ACCT INFO SYSTEMS (ACCESS CODE)
11th Edition
ISBN: 9781337599320
Author: GELINAS
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 11, Problem 5SP
Summary Introduction
To match: The control goals or system deficiencies with the control plans.
Introduction:
B/AR/CR process:
It is an accounting process with an interacting structure of different process supporting the decision-making activities of the
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over.
Control Plans
Review shipped not billed sales orders
Turnaround documents
Deposit slip file
Procedures for rejected inputs
Computer agreement of batch totals
Document design
Control Goals or System Deficiencies
The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks.
In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices.
Helps to ensure that…
Following is a list of eight generic control goals (A-H), followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve controls goals).
List the numbers 1 through 8 in the table below. Each number represents one of the described situations on the page below. In the table, next to each number, place the capital letter of the control goal that best matches the situation described.
Hint: Some letters may be used more than once in each situation. Conversely, some letters may not be used at all.
Control goals:
Ensure effectiveness of operations
Ensure efficient employment of resources
Ensure security of resources
Ensure input validity
Ensure input completeness
Ensure input accuracy
Ensure update completeness
Ensure update accuracy
Situations:
Instead of preparing deposit slips by hand, Kaley Company has them generated by the computer. The company does so to speed up the deposit…
The following is a list of 12 control plans from this chapter or from Chapters 8, 9, 10, & 11. This is followed by a list of 10 system failures that have control implications. Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Also, give a brief (one- to two-sentence) explanation of your choice. A letter should be used only once, with two letters left over.
Control Plans
Compare PO data to input receipt data
Written code of conduct
Compare vendors for price, terms, quality, and availability
Monitor open POs
Independent authorization to record receipt
Count goods and compare to vendor packing slip
Independent vendor master data maintenance
Personnel management controls (supervision)
Perimeter and building controls
Segregate warehouse and receiving functions
Digital signature
Logical and physical access controls
System Failures
Warehouse managers at Broward, Inc. have been discovering inventory shortages. When they…
Chapter 11 Solutions
ACCT INFO SYSTEMS (ACCESS CODE)
Ch. 11 - What is the billing/accounts receivable/cash...Ch. 11 - What primary activities does the B/AR/CR process...Ch. 11 - Prob. 3RQCh. 11 - What functions are typically segregated in the...Ch. 11 - Prob. 5RQCh. 11 - Describe several ways that companies have reduced...Ch. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - What is accounts receivable master data?
Ch. 11 - What are the major features of a balance-forward...Ch. 11 - What are the differences between a post-billing...Ch. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - What characterizes a valid RA (i.e., cash...Ch. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Develop several examples of possible goal...Ch. 11 - Prob. 2DQCh. 11 - Prob. 3DQCh. 11 - Prob. 4DQCh. 11 - Prob. 5DQCh. 11 - The two most widely used billing systems are (1)...Ch. 11 - Prob. 7DQCh. 11 - Prob. 1SPCh. 11 - Prob. 2SPCh. 11 - Prob. 3SPCh. 11 - Prob. 5SPCh. 11 - Prob. 6SPCh. 11 - Prob. 3PCh. 11 - Prob. 5PCh. 11 - Prob. 6PCh. 11 - Use the DFDs in Figure 11.3 (pg. 416), Figure 11.4...
Knowledge Booster
Similar questions
- Match the two lists, below, by placing the capital letter from List 1 in each of the cells preceding the five descriptions in List 2 to which they best relate. One description in List 2 can be answered with 2 matches from List 1. Therefore, you should have 2 letters left over from List 1. List 1: Concepts A. Application (i.e., automated) control. B. Corrective control. C. Control environment. D. Input validity. E. Input completeness. F. Input accuracy G. Update completeness. H. Efficient use of resources. List 1: Capital letter List 2: Definitions/Descriptions 1. Insurance policy reimburses a company for losses due to a fire in a warehouse. 2. Shipping notices have a serial number that is tracked to ensure that they are all input. 3. Computer reviews each input to ensure that all the required data are included. 4. Inventory movements are tracked with a scanner to reduce manual counting. 5. Purchase orders are signed to approve the purchase.arrow_forwardWhich of the following is a component of general controls? a. processing controls b. output controls c. back-up and contingency planning d. input controls Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardListed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer:arrow_forward
- Which of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardUsing the flowchart of a purchases system, identify six major control weaknesses in the system. Discuss and classify each weakness in accordance with SAS 78/COSO.arrow_forwardExplain what is meant by independent checks on performanceand give five specific examples.arrow_forward
- Each of the following are input controls. Please give an example of how they may be used: Thank you:) Range check Reasonableness check Validity checkarrow_forward7.8 Tralor Corporation manufactures and sells several different lines of small elec- tric components. Its internal audit department completed an audit of its expen- diture processes. Part of the audit involved a review of the internal accounting controls for payables, including the controls over the authorization of transactions, accounting for transactions, and the protection of assets. The auditors noted the following items: 1. Routine purchases are initiated by inventory control notifying the purchasing de- partment of the need to buy goods. The purchasing department fills out a prenum- bered purchase order and gets it approved by the purchasing manager. The original of the five-part purchase order goes to the vendor. The other four copies are for pur- chasing, the user department, receiving for use as a receiving report, and accounts payable. 2. For efficiency and effectiveness, purchases of specialized goods and services are ne- gotiated directly between the user department and…arrow_forwardRefer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated with the systems as currently configured. b. Describe the controls that need to be implemented into the system to mitigate the risks in thegiven scenario.arrow_forward
- 3. Risk registers would normally detail which of the following: (Select all that apply.) A. Risk level before controls are implemented B. Risk lével after controls are implemented C. Responsibility for managing risks D. The total cost of a control being implemented Answer: Page 3 of 11 ted States) E Focus МacВook Proarrow_forwardChoose only one answer as well as state their reasons/rationale for the answer chosen. 7) Which input control is designed to prevent a buffer overflow attack?a. Size checkb. Reasonableness testc. Range checkd. Field checkarrow_forwardThe are several techniques for recording the assessment of control risk. One or more of the following may be used depending on the complexity of the system. Briefly explain the ... Narrative notes Questionnaires flowcharts checklistsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,