Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 4MCQ
To determine
Identify the code which is described in the form of acronyms.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Which of the following statements is true?a. Cookies were originally intended to facilitate advertising on the Web.b. Cookies always contain encrypted data.c. Cookies are text files and never contain encrypted data. d. Cookies contain the URLs of sites the user visits. e. Web browsers cannot function without cookies.
A message that is contrived to appear to be coming from a trusted or authorized source is calleda. a denial of service attack.b. digital signature forging.c. Internet protocol spoofing.d. URL masquerading.e. a SYN-ACK packet.
Which of the following statements is correct? a. TCP/IP is the basic protocol that permits communication between Internet sites. b. TCP/IP controls Web browsers that access the Web. c. TCP/IP is the document format used to produce Web pages. d. TCP/IP is used to transfer text files, programs, spreadsheets, and databases across the Internet. e. TCP/IP is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.
Chapter 12 Solutions
Accounting Information Systems
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 21RQCh. 12 - Prob. 22RQCh. 12 - Prob. 23RQCh. 12 - Prob. 1DQCh. 12 - Prob. 2DQCh. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 8DQCh. 12 - Prob. 9DQCh. 12 - Prob. 10DQCh. 12 - Prob. 11DQCh. 12 - What is a digital envelope?Ch. 12 - Prob. 13DQCh. 12 - Prob. 14DQCh. 12 - Prob. 15DQCh. 12 - Prob. 16DQCh. 12 - Prob. 17DQCh. 12 - Prob. 18DQCh. 12 - Prob. 19DQCh. 12 - Prob. 1MCQCh. 12 - Prob. 2MCQCh. 12 - Prob. 3MCQCh. 12 - Prob. 4MCQCh. 12 - Prob. 5MCQCh. 12 - Prob. 6MCQCh. 12 - Prob. 7MCQCh. 12 - A system of computers that connects the internal...Ch. 12 - Prob. 9MCQCh. 12 - Prob. 10MCQCh. 12 - Prob. 1PCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6PCh. 12 - VIRTUALIZATION Virtualization technology is...Ch. 12 - Prob. 8P
Knowledge Booster
Similar questions
- Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host’s network using a technique calleda. spoofing.b. spooling.c. dual-homed.d. screening.arrow_forwardWhich of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.arrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forward
- Sniffer software isa. used by malicious Web sites to sniff data from cookies stored on the user’s hard drive. b. used by network administrators to analyze net- work traffic. c. used by bus topology intranets to sniff for carriers before transmitting a message to avoid data collisions. d. an illegal program downloaded from the Web to sniff passwords from the encrypted data of Internet customers. e. illegal software for decoding encrypted messages transmitted over a shared intranet channel.arrow_forwardWhich statement is NOT correct?a. Legacy systems may process financially significant transactions.b. Some legacy systems use database technology.c. Mainframes are exclusive to legacy systems, while modern systems use only the client-server model.d. All the above are true.arrow_forwardWhich of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully capturesarrow_forward
- Which of the following is a risk to the financial statement of a company when it places a purchase order with a supplier? The advantages of PDF files are: A. that they can be securely locked so that the figures cannot be changed.B. that they can be easily manipulated and changed by users.C. the software to produce them is very cheap.D. none of the options are correct. 2. What is information overload? A. The situation where a computer has more information than is needed or is able to be processed in a meaningful way when a computer program is executed.B. The situation where an individual has more information than is needed or is able to be processed in a meaningful way when working through a decision.C. The situation where a computer has more information than is needed or is able to be processed when data storage is taking place.D. The situation where the amount of information exceeds the storage capacity of the brain of a human being. 3. When all data are stored in a central place,…arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (f) A company purchased the leading “off-the-shelf” e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the database by entering appropriate SQL code.arrow_forwardWhich of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,