Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 5DQ
Summary Introduction
To determine: The difference between bubble 3.1 and bubble 3.2 in the above diagram.
Introduction:
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Which of the following is a control that can be used to ensure that all of the components of an
invoice number are input by a data entry person?
dependency check
O procedures for rejected inputs
preformatted screens
O turnaround documents
1.
Data under a traditional ledger system is
authenticated by a central authority while
data under a blockchain is authenticated
through
Select one:
a. central authority.
b. a party outside the blockchain.
C. mass collaboration.
d. an external audit.
2
Analyzing data with the purpose of
determining a casual relationship refers to
Select one:
a. predictive analytics.
b. descriptive analytics.
c. diagnostic analytics.
d. prescriptive analytics.
3.
Which of the following items is not an
application of blockchain?
Select one:
a. joining ERP systems from multinational
subsidaries.
b. continual updating of real-time data on
customer preferences.
C. continual updating of financial statements
with new transactions.
d. joining ERP systems from different
companies.
Please answer with reason for all why the option is correct and why the other options are incorrect
Chapter 12 Solutions
Accounting Information Systems
Ch. 12 - Prob. 1RQCh. 12 - What primary functions does the purchasing process...Ch. 12 - Prob. 3RQCh. 12 - What are the fundamental responsibilities of each...Ch. 12 - Describe supply chain management (SCM).Ch. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - What types of frauds are typically found in the...Ch. 12 - What are the typical effectiveness goals of the...Ch. 12 - What characterizes a valid PO input? What...Ch. 12 - Prob. 15RQCh. 12 - Describe the impact that entity-level controls...Ch. 12 - Refer to the operations process (effectiveness)...Ch. 12 - Explain why ambiguities and conflicts exist among...Ch. 12 - Prob. 3DQCh. 12 - Without redrawing the figures, discuss how Figure...Ch. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 8DQCh. 12 - Prob. 9DQCh. 12 - Prob. 1SPCh. 12 - Prob. 2SPCh. 12 - Prob. 3SPCh. 12 - Prob. 4SPCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6P
Knowledge Booster
Similar questions
- After a receipt is uploaded into QBO, the user will need to ______ the data and ensure the receipt is properly categorized and classified. Select one: a. Sort b. Save c. Journalize d. Reviewarrow_forwardA sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted. A control procedure that would serve as a preventive control for this situation would be: Select one: O a. Hash total O b. Check digit O c. Validity test O d. Either B or Carrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forward
- How do you analyze the QUICKBOOK Software to analyze the customer and vendor’sPayments and Receipts? Justify the figures using QuickBooks.arrow_forwardDescribe the three types of anomalies associated with database tables that have not been normalized. Using and Inventory table as an example, explain the operational implications of each anomaly.arrow_forwardBriefly provide your opinion whether an auditor wishing to assess the adequacy of separation of functions examine a data flow diagram or system flowchart. Why.arrow_forward
- 1-Use audit software to compare vendor per the acquisition journal to the preapproved vendor list and identify any exception, identify the type of audit tests A) Test of control. B) analytical procedure. C) substantive test of transaction. D)test of details of balances. radarrow_forwardQuestion 1 Which of these would be a reason for adopting a predominantly substantive approach? Select an answer and submit. For keyboard navigation, use the up/down arrow keys to select an answer. a Accounts are affected by more than one transaction class Detection risk has been assessed as high C There are no significant control procedures that pertain to the assertion Control risk has been assessed as low b darrow_forwardControl Objectives and Procedures Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15). Make a copy of the exhibit page and complete the following requirements.Requireda. Opposite the examples of transaction errors lettered a–g, write the name of the transaction assertion clients wish to achieve to prevent, detect, or correct the error.b. Opposite each numbered control procedure, place an “X” in the column that identifies the error(s) the procedure is likely to control by prevention, detection, or correction.arrow_forward
- Refer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.arrow_forwardThe computer processing portion of a sales order system is represented by the flowchart. Answer the following questions.a. What type of data processing system is this? Explain, and be specific.b. The auditor suggests that this system can be greatly simplified by changing to direct access files. Explain the major operational changes that would occur in the system if this were done.c. The auditor warns of control implications from this change that must be considered. Explain the nature of the control implications.d. Sketch a flowchart (the computerized portion only) of the proposed new system. Use correct symbols and label the diagram.arrow_forwardWhich of the following is false? Select one: a. Recording transactions in separate special journals provides users with a more efficient system and access to specific information. b. Source documents provide evidence for journal entries, which are then posted to the general ledger accounts. c. The opening balances from the general ledger accounts are used to create a trial balance, the financial statements and other reports. d. All of the choices are truearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College PubBusiness Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage