Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Personnel development control plans Choose] [Choose Sydney, the computer operator, did not want to go to work one day because he wanted to go sailing.

image text in transcribedimage text in transcribed

Personnel development control plans Choose] [Choose Sydney, the computer operator, did not want to go to work one day because he wanted to go sailing. He gave his ID card to his cousin Vinny who went to work for him. Even though he was a computer Sally is the inventory control/warehouse clerk at Techtron Inc. She has been stealing secret computer components from the warehouse, selling them to foreign agents, and covering up her thefts by At Maralee Company, there seems to be a lack of progression from lower to middle management.Edward, the director of personnel, believes that the people being hired have great potential, but the The controller at Infotech, Inc. has just completed an analysis of personnel costs and believes that the cost associated with training new personnel is too high. She attributes this high cost to the incr One of the inventory control programs at Excess Company has been ordering more inventory than is required, causing an overstock condition on many items. During an investigation of the problem Mary had become quite unhappy with her job at Funk, Inc. She knew that she was going to quit soon and decided to destroy some computer files. Using her own username and password, she found s When the hurricane hit the coast, Sogsy Records Company lost the use of its flooded computer room. In such cases, plans called for using an alternate computer center 100 miles inland. However, So Roger, the night-shift computer operator, has had occasion several times in the last month to call his supervisor to receive assistance over the telephone to correct a problem that he was having in o Paul the programmer has modified the accounts receivable statement program so that the receivables from his cousin Peter will be eliminated from the accounts receivable master file upon printing All the files were lost at the Stoughton Company when a visitor sat down at a computer terminal, signed on using one of the passwords posted on the computer terminals, and erased some of the dat Operations run manuals Disaster recovery plans Program change controls The first list below contains 10 control plans. The second list describes 10 system failures that have control implications Requirecd On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. If you can't find a control that will prevent the failure, then choose a detective or a corrective plan. A plan should be used only once. Personnel development control plans Choose ] Operations run manuals Choose ] Disaster recovery plans Choose ] Program change controls Choose ] Physical control plans Choose ] Segregation of systems development and Choose ] programming from computer operations Retention control plans Choose ] Restriction of physical access to computer Choose ] resources Segregation of recording events from Choose ] safeguarding resources Biometric identification system Choose ] Personnel development control plans Choose] [Choose Sydney, the computer operator, did not want to go to work one day because he wanted to go sailing. He gave his ID card to his cousin Vinny who went to work for him. Even though he was a computer Sally is the inventory control/warehouse clerk at Techtron Inc. She has been stealing secret computer components from the warehouse, selling them to foreign agents, and covering up her thefts by At Maralee Company, there seems to be a lack of progression from lower to middle management.Edward, the director of personnel, believes that the people being hired have great potential, but the The controller at Infotech, Inc. has just completed an analysis of personnel costs and believes that the cost associated with training new personnel is too high. She attributes this high cost to the incr One of the inventory control programs at Excess Company has been ordering more inventory than is required, causing an overstock condition on many items. During an investigation of the problem Mary had become quite unhappy with her job at Funk, Inc. She knew that she was going to quit soon and decided to destroy some computer files. Using her own username and password, she found s When the hurricane hit the coast, Sogsy Records Company lost the use of its flooded computer room. In such cases, plans called for using an alternate computer center 100 miles inland. However, So Roger, the night-shift computer operator, has had occasion several times in the last month to call his supervisor to receive assistance over the telephone to correct a problem that he was having in o Paul the programmer has modified the accounts receivable statement program so that the receivables from his cousin Peter will be eliminated from the accounts receivable master file upon printing All the files were lost at the Stoughton Company when a visitor sat down at a computer terminal, signed on using one of the passwords posted on the computer terminals, and erased some of the dat Operations run manuals Disaster recovery plans Program change controls The first list below contains 10 control plans. The second list describes 10 system failures that have control implications Requirecd On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. If you can't find a control that will prevent the failure, then choose a detective or a corrective plan. A plan should be used only once. Personnel development control plans Choose ] Operations run manuals Choose ] Disaster recovery plans Choose ] Program change controls Choose ] Physical control plans Choose ] Segregation of systems development and Choose ] programming from computer operations Retention control plans Choose ] Restriction of physical access to computer Choose ] resources Segregation of recording events from Choose ] safeguarding resources Biometric identification system Choose ]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

How To Audit The Process Based QMS

Authors: Dennis R. Arter, Charles A. Cianfrani, Jack West

1st Edition

0873895770, 978-0873895774

More Books

Students also viewed these Accounting questions