2.99 See Answer

Question: The following is a list of 12


The following is a list of 12 control plans from this chapter, followed by a list of 10 examples of System Failures or problem situations that have control implications: Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Because there are 12 control plans, you should have two letters left over.
Control Plans
A. Batch sequence check
B. Confirm input acceptance
C. Programmed edit checks
D. Manual agreement of batch totals
E. Online prompting
F. Cumulative sequence check
G. Electronic approvals
H. Document design
I. Procedures for rejected inputs
J. Compare input data with master data
K. Turnaround documents
L. Digital signatures
System Failures
1. At Wynne Company, customer orders are received in the mail in the sales department, where clerks enter individual orders into the company’s computer system and then file the completed orders in a filing cabinet. Customers should receive an acknowledgement for each of their orders. When the customer fails to receive an acknowledgement, the customer calls to inquire. Inevitably, the sales clerk will find the customer’s order filed with other customer orders that had been entered into the computer. The “missing” orders are always marked as “ENTERED”.
2. The tellers at Mason Bank have been having difficulty reconciling their cash drawers. All customer transactions such as deposits and withdrawals are entered online at each teller station. At the end of the shift, the computer prints a list of the transactions that have occurred during the shift. The tellers must then review the list to determine that their drawers contain checks, cash, and other documents to support each entry on the list.
3. Data entry clerks at Dora Company use networked PCs to enter batches of documents into the computer. Recently, a number of errors have been found in key numeric fields. The supervisor would like to implement a control to reduce the transcription errors being made by the clerks.
4. At Central Inc., clerks in the accounting offices of the company’s three divisions prepare prenumbered general ledger voucher documents. Once prepared, the vouchers are given to each office’s data entry clerk, who keys them into an online terminal. The computer records whatever general ledger adjustment was indicated by the voucher. The controller has found that several vouchers were never recorded, and some vouchers were recorded twice.
5. Purchase orders at Hickory Corp. are prepared online by purchasing clerks. Recently, the purchasing manager discovered that many purchase orders are being sent for quantities far greater (i.e., incorrect quantities) than would normally be requested.
6. At Quality Brokers, Inc., a clerk on the trading floor mistakenly entered the dollar amount of a trade into the box on the computer screen reserved for the number of shares to be sold and then transmitted the incorrect trade to the stock exchange’s computer.
7. At Pilot Company, clerks in the cash applications area of the accounts receivable office open mail containing checks from customers. They prepare a remittance advice (RA) containing the customer number, invoice numbers, amount owed, amount paid, and check number. Once prepared, the RAs are sent to a clerk who keys them into the computer. The accounts receivable manager has been complaining that the RA entry process is slow and error-prone.
8. Dancer Company enters shipping notices in batches. Upon entry, the computer performs certain edits to eliminate those notices that have errors. As a result, many actual shipments never get recorded.
9. Jamie the hacker gained access to the computer system of United
Bank and entered the data to transfer funds to his bank account in the Cayman Islands.
10. At Lockhart Company data entry clerks receive a variety of documents from many departments throughout the company. In some cases, unauthorized inputs are keyed and entered into the computer.


> The following is a list of six control plans from this chapter, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Becaus

> Fraud is sometimes discovered when looking at one piece of information within the context of overall data. For example, sales entered into the system after a store closes. Describe how using an Enterprise System might be preferable to a nonintegrated sys

> Provide an example of a business event. Explain how an enterprise system can provide the ability to share information and make the execution of the event efficient. Also, describe the various aspects of the business event that a company might want to cap

> Consider the inventory of a retailer. Describe how the qualities of information presented in this chapter, can help enable the efficiency and effectiveness of the organization?

> Match the items in the following two lists by matching the letter (or letters) of the information quality (qualities) that best describes the information quality violation presented in the second column. Some letters may not be used at all and some may b

> There are many opportunities for fraud within the OE/S process. One of these opportunities is the use of the system to fraudulently ship goods to an employee, posing as a customer. Describe the controls that can be implemented to reduce the likelihood th

> The following is a list of six control plans from this chapter or from Chapter 9. These are followed by a list of six statements describing either a control goal or a system deficiency. Match the five control goals or system deficiencies with a control p

> Assume that a computerized credit-checking procedure operates as follows: As orders are entered into the computer by a CSR, the computer calculates the total of the customer order and adds to this the customer’s outstanding balance from the accounts rece

> Describe a situation in which information would be shared between two of the “silos” in Figure 2.2. What data would be shared? Why would the data be shared? FIGURE 2.2 Value Chain and Value System a Organisstion

> Using the following table as a guide, describe for each function from Figure 10.1: Figure 10.1: a. A risk (an event or action that will cause the organization to fail to meet its goals/objectives) b. A control/process or use of technology that will ad

> The chapter presented a brief example of how the OE/S process might or might not support the decision-making needs of marketing managers. For each of the functional positions shown in the organization chart of Figure 10.2 (pg. 361), Figure 10.2: Spec

> Among the three functional entities (marketing, finance, and logistics) shown in Figure 10.1 (pg. 359), Figure 10.1: What goal conflicts could exist, and how might this affect the results of the OE/S process? FIGURE 101 A Haraontal Perspecive of

> Figure 9.10: Lists 10 control plans from this chapter and three control goals for the information process. Fill in the table cells, as appropriate, to indicate which control plans can accomplish which control goals. Number your entries, and describe th

> Figure 9.9 (p. 346) depicts the transmission of an electronic message incorporating public key cryptography, encryption, and digital signatures. Answer the following questions related to that figure: 1. Can anyone read the message? Why? 2. Can Sally be s

> Using Figure 8.9, Figure 8.9: Select one COBIT process in each COBIT domain and find a specific control plan from the chapter that you believe would be categorized in the process. You will have five answers. For example: A requirements walkthrough wo

> Search the Internet or an organization to which you have access (e.g., university, your employer) to find a company policy related to employees (e.g., hiring policy) or IT (e.g. password policy). Summarize the policy and explain how the policy enhances p

> Research the Internet, newspapers, magazines, and journals to find a recent fraud case involving IT and pervasive controls failure. Develop a report (format and length to be determined by your instructor) briefly describing the case, what pervasive contr

> 1. Using a key of 2 and an algorithm of adding and subtracting from alternating letters starting with addition, encrypt the word “accounting.” 2. Using a key of 3 and an algorithm of adding and subtracting from alternating letters starting with subtracti

> The following is a list of six control plans from this chapter, followed by a list of five situations that have control implications. Match each of the five situations with the control plan that would best prevent the system failure from occurring. Becau

> Consider a business process that you have experienced at work, as a customer, or as a student. Examples might include any process in a work setting, such as payroll and purchasing, or any process with which you have interacted, such as ordering from a We

> The following is a list of six control plans from this chapter, followed by a list of five situations that have control implications. Match each of the five situations with a control plan that would best prevent the system failure from occurring. Because

> Match the concept in List 1 with the definition or description in List 2. There is only one correct or best answer for each match. Therefore, you should have three letters left over from List 1. List 1—Terms A. Pervasive control plan B. Preventive contro

> Match the concept in List 1 with the definition or description in List 2. There is only one correct or best answer for each match. Therefore, you should have three letters left over from List 1. List 1—Terms A. Input accuracy B. Input validity C. Pervasi

> Provide a comparison of the internal control frameworks of COSO’s ERM and SAS No. 78/COSO 2013 Internal Control – Integrated Framework. Discuss (in a manner prescribed by your professor) the implications to independent auditors of the differences.

> Examine the REA model for Hera Industrial Supply that appears in Figure 6.18. Figure 6.18: For each of the six entities in the model, list the attributes that a database designer should include in each table. Identify primary key attributes with (PK

> Examine the REA model for Hera Industrial Supply that appears in Figure 6.18. Figure 6.18: Determine the maximum cardinalities for each of the eight relationships indicated in the model. State any assumptions you needed to make, and be prepared to d

> Examine Figure 6.18, which contains the REA model for Hera Industrial Supply (HIS). The model is partially completed; it includes all entities and relationships, but it does not include cardinalities or descriptions of the relationships (which would appe

> Using the vendor and purchase order tables from Short Problem 6-3 and SQL commands, create a query to find out the date of each purchase order and the vendor by name each purchase order was sent to.

> Using SQL commands, create a vendor table and purchase order table, and populate them with data.

> Develop the REA data model from Short Problem 6-1 into an E-R diagram with maximum cardinalities. Assume that each inventory item can be ordered multiple times. Draw the model using Microsoft Visio (or other software).

> Describe how an enterprise system can assist an organization in optimizing its value system.

> Develop an REA data model for ordering inventory. Consider this a single event. You will need to identify the associated resource(s) and agent(s). Draw the model using Microsoft Visio (or other software).

> Using database software (e.g., Access) and the database tables implemented in SP 5-3, run a query identifying customers by name and the inventory item(s) they received by description. Obtain a printout of the query design and the results.

> Implement the E-R diagram from SP 5-1 as tables in a database software package, such as Access. Once the tables are created, link the tables together in relationships. Finally, populate the tables with several instances of each entity. To do this, it wil

> Using the E-R diagram in from SP 5-1, write a description for each of the relationships in the diagram. In your description, include the cardinalities. For example, you might describe the relationship between CUSTOMERS and SHIPMENTS as: “Shipments are ma

> Using Microsoft Visio (or an alternative software), create an E-R diagram with maximum cardinalities for the shipping of inventory to customers. Show this diagram as an REA model identifying resources, events, and agents.

> Historically, many businesses served only local customers. That model usually limited customers to a small geographic area. Identify a specific type of business, and compare/contrast the opportunities and risks for the business pre-Internet, and in today

> Identify a specific situation in which periodic processing is sufficient to support the business process, and a second situation where immediate processing is necessary to adequately support the process.

> E-business has allowed companies to reduce inventory while simultaneously offering a wide variety of items. Amazon.com is an example of such a company. Identify another organization that has expanded or improved (or could potentially expand or improve) b

> Provide an example of a business where the evolution of communication (i.e., face-to-face, phone, e-mail, etc.) has altered its business activities. What are the advantages and disadvantages associated with these changes?

> Some people believe that an automated accounting system is always better than a manual system. Describe circumstances, and provide examples, where you would recommend a manual system rather than automated solution.

> Periodically, you will read in the news about one company in the ERP industry acquiring another company in that industry. Discuss the pros and cons of consolidation of the ERP software industry.

> Enterprise systems may provide better information than nonintegrated systems for management decisions. Provide specific examples that support (or refute) this claim.

> Consider the business event–processing activity, entering a customer’s order. Identify the key business event data (who, what, where, and when) you would want to capture. (For an example of the event you may refer to F

> Find the most current listing of the AICPA’s or CPA Canada’s Top Technology Initiatives Survey. Research and write a paper on the accounting and business implications for the number one item on the list. Include any external pressures that may impact the

> Identify the skills required to be a forensic accountant. How does the knowledge of technology and AIS help enable or augment those skills?

> Find the most current listing of the AICPA’s or CPA Canada’s Top Technology Initiatives Survey. Compare the listing to prior years’ listings. Identify and discuss trends among the years. Your professor will tell you how long your paper should be.

> About three decades ago, in his first address as Chairman of the Board of the American Institute of Certified Public Accountants (AICPA), Robert K. Elliott said: Knowledge leveraging will shape a wide range of CPA services. CPAs will be able to identify

> The following is a brief description of the financial statement assertions from PCAOB Auditing Standards Section AU 326, Evidential Matter: A. Existence or occurrence: Assets or liabilities of the entity exist at a given date (existence) or recorded tran

> The following narrative describes the processing of customer mail orders at Eye-Dee-A-Pet, Inc.: Eye-Dee-A-Pet, Inc. is a small manufacturing operation engaged in the selling of digital identification chips that can be implanted into household pets, such

> Research the Internet, newspapers, magazines, and journals to find recent incidences of denial-of-service attacks on one or more Web sites. Develop a report (format and length to be determined by your instructor) providing a general overview of the incid

> The Tigris Company is considering taking customers’ orders on its Web site. a. What information would Tigris collect from the customer during this process? b. What information would need to come from Tigris’ Web and back-end systems to complete the order

> Research the Internet, newspapers, magazines, and journals to find recent incidences of outages of one or more Web sites. Develop a report (format and length to be determined by your instructor) providing a general overview of the incident(s), including

> Examine the last column in Table 8.2 (p. 280) for the following personnel only: access control officer, chief information officer (CIO), structural security/disaster recovery manager, testing/quality assurance, and database administrator. For each of the

> AS5 outlines the processes for “An Audit of Internal Control over Financial Reporting That Is Integrated with an Audit of Financial Statements.” Paragraph 24 of this document lists eight entity-level controls. Entity-level controls are comparable to the

> Personnel at C&P Company must perform the following functions: 1. Receive checks and remittance advice from customers. 2. Approve vendor invoices for payment and prepare checks. 3. Approve credit memoranda for customer sales returns. 4. Record collection

> Assume that accounts payable are processed on a computer and that the options in the accounts payable system module are as follows: 1. Maintain vendor master data (i.e., add, change, or delete vendors in the vendor master data). 2. Record vendor invoices

> The following is a list of 13 control plans from this chapter, followed by a list of 10 situations that have control implications. Match the 10 situations with the control plan that would best prevent the system failure from occurring. Because there are

> Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could

> The following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. a. Criminals posing as small business owners obtai

> Figure 7.8: depicts the adaptation of a sample control matrix from a PricewaterhouseCoopers guide for Section 404 of the Sarbanes-Oxley Act of 2004.28 We have added some data from the Suprina Company example to the first row of the matrix. Compare the

> The CFO of PKD Corporation is very uncomfortable with its current risk exposure related to the possibility of business disruptions. Specifically, PKD is heavily involved in E-business, and its internal information systems are tightly interlinked with its

> After the core of an ERP system has been implemented, any of the modules may then be implemented separately. What is the implication of being able to implement an ERP system on a piece-by-piece basis?

> In the following first list are 10 examples of the items described in the second list. Match the two lists by placing the capital letter from the first list on the blank line preceding the description to which it best relates. You should have two letters

> Following is a list of eight generic control goals from the chapter, followed by eight descriptions of either process failures (i.e., control goals not met) or instances of successful control plans (i.e., plans that helped to achieve control goals). List

> Conduct research to determine management’s responsibility for establishing and maintaining an adequate system of internal control. Create a written report, in a manner prescribed by your instructor, describing applicable statutory and professional guidan

> Match the concept in List 1 with the definition or description in List 2. There is only one correct or best answer for each match. Therefore, you should have two letters left over from List 1. List 1—Concepts A. Application (i.e., automated) control B. C

> The following E-R diagram (Figure 6.19) Figure 6.19: Represents students registering for classes for a single semester. Assume that the Registration table can hold a complete history of each individual student’s registration events.

> Using the REA model in Figure 6.18 (pg. 222) Figure 6.18: And your answers to Discussion Questions 6-2, 6-3, and 6-4, create a database for HIS in the software package of your choice. This will require that you do the following: a. Create tables for

> This problem is a continuation of Problem 6-3 but requires use of a spreadsheet package that is capable of reading data from your database package (e.g., Excel can import data from an Access database). a. Using your spreadsheet package, construct SQL que

> Note: This problem is a continuation of Problem 6-3 but requires access to the Internet, a site for posting the database on the Web, and an understanding of Internet access. a. Take the database developed in Problem 6-3 and place it on the Internet (or y

> Using the information from Figure 6.12 (pg. 212) and Figure 6.13 create the database in the software package of your choice. This will require three steps: Implement the relations from Figure 6.13. Insert the data from Figure 6.13 into the relational tab

> Human Resources department needs the work time, vacation time, and sick time for Greg Kinman (see the EMPLOYEE table in Figure 6.13). What SQL command(s) would you use to extract this information from the tables in Figure 6.13?

> To be of any value, a modern information process must assist all levels of management.” Discuss.

> What SQL command(s) would you use to add the date on which an employee was hired to the EMPLOYEE table represented in Figure 6.13 (pg. 213)? Name this new attribute Employment_Date. Assume that the employees were hired on the following dates, using a yea

> Transform the database structure that appears in Figure 5.15 into 3NF. Be sure to show your intermediate steps of 1NF and 2NF.

> This problem asks you to research the literature for applications of intelligent systems. Your instructor will guide you regarding the number of pages required for each part. a. Develop a paper that outlines the use of ES in accounting and tax applicatio

> Review the E-R diagram in Figure 5.14 (pg. 189) and: a. List the resources, events, and agents that are represented as entities in this diagram. b. Write a description for each of the six relationships in the diagram. In your description, include the car

> A local accounting firm that is growing rapidly has asked for your help. The firm has four partners who are primarily responsible for developing new business. In addition to developing new business, the partners are very busy with their management tasks,

> Use the database structure and sample data in Figure 5.10 to: a. Combine the tables to obtain a complete record of orders and shipments. Obtain a printout of the algorithm(s) used to combine the tables and a printout of the list of these records. b. Writ

> Using the database structure and sample data in Figure 5.10 (pg. 169) as a starting point (rather than Figure 5.2), complete the requirements of Problems 5-1 through 5-3 (or whatever portions of those problems your instructor may indicate).

> Note: This problem is a continuation of Problem 5-1. a. Write a “program” to enter customer order amounts into the database and to have the system either warn the user if the new order places the customer over his or her credit limit or advise the user i

> a. “Search” the database for all customers with a specific state (choose a state that is common to at least two but not to all of your customers). Obtain a printout of your search algorithm and a list of customers whose records met the search parameter.

> Using a spreadsheet (e.g., Excel), design a decision aid to help you complete the following task. You are looking for a new apartment and decided to go through a realtor instead of shopping for the apartment through advertisements. Avbel Realty provided

> Describe two structured decisions and two unstructured decisions. Discuss the relative amount of structure in each decision.

> Use the Internet to research knowledge management systems. Specifically, (1) find one example of a knowledge management system, (2) identify the provider or vendor, (3) provide the Web site URL, and (4) list the features of the system found that help an

> Technology Summary 5.2 (pp. 159–160) uses examples of employee ID codes to illustrate five data coding types. Refer to those examples. Create student ID codes that illustrate each of the five coding schemes. Discuss the strengths and weaknesses of each e

> Use the Internet to research the database integration features of an ERP software package and a CRM software package. The number of pages will be indicated by your instructor. a. Learn about the ERP products of SAP and the CRM products of Oracle’s Siebel

> Figure 5.16 (pg. 191) is a sample from a spreadsheet used to record donors for a small college. You have been asked to design and implement a database to allow easy inputting, updating, and reporting of contribution data. Figure 5.16: a. Transform the

> Before starting this problem, you should consult the customer master data record layout in Figure 5.2 (pg. 148). Figure 5.2: Using the database software indicated by your instructor: a. Create the “structure” for th

> The chapter describes how a batch processing system works with a used book shop as an example. Looking at Figure 3.2 and its description of how the system works, identify another type of business that might use a similar batch processing system, and desc

> Use the Internet to locate www.cia.gov and www.Amazon.com. Find the privacy and security policies for each. Compare and contrast the use of privacy statements, encryption, SSL, and cookie policies.

> Using the Internet, find and describe an Internet market exchange or Internet auction market. Your discussion should include the products and services available and the type of buyers and sellers you expect to participate. If you choose a private market,

> Explain how EDMhas been (or could be) used in your AIS class to eliminate all paper flow between the students and professor. Include in your explanation what technologies were (would be) necessary to enable your plan. (Your professor will direct you rega

> Develop a research paper on the use of the Internet to support EDI between companies. Your paper should consider how companies set up communications over the Internet to maintain the same security and standardization that are achieved using VANs for non-

> Comparing relevance and reliability, which information quality is most important? Support your answer with examples.

> Identify a business venture that you believe could be successful using only Internet commerce. Explain how you would design your Web page, how you would capture business event data, and the mode of processing you would use. Provide a report detailing sup

> Consider a business you might want to start on the Internet using e-mail to communicate with customers and capture business data. Explain why e-mail would be a good approach for your business. Draft a brief business plan evaluating the advantages and dis

> Technology Summary 3.4 briefly describes cloud computing. Write a report on the opportunities and concerns relating to a company using the cloud for mission critical software applications. (Your professor will direct you regarding the length of the repor

> Using the four methods of conducting E-business (e-mail, EDM, EDI, and Internet commerce), select a business of your choice and describe how each method is currently integrated into their business or how each method could be incorporated into their busin

2.99

See Answer