AC 571 - Final Exam (Study Guide)
AC 571 - Final Exam (Study Guide)
new AIS.
Discuss the eight basic steps required in the implementation phase of the SDLC in
the proper order they should occur. (Points : 30)
The eight-step method to develop and test software programs in conjunction with the systems
implementation phase of the SDLC consists of the following:
consult with users and write an agreement about software requirements as a way to
determine user needs
create and document a development plan
identify the overall approach and major processing tasks at a high level before proceeding
to levels of greater detail; begin writing program instructions
test the program once program code has been written; this can be achieved in part
through debugging and desk checking
document the program; this will explain how the program works and assist analysts in
correcting and resolving errors
train program users; documentation developed in step five will be used at this time
install and use the system; program maintenance can take place as needed.
use and modify the system (program maintenance); revise existing programs
Explain the preparation of financial statements as the third step in the general
ledger and reporting system.
Preparing the financial statements as part of the general ledger system incorporates the
following:
income statement; this relies on data from revenue and expense accounts that have been
adjusted.
adjusted trial balance; used to provide the balances used on the income statement.
Revenue and expense accounts are "zeroed out" using closing entries, transferring any net
income or loss to the retained earnings account
prepare balance sheet
statement of cash flows is prepared after the balance sheet since it uses data obtained
from both the income statement and the balance sheet as well as other information about
the organization's investing and financing activities.
Advantages and disadvantages to consider include the following:
Advantages Not having to deal with complexity and changes in tax codes
Not having to worry about what to do if equipment crashes
Reduced likelihood of employees accessing the payroll files; increased confidentiality
Increased efficiencies and cost reductions.
Wider range of benefits.
In addition to the advantages and disadvantages mentioned, the following should also be taken
into consideration:
How much does the service cost?
How would the data be submitted-online or hand carried?
What kind of reports and documents could be obtained from the service bureau?
How would the service interface with the existing general ledger system?
What resources are now being devoted to payroll and how could these resources be redeployed into other areas?
Could security and control be improved by the outsourcing?
What would be the time length of a contract for outsourcing services?
Could the service bureau system be integrated so that an online query could be made by
the organization?
What kind of track record does the service bureau have with other clients?
Are there new technologies and approaches that would become available to the company
via the service bureau?
Identify and discuss the common systems for approving vendor payments.
Vendor payments are commonly approved through the use of both Voucher and Non-voucher
systems
employees. Order clerks take customer orders over the telephone and instruct the cooks on what
they need to prepare. The cooks prepare the requested food and give it to the order clerks who
package it for delivery. Delivery people take the final packaged orders to the customers'
residences using company-owned delivery vehicles. Delivery people accept credit card, check
and cash payments. Delivery people return a copy of the delivery ticket along with the
customer's remittance to the order clerk who records the payment using the company's electronic
cash register. Each days receipts are totaled and Jessica decides into which of D-D-R's bank
accounts those receipts should be deposited.
Required: (a) List the operating events and the decision/management events discussed in
this example; (b) Identify and discuss any risks associated with the events; (c) Propose at
least one or more internal controls that would mitigate the risks.
Operating events include:
One risk to consider is the possibility of running out of merchandise that customers want to buy.
A control to mitigate this risk would include accurate inventory control and ordering procedures.
Another risk would be to charge too much for goods resulting in their not selling. Controls to
mitigate this might include:
The flip side to the previous risk is to charge too little for goods so profits are too low. Controls
to mitigate this risk would include:
Since accounting data comes from an AIS, having an understanding and knowledge of AIS
skills are critical to an accountants career success; interacting with an AIS is one of the most
important activities that accountants perform.
Being able to effectively interact with an AIS provides an accountant the ability to:
For example, CPA firms use their information systems to share best
practices and to support communication between offices. Employees
can search the corporate database to
There are three (3) important business functions that are performed by the six (6)
components of an AIS.
Observation of the activities being audited (e.g., watching how data control
personnel handle data processing work as it is received)
Review of documentation to understand how a particular process or internal
control system is supposed to function
Discussions with employees about their jobs and about how they carry out
certain procedures
Questionnaires that gather data
Physical examination of the quantity and/or condition of tangible assets, such as
equipment and inventory
Confirmation of the accuracy of information, such as customer account
balances, through communication with independent third parties
Re-performance of calculations to verify quantitative information (e.g.,
recalculating the annual depreciation expense)
Vouching for the validity of a transaction by examining supporting documents,
such as the purchase order, receiving report, and vendor invoice supporting an
accounts payable transaction
Analytical review of relationships and trends among information to detect items
that should be further investigated. For example, an auditor for a chain store
discovered that one stores ratio of accounts receivable to sales was too high. An
investigation revealed that the manager was diverting collected funds to her
personal use.
Evaluate the benefits of a database approach to data management over old fileoriented systems.
In file-oriented systems, programmers must know the physical location and layout of
records. In the past, companies typically created new files and programs each time a need
for information arose. This proliferation created problems such as storing the same data in
two or more master files, making it difficult to integrate and update data and to obtain an
organization-wide view of data. It also created problems because the data in the different
files were inconsistent.
Databases were developed to address the proliferation of master files. Database systems
overcome this problem by separating the storage of the data from the use of data elements.
The database approach provides two separate views of the data: the physical view and the
logical view. The logical view is how people conceptually organize and understand the
data. The physical view refers to how and where data are physically arranged and stored in
the computer system.
Several years ago a ring of foreign-based hackers broke into Town Banks system and stole $10
million from its customers accounts. Discuss how systems can become vulnerable to computer
crimes and then evaluate controls that strengthen those weaknesses.
Required:
a) Provide at least three weaknesses of AIS that hackers can exploit for gain
b) Suggest at least one control for each weakness
Cross-site scripting (XSS) is a vulnerability in dynamic Web pages that allows an attacker to
bypass a browsers security mechanisms and instruct the victims browser to execute code
thinking it came from the desired Web site.
The best way to protect against XSS is HTML sanitization, which is a process of validating
input and only allowing users to input predetermined characters.
A zero-day attack (or zero-hour attack) is an attack between the time a new software
vulnerability is discovered and the time a software developer releases a patch that fixes the
problem. When hackers detect a new vulnerability, they release it into the wild by posting
it on underground hacker sites. Word spreads quickly, and the attacks begin. It takes
companies time to discover the attacks, study them, develop an antidote, release the patch to
fix the problem, install the patch on user systems, and update antivirus software.
One way software developers minimize the vulnerability window is to monitor known hacker
sites so they know about the vulnerability when the hacker community does.
A man-in-the-middle (MITM) attack places a hacker between a client and a host and
intercepts network traffic between them. An MITM attack is often called a session hijacking
attack. MITM attacks are used to attack public-key encryption systems where sensitive and
valuable information is passed back and forth.
Student Answer:
Instructor
Explanation:
Points Received:
0 of 5
Comments:
Question 7 Question :
.
Student Answer:
Instructor
Explanation:
Student Answer:
Instructor
Explanation:
Points Received:
some people may commit computer fraud unwittingly and not be aware of it.
Many computer frauds go undetected. The belief that "it just can't happen to
us". Most networks have a low level of security. Many Internet sites provide
guidance on how to commit computer crimes. Law enforcement is unable to
keep up with the number of computer frauds. Most frauds are not reported.
The total dollar value of losses is difficult to calculate.
0 of 5
Comments:
Question 7 Question :
.
Student Answer:
Instructor
Explanation:
Student Answer:
Instructor
Explanation:
Points Received:
0 of 5
Comments:
Question 7 Question :
.
Student Answer:
Instructor
Explanation:
Points Received:
0 of 5
(TCO D) In billing and accounts receivable, what documents are
commonly used?
Student Answer:
Instructor
Explanation:
Points Received:
Comments:
0 of 5
Question 7 Question :
.
Student Answer:
Instructor
Explanation:
Student Answer:
Instructor
Explanation:
Points Received:
Comments:
0 of 5
Question 7 Question :
.
Student Answer:
Instructor
Explanation:
Points Received:
(TCO F) What are the four basic activities involved in the general ledger
and reporting system?
0 of 5
(TCO H) What is the purpose of a conceptual systems design report?
Student Answer:
Instructor
Explanation:
Points Received:
0 of 5
Comments:
Question 7 Question :
.
Student Answer:
Instructor
Explanation:
clients over the Internet. An organization that uses an ASP "rents" the
software, thus eliminating the tasks of buying, installing, and maintaining the
software. Among the advantages to using this approach as opposed to the
outright purchase of software is a reduction of software costs and
administrative overhead, automated software upgrades, scalability as the
organization itself grows, global access to information, access to skilled IT
personnel, and ability to focus on core competencies rather than IT
requirements. (Chapter 21, p. 614)
How can information technology be used to improve the vendor invoice approval pr
ocess?
EDI eliminates the need to enter invoice data and the matching of payment docume
nts - all of
this can be done using computers and network technologies. Technology can elimin
ate the need
for vendor invoices by approving payment upon receipt of the goods. Imaging syste
ms can
eliminate paper flow, and universal languages such as XML can provide a paperless
means of
receiving and storing vendor invoices. Use of procurement cards, credit cards, and e
lectronic
expense forms can improve the efficiency of non-inventory purchases. ERS, which is
invoiceless,
is a means to replace the traditional three-matching process (vendor invoice, receivi
ng report
and purchase order)with a two-way match of the purchase order and receiving repor
t.
XBRL (Extensible Business Reporting Language) is a variation of XML, which is
designed to communicate the content of data. XML improves upon HTML by being
able to describe the content of the data presented. However, XML is limited when
communicating financial information. For financial purposes, XBRL identifies each
piece of data, along with how the data should be processed and how the data relate
to other data items. XBRL may soon become the universal standard computer
language for communicating financial data. XBRL enables organizations to publish
financial information only once, using standard XBRL tags. XBRL tagged information
is interpretable and doesn't need to be re-entered by users.