Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 4SP
Summary Introduction
To explain: An enterprise system might be preferable to a nonintegrated system while detecting a fraud.
Introduction:
Enterprise system:
These are software packages which are large scale in nature mostly utilized to run and support complex organization activities which include, reporting, data flow, and other activities.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain the difference between computer fraud and general fraud. Explain both categories of fraud in relation to accounting information system.
1. What does it mean to say that internal control has limitations and what are these limitations?
2. Provide an appropriate response based on the following scenarios.
Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented?
Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?
3. What is petty cash and what purpose(s) does it serve?
4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash?
5. Prepare the necessary journal entries for each of the following:
(a) On March 1, issued a check to establish a petty cash fund of $1,410
(b)…
answer quickly
Chapter 2 Solutions
Accounting Information Systems
Ch. 2 - Prob. 1RQCh. 2 - Describe the key features/characteristics of an...Ch. 2 - Prob. 3RQCh. 2 - Describe the methods used to integrate ERP systems...Ch. 2 - Prob. 5RQCh. 2 - What is the relationship of the organizational...Ch. 2 - Prob. 7RQCh. 2 - Prob. 8RQCh. 2 - Prob. 9RQCh. 2 - Prob. 10RQ
Ch. 2 - Describe the six steps in the order-to-cash...Ch. 2 - Prob. 12RQCh. 2 - Prob. 13RQCh. 2 - How does an enterprise system support the...Ch. 2 - List the advantages and disadvantages of an...Ch. 2 - Prob. 1DQCh. 2 - The Tigris Company is considering taking customers...Ch. 2 - Periodically, you will read in the news about one...Ch. 2 - Describe how an enterprise system can assist an...Ch. 2 - Consider a business process that you have...Ch. 2 - Describe a situation in which information would be...Ch. 2 - Prob. 7DQCh. 2 - Prob. 8DQCh. 2 - Describe the primary and supporting activities...Ch. 2 - Prob. 1SPCh. 2 - Prob. 2SPCh. 2 - Prob. 3SPCh. 2 - Prob. 4SPCh. 2 - Conduct research on the Web sites of either CIO...Ch. 2 - Prob. 2PCh. 2 - Conduct research on an ERP package, such as...Ch. 2 - Prob. 4PCh. 2 - Prob. 5PCh. 2 - Prob. 6PCh. 2 - Choose (or you instructor may designate) an ERP...
Knowledge Booster
Similar questions
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardWhich of the following is false about accounting information systems? A. They provide reports that people analyze. B. They prevent errors and stop employees from stealing inventory. C. They are designed to gather data about the companys transactions. D. They consist of processes that involve input of data from source documents, processing, output, and storage.arrow_forwardHow do you understand the Fraud Triangle? Please provide explanation.arrow_forward
- Research a company that had a fraud event happen due to inadequate accounting procedures. Review the fraud event that happened in the company in detail and identify at least two accounting control procedures that were deficient in this event. Propose an internal control system that would have eliminated the fraud, using the ERP system.arrow_forwardAccounts payable fraud is an issue that may arise. Find an Accounts payable fraud story on the internet Discuss the following: What was the purpose of the fraud? What were the actions and consequences? Who benefitted from the fraud? How did the fraud get discovered? What controls should have been in place to prevent fraud?arrow_forwarda) Internal controls play an important role in reducing the risks of fraudulent activities in any organization. Further, advanced technology helps accountants in reducing fraud. Explain how an advanced technology transaction processing system reduces fraudulent activities from any organizing. b) Refer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment. Sales Department Accounting Department Warehouse Shipping Department Slock Release Packing Packing Customer Sales Order Release Packing Customer Order Reconcle Packing sip and Sales order, send Camier Record in Shipping AR Sub Ledge Pick Goods Update Inventory send goods Shipping Bi Customer Approves cred, prepare Update Accounts Inventory Sub ledger Sales documents Shipping Log AR Control Sales Order Stock Release Packing Sip Sales Stock…arrow_forward
- Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true? a. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data b. The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud c. The biggest cause of data breaches is organized by hacker groups. d. Losses from the theft of physical assets are much greater than those from the electronic theft of data e. In the absence of controls, it is not hard for a dishonest employee to steal data.arrow_forwardProvide incidents that E-commerce fail to secure personal information of their customers and subsequently used it for fraudulent acts.arrow_forwardDefine Fraud.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
- College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub