Pkg Acc Infor Systems MS VISIO CD
10th Edition
ISBN: 9781133935940
Author: Ulric J. Gelinas
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 2SP
1)
Summary Introduction
To determine: The control plan for the given control situation.
Introduction:
2)
Summary Introduction
To determine: The control plan for the given control situation.
3)
Summary Introduction
To determine: The control plan for the given control situation.
4)
Summary Introduction
To determine: The control plan for the given control situation.
5)
Summary Introduction
To determine: The control plan for the given control situation.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Below are several statements about internal controls.1. The components of internal control are built on the foundation of the ethical tone set by top management.2. Once every three months, managers need to review operations to ensure that control procedures work effectively.3. Collusion refers to the act of a single individual circumventing internal control procedures.4. Detective control procedures are designed to detect errors or fraud that have already occurred, while preventive control procedures are designed to keep errors or fraud from occurring in the first place.5. Fraud committed by top-level employees is more difficult to detect because those employees more often have the ability to override internal control features.6. A good example of separation of duties would be having one person collect cash from customers and account for it, while having another person order inventory and maintain control over it.7. Employee tips historically have been the most common means of…
Identify whether the following is either preventative, detective or directive controls:
Following are five separate cases involving internal control issues.
Required:
1. For each case, identify the principle(s) of internal control that is violated.
a.
Marker Theater has a computerized order-taking system for its tickets. The system is backed up once
a year.
b.
Sutton Company has two employees handling acquisitions of inventory. One employee places
purchase orders and pays vendors. The second employee receives the merchandise.
C.
To ensure the company retreat would not be cut, the manager of Lavina Company decided to save
money by canceling the external audit of internal controls.
d.
Tywin company keeps very poor records of its equipment. Instead, the company asserts its employees
are honest and would never steal from the company.
The owner of Super Pharmacy uses a check software/printer to prepare checks, making it difficult for
e. anyone to alter the amount of a check. The check software/printer, which is not password protected, is
on the owner's desk in an office that…
Chapter 8 Solutions
Pkg Acc Infor Systems MS VISIO CD
Ch. 8 - What are the four major categories of pervasive...Ch. 8 - What are the differences among a pervasive control...Ch. 8 - Prob. 3RQCh. 8 - Describe some compensating controls that can be...Ch. 8 - What are policy controls plans? How do policies...Ch. 8 - Why should an organization conduct monitoring...Ch. 8 - Prob. 8RQCh. 8 - Prob. 14RQCh. 8 - What are the major elements of the strategic IT...Ch. 8 - Prob. 16RQ
Ch. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Prob. 23RQCh. 8 - Prob. 24RQCh. 8 - Prob. 25RQCh. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - Prob. 30RQCh. 8 - Prob. 31RQCh. 8 - Prob. 32RQCh. 8 - Prob. 33RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - No matter how sophisticated a system of internal...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Prob. 11DQCh. 8 - Prob. 12DQCh. 8 - Prob. 13DQCh. 8 - Prob. 1SPCh. 8 - Prob. 2SPCh. 8 - Prob. 3SPCh. 8 - Listed here are 20 control plans discussed in the...Ch. 8 - Prob. 3PCh. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 7P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, finance and related others by exploring similar questions and additional content below.Similar questions
- What is the purpose of the following control procedures (i.e., what threats is it designed to mitigate)? g. Use of a fingerprint scanner in order for employees to record the time they started and the time they quit working each day.arrow_forwardListed below are five procedures followed by Gilmore Company.Indicate whether each procedure is an example of good internal control or of weak internal control. If it is an example of good internal control, indicate which internal control principle is being followed. If it is an example of weak internal control, indicate which internal control principle is violated. Use the table below. Procedure IC Good or Weak? Related Internal Control Principle 1. Employees are required to take vacations. Select a weakness in internal control GoodWeak Select a control principle that is violated Human Resource ControlsIndependent Internal VerificationEstablishment of ResponsibilityPhysical ControlsSegregation of DutiesDocumentation Procedures 2. Any member of the sales department can approve credit sales. Select a weakness in internal control WeakGood Select a control principle that is violated Segregation of DutiesDocumentation ProceduresEstablishment…arrow_forwardListed below are five procedures followed by Gilmore Company.Indicate whether each procedure is an example of good internal control or of weak internal control. If it is an example of good internal control, indicate which internal control principle is being followed. If it is an example of weak internal control, indicate which internal control principle is violated. Use the table below. Procedure IC Good or Weak? Related Internal Control Principle 1. Employees are required to take vacations. Select a weakness in internal control GoodWeak Select a control principle that is violated Independent Internal VerificationSegregation of DutiesEstablishment of ResponsibilityPhysical ControlsHuman Resource ControlsDocumentation Procedures 2. Any member of the sales department can approve credit sales. Select a weakness in internal control…arrow_forward
- what is the potential consequences and give each of the question a prevention technique. 1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. 2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. 3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at…arrow_forwardConsider the following short case as you respond to the question:SPC Corporation sells computer security software. They maintain their AIS using general ledger software; data files are backed up twice a day. Sales staff can access the customer database, inventory files and general ledger, as well as sales-related documents such as invoices and sales orders. Newly hired sales staff members at SPC receive the company procedures manual which explains the process used to complete the steps in the sales/collection process. To minimize costs, SPC designates up to five sales staff members each month who can do credit checks for all new customers in addition to processing sales. SPC bills its clients monthly and uses the balance forward method of accounting for receivables; all cash receipts from clients are processed using a lockbox procedure. The lockbox firm's fee is 3% of all collections. SPC's accounting department estimates bad debts at the end of each fiscal year; they are normally…arrow_forwardRichard Palm is the accounting clerk of Olive Limited. He uses the source documents such as purchaseorders, sales invoices and suppliers’ invoices to prepare journal vouchers for general ledger entries.Each day he posts the journal vouchers to the general ledger and the related subsidiary ledgers. At theend of each month, he reconciles the subsidiary accounts to their control accounts in the generalledger to ensure they balance.Discuss the internal control weaknesses and risks associated with the above processarrow_forward
- Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He…arrow_forwardThe following is a list of six control plans (A-F). Please match the control plans to each of the control goals and system deficiencies identified in five different companies in the table, below. Control plans: A. Digital signature B. Manually reconcile batch totals C. Preformatted screens D. One-for-one checking of the goods, picking tickets and sales order E. Independent shipping authorization F. Turn around document Control goals and system deficiencies: 1. Zagreb, Inc. receives sales order on its Web server. Several times each day these are downloaded to the order entry and sales system. During the download process several line items are lost. 2. When goods arrive at Toronto Company's warehouse, the shipping clerk keys in the sales order number to retrieve the sales order. Often, the clerk keys the sales order number incorrectly and the wrong sales order is displayed. 3. Central Incorporated's customer send orders over the internet. Central is concerned that some of the orders are…arrow_forwardRequired:Match each of the control procedures listed below with the most closely related control procedurestype. Your answer should pair each of the numbers 1 through 10 with the appropriate letter.Control Procedure Typesa. Adequate documents and recordsb. Checks on recorded amountsc. Clearly defined authority and responsibilityd. Safeguards over assets and recordse. Segregation of dutiesControl Procedures1. Only the cashier assigned to the cash register is allowed to perform transactions.2. Division managers are evaluated annually on the basis of their division’s profitability.3. Invoices received from outside suppliers are filed with purchase orders.4. Employees with access to the accounting records are not permitted to open the mailbecause it contains many payments by check from customers.5. The extent of access to the many segments of the company’s computer system is tightly controlledby individual identification cards and passwords that change at regular intervals.6. Each shipment…arrow_forward
- Is the following a potential control weakness? A computer network and personal computers support Marco accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. Briefly explain the potential mistatement and recommended correction.arrow_forwardLee Wong, CPA, is auditing the financial statements of the Alexandria Corporation, which has a batch-processing IT-based system for shipping and invoicing that it purchased from a software vendor. The following comments have been extracted from Wong’s notes on IT operations and the processing and control of shipping notices and customer invoices. Each type of computer run is assigned to a specific employee who is responsible for making program changes, running the program, and answering questions. This procedure has the advantage of eliminating the need for records of IT operations because each employee is responsible for his or her own computer runs. At least one IT department employee remains in the computer room during office hours, and only IT department employees have keys to the computer room. The corporation considered the desirability of program controls but decided to retain the manual controls in place prior to the conversion to the software vendor’s system. Company products…arrow_forwardFollowing are five separate cases involving internal control issues. a. Tywin Company keeps very poor records of its equipment. Instead, the company asserts its employees are honest and would never steal from the company. b. Marker Theater has a computerized order-taking system for its tickets. The system is backed up once a year. c. Sutton Company has two employees handling acquisitions of inventory. One employee places purchase orders and pays vendors. The second employee receives the merchandise. d. The owner of Super Pharmacy uses a check software/printer to prepare checks, making it difficult for anyone to alter the amount of a check. The check software/printer, which is not password protected, is on the owner’s desk in an office that contains company checks and is normally unlocked. e. To ensure the company retreat would not be cut, the manager of Lavina Company decided to save money by canceling the external audit of internal controls. Required 1. For each case, identify the…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubCollege Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Understanding Systems Development Life Cycle; Author: GreggU;https://www.youtube.com/watch?v=shNOYFlmBOU;License: Standard Youtube License