Accounting Information Systems
Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 15, Problem 2P

a.

To determine

Explain the operating risk associated with Company A.

b.

To determine

Explain the control measures required to mitigate the risk.

Blurred answer
Students have asked these similar questions
An online virus-scan service provider, Whispering, is expanding its offerings to include an optimizing service to users-it can scan the consumer's hard drive for duplicate files, suggest more efficient ways to save or archive photos and movies, and much more. The problem is that the company's own cost information has been lost-not due to a virus but due to human error. Charlee, the office manager, is trying to recreate some of the information to use in pricing Whispering's newest optimizing service. Here is what she was able to dig up: Known Information for Virus-ScanService Selling price $30 per scan Gross margin % 50 % Costs of Optimizing Service Labor cost $5 per scan MOH cost (includes software, utilities, etc.) $25 per scan (a) For Whispering's virus-scan service, calculate the current cost-plus markup percentage (based on service cost rather than full cost, since the selling and administrative expense information has been lost). (Round answer to O decimal places, e.g. 15%.)…
what is the potential consequences and give each of the question a prevention technique. 1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. 2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. 3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at…
Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Has the company identified an off‐site alternative computer processing location?

Chapter 15 Solutions

Accounting Information Systems

Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,