Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 11DQ
a)
Summary Introduction
To suggest: Monitoring activity for credit approval.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
b)
Summary Introduction
To suggest: Monitoring activity for removal of terminated employee access to computer systems.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
c)
Summary Introduction
To suggest: Monitoring activity for new background check.
Introduction: Monitoring activities are implemented to review the process and control the variances in the process and reduce the deviations from the standards.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Internal controls do each of the following except:
A. Evaluate performance of employees
B. Guarantee the accuracy if account records
C. Protect assets
D. Increase the likelihood that any errors will be caught
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.
Which of the following elements of internal control includes maintaining records of employees documenting their compensation and promotion?
Control procedures
Monitoring
Control environment
Risk assessment
Chapter 8 Solutions
Accounting Information Systems
Ch. 8 - What are the four major categories of pervasive...Ch. 8 - What are the differences among a pervasive control...Ch. 8 - Prob. 3RQCh. 8 - Describe some compensating controls that can be...Ch. 8 - What are policy controls plans? How do policies...Ch. 8 - Why should an organization conduct monitoring...Ch. 8 - Prob. 8RQCh. 8 - Prob. 10RQCh. 8 - What are the major elements of the strategic IT...Ch. 8 - Prob. 12RQ
Ch. 8 - Prob. 13RQCh. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Prob. 23RQCh. 8 - Prob. 24RQCh. 8 - Prob. 25RQCh. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - Prob. 29RQCh. 8 - Prob. 30RQCh. 8 - Prob. 31RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - No matter how sophisticated a system of internal...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - Prob. 7DQCh. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Prob. 9DQCh. 8 - Prob. 10DQCh. 8 - Prob. 11DQCh. 8 - The following is a list of six control plans from...Ch. 8 - Prob. 2SPCh. 8 - Prob. 3SPCh. 8 - Prob. 2PCh. 8 - The following is a list of 13 control plans from...Ch. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 6PCh. 8 - Examine the last column in Table 8.2 (p. 280) for...
Knowledge Booster
Similar questions
- Which of the following is NOT a general control?* a. Backup of live data b. Use of passwords c. Setting an acceptable range for working hours d. Calamity-proof IT facilities ABOUT AUDITING/ACCOUNTING TOPICSarrow_forwardWhich of the following controls would most effectively minimize the need to correct failures to collect required information in the account opening process? A quality review staff that checks paper applications to ensure all fields are complete An automated account opening platform that required data entry prior to allowing the accoun to be opened Requiring that a manager review and apprive all new account applications Documenting a procedure that sets forth the steps required to open an accountarrow_forwardMatch each of the following control activities with its definition. Control Activities Definitions 1. Separation of duties 2. Physical controls 3. Proper authorization 4. Employee management 5. Reconciliations 6. Performance reviews a. The company should maintain security over assets and accounting records.b. Management should periodically determine whether the amounts of physical assets of the company match the accounting records.c. The company should provide employees with appropriate guidance to ensure they have the knowledge necessary to carry out their job duties.d. The actual performance of individuals or processes should be checked against their expected performance.e. Authorizing transactions, recording transactions, and maintaining control of the related assets should be separated among employees.f. To prevent improper use of the company’s resources, only certain employees are allowed to carry out certain business activities.arrow_forward
- Which of the following is NOT an example of application control?* a. Pre-filled forms are already sent to users to minimize input errors b. After processing, the daily sales summary are reconciled with the individual sales invoices processed c. Reasonableness tests on acceptable working hours are embedded in the payroll software d. An equipment failure causes an error message on the monitorarrow_forwardOperating system security involves policies, procedures, and controls that determine who can access the operating system. User access privileges are assigned to individuals and to entire workgroups authorized to use the system.The way access privileges are assigned influences system security. Priviliges should be carefully administered and closely monitored for compliance with organizational policy. Choose one of the options below, that is not a test of control of the audit objective relating to access privileges. a. Review employee records to determine whether users have formally acknowledged their responsibility to maintain the confidentiality of company data.b. Review the privileges of a selection of user groups and individuals to determine if their access rights are appropriate for their job descriptions and positions.c. The auditor should verify that individuals are granted access to data and programs based on their need to know.d. Review the account lockout policy and procedures…arrow_forwardWhen planning the audit of internal controls for an issuer, the audit team shoulda. Identify significant accounts, locations, and assertions.b. Conduct a walkthrough of the internal control process.c. Make inquiries of employees regarding the existence of control activities.d. Reperform control activities performed by client employees to determine theireffectiveness.arrow_forward
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (b) A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password.arrow_forwardThe IT auditor can MOST (select one) effectively help a company deal with increasing IT-related risk by: a) Alerting management and the Audit Committee of the risks related to IT, and making audit recommendations that are focused on the root cause. b) Performing a weekly review of system-based audit logs to determine if the company has been breached. c) Ensuring that the company has a log-in banner that warns unauthorized users that they may be subject to criminal prosecution and penalties. d) Conducting an audit of the company's network security and pointing out weak firewall configuration settings in the audit report.arrow_forwardWhich of the following is an internal control activity that could prevent a paid disbursement voucher from being presented for payment a second time?a. Vouchers should be prepared by individuals who are responsible for signing disbursement checks.b. Disbursement vouchers should be approved by at least two responsible management officials.c. The date on a disbursement voucher should be within a few days of the date the voucher is presented for payment.d. The official who signs the check should compare the check with the voucher and should stamp “PAID” on the voucher documents.arrow_forward
- Which of the following is an example of an input control? a.making sure report that are distributed to the proper people b.monitoring the work of data entry clerks. c. Collecting accurate statistics of historical transactions while gathering data. d. Performing a check-digit test on a customer acount number e.Having anothr person review the design of a business formarrow_forwardThe following internal controls were identified by the auditor while gaining an understanding of internal control for the sales cycle. Access to the customer master file is restricted to authorized personnel. Customers are added to the master file only after appropriate approval, including adequate background and credit checks. Sales are made only to approved customers. The computer system rejects orders if the customer number is invalid or the order exceeds the customer’s approved credit limit. The computer matches the products and quantities on the customer order, shipping document, and sales invoice and generates an exception report of differences for follow-up in the accounting department. The computer generates a daily list of unmatched shipping documents. The sales clerk follows up on each exception and electronically signs the report when they are resolved. Invoice prices are obtained from the price master file. Any changes to the standard prices on an invoice must be…arrow_forwardAssumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L