Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 11DQ
a)
Summary Introduction
To suggest: Monitoring activity for credit approval.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
b)
Summary Introduction
To suggest: Monitoring activity for removal of terminated employee access to computer systems.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
c)
Summary Introduction
To suggest: Monitoring activity for new background check.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Internal controls do each of the following except:
A. Evaluate performance of employees
B. Guarantee the accuracy if account records
C. Protect assets
D. Increase the likelihood that any errors will be caught
Select the appropriate control activities for each of the following definitions.
Definitions
Control Activities
a. The company should maintain security over assets and accounting records.
Management should periodically determine whether the amounts of physical
b.
assets of the company match the accounting records.
The company should provide employees with appropriate guidance to ensure
C.
they have the knowledge necessary to carry out their job duties.
The actual performance of individuals or processes should be checked against
d.
their expected performance.
Authorizing transactions, recording transactions, and maintaining control of the
е.
related assets should be separated among employees.
To prevent improper use of the company's resources, only certain employees
are allowed to carry out certain business activities.
Which of the following elements of internal control includes maintaining records of employees documenting their compensation and promotion?
Control procedures
Monitoring
Control environment
Risk assessment
Chapter 8 Solutions
Accounting Information Systems
Ch. 8 - What are the four major categories of pervasive...Ch. 8 - What are the differences among a pervasive control...Ch. 8 - Prob. 3RQCh. 8 - Describe some compensating controls that can be...Ch. 8 - What are policy controls plans? How do policies...Ch. 8 - Why should an organization conduct monitoring...Ch. 8 - Prob. 8RQCh. 8 - Prob. 10RQCh. 8 - What are the major elements of the strategic IT...Ch. 8 - Prob. 12RQ
Ch. 8 - Prob. 13RQCh. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Prob. 23RQCh. 8 - Prob. 24RQCh. 8 - Prob. 25RQCh. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - Prob. 29RQCh. 8 - Prob. 30RQCh. 8 - Prob. 31RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - No matter how sophisticated a system of internal...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Prob. 9DQCh. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - The following is a list of six control plans from...Ch. 8 - Prob. 2SPCh. 8 - Prob. 3SPCh. 8 - Prob. 2PCh. 8 - The following is a list of 13 control plans from...Ch. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 6PCh. 8 - Examine the last column in Table 8.2 (p. 280) for...
Knowledge Booster
Similar questions
- Which of the following is NOT a general control?* a. Backup of live data b. Use of passwords c. Setting an acceptable range for working hours d. Calamity-proof IT facilities ABOUT AUDITING/ACCOUNTING TOPICSarrow_forwardOperating system security involves policies, procedures, and controls that determine who can access the operating system. User access privileges are assigned to individuals and to entire workgroups authorized to use the system.The way access privileges are assigned influences system security. Priviliges should be carefully administered and closely monitored for compliance with organizational policy. Choose one of the options below, that is not a test of control of the audit objective relating to access privileges. a. Review employee records to determine whether users have formally acknowledged their responsibility to maintain the confidentiality of company data.b. Review the privileges of a selection of user groups and individuals to determine if their access rights are appropriate for their job descriptions and positions.c. The auditor should verify that individuals are granted access to data and programs based on their need to know.d. Review the account lockout policy and procedures…arrow_forwardMatch each of the following control activities with its definition. Control Activities Definitions 1. Separation of duties 2. Physical controls 3. Proper authorization 4. Employee management 5. Reconciliations 6. Performance reviews a. The company should maintain security over assets and accounting records.b. Management should periodically determine whether the amounts of physical assets of the company match the accounting records.c. The company should provide employees with appropriate guidance to ensure they have the knowledge necessary to carry out their job duties.d. The actual performance of individuals or processes should be checked against their expected performance.e. Authorizing transactions, recording transactions, and maintaining control of the related assets should be separated among employees.f. To prevent improper use of the company’s resources, only certain employees are allowed to carry out certain business activities.arrow_forward
- Identify risks for potential fraud, stealing, or information exposure by reviewing the general ledger/journal numbers. Consider the following in your response: Determine whether established security procedures are being followed. Examine roles and access to data. Determine if approval paths meet the level of security for the task. Receiving Procedures Goods are delivered directly to the requesting office. The requestor receives the goods and packing slip. After the goods or services have been received the packing slip should be signed indicating receipt of goods and scanned and emailed to accounts payable. Approval Paths: Transactions Involving Purchase Orders Accounts payable receives the appropriate documentation from the pertinent department indicating goods and services have been received. A three-way match of the purchase order, invoice, and receiving document is performed and approved by accounts payable. Once approved by accounts payable, a payment voucher is created in…arrow_forwardWhen planning the audit of internal controls for an issuer, the audit team shoulda. Identify significant accounts, locations, and assertions.b. Conduct a walkthrough of the internal control process.c. Make inquiries of employees regarding the existence of control activities.d. Reperform control activities performed by client employees to determine theireffectiveness.arrow_forwardWhich of the following controls would most effectively minimize the need to correct failures to collect required information in the account opening process? A quality review staff that checks paper applications to ensure all fields are complete An automated account opening platform that required data entry prior to allowing the accoun to be opened Requiring that a manager review and apprive all new account applications Documenting a procedure that sets forth the steps required to open an accountarrow_forward
- What is the purpose of the following control procedures (i.e., what threats is it designed to mitigate)? g. Use of a fingerprint scanner in order for employees to record the time they started and the time they quit working each day.arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.arrow_forwardA company implements internal controls to improve the chances that employee will function according to the plans and standard operating procedures developed by the management team. Select one: True Falsearrow_forward
- Which of the following is an example of an input control? a.making sure report that are distributed to the proper people b.monitoring the work of data entry clerks. c. Collecting accurate statistics of historical transactions while gathering data. d. Performing a check-digit test on a customer acount number e.Having anothr person review the design of a business formarrow_forwardThe IT Audit Director is responsible for monitoring and approving network-related changes to the company's production network. This is an appropriately designed preventive control. a) True b) Falsearrow_forwardWhich of the following IT controls would a company appropriately use to mitigate the risk of unauthorized access to its payroll data? a. Validity checks b. Biometric devices c. A neural network d. Employee purchase cardsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L