spacenab

Spacenab

Log in

 Password
"Post your contents, writings, articles, info-graphics, and more on spacenab."
sign up with facebook
Create a new post
PhilipMendelson

ACC 564 Entire Course Accounting Information Systems

PhilipMendelson

ACC 564 Entire Course Accounting Information Systems

  Follow Below Link to Buy Answer or Oder Us for 100% Original and Plagiarism Free Work

 

Email us for original work at ( Homeworkeducator@gmail.com )

http://homeworkeducation.com/downloads/acc-564-entire-course-accounting-information-systems/

ACC 564 Week 2 Assignment 1 – Information Needs for the AIS

In 1967, Russell Ackoff presented a classical analysis of misinformation in management (Ackoff’s Management Misinformation Systems, Case 1-1, pg. 21 of the text). Now, you need to fast-forward to the present. After reading the case, craft your own version of misinformation in management by developing five (5) key incorrect assumptions that management makes about its accounting information systems.

 

For this assignment, research the Internet or Strayer databases for information related to improper assumptions concerning accounting information systems.

 

Write a five to seven (5-7) page paper in which you:

Based on your research, assess how corporate leaders may make improper assumptions related to accounting information systems and the related information. Indicate the most negative potential impacts on business operations related to these assumptions. Provide support for your rationale.

Suggest three to four (3-4) ways in which organizational performance may be improved when information is properly managed within a business system. Provide support for your rationale.

Evaluate the level of system security (i.e., high, medium, low) needed to ensure information integrity within automated business systems. Provide support for your evaluation.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

ACC 564 Week 3 Quiz 1

1) Which of the following statements below shows the contrast between data and information?

  1. A) Data is the output of an AIS.
  2. B) Information is the primary output of an AIS.
  3. C) Data is more useful in decision-making than information.
  4. D) Data and information are the same.

 

2) Information is

  1. A) basically the same as data.
  2. B) raw facts about transactions.
  3. C) potentially useful facts when processed in a timely manner.
  4. D) data that has been organized and processed so that it’s meaningful.

 

3) The value of information can best be defined as

  1. A) how useful it is to decision makers.
  2. B) the benefits produced by possessing and using the information minus the cost of producing it.
  3. C) how relevant it is.
  4. D) the extent to which it maximizes the value chain.

 

4) An accounting information system (AIS) processes ________ to provide users with ________.

  1. A) data; information
  2. B) data; transactions
  3. C) information; data
  4. D) data; benefits

 

5) Information that reduces uncertainty, improves decision makers’ ability to make predictions, or confirms or corrects their prior expectations, is said to be

  1. A) complete.
  2. B) relevant.
  3. C) reliable.
  4. D) timely.

 

6) Information that is free from error or bias and accurately represents the events or activities of the organization is

  1. A) relevant.
  2. B) reliable.
  3. C) verifiable.
  4. D) timely.

 

7) Information that does not omit important aspects of the underlying events or activities that it measures is

  1. A) complete.
  2. B) accessible.
  3. C) relevant.
  4. D) timely.

 

8) When two knowledgeable people acting independently each produce the same information, this information is said to be

  1. A) complete.
  2. B) relevant.
  3. C) reliable.
  4. D) verifiable.

 

9) Data must be converted into information to be considered useful and meaningful for decision-making. There are six characteristics that make information both useful and meaningful. If information is free from error or bias and accurately represents the events or activities of the organization, it is representative of the characteristic of

  1. A) relevancy.
  2. B) timeliness.
  3. C) understandability.
  4. D) reliability.

 

10) An accounting information system must be able to perform which of the following tasks?

  1. A) collect transaction data
  2. B) process transaction data
  3. C) provide adequate controls
  4. D) all of the above

 

11) Which of the following is not an example of a common activity in an AIS?

  1. A) buy and pay for goods and services
  2. B) sell goods and services and collect cash
  3. C) summarize and report results to interested parties
  4. D) recording of sales calls for marketing purposes

 

12) Which of the following is not one of the components of an AIS?

  1. A) Internal controls and security measures
  2. B) People
  3. C) Procedures and instructions
  4. D) Hardware

 

13) One group that relies on both the adequate collection and transformation of data for decision-making purposes for an organization is

  1. A) management.
  2. B) interested outsiders.
  3. C) competitors.
  4. D) the government.

 

14) The primary objective of accounting is to

  1. A) implement strong internal controls.
  2. B) provide useful information to decision makers.
  3. C) prepare financial statements.
  4. D) ensure the profitability of an organization.

 

15) The American Institute of Certified Public Accountants (AICPA) has recognized the importance of AIS and the major impact information technology has on the area of accounting. To recognize individual CPAs who have met educational and experiential requirements in this area, the group formally created the designation known as

  1. A) the Certified Management Accountant.
  2. B) the Certified Information Technology Professional.
  3. C) the Certified Internal Auditor.
  4. D) the Certified Data Processing Professional.

 

16) The AIS must include controls to ensure

  1. A) safety and availability of data.
  2. B) marketing initiatives match corporate goals.
  3. C) information produced from data is accurate.
  4. D) both A and C

 

17) A change in the AIS that makes information more easily accessible and widely available within an organization is most likely to first influence the

  1. A) organizational culture.
  2. B) customer base.
  3. C) external financial statement users.
  4. D) production activity.

 

18) The process of creating value for customers is the result of nine activities that form a

  1. A) value chain.
  2. B) profitable operation.
  3. C) successful business.
  4. D) support system.

 

19) The value chain concept is composed of two types of activities known as

  1. A) primary and support.
  2. B) primary and secondary.
  3. C) support and value.
  4. D) technology and support.

 

20) Which of the following is a primary activity in the value chain?

  1. A) infrastructure
  2. B) technology
  3. C) purchasing
  4. D) marketing and sales

 

 

More Questions are Included…

 

ACC 564 Week 4 Assignment 2 – Hacking the AIS

In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.

 

For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked.

 

Write a five to seven (5-7) page paper in which you:

Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.

Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.

Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.

Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

ACC 564 Week 5 Quiz 2

1) Wally Hewitt maintains an online brokerage account. In early March, Wally received an email from the firm that explained that there had been a computer error and that provided a phone number so that Wally could verify his customer information. When he called, a recording asked that he enter the code from the email, his account number, and his social security number. After he did so, he was told that he would be connected with a customer service representative, but the connection was terminated. He contacted the brokerage company and was informed that they had not sent the email. Wally was a victim of

  1. A) Bluesnarfing.
  2. B) splogging.
  3. C) vishing.
  4. D) typosquatting.

 

2) When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as

  1. A) data diddling.
  2. B) dumpster diving.
  3. C) eavesdropping.
  4. D) piggybacking.

 

3) Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by

  1. A) scavenging.
  2. B) skimming.
  3. C) Internet auction fraud.
  4. D) cyber extortion.

 

4) A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a

  1. A) trap door.
  2. B) data diddle.
  3. C) logic bomb.
  4. D) virus.

 

5) The unauthorized copying of company data is known as

  1. A) data leakage.
  2. B) eavesdropping.
  3. C) masquerading.
  4. D) phishing.

 

6) Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called

  1. A) hackers.
  2. B) crackers.
  3. C) phreakers.
  4. D) jerks.

 

7) What is a denial of service attack?

  1. A) A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider’s e-mail server.
  2. B) A denial of service attack occurs when an e-mail message is sent through a re-mailer, who removes the message headers making the message anonymous, then resends the message to selected addresses.
  3. C) A denial of service attack occurs when a cracker enters a system through an idle modem, captures the PC attached to the modem, and then gains access to the network to which it is connected.
  4. D) A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more Usenet newsgroups LISTSERV lists.

 

8) Gaining control of someone else’s computer to carry out illicit activities without the owner’s knowledge is known as

  1. A) hacking.
  2. B) hijacking.
  3. C) phreaking.
  4. D) sniffings.

 

9) Illegally obtaining and using confidential information about a person for economic gain is known as

  1. A) eavesdropping.
  2. B) identity theft.
  3. C) packet sniffing.
  4. D) piggybacking.

 

10) Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called

  1. A) superzapping.
  2. B) data leakage.
  3. C) hacking.
  4. D) piggybacking.

 

11) Which of the following is not a method of identify theft?

  1. A) Scavenging
  2. B) Phishing
  3. C) Shoulder surfing
  4. D) Phreaking

So on…….

 

ACC 564 Week 7 Assignment 3 – Fraud in the Accounting Information System

For this assignment, research the Internet or Strayer databases to locate a firm that was involved in a fraud and / or embezzlement case.

 

Explain how the firm’s accounting information system (i.e., components and functions) contributed to the fraud and / or embezzlement. You will need to focus on how each component / function of the accounting information system failed, which resulted in the scandal / case.

 

Write a ten to twelve (10-12) page paper in which you:

Based on the information you researched, assess the failure of the firm’s accounting information system to prevent the related fraud / embezzlement.

Imagine that the company that you researched uses a third-party accounting system. Evaluate the effectiveness of the firm’s stakeholder in the event that a third-party accounting system suffers a breach. Include an assessment of the level of responsibility of the software provider to the business and its clients. Provide support for your rationale.

Determine what advances in accounting and / or information technology could have prevented the event from occurring. Provide support for your argument.

Evaluate what changes should be made to both the Sarbanes-Oxley Act of 2002 and other current laws in order to make them more effective in deterring companies from committing crimes.

Recommend a strategy that the company you indicated may use to prevent future business information failures. Indicate how the company should approach the implementation of your recommended strategy. Provide support for your recommendation.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

 

ACC 564 Week 8 Quiz 3

1) The best example of a hash total for a payroll transaction file could be

  1. A) total of employees’ social security numbers.
  2. B) sum of net pay.
  3. C) total number of employees.
  4. D) sum of hours worked.

 

2) Error logs and review are an example of

  1. A) data entry controls.
  2. B) data transmission controls.
  3. C) output controls.
  4. D) processing controls.

 

3) Following is the result of batch control totals on employee Social Security Numbers in a payroll processing transaction:

 

The difference in the control totals is 720,000. Which data entry control would best prevent similar data entry errors in the future?

  1. A) Modulus 11
  2. B) Validity check
  3. C) Check digit
  4. D) Sequence check

 

4) Which of the following data entry controls would not be useful if you are recording the checkout of library books by members?

  1. A) Sequence check
  2. B) Prompting
  3. C) Validity check
  4. D) Concurrent update control

 

5) A customer failed to include her account number on her check, and the accounts receivable clerk credited her payment to a different customer with the same last name. Which control could have been used to most effectively to prevent this error?

  1. A) Closed-loop verification
Views(26) Opinions(0) 04/15/2017 05:44:13 Report abuse
Copyright © 2014 spacenab.com . All the right reserved.