Accounting Information Systems
11th Edition
ISBN: 9780357156032
Author: Ulric J. Gelinas; Richard B. Dull; Patrick Wheeler
Publisher: Cengage Limited
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 3P
Summary Introduction
To match: The control goals with the situations.
Introduction:
It is an information structure which collects and manages data of an organization which can be utilized by analysts, managers, and other decision making authorities of an organization.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Match the two lists, below, by placing the capital letter from List 1 in each of the cells
preceding the five descriptions in List 2 to which they best relate.
One description in List 2 can be answered with 2 matches from List 1. Therefore, you should
have 2 letters left over from List 1.
List 1: Concepts
A. Application (i.e., automated) control.
B. Corrective control.
C. Control environment.
D. Input validity.
E. Input completeness.
F. Input accuracy
G. Update completeness.
H. Efficient use of resources.
List 1: Capital letter
List 2: Definitions/Descriptions
1. Insurance policy reimburses a company for losses due to
a fire in a warehouse.
2. Shipping notices have a serial number that is tracked to
ensure that they are all input.
3.
Computer reviews each input to ensure that all the
required data are included.
4. Inventory movements are tracked with a scanner to
reduce manual counting.
5. Purchase orders are signed to approve the purchase.
The following is a list of six control plans.These are followed by a list of five system failures that have control implications. Match the five system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one or two sentences) explanation of your choice. A letter should be used only once, with one letter left over.
Control Plans
Program change controls
Independent validation of vendor invoices
Access control software
Batch control plans
Compare input data with master data (e.g., vendor master data)
Match invoice, PO, and receipt
System Failures
Vendor Invoices are received at Samuel Company via an EDI feed over the Internet. Some of these are fraudulent invoices from bogus vendors.
Vendor invoices are sent to clerks in the AP department at Seneca, Inc., where they are entered once each day to create a file of invoice data that is then processed by the accounts payable program each evening. Several errors have been found in the…
Which of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls
Required: choose the correct answer and Justify your answers in at least 6 sentences.
Chapter 7 Solutions
Accounting Information Systems
Ch. 7 - Describe organizational governance.Ch. 7 - Prob. 2RQCh. 7 - Describe the eight elements of ERM.Ch. 7 - Describe and compare risks and opportunities.Ch. 7 - Prob. 5RQCh. 7 - Prob. 6RQCh. 7 - Prob. 7RQCh. 7 - What is COSO?Ch. 7 - Prob. 9RQCh. 7 - Prob. 10RQ
Ch. 7 - Prob. 11RQCh. 7 - Prob. 12RQCh. 7 - Prob. 13RQCh. 7 - Prob. 14RQCh. 7 - Prob. 15RQCh. 7 - Prob. 16RQCh. 7 - Prob. 17RQCh. 7 - Prob. 18RQCh. 7 - Prob. 19RQCh. 7 - Prob. 1DQCh. 7 - Prob. 2DQCh. 7 - Prob. 3DQCh. 7 - Provide five examples of potential conflict...Ch. 7 - Prob. 5DQCh. 7 - Prob. 6DQCh. 7 - Prob. 7DQCh. 7 - Prob. 8DQCh. 7 - Prob. 9DQCh. 7 - Prob. 1SPCh. 7 - Match the concept in List 1 with the definition or...Ch. 7 - Match the concept in List 1 with the definition or...Ch. 7 - Prob. 4SPCh. 7 - Prob. 1PCh. 7 - Prob. 2PCh. 7 - Prob. 3PCh. 7 - Prob. 4PCh. 7 - Prob. 6P
Knowledge Booster
Similar questions
- Match six of the terms (a-j) with the definitions provided below (1-6).a. Application controlsb. Error listingc. General controlsd. Hardware controlse. Input controlsf. Output controlsg. Parallel simulationh. Parallel testingi. Pilot testingj. Processing controls________ 1. The new and old systems operate simultaneously in all locations.________ 2. Controls that relate to all aspects of the IT system.________ 3. Controls such as review of data for reasonableness, designed to assure that data generated by thecomputer is valid, accurate, complete, and distributed only to authorized people.________ 4. Controls that apply to processing of transactions.________ 5. A new system is implemented in one part of the organization while other locations continue to rely onthe old system.________ 6. Controls such as proper authorization of documents, check digits, and adequate documentation,designed to assure that the information to be entered into the computer is authorized, complete, and accurate.arrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardWhich of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forward
- For each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.a. Retrieve a record from the file based upon its primary key value.b. Update a record in the file.c. Read a complete file of records.d. Find the next record in a file.e. Insert a record into a file.f. Delete a record from a file.g. Scan a file for records with secondary keys.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forwardThree phases of the management process are controlling, planning, and decision making. Match the following descriptions to the proper phase:Phase of management process DescriptionControlling a. Monitoring the operating results of implemented plans and comparing the actual results with expected results.Planning b. Inherent in planning, directing, controlling, and improving.Decision making c. Long-range courses of action.arrow_forward
- In the ________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs. Group of answer choices analysis improve measure control definearrow_forward3. Risk registers would normally detail which of the following: (Select all that apply.) A. Risk level before controls are implemented B. Risk lével after controls are implemented C. Responsibility for managing risks D. The total cost of a control being implemented Answer: Page 3 of 11 ted States) E Focus МacВook Proarrow_forwardData flow diagrams employ four different symbols. What are these symbols, and what does each symbol represent?arrow_forward
- Write the six of the key input variables. of sensitivity analysis?arrow_forwardRequired information [The following information applies to the questions displayed below.] Consider the following narrative describing the process of filling a customer's order at a Starbucks branch: Identify the start and end events and the activities in the following narrative, and then draw the business process model using BPMN: the Starbucks customer entered the drive-through lane and stopped to review the menu. He then ordered a Venti coffee of the day and a blueberry muffin from the barista. The barista recorded the order in the cash register. While the customer drove to the window, the barista filled a Venti cup with coffee, put a lid on it, and retrieved the muffin from the pastry case and placed it in a bag. The barista handed the bag with the muffin and the hot coffee to the customer. The customer has an option to pay with cash, credit card, or Starbucks gift card. The customer paid with a gift card. The barista recorded the payment and returned the card along with the…arrow_forward12.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Cornerstones of Cost Management (Cornerstones Ser...AccountingISBN:9781305970663Author:Don R. Hansen, Maryanne M. MowenPublisher:Cengage Learning
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Cornerstones of Cost Management (Cornerstones Ser...
Accounting
ISBN:9781305970663
Author:Don R. Hansen, Maryanne M. Mowen
Publisher:Cengage Learning