Free Essay

Accy 310 Final Exam Sg

In:

Submitted By sufy1
Words 2842
Pages 12
Chapter 1—AIS overview (3 Questions = 4.5 points)

Purpose of/value provided by AIS

1. Improving the quality and reducing the costs of products or service 2. Improve efficiency and effectiveness of the value chain and supply chain 3. Share knowledge 4. Improve the internal control structure 5. Improve decision making

Key Role if the AIS

1. Collecting and storing data 2. Providing information for decisions 3. Safeguarding assets

Value Chain Activities

1. Inbound Logistics------ receiving and storage 2. Operations -------------- manufacturing and repackaging 3. Outbound Logistics---- distribution shipping 4. Marketing & Sales------ advertising, selling 5. Service-------------------- repair, maintenance

Characteristic of Useful Information

1. Relevant 2. Reliable 3. Timely 4. Verifiable 5. Understandable 6. Accessible 7. Complete

Chapter 2/SUA

Purpose/use of general ledger, subsidiary ledgers, special journals and cash prelist

General Ledger= contains summary level data for every asset, liability, equity and revenue, and expense account...(accounts receivable)

Subsidiary Ledger= contains detailed data for any general ledger account with many individualized subaccounts.... (Separate account for each accounts receivable)

General Journal= used to record infrequent or non-routine transaction, such as loan payments
Specialized Journal= records large numbers of repetitive transactions such as sales, cash receipts, and cash disbursement

Sequence of events in accounting cycle

1. Collect Data 2. Journalize Transactions (capture in transaction files) 3. Post transactions to accounts in ledger (G/L master file) 4. Prepare unadjusted trial balance 5. Prepare and Post adjusting entries 6. Prepare adjusted trial balance 7. Prepare accounting reports a. Income Statement First (sales – cogs = NI) b. Retained Earnings Second (Beg RE+NI-Div= Ending RE) c. Balance Sheet Last (assets=liab + OE) gets RE from RE statement 8. Close Accounts-----(never close balance sheet accounts)

Transaction Cycles

1. Revenue Cycle—goods and services are sold for cash, receive cash 2. Expenditure Cycle---- companies purchase inventory for resale or raw mat 3. Production/Conversion---raw materials transformed into finished goods 4. Human Resource/Payroll- employees are hired/fired/trained 5. Financing Cycles-----companies sell shares, borrow money

Characteristics of adjusting and closing entries * Never close balance sheet accounts

Characteristics of good forms design 1. Pre-numbering of documents 2. Turnaround documents

Updates to master vs. transaction files * Journals (general and specialized) update ledger * Transaction (detail) files UPDATE master files
Master File= stores cumulative information about an organization
Transaction File= contains records of individualized business transaction that occur during a specific time

Chapter 3---Documentation Techniques

Identify commonly used flowchart symbols and segments * Look at page number 76-77

General Features of context diagrams/DFD’s
Data Flow Diagrams= shows flows of data between processes, files, and destinations * Context level is highest level

Flowchart= graphic representation of sequential processes * Document---shows document flow among areas of responsibility * System---summarizes inputs, processing and outputs of a system * Program--- shows logic of computer program execution

Chapter 4—Databases and Microsoft Access

Purpose of Schemas/subschemas/data dictionary

Data Dictionary= contains information about the structure of the database For each data element stored in the database, there is a record in the Dictionary describing it Schemas= describes the logical structure of a database * Conceptual level---views entire database, data elements, relationships * External Level--- * Internal Level---how data is stored

Sub-Schemas= consists of individual user views of portions of the database. Employees don’t have access to everything

Primary vs. Foreign Key

Primary Key= database attribute, or combination of attributes, that uniquely Identifies a specific row in a table. Cannot be null

Foreign Key= an attribute that is a primary key in another table, is used to link tables....if not null, must have values that correspond to the value of a primary key in another table

Database rules and anomaly

Update Anomaly Insert Anomaly Delete Anomaly

1. Every column is single valued 2. Primary Keys cannot be null 3. Foreign keys, if not null, correspond to a primary key in another table 4. All non-key attributes in table should describe a characteristics about the object identified by the primary key.
Use of DDL, DQl, DML

Data Definition Language (DDL)= 1. Builds data dictionary 2. Creates database 3. Set access + security 4. Describes logical view 5. Adding a new field

Data Manipulation Language (DML)= 1. Add/Change delete records in database 2. Adding new record 3. Changes database content

Data Query Language 1. Users means of pulling inform from database 2. Creating queries 3. Retrieve, sort, order, display data

Concept of database file design/normalization

Normalization= assumes that everything is initially stored in one large table
Similar to exam #3 problems regarding database file design.

Chapter 7—Internal Control

Purpose of Internal Control

1. Safeguarding of assets 2. Maintenance of adequate records 3. Reliable financial information 4. Financial statements in accordance with standards 5. Operational efficiency 6. Employee compliance with policies 7. Compliance with laws and regulations 8. Accountants are control consultants

General Categories of controls

1. Preventive Controls= deter problems before they arise 2. Detective Controls= discover problems that are not prevented 3. Corrective Controls= identify and correct problems as well as correct and recover from the resulting error

Components of internal control environment

1. Managements philosophy, operating style, risk appetite 2. Human resource policies and practices and methods of assigning authority & responsibility 3. Influence of audit committee of board of directors 4. Organizational reporting/structure (regulations & requirements) 5. External Influence imposed by FASB, SEC, etc

Purpose of control totals/pre-numbered documents 1. Prevent/minimize errors 2. Reduce possibility of fraud 3. All documents accounted for 4. Help ensure accuracy of all relevant transaction data

Sarbanes-Oxley provisions 1. New rules for auditors—report to audit committee, audit partners rotate 2. New rules for audit committees--- 3. New rules for management---CEO, CFO must certify documents 4. New internal control requirements—

Segregation of Duties concepts 1. Authorization---approving transactions and decisions 2. Recording----preparing source documents, maintaining journals, ledgers 3. Custody----handling cash, inventory, receiving incoming customer checks, writing checks
THESE DUTIES MUST BE SEPERATED!!! * Separate physical custody, authorization and recording of assets

Purpose/composition of audit committee 1. Outside, independent directors, must be on board of directors, and be independent of the company 2. Responsible for financial reporting, regulatory compliance, internal control, and hiring and overseeing internal and external auditors, who report all critical accounting policies and practices to them

Chapter 10-Computeried Controls

Components of backup and recovery plan 1. Insurance for equipment and business loss 2. Appointed disaster team 3. Hot site= facility that is pre-wired, and contains all resources a business needs 4. Cold Site= pre-wired, and a contract with a company that will provide all needed resources within a period of time 5. Files backed up and stored offsite physically or through electronic 6. Recovery plan is fully documented, up-to-date and tested every so often

Computer software program change control 1. Change requests documented and approved 2. Limit access to programs 3. Test the plan 4. Adequate documentation 5. Changes to program reviewed 6. Provide audit trails of changes, authorizations and reviews

Input edits checks/batch controls 1. Good forms design a. Pre-numbering of documents b. Turnaround documents 2. Electronic Cancellation

3. Data entry controls c. Field check—determines whether the characteristics in a field are of the proper type.....numeric in zip code field d. Sign check--- checks for correct arithmetic sign e. Limit check---amount cannot exceed 40 f. Range check—amount is between a range..0-100 g. Size check—6 digit field cannot except a 10 digit input h. Completeness check---checks if all required fields are filled out i. Validity check---checks number to master file to make sure j. Reasonable test—makes sure input in reasonable no overtime hours for someone who hasn’t worked 40 hours k. Batch totals---summarizes important values for a batch of input records l. Financial Total—sums a field that contains monetary values m. Hash total—sums a non-financial numeric field such as inventory n. Record Count—number of records in a batch o. Sequence checks—makes sure that batch of input records is in the proper sequence p. Closed loop verification—checks the accuracy of input data by using it to retrieve and display other related information

Source data automation 1. Data matching 2. File labels a. Header record=located at beginning of each file b. Trailer record= located at the end, contains batch total

EDI, EFT, FEDI 1. Electronic Data Interchange (EDI)= the use of computerized communications to submit business documents electronically in format that can be automatically processed by the recipients information system

2. Electronic Funds Transfer EFT= transfer of monetary funds between 2 or more organizations using computers and other automated technology.

3. Financial electronic data interchange (FEDI)= combination of EDI and EFT that enables both remittance data and funds transfer instructions to be included in one electronic package

Physical and logical access controls 1. Physical control= physical, custody to using something 2. Logical control = the ability to use computer equipment to access company data, dialing into the network

Chapter 12—Revenue Cycle

Segregation of Duties concept 1. Sales (order entry) and Credit authorization 2. Shipping and billing (AR) 3. Cash Receipts and Accounts Receivable 4. Cash Receipts and Credit Memo Authorization 5. Cash Receipts and Reconciling bank statement 6. Accounts receivable and general ledger

Parties/Departments involved in the revenue cycle 1. Receive Sales Order 2. Enter sales order into the system 3. System verifies credit, checks inventory and notifies warehouse and shipping department about the approved sale 4. Warehouse and Shipping, pack goods, ship the goods 5. Invoice generates, and gets send to customer 6. Receive checks—cashier updates Company’s cash balance---AR clerk updated customer accounts. 7. Sales Department---Warehouse---Shipping---Accounts Receivable

Documents used in the revenue cycle, including their purpose 1. Purchase Order/Sales Order 2. Picking Ticket= identifies which items to pick and how many 3. Packing Slip= lists the quantity and description of each item shipped 4. Bill Of Lading= legal contract that defines responsibility of goods in transit

Sequence of Procedures 1. Take Customers Order a. Credit Approval b. Checking Inventory c. Respond to customer inquiries 2. Shipping d. Pick and Pack the order e. Ship the order 3. Billing f. Generate invoice 4. Maintain A/R 5. Cash collection

Revenue Cycle threats and applicable control procedures 1. Look at pg 356-357 in the book

Opportunities for IT 1. EDI for order entry 2. Bar codes 3. Input edit checks 4. Automated warehouse/bar codes/RFID 5. Smart Forklifts 6. Electronic packing slips 7. Image Processing 8. Segregation of duties 9. Lockbox or electronic lockbox 10. EFT/FEDI 11. Credit or Procurement cards

Chapter 13—Expenditure Cycle

Documents used in the expenditure cycle 1. Purchase Requisition--- identifies what is needed 2. Purchase order---document that formally requests a supplier to sell and deliver specified products at a certain price 3. Receiving Report—document details about each delivery, including the date received, shipper, supplier and purchase order number 4. Debit Memo-records the adjustment being requested 5. Disbursement Voucher and Voucher Package---Receiving report, sales invoice, purchase order

Segregation of Duties 1. Purchasing and Accounts Payable 2. Inventory Records and Warehouse 3. Receiving and Warehouse 4. Accounts Payable and Cash disbursement 5. Cash Disbursements and General ledger

Opportunities for IT 1. On-line data requisition 2. EDI or internet 3. Vendor-managed inventory program 4. Reverse auctions 5. Procurements cards for non inventory items 6. Bar-code update of inventory records 7. RFID tags 8. Satellite location tracking

Sequence of Procedures 1. Order materials, supplies, service 2. Receiving materials, supplies, service 3. Approving Supplier Invoices a. Voucher package 4. Cash Disbursement

Parties/Departments involved 1. Various Departments 2. Purchase department 3. Receiving and Warehouse, Inventory 4. Accounts Payable and Cashier

Chapter 14—Production Cycle

Documentation used in the production cycle

1. Bill Of materials= specifies the part number, description, and quantity of each component used in a finished product

2. Operations List= specifies the sequence of steps to follow in making a product, which equipment to use, and how long each step should take.

3. Master Production Schedule= specifies what, when and how much to produce based on customer order, sales forecast, and FG inventory level

4. Production Order= authorizes the start of production. Identifies quantity to be produced, production department required and final destination

5. Materials Requisition= authorizes release of raw materials into production. Serves as a source document for journal entry transferring raw materials to WIP.

6. Move ticket= document transfers of production between departments
Segregation of duties concept 1. Inventory and Warehouse 2. Factory and Production Control 3. Cost Accounting and General Accounting

Activities in the production cycle 1. Product Design 2. Planning and Scheduling 3. Production Operation 4. Cost Accounting

Chapter 15—Payroll Cycle

Use of Payroll impress and general ledger clearing account 1. Payroll Clearing Account= is a general ledger account that is used in a two-step process to check the accuracy and completeness of recording payroll costs and their subsequent allocation to appropriate cost centers.

2. Imprest fund= a cash account with two characteristics (1)- set at a fixed amount such as 100, and (2) vouchers are required for every disbursement. At all times, the sum of cash plus vouchers should equal the present fund balance

Parties/Departments involved in the payroll cycle 1. Human Resource 2. All the business departments 3. Government 4. Bank 5. Accounts Payable

Payroll Cycle Threats and applicable control procedures 1. Imprest payroll account 2. Unclaimed paycheck sent to I/A 3. Reconciliation of check signing machine 4. Control of time cards/blank checks 5. Segregate payroll distribution 6. Payroll file access controls 7. File backups

Sequence of documents and procedures in the payroll cycle 1. Updating payroll master database 2. Validate employee time cards and attendance dates 3. Prepare Payroll 4. Disbursements of Paychecks to employees 5. Reconciling the payroll bank account
Transaction and master file data and access controls 1. Segregate duties to eliminate un-authorized changes to payroll master data 2. HRM department updates master file for hiring, firing, pay changes while cashier should process pay and disbursement

Segregation of Duties concept 1. Timekeeping and Payroll 2. Payroll and Cash Disbursement 3. Payroll and Human Resource 4. Time keeping and Payroll 5. Payroll and Cash Disbursement

Payroll Taxes 1. FICA payable 2. State Unemployed Tax 3. Federal Unemployed Tax

Chapter 17—REA model

Purpose of the E-R diagrams 1. An entity-relationship (E-R) diagram is graphical technique for portraying a database schema 2. Entities are anything about which we collect information 3. Shows the various entities being modeled and the important relationship among them

Components/rules of REA Diagrams 1. Each event linked to at least one resource 2. Each event linked to at least one other event 3. Each even linked to at least two agents

Interpreting an REA Diagram 1. Look at PowerPoint

Chapter 20—Systems Analysis

Sequence and phase of SDLC and specific activities included there in 1. Systems Analysis---initial investigation 2. Conceptual Design---how design will meet users needs 3. Physical Design---translates conceptual into actual design 4. Implementation and Conversion 5. Operation and Maintenance

Types of feasibility analysis 1. Determine feasibility as to: a. Technological implementation b. Operational objectives c. Time constraints d. Legal requirements e. Economic cost vs benefits 2. Report Findings to ISSC f. Determine whether to proceed 3. Capital Budgeting g. Payback i. How long to recoup investment ii. Considers return of investment vs return on investment 4. Economics, Technical, Legal, Scheduling and Operational Feasibility

Responsibilities of parties involved in phases of systems development 1. ISSC Information Systems Steering Committee a. Initiate analysis, review progress 2. Management b. Provide support and direction 3. Accountants c. Users, evaluators, control consultants 4. Project Development team d. System analysts, management, accountants, users, programmers

Information Gathering methods 1. Initial Investigation= conducted to screen the requests for system development 2. Systems survey= extensive study of the current AIS a. Interviews-gathers answers to why questions b. Questionnaire= c. Observation—how system actually works d. Systems documentation= describes how AIS is intended to work

Chapter 8—Controls for System Reliability

Network Architecture and access controls 1. Firewall 2. Boarder Router=connects an organizations information system to the internet

Preventive security controls 1. Authentication a. Passwords b. Biometrics c. Physical devices (badges and cards) d. MULTI-FACTOR AUTHENTICATION IS BEST 2. Authorization e. Access control matrix f. Compatibility test 3. Physical Access g. To computers, LAN wiring, lap-tops, other technology products 4. Remote Access 5. Encryption h. Digital Signature i. Digital Certificate j. Hash

Detective Security Controls 1. Log Analysis a. Labor Intensive b. Prone to human error 2. Intrusion Detection Systems c. IDS unusual behavior of traffic that has passed firewall 3. Security Testing d. Vulnerability Scans e. Penetration Test

Corrective security controls 1. Have a computer emergency response team CIRT a. IT and senior management b. Respond to security incidents 2. Employ a chief security officer CSO 3. Use patch management c. Regularly apply patches and updates to software

Similar Documents