close solutoin list

The following is a list of six control plans from this chapter, followed by a list of five situations that have control implications. Match each of the five situations with the control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over. Control Plans A. Firewall B. Access control software C. Personnel termination control plans D. Personnel selection and hiring control plans E. Rotation of duties and forced vacations F. Continuous data protection Control Situations 1. During a severe ice storm, an employee at Limor Company was keying data at one of the computers in the order entry department. After about an hour of data entry, ice buildup on power lines caused a company-wide power failure. When power was restored, the employee had to rekey all the data from scratch. 2. Therese is employed in the personnel department at Columbia Company. From the computer in her office, Therese was able to access the order entry system at Columbia and entered some orders for goods to be shipped to her cousin. 3. A hacker accessed the Web site at Vandalia, Inc. and changed some of the graphics. Confused by these changes, some customers took their business elsewhere. 4. Mary Doolittle, the company cashier, was known throughout the company as a workaholic. After three years on the job, Mary suddenly suffered heart problems and was incapacitated for several weeks. While she was ill, the treasurer temporarily assumed the cashier’s duties and discovered that Mary had misappropriated several thousand dollars since she was hired. 5. The résumé of an applicant for the job of controller at Rina’s Bakery showed that the candidate had graduated magna cum laude from Overton State University (OSU), with a major in accounting, some 10 years earlier. OSU’s accounting program was well respected, and Rina’s Bakery had hired several OSU graduates over the years. In his second month on the job, however, the new controller became tongue-tied when the CFO asked him a technical question about earnings per share reporting. When later it was discovered that the controller’s degree from OSU was in mechanical engineering, he was dismissed.

BuyFind

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127
BuyFind

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127

Solutions

Chapter
Section
Chapter 8, Problem 2SP
Textbook Problem

The following is a list of six control plans from this chapter, followed by a list of five situations that have control implications. Match each of the five situations with the control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over.

Control Plans

  1. A. Firewall
  2. B. Access control software
  3. C. Personnel termination control plans
  4. D. Personnel selection and hiring control plans
  5. E. Rotation of duties and forced vacations
  6. F. Continuous data protection

Control Situations

  1. 1. During a severe ice storm, an employee at Limor Company was keying data at one of the computers in the order entry department. After about an hour of data entry, ice buildup on power lines caused a company-wide power failure. When power was restored, the employee had to rekey all the data from scratch.
  2. 2. Therese is employed in the personnel department at Columbia Company. From the computer in her office, Therese was able to access the order entry system at Columbia and entered some orders for goods to be shipped to her cousin.
  3. 3. A hacker accessed the Web site at Vandalia, Inc. and changed some of the graphics. Confused by these changes, some customers took their business elsewhere.
  4. 4. Mary Doolittle, the company cashier, was known throughout the company as a workaholic. After three years on the job, Mary suddenly suffered heart problems and was incapacitated for several weeks. While she was ill, the treasurer temporarily assumed the cashier’s duties and discovered that Mary had misappropriated several thousand dollars since she was hired.
  5. 5. The résumé of an applicant for the job of controller at Rina’s Bakery showed that the candidate had graduated magna cum laude from Overton State University (OSU), with a major in accounting, some 10 years earlier. OSU’s accounting program was well respected, and Rina’s Bakery had hired several OSU graduates over the years. In his second month on the job, however, the new controller became tongue-tied when the CFO asked him a technical question about earnings per share reporting. When later it was discovered that the controller’s degree from OSU was in mechanical engineering, he was dismissed.

Expert Solution

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

See Solution

*Response times vary by subject and question complexity. Median response time is 34 minutes and may be longer for new subjects.

Chapter 8 Solutions

Accounting Information Systems
Show all chapter solutions
Ch. 8 - What types of documentation constitute a...Ch. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Describe backup and recovery.Ch. 8 - Describe continuous data protection (CDP), a...Ch. 8 - What is the difference between a hot site and a...Ch. 8 - Describe a denial-of-service attack. What controls...Ch. 8 - Describe the three layers of controls for...Ch. 8 - Explain biometric identification systems.Ch. 8 - Describe the four layers of controls for...Ch. 8 - Distinguish firewalls, intrusion-detections...Ch. 8 - What is data encryption? What is the key in...Ch. 8 - Define computer hacking and cracking, and explain...Ch. 8 - Provide three examples of hacking techniques....Ch. 8 - The chapter discusses environmental hazards with...Ch. 8 - What is the COBIT 5 framework? How does it differ...Ch. 8 - Name the five principles delineated by COBIT 5.Ch. 8 - List the seven enablers in the COBIT 5 framework.Ch. 8 - What are the five IT control process domains in...Ch. 8 - The Enterprise Risk Management (ERM) framework...Ch. 8 - In small companies with few employees, it is...Ch. 8 - No matter how sophisticated a system of internal...Ch. 8 - If personnel hiring is done correctly, the other...Ch. 8 - Monitoring must be performed by an independent...Ch. 8 - A key control concern described in Table 8.2 (p....Ch. 8 - Debate the following point: Business continuity...Ch. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Preventing the unauthorized disclosure and loss of...Ch. 8 - Your boss was heard to say, If we implemented...Ch. 8 - For each of these control plans, suggest a...Ch. 8 - The following is a list of six control plans from...Ch. 8 - The following is a list of six control plans from...Ch. 8 - Question: 1. Using a key of 2 and an algorithm of...Ch. 8 - Question : Listed here are 20 control plans...Ch. 8 - The following is a list of 13 control plans from...Ch. 8 - Assume that accounts payable are processed on a...Ch. 8 - Personnel at CP Company must perform the following...Ch. 8 - AS5 outlines the processes for An Audit of...Ch. 8 - Examine the last column in Table 8.2 (p. 280) for...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Show solutions
Discuss target market strategies

MKTG 12:STUDENT ED.-TEXT

Finally, you can also use the information on the Internet to value the entire corporation. This approach requir...

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)

Describe service-oriented architecture (SOA).

Pkg Acc Infor Systems MS VISIO CD

Purchases Returns and Allowances is debited when merchandise returned for credit.

College Accounting, Chapters 1-27 (New in Accounting from Heintz and Parry)

Does the PIP always hold?

Economics (MindTap Course List)