Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 17, Problem 5MCQ
To determine
Identify the statement which is not correct.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Computers remove a fundamental separation of functions between authorizing and processing transactions, and there is also a risk of the integrity of accounting records. What do you think, how can management control these risks?
A company limits access to computerized accounting records. What can be said of this procedure?
a.It is a good example of physical controls.
b.It violates adequate documents and records.
c.It violates proper segregation of duties.
d.It is a good example of independent checks on performance.
Controls that enhance the accuracy and reliability of the accounting records are
automated controls.
external controls.
physical controls.
none of these answer choices are correct.
Chapter 17 Solutions
Accounting Information Systems
Ch. 17 - Prob. 1RQCh. 17 - Prob. 2RQCh. 17 - Prob. 3RQCh. 17 - Prob. 4RQCh. 17 - Prob. 5RQCh. 17 - Prob. 6RQCh. 17 - Prob. 7RQCh. 17 - What is the importance of the SPL?Ch. 17 - Prob. 9RQCh. 17 - Prob. 10RQ
Ch. 17 - Prob. 11RQCh. 17 - Prob. 12RQCh. 17 - What tests may be conducted for identifying...Ch. 17 - Prob. 14RQCh. 17 - Prob. 15RQCh. 17 - Prob. 16RQCh. 17 - Prob. 17RQCh. 17 - Prob. 18RQCh. 17 - Prob. 19RQCh. 17 - Prob. 20RQCh. 17 - Prob. 1DQCh. 17 - Prob. 2DQCh. 17 - Prob. 3DQCh. 17 - What are rounding error routines, and why are they...Ch. 17 - Prob. 5DQCh. 17 - Prob. 6DQCh. 17 - Prob. 7DQCh. 17 - Prob. 8DQCh. 17 - The systems development life cycle is a...Ch. 17 - Prob. 10DQCh. 17 - Prob. 11DQCh. 17 - Compare and contrast the following techniques...Ch. 17 - Prob. 13DQCh. 17 - Prob. 1MCQCh. 17 - Prob. 2MCQCh. 17 - Prob. 3MCQCh. 17 - Prob. 4MCQCh. 17 - Prob. 5MCQCh. 17 - Prob. 6MCQCh. 17 - Prob. 7MCQCh. 17 - Prob. 8MCQCh. 17 - Prob. 9MCQCh. 17 - Prob. 10MCQCh. 17 - Prob. 1PCh. 17 - Prob. 2PCh. 17 - Prob. 3PCh. 17 - Prob. 4PCh. 17 - Prob. 5PCh. 17 - Prob. 6PCh. 17 - Prob. 7PCh. 17 - Prob. 8PCh. 17 - Prob. 9PCh. 17 - Prob. 10PCh. 17 - The Balcar Companys external auditors are...Ch. 17 - Prob. 12PCh. 17 - Prob. 13PCh. 17 - Prob. 14PCh. 17 - Prob. 15P
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forward1. Automated controls in a computerized system are always more reliable than manual controls. true or false 2. The risk of fraud in a computerized system is lower than in a manual system because of the use of automated controls. 3. What is a potential risk associated with computerized systems? a. Inefficient use of resources b. Unauthorized access to data c. Excessive use of paper-based documents d. Lack of user training 4. The use of computer systems in financial reporting increases the risk of material misstatements. true or false 5. Which of the following is a potential limitation of computer-based systems? a. Increased risk of data loss b. Reduced need for user training c. Reduced need for internal controls d. Increased efficiency and accuracyarrow_forwardAuditors of ERP systemsa. need not be concerned about segregation of duties because these systems possess strong computer controls.b. focus on output controls such as independent verification to reconcile batch totals.c. are concerned that managers fail to exercise adequate care in assigning permissions.d. do not see the data warehouse as an audit or control issue at all because financial records are not stored there.e. need not review access levels granted to users because these are determined when the system is configured and never change.arrow_forward
- Explain why deficiencies in internal controls might not always result in significant misstatements when transactions are recordedarrow_forwardWhich of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.arrow_forwardWhich one of the following is not an objective of a system of internal controls? Select one: 1. Overstate liabilities in order to be conservative 2. Enhance the accuracy and reliability of accounting records 3. Safeguard company assets 4. Reduce the risks of errorsarrow_forward
- Which of the following exists as an inherent risk even in the best designed systems a. Authorization b. Collusion c. Independent checks d. Detective controlarrow_forwardWhich of the following describes preventive controls? (Several choices may be correct.) Expected to be 100% effective. O Easily verified as to whether the control has worked. O Designed to stop misstatement from occurring. O Applied to each transaction prior to entering transactions into the accounting system. Applied to each transaction after transactions have been processed. O Designed to detect fraud or errors that have occurred.arrow_forwardControls over data management systems fall into two categories: access controls and backup controls. In the shared database environment, access control risks include corruption, theft, misuse, and destruction of data. These threats originate from both unauthorized intruders and authorized users who exceed their access privileges. Which of the following options is not part of controls over data management systems? a. Employees that sharing the same computers need restriction for access to specific directories, programs, and data files by using multilevel password control.b. To recover data from disaster, organizations must implement policies and procedures and routinely provide backup copies of critical files.c. Database Administrator works closely with users and systems designers has primary responsibility for user view design and works closely with users and systems designers.d. Access to confidential data must be properly managed. Inference controls prevent users from inferring,…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License