Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 9, Problem 1SP
The following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Because there are six control plans, you should have one letter left over.
Control Plans
- A. Limit checks
- B. Tickler files
- C. Public key cryptography
- D. Compare input data with master data
- E. One-for-one checking
- F. Manual reconciliation of batch totals (hash totals)
Definitions or Descriptions
- 1. Determines if a customer number has been input correctly.
- 2. Ensures that transmitted messages can be read only by authorized receivers.
- 3. A control plan that confirms a value that was entered is within a valid range.
- 4. An area (electronic or manual) where documents or other items are stored that need follow-up.
- 5. Used to detect changes in batches of events to ensure the validity, completeness, and accuracy of the batch.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The following is a list of 12 control plans from this chapter or from Chapters 8, 9, 10, & 11. This is followed by a list of 10 system failures that have control implications. Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one- to two-sentence) explanation of your choice. A letter should be used only once, with two letters left over.
Control Plans
Compare PO data to input receipt data
Written code of conduct
Compare vendors for price, terms, quality, and availability
Monitor open POs
Independent authorization to record receipt
Count goods and compare to vendor packing slip
Independent vendor master data maintenance
Personnel management controls (supervision)
Perimeter and building controls
Segregate warehouse and receiving functions
Digital signature
Logical and physical access controls
System Failures
Warehouse managers at Broward, Inc. have been discovering inventory shortages. When they…
Which of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls
Required: choose the correct answer and Justify your answers in at least 6 sentences.
Which of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total
Required: choose the correct answer and Justify your answers in at least 6 sentences.
Chapter 9 Solutions
Accounting Information Systems
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - How could the control matrix be used to recommend...Ch. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Name and explain four different types of batch...Ch. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 1DQCh. 9 - Explain why input controls are so important....Ch. 9 - Describe the similarities and differences between...Ch. 9 - Prob. 4DQCh. 9 - Prob. 5DQCh. 9 - Prob. 6DQCh. 9 - Prob. 7DQCh. 9 - Prob. 8DQCh. 9 - Prob. 9DQCh. 9 - Prob. 10DQCh. 9 - Prob. 11DQCh. 9 - The following is a list of six control plans from...Ch. 9 - Prob. 2SPCh. 9 - Figure 9.10 lists 10 control plans from this...Ch. 9 - Prob. 1PCh. 9 - Prob. 2PCh. 9 - Prob. 3PCh. 9 - Prob. 4PCh. 9 - Prob. 5PCh. 9 - Prob. 6P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, finance and related others by exploring similar questions and additional content below.Similar questions
- Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardThe following is a list of 12 control plans from this chapter or from Chapters 8 & 9. These are followed by a list of 10 system failures that have control implications. Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Write one or two sentences explaining each answer. Because there are 12 control plans, you should have two letters left over. Control Plans Enter customer order close to where customer order is prepared Turnaround document Independent shipping authorization Populate input screens with master data One-for-one checking of the goods, picking ticket, and sales order Preformatted screens Confirm input acceptance Reasonableness check Backup procedures (for data) Program change controls Digital signature Personnel termination controls System Failures Handsome Corp. has recently received customer complaints that the goods they receive frequently are not accurate. Sometimes they receive…arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forward
- Match the two lists, below, by placing the capital letter from List 1 in each of the cells preceding the five descriptions in List 2 to which they best relate. One description in List 2 can be answered with 2 matches from List 1. Therefore, you should have 2 letters left over from List 1. List 1: Concepts A. Application (i.e., automated) control. B. Corrective control. C. Control environment. D. Input validity. E. Input completeness. F. Input accuracy G. Update completeness. H. Efficient use of resources. List 1: Capital letter List 2: Definitions/Descriptions 1. Insurance policy reimburses a company for losses due to a fire in a warehouse. 2. Shipping notices have a serial number that is tracked to ensure that they are all input. 3. Computer reviews each input to ensure that all the required data are included. 4. Inventory movements are tracked with a scanner to reduce manual counting. 5. Purchase orders are signed to approve the purchase.arrow_forwardThe following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over. Control Plans Review shipped not billed sales orders Turnaround documents Deposit slip file Procedures for rejected inputs Computer agreement of batch totals Document design Control Goals or System Deficiencies The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks. In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices. Helps to ensure that…arrow_forwardCategorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forward
- Using the flowchart of a purchases system, identify six major control weaknesses in the system. Discuss and classify each weakness in accordance with SAS 78/COSO.arrow_forwardWhat are the four basic backup and recovery features necessary in a database management system? Briefly explain each.arrow_forwardRequired: a. Create a document flowchart of the existing system. b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78. 1.Transaction Authorization 2.Segregation of Duties 3.Supervision 4.Accounting Records 5.Access Control 6.Independent Verificationarrow_forward
- Identify each item 1 through 10 with the system component A through E that it is best associated with. A. Source documents B. Input devices C. Information processors D. Information storage E. Output devices 1. Computer keyboard 2. Printer 3. Monitor 4. Bank statement 5. Ledger software 6. Cloud storage 7. Journal software 8. Invoice from supplier 9. Computer scanner 10. Filing cabinetarrow_forwardPROBLEM 8 - INTERNAL CONTROL. Using the flowchart for Problem 8 of a purchases system, identify six major control weaknesses in the system. Discuss and classify each weakness in accordance with SAS 78/COSO.arrow_forwardWhich of the following is a control that can be used to ensure that all of the components of an invoice number are input by a data entry person? dependency check O procedures for rejected inputs preformatted screens O turnaround documentsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License