Professional Documents
Culture Documents
Module 5678 Dicussion Quest.
Module 5678 Dicussion Quest.
5. What are the four controls needed in maintenance activities to minimize potential
exposure to systems corruption? (4 X 7.143% = 28.57%)
The four controls needed in maintenance activities to minimize potential exposure to
systems corruption are formal authorizations, technical specifications, testing, and
documentation updates.
MODULE 6
DISCUSSION QUESTIONS FOR SUBMISSION APRIL 5, 2021)
1. What are transaction cycles? Explain each.(4 X 4.762% = 19.05%)
Three transaction cycles process most of the firm’s economic activity: the expenditure
cycle, the conversion cycle, and the revenue cycle. These cycles exist in all types of
businesses – both profit-seeking and not-for-profit.
For instance, every business (1) incurs expenditures in exchange for resources
(expenditure cycle), (2) provides value-added through its products or services
(conversion cycle), and (3) receives revenue from outside sources (revenue cycle).
Source documents.
Economic events give rise to some documents being created at the beginning
(the source) of the transaction. These are called source documents. Some documents
are used to capture and formalize transaction data needed for processing by the
transaction cycle.
Product documents.
Product documents are the result of transaction processing rather than the
triggering mechanism for the process. For example, a payroll check to an employee is a
product document of the payroll system. Customer’s bill is a product document of the
sales system.
Turnaround documents.
Turnaround documents are product documents of our system that become
source documents for another system. A customer, for example, received a perforated
two-part bill or statement. The top portion of the document is the actual bill, and the
bottom portion is the remittance advice. When customers make a payment, they
remove the remittance advice and return it to the company along with their check. A
turnaround document carries important information about a customer’s account to help
the cash receipts system process the check.
There are two basic types of ledgers: the general ledger which contains the firm’s
account information in the form of highly summarized control accounts, while
subsidiary ledgers, which contain the details of the individual accounts that constitute a
particular control account.
Inventory ledger
Purchases ledger
5. Explain the four different types of magnetic files representing the accounting
records in computer-based systems (4 X 4.762% = 19.05%)
Accounting records in computer-based systems are represented by four different
types of magnetic files: master files, transaction files, reference files, and
archive files.
Master file
A master file generally contains account data. The general ledger and subsidiary
ledgers are
examples of master files. Data values in master files are updated from
transactions.
Transaction file
A transaction file is a temporary file holding transaction records that will be used
to change or
update data in a master file. Sales orders, inventory receipts, and cash receipts are
examples of transaction files.
Reference file
A reference file stores data that are used as standards for processing transactions.
For example,
the payroll program may refer to a tax table to calculate the proper amount of
withholding taxes for payroll transactions. Other reference files include price lists
used for preparing customer invoices, lists of authorized suppliers, employee
rosters, and customer credit files for approving credit sales.
Archive file
The archive file contains records of past transactions that are retained for future
reference. These
transactions form an important part of the audit trail. Archive files include
journals, prior-period payroll information, lists of former employees, records of
accounts written off, and prior-period ledgers.
Batch systems processing assemble transactions into groups for processing. In this
approach, there is always a time lag between the point at which an economic event
occurs and the point at which it is reflected in the firm’s accounts. The amount of lag
depends on the frequency of batch processing. Time lag can range from minutes to
weeks. Payroll processing is an example of a typical batch system. The economic events-
the application of employee labor-occur continuously throughout the pay period. At the
end of the period, the paychecks (or the ATM deposits) for all employees are prepared
together as a batch.
Real-time systems process the entire transaction when it occurs. A sales order
processed by the system can be captured, filled, and shipped the same day. Such a
system has many potential benefits, including improved productivity, reduced
inventory, increased inventory turnover, decreased lags in customer billing, and
enhanced customer satisfaction. Since transaction information is transmitted
electronically, physical source documents can be eliminated or greatly reduced.
Real-time processing employs exclusive use of direct access files and involves some level
of network technology. Terminals at distributed sites throughout the organization are
used for receiving, processing, and sending information about current transactions.
They are linked together in a network arrangement so uses can communicate.
MODULE 7
DISCUSSION QUESTIONS
1. Explain the three types of application controls. (3 X 9.09% = 27.27%)
Application controls which may be manual actions or procedures programmed into an
application, fall into three broad categories: input controls, processing controls, and
output controls.
Input Controls
The data collection department of the information system is responsible for bringing data
into the system for processing. Input controls at this stage attempt to ensure that these
transactions are valid, accurate, and complete. Data input procedures can be either source
document-triggered (batch) or direct input (real-time).
Processing Controls
After passing through the data input stage, transactions enter the processing stage of the
system. Processing controls are divided into three categories: run-to-run controls,
operator intervention controls, and audit trail controls.
Output Controls
Output controls ensure that system output is not lost, misdirected, or corrupted and that
privacy is not validated. Exposures of this sort can cause serious disruptions to operations
and may result in financial losses to the firm. For example, if the checks produced by a
firm’s cash disbursements system are lost, misdirected, or destroyed, trade accounts and
other bills may go unpaid. This could damage the firm’s credit rating and result in lost
discounts, interest and penalty charges. IF the privacy of certain types of outputs is
violated, a firm could have its business objectives compromised, or it could even become
legally exposed. Examples of privacy exposure include the disclosure of trade secrets,
patents pending, marketing research results, and patient medical records.
2. What is output spooling? (1 x 9.09% = 9.09%
Output spooling. In large scale data processing operations, output devices such as line
printers can become backlogged with many programs simultaneously demanding these
limited resources.. This can cause a bottleneck, which adversely affects the throughput of
the system. Applications waiting to print output occupy computer memory and block
other applications from entering the process system. To ease the burden, applications are
often designed to direct their output to a magnetic disk file rather than to the printer
directly. This is called spooling. Later, when printer resources become available, the
output files are printed.
5. What are the three levels of input validation controls? Distinguish one from the
other. (3 X 9.09% = 27.28%)
There are three levels of input validation controls:
1. Field interrogation
2. Record interrogation
3. File interrogation
TOTAL GRADE 100%
OLIVAREZ COLLEGE
Dr. A Santos Avenue San Dionisio,
Parañaque City
COLLEGE OF ACCOUNTANCY
AUDITING IN CIS ENVIRONMENT
Professor: Ms. Mila Cruz
Submitted by: Bonayon, Hannah Grace
MODULE 8
DISCUSSION QUESTIONS (4 items)
1. What are the three primary phases in designing a relational database system?
Explain each.(3x11.11% = 33.33%)
There are three primary phases in designing a relational database: conceptual database design,
logical database design, and physical database design.
The auditor advised to get data directly from the database, and not from the flat file
because the database approach is not represented by a single architecture. Early database
models are as different from modern database models as they were from traditional flat file
models. The way the data are organized in these early database systems forces users to navigate
between data elements using predefined structured paths. The relationship model is far more
flexible by allowing users to create new and unique paths through the database to solve a wider
range of business problems.
Although their limitations are severe and their demise is inevitable, hierarchical and network
models still exist as legacy systems that support mission-critical functions in some companies.
Most modern systems, however, employ relational databases.
3. Explain the three fundamental associations of database tables in relation to other tables.
Give an example for each.
3 x 11.11% = 33.33%)
There are three fundamental associations: one-to one, one-to-many, and many-to-many.
One-to-one association
This means that for every one occurrence in Table X, there is a zero or one occurrence in Table Y. In
business terms, for every employee records in the employee file, there is a single (or zero for new
employees) record in the year-to date earnings file. For Example:
One-to-many association
For every record occurrence in Table X, there is a zero, one, or many occurrences in Table Y. To
illustrate, for every customer record in the customer table (Table X), there is zero, one, or many sales
order records in the Sales Order Table (Table Y). For Example:
Many-to-many association
This is a two-way relationship. For each record occurrence in Tables X and Y, respectively, an M:M
association often exists between a firm’s inventory records (Table X) and its vendor records (Table Y). At
the same time, a single vendor supplies one or more items of inventory. For Example: