Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment: Accounting Information System

1. IT Controls: Small Construction Company uses QuickBooks Online and has one employee, Gloria, in the accounting department. Gloria has unique userid and password to access QuickBooks Online. The company is growing and recently hired 2 new accountants. To avoid paying for more QuickBooks users, Gloria gave her userid and password to the new accountants.

Required: Should Gloria share her userid and password? Why or Why not? If you answered no, recommend changes to correct the problem?

2. IT Controls: Western Community Hospital operates 3 hospitals in San Diego. Western implemented an electronic medical record to collect and store patient data. Physicians and nurses enter and retrieve patient data. The system integrates patient data with the patient financial data to invoice patients and insurance companies. Dr. KrimiNel is unhappy with Western's decision to close the hospital where she works. Dr. Nel downloaded the entire data file containing patient financial data on a USB flash drive and posted the data on a hacker website.

Required: List three Information Technology controls that Western Community Hospital should have implemented to prevent or detect the theft of patient financial data.

1. Computers International is implementing an online, automated wire transfer capability at World Bank to electronically transfer funds in local currencies to pay supplier Investors. Which of the control activities listed below does not help prevent fraudulent wire transfers.

A) The drive on the computer used for wire transfer is backed up at the end of each day.
B) World Bank recognize transactions from only one Global Toy computer using the computer's media access control number.
C) Limit transactions to a single employee and establish unique username and password with Word Bank.
D) World Bank required the Treasurer to approve all wire transfers over $5000.00.

2. Journal entries are necessary to record non-recurring events, correct errors and records adjustments. Which of the following procedures is the least effective control activity to protect against fraudulent journal entries.

A) The most senior accounting person, which is usually the controller, prepares and records all journal entries.
B) An accounting supervisor independent of the person preparing the journal entry approves the journal voucher.
C) All subsidiary ledgers are reconciled to the general ledger control accounts.
D) Internal auditors review adjusting journal entries each quarter.

3. Which of the following transactions is represented by the diagram below?

A) Vendors send a bill for each inventory item purchased which is payable on receipt.
B) A single purchase of inventory is paid for with multiple payments.
C) Inventory vendors send a monthly bill for merchandise delivered. The seller does not accept or allow installment payments.
D) Some inventory purchase are paid for with multiple payments and some payments may apply to multiple purchases.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92581363
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Question you have been asked by management to secure the

Question : You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Pretend that your own computer is the laptop that has b ...

Question 1 osi 7 layer modela what are benefits of using a

Question 1: OSI 7 layer Model. a) What are benefits of using a layered network model? b) Encryption takes place at which layer? c) Flow control takes place at which layer? d) Packets are found at which layer? e) Packet f ...

1 discussion questionsearch scholar google for a company

1. Discussion Question Search "scholar google" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes wer ...

The head of the it security department expressed her

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings. You have been asked to pr ...

In the health care industry the topic of network topology

In the health care industry, the topic of network topology is becoming increasingly important as hospitals, clinics, and other supports consider adding more devices and equipment to existing networks or building addition ...

Discussion1 select a company either real or fictitious2

Discussion 1) Select a company either real or fictitious 2) Completely describe the company, including the business and where the company is located 3) Describe the minimum services that must be maintained for that compa ...

Review the cloudcrushers business scenario to understand

Review the "CloudCrushers Business Scenario" to understand the various components needed to ensure connectivity. Prepare a 1.5 page paper describing these components, as well as how the types of connectivity, such as Eth ...

Assignmentwrite on any topic related to technology security

Assignment Write on any topic related to technology security. (Choose one among these topics: Importance of Information security, Different types of Social Engineering attacks and how to overcome, IT Governance Planning ...

Project title security lapses and data breaches an

Project Title: "Security Lapses and Data Breaches: An Examination of the Failures to Protect Business Data and their Consequences" Instruction of creating the Background: Background information expands upon the key point ...

Assignment creating and communicating a security

Assignment : Creating and Communicating a Security Strategy As an IT professional, you'll often be required to communicate policies, standards, and practices in the workplace. For this assignment, you'll practice this im ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As