General Computer Controls Question Bank 2013
General Computer Controls Question Bank 2013
DEPARTMENT OF ACCOUNTANCY
AUDITING 3A
2013
Mr Ntato Mokonane achieved his lifelong dream when he opened his own
restaurant, The Proud Peacock, in partnership with his brother-in-law, Mr Xolile
Xosi. The restaurant has been open for 18 months and has proved to be very
popular. Mr Mokonane has asked you to advise him on the controls he should
have in place in his restaurant.
b) Describe the programmed controls that you would expect to find that
would ensure that all valid restaurant sales are captured accurately and
completely. (Application controls) (13)
2
QUESTION 1 (SUGGESTED SOLUTION)
Access controls
Maximum (10)
Validity
Access controls – see above (1)
3
log these overrides (so that Ntato can review these logs the next morning and
investigate the reasons therefore). (1)
Accuracy
Completeness
Maximum (13)
Presentation (2)
4
QUESTION 2 (45 MARKS)
Mrs Human, along with being a very good lecturer, decided to open a Game
Butchery. The butchery specialises in the production of salami from wild Game
meat, specifically Zebra. She is still considering whether or not it would be worth
her while to also open a shop that sells Ottomans, but this is still in the pipeline.
At present, Mrs Human uses a manual accounting system to record all her
transactions in the company. She is a little unsure of her accuracy and technical
accounting knowledge, and is considering developing a computerised system
that will perform all her accounting functions for her. She has asked for the
advice from her esteemed auditor regarding the controls that need to be in place
in the newly developed system during this changeover from the manual system
to the computerised system.
REQUIRED:
Briefly outline the stages in the development and implementation of the new
computer application. (25)
One of the major implications of on-line computer systems is that the user can
have direct access to the master files within the system, through the medium of a
terminal.
REQUIRED:
5
QUESTION 2 (SUGGESTED SOLUTION)
PART A
6
The entity should define the way the system must work to meet the specification
of users and business (½)
Testing
balancing old files with new files (½)
third party confirmations (½)
follow up of exception reports (½)
comparison with data run on old system (parallel) (½)
manual comparison of data (½)
approval by users (½)
8
PART B
2. Locating terminal devices throughout the entity increases the opportunity for
unauthorised use of a terminal device and the entry of unauthorised transactions.
(1)
3. If on-line processing is interrupted for any reason, for example, due to faulty
telecommunications, there may be a greater chance that transactions or files
may be lost and that the recovery may not be accurate and complete. (1)
5. The use of electronic commerce and EDI for the exchange of documents
between two organisations results in the loss of traditional paper audit trails,
including invoices and purchase orders. (1)
7. Improper input may corrupt files either for fraudulent purposes or as a result of
innocent error. Such a corruption is likely to be difficult to discover. (1)
Maximum (10)
9
b) The methods that can be adopted to help overcome these weaknesses
include:
Student should describe these controls in order to allocate marks!
a)Terminals
The use of TINS
Limited access to system
Shut off after 5 mins non-use
Shut down after 3 unsuccessful attempts
Limited to 1 workstation log on
Polling by central computer (Any 2)
b) Identification of users
User ID’s & passwords
IP address
Magnetic cards
Voice recognition (Any 2)
c)Authorisation of users
Logon ID’s
Passwords
Multilevel passwords
User matrixes (Any 2)
f)Password control
Minimum length
10
Not easily guessed not shown on screen
Changed regularly
Confidentiality emphasised
Cancelled on resignation/ dismissal
Cancelled after period of inactivity
Use for authorisation
Limit access to part of system
Limit access to certain times of day
Authorisation levels linked (Any 2)
g)Programme libraries
Access to backup programmes controlled by access software
Passwords
Updating authorised (Any 2)
h)Utlilities
Stored separately Use logged and reviewed (Any1)
i.Terminals
Physically locked
Located in visible area
Situated in lockable room (Any 2)
v. Distributable processing
Only executable programmes (instead of production programmes)
at branches
Independent comparison of exec. Programs to source programmes
(e.g. internal auditor) (2)
Maximum (10)
11
QUESTION 3 (20 MARKS)
Ms OG Seatle – Maitse achieved her lifelong dream when she opened her own
restaurant, Complex 49, in partnership with the love of her life, only known to
most as “Jingles”. The restaurant has been open for 22 months and has proved
to be very popular.
Being new to this “computer environment” topic, Ms Seatle – Maitse was not
quite sure of what exactly she should expect as characteristics of a CIS
environment and was hoping that you could also assist her regarding this query.
a) Discuss the controls that you would have expected to find during the
development and implementation of the new Pastel Point of Sale software
system. (10)
12
QUESTION 3 (SUGGESTED SOLUTION)
Part A
3. Implementation
13
the auditors should also be involved. (1)
MAXIMUM (10)
14
QUESTION 4 (22 MARKS)
You are the audit manager of Top Fashions (Pty) Ltd, a company trading in the
fashion industry with a 28 February 2010 period end. Top Fashions (Pty) Ltd acts
as a supplier of highly fashionable jeans to various store outlets across South
Africa.
The company was established by Mr. Levi and had grown significantly over the
past years into a well-known fashion icon in the industry. Mr. Levi started the
company in the back of his garage while studying for his degree in fashion
design. He specializes in the manufacturing of fashionable jeans for the youth of
today. His jeans became so popular over the years that most of the major
clothing stores across South Africa now sell his jeans. Mr. Levi expanded his
business from a sole propriety into a well established company with several
branches across South Africa.
Due to the increase in the volume of transactions, the company decided during
the year to convert to a more sufficient online update information system which
now integrates all areas of the company into one system. A central file server
(mainframe) located at the head office in Gauteng will control the system and all
of the company’s branches are connected to the system through on-line
terminals.
The PC’s at each branch form part of a wide area network using
new software and networking technology to provide integration
between the mainframe and PC network, and to allow the PC’s at
each branch to communicate with the mainframe.
Management is concerned that the new system will introduce control problems
not previously encountered, and is willing to go to any expense to implement
proper controls over the new system.
15
YOU ARE REQUIRED TO:
a) List the controls that Top Fashions (Pty) Ltd should implement over the
conversion from the old system to the new information system. (10)
b) List the most pertinent programmed controls that management should
implement to ensure that unauthorized access is gained to their new
system. (10)
Presentation 2
16
QUESTION 4 (SUGGESTED SOLUTION)
17
Formal procedures and authorisation of emergency changes and
limitation thereof. (1)
Maximum (1)
TOTAL MAXIMUM (10)
18
responsibility levels linked to user IDs to limit access
only authorised personnel and EDI users should have the ability to
gain access to specific computerised functions
firewalls to control access to the system
multilevel passwords: two or more password required to obtain
access
compile user matrixes for controlling access to application
programs and processing
read only functions
allowing only access to certain parts of the system
Maximum (4)
Use of access control software especially over access at the VANS (1)
Program libraries should be kept and the following controls should
be exercised: access to back-up programs should be controlled by
access software against unauthorised changes
access to library protected by passwords
updating to libraries should be authorised (senior)
program libraries should be regularly reviewed by an independent
senior official
Maximum (2)
19
Other matters:
Formal information security function, positioned well and ensuring
of technical expertise within the function to manage access control.
Approval controls for the establishing of user id’s and granting of
priviledges.
Physical access to computer facilities housing the financial
application and restrictions to the access rights.
Maximum (2)
TOTAL MAXIMUM (10)
Presentation (2)
20