Exam 21: Ais Development Strategies
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
Identify one of the primary risks associated with end-user computing below.
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
Business Process Management views business processes as
Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
A
Describe outsourcing and identify the two types of outsourcing agreements.
Free
(Essay)
4.7/5
(40)
Correct Answer:
Outsourcing is the hiring of an outside company to handle all or part of a company's data processing activities.There are two main types of outsourcing agreements: Mainframe outsourcing and Client/server or desktop outsourcing.Mainframe outsourcing is when the outsourcer buys the client's equipment,hires the client's employees,and operates on the client's site or connects the system to the outsourcer's computer.Client/server or desktop outsourcing is when a particular service,segment of business,function,or PC support is outsourced.
There are frequently many canned software packages are available.However,many companies choose to develop their own software.Why?
(Multiple Choice)
4.8/5
(31)
What are the advantages and disadvantages of custom software and of canned software for meeting application software needs?
(Essay)
4.8/5
(29)
Software as a Service (SaaS)refers to Web-based computing services provided by a(n)
(Multiple Choice)
4.7/5
(32)
________ and ________ are approaches to evaluating vendor proposals that do not incorporate dollar estimates of costs or benefits.
(Multiple Choice)
4.8/5
(42)
Benathir Donathat,director of the project committee,has received approval from management for implementation of a new accounting information system.After putting out an RFP,the committee settled on a Web-based application service provider that will manage all hardware and software required by the system,with fees based on usage.The committee decided to go with
(Multiple Choice)
4.9/5
(30)
When canned software is used for systems acquisition,the physical design phase of the SDLC
(Multiple Choice)
5.0/5
(37)
When canned software is used for systems acquisition,the conceptual design phase of the SDLC
(Multiple Choice)
4.8/5
(33)
All of the following are reasons a company might choose to outsource its systems operations and maintenance except
(Multiple Choice)
4.8/5
(39)
Identify the ways an organization can gain full advantage of using a Request For Proposal (RFP).
(Essay)
4.8/5
(35)
How does outsourcing improve an organization's utilization of assets?
(Multiple Choice)
4.8/5
(40)
Describe each of the four important principles underlying Business Process Management (BPM).
(Essay)
4.9/5
(38)
Describe computer-aided software (or systems)engineering (CASE)and identify the advantages and disadvantages of CASE?
(Essay)
4.9/5
(36)
When canned software is used for systems acquisition,the implementation and conversion phase of the SDLC does not
(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 97
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)