Top Banner
Chapter 9—Controlling Information Systems: Business Process Controls TRUE/FALSE 1. Specifying control goals is the first step in building a control matrix. ANS: T 2. In the control matrix the M stands for present controls. ANS: F 3. A control matrix is a tool that assists in evaluating the control goals and recommended control plans of an information system. ANS: T 4. Control efficiency addresses whether the control goals are being achieved. ANS: F 5. Control effectiveness addresses how individual control plans achieve multiple control goals. ANS: F 6. The purpose of security controls is to ensure that entity resources are protected from loss, destruction, disclosure, copying, sale, or other misuse. ANS: T 7. The following symbol represents a computer process. 183
38
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ch09

Chapter 9—Controlling Information Systems: Business Process Controls

TRUE/FALSE

1. Specifying control goals is the first step in building a control matrix.

ANS: T

2. In the control matrix the M stands for present controls.

ANS: F

3. A control matrix is a tool that assists in evaluating the control goals and recommended control plans of an information system.

ANS: T

4. Control efficiency addresses whether the control goals are being achieved.

ANS: F

5. Control effectiveness addresses how individual control plans achieve multiple control goals.

ANS: F

6. The purpose of security controls is to ensure that entity resources are protected from loss, destruction, disclosure, copying, sale, or other misuse.

ANS: T

7. The following symbol represents a computer process.

ANS: F

8. The following symbol represents a manual process.

ANS: F

183

Page 2: ch09

184 Chapter 9

9. The following symbol represents manual keying.

ANS: T

10. The following symbol represents automated keying.

ANS: F

11. Control redundancy addresses whether multiple control plans are directed toward the same control goal.

ANS: T

12. The purpose of input goals is to ensure input validity, input completeness and input accuracy.

ANS: T

13. The use of the letter P in a control matrix represents a missing control plan.

ANS: F

14. The most error prone and inefficient steps in an operations or information process is master file updates.

ANS: F

15. A control plan that makes it easier to prepare the document initially and later to input data from the document is called document design.

ANS: T

16. Written approval takes the form of a signature or initials on a document to indicate that the proper person has authorized the event.

ANS: T

17. Online prompting helps guide the online entry of data by defining the acceptable length of each data field and often dictating the acceptable format of certain fields.

ANS: F

Page 3: ch09

Controlling Information Systems: Business Process Controls 185

18. Preformatted screens describes a computer system's asking the user for input or asking questions that the user must answer.

ANS: F

19. Programmed edit checks are edits automatically performed by data entry programs upon entry of the input data.

ANS: T

20. Another name for a reasonableness check is a credit limit check.

ANS: F

21. Dollar totals represent a summarization of any numeric data field within the input document or record.

ANS: F

22. The edit that compares calculations performed manually with those performed by the computer to determine if a document has been entered correctly is referred to as mathematical accuracy checks.

ANS: T

23. A check digit is an extra digit that is added to an identification number to help control the accuracy with which the number is entered into a computer system.

ANS: T

24. Interactive feedback checks help ensure input completeness by informing the user that the input has been accepted and recorded.

ANS: T

25. The control plan called data verification is designed to reduce the possibility that one person will misread or miskey data.

ANS: F

26. A dependency check employs data encryption--specifically public-key cryptography--to authenticate a system user's identity and to verify the integrity of a message transmitted by that user.

ANS: F

27. A digital signature tests whether the contents of two or more data fields bear the correct logical relationship.

ANS: F

28. An exception and summary report reflects the transactions that were accepted by the system and processed and those that were rejected by the system.

ANS: T

Page 4: ch09

186 Chapter 9

29. Master data control plans regulate transaction processing by calculating control totals at various points in a processing run and subsequently comparing these totals.

ANS: F

30. Document/record counts are simple counts of the number of documents entered.

ANS: T

31. A count of the number of invoices being paid by all of the customer remittances is a type of batch control total called a line or item count.

ANS: T

32. The total dollar value of all invoice totals in a batch of sales invoices is called a hash total.

ANS: F

33. A hash total is the general term to describe the summation of data that would not normally be totaled except for control purposes.

ANS: T

34. A turnaround document is a document that is printed as an output of multiple computer processes and is used to capture and input a previous transaction.

ANS: F

35. Batch control plans regulate information processing by calculating control totals at various points in a processing run and subsequently comparing those totals.

ANS: T

36. In order to implement either a batch sequence check or cumulative sequence check, transactions must be captured on prenumbered documents.

ANS: T

37. Dollar totals are a summarization of the dollar value of items in the batch.

ANS: T

38. In a batch sequence check a computer program sorts the transactions into numerical order, checks the documents against the sequence number range, and reports missing, duplicate, and out-of-range event data.

ANS: T

39. The cumulative sequence check provides input control in those situations in which the serial numbers are assigned within the organization but later are not entered in perfect serial number sequence.

ANS: T

Page 5: ch09

Controlling Information Systems: Business Process Controls 187

40. Data encryption is a process that employs mathematical algorithms and keys to encode data so that it is unintelligible to the human eye.

ANS: TMULTIPLE CHOICE

1. The two primary steps in preparing the control matrix includea. specifying control goals, recommending control plansb. specifying control plans, specifying input goalsc. specifying the control environment, identifying information process goalsd. specifying control procedures, identifying process goals

ANS: A

2. The purpose of __________ control goals is to ensure the successful accomplishment of the goals set forth for the business process under consideration.a. efficiencyb. effectivenessc. securityd. input

ANS: B

3. The purpose of __________ control goals is to ensure that all resources used throughout the business process are being employed in the most productive manner.a. efficiencyb. effectivenessc. securityd. input

ANS: A

4. The purpose of __________ control goals is to ensure that entity resources are protected from loss, destruction, disclosure, copying, sale, or other misuse..a. efficiencyb. effectivenessc. securityd. input

ANS: C

5. Immediately endorsing incoming checks satisfies the control goal of a. ensure effectiveness of operationsb. update completeness and accuracyc. input accuracyd. ensure security of resources

ANS: D

6. The purpose of input goals is to ensure that

Page 6: ch09

188 Chapter 9

a. input validity, completeness, and accuracyb. update completeness and accuracyc. input accuracyd. none of the above

ANS: A

7. In a control matrix the coding P-1 meansa. process 1b. process 1 is presentc. process 1 is missingd. none of the above

ANS: B

8. In a the columns representing control goals in a control matrix, the coding M-1 meansa. a major control planb. a missing control planc. process 1 is missingd. none of the above

ANS: C

9. The most error prone and inefficient steps in an operations or information process isa. report generationb. master data updatec. data entryd. none of the above

ANS: C

10. The columns in a control matrix contain headings describe the system's:a. control goalsb. control plansc. control environmentd. control procedures

ANS: A

11. In the control matrix, the rows represent:a. control goals of the operations systemb. recommended control plans including present and missing controlsc. control goals of the information systemd. control goals of the management system

ANS: B

12. Having too many control plans directed at the same control goal is called:a. control efficiencyb. control effectivenessc. control redundancyd. control completeness

ANS: C

Page 7: ch09

Controlling Information Systems: Business Process Controls 189

13. Which of the following symbols represents manual keying?a.

b.

c.

d.

a. Symbol a.b. Symbol b.c. Symbol c.d. Symbol d.

ANS: B

14. Which of the following symbols represents a manual process?a.

b.

c.

Page 8: ch09

190 Chapter 9

d.

a. Symbol a.b. Symbol b.c. Symbol c.d. Symbol d.

ANS: C

15. Which of the following symbols represents a computer process?a.

b.

c.

d.

a. Symbol a.b. Symbol b.c. Symbol c.d. Symbol d.

ANS: A

Page 9: ch09

Controlling Information Systems: Business Process Controls 191

16. As an exception to the general rule, which one of the following is not necessarily included in the systems flowchart?a. control plan for input accuracyb. control plan for ensuring efficient employment of resourcesc. control plan for ensuring effective employment of resourcesd. none of the above

ANS: B

17. Which of the following control plans does not address the control goal of input accuracy?a. document designb. written approvalsc. preformatted screensd. online prompting

ANS: B

18. Which of the following is a control plan in which the source document is designed to make it easier to prepare the document for input?a. document designb. written approvalc. preformatted screensd. online prompting

ANS: A

19. Which of the following is a control plan that takes the form of signatures or initials on a document to indicate that a person has authorized the event?a. document designb. written approvalc. preformatted screensd. online prompting

ANS: B

20. Which of the following is a control plan that controls the entry of data by defining the acceptable format of each data field?a. document designb. written approvalc. preformatted screensd. online prompting

ANS: C

21. Which of the following is a control plan that requests user input or asks questions that the user must answer?a. document designb. written approvalc. preformatted screensd. online prompting

ANS: D

Page 10: ch09

192 Chapter 9

22. A user mistakenly enters the data June 31. The programmed edit check that will detect this error is:a. online promptingb. mathematical accuracy checkc. preformatted screend. reasonableness check

ANS: D

23. Which of the following reflects a summarization of any numeric data field within the input document or record?a. reasonableness check or limit checkb. document/record hash totalsc. mathematical accuracy checkd. check digit verification

ANS: B

24. Which of the following compares manual calculations to computer calculations?a. reasonableness check or limit checkb. document/record hash totalsc. mathematical accuracy checkd. check digit verification

ANS: C

25. A control that can be used to ensure that all of the characters of a social security number are entered by a data entry clerk is:a. dependency checkb. rejection proceduresc. preformatted screensd. turnaround documents

ANS: C

26. A written approval in the form of a signature or initials on a document indicating that a person has authorized the event achieves the control goal of:a. input validityb. input completenessc. input accuracyd. update accuracy

ANS: A

27. A control that can be used to reduce the likelihood of a transposition occurring when an account number is entered through a remote terminal is:a. check digit verificationb. data encryptionc. preformatted screensd. reasonableness checks

ANS: A

Page 11: ch09

Controlling Information Systems: Business Process Controls 193

28. Which of the following control plans is designed to achieve the goal of input completeness?a. key verificationb. interactive feedback checkc. programmed edit checkd. written approvals

ANS: B

29. A control whose primary purpose is to ensure greater input accuracy is:a. tickler fileb. preformatted screensc. interactive feedback checksd. procedures for rejected inputs

ANS: B

30. Not knowing whether input data has been accepted by the information system, the user enters the data again, resulting in duplicate event data. The control plan that helps to prevent this error is: a. key verificationb. interactive feedback checkc. check digit verificationd. online prompting

ANS: B

31. Which of the following control plans is designed to achieve the goal of input accuracy?a. key verificationb. interactive feedback checkc. batch sequence checkd. cumulative sequence check

ANS: A

32. A control in which two people key the same inputs into a system where they are automatically compared is called:a. online promptingb. key verificationc. computer matching proceduresd. a redundancy check

ANS: B

33. Which of the following control plans is designed both to authenticate a system user's identity and to verify the integrity of a message transmitted by that user?a. coding schemesb. digital signaturec. preformatted screensd. checking of digit verification

ANS: B

Page 12: ch09

194 Chapter 9

34. A control that is primarily directed at ensuring input validity is:a. digital signatureb. preformatted screensc. interactive feedback checksd. online prompting

ANS: A

35. In the control matrix for data entry with master data, digital signatures addresses all of the following control goals except:a. ensure security of resourcesb. input completenessc. input validityd. input accuracy

ANS: C

36. A sales representative enters the customer's account number and the system retrieves certain data about the customer from master data. This control plan addresses all of the control goals except:a. ensure efficient employment of resourcesb. input completenessc. input accuracyd. update completeness

ANS: D

37. A digital signature is aimed primarily at ensuring which of the following information system control goals?a. input validityb. input completenessc. input accuracyd. update completeness

ANS: A

38. All of the following are types of programmed edit checks except:a. a proximity checkb. a document/record hash totalc. a mathematical accuracy checkd. a reasonableness check

ANS: A

39. Which of the following is not a programmed edit check?a. online promptingb. check digit verificationc. dependency checksd. limit checks

ANS: A

Page 13: ch09

Controlling Information Systems: Business Process Controls 195

40. A control report generated by a system that shows data about transactions that were accepted or rejected during a transaction processing step is called a(n):a. violation reportb. exception and summary reportc. variance reportd. program change log

ANS: B

41. Which of the following is a batch control total that represents the minimum level of control for input completeness?a. dollar totalsb. record countsc. hash totalsd. item counts

ANS: B

42. A summation of customer account numbers taken from a batch of sales invoices would be classified as a:a. record countb. line countc. dollar totald. hash total

ANS: D

43. Which batch control total generally has no other purpose than control?a. dollar totalsb. record countsc. hash totalsd. item counts

ANS: C

44. Which of the following types of batch totals is likely to be most effective in assuring the control goal of input accuracy?a. line countsb. document/record countsc. item countsd. hash totals

ANS: D

45. When they are sent to a customer and returned with the payment, remittance advices are examples of:a. batch control totalsb. computer-prepared documentsc. written approval controlsd. turnaround documents

ANS: D

Page 14: ch09

196 Chapter 9

46. Which of the following activities is not part of the computer agreement of batch totals:a. A batch total is manually computed prior to data entry.b. Data shown on source documents are key entered or scanned.c. The computer produces a report that includes a batch total.d. A person reconciles the manual and computer batch totals.

ANS: D

47. Which of the following controls requires that documents be prenumbered before it can be implemented?a. completeness checkb. sequence checkc. batch total matchingd. key verification

ANS: B

48. Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called:a. cumulative sequence checkb. batch sequence checkc. suspense file of missing numbersd. computer agreement of batch totals

ANS: B

49. Which of the following statements related to tickler files is false?a. A tickler file is reviewed on a regular basis for items that do not clear the file on a timely

basis.b. A tickler file can consist of documents or computer records.c. A tickler file addresses the control goal of update accuracy.d. A tickler file addresses the control goal of input completeness.

ANS: C

50. The process of encoding data so that it may only be read by someone having a key is called:a. a coding schemeb. encryptionc. dependency checksd. check digit verification

ANS: B

51. Plaintext and ciphertext are terms associated with __________.a. coding schemesb. hash totalsc. programmed edit checksd. data encryption

ANS: D

Page 15: ch09

Controlling Information Systems: Business Process Controls 197

COMPLETION

1. Specifying ___________________ is the first step in building a control matrix.

ANS: control goals

2. In the control matrix the P stands for __________ controls.

ANS: present

3. A _______________ is a tool that assists in evaluating the control goals and recommended control plans of an information system.

ANS: control matrix

4. Control ________________ addresses whether the control goals are being achieved.

ANS: effectiveness

5. Control ______________ addresses how well individual control plans achieve multiple control goals.

ANS: efficiency

6. The purpose of __________ controls is to ensure that entity resources are protected from loss, destruction, disclosure, copying, sale, or other misuse.

ANS: security

7. The following symbol represents a(n) ______________.

ANS: manual process

8. The following symbol represents a(n) ______________.

ANS: computer process

9. The following symbol represents ______________.

ANS: manual keying

Page 16: ch09

198 Chapter 9

10. Control _________________ addresses whether multiple control plans are directed toward the same control goal.

ANS: redundancy

11. The purpose of input goals is to ensure input validity, input ___________, and input _________.

ANS: completeness, accuracy

12. The use of the letter M in a control matrix represents a(n) ____________________.

ANS: missing control or missing control plan

13. The most error prone and inefficient steps in an operations or information process is (are) ____________.

ANS: data entry or when humans enter data into the system

14. A control plan that makes it easier to prepare the document initially and later to input data from the document is called ____________________.

ANS: document design

15. ____________________ takes the form of a signature or initials on a document to indicate that the proper person has authorized the event.

ANS: Written approval

16. ____________________ help guide the online entry of data by defining the acceptable length of each data field and often dictating the acceptable format of certain fields.

ANS: Preformatted screens

17. ____________________ describes a computer system's asking the user for input or asking questions that the user must answer.

ANS: Online prompting

18. ____________________ are edits automatically performed by data entry programs upon entry of the input data.

ANS: Programmed edit checks

19. Another name for a(n) ____________________ check is a limit check.

ANS: reasonableness

20. ____________________ represent a summarization of any numeric data field within the input document or record.

ANS: Hash totals

Page 17: ch09

Controlling Information Systems: Business Process Controls 199

21. The edit that compares calculations performed manually with those performed by the computer to determine if a document has been entered correctly is referred to as ____________________.

ANS: mathematical accuracy checks

22. A(n) ____________________ digit is an extra digit that is added to an identification number to help control the accuracy with which the number is entered into a computer system.

ANS: check

23. ____________________ help ensure input completeness by informing the user that the input has been accepted and recorded.

ANS: Interactive feedback checks

24. The control plan called ____________________ is designed to reduce the possibility that one person will misread or miskey data.

ANS: key verification

25. A(n) ____________________ employs data encryption--specifically public-key cryptography--to authenticate a system user's identity and to verify the integrity of a message transmitted by that user.

ANS: digital signature

26. A(n) _____________ and ______________ report is a computer-generated report that reflects the events--either in detail, summary total, or both--that were accepted by the system and rejected by the system.

ANS: exception and summary

27. ____________________ regulate transaction processing by calculating control totals at various points in a processing run and subsequently comparing those totals.

ANS: Batch control plans

28. ____________________ are simple counts of the number of documents entered.

ANS: Document/record counts

29. A count of the number of invoices being paid by all of the customer remittances is a type of batch control total called a(n) ____________________.

ANS: line or item count

30. The total dollar value of all invoice totals in a batch of sales invoices is called a(n) ____________________.

ANS: dollar total

Page 18: ch09

200 Chapter 9

31. A(n) ____________________ is the general term to describe the summation of data that would not normally be totaled except for control purposes.

ANS: hash total

32. A(n) ____________________ is a document that is printed as an output of one computer process and is used to capture and input a subsequent transaction.

ANS: turnaround document

33. In the control matrix for data entry with batches, the control plan “compare picking tickets and packing slips” helps to ensure the control goals of effectiveness of operations and ensure ________________.

ANS: security of resources

34. In order to implement either a batch sequence check or cumulative sequence check, transactions must be captured on ____________________ documents.

ANS: prenumbered

35. _______________ are a summarization of the dollar value of items in the batch.

ANS: Dollar totals

36. In a(n) ____________________ a computer program sorts the transactions into numerical order, checks the documents against the sequence number range, and reports missing, duplicate, and out-of-range event data.

ANS: batch sequence check

37. The ____________________ provides input control in those situations in which the serial numbers are assigned within the organization but later are not entered in perfect serial number sequence.

ANS: cumulative sequence check

38. ____________________ is a process that employs mathematical algorithms and keys to encode data so that it is unintelligible to the human eye.

ANS: Data encryption

Page 19: ch09

Controlling Information Systems: Business Process Controls 201

PROBLEM

1. The workings of the control plan computer agreement of batch totals are described in Chapter 9 as follows (paraphrased):

• First, one or more of the batch totals discussed in Chapter 9 are established manually (assume this is done in the billing department).

• Then, the manually prepared total must be entered into the computer and is written to a computer batch control totals file (assume that the keying is done in a data entry unit of the data center).

• As individual transactions are entered, a computer program accumulates independent batch totals and compares these totals with the ones prepared manually and entered at the start of the processing.

• The computer then prepares an "Error and Summary Report," which usually contains details of each batch, together with an indication of whether the totals agreed or disagreed.

Required:

Prepare a system flowchart to diagram the above process. Assume that batches of transactions are input through a network computer device located in the billing department; the network computer is wired directly to a centralized mainframe computer.

ANS:

Page 20: ch09

202 Chapter 9

2. The workings of the control plan batch sequence check are described in Chapter 9 as follows (paraphrased):

• First, the range of serial numbers composing a batch of documents is entered (assume that key entry is done in a data entry unit of the data center).

• Then, data from each individual, serially prenumbered document is entered.• Finally, the computer program sorts the event data into numerical order, checks the

document numbers against the sequence number range, and prints a "Report of Missing, Duplicate, and Out-of-Range Numbers."

Required:

Prepare a system flowchart to diagram the above process. Assume that batches of documents are input through a network computer (NC) device located in the billing department; the NC is connected directly to a centralized mainframe computer.

Page 21: ch09

Controlling Information Systems: Business Process Controls 203

ANS:

Report of missing,

duplicate, or out of range

numbers

Prenumbered source documents

Prenumbered source

documents

Key individual events

Key serial number range

Record Number Change

Sort events into numerical

order

Check documents against sequence number range & print report of

missing, duplicate, and out of range

numbers

Event data

Sorted event data

Number table

Record event data

Data center

Data entry Computer

3. Figure TB-9.3 shows eight flowchart segments taken from the Chapter 9 flowcharts. The segments--identified A through I--have been stripped of almost all labels.

Page 22: ch09

204 Chapter 9

Segment B

Segment C

Segment D

Segment E

Segment F

Segment G

Segment H

Segment I

Segment A

Required:

On the blank line to the left of each numbered description that follows, place the capital letter of the flowchart segment from Figure TB-9.4 that best matches that description. Since there are ten descriptions, one answer space will be left blank.

FLOWCHART DESCRIPTIONAnswers

_____ 1. After resolving discrepancies, a data entry clerk keys corrections. The computer processes the corrections and a screen message confirms that the corrections were accepted.

_____ 2. The computer edits/validates input by reference to data residing in a master data, records event data and prints a single error and summary report.

_____ 3. The user resolves discrepancies displayed by the computer system and keys in any corrections that are necessary.

Page 23: ch09

Controlling Information Systems: Business Process Controls 205

_____ 4. The computer records events in event data, updates the master data, and a screen message confirms that the input has been accepted.

_____ 5. An employee in a user department assembles source documents into batches and prepares batch totals.

_____ 6. At a remote location, a user enters data into a central computer system. The system edits the input and displays a message on screen informing the user of any errors.

_____ 7. A data entry clerk enters batch totals and the data from source documents. The master data is updated and a screen message is displayed.

_____ 8. A data entry clerk enters data on a source documents. The computer edits the input and a screen message is displayed for any input errors.

_____ 9. A user compares output totals shown on an error and summary report with input totals shown on a batch control tape.

ANS:

Description FlowchartNumber Segment

1. F2. C3. G4. A5. B6. H7. I8. E9. D

4. The following is a list of 14 control plans.

Control PlansA. Enter data close to the originating sourceB. Preformatted screensC. Interactive feedback checksD. Programmed edit checksE. Document designF. Key verificationG. Written approvalsH. Digital signaturesI. Rejection procedures

Page 24: ch09

206 Chapter 9

Required:

Listed below are eight system failures that have control implications. On the blank line to the left of each number, insert the capital letter from the list above of the best control plan to prevent the system failure from occurring. (If you can't find a control that will prevent the failure, then choose a detective plan or, as a last resort, a corrective control plan). A letter should be used only once.

SYSTEM FAILURESAnswers

_____ 1. A clerk logged on to an online cash receipts system by entering the date of April 38, 20XX, instead of the correct date of April 28, 20XX. As a result, all cash receipts recorded that day were posted under an incorrect date.

_____ 2. Wabash Company enters shipping notices in batches. Upon entry, the computer performs certain edits to eliminate those notices that have errors. As a result, many actual shipments never get recorded.

_____ 3. At Nouveau Boutique, several different sales clerks prepare sales slips during the day. The sales slips are then keyed into the computer at Nouveau Boutique at the end of the day. However, numerous errors occur because the layout of the sales slips is difficult for the data entry clerk to follow.

_____ 4. Pitney Co. recently converted to an online order entry system. Clerks key in customer order data at one of several PCs. In the first week of operations, every sales order produced by the system was missing the data for the customer's "ship to" address.

_____ 5. A computer hacker gained access to the computer system of East Suburban Bank and entered a transaction to transfer funds to her bank account in the British West Indies.

_____ 6. Data entry clerks at the Videotron Company use key-to-disk units to prepare a variety of inputs for entry into the computer and the computer performs an agreement of batch totals. Recently, a number of errors have been found in key numeric fields. The supervisor would like to implement a control to reduce the transcription errors being made by the clerks.

_____ 7. At Cosmo Co., field salespersons call on customers and take customer orders by recording them on sales order forms. The forms are mailed by each salesperson each night to Cosmo's central data center for processing. The company has been besieged by customer complaints about how long it takes to receive their orders and about being shipped incorrect goods.

_____ 8. Ajax, Inc., recently installed a new cash receipts system. A clerk keys in remittance data through a terminal located in the accounts receivable department. On the first day of operations, because of a program bug, all remittances entered failed to get posted to the accounts receivable master file. Although the computer performs an agreement of batch totals, the clerk had no idea that the system did not perform the master data update process.

Page 25: ch09

Controlling Information Systems: Business Process Controls 207

_____ 9. At Infotech Inc., data entry clerks receive a variety of inputs from many departments throughout the company. In some cases, unauthorized inputs are keyed and entered into the computer.

ANS:

SystemFailure Answer

1. D2. I3. E4. B5. H6. F7. A8. C9. G

5. The following is a list of 8 control plans:

Control Plans

A. Populate inputs with master data E. Document designB. Cumulative sequence check F. Preformatted screensC. Turnaround documents G. Dependency checkD. Document/record counts H. Hash total

Required:

Listed below are eight statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency. On the blank line to the left of each number, insert the capital letter from the list above of the best control plan to achieve the described goal or to address the system deficiency. A letter should be used only once, with four letters left over.

CONTROL GOALS OR SYSTEM DEFICIENCIESAnswers

_____ 1. Helps to achieve the information systems control goal of input accuracy by ensuring that dates are properly entered as MM/DD/YY.

_____ 2. According the control matrix for data entry with batches, by using a pre-recorded bar code to trigger an event, this control plan ensures effectiveness of operations and improves efficiency by reducing the amount of data that must be input and by improving the speed and productivity of data entry. In addition, this control plan improves input validity, and improves input accuracy.

_____ 3. This control plan could help prevent the entry of inconsistent data elements, such as entering a tax code for a customer to whom sales should be nontaxable.

Page 26: ch09

208 Chapter 9

_____ 4. According to the control matrix for data entry with master data, when the order entry clerk types in the customer number, the system automatically retrieves the customer's name, address, and other standing data from the customer master data. In this way, resources are used more efficiently.

_____ 5. This control plan should prevent a field salesperson from omitting data elements when filling in the sales order form on his/her notebook computer.

_____ 6. In entering a batch of remittance advices into the computer, an operator made several errors in keying the customer identification numbers. However, the errors were detected when the total of the customer ID numbers that were input did not agree with the corresponding total calculated from the source documents.

_____ 7. This control plan helps to identify duplicate, missing, and out-of-range document numbers by comparing input numbers with a previously stored number range.

_____ 8. This batch control total does not help to ensure input accuracy, nor would it detect the fact that one record in a batch was removed and substituted with another.

ANS:

Control ControlGoal/ Goal/

System SystemDeficiency Answer Deficiency Answer

1. F 5. E2. C 6. H3. G 7. B4. A 8. D

6. The following is a systems flowchart for data entry with master data available. Create a control matrix based on this flowchart.

Page 27: ch09

Controlling Information Systems: Business Process Controls 209

Use the following columns for your control matrix from left to right:

1. Recommended control plans

Control Goals for the Operations Process2. Ensure effectiveness of operations3. Ensure efficient employment of resources4. Ensure security of resources

Control Goals for the Information Process5. For the (blank) inputs, ensure:

Divide this column up into IV, IC, IA columns6. For the (blank) master data, ensure:

Divide this column up into UC, UA columns

Use a legend:IV = Input ValidityIC = Input completenessIA = Input accuracyUC = Update completenessUA = Update accuracy

ANS:

Page 28: ch09

210 Chapter 9