Free Essay

Application Controls

In:

Submitted By makishacruel
Words 2018
Pages 9
aAPPLICATION CONTROLS
Application controls are programmed procedures designed to deal with potential exposures that threaten specific applications, such as payroll, purchases, and cash disbursements systems. Application controls fall into three broad categories: input controls, processing controls, and output controls.

Input Controls Input controls at this stage are designed to ensure that these transactions are valid, accurate, and complete. Data input procedures can be either source document-triggered (batch) or direct input (real time).

Source document input requires human involvement and is prone to clerical errors.
Some types of errors that are entered on the source documents cannot be detected and corrected during the data input stage. Dealing with these problems may require tracing the transaction back to its source (such as contacting the customer) to correct the mistake. Direct input, on the other hand, employs real-time editing techniques to identify and correct errors immediately, thus significantly reducing the number of errors that enter the system.

Classes of Input Control

a. Source Document Controls.
Careful control must be exercised over physical source documents in systems that use them to initiate transactions. Source document fraud can be used to remove assets from the organization.
In the absence of other compensating controls to detect this type of fraud, the system would create an account payable and subsequently write a check in payment.

Control Procedures over Source Documents:

a. Use Pre-numbered Source Documents. Source documents should come prenumbered from the printer with a unique sequential number on each document. Source document numbers permit accurate accounting of document usage and provide an audit trail for tracing transactions through accounting records. We discuss this further in the next section. b. Use Source Documents in Sequence. Source documents should be distributed to the users and used in sequence. This requires that adequate physical security be maintained over the source document inventory at the user site. When not in use, documents should be locked away. At all times, access to source documents should be limited to authorized persons.

c. Periodically Audit Source Documents. Reconciling document sequence numbers should identify missing source documents. Periodically, the auditor should compare the numbers of documents used to date with those remaining in inventory plus those voided due to errors. Documents not accounted for should be reported to management.

b. Data Coding Control
Coding controls are checks on the integrity of data codes used in processing. A customer’s account number, an inventory item number, and a chart of accounts number are all examples of data codes.

Three Types of Error: a. Transcription errors
Three Classes:
• Addition errors occur when an extra digit or character is added to the code. For example, inventory item number 83276 is recorded as 832766.
• Truncation errors occur when a digit or character is removed from the end of a code. In this type of error, the inventory item above would be recorded as 8327.
• Substitution errors are the replacement of one digit in a code with another. For example, code number 83276 is recorded as 83266. b. Transposition errors:
Two Types: * Single transposition errors- occur when two adjacent digits are reversed. For instance, 83276 are recorded as 38276. * Multiple transposition errors- occur when nonadjacent digits are transposed. For example, 83276 are recorded as 87236.

c. Check Digit One method for detecting data coding errors is a check digit. A check digit is a control digit (or digits) added to the code when it is originally assigned that allows the integrity of the code to be established during subsequent processing. The check digit can be located anywhere in the code: as a prefix, a suffix, or embedded someplace in the middle.
The use of check digits introduces storage and processing inefficiencies and therefore should be restricted to essential data, such as primary and secondary key fields. All check digit techniques require one or more additional spaces in the field to accommodate the check digit. In the case of modulus 11, if step three above produces a remainder of 1, the check digit of 10 will require two additional character spaces. If field length is a limitation, one way of handling this problem is to disallow codes that generate the check digit 10. This would restrict the range of available codes by about 9 percent.

d. Batch Controls Batch controls are an effective method of managing high volumes of transaction data through a system. The objective of batch control is to reconcile output produced by the system with the input originally entered into the system. This provides assurance that:
• All records in the batch are processed.
• No records are processed more than once.
• An audit trail of transactions is created from input through processing to the output stage of the system.
Batch control is not exclusively an input control technique. Controlling the batch continues through all phases of the system. We are treating this topic here because batch control is initiated at the input stage.
Achieving batch control objectives requires grouping similar types of input transactions (such as sales orders) together in batches and then controlling the batches throughout data processing. Two documents are used to accomplish this task: a batch transmittal sheet and a batch control log. Figure 7.1 shows an example of a batch transmittal sheet. The batch transmittal sheet captures relevant information such as the following about the batch.
• A unique batch number
• A batch date
• A transaction code (indicating the type of transactions, such as a sales order or cash receipt)
• The number of records in the batch (record count)
• The total dollar value of a financial field (batch control total)
• The total of a unique nonfinancial field (hash total)
Usually, the batch transmittal sheet is prepared by the user department and is submitted to data control along with the batch of source documents. Sometimes, the data control clerk, acting as a liaison between the users and the data processing department, prepares the transmittal sheet. Figure 7.2 illustrates the batch control process.
The data control clerk receives transactions from users assembled in batches of 40 to 50 records. The clerk assigns each batch a unique number, date-stamps the documents, and calculates (or recalculates) the batch control numbers, such as the total dollar amount of the batch and a hash total (discussed later). The clerk enters the batch control information in the batch control log and submits the batch of documents, along with the transmittal sheet, to the data entry department.

e. Hash Totals.
The term hash total, which was used in the preceding discussion, refers to a simple control technique that uses nonfinancial data to keep track of the records in a batch. Any key field, such as a customer’s account number, a purchase order number, or an inventory item number, may be used to calculate a hash total.

f. Validation Controls Input validation controls are intended to detect errors in transaction data before the data are processed. Validation procedures are most effective when they are performed as close to the source of the transaction as possible. However, depending on the type of technology in use, input validation may occur at various points in the system.

Three levels of input validation controls:
Field interrogation involves programmed procedures that examine the characteristics of the data in the field. The following are some common types of field interrogation * Field interrogation involves programmed procedures that examine the characteristics of the data in the field. * Numeric-alphabetic data checks determine whether the correct form of data is in a field. * Zero-value checks are used to verify that certain fields are filled with zeros. Some program languages require that fields used in mathematical operations be initiated with zeros prior to processing. This control may trigger an automatic corrective control to replace the contents of the field with zero if it detects a nonzero value. * Limit checks determine if the value in the field exceeds an authorized limit. For example, assume the firm’s policy is that no employee works more than 44 hours per week. The payroll system validation program can interrogate the hours-worked field in the weekly payroll records for values greater than 44. * Range checks assign upper and lower limits to acceptable data values. For example, if the range of pay rates for hourly employees in a firm is between 8 and 20 dollars, all payroll records can be checked to see that this range is not exceeded. The purpose of this control is to detect keystroke errors that shift the decimal point one or more places. It would not detect an error where a correct pay rate of, say, 9 dollars is incorrectly entered as 15 dollars. * Validity checks compare actual values in a field against known acceptable values. This control is used to verify such things as transaction codes, state abbreviations, or employee job skill codes. If the value in the field does not match one of the acceptable values, the record is determined to be in error. * Check digit controls identify keystroke errors in key fields by testing the internal validity of the code. We discussed this control technique earlier in the section. * Record Interrogation. Record interrogation procedures validate the entire record by examining the interrelationship of its field values. Some typical tests are discussed below. * Reasonableness checks determine if a value in one field, which has already passed a limit check and a range check, is reasonable when considered along with other data fields in the record. * Sign checks are tests to see if the sign of a field is correct for the type of record being processed. * Sequence checks are used to determine if a record is out of order. In batch systems that use sequential master files, the transaction files being processed must be sorted in the same order as the primary keys of the corresponding master file. * File Interrogation. The purpose of file interrogation is to ensure that the correct file is being processed by the system. These controls are particularly important for master files, which contain permanent records of the firm and which, if destroyed or corrupted, are difficult to replace.

* Internal label checks verify that the file processed is the one the program is actually calling for. Files stored on magnetic tape are usually kept off-line in a tape library.

* Version checks are used to verify that the version of the file being processed is correct. In a grandparent–parent–child approach, many versions of master files and transactions may exist. The version check compares the version number of the files being processed with the program’s requirements.

* Expiration date check prevents a file from being deleted before it expires. In a GPC system, for example, once an adequate number of backup files is created, the oldest backup file is scratched (erased from the disk or tape) to provide space for new files.

Input Error Correction.

When errors are detected in a batch, they must be corrected and the records resubmitted for reprocessing. This must be a controlled process to ensure that errors are dealt with completely and correctly.

Three common error handling techniques

a. Correct immediately
If the system is using the direct data validation approach (refer to 7-4(a) and (b), error detection and correction can also take place during data entry. Upon detecting a keystroke error or an illogical relationship, the system should halt the data entry procedure until the user corrects the error.

b. Create an error file
When delayed validation is being used, such as in batch systems with sequential files, individual errors should be flagged to prevent them from being processed. At the end of the validation procedure, the records flagged as errors are removed from the batch and placed in a temporary error holding file until the errors can be investigated. Some errors can be detected during data input procedures. However, as was mentioned earlier, the update module performs some validation tests.

c. Reject the entire batch
Reject the Batch. Some forms of errors are associated with the entire batch and are not clearly attributable to individual records. An example of this type of error is an imbalance in a batch control total.

Similar Documents

Premium Essay

Access Control, Time Log, and Billing Application

...Access Control, Time Log, and Billing Application Executive Summary The need to maximize the economic performance in business organizations remains a key objective for many companies. Since firms lack an effective way to monitor the activities of the workforce, most of the business organizations needs to acquire access control systems, time log, and the billing application. The system assists companies in determining the productivity of the enterprise. Development of well-functioning application that would suit the needs of the ultimate users is often a challenge to the IT engineers. The main issue with the incomplete application is caused by inadequate communication between the developer and the program developers. There have been many research reports that suggest the appropriate procedures in the development of programs to avoid development of uncompetitive programs. Another issue with the development of faulty programs includes failures of the sponsors to provide the adequate requirements for the application. A research on this matter indicates that many firms continue experiencing reduced quality systems. Some organizations spend enormous amount of finances in hope to acquire adequate systems that would satisfy their intended needs. It is unfortunate that some of the developed systems end failing to deliver as expected by the sponsors. Such issues emerge from inadequate communication between the users and developers. In some cases, they might manifest after implementation...

Words: 2212 - Pages: 9

Premium Essay

Management Controls

...management controls. IT Audit is the process of collecting and evaluating evidence to determine whether a computer System has been designed to maintain data integrity, safeguard assets, allows organizational goals. To be achieved effectively, and uses resources efficiently. Data integrity relates to the accuracy and completeness of information as well as to its validity in accordance with the norms. An effective information system leads the organization to achieve its objectives and an efficient information system uses minimum resources in achieving the required objectives. IT Auditor must know the characteristics of users of the information system and the decision making environment in the audit organisation while evaluating the effectiveness of any system. The potential for material systems error has thereby been greatly increased causing great costs to the organisation, e.g., the highly repetitive nature of many computer applications means that small errors may lead to large losses Controls in a computer information system reflect the policies, procedures, practices and organizational structures designed to provide reasonable assurance that objectives will be achieved. The controls in a computer system ensure effectiveness and efficiency of operations, reliability of financial reporting and compliance with the rules and regulations. Information system controls are broadly classified into two broad categories: * General Controls * Application controls General controls...

Words: 1027 - Pages: 5

Free Essay

Friday

...Section A Ans 1A The term audiovisual (AV, or A/V) may refer to works with both a sound and a visual component, the production or use of such works, or the equipment used to create and present such works. Slide-tape presentations,[1] films, and television programs are examples of audiovisual presentations. Once audiovisual media came into existence, it became a part of people's everyday lives within a few decades.[2] Business presentations are also usually audiovisual. In a typical presentation, the presenter provides the audio by speaking, and supplements it with a series of images projected onto a screen, either from a slide projector, or from a computer connected to a projector using apresentation program (software). In the developed world, there has been a huge uptake of computer-based audiovisual equipment in the education sector, with many schools and higher educational establishments installing projection equipment and often using interactive whiteboard technology. Ans1B A teleconference is a meeting or conference held via a telephone or network connection between participants in remote cities or work sites. Many types of teleconferences exist, with the simplest form involving the use of a speaker phone at each location to conduct an audio conference. More sophisticated teleconference meetings involve the exchange of audio, video, and data. The term teleconference can also refer to a live event that is transmitted via satellite to various locations simultaneously...

Words: 3586 - Pages: 15

Premium Essay

Nt1210 Unit 2.3 Application Layer

...2.2.3 Application layer The application layer consists of management and business-oriented software. It can also be understood as a user interface for the control layer. From the management point of view, the programs running in the application layer may provide the network engineers with statistics about their networks. Currently using application layer metrics in the form of a common measurement solution received minor attention. Such as application of a measurement can be a generic usage-based charging as a service. In another word, a more flexible measurement which is software defined and written by providers of service customized for their own specific use, transparent from their interior applications and end-users [24]. 2.3 OpenFlow protocol...

Words: 395 - Pages: 2

Premium Essay

Brose Paper

...countries   * It has a world-wide workforce of 14,000 employees. |     * Brose Groups has a strong communication between suppliers, plants, and customers.   * Standardized business processes to make for more efficient enterprise capabilities   * Well-organized supply chain |   2. What operational, management and control, and corporate learning/innovation challenges were faced by Brose during its rapid expansion over the last two decades? [table] Operational |     * Too many different information systems   * Hampered communication among suppliers, plants and customers | Management | The company has a huge expansion in the number of employees | Control |Inherited a wide range of functional software application |   3. What would be the benefits and the risks of retaining the functional application software found in each Brose location prior to the move to SAP?   [table] Benefits | Risks |     * the company will have no need to do any changes of current information into new application software   * there is no extra cost to implement new software   * Staff is not required to learn new software applications   * Employees will be happy with the current functional application software which they are very familiar with. |     * The current operational software may out of date and doesn’t work well   * it may cost the company more to use the old software system   * Inadequate investment in training for their staff   * managers and employees may be hesitant with the implementation of...

Words: 294 - Pages: 2

Premium Essay

Application.Servers.for.E-Business

...Application Servers for E-Business Table of Contents Application Servers for E-Business - 2 Preface - 4 Chapter 1 - Introduction - 5 Chapter 2 - A Survey of Web Technologies - 22 Chapter 3 - Java - 44 Chapter 4 - CORBA - 65 Chapter 5 - Application Servers - 82 Chapter 6 - Design Issues for Enterprise Deployment of Application Servers - 114 Chapter 7 - Tying It All Together - 137 References - 160 For More Information - 163 page 1 Application Servers for E-Business Application Servers for E-Business Lisa M. Lindgren Auerbach Library of Congress Cataloging-in-Publication Data Lindgren, Lisa. Application servers for e-business / Lisa M. Lindgren. p.cm. Includes bibliographical references and index. ISBN 0-8493-0827-5 (alk. paper) 1. Electronic commerce. 2. Application software—Development. I. Title. HF5548.32 .L557 2001 658′.0553–dc21 00-050245 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system,...

Words: 98260 - Pages: 394

Premium Essay

Unit 9 - Gpo Planning Scenario Assignment

...Policy can be used to install, upgrade, patch, or remove software applications when a computer is started, when a user logs on to the network, or when a user accesses a file associated with a program that is not currently on the user’s computer. 2. What is Repackaging Software? It is taking a snapshot of a clean computer system before the application is installed, installing the application as desired, and taking a snapshot of the computer after the application is installed. A clean computer system is defined as a system with no other applications installed and only those service packs, hot fixes, and operating system patches that are required for operating system functionality. The repackaged application takes into account the changes to the registry, system settings, and file system caused by the installation itself. When you repackage an application, you are creating a relational database that tracks the installation parameters associated with the application. 3. What is the use of Using Software Categories Allowing users to choose the applications they prefer provides them with some level of control over their working environment. It is possible to publish all of the available applications to give the users complete control over their environment. However, when a larger number of applications are published, the users may get confused and have difficulty understanding the purpose of each application. In addition, they may have difficulty locating the programs they...

Words: 814 - Pages: 4

Premium Essay

Brose Casestudy

...What is the Brose Groups business and what are the critical success factors (CSF’s) in a business like Brose’s? [lists] What is there business: • Automotive Supplier • Turnover of 4 billion (2011) • Founded 1908 • Product: Car Parts • International (25 different countries) • Private Company (family owned) • Headquarters in Germany • Supplies over 40 auto brands • 14,000 employees Critical success factors: • 1990s acquisition of existing companies • acquired a wide range of functional software applications • Later standardize operations • R/3, an ERP application licensed by SAP • Supports over a 1000 business processes |Benefits of Functional Application Software |Risks of functional application software | |No reengineering of structure and existing processes needed |Software does not align with all of Brose business processes | |Employees able to handle |Less oversight and measure of business process | |No additional training is needed for new software |No real-time reports and process value chain integration | |Lower costs in short term |Not able to accumulate comprehensive and accurate data ...

Words: 1298 - Pages: 6

Free Essay

Bsa 375 Week 4 Individual Paper

...to create report definitions and layouts, screen definitions and layouts, data element definitions, and workflow diagrams. In order for it to be successful, it starts with a high-level meeting with the COO Hugh McCauley. In this meeting, I will ask Mr. McCauley to assign stakeholders and dedicate them to this information gathering process. The Ideal stakeholder would be a manager or supervisor from each area of the department who has everyday working knowledge of the current HR IT system and the IT technical staff whose job it is to ensure the new system will work under the current IT infrastructure. At the end of this meeting, I would explain to the COO that I plan to follow the software development life cycle (SDLC) and use joint application development (JAD) sessions for information gathering. JAD will provide a well-organized written document upon the conclusion of the sessions that itemizes the processes that will take place along with who will be working on each task. Information Gathering Techniques: During the...

Words: 3437 - Pages: 14

Free Essay

Assignment 1

...miles, and data rates are typically ranging from 64 Kbps to 100 Mbps, although nowadays they can get up to 10 Gbps. WANs connect BNs and MANs, and are usually made by leasing circuits provided by IXCs. The data transmission rates are anywhere from 64 Kbps to 10 Gbps. 12. Describe the seven layers in the OSI network model and what they do. The seven layers are as follows; Application, Presentation, Session, Transport, Network, Datalink, and Physical. The application layer is a set of utilities used by application programs. The presentation layer formats data for presentation to the user and provides data interfaces, data compression and translation between data formats. The session layer initiates, maintains and terminates each logical session sent between the sender and receiver. The transport layer deals with the end to end issues such as segmenting the message for network transport, as well as maintaining the logical connections between sender and receiver. The network layer is for making routing decisions. The data link layer is for message delineation, error control and network medium access control. The last layer is the...

Words: 1047 - Pages: 5

Free Essay

Engineer

...Georgia Institute of Technology, Atlanta TECHNICAL SKILLS: J2EE Framework, JAVA, JSP, C/C++, UNIX Shell scripts, JavaScript, JDBC, XML web service, Struts MIDDLEWARES: WEBLOG, , STRUTS, CORBA for JAVA and C++, EJB, WLI. WORKING EXPERIENCES: 1996.12 – 1997.7: Concerto Software, Software Engineer Developed software systems for large telephone centers including the development of a Flex Server for Meridian One Switch that enables agents to transfer inbound or outbound calls according to real-time statistics. 1997.7 – current: Verizon Corporation, Member Technical Staff • Local Number Portability (1997), Major Developer, Participated in planning, designing and implementing the LNP application that allows customer to change their local phone service carriers without changing their phone number • Advanced IP Services Ordering System (1998) Participated in planning, designing and implementing the web-based ordering system that allows retail customers to order Verizon IP services (VOIP, FaxOIP, Unify messaging) from internet. Was responsible for server side DB and architecture design and implementation. • Verizon Supply Interface (1999) Participated in designing and implementing the interface between Verizon DSL Ordering System and Verizon Logistic Supply system. • Verizon ADSL Icare System (2001) Participated in implementing, enhancing and maintaining the web-based customer...

Words: 735 - Pages: 3

Premium Essay

Management

...Database Management System is a System Software or an Application Software System Software: System software is computer software or an operating system designed to operate and control the computer hardware and to provide a platform for running application software. Actually, system software is any computer software which manages and controls computer hardware so that application software can perform a task. Operating systems, such as Microsoft Windows, Mac OS X or Linux, are prominent examples of system software. System software is not meant to be run by the end user. For example, while you might use your Web browser every day, you probably don't have much use for an assembler program. System software runs at the most basic level of your computer. Application Software: Application software, also known as an application or an app, is computer software designed to help the user to perform specific tasks. Examples include enterprise software, accounting software, office suites, graphics software. Application software applies the power of particular system software to a particular purpose. Applications software (also called end-user programs) includes database programs, word processors, and spreadsheets. Applications software sits on top of systems software because it is unable to run without the operating system and system utilities. Example of system software and application software given in a chart: Database Management System(DBMS): A database management system (DBMS)...

Words: 635 - Pages: 3

Premium Essay

Student

...accounts receivable, and accounting. Input controls help ensure the validity, accuracy, and completeness of the data entered into an accounting information system. When working with input controls it is important to observe, record, and write down all the companies’ data. When observing the data the company must make use of dual observation, for the fact that more than one employee is involved in the observation process. It is essential for a company to record all of its data, so nothing gets misread, misinterpreted, or lost. When recording data some companies prefer to use electronics such as the use of point-of-sale devices and smart cash registers. Although the electronic option on recording data can make the process much easier, some businesses find the electronic method not feasible, therefore their documents must be prepared manually. When businesses choose to record their data manually, preprinted recording forms are sometimes used. Edit test may also be used. Processing controls process the companies’ information once it has been entered into the companies’ computer system. It is important for companies to have a clear audit trail. Having a clear audit trail helps trace transactions in order to provide all the proper documentation for changes in general ledger account balances, to prepare financial reports, and to correct errors in transactions. Some companies’ have information systems known as batch control totals, which represent the dollar amounts that...

Words: 1075 - Pages: 5

Premium Essay

Mis Job Posting

...With the rise of the importance of information and of information technology, the range of career opportunities for IS managers has expanded. To illustrate the variety of jobs running in MIS and the importance of IS to other career paths, I have listed four job openings in MIS and four other ones in Accounting, which is an area that heavily relies on information systems. Careers in MIS Job title: Software quality assurance analyst Skills and knowledge requirements: • Education: Completion of high school, completion of college/CEGEP/vocational or technical training • Experience: 3 years to less than 5 years • Languages: Speak English, read English, write English • Specific skills: Confer with clients to identify and document requirements, conduct business and technical studies, design, develop and implement information systems business solutions, provide advice on information systems strategy, policy, management and service delivery, develop and implement policies and procedures throughout the software development life cycle, conduct reviews to assess quality assurance practices • Computer and technology knowledge: Windows, Intranet, Internet, Multimedia software, Word processing software, Spreadsheet software, Presentation software, Office suites, Electronic mailing software • Work conditions and physical capabilities: Fast-paced environment, work under pressure, tight deadlines, repetitive tasks, attention to detail, combination of sitting, standing, walking • Essential...

Words: 1801 - Pages: 8

Free Essay

Erp Solutions with Sap.

...plan and control an organization so the organization can use its internal knowledge to seek external advantage. The ERP system is a set of software applications that organize, define and standardize the business processes necessary to effectively plan and control an organization. Essentially, ERP applications are a computer model of a business, embodying the products and processes, information flow, procedures, and relationships between functions and activities. A set of planning applications can provide recommendations for what must be accomplished in order to meet the forecasted demand and keep the business functioning smoothly. Planning is at the core of ERP and is embodied in a top-down hierarchy of functions: master planning, detailed material and resource planning, and execution, such as production control and purchasing. Master planning is the executive level function that sets the operational business plan, supports the sales and operations planning (S&OP) process. Detailed material planning (Material Requirements Planning or MRP) uses bill of material and inventory information to develop a complete manufacturing and purchasing plan for all products, assemblies, components and materials. At this level capacity requirement planning (CRP) ties the production plan to resource availability, creating work center capacity and loading. Clustered around the planning core functions, additional software modules provide support for executing the plan (production control, purchasing)...

Words: 2606 - Pages: 11