AIS Reviewer 5

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

and helps prevent two common

errors:
i. Transcription Errors.
Occurs when (1) extra
digits are added to the
code, (2) a digit is
omitted from a code, or
(3) a digit is recorded
incorrectly
3. Supervision. A compensating control in ii. Transposition Errors.
small organizations for sufficient Occur when digits are
segregation o duties; a control activity reversed.
involving the critical oversight of b. Missing Data Check. Identifies
employees blank or incomplete input fields.
4. Accounting Records. Consist of source c. Numeric-Alphabetic.
documents, journals, and ledgers which Check/identify data in the
capture economic essence and provide wrong form. (E.g. Password
an audit trail making)
5. Access Control. Ensure that only d. Range Checks. Verify that all
authorized personnel have access to the amounts fall within an
firm’s assets. acceptable range. (E.g.
6. Independent Verification Procedures. Authorized limit/range)
Independent checks of the accounting e. Reasonableness Check Verify
system to identify eros and that amounts that have based
misinterpretations. limit and range checks are
a. Management can assess reasonable.
indiidual performance f. Validity Checks. Compare
b. System Integirity actual fields against acceptable
c. Data correctness which values.
includes: 2. Processing. Programmed procedures to
i. Reconciling batch totals ensure an application’s logic is
during transaction functioning properly.
processing. a. Batch Controls. Manage the
ii. Comparing physical flow of high volume
assets with accounting transactions and reconcile
records. system output with original
iii. Reconciling subsidiary input.
accounts with control
accounts.
iv. Reviewing management
reports that summarize
business activities. Control total = Running balance/Amount nung
pinrocess
IT Application Controls b. Run-to-Run Controls. Controls
1. Input. Programmed procedures, often that use batch figures to
called edits, that perform tests on monitor the batch as it moves
transaction data to ensure that they from one programmed
are free from errors. procedure to another. (E.g.
a. Check Digit. Method for Processing usually takes 3
detecting data coding errors in minutes, but now it suddenly
which a control digit is added became 3.5 minutes, dapat
to the code when it is originally ma-monitor ito ng IT and
designed to allow the integrity investigate why so)
of the code to be established c. Hash Total. Summation of
during subsequent processing nonfinancial data field to keep
track of the records in a batch.

DocumenTorr 💙
(E..g. Pag-add niya ng data, File. Each record in a direct
transaction code, etc.) access file is assigned a unique
d. Audit Trail Controls. Ensures disk location or address that is
every transaction can be traced determined by its primary key
through each stage to value.
processing from its economic
sources to its presentation in
the financial statements. (E.g.
Validation of Balance Sheet
amounts in the checking
accounts/GL)
i. Transaction Log
h. Destructive Update Approach.
Leaves no backup copy and
requires a special recovery
program if data is destroyed or
corrupted.

e. Master File Backup Controls.


Ensures every transaction can
be traced through each stage
to processing from its economic
i. Backup of Masterfile in a
source to its presentation in the
Real Time System. Real-time
financial statements. The
systems pose a more difficult
systems designer determines
problem because transactions
the number of backup master
are being processed
files needed for each
continuously. Backup
application. Two factors
procedures are scheduled at
influence this decision:
pre-specified intervals
i. Financial Significance
throughout the day. (E.g. Fast
of the System
Food chains backup their
ii. Degree of File Activity
systems every 30 minutes.)
f. Grandfather-Father-Son
(GFS). A back-up technique
employed by systems that use
sequential master files (whether
tape or disk). An integral part
of the master file update
process.
3. Output Procedures to ensure output is
not lost, misdirected, or corrupted and
that privacy is not violated. Proper
access and backup procedures must be
in place to protect these files. (E.g.
Hardcopy output)
a. Controlling Hard Copy
Output
i. Output Spooling.
Spooling is directing an
application’s output to
a magnetic disk file
rather than to printer
g. Backup Process in Batch directly. (E.g. Standby,
System using Direct Access

DocumenTorr 💙

You might also like