Edp
Edp
Edp
Communicating with the Computer Source code ---------> Compiler ---------> Object code Human languages Machine languages B. Data Organization Data hierarchy Bit Byte Field Record File Data Base Definition a 0 or a 1 a group of related bits a group of related bytes a group of related fields a group of related records a group of related files Example 0 or 1 A, B, 1, 2 name name, SS#, rate payroll for all employees payroll and personnel
Data Base -- A centralized set of interrelated files combined to reduce data redundancy and enhance data consistency. The data base is accessible to multiple authorized users who utilize it in performing various applications e.g. payroll, general ledger update, billing etc. Example: A bank may maintain a data base system for customers savings accounts that includes the customers names, addresses, account numbers, and the activity in and balances of the savings accounts. From this data base, a variety of users can extract information for different purposes. Tellers can use the data base to determine whether or not a customer has sufficient funds for a withdrawal. The accounting function can use the data base to compute interest payments. The marketing function can use the data base to gather names and addresses for a marketing survey. Data bases can be hierarchical or networked, but by far the most popular structure of databases relational. Relational databases resemble spreadsheets, but allow tremendous flexibility in manipulating the data. The underlying basis of all major accounting software packages is now a relational database. Data Base Management System (DBMS) - a set of software programs which manages (creates, accesses and maintains) the database.
Access controls are very important and typically include restrictions on which fields can be accessed by which users and/or which machine locations. Special attention must be paid to back up procedures. A database administer is also an important control in a database environment. Data Base Administrator (DBA) - Maintains the 1) DBMS 2) data dictionary - which defines the data 3) controls over the DB and 4) Utility programs. When a DBA exists the auditor must be aware of the inherent violation of separation of duties. The DBA serves an important control mechanism in C Data Storage Mechanisms-TAPE - sequential access - batch processing - use when large data files infrequently accessed need data for extended time period-BACKUP - advantages cheaper updating doesnt destroy data - disadvantage must read entire file up to desired record D. Data Processing Methods 1. Batch Processing - data is accumulated by type of transaction (e.g. payroll or sales) and then it is both entered and processed in batches at one time. The advantages of batch processing are hard copy documentation and batch control totals/reference numbers.
Key Data to Tape Errors for Correction and Reentry Old Master File
DISK - random (direct) access - OLRT processing - use when frequent access or rapid retrieval needed rapid update needed - advantages fast access less cumbersome - disadvantages more expensive destructive update
Transaction File
Validate
2.
On-line Entry/Batch Processing - individual transactions are entered directly into the computer via terminal which allows them to be subjected to certain edit or validation checks. A validated transaction file is accumulated as the transactions are entered and is later used to update the master file. Batch controls are still used.
Terminal
Periodic Processing
Master File
3.
On-line Entry/On-line Processing - similar to #2 except the master files are updated concurrently with data entry and a transaction log (or register) is produced that consists of a chronological record of all transactions.
Entry of data & Receive Error/ Validation Messages; Receive Transaction Results
Immediate Transaction Terminal E. Data Processing Configurations 1. 2. Stand alone mainframe, mini or microcomputer Networks--computers linked together to enhance individual and group productivity through transmission media. Each computer has a network interface card (hardware) which allows it to hookup to the other computers. a. Networks facilitate sharing of data, processing and resources between different users e.g. files, databases, application programs, printers, scanners, tape backup devices, etc. They are sometimes called distributed processing systems. However distributed processing systems can also imply a traditional mainframe computer hooked up to a series of small computers. Regardless, LANs and distributed systems reduce the load on the main computer by transferring certain edit and processing functions to the users in remote sites. Networks can be either Local Area Networks (LANs) or Wide Area Networks (WANs). Both kinds of networks can carry either voice or data. Validation, Update & Process Log
i.
LOCAL AREA NETWORK (LAN) - a configuration of microcomputers located in a close physical relationship which facilitates high speed communication and information sharing between them. In a LAN, the machines are connected by cables (typically coaxial, copper or fiber optic). A dedicated high-speed, high-capacity microcomputer (called a server) allows the linked computers to access the same data, software, and peripheral equipment simultaneously, as well as communicate with each other. WANs-- cover larger geographical distances and can be private (e.g. a particular companyscalled an Intranet or Extranet) or public (e.g. the Internet). In a WAN, the machines are typically connected by phone lines, but satellites or microwaves can also be used.
The Internet and Electronic Commerce
ii.
What is electronic commerce? Broadly defined, it is any business activity taking place using electronic communication software. It describes all types of business transactions, including internal business functions, business-to-business transactions, and business-to-consumer exchanges. Compared to traditional methods of doing business, on-line, transaction-oriented communication offers numerous and significant benefits. Enhanced productivity, better service, worldwide 24 hour availability, fast access to a wide range of useful information, and the ability of a small business to compete with a much larger business are just a few. The financial impact of continuing growth is significant The popularity and functionality of the Internet is growing daily. Depending on whose numbers you believe, there are between 25 or 80 million people using the Internet. By the year 2000 it is predicted that 200 million users will be connected via the Internet. If the growth continues as most Internet service providers (ISPs) predict, by 2010 a billion people will be on-line. The financial impact of this growth is significant. Analysts suggest that the entire Internet market will swell to over $150 billion by the year 2000. While consumer purchasing is expected to mushroom, business user will account for the lions share of Web commerce. The forecast for Internet commerce by consumers is projected to grow from $730 million in 1996 to $20 billion in 2000, while business sales on the Internet will grow form $120 million to $134 billion. The impact of electronic commerce extends well beyond the Internet. Simply put, electronic commerce takes much of the complexity out of everyday business interactions. It reduces lead times, enhances productivity, and saves money, giving new meaning to the faster, better, cheaper model that has become the underlying principle of todays global business arena. The use of Internet-based applications also has created a range of customer self-service activities that were not possible via traditional customer/supplier interactions. Buyers can check product availability and inventory levels, place orders, and determine the status of their orders any time of the day or night. On-line security is now at its highest level in history One element keeping electronic commerce from being readily accepted is the concern over transaction and information security. The issue of security has been extensively addressed through the application of new technologies, firewalls, decentralized systems, and encryption techniques. As a result, on-line security is at its highest level in history. Youre probably safer placing a credit card transaction over the Internet than handing your credit card to a complete stranger in a restaurant and asking the person to total your bill with it. From: Strategies by Shenck & Associates
II.
COMMON FLOWCHARTING SYMBOLS Document This can be a manual form or a computer printout
Computer Operation Computer process which transforms input data into useful information Manual Operation Manual (human) process to prepare documents, make entries, check output, etc. Determines which alternative path is followed (IF/THEN/ELSE Conditions) General input or output to a process. Often used to represent accounting journals and ledgers on document flowcharts. Refers to direct access computer storage connected directly to the CPU. Data is available on a random access basis. Refers to a file or indicates the mailing of a document, i.e., invoices or statements to customers. A letter in the symbol below the line indicated the order in which the file is stored. (N-Numerical, C-Chronological, A-Alphabetical) D=Date C/N Customer number
Decision
Input/Output
On-line Storage
Off-line Storage
On-Page Connector Connects parts of flowchart on the same page. Off-Page Connector Connects parts of flowchart on separate pages.
The greatest good you can do for another is not just to share your riches, but to reveal to him his own.
Benjamin Disraeli
Display
Visual display of data and/or output on a terminal screen. Manually computed total before processing (such as the number of records to be processed). This total is recomputed by the computer and compared after processing is completed. Used for reading, writing, or storage on sequential storage media. Random access storage media used for reading, writing, or storage. Provides additional description or information connected to symbol to which it annotates by a dotted line (not a flowline). Shows direction of data flow, operations, and documents. Refers to data entered through a terminal keyboard or key-to-tape or key-to-disk device. Sometimes they just use the manual operation symbol.
Magnetic Tape
Magnetic Disk
Annotation
Flowline
Items 1 through 3 are based on the following section of a system flowchart for a payroll application. BATCHED TIME CARDS A
ERRORS
1.
2.
Symbol B could represent a. Computation of net pay. b. Separation of erroneous time cards. c. Validation of payroll data. d. Preparation of the payroll register. Symbol C could represent a. Batched time cards. b. Unclaimed payroll checks. c. Erroneous time cards. d. An error report.
3.
Nothing gives one person so much advantage over another as to remain cool and unruffled under all circumstances.
Thomas Jefferson
4. Which of the following symbolic representations indicates that new payroll transactions and the old payroll file have been used to prepare payroll checks, prepare a printed payroll journal, and generate a new payroll file? a.
Input Data
b.
Transaction Register
c.
5. In a credit sales and cash receipts system flowchart symbol X could represent a. Auditors test data. b. Remittance advices. c. Error reports. d. Credit authorization forms.
d.
Items 6 and 7 are based on the following flowchart of a clients revenue cycle:
6.
Symbol A most likely represents a. remittance advice file. b. Receiving report file. c. Accounts receivable master file. d. Cash disbursements transaction file. Symbol B most likely represents a. Customer orders. b. Receiving reports. c. Customer checks. d. Sales invoices. BIG ROCKS
7.
One day an expert was speaking to a group of business students and, to drive home a point, used an illustration those students will never forget. As this man stood in front of the group of high-powered overachievers he said, "Okay, time for a quiz." Then he pulled out a one-gallon, wide-mouthed mason jar and set it on a table in front of him. Then he produced about a dozen fist-sized rocks and carefully placed them, one at a time, into the jar. When the jar was filled to the top and no more rocks would fit inside, he asked, "Is this jar full?" Everyone in the class said, "Yes." Then he said, "Really?" He reached under the table and pulled out a bucket of gravel. Then he dumped some gravel in and shook the jar causing pieces of gravel to work themselves down into the spaces between the big rocks. Then he asked the group once more, "Is the jar full?" By this time the class was onto him. "Probably not," one of them answered. "Good!" he replied. He reached under the table and brought out a bucket of sand. He started dumping the sand in and it went into all the spaces left between the rocks and the gravel. Once more he asked the question, "Is this jar full?" "No!" the class shouted. Once again he said, "Good!" Then he grabbed a pitcher of water and began to pour it in until the jar was filled to the brim. Then he looked up at the class and asked, "What is the point of this illustration?" One eager beaver raised his hand and said, "The point is, no matter how full your schedule is, if you try really hard, you can always fit some more things into it!" "No," the speaker replied, "that's not the point. The truth this illustration teaches us is: If you don't put the big rocks in first, you'll never get them in at all." What are the 'big rocks' in your life? A project that YOU want to accomplish? Time with your loved ones? Your faith, your education, your finances? A cause? Teaching or mentoring others? Remember to put these BIG ROCKS in first or you'll never get them in at all. --- So, tonight or in the morning when you are reflecting on this short story, ask yourself this question: What are the 'big rocks' in my life or business? Then, put those in your jar first.
What's the definition of an accountant? Someone who solves a problem you didn't know you had in a way you don't understand. What's the definition of a good tax accountant? Someone who has a loophole named after him. What's an auditor? Someone who arrives after the battle and bayonets all the wounded. An accountant is having a hard time sleeping and goes to see his doctor. "Doctor, I just can't get to sleep at night." "Have you tried counting sheep?" "That's the problem-I make a mistake and spend three hours trying to find it." ***************************************************************************** A fellow has been learning to be a balloonist and takes his first solo flight. Unfortunately the wind gets up, he is blown off course and forced to land. He is in a paddock close to a road, but has no idea where he is. He sees a car coming along the road and hails it. The driver gets out and the balloonist says, "G'day mate, can you tell me where I am? "Yes, of course." says the motorist. "You have just landed your balloon and with this wind you have obviously been blown off course. You are in the top paddock on John Dawson's farm, 13.5 kilometers from Condobolin. John will be ploughing the paddock next week and sowing wheat. There is a bull in the paddock. It's behind you and about to attack you." At that moment the bull reaches the balloonist and tosses him over the fence. Luckily he is unhurt. He gets up, dusts himself off and says to the motorist, "I see you're an accountant!". "Good grief", says the other man, "you're right. How did you know that?" "I employ accountants," says the balloonist. "The information you gave me was detailed, precise and accurate. Most of all it was useless and arrived far too late to be of any help." ****************************************************************************** A business man was interviewing applicants for the position of divisional manager. He devised a simple test to select the most suitable person for the job. He asked each applicant the question, "What is two and two?" The first interviewee was a journalist. He answered "Twenty-two". The second applicant was an engineer. He pulled out a slide-rule and showed the answer to be between 3.999 and 4.001. The next person was a lawyer. He stated that in the case of Jenkins vs. Commissioner of Stamp Duties (Qld), two and two was proven to be four. The last applicant was an accountant. The business man asked him, "How much is two and two?" The accountant got up from his chair, went over and closed the door, then came back and sat down. He leaned across the desk and said in a low voice, "How much do you want it to be?" The accountant got the job.
The flowchart on the following page depicts part of a revenue cycle. Some of the flowchart symbols are labeled to indicate control procedures and records. For each symbol numbered 1 through 13, select one response from the answer lists below. Each response in the lists may be selected once or not at all. Answer Lists Operations and control procedures
A. B. C. D. E. F. G. H. I. J. K. L. M. N. O.
Enter shipping data Verify agreement of sales order and shipping document Write off accounts receivable To warehouse and shipping department Authorize account receivable write-off Prepare aged trial balance To sales department Release goods for shipment To accounts receivable department Enter price data Determine that customer exists Match customer purchase order with sales order Perform customer credit check Prepare sales journal Prepare sales invoice
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11 12 13
Documents, journals, ledgers, and files P. Q. R. S. T. U. V. W. X. Y. Z. Shipping document General ledger master file General journal Master price file Sales journal Sales invoice Cash receipts journal Uncollectible accounts file Shipping file Aged trial balance Open order file
You cant stay mad at somebody who makes you laugh. Jay Leno
11
CPA FLOWCHART
N O VEM B ER 1993
SALES DEPT. F ro m C u s to m e r C O M P U T ER P R O C E S S IN G D EP A R T M EN T C O M P U T E R IZ E D O RDER PRO GRAM : C O M P U T E R IZ E D S H I P P IN G P R O G R A M : W AR EH O US E & S H IP P IN G DEP A RTM EN T
C u s t. C r e d it F ile
C u s to m e r P u rc h a se O rd e r
# 1 a n d p e rf o rm e d i t c h e c k s a n d p re p a re s a l e s o rd e r
#2
R e tr i e v e O p e n O rd e rs; A d d S h i p p i n g D a t a ; T ra n sf e r t o S h i p p i n g F i l e ; a n d P re p a re S h ip p in g D o c u m e n ts
F ro m C om puter P ro c e s s in g D ept.
S a le s O r d e r S a le s O r d e r S a le s O r d e r S a le s O r d e r
To W a re h o u se a n d S h ip p in g D e p t.
3
S h ip p in g D o c . S h ip p in g Document
3 2 1
T r a n s m it C u s to m e r D a ta to C o m p u te r
2
#4
C u s to m e r Pu rc h a s e O rder
A c c o u n ts Rec. M a s te r F ile
S h ip p in g F ile
#6
#5
#3
In v e n t o r y M a s te r F ile
#10
S a le s T ra n s a c t io n F ile
C O M P U T E R IZ E D B IL L IN G P R O G R A M : R e tri e v e S h i p p i n g D a t a ; E n te r P ric e D a ta ; P re p a re S a le s T r a n s a c t i o n F i l e ; a n d# 7
C u s to m e r P .O . S a le s O r d e r S a le s O r d e r
T ra n sm i t S h ip p in g I n f o rm a t i o n t o C o m p u te r
#8
2 1
S a le s O r d e r S h ip p in g D o c . S h ip p in g Docum ent
3 2 1
To C u s to m e r
To C u s to m e r
#9
G e n e ra l L e d g e r T ra n sa c t i o n S u m m a ry
#12
A c c o u n ts R e c e i v a b le Ledger
#13
To C u s to m e r w it h G oods
To A c c o u n t in g
To A c c o u n t in g
To A c c o u n ts R e c e iv a b le
T o C u s to m e r C r e d it
If you want to lead the orchestra you must be willing to turn your back on the crowd. Max Lucado
12
DESCRIPTION OF BATCH PROCESSING SYSTEM FOR A PAYROLL APPLICATION Preparing the Payroll. Figure 1 illustrates typical controls in a basic system for preparing the payroll in the payroll and EDP departments. On receipt of the clock cards and time tickets in the payroll department, the documents are batched and a batch total is prepared of hours worked. The documents and a batch transmittal form are then sent to data control in the EDP department. Data control verifies the information on the batch transmittal form, enters the batch totals in a control log, and forwards the data to data entry where it is keyed to tape and verified. The resulting payroll transactions tape is then used in preparing the payroll. In run 1, the payroll transactions are sorted by employee number and the data are subjected to an edit check routine. This includes a check for valid employee number and a limit or reasonableness check on the hours worked. The output of this run consists of a valid payroll transactions tape and an exceptions and control report that is sent to data control. Data control compares the control totals with the batch control log, informs the payroll department of exceptions discovered by the edit routine, and follows up to see that payroll submits corrected data. These controls over the data entry process preceding the calculation of the payroll contribute to the existence or occurrence, completeness, and valuation or allocation assertions for payroll transactions. In the system shown in Figure 1, the calculation of the payroll and the preparation of the payroll register and payroll checks occur in run 2. The program uses data from the valid payroll transactions tape and the personnel data and employee earnings master files. This run also records the payroll as described in the next section. Recording the Payroll. As the gross pay, deductions, and net pay are calculated in run 2 for each employee, the program updates the employee earnings master file, and accumulates totals for the payroll journal entry that is generated and entered in the general ledger master file at the conclusion of the run. The following printed outputs of this run are sent to data control: *0 An exceptions and control report that is reviewed by data control before distributing the other printed output. *1 A copy of the payroll register that is returned along with the clock cards and time tickets to the payroll department for comparison with the original batch transmittal data. *2 A second copy of the payroll register and prenumbered payroll checks that are sent to the treasurer's office. *3 A general ledger summary that is sent to accounting showing the payroll entry generated by the payroll program.
Remember one thing about democracy. We can have anything we want and at the same time, we always end up with exactly what we deserve. Edward Albee
13
DATA CONTROL
Receive, Verify and Log Batch Totals
DATA ENTRY
Time Tickets Clock Cards Batch Transmittal Form
COMPUTER OPERATIONS
PERSONNEL DEPARTMENT
Time Tickets Clock Cards Control Total Log Key to Tape and Verify Exceptions and Control Report Valid Payroll Transactions Process Personnel Change Data
Payroll Transactions
Auth. Change
Personnel Data Master File
Authorization Change
1
To Payroll
14
CPA ESSAY QUESTIONS ON PAYROLL INPUT CONTROLS Talbert Corporation hired an independent computer programmer to develop a simplified payroll application for its newly purchased computer. The programmer developed an on-line, data-based micro-computer system the minimized the level of knowledge required by the operator. It was based upon typing answers to input cues that appeared on the terminal's viewing screen, examples of which follow. A. Access routine: 1. Operator access number to payroll file? 2. An there new employees? New employees routine: 1. Employee name? 2. Employee number? 3. Social/security/number? 4. Rate per hour? C. 5. 6. 7. Single or married? Number of dependents? Account distribution?
B.
Current payroll routine: 1. Employee number? 2. Regular hours worked? 3. Overtime hours worked? 4. Total employee per payroll period?
The independent auditor is attempting to verify that certain input validation (edit) checks exist to ensure that errors resulting from omissions, invalid entries, or other inaccuracies will be detected during the typing of answers to the input cues. Identify the various types of input validation (edit) checks the independent auditor would expect to find in the EDP system. Describe the assurances provided by each identified validation check. Do not discuss the review and evaluation of these controls. Answer -- The following edit checks might be used to detect errors during the typing of answers to the input cues: *4 Password -- ensures that the operator is authorized to access computer programs and files. *5 Numeric check -- ensures that numbers are entered into and accepted by the system where only numbers are required to be entered, e.g., numbers 0-9 in social security number. *6 Alphabetic check ensures that letters are entered into and accepted by the system where only letters are required to be entered, e.g., letters A-Z in employee name. *7 Special Character check ensures that only specific special characters are entered into and accepted by the system where only these special characters are required to be entered e.g., dashes between numbers in social security number. *8 Sign checks -- ensures that positive or negative signs are entered into and accepted by the system where only such signs are required to be entered, e.g., hours worked. *9 Arithmetic check -- ensures the validity of the result of a mathematical computation, e.g., total employees for period equals number of employee numbers in system. *10 Validity checks -- ensures that only authorized data codes will be entered into and accepted by the system where only such authorized data codes are required. e.g., authorized employee account numbers. *11 Limit (reasonableness) checks -- ensures that only data within predetermined limits will be entered into and accepted by the system, e.g., rate per hour cannot be lower than the minimum set by law or higher than the maximum set by management. *12 Self checking digit -- ensures that only specific code numbers prepared by using a specific arithmetic operation will be entered into and accepted by the system, e.g., employee numbers generated by the modules method with prime number weighting. *13 Size check --ensures that only data using fixed or defined field lengths will be entered into and accepted by the systems e.g., number of dependents requires exactly two digits. *14 Data check--ensures that no blanks will be entered into and accepted by the system when data should be present e.g., an S or M is entered in response to single or married. *15 Overflow check ensures that no digits are dropped if a number becomes too large for a variable during processing, e.g., hourly rate "on size errors" are detected. *16 Control Total checks --ensures that no unauthorized changes are made to specified data or data fields and all data have been entered.
15
Customer's Order
ORDER PROGRAM Perform Edit and Credit Checks; Print Sales Orders
SHIPPING PROGRAM Retrieve Open Orders; Add Shipping Data; Transfer to Shipping File; Print Shipping Documents
Sales Orders
1
4 3 2
Shipping File
To Customer
MASTER FILE UPDATE PROGRAM Update Master Files; Print Sales Journal and General Ledger Transaction Summary
BILLING PROGRAM Retrieve Shipped Order Data; Prepare Invoice; Accumulate and Compare Batch Total; Enter in Sales Transactions File; Print Invoices
BILLING
Sales Order
To Accounting
To Customer
Shipping Document
3
16
DESCRIPTION OF ON-LINE ENTRY/BATCH PROCESSING FOR REVENUE APPLICATION Figure 2 shows a flowchart of an on-line batch entry processing system that incorporates most of the controls discussed in the preceding sections. In the illustrated system, as orders are received sales order clerks use on-line terminals and an order program to determine that the customer has been approved, and that the order will not cause the customer's balance to exceed the customer's authorized credit limit. The program also checks the inventory master file to determine that goods are on hand to fill the order. If the order is accepted, the computer enters it into an open order file and a multicopy sales order form is produced on a printer in the sales order department. When an order is, not accepted, a message is displayed on the terminal indicating the reason for rejection. Copies of the approved sales order are forwarded to the warehouse as authorization to release goods to shipping. In shipping, personnel first makes an independent check on agreement of the goods received with the accompanying sales order form. They then use their on-line terminals and a shipping program to retrieve the corresponding sales order from the open order file and add appropriate shipping data. Next the computer transfers the transaction from the open order file to a shipping file and produces a shipping document on the printer in the shipping department. As matching shipping documents and sales order forms are received in the billing department, they are batched and batch totals are manually compared. Using their on-line terminals and a billing program, billing department personnel first enter the manually prepared batch totals. Next the previously entered order and shipping data for each transaction is retrieved from the shipping file and a sales invoice is generated using prices from the master price file. As each billing is completed, the computer enters it into a sales transactions file. After all the transactions in a batch have been processed in this manner, the billing program compares a computer generated batch total with the manual batch total previously entered by the billing clerk. Discrepancies are displayed on the terminal and corrected by the billing clerks before processing continues. Finally, sales invoices for the batch are printed in the EDP department and distributed as shown in the flowchart. The recording of sales transactions is completed at the end of each day when the EDP department runs the master file update program. As shown, this program updates three master files and produces a sales journal and general ledger transaction summary which are sent to accounting. The use of a separate program to produce monthly customer statements is not shown in the flowchart.
Each of us is given a pocketful of time to spend however we may. We use what we will. We waste what we will. But we can never get back a day. Roger Wilcox
17
DESCRIPTION OF AN ONLINE ENTRY/BATCH PROCESSING SYSTEM FOR AN EXPENDITURE APPLICATION A flowchart of a representative system for processing purchases transactions is shown in Figure 3. In this system, purchase orders are prepared in the purchasing department using on-line terminals. Multicopy purchase orders are printed and distributed as shown in the figure. In addition, an open purchase order file is maintained on the computer. When goods arrive in the receiving department, a copy of the matching purchase order is pulled from the file. The goods are then counted, inspected and compared against the copy of the purchase order. Next, receiving clerks use their computer terminals to retrieve the computer record of the purchase order from the open purchase order file. After a clerk keys in the quantities received on an order, the computer produces a multi-copy receiving report and transfers the record from the open purchase order file to the receiving report file. The copies of the receiving report are distributed as shown in the flowchart. Copies of the purchase order and receiving report for each transaction are placed in a holding file in the vouchers payable department pending arrival of the matching vendors invoice. Once the vendors invoice arrives, a vouchers payable clerk checks the mathematical accuracy and compares it with the purchase order and receiving report. Batches of approved matched documents are assembled and a batch total is calculated manually. Data keyed in from the vendors invoices, together with matching data extracted by the computer from the receiving report file, are then used to create a record for each voucher in the purchases transactions file. The vouchers and a voucher summary are then printed. The voucher summary is compared with the manual batch total in vouchers payable and any differences are resolved. The summary is then forwarded to accounting . The vouchers are collated with the supporting documents and placed in a file by due date in the vouchers payable department. The purchases transactions file is subsequently used to update the accounts payable, inventory and general ledger master files. Outputs of that run include a voucher register listing the newly processed vouchers, and a general ledger summary showing the totals posted to the general ledger accounts. These printouts are forwarded to accounting where they are reviewed on a daily basis and reconciled with the voucher summaries received from vouchers payable. On their due dates approved vouchers are manually pulled from the unpaid voucher file in the vouchers payable department and a batch total is prepared. In the system shown, as clerks key in each voucher number, the cash disbursements program is used to prepare a check based on information in the accounts payable master file. In addition, the program enters the payment data in a cash disbursement transaction file and produces a check summary which is compared with the batch total prepared in V/P. The checks, check summary, and vouchers are then forwarded to the treasurers department. In the treasurers department, an independent check is made to determine the existence of an approved voucher for each check. Also the payees name and check amount are agreed with the voucher. The supporting documents for each voucher are then stamped paid, and the check is signed and mailed with the remittance advice. A copy of the check is attached to the voucher and filed in the paid voucher file. The check summary and copies of all the checks are sent to accounting. The cash disbursements update program is then used to update the accounts payable and general ledger master files based on data in the cash disbursements transaction file. This program also produces the cash disbursement journal and a general ledger summary showing the totals posted to general ledger accounts. These are forwarded from EDP to the accounting department where they are compared with the check summary received from the treasurer.
The perfection of the means and the confusion of the end is the characteristic that marks our time.
18
--Einstein
(Some things never change!!!)
19
VO UC HERS PA Y A BLE
F ro m R e c e i v in g
F ro m P u r c h a s in g
F ro m V endor
R e m it t a n c e A d v ic e
A p p ro ve d P u rc h a s e R e q u is itio n E n te r P urc h a s e O rd e r D a ta
E n te r R e c e iv in g D a ta
F ile P e n d in g A r r iv a l o f G oods
P u rc h a s e O rd e r 3
R e c e i v in g R e p o rt
V e n d o r 's In v o ic e
R e q u i s i t io n P u rc h a s e O rd e r P u rc h a s e O rd e r 1 5 P u rch a se O rd e r 4 P u rc h a s e O rd e r 3 P u rc h a s e 2 O rd e r 1 T o R e c e iv in g To Vendor
F il e P e n d in g A r r iv a l o f a l l D o c u m e n ts P u rc h a s e O rd e r R e c e i v in g 3 R e m i t t a n R ee pA od r vt i c e c 1 V e n d o r ' s I n v o ic e
B a tc h T o ta l
T o S to r e s To V o u c h e rs P a y a b le
To V o u ch e rs P a y a b le
C o p y T h r e e S ig n e d a n d R e t u r n e d ; F i le d w ith P .O . T o S t o r e s w it h G o o d s
V o uc he r V o uc he r S u m m a ry
D U n p a id V o u c h e r F i le
ED P
P u rc h a s e O rd e r P ro g ra m
R e c e iv in g P ro g ra m
R e c e iv i n g R e p o rt F il e
V oucher P ro g ra m
P u rc h a s e s T ra n s a c t io n s F ile
T o A c c o u n tin g
VO U C H E R S P AY AB LE
In v e n t o r y M a s te r F i le
U n p a id Voucher F il e
A c c o u n ts P a y a b le M a s te r F i le
G e n e ra l Ledger M a s te r F i le
A c c o u n ts P a y a b le U p d a te P ro g ra m
G e n e ra l L e d g e r S u m m a ry
V oucher R e g is te r
T o A c c o u n tin g T R EAS U R E R
P u ll A p p r o v e d V o u c h e rs o n D u e D a te a n d P r e p a r e B a tc h T o ta l
B a tc h T o ta l
P u rch a se O rd e r R e c e i v in g R e p o r t 3 R e m it t a n c e A d v i c e 1 V e n d o r 's In v o ic e
E n te r V o u c h e r D a ta a n d V e rify A g r e e m e n t w ith B a t c h T o ta l
A p p ro ve d V ouc her
R e m i t t a n c e A d v ic e C heck C heck C heck 3 2
S ta m p D o c u m e n ts P a i d ; S ig n a n d M a il C he ck s C heck C hec k S u m m a ry
3
C he ck
1
T o A c c o u n tin g P a id V oucher F i le
C he ck S u m m a ry
ED P C a sh D is b u r s e m e n t s P ro g ra m
To V endor G /L S u m m a r y
C ash D is b u rs e m e n ts U p d a te P ro g ra m
C ash D is b u r s . T r a n s . F i le
C ash D is b u r s e m e n ts J o u rn a l
A 2
A c c o u n ts P a y a b le M a ste r F ile
G e n e ra l Ledger M a s te r F ile
T o A c c o u n tin g
During our computer class, the teacher chastised one boy for talking to the girl sitting next to him. I was just asking her a question, the boy said. If you have a question, ask me, the teacher tersely replied. Okay, he answered. Do you want to go out with me Friday night? -Contributed by Tracy Maxwell
20
EXAMPLE OF A DATA BASE FOR THE EXPENDITURE CYCLE Vendor Record Vendor Vendor number name Vendor address Payment terms Current balance Quality code Reliability code Other vendor history data
Buyer code
Vendor Invoice Record Invoice Vendor Invoice PO number number date number
Payment terms
Date due
Invoice subtotal
Freight charges
Invoice total
Quantity received
Order price
Quantity shipped
Unit price
Item total
Quoted price
Receiving Report Record Report Vendor PO Receipt number number number date Receiving Line Items Report Stock Quantity number number received
Receiver code
Shipper code
Materials Inventory Record Stock Item Location Vendor numbe description code code r
Reorder point
Order quantity
Quantity on hand
Quantity on order
Quantity reserved
Unit cost
Total cost
21
III.
CHARACTERISTICS OF EDP SYSTEMS THAT DIFFER FROM MANUAL SYSTEMS Uniform Processing of Transactions - Computers process like transactions in a like manner; so subject to same controls - Therefore, computers virtually eliminate clerical error - Computers will only error systematically, unlike humans who error on a random basis Segregation of Functions - Many I/C procedures performed by separate individuals may be combined in EDP systems - Special concern that individuals with access to the computer not have other incompatible duties (e.g. ability to initiate or change transactions) Potential For Errors & Irregularities - Decrease human involvement in handling transactions reduces the potential for observing errors/irregularities - The average computer fraud is ten times greater than the average manual fraud Initiation or Subsequent Execution of Transactions by Computer - Computer authorization of Automatic transactions may not be well documented - Errors in POS can have multiple effects Transaction Trail - May be lost, partially obscured, or only exist on a temporary basis - Many control procedures in EDP systems do not leave documentary evidence of performance - Files and records are in machine readable form and cant be read Electronic Audit Trail Elements of a Computer log
Unique identification of transaction. Examples include the assignment of a number by the computer. The unique identifier could be assigned sequentially or could consist of a location identifier and a unique number for that location. Sales invoices, for example, are sequentially numbered by the computer application. Date and time of transaction. These could be assigned automatically by the computer application. Individual responsible for the transaction. When a party logs on to a computer terminal to initiate or authorize a transaction there is evidence of who the party is and the location from which the transaction was initiated. The log in used to gain access to the computer can identify the source of the transaction.
Procrastination is like a credit card: Its a lot of fun until you get the bill.
Christopher Parker
22
WAVE OF THE FUTURE--NO HARD COPY DOCUMENTS!!!! In the not-too-distant future, ELECTRONIC DATA INTERCHANGE (EDI) is expected to be common place. Already, about 75% of the Fortune 100 companies and 39% of the Fortune 500 use EDI to some extent. Examples include the following: Computers at over 3,000 suppliers to Chrysler accept purchase orders transmitted by computers at Chrysler assembly plants, and in turn electronically invoice Chryslers computers for parts shipped. Wal-Mart, which operates the largest EDI program in the retail industry, processes about 75% of its payments to suppliers with EDI.
Among other benefits, proponents claim that EDI can cut, in half, the currently estimated 7% of corporate spending that goes for processing orders, sending invoices, and other administrative costs. EDI is the electronic exchange of business transactions, in a standard format, from one entity's computer to another entity's computer through an electronic communications network. If a private communications network is being used it is called a VAN--Value Added Network. But, an increasing number of EDI transactions are conducted over the Internet. EDI is commonly used for purchasing, processing accounts payables, invoicing, and financial applications. In EDI systems, documents such as purchase orders, invoices, shipping forms, bills of lading, and checks are converted by translation software into electronic transactions conforming to a standard format. For example, in electronic funds transfer systems, a form of EDI, electronic transactions replace checks as a means of payment.
23
EDP CONTROLS Among the objectives of internal controls are to 1) provide reasonable, but not absolute, assurance that assets are safeguarded from unauthorized use or disposition, and 2) that financial records are reliable to permit the preparation of financial statements. These objectives remain the same in an EDP Environment. However, there are certain modifications we need to make in how we think of the internal control components-environment, information and communication, risk assessment, control activities (procedures), and monitoring--when the computer is introduced into the accounting process. I. EFFECT OF COMPUTER ON CONTROL ENVIRONMENT We use I B MACHO to remember the seven factors which reflects the overall attitude, awareness and actions of the board of directors, management, owners and others concerning the importance of internal control and its emphasis in the entity: I B M A C H O Integrity and ethical values Audit Committee and Board of Directors Philosophy of Management and operating style Assignment of authority and responsibility Commitment to competence Human resource policies and procedures Organizational structure
The organizational structure is particularly impacted when we have an EDP environment. A company should work to segregate functions to reduce the risk of error or fraud due to the human element. A. Segregation of functions within the EDP department 1. Systems design--overall design of systems; prepares systems flowcharts; NO access to equipment 2. Programmer--designs application flowcharts, program coding and debugging, record input and report output layouts; prepares program run manual; access to equipment only when debugging; no access to live input 3. Operator--loads programs and inputs; supervises operations; receives output; can intervene by console (be sure to keep a log); allowed access only to operator instructions, not the entire program run manual 4. Librarian--custody of programs, program documentation and data files; allows access only to authorized persons at authorized times; keeps a check-out log; Today the librarian is generally a computer program. 5. Control group--receives input and output; reconciles output with input control totals; distributes output to only authorized persons; control of error log and reprocessing of errors; reviews console log for unauthorized access
24
B.
Segregation of functions between EDP and users 1. EDP should not authorize or initiate transactions or have custody or access to non-EDP assets. 2. EDP should not correct non-EDP errors. 3. EDP should be organizationally separate from the departments it serves.
C.
General policies 1. Bond all key EDP employees. 2. Rotate operators within shifts and responsibilities. 3. Enforce mandatory vacations. 4. Terminate fired employees immediately. 5. Have written standard operating procedures.
II.
EFFECT OF THE COMPUTER ON THE CONTROL PROCEDURES The computer has the most effect on a companys control procedures. Recall that we use DAASI to remind us of the control procedures (activities) of a company. In an EDP environment, control procedures are generally comprised of a combination of general, application and user controls. GENERAL CONTROLS--relate to the overall EDP environment and pertain to all applications. General controls relate to: Operations controls Changes to existing systems and programs Access to programs, data, equipment Developing new programs and systems A weakness in general controls will have a pervasive effect and consequently makes it almost impossible to rely on the specific applications controls. Likewise, good general controls increase the assurance that application procedures operate effectively. APPLICATION CONTROLS--relate to specific applications (e.g. revenue, payroll, expenditure) and consists of programmed controls and related manual follow-up procedures. Programmed controls are actually embedded in the program, e.g. in the revenue cycle, the computer would match sales orders to shipping documents and print a report of all unfilled sales orders. Related manual follow-up procedures involve employee follow-up of items listed on computer exception reports. For the example above, it would be an employee checking the status of back-ordered goods. USER CONTROL PROCEDURES--represent manual checks of the completeness and accuracy of computer processing through comparing computer output against source documents or other input. For example, assume you sent 20 timecards to EDP for processing. A user control procedure would be to make sure that 20 paychecks came back from EDP (these totals are called control totals).
25
III.
GENERAL CONTROLS A. OPERATIONS CONTROLS are intended to ensure that application programs are used properly and that the proper data files are used during processing. They involve management review of regular and unscheduled job lists, restricting operators access to only the operations manual (not program documentation) and adequate procedures for managing and backing up data and program files. 1. Framework for controlling operations in the event of physical disaster or computer failure. a. Contingency procedures and back-up facilities plans for fires, floods, etc. Hot site vs. Cold site b. Duplicate (back-up) files-stored off premise Disk = dump Database = daily snap shot Note: Daily snapshots are retained until a weekly is create; weeklys are retained until a monthly is created; monthlys are retained until the yearly is created. Tape = Grandfather-Father-Son
Master File =
Transaction File=
2. Controls to make sure the proper files are used. a. Labels--external and internal i. external labels should be coded ii. internal labels (header and trailer labels) --Header: file serial #, volume serial #, file name, creation date and retention date --Trailer: number of blocks, record count, control totals, end of volume, and end of reel b. File protection rings - no ring, no write; read only switch for disks 3. Maintain an equipment failure (downtime) log B. CHANGES OVER EXISTING PROGRAMS AND SYSTEMS includes controls intended to ensure that modifications to application programs are suitably approved, designed, tested and implemented. 1. A change request log should be kept. 2. Any changes should be approved by supervisor.
26
3. All changes should be made by programmers and tested before implementation. 4. Users should approve the tested changes. 5. All changes should be documented. 6. SOURCE CODE COMPARISONS. C. ACCESS CONTROLS TO PROGRAMS AND DATA are intended to prevent or detect unauthorized changes to programs and files. Access is controlled both through restrictive physical controls and software controls that limit a) programmer access to production programs, live data files, and job control language; b) operator access to source code and individual elements of data files; and c) user access to defined programs and data files. 1. Restrict access to programs, program documentation and data files a. Password and passkeys b. External and internal labels c. Librarian-storage in a strongly constructed vault i. Store programs and data in strong vault ii. Keeps usage log and maintains authorization list d. Software packages are available to monitor authorized and unauthorized changes made to the files, programs or the operating system 2. Restrict access to computer equipment to only authorized personnel a. Passwords and passkeys, sign-in sheets b. Guards, locks, badges c. Dont allow terminated personnel or disgruntled employees near the computer!!!!! d. Log of computer utilization-EDP control group should check for unauthorized use 3. Special consideration for restricting access in on-line real-time (OLRT) systems a. Restrict terminal to certain programs and data files b. Authorization tables--list the programs and data that each terminal and user is permitted to use, and identifies the activities each user is authorized to perform with each program and data set c. Locks on data records-restricts access to certain fields, records or files, e.g. number of hours and hourly rate, executive payroll 4. Special considerations regarding restricting access when using telecommunications (electronic transmission of data) (remember telephone wires can be tapped!) a. Call back units-prevent unauthorized users access to system b. Encryption-encode data to disguise it c. FIREWALL--security measure companies adopt to prevent outside users (particularly from the Internet) from accessing the companys system
A BUSINESSMAN taking a seminar on efficiency completed a case study of his wifes routine for fixing breakfast, and presented the results to the class. After a few days of observation, I quickly determined the practices that were robbing her of precious time and energy, the man reported. Taking note of how may trips she made from the kitchen to the dining room carrying just one item, I suggested that in the future she carry several items at a time. Did it work? the teacher asked. It sure did, replied the businessman. Instead of taking her 20 minutes to fix my breakfast, it now takes me just seven.
27
D.
DEVELOPMENT OF NEW PROGRAMS AND SYSTEMS controls are intended to ensure that new application systems are suitably authorized, designed and tested. 1. Reviewing, testing and approval of new systems a. Companies need to use the Systems Development Life Cycle when implementing new computer systems. SDLC phases are: -- Analysis-determining whether the current systems is meeting users needs. In the event it is not, a feasibility study is conducted to examine potential solutions to the problem. -- Design-this phase involves developing specifications regarding input, processing, internal controls and security measures, programs, procedures, output and databases. -- Implementation-involves the actual programming for the new system including debugging & testing AND conversion from the old system to the new system. Common implementation methods include running parallel systems which is very expensive but safe; the cold turkey method which is less expensive but very risky or a phased in approach which makes the most sense. -- Operation-this phase includes post-implementation review to determine if the system is meeting its objectives and is being utilized. Also systems maintenance (monitoring, evaluating and modifying the system) is an ongoing part of this phase.
2. BE SURE TO involve users, internal auditors, and external auditors at the systems design and development stage - designing controls into an already implemented system is very difficult and costly. 3. Involve users and EDP in the systems testing, and be sure to test the system through the entire cycle (e.g. include testing procedures only done at yearend). 4. Get management and user approval of the new system to avoid problems like system not being used because it doesnt provide the data on a timely enough basis. 5. Documentation procedures - the Program Run Manual should include: a. Systems descriptions and flowcharts b. Program descriptions and flowcharts c. Program listing (in source code) d. Record layouts (input documents and output reports) e. Control procedures f. Operating instructions. g. Good documentation is important to: i. The company for training of new personnel and maintenance. ii. The auditors to aid in understanding the system and designing the audit tests.
A man went into a fortune teller's shop and waited for a reading. The fortune teller gazed into the crystal ball and said " You will be poor and unhappy until you are 45 year old." "Then what will happen?" asked the man. The fortune teller replied, "Then you'll get used to it."
28
From Dear Abby 6. Hardware controls--ensure that the computer system will not be a cause of inaccurate application processing. Automatic (built-in) error detection features a. Parity check--an extra bit used to check that all data has been transferred without loss--odd or even parity. b. Dual circuitry--a computation is made twice by the computer in different parts of the CPU and the results are compared. c. Echo check--a signal sent to the CPU verifying that a command has been received & complied with. d. Dual read--input data are read twice and compared. e. Read after write--data is read after it is recorded in storage and verified for accuracy. f. Boundary protection--prevents the intermixing or overlapping of data among the many files in the computer.
IV.
APPLICATION CONTROLS--relate to specific applications (e.g. revenue, payroll expenditure) and consists of programmed controls and related manual follow-up procedures. Programmed controls are actually embedded in the program, e.g. in the expenditure cycle, the computer would be programmed to accept only vendors from an approved vendor list and would print a report of any purchases made from unauthorized vendors. Related manual follow-up procedures involve employee follow-up of items listed on computer exception reports. For the example above, it would be an employee reviewing the purchases from unauthorized vendors to determine if specific management approval had been given for the purchase. Examples of Application Controls: A. Batch control totals establish the accuracy of processing record countsnumber of documents, e.g. control totalsa total that has some meaning, e.g. hash totalsan inherently meaningless total, e.g. Self-checking digit--a check number is created from the original number and becomes part of the number itself
B.
Experienceenablesyoutorecognizea mistakewhenyoumakeitagain.
FranklinP.Jones
29
C.
Programmed edit checks--checks written into the application programs to reject incomplete, inaccurate, or unreasonable DATA DURING THE INPUT STAGE. These edit checks prevent the user from progressing further until resolved. a. b. c. d. e. f. g. h. i. j. k. D. Field check -prevents invalid characters--e.g. alphabetic character in a numeric field Invalid codes--e.g. store codes from 01-22 code 53 would be invalid Limit test--e.g. data which falls outside pre-established limits Sequence checks--e.g. file arranged in ascending order Sign test--e.g. negative number in a positive field Missing data--e.g. blank field Anticipation test--e.g. anticipate receipt of particular data Field size check- wont allow more than certain numbers Logic check - prevents illogical combinations of input Closed loop verificationsometimes called redundant data check uses two identifiers for a transaction such as name and customer ID before allowing data entry to occur Verification of self-checking digit
Limit and Reasonableness tests--logical tests performed DURING PROCESSING to verify the contents and relationships of records. These errors show up on exception (error) reports. Comparison to a limit--e.g. did customer exceed credit limit Comparison to a range of values--e.g. paychecks should not be less than $150 or greater that $3,000 Test for proper mathematical sign--e.g. negative rate of pay Test for a zero value--e.g. social security number Test for non-numeric data in a numeric field--e.g. #*.80 for a pay rate Comparison of field value or code against a table of allowed values or codes--e.g. codes for authorized vendors Test for logical relationship between fields--e.g. Match master file account # with transaction file account #
E.
Computer generated log of input errors Error log--invalid data, file programs Console log--time run, files and programs used, interventions & machine halts Footing and Crossfooting tests The EDP Control group does the following: Balancing of all control totals Visual scanning--for unusual errors Distribution of output to authorized persons Review of error logs Procedures for follow up of exceptions and errors
F. G.
30
Many executives seem to be infatuated with the limitless information potential of computers--sometimes at the real expense of the human thinking that ought to be at the base of any analysis. When playing the enticing "what if" games that computers make available, beware of contracting spreadsheetitis." And remember, machines cannot think (not yet)--they can only rearrange what was furnished them previously. Philip Kropatkin
HOW BIG WAS IT OR COULD YOU DO ONE FOR, SAY The Transaction
31
The wire transfer unit of a large West Coast bank received a phone call from one of the bank's international officers requesting a $10 million transfer from the bank to an account at a New York City bank. The calling officer provided the correct secret codes for the day and satisfied the criteria for initiating a wire transfer. The wireroom processed the request and transferred the funds. Later the New York City bank received instruction from it account holder to transfer the funds to a bank account in Geneva, Switzerland. Discovery of the Fraud The FBI received information that a person had purchased a large quantity of diamonds with funds stolen from a named West Coast bank. The FBI determined that the tip was accurate and notified the West Coast bank of the multimillion dollar fraud that had be committed against it. The Investigation The investigation revealed: The West coast bank had been installing new computer hardware and software in its wire transfer room. A computer consultant hired by the bank was actively involved in this renovation. While working in the wireroom, the consultant was: Placed on the authorized list for admittance to the wireroom; given a valid password for gaining access to the electronic funds transfer processing system; and allowed use of terminals connected to this system; Able to observe the process for ordering wire transfers, including how to obtain the daily secret codes used to authorize electronic funds transfers; and able to listen to the conversational style and format used by bank officers in ordering fund transfer. One day after his assignment had been completed, the consultant requested permission to enter the wireroom. Because his name had not been deleted from the authorized list, the consultant was allowed to enter the area and t use a terminal. Using a wireroom terminal and his own password, which had not been deleted from the system, the consultant obtained the secret funds transfer codes for that day. He left the wireroom and called the wireroom from a phone booth. Pretending to be an international office of the bank, he requested a $10 million funds transfer from the bank to an account at a New York City bank. The wireroom employee, believing that he was speaking with an international officer of his bank because of the style and format of the conversation and the use of the correct secret codes for the day, accepted the order and transferred the funds. The consultant flew to Geneva, Switzerland, where he had the stolen funds transferred from his account t the East Coast bank into an account at a Swiss bank. He purchased over $8 million in diamonds from a Russian diamond wholesaling company. He flew back to the West Coast with the diamonds and moved in with a friend. While the consultant tried to decide what to do with his ill-gotten gains, his "friend" made a critical tip to the FBI. How to Prevent this Fraud When it is necessary to hire a consultant who will have access to very sensitive data, the consultant should undergo a special clearance process before being allowed access to the data. Another control should be used to record all passwords and accesses given to the consultant and to promptly terminate all passwords and accesses on the consultants last day of employment. Additionally, a consistently followed, call-back verification process would have simply and quickly detected and prevented the multimillion dollar fraud. Epilogue As might be expected, the news media reported this fraud extensively in every country in the Western world. The prestige and reputation of the West Coast bank were harmed. The bank now has one of the largest computer security staffs of any bank in the world. Following his indictment, and while free on $200,000 bond prior to the trial, the consultant teamed with an employee of another West Coast bank to commit a $50 million wire transfer fraud. The employee alerted the FBI of the planned EFT fraud and it was aborted. The consultant the agreed to a guilty plea and was sentenced to eight years imprisonment on the first wire fraud to avoid prosecution on the second, attempted wire fraud. Following his release from prison in less than three years, the consultant was hired to run the computer system of a national science association in Washington, D.C.
32
1.
More than one file may be stored on a single magnetic memory disc. Several programs may be in the core storage unit simultaneously. In both cases it is important to prevent the mixing of data. One way to do this is to use a. File integrity control. c. Interleaving. b. Boundary protection. d. Paging. In a computerized system, procedure or problem-oriented language is converted to machine language through a (an) a. Interpreter. c. Compiler. b. Verifier. d. Converter. Which of the following is not a characteristic of a batch processed computer system? a. The collection of like transactions which are sorted and processed sequentially against a master file. b. Keypunching of transactions, followed by machine processing. c. The production of numerous printouts. d. The posting of a transaction, as it occurs, to several files, without intermediate printouts. Which of the following symbolic representations indicate that a file has been consulted? a. c.
2.
3.
4.
b.
d.
5.
The machine language for a specific computer a. May be changed by the programmer. b. Is the same as all other computer languages. c. Is determined by the engineers who designed the computer. d. Is always alphabetic. A well prepared flowchart should make it easier for the auditor to a. Prepare audit procedure manuals. b. Prepare detailed job descriptions. c. Trace the origin and disposition of documents. d. Assess the degree of accuracy of financial data.
6.
7.
When a data base administrator's position exists within a client organization, the auditor must be aware of the a. Output effectiveness/efficiency considerations. b. Need for coded program files. c. Use of encrypted dialog in a two-way authentication process.
33
d. 8.
What type of EDP system is characterized by data that are assembled from more than one location and records that are updated immediately? a. Microcomputer system. c. Batch processing system. b. Minicomputer system. d. On-line real-time system. Which of the following symbolic representations indicates that a sales invoice has been filed? a.
9.
b.
c.
d.
b.
d.
11. The computer system most likely to be used by a large savings bank for customers' accounts would be a. An on-line, real-time system. c. A generalized utility system. b. A batch processing system. d. A direct access data base system.
34
II. EDP INTERNAL CONTROL QUESTIONS 1. One of the major problems in an EDP system is that incompatible functions may be performed by the same individual. One compensating control for this is use of a. A tape library. c. Computer generated hash totals. b. A self-checking digit system. d. A computer log. Which of the following would lessen internal control in an electronic data processing system? a. The computer librarian maintains custody of computer program instructions and detailed program listing. b. Computer operators have access to operator instructions and detailed program listings. c. The control group maintains sole custody of all computer output. d. Computer programmers write and debug programs which perform routines designed by the systems analyst. When an on-line, real-time (OLRT) electronic data processing system is in use, internal control can be strengthened by a. Providing for the separation of duties between keypunching and error listing operations. b. Attaching plastic file protection rings to reel of magnetic tape before new data can be entered on the file. c. Making a validity check of an identification number before a user can obtain access to the computer files. d. Preparing batch totals to provide assurance that file updates are made for the entire input. If a control total were to be computed on each of the following data items, which would best be identified as a hash total for a payroll EDP application? a. Net pay. c. Hours worked. b. Department numbers. d. Total debits and total credits. For good internal control, which of the following functions should not be the responsibility of the treasurer's department? a. Data processing. c. Custody of securities. b. Handling of cash. d. Establishing credit policies. Which of the following constitutes a weakness in the I/C of an EDP system? a. One generation of backup files is stored in an off-premises location. b. Machine operators distribute error messages to the control group. c. Machine operators do not have access to the complete systems manual. d. Machine operators are supervised by the programmer. Totals of amounts in computer-record data fields which are not usually added for other purposes but are used only for data processing control purposes are called a. Record totals. c. Processing data totals. b. Hash totals. d. Field totals.
2.
3.
4.
5.
6.
7.
35
8.
Carmela Department Stores has a fully integrated EDP accounting system and is planning to issue credit cards to credit-worthy customers. To strengthen internal control by making it difficult for one to create a valid customer account number, the company's independent auditor has suggested the inclusion of a check digit which should be placed a. At the beginning of a valid account number, only. b. In the middle of a valid account number, only. c. At the end of a valid account number, only. d. Consistently in any position. Which of the following is an example of a check digit? a. An agreement of the total number of employees to the total number of checks printed by the computer. b. An algebraically determined number produced by the other digits of the employee number. c. A logic test that ensures all employee numbers are nine digits. d. A limit check that an employee's hours do not exceed 50 hours per work week.
9.
10. Which of the following activities would most likely be performed in the EDP department? a. Initiation of changes to master records. b. Conversion of information to machine-readable form. c. Correction of transactional errors. d. Initiation of changes to existing applications. 11. For control purposes, which of the following should be organizationally segregated from the computer operations functions? a. Data conversion. b. Surveillance of CRT messages. c. Systems development. d. Minor maintenance according to a schedule. 12. Where computer processing is used in significant accounting applications, internal control procedures may be defined by classifying control procedures into two types: general and a. Administrative. c. Application. b. Specific. d. Authorization. 13. Which of the following most likely constitutes a weakness in the internal control of an EDP system? a. The control clerk establishes control over data received by the EDP department and reconciles control totals after processing. b. The application programmer identifies programs required by the systems design and flowcharts the logic of these programs. c. The systems analyst reviews output and controls the distribution of output from the EDP department. d. The accounts payable clerk prepares data for computer processing and enters the data into the computer. 14. Which of the following is not a major reason why an accounting audit trail should be maintained for a computer system?
36
a. b.
c. d.
15. A procedure control used in the management of a computer center to minimize the possibility of data or program file destruction through operator error includes a. Control figures. c. Limit checks. b. Crossfooting tests. d. External labels. 16. The use of a header label in conjunction with magnetic tape is most likely to prevent errors by the a. Computer operator. c. Computer programmer. b. Keypunch operator. d. Maintenance technician. 17. Where disc files are used, the grandfather-father-son update backup concept is relatively difficult to implement because the a. Location of information points on discs is an extremely time consuming task. b. Magnetic fields and other environmental factors cause off-site storage to be impractical. c. Information must be dumped in the form of hard copy if it is to be reviewed before used in updating. d. Process of updating old records is destructive. 18. Which of the following is an application control? a. Dual read. c. Systems flowchart. b. Hash total. d. Control over program changes. 19. Where computers are used, the effectiveness of internal control depends, in part, upon whether the organizational structure includes any incompatible combinations. Such a combination would exist when there is no separation of the duties between a. Documentation librarian and manager of programming. b. Programmer and console operator. c. Systems analyst and programmer. d. Processing control clerk and key punch supervisor. 20. Which of the following employees in a company's electronic data processing department should be responsible for designing new or improved data processing procedures? a. Flowchart editor. c. Systems analyst. b. Programmer. d. Control group supervisor. 21. Responsibility for initial testing (debugging) of the program should be assigned to the a. EDP department control group. c. Programmer. b. Internal audit control group. d. Machine operator.
37
22. Parity checks, read-after-write checks, and duplicate circuitry are electronic data processing controls that are designed to detect a. Erroneous internal handling of data. b. Lack of sufficient documentation for computer processes. c. Illogical programming commands. d. Illogical uses of hardware. 23. A control feature in an electronic data processing system requires the central processing unit (CPU) to send signals to the printer to activate the print mechanism for each character. The print mechanism, just prior to printing, sends a signal back to the CPU verifying that the proper print position has been activated. This type of hardware control is referred to as a. Echo control. c. Signal control. b. Validity control. d. Check digit control. 24. An advantage of manual processing is that human processors may note data errors and irregularities. To replace the human element of error detection associated with manual processing, a well-designed electronic data processing system should introduce a. Programmed limits. c Echo checks. b. Dual circuitry. d. Read-after-write. 25. An internal administrative control that is sometimes used in connection with procedures to detect unauthorized or unexplained computer usage is a. Maintenance of a computer tape library. b. Use of file controls. c. Maintenance of a computer console log. d. Control over program tapes.
Anyone with money to burn will always find himself surrounded by people with matches. Joe Ryan
38