Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 4P
a.
To determine
Explain the uncontrolled risks associated with the systems as currently configured.
b.
To determine
Explain the controls that need to be implemented into the system to mitigate the risk in provided scenario.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Refer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.
a. Identify the physical control weakness depicted in the flowchart for Problem 2
b. Describe the IT controls that should be in place in this system
INTERNAL CONTROL
Examine the flowchart below and determine any control threats. Specifically discuss the control problems, the possible dangers, and any corrective procedures you would recommend.
Chapter 5 Solutions
Accounting Information Systems
Ch. 5 - Prob. 1RQCh. 5 - What purpose does a purchasing department serve?Ch. 5 - Prob. 3RQCh. 5 - Prob. 4RQCh. 5 - Prob. 5RQCh. 5 - Prob. 6RQCh. 5 - Prob. 7RQCh. 5 - Prob. 8RQCh. 5 - Prob. 9RQCh. 5 - Some organizations do not use an AP subsidiary...
Ch. 5 - What is the purpose of the blind copy of a PO?Ch. 5 - Prob. 12RQCh. 5 - Prob. 1DQCh. 5 - Prob. 2DQCh. 5 - Prob. 3DQCh. 5 - The level of day-to-day department activity in...Ch. 5 - Prob. 5DQCh. 5 - What is central to a successful EDI...Ch. 5 - Discuss the objective of eliminating the receiving...Ch. 5 - What purpose does multilevel security control play...Ch. 5 - Prob. 9DQCh. 5 - Prob. 10DQCh. 5 - Which of the following statements is correct? a....Ch. 5 - Which of the following represents incompatible...Ch. 5 - Prob. 3MCQCh. 5 - Prob. 4MCQCh. 5 - Prob. 5MCQCh. 5 - Prob. 6MCQCh. 5 - Prob. 7MCQCh. 5 - Which of the following tasks should the cash...Ch. 5 - Which ledger can be updated solely from the...Ch. 5 - Prob. 10MCQCh. 5 - Prob. 1PCh. 5 - INVENTORY ORDERING ALTERNATIVES The flowchart for...Ch. 5 - Prob. 3PCh. 5 - Prob. 4PCh. 5 - Prob. 5PCh. 5 - Prob. 6PCh. 5 - Prob. 7PCh. 5 - Prob. 8PCh. 5 - Prob. 9PCh. 5 - Prob. 10PCh. 5 - Prob. 11PCh. 5 - UNRECORDED LIABILITIES You are auditing the...Ch. 5 - SMITHS MARKET (SMALL BUSINESS ACCOUNTING SYSTEM)...Ch. 5 - POSAVEK REMODELING AND BUILDING SUPPLY COMPANY...Ch. 5 - GREEN POND NURSERY (STANDALONE PC-BASED ACCOUNTING...Ch. 5 - Prob. 4ICCCh. 5 - Prob. 5ICCCh. 5 - Prob. 6ICCCh. 5 - Prob. 7ICCCh. 5 - Prob. 8ICC
Knowledge Booster
Similar questions
- User test and acceptance is part of which phase of the SDLC? a. General systems design b. Program specification and implementation planning c. Detailed systems design d. Implementationarrow_forwardc. Analyze the phrysical internal control weaknewesin the systemd. (Optional) Prepare a system Mowchart of a rode-signed computer- based system that resolves thecontrol acakneses that you identified._ Explainyour solution.arrow_forwardUsing the flowchart provided below, identify control problems, related risks of the problem and corrective actions to mitigate the risk. Format: Problem Risk Controlarrow_forward
- This method of documenting understanding of internal control structure is advantageous because it serves as a checklist thereby preventing the likelihood of missing a significant area of the controls: *A. Internal control questionnaire methodB. Narrative memorandum methodC. Flowchart methodD. Decision tablesE. All of themarrow_forwardINTERNAL CONTROLS AND FLOWCHART ANALYSIS a. Identify the physical control weaknesses depicted in theflowchart for Problem 2.b. Describe the IT controls that should be in place in this system.arrow_forwardCategorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forward
- Identify the main areas of risk which may arise in relation to computer systemsarrow_forward“If we document a system with a systems flowchart and data flowdiagrams, we have overdocumented the system.” Discuss fully.arrow_forwardHow testing transaction as appropriate in internal control system?arrow_forward
- Required: a. Create a document flowchart of the existing system. b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78. 1.Transaction Authorization 2.Segregation of Duties 3.Supervision 4.Accounting Records 5.Access Control 6.Independent Verificationarrow_forwardThe are several techniques for recording the assessment of control risk. One or more of the following may be used depending on the complexity of the system. Briefly explain the ... Narrative notes Questionnaires flowcharts checklistsarrow_forwardWhich of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LCornerstones of Financial AccountingAccountingISBN:9781337690881Author:Jay Rich, Jeff JonesPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Cornerstones of Financial Accounting
Accounting
ISBN:9781337690881
Author:Jay Rich, Jeff Jones
Publisher:Cengage Learning