4.99 See Answer

Question: The information technology (IT) department at


The information technology (IT) department at Jacobsons, Inc., consists of eight employees, including the IT manager, Melinda Cullen. Cullen is responsible for the day-to-day oversight of the IT function and reports to Jacobsons’ chief operating officer (COO). The COO is a senior vice president responsible for the overall retail operations who reports directly to the president and chief executive officer. The COO attends board of director meetings to provide an update of key operating performance issues.
Because Cullen takes an active role in managing the IT department, the COO rarely discusses IT issues with the board or CEO. Cullen and the COO identify hardware and software needs and are authorized to approve those purchases.
In addition to Cullen, the IT department is composed of seven other individuals: three programmers, three operators, and one data control clerk. Cullen has been employed by Jacobsons for 12 years, working her way up through various positions in the department. Fortunately, she has been able to retain a fairly stable staff and has experienced minimal turnover. All IT personnel have been employed in their current positions since mid-2012. When hiring personnel, Cullen does extensive background checks on prospective employees, including reference, credit, and criminal checks. Cullen has developed a trust with each employee and, as a result, delegates extensively to each individual. This is especially beneficial because Cullen spends most of her time working with user departments in a systems analyst role, identifying changes needed to existing applications. She conducts weekly IT departmental meetings on Tuesday mornings. Each staff member attends, including night operators, to discuss issues affecting the performance of the department.
The three programmers are responsible for maintaining and updating systems and application software. The lead programmer is responsible for assigning duties among the programming staff. All three programmers have extensive experience with the operating, utility, security, and library software as well as all of Jacobsons’ application software packages. Programming assignments are made based on who is least busy among the programming staff at the time. This method of management keeps all programmers familiar with most software packages in use at Jacobsons and keeps programmers excited about the job tasks because of the variety of assignments they receive. Cullen encourages each programmer to take continuing education courses to keep current with the latest technical developments. In addition to programming responsibilities, the programming staff maintains the library of programs and data tapes, which is located in a locked room nearby. The programming staff maintains extensive logs of tape use and of changes made to program files.
The three operators consist of a day operator and two night operators. Most of the applications are based on online inputting from various user departments for batch processing overnight. Thus, the heaviest volume of processing occurs during the night shift, although there is some daytime processing of payroll and general ledger applications. All operators are responsible for monitoring the operation of the equipment and correcting system-caused errors. In addition, they do routine monthly backup procedures. The computer operators have programming experience with the program language used in application programs. Occasionally, when a small change is identified for an application program, Cullen asks the day shift operator to implement that change to avoid overburdening the programming staff.
Operators follow the production schedule prepared by Cullen, who consults with user departments to develop the schedule. The day shift operator reviews the job processed log (which chronologically details the jobs processed) generated at the end of the previous night shift for deviations from the schedule, and the lead night shift operator reviews the job processed log generated at the end of the previous day shift for deviations from the schedule. If jobs processed reconcile to the job schedule, the job processed log is discarded. When there are deviations, the operator doing the review leaves a copy for Cullen, highlighting the deviation. Before doing batch processing jobs, the operators generate an input listing report that summarizes the number of online input entries submitted during the day for processing. This number is recorded and then later compared by the operators with the computer output generated after batch processing and file updating occur.
This provides a check figure of the number of transactions processed. When the numbers agree, the output is submitted to the data control clerk. When the numbers disagree, the operators identify the error and resubmit the application for processing.
The data control clerk collates all computer output, including output reports and exception listings. The data control clerk reviews exception reports and prepares correction forms for reprocessing. Examples of changes that the data control clerk might make include correcting inputting errors (for example, amounts accidentally transposed) and preparing change request forms for changes to existing master files (examples include revising sales price lists and inventory product numbers in the sales master file and adding new employee names, addresses, and identification numbers to the payroll master file). After all corrections are made, the data control clerk distributes all computer output to the various user departments. User departments have high regard for the IT staff. Output reports are reconciled to input reports by users on a test basis quarterly. You are the senior auditor assigned to the audit of Jacobsons. The audit partner has asked you to assist in doing the IT general controls review. The partner has asked you to review this narrative information and respond to the following questions:

Required:
1. What controls and deficiencies exist in the lines of reporting from IT to senior management? If you note any deficiencies, provide recommendations that can be included in the management letter.
2. What is your assessment of how Melinda Cullen fulfills her IT management responsibilities? Identify tasks that she does that strengthen the department. Which of her tasks cause you concern? What changes in her day-to-day responsibilities would you make?
3. What is your assessment of the programming function at Jacobsons? What are the strengths? What are the deficiencies? Make recommendations for improvement.
4. What is your assessment of the IT operations function at Jacobsons? What are the strengths? What are the deficiencies? Make recommendations for improvement.
5. What is your assessment of the data control function at Jacobsons? What are the strengths? What are the deficiencies? Make recommendations for improvement.
6. Make recommendations for improving controls over the involvement of users. Required



> What is a functional consequence of RNA editing?

> What features of the structure of DNA enable it to be replicated?

> What is the function of the nuclear matrix?

> Describe the distinguishing features of the solenoid and zigzag models.

> What is the diameter of a nucleosome?

> What are two reasons for the wide variation in genome sizes among eukaryotic species?

> What are some differences between the types of sequences found in eukaryotic chromosomes versus bacterial chromosomes?

> In your own words, describe the step that requires the use of ATP.

> Why is strand separation beneficial?

> How many nucleoids are in this bacterial cell? 0.3 um

> Would you expect to find active genes in regions of heterochromatin or euchromatin?

> Explain why release factors are called “molecular mimics”.

> What is a chromosome territory?

> What types of sequences constitute most of a bacterial genome?

> What are the base-pairing rules for RNA?

> What types of bonds hold nucleotides together in an RNA strand?

> What are the structural differences between B DNA and Z DNA?

> Describe the major and minor grooves.

> What holds the DNA strands together?

> Which components of nucleotides form the backbone of a DNA strand?

> Which of these components of nucleotides are not found in DNA?

> What was the purpose of adding RNase or protease to a DNA extract?

> What is the role of peptidyl transferase during the elongation stage?

> Explain why a triploid individual is usually infertile.

> What are some common advantages of polyploidy in plants?

> Approximately how many copies of chromosome 2 are found in a polytene chromosome in Drosophila?

> Describe the imbalance in gene products that occurs in an individual with monosomy 2.

> Explain why the mouse in part (d) died.

> What adjectives can be used to describe a fruit fly that has a total of seven chromosomes because it is missing one copy of chromosome 3?

> Explain why these chromosomes form a translocation cross during prophase of meiosis I.

> If these segregation patterns are equally likely, what is the probability that a gamete produced by the individual who carries the translocated chromosome will result in a viable offspring with a normal phenotype?

> Which of these two mechanisms might be promoted by the presence of the same transposable element in many places in a species’ genome?

> Explain why these homologous chromosomes can synapse only if an inversion loop forms.

> Why does a bacterial mRNA bind specifically to the small ribosomal subunit?

> In this example, what is the underlying cause of nonallelic homologous recombination?

> Why is a chromosomal fragment without a centromere subsequently lost and degraded?

> Which of these changes in chromosome structure alter the total amount of genetic material?

> Why is it useful to stain chromosomes?

> Transduction is sometimes described as a mistake in the bacteriophage reproductive cycle. Explain how it can be viewed as a mistake.

> Which of these two genes is closer to the origin of transfer?

> Why is the scale of this map in minutes?

> With regard to the timing of conjugation, explain why the recipient cell at the top right is pro−, whereas the recipient cell in the bottom right is pro+.

> How is an F′ factor different from an F factor?

> What are the functions of relaxase, coupling factor, and the exporter in the process of conjugation?

> Explain how mRNA plays a role in all three stages of translation.

> Which disease occurs when homogentisic acid oxidase is defective?

> What is the role of the shipping document in invoicing customers? What are the most important management assertions related to customer billing?

> Ann Donnelly is a senior audit manager in an East Coast office of a public accounting firm. Her prospects for promotion to partner are excellent if she continues to perform at the same high-quality level as in the past. Ann was recently married, and she

> Barbara Whitley had great expectations about her future as she sat in her graduation ceremony in May 2018. She was about to receive her Master of Accounting degree, and in the next week she would begin her career on the audit staff of Green, Thresher & C

> McClain Plastics has been an audit client of Belcor, Rich, Smith & Barnes, CPAs (BRS&B), for several years. McClain Plastics was started by Evers McClain, who owns 51 percent of the company’s stock. The balance is owned by about 20 stockholders, who are

> The Maguire Pharmaceutical Company, a drug manufacturer, has the following internal controls for billing and recording accounts receivable: 1. An incoming customer’s purchase order is received in the order department by a clerk who prepares a prenumbered

> Auditors develop overall audit plans to ensure that they obtain sufficient appropriate audit evidence. The timing and extent of audit procedures auditors use is a matter of professional judgment, which depends upon a number of factors. Decisions about th

> The following are examples of audit procedures: 1. Watch employees count inventory to determine whether company procedures are being followed. 2. Count a sample of inventory items and record the amount in the audit files. 3. Calculate the ratio of sales

> Most grocery stores use bar code scanning technologies that interface with cash registers used to process customer purchases. Cashiers use the scanners to read bar code labels attached to each product, which the system then uses to obtain unit prices, ca

> Discuss changes in accounting and business operations over the last decade that have increased the need for independent audits.

> The following are audit procedures from different transaction cycles: 1. Examine sales invoices for evidence of internal verification of prices, quantities, and extensions. 2. Select items from the client’s perpetual inventory records and examine the ite

> The following are audit procedures from different transaction cycles: 1. Trace a sample of shipping documents to entry in the sales journal. 2. Examine a sample of warehouse removal slips for signature of authorized official. 3. Examine contract terms fo

> Internal controls 1 through 5 were tested in prior audits. Evaluate each internal control independently and determine which controls must be tested in the current year’s audit of the December 31, 2019, financial statements. Be sure to explain why testing

> This problem requires the use of ACL software, which can be accessed through the textbook website. Information about downloading and using ACL and the commands used in this problem can also be found on the textbook website. You should read all of the ref

> The SEC issues Accounting and Auditing Enforcement Releases (AAERs) summarizing SEC actions concerning civil lawsuits brought by the SEC in federal court and related settlements from administrative proceedings. Visit the SEC’s website (www.sec.gov) and l

> Following are 10 key internal controls in the payroll cycle for Gilman Stores, Inc. Key Controls 1. To input hours workedpayroll accounting personnel input the employee’s identification number. The system does not allow input of hours worked for invalid

> The following are independent situations for which you will recommend an appropriate audit report on internal control over financial reporting as required by PCAOB auditing standards: 1. During interim testing, the auditor identified and communicated to

> Anthony Liu, CPA, prepared the flowchart on the next page that portrays the raw materials purchasing function of one of Anthony’s clients, Medium-Sized Manufacturing Company, from the preparation of initial documents through the vouching of invoices for

> Mark Hopper is planning the audit of the investments account for audit client Garden Supply Co. (GSC). GSC invests excess cash at the end of the summer sales season through an investment manager who invests in equity and debt securities for GSCâ&#1

> This problem requires the use of ACL software, which can be accessed through the textbook website. Information about downloading and using ACL and the commands used in this problem can also be found on the textbook website. You should read all of the ref

> What is the role of the Public Company Accounting Oversight Board (PCAOB)? How does the PCAOB provide oversight of audit firms?

> The following audit procedures are included in the audit program because of heightened risks of material misstatements due to fraud. 1. Use audit software to search purchase transactions to identify any with nonstandard vendor numbers or with vendor name

> Your new audit client, Hardwood Lumber Company, has a computerized accounting system for all financial statement cycles. During planning, you visited with the information systems vice president and learned that personnel in information systems are assign

> This problem requires you to access PCAOB Auditing Standards (pcaobus.org) to answer each of the following questions. You can access those standards by viewing content found under the link “Standards.” Review PCAOB auditing standards related to the audit

> The following are misstatements that can occur in the sales and collection cycle: 1. A customer order was filled and shipped to a former customer, which had already filed for bankruptcy. 2. For a sale, a data entry operator erroneously failed to enter th

> The division of the following duties is meant to provide the best possible controls for the Meridian Paint Company, a small wholesale store: †1. Approve credit for customers included in the customer credit master file. †2. Input shipping and billing info

> The following are misstatements that have occurred in Fresh Foods Grocery Store, a retail and wholesale grocery company: 1. On the last day of the year, a truckload of beef was set aside for shipment but was not shipped. Because it was still on hand, the

> The following are internal controls related to various cycles. 1. Checks are signed by the company president, who compares the checks with the underlying supporting documents. 2. Sales invoices are matched with shipping documents by the computer system a

> Why is it important to distinguish the auditor’s assessment of the risk of material misstatement due to fraud from the assessment of the risk of material misstatement due to error?

> Indicate the four phases of the audit process. In which phase does the auditor perform tests of controls?

> What are the benefits derived from planning audits?

> Identify two examples of acts or behavior by CPAs that would be considered acts discreditable to the profession.

> An audit client is creating a Web-based sales ordering system for customers to purchase products using personal credit cards for payment. Identify three risks related to an online sales system that management should consider. For each risk, identify an i

> Assume that Xinran Wang, CPA, is using 5 percent of net income before taxes, current assets, or current liabilities as her major guideline for evaluating materiality. What qualitative factors should she also consider in deciding whether misstatements may

> Compare the risks associated with network systems and database systems to those associated with centralized IT functions.

> Identify the traditionally segregated duties in IT systems.

> Describe which two factors of the audit risk model relate to the risk of material misstatement at the assertion level.

> Explain how control risk assessment differs for an integrated audit versus a financial statement-only audit.

> What do auditing standards require the auditor to consider when assessing the risk of material misstatements in revenue?

> What is the primary focus of the monitoring component of internal control?

> What three auditor actions are required to address the potential for management override of controls?

> Describe the types of overall responses by auditors to address fraud risk.

> What is meant by the term quality control as it relates to a CPA firm?

> In addition to inquiring of individuals among management who are involved in financial reporting positions, such as the CFO and controller, which additional individuals should you consider making inquiries of as part of your risk assessment procedures? B

> Assume that you are concerned that your client has recorded revenues that did not occur. What audit objective would you assess as having a high risk of material misstatement?

> Identify the management assertion and general balance-related audit objective for the specific balance-related audit objective: Read the fixed asset footnote disclosure to determine that the types of fixed assets, depreciation methods, and useful lives a

> Describe the types of information that should be included in the auditor’s working papers as evidence of the auditor’s fraud assessment procedures.

> The following is an example of a CPA firm’s quality control procedure requirement: “Any person being considered for employment by the firm must have completed a basic auditing course and have been interviewed and approved by an audit partner of the firm

> Explain why liquidity activity ratios ratios are useful to auditors.

> Describe examples of characteristics of transactions and balances that might cause an auditor to determine that a risk of material misstatement is a significant risk.

> Auditing standards require that the engagement team members engage in discussion about the susceptibility of the financial statements to the risk of fraud. How does this discussion relate to the required discussion about the risk of material misstatement

> Auditing standards require that the engagement team members engage in discussion about the risk of material misstatement. Describe the nature of this required discussion and who should be involved.

> Why is it important for the auditor to consider the risk of material misstatement at the overall financial statement level?

> This problem requires the use of ACL software, which can be accessed through the textbook website. Information about downloading and using ACL and the commands used in this problem can also be found on the textbook website. You should read all of the ref

> For how long does the Sarbanes–Oxley Act require auditors of public companies to retain audit documentation?

4.99

See Answer