Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 8P
To determine
Describe the six major physical control weaknesses in the system with the help of flowcharts.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
PHYSICAL CONTROLSUsing the flowchart of a purchases system for Problem8, identify six major physical control weaknesses in the system. Discuss the unmitigated risks associated with each weakness.
Using the flowchart of a purchases system, identify six major control weaknesses in the system. Discuss and classify each weakness in accordance with SAS 78/COSO.
PHYSICAL CONTROLSUsing the flowchart of a purchases system for this Problem, identify sixmajor physical control weaknesses in the system. Discuss theunmitigated risks associated with each weakness.
Chapter 5 Solutions
Accounting Information Systems
Ch. 5 - Prob. 1RQCh. 5 - What purpose does a purchasing department serve?Ch. 5 - Prob. 3RQCh. 5 - Prob. 4RQCh. 5 - Prob. 5RQCh. 5 - Prob. 6RQCh. 5 - Prob. 7RQCh. 5 - Prob. 8RQCh. 5 - Prob. 9RQCh. 5 - Some organizations do not use an AP subsidiary...
Ch. 5 - What is the purpose of the blind copy of a PO?Ch. 5 - Prob. 12RQCh. 5 - Prob. 1DQCh. 5 - Prob. 2DQCh. 5 - Prob. 3DQCh. 5 - The level of day-to-day department activity in...Ch. 5 - Prob. 5DQCh. 5 - What is central to a successful EDI...Ch. 5 - Discuss the objective of eliminating the receiving...Ch. 5 - What purpose does multilevel security control play...Ch. 5 - Prob. 9DQCh. 5 - Prob. 10DQCh. 5 - Prob. 1MCQCh. 5 - Prob. 2MCQCh. 5 - Prob. 3MCQCh. 5 - Prob. 4MCQCh. 5 - Prob. 5MCQCh. 5 - Prob. 6MCQCh. 5 - Prob. 7MCQCh. 5 - Prob. 8MCQCh. 5 - Prob. 9MCQCh. 5 - Prob. 10MCQCh. 5 - Prob. 1PCh. 5 - INVENTORY ORDERING ALTERNATIVES The flowchart for...Ch. 5 - Prob. 3PCh. 5 - Prob. 4PCh. 5 - Prob. 5PCh. 5 - Prob. 6PCh. 5 - Prob. 7PCh. 5 - Prob. 8PCh. 5 - Prob. 9PCh. 5 - Prob. 10PCh. 5 - Prob. 11PCh. 5 - SMITHS MARKET (SMALL BUSINESS ACCOUNTING SYSTEM)...Ch. 5 - Prob. 2ICCCh. 5 - Prob. 3ICCCh. 5 - Prob. 4ICCCh. 5 - Prob. 5ICCCh. 5 - GREEN POND NURSERY (STANDALONE PC-BASED ACCOUNTING...Ch. 5 - Prob. 7ICCCh. 5 - Prob. 8ICC
Knowledge Booster
Similar questions
- PROBLEM 8 - INTERNAL CONTROL. Using the flowchart for Problem 8 of a purchases system, identify six major control weaknesses in the system. Discuss and classify each weakness in accordance with SAS 78/COSO.arrow_forwardRequired: a. Create a document flowchart of the existing system. b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78. 1.Transaction Authorization 2.Segregation of Duties 3.Supervision 4.Accounting Records 5.Access Control 6.Independent Verificationarrow_forwardRefer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.arrow_forward
- Which of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwarda. Identify the physical control weakness depicted in the flowchart for Problem 2 b. Describe the IT controls that should be in place in this systemarrow_forwardCategorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forward
- Refer to the system flowchart below and identify the internal control risks represented in it:arrow_forwardControl Objectives and Procedures Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15). Make a copy of the exhibit page and complete the following requirements.Requireda. Opposite the examples of transaction errors lettered a–g, write the name of the transaction assertion clients wish to achieve to prevent, detect, or correct the error.b. Opposite each numbered control procedure, place an “X” in the column that identifies the error(s) the procedure is likely to control by prevention, detection, or correction.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L