![Accounting Information Systems](https://www.bartleby.com/isbn_cover_images/9781133934400/9781133934400_largeCoverImage.gif)
Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 17, Problem 6MCQ
To determine
Identify the option which correctly explains the technique of tracing.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Which of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.
The risk of fraud in a computerized system is lower than in a manual system because of the use of automated controls. true or false
You are conducting substantive tests on the Accounts Receivable file to verify its accuracy. The file is large, and you decide to test only a sample of records. Because of the complexity of the database structure, you cannot access the database directly. The client's systems programmer uses a utility program to write a query that produces a flat file, which he provides for testing purposes. Discuss any concerns you would have as an auditor and any actions you would take.
Chapter 17 Solutions
Accounting Information Systems
Ch. 17 - Prob. 1RQCh. 17 - Prob. 2RQCh. 17 - Prob. 3RQCh. 17 - Prob. 4RQCh. 17 - Prob. 5RQCh. 17 - Prob. 6RQCh. 17 - Prob. 7RQCh. 17 - What is the importance of the SPL?Ch. 17 - Prob. 9RQCh. 17 - Prob. 10RQ
Ch. 17 - Prob. 11RQCh. 17 - Prob. 12RQCh. 17 - What tests may be conducted for identifying...Ch. 17 - Prob. 14RQCh. 17 - Prob. 15RQCh. 17 - Prob. 16RQCh. 17 - Prob. 17RQCh. 17 - Prob. 18RQCh. 17 - Prob. 19RQCh. 17 - Prob. 20RQCh. 17 - Prob. 1DQCh. 17 - Prob. 2DQCh. 17 - Prob. 3DQCh. 17 - What are rounding error routines, and why are they...Ch. 17 - Prob. 5DQCh. 17 - Prob. 6DQCh. 17 - Prob. 7DQCh. 17 - Prob. 8DQCh. 17 - The systems development life cycle is a...Ch. 17 - Prob. 10DQCh. 17 - Prob. 11DQCh. 17 - Compare and contrast the following techniques...Ch. 17 - Prob. 13DQCh. 17 - Prob. 1MCQCh. 17 - Prob. 2MCQCh. 17 - Prob. 3MCQCh. 17 - Prob. 4MCQCh. 17 - Prob. 5MCQCh. 17 - Prob. 6MCQCh. 17 - Prob. 7MCQCh. 17 - Prob. 8MCQCh. 17 - Prob. 9MCQCh. 17 - Prob. 10MCQCh. 17 - Prob. 1PCh. 17 - Prob. 2PCh. 17 - Prob. 3PCh. 17 - Prob. 4PCh. 17 - Prob. 5PCh. 17 - Prob. 6PCh. 17 - Prob. 7PCh. 17 - Prob. 8PCh. 17 - Prob. 9PCh. 17 - Prob. 10PCh. 17 - The Balcar Companys external auditors are...Ch. 17 - Prob. 12PCh. 17 - Prob. 13PCh. 17 - Prob. 14PCh. 17 - Prob. 15P
Knowledge Booster
Similar questions
- You are conducting substantive tests on the accounts receivable file to verify its accuracy. The file is large, and you decide to test only a sample of the records. Because of the complexity of the database structure, you cannot access the database directly. The client’s systems programmer uses a utility program to write a query that produces a flat file, which he provides for testing purposes. Required Discuss any concerns you would have as an auditor and any actions you would take.arrow_forwardThe purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b. data input errors.c. the failure to have all input data ready on time.d. computer operator intervention.e. echo check failures.arrow_forwardCase Study. You are conducting substantive tests on the Accounts Receivable file to verify its accuracy. The file is large, and you decide to test only a sample of records. Because of the complexity of the database structure, you cannot access the database directly. The client’s systems programmer uses a utility program to write a query that produces a flat file, which he provides for testing purposes. Discuss any concerns you would have as an auditor and any actions you would take.arrow_forward
- 1. Automated controls in a computerized system are always more reliable than manual controls. true or false 2. The risk of fraud in a computerized system is lower than in a manual system because of the use of automated controls. 3. What is a potential risk associated with computerized systems? a. Inefficient use of resources b. Unauthorized access to data c. Excessive use of paper-based documents d. Lack of user training 4. The use of computer systems in financial reporting increases the risk of material misstatements. true or false 5. Which of the following is a potential limitation of computer-based systems?  a. Increased risk of data loss b. Reduced need for user training c. Reduced need for internal controls d. Increased efficiency and accuracyarrow_forwardA primary advantage of using generalized audit software packages to audit the financial statements of a client that uses a computer system is that the auditor may: a.Access information stored on computer files while having a limited understanding of the client’s hardware and software features. b.Consider increasing the use of substantive tests of transactions in place of analytical procedures. c.Substantiate the accuracy of data through selfchecking digits and hash totals. d.Reduce the level of required tests of controls to a relatively small amount.arrow_forwardWhich of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully capturesarrow_forward
- Controls that enhance the accuracy and reliability of the accounting records are automated controls. external controls. physical controls. none of these answer choices are correct.arrow_forwardAy  In addition to the fraud triangle, what are a couple other tools used to indicate the potential for fraud. Explain themarrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true? a. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data b. The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud c. The biggest cause of data breaches is organized by hacker groups. d. Losses from the theft of physical assets are much greater than those from the electronic theft of data e. In the absence of controls, it is not hard for a dishonest employee to steal data.arrow_forward
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardIf detective controls signal error flags, why shouldn’t this type of controls automatically make a correction in the identified errors? Why are corrective controls necessary?arrow_forwardThere are several steps involved in the fraud theory approach. What are they?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,