Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 3MCQ
To determine
Identify the code which is described in the form of acronyms.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following best describes a system of computers that connects the internal users of an organization distributed over a wide geographic area? a. LAN b. Internet c. decentralized network d. multidrop network e. intranet
One physical computer can be used to host multiple instances of operating systems, and multiple users can separately access those separate operating systems. This is an example of:
A) blockchain.
B) value chain.
C)Virtualization.
D)distributed computing.
Controls that are designed to apply to an entire control environment are called:.
A)Integrated controls.
B)Application controls .
C)General controls .
D)Governance controls.
This internal control framework is used by many public companies that file with the SEC in the United States: .
A)COBIT.
B)PCAOB.
C) ERM.
D)coso.
In conversations, Bob told Alice that a property for sale had an "ocean view." She was so motivated that she made an offer and gave money as a down payment. When she went to see the property the ocean was not visible because it was too far away. Which element of fraud is illustrated by this story?.
A) Misappropriation of assets.
B)Corruption .
C)Material fact .…
Which statement is NOT true?a. In a typical two-tier client-server architecture, the server handles both application and database duties.b. Client computers are responsible for presenting data to the user and passing user input back to the server.c. Two-tier architecture is for local area network applications where the demand on the server is restricted to a relatively small population of users.d. The database and application functions are separated in the three-tier model. e. In three-tier client-server architectures, one tier is for user presentation, one is for database and applications access, and the third is for Internet access.
Chapter 12 Solutions
Accounting Information Systems
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 21RQCh. 12 - Prob. 22RQCh. 12 - Prob. 23RQCh. 12 - Prob. 1DQCh. 12 - Prob. 2DQCh. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 8DQCh. 12 - Prob. 9DQCh. 12 - Prob. 10DQCh. 12 - Prob. 11DQCh. 12 - What is a digital envelope?Ch. 12 - Prob. 13DQCh. 12 - Prob. 14DQCh. 12 - Prob. 15DQCh. 12 - Prob. 16DQCh. 12 - Prob. 17DQCh. 12 - Prob. 18DQCh. 12 - Prob. 19DQCh. 12 - Prob. 1MCQCh. 12 - Prob. 2MCQCh. 12 - Prob. 3MCQCh. 12 - Prob. 4MCQCh. 12 - Prob. 5MCQCh. 12 - Prob. 6MCQCh. 12 - Prob. 7MCQCh. 12 - A system of computers that connects the internal...Ch. 12 - Prob. 9MCQCh. 12 - Prob. 10MCQCh. 12 - Prob. 1PCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6PCh. 12 - VIRTUALIZATION Virtualization technology is...Ch. 12 - Prob. 8P
Knowledge Booster
Similar questions
- Technology can be used to support a strong internal control system. Discuss how technology has improved the point-of-sale transactions.arrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forwardThe ABC Company is a geographically distributed organization with several sites around the country. Users at these sites need rapid access to data for transaction processing purposes. The sites are autonomous; they do not share the same customers, products, or suppliers. Which distributed database method is best under these circumstances? Explain your reasoning.arrow_forward
- Which of the following provides a decentralized database or digital ledger of transactions that everyone on the network can see? a.Block chain technologies b.Crowd funding c.Crypto currencies d.Investment bankingarrow_forwardYou are the administrator of a web server to configure the level of access for users. Then need to be authenticated first before having access to some web pages. What criteria of information security has been addressed in this configuration? Choose one of the below options and justify your answer. - integrity - scalability - availability - confidentialityarrow_forwardWhich statement best describes the issue of distributed data processing (DDP)?a. The centralized and DDP approaches are mutually exclusive; an organization must choose one approach or the other.b. The philosophy and objective of the organization’s management will determine the extent of DDP in the firm.c. In a minimum DDP arrangement, only data input and output are distributed, leaving the tasks of data control, data conversion, database management, and data processing to be cen- trally managed.d. The greatest disadvantage of a totally distributed environment is that the distributed infor- mation processing unit locations are unable to communicate and coordinate their activities.e. Although hardware (such as computers, database storage, and input/output terminals) can be effectively distributed, the systems development and maintenance tasks must remain centralized for better control and efficiency.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College