Pkg Acc Infor Systems MS VISIO CD
10th Edition
ISBN: 9781133935940
Author: Ulric J. Gelinas
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 5DQ
Summary Introduction
To determine: The difference between bubble 3.1 and bubble 3.2 in the above diagram.
Introduction:
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The computer processing portion of a sales order system is represented by the flowchart. Answer the following questions.a. What type of data processing system is this? Explain, and be specific.b. The auditor suggests that this system can be greatly simplified by changing to direct access files. Explain the major operational changes that would occur in the system if this were done.c. The auditor warns of control implications from this change that must be considered. Explain the nature of the control implications.d. Sketch a flowchart (the computerized portion only) of the proposed new system. Use correct symbols and label the diagram.
1. In the ________ stage of an operational audit, the auditor measures the actual system against an idealstandard.
internal controlevidence collectionevidence evaluationtesting
2. Which of the following is an effective data entry control to ensure that order date isless than or equal to the ship date?
A validity check.A range check.A limit check.A reasonableness check.
3. The G/L and the AR Subledger are linked through the use of a
Customer numberVendor numberCompany codeReconciliation account
Which of the following automated application controls would offer reasonable assurancethat inventory data were completely and accurately entered?a. Sequence checking.b. Batch totals.c. Limit tests.d. Check digits.
Chapter 12 Solutions
Pkg Acc Infor Systems MS VISIO CD
Ch. 12 - Prob. 1RQCh. 12 - What primary functions does the purchasing process...Ch. 12 - Prob. 3RQCh. 12 - What are the fundamental responsibilities of each...Ch. 12 - Describe supply chain management (SCM).Ch. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - What types of frauds are typically found in the...Ch. 12 - What are the typical effectiveness goals of the...Ch. 12 - What characterizes a valid PO input? What...Ch. 12 - Prob. 15RQCh. 12 - Describe the impact that entity-level controls...Ch. 12 - Prob. 1DQCh. 12 - Explain why ambiguities and conflicts exist among...Ch. 12 - Prob. 3DQCh. 12 - Prob. 4DQCh. 12 - Prob. 5DQCh. 12 - Prob. 6DQCh. 12 - Prob. 7DQCh. 12 - Prob. 1SPCh. 12 - Prob. 2SPCh. 12 - Prob. 3SPCh. 12 - Prob. 4SPCh. 12 - Prob. 4PCh. 12 - Prob. 5PCh. 12 - Prob. 6P
Knowledge Booster
Similar questions
- Explain the difference between an attribute and an exceptioncondition. State the exception condition for the audit procedure: The duplicate salesinvoice has been initialed indicating the performance of internal verification.arrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forwardWhich of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully capturesarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub