Devry Ais Week 4 Assignment

In: Business and Management

Submitted By suzynaidu
Words 456
Pages 2
12.6.
Create a questionnaire checklist that can be used to evaluate controls for each of the four basic activities in the revenue cycle (sales order entry, shipping, billing, and cash collections).
Required
* a. For each control issue, write a Yes/No question such that a “No” answer represents a control weakness. For example, one question might be, “Are customer credit limits set and modified by a credit manager with no sales responsibility?” * b. For each Yes/No question, write a brief explanation of why a “No” answer represents a control weakness.

Sales Order Entry 1. Are there data entry application controls in place?
The answer is no which represents the weakness in that you risk inaccurate or incomplete customer orders.

Shipping 2. Is there a separation of shipping and billing functions? This answer no represents weakness in that there a risk of sending wrong merchandise, wrong quantities, and wrong addresses.

Billing 3. Are there adequate data entry checks? This answer no represents a weakness in that it errors in billing.

Cash Collection 4. Is there a periodic reconciliation of bank statements with records by someone not involved in cash receipts processing? 5. Is there a segregation of duties? The answer no to either of these questions represents a threat in that there is a higher risk of fraud or theft.

13.5.
Use Table 13-2 to create a questionnaire checklist that can be used to evaluate controls for each of the basic activities in the expenditure cycle (ordering goods, receiving, approving supplier invoices, and cash disbursements).
Required
* a .For each control issue, write a Yes/No question such that a “No” answer represents a control weakness. For example, one question might be “Are supporting documents, such as purchase orders and receiving reports,…...

Similar Documents

Devry Nr 439 Week 4 Research Database Assignment

...DeVry NR 439 Week 4 Research Database Assignment IF You Want To Purchase A+ Work Then Click The Link Below , Instant Download http://www.hwspeed.com/DeVry-NR-439-Week-4-Research-Database-Assignment-3473493893.htm?categoryId=-1 If You Face Any Problem E- Mail Us At JOHNMATE1122@Gmail.Com ASSIGNMENTS Guidelines and Grading Rubric Purpose You are to locate and document research databases that relate to a significant clinical nursing issue of your choice. The research databases may be labeled as such, or may be collections of research studies, reports, articles and/or findings that are not specifically called databases. Please note: Individual journals and journal articles do not meet the criteria for a research database, and therefore, do not qualify for this assignment. Course Outcomes This assignment enables the student to meet the following course outcome: CO 1: Examine the sources of evidence that contribute to professional nursing practice. (PO #7) Due Date: You are to identify a total of five research databases (or collections of research-based evidence) that are relevant to a significant clinical nursing issue that is important to you. Submit the descriptions using the form provided in Doc Sharing to the Week 4 Dropboxby11:59 p.m. Sunday (MT). Points The assignment is worth a total of 175 points. Please see the grading rubric for details. Requirements 1. Choose a topic of interest to you that is a significant clinical nursing issue. Please......

Words: 1182 - Pages: 5

Acc 564 Week 4 Assignment 2 – Hacking the Ais

...ACC 564 Week 4 Assignment 2 – Hacking the AIS Click Link Below To Buy: http://hwcampus.com/shop/acc-564/acc-564-week-4-assignment-2-hacking-the-ais/ Or Visit www.hwcampus.com ACC 564 Week 4 Assignment 2 – Hacking the AIS In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your......

Words: 257 - Pages: 2

Acc564 Week 4 Assignment 2: Hacking the Ais Acc 564 Week 4 Assignment 2: Hacking the Ais

...ACC 564 ACC564 Complete Course Week 1 to Week 11 Click below link for Answer visit www.workbank247.com http://workbank247.com/q/acc564-complete-course-week-1-to-week-11/10449 http://workbank247.com/q/acc564-complete-course-week-1-to-week-11/10449 ACC564 Week 1 Discussion 1 "Value of Information" Please respond to the following:  • Firms realize that in order to make money, they have to invest money. This can be attributed to the information that the firm relies on. As discussed in the text, there are seven characteristics of useful information. From the first e-Activity and assuming that you are new CFO of Strayer University, identify the top-three characteristics you would rely on the most for improving the profitability of the firm. Provide an example of how each characteristic would directly help the firm in terms of profitability.  • On the other hand, public and private firms are accountable to a wide range of regulators and stakeholders. Of the seven characteristics, identify the top three that would be applicable to meeting the needs of regulators and stakeholders. Provide an example of how each characteristic would directly help the firm in terms of meeting the needs of these key regulators and stakeholders. ACC564 Week 1 Discussion 2 "Impact of Design of an Accounting Information System (AIS)" Please respond to the following:  •Some of the world’s most successful companies (Fortune 500) operate multiple lines of business. Despite this fact, many of...

Words: 3591 - Pages: 15

Acc564 Week 10 Assignment 4: Changing the Ais Acc 564 Week 10 Assignment 4: Changing the Ais

...Course Week 1 to Week 11 Click below link for Answer visit www.workbank247.com http://workbank247.com/q/acc564-complete-course-week-1-to-week-11/10449 http://workbank247.com/q/acc564-complete-course-week-1-to-week-11/10449 ACC564 Week 1 Discussion 1 "Value of Information" Please respond to the following:  • Firms realize that in order to make money, they have to invest money. This can be attributed to the information that the firm relies on. As discussed in the text, there are seven characteristics of useful information. From the first e-Activity and assuming that you are new CFO of Strayer University, identify the top-three characteristics you would rely on the most for improving the profitability of the firm. Provide an example of how each characteristic would directly help the firm in terms of profitability.  • On the other hand, public and private firms are accountable to a wide range of regulators and stakeholders. Of the seven characteristics, identify the top three that would be applicable to meeting the needs of regulators and stakeholders. Provide an example of how each characteristic would directly help the firm in terms of meeting the needs of these key regulators and stakeholders. ACC564 Week 1 Discussion 2 "Impact of Design of an Accounting Information System (AIS)" Please respond to the following:  •Some of the world’s most successful companies (Fortune 500) operate multiple lines of business. Despite this fact, many of these firms rely on a single AIS.......

Words: 3593 - Pages: 15

Acc 564 Week 4 Assignment 2 Hacking the Ais

...ACC 564 Week 4 Assignment 2 Hacking the AIS Click Link Below To Buy: http://hwcampus.com/shop/acc-564/acc-564-week-4-assignment-2-hacking-the-ais/ Or Visit www.hwcampus.com ACC 564 Week 4 Assignment 2 – Hacking the AIS In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your......

Words: 257 - Pages: 2

Bsop 330 Week 4 Lab Assignments Devry

...BSOP 330 WEEK 4 LAB ASSIGNMENTS DEVRY To purchase this visit here: http://www.activitymode.com/product/bsop-330-week-4-lab-assignments-devry/ Contact us at: SUPPORT@ACTIVITYMODE.COM BSOP 330 WEEK 4 LAB ASSIGNMENTS CHAPTER 12, PROBLEMS 12.1, 12.5, 12.9, 12.15 DEVRY L. Houts Plastics is a large manufacturer of injection-molded plastics in North Carolina. An investigation of the company’s manufacturing facility in Charlotte yields the information presented in the table below. How would the plant classify these items according to an ABC classification system? Chapter 12, problems 12.5 William Beville’s computer training school, in Richmond, stocks workbooks with the following characteristics: Demand ,500 units/year Ordering cost S = $25/order Holding cost H = $4/unit/year a) Calculate the EOQ for the workbooks. b) What are the annual holding costs for the workbooks? c) What are the annual ordering costs? Chapter 12, problems 12.9 Southeastern Bell stocks a certain switch connector at its central warehouse for supplying field service offices. The yearly demand for these connectors is 15,000 units. Southeastern estimates its annual holding cost for this item to be $25 per unit. The cost to place and process an order from the supplier is $75. The company operates 300 days per year, and the lead time to receive an order from the supplier is 2 working days. a) Find the economic order quantity. b) Find the annual holding costs. c) Find the annual ordering costs. ...

Words: 1252 - Pages: 6

Acct 251 Week 4 Peachtree Assignment Devry

...ACCT 251 WEEK 4 PEACHTREE ASSIGNMENT DEVRY To purchase this visit following link http://www.activitymode.com/product/acct-251-week-4-peachtree-assignment-devry/ Contact us at: SUPPORT@ACTIVITYMODE.COM ACCT 251 WEEK 4 PEACHTREE ASSIGNMENT DEVRY ACCT251 Peachtree Assignment You will be completing your assignment using Peachtree, accessible in the iLab. Visit the iLab content item under Course Home for instructions on how to access Peachtree. Complete Exercise 6-1 and 6-2. In Exercise 6-2, Steps #1 has you to generate a report that you will convert to Excel. This is the report that you will submit as your homework. Complete Exercise 9-1 and 9-2. In Exercise 9-1, Step #13 asks you to generate a report that you will convert to Excel. This is the report that you will submit as your homework. In Exercise 9-2, Step #2 asks you to generate a report that you will convert to Excel. This is the report that you will submit as your homework. Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read thesestep-by-step instructions or watch this Dropbox Tutorial. See the Syllabus section “Due Dates for Assignments & Exams” for due date information. Activity Mode aims to provide quality study notes and tutorials to the students of ACCT 251 Week 4 Peachtree Assignment DeVry in order to ace their studies. ACCT 251 WEEK 4 PEACHTREE ASSIGNMENT DEVRY To purchase this visit following......

Words: 1953 - Pages: 8

Acct 251 Week 4 Peachtree Assignment Devry

...ACCT 251 WEEK 4 PEACHTREE ASSIGNMENT DEVRY To purchase this visit following link http://www.activitymode.com/product/acct-251-week-4-peachtree-assignment-devry/ Contact us at: SUPPORT@ACTIVITYMODE.COM ACCT 251 WEEK 4 PEACHTREE ASSIGNMENT DEVRY ACCT251 Peachtree Assignment You will be completing your assignment using Peachtree, accessible in the iLab. Visit the iLab content item under Course Home for instructions on how to access Peachtree. Complete Exercise 6-1 and 6-2. In Exercise 6-2, Steps #1 has you to generate a report that you will convert to Excel. This is the report that you will submit as your homework. Complete Exercise 9-1 and 9-2. In Exercise 9-1, Step #13 asks you to generate a report that you will convert to Excel. This is the report that you will submit as your homework. In Exercise 9-2, Step #2 asks you to generate a report that you will convert to Excel. This is the report that you will submit as your homework. Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read thesestep-by-step instructions or watch this Dropbox Tutorial. See the Syllabus section “Due Dates for Assignments & Exams” for due date information. Activity Mode aims to provide quality study notes and tutorials to the students of ACCT 251 Week 4 Peachtree Assignment DeVry in order to ace their studies. ACCT 251 WEEK 4 PEACHTREE ASSIGNMENT DEVRY To purchase this visit following......

Words: 1953 - Pages: 8

Acc 564 Week 4 Assignment 2 Hacking the Ais

...ACC 564 Week 4 Assignment 2 Hacking the AIS Click Link Below To Buy: http://hwcampus.com/shop/acc-564/acc-564-week-4-assignment-2-hacking-the-ais/ Or Visit www.hwcampus.com ACC 564 Week 4 Assignment 2 – Hacking the AIS In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your......

Words: 257 - Pages: 2

Acc 564 Week 4 Assignment 2 Hacking the Ais

...ACC 564 Week 4 Assignment 2 Hacking the AIS Click Link Below To Buy: http://hwcampus.com/shop/acc-564/acc-564-week-4-assignment-2-hacking-the-ais/ Or Visit www.hwcampus.com ACC 564 Week 4 Assignment 2 – Hacking the AIS In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your......

Words: 257 - Pages: 2

Acc 564 Week 4 Assignment 2 Hacking the Ais

...ACC 564 WEEK 4 ASSIGNMENT 2 HACKING THE AIS To purchase this tutorial visit here: http://mindsblow.us/question_des/ACC564WEEK4ASSIGNMENT2HACKINGTHEAIS/521 contact us at: help@mindblows.us ACC 564 WEEK 4 ASSIGNMENT 2 HACKING THE AIS In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: 1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. 2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. 3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. 4. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for......

Words: 760 - Pages: 4

Acc 564 Week 10 Assignment 4 Changing the Ais

...ACC 564 WEEK 10 ASSIGNMENT 4 CHANGING THE AIS To purchase this tutorial visit here: http://mindsblow.us/question_des/ACC564WEEK10ASSIGNMENT4CHANGINGTHEAIS/513 contact us at: help@mindblows.us ACC 564 WEEK 10 ASSIGNMENT 4 AIS (CHANGING THE ACCOUNTING INFORMATION SYSTEM) Migrating to a new accounting information system is not an easy task. Many firms have struggled with this process, even though our textbook makes the process seem quite straightforward. Recently, IBM recapped some of the lessons learned in migrating to a new accounting information system within the federal government. These lessons can be applied to any accounting information system project. Others have developed their own recommendations for best practices and lessons learned involving implementing accounting information systems. However, in order to appreciate what IBM and others are proposing, we need to apply lessons learned to a real-life situation involving the failure to implement an accounting system properly. For this assignment, research the Internet or Strayer databases for information related to a real-life accounting information system failure and best practices, as well as lessons learned from implementing the accounting system. In addition to information that you may find during your research, please use the following IBM article to complete the assignment: (http://www.businessofgovernment.org/article/what-we-know-now-lessons-learned-implementing-federal-financial-systems-projects). Write...

Words: 955 - Pages: 4

Acc 564 Week 4 Assignment 2 Hacking the Ais

...ACC 564 Week 4 Assignment 2 Hacking the AIS Click Link Below To Buy: http://hwcampus.com/shop/acc-564/acc-564-week-4-assignment-2-hacking-the-ais/ Or Visit www.hwcampus.com ACC 564 Week 4 Assignment 2 – Hacking the AIS In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your......

Words: 257 - Pages: 2

Acc 564 Week 4 Assignment 2 Hacking the Ais

...ACC 564 WEEK 4 ASSIGNMENT 2 HACKING THE AIS TO purchase this tutorial visit following link: http://wiseamerican.us/product/acc-564-week-4-assignment-2-hacking-ais/ Contact us at: SUPPORT@WISEAMERICAN.US ACC 564 WEEK 4 ASSIGNMENT 2 HACKING THE AIS In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: 1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. 2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. 3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. 4. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide...

Words: 489 - Pages: 2

Acc 564 Week 4 Assignment 2 Hacking the Ais

...ACC 564 WEEK 4 ASSIGNMENT 2 HACKING THE AIS TO purchase this tutorial visit following link: http://wiseamerican.us/product/acc-564-week-4-assignment-2-hacking-ais/ Contact us at: SUPPORT@WISEAMERICAN.US ACC 564 WEEK 4 ASSIGNMENT 2 HACKING THE AIS In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: 1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. 2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. 3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. 4. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide...

Words: 489 - Pages: 2

Slender Man (2018) | Saint Seiya | Talk Hero