1)
To determine: The control plan for each process failure given.
Introduction:
2)
To determine: The control plan for each process failure given.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)
To determine: The control plan for each process failure given.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)
To determine: The control plan for each process failure given.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)
To determine: The control plan for each process failure given.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Trending nowThis is a popular solution!
Chapter 12 Solutions
Accounting Information Systems
- The following is a list of 12 control plans from this chapter or from Chapters 8, 9, 10, & 11. This is followed by a list of 10 system failures that have control implications. Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one- to two-sentence) explanation of your choice. A letter should be used only once, with two letters left over. Control Plans Compare PO data to input receipt data Written code of conduct Compare vendors for price, terms, quality, and availability Monitor open POs Independent authorization to record receipt Count goods and compare to vendor packing slip Independent vendor master data maintenance Personnel management controls (supervision) Perimeter and building controls Segregate warehouse and receiving functions Digital signature Logical and physical access controls System Failures Warehouse managers at Broward, Inc. have been discovering inventory shortages. When they…arrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardWhich of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forward
- Explain what is meant by independent checks on performanceand give five specific examples.arrow_forwardEach of the following are input controls. Please give an example of how they may be used: Thank you:) Range check Reasonableness check Validity checkarrow_forward3. Risk registers would normally detail which of the following: (Select all that apply.) A. Risk level before controls are implemented B. Risk lével after controls are implemented C. Responsibility for managing risks D. The total cost of a control being implemented Answer: Page 3 of 11 ted States) E Focus МacВook Proarrow_forward
- Using the flowchart of a purchases system, identify six major control weaknesses in the system. Discuss and classify each weakness in accordance with SAS 78/COSO.arrow_forwardThe following is a list of 12 control plans from this chapter or from Chapters 8 & 9. These are followed by a list of 10 system failures that have control implications. Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Write one or two sentences explaining each answer. Because there are 12 control plans, you should have two letters left over. Control Plans Enter customer order close to where customer order is prepared Turnaround document Independent shipping authorization Populate input screens with master data One-for-one checking of the goods, picking ticket, and sales order Preformatted screens Confirm input acceptance Reasonableness check Backup procedures (for data) Program change controls Digital signature Personnel termination controls System Failures Handsome Corp. has recently received customer complaints that the goods they receive frequently are not accurate. Sometimes they receive…arrow_forward7.8 Tralor Corporation manufactures and sells several different lines of small elec- tric components. Its internal audit department completed an audit of its expen- diture processes. Part of the audit involved a review of the internal accounting controls for payables, including the controls over the authorization of transactions, accounting for transactions, and the protection of assets. The auditors noted the following items: 1. Routine purchases are initiated by inventory control notifying the purchasing de- partment of the need to buy goods. The purchasing department fills out a prenum- bered purchase order and gets it approved by the purchasing manager. The original of the five-part purchase order goes to the vendor. The other four copies are for pur- chasing, the user department, receiving for use as a receiving report, and accounts payable. 2. For efficiency and effectiveness, purchases of specialized goods and services are ne- gotiated directly between the user department and…arrow_forward
- Refer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.arrow_forwardChoose only one answer as well as state their reasons/rationale for the answer chosen. 7) Which input control is designed to prevent a buffer overflow attack?a. Size checkb. Reasonableness testc. Range checkd. Field checkarrow_forwardDiscuss six ways that threats from destructive programs can be substantially reduced through a combination of technology controls and administrative procedures.arrow_forward
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,