a)
To determine: The arguments for and against sending a copy of the invoice to the purchasing department for approval of payment.
Introduction:
b)
To determine: The arguments for and against sending a copy of the invoice to the requisitioning department for approval of payment.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Want to see the full answer?
Check out a sample textbook solutionChapter 13 Solutions
Accounting Information Systems
- Which of the following statements is true?a. Journal vouchers detailing transaction activity flow from various operational departments into the GLS, where they are independently reconciled and posted to the journal voucher history file. b. Journal vouchers summarizing transaction activity flow from the accounting department into the GLS, where they are independently reconciled and posted to the general ledger accounts. c. Journal vouchers summarizing transaction activity flow from various operational departments into the GLS, where they are independently reconciled and posted to the general ledger accounts. d. Journal vouchers summarizing transaction activity flow from various operational departments into the GLS, where they are indepen dently reconciled and posted to the journal voucher history file.arrow_forwardAnswer the following questions. a. Which department is responsible for initiating the purchase of materials? b. What is the name of the document generated by the department identified in (a) above? c. Typically, multiple copies of a purchase order are prepared. One copy should go to the vendor, and one is retained in the purchasing department. To achieve proper control, which other departments should receive copies of the purchase order? d. What documents does the accounts payable clerk review before setting up a liability? e. Which document transfers responsibility for goods sold to a common carrier?arrow_forwardAn example of a preventive control in the expenditure cycle is: A. Requiring management approval for large purchases B. Regular inventory counts C. Using firewalls and intrusion detection systems D. Conducting vendor audits.arrow_forward
- Which of the following is a control that can be used to ensure that all of the components of an invoice number are input by a data entry person? dependency check O procedures for rejected inputs preformatted screens O turnaround documentsarrow_forwardWhich of the following is an example of an input control? a.making sure report that are distributed to the proper people b.monitoring the work of data entry clerks. c. Collecting accurate statistics of historical transactions while gathering data. d. Performing a check-digit test on a customer acount number e.Having anothr person review the design of a business formarrow_forwardWhich of the following best represents a key control for ensuring sales are properlyauthorized when assessing control risks for sales? A. The separation of duties between the billing department and the cash receipts approval department. B. The use of an approved price list to determine unit selling price. C. Copies of approved sales orders sent to shipping, billing, and accounting departments. D. Sales orders are sent to the credit department for approval.arrow_forward
- What category of control procedures best describes a reconciliation account, such as Accounts Payable? 1)Group of answer choices 2)Detective 3)Application 4)Systems 5)Preventivearrow_forwardControl Objectives and Procedures Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15). Make a copy of the exhibit page and complete the following requirements.Requireda. Opposite the examples of transaction errors lettered a–g, write the name of the transaction assertion clients wish to achieve to prevent, detect, or correct the error.b. Opposite each numbered control procedure, place an “X” in the column that identifies the error(s) the procedure is likely to control by prevention, detection, or correction.arrow_forwardReliability means that data are reasonably complete and accurate. Accuracy refers to the extent that recorded data reflect the actual underlying information. In this regard which of the following is the suitable example of reliability of the data? O a. Information may be more reliable when it is obtained from dependent sources outside the entity O b. Information may be more reliable when it is obtained from independent sources outside the entity O c Information may be more reliable when it is obtained from the management of the entity O d. Information may be more reliable when it is obtained from engagement team membersarrow_forward
- 1. Data under a traditional ledger system is authenticated by a central authority while data under a blockchain is authenticated through Select one: a. central authority. b. a party outside the blockchain. C. mass collaboration. d. an external audit. 2 Analyzing data with the purpose of determining a casual relationship refers to Select one: a. predictive analytics. b. descriptive analytics. c. diagnostic analytics. d. prescriptive analytics. 3. Which of the following items is not an application of blockchain? Select one: a. joining ERP systems from multinational subsidaries. b. continual updating of real-time data on customer preferences. C. continual updating of financial statements with new transactions. d. joining ERP systems from different companies.arrow_forwardWhich of the following activities would use number of customer orders as an activity base? A. Order shipping B. Invoicing & collecting C. Customer return processing D. Both A & Barrow_forwardRequired: a. Create a document flowchart of the existing system. b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78. 1.Transaction Authorization 2.Segregation of Duties 3.Supervision 4.Accounting Records 5.Access Control 6.Independent Verificationarrow_forward
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubCollege Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub