Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem 5P
a)
Summary Introduction
To annotate: The given flowchart to indicate additional present and missing control.
Introduction:
b)
Summary Introduction
To complete: The control matrix.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
c. Analyze the phrysical internal control weaknewesin the systemd. (Optional) Prepare a system Mowchart of a rode-signed computer- based system that resolves thecontrol acakneses that you identified._ Explainyour solution.
The following is a list of six control plans.These are followed by a list of five system failures that have control implications. Match the five system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one or two sentences) explanation of your choice. A letter should be used only once, with one letter left over.
Control Plans
Program change controls
Independent validation of vendor invoices
Access control software
Batch control plans
Compare input data with master data (e.g., vendor master data)
Match invoice, PO, and receipt
System Failures
Vendor Invoices are received at Samuel Company via an EDI feed over the Internet. Some of these are fraudulent invoices from bogus vendors.
Vendor invoices are sent to clerks in the AP department at Seneca, Inc., where they are entered once each day to create a file of invoice data that is then processed by the accounts payable program each evening. Several errors have been found in the…
“If we document a system with a systems flowchart and data flowdiagrams, we have overdocumented the system.” Discuss fully.
Chapter 9 Solutions
Accounting Information Systems
Ch. 9 - Prob. 1RQCh. 9 - Prob. 2RQCh. 9 - How could the control matrix be used to recommend...Ch. 9 - Prob. 4RQCh. 9 - Prob. 5RQCh. 9 - Prob. 6RQCh. 9 - Prob. 7RQCh. 9 - Name and explain four different types of batch...Ch. 9 - Prob. 9RQCh. 9 - Prob. 10RQ
Ch. 9 - Prob. 1DQCh. 9 - Explain why input controls are so important....Ch. 9 - Describe the similarities and differences between...Ch. 9 - Prob. 4DQCh. 9 - Prob. 5DQCh. 9 - Prob. 6DQCh. 9 - Prob. 7DQCh. 9 - Prob. 8DQCh. 9 - Prob. 9DQCh. 9 - Prob. 10DQCh. 9 - Prob. 11DQCh. 9 - The following is a list of six control plans from...Ch. 9 - Prob. 2SPCh. 9 - Figure 9.10 lists 10 control plans from this...Ch. 9 - Prob. 1PCh. 9 - Prob. 2PCh. 9 - Prob. 3PCh. 9 - Prob. 4PCh. 9 - Prob. 5PCh. 9 - Prob. 6P
Knowledge Booster
Similar questions
- Which of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forwardWhich of the following is a control that can be used to ensure that all of the components of an invoice number are input by a data entry person? dependency check O procedures for rejected inputs preformatted screens O turnaround documentsarrow_forward
- Typical DBMS features include all of the following EXCEPT a. database interface design and development. b. backup and recovery. c. program development. d. database access. e. all of these are typical DBMS features.arrow_forwardWhich of the following is NOT part of the systems implementation process? a. converting databases b. documentation c. systems design d. testing and correctionarrow_forward:The highest level of DFD is Master File Program flow chart Context diagram Data flow Chartarrow_forward
- Discuss the major control implications of batch systems with real-time data input. What compensating procedures are available?arrow_forwardMatch the two lists, below, by placing the capital letter from List 1 in each of the cells preceding the five descriptions in List 2 to which they best relate. One description in List 2 can be answered with 2 matches from List 1. Therefore, you should have 2 letters left over from List 1. List 1: Concepts A. Application (i.e., automated) control. B. Corrective control. C. Control environment. D. Input validity. E. Input completeness. F. Input accuracy G. Update completeness. H. Efficient use of resources. List 1: Capital letter List 2: Definitions/Descriptions 1. Insurance policy reimburses a company for losses due to a fire in a warehouse. 2. Shipping notices have a serial number that is tracked to ensure that they are all input. 3. Computer reviews each input to ensure that all the required data are included. 4. Inventory movements are tracked with a scanner to reduce manual counting. 5. Purchase orders are signed to approve the purchase.arrow_forwardOutline the traditional problems associated with the flatfile model that are resolved by the database model.arrow_forward
- Briefly describe record counts, batch totals, and hash totals. What types of errors in input would each of these controls likely identify?arrow_forwardWhich statement is NOT correct? The indexed sequential access methoda. is used for very large files that need both direct access and batch processing.b. may use an overflow area for records.c. provides an exact physical address for each record.d. is appropriate for files that require few inser- tions or deletions.arrow_forwardSequential file processing will not permita. data to be edited on a separate computer run.b. the use of a database structure.c. data to be edited in an offline mode.d. batch processing to be initiated from a terminal.e. data to be edited on a real-time basis.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub