![MindTap Accounting, 1 term (6 months) Printed Access Card for Hall's Accounting Information Systems, 10th](https://www.bartleby.com/isbn_cover_images/9781337619257/9781337619257_smallCoverImage.jpg)
MindTap Accounting, 1 term (6 months) Printed Access Card for Hall's Accounting Information Systems, 10th
10th Edition
ISBN: 9781337619257
Author: Hall, James A.
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 16, Problem 5MCQ
Which of the following statements is NOT correct?
- a. EAMs capture transactions during processing without removing the application from service.
- b. EAMs support continuous monitoring of controls.
- c. EAMs have the potential to corrupt corporate databases
- d. EAMs decrease operational performance.
- e. All of the above are correct statements.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully captures
Computers remove a fundamental separation of functions between authorizing and processing transactions, and there is also a risk of the integrity of accounting records. What do you think, how can management control these risks?
1. Automated controls in a computerized system are always more reliable than manual controls. true or false
2. The risk of fraud in a computerized system is lower than in a manual system because of the use of automated controls.
3. What is a potential risk associated with computerized systems?
a. Inefficient use of resources
b. Unauthorized access to data
c. Excessive use of paper-based documents
d. Lack of user training
4. The use of computer systems in financial reporting increases the risk of material misstatements. true or false
5. Which of the following is a potential limitation of computer-based systems?
a. Increased risk of data loss
b. Reduced need for user training
c. Reduced need for internal controls
d. Increased efficiency and accuracy
Chapter 16 Solutions
MindTap Accounting, 1 term (6 months) Printed Access Card for Hall's Accounting Information Systems, 10th
Ch. 16 - Prob. 1RQCh. 16 - Prob. 2RQCh. 16 - Prob. 3RQCh. 16 - Prob. 4RQCh. 16 - Prob. 5RQCh. 16 - Prob. 6RQCh. 16 - Prob. 7RQCh. 16 - What is the importance of the SPL?Ch. 16 - Prob. 9RQCh. 16 - Prob. 10RQ
Ch. 16 - Prob. 11RQCh. 16 - Prob. 12RQCh. 16 - What tests may be conducted for identifying...Ch. 16 - Prob. 14RQCh. 16 - Prob. 15RQCh. 16 - Prob. 16RQCh. 16 - Prob. 17RQCh. 16 - Prob. 18RQCh. 16 - Prob. 19RQCh. 16 - Prob. 20RQCh. 16 - Prob. 1DQCh. 16 - Prob. 2DQCh. 16 - Prob. 3DQCh. 16 - What are rounding error routines, and why are they...Ch. 16 - Prob. 5DQCh. 16 - Prob. 6DQCh. 16 - Prob. 7DQCh. 16 - Prob. 8DQCh. 16 - The systems development life cycle is a...Ch. 16 - Prob. 10DQCh. 16 - Prob. 11DQCh. 16 - Compare and contrast the following techniques...Ch. 16 - Prob. 13DQCh. 16 - Prob. 1MCQCh. 16 - Prob. 2MCQCh. 16 - Which of the following is NOT an SDLC controllable...Ch. 16 - Prob. 4MCQCh. 16 - Which of the following statements is NOT correct?...Ch. 16 - Prob. 6MCQCh. 16 - Prob. 7MCQCh. 16 - Prob. 8MCQCh. 16 - Prob. 9MCQCh. 16 - Prob. 10MCQCh. 16 - Prob. 1PCh. 16 - Prob. 2PCh. 16 - Prob. 3PCh. 16 - Prob. 4PCh. 16 - Prob. 5PCh. 16 - Prob. 6PCh. 16 - Prob. 7PCh. 16 - Prob. 8PCh. 16 - Prob. 9PCh. 16 - The Balcar Companys external auditors are...Ch. 16 - Prob. 11PCh. 16 - Prob. 12PCh. 16 - Prob. 13PCh. 16 - Prob. 14PCh. 16 - Prob. 15PCh. 16 - Prob. 16PCh. 16 - Prob. 17PCh. 16 - Prob. 18P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Which of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.arrow_forwardThe installation of a database management system is likely to have the least impact ona. data redundancy.b. entity-wide sharing of common data.c. exclusive ownership of data.d. the logic needed to solve a problem in an application program.e. the internal controls over data access.arrow_forward1. _____ are controls that do not rely on the client's information technology (IT) environment for their operation. a. IT general controls (ITGCs) b. Automated controls c. Computer application controls d. Manual controls 2. Assessing control risk begins with understanding entity-level controls. a. True b. Falsearrow_forward
- Explain why deficiencies in internal controls might not always result in significant misstatements when transactions are recordedarrow_forwardAuditors of ERP systemsa. need not be concerned about segregation of duties because these systems possess strong computer controls.b. focus on output controls such as independent verification to reconcile batch totals.c. are concerned that managers fail to exercise adequate care in assigning permissions.d. do not see the data warehouse as an audit or control issue at all because financial records are not stored there.e. need not review access levels granted to users because these are determined when the system is configured and never change.arrow_forwardThe four fundamental characteristics of blockchain ( decentralization, immutability,security, and transparency)create a system with: Distrust inthe quality of its data Trust, for asystem without the need forcentralized authority The needfor a lot of oversight Two manyusers to make it effectivearrow_forward
- Which of the following exists as an inherent risk even in the best designed systems a. Authorization b. Collusion c. Independent checks d. Detective controlarrow_forwardControls over data management systems fall into two categories: access controls and backup controls. In the shared database environment, access control risks include corruption, theft, misuse, and destruction of data. These threats originate from both unauthorized intruders and authorized users who exceed their access privileges. Which of the following options is not part of controls over data management systems? a. Employees that sharing the same computers need restriction for access to specific directories, programs, and data files by using multilevel password control.b. To recover data from disaster, organizations must implement policies and procedures and routinely provide backup copies of critical files.c. Database Administrator works closely with users and systems designers has primary responsibility for user view design and works closely with users and systems designers.d. Access to confidential data must be properly managed. Inference controls prevent users from inferring,…arrow_forwardA company limits access to computerized accounting records. What can be said of this procedure? a.It is a good example of physical controls. b.It violates adequate documents and records. c.It violates proper segregation of duties. d.It is a good example of independent checks on performance.arrow_forward
- Encryption a. avoids the need for separation of duties. b. creates firewalls to protect data. c. cannot be broken by hackers. d. rearranges messages by a special process.arrow_forwardWhich of the following describes preventive controls? (Several choices may be correct.) Expected to be 100% effective. O Easily verified as to whether the control has worked. O Designed to stop misstatement from occurring. O Applied to each transaction prior to entering transactions into the accounting system. Applied to each transaction after transactions have been processed. O Designed to detect fraud or errors that have occurred.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619455/9781337619455_smallCoverImage.gif)
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License