Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 3P
Summary Introduction
To match: The control goals with the situations.
Introduction:
It is an information structure which collects and manages data of an organization which can be utilized by analysts, managers, and other decision making authorities of an organization.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over.
Control Plans
Review shipped not billed sales orders
Turnaround documents
Deposit slip file
Procedures for rejected inputs
Computer agreement of batch totals
Document design
Control Goals or System Deficiencies
The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks.
In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices.
Helps to ensure that…
Match the two lists, below, by placing the capital letter from List 1 in each of the cells
preceding the five descriptions in List 2 to which they best relate.
One description in List 2 can be answered with 2 matches from List 1. Therefore, you should
have 2 letters left over from List 1.
List 1: Concepts
A. Application (i.e., automated) control.
B. Corrective control.
C. Control environment.
D. Input validity.
E. Input completeness.
F. Input accuracy
G. Update completeness.
H. Efficient use of resources.
List 1: Capital letter
List 2: Definitions/Descriptions
1. Insurance policy reimburses a company for losses due to
a fire in a warehouse.
2. Shipping notices have a serial number that is tracked to
ensure that they are all input.
3.
Computer reviews each input to ensure that all the
required data are included.
4. Inventory movements are tracked with a scanner to
reduce manual counting.
5. Purchase orders are signed to approve the purchase.
The following is a list of six control plans.These are followed by a list of five system failures that have control implications. Match the five system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one or two sentences) explanation of your choice. A letter should be used only once, with one letter left over.
Control Plans
Program change controls
Independent validation of vendor invoices
Access control software
Batch control plans
Compare input data with master data (e.g., vendor master data)
Match invoice, PO, and receipt
System Failures
Vendor Invoices are received at Samuel Company via an EDI feed over the Internet. Some of these are fraudulent invoices from bogus vendors.
Vendor invoices are sent to clerks in the AP department at Seneca, Inc., where they are entered once each day to create a file of invoice data that is then processed by the accounts payable program each evening. Several errors have been found in the…
Chapter 7 Solutions
Accounting Information Systems
Ch. 7 - Describe organizational governance.Ch. 7 - Prob. 2RQCh. 7 - Describe the eight elements of ERM.Ch. 7 - Describe and compare risks and opportunities.Ch. 7 - Prob. 5RQCh. 7 - Prob. 6RQCh. 7 - Prob. 7RQCh. 7 - What is COSO?Ch. 7 - Prob. 9RQCh. 7 - Prob. 10RQ
Ch. 7 - Prob. 11RQCh. 7 - Prob. 12RQCh. 7 - Prob. 13RQCh. 7 - Prob. 14RQCh. 7 - Prob. 15RQCh. 7 - Prob. 16RQCh. 7 - Prob. 17RQCh. 7 - Prob. 18RQCh. 7 - Prob. 19RQCh. 7 - Prob. 1DQCh. 7 - Prob. 2DQCh. 7 - Prob. 3DQCh. 7 - Provide five examples of potential conflict...Ch. 7 - Prob. 5DQCh. 7 - Prob. 6DQCh. 7 - Prob. 7DQCh. 7 - Prob. 8DQCh. 7 - Prob. 9DQCh. 7 - Prob. 1SPCh. 7 - Match the concept in List 1 with the definition or...Ch. 7 - Match the concept in List 1 with the definition or...Ch. 7 - Prob. 4SPCh. 7 - Prob. 1PCh. 7 - Prob. 2PCh. 7 - Prob. 3PCh. 7 - Prob. 4PCh. 7 - Prob. 6P
Knowledge Booster
Similar questions
- Which of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardMatch six of the terms (a-j) with the definitions provided below (1-6).a. Application controlsb. Error listingc. General controlsd. Hardware controlse. Input controlsf. Output controlsg. Parallel simulationh. Parallel testingi. Pilot testingj. Processing controls________ 1. The new and old systems operate simultaneously in all locations.________ 2. Controls that relate to all aspects of the IT system.________ 3. Controls such as review of data for reasonableness, designed to assure that data generated by thecomputer is valid, accurate, complete, and distributed only to authorized people.________ 4. Controls that apply to processing of transactions.________ 5. A new system is implemented in one part of the organization while other locations continue to rely onthe old system.________ 6. Controls such as proper authorization of documents, check digits, and adequate documentation,designed to assure that the information to be entered into the computer is authorized, complete, and accurate.arrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forward
- Which of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.a. Retrieve a record from the file based upon its primary key value.b. Update a record in the file.c. Read a complete file of records.d. Find the next record in a file.e. Insert a record into a file.f. Delete a record from a file.g. Scan a file for records with secondary keys.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forward
- Three phases of the management process are controlling, planning, and decision making. Match the following descriptions to the proper phase:Phase of management process DescriptionControlling a. Monitoring the operating results of implemented plans and comparing the actual results with expected results.Planning b. Inherent in planning, directing, controlling, and improving.Decision making c. Long-range courses of action.arrow_forwardIn the ________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs. Group of answer choices analysis improve measure control definearrow_forward3. Risk registers would normally detail which of the following: (Select all that apply.) A. Risk level before controls are implemented B. Risk lével after controls are implemented C. Responsibility for managing risks D. The total cost of a control being implemented Answer: Page 3 of 11 ted States) E Focus МacВook Proarrow_forward
- Accounting Information Systems | 11th Edition Chapter 7, Problem 3P Following is a list of eight generic control goals from the chapter, followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve control goals). List the numbers 1 through 8 on a solution sheet. Each number represents one of the described situations. Next to each number: Place the capital letter of the control goal that best matches the situation described. Provide a one- or two-sentence explanation of how the situation relates to the control goal you selected. If you select more than one control goal for a situation, provide an explanation for each that you select. Hint: Some letters may be used more than once. Conversely, some letters may not apply at all. Control Goals Ensure effectiveness of operations Ensure efficient employment of resources Ensure security of resources Ensure input validity…arrow_forwardThe following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forwardThe following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Cornerstones of Cost Management (Cornerstones Ser...AccountingISBN:9781305970663Author:Don R. Hansen, Maryanne M. MowenPublisher:Cengage Learning
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Cornerstones of Cost Management (Cornerstones Ser...
Accounting
ISBN:9781305970663
Author:Don R. Hansen, Maryanne M. Mowen
Publisher:Cengage Learning