Accounting Information Systems
11th Edition
ISBN: 9780357156032
Author: Ulric J. Gelinas; Richard B. Dull; Patrick Wheeler
Publisher: Cengage Limited
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 9, Problem 1SP
The following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Because there are six control plans, you should have one letter left over.
Control Plans
- A. Limit checks
- B. Tickler files
- C. Public key cryptography
- D. Compare input data with master data
- E. One-for-one checking
- F. Manual reconciliation of batch totals (hash totals)
Definitions or Descriptions
- 1. Determines if a customer number has been input correctly.
- 2. Ensures that transmitted messages can be read only by authorized receivers.
- 3. A control plan that confirms a value that was entered is within a valid range.
- 4. An area (electronic or manual) where documents or other items are stored that need follow-up.
- 5. Used to detect changes in batches of events to ensure the validity, completeness, and accuracy of the batch.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
3
The following is a list of six control plans from this chapter or from Chapters 8 through 12. These are followed by a list of five system failures that
have control implications. Match the five system failures with a control plan that would best prevent the system failure from occurring. Also, give
a brief (one or two sentences) explanation of your choice. A letter should be used only once, with one letter left over.
Control Plans
A. Reconcile bank account
B. Match invoice, PO, and receipt
C. Tickler file of open POs and receiving reports
D. Batch sequence check
E. Procedures for rejected inputs
F. Independent authorization to make payment
System Failures
1. Pownal Company was sent an invoice for goods that were never received. The invoice was paid in full.
2. Dewey, Inc. has several vendors who do not send invoices in a timely manner. Terms for payment are based on dates that goods are received,
and discounts are being lost due to the late receipt, entry, and payment of these…
The following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over.
Control Plans
Review shipped not billed sales orders
Turnaround documents
Deposit slip file
Procedures for rejected inputs
Computer agreement of batch totals
Document design
Control Goals or System Deficiencies
The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks.
In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices.
Helps to ensure that…
List at least five threats in the process of ERP implementation (any of these steps: ERP product brand selection, module design, installation, testing, and daily operation), and propose at least 10 controls to mitigate the threats in your list.
For each threat, there should be at least one proposed control.
Elaborate on both the threats and controls.
An answer like “Threat 1: Theft of cash. Controls: a. surprise audits; b. running petty cash.” is not sufficient. You need to explain why you think theft of cash is a threat, and how the two controls can mitigate the risk of cash theft.
Chapter 9 Solutions
Accounting Information Systems
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - How could the control matrix be used to recommend...Ch. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Name and explain four different types of batch...Ch. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 1DQCh. 9 - Explain why input controls are so important....Ch. 9 - Describe the similarities and differences between...Ch. 9 - Prob. 4DQCh. 9 - Prob. 5DQCh. 9 - Prob. 6DQCh. 9 - Prob. 7DQCh. 9 - Prob. 8DQCh. 9 - Prob. 9DQCh. 9 - Prob. 10DQCh. 9 - Prob. 11DQCh. 9 - The following is a list of six control plans from...Ch. 9 - Prob. 2SPCh. 9 - Figure 9.10 lists 10 control plans from this...Ch. 9 - Prob. 1PCh. 9 - Prob. 2PCh. 9 - Prob. 3PCh. 9 - Prob. 4PCh. 9 - Prob. 5PCh. 9 - Prob. 6P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, finance and related others by exploring similar questions and additional content below.Similar questions
- Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardRequired: a. Create a document flowchart of the existing system. b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78. 1.Transaction Authorization 2.Segregation of Duties 3.Supervision 4.Accounting Records 5.Access Control 6.Independent Verificationarrow_forwardBriefly describe record counts, batch totals, and hash totals. What types of errors in input wouldeach of these controls likely identify?arrow_forward
- 3. Risk registers would normally detail which of the following: (Select all that apply.) A. Risk level before controls are implemented B. Risk lével after controls are implemented C. Responsibility for managing risks D. The total cost of a control being implemented Answer: Page 3 of 11 ted States) E Focus МacВook Proarrow_forwardFollowing is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals). List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described. Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all. Control goals: Ensure effectiveness of operations Ensure efficient employment of resources Ensure security of resources Ensure input validity Ensure input completeness Ensure input accuracy Ensure update completeness Ensure update accuracy Situations: Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…arrow_forwardA control designed to validate a transaction at the point of data entry is a. recalculation of a batch total. b. a record count. c. a check digit. d. checkpoints. e. recalculation of hash total.arrow_forward
- Control Objectives and Procedures Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15). Make a copy of the exhibit page and complete the following requirements.Requireda. Opposite the examples of transaction errors lettered a–g, write the name of the transaction assertion clients wish to achieve to prevent, detect, or correct the error.b. Opposite each numbered control procedure, place an “X” in the column that identifies the error(s) the procedure is likely to control by prevention, detection, or correction.arrow_forwardFor this assignment, you are to construct a diagram of the Fraud Triangle and clearly label each component of the Fraud Triangle. For each of these three components, provide the following: An explanation (two to three paragraphs) of each of the three components, specifically addressing how it could contribute to fraud. For each component of the Fraud Triangle, provide the following: List and briefly discuss internal controls for each of the three components that could help to reduce the impact of potential frauds related to that component of the Fraud Triangle. Note: This means that you will have a total of 24 internal controls documented. A few of the internal controls might be common to each component but please tailor them to the component you are referring to and do not copy and paste the same eight internal controls for each component. While APA style is not required for the body of this assignment, solid academic writing is expected and in-text citations and references should be…arrow_forwardfill all requirements please?arrow_forward
- Choose only one answer as well as state their reasons/rationale for the answer chosen. 7) Which input control is designed to prevent a buffer overflow attack?a. Size checkb. Reasonableness testc. Range checkd. Field checkarrow_forwardINTERNAL CONTROL Examine the flowchart below and determine any control threats. Specifically discuss the control problems, the possible dangers, and any corrective procedures you would recommend.arrow_forwardInternal controls are perhaps the most important tools for managing operational risk. What are internal controls? Give three examples of internal controls and explain how each control is used to minimize operational risk.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License