Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 10, Problem 6P
Summary Introduction
To match: The control plans with the control goals or system deficiencies.
Introduction:
OE/S process:
It is known as the order entry/sales process. It describes the first four steps of the order-to-cash process.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over.
Control Plans
Review shipped not billed sales orders
Turnaround documents
Deposit slip file
Procedures for rejected inputs
Computer agreement of batch totals
Document design
Control Goals or System Deficiencies
The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks.
In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices.
Helps to ensure that…
The following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have.
Control Plans from Chapter 8
Access control software (i.e., assignment of access rights to employees)
Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities
Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources
Preventive maintenance of computer hardware to ensure reliability and availability
Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…
The following is a list of 12 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control. Explain the impact that the pervasive control could have.
Control Plans from Chapter 8
Access control software (i.e., assignment of access rights to employees)
Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities
Physical controls for perimeter, building, and computer facilities to prevent loss or destruction of the computer resources
Preventive maintenance of computer hardware to ensure reliability and availability
Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs…
Chapter 10 Solutions
Accounting Information Systems
Ch. 10 - Prob. 1RQCh. 10 - What are the major functions performed by the OE/S...Ch. 10 - With what internal and external entities does the...Ch. 10 - Prob. 4RQCh. 10 - Prob. 5RQCh. 10 - Prob. 6RQCh. 10 - Distinguish buy-side and sell-side systems.Ch. 10 - Prob. 8RQCh. 10 - Prob. 9RQCh. 10 - Prob. 10RQ
Ch. 10 - Prob. 11RQCh. 10 - Prob. 12RQCh. 10 - Prob. 13RQCh. 10 - Prob. 14RQCh. 10 - Describe the impact that entity-level controls...Ch. 10 - Prob. 1DQCh. 10 - Prob. 2DQCh. 10 - Prob. 3DQCh. 10 - Prob. 4DQCh. 10 - Prob. 5DQCh. 10 - Prob. 6DQCh. 10 - An enterprise system supports a business process...Ch. 10 - Among the three functional entities (marketing,...Ch. 10 - The chapter presented a brief example of how the...Ch. 10 - Prob. 3SPCh. 10 - Prob. 4SPCh. 10 - Prob. 5SPCh. 10 - Prob. 6SPCh. 10 - Prob. 3PCh. 10 - Prob. 6P
Knowledge Booster
Similar questions
- The following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Because there are six control plans, you should have one letter left over. Control Plans A. Limit checks B. Tickler files C. Public key cryptography D. Compare input data with master data E. One-for-one checking F. Manual reconciliation of batch totals (hash totals) Definitions or Descriptions 1. Determines if a customer number has been input correctly. 2. Ensures that transmitted messages can be read only by authorized receivers. 3. A control plan that confirms a value that was entered is within a valid range. 4. An area (electronic or manual) where documents or other items are stored that need follow-up. 5. Used to detect changes in batches of events to ensure the validity, completeness, and accuracy of the batch.arrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forwardFollowing is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals). List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described. Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all. Control goals: Ensure effectiveness of operations Ensure efficient employment of resources Ensure security of resources Ensure input validity Ensure input completeness Ensure input accuracy Ensure update completeness Ensure update accuracy Situations: Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…arrow_forward
- Following is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals). List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described. Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all. Control goals: Ensure effectiveness of operations Ensure efficient employment of resources Ensure security of resources Ensure input validity Ensure input completeness Ensure input accuracy Ensure update completeness Ensure update accuracy Situations: Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…arrow_forward1. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be most effective in addressing the error or irregularity. For each control you identify, indicate (1) if it is a preventive, detective, or corrective control, and (2) which of the four internal control objectives is addressed.a. A computer hardware component malfunctions during a processing run, causing many of the accounts receivable records to be lost. b. A five-minute power failure causes the computer system to cease functioning, thus resulting in the loss of data being transmitted from several terminals. c. During a violent electrical storm, an employee was keying data at one of the computers in the order entry department. After about an hour of data entry, lightning caused a company-wide power failure. When power was restored, the employee had to re-key all the data from scratch. d. An inexperienced computer operator mounts the accounts receivable master file (on magnetic tape reel) for…arrow_forwardThe following is a list of 13 control plans from this chapter, followed by a list of 10 situations that have control implications. Match the 10 situations with the control plan that would best prevent the system failure from occurring. Because there are 13 control plans, you should have 3 letters left over. Control Plans A. Firewall B. Backup batteries and generators C. Insurance D. Employee badges, guest sign-in, locks on computer room doors E. Hot site F. Intrusion detection systems G. Off-site storage of backup computer programs and data H. Training (personnel development) I. Personnel termination procedures J. Security guards K. Program change controls L. Operations run manuals M. Fidelity Bond Situations 1. The computer users at the Identity Company do not know how to use the computer very well. 2. A computer hacker created a program to generate random user IDs and passwords. He used the random number program to access the computer system of Samson, Inc. 3. During the nightly computer run to update bank customers accounts for deposits and withdrawals for that day, an electrical storm caused a temporary power failure. The run had to be reprocessed from the beginning, resulting in certain other computer jobs not being completed on schedule. 4. A fire destroyed part of the computer room and the adjacent library of computer disks at Petunia, Inc. It took several months to reconstruct the data from manual source documents and other hard copy records. 5. A competitor flooded the Wolfeson Company Web server with false messages (i.e., a denial-of-service attack). The Web server, unable to handle all of this traffic, shut down for several hours until the messages could be cleared. 6. A group of demonstrators broke into a computer center and destroyed computer equipment worth several thousand dollars. 7. A computer programmer at Dover Company was fired for gross incompetence. During the two-week notice period, the programmer destroyed the documentation for all programs that he had developed since being hired. 8. The cash receipts clerk was on his way to the bank to deposit all the cash and checks received by the company that day when he decided that he would prefer to have a vacation in Brazil. The clerk kept the cash and cashed the checks. All the money was lost to the company. 9. A disgruntled programmer at the Going Company planted a logic bomb in the computer program that produced weekly payroll checks. The bomb was triggered to go off if the programmer were ever terminated. When the programmer was fired for continued absenteeism, the next weekly payroll run destroyed all the companys payroll master data. 10. The computer systems at Club, Inc. were destroyed in a recent fire. It took Club several days to get its IT functions operating again.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,