Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The following is a list of 12 control plans from this chapter, followed by a list of 10 examples of System Failures or problem situations

The following is a list of 12 control plans from this chapter, followed by a list of 10 examples of System Failures or problem situations that have control implications: Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Because there are 12 control plans, you should have two letters left over.

Control Plans

  1. Batch sequence check

  2. Confirm input acceptance

  3. Programmed edit checks

  4. Manual agreement of batch totals

  5. Online prompting

  6. Cumulative sequence check

  7. Electronic approvals

  8. Document design

  9. Procedures for rejected inputs

  10. Compare input data with master data

  11. Turnaround documents

  12. Digital signatures

System Failures

  1. At Wynne Company, customer orders are received in the mail in the sales department, where clerks enter individual orders into the companys computer system and then file the completed orders in a filing cabinet. Customers should receive an acknowledgement for each of their orders. When the customer fails to receive an acknowledgement, the customer calls to inquire. Inevitably, the sales clerk will find the customers order filed with other customer orders that had been entered into the computer. The missing orders are always marked as ENTERED.

  2. The tellers at Mason Bank have been having difficulty reconciling their cash drawers. All customer transactions such as deposits and withdrawals are entered online at each teller station. At the end of the shift, the computer prints a list of the transactions that have occurred during the shift. The tellers must then review the list to determine that their drawers contain checks, cash, and other documents to support each entry on the list.

  3. Data entry clerks at Dora Company use networked PCs to enter batches of documents into the computer. Recently, a number of errors have been found in key numeric fields. The supervisor would like to implement a control to reduce the transcription errors being made by the clerks.

  4. At Central Inc., clerks in the accounting offices of the companys three divisions prepare prenumbered general ledger voucher documents. Once prepared, the vouchers are given to each offices data entry clerk, who keys them into an online terminal. The computer records whatever general ledger adjustment was indicated by the voucher. The controller has found that several vouchers were never recorded, and some vouchers were recorded twice.

  5. Purchase orders at Hickory Corp. are prepared online by purchasing clerks. Recently, the purchasing manager discovered that many purchase orders are being sent for quantities far greater (i.e., incorrect quantities) than would normally be requested.

  6. At Quality Brokers, Inc., a clerk on the trading floor mistakenly entered the dollar amount of a trade into the box on the computer screen reserved for the number of shares to be sold and then transmitted the incorrect trade to the stock exchanges computer.

  7. At Pilot Company, clerks in the cash applications area of the accounts receivable office open mail containing checks from customers. They prepare a remittance advice (RA) containing the customer number, invoice numbers, amount owed, amount paid, and check number. Once prepared, the RAs are sent to a clerk who keys them into the computer. The accounts receivable manager has been complaining that the RA entry process is slow and error-prone.

  8. Dancer Company enters shipping notices in batches. Upon entry, the computer performs certain edits to eliminate those notices that have errors. As a result, many actual shipments never get recorded.

  9. Jamie the hacker gained access to the computer system of United Bank and entered the data to transfer funds to his bank account in the Cayman Islands.

  10. At Lockhart Company., data entry clerks receive a variety of documents from many departments throughout the company. In some cases, unauthorized inputs are keyed and entered into the computer.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Theory Contemporary Accounting Issues

Authors: Thomas G. Evans

1st Edition

0324107846, 9780324107845

More Books

Students also viewed these Accounting questions