Use Table to create a questionnaire checklist that can be used to evaluate controls for each of
Question:
a. For each control issue, write a Yes/No question such that a No answer represents a control weakness.
b. For each Yes/No question, write a brief explanation of why a No answer represents a controlweakness.
Transcribed Image Text:
TABLE 14-1 Threats and Controls in the Production Cycle ACTIVITY General issues THREAT CONTROLS (FIRST NUMBER REFERS TO THE CORRESPONDING THREAT 1. Inaccurate or invalid 1.1 Data processing integrity controls 1.2 Restriction of access to master data 1.3 Review of all changes to master data 2.1 Access controls 2.2 Encryption 3.1 Backup and disaster recovery procedures 4.1 Accounting analysis of costs arising from product design choices 4.2 Analysis of warranty and repair costs 5.1 Production planning systems 5.2 Review and approval of production schedules and orders 5.3 Restriction of access to production orders and production schedules 6.1 Physical access controls 6.2 Documentation of all inventory movement 6.3 Segregation of duties-custody of assets from recording and throughout master data of sensitive information data 2. Unauthorized disclosure entire production cycle 3. Loss or destruction of Product design 4. Poor product design resulting in excess costs Planning and . Over and scheduling underproduction 6. Theft of inventory 7. Theft of fixed assets 8. Poor performance 9. Suboptimal investment in Production operations authorization of removal fixed assets 6.4 Restriction of access to inventory master data 6.5 Periodic physical counts of inventory and reconciliation of those 10. Loss of inventory or fixed assets due to fire or other disasters counts to recorded quantities 7.1 Physical inventory of all fixed assets 7.2 Restriction of physical access to fixed assets 7.3 Maintaining detailed records of fixed assets, including disposal 8.1 Training 8.2 Performance reports 9.1 Proper approval of fixed-asset acquisitions, including use of 11. Disruption of operations requests for proposals to solicit multiple competitive bids 10.1 Physical safeguards (e.g., fire sprinklers) 10.2 Insurance 11.1 Backup and disaster recovery plans 12.1 Source data automation 12.2 Data processing integrity controls 13.1 Time-driven activity-based costing 14.1 Innovative performance metrics (e.g., throughput) Cost accounting 12. In accurate cost data 13. Inappropriate allocation of overhead costs 14. Misleading reports
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 75% (4 reviews)
a A wide variety of questions is possible Below is a sample list Question Yes No 1 Is access to production master data production orders inventory master production schedule etc restricted 2 Is the pr...View the full answer
Answered By
Michael Mulupi
I am honest,hardworking, and determined writer
4.70+
72+ Reviews
157+ Question Solved
Related Book For
Accounting Information Systems
ISBN: 978-0133428537
13th edition
Authors: Marshall B. Romney, Paul J. Steinbart
Question Posted:
Related Video
This activity is based on training and learning principles where the moderator is demonstrating to the participants how to make a paper Airplane. After the demonstration, participants are asked to fly their airplane to see which participant learned maximum from the activity
Students also viewed these Accounting questions
-
Create a questionnaire checklist that can be used to evaluate controls for each of the four basic activities in the revenue cycle (sales order entry, shipping, billing, and cash collections). a. For...
-
Design a research proposal that can be used to address the following decision problem: Should the Marriott in Pittsburgh, Pennsylvania, reduce the quality of its towels and bedding in order to...
-
Write out a formula that can be used to value any stock, regardless of its dividend pattern.
-
Do firms follow the same steps for impairment testing of finite- and indefinite- life intangible assets ? Explain.
-
You are engaged to examine the financial statements of Lauzon Inc. for the year ended December 31. On October 1, Lauzon Inc. borrowed $250,000 from a local bank to finance a plant expansion. The loan...
-
What is the result of the following when called as java Binary.java? (Choose two.) A. null B. [] C. Binary D. The code throws an ArrayIndexOutOfBoundsException. E. The code throws a...
-
Table 2-2 on page 45 is a frequency distribution summarizing the IQ scores of a group of children with low lead exposure. Is it possible to identify the original list of the 78 individual IQ scores...
-
As of May 31, 2013, the bank statement showed an ending balance of $26,100. The unadjusted Cash account balance was $27,350. The following information is available: 1. Deposit in transit, $6,981. 2....
-
You have a portfolio that is equally split between two stocks: SUI Consulting and OAR Repairs. You have estimated the variance of SUI to be 4 0 0 , while the variance of OAR is 9 0 0 . You figure...
-
An experiment was conducted to investigate leaking current in a SOS MOSFETS device. The purpose of the experiment was to investigate how leakage current varies as the channel length changes. Four...
-
What internal control procedure(s) would best prevent or detect the following problems? a. A production order was initiated for a product that was already overstocked in the companys warehouse. b. A...
-
You have recently been hired as the controller for a small manufacturing firm that makes high-definition televisions. One of your first tasks is to develop a report measuring throughput. Required...
-
Garnishment is a court ordered action that affects a. A workers pay. b. Employee working conditions. c. A workers right to join a union. d. Managements right to discharge a worker for good cause.
-
Question 5 All the below should be followed when you paraphrase except... A do not replace all words in a sentence with synonyms. B do not copy sentences or parts of the sentences from the original....
-
3. Differentiate between: a. Encrypt & Decrypt b. Encipher & Decipher c. Symmetric Encryption and Asymmetric Encryption (6 marks) 4. Choose any 1 cipher methods of your choice and explain its working...
-
The theory that regulators often end up adopting the views of the regulated is known as A. the deregulation hypothesis. B. the capture hypothesis. C. the share-the-gains, share-the-pains hypothesis....
-
is any cost that is primarily subject to the influ controllable cost responsibility accounting Obudgetary slack O controllability cost center?
-
P ( ( student ) = 0 . 2 , ) = 0 . 2 , P ( ( clever ) = 0 . 4 , ) = 0 . 4 , P ( ( clever | | student ) = 0 . 5 . ) = 0 . 5 . Using the Bayesian Theorem,what will be the value of P ( ( student | |...
-
Sounds are the result of small changes in pressure. To predict the speed at which such disturbances travel, assume that P, , v, and T in a fluid are each perturbed slightly from their constant values...
-
Aztec Furnishings makes hand-crafted furniture for sale in its retail stores. The furniture maker has recently installed a new assembly process, including a new sander and polisher. With this new...
-
The Internet uses many acronyms. Within the context of the present chapter, what words were used to form each of the following? a. EC b. EDI c. email d. HTTP e. IDS f. ITADA g. IP address h. blog i....
-
In Discussion Question 15-1 above, you discussed intranets and extranets, and identified the importance of each to accountants. Now, assume that you are a partner in a medium-sized, local CPA firm....
-
Visit the XBRL home page at www.XBRL.org, and read the section entitled what is XBRL. Then, do each of the following: a. Select the option Latest News from the home page, which lists several articles...
-
a) Assess five (5) top construction trends in Malaysian construction industry. (5 marks) b) Demand of construction industry is in various types and sizes. There will be different locations,...
-
My assignment is asking me to describe the plans that are employed by the organization and determine which managers created each type of plan. I have chosen to do the assignment on Apple Inc. Can I...
-
Cooper and Brandy are married and file a joint income tax return with two separate Schedule Cs. Cooper is an independent security specialist who spent $635 on uniforms during the year. His laundry...
Study smarter with the SolutionInn App