Auditing And Assurance Services
17th Edition
ISBN: 9780134897431
Author: ARENS, Alvin A.
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 11, Problem 21.3MCQ
To determine
Identify an example of application control.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.
Which of the following is NOT an example of application control?*
a. Pre-filled forms are already sent to users to minimize input errors
b. After processing, the daily sales summary are reconciled with the individual sales invoices processed
c. Reasonableness tests on acceptable working hours are embedded in the payroll software
d. An equipment failure causes an error message on the monitor
15.
A payroll clerk with authorized access to the local area network (LAN) was able to directly update personnel files independent of the application programs. The best control to prevent a clerk from doing this would be to:
Group of answer choices
None of the choices
Restrict access to LAN workstations by such means as automatic lockup after a predefined period of keyboard inactivity
Use password security to authenticate users as they attempt to log on to the LAN
Restrict access to and monitor installation of software products or tools having powerful update capabilities
Establish a security policy for the department that prohibits direct updating of data files
Chapter 11 Solutions
Auditing And Assurance Services
Ch. 11 - Prob. 1RQCh. 11 - Prob. 2RQCh. 11 - Prob. 3RQCh. 11 - Prob. 4RQCh. 11 - Prob. 5RQCh. 11 - Prob. 6RQCh. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - Prob. 10RQ
Ch. 11 - Prob. 11RQCh. 11 - Prob. 12RQCh. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - Prob. 15RQCh. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Prob. 18RQCh. 11 - Prob. 19RQCh. 11 - Prob. 20.1MCQCh. 11 - Actions, policies, and procedures that reflect the...Ch. 11 - Prob. 20.3MCQCh. 11 - Prob. 21.1MCQCh. 11 - Prob. 21.2MCQCh. 11 - Prob. 21.3MCQCh. 11 - Prob. 22.1MCQCh. 11 - Prob. 22.2MCQCh. 11 - Which of the following correctly describes an...Ch. 11 - Prob. 23DQPCh. 11 - Prob. 24DQPCh. 11 - The following are misstatements that have occurred...Ch. 11 - Prob. 26DQPCh. 11 - Prob. 27DQPCh. 11 - Prob. 28DQPCh. 11 - Prob. 29DQPCh. 11 - Prob. 30DQPCh. 11 - Prob. 31DQPCh. 11 - Prob. 32C
Knowledge Booster
Similar questions
- Which of the following software functions can help protect sales revenue from external and internal threats of theft? a) Reconcile inventory reductions with product issues from kitchen. b) Reconcile product issues from kitchen with guest check totals. c) Create over and short computations by server, shift, and day. d) All of the above e) Only a. and b. abovearrow_forwardIs the following a potential control weakness? Most data input in Marco Inc. is backed up by paper trails of source documents and other business papers. In addition, the firm uses an Internet service to back up all files on the Internet. Marco manually runs a backup at the end of each day. They have no other Internet presence other than an informational Website that does not allow potential customers to order merchandise. Briefly explain the potential mistatement and recommended correction.arrow_forward1. In a manual accounting system, what advantage does the journal voucher system have over the traditional general journal system? 2. Discuss how the nature of the necessary internal control features is affected by switching from a manual system to (1) a large-scale computer-based accounting system or (2) a PC-based accounting system. 3. Under what circumstances will automated mailroom procedures provide the most benefit? The least benefit?arrow_forward
- Increasing use of sophisticated EDP systems has produced significant changes in the accounting environment. Some of these changes are the following: documents that are used to enter information into the computer may exist for only a short time or only in computer-readable form. In some computer systems, input documents may not exist at all, because information is entered directly into the system. Computer processing uniformly subjects like transactions to the same processing instructions. Many internal control procedures, once performed by separate individuals in manual systems, may be combined in systems that use computer processing. The potential for individuals to gain unauthorized access to data or assets may be greater in computerized accounting systems than in manual systems. Required: For each of the changes, discuss the impact on the internal control system and the independent audit.arrow_forward3. Which of the following is not a computer facility control? (a) Place the data processing center where unauthorized individuals cannot gain entry to the facility. (b) Limit access to the data processing center all employees of the company. (c) Buy insurance to protect against loss of equipment in the computer facility. (d) Use advanced technology to identify individuals who are authorized access to the data processing center. 4.For internal control over computer program changes, a policy should be established requiring that: (a) All proposed changes be approved by a responsible individual and logged. (b) The programmer designing the change should be responsible for ensuring that the revised program is adequately tested. (c) All program changes be supervised by the information system control group. (d) To facilitate operational performance, superseded portions of programs should not be deleted from the program run manual.arrow_forwardIs the following a potential control weakness? A computer network and personal computers support Marco accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. Briefly explain the potential mistatement and recommended correction.arrow_forward
- Which of the following is a risk to the financial statement of a company when it places a purchase order with a supplier? The advantages of PDF files are: A. that they can be securely locked so that the figures cannot be changed.B. that they can be easily manipulated and changed by users.C. the software to produce them is very cheap.D. none of the options are correct. 2. What is information overload? A. The situation where a computer has more information than is needed or is able to be processed in a meaningful way when a computer program is executed.B. The situation where an individual has more information than is needed or is able to be processed in a meaningful way when working through a decision.C. The situation where a computer has more information than is needed or is able to be processed when data storage is taking place.D. The situation where the amount of information exceeds the storage capacity of the brain of a human being. 3. When all data are stored in a central place,…arrow_forward3. Which of the following is not a computer facility control? (a) Place the data processing center where unauthorized individuals cannot gain entry to the facility. (b) Limit access to the data processing center all employees of the company. (c) Buy insurance to protect against loss of equipment in the computer facility. (d) Use advanced technology to identify individuals who are authorized access to the data processing center. 4.For internal control over computer program changes, a policy should be established requiring that: (a) All proposed changes be approved by a responsible individual and logged. (b) The programmer designing the change should be responsible for ensuring that the revised program is adequately tested. (c) All program changes be supervised by the information system control group. (d) To facilitate operational performance, superseded portions of programs should not be deleted from the program run manual. 5. Auditing "around the computer": (a) Assumes that accurate…arrow_forwardWhich of the following is false about accounting information systems? A. They provide reports that people analyze. B. They prevent errors and stop employees from stealing inventory. C. They are designed to gather data about the companys transactions. D. They consist of processes that involve input of data from source documents, processing, output, and storage.arrow_forward
- The database approach has several unique characteristics not found in traditional (flat-file) systems. Which of the following statements does not apply to the database model? a. Database systems have data independence; that is, the data and the programs are maintained separately except during processing. b. Database systems contain a data-definition language that helps describe each schema and subschema. c. The database administrator is the part of the software package that instructs the operating aspects of the program when data are retrieved. d. A primary goal of database systems is to minimize data redundancy. e. Database systems provide increased accessibility to data and flexibility in its usage.arrow_forwardWhich of the following statements is FALSE? Question 7 options: 1) As computerized accounting systems become more complex, there are usually fewer manual processes. 2) With more automation in computerized accounting systems, responsibility for authorization gets moved to lower levels of employees. 3) Approvals for each journal voucher are general authorizations instead of a specific authorization. 4) None of the above are false.arrow_forwardPlease answer all the requirements. Thank you 1. Increasing use of sophisticated EDP systems has produced significant changes in the accounting environment. Some of these changes are the following: a. documents that are used to enter information into the computer may exist for only a short time or only in computer-readable form. In some computer systems, input documents may not exist at all, because information is entered directly into the system. b. Computer processing uniformly subjects like transactions to the same processing instructions. c. Many internal control procedures, once performed by separate individuals in manual systems, may be combined in systems that use computer processing. d. The potential for individuals to gain unauthorized access to data or assets may be greater in computerized accounting systems than in manual systems. Required: For each of the changes, discuss the impact on the internal control system and the independent audit. 2. The CARE…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegePkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L