Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 11, Problem 3SP
Summary Introduction
To explain: The risk and the control process that will use the technology to handle the risk.
Introduction:
B/AR/CR process:
It is an accounting process with an interacting structure of different process supporting the decision-making activities of the
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Using the following table as a guide, describe for each function (see Figure 11.1):
A risk (an event or action that will cause the organization to fail to meet its goals/objectives).
A control/process or use of technology that will address the risk.
Function
Risks
Controls and Technology
Marketing
Finance
Billing
AR (debit)
Sales (credit)
Collections
Cash (debit)
AR (credit)
which of the following assets require the strongest of internal controls a. inventory b. credit card c. computer equipment d. cash
Imurlal LUnTUI amu give an example of each principle that
you might observe when picking up your pizza. (Note: It may not be possible to observe
all the principles.)
E7-3 The following control procedures are used in Keaton Company for over-the-counter
cash receipts.
List
oVE
im
1. Each store manager is responeible for interviewing applicants for cashier jobs. They
are hired if they seem honest and trastworthy.
2. All over-the-counter receipts are regisiered by three clerks who share a cash register
with a single cash drawer.
3. To minimize the risk of robbery, cash in excess of $100 is stored in an unlocked brief-
case in the stock room until it is deposited in the bank.
4. At the end of each day, the total receipts are counted by the cashier on duty and rec-
onciled to the cash register total.
5. The company accountant makes the bank deposit and then records the day's receipts.
(L
Chapter 11 Solutions
Accounting Information Systems
Ch. 11 - What is the billing/accounts receivable/cash...Ch. 11 - What primary activities does the B/AR/CR process...Ch. 11 - Prob. 3RQCh. 11 - What functions are typically segregated in the...Ch. 11 - Prob. 5RQCh. 11 - Describe several ways that companies have reduced...Ch. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - What is accounts receivable master data?
Ch. 11 - What are the major features of a balance-forward...Ch. 11 - What are the differences between a post-billing...Ch. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - What characterizes a valid RA (i.e., cash...Ch. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Develop several examples of possible goal...Ch. 11 - Prob. 2DQCh. 11 - Prob. 3DQCh. 11 - Prob. 4DQCh. 11 - Prob. 5DQCh. 11 - The two most widely used billing systems are (1)...Ch. 11 - Prob. 7DQCh. 11 - Prob. 1SPCh. 11 - Prob. 2SPCh. 11 - Prob. 3SPCh. 11 - Prob. 5SPCh. 11 - Prob. 6SPCh. 11 - Prob. 3PCh. 11 - Prob. 5PCh. 11 - Prob. 6PCh. 11 - Use the DFDs in Figure 11.3 (pg. 416), Figure 11.4...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, finance and related others by exploring similar questions and additional content below.Similar questions
- Which one of the following components of internal control over financial reporting sets the tone for the organization? a. Risk assessment. b. Control environment. c. Information and communication. d. Monitoring.arrow_forwardWhich of the following assets require the strongest of internal controls? Group of answer choices 1.credit cards 2.computer equipment 3.inventory 4.casharrow_forwardWhat category of control procedures best describes a reconciliation account, such as Accounts Payable? 1)Group of answer choices 2)Detective 3)Application 4)Systems 5)Preventivearrow_forward
- Which of the following assets require the strongest of internal controls? Group of answer choices inventory credit cards computer equipment casharrow_forwardKeeping cash locked away is an example of which control activity? a. Authorization b. Performance reviews • c. Physical control d. Segregation of dutiesarrow_forwardUsing a bpmn modelling tool, model the control flow of a business process for modelling credit risk? the process starts when a new credit request is received. A risk management officer checks the levels of the application. If the risk is above a threshold, an advanced risk assessment needs to be carried out, otherwise a simple assessment will suffice. Once the assessment has been completed, the customer is notified with the assessment result while the disbursement is arranged. Fir simplicity, assume that the result of an assessment is always positivearrow_forward
- What is the purpose of the following control procedures (i.e., what threats is it designed to mitigate)? c. Direct deposit of paychecks.arrow_forwardComputer accounting control procedures are referred to as general or application controls. The primary objective of application controls in a computer environment is toa. ensure that the computer system operates efficiently.b. ensure the validity, completeness, and accuracy of financial transactions.c. provide controls over the electronic functioning of the hardware.d. plan for the protection of the facilities and backup for the systems.arrow_forwardInternal ControlsThink of possible controls over (Explain)1.) cash2) receivables3.) inventories.arrow_forward
- Ma1. Control activities are the policies and procedures that help ensure that management directives are carried out and which are designed to prevent and detect fraud and error occurring. An example of a control activity is the maintenance of a control account. Explain any five internal control activities and describe measures of internal control you would recommend to ensure that cash receipts and resources are properly accounted for and managed.arrow_forwardExternal user group, often referred to as financial intermediaries. What does these users provides?arrow_forward1. Which of the following is an example of an input control in the expenditure cycle? a. Physical controls over inventory b. Reconciling the bank statement c. Document sequencing d. Access controls over the purchasing system 2. A control procedure that helps prevent duplicate payments is: a. Performing physical inventory counts b. Matching purchase orders, receiving reports, and vendor invoices c. Reconciling bank statements d. Conducting vendor audits 3.Which of the following is an example of an independent verification control in the expenditure cycle? a. Document sequencing b. Reconciling the bank statement c. Segregation of duties d. Physical controls over inventoryarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPrinciples of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
What is variance analysis?; Author: Corporate finance institute;https://www.youtube.com/watch?v=SMTa1lZu7Qw;License: Standard YouTube License, CC-BY