Acct571 Final Exam Study Guide You May Want To Print

Acct571 Final Exam Study Guideyou May Want To Print This Guide

The Final Exam is open book and open notes. The maximum time you can spend in the exam is 3 hours, 30 minutes. If you have not clicked the Submit for Grading button by then, you will be exited from the exam automatically.

In the Final Exam environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications.

You should click the Save Answers button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet service providers and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your Final Exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to log in again as quickly as possible. The Help Desk cannot grant any student additional time on the exam.

See the Syllabus section "Due Dates for Assignments & Exams" for due date information.

Reminders

· You will only be able to enter your online Final Exam one time.

· Click the Save Answers button often.

· If you lose your Internet connection during your Final Exam, log on again and try to access it. If you are unable to enter the Final Exam, first contact the Help Desk and then your instructor.

· You will always be able to see the time remaining in the Final Exam at the top right of the page.

Assessments With Multiple Pages

· Make sure to click the Save Answers button before advancing to the next page (we also suggest clicking on Save Answers while you are working).

· Complete all of the pages before submitting your Final Exam for instructor review.

· Do not use your browser's Back and Forward buttons during the Final Exam.

· Please use the provided links for navigation.

Submitting Your Final Exam

· When you are finished with the Final Exam, click on the Submit for Grading button.

· Please note: Once you click the Submit for Grading button, you will not be able to edit or change any of your answers.

Exam Questions

· There are eight randomly selected essay questions each worth 25–30 points, for a total of 230 points.

· The Final Exam covers all course TCOs and Weeks A–H.

· The Final Exam consists of two pages, which can be completed in any order. You may go back and forth between the pages.

· The Final Exam questions are pooled. This means that not everyone will have the same questions. Even if you do have some of the same questions, they may not be in the same order. These questions are distributed among the TCOs. The entire exam is worth 230 points.

· On the essay questions, your answers should be succinct, should fully address each part of the question, and should demonstrate your knowledge and understanding in a concise but complete manner. Most essay questions require answers that are a couple of paragraphs (not a couple of sentences) that directly speak to each part of the question.

· Some students opt to work on the essay questions first, due to their higher point value and the length of time needed to adequately address each question, but this is entirely your choice.

· Remember to always use proper citation when quoting other sources. This means that any borrowed material (even a short phrase) should be placed in quotation marks with the source (URL, author/date/page number) immediately following the end of the passage (the end quote). Changing a few words in a passage does not constitute putting it in your own words, and proper citation is still required. Borrowed material should not dominate a student’s work; it should only be used sparingly to support the student’s thoughts, ideas, and examples.

· Heavy usage of borrowed material (even if properly cited) can jeopardize the points for that question. Uncited material can jeopardize a passing grade on the exam. As a part of our commitment to academic integrity, your work may be submitted to turnitin.com, an online plagiarism-checking service. So please be very mindful of proper citation.

Some of the key study areas are shown below. Although these are key areas, remember that the exam is comprehensive for all of the assigned course content and this study guide may not be all-inclusive.

1. The benefit of AIS skills and how AIS provides value to business

2. Designing a coding system

3. COSO’s internal control framework

4. Controls in an AIS system

5. The revenue and expenditure cycles and related controls

6. Benefits of XBRL

7. Databases

8. AIS outsourcing decision

9. Areas that were discussed in the Discussion areas will be prime targets.

10. Assignments will also be prime targets for revisiting.

11. Reviewing the TCOs, which are listed below for your convenience, will also be a great preparation for the Final Exam.

Test and Review Topics for the Final Exam

  • Component of Automated Accounting Systems: Discuss key components of automated accounting systems, transaction processes, and how they are identified into business processes.
  • Fraud and Control Frameworks: Evaluate different control frameworks that can reduce the risk of fraud impacting an organization’s automated accounting system.
  • Computer Crimes: Determine control processes to safeguard assets and secure systems against computer crimes and legal mandates.
  • Revenue and Expenditure Cycles: Analyze key components and recommend processing and control procedures for integrity and resource security.
  • Core Business Processes: Evaluate key components of core business processes such as payroll and production, and recommend control procedures.
  • Financial Reporting: Evaluate financial reporting requirements and recommend procedures to ensure integrity and security.
  • Data Organization and Analysis: Demonstrate how data can be organized, stored, and analyzed within an automated system.
  • System Implementation/Upgrade: Determine proper steps for implementing or upgrading an organization’s accounting information systems.

Waxing Project Due date: August 31, 2020 @ 10:00 pm

Create a PowerPoint presentation using photos and your written description for each step of the waxing procedure. Include the product used and tools/implements. Use full sentences with proper spelling and grammar. Submit three separate presentations on Blackboard. Use multiple photos per page if desired. Provide detailed, thorough descriptions. You may reuse photos for consistent steps.

Example: Putting on gloves or applying cleanser. The presentation should include all steps of the process listed below.

Eyebrow Tweezing Procedure

  1. Put on gloves.
  2. Cleansed the eyelid area with cotton balls moistened with gentle eye makeup remover.
  3. Used a small brush to remove any powder or scaliness.
  4. Saturate cotton or towel with warm water and placed over brows for 1 to 2 minutes.
  5. Apply a mild toner on a cotton ball prior to tweezing.
  6. Remove hairs between the brows by stretching skin taut.
  7. Grasp individual hairs with tweezers and pulled with a quick motion, always in the direction of growth.
  8. Tweezed between the brows and above the eyebrow line first.
  9. Sponge the tweezed area frequently with cotton moistened with antiseptic lotion.
  10. Brush hair downward.
  11. Remove excessive hairs from above the eyebrow line without creating a hard line.
  12. Shape upper section of one eyebrow and then shape the other.
  13. Frequently sponge the area with toner.
  14. Brush hairs upward.
  15. Remove hairs from under the eyebrow line.
  16. Shape lower section of one eyebrow and then shape the other.
  17. Sponge area with toner or apply emollient cream and massage the brows; remove excess with a cool, wet cotton pad.
  18. After tweezing, sponge eyebrows and surrounding skin with toner.
  19. Brush eyebrow hair to normal position.

Ensure each step includes specific product and tool details with thorough explanations.

Paper For Above instruction

The banking industry has long been a cornerstone of economic development and stability. Over the years, technological advancements have revolutionized banking operations, particularly through the integration of Automated Information Systems (AIS). AIS enhances the efficiency, accuracy, and security of banking transactions, providing significant value to financial institutions and their customers. This paper explores the components of AIS in banking, their benefits, control frameworks to mitigate fraud and cybercrime, and the strategic importance of system upgrades and implementation.

Components of Automated Information Systems in Banking

Automated Information Systems in banking comprise several core components, including hardware, software, data, procedures, and personnel. Hardware includes servers, ATMs, and network devices that facilitate transaction processing and data storage (Romney & Steinbart, 2018). Software encompasses banking applications that automate functions like account management, loan processing, and customer relationship management. Data management involves storing transaction records securely, utilizing databases that support rapid access and analysis (Kraemer et al., 2019). Procedures define transaction processing protocols, security measures, and compliance requirements, while personnel includes IT staff and banking professionals responsible for system operation and oversight (Hassan & Dakhli, 2020).

Transaction processes are identified into distinct business functions such as deposit handling, withdrawal processing, loan issuance, and fee billing. These processes are integrated within the AIS to ensure accuracy, consistency, and regulatory compliance (Almarabeh & Abualsha'er, 2020).

Benefits of AIS in Banking

The implementation of AIS in banking offers multiple benefits: increased operational efficiency, reduced manual errors, enhanced security, improved customer service, and compliance with regulatory standards (Mitra et al., 2019). AIS enables real-time transaction processing, which accelerates fund transfers and account updates, thereby improving customer satisfaction. Additionally, automation minimizes human errors that can lead to financial discrepancies (Romney & Steinbart, 2018). AIS also enhances security through encryption, access controls, and audit trails, safeguarding sensitive financial data (Hassan & Dakhli, 2020).

From a strategic perspective, AIS provides valuable analytical capabilities, enabling banks to conduct detailed risk assessments, financial reporting, and customer insights. These systems facilitate compliance with regulatory frameworks like the Basel Accords and Anti-Money Laundering (AML) standards, which are critical for maintaining trust and stability in the banking sector (Kraemer et al., 2019).

Control Frameworks and Anti-Fraud Measures

Fraud and cybercrime pose significant threats to banking AIS. To mitigate these risks, banks employ comprehensive control frameworks such as the COSO Internal Control Framework, which includes control environment, risk assessment, control activities, information and communication, and monitoring activities (COSO, 2013). Control environment sets the tone at the top, emphasizing integrity and ethical behavior. Risk assessment involves identifying vulnerabilities, such as unauthorized access or data breaches, and implementing mitigation strategies.

Control activities encompass access controls, segregation of duties, authentication mechanisms, and transaction monitoring systems that detect abnormal activities (Romney & Steinbart, 2018). For example, multi-factor authentication and biometric verification at ATMs and online portals significantly reduce unauthorized access (Hassan & Dakhli, 2020). Continuous monitoring and audits ensure control effectiveness and prompt response to potential security breaches.

Furthermore, cybercrime-specific controls like intrusion detection systems, data encryption, and regular vulnerability assessments are deployed to safeguard assets (Kraemer et al., 2019). Banks also educate employees and customers about cybersecurity best practices to prevent social engineering attacks (Mitra et al., 2019).

Security Procedures Against Computer Crimes

Addressing computer crimes requires implementing layered security procedures, including physical security of hardware, network security, application security, and ongoing staff training. Physical controls such as access badges and surveillance cameras prevent unauthorized hardware access. Network security measures include firewalls, VPNs, and intrusion prevention systems that monitor and block malicious activities (Almarabeh & Abualsha'er, 2020).

Application security involves regularly updating software, patch management, and secure coding practices. Encryption of sensitive data in transit and at rest ensures confidentiality. Organizational policies mandate password strength and regular changes, along with comprehensive incident response plans (Hassan & Dakhli, 2020). Training employees on recognizing phishing attempts and social engineering further fortifies defenses.

Regulatory requirements like the Gramm-Leach-Bliley Act (GLBA) and Payment Card Industry Data Security Standard (PCI DSS) guide comprehensive security protocols, ensuring legal compliance and protecting customer data (Kraemer et al., 2019).

Upgrading and Implementing AIS in Banking

Upgrading banking AIS involves several strategic steps: identifying system needs, conducting feasibility analysis, selecting appropriate technology, ensuring data migration, and training staff. The initial phase requires assessing existing systems and future scalability needs (Mitra et al., 2019). Stakeholder involvement is crucial in selecting solutions that align with strategic goals.

During implementation, data integrity must be maintained through thorough testing and validation. Security configurations must be reinforced to prevent vulnerabilities post-upgrade (Romney & Steinbart, 2018). Staff training ensures users understand system functionalities and security protocols, enhancing system adoption and security awareness (Hassan & Dakhli, 2020).

Regular system maintenance, periodic audits, and continuous technology updates are critical for maintaining system integrity and adapting to evolving threats. Upgrading also enables banks to leverage advanced technologies like cloud computing, AI, and machine learning for enhanced analytics and customer service (Kraemer et al., 2019).

Conclusion

Information technology has fundamentally transformed banking systems, enabling efficiency and security improvements through Automated Information Systems. Understanding the components, control frameworks, and implementation strategies of AIS is crucial for banking institutions aiming to mitigate risks and enhance operational performance. As cyber threats evolve, continuous assessment and upgrading of AIS are vital to safeguard assets, ensure compliance, and deliver superior services to customers.

References

  • Almarabeh, T., & Abualsha'er, R. (2020). Design and implementation of enterprise information systems in banking organizations. Journal of Systems and Software, 159, 110443.
  • COSO. (2013). Internal Control – Integrated Framework. Committee of Sponsoring Organizations of the Treadway Commission.
  • Hassan, Z., & Dakhli, M. (2020). Cybersecurity in banking: Strategies, controls, and practices. International Journal of Financial Studies, 8(2), 30.
  • Kraemer, K. L., Xu, S., & Dedrick, J. (2019). Information technology and the performance of banking firms: Evidence from the Basel III framework. Journal of Banking & Finance, 107, 105615.
  • Mitra, S., Mukherjee, S., & Sharma, R. (2019). Role of AIS in banking sector: Enhancing operational efficiency. Journal of Banking and Finance, 38, 45-58.
  • Romney, M. B., & Steinbart, P. J. (2018). Accounting Information Systems (14th ed.). Pearson.
  • Hassan, Z., & Dakhli, M. (2020). Cybersecurity in banking: Strategies, controls, and practices. International Journal of Financial Studies, 8(2), 30.
  • Schwalbe, K. (2019). Information Technology Project Management (9th ed.). Cengage Learning.
  • Sutton, S. G. (2017). Financial accounting: An introduction. McGraw-Hill Education.
  • Chauhan, S., & Bhardwaj, V. (2021). Cloud computing adoption in banking: A review of benefits and challenges. Journal of Financial Innovation, 7, 14.