Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 8, Problem 7P
Examine the last column in Table 8.2 (p. 280) for the following personnel only: access control officer, chief information officer (CIO), structural security/disaster recovery manager, testing/quality assurance, and database administrator.
For each of the five functions, list one control plan from this chapter that would address the control concern described in the last column of Table 8.2 (p. 280) for that function. Explain how the plan might address the concern mentioned. Do not use the same plan twice; use five different plans.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Which of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls
Required: choose the correct answer and Justify your answers in at least 6 sentences.
Match the two lists, below, by placing the capital letter from List 1 in each of the cells
preceding the five descriptions in List 2 to which they best relate.
One description in List 2 can be answered with 2 matches from List 1. Therefore, you should
have 2 letters left over from List 1.
List 1: Concepts
A. Application (i.e., automated) control.
B. Corrective control.
C. Control environment.
D. Input validity.
E. Input completeness.
F. Input accuracy
G. Update completeness.
H. Efficient use of resources.
List 1: Capital letter
List 2: Definitions/Descriptions
1. Insurance policy reimburses a company for losses due to
a fire in a warehouse.
2. Shipping notices have a serial number that is tracked to
ensure that they are all input.
3.
Computer reviews each input to ensure that all the
required data are included.
4. Inventory movements are tracked with a scanner to
reduce manual counting.
5. Purchase orders are signed to approve the purchase.
Following is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals).
List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described.
Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all.
Control goals:
Ensure effectiveness of operations
Ensure efficient employment of resources
Ensure security of resources
Ensure input validity
Ensure input completeness
Ensure input accuracy
Ensure update completeness
Ensure update accuracy
Situations:
Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…
Chapter 8 Solutions
Accounting Information Systems
Ch. 8 - What are the four major categories of pervasive...Ch. 8 - What are the differences among a pervasive control...Ch. 8 - Prob. 3RQCh. 8 - Describe some compensating controls that can be...Ch. 8 - What are policy controls plans? How do policies...Ch. 8 - Why should an organization conduct monitoring...Ch. 8 - Prob. 8RQCh. 8 - Prob. 10RQCh. 8 - What are the major elements of the strategic IT...Ch. 8 - Prob. 12RQ
Ch. 8 - Prob. 13RQCh. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Prob. 23RQCh. 8 - Prob. 24RQCh. 8 - Prob. 25RQCh. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - Prob. 29RQCh. 8 - Prob. 30RQCh. 8 - Prob. 31RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - No matter how sophisticated a system of internal...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Prob. 9DQCh. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - The following is a list of six control plans from...Ch. 8 - Prob. 2SPCh. 8 - Prob. 3SPCh. 8 - Prob. 2PCh. 8 - The following is a list of 13 control plans from...Ch. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 6PCh. 8 - Examine the last column in Table 8.2 (p. 280) for...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, finance and related others by exploring similar questions and additional content below.Similar questions
- The following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over. Control Plans Review shipped not billed sales orders Turnaround documents Deposit slip file Procedures for rejected inputs Computer agreement of batch totals Document design Control Goals or System Deficiencies The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks. In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices. Helps to ensure that…arrow_forwardWhen evaluating a potential new information system using the systems development life cycle approach, which study describes the process in which the organization's current system is analyzed to determine whether a new system is needed or can be repair the existing system? a. Systems design and development. b. Systems evaluation and maintenance. c. System analysis. d. Systems research and feasibility.arrow_forward1. Physical systems design reports summarises what has been accomplished, which serves as a basis for the management and/or steering committee to decide whether to proceed to the implementation phase. Describe the item that should appear in the table of contents of the complete report.arrow_forward
- Which of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardDescribe the duties of systems analysts, programmers, computer operators, data conversion operators,librarians, and the control group. Which duties should be separated within the computer department?arrow_forwardThe following is a list of six control plans.These are followed by a list of five system failures that have control implications. Match the five system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one or two sentences) explanation of your choice. A letter should be used only once, with one letter left over. Control Plans Program change controls Independent validation of vendor invoices Access control software Batch control plans Compare input data with master data (e.g., vendor master data) Match invoice, PO, and receipt System Failures Vendor Invoices are received at Samuel Company via an EDI feed over the Internet. Some of these are fraudulent invoices from bogus vendors. Vendor invoices are sent to clerks in the AP department at Seneca, Inc., where they are entered once each day to create a file of invoice data that is then processed by the accounts payable program each evening. Several errors have been found in the…arrow_forward
- Which of the following is the correct sequence of activities in the systems development life cycle? a. Design, analysis, implementation, and operation. b. Design, implementation, analysis, and operation. c. Analysis, design, implementation, and operation. d. Programming, analysis, implementation, and operation.arrow_forwardApply the P.R.O.F.I.T. model to identify Infosys capabilities. Identify from the case study information the core competencies of Infosys.arrow_forwardConsider the following dialogue between a system professional, Jim Festin, and a manager of adepartment targeted for a new information system, Charles Puno:Festin: The way to go about the analysis is to first examine the old system, such as reviewing keydocuments and observing the workers perform their tasks. Then we can determine which aspects areworking well and which should be preserved.Puno: We have been through these types of projects before and what always ends up happening isthat we do not get the new system we are promised; we get a modified version of the old system.Festin: Well, I can assure you that will not happen this time. We just want a thorough understanding ofwhat is working well and what is not.Puno: I would feel much more comfortable if we first started with a list of our requirements. We shouldspend some time up-front determining exactly what we want the system to do for my department. Thenyou systems people can come in and determine what portions to salvage if you…arrow_forward
- The following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forwardThe following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forwardList the three parts of a control system, and explain how such a system works.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License