BuyFind

Accounting Information Systems

10th Edition
Hall + 1 other
Publisher: Cengage Learning,
ISBN: 9781337619202
BuyFind

Accounting Information Systems

10th Edition
Hall + 1 other
Publisher: Cengage Learning,
ISBN: 9781337619202

Solutions

Chapter
Section
Chapter 15, Problem 1RQ
Textbook Problem

What are the five control objectives of an operating system?

Expert Solution
To determine

Explain the five control objectives of an operating system.

Explanation of Solution

Operating System:

The system through which hardware and software in a computer managed, is known as operating system. Operating system provides a general service for programs in computer.

The five control objectives of an operating system are mentioned below:

  • The operating system must not get affected by any user or other programs. Proper control over the operating system can be attained with the help of other application software.
  • Overlapping between different threads running over a network is eliminated by operating system. Operating system ensures that every individual involved should have an experience of being the sole-user of the system.
  • Users’ data are secured by the operating system. An individual can also access the data module of other users.
  • Operating system consist diverse software. Therefore, operating system should be secured from corrupting or any other unfavorable changes.
  • Work environment should have no impact on operating system because an unexpected power down will stop all the programs in-between.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!

Chapter 15 Solutions

Accounting Information Systems
Ch. 15 - What are the risks from subversive threats?Ch. 15 - What are the risks from equipment failure?Ch. 15 - What is a firewall?Ch. 15 - Distinguish between network-level and...Ch. 15 - What are the most common forms of contra-security...Ch. 15 - What can be done to defeat a DDoS attack?Ch. 15 - How does public key encryption work?Ch. 15 - What is a digital envelope?Ch. 15 - What is a digital signature?Ch. 15 - Categorize each of the following as either an...Ch. 15 - What is DPI?Ch. 15 - At what three points in an electronic data...Ch. 15 - Why is human behavior considered one of the...Ch. 15 - Why would a systems programmer create a back door...Ch. 15 - Discuss the issues that need to be considered...Ch. 15 - Explain how an access token and an access control...Ch. 15 - Explain how a Trojan horse may be used to...Ch. 15 - Discuss six ways that threats from destructive...Ch. 15 - Explain the three ways that audit trails can be...Ch. 15 - Explain how poorly designed audit trail logs can...Ch. 15 - Many authorities believe that the employer does...Ch. 15 - Why is it risky to allow programmers to create...Ch. 15 - Is access control of greater concern in the...Ch. 15 - How can passwords actually circumvent security?...Ch. 15 - Explain how the one-time password approach works.Ch. 15 - End-user computing has become extremely popular in...Ch. 15 - Distinguish between data access and access...Ch. 15 - What are the objectives of auditors in auditing...Ch. 15 - What are some tests of data communications...Ch. 15 - Explain how smurf attacks and SYN flood attacks...Ch. 15 - Discuss the risks from equipment failure and how...Ch. 15 - Does every organization that has a LAN need a...Ch. 15 - Describe three ways in which IPS can be used to...Ch. 15 - What problem is common to all private key...Ch. 15 - What is RSA encryption?Ch. 15 - Explain the triple-DES encryption techniques known...Ch. 15 - Distinguish between a digital signature and a...Ch. 15 - Describe a digest within the context of a digital...Ch. 15 - What is a digital envelope?Ch. 15 - Why is inadequate segregation of duties a problem...Ch. 15 - Why is the request-response technique important?...Ch. 15 - Is backup redundancy inefficient?Ch. 15 - Discuss how the widespread use of laptop and...Ch. 15 - Discuss the unique control problems EDI creates.Ch. 15 - In an EDI system, only the customer needs to...Ch. 15 - Discuss how EDI creates an environment in which...Ch. 15 - When someone disguises the source of Internet...Ch. 15 - A program that attaches to another legitimate...Ch. 15 - The purpose of a checkpoint procedure is to...Ch. 15 - A users application may consist of several modules...Ch. 15 - An integrated group of programs that supports the...Ch. 15 - Which of the following is NOT a network control...Ch. 15 - Reviewing database authority tables is an example...Ch. 15 - The database attributes that individual users have...Ch. 15 - Transmitting numerous SYN packets to a targeted...Ch. 15 - Which of the following is not an operating system...Ch. 15 - A manufacturing company has a sales force that...Ch. 15 - Last year ACME Manufacturing commissioned...Ch. 15 - Mary Scott has a masters degree in computer...Ch. 15 - Stephanie Baskill, an unemployed accounting clerk,...Ch. 15 - A global manufacturing company has over 100...Ch. 15 - Listed here are five scenarios. For each scenario,...Ch. 15 - Listed here are four scenarios. For each scenario,...Ch. 15 - The following information is stored in two...Ch. 15 - Better Business Company (BBC) is in the process of...Ch. 15 - Ajax Automotive supports retail automotive centers...Ch. 15 - John Martin, a highly skilled computer technician...Ch. 15 - Some relevant database tables and attributes are...Ch. 15 - Required a. Using the database table and attribute...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Indicate the effects of the transactions listed in the following table on total current assets, current ratio, ...

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)