Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 8P
a.
To determine
Determine the database authorization table for master file and payroll file.
b.
To determine
Describe the potential risk if the right controls are not in place or if Bo and Ba collude.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Match the term to its definition by choosing the appropriate number in the answer field. You will not use all of the terms provided.
Question 8 options:
A partial set of all available data items in a database that are used by a specific application, query, or report.
Fields that link tables with other tables.
The ability of employees at higher levels of responsibility and authority to bypass internal controls.
A field which is unique to each record in a database table.
The total number of transactions in a batch, used as a control total.
Procedures that are put in place to remedy errors or irregularities after they have been discovered.
Controls designed to enhance the control environment and strengthen the effectiveness of application controls.
1.
Corrective controls
2.
Preventive controls
3.
General controls
4.
Application controls
5.
Record counts
6.…
Which of the following is an example of an input control?
a.making sure report that are distributed to the proper people
b.monitoring the work of data entry clerks.
c. Collecting accurate statistics of historical transactions while gathering data.
d. Performing a check-digit test on a customer acount number
e.Having anothr person review the design of a business form
An audit client has engaged a third-party service organization tohost its payroll software package on servers located at the service organization. What optionsdo you have to obtain assurance about the controls embedded in the payroll application?
Chapter 15 Solutions
Accounting Information Systems
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Explain discretionary access privileges.Ch. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - What is a vaccine, and what are its limitations?Ch. 15 - Prob. 10RQ
Ch. 15 - Prob. 11RQCh. 15 - What are the risks from equipment failure?Ch. 15 - Prob. 13RQCh. 15 - Prob. 14RQCh. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Prob. 12DQCh. 15 - Prob. 13DQCh. 15 - End-user computing has become extremely popular in...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Prob. 24DQCh. 15 - Prob. 25DQCh. 15 - Describe a digest within the context of a digital...Ch. 15 - What is a digital envelope?Ch. 15 - Prob. 28DQCh. 15 - Prob. 29DQCh. 15 - Prob. 30DQCh. 15 - Prob. 31DQCh. 15 - Discuss the unique control problems EDI creates.Ch. 15 - Prob. 33DQCh. 15 - Prob. 34DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 7PCh. 15 - Prob. 8PCh. 15 - Better Business Company (BBC) is in the process of...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- Andy is a junior accounts clerk. Andy has the responsibility of keying transactions into the accounting information system. Andy also has the authorization and sanctions to post those journal entries into the ledger. Required: Identify the risk(s) in the situation and assess what and how controls can be deployed to this situation.arrow_forwardCase Study. In an automated payroll processing environment, a department manager substituted the time card for a terminated employee with a time card for a fictitious employee. The fictitious employee had the same pay rate and hours worked as the terminated employee. The best control technique to detect this action using employee identification numbers would be______________. Explain your answer.arrow_forwardIn an automated payroll processing environment, a department manager substituted the time card for a terminated employee with a time card for a fictitious employee. The fictitious employee had the same pay rate and hours worked as the terminated employee. The best control technique to detect this action using employee identification numbers would be aa. batch total.b. record count.c. hash total.d. subsequent check.e. financial total.arrow_forward
- Computer Internal Control Questionnaire Evaluation. Assume that, when conductingprocedures to obtain an understanding of Denton Seed Company’s internal controls, youchecked “No” to the following internal control questionnaire items:∙ Does access to online files require specific passwords to be entered to identify and validate the terminal user?∙ Does the user establish control totals prior to submitting data for processing? (Orderentry application subsystem.)∙ Are input control totals reconciled to output control totals? (Order entry applicationsubsystem.)Required:Describe the errors and frauds that could occur because of the weaknesses indicated by thelack of IT controlsarrow_forwardExplain how internal control can be enhanced through the proper installation of Information Technology Identify the risks for accounting systems that rely heavily on IT functions. Distinguish between general controls and application controls and give examples at least five Which duties should be segregated in a computer department? Describe the typical duties of computer personnel. What aspects of documentation, file security and retention control procedures are unique to computer systems? What are the responsibilities of the database administrator (DBA) function? Compare the risks associated with network environment to those associated with centralized IT functions.arrow_forwardWhich of the following is NOT an example of application control?* a. Pre-filled forms are already sent to users to minimize input errors b. After processing, the daily sales summary are reconciled with the individual sales invoices processed c. Reasonableness tests on acceptable working hours are embedded in the payroll software d. An equipment failure causes an error message on the monitorarrow_forward
- Given the information below, Marco only issues accounts and passwords to employees with jobs requiring computer data entry or access to file information and reports. Passwords are required to enter the system. Access is limited such that employees only have access to the information they need to perform their duties. Access is also limited in nature such that some employees who do not have the authority to enter data have read-only access while those whose jobs require data entry have both read and write access. Normal access to the files takes place via the software, which subjects any input to various logical and numerical tests. What is the: a) potential control strength and (b) potential mistatement detected or corrected.arrow_forwardExplain in detail how the following relate to Advanced Technology Payroll Systems: Human Resources, Cost Accounting, Employee Timekeeping, Data Processing. Explain the following: Time and Attendance File, Biometric Time Clock, Magnetic Swipe ID Cards, Proximity Cards, Mobile Remote Devices. What are the payroll systems risks and internal controls?arrow_forwardDiscuss the risks depicted by the payroll system flowchart. Describe the internal control improvements to the system that are needed to reduce these risks.arrow_forward
- Consider the following list of internal controls. For each control classify it either as a preventive control or a detective control. Also classify each control as either a manual control, an IT dependent manual control, at IT application control, or a IT general control. a. b. C. d. e. Software will not allow a sale to be processed to a customer that has exceeded its credit limit. Personnel responsible for running computer programs are prevented from accessing and changing computer software. Computer software generates a daily report of all shipping documents (bills of lading) that have not resulted in a sales invoice. An accounting clerk follows-up on a computer-generated report of all shipping documents (bills of lading) that have not resulted in a sales invoice, to determine if an invoice should be generated. An accounting employee performs a monthly bank reconciliation.arrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Cyber sleuths need the following skills: a. Ability to do complex programming so they can develop their own software to examine corporate data and records. b. Ability to follow a trail, think analytically, and be thorough. c. Ability to use their computer engineering experience to evaluate the hardware used by the company d. Ability to think like a fraud perpetrator and use hacking tools and techniques. e. Ability to use their legal training to properly prepare the evidence needed to prosecute perpetratorsarrow_forwardUsing the flowchart structure presented in Figure 2- in the text, prepare a system flowchart of the pro- cess outlined in Problem 3. Assume the following: Hard-copy timesheets are submitted by employees to department management. Managers submit the time sheet data digitally from their department terminals to the automated payroll application located in the data center. The automated system posts the transactions to the digital payroll file. The system also prepares and distributes hard- copy checks and cost center reports to employees and management respectively. Managers review the reports and file them in their departmentsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Business Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:Cengage
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage