Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 10, Problem 3P
Summary Introduction
To match: The control plans with the system failures.
Introduction:
OE/S process:
It is known as the order entry/sales process. It describes the first four steps of the order-to-cash process.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over.
Control Plans
Review shipped not billed sales orders
Turnaround documents
Deposit slip file
Procedures for rejected inputs
Computer agreement of batch totals
Document design
Control Goals or System Deficiencies
The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks.
In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices.
Helps to ensure that…
Following is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals).
List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described.
Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all.
Control goals:
Ensure effectiveness of operations
Ensure efficient employment of resources
Ensure security of resources
Ensure input validity
Ensure input completeness
Ensure input accuracy
Ensure update completeness
Ensure update accuracy
Situations:
Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…
Following is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals).
List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described.
Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all.
Control goals:
Ensure effectiveness of operations
Ensure efficient employment of resources
Ensure security of resources
Ensure input validity
Ensure input completeness
Ensure input accuracy
Ensure update completeness
Ensure update accuracy
Situations:
Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…
Chapter 10 Solutions
Accounting Information Systems
Ch. 10 - Prob. 1RQCh. 10 - What are the major functions performed by the OE/S...Ch. 10 - With what internal and external entities does the...Ch. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Distinguish buy-side and sell-side systems.Ch. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Describe the impact that entity-level controls...Ch. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 4DQCh. 10 - Prob. 5DQCh. 10 - Prob. 6DQCh. 10 - An enterprise system supports a business process...Ch. 10 - Among the three functional entities (marketing,...Ch. 10 - The chapter presented a brief example of how the...Ch. 10 - Prob. 3SPCh. 10 - Prob. 4SPCh. 10 - Prob. 5SPCh. 10 - Prob. 6SPCh. 10 - Prob. 3PCh. 10 - Prob. 6P
Knowledge Booster
Similar questions
- The following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Because there are six control plans, you should have one letter left over. Control Plans A. Limit checks B. Tickler files C. Public key cryptography D. Compare input data with master data E. One-for-one checking F. Manual reconciliation of batch totals (hash totals) Definitions or Descriptions 1. Determines if a customer number has been input correctly. 2. Ensures that transmitted messages can be read only by authorized receivers. 3. A control plan that confirms a value that was entered is within a valid range. 4. An area (electronic or manual) where documents or other items are stored that need follow-up. 5. Used to detect changes in batches of events to ensure the validity, completeness, and accuracy of the batch.arrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardThe following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forward
- The following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have. Control Plans from Chapter 8 Access control software (i.e., assignment of access rights to employees) Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources Preventive maintenance of computer hardware to ensure reliability and availability Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…arrow_forward1. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be most effective in addressing the error or irregularity. For each control you identify, indicate (1) if it is a preventive, detective, or corrective control, and (2) which of the four internal control objectives is addressed.a. A computer hardware component malfunctions during a processing run, causing many of the accounts receivable records to be lost. b. A five-minute power failure causes the computer system to cease functioning, thus resulting in the loss of data being transmitted from several terminals. c. During a violent electrical storm, an employee was keying data at one of the computers in the order entry department. After about an hour of data entry, lightning caused a company-wide power failure. When power was restored, the employee had to re-key all the data from scratch. d. An inexperienced computer operator mounts the accounts receivable master file (on magnetic tape reel) for…arrow_forwardhas hired you to review its sales order procedures for internal control compliance and to make recommendations for changes. You are required to:a. Create a data flow diagram of the current system. b. Create a system flowchart of the existing system. c. Analyze the internal control weaknesses in the system. ; andd. Prepare a system flowchart of a redesigned computer-based systemarrow_forward
- The following is a list of 13 control plans from this chapter, followed by a list of 10 situations that have control implications. Match the 10 situations with the control plan that would best prevent the system failure from occurring. Because there are 13 control plans, you should have 3 letters left over. Control Plans A. Firewall B. Backup batteries and generators C. Insurance D. Employee badges, guest sign-in, locks on computer room doors E. Hot site F. Intrusion detection systems G. Off-site storage of backup computer programs and data H. Training (personnel development) I. Personnel termination procedures J. Security guards K. Program change controls L. Operations run manuals M. Fidelity Bond Situations 1. The computer users at the Identity Company do not know how to use the computer very well. 2. A computer hacker created a program to generate random user IDs and passwords. He used the random number program to access the computer system of Samson, Inc. 3. During the nightly computer run to update bank customers accounts for deposits and withdrawals for that day, an electrical storm caused a temporary power failure. The run had to be reprocessed from the beginning, resulting in certain other computer jobs not being completed on schedule. 4. A fire destroyed part of the computer room and the adjacent library of computer disks at Petunia, Inc. It took several months to reconstruct the data from manual source documents and other hard copy records. 5. A competitor flooded the Wolfeson Company Web server with false messages (i.e., a denial-of-service attack). The Web server, unable to handle all of this traffic, shut down for several hours until the messages could be cleared. 6. A group of demonstrators broke into a computer center and destroyed computer equipment worth several thousand dollars. 7. A computer programmer at Dover Company was fired for gross incompetence. During the two-week notice period, the programmer destroyed the documentation for all programs that he had developed since being hired. 8. The cash receipts clerk was on his way to the bank to deposit all the cash and checks received by the company that day when he decided that he would prefer to have a vacation in Brazil. The clerk kept the cash and cashed the checks. All the money was lost to the company. 9. A disgruntled programmer at the Going Company planted a logic bomb in the computer program that produced weekly payroll checks. The bomb was triggered to go off if the programmer were ever terminated. When the programmer was fired for continued absenteeism, the next weekly payroll run destroyed all the companys payroll master data. 10. The computer systems at Club, Inc. were destroyed in a recent fire. It took Club several days to get its IT functions operating again.arrow_forwardThe following is a list of six control plans from this chapter, followed by a list of five situations that have control implications. Match each of the five situations with a control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over. Control Plans A. Service level agreements B. Clear desk and locked door policy C. User manuals D. Biometric identification systems E. Program change controls F. Personnel termination control plans Control Situations 1. The customer service representatives at Everyday Supplies, a catalog sales company, have been complaining that the computer system response time is very slow. They find themselves apologizing to customers who are waiting on the phone for their orders to be completed. 2. George and Mike have been friends for many years. Henry works in the shipping department at Superior Company, an electronics wholesaler, and Mike is unemployed. To make a little money, Mike borrowed Georges employee badge (it has a magnetic strip on the back to open doors at Superior Company) and used the badge to access the Superior warehouse and steal some electronics gear. 3. At Bedrock Company, most transaction processing is automated. When an inventory item reaches its reorder point, the computer automatically prints a purchase order for the economic order quantity (EOQ). A programmer, who was in collusion with 3D-Arm, Inc., the vendor that supplied several parts, altered the computer program and the inventory master data for those parts. He reduced the EOQ and made certain program alterations, so that items supplied by 3D-Arm were ordered more often than Bedrock required them. 4. The data entry clerk in the accounts payable department at Martini Company did not have detailed instructions for completing the input form for approved vendor invoices. To speed up data entry, he let all of the date information default from the current days date. As a result, several invoices were paid late, and Martini Company lost cash discounts on several other vendor payments. 5. During a normal workday, James, who was not an employee, entered Tortora Companys offices and was able to find and remove some computer printouts containing user IDs and other sensitive information. He later used that information to gain access to Rowleys computer system.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning