SM Ch7
SM Ch7
SM Ch7
Review Questions
Response
a. field
b. field
c. file
dfield
e. record
f. file
g. field
h. record
i. field
j. file
k. field
l. record
9. If all of the inputs have been validated before processing, then what purpose do
run-to-run controls serve?
Response: The run-to-run control is a control device to ensure that no
records are lost, unprocessed, or processed more than once for each of the
computer runs (processes) that the records must flow through.
Discussion Questions
1. The field calls for an “M” for married or an “S” for single. The entry is a “2.” What
control will detect this error?
Response: Numeric/alphabetic data checks or validity check
2. The firm allows no more than 10 hours of overtime a week. An employee entered
“15” in the field. Which control will detect this error?
Response: Limit check
3. The password was “CANARY”; the employee entered “CAANARY.” Which control
will detect this error?
Response: Validity check
4. The inventory item number was omitted on the purchase order. Which control
will detect this error?
Response: Missing data check
5. The order entry system will allow a 10 percent variation in list price. For example,
an item with a list price of $1 could be sold for 90 cents or $1.10 without any system
interference. The cost of the item is $3, but the cashier entered $2. Which control
would detect this error?
Response: Range check
6. How does privacy relate to output control?
Response: If the privacy of certain types of output is violated, for example,
sensitive information about clients or customers, a firm could be legally exposed.
9. Output controls ensure that output is not lost, misdirected, or corrupted and that
privacy is not violated. What are some output exposures, or situations where output
is at risk?
Response: Output is removed from the printer by the computer operator,
separated into sheets and separated from other reports, reviewed for correctness by
the data control clerk, and then sent through interoffice mail to the end user. Each
stage in this process is a point of potential exposure where the output could be
reviewed, stolen, copied, or misdirected. An additional exposure exists when
processing or printing goes wrong and produces output that is unacceptable to the
end user. These corrupted or partially damaged reports are often discarded in waste
cans. Computer criminals have successfully used such waste to achieve their illicit
objectives.
10. Input validation includes field interrogation that examines the data in individual
fields. List four validation tests and indicate what is checked in each.
Response: Numeric-alphabetic checks look for the correct content in a field,
numbers, or letters; zero-value checks determine if necessary zeros are present;
limit checks verify that values are within preset limits; range checks verify the
values fall within an acceptable range. Other acceptable responses include missing
data checks that look for blank spaces, validity checks that compare actual values in
a field against known acceptable values, and check digit controls that identify
keystroke errors in key fields.
1. B 17. C
2. B 18. A
3. D 19. D
4. C 20. A
5. C 21. D
6. D 22. C
7. B 23. B
8. C 24. C
9. D 25. C
10. D 26. A
11. C 27. C
12. C 28. B
13. C 29. A
14. D 30. C
15. C 31. B
16. D 32. C
Problems
1. Input Validation
Identify the types of input validation techniques for the following inputs to the
payroll system. Explain the controls provided by each of these techniques.
a. Operator access number to payroll file
b. New employee
c. Employee name
d. Employee number
e. Social Security number
f. Rate per hour or salary
g. Marital status
h. Number of dependents
i. Cost center
j. Regular hours worked
k. Overtime hours worked
l. Total employees this payroll period
Response:
a. File Interrogation. Verify internal label to ensure the correct file is being accessed.
b. Record Interrogation. Reasonableness and sequence checks to verify the entire
record. Field checks on pay rate and personal information to be entered: Validity
check, missing data check, sign checks, numeric-alphabetic data check.
c. Alphabetic check validates that letters are entered where only letters are required
to be entered, e.g., employee name.
d. Check digit to verify that the number is correct .
e. Missing data check, numeric check, validity check.
f. Range check, reasonableness check sign check
g. Missing data check ensures that no blank fields are entered where data should be
present, e.g., marital status, validity check
h. Reasonableness check, limit check. Missing data check.
i, Validity check.
j. limit check, missing data check
k. Reasonableness checks validate that only data within a pre-specified range is
entered, e.g., number of hours worked greater than zero and less than 70.
l. Batch control totals
Required:
For each of the three data control categories listed, provide two specific controls
and explain how each control contributes to ensuring the reliability of data. Use the
following format for your answer.
Control Specific Contribution to
Category Controls Data Reliability
Response:
Presented below are the three data control categories, two specific controls, and
how each control contributes to ensuring the data reliability.
Required:
Determine control techniques to make sure that all orders are entered accurately
into the system. Also, discuss any differences in control measures between the batch
and the real-time processing.
Response: For the phone orders, if a customer has a customer number, it should be
verified against a master file. If a customer needs to establish a customer number,
one should be assigned, and the customer’s name should be entered. A missing data
check should be used to verify that a first name, last name, and street address have
been entered. If the firm has a U.S. zip code database, the zip code can be entered
and the city and town should appear.
The payment method should be a menu choice of credit cards that are
accepted. The credit card number should be entered into an alpha-numeric field as
well as the expiration date—a numeric field. Once the order is totaled, authorization
with the credit card company will be provided online. The item ordered should be
entered and verified against an inventory master file. The description should appear
and be read to the customer and verified as accurate. The unit price should
automatically appear. The quantity should be entered, and a range check performed
to see if the order is reasonable.
For the batch processed data, customers without customer numbers should be
placed into a batch for adding and receiving customer numbers before the order can
be processed. For those orders with customer numbers, the data will be grouped
into batches. Check digits will be calculated for the customer numbers and the
inventory items. Any records that have an invalid customer number, invalid
inventory item, check digits that do not match, or an unreasonable quantity ordered
will be written to an error file, and the rest of the orders will be processed. The
clean transactions should be sorted according to charge type and the credit card
numbers verified. Any rejected transactions will be sent to a special file from which
letters will be sent to the customer. The doubly-clean transactions will then be
processed. The real-time processing technique is more efficient because any errors
can be resolved easily and immediately.
Response:
Key Points
a. Immediate Correction: In the direct data validation approach, error detection
and correction take place during data entry. When an error or illogical relationship
is entered, the system should halt the data entry procedure until the error is
corrected.
b. Creation of an Error File: In the delayed data validation approach, errors are
flagged and placed in an error file. Records with errors will not be processed until
the error is investigated and corrected.
c. Rejection of the Batch: Some errors are associated with the entire batch and are
not attributable to individual records. An example of this is a control total that does
not balance. The entire batch is placed in the error file and will be reprocessed when
the error is corrected.
5. Many techniques can be used to control the input effort. Write a one-page
essay discussing three techniques.
Response:
Key Points
a. Source document controls are designed to control the documents used to initiate
transactions with pre-numbered source documents, used in sequence, and
periodically accounted for.
b. Data coding controls are designed to check on the integrity of data by preventing
transcription errors and transposition errors.
c. Batch controls are designed to manage large volumes of data by repeatedly
verifying totals of specific fields, some financial and others nonfinancial.
Response:
Key Points
a. Transaction logs list all transactions successfully processed by the system and
serve as journals, and permanent records. Transactions that were not processed
successfully should be recorded in an error file.
b. After processing transactions, a paper transaction listing should be produced and
used by appropriate users to reconcile input.
c. Logs and listings of automatic transactions should be produced for transactions
initiated internally by the system.
d. Error listing should document all errors and be sent to appropriate users to
support error correction.
Response:
Key Points
The test data method is used to establish application integrity by processing
specially prepared sets of input data through production applications that are under
review. The results of the test are compared with the expected results. The base
case system evaluation tests extend the test data method; the test data set
constrains all possible transaction types. Tracing is an electronic walk-through of
the application’s internal logic and analysis of the execution of each program
command line for a specific transaction. An integrated test facility is an automated
technique that enables the auditor to test an application’s logic and controls during
its normal operations by creating dummy transactions and files. This method
promotes ongoing application auditing. Parallel simulation involves creating a
simulation of the transaction processing system and then using actual transactions
to determine if the results of processing reconcile with the organization’s
transaction processing system.