1)
To determine: The control plan for each process failure given.
Introduction:
2)
To determine: The control plan for each process failure given.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)
To determine: The control plan for each process failure given.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)
To determine: The control plan for each process failure given.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)
To determine: The control plan for each process failure given.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Trending nowThis is a popular solution!
Chapter 12 Solutions
Accounting Information Systems
- Which of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardMatch six of the terms (a-j) with the definitions provided below (1-6).a. Application controlsb. Error listingc. General controlsd. Hardware controlse. Input controlsf. Output controlsg. Parallel simulationh. Parallel testingi. Pilot testingj. Processing controls________ 1. The new and old systems operate simultaneously in all locations.________ 2. Controls that relate to all aspects of the IT system.________ 3. Controls such as review of data for reasonableness, designed to assure that data generated by thecomputer is valid, accurate, complete, and distributed only to authorized people.________ 4. Controls that apply to processing of transactions.________ 5. A new system is implemented in one part of the organization while other locations continue to rely onthe old system.________ 6. Controls such as proper authorization of documents, check digits, and adequate documentation,designed to assure that the information to be entered into the computer is authorized, complete, and accurate.arrow_forward
- Explain what is meant by independent checks on performanceand give five specific examples.arrow_forward3. Risk registers would normally detail which of the following: (Select all that apply.) A. Risk level before controls are implemented B. Risk lével after controls are implemented C. Responsibility for managing risks D. The total cost of a control being implemented Answer: Page 3 of 11 ted States) E Focus МacВook Proarrow_forwardWrite the six of the key input variables. of sensitivity analysis?arrow_forward
- Describe the four common programmed edit checks.arrow_forwardProvide a list of the five risk-control strategies and a short description of each.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forward
- For each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.a. Retrieve a record from the file based upon its primary key value.b. Update a record in the file.c. Read a complete file of records.d. Find the next record in a file.e. Insert a record into a file.f. Delete a record from a file.g. Scan a file for records with secondary keys.arrow_forward7.8 Tralor Corporation manufactures and sells several different lines of small elec- tric components. Its internal audit department completed an audit of its expen- diture processes. Part of the audit involved a review of the internal accounting controls for payables, including the controls over the authorization of transactions, accounting for transactions, and the protection of assets. The auditors noted the following items: 1. Routine purchases are initiated by inventory control notifying the purchasing de- partment of the need to buy goods. The purchasing department fills out a prenum- bered purchase order and gets it approved by the purchasing manager. The original of the five-part purchase order goes to the vendor. The other four copies are for pur- chasing, the user department, receiving for use as a receiving report, and accounts payable. 2. For efficiency and effectiveness, purchases of specialized goods and services are ne- gotiated directly between the user department and…arrow_forwardChoose only one answer as well as state their reasons/rationale for the answer chosen. 7) Which input control is designed to prevent a buffer overflow attack?a. Size checkb. Reasonableness testc. Range checkd. Field checkarrow_forward
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,