Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 4SP
Summary Introduction
To explain: An enterprise system might be preferable to a nonintegrated system while detecting a fraud.
Introduction:
Enterprise system:
These are software packages which are large scale in nature mostly utilized to run and support complex organization activities which include, reporting, data flow, and other activities.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain the difference between computer fraud and general fraud. Explain both categories of fraud in relation to accounting information system.
1. What does it mean to say that internal control has limitations and what are these limitations?
2. Provide an appropriate response based on the following scenarios.
Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented?
Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?
3. What is petty cash and what purpose(s) does it serve?
4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash?
5. Prepare the necessary journal entries for each of the following:
(a) On March 1, issued a check to establish a petty cash fund of $1,410
(b)…
How do you understand the Fraud Triangle? Please provide explanation.
Chapter 2 Solutions
Accounting Information Systems
Ch. 2 - Prob. 1RQCh. 2 - Describe the key features/characteristics of an...Ch. 2 - Prob. 3RQCh. 2 - Describe the methods used to integrate ERP systems...Ch. 2 - Prob. 5RQCh. 2 - What is the relationship of the organizational...Ch. 2 - Prob. 7RQCh. 2 - Prob. 8RQCh. 2 - Prob. 9RQCh. 2 - Prob. 10RQ
Ch. 2 - Describe the six steps in the order-to-cash...Ch. 2 - Prob. 12RQCh. 2 - Prob. 13RQCh. 2 - How does an enterprise system support the...Ch. 2 - List the advantages and disadvantages of an...Ch. 2 - Prob. 1DQCh. 2 - The Tigris Company is considering taking customers...Ch. 2 - Periodically, you will read in the news about one...Ch. 2 - Describe how an enterprise system can assist an...Ch. 2 - Consider a business process that you have...Ch. 2 - Describe a situation in which information would be...Ch. 2 - Prob. 7DQCh. 2 - Prob. 8DQCh. 2 - Describe the primary and supporting activities...Ch. 2 - Prob. 1SPCh. 2 - Prob. 2SPCh. 2 - Prob. 3SPCh. 2 - Prob. 4SPCh. 2 - Conduct research on the Web sites of either CIO...Ch. 2 - Prob. 2PCh. 2 - Conduct research on an ERP package, such as...Ch. 2 - Prob. 4PCh. 2 - Prob. 5PCh. 2 - Prob. 6PCh. 2 - Choose (or you instructor may designate) an ERP...
Knowledge Booster
Similar questions
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardWhich of the following is false about accounting information systems? A. They provide reports that people analyze. B. They prevent errors and stop employees from stealing inventory. C. They are designed to gather data about the companys transactions. D. They consist of processes that involve input of data from source documents, processing, output, and storage.arrow_forwardRefer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
- College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub