1)
To determine: The control plan for the given system failure.
Introduction:
1)
Explanation of Solution
Given system failure:
Company W ordered 30 circuit breakers from Company E and received only 25. Other 5 circuit breakers were on the backorder at Company E. However, an invoice was received for 30 circuit breakers and paid fully.
Determine the control plan for the given system failure:
Match invoice, PO, and receiving report: Matching invoice with Purchase Order (PO) and the receiving report helps the firm to avoid the invoices for the goods which were not ordered or received.
2)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
2)
Explanation of Solution
Given system failure:
Company T usually does not receive invoices and record invoices in a timely manner for payment discounts.
Determine the control plan for the given system failure:
Tickler file of open POs and receiving reports: Tickler files are an electronic or manual area where the documents, which need follow-up will be stored. It will help the firm to follow up the vendors who have not sent invoices.
3)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)
Explanation of Solution
Given system failure:
Person N is a cashier at Company S who has been writing checks to herself and no one detected for years.
Determine the control plan for the given system failure:
Reconcile bank account: Reconcile bank account helps to make sure that the payments made by the bank are accurate and authorized.
4)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)
Explanation of Solution
Given system failure:
At Company E, some of the incoming invoices are not matched against receiving reports and PO. Person J would prepare a PO to cover the invoice if he cannot find a PO for the incoming invoices.
Determine the control plan for the given system failure:
Segregate duties among purchasing, receiving, and accounts payable: The duties of the purchasing and receiving department, and accounts payable should be segregated.
5)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)
Explanation of Solution
Given system failure:
The company I receive vendor invoices once each day as batches from the Value-Added Network (VAN) through EDI feed. However, some of the invoices are from the fake vendors.
Determine the control plan for the given system failure:
Compare input data with master data: Comparing the input data with the master vendor data helps to determine the invoices from the authorized vendors.
6)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
6)
Explanation of Solution
Given system failure:
Due to the cash flow diagrams, Company W loses discounts on vendor payments.
Determine the control plan for the given system failure:
Review of a cash planning report: On a regular basis, the treasurer should produce and review an aging of accounts payable to make sure that enough funds are available to pay obligations.
7)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
7)
Explanation of Solution
Given system failure:
Person A is an accounts payable clerk at Company F, who has grown drained of resolving discrepancies. Person A has changed the accounts payable invoice programs to allow large variances to reduce rejects.
Determine the control plan for the given system failure:
Program change controls: Program that performs a credit check and validation should be prevented from the unauthorized alternation which can be done with the help of program change controls.
8)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
8)
Explanation of Solution
Given system failure:
Person N is an account payable who send the batch of vendor invoices to the clerk in cash disbursements twice a week. However, it is discovered that not all the payments were made correctly.
Determine the control plan for the given system failure:
Reconcile run-to-run totals: The batch totals for approved payments should be created by the cash disbursement clerk and it must be compared with the actual amount paid.
9)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
9)
Explanation of Solution
Given system failure:
Company S receives the electronic invoice by the third party via a web portal. It is discovered that the invoices were altered in transit from the vendor, as most of the invoices are not correct.
Determine the control plan for the given system failure:
Digital signature: Digital signatures make sure that there is only authorized access to the computer.
10)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
10)
Explanation of Solution
Given system failure:
Person G is the cashier who received invoices and made payments as needed. Some of the payments are to fake vendors.
Determine the control plan for the given system failure:
Segregate duties between accounts payable and cashier: The duties of accounts payable and cashier should be segregated to take care of the things without difficulties.
Want to see more full solutions like this?
Chapter 13 Solutions
Accounting Information Systems
- Which of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardc. Analyze the phrysical internal control weaknewesin the systemd. (Optional) Prepare a system Mowchart of a rode-signed computer- based system that resolves thecontrol acakneses that you identified._ Explainyour solution.arrow_forwardFollowing is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals). List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described. Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all. Control goals: Ensure effectiveness of operations Ensure efficient employment of resources Ensure security of resources Ensure input validity Ensure input completeness Ensure input accuracy Ensure update completeness Ensure update accuracy Situations: Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…arrow_forward
- Categorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardThe following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Because there are six control plans, you should have one letter left over. Control Plans A. Limit checks B. Tickler files C. Public key cryptography D. Compare input data with master data E. One-for-one checking F. Manual reconciliation of batch totals (hash totals) Definitions or Descriptions 1. Determines if a customer number has been input correctly. 2. Ensures that transmitted messages can be read only by authorized receivers. 3. A control plan that confirms a value that was entered is within a valid range. 4. An area (electronic or manual) where documents or other items are stored that need follow-up. 5. Used to detect changes in batches of events to ensure the validity, completeness, and accuracy of the batch.arrow_forward
- Match the two lists, below, by placing the capital letter from List 1 in each of the cells preceding the five descriptions in List 2 to which they best relate. One description in List 2 can be answered with 2 matches from List 1. Therefore, you should have 2 letters left over from List 1. List 1: Concepts A. Application (i.e., automated) control. B. Corrective control. C. Control environment. D. Input validity. E. Input completeness. F. Input accuracy G. Update completeness. H. Efficient use of resources. List 1: Capital letter List 2: Definitions/Descriptions 1. Insurance policy reimburses a company for losses due to a fire in a warehouse. 2. Shipping notices have a serial number that is tracked to ensure that they are all input. 3. Computer reviews each input to ensure that all the required data are included. 4. Inventory movements are tracked with a scanner to reduce manual counting. 5. Purchase orders are signed to approve the purchase.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forwardThe following is a list of six control plans (A-F). Please match the control plans to each of the control goals and system deficiencies identified in five different companies in the table, below. Control plans: A. Digital signature B. Manually reconcile batch totals C. Preformatted screens D. One-for-one checking of the goods, picking tickets and sales order E. Independent shipping authorization F. Turn around document Control goals and system deficiencies: 1. Zagreb, Inc. receives sales order on its Web server. Several times each day these are downloaded to the order entry and sales system. During the download process several line items are lost. 2. When goods arrive at Toronto Company's warehouse, the shipping clerk keys in the sales order number to retrieve the sales order. Often, the clerk keys the sales order number incorrectly and the wrong sales order is displayed. 3. Central Incorporated's customer send orders over the internet. Central is concerned that some of the orders are…arrow_forward
- For each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.a. Retrieve a record from the file based upon its primary key value.b. Update a record in the file.c. Read a complete file of records.d. Find the next record in a file.e. Insert a record into a file.f. Delete a record from a file.g. Scan a file for records with secondary keys.arrow_forwardhas hired you to review its sales order procedures for internal control compliance and to make recommendations for changes. You are required to:a. Create a data flow diagram of the current system. b. Create a system flowchart of the existing system. c. Analyze the internal control weaknesses in the system. ; andd. Prepare a system flowchart of a redesigned computer-based systemarrow_forwardWhich of the following is a control that can be used to ensure that all of the components of an invoice number are input by a data entry person? dependency check O procedures for rejected inputs preformatted screens O turnaround documentsarrow_forward
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,