Principles Of Auditing & Other Assurance Services
21st Edition
ISBN: 9781259916984
Author: WHITTINGTON, Ray, Pany, Kurt
Publisher: Mcgraw-hill Education,
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 8, Problem 29EOQ
When an online real-time (OLRT) IT processing system is in use, internal control can be strengthened by:
- (1) Providing for the separation of duties between data input and error handling operations.
- (2) Reconciling hash totals to computer runs.
- (3) Making a validity check of an identification number and password before a user can obtain access to the computer files.
- (4) Preparing batch totals to provide assurance that file updates are made for the entire input.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The computer processing portion of a sales order system is represented by the flowchart. Answer the following questions.a. What type of data processing system is this? Explain, and be specific.b. The auditor suggests that this system can be greatly simplified by changing to direct access files. Explain the major operational changes that would occur in the system if this were done.c. The auditor warns of control implications from this change that must be considered. Explain the nature of the control implications.d. Sketch a flowchart (the computerized portion only) of the proposed new system. Use correct symbols and label the diagram.
Required:
a. Create a document flowchart of the existing system.
b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78.
1.Transaction Authorization
2.Segregation of Duties
3.Supervision
4.Accounting Records
5.Access Control
6.Independent Verification
Assumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items:
Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user?
Are control totals established by the user prior to submitting data for processing? (order entry application subsystem).
Are input control totals reconciled to output control totals? (Order entry application sub system).
Required:
Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.
Chapter 8 Solutions
Principles Of Auditing & Other Assurance Services
Ch. 8 - List and describe the major components of an...Ch. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Distinguish general control activities from...Ch. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - What is the difference between an Internet-based...Ch. 8 - Prob. 15RQCh. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22QRACh. 8 - Prob. 23QRACh. 8 - Prob. 24QRACh. 8 - Prob. 25QRACh. 8 - Prob. 26QRACh. 8 - Prob. 27QRACh. 8 - Prob. 28QRACh. 8 - Prob. 29AOQCh. 8 - Prob. 29BOQCh. 8 - Prob. 29COQCh. 8 - Prob. 29DOQCh. 8 - When an online real-time (OLRT) IT processing...Ch. 8 - Prob. 29FOQCh. 8 - Prob. 29GOQCh. 8 - Prob. 29HOQCh. 8 - Prob. 29IOQCh. 8 - Prob. 29JOQCh. 8 - Prob. 29KOQCh. 8 - Prob. 29LOQCh. 8 - Prob. 30OQCh. 8 - Prob. 31OQCh. 8 - For each definition (or partial definition) in the...Ch. 8 - Prob. 33PCh. 8 - Prob. 34PCh. 8 - Prob. 35PCh. 8 - Prob. 36PCh. 8 - Prob. 37PCh. 8 - Prob. 38ITC
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Computer Internal Control Questionnaire Evaluation. Assume that, when conductingprocedures to obtain an understanding of Denton Seed Company’s internal controls, youchecked “No” to the following internal control questionnaire items:∙ Does access to online files require specific passwords to be entered to identify and validate the terminal user?∙ Does the user establish control totals prior to submitting data for processing? (Orderentry application subsystem.)∙ Are input control totals reconciled to output control totals? (Order entry applicationsubsystem.)Required:Describe the errors and frauds that could occur because of the weaknesses indicated by thelack of IT controlsarrow_forwardDatabase currency is achieved bya. implementing partitioned databases at remote sites.b. employing data-cleansing techniques.c. ensuring that the database is secure from accidental entry.d. an external auditor’s reconciliation of reports from multiple sites.e. a database lockout that prevents multiple simultaneous access.arrow_forwardA control designed to validate a transaction at the point of data entry is a. recalculation of a batch total. b. a record count. c. a check digit. d. checkpoints. e. recalculation of hash total.arrow_forward
- The purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b. data input errors.c. the failure to have all input data ready on time.d. computer operator intervention.e. echo check failures.arrow_forwardControls used in the management of a computer center to minimize the possibility of using an incorrect file or program area. Control totals.b. Record counts.c. Limit checks.d. External labels.arrow_forward1. Explain how client internal controls can be improved through the proper installation of IT. 2. Distinguish between random error resulting from manual processing and systematic error resulting from IT processing and give an example of each category of error. 3. Explain what is meant by auditing around the computer, and describe what must be present for this approach to be effective in the audit of a client that uses IT to process accounting information. 4. An audit client is in the process of creating an online Web-based sales ordering system for customers to purchase products using personal credit cards for payment. Identify three risks related to an online sales system that management should consider. For each risk, identify an internal control that could be implemented to reduce that risk. 00000000000arrow_forward
- Match each word or phrase with the best description of it. Descriptions Words / Phrases related tocomputerized accounting systems a. Allows multiple users to access the system at the same time. Audit trailInternal controlNetwork-compatibleEnterprise resource planning systemsEntry-level software b. Enables the tracking of all transactions. Audit trailEnterprise resource planning systemsEntry-level softwareNetwork-compatibleInternal control c. Identifies suspicious transactions or likely mistakes such as wrong account numbers or duplicate transactions. Audit trailInternal controlEntry-level softwareEnterprise resource planning systemsNetwork-compatible d. Large-scale computer systems that integrate all aspects of the organization including accounting, sales, human resource…arrow_forwardComputer accounting control procedures are referred to as general or application controls. The primary objective of application controls in a computer environment is toa. ensure that the computer system operates efficiently.b. ensure the validity, completeness, and accuracy of financial transactions.c. provide controls over the electronic functioning of the hardware.d. plan for the protection of the facilities and backup for the systems.arrow_forwardWhich of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License