Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127


Chapter 8, Problem 21RQ
Textbook Problem

Explain biometric identification systems.

Expert Solution

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

See Solution

*Response times vary by subject and question complexity. Median response time is 34 minutes and may be longer for new subjects.

Chapter 8 Solutions

Accounting Information Systems
Show all chapter solutions
Ch. 8 - What types of documentation constitute a...Ch. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Describe backup and recovery.Ch. 8 - Describe continuous data protection (CDP), a...Ch. 8 - What is the difference between a hot site and a...Ch. 8 - Describe a denial-of-service attack. What controls...Ch. 8 - Describe the three layers of controls for...Ch. 8 - Explain biometric identification systems.Ch. 8 - Describe the four layers of controls for...Ch. 8 - Distinguish firewalls, intrusion-detections...Ch. 8 - What is data encryption? What is the key in...Ch. 8 - Define computer hacking and cracking, and explain...Ch. 8 - Provide three examples of hacking techniques....Ch. 8 - The chapter discusses environmental hazards with...Ch. 8 - What is the COBIT 5 framework? How does it differ...Ch. 8 - Name the five principles delineated by COBIT 5.Ch. 8 - List the seven enablers in the COBIT 5 framework.Ch. 8 - What are the five IT control process domains in...Ch. 8 - The Enterprise Risk Management (ERM) framework...Ch. 8 - In small companies with few employees, it is...Ch. 8 - No matter how sophisticated a system of internal...Ch. 8 - If personnel hiring is done correctly, the other...Ch. 8 - Monitoring must be performed by an independent...Ch. 8 - A key control concern described in Table 8.2 (p....Ch. 8 - Debate the following point: Business continuity...Ch. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Preventing the unauthorized disclosure and loss of...Ch. 8 - Your boss was heard to say, If we implemented...Ch. 8 - For each of these control plans, suggest a...Ch. 8 - The following is a list of six control plans from...Ch. 8 - The following is a list of six control plans from...Ch. 8 - Question: 1. Using a key of 2 and an algorithm of...Ch. 8 - Question : Listed here are 20 control plans...Ch. 8 - The following is a list of 13 control plans from...Ch. 8 - Assume that accounts payable are processed on a...Ch. 8 - Personnel at CP Company must perform the following...Ch. 8 - AS5 outlines the processes for An Audit of...Ch. 8 - Examine the last column in Table 8.2 (p. 280) for...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Show solutions
What does the invisible hand of the marketplace do?

Principles of Economics (MindTap Course List)

Why do options typically sell at prices higher than their exercise values?

Fundamentals of Financial Management (MindTap Course List)

What is inflation and what causes it?

Principles of Microeconomics (MindTap Course List)

Why do economists make assumptions?

Principles of Macroeconomics (MindTap Course List)

FV OF UNEVEN CASH FLOW You want to buy a house within 3 years, and you are currently saving for the down paymen...

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)

Post the following entry to the general ledger and the subsidiary ledger.

College Accounting (Book Only): A Career Approach

Complete the following table:

Economics (MindTap Course List)

List aspects of culture that fit you or did not fit.

Understanding Management (MindTap Course List)