menu
bartleby
search
close search
Hit Return to see all results
close solutoin list

The following is a list of six control plans from this chapter. Control Plans A. Service level agreements B. Library controls C. Security guards D. User manuals E. Biometric identification systems F. Program change controls The following is a list of five situations that have control implications. Control Situations 1. The customer service representatives at Everyday Supplies, a catalog sales company, have been complaining that the computer system response time is very slow. They find themselves apologizing to customers who are waiting on the phone for their orders to be completed. 2. George and Mike have been friends for many years. Henry works in the shipping department at Superior Company, an electronics wholesaler, and Mike is unemployed. To make a little money, Mike “borrowed” George’s employee badge (it has a magnetic strip on the back to open doors at Superior Company) and used the badge to access the Superior warehouse and steal some electronics gear. 3. At Bedrock Company, most transaction processing is automated. When an inventory item reaches its reorder point, the computer automatically prints a purchase order for the economic order quantity (EOQ). A programmer, who was in collusion with 3D-Arm, Inc., the vendor that supplied several parts, altered the computer program and the inventory master data for those parts. He reduced the EOQ and made certain program alterations, so that items supplied by 3D-Arm were ordered more often than Bedrock required them. 4. The data entry clerk in the accounts payable department at Martini Company did not have detailed instructions for completing the input form for approved vendor invoices. To speed up data entry, he let all of the date information default from the current day’s date. As a result, several invoices were paid late, and Martini Company lost cash discounts on several other vendor payments. 5. During a normal workday, James, who was not an employee, entered Tortora Company’s offices and was able to find and remove some computer printouts containing user IDs and other sensitive information. He later used that information to gain access to Rowley’s computer system. Match the five situations with a control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over.

BuyFindarrow_forward

Pkg Acc Infor Systems MS VISIO CD

10th Edition
Ulric J. Gelinas
Publisher: CENGAGE L
ISBN: 9781133935940

Solutions

Chapter
Section
BuyFindarrow_forward

Pkg Acc Infor Systems MS VISIO CD

10th Edition
Ulric J. Gelinas
Publisher: CENGAGE L
ISBN: 9781133935940
Chapter 8, Problem 1SP
Textbook Problem
17 views

The following is a list of six control plans from this chapter.

Control Plans

  1. A. Service level agreements
  2. B. Library controls
  3. C. Security guards
  4. D. User manuals
  5. E. Biometric identification systems
  6. F.  Program change controls

The following is a list of five situations that have control implications.

Control Situations

  1. 1. The customer service representatives at Everyday Supplies, a catalog sales company, have been complaining that the computer system response time is very slow. They find themselves apologizing to customers who are waiting on the phone for their orders to be completed.
  2. 2. George and Mike have been friends for many years. Henry works in the shipping department at Superior Company, an electronics wholesaler, and Mike is unemployed. To make a little money, Mike “borrowed” George’s employee badge (it has a magnetic strip on the back to open doors at Superior Company) and used the badge to access the Superior warehouse and steal some electronics gear.
  3. 3. At Bedrock Company, most transaction processing is automated. When an inventory item reaches its reorder point, the computer automatically prints a purchase order for the economic order quantity (EOQ). A programmer, who was in collusion with 3D-Arm, Inc., the vendor that supplied several parts, altered the computer program and the inventory master data for those parts. He reduced the EOQ and made certain program alterations, so that items supplied by 3D-Arm were ordered more often than Bedrock required them.
  4. 4. The data entry clerk in the accounts payable department at Martini Company did not have detailed instructions for completing the input form for approved vendor invoices. To speed up data entry, he let all of the date information default from the current day’s date. As a result, several invoices were paid late, and Martini Company lost cash discounts on several other vendor payments.
  5. 5. During a normal workday, James, who was not an employee, entered Tortora Company’s offices and was able to find and remove some computer printouts containing user IDs and other sensitive information. He later used that information to gain access to Rowley’s computer system.

Match the five situations with a control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over.

1)

Summary Introduction

To determine: The control plan for the given control situation.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

Explanation of Solution

Given control situation:

At Company E, customer service representatives are complaining that the response time of the computer system is very slow. It increases the waiting time of the customers...

2)

Summary Introduction

To determine: The control plan for the given control situation.

3)

Summary Introduction

To determine: The control plan for the given control situation.

4)

Summary Introduction

To determine: The control plan for the given control situation.

5)

Summary Introduction

To determine: The control plan for the given control situation.

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 8 Solutions

Pkg Acc Infor Systems MS VISIO CD
Show all chapter solutions
add
Ch. 8 - What is the systems development life cycle (SDLC)?Ch. 8 - What types of documentation constitute a...Ch. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Describe backup and recovery.Ch. 8 - Describe continuous data protection (CDP), a...Ch. 8 - What is the difference between a hot site and a...Ch. 8 - Describe a denial-of-service attack. What controls...Ch. 8 - Describe the three layers of controls for...Ch. 8 - Explain biometric identification systems.Ch. 8 - Describe the four layers of controls for...Ch. 8 - Distinguish firewalls, intrusion-detections...Ch. 8 - What is data encryption? What is the key in...Ch. 8 - Define computer hacking and cracking, and explain...Ch. 8 - Provide three examples of hacking techniques....Ch. 8 - a. What kinds of damage are included in the...Ch. 8 - The Enterprise Risk Management (ERM) framework...Ch. 8 - In small companies with few employees, it is...Ch. 8 - No matter how sophisticated a system of internal...Ch. 8 - If personnel hiring is done correctly, the other...Ch. 8 - Monitoring must be performed by an independent...Ch. 8 - A key control concern described in Table 8.2 (pp....Ch. 8 - Debate the following point: Business continuity...Ch. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Preventing the unauthorized disclosure and loss of...Ch. 8 - Your boss was heard to say, If we implemented...Ch. 8 - For each of these control plans, suggest a...Ch. 8 - The following is a list of six control plans from...Ch. 8 - The following is a list of six control plans from...Ch. 8 - Question: 1. Using a key of 2 and an algorithm of...Ch. 8 - Listed here are 20 control plans discussed in the...Ch. 8 - The following is a list of 12 control plans from...Ch. 8 - Assume that accounts payable are processed on a...Ch. 8 - Personnel at CP Company must perform the following...Ch. 8 - AS5 outlines the processes for An Audit of...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Show solutions add
Is an initial public offering an example of a primary or a secondary market transaction? Explain.

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)

Is an initial public offering an example of a primary or a secondary market transaction? Explain.

Fundamentals of Financial Management, Concise Edition (MindTap Course List)

What are the major elements of design planning?

Foundations of Business (MindTap Course List)

Discuss target market strategies

MKTG 12:STUDENT ED.-TEXT

Label the blanks in the column heads as either Debit or Credit.

College Accounting (Book Only): A Career Approach

If M V increases, why does P Q have to rise?

Economics (MindTap Course List)

Explain how lack of integration of an ABM system may cause its failure.

Cornerstones of Cost Management (Cornerstones Series)