Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 6, Problem 10DQ
To determine
Explain the internal control that would prevent an employee from removing a computer and then reporting it as scrapped.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
What control procedures can be used to achieve control over computer operations in an end-user
computing environment? What control procedures can be used to achieve control over computerized
processing in an end-user computing environment?
Controls used in the management of a computer center to minimize the possibility of using an incorrect file or program area. Control totals.b. Record counts.c. Limit checks.d. External labels.
Which of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.
Chapter 6 Solutions
Accounting Information Systems
Ch. 6 - Which document is used by the cost accounting...Ch. 6 - Prob. 2RQCh. 6 - Prob. 3RQCh. 6 - Why should employee paychecks be drawn against a...Ch. 6 - Prob. 5RQCh. 6 - Prob. 6RQCh. 6 - Prob. 7RQCh. 6 - Prob. 8RQCh. 6 - Prob. 9RQCh. 6 - Prob. 10RQ
Ch. 6 - What are the objectives of a fixed asset system?Ch. 6 - How do fixed asset systems differ from purchases...Ch. 6 - What are three tasks of the fixed asset system?Ch. 6 - What information is found on the depreciation...Ch. 6 - Why is it crucial to the integrity of the...Ch. 6 - Prob. 16RQCh. 6 - Prob. 17RQCh. 6 - What document shows when fixed assets are fully...Ch. 6 - Who should authorize disposal of fixed assets?Ch. 6 - Assets used for production are secured in a...Ch. 6 - What is the importance of the job ticket?...Ch. 6 - Prob. 2DQCh. 6 - Prob. 3DQCh. 6 - Prob. 4DQCh. 6 - Discuss some specific examples in which...Ch. 6 - Discuss some service industries that may require...Ch. 6 - Prob. 7DQCh. 6 - If an asset that is not fully depreciated is sold...Ch. 6 - Discuss the fundamental risk and control issues...Ch. 6 - Prob. 10DQCh. 6 - Prob. 11DQCh. 6 - Describe an internal control that would prevent...Ch. 6 - Prob. 13DQCh. 6 - What negative consequences result when fixed asset...Ch. 6 - Prob. 1MCQCh. 6 - Prob. 2MCQCh. 6 - Prob. 3MCQCh. 6 - Prob. 4MCQCh. 6 - Which one of the following documents captures the...Ch. 6 - Which of the following are not fixed asset system...Ch. 6 - All of the following controls are likely to apply...Ch. 6 - All of the following data items are likely to be...Ch. 6 - The following are all transactions processed in...Ch. 6 - Prob. 10MCQCh. 6 - PAYROLL FRAUD John Smith worked in the stockyard...Ch. 6 - Prob. 2PCh. 6 - Prob. 3PCh. 6 - Prob. 4PCh. 6 - Prob. 5PCh. 6 - Prob. 6PCh. 6 - Prob. 7PCh. 6 - Prob. 8PCh. 6 - FIXED ASSET SYSTEM-FRAUD POTENTIAL Holder Co....Ch. 6 - Prob. 10PCh. 6 - Prob. 11PCh. 6 - Prob. 12PCh. 6 - Prob. 1ICCCh. 6 - Prob. 2ICCCh. 6 - Prob. 3ICCCh. 6 - Prob. 4ICCCh. 6 - Prob. 5ICCCh. 6 - Prob. 6ICC
Knowledge Booster
Similar questions
- What is the control issue related to reentering corrected error records into a batch processing system? What are the two methods for doing this?arrow_forwardWhich of the following is NOT a general control?* a. Backup of live data b. Use of passwords c. Setting an acceptable range for working hours d. Calamity-proof IT facilities ABOUT AUDITING/ACCOUNTING TOPICSarrow_forwardConsider the following list of internal controls. For each control classify it either as a preventive control or a detective control. Also classify each control as either a manual control, an IT dependent manual control, at IT application control, or a IT general control. a. b. C. d. e. Software will not allow a sale to be processed to a customer that has exceeded its credit limit. Personnel responsible for running computer programs are prevented from accessing and changing computer software. Computer software generates a daily report of all shipping documents (bills of lading) that have not resulted in a sales invoice. An accounting clerk follows-up on a computer-generated report of all shipping documents (bills of lading) that have not resulted in a sales invoice, to determine if an invoice should be generated. An accounting employee performs a monthly bank reconciliation.arrow_forward
- Your organisation is disturbed that some staff members are clocking on for others who do not report for work. Recommend controls that will minimize this menace?arrow_forwardManagement and auditor are concerned about segregation of duties in computer based systems? Why? How to mitigate this concern?arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.arrow_forward
- When is more frequent monitoring of internal controls not required?* When employees are poorly trained. When the control activity and risk being managed are important. When a department is making changes to an application being used in that department. When internal controls have recently been changed to reduce the frequency of errors.arrow_forwardExplain the normal process an auditor would expect to find in the client's systems. governing changes to computer programs. Why is an auditor concerned about program changes?arrow_forwardOperating system security involves policies, procedures, and controls that determine who can access the operating system. User access privileges are assigned to individuals and to entire workgroups authorized to use the system.The way access privileges are assigned influences system security. Priviliges should be carefully administered and closely monitored for compliance with organizational policy. Choose one of the options below, that is not a test of control of the audit objective relating to access privileges. a. Review employee records to determine whether users have formally acknowledged their responsibility to maintain the confidentiality of company data.b. Review the privileges of a selection of user groups and individuals to determine if their access rights are appropriate for their job descriptions and positions.c. The auditor should verify that individuals are granted access to data and programs based on their need to know.d. Review the account lockout policy and procedures…arrow_forward
- Which of the following is NOT an example of application control?* a. Pre-filled forms are already sent to users to minimize input errors b. After processing, the daily sales summary are reconciled with the individual sales invoices processed c. Reasonableness tests on acceptable working hours are embedded in the payroll software d. An equipment failure causes an error message on the monitorarrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.arrow_forwardThe IT Audit Director is responsible for monitoring and approving network-related changes to the company's production network. This is an appropriately designed preventive control. a) True b) Falsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning