Auditing And Assurance Services
17th Edition
ISBN: 9780134897431
Author: ARENS, Alvin A.
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 11, Problem 21.3MCQ
To determine
Identify an example of application control.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following is NOT an example of application control?*
a. Pre-filled forms are already sent to users to minimize input errors
b. After processing, the daily sales summary are reconciled with the individual sales invoices processed
c. Reasonableness tests on acceptable working hours are embedded in the payroll software
d. An equipment failure causes an error message on the monitor
Is the following a potential control weakness?
Most data input in Marco Inc. is backed up by paper trails of source documents and other business papers. In addition, the firm uses an Internet service to back up all files on the Internet. Marco manually runs a backup at the end of each day. They have no other Internet presence other than an informational Website that does not allow potential customers to order merchandise.
Briefly explain the potential mistatement and recommended correction.
Is the following a potential control weakness?
A computer network and personal computers support Marco accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once.
Briefly explain the potential mistatement and recommended correction.
Chapter 11 Solutions
Auditing And Assurance Services
Ch. 11 - Prob. 1RQCh. 11 - Prob. 2RQCh. 11 - Prob. 3RQCh. 11 - Prob. 4RQCh. 11 - Prob. 5RQCh. 11 - Prob. 6RQCh. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - Prob. 10RQ
Ch. 11 - Prob. 11RQCh. 11 - Prob. 12RQCh. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - Prob. 15RQCh. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Prob. 18RQCh. 11 - Prob. 19RQCh. 11 - Prob. 20.1MCQCh. 11 - Actions, policies, and procedures that reflect the...Ch. 11 - Prob. 20.3MCQCh. 11 - Prob. 21.1MCQCh. 11 - Prob. 21.2MCQCh. 11 - Prob. 21.3MCQCh. 11 - Prob. 22.1MCQCh. 11 - Prob. 22.2MCQCh. 11 - Which of the following correctly describes an...Ch. 11 - Prob. 23DQPCh. 11 - Prob. 24DQPCh. 11 - The following are misstatements that have occurred...Ch. 11 - Prob. 26DQPCh. 11 - Prob. 27DQPCh. 11 - Prob. 28DQPCh. 11 - Prob. 29DQPCh. 11 - Prob. 30DQPCh. 11 - Prob. 31DQPCh. 11 - Prob. 32C
Knowledge Booster
Similar questions
- Which of the following is false about accounting information systems? A. They provide reports that people analyze. B. They prevent errors and stop employees from stealing inventory. C. They are designed to gather data about the companys transactions. D. They consist of processes that involve input of data from source documents, processing, output, and storage.arrow_forwardGiven the information below, Marco only issues accounts and passwords to employees with jobs requiring computer data entry or access to file information and reports. Passwords are required to enter the system. Access is limited such that employees only have access to the information they need to perform their duties. Access is also limited in nature such that some employees who do not have the authority to enter data have read-only access while those whose jobs require data entry have both read and write access. Normal access to the files takes place via the software, which subjects any input to various logical and numerical tests. What is the: a) potential control strength and (b) potential mistatement detected or corrected.arrow_forwardWhich of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.arrow_forward
- Which of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.arrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will customer orders be received via the Internet? Are all collections from customers received in the form of checks? Are product quantities monitored regularly?arrow_forwardThe accounting clerk for the Ram System company receives source documents such as purchase orders, sales invoices, and vendor invoices, which she uses to prepare journal vouchers to the general ledger for general ledger entries. Each day the clerk posts the journal vouchers to the general ledger and the related subsidiary ledgers. Each month the clerk reconciles the subsidiary accounts to their control accounts in the general ledger to ensure that they balance. Required: Discuss any control weaknesses and risks associated with this scenario.arrow_forward
- The following internal controls were identified by the auditor while gaining an understanding of internal control for the sales cycle. Access to the customer master file is restricted to authorized personnel. Customers are added to the master file only after appropriate approval, including adequate background and credit checks. Sales are made only to approved customers. The computer system rejects orders if the customer number is invalid or the order exceeds the customer’s approved credit limit. The computer matches the products and quantities on the customer order, shipping document, and sales invoice and generates an exception report of differences for follow-up in the accounting department. The computer generates a daily list of unmatched shipping documents. The sales clerk follows up on each exception and electronically signs the report when they are resolved. Invoice prices are obtained from the price master file. Any changes to the standard prices on an invoice must be…arrow_forwardIs it an entity inherent risk for the information below? A computer network and personal computers support Marco Inc's accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. If it is an inherent risk, what is the feature of the firm that will possibly affect inherent risk and explain how and why; that is whether it increases or decreases inherent risk. Please address a specific risk to the accuracy of the financial statements with the "how" and whether…arrow_forwardAssumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegePkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub