Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 2P
a.
To determine
Explain the operating risk associated with Company A.
b.
To determine
Explain the control measures required to mitigate the risk.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
An online virus-scan service provider, Whispering, is expanding its offerings to include an optimizing service to users-it can scan the
consumer's hard drive for duplicate files, suggest more efficient ways to save or archive photos and movies, and much more. The
problem is that the company's own cost information has been lost-not due to a virus but due to human error. Charlee, the office
manager, is trying to recreate some of the information to use in pricing Whispering's newest optimizing service. Here is what she was
able to dig up:
Known Information for Virus-ScanService
Selling price
$30 per scan
Gross margin %
50 %
Costs of Optimizing Service
Labor cost
$5 per scan
MOH cost (includes software, utilities, etc.)
$25 per scan
(a)
For Whispering's virus-scan service, calculate the current cost-plus markup percentage (based on service cost rather than full
cost, since the selling and administrative expense information has been lost). (Round answer to O decimal places, e.g. 15%.)…
what is the potential consequences and give each of the question a prevention technique.
1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks.
2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file.
3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at…
Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Has the company identified an off‐site alternative computer processing location?
Chapter 15 Solutions
Accounting Information Systems
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Explain discretionary access privileges.Ch. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - What is a vaccine, and what are its limitations?Ch. 15 - Prob. 10RQ
Ch. 15 - Prob. 11RQCh. 15 - What are the risks from equipment failure?Ch. 15 - Prob. 13RQCh. 15 - Prob. 14RQCh. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Prob. 12DQCh. 15 - Prob. 13DQCh. 15 - End-user computing has become extremely popular in...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Prob. 24DQCh. 15 - Prob. 25DQCh. 15 - Describe a digest within the context of a digital...Ch. 15 - What is a digital envelope?Ch. 15 - Prob. 28DQCh. 15 - Prob. 29DQCh. 15 - Prob. 30DQCh. 15 - Prob. 31DQCh. 15 - Discuss the unique control problems EDI creates.Ch. 15 - Prob. 33DQCh. 15 - Prob. 34DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 7PCh. 15 - Prob. 8PCh. 15 - Better Business Company (BBC) is in the process of...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- Ascendex Sdn Bhd is an online company that supplies a range of IT products. Its product line includes IT hardware and software. Their main customers are government agencies and private company. The company employs a combination of manual procedures and a networked accounting system with distributed terminals in several departments. After years of satisfactory performance, however, Ascendex Sdn Bhd is now experiencing operational inefficiencies and accounting errors. Your firm has been hired to evaluate Ascendex’s business processes and internal controls. Ascendex’s expenditure cycle is described in the following paragraphs. PURCHASE SYSTEM PROCEDURES Ascendex’s transactions are initiated when the purchasing department clerk reviews the inventory file for items that need to be replenished. The clerk selects a vendor, adds a record to the digital purchase order (PO) File, and prints four hard copies of the PO. One copy is filed in the department; the second copy is sent to the receiving…arrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?arrow_forwardInnovative Marketing, Inc. (IMI), sold “scareware”—computer security software. IMI’s Internet ads redirected consumers to sites where they were told that a scan of their computers had detected dangerous files—viruses, spyware, and “illegal” pornography. In fact, no scans were conducted. Kristy Ross, an IMI co-founder and vice president, reviewed and edited the ads, and was aware of the many com- plaints that consumers had made about them. An individual can be held liable under the Federal Trade Commission Act’s prohibition of deceptive acts or practices if the person (1) participated directly in the deceptive practices or had the authority to control them and (2) had or should have had knowledge of them. Were IMI’s ads deceptive? If so, can Ross be held liable? Explain..arrow_forward
- A new systems development project is being planned for Reindeer Christmas Supplies Company. The invoicing, cash receipts, and accounts payable modules are all going to be updated. The controller, Kris K. Ringle, is a little anxious about this project. The last systems development project that affected his department was not very successful, and the employees in the accounting department did not accept the new system very well at first. He feels that the systems personnel did not interact sufficiently with the users of the systems in the accounting department.Prepare a memo from Ringle to the head of the information systems department, Sandy Klaus. In this memo, provide some suggestions for including the accounting personnel in the systems development project. Give persuasive arguments as to why prototyping would be helpful to the workers in the accounting department.arrow_forwardThe internal auditor of a small company has recommended to the CEO that it invest in a disaster recovery plan (DRP) because of several identified vulnerabilities. Traditional in-house DRP approaches are, however, not a viable option because the company lacks the necessary IT resources to implement and manage these tasks. The auditor has suggested that outsourcing disaster recovery to a cloud-based service provider may be a reasonable alternative. The CEO has no experience with cloud computing and has asked the internal auditor to provide him with more information. Required: Prepare a report outlining cloud computing. Your report should address the following: List the key features of cloud computingarrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will customer orders be received via the Internet? Are all collections from customers received in the form of checks? Are product quantities monitored regularly?arrow_forward
- After finishing your accounting degree, you joined an accounting firm. This is a medium-size accountingfirm with a reasonable range of clients. You are in an engagement meeting with one of your clients, andyour client's management raises some concerns. In particular, the management is concerned that theaudit tests that you perform will disrupt operations. Your client has recently implemented a datawarehouse. The management suggests that you draw the data for analytical reviews and substantivetesting from the data warehouse instead of the operational database. Further, the management pointsout that operational data are copied weekly into the data warehouse, and all data you need are containedthere.Required: Based on the given scenario, outline your response to the management's proposal and mentionany concerns you might have.arrow_forwardHow could Pascal and Super Tech have identified and addressed this risk? What should Pascal do now? Case - Pascal is the manager of software development for Super Tech. He discovered that Bill, the lead software designer, has announced that he is leaving the company next week. Pascal finds that Bill has accepted a job with Super Tech main competitor. Pascal fear that in his new job, Bill will use technology developed while at the company and disclose the identities of key customers.arrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. The number of incidents and the total dollar losses from computer fraud are increasing rapidly for several reasons: a. Many instances of computer fraud go undetected and many frauds are not reported. b. Many companies are moving to cloud services where there are few data security controls. c. Internet sites offer step-by-step instructions on how to perpetrate computer fraud and abuse. d. Law enforcement is not interested in preventing or prosecuting computer fraud. e. There are no laws against computer fraud so prosecution is difficultarrow_forward
- You are currently working in a mid-tier accounting firm. In an engagement meeting with a client, the management of your client is concerned that the audit tests that you perform will disrupt operations. Your client has recently implemented a data warehouse and the management suggests that you draw the data for analytical reviews and substantive testing from the data warehouse instead of the operational database. The management points out that operational data are copied weekly into the data warehouse and all data you need are contained there.Outline your response to the management’s proposal and mention any concerns you might have.arrow_forwardThe internal auditor of a small company has recommended to the CEO that it invest in a disaster recovery plan (DRP) because of several identified vulnerabilities. Traditional in-house DRP approaches are, however, not a viable option because the company lacks the necessary IT resources to implement and manage these tasks. The auditor has suggested that outsourcing disaster recovery to a cloud-based service provider may be a reasonable alternative. The CEO has no experience with cloud computing and has asked the internal auditor to provide him with more information. Required: Prepare a report outlining cloud computing. Your report should address the following: Describe how the services provided under cloud computing relate to disaster recovery planning. Outline the risks associated with this technologyarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,