussion Standards for Evidence Collection & Volatile Data Collection 22 unread replies.22 replies. Submit your initial post for one of these two options. Option 1- Evidence Collection Standards Discuss the similarities and differences in standards for collecting evidence in private, civil, and criminal investigations. Describe the likely places where the different types of investigations will occur. Describe who will be involved in each type of investigation. Option 2 Volatile Data Describe volatile data, including situations when a forensic examiner would need to collect it. Explain the possible forensic relevance of volatile data. Explain differences in recommendations for first responders and forensic specialists for collecting volatile data. What equipment and resources would a forensic specialist need to collect volatile data?arrow_forwardThe worksheet for the Drano Plumbing Company was prepared by Damon Davis. He determined that his net income was $50,000. He added up the $400,000 shortfall on his Total Financial Sheet Columns and the $300,000 credit, and then he calculated: Who is aware of the most likely explanation for this disparity? If such is the case, how should he go about locating the issue?arrow_forwardGiven the following data records that includes the employee’s full name, Job, and the salary. The institute has decided to award the instructors a bonus of 200 due to their efforts during the pandemic.Adam Saleet,IT Support,1000Naji Shemmari,Registrar,1250Bilal Tweijari,Instructor,2000Abdallah Mazem,Accountant,1000Nizar Hachem,Instructor,1800Nawwara Sleiman,Admission,900Ameen Sinjer,QA Officer,1400Walaa Saeed,Instructor,1900Hamid Shami,IT Support,850Nadine Khattar,Instructor, 1480Using “csv”, “table_utils”, and “statistics” libraries, you are asked to do the following:a- Create a text file, SP21-Emp1.txt, and copy the above contents to it.3b- Write a python program that does the following:1- Read the contents of the file SP21-Emp1.txt into a list.2- Extract the salaries into a new list.2- For each instructor, you should add 200 to their salary.3- Each name should also be split into first and last.4- Using “statistics” library, calculate the mean and median of the salaries.5- Print the…arrow_forward
- Putting the final touches on the paperwork for Drano Plumbing was Damon Davis. The net profit, he thought, would be $50,000. He added up the columns on the balance sheet and discovered that the credit column was worth $30,000 and the debit column was $400,000, respectively. What was the most probable cause of the inconsistent results? What should he do to determine the issue's origin if this wasn't the cause of the issue?arrow_forward. Choose a publicly traded security for which you can find a series of historical values. Make a conjecture about related data (at least two data series), that might be used as predictors for this series of values. Find online data sources to get current data for both the predictors and the values of the security (up to 12/31/20 or more recent, if possible) Download this data and copy it into Excel, Create graphs of the data . Use Excel to conduct a regression of the values of the security against the predictors and verify the validity of underlying assumptions eliminate outliers if necessary, check for homoscedasticity and serial correlation, look for evidence of multicollinearity and eliminate redundant predictors if necessary . Submit written report & Excel spreadsheet, Report can be .doc or .pdf. Document regression inputs with text comments, Report should clearly state the conjecture being investigated, clearly describe the data sources used & data handling, include links…arrow_forwardQuestion 1 Which of the following correctly describes the difference between privacy and security? Privacy is about the individual's control over sensitive information pertaining to the individual; security is about the methods used to provide control over information. Privacy is about controlling access to personal information; security is about controlling access to company information. None of the listed choices are correct. Privacy and security refer to the sets of controls used to protect information. Question 2 Extended service agreements which run for 3 more years require that Sifers-Grayson provide software maintenance and patches for SCADA systems sold more than fifteen years ago. The engineering workstations used to provide this support take up 500 sq ft of space in the R&D lab and, due to their reliance on Windows XP, present security vulnerabilities which need to…arrow_forward
- As of the time of writing, Damon Davis was completing out the paperwork for Drano Plumbing. He estimated a $50,000 net profit would be made. He counted the columns of the balance sheet and knew how much was in the credit column ($300,000) and how much was in the negative column ($400,000). What, in your opinion, was the most plausible reason for the discrepancy in the results? What should he do next to identify the issue's cause if this wasn't the cause of the issue?arrow_forwardExplain how the GRANT statement could affect the protection of intellectual property. What are the benefits of gaining the various types of access, and what is the procedure for doing so? When looking forward many years, what are the odds that they will be asked to surrender their licenses?arrow_forwardA security team received a regulatory notice asking for information regarding collusion and pricing from staff members who are no longer with the organization. The legal department provided the security team with a list of search terms to investigate. This is an example of: A. due intelligence B. e-discovery. C. due care. D. legal hold. ~If you could explain why you chose that answer, I’d appreciate it. Thank you!arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning