Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 2P
Summary Introduction
To determine: The code for each control plan given.
Introduction:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total
Required: choose the correct answer and Justify your answers in at least 6 sentences.
Match the two lists, below, by placing the capital letter from List 1 in each of the cells
preceding the five descriptions in List 2 to which they best relate.
One description in List 2 can be answered with 2 matches from List 1. Therefore, you should
have 2 letters left over from List 1.
List 1: Concepts
A. Application (i.e., automated) control.
B. Corrective control.
C. Control environment.
D. Input validity.
E. Input completeness.
F. Input accuracy
G. Update completeness.
H. Efficient use of resources.
List 1: Capital letter
List 2: Definitions/Descriptions
1. Insurance policy reimburses a company for losses due to
a fire in a warehouse.
2. Shipping notices have a serial number that is tracked to
ensure that they are all input.
3.
Computer reviews each input to ensure that all the
required data are included.
4. Inventory movements are tracked with a scanner to
reduce manual counting.
5. Purchase orders are signed to approve the purchase.
3. Risk registers would normally detail which of the following: (Select all that apply.)
A. Risk level before controls are implemented
B. Risk lével after controls are implemented
C. Responsibility for managing risks
D. The total cost of a control being implemented
Answer:
Page 3 of 11
ted States)
E Focus
МacВook Pro
Chapter 8 Solutions
Accounting Information Systems
Ch. 8 - What are the four major categories of pervasive...Ch. 8 - What are the differences among a pervasive control...Ch. 8 - Prob. 3RQCh. 8 - Describe some compensating controls that can be...Ch. 8 - What are policy controls plans? How do policies...Ch. 8 - Why should an organization conduct monitoring...Ch. 8 - Prob. 8RQCh. 8 - Prob. 10RQCh. 8 - What are the major elements of the strategic IT...Ch. 8 - Prob. 12RQ
Ch. 8 - Prob. 13RQCh. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Prob. 23RQCh. 8 - Prob. 24RQCh. 8 - Prob. 25RQCh. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - Prob. 29RQCh. 8 - Prob. 30RQCh. 8 - Prob. 31RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - No matter how sophisticated a system of internal...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Prob. 9DQCh. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - The following is a list of six control plans from...Ch. 8 - Prob. 2SPCh. 8 - Prob. 3SPCh. 8 - Prob. 2PCh. 8 - The following is a list of 13 control plans from...Ch. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 6PCh. 8 - Examine the last column in Table 8.2 (p. 280) for...
Knowledge Booster
Similar questions
- Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardThe following is a list of 12 control plans from this chapter or from Chapters 8, 9, 10, & 11. This is followed by a list of 10 system failures that have control implications. Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one- to two-sentence) explanation of your choice. A letter should be used only once, with two letters left over. Control Plans Compare PO data to input receipt data Written code of conduct Compare vendors for price, terms, quality, and availability Monitor open POs Independent authorization to record receipt Count goods and compare to vendor packing slip Independent vendor master data maintenance Personnel management controls (supervision) Perimeter and building controls Segregate warehouse and receiving functions Digital signature Logical and physical access controls System Failures Warehouse managers at Broward, Inc. have been discovering inventory shortages. When they…arrow_forwardSYSTEM FLOWCHART Using the diagram for Problem 7, answer the following questions: • What do Symbols 1 and 2 represent? • What does the operation involving Symbols 3 and 4 depict? • What does the operation involving Symbols 4 and 5 depict? • What does the operation involving Symbols 6, 8, and 9 depict?arrow_forward
- The following is a list of 12 control plans from this chapter or from Chapters 8 & 9. These are followed by a list of 10 system failures that have control implications. Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Write one or two sentences explaining each answer. Because there are 12 control plans, you should have two letters left over. Control Plans Enter customer order close to where customer order is prepared Turnaround document Independent shipping authorization Populate input screens with master data One-for-one checking of the goods, picking ticket, and sales order Preformatted screens Confirm input acceptance Reasonableness check Backup procedures (for data) Program change controls Digital signature Personnel termination controls System Failures Handsome Corp. has recently received customer complaints that the goods they receive frequently are not accurate. Sometimes they receive…arrow_forwardRefer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.arrow_forwardMatch six of the terms (a-j) with the definitions provided below (1-6).a. Application controlsb. Error listingc. General controlsd. Hardware controlse. Input controlsf. Output controlsg. Parallel simulationh. Parallel testingi. Pilot testingj. Processing controls________ 1. The new and old systems operate simultaneously in all locations.________ 2. Controls that relate to all aspects of the IT system.________ 3. Controls such as review of data for reasonableness, designed to assure that data generated by thecomputer is valid, accurate, complete, and distributed only to authorized people.________ 4. Controls that apply to processing of transactions.________ 5. A new system is implemented in one part of the organization while other locations continue to rely onthe old system.________ 6. Controls such as proper authorization of documents, check digits, and adequate documentation,designed to assure that the information to be entered into the computer is authorized, complete, and accurate.arrow_forward
- PROGRAM TESTING When program modules have been coded and tested, they must be brought together and tested as a whole. Comment on the importance of testing the entire system.arrow_forwardRequired information [The following information applies to the questions displayed below.] Consider the following narrative describing the process of filling a customer's order at a Starbucks branch: Identify the start and end events and the activities in the following narrative, and then draw the business process model using BPMN: the Starbucks customer entered the drive-through lane and stopped to review the menu. He then ordered a Venti coffee of the day and a blueberry muffin from the barista. The barista recorded the order in the cash register. While the customer drove to the window, the barista filled a Venti cup with coffee, put a lid on it, and retrieved the muffin from the pastry case and placed it in a bag. The barista handed the bag with the muffin and the hot coffee to the customer. The customer has an option to pay with cash, credit card, or Starbucks gift card. The customer paid with a gift card. The barista recorded the payment and returned the card along with the…arrow_forwardFollowing is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals). List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described. Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all. Control goals: Ensure effectiveness of operations Ensure efficient employment of resources Ensure security of resources Ensure input validity Ensure input completeness Ensure input accuracy Ensure update completeness Ensure update accuracy Situations: Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…arrow_forward
- Following is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals). List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described. Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all. Control goals: Ensure effectiveness of operations Ensure efficient employment of resources Ensure security of resources Ensure input validity Ensure input completeness Ensure input accuracy Ensure update completeness Ensure update accuracy Situations: Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…arrow_forwarda. Explain the advantages of using GAS to assist with IT audits, and give five examples of how it may be used. b. Describe the audit purpose facilitated and the procedural steps to be followed when using the following CAATTs: 1. ITF 2. EAM 3. Parallel simulationarrow_forwardCan you help me with CVP Drill #7?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,