close solutoin list

The following is a list of six control plans from this chapter, followed by a list of five situations that have control implications. Match each of the five situations with a control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over. Control Plans A. Service level agreements B. Clear desk and locked door policy C. User manuals D. Biometric identification systems E. Program change controls F. Personnel termination control plans Control Situations 1. The customer service representatives at Everyday Supplies, a catalog sales company, have been complaining that the computer system response time is very slow. They find themselves apologizing to customers who are waiting on the phone for their orders to be completed. 2. George and Mike have been friends for many years. Henry works in the shipping department at Superior Company, an electronics wholesaler, and Mike is unemployed. To make a little money, Mike “borrowed” George’s employee badge (it has a magnetic strip on the back to open doors at Superior Company) and used the badge to access the Superior warehouse and steal some electronics gear. 3. At Bedrock Company, most transaction processing is automated. When an inventory item reaches its reorder point, the computer automatically prints a purchase order for the economic order quantity (EOQ). A programmer, who was in collusion with 3D-Arm, Inc., the vendor that supplied several parts, altered the computer program and the inventory master data for those parts. He reduced the EOQ and made certain program alterations, so that items supplied by 3D-Arm were ordered more often than Bedrock required them. 4. The data entry clerk in the accounts payable department at Martini Company did not have detailed instructions for completing the input form for approved vendor invoices. To speed up data entry, he let all of the date information default from the current day’s date. As a result, several invoices were paid late, and Martini Company lost cash discounts on several other vendor payments. 5. During a normal workday, James, who was not an employee, entered Tortora Company’s offices and was able to find and remove some computer printouts containing user IDs and other sensitive information. He later used that information to gain access to Rowley’s computer system.

BuyFind

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127
BuyFind

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127

Solutions

Chapter
Section
Chapter 8, Problem 1SP
Textbook Problem

The following is a list of six control plans from this chapter, followed by a list of five situations that have control implications. Match each of the five situations with a control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over.

Control Plans

  1. A. Service level agreements
  2. B. Clear desk and locked door policy
  3. C. User manuals
  4. D. Biometric identification systems
  5. E. Program change controls
  6. F. Personnel termination control plans

Control Situations

1. The customer service representatives at Everyday Supplies, a catalog sales company, have been complaining that the computer system response time is very slow. They find themselves apologizing to customers who are waiting on the phone for their orders to be completed.

2. George and Mike have been friends for many years. Henry works in the shipping department at Superior Company, an electronics wholesaler, and Mike is unemployed. To make a little money, Mike “borrowed” George’s employee badge (it has a magnetic strip on the back to open doors at Superior Company) and used the badge to access the Superior warehouse and steal some electronics gear.

3. At Bedrock Company, most transaction processing is automated. When an inventory item reaches its reorder point, the computer automatically prints a purchase order for the economic order quantity (EOQ). A programmer, who was in collusion with 3D-Arm, Inc., the vendor that supplied several parts, altered the computer program and the inventory master data for those parts. He reduced the EOQ and made certain program alterations, so that items supplied by 3D-Arm were ordered more often than Bedrock required them.

4. The data entry clerk in the accounts payable department at Martini Company did not have detailed instructions for completing the input form for approved vendor invoices. To speed up data entry, he let all of the date information default from the current day’s date. As a result, several invoices were paid late, and Martini Company lost cash discounts on several other vendor payments.

5. During a normal workday, James, who was not an employee, entered Tortora Company’s offices and was able to find and remove some computer printouts containing user IDs and other sensitive information. He later used that information to gain access to Rowley’s computer system.

Expert Solution

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

See Solution

*Response times vary by subject and question complexity. Median response time is 34 minutes and may be longer for new subjects.

Chapter 8 Solutions

Accounting Information Systems
Show all chapter solutions
Ch. 8 - What types of documentation constitute a...Ch. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Describe backup and recovery.Ch. 8 - Describe continuous data protection (CDP), a...Ch. 8 - What is the difference between a hot site and a...Ch. 8 - Describe a denial-of-service attack. What controls...Ch. 8 - Describe the three layers of controls for...Ch. 8 - Explain biometric identification systems.Ch. 8 - Describe the four layers of controls for...Ch. 8 - Distinguish firewalls, intrusion-detections...Ch. 8 - What is data encryption? What is the key in...Ch. 8 - Define computer hacking and cracking, and explain...Ch. 8 - Provide three examples of hacking techniques....Ch. 8 - The chapter discusses environmental hazards with...Ch. 8 - What is the COBIT 5 framework? How does it differ...Ch. 8 - Name the five principles delineated by COBIT 5.Ch. 8 - List the seven enablers in the COBIT 5 framework.Ch. 8 - What are the five IT control process domains in...Ch. 8 - The Enterprise Risk Management (ERM) framework...Ch. 8 - In small companies with few employees, it is...Ch. 8 - No matter how sophisticated a system of internal...Ch. 8 - If personnel hiring is done correctly, the other...Ch. 8 - Monitoring must be performed by an independent...Ch. 8 - A key control concern described in Table 8.2 (p....Ch. 8 - Debate the following point: Business continuity...Ch. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Preventing the unauthorized disclosure and loss of...Ch. 8 - Your boss was heard to say, If we implemented...Ch. 8 - For each of these control plans, suggest a...Ch. 8 - The following is a list of six control plans from...Ch. 8 - The following is a list of six control plans from...Ch. 8 - Question: 1. Using a key of 2 and an algorithm of...Ch. 8 - Question : Listed here are 20 control plans...Ch. 8 - The following is a list of 13 control plans from...Ch. 8 - Assume that accounts payable are processed on a...Ch. 8 - Personnel at CP Company must perform the following...Ch. 8 - AS5 outlines the processes for An Audit of...Ch. 8 - Examine the last column in Table 8.2 (p. 280) for...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Show solutions
What does the invisible hand of the marketplace do?

Brief Principles of Macroeconomics (MindTap Course List)

What are the key factors on which external financing depends, as indicated in the AFN equation?

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)

Post the following entry to the general ledger and subsidiary ledger.

College Accounting (Book Only): A Career Approach

What is the first step in preparing a master budget?

Survey of Accounting (Accounting I)