Question

In: Accounting

The following is a list of 10 control plans from Chapter 8. These are followed by...

The following is a list of 10 control plans from Chapter 8. These are followed by a list of 10 B/AR/CR business process controls or deficiencies. Match the 10 B/AR/CR business process control plans with a pervasive control plan from Chapter 8 that could prevent the deficiencies noted in the preceding list or have an impact on the successful execution of the business process control.

Match letters A-J to numbers 1-10

A. Controls for physical and logical access to accounts receivable master data to prevent, for example, unauthorized deletion of open invoices.
B. Segregate cashier who processes cash receipts from treasurer.
C. Segregate controller functions (recordkeeping for AR) from treasurer functions (custody of cash).
D. Access control software (i.e., assignment of access rights to employees)
E. Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs.
F. Segregate marketing (i.e., authorization of prices) from billing (i.e., authorization of changes to the billing process and programs)
G. Selection, hiring, and supervision of billing clerks to ensure that they can
and do carry out their assigned responsibilities.
H. Segregate payment applications clerks from AR clerks who resolve
customer complaints
I. Controls for physical and logical access to sales order master data to prevent, for example, unauthorized deletion of open sales orders.
J. Preventive maintenance of computer hardware to ensure reliability and availability.
1. Treasurer reconciles bank accounts regularly.
2. Monthly statements are printed in the accounts receivable department and mailed to customers.
3. Cash receipts are reviewed to determine that the customer has taken the appropriate discounts. Exceptions are routed via workflow to the supervisor of AR for electronic approval. Sales clerks have been able to approve the taking of unauthorized discounts.
4. Each day, the computer processes the open sales orders to identify those that have been shipped but not yet billed. This list is presented to the billing clerk for action. Occasionally, the billing clerk does not bother to follow up on open sales orders, and invoices are not sent out in a timely manner.
5. Periodically, the billing program identifies open sales orders (shipped but not billed) and prepares and sends invoices. To prevent some invoices from being sent, someone in the organization has changed certain sales orders to indicate that they are closed.
6. When an invoice is prepared, the computer should employ authorized prices, terms, freight, and discounts. Frequent customer complaints
include incorrect prices on invoices. Research determines that billing clerks are changing authorized prices prior to billing.
7. Prior to releasing a batch of invoices, the billing clerk compares the batch totals of the shipments to be billed to the totals prepared by the computer at the end of the invoicing process. The computer totals are often incorrect.
8. Upon receipt in the mailroom, checks are forwarded to the cashier and
RAs are sent to the cash applications clerks.
9. The computer prepares an aging of open invoices, and accounts receivable clerks follow up on overdue balances.
10. Turnaround documents (e.g., RAs) are used to record customer payments. The scanner often does not read the remittance data correctly.

Solutions

Expert Solution

The matching of deficiencies and Business process control plans are as below:

Column A Column B
1. Treasurer reconciles bank accounts regularly. B. Segregate cashier who processes cash receipts from treasurer.
2. Monthly statements are printed in the accounts receivable department and mailed to customers. H. Segregate payment applications clerks from AR clerks who resolve
customer complaints
3. Cash receipts are reviewed to determine that the customer has taken the appropriate discounts. Exceptions are routed via workflow to the supervisor of AR for electronic approval. Sales clerks have been able to approve the taking of unauthorized discounts. D. Access control software (i.e., assignment of access rights to employees)
4. Each day, the computer processes the open sales orders to identify those that have been shipped but not yet billed. This list is presented to the billing clerk for action. Occasionally, the billing clerk does not bother to follow up on open sales orders, and invoices are not sent out in a timely manner. G. Selection, hiring, and supervision of billing clerks to ensure that they can and do carry out their assigned responsibilities.
5. Periodically, the billing program identifies open sales orders (shipped but not billed) and prepares and sends invoices. To prevent some invoices from being sent, someone in the organization has changed certain sales orders to indicate that they are closed. I. Controls for physical and logical access to sales order master data to prevent, for example, unauthorized deletion of open sales orders.
6. When an invoice is prepared, the computer should employ authorized prices, terms, freight, and discounts. Frequent customer complaints
include incorrect prices on invoices. Research determines that billing clerks are changing authorized prices prior to billing.
F. Segregate marketing (i.e., authorization of prices) from billing (i.e., authorization of changes to the billing process and programs)
7. Prior to releasing a batch of invoices, the billing clerk compares the batch totals of the shipments to be billed to the totals prepared by the computer at the end of the invoicing process. The computer totals are often incorrect. E. Systems development life cycle (SDLC), including testing and approval before implementation of new or revised programs.
8. Upon receipt in the mailroom, checks are forwarded to the cashier and
RAs are sent to the cash applications clerks.
C. Segregate controller functions (recordkeeping for AR) from treasurer functions (custody of cash).
9. The computer prepares an aging of open invoices, and accounts receivable clerks follow up on overdue balances. A. Controls for physical and logical access to accounts receivable master data to prevent, for example, unauthorized deletion of open invoices.
10. Turnaround documents (e.g., RAs) are used to record customer payments. The scanner often does not read the remittance data correctly. J. Preventive maintenance of computer hardware to ensure reliability and availability.

Related Solutions

The following is a list of 12 control plans from this chapter, followed by a list...
The following is a list of 12 control plans from this chapter, followed by a list of 10 examples of System Failures or problem situations that have control implications: Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Because there are 12 control plans, you should have two letters left over. Control Plans A. Batch sequence check B. Confirm input acceptance C. Programmed edit checks D. Manual agreement of batch totals...
The following is a list of 12 control plans from this chapter or from Chapters 8...
The following is a list of 12 control plans from this chapter or from Chapters 8 and 9. These are followed by a list of 10 statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency. Match the 10 control goals or system deficiencies with a control plan that would best prevent the system failure from occurring. Because there are 12 control plans, you should have two letters left over. Control Plans A....
The following is a list of 12 control plans from this chapter or from Chapters 8...
The following is a list of 12 control plans from this chapter or from Chapters 8 and 9. These are followed by a list of 10 system failures that have control implications. Match the 10 system failures with a control plan that would best prevent the system failure from occurring. Write one or two sentences explaining each answer. Because there are 12 control plans, you should have two letters left over. Control Plans A. Enter customer order close to where...
The following is a list of six control plans, and these are followed by a list...
The following is a list of six control plans, and these are followed by a list of five definitions or descriptions of control plans. Match the five definitions or descriptions with a control plan that best matches the definition. Because there are six control plans, you should have one letter left over. Control Plans A. Limit checks B. Tickler files C. Public key cryptography D. Compare input data with master data E. One-for-one checking F. Manual reconciliation of batch totals...
The following is a list of six control plans from this chapter or from Chapter 9....
The following is a list of six control plans from this chapter or from Chapter 9. These are followed by a list of six statements describing either a control goal or a system deficiency. Match the five control goals or system deficiencies with a control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over. Control Plans A. One-for-one checking of the goods, picking ticket, and sales...
The following is a list of 10 control plans and ten statements describing either the achievement...
The following is a list of 10 control plans and ten statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the letter of the best control plan to achieve the desired goal or to address the system deficiency described. A letter should be used only once. a.Compare input shipping notice to sales order master data b.Review shipped not billed sales orders (tickler file) c.Immediately endorse incoming checks...
True or false 1. the control function gathers feedback to ensure that plans are being followed....
True or false 1. the control function gathers feedback to ensure that plans are being followed. 2. when the benefits of a potential decision are greater than the cost, the decision should usually be made. 3. decision making involves making a selection among competing alternatives 4.period cost involve direct: materials, director labor, and manifacturing overhead. 5. a good example of a cost diverter production labor wages is the number of machine hours 6. a fixed cost changes in direct proportion...
Given the following list of data, what is the five-number summary? 5, 5, 8, 8, 10,...
Given the following list of data, what is the five-number summary? 5, 5, 8, 8, 10, 12, 12, 13, 13, 14, 15
1)Four approaches to internal control documentation are discussed in this chapter. List the advantages and disadvantages...
1)Four approaches to internal control documentation are discussed in this chapter. List the advantages and disadvantages of each. How would documentation assist the auditor to identify the strengths and weaknesses of an entity’s system of internal controls? 2) If an auditor identifies an internal control weakness for an assertion, how does it affect the audit strategy? If the auditor identifies an internal control strength for an assertion, how does it affect the audit strategy?
8. What are control activities? 9. Give the different types of control activities. 10. Why is...
8. What are control activities? 9. Give the different types of control activities. 10. Why is it necessary to monitor controls? 11. What are the inherent limitations of internal controls? 12. Enumerate, in chronological order, the steps followed in the study and evaluation of internal controls. Explain each step briefly.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT