Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Identify which IT Application Controls would best mitigate the threats outlined. Expand upon your answer to analyze the relationship among risk/opportunity/control. Also consider how these

Identify which IT Application Controls would best mitigate the threats outlined. Expand upon your answer to analyze the relationship among risk/opportunity/control. Also consider how these scenarios could be detected by an audit internal or external.

Which types of input controls would mitigate the following threats?

  1. Posting the amount of a sale to a customer account that does not exist.
  2. A Customer entering too many characters into the five-digit zip code while making an online purchase, causing the server to crash.
  3. An interns pay rate was entered as $150 per hour, not $15 per hour.
  4. Approving a customer order without the customers address so the order was not shipped on time.
  5. Entering the contract number of a critical contract as 13688 instead of 16388, which is a serious mistake for the company.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditors Letter Handbook

Authors: American Bar Association Business Law Section

2nd Edition

161438973X, 978-1614389736

More Books

Students also viewed these Accounting questions

Question

Find Z for the network shown. -j1Q j20 -j40 j40 to 2.

Answered: 1 week ago