Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 4P
a.
To determine
Explain the uncontrolled risks associated with the systems as currently configured.
b.
To determine
Explain the controls that need to be implemented into the system to mitigate the risk in provided scenario.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
a. Identify the physical control weakness depicted in the flowchart for Problem 2
b. Describe the IT controls that should be in place in this system
Refer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.
Refer to the system flowchart below and identify the internal control risks represented in it:
Chapter 5 Solutions
Accounting Information Systems
Ch. 5 - Prob. 1RQCh. 5 - What purpose does a purchasing department serve?Ch. 5 - Prob. 3RQCh. 5 - Prob. 4RQCh. 5 - Prob. 5RQCh. 5 - Prob. 6RQCh. 5 - Prob. 7RQCh. 5 - Prob. 8RQCh. 5 - Prob. 9RQCh. 5 - Some organizations do not use an AP subsidiary...
Ch. 5 - What is the purpose of the blind copy of a PO?Ch. 5 - Prob. 12RQCh. 5 - Prob. 1DQCh. 5 - Prob. 2DQCh. 5 - Prob. 3DQCh. 5 - The level of day-to-day department activity in...Ch. 5 - Prob. 5DQCh. 5 - What is central to a successful EDI...Ch. 5 - Discuss the objective of eliminating the receiving...Ch. 5 - What purpose does multilevel security control play...Ch. 5 - Prob. 9DQCh. 5 - Prob. 10DQCh. 5 - Which of the following statements is correct? a....Ch. 5 - Which of the following represents incompatible...Ch. 5 - Prob. 3MCQCh. 5 - Prob. 4MCQCh. 5 - Prob. 5MCQCh. 5 - Prob. 6MCQCh. 5 - Prob. 7MCQCh. 5 - Which of the following tasks should the cash...Ch. 5 - Which ledger can be updated solely from the...Ch. 5 - Prob. 10MCQCh. 5 - Prob. 1PCh. 5 - INVENTORY ORDERING ALTERNATIVES The flowchart for...Ch. 5 - Prob. 3PCh. 5 - Prob. 4PCh. 5 - Prob. 5PCh. 5 - Prob. 6PCh. 5 - Prob. 7PCh. 5 - Prob. 8PCh. 5 - Prob. 9PCh. 5 - Prob. 10PCh. 5 - Prob. 11PCh. 5 - UNRECORDED LIABILITIES You are auditing the...Ch. 5 - SMITHS MARKET (SMALL BUSINESS ACCOUNTING SYSTEM)...Ch. 5 - POSAVEK REMODELING AND BUILDING SUPPLY COMPANY...Ch. 5 - GREEN POND NURSERY (STANDALONE PC-BASED ACCOUNTING...Ch. 5 - Prob. 4ICCCh. 5 - Prob. 5ICCCh. 5 - Prob. 6ICCCh. 5 - Prob. 7ICCCh. 5 - Prob. 8ICC
Knowledge Booster
Similar questions
- User test and acceptance is part of which phase of the SDLC? a. General systems design b. Program specification and implementation planning c. Detailed systems design d. Implementationarrow_forwardWhich option below accurately describes the process of continually assessing internal controls and transactions? Multiple Choice Continuous reporting. О Continuous monitoring. The homogenous systems approach. The heterogeneous systems approach.arrow_forwardINTERNAL CONTROL Examine the flowchart below and determine any control threats. Specifically discuss the control problems, the possible dangers, and any corrective procedures you would recommend.arrow_forward
- Using the flowchart provided below, identify control problems, related risks of the problem and corrective actions to mitigate the risk. Format: Problem Risk Controlarrow_forwardThis method of documenting understanding of internal control structure is advantageous because it serves as a checklist thereby preventing the likelihood of missing a significant area of the controls: *A. Internal control questionnaire methodB. Narrative memorandum methodC. Flowchart methodD. Decision tablesE. All of themarrow_forward3. Risk registers would normally detail which of the following: (Select all that apply.) A. Risk level before controls are implemented B. Risk lével after controls are implemented C. Responsibility for managing risks D. The total cost of a control being implemented Answer: Page 3 of 11 ted States) E Focus МacВook Proarrow_forward
- Categorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forwardc. Analyze the phrysical internal control weaknewesin the systemd. (Optional) Prepare a system Mowchart of a rode-signed computer- based system that resolves thecontrol acakneses that you identified._ Explainyour solution.arrow_forwardExamine the flowchart and determine any control threats. Specifically discuss the control problems, the possible dangers, and any corrective procedures you would recommend.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning