A20 MIDTERM Notes
A20 MIDTERM Notes
Source: Wild
Accounting information systems collect and process data from transactions and events, organize
them in useful reports, and communicate results to decision makers. With the increasing complexity
of business and the growing need for information, accounting information systems are more important
than ever. All decision makers need to have a basic knowledge of how accounting information
systems work. This knowledge gives decision makers a competitive edge as they gain a better
understanding of information constraints, measurement limitations, and potential applications. It
allows them to make more informed decisions and to better balance the risks and returns of different
strategies.
(Source: Wild)
A general journal is an all-purpose journal in which we can record any transaction. Use of a general
journal for all transactions is usually more costly for a business and is a less effective control
procedure. Moreover, for less technologically advanced systems, use of a general journal requires
that each debit and each credit entered be individually posted to its respective ledger account. To
enhance internal control and reduce costs, transactions are organized into common groups.
Special journals are efficient tools in helping journalize and post transactions. This is done, for
instance, by accumulating debits and credits of similar transactions, which allows posting of amounts
as column totals rather than as individual amounts. The advantage of this system increases as the
number of transactions increases. Special journals allow an efficient division of labor, which is also an
effective control procedure. It is important to note that special journals and subsidiary ledgers are
designed in a manner that is best suited for each business. The most likely candidates for special
journal status are recurring transactions—for many businesses those are sales, cash receipts,
purchases, and cash disbursements.
1. Payroll
2. Tax
Income With holding
Vat
Remember, the use of standard cost/forecasting/budgeting is to compare actual
performance with their expectations
The use of standard costs provides a type of access control. By specifying the quantities of material
and labor authorized for each product, the firm limits unauthorized access to those resources. To
obtain excess quantities requires special authorization and formal documentation. (Source: Hall 7th
ed)
The following are the most commonly cited deficiencies of standard accounting systems
INACCURATE COST ALLOCATIONS. Applying standard costing leads to product cost distortions in
a lean environment, causing some products to appear to cost more and others to appear to cost less
than they actually do. Poor decisions regarding pricing, valuation, and profitability may result.
PROMOTES NONLEAN BEHAVIOR.The primary performance measurements used in standard
costing are personal efficiency of production workers, the effective utilization of manufacturing
facilities, and the degree of overhead absorbed by production.
TIME LAG. Standard cost data for management reporting are historic in nature. Data lag behind the
actual manufacturing activities on the assumption that control can be applied after the fact to correct
errors.
FINANCIAL ORIENTATION. Accounting data use dollars as a standard unit of measure for
comparing disparate items being evaluated. Decisions pertaining to the functionality of a product or
process, improving product quality, and shortening delivery time, however, are not necessarily well
served by financial information produced through standard cost techniques. Indeed, attempts to force
such data into a common financial measure may distort the problem and promote bad decisions.
Wild
Internal Control System - Managers use an internal control system to monitor and control business
activities. An internal control system consists of the policies and procedures managers use to
1. Protect assets.
2. Promote efficient operations.
3. Ensure reliable accounting.
4. Urge adherence to company policies.
A properly designed internal control system is a key part of systems design, analysis, and
performance. Managers place a high priority on internal control systems because they can prevent
avoidable losses, help managers plan operations, and monitor company and employee performance.
For example, internal controls for health care must protect patient records and privacy. Internal
controls do not provide guarantees, but they lower the company’s risk of loss.
Internal control policies and procedures vary from company to company according to such factors as
the nature of the business and its size. Certain fundamental internal control principles apply to all
companies. The principles of internal control are to
2. Establish responsibilities.
3. Maintain adequate records.
4. Insure assets and bond key employees.
5. Separate recordkeeping from custody of assets.
6. Divide responsibility for related transactions.
7. Apply technological controls.
8. Perform regular and independent reviews.
Definitions of (this 3 documents are used to check for possible error in recording also
called 3 way matching)
Receiving report
Invoice
Purchase order (this is the source , so the item received and in the invoice should be
the same as in the PO)
A purchase order is a document the purchasing department uses to place an order with
a vendor (seller or supplier). A purchase order authorizes a vendor to ship ordered
merchandise at the stated price and terms. When the purchasing department receives a
purchase requisition, it prepares at least five copies of a purchase order. The copies are
distributed as follows: copy 1 to the vendor as a purchase request and as authority to ship
merchandise; copy 2, along with a copy of the purchase requisition, to the accounting
department, where it is entered in the voucher and used in approving payment of the
invoice; copy 3 to the requesting department to inform its manager that action is being
taken; copy 4 to the receiving department without order quantity so it can compare with
goods received and provide independent count of goods received; and copy 5 retained on
file by the purchasing department.
An invoice is an itemized statement of goods prepared by the vendor listing the
customer’s name, items sold, sales prices, and terms of sale. An invoice is also a bill sent
to the buyer from the supplier. From the vendor’s point of view, it is a sales invoice. The
buyer, or vendee, treats it as a purchase invoice. When receiving a purchase order, the
vendor ships the ordered merchandise to the buyer and includes or mails a copy of the
invoice covering the shipment to the buyer. The invoice is sent to the buyer’s accounting
department where it is placed in the voucher.
Receiving Report - Many companies maintain a separate department to receive all
merchandise and purchased assets. When each shipment arrives, this receiving
department counts the goods and checks them for damage and agreement with the
purchase order. It then prepares four or more copies of a receiving report, which is used
within the company to notify the appropriate persons that ordered goods have been
received and to describe the quantities and condition of the goods. One copy is sent to
accounting and placed in the voucher. Copies are also sent to the requesting department
and the purchasing department to notify them that the goods have arrived. The receiving
department retains a copy in its files.
Invoice Approval - When a receiving report arrives, the accounting department should
have copies of the following documents in the voucher: purchase requisition, purchase
order, and invoice. With the information in these documents, the accounting department
can record the purchase and approve its payment. In approving an invoice for payment, it
checks and compares information across all documents. To facilitate this checking and to
ensure that no step is omitted, it often uses an invoice approval, also called check
authorization. An invoice approval is a checklist of steps necessary for approving an
invoice for recording and payment. It is a separate document either filed in the voucher or
preprinted (or stamped) on the voucher
Forms Design - Source documents and other forms should be designed to minimize the chances for
errors and omissions. Two particularly important forms design controls involve sequentially
prenumbering source documents and using turnaround documents.
1. All source documents should be sequentially prenumbered. Prenumbering improves control by
making it possible to verify that no documents are missing. When sequentially prenumbered source
data documents are used, the system should be programmed to identify and report missing or
duplicate source documents.
2. A turnaround document is a record of company data sent to an external party and then returned
by the external party for subsequent input to the system. Turnaround documents are prepared in
machine-readable form to facilitate their subsequent processing as input records. An example is a
utility bill that a special scanning device reads when the bill is returned with a payment. Turnaround
documents improve accuracy by eliminating the potential for input errors when entering data
manually.
Output controls - Careful checking of system output provides additional control over
processing integrity.
Important output controls include the following:
● User review of output. Users should carefully examine system output to verify that it is
reasonable, that it is complete, and that they are the intended recipients.
● Reconciliation procedures. Periodically, all transactions and other system updates should
be reconciled to control reports, file status/update reports, or other control mechanisms. In
addition, general ledger accounts should be reconciled to subsidiary account totals on a
regular basis.
● External data reconciliation. Database totals should periodically be reconciled with data
maintained outside the system.
● Data transmission controls. Organizations also need to implement controls designed to
minimize the risk of data transmission errors. Whenever the receiving device detects a data
transmission error, it requests the sending device to retransmit that data. Generally, this
happens automatically, and the user is unaware that it has occurred.
Information Resource Management (IRM) is a program of activities directed at making effective
use of information technology within an organization. These activities range from global corporate
information planning to application system development, operation, and maintenance and support
of end-user computing.
An integrated information system is a combination of software that combine different
databases from various sources with data integration tools, visualization and models. For a
complex area such as aquaculture, a single software becomes insufficient, or very complex and
therefore very uncertain or undecidable.
An information security management system (ISMS) is a set of policies and procedures for
systematically managing an organization's sensitive data. The goal of an ISMS is to minimize risk
and ensure business continuity by proactively limiting the impact of a security breach.
Reliability
Relevance
Verifiability
Timeliness
Predictive value
Credit memorandum - A seller’s credit memorandum informs a buyer of the seller’s credit to the
buyer’s Account Receivable (on the seller’s books).
Turnaround documents - Records of company data sent to an external party and then returned
to the system as input. Turnaround documents are in machine-readable form to facilitate their
subsequent processing as input records. An example is a utility bill.
Source documents - Documents used to capture transaction data at its source – when the
transaction takes place. Examples include sales orders, purchase orders, and employee time
cards.
Picking ticket - A document that lists the items and quantities ordered and authorizing the
inventory control function to release that merchandise to the shipping department.
Packing slip - A document listing the quantity and description of each item included in a
shipment
Bill of lading - A legal contract that defines responsibility for goods while they are in transit.
Purpose of
Passwords provide the first line of defense against unauthorized access to your computer
and personal information.
Internal file labels generally refer to labels that are expressed in a machine-readable
language. They provide identity to information or data in a storage medium.
Examples of
A validity check compares the ID code or account number in transaction data with similar
data in the master file to verify that the account exists. For example, if product number 65432
is entered on a sales order, the computer must verify that there is indeed a product 65432 in
the inventory database.
A completeness check (or test) verifies that all required data items have been entered. For
example, sales transaction records should not be accepted for processing unless they include
the customer’s shipping and billing addresses.
A reasonableness test determines the correctness of the logical relationship between two
data items. For example, overtime hours should be zero for someone who has not worked the
maximum number of regular hours in a pay period
A field check determines whether the characters in a field are of the proper type. For
example, a check on a field that is supposed to contain only numeric values, such as a U.S.
Zip code, would indicate an error if it contained alphabetic characters.
Primary objectives of
The revenue cycle’s primary objective is to provide the right product in the right place at the
right time for the right price.
The primary objective in the expenditure cycle is to minimize the total cost of acquiring and
maintaining inventories, supplies, and the various services the organization needs to function
Conversion cycle. The objective is to create a product that meets customer requirements in
terms of quality, durability, and functionality while simultaneously minimizing production costs.
Inherent risk - The susceptibility to significant control problems in the absence of internal control.
Control risk - Risk that a material misstatement will get through the internal control structure and
into the financial statements
Detection risk - Risk that auditors and their audit procedures will fail to detect a material error or
misstatement.