Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 16, Problem 6MCQ
To determine
Identify the following which is not an objective of network control.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully captures
Which of the following statements about the client-server model is correct?a. It is best suited to the token ring topology because the random-access method this topology uses detects data collisions.b. It distributes both data and processing tasks to the server node. The client-server model can use the bus or ring topology.c. It is most effective when used as a bus topology because its deterministic access method avoids collisions and prevents data loss during transmissions.d. It is more efficient than the bus or ring topologies because it transmits an entire file of records to the requesting node rather than only a single record.e. It is not used in conjunction with either the bus or ring topologies.
1. _____ are controls that do not rely on the client's information technology (IT) environment for their operation.
a. IT general controls (ITGCs)
b. Automated controls
c. Computer application controls
d. Manual controls
2. Assessing control risk begins with understanding entity-level controls.
a. True
b. False
Chapter 16 Solutions
Accounting Information Systems
Ch. 16 - Prob. 1RQCh. 16 - Prob. 2RQCh. 16 - Prob. 3RQCh. 16 - Prob. 4RQCh. 16 - Prob. 5RQCh. 16 - Explain discretionary access privileges.Ch. 16 - Prob. 7RQCh. 16 - Prob. 8RQCh. 16 - What is a vaccine, and what are its limitations?Ch. 16 - Prob. 10RQ
Ch. 16 - Prob. 11RQCh. 16 - What are the risks from equipment failure?Ch. 16 - Prob. 13RQCh. 16 - Prob. 14RQCh. 16 - Prob. 15RQCh. 16 - Prob. 16RQCh. 16 - Prob. 17RQCh. 16 - Prob. 18RQCh. 16 - Prob. 19RQCh. 16 - Prob. 20RQCh. 16 - Prob. 21RQCh. 16 - Prob. 22RQCh. 16 - Prob. 1DQCh. 16 - Prob. 2DQCh. 16 - Prob. 3DQCh. 16 - Prob. 4DQCh. 16 - Prob. 5DQCh. 16 - Prob. 6DQCh. 16 - Prob. 7DQCh. 16 - Prob. 8DQCh. 16 - Prob. 9DQCh. 16 - Prob. 10DQCh. 16 - Prob. 11DQCh. 16 - Prob. 12DQCh. 16 - Prob. 13DQCh. 16 - End-user computing has become extremely popular in...Ch. 16 - Prob. 15DQCh. 16 - Prob. 16DQCh. 16 - Prob. 17DQCh. 16 - Prob. 18DQCh. 16 - Prob. 19DQCh. 16 - Prob. 20DQCh. 16 - Prob. 21DQCh. 16 - Prob. 22DQCh. 16 - Prob. 23DQCh. 16 - Prob. 24DQCh. 16 - Prob. 25DQCh. 16 - Describe a digest within the context of a digital...Ch. 16 - What is a digital envelope?Ch. 16 - Prob. 28DQCh. 16 - Prob. 29DQCh. 16 - Prob. 30DQCh. 16 - Prob. 31DQCh. 16 - Discuss the unique control problems EDI creates.Ch. 16 - Prob. 33DQCh. 16 - Prob. 34DQCh. 16 - Prob. 1MCQCh. 16 - Prob. 2MCQCh. 16 - Prob. 3MCQCh. 16 - Prob. 4MCQCh. 16 - Prob. 5MCQCh. 16 - Prob. 6MCQCh. 16 - Prob. 7MCQCh. 16 - Prob. 8MCQCh. 16 - Prob. 9MCQCh. 16 - Prob. 10MCQCh. 16 - Prob. 1PCh. 16 - Prob. 2PCh. 16 - Prob. 3PCh. 16 - Prob. 4PCh. 16 - Prob. 5PCh. 16 - Prob. 6PCh. 16 - Prob. 7PCh. 16 - Prob. 8PCh. 16 - Better Business Company (BBC) is in the process of...Ch. 16 - Prob. 10PCh. 16 - Prob. 11PCh. 16 - Prob. 12PCh. 16 - Prob. 13P
Knowledge Booster
Similar questions
- Which of the following is NOT an SDLC controllable activity? a. External audit participation b. User specification c. Systems authorization d. User test and acceptance procedures e. All are SDLC controlsarrow_forwardWhich of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardWhich of the following exists as an inherent risk even in the best designed systems a. Authorization b. Collusion c. Independent checks d. Detective controlarrow_forward
- Encryption a. avoids the need for separation of duties. b. creates firewalls to protect data. c. cannot be broken by hackers. d. rearranges messages by a special process.arrow_forwardWhich of the following is not true concerning control activities? a.Control procedures is another term for control activities. b. Transaction authorization is a control activity. c. Information and communication is an important component of control activities. d. Control activities generally fall into the two categories of preventive controls and detective controls.arrow_forwardControls over data management systems fall into two categories: access controls and backup controls. In the shared database environment, access control risks include corruption, theft, misuse, and destruction of data. These threats originate from both unauthorized intruders and authorized users who exceed their access privileges. Which of the following options is not part of controls over data management systems? a. Employees that sharing the same computers need restriction for access to specific directories, programs, and data files by using multilevel password control.b. To recover data from disaster, organizations must implement policies and procedures and routinely provide backup copies of critical files.c. Database Administrator works closely with users and systems designers has primary responsibility for user view design and works closely with users and systems designers.d. Access to confidential data must be properly managed. Inference controls prevent users from inferring,…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning