Chapter 8: Problem 6
Which of the following control activities is not relevant when a company uses a computerized (rather than manual) accounting system? (a) Establishment of responsibility. (b) Segregation of duties. (c) Independent internal verification. (d) All of these control activities are relevant to a computerized system.
Short Answer
Step by step solution
Understanding the Options
Analyze Establishment of Responsibility
Check Segregation of Duties
Review Independent Internal Verification
Evaluate Option (d)
Unlock Step-by-Step Solutions & Ace Your Exams!
-
Full Textbook Solutions
Get detailed explanations and key concepts
-
Unlimited Al creation
Al flashcards, explanations, exams and more...
-
Ads-free access
To over 500 millions flashcards
-
Money-back guarantee
We refund you if you fail your exam.
Over 30 million students worldwide already upgrade their learning with 91Ó°ÊÓ!
Key Concepts
These are the key concepts you need to understand to accurately answer the question.
Establishment of Responsibility
In a computerized context, responsibility often revolves around tasks like data entry, managing updates, and monitoring systems. For instance:
- Assigning a person to input financial data ensures that there is a clear point of contact for any discrepancies in those figures.
- Designating someone to oversee system updates ensures that changes are implemented smoothly and correctly, with accountability for any potential system issues.
- Clearly defined roles turn oversight into a controllable and transparent process, integral for audits and internal reviews.
Segregation of Duties
Here are some aspects of segregation in computerized environments:
- Different individuals should be responsible for authorizing transactions, recording them, and handling assets. This minimizes the risk of unauthorized activities.
- Roles should be set in the software to limit access to sensitive information based on a user's responsibilities and needs.
- By dividing responsibilities, it is easier to track who accessed particular data, adding a layer of transparency and security.
Independent Internal Verification
Some examples of this practice include:
- Having independent personnel periodically review financial records and system logs for unusual activities or errors, ensuring that records match actual transactions.
- Automated reports and alerts set up within the system can continuously monitor for deviations from established protocols.
- Conducting regular audits helps evaluate the effectiveness of other controls and ensure adjustments are made when necessary.