Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 4P
Summary Introduction
To match: The examples and descriptions.
Introduction:
It is an information structure which collects and manages data of an organization which can be utilized by analysts, managers, and other decision-making authorities of an organization.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The following is a list of six control plans.These are followed by a list of five system failures that have control implications. Match the five system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one or two sentences) explanation of your choice. A letter should be used only once, with one letter left over.
Control Plans
Program change controls
Independent validation of vendor invoices
Access control software
Batch control plans
Compare input data with master data (e.g., vendor master data)
Match invoice, PO, and receipt
System Failures
Vendor Invoices are received at Samuel Company via an EDI feed over the Internet. Some of these are fraudulent invoices from bogus vendors.
Vendor invoices are sent to clerks in the AP department at Seneca, Inc., where they are entered once each day to create a file of invoice data that is then processed by the accounts payable program each evening. Several errors have been found in the…
For each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.
For each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.a. Retrieve a record from the file based upon its primary key value.b. Update a record in the file.c. Read a complete file of records.d. Find the next record in a file.e. Insert a record into a file.f. Delete a record from a file.g. Scan a file for records with secondary keys.
Chapter 7 Solutions
Accounting Information Systems
Ch. 7 - Describe organizational governance.Ch. 7 - Prob. 2RQCh. 7 - Describe the eight elements of ERM.Ch. 7 - Describe and compare risks and opportunities.Ch. 7 - Prob. 5RQCh. 7 - Prob. 6RQCh. 7 - Prob. 7RQCh. 7 - What is COSO?Ch. 7 - Prob. 9RQCh. 7 - Prob. 10RQ
Ch. 7 - Prob. 11RQCh. 7 - Prob. 12RQCh. 7 - Prob. 13RQCh. 7 - Prob. 14RQCh. 7 - Prob. 15RQCh. 7 - Prob. 16RQCh. 7 - Prob. 17RQCh. 7 - Prob. 18RQCh. 7 - Prob. 19RQCh. 7 - Prob. 1DQCh. 7 - Prob. 2DQCh. 7 - Prob. 3DQCh. 7 - Provide five examples of potential conflict...Ch. 7 - Prob. 5DQCh. 7 - Prob. 6DQCh. 7 - Prob. 7DQCh. 7 - Prob. 8DQCh. 7 - Prob. 9DQCh. 7 - Prob. 1SPCh. 7 - Match the concept in List 1 with the definition or...Ch. 7 - Match the concept in List 1 with the definition or...Ch. 7 - Prob. 4SPCh. 7 - Prob. 1PCh. 7 - Prob. 2PCh. 7 - Prob. 3PCh. 7 - Prob. 4PCh. 7 - Prob. 6P
Knowledge Booster
Similar questions
- Which of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardMatch the two lists, below, by placing the capital letter from List 1 in each of the cells preceding the five descriptions in List 2 to which they best relate. One description in List 2 can be answered with 2 matches from List 1. Therefore, you should have 2 letters left over from List 1. List 1: Concepts A. Application (i.e., automated) control. B. Corrective control. C. Control environment. D. Input validity. E. Input completeness. F. Input accuracy G. Update completeness. H. Efficient use of resources. List 1: Capital letter List 2: Definitions/Descriptions 1. Insurance policy reimburses a company for losses due to a fire in a warehouse. 2. Shipping notices have a serial number that is tracked to ensure that they are all input. 3. Computer reviews each input to ensure that all the required data are included. 4. Inventory movements are tracked with a scanner to reduce manual counting. 5. Purchase orders are signed to approve the purchase.arrow_forwardIdentify each item 1 through 10 with the system component A through E that it is best associated with. A. Source documents B. Input devices C. Information processors D. Information storage E. Output devices 1. Computer keyboard 2. Printer 3. Monitor 4. Bank statement 5. Ledger software 6. Cloud storage 7. Journal software 8. Invoice from supplier 9. Computer scanner 10. Filing cabinetarrow_forward
- Match each word or phrase with the best description of it. Descriptions Words / Phrases related tocomputerized accounting systems a. Allows multiple users to access the system at the same time. Audit trailInternal controlNetwork-compatibleEnterprise resource planning systemsEntry-level software b. Enables the tracking of all transactions. Audit trailEnterprise resource planning systemsEntry-level softwareNetwork-compatibleInternal control c. Identifies suspicious transactions or likely mistakes such as wrong account numbers or duplicate transactions. Audit trailInternal controlEntry-level softwareEnterprise resource planning systemsNetwork-compatible d. Large-scale computer systems that integrate all aspects of the organization including accounting, sales, human resource…arrow_forwardMatch the term to its definition by choosing the appropriate number in the answer field. You will not use all of the terms provided. Question 8 options: A partial set of all available data items in a database that are used by a specific application, query, or report. Fields that link tables with other tables. The ability of employees at higher levels of responsibility and authority to bypass internal controls. A field which is unique to each record in a database table. The total number of transactions in a batch, used as a control total. Procedures that are put in place to remedy errors or irregularities after they have been discovered. Controls designed to enhance the control environment and strengthen the effectiveness of application controls. 1. Corrective controls 2. Preventive controls 3. General controls 4. Application controls 5. Record counts 6.…arrow_forwardThe following is a list of six control plans (A-F). Please match the control plans to each of the control goals and system deficiencies identified in five different companies in the table, below. Control plans: A. Digital signature B. Manually reconcile batch totals C. Preformatted screens D. One-for-one checking of the goods, picking tickets and sales order E. Independent shipping authorization F. Turn around document Control goals and system deficiencies: 1. Zagreb, Inc. receives sales order on its Web server. Several times each day these are downloaded to the order entry and sales system. During the download process several line items are lost. 2. When goods arrive at Toronto Company's warehouse, the shipping clerk keys in the sales order number to retrieve the sales order. Often, the clerk keys the sales order number incorrectly and the wrong sales order is displayed. 3. Central Incorporated's customer send orders over the internet. Central is concerned that some of the orders are…arrow_forward
- Categorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forwardWhich of the following is a control that can be used to ensure that all of the components of an invoice number are input by a data entry person? dependency check O procedures for rejected inputs preformatted screens O turnaround documentsarrow_forwardRefer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment.arrow_forward
- c. Analyze the phrysical internal control weaknewesin the systemd. (Optional) Prepare a system Mowchart of a rode-signed computer- based system that resolves thecontrol acakneses that you identified._ Explainyour solution.arrow_forwardThe major objectives of control are guard against frauds in data entry/processing check clerical handling of data before it enters a computer to provide a method to trace the steps and find where error has occurred automatically correct errors in data entry/processing Question 17Answer a. i and iii b. i,ii, iii, iv c. i, ii and iv d. i, ii, and iii e. i onlyarrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (e)A company’s programming staff wrote custom code for the shopping cart feature on its website. The code contained a vulnerability that could be exploited when the customer typed in the ship-to address.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub