Explore BrainMass
Share

Controls and Procedures

This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

10-16. Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems.

a. Leslie Thomas, a secretary at the university, indicated that she had worked 40 hours on her regular time card. The university paid her for 400 hours worked that week.

b. The aging analysis indicated that the Grab and Run Electronics Company account was so far in arrears that the credit manager decided to cut off any further credit sales to the company until it cleared up its account. Yet, the following week, the manager noted that three new sales had been made to that company-all on credit.

c. The Small Company employed Mr. Fineus Eyeshade to perform all its accounts receivable data processing. Mr. Eyeshade's 25 years with the company and his unassuming appearance helped him conceal the fact that he was embezzling cash collections from accounts receivable to cover his gambling losses at the racetrack.data security

d. The Blue Mountain Utility Company was having difficulty with its customer payments. The payment amounts were entered directly onto a terminal, and the transaction file thus created was used to update the customer master file. Among the problems encountered with this system were the application of customer payments to the wrong accounts and the creation of multiple customer master file records for the same account.

e. The Landsford brothers had lived in Center County all their lives. Ben worked for the local mill in the accounts payable department, and Tom owned the local hardware store. Ben had the mill pay for this merchandise in its usual fashion, and he wrote off the missing goods as "damaged inventory." The sheriff couldn't believe that the brothers had created several dummy companies that sold fictitious merchandise to the mill.

a. A bank deposit transaction was accidentally coded with a withdrawal code.

b. The key-entry operator keyed in the purchase order number as a nine-digit number instead of an eight-digit number.

c. The date of a customer payment was keyed 2001 instead of 2010.

d. A company employee was issued a check in the amount of $-135.65 because he had not worked a certain week, but most of his payroll deductions were automatic each week.

e. A patient filled out her medical insurance number as 123465 instead of 123456.

f. An applicant for the company stock option plan filled out her employee number as 84-7634-21. The first two digits are a department code. There is no department 84.

g. A high school student was able to log onto the telephone company's computer as soon as he learned what telephone number to call.

h. The accounts receivable department sent 87 checks to the computer center for processing. No one realized that one check was dropped along the way and that the computer therefore processed only 86 checks.

© BrainMass Inc. brainmass.com March 21, 2019, 11:39 am ad1c9bdddf
https://brainmass.com/business/the-conceptual-framework-of-accounting/controls-and-procedures-47154

Solution Preview

Please see response attached. I hope this helps and take care.

Posting 47154.doc:

Q10-16: Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems.

I used the following definitions of general and application controls (and the examples provided for each) as a guide to identify the control procedures that would guard against each of the following errors or problems:

The general controls are important because they support application processing. ... financial auditors are more likely to understand application controls ...

General IT controls include the procedures and processes that support the overall processing of business applications of an organization. These controls include areas such as access to programs and data, data center operations, program development, program changes, IT disaster recovery plans, and the proper segregation of duties of information systems department personnel. The general controls are important because they support application processing. Computerized application controls include the controls involving the processing and storing of business transactions. They ensure the completeness, accuracy, authorization, and validity of processed transactions. Application controls include application ...

Solution Summary

Relating to specific questions, this solution identifies one or more control procedures (either general or application controls, or both) that would guard against the presenting errors or problems. Supplemented with two articles on controls and application of controls and procedures.

$2.19