1)
To determine: The control plan for the given system failure.
Introduction:
2)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Want to see the full answer?
Check out a sample textbook solutionChapter 13 Solutions
Pkg Acc Infor Systems MS VISIO CD
- The purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b. data input errors.c. the failure to have all input data ready on time.d. computer operator intervention.e. echo check failures.arrow_forwardControls used in the management of a computer center to minimize the possibility of using an incorrect file or program area. Control totals.b. Record counts.c. Limit checks.d. External labels.arrow_forwardCategorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forward
- INTERNAL CONTROLS AND FLOWCHART ANALYSIS a. Identify the physical control weaknesses depicted in theflowchart for Problem 2.b. Describe the IT controls that should be in place in this system.arrow_forwardControl Objectives and Procedures Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15). Make a copy of the exhibit page and complete the following requirements.Requireda. Opposite the examples of transaction errors lettered a–g, write the name of the transaction assertion clients wish to achieve to prevent, detect, or correct the error.b. Opposite each numbered control procedure, place an “X” in the column that identifies the error(s) the procedure is likely to control by prevention, detection, or correction.arrow_forward1. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be most effective in addressing the error or irregularity. For each control you identify, indicate (1) if it is a preventive, detective, or corrective control, and (2) which of the four internal control objectives is addressed.a. A computer hardware component malfunctions during a processing run, causing many of the accounts receivable records to be lost. b. A five-minute power failure causes the computer system to cease functioning, thus resulting in the loss of data being transmitted from several terminals. c. During a violent electrical storm, an employee was keying data at one of the computers in the order entry department. After about an hour of data entry, lightning caused a company-wide power failure. When power was restored, the employee had to re-key all the data from scratch. d. An inexperienced computer operator mounts the accounts receivable master file (on magnetic tape reel) for…arrow_forward
- Required: a. Create a document flowchart of the existing system. b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78. 1.Transaction Authorization 2.Segregation of Duties 3.Supervision 4.Accounting Records 5.Access Control 6.Independent Verificationarrow_forwardThe computer processing portion of a sales order system is represented by the flowchart. Answer the following questions.a. What type of data processing system is this? Explain, and be specific.b. The auditor suggests that this system can be greatly simplified by changing to direct access files. Explain the major operational changes that would occur in the system if this were done.c. The auditor warns of control implications from this change that must be considered. Explain the nature of the control implications.d. Sketch a flowchart (the computerized portion only) of the proposed new system. Use correct symbols and label the diagram.arrow_forwardWhich of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forward
- The major objectives of control are guard against frauds in data entry/processing check clerical handling of data before it enters a computer to provide a method to trace the steps and find where error has occurred automatically correct errors in data entry/processing Question 17Answer a. i and iii b. i,ii, iii, iv c. i, ii and iv d. i, ii, and iii e. i onlyarrow_forwardhas hired you to review its sales order procedures for internal control compliance and to make recommendations for changes. You are required to:a. Create a data flow diagram of the current system. b. Create a system flowchart of the existing system. c. Analyze the internal control weaknesses in the system. ; andd. Prepare a system flowchart of a redesigned computer-based systemarrow_forwardAssumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.arrow_forward
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,