1)
To determine: The control plan for the given system failure.
Introduction:
2)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Want to see the full answer?
Check out a sample textbook solutionChapter 13 Solutions
Accounting Information Systems
- The following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Because there are six control plans, you should have one letter left over. Control Plans A. Limit checks B. Tickler files C. Public key cryptography D. Compare input data with master data E. One-for-one checking F. Manual reconciliation of batch totals (hash totals) Definitions or Descriptions 1. Determines if a customer number has been input correctly. 2. Ensures that transmitted messages can be read only by authorized receivers. 3. A control plan that confirms a value that was entered is within a valid range. 4. An area (electronic or manual) where documents or other items are stored that need follow-up. 5. Used to detect changes in batches of events to ensure the validity, completeness, and accuracy of the batch.arrow_forwardRefer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment.arrow_forwardRefer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.arrow_forward
- List at least five threats in the process of ERP implementation (any of these steps: ERP product brand selection, module design, installation, testing, and daily operation), and propose at least 10 controls to mitigate the threats in your list. For each threat, there should be at least one proposed control. Elaborate on both the threats and controls. An answer like “Threat 1: Theft of cash. Controls: a. surprise audits; b. running petty cash.” is not sufficient. You need to explain why you think theft of cash is a threat, and how the two controls can mitigate the risk of cash theft.arrow_forwardRefer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment.arrow_forwardListed here are two scenarios. For each scenario, discuss the possible damages that can occur.Suggest a preventive control.A. An intruder taps into a telecommunications device and retrieves the identifying codes andpersonal identification numbers for ATM cardholders. (The user subsequently codes thisinformation onto a magnetic coding device and places this strip on a blank bank card.)B. Because of occasional noise on a transmission line, electronic messages received are extremelygarbled.Problem # 4 (30arrow_forward
- Accounting Questionarrow_forward(QuickBooks Online) A client messaged you saying that there might be something wrong with the bank feed of their checking account. What would be the first thing to do to see if the bank feed will refresh? A. Select the update button in the banking center. B. Select the troubleshoot button from the advanced tab in accounts and settings. C. Select the pencil icon on the checking account tile and select contact bank. D. Select the pencil icon on the checking account tile and select trouble shoot.arrow_forwardThe following is a list of six control plans (A-F). Please match the control plans to each of the control goals and system deficiencies identified in five different companies in the table, below. Control plans: A. Digital signature B. Manually reconcile batch totals C. Preformatted screens D. One-for-one checking of the goods, picking tickets and sales order E. Independent shipping authorization F. Turn around document Control goals and system deficiencies: 1. Zagreb, Inc. receives sales order on its Web server. Several times each day these are downloaded to the order entry and sales system. During the download process several line items are lost. 2. When goods arrive at Toronto Company's warehouse, the shipping clerk keys in the sales order number to retrieve the sales order. Often, the clerk keys the sales order number incorrectly and the wrong sales order is displayed. 3. Central Incorporated's customer send orders over the internet. Central is concerned that some of the orders are…arrow_forward
- You have been assigned to review the payment system of an enterprise. The finance director suspects that some duplicate payments may have been made. List five control procedures which you would expect to find.arrow_forwardControl Objectives and Procedures Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15). Make a copy of the exhibit page and complete the following requirements.Requireda. Opposite the examples of transaction errors lettered a–g, write the name of the transaction assertion clients wish to achieve to prevent, detect, or correct the error.b. Opposite each numbered control procedure, place an “X” in the column that identifies the error(s) the procedure is likely to control by prevention, detection, or correction.arrow_forwardWhich of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forward
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub