Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 11DQ
a)
Summary Introduction
To suggest: Monitoring activity for credit approval.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
b)
Summary Introduction
To suggest: Monitoring activity for removal of terminated employee access to computer systems.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
c)
Summary Introduction
To suggest: Monitoring activity for new background check.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following elements of internal control includes maintaining records of employees documenting their compensation and promotion?
Control procedures
Monitoring
Control environment
Risk assessment
Operating system security involves policies, procedures, and controls that determine who can access the operating system. User access privileges are assigned to individuals and to entire workgroups authorized to use the system.The way access privileges are assigned influences system security. Priviliges should be carefully administered and closely monitored for compliance with organizational policy. Choose one of the options below, that is not a test of control of the audit objective relating to access privileges.
a. Review employee records to determine whether users have formally acknowledged their responsibility to maintain the confidentiality of company data.b. Review the privileges of a selection of user groups and individuals to determine if their access rights are appropriate for their job descriptions and positions.c. The auditor should verify that individuals are granted access to data and programs based on their need to know.d. Review the account lockout policy and procedures…
Internal controls do each of the following except:
A. Evaluate performance of employees
B. Guarantee the accuracy if account records
C. Protect assets
D. Increase the likelihood that any errors will be caught
Chapter 8 Solutions
Accounting Information Systems
Ch. 8 - What are the four major categories of pervasive...Ch. 8 - What are the differences among a pervasive control...Ch. 8 - Prob. 3RQCh. 8 - Describe some compensating controls that can be...Ch. 8 - What are policy controls plans? How do policies...Ch. 8 - Why should an organization conduct monitoring...Ch. 8 - Prob. 8RQCh. 8 - Prob. 10RQCh. 8 - What are the major elements of the strategic IT...Ch. 8 - Prob. 12RQ
Ch. 8 - Prob. 13RQCh. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Prob. 23RQCh. 8 - Prob. 24RQCh. 8 - Prob. 25RQCh. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - Prob. 29RQCh. 8 - Prob. 30RQCh. 8 - Prob. 31RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - No matter how sophisticated a system of internal...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Prob. 9DQCh. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - The following is a list of six control plans from...Ch. 8 - Prob. 2SPCh. 8 - Prob. 3SPCh. 8 - Prob. 2PCh. 8 - The following is a list of 13 control plans from...Ch. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 6PCh. 8 - Examine the last column in Table 8.2 (p. 280) for...
Knowledge Booster
Similar questions
- Which of the following is NOT a general control?* a. Backup of live data b. Use of passwords c. Setting an acceptable range for working hours d. Calamity-proof IT facilities ABOUT AUDITING/ACCOUNTING TOPICSarrow_forwardSelect the appropriate control activities for each of the following definitions. Definitions Control Activities a. The company should maintain security over assets and accounting records. Management should periodically determine whether the amounts of physical b. assets of the company match the accounting records. The company should provide employees with appropriate guidance to ensure C. they have the knowledge necessary to carry out their job duties. The actual performance of individuals or processes should be checked against d. their expected performance. Authorizing transactions, recording transactions, and maintaining control of the е. related assets should be separated among employees. To prevent improper use of the company's resources, only certain employees are allowed to carry out certain business activities.arrow_forwardMatch each of the following control activities with its definition. Control Activities Definitions 1. Separation of duties 2. Physical controls 3. Proper authorization 4. Employee management 5. Reconciliations 6. Performance reviews a. The company should maintain security over assets and accounting records.b. Management should periodically determine whether the amounts of physical assets of the company match the accounting records.c. The company should provide employees with appropriate guidance to ensure they have the knowledge necessary to carry out their job duties.d. The actual performance of individuals or processes should be checked against their expected performance.e. Authorizing transactions, recording transactions, and maintaining control of the related assets should be separated among employees.f. To prevent improper use of the company’s resources, only certain employees are allowed to carry out certain business activities.arrow_forward
- When planning the audit of internal controls for an issuer, the audit team shoulda. Identify significant accounts, locations, and assertions.b. Conduct a walkthrough of the internal control process.c. Make inquiries of employees regarding the existence of control activities.d. Reperform control activities performed by client employees to determine theireffectiveness.arrow_forwardWhich of the following controls would most effectively minimize the need to correct failures to collect required information in the account opening process? A quality review staff that checks paper applications to ensure all fields are complete An automated account opening platform that required data entry prior to allowing the accoun to be opened Requiring that a manager review and apprive all new account applications Documenting a procedure that sets forth the steps required to open an accountarrow_forwardA company implements internal controls to improve the chances that employee will function according to the plans and standard operating procedures developed by the management team. Select one: True Falsearrow_forward
- Written Policies and Procedures as a part of internal control system serves all of the following objectives, except a. Provide a source of continuity and a basis for uniformity. b. Serve as reference material for future c. Helps discrepancies to be resolved immediately d. Provide a training tool for new employeesarrow_forwardWhat is the purpose of the following control procedures (i.e., what threats is it designed to mitigate)? f. Limit checks on hours worked for each time card.arrow_forwardWhich of the following is an example of an input control? a.making sure report that are distributed to the proper people b.monitoring the work of data entry clerks. c. Collecting accurate statistics of historical transactions while gathering data. d. Performing a check-digit test on a customer acount number e.Having anothr person review the design of a business formarrow_forward
- When a fraud has occurred within an organization, management must decide what follow-up action (s) to take. Briefly describe the three follow-up alternatives available to organizations?arrow_forwardThe IT Audit Director is responsible for monitoring and approving network-related changes to the company's production network. This is an appropriately designed preventive control. a) True b) Falsearrow_forwardAn IS auditor conducting a compliance audit of a healthcare organization operating an online system that contains sensitive health care information. Which of the following should an IS auditor first review? () IT infrastructure and IS department organization chart () legal and regulatory requirements regarding data privacy () adherence to organization policies and procedures () network diagram and firewall rules surrounding the online systemarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L