IF You want to Purchase This And Any Other Then:Contact us At: JOHNMATE1122@gmail.com
CIS 430 Full Course Latest 2017 November
Question CIS430 Unit 2 Discussion latest 2017 november For the discussion board 2, discuss a personal fraud that you are familiar with. Establish a thread for the fraud brought up and then discuss it. Let's get three or four personal frauds established and then we can discuss them. This is the only discussion board in this course where you do not need to create your own initial thread in order to view other threads in the discussion board.
CIS430 Unit 3 Discussion latest 2017 november Distinguish between the sales order, billing, and AR departments. Why can't the sales order or AR departments prepare the bills. You must create your own initial thread in order to view other threads in the discussion board.
CIS430 Unit 4 Discussion latest 2017 november Let's close the text books for this one. A lot of people are talking about “Outsourcing”. There is a trend to send accounting, architecture, and computer related jobs overseas to India and other countries because the labor is so much cheaper. It’s become such a hot topic that it became a major issue in political campaigns. What’s you opinion on this topic? Is this just good competition or unfair competition? Do you think there is a risk sending high tech jobs overseas, regarding possibly sensitive data? Corporations Board of Directors are responsible for the well being of the company and to maximize profits. Aren’t they just doing there job? What can be done to stop this or should we? Is it an over reaction? Cite one Web page that went into your research of this topic.
You must create your own initial thread in order to view other threads in the discussion board.
CIS430 Unit 5 Discussion latest 2017 november Per Chapter 8 Problem 12, Organizational Structure and Span of Control comment as to the advantages and disadvantages of the organizational structures. What structure would you recommend? Perhaps you would recommend a third structure. You must create your own initial thread in order to view other threads in the discussion board.
CIS430 Unit 6 Discussion latest 2017 november Per Chapter 13 Problem 4 Systems Analysis - Whose position do you sympathize with the most? What method would you propose they take? You must create your own initial thread in order to view other threads in the discussion board.
CIS430 Unit 7 Discussion latest 2017 november Per Chapter 16 Problem 9 Security and Control Assessment: Discuss the potential risks and needed controls.Classify them according to the relevant areas of the COSO framework. You must create your own initial thread in order to view other threads in the discussion board.
CIS430 Unit 8 Discussion latest 2017 november Per Chapter 17 Problem 7 Systems Development and Program Changes discuss the internal control weaknesses in the system development and program change procedures. Comments should relate to (but not be limited to) the organization structure, systems development, systems maintenance, internal audit participation, testing procedures, access controls, segregation of duties, program fraud and documentation inadequacies. You must create your own initial thread in order to view other threads in the discussion board.
Copyright Š 2015 Pearson Canada Inc.
2
CIS430 Unit 1 C1 Homework latest 2017 november Question 1 4 out of 4 points Discussion Question 7. Examine Figure 1- 4 and discuss where and how problems can arise that can cause the resulting information to be bad or ineffective. Question 2 4 out of 4 points Discussion Question 11. Discuss why it is crucial that internal auditors report solely to the uppermost level of management (either to the chief executive officer or the audit committee of the board of directors) and answer to no other group.
CIS430 Unit 2 C2 Homework latest 2017 november Question 1 4 out of 4 points Discussion Question 1: Discuss the flow of cash through the transaction cycles. Include in your discussion the relevant sub-systems and any time lags that may occur. Question 2 4 out of 4 points 7. SYSTEM FLOWCHART Using the diagram for Problem 7, answer the following questions: What do Symbols 1 and 2 represent? What does the operation involving Symbols 3 and 4 depict? What does the operation involving Symbols 4 and 5 depict? What does the operation involving Symbols 6, 8, and 9 depict?
CIS430 Unit 3 C4 Homework latest 2017 november Question 1 5 out of 5 points Problem 3. FLOWCHART ANALYSIS Use the flowchart for Problem 3 to answer these questions:
Copyright Š 2015 Pearson Canada Inc.
3
a. What accounting document is represented by symbol A? b. What is an appropriate name for the department labeled B? c. What would be an appropriate description for process C? d. What is the location represented by symbol D? e. What accounting record is represented by symbol E? f. What is an appropriate name for the department labeled H? g. What device is represented by symbol F? h. What device is represented by symbol G? i. What accounting record is represented by symbol G?
CIS430 Unit 4 C5 Homework latest 2017 november Question 1 5 out of 5 points Problem 2 INVENTORY ORDERING ALTERNATIVES Refer to page 240 in the text, which illustrates three alternative methods of ordering inventory. Required: a. Distinguish between a purchase requisition and a purchase order. b. Discuss the primary advantage of alternative two over alternative one. Be specific. c. Under what circumstances can you envision management using alternative one rather than alternative two?
CIS430 Unit 5 C11 Homework latest 2017 november Question 1 3 out of 3 points Review Question 1: Define ERP Question 2 4 out of 6 points Partial Credit Problem 7: When an ERP implementation fails, who is to blame? Is it the software manufacturer, the client firm, or the implementation strategy? Explain.
Copyright Š 2015 Pearson Canada Inc.
4
CIS430 Unit 6 C12 Homework latest 2017 november Question 1 4 out of 4 points Discussion Question 8 and 9: What are cookies, why are they used and what security concerns pertain to cookies? Question 2 4 out of 4 points Problem 8. ELECTRONIC FRAUD In a recent financial fraud case, city employees in Brooklyn/>, New York/>/>, accessed electronic databases to defraud the city of $ 20 million. Several employees in collusion with the former deputy tax collector completely erased or reduced $ 13 million in property taxes and $ 7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills. Required Discuss the control techniques that could prevent or detect this fraud.
CIS430 Unit 6 C13 Homework latest 2017 november Question 1 3 out of 3 points Review Question 7: Explain why a survey of the current system may serve no purpose when an organization is planning to implement an ERP. Question 2 4 out of 4 points Discussion Question 1: Accounting educators are discussing ways to incorporate communication skills, both oral and written, into accounting information systems courses. Why do you think these skills are deemed crucial for proper execution of the SDLC?
CIS430 Unit 7 C15 Homework latest 2017 november Question 1 4 out of 4 points
Copyright Š 2015 Pearson Canada Inc.
5
Discussion Question 10: A bank in California has 13 branches spread throughout northern California, each with its own minicomputer where its data are stored. Another bank has ten branches spread throughout California, with the data being stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster? Question 2 4 out of 4 points Discussion Question 15: An organization’s internal audit department is usually considered an effective control mechanism for evaluating the organization’s internal control structure. Birch Company’s internal auditing function reports directly to the controller. Comment on the effectiveness of this organizational structure.
CIS430 Unit 7 C16 Homework latest 2017 november Question 1 3 out of 3 points Review Question 1: Why is human behavior considered one of the biggest potential threats to operating system integrity? Question 2 3 out of 3 points Review Question 2: Why would a systems programmer create a back door if he or she has access to the program in his or her day- to- day tasks?
CIS430 Unit 8 C17 Homework latest 2017 november Question 1 Discussion Question 4: What are rounding error routines, and why are they used? Question 2 Discussion Question 5: How does the salami fraud get its name, and how does it work? Question 3
Copyright © 2015 Pearson Canada Inc.
6
CIS430 Unit 2 Self Quiz C2 latest 2017 november Question 1 Directing work-in-process through its various stages of manufacturing is part of the conversion cycle. True False Question 2 Real time systems process transactions individually at the moment the event occurs. There are no time lags between occurence and recording. True False Question 3 Management is responsible for evaluating and reporting on a company's controls. True False Question 4 Bat Batch processing of non-critical accounts improves operational efficiency. True False
CIS430 Unit 2 Self Quiz C3 latest 2017 november Question 1 All the following are factors in the fraud triangle except Ethical behavior of an individual (rationalization) Pressure exerted on an individual at home and job related Materiality of the assets Opportunity to gain access to assets
Copyright Š 2015 Pearson Canada Inc.
7
Question 2 0 out of 0 points Correct Which of the following best describes lapping? applying cash receipts to a different customer’s account in an attempt to conceal previous thefts of funds inflating bank balances by transferring money among different bank accounts expensing an asset that has been stolen creating a false transaction Question 3 Skimming involves Stealing cash from an organization before it is recorded Stealing cash from an organization after it has been recorded A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor. Manufacturing false purchase orders, receiving reports, and invoices Question 4 Who is responsible for establishing and maintaining the internal control system? internal auditor accountant management external auditor
CIS430 Unit 5 Self Quiz C8 latest 2017 november Question 1 FRS is an acronym for Federal Reporting System. True False Question 2
Copyright Š 2015 Pearson Canada Inc.
8
MRS is an acronym for Management Reporting System. True False Question 3 Management reporting is often called discretionary reporting because it is not mandated as is financial reporting. True False Question 4 A company with a wide span of control tends to have relatively more layers of management. True False
CIS430 Unit 5 Self Quiz C11 latest 2017 november Question 1 The The big bang approach involves converting from old legacy systems to the new ERP in one implementation step. True False Question 2 The implementation of a centralized ERP system creates a disaster risk that must be controlled by having an effective contingency plan. True False Question 3 Most ERP systems are developed and implemented by in house personnel. False Question 4 The process of managing the access control to the ERP system to include the process of creating, modifying and deleting who has access to what has been identified as a major control problem in the use of an ERP system.
Copyright Š 2015 Pearson Canada Inc.
9
True False
CIS430 Unit 5 Self Quiz C12 latest 2017 november Question 1 The rules that make it possible for users of networks to communicate are called protocols True False Question 2 EDI is the inter-company exchange of computer processible business information in standard format. True False Question 3 Which one of the following statements is correct? Cookies always contain encrypted data. Cookies are text files and never contain encrypted data. Question 4 An IP Address: defines the path to a facility or file on the web. is the unique address that every computer node and host attached to the Internet must have. is represented by a 64-bit data packet. is the address of the protocol rules and standards that governing the design of internet hardware and software. none of the above is true.
CIS430 Unit 6 Self Quiz C13 latest 2017 november Question 1
Copyright Š 2015 Pearson Canada Inc.
10
When implementing a new system, the costs associated with transferring data from one storage medium to another is an example of a data conversion cost. True False Question 2 All of the following are reasons why new systems fail except The user is not involved in the development of the system. The system requirements are not clearly specified. The systems analysts rely on prototyping models. The systems analyst did not fully understand the business problem. Question 3 The degree of compatibility between the firm’s existing procedures and personnel skills and the requirements of the new system is called technical feasibility operational feasibility schedule feasibility legal feasibility Question 4 Reasons that a new systems implementation may be unsuccessful include all of the following except organizational restructuring required by the new system results in displaced workers end users do not understand the strategic merits of the new system employees are not trained to use the system system development team members include representatives from end-user departments
CIS430 Unit 7 Self Quiz C16 latest 2017 november Question 1 A software program that allows access to a system without going through the normal logon procedures is called back door. True False Question 2
Copyright Š 2015 Pearson Canada Inc.
11
A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse. True False Response Feedback: It is called a worm. Question 3 The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems. True False Question 4 Encryption is the conversion of data into a secret code for storage in databases and transmission over networks.For transmissions, the message is coded at the sending end using an encryption algorithm and is decoded at the receiving end. True False
CIS430 Unit 8 Self Quiz C17 latest 2017 november Question 1 A check digit is a method of detecting incorrectly account numbers that are entered incorrectly. True False Question 2 Tracing is a method used to verify the logical operations executed by a computer. True False Question 3 Generalized audit software packages are owned by the auditor's client. True False
Copyright Š 2015 Pearson Canada Inc.
12
Question 4 In parallel simulation a program is created that does what the application program does. Transactions are reprocessed and the parallel simulation results are compared to the actual application results. True False
CIS430 Unit 2 Quiz C2 latest 2017 november Question 1 Which of the following is false? A reference file stores data that are used as standards for processing transactions. A master file generally contains account data. An archive file contains records of past transactions that are retained for future reference. A transaction file is a temporary file of transaction records used to change or update data in a master file. All of the above are true. Question 2 Which of the following is true of the relationship between subsidiary ledgers and general ledger accounts? The relationship between the two provides an audit trail from the financial statements to the source documents. The two contain different and unrelated data. All general ledger accounts have subsidiaries. The total of subsidiary ledger accounts usually exceeds the total in the related general ledger account. Question 3 Which of the following statements is NOT true? Sorting records that are coded alphabetically tends to be more difficult for users than sorting numeric sequences. Mnemonic coding requires the user to memorize codes. Sequential codes carry no information content beyond their order in the sequence. Mnemonic codes are limited in their ability to represent items within a class. Question 4 Which statement is NOT true?
Copyright Š 2015 Pearson Canada Inc.
13
Business activities begin with the acquisition of materials, property, and labor in exchange for cash. The conversion cycle includes the task of determining raw materials requirements. Manufacturing firms have a conversion cycle but retail firms do not. A payroll check is an example of a product document of the payroll system.
CIS430 Unit 2 Quiz C3 latest 2017 november Question 1 Which of the following is not a major factor that contributes to small business fraud? Inadequate employee prescreening Too much trust Limited controls Excessive cash on hand Question 2 A shell company fraud involves: stealing cash from an organization before it is recorded stealing cash from an organization after it has been recorded setting up a fake company and manufacturing false purchase orders, receiving reports, and invoices A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor Question 3 When duties cannot be segregated, the most important internal control procedure is supervision independent verification accounting records access controls Question 4 To conceal the theft of a check from customers in payment of their accounts, which of the following journal entries should the bookkeeper make? Debit Miscellaneous Expense; Credit Cash Debit Petty; Credit Cash
Copyright Š 2015 Pearson Canada Inc.
14
Debit Cash; Credit Accounts Receivable Debit Sales Returns; Credit Accounts Receivable None of the above
CIS430 Unit 3 Quiz C4 latest 2017 november Question 1 Which type of control is considered a compensating control? segregation of duties access control supervision accounting records Question 2 In regard to the bill of lading which of the following is false? The shipping clerk normally prepares the bill of lading. It is a formal contract between the seller and the shipping company. It establishes legal ownership and responsibility for assets in transit. It is completed before the packing slip and shipping notice. Question 3 The bill of lading is prepared by the sales clerk warehouse clerk shipping clerk billing clerk Question 4 Good internal controls in the revenue cycle should ensure all of the following except all sales are profitable all sales are recorded credit is authorized inventory to be shipped is not stolen
Copyright Š 2015 Pearson Canada Inc.
15
CIS430 Unit 4 Quiz C5 latest 2017 november Question 1 The documents in a voucher packet include all of the following except a check a purchase order an invoice a receiving report Question 2 The greatest advantage of the automated inventory system over its manual counterpart is improved ability to manager inventory needs. True False Question 3 Vendors approved by an organization are maintained in a valid vendor file. Insuring that vendors used are in the valid vendor file will insure the most competitive price will be obtained. False True Question 4 Which document helps to ensure that the receiving clerks actually count the number of goods received? packing list blind copy of purchase order shipping notice invoice
CIS430 Unit 5 Quiz C8 latest 2017 november Question 1
Copyright Š 2015 Pearson Canada Inc.
16
Which statement below best describes an investment center? The authority to make decisions affecting the major determinants of profit, including the power to choose its markets and sources of supply, and significant control over the amount of invested capital. The authority to make decisions over the most significant costs of operations, including the power to choose the sources of supply. The authority to provide specialized support to other units within the organization. The responsibility for developing markets for and selling of the output of the organization. Question 2 A profit center manager has responsibility for both cost control and revenue generation. True False Question 3 The core benefits of XBRL adoption include all of the following except: Improved information quality Cost reduction through tagging of each item with information so that data is easy to identify Cost reduction through the ability to use data just once. Cost reduction through enhancing comparability of information because XBRL lays out a common set of definitions by which all organizations will tag their data. Question 4 An audit trail should: Provide the ability to answer inquiries from customers or vendors. Be able to reconstruct files if they are destroyed. Provide historical data required by auditors. Fulfill government requirements. Provide a means for preventing, detecting and correcting errors. All of the above.
Copyright Š 2015 Pearson Canada Inc.
17
CIS430 Unit 5 Quiz C11 latest 2017 november Question 1 In regard to ERP which of the following is false? There is no need to be concerned about segregation of duties because ERP systems possess strong computer controls. Managers in an ERP environment must be concerned about granting access to too many employees. ERP systems are often installed because they tend to eliminate the need for contingency disaster planning. Access security is critical in an ERP environment and must be maintained to establish data confidentiality, integrity and availability. Question 2 In regard to an enterprise resource system (ERP) which of the following is false? An organization may need to change the way it conducts business to take full advantage of the ERP. ERP systems are custom packages designed for specific organizations. The ERP system integrates key processes of the organization so a single computer system can serve the needs of each functional area. ERP systems utilize a single database to facilitate the sharing of information and to improve communications across the organization. Question 3 There are a number of risks that may be associated with ERP implementation. Which of the following was NOT stated as a risk in the chapter? A drop in firm performance after implementation because the firm looks and works differently than it did while using a legacy system. Implementing companies have found that staff members, employed by ERP consulting firms, do not have sufficient experience in implementing new systems. Implementing firms fail to select systems that properly support their business activities. ERPs are too large, complex, and generic for them to be well integrated in to most company cultures. CIS430 Unit 6 Quiz C12 latest 2017 november Question 1 Which of the following statements is true? Cookies were originally intended to facilitate advertising on the Web Cookies always contain encrypted data. encrypted data. Cookies contain the URLs of sites the user visits.
Copyright Š 2015 Pearson Canada Inc.
18
Web browsers cannot function without cookies. Question 2 Which of the following security risks associated with electronic commerce is false? A firewall is a system used to insulate an organization’s intranet from the internet. A common firewall configuration employs two firewalls – a network level firewall and an application level firewall. A digital certificate is an electronic authentication technique that can be used to authenticate the identity of the sender of a message. In a public key management system a certification authority will issue and revoke digital certificates. Encryption can resolve all security concerns. Question 3 Per the article The Information Security Control Environment, which of the following is considered a “least” commonly implemented control? Protect equipment from unauthorized access. Maintain network security. Enforce a secure logon process when providing access to information services. Keep antivirus software updated. Authenticate remote users accessing the network. Question 4 Which of the following statements is correct? TCP/ IP is the basic protocol that permits communication between Internet sites. TCP/ IP controls Web browsers that access the Web. TCP/ IP is the document format used to pro-duce Web pages. TCP/ IP is used to transfer text files, programs, spreadsheets, and databases across the Internet. TCP/ IP is a low- level encryption scheme used to secure transmissions in higher- level ( HTTP) format.
CIS430 Unit 6 Quiz C13 latest 2017 november Question 1 Which of the following is least likely to be an accountant’s role in the SDLC? user consultant
Copyright © 2015 Pearson Canada Inc.
19
auditor programmer all of these are likely roles Question 2 Which of the following steps is NOT considered to be part of this systems survey? Interviews are conducted with operating people and managers. The complete documentation of the system is obtained and reviewed. Measures of processing volume are obtained for each operation. Equipment sold by various computer manufacturers is reviewed in terms of capability, cost, and availability. Question 3 In the context of the TELOS acronym, technical feasibility refers to whether a proposed system is attainable, given the existing technology. the systems manager can coordinate and control the activities of the systems department. an adequate computer site exists for the pro-posed system. the proposed system will produce economic benefits exceeding its costs. the system will be used effectively within the operating environment of an organization. Question 4 2 out of 2 points All of the following individuals would likely be SDLC participants EXCEPT accountants. shareholders. management. programmers.
CIS430 Unit 7 Quiz C15 latest 2017 november Question 1 Which of the following is not a disaster recovery techniques? empty shell Recovery Operations Center (ROC) internally provided backup All of the above are disaster recovery techniques.
Copyright Š 2015 Pearson Canada Inc.
20
Question 2 2 out of 2 points Which of the following is NOT a control implication of distributed data processing? redundancy user satisfaction incompatibility lack of standards Question 3 When management outsources IT they also are able to outsource their management responsibility under SOX for ensuring adequate IT controls. True False Question 4 Which of the following is NOT a potential threat to computer hardware and peripherals? low humidity high humidity carbon dioxide fire extinguishers water sprinkler fire extinguishers Question 5 The Disaster Recovery Plan (DRP) should provide details regarding the use of a duplicate data processing facility. True False
CIS430 Unit 7 Quiz C16 latest 2017 november Question 1 In regard to data base backup the auditor's objective is to verify that the database controls are adequate to facilitate the recovery of lost, destroyed or corrupted data. True False Question 2
Copyright Š 2015 Pearson Canada Inc.
21
A user’s application may consist of several modules stored in separate memory locations, each with its own data.One module must not be allowed to destroy or corrupt another module. This is an objective of operating system controls. data resource controls. computer center and security controls. application controls. Question 3 Audit trails can be used to support system security by: Detecting unauthorized access to the system. Facilitating the reconstruction of events. Promoting personal accountability. All of the above. Question 4 A program whose sole purpose is to capture IDs and passwords from unsuspected users is called: virus. worm. Trojan horse. logic bomb.
CIS430 Unit 8 Quiz C17 latest 2017 november Question 1 A control designed to validate a transaction at the point of data entry is a. recalculation of a record count. a check digit. checkpoints.
Copyright Š 2015 Pearson Canada Inc.
22
recalculation of hash total. Question 2 Which of the following statements is true? The black box approach to testing application controls is essentially auditing around the computer. The white box approach audits through the computer and tests the application logic directly. Both are true. Both are false. Question 3 In an automated payroll processing environment, a department manager substituted the time card for a terminated employee with a time card for a fictitious employee. The fictitious employee had the same pay rate and hours worked as the terminated employee. The best control technique to detect this action using employee identification numbers would be a record count. True False Question 4 Users need to be actively involved in the system development process. True False
CIS430Unit 8 Final Exam latest 2017 november Question 1 Which symbol represents a manual operation? Question 2 2 out of 2 points Which symbol represents an on-page connector?
Copyright Š 2015 Pearson Canada Inc.
23
Question 3 2 out of 2 points Who is responsible for establishing and maintaining the internal control system? the internal auditor the accountant management the external auditor Question 4 The board of directors consists entirely of personal friends of the chief executive officer. This indicates a weakness in this is not a weakness the accounting system the control environment control procedures Question 5 The office manager forgot to record in the accounting records the daily bank deposit. Which control procedure would most likely prevent or detect this error? segregation of duties independent verification accounting records supervision
Copyright Š 2015 Pearson Canada Inc.
24