1)
To determine: The control plan for the given system failure.
Introduction:
2)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)
To determine: The control plan for the given system failure.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Want to see the full answer?
Check out a sample textbook solutionChapter 13 Solutions
Accounting Information Systems
- The following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Because there are six control plans, you should have one letter left over. Control Plans A. Limit checks B. Tickler files C. Public key cryptography D. Compare input data with master data E. One-for-one checking F. Manual reconciliation of batch totals (hash totals) Definitions or Descriptions 1. Determines if a customer number has been input correctly. 2. Ensures that transmitted messages can be read only by authorized receivers. 3. A control plan that confirms a value that was entered is within a valid range. 4. An area (electronic or manual) where documents or other items are stored that need follow-up. 5. Used to detect changes in batches of events to ensure the validity, completeness, and accuracy of the batch.arrow_forwardThe following is a list of six control plans from this chapter or from Chapter 9 and Chapter 10. These are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over. Control Plans Review shipped not billed sales orders Turnaround documents Deposit slip file Procedures for rejected inputs Computer agreement of batch totals Document design Control Goals or System Deficiencies The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks. In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices. Helps to ensure that…arrow_forwardListed below are five procedures followed by Eikenberry Company.Indicate whether each procedure is an example of good internal control or of weak internal control. If it is an example of good internal control, indicate which internal control principle is being followed. If it is an example of weak internal control, indicate which internal control principle is violated. Use the table below. Procedure IC Good or Weak? Related Internal Control Principle 1. Several individuals operate the cash register using the same register drawer. Select a weakness in internal control Select a control principle that is violated 2. A monthly bank reconciliation is prepared by someone who has no other cash responsibilities. Select a weakness in internal control Select a control principle that is violated 3. Joe Cockrell writes checks and also records cash payment entries. Select a weakness in internal control Select a control principle that is violated…arrow_forward
- List at least five threats in the process of ERP implementation (any of these steps: ERP product brand selection, module design, installation, testing, and daily operation), and propose at least 10 controls to mitigate the threats in your list. For each threat, there should be at least one proposed control. Elaborate on both the threats and controls. An answer like “Threat 1: Theft of cash. Controls: a. surprise audits; b. running petty cash.” is not sufficient. You need to explain why you think theft of cash is a threat, and how the two controls can mitigate the risk of cash theft.arrow_forwardEach situation below describes an internal control weakness in the cash receipts process. Identifywhich of the five internal control principles is violated, explain the weakness, and then suggest achange that would improve internal control.a. Cashiers prepare a cash count summary, attach tapes from the cash register showing total receipts,and then prepare a bank deposit slip, which they take to the bank for deposit. After the deposit ismade, all documents are forwarded to the accounting department for review and recordingarrow_forwardWhich of the following is an internal control activity that could prevent a paid disbursement voucher from being presented for payment a second time?a. Vouchers should be prepared by individuals who are responsible for signing disbursement checks.b. Disbursement vouchers should be approved by at least two responsible management officials.c. The date on a disbursement voucher should be within a few days of the date the voucher is presented for payment.d. The official who signs the check should compare the check with the voucher and should stamp “PAID” on the voucher documents.arrow_forward
- Listed below are five procedures followed by Eikenberry Company.Indicate whether each procedure is an example of good internal control or of weak internal control. If it is an example of good internal control, indicate which internal control principle is being followed. If it is an example of weak internal control, indicate which internal control principle is violated. Use the table below. Procedure IC Good or Weak? Related Internal Control Principle 1. Several individuals operate the cash register using the same register drawer. Select a weakness in internal control WeakGood Select a control principle that is violated Independent Internal VerificationSegregation of DutiesEstablishment of ResponsibilityHuman Resource ControlsDocumentation ProceduresPhysical Controls 2. A monthly bank reconciliation is prepared by someone who has no other cash…arrow_forwardYou have been assigned to review the payment system of an enterprise. The finance director suspects that some duplicate payments may have been made. List five control procedures which you would expect to find.arrow_forward
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning