Question

In: Accounting

What IT controls should prevent/detect the following threats? Explain (5 marks) 1. The data entry clerk...

  1. What IT controls should prevent/detect the following threats? Explain

1. The data entry clerk mis-keys the customer number for a customer order, so the goods are sent to the wrong address and charged to the wrong customer.

2.An accounts payable clerk changes the bank details for a vendor to her own, enters a duplicate vendor invoice, and pays the amount to herself.

3.The sales system generates shipping documents as authority for shipment to customers, but some shipments are not invoiced to customers.

4.The computer program processing sales incorrectly calculates GST.

5.The data entry clerk entering vendor invoices for acquisitions keys a non-existing expense account number, and so no expense was debited for this invoice.

Solutions

Expert Solution

1. The mistake of entering wrong customer number can be corrected by providing space in the order form for entering the customer number twice and checking mistmatch between the two. Another method may be to programme the order form in such a way that it accepts manual entry of customer address and check it with the address details in the customer master data base corresponding to the costomer number entered. And ask for rentry if any mismatch found.

2. There needs to be proper authorisation for payments. The data entry clerks or accounts clerks should not be provided with access to alter the information. Access to the software should be provided only by means of passwords, and enable the routing of name of persons who make the entries . Establishing the above control measures will help to reduce such misappropriation of cash by accounting clerks.

3. The system should also have the function to check the customer order forms with shipping documents so that it can ensure and authorise that the shipment is made to the customer who have placed the order.

4.The computer programme should be corrected accordingly to calculate correct amount of GST.

5. The system should be reprogrammed so that it should automatically provide warning of entering non-exsting expense account number and prevent from continuing with the entry without entering the correct expense accounting number.

5.


Related Solutions

what it controls should prevent/detect the following threats? explain 1. The data entry clerk mis-keys the...
what it controls should prevent/detect the following threats? explain 1. The data entry clerk mis-keys the customer number for a customer order, so the goods are sent to the wrong address and charged to the wrong customer. 2.An accounts payable clerk changes the bank details for a vendor to her own, enters a duplicate vendor invoice, and pays the amount to herself. 3.The sales system generates shipping documents as authority for shipment to customers, but some shipments are not invoiced...
1. List some controls that reduce fraud risks. 2. Explain how you can detect fraud
  1. List some controls that reduce fraud risks. 2. Explain how you can detect fraud.
Explain briefly the 4 main threats to information privacy. What are cookies and what should individuals...
Explain briefly the 4 main threats to information privacy. What are cookies and what should individuals do about them. Describe the PLUS approach to ethical decision making.
1.   What is the system of internal controls? 2.  Explain five (5) limitations of the Internal Control...
1.   What is the system of internal controls? 2.  Explain five (5) limitations of the Internal Control System? 3. Your audit plan notes that you will be testing the system of internal controls for the ‘three Es’. Explain the ‘three Es’ 4. Why should an auditor place reliance in internal controls
Question 1 (8 marks) Consider each of the following situations: One of the mitigating controls that...
Question 1 Consider each of the following situations: One of the mitigating controls that you wish to rely on is that any increases in credit limits are authorised by the financial controller. The audit assistant checks the company’s policy manual and notes that this control procedure is required. He concludes that the control is operating effectively and can be relied on. A test of controls of 48 sales transactions was undertaken which resulted in four errors. The working papers noted...
QUESTION 1 ​ 5 MARKS What are “insolvent transactions”? Provide an example. Explain the “presumption of...
QUESTION 1 ​ 5 MARKS What are “insolvent transactions”? Provide an example. Explain the “presumption of insolvency”?. QUESTION 2 ​​​​​​​​​​5 MARKS Explain how lenders can secure their loans. Provide an example. Distinguish secured creditors and unsecured creditors. Provide an example of each. ​​​​​​ QUESTION 3 ​​​​​​​​​5 MARKS How are shares in a company transferred? Provide an example. Explain the steps involved to transfer shares in ‘listed’ companies.​​ ​​​ QUESTION 4 ​​​​​​​​​5 MARKS Explain the differences between debt and equity financing....
Q. Separation of data and report areas (5 marks) Why should accounting spreadsheet reports be designed...
Q. Separation of data and report areas Why should accounting spreadsheet reports be designed with a completely separate data entry area and a separate report area? Paste a simple spreadsheet example showing normal and formula views.
Question 5 (5 + 3 + 2 Marks) a) What is unified classification of soil? Explain...
Question 5 (5 + 3 + 2 Marks) a) What is unified classification of soil? Explain the classification and nomenclature of Gravels, Sands, Silts and Clays. b) Explain well-graded, poorly graded and gap-graded soil showing the graph between percentage passing and grain size. c) The grain size analysis was conducted and following results are obtained from graph. The d 10 = 0.15, d 30 =0.425 & d 60 =1.5. Determine the grading of the soil.
What internal control procedure(s) would provide protection against the following threats/exposures? (10 marks of a 100...
What internal control procedure(s) would provide protection against the following threats/exposures? (10 marks of a 100 marks paper) Theft of goods by the warehouse workers, who claim that the inventory shortages reflect errors in the inventory records. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. Theft of cheques by the mailroom clerk, who then endorsed the cheques for deposit into the clerk’s personal bank account. Theft of funds...
1.What are the 5 factors that the auditor considers when looking for controls that are reliable...
1.What are the 5 factors that the auditor considers when looking for controls that are reliable and have a high likelihood of operating as intended? 2. What 3 factors are considered, in trying to determine whether there is a need for additional detailed test of controls? 3. With respect to accounting estimates, both the AICPA and PCAOB require the auditors to make three determinations. What are they? 4. During the risk assessment phase the auditors gain an understanding of the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT