Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 3, Problem 4MCQ
To determine
Identify a method which is used to edit the transactions in real-time processing system.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
How does a direct access file processing system edit individual transactions?a. takes place in a separate computer runb. takes place in online mode as transactions are enteredc. takes place during a backup procedured. is not performed due to time constraintse. is not necessary
Which statement is NOT correct? The indexed sequential access methoda. is used for very large files that need both direct access and batch processing.b. may use an overflow area for records.c. provides an exact physical address for each record.d. is appropriate for files that require few inser- tions or deletions.
Which statement is NOT correct?a. Indexed random files are dispersed throughout the storage device without regard for physical proximity with related records.b. Indexed random files use disk storage space efficiently.c. Indexed random files are efficient when processing a large portion of a file at one time.d. Indexed random files are easy to maintain in terms of adding records.
Chapter 3 Solutions
Accounting Information Systems
Ch. 3 - What is ethics?Ch. 3 - Prob. 2RQCh. 3 - Prob. 3RQCh. 3 - Prob. 4RQCh. 3 - What are the three ethical principles that may...Ch. 3 - What is computer ethics?Ch. 3 - Prob. 7RQCh. 3 - Prob. 8RQCh. 3 - What are the computer ethical issues regarding...Ch. 3 - What are the computer ethical issues regarding...
Ch. 3 - What are the computer ethical issues regarding...Ch. 3 - Prob. 12RQCh. 3 - What are the computer ethical issues regarding the...Ch. 3 - Prob. 14RQCh. 3 - Prob. 15RQCh. 3 - What are the computer ethical issues regarding...Ch. 3 - Prob. 17RQCh. 3 - Prob. 18RQCh. 3 - Name the three fraud-motivating forces.Ch. 3 - Prob. 20RQCh. 3 - Prob. 21RQCh. 3 - Prob. 22RQCh. 3 - Prob. 23RQCh. 3 - What is lapping?Ch. 3 - Prob. 25RQCh. 3 - What is bribery?Ch. 3 - What is economic extortion?Ch. 3 - Prob. 28RQCh. 3 - Define check tampering.Ch. 3 - What is billing (or vendor) fraud?Ch. 3 - Prob. 31RQCh. 3 - Prob. 32RQCh. 3 - Prob. 33RQCh. 3 - Prob. 34RQCh. 3 - Prob. 35RQCh. 3 - Prob. 36RQCh. 3 - Prob. 37RQCh. 3 - Prob. 38RQCh. 3 - Prob. 39RQCh. 3 - Prob. 40RQCh. 3 - Prob. 41RQCh. 3 - Give one example of an error that a check digit...Ch. 3 - Prob. 43RQCh. 3 - Prob. 44RQCh. 3 - What is the objective of a transaction log?Ch. 3 - Prob. 46RQCh. 3 - Prob. 47RQCh. 3 - Prob. 48RQCh. 3 - Prob. 49RQCh. 3 - Prob. 50RQCh. 3 - Distinguish between ethical issues and legal...Ch. 3 - Prob. 2DQCh. 3 - Prob. 3DQCh. 3 - Prob. 4DQCh. 3 - Prob. 5DQCh. 3 - The estimates of losses annually resulting from...Ch. 3 - Prob. 7DQCh. 3 - Prob. 8DQCh. 3 - Prob. 9DQCh. 3 - Prob. 10DQCh. 3 - Prob. 11DQCh. 3 - Prob. 12DQCh. 3 - Prob. 13DQCh. 3 - Prob. 14DQCh. 3 - Distinguish between exposure and risk.Ch. 3 - Prob. 16DQCh. 3 - Prob. 17DQCh. 3 - Prob. 18DQCh. 3 - Prob. 19DQCh. 3 - Prob. 20DQCh. 3 - Prob. 21DQCh. 3 - Prob. 22DQCh. 3 - Prob. 23DQCh. 3 - Prob. 24DQCh. 3 - Prob. 25DQCh. 3 - Prob. 26DQCh. 3 - Prob. 27DQCh. 3 - Prob. 28DQCh. 3 - Explain the problems associated with inappropriate...Ch. 3 - Prob. 30DQCh. 3 - Prob. 31DQCh. 3 - Prob. 32DQCh. 3 - Prob. 33DQCh. 3 - Prob. 34DQCh. 3 - Prob. 35DQCh. 3 - Prob. 36DQCh. 3 - Prob. 37DQCh. 3 - Prob. 1MCQCh. 3 - Prob. 2MCQCh. 3 - Prob. 3MCQCh. 3 - Prob. 4MCQCh. 3 - Prob. 5MCQCh. 3 - Prob. 6MCQCh. 3 - Prob. 7MCQCh. 3 - Prob. 8MCQCh. 3 - Prob. 10MCQCh. 3 - Prob. 12MCQCh. 3 - Which of the following controls would best prevent...Ch. 3 - Prob. 14MCQCh. 3 - Prob. 15MCQCh. 3 - Prob. 16MCQCh. 3 - The fraud scheme that is similar to the concept of...Ch. 3 - Prob. 18MCQCh. 3 - Prob. 19MCQCh. 3 - FRAUD SCHEME - HEALTH INSPECTOR A city health...Ch. 3 - FRAUD SCHEME PURCHASING AGENT A purchasing agent...Ch. 3 - Prob. 3PCh. 3 - Prob. 4PCh. 3 - EXPENSE ACCOUNT FRAUD While auditing the financial...Ch. 3 - Prob. 6PCh. 3 - Prob. 7PCh. 3 - Prob. 8PCh. 3 - Prob. 9PCh. 3 - Prob. 10PCh. 3 - Prob. 11PCh. 3 - Prob. 12PCh. 3 - Prob. 13PCh. 3 - Prob. 14PCh. 3 - Prob. 15PCh. 3 - Prob. 16PCh. 3 - Prob. 17PCh. 3 - Prob. 18PCh. 3 - Prob. 19PCh. 3 - Prob. 20P
Knowledge Booster
Similar questions
- For each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forwardSo far, computer systems cannot yet ________. A. receive data and instructions from input devices such as a scanner. B. decide how to record a business transaction. C. communicate with other computers electronically. D. recognize that you made a mistake entering $100 when you meant to enter $101.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.a. Retrieve a record from the file based upon its primary key value.b. Update a record in the file.c. Read a complete file of records.d. Find the next record in a file.e. Insert a record into a file.f. Delete a record from a file.g. Scan a file for records with secondary keys.arrow_forward
- A system contains many processes. Three common processes that are “grouped” together are transaction corrections, adjustments, and cancellations. These three elements work to properly serve customers. Imagine a system that allows you to register for a class online. The online system must give you a way to correct any errors you made, such as registering for the wrong class. This would be a transaction correction. The system should also allow you to make adjustments, such as adding or dropping classes. Finally, the system should allow you to make cancellations, such as cancelling the registration process entirely. Notice that all three of these processes, correction, adjustment, and cancellation, work together to provide you with one service, which is registering for classes. What type of requirements are transaction corrections, adjustments, and cancellations? Select one. Question 4 options: A Functional Requirements B Nonfunctional Requirementsarrow_forwardI typed in the answers provided and the system responded incorrect.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubPrinciples of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L