Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem 5DQ
a)
Summary Introduction
To comment: On the given statement.
Introduction:
b)
Summary Introduction
To prepare: A statement of the relationship between the control plan of using prenumbered documents and the information system control goal of the validity of the event.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following is correct about control risk? Select one:
a.
None of the others
b.
The risk that a material misstatement could occur in a relevant assertion and not be prevented or detected on a timely basis by the entity’s internal control.
c.
It is an alternative to substantive testing
d.
It is the same as inherent risk.
1
Which of the following is not an element of the fraudtriangle?a. Opportunityb. Control environmentc. Incentived. Rationalization
Chapter 9 Solutions
Accounting Information Systems
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - How could the control matrix be used to recommend...Ch. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Name and explain four different types of batch...Ch. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 1DQCh. 9 - Explain why input controls are so important....Ch. 9 - Describe the similarities and differences between...Ch. 9 - Prob. 4DQCh. 9 - Prob. 5DQCh. 9 - Prob. 6DQCh. 9 - Prob. 7DQCh. 9 - Prob. 8DQCh. 9 - Prob. 9DQCh. 9 - Prob. 10DQCh. 9 - Prob. 11DQCh. 9 - The following is a list of six control plans from...Ch. 9 - Prob. 2SPCh. 9 - Figure 9.10 lists 10 control plans from this...Ch. 9 - Prob. 1PCh. 9 - Prob. 2PCh. 9 - Prob. 3PCh. 9 - Prob. 4PCh. 9 - Prob. 5PCh. 9 - Prob. 6P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, finance and related others by exploring similar questions and additional content below.Similar questions
- Audit working papers are the property of the auditors, who may distort the papers, sell them, or give them to third part. Is this statement true or false? Justify with your explanation.arrow_forwardThis answer is incorrect, can someone double check?arrow_forwardWhich of the following is NOT an element of the fraud triangle? a. ethics b. justifiable reliance c. situational pressure d. opportunityarrow_forward
- If one of the three elements of the fraud triangles is not present, can fraud be still perpetrated? explainarrow_forwardActions that may be taken to address risks include acceptance, avoidance, mitigation or transfer. a) True b) Falsearrow_forwardWhen can a check be a negotiable instrument?arrow_forward
- Which of the following is not a principle relating to risk assessment? a. Identifies and analyses risks and respond to changes b. Designing the information systems c. Specifies objectives with sufficient clarity d. Considers the potential for fraud in assessing risksarrow_forwardSomething is deemed to be 'material' if its omission, non-disclosure or misstatement is likely to affect economic decisions or other evaluations made by users entitled to rely on the financial statements. Select one alternative: True Falsearrow_forwardEvidence that tends to make some fact in issue more or less likely than it would be without the evidence is called: A. Relevant evidence. B. Authenticated evidence. C. Direct evidence. D. Real evidence.arrow_forward
- Which of the following is NOT a possible legal risk that can arise because of a fraud investigation conducted in an improper manner? A. Forcible entry and detainer. B. Invasion of privacy. C. Defamation. D. Malicious prosecution.arrow_forwardWhich of the following exists as an inherent risk even in the best designed systems a. Authorization b. Collusion c. Independent checks d. Detective controlarrow_forwardGive an example of fraud and error?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Business/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:CengageBusiness Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License