Principles Of Auditing & Other Assurance Services
21st Edition
ISBN: 9781259916984
Author: WHITTINGTON, Ray, Pany, Kurt
Publisher: Mcgraw-hill Education,
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 29DOQ
To determine
Identify the appropriate answer related to the control that would prevent the error in the given case.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Vendor invoices are recorded for items that were never ordered by the company. Which of the following controls can best
address this issue?
O Procedures for rejected inputs
O Reconcile bank account
O Independent authorization to make payment
Independent validation of vendor invoices
Which of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.
A sales transaction was coded with an invalid customer account
code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not
detected until the updating run when it was found that there was
no such account to which the transaction could be posted. A
control procedure that would serve as a preventive control for this
situation would be:
Select one:
O a. Hash total
O b. Check digit
O c. Validity test
O d. Either B or C
Chapter 8 Solutions
Principles Of Auditing & Other Assurance Services
Ch. 8 - List and describe the major components of an...Ch. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Distinguish general control activities from...Ch. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - What is the difference between an Internet-based...Ch. 8 - Prob. 15RQCh. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22QRACh. 8 - Prob. 23QRACh. 8 - Prob. 24QRACh. 8 - Prob. 25QRACh. 8 - Prob. 26QRACh. 8 - Prob. 27QRACh. 8 - Prob. 28QRACh. 8 - Prob. 29AOQCh. 8 - Prob. 29BOQCh. 8 - Prob. 29COQCh. 8 - Prob. 29DOQCh. 8 - When an online real-time (OLRT) IT processing...Ch. 8 - Prob. 29FOQCh. 8 - Prob. 29GOQCh. 8 - Prob. 29HOQCh. 8 - Prob. 29IOQCh. 8 - Prob. 29JOQCh. 8 - Prob. 29KOQCh. 8 - Prob. 29LOQCh. 8 - Prob. 30OQCh. 8 - Prob. 31OQCh. 8 - For each definition (or partial definition) in the...Ch. 8 - Prob. 33PCh. 8 - Prob. 34PCh. 8 - Prob. 35PCh. 8 - Prob. 36PCh. 8 - Prob. 37PCh. 8 - Prob. 38ITC
Knowledge Booster
Similar questions
- Assumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.arrow_forwardConsider the following internal controls associated with an evaluated receipts process. For each control, identify the assertion for which the control is designed to prevent, or detect and correct misstatements. a. b. C. d. e. f. g. h. Software generates a daily report comparing the daily total in the cash disbursements journal with the total of payables submitted to the third-party payment processor for payment, and discrepancies are reported. Software generates a daily report of any discrepancies between the vendor accounting coding and general ledger accounts coding, which is compared with the purchase order and purchase requisition. Software generates a daily report of any discrepancies between the recorded payable and quantities on the receiving report. Once a receiving report is matched with a purchase, it cannot be matched with another purchase. Software generates a daily report of receiving reports that have not been matched one-for-one with the recording of a purchase and a…arrow_forwardControls used in the management of a computer center to minimize the possibility of using an incorrect file or program area. Control totals.b. Record counts.c. Limit checks.d. External labels.arrow_forward
- Which of the following is a control that can be used to ensure that all of the components of an invoice number are input by a data entry person? dependency check O procedures for rejected inputs preformatted screens O turnaround documentsarrow_forwardControl Objectives and Procedures Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15). Make a copy of the exhibit page and complete the following requirements.Requireda. Opposite the examples of transaction errors lettered a–g, write the name of the transaction assertion clients wish to achieve to prevent, detect, or correct the error.b. Opposite each numbered control procedure, place an “X” in the column that identifies the error(s) the procedure is likely to control by prevention, detection, or correction.arrow_forwardFireballCompany requires that all documents supporting a check (purchase order, invoice, and receiving report) be canceled by punching a hole through the packet. Why is this practice required?What might happen if it were not?arrow_forward
- The purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b. data input errors.c. the failure to have all input data ready on time.d. computer operator intervention.e. echo check failures.arrow_forwardComputer Internal Control Questionnaire Evaluation. Assume that, when conductingprocedures to obtain an understanding of Denton Seed Company’s internal controls, youchecked “No” to the following internal control questionnaire items:∙ Does access to online files require specific passwords to be entered to identify and validate the terminal user?∙ Does the user establish control totals prior to submitting data for processing? (Orderentry application subsystem.)∙ Are input control totals reconciled to output control totals? (Order entry applicationsubsystem.)Required:Describe the errors and frauds that could occur because of the weaknesses indicated by thelack of IT controlsarrow_forwardAn employee in the receiving department keyed in a shipment from a remote terminal and inadvertently omitted the purchase order number. The best systems control to detect this error would be aa. batch total.b. completeness test.c. sequence check.d. reasonableness test.e. compatibility test.arrow_forward
- Assertion Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15).Required:For each error/control objective, identify the assertion about classes of transactions and events most benefited by the control.arrow_forward1. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be most effective in addressing the error or irregularity. For each control you identify, indicate (1) if it is a preventive, detective, or corrective control, and (2) which of the four internal control objectives is addressed.a. A computer hardware component malfunctions during a processing run, causing many of the accounts receivable records to be lost. b. A five-minute power failure causes the computer system to cease functioning, thus resulting in the loss of data being transmitted from several terminals. c. During a violent electrical storm, an employee was keying data at one of the computers in the order entry department. After about an hour of data entry, lightning caused a company-wide power failure. When power was restored, the employee had to re-key all the data from scratch. d. An inexperienced computer operator mounts the accounts receivable master file (on magnetic tape reel) for…arrow_forward"All the supporting documents such as PO, vendor's invoice are attached to the voucher" is one of the key controls to meet Occurrence audit assertion. True Falsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Financial AccountingAccountingISBN:9781305088436Author:Carl Warren, Jim Reeve, Jonathan DuchacPublisher:Cengage LearningCollege Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Financial Accounting
Accounting
ISBN:9781305088436
Author:Carl Warren, Jim Reeve, Jonathan Duchac
Publisher:Cengage Learning
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning