Professional Documents
Culture Documents
Discussion Questions Chapter 1 3
Discussion Questions Chapter 1 3
A-201
CHAPTER 1
DISCUSSION QUESTIONS:
There are strict reporting criteria that apply to the reporting needs of external
users like lending institutions, the IRS, the SEC, and stockholders. Since failing to
give correct and timely information entails severe consequences, corporations have
historically placed a very high priority on the quality of the AIS and the reports
they produce for external bodies. To make wise decisions, internal users like
managers also need crucial information. Businesses are starting to understand how
crucial it is to meet the demands of these internal users if they are to function
profitably and effectively going forward.
4. Why have re-engineering efforts been made to Integrate AIS and MIS?
Data from the AIS and the MIS are often needed by managers in all
domains. Report preparation is time- and money-consuming if managers must
combine the data from two or more data sources in order to find the information
they require.
Only the types of data components collected vary amongst the transaction
processing systems. Both the service and manufacturing sectors need to gather data
on operational procedures. While a manufacturing company may gather
information on the amount of scrap produced at a certain workstation, a service
company, like a public accounting firm, wants to gather information about the
number of staff hours spent confirming cash balances. Systems for transaction
processing are essential in many types of industries.
6. Discuss the difference between the financial reporting system and the
general ledger system.
7. Examine Figure 1-5 and discuss where and how Problems can arise that can
cause the resulting Information to be bad or ineffective.
11. Discuss why it is crucial that internal auditors Report solely to the
uppermost level of management (either to the chief executive officer or the
Audit committee of the board of directors) and answer to no other group.
Fraud within the company must be found and pursued by the internal
auditors. Internal auditors may be concerned about losing their jobs if they report
such actions if management-level individuals are engaged. Therefore, the internal
auditors ought to report to the board of directors so that they won't have to worry
about upper management criticizing their actions.
12. Contrast centralized data processing with distributed data processing.
How do the roles of systems professionals and end users change? What do you
think the trend is today?
13. Discuss how conceptual and physical systems differ and which functions
are responsible for each of them. These systems.
The physical system represents the tools for carrying out the activities,
whereas the conceptual system represents the logic and decision rules to be used.
The conceptual system may be accomplished in a variety of ways (physical
systems). Although the accountant is crucial to the conceptual system's design,
system designers may predominate in the activities of due to the technological
nature of the solution's physical architecture. Even though they may just play an
advisory role, the accountant should nonetheless be involved in the process.
14. If accountants are viewed as providers of information, then why are they
consulted as system users in the systems development process?
To create an efficient internal system and to meet the needs of the users of
accounting information, the accountants are consulted as system users. The
accountants are involved not only in one step of system development but in every
level of system development. Since each stage has unique characteristics that set it
apart from others. They are also required to make it simple to establish the
accounting information system. The most crucial aspect is the accuracy and
assurance of dependability of accounting information in financial reporting.
15. Do you agree with the statement, ‘‘the term IT Auditor should be
considered obsolete because it Implies a distinction between regular auditors
and Auditors who examine computerized AIS’’? Why Or why not?
DISCUSSION QUESTIONS:
1.Discuss the flow of cash through the transaction cycle Include in your
discussion the relevant sub-systems and any time lags that may occur.
3. Discuss the role of the conversion cycle for service and retailing entities.
Planning the goods to buy or the services to produce, planning the workforce
to complete the necessary tasks (extremely important in-service entities), and
directing the workforce to perform the service or sell the good are all part of the
conversion cycle activities for service and retailing entities.
Yes. For instance, the source document for the system that processes cash
receipts transactions is the remittance advice of a bill that is returned together with
the payment.
However, the special journal is for posting to the general ledger, even if you
may use them interchangeably at times. Registers are maintained for the storage of
information. Relationship between the AP subsidiary ledger balance and the AP
general ledger control account.
8. What role does the audit trail play in the task of Confirmation?
Similar to a manual audit trail, a digital audit trail serves the same purpose.
The procedures change slightly in actuality. The file to which the balances and
transactions of the accounts receivable subsidiary accounts are traced is the archive
file that only contains valid transactions. For confirmation, the clients still need to
be contacted.
10. Are large batch sizes preferable to small batch Sizes? Explain.
Small batches have the advantage of fewer transactions to sort through for
error detection, but they are not processed as efficiently. Further, computing
facilities and constraints might dictate whether multiple small batches may be
processed throughout the day or whether a single large batch is processed at night
when the computing facilities have excess capacity
11. Discuss why an understanding of legacy system Technologies is of some
importance to auditors.
Some businesses use legacy systems to process certain portions of their data.
Auditors must be able to assess and test older systems when they are used to
handle financially significant transactions.
Real-time data collecting and batch updating are frequently used in large-
scale systems that handle large numbers of transactions. (Transaction-specific
master file records are changed in real time; updates to common accounts are made
in batch mode.)
Systems that execute fewer transactions per second and those that do not
share common records are more suited for real-time processing.
14. Explain how a hashing structure works and why it’s quicker than using an
index. Give an example. If it’s so much faster, why isn’t it used exclusively?
To store and retrieve data fast, hash tables are employed (or records). Using
hash keys, records are stored in buckets. Hash keys are created by running a
selected value through a hashing algorithm. This selected value needs to be the
same for all of the records. Each bucket may contain a number of records that are
arranged in a specific order. Since each key does not need to be distinct from the
others, it is speedier than indexing. The hash table would only need to look up and
search through the 15 objects in the "B" bucket, as opposed to all 200 objects, if,
for instance, only 15 of the 200 objects have hash codes that start with the letter
"B".
15. Describe a specific accounting application that could make use of a virtual
storage access method file.
For very big files that need normal batch processing and a light level of
individual record processing, the virtual storage access method (VSAM) structure
is utilized. For instance, a public utility company's customer file will be processed
in batch mode for billing purposes and immediately accessed in response to
specific client requests. The VSAM structure may be progressively searched for
effective batch processing due to its sequential organization.
CHAPTER 3
DISCUSSION QUESTIONS:
3. Although top management’s attitude toward ethics sets the tone for
business practice, sometimes it is the role of lower-level managers to uphold a
firm’s ethical standards. John, an operations-level manager, discovers that the
company is illegally dumping toxic materials and is in violation of
environmental regulations. John’s immediate supervisor is involved in the
dumping. What action should John take?
Because they are concerned about how the public would perceive their
internal control system, the top management of publicly traded companies is
frequently reticent to publicly acknowledge that they have been the victim of
computer crime. Additionally, a lot of businesses might not be entirely aware of
the degree of their computer fraud-related losses.
8. Discuss the concept of exposure and explain why firms may tolerate some
exposure.
9. If detective controls signal error flags, why shouldn’t these types of controls
automatically make a correction in the identified error? Why are corrective
controls necessary?
There may be more than one workable corrective option for any recognized
issue, and the optimum course of action possibly not always clear. Therefore, tying
a robotic response to a detective control could make it worse. by taking the wrong
corrective action to an issue.
10. Discuss the non-accounting services that external auditors are no longer
permitted to render audit clients
The auditor is not allowed to offer any of the non-audit services listed below
to an audit client or any of its affiliates. Conception and deployment of financial
information systems. Reports on contributions-in-kind, fairness opinions, or
services for appraisal or valuation.
11. Discuss whether a firm with fewer employees than there are incompatible
tasks should rely more heavily on general authority than specific authority
It is improper for the controller to receive reports from the internal auditing
department. The controller may provide the auditors with incorrect or misleading
information if they are aware of or participating in a fraud or defalcation. If the
auditors don't keep some things under wraps, they run the risk of losing their jobs.
Additionally, the fraud may be occurring above the controller, and if the case is
pursued, the controller might fear losing his or her employment. The best course of
action is to have the board of directors get direct reports from the internal auditing
unit.
Exposure is the risk of harm to the business. In plain English, risk is the
likelihood, i.e., the possibility, that a circumstance will materialize and primarily
result in a loss or an undesirable consequence, whereas exposure is the degree to
which the risk can have an impact.