1)
To determine: The control plan for the given system failure.
Introduction:
1)
Explanation of Solution
Given system failure:
Inventory shortages have been discovered at Company B by the warehouse managers. They realized that the goods have arrived in the warehouse while investigating the paperwork.
Determine the control plan for the given system failure:
Perimeter and building controls: Accessing control over the warehouse building helps to prevent the losses.
2)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
2)
Explanation of Solution
Given system failure:
The vendors claimed that they are billing for the goods they have shipped. However, the accounts payable clerks at Company G have trouble in reconciling the quantities as received and the quantities on invoices sent by the vendors.
Determine the control plan for the given system failure:
Count goods and compare to vendor packing slip: Vendor packing slip should be compared with the goods that are counted.
3)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)
Explanation of Solution
Given system failure:
Person C ordered unneeded inventory items from the company for which she is the owner.
Determine the control plan for the given system failure:
A written code of conduct: The buyers should sign in a written code of conduct of the firm to avoid conflict of interest between their financial interest and responsibility.
4)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)
Explanation of Solution
Given system failure:
Person D is working in the receiving department. He once received goods and he is unable to find PO for the goods. Hence, he created PO and received the good. However, later he found that the firm never ordered the goods.
Determine the control plan for the given system failure:
Independent authorization to record receipt: There must be a purchase order on file and the person in logistics should not create the PO.
5)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)
Explanation of Solution
Given system failure:
Person K created a vendor record for Company E, as she is in need to buy a part from Company E. Afterwards, others began to use Company E for other purchases.
Determine the control plan for the given system failure:
Independent vendor master data maintenance: Vendor master data should be maintained. The firm should need a process to approve the vendors to find that they can deliver goods with the prices.
6)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
6)
Explanation of Solution
Given system failure:
When gotten into some financial difficulties, Person S who is working in Company L started to work for Company H. Person S created PO from Company H and recorded a receipt. However, no goods were received. Afterward, Company H sends a bill and gets paid from Company L.
Determine the control plan for the given system failure:
Segregate warehouse and receiving functions: The warehouse and receiving functions should be segregated.
7)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
7)
Explanation of Solution
Given system failure:
At Company W, there are discrepancies between the items ordered and recorded that includes wrong quantities and wrong items.
Determine the control plan for the given system failure:
Compare PO data to input receipt data: The purchase order should be matched with the invoice received for the order
8)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
8)
Explanation of Solution
Given system failure:
Most of the times, Company S would run out of inventory of some items. They investigated and found that the PO was issued but items are not received. They have also noted that these delayed deliveries and poor performance are from the same vendors.
Determine the control plan for the given system failure:
Compare vendors for price, terms, quality, and availability: Available vendors should be compared with respect to the price, terms, availability, and quality. Hence, vendors who can provide the best services can be selected.
9)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
9)
Explanation of Solution
Given system failure:
The vendors of Company M received POs that seemed to be from the firm but actually bogus. Usually, Company M uses the internet to send purchase orders.
Determine the control plan for the given system failure:
Digital signature: Digital signatures make sure that there is only authorized access to the computer.
10)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
10)
Explanation of Solution
Given system failure:
There were several discrepancies in inventory data of Company D. The inventory in the shelf has not reflected in the balances.
Determine the control plan for the given system failure:
Monitor open PO: Open purchase orders should be monitored to avoid discrepancies.
Want to see more full solutions like this?
Chapter 12 Solutions
Accounting Information Systems
- The following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over. Control Plans Review shipped not billed sales orders Turnaround documents Deposit slip file Procedures for rejected inputs Computer agreement of batch totals Document design Control Goals or System Deficiencies The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks. In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices. Helps to ensure that…arrow_forwardWhich of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardFollowing is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals). List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described. Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all. Control goals: Ensure effectiveness of operations Ensure efficient employment of resources Ensure security of resources Ensure input validity Ensure input completeness Ensure input accuracy Ensure update completeness Ensure update accuracy Situations: Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…arrow_forward
- Refer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.arrow_forwardc. Analyze the phrysical internal control weaknewesin the systemd. (Optional) Prepare a system Mowchart of a rode-signed computer- based system that resolves thecontrol acakneses that you identified._ Explainyour solution.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forward
- For each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.a. Retrieve a record from the file based upon its primary key value.b. Update a record in the file.c. Read a complete file of records.d. Find the next record in a file.e. Insert a record into a file.f. Delete a record from a file.g. Scan a file for records with secondary keys.arrow_forwardChoose only one answer as well as state their reasons/rationale for the answer chosen. 7) Which input control is designed to prevent a buffer overflow attack?a. Size checkb. Reasonableness testc. Range checkd. Field checkarrow_forwardCategorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forward
- Refer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment.arrow_forwardMatch six of the terms (a-j) with the definitions provided below (1-6).a. Application controlsb. Error listingc. General controlsd. Hardware controlse. Input controlsf. Output controlsg. Parallel simulationh. Parallel testingi. Pilot testingj. Processing controls________ 1. The new and old systems operate simultaneously in all locations.________ 2. Controls that relate to all aspects of the IT system.________ 3. Controls such as review of data for reasonableness, designed to assure that data generated by thecomputer is valid, accurate, complete, and distributed only to authorized people.________ 4. Controls that apply to processing of transactions.________ 5. A new system is implemented in one part of the organization while other locations continue to rely onthe old system.________ 6. Controls such as proper authorization of documents, check digits, and adequate documentation,designed to assure that the information to be entered into the computer is authorized, complete, and accurate.arrow_forwardWhich of the following is a control that can be used to ensure that all of the components of an invoice number are input by a data entry person? dependency check O procedures for rejected inputs preformatted screens O turnaround documentsarrow_forward
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,