Acc 118 Week 4 Module
Acc 118 Week 4 Module
WEEK: 4
LEARNING CONTENT:
Introduction
Modern computer equipment has a high degree of reliability and the auditor can usually assume that
the equipment will perform reliably and will detect machine-based errors if they occur. Except where
difficulties in processing are found to be a result of machine errors, the auditor can usually rely on the
efficacy of these controls. Some of these are operable, however, only if program instructions test the
equipment indicators. In order to understand the working of the equipment, to understand why it is reliable,
and to evaluate the effectiveness of machine checks in cases where there are problems, it is desirable for
the auditor to have a general understanding of built-in hardware control features. This chapter describes
the general reasons for equipment malfunctions, the general types of equipment controls and the controls
associated with the major equipment items.
Discussion
A. How the equipment can malfunction
A computer system consists of both electronic elements and mechanical parts. The central processing
unit, for example, consists almost entirely of electronic elements such as transistors, resistors and
diodes, whereas most input/output equipment and file storage devices contain both electronic
components and parts which move mechanically. Failure in the system, therefore, can result from the
malfunction of either a mechanical part or an electronic element.
B. Equipment controls
Equipment controls are usually based on the concept of redundancy. This concept has received much
attention in communication theory but is also applicable elsewhere as a general basis for error control.
With respect to error control, redundancy involves the addition of an element to a process or to the
code for an item for the sole purpose of detecting any error which may occur. If there is no possibility
of error, the redundancy is usually eliminated. Equipment controls can be divided into five types:
redundant character check, duplicate process check, echo check, validity check and equipment check.
Each of these involves a separate operation which provides a check on the results of the main
operation. The general types of controls are described in this section; their application to specific
equipment is described in the remaining sections of the chapter.
Echo Check
In an echo check the central processor sends a command to an input or output device to perform an
operation. The device returns a signal that verifies that the proper mechanisms for performing the
actions have been activated. This check verifies that the equipment was activated without testing the
actual results obtained.
Validity Check
Since, on many operations, only certain results can be considered correct, one method of checking is
to compare a result obtained against all valid results. Any result not fitting into this set of valid results
is considered incorrect.
Equipment Check
In this control, the computer checks the equipment to see if it is functioning properly instead of
checking the results from the operation. It is not a positive check, since the equipment may be
working properly while defective media or other factors are causing improper results.
C. Central processor hardware controls
The central processor has two equipment error-control problems. The first is that of ensuring that all
data elements transmitted through the internal circuitry of the central processor are transmitted
correctly and that no problem with the timing or pulses has destroyed or altered the data being moved.
The second is that of avoiding the performance of an operation that is invalid. The typical central
processor hardware controls are the parity bit, the operation validity check and interlocks. In some of
the very early computers there were duplicate circuitry and double arithmetic in order to ensure correct
functioning of the central processing unit, but these precautions are no longer considered necessary or
desirable.
Parity Bit
The computer represents data and instructions internally using devices which have
two recognizable states. A magnetic core, for example, is polarized in one of two
directions. Each of these two states is used to represent a binary digit (abbreviated
as bit) —one state represents a 1-bit and the other a 0-bit in the binary system.
Decimal numbers and alphabetic characters are converted to binary
representation for internal processing or for storage on magnetic media such as
magnetic tape and are converted back to decimal numbers and alphabetic
characters when printed on reports. There are various different approaches to
coding of data for internal representation in binary form. In all of these
approaches, the computer works with groups of storage devices, each of which
can hold either a 1-bit or a 0-bit.
A redundant character, called a parity bit or check bit, is associated with each
group of bits separately identified and moved as a separate unit through the
computer. This unit may be a large, fixed set of bits called a computer word, a
smaller set which can encode a single alphanumeric character, or a separately
identified part, called a byte, of a larger fixed word. The parity of the binary word,
character set or byte is made even or odd when the data is first converted to
binary form from input items or when data is formed from a computation or other
manipulation. The number of bits is summed and a 1-bit or a 0-bit is placed in the
parity bit position to make the total number of bits odd if an odd parity check is
used or even if an even parity check is used. Figure 4-1 (this page) illustrates the
parity bit in a 6-bit binary-coded character bit set. Each time this basic group of
bits is moved in the computer, the parity of the group is checked. If the parity bit
as newly computed is different than the parity bit as previously computed, a bit
has been destroyed. This test is not infallible since the destruction of two bits will
leave the parity bit unchanged, but the probability of this happening is very low.
There are a few computers (usually equipment with a scientific processing orientation) which do not use
a built-in parity bit control. Other reliability features including programming checks usually compensate
for this omission. Parity errors in the central processor are seldom encountered and many of the errors
which are registered are due to the checking circuitry itself rather than to an underlying error. The
auditor should be aware of the parity check, but the lack of this check does not usually affect his
assessment of the system or the extent of the audit tests.
Validity Check
In the central processor there are only certain operation codes which are valid and which the computer
can execute and there is only a certain range of numbers which the computer can access as memory
addresses. Before attempting to execute an operation code or access a memory location, the computer
usually performs a validity check to determine that it is a valid operation code or a valid address. Validity
checks are used in some computers with character coding to check the movement of data. Each bit set
can encode one character, but not all combinations are valid. An invalid combination indicates an error.
Interlocks
The computer system has automatic controls to prevent the equipment from attempting certain
operations at the wrong time. For example, there is an input/output interlock which prevents the
computer from signalling an input or output device to perform an action while it is already performing
another operation. Thus, a card reader cannot be signalled to read a card while it is already performing
a card-reading operation. A storage protection interlock is a hardware control used with fairly advanced
computer systems that process several programs concurrently. It prevents the computer from using a
block of memory locations that are not assigned to the particular program.
The hardware error controls for printing, as detailed in Table 4.3 (below) are echo, print synchronization
and validity. Note that these controls test in various ways the mechanisms performing the printing but
none of them is a positive test of what was actually printed. In practice, however, these controls have
proved to be satisfactory.
The positions are called channels. At the end of each record there is a blank space (usually ¾ inch)
called an interrecord gap (or, more precisely, an interblock gap) to separate the blocks on the tape, each
of which contains one or more records.
Problems with magnetic tape may result from difficulties with the magnetic tape itself (the primary
reason), from malfunction of the read/write heads, or from malfunctions in the tape drive mechanism.
The typical magnetic computer tape consists of a half-inch wide strip of polyester (plastic) film 2,400
feet long with a thin iron oxide coating. As the tape passes over the read / write head, any imperfection
in the coating may lift the tape from the head and cause a signal drop. These defects can stem from
manufacturing defects or from dust particles, but the most frequent source of difficulty comes from
imbedded particles of oxide. Flakes of oxide break away from the coating and are redeposited on the
tape surface by the tape heads and guides. These can be removed by a special cleaning process. Over
a period of time, parts of a tape become worn. These worn sections must be removed or skipped over
and not used for recording.
The proper operation of the read/write mechanism in the tape unit depends
upon correct signals from the central processor and correct speeds and
positioning as the tape moves past the read/ write heads. If the tape moves
at an improper speed the recording or reading mechanism will not operate
properly. A malfunction of the write head may cause a recording to be made
at less than an acceptable signal level. The drive mechanism has a device,
usually a photoelectric sensing device, to sense the beginning and end of the
tape. If this is not operating properly, the read/write heads may attempt to
write or read on the leader at the beginning or end of the tape. Incorrect
processing or loss of data will result. The hardware controls for magnetic tape
consist of a parity check for reading of data and a read-after-write comparison
for writing on tape.
The basic parity check for magnetic tape is a row check, often called a lateral
or frame check, in which each character (coded one character per frame) is
given a parity bit when the data is put on the tape. When the data is read
from the tape the parity bit is checked. An improved parity check is the
addition of longitudinal or track parity bits to give a two-dimensional check.
Each record encoded on the tape is given a track parity bit in addition to the
row parity bit associated with each frame. This serves as an added check over
the single dimensional row parity. In addition, the intersection of a missing
row bit and a missing longitudinal bit will, if only one bit is in error, define the exact bit position causing
the error and will allow for automatic error recovery (Figure 4-6, this page).
A cyclic or diagonal check is used in a few magnetic tape units. This is a check character formed by
taking a parity check diagonally instead of down or across. This provides additional capabilities for
pinpointing any bit positions that happen to be in error.
Read after Write Check
The read/write heads on a magnetic tape drive may take two forms: the single-gap head which acts as
both a read mechanism and a write mechanism (only one operation being performed at a time) and a
two-gap head which has both a read head and a write head. The two-gap head (Figure 4-7, page 49)
allows for a read immediately after a write comparison in which case the data just written is read and
compared. The data is tested to see if it was recorded at a proper signal level and parity is checked.
The automatic write/read comparison depends upon having the two-gap head. It is preferable from an
error control standpoint because recording errors are detected and corrected when they occur rather
than when the file is next processed. In the latter case, reconstruction is usually more costly and it is
also time consuming.
A common approach is to have the arm float on a layer of air. In the event of power failure, a safety
device retracts the heads to prevent them from damaging the disk. Strip file storage consists of
cartridges loaded with plastic strips coated with a recording material. For a read/write operation, the
selected strip is dropped from the cartridge onto a positioning drum which moves it past a read/write
head. Errors may occur in this type of equipment because of incorrect positioning or because of improper
reading or writing by the read/write mechanism. The major error control methods are the parity check,
check character and read-after-write check (Table 4.4, page 52).
A major error can occur in a disk storage device if information which is sent to be recorded at one
location is recorded instead at another. The recording at the incorrect location not only puts the
information where it should not be, but also destroys information at the location improperly used. In
order to avoid the possibility of such an error’s happening through an improper movement of the
read/write head, it is considered good practice, either through hardware controls or through
programming, to compare the address of the location at which data is to be written with the address
called for by the instructions.
The reject rate is significant in terms of handling time and reprocessing. The seriousness of errors
undetected because of misreading depends on the type of application. A 1 % error rate may be quite
acceptable for one application but totally unacceptable for another. Programmed tests discussed in
Chapter 6 can be used to detect many of the errors that are not found at the time of reading.
The auditor should be able to obtain general information on the reliability of the equipment from
operating reports and from computer logs which record periods of machine breakdown (downtime) and
the reasons for it.
In most cases the hardware error detection methods are satisfactory and do not require special audit
attention. However, procedures for handling detected errors are themselves sources of possible errors
that may go undetected. For example, a card reader with a validity check will reject a card with invalid
punch combinations or a card which was sensed incorrectly so that it appeared to be invalid. If the
procedures for handling this error are not followed properly, the result may be a double reading of the
card or a skipping of the card. In reviewing processing procedures, therefore, the auditor should usually
devote more attention to the procedures for handling errors than to the hardware controls which detect
them.
Summary:
Malfunction in the equipment can be prevented through the following control:
Equipment controls
Central processor hardware controls
Card reader hardware controls
Card punch hardware controls
Printer controls
Magnetic tape hardware controls
Hardware controls for direct access storage devices
Hardware controls for data communications
Other input/ output devices
Hardware controls and the audit
Through the use of the above control, the internal control of the business will increase and can assure the
reliability and relevance of the information that will be generate in the system.
REFERENCE:
1. Davis, G. CPA, PhD. Auditing and EDP. American Institute of Certified Public Accountants, Inc. 666
Fifth Avenue, New York, N.Y.