ACCOUTING PRIN SET LL INCLUSIVE
14th Edition
ISBN: 9781119815327
Author: Weygandt
Publisher: WILEY
expand_more
expand_more
format_list_bulleted
Question
error_outline
This textbook solution is under construction.
Students have asked these similar questions
Andrea Pafko, a fellow student, contends that the doubleentrysystem means that each transaction must berecorded twice. Is Andrea correct? Explain.
Can you explain how the internal control of Documentation Procedure is violated in this question?
after payment, bills are filed in a "paid invoice" folder.
which is true about vendor files?
A. They must be cleaned on a daily basis
B. They can be in electronic or paper form
C. They do not need maintenance
D. Duplicate records do not need to be removed
Knowledge Booster
Similar questions
- FireballCompany requires that all documents supporting a check (purchase order, invoice, and receiving report) be canceled by punching a hole through the packet. Why is this practice required?What might happen if it were not?arrow_forwardWhich of the following is true of the correcting entry method? a.It cannot be used to correct a manual entry. b.It cannot be used to correct computerized entry. c.It can be used only to correct an error before posting has taken place. d.It can be used to correct both manual and computerized entries.arrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forward
- In one sentence, what does updating a master file record involve?arrow_forwardProvide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?arrow_forwardThe collection of accounts of Customer Alexander is recorded as a credit to the ledger of Customer Sean. What is the effect of the error in the total assets of the entity?arrow_forward
- In your own words, explain the meaning of authentication and authorization. Be sure to distinguish between these two items. Give a specific example of how a compan achieves thiese. That is, one example for authentication and one other example for authorization.arrow_forwardWhich of the following control procedures mitigates the threat of duplicate payments? Select one: a. When an invoice is paid, the invoice and the entire voucher package should be canceled (for example marked “paid”) in a way that it cannot be submitted again. b. When evaluated receipt settlement (invoice-less system) is used, receiving reports need not be marked as paid as no invoices are generated. c. Photocopied invoices can be paid. d. Invoices should be approved for payment only when accompanied by a valid purchase order.arrow_forwardThis answer is incorrect, can someone double check?arrow_forward
- A sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted. A control procedure that would serve as a preventive control for this situation would be: Select one: O a. Hash total O b. Check digit O c. Validity test O d. Either B or Carrow_forwardListed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a preventive control.a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. (The user subsequently codes this information ontoa magnetic coding device and places this strip on a piece of cardboard.)b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled.c. Because of occasional noise on a transmission line, data being transferred is lost or garbled.d. An intruder is temporarily delaying important strategic messages over the telecommunications lines.e. An intruder is altering electronic messages before the user receives them.arrow_forwardThe need to physically check bills of lading and other documents can be eliminated by using RFID. Select one: a. True b. Falsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
- Business Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:CengageAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning