Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 6, Problem 10DQ
To determine
Explain the internal control that would prevent an employee from removing a computer and then reporting it as scrapped.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.
In auditing program change control, the IT auditor will:
a. Not need to inspect program authorization forms for signatures
b. Ensure an organization is following the process described in their documentation for
program change control
c. Make sure that only computer programmers move their own changes into a production
environment
d. Make sure that only computer programmers have tested the changes they made to
programs
Chapter 6 Solutions
Accounting Information Systems
Ch. 6 - Which document is used by the cost accounting...Ch. 6 - Prob. 2RQCh. 6 - Prob. 3RQCh. 6 - Why should employee paychecks be drawn against a...Ch. 6 - Prob. 5RQCh. 6 - Prob. 6RQCh. 6 - Prob. 7RQCh. 6 - Prob. 8RQCh. 6 - Prob. 9RQCh. 6 - Prob. 10RQ
Ch. 6 - What are the objectives of a fixed asset system?Ch. 6 - How do fixed asset systems differ from purchases...Ch. 6 - What are three tasks of the fixed asset system?Ch. 6 - What information is found on the depreciation...Ch. 6 - Why is it crucial to the integrity of the...Ch. 6 - Prob. 16RQCh. 6 - Prob. 17RQCh. 6 - What document shows when fixed assets are fully...Ch. 6 - Who should authorize disposal of fixed assets?Ch. 6 - Assets used for production are secured in a...Ch. 6 - What is the importance of the job ticket?...Ch. 6 - Prob. 2DQCh. 6 - Prob. 3DQCh. 6 - Prob. 4DQCh. 6 - Discuss some specific examples in which...Ch. 6 - Discuss some service industries that may require...Ch. 6 - Prob. 7DQCh. 6 - If an asset that is not fully depreciated is sold...Ch. 6 - Discuss the fundamental risk and control issues...Ch. 6 - Prob. 10DQCh. 6 - Prob. 11DQCh. 6 - Describe an internal control that would prevent...Ch. 6 - Prob. 13DQCh. 6 - What negative consequences result when fixed asset...Ch. 6 - Prob. 1MCQCh. 6 - Prob. 2MCQCh. 6 - Prob. 3MCQCh. 6 - Prob. 4MCQCh. 6 - Which one of the following documents captures the...Ch. 6 - Which of the following are not fixed asset system...Ch. 6 - All of the following controls are likely to apply...Ch. 6 - All of the following data items are likely to be...Ch. 6 - The following are all transactions processed in...Ch. 6 - Prob. 10MCQCh. 6 - PAYROLL FRAUD John Smith worked in the stockyard...Ch. 6 - Prob. 2PCh. 6 - Prob. 3PCh. 6 - Prob. 4PCh. 6 - Prob. 5PCh. 6 - Prob. 6PCh. 6 - Prob. 7PCh. 6 - Prob. 8PCh. 6 - FIXED ASSET SYSTEM-FRAUD POTENTIAL Holder Co....Ch. 6 - Prob. 10PCh. 6 - Prob. 11PCh. 6 - Prob. 12PCh. 6 - Prob. 1ICCCh. 6 - Prob. 2ICCCh. 6 - Prob. 3ICCCh. 6 - Prob. 4ICCCh. 6 - Prob. 5ICCCh. 6 - Prob. 6ICC
Knowledge Booster
Similar questions
- The IT Audit Director is responsible for monitoring and approving network-related changes to the company's production network. This is an appropriately designed preventive control. a) True b) Falsearrow_forwardWhich of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.arrow_forwardAs the client support supervisor for FarFar construction, you noticed that some site workers are clocking on for friends who are not present. Discuss controls you could implement to address this concern.arrow_forward
- Assumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.arrow_forwardWhen is more frequent monitoring of internal controls not required?* When employees are poorly trained. When the control activity and risk being managed are important. When a department is making changes to an application being used in that department. When internal controls have recently been changed to reduce the frequency of errors.arrow_forwardGeneral Controls. Indicate the benefits of each of the following examples of general controls. a. Echo checks are designed and built into the computer by the manufacturer.b. The company schedules regular maintenance on its computer hardware.c. The company involves users in its design of programs and selection of prepackaged software and programs.d. New programs are tested and validated prior to being implemented.e. Documentation is required prior to modifying existing programs using “emergency”change orders.f. The duties of system analysts, programmers, and computer operators are appropriatelyseparated.g. Appropriate backup and data retention policies are implemented.h. The access rights granted to employees are periodically reviewed and evaluated, giving consideration to known changes resulting from promotions and transfers within the company.arrow_forward
- Given the information below, Marco only issues accounts and passwords to employees with jobs requiring computer data entry or access to file information and reports. Passwords are required to enter the system. Access is limited such that employees only have access to the information they need to perform their duties. Access is also limited in nature such that some employees who do not have the authority to enter data have read-only access while those whose jobs require data entry have both read and write access. Normal access to the files takes place via the software, which subjects any input to various logical and numerical tests. What is the: a) potential control strength and (b) potential mistatement detected or corrected.arrow_forwardWhich of the following is NOT an example of application control?* a. Pre-filled forms are already sent to users to minimize input errors b. After processing, the daily sales summary are reconciled with the individual sales invoices processed c. Reasonableness tests on acceptable working hours are embedded in the payroll software d. An equipment failure causes an error message on the monitorarrow_forwardExplain how internal control can be enhanced through the proper installation of Information Technology Identify the risks for accounting systems that rely heavily on IT functions. Distinguish between general controls and application controls and give examples at least five Which duties should be segregated in a computer department? Describe the typical duties of computer personnel. What aspects of documentation, file security and retention control procedures are unique to computer systems? What are the responsibilities of the database administrator (DBA) function? Compare the risks associated with network environment to those associated with centralized IT functions.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning