Chapter 20 Ans
April 5, 2017 | Author: Dave Manalo | Category: N/A
Short Description
Download Chapter 20 Ans...
Description
CHAPTER 20 THE COMPUTER ENVIRONMENT I.
Review Questions 1.
In a batch processing system, documents evidencing transactions and events are gathered and processed by groups. The day’s sales invoices, for example, may be converted to machine-readable form and processed the next morning. In a real time system, transactions are input into the system and processed as they occur. A branch sale, for example, may be input into the system via a terminal at a remote location. The computer checks for product availability, customer authenticity, customer credit approval, and shipping terms; and if all conditions are met, the sale is processed immediately and the sales invoice and shipping order are produced.
2.
In a real-time system, much of the data are stored internally and documentation is often not as extensive as in a batch system. Retrieval and audit of transaction data, therefore, are often more difficult in a real-time system. Also, controls are more likely to be programmed in real-time systems, and for this reason, are more difficult to test.
3.
Inasmuch as computer processing requires increased dependence on the computer systems and software for the accuracy and completeness of processing, documentation assumes major significance relative to effective control. Documentation facilitates reviewing and updating systems and programs as the environment changes; and it also minimizes the probability of unauthorized system and program changes which could result in loss of control and decreased reliability of financial data.
4.
In a batch system, files are stored off-line for the most part, and access control assumes the form of safeguarding the programs, transaction files, and master files by assigning responsibility for the files to a librarian and instituting a formal checkout system. Only those persons authorized to process transactions (computer operators) are permitted access to transaction and master files; and programmers are permitted access to programs only for testing and “debugging” purposes. In an on-line, real-time system, transactions and master files are stored internally, often in a system of integrated data bases. Access control in this type of data environment assumes the form of controlling access to data bases and fixing of responsibility for the data base components. Assigning a password to an individual who is responsible for the data base component
20-2
Solutions Manual - Principles of Auditing and Other Assurance
Services
5.
accessible by that password, canceling passwords of former employees, and frequent changing of existing employees’ passwords are examples of access controls in a real-time system. Recording forms and transaction logs assure consistency and completeness of data inputs. The form or log should include codes describing such transaction components as employee number, customer number, vendor number, department number, stock number, purchased part number, or job number. The form should also provide for quantities, prices, dates, and usually a short narrative description of products, parts, materials, or services for purchase and sales transactions.
6.
A transaction file is the batch of entered data that has been converted into machine-readable form. A transaction file may contain payroll information for a specific period of time. It is similar to a journal in a manually prepared system. A master file contains updated information through a particular time period. It is similar to a ledger in a manual system.
7.
Small businesses have found that microcomputers or personal computer systems are cost effective for processing accounting data. In small businesses, one would expect to find microcomputers (or personal computers) using commercially available software.
8.
In the computerized system, documents to support a transaction may not be maintained in readable form, requiring associated performance of controls. However, the computerized system will enable processing of transactions to be done more consistently, duties to be consolidated, and reports to be generated more easily.
II. Multiple Choice Questions 1. 2. 3. 4.
d c a a
5. 6. 7. 8.
c c c b
9. 10. 11. 12.
c c d c
13. 14. 15. 16.
c d a a
17. 18. 19. 20.
c a b a
III. Comprehensive Cases An auditor should have the following concerns about the Box system: •
Does the system have any flaws or incompatibilities? (No one appears to have tested the software or found out about others’ satisfaction with it.)
•
The computer sits out in the open. (Anyone could have access to and damage the hardware.)
•
Anyone could come up with the password by guessing.
The Computer Environment
21-3
•
The backup disks are not stored in a safe place.
•
Was the conversion appropriately executed, with no data lost or added?
View more...
Comments