Controls over data management systems fall into two categories: access controls and backup controls. In the shared database environment, access control risks include corruption, theft, misuse, and destruction of data. These threats originate from both unauthorized intruders and authorized users who exceed their access privileges. Which of the following options is not part of controls over data management systems?
a. Employees that sharing the same computers need restriction for access to specific directories, programs, and data files by using multilevel password control.
b. To recover data from disaster, organizations must implement policies and procedures and routinely provide backup copies of critical files.
c. Database Administrator works closely with users and systems designers has primary responsibility for user view design and works closely with users and systems designers.
d. Access to confidential data must be properly managed. Inference controls prevent users from inferring, through query features, specific data values that they are unauthorized to access.
Explain your answer in 100 - 150 words. Why did you choose your answer and why not choose others.
Step by stepSolved in 2 steps
- Explain the difference between computer fraud and general fraud. Explain both categories of fraud in relation to accounting information system.arrow_forwardIs the following a potential control weakness? A computer network and personal computers support Marco accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. Briefly explain the potential mistatement and recommended correction.arrow_forward3. Which of the following is not a computer facility control? (a) Place the data processing center where unauthorized individuals cannot gain entry to the facility. (b) Limit access to the data processing center all employees of the company. (c) Buy insurance to protect against loss of equipment in the computer facility. (d) Use advanced technology to identify individuals who are authorized access to the data processing center. 4.For internal control over computer program changes, a policy should be established requiring that: (a) All proposed changes be approved by a responsible individual and logged. (b) The programmer designing the change should be responsible for ensuring that the revised program is adequately tested. (c) All program changes be supervised by the information system control group. (d) To facilitate operational performance, superseded portions of programs should not be deleted from the program run manual. 5. Auditing "around the computer": (a) Assumes that accurate…arrow_forward
- Which of the following describes preventive controls? (Several choices may be correct.) Expected to be 100% effective. O Easily verified as to whether the control has worked. O Designed to stop misstatement from occurring. O Applied to each transaction prior to entering transactions into the accounting system. Applied to each transaction after transactions have been processed. O Designed to detect fraud or errors that have occurred.arrow_forwardWhen is more frequent monitoring of internal controls not required?* When employees are poorly trained. When the control activity and risk being managed are important. When a department is making changes to an application being used in that department. When internal controls have recently been changed to reduce the frequency of errors.arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forward
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education