Question

In: Accounting

Several categories of control activities are identified in the chapter using the following framework: A. Authorization...

Several categories of control activities are identified in the chapter using the following framework:

  • A. Authorization
  • B. Performance reviews
  • C. Information-processing controls
    • C1. IT general controls
    • C2. IT application controls
    • C3. IT-dependent manual controls
  • D. Physical controls
  • E. Segregation of duties

Following are specific control procedures prescribed by Trusty Inc., a public company:

  1. The software application must match information from a vendor's invoices with information from receiving and information from the purchase order before a check is issued.

  2. Two authorized signatures are required on every check for payment of purchases over $100,000.

  3. Each month the credit manager carefully reviews the computer-generated aged trial balance of accounts receivable to identify past-due balances and follows up for collection.

  4. A supervisor must approve overtime work.

  5. The software application assigns sequential numbers to sales invoices used in the billing system.

  6. The software application verifies the mathematical accuracy of each voucher and prints an exception report for items with mathematical errors.

  7. Employee payroll records are kept on an electronic file that can only be accessed by certain terminals and are password-protected.

  8. An accounting supervisor reviews journal entries periodically for reasonableness of account classifications.

  9. Two individuals open the mail and prepare a prelisting of checks received. Then the checks received from customers and related remittance advices are separated in the mailroom and subsequently processed by different individuals.

  10. All vouchers must be stamped “paid” on payment.

  11. On a quarterly basis, the controller reviews a software-generated comparison of warranty expenses and actual warranty claims.

  12. Computer programmers are not allowed in the computer room.

  13. The software application will not complete the processing of a batch when the accounts receivable control account does not match the total of the subsidiary ledgers.

Required

  1. Indicate the category of control activities applicable to each procedure using the framework above.

  2. Identify an assertion to which each procedure pertains.

Solutions

Expert Solution

Answer:

Item

a. Category of Control Activities

b. Assertion

  1. The software application must match information from a vendor’s invoices with information from receiving and information from the purchase order before a check is issued.

IT application controls

Occurrence

  1. Two authorized signatures are required on every check over $100,000.

Authorization

Occurrence

  1. Each month the credit manager carefully reviews the computer-generated aged trial balance of accounts receivable to identify past-due balances and follows up for collection.

Performance reviews

Valuation and allocation

  1. A supervisor must approve overtime work.

Authorization

Occurrence

  1. The software application assigns sequential numbers to sales invoices used in the billing system.

IT application controls

Completeness

  1. The software application verifies the mathematical accuracy of each voucher and prints an exception report for items with mathematical errors.

IT application controls

Accuracy

  1. Employee payroll records are kept on a computer file that can only be accessed by certain terminals and are password protected.

IT general controls

Occurrence, accuracy, classification

  1. An accounting supervisor reviews journal entries periodically for reasonableness of account classifications.

IT dependent manual controls

Classification

  1. Two individuals open the mail and prepare a prelisting of checks received. Then the checks received from customers and related remittance advices are separated in the mailroom and subsequently processed by different individuals.

Segregation of duties

Completeness

  1. All vouchers must be stamped “paid”upon payment.

Physical controls

Occurrence

  1. On a quarterly basis, the controller reviews a software-generated comparison of warranty expenses and actual warranty claims.

Performance reviews, IT dependent manual controls.

Accuracy

  1. Computer programmers are not allowed in the computer room.

IT general controls

Pervasive affect on multiple assertions

  1. The software application will not complete the processing of a batch when the accounts receivable control account does not match the total in the subsidiary ledgers.

IT application controls

Occurrence or completeness


Related Solutions

Control activities fall into five categories with specific control activities in each category.   Explain which specific...
Control activities fall into five categories with specific control activities in each category.   Explain which specific control activity you feel is the most critical in preventing fraudulent activities.   Additionally, if you could eliminate a specific control activity due to financial constraints in maintaining controls, explain which one you would eliminate.
Control activities fall into five categories with specific control activities in each category. Explain which specific...
Control activities fall into five categories with specific control activities in each category. Explain which specific control activity you feel is the most critical in preventing fraudulent activities. Additionally, if you could eliminate a specific control activity due to financial constraints in maintaining controls, explain which one you would eliminate.
Write a brief about control activities as a component of COSO framework.
Write a brief about control activities as a component of COSO framework.
In Chapter 3 you learned about COSO's internal control framework. In this chapter, we took a...
In Chapter 3 you learned about COSO's internal control framework. In this chapter, we took a look at COSO's enterprise risk management framework. COSO went to great lengths to explain why the ERM framework was needed and how it relates to the internal control framework. Read their explanation at the COSO web site. Open your browser and type the address as www.coso.org There is a thought paper on the home page you may find helpful. Are both frameworks needed? Do...
Describe five crucial components of the COSO Framework: Internal Environment (Control Environment), Risk Assessment, Control Activities,...
Describe five crucial components of the COSO Framework: Internal Environment (Control Environment), Risk Assessment, Control Activities, Information and Communication, and Monitoring. Explain what is included in the component and how that component impacts the rest of the internal control system (i.e., the other four components). Please help me to answer this question.
For each of the following three control activities, write a likely test of control that the...
For each of the following three control activities, write a likely test of control that the auditor would perform (be specific in the test you write). A sale is recorded only when a shipment has been made. A manager must authorize all sales returns that are greater than $1,000. Cash disbursement in the Disbursements Journal must be accompanied by supporting documents: purchase order, receiving document, and vendor invoice.
Internal controls can be categorized using the following framework: 1. Control environment 2. Risk assessment 3....
Internal controls can be categorized using the following framework: 1. Control environment 2. Risk assessment 3. Control activities 3.1 Authorization 3.2 Performance reviews 3.3 Information-processing controls     3.3.1. IT general controls     3.3.2. IT application controls     3.3.3. IT-dependent manual controls 3.4 Physical controls 3.5 Segregation of duties 4. Information and communication 5. Monitoring Following is a list of controls implemented by Waterfront, Inc.: a. Management established a code of conduct that includes rules regarding conflicts of interest for purchasing agents. b. Waterfront’s...
Classify each of the following activities into one of the four cost of quality categories and/or...
Classify each of the following activities into one of the four cost of quality categories and/or identify it as a value-added or a non-value-added activity. Value-added activity Non-value-added Internal failure cost External failure cost Appraisal cost Prevention cost a. Rework, due to poor materials, on bicycles at Trek b. Inspection costs incurred by Walmart on merchandise purchased from Mattel, Inc. c. Costs incurred by Walmart when merchandise, purchased from Grocers, Inc., spoils in its warehouse before shipping to its stores...
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization.
Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are creating the policy and then complete the policy using the framework.
The following is a list of six control plans from this chapter or from Chapter 9....
The following is a list of six control plans from this chapter or from Chapter 9. These are followed by a list of six statements describing either a control goal or a system deficiency. Match the five control goals or system deficiencies with a control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over. Control Plans A. One-for-one checking of the goods, picking ticket, and sales...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT