Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Presented below is a list of internal controls, labeled a-p. These controls are commonly implemented in a firms AIS. Below the list is a definition

Presented below is a list of internal controls, labeled a-p. These controls are commonly implemented in a firms AIS. Below the list is a definition or description of a variety of internal controls, labeled 1-11 Match each number with the letter of the control that best fits the definition or description. You may use a control more than once.

a. Access control b. Application control. c. Backup

d. Data type test. e. Detective control. f. Distribution log

g. Encryption. h. Fire control. i. Hash total

j. Internal control. k. Output control. l. Biometrics control

m. Range test. n. Firewall. o. Redundant data check

p. Relationship check (analytical review)

1. When a catastrophe destroys accounting data and files, this control ensures continuation of business operations.

2. A control that scrambles the contents of a file to make it unreadable to an unauthorized user.

3. This test determines whether a data field contains only proper characters or numbers. For example, assume that a five-digit field should contain all numbers but that one of the symbols in the field is a letter. An error message would indicate that an incorrect character exists in the field.

4. A test that specifies both a lower and upper limit; for example, employees should be between the ages of 21 and 65.

5. A check applied to various data items to determine if the relationships among the data elements are normal or expected.

6. A control that must be implemented for each automated accounting application.

7. A procedure to identify errors and irregularities after they have occurred.

8. A check of a persons fingerprint or iris against a table of access privileges that indicate the transactions the person is authorized to process.

9. This control ensures that reports are distributed to personnel authorized to receive them.

10. An internal control to prevent an individual from accessing a file that he or she is unauthorized to access.

11. One of the purposes is to ensure that the organizations operations are efficient and effective

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Understanding And Practice

Authors: Robert Perks

3rd Edition

0077124782, 9780077124786

More Books

Students also viewed these Accounting questions

Question

When do I give in to my bad habit?

Answered: 1 week ago

Question

What is the use of bootstrap program?

Answered: 1 week ago

Question

What is a process and process table?

Answered: 1 week ago

Question

What is Industrial Economics and Theory of Firm?

Answered: 1 week ago