Accounting Information Systems 9th Edition
9th Edition
ISBN: 9781305756700
Author: Hall
Publisher: CENGAGE C
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 2MCQ
To determine
Identify the correct example of an application control objective.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What types of physical controls are in place to protect company assets (assets include inventory, cash, equipment, etc.)?
What types of controls are in place to protect data (such as company information or customer personal information)?
Choose one more internal control principle from this module, and explain how the company implements that principle and the purpose?
Computer accounting control procedures are referred to as general or application controls. The primary objective of application controls in a computer environment is toa. ensure that the computer system operates efficiently.b. ensure the validity, completeness, and accuracy of financial transactions.c. provide controls over the electronic functioning of the hardware.d. plan for the protection of the facilities and backup for the systems.
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(c) A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.
Chapter 15 Solutions
Accounting Information Systems 9th Edition
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Prob. 6RQCh. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - Prob. 9RQCh. 15 - Prob. 10RQ
Ch. 15 - What are the three primary IT functions that must...Ch. 15 - Prob. 12RQCh. 15 - Prob. 13RQCh. 15 - What are the primary reasons for separating...Ch. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 23RQCh. 15 - Prob. 24RQCh. 15 - Prob. 25RQCh. 15 - Prob. 26RQCh. 15 - Prob. 27RQCh. 15 - Prob. 28RQCh. 15 - Prob. 29RQCh. 15 - Prob. 30RQCh. 15 - Prob. 31RQCh. 15 - Prob. 32RQCh. 15 - Distinguish between errors and irregularities....Ch. 15 - Prob. 34RQCh. 15 - Prob. 35RQCh. 15 - Prob. 36RQCh. 15 - Prob. 37RQCh. 15 - Prob. 38RQCh. 15 - Prob. 39RQCh. 15 - Define commodity IT asset.Ch. 15 - Prob. 41RQCh. 15 - Prob. 42RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Who should determine and prioritize the critical...Ch. 15 - Prob. 13DQCh. 15 - Define the management assertions of existence or...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Explain how IT outsourcing can lead to loss of...Ch. 15 - Prob. 25DQCh. 15 - Prob. 26DQCh. 15 - Prob. 27DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 8PCh. 15 - DISASTER RECOVERY PLAN Hexagon is an online...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardThe computer processing portion of a sales order system is represented by the flowchart. Answer the following questions.a. What type of data processing system is this? Explain, and be specific.b. The auditor suggests that this system can be greatly simplified by changing to direct access files. Explain the major operational changes that would occur in the system if this were done.c. The auditor warns of control implications from this change that must be considered. Explain the nature of the control implications.d. Sketch a flowchart (the computerized portion only) of the proposed new system. Use correct symbols and label the diagram.arrow_forwardExplains these controls and tell why they are important in any fraud situation: a. Preventive controls b. Detective controls c. Leveraging technologd. Identifying the red flags NB: Answer questions a-darrow_forward
- Which of the following is an example of an input control? a.making sure report that are distributed to the proper people b.monitoring the work of data entry clerks. c. Collecting accurate statistics of historical transactions while gathering data. d. Performing a check-digit test on a customer acount number e.Having anothr person review the design of a business formarrow_forwardWhich of the following describes preventive controls? (Several choices may be correct.) Expected to be 100% effective. O Easily verified as to whether the control has worked. O Designed to stop misstatement from occurring. O Applied to each transaction prior to entering transactions into the accounting system. Applied to each transaction after transactions have been processed. O Designed to detect fraud or errors that have occurred.arrow_forwardExplain how internal control can be enhanced through the proper installation of Information Technology Identify the risks for accounting systems that rely heavily on IT functions. Distinguish between general controls and application controls and give examples at least five Which duties should be segregated in a computer department? Describe the typical duties of computer personnel. What aspects of documentation, file security and retention control procedures are unique to computer systems? What are the responsibilities of the database administrator (DBA) function? Compare the risks associated with network environment to those associated with centralized IT functions.arrow_forward
- Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully capturesarrow_forwardA CIS environment exists when a computer of any type o. size is involved in the processing of an entity's financial information. If an auditor is involved in the configuration and system development prior to the implementation, is the financial information is considered reliable and free from error?arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (f) A company purchased the leading “off-the-shelf” e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the database by entering appropriate SQL code.arrow_forward
- How audit programs that need to be made to detect vulnerabilities in the firewall?arrow_forwardWhat controls should be employed to avoid breaches into an accountijg information system.arrow_forwardWhich of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningCornerstones of Financial AccountingAccountingISBN:9781337690881Author:Jay Rich, Jeff JonesPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Cornerstones of Financial Accounting
Accounting
ISBN:9781337690881
Author:Jay Rich, Jeff Jones
Publisher:Cengage Learning