Week 6 Assignment
a) Shipping personnel should be required to document (on paper or by computer) receipt of
goods from the finished goods storeroom. This procedure acknowledges responsibility for
custody of the goods transferr
(TCO A) Data are:
facts entered, stored, and processed by an information system
processed output that is useful to decision makers
another word for information
quantitative facts that are not qualitative by nature
(TCO G) Computer fraud is often much more difficult to detect than other types of fraud because
perpetrators usually only steal very small amounts of money at a time, thus
requiring a long period of time to have elapsed before th
Step 2: New Company:
This was taken at the Maintain your Company because I forgot to snap it when I set the
company up. Hope this will work
Step 3 & 4 Beginning Balances
I redid this portion at least 5 times and still go
As a member of a development team, youve been asked to develop and test the
Discuss the eight basic steps required in the implementation phase of the SDLC in
the proper order they should occur. (Points : 30)
The eight-step method to develop and t
(TCO G) The problem of inability to add new data without violating the
basic integrity of the database is referred to as the
an update anomaly.
How many different kinds of inventory items does S&S sell?
How many sales were made during October?
What were total sales in October?
What was the average amount of a sales t
Week 1 Assignment
Discussion Question 2-2
By using pre-numbered checks to write up customer orders at restaurants is an example of a good
internal control. It helps managers to calculate how much payments should received from
customers by comparing
ACCT 571 CASE STUDY
Homework Week 2
SEC charged Diamond Foods Inc a San Francisco-based snack food company and its
former chief financial officer Steven Neill with accounting fraud, the finding of a two-year
investigation, lying about waln
Companies should not be held liable for losses sustained in a successful attack made on their
AIS by outside sources
I think that Companies should be held liable for losses sustained in a successful attack
made on their AIS by outside sources. Thi
Create a questionnaire checklist that can be used to evaluate controls for each of
the four basic activities in the revenue cycle (sales order entry, shipping, billing,
and cash collections).
a. For each control issue, write a Yes/No question such th
15.3 You have been hired to evaluate the payroll system for the Skip-Rope
Manufacturing Company. The company processes its payroll in-house. Use Table 15-1 as a
reference to prepare a list of questions to evaluate Skip-Ropes internal control structure as
21.4 Mark Mitton, the liaison to the IS department, has eliminated all but the best three
systems. Mark developed a list of required features, carefully reviewed each system,
talked to other users, and interviewed appropriate systems representatives. Mark
Compatibility tests utilize a(n) _, which is a
list of authorized users, programs, and data files the
users are authorized to access or manipulate.
logical control matrix
(TCO D) How is credit approval generally handled for well-established
customers with a documented payment history?
specific authorization by the credit manager
routine approval is usually granted
a new credit application is t
These are the automatically computed results of your exam.
Grades for essay questions, and comments from your
instructor, are in the "Details" section below.
ACCT 571 Accounting Information System
WK 3 Assignment
Should Companies be Held Liable for Successful Attacks on Their AIS by Outside Sources?
The Accounting Information System (AIS) is a computer based method in conjunction with
ACCT 571 Accounting Information Systems
WK 2 Assignment
The worlds largest home improvement specialty retailer in the U.S., Canada Puerto Rico, U.S.
Virgin Islands and Mexico; Home Depot continues to hold the dominant position in the home
Problem 1.6 (page 20)
a. What kind of information do you think Tesco gathers?
Tesco probably gather a persons name, address, age, sex, email, phone, country, and
interest during the initial signing up for their rewards cars. After signing up, Tesco
What internal control procedure(s) would be most effective
in preventing the following errors or fraudulent acts?
a. An inadvertent data entry error caused an employees wage rate
to be overstated in the payroll master file.
Personnel department shou
a. What is the great divide in the systems development process?
What causes the gap?
The great divide is the gap between the information needs of
business managers and the information produced by the
information systems. The great divide is caused
Why take the time to develop separate REA diagrams for
each business cycle if the ultimate objective is to combine them into
one integrated enterprise-wide data model? Why not just focus on the
integrated model from the start?
Working from a single
Case 5-1 (page 144)
1. Miller fits the profile of the average fraud perpetrator because he searches for and finds weak points
in a system and exploits and takes advantage of it for his own selfish gain. He differs from the
average criminal because he was