0% found this document useful (0 votes)
10 views13 pages

AIS Midsem

The document discusses various types of fraud and internal controls. It provides examples of different fraudulent acts like computer hacking, identity theft, and altering accounting records. It also discusses controls to prevent fraud such as segregation of duties, authorization controls, and data entry controls like validity checks and reconciliation.

Uploaded by

nartmish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views13 pages

AIS Midsem

The document discusses various types of fraud and internal controls. It provides examples of different fraudulent acts like computer hacking, identity theft, and altering accounting records. It also discusses controls to prevent fraud such as segregation of duties, authorization controls, and data entry controls like validity checks and reconciliation.

Uploaded by

nartmish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

SECTION A [20 MASI

SHADE TIE L.ETTER CORRESPONDING TO TIE CORRECT ANSWER ON THE


SCANNAILE SHEET AND CIRCLE SAME ON THE QUESTION PAPER
I) When opening un lxeel file, Kelvin received a message saying that the file is lockcd
for editing. Ihis is happening because
A. the file is corrupted due to a computer vir.
I. Erie opened the tile av read-only.
C. concurrent update controls have locl,ef the file.
D. there is no problem. Kelvin is editing the file, so it is locked.

2) Edward Awuriba has been the wetmaster for Sumbruingu Community Dank tsCI) only
ten days when SCH' website w scheduled tor a routine security patch update.
Unbeknown to Mr. Azuniba, eberetooks found out the timing of the patch update and
launched attacks right before SC['s update from a remote location. As n result of the
attack, SCB tost a significant amount of clients' private information. 5CB sutlered
from a(n)
A. haking attack.
I, zero-day attack
C. identity thett attack
D. eyher·extortion attack

) Prinee Esslam is the intemal auditor for S·AMOS[AR Limited Before investigating the
HRM / payroll cycle at S\JOSPAR, Prince decided to read up on the proper
segregation of duties reganding payroll disbursement prusesses. For strongest
segregation of duties, the - should distribute paychecks.
A. account+ payable department
I. cashier
C. internal audit department
D. eternal auditor

4) "Cooking the tools" is typically accomplished by all the following etept


A. overstating inventory.
• accelerating recognition of revenue.
C. inflating accounts payable
D delaying recording of expense

5) Which of the following fraudulent acts generally takes most time and effort''
A. Lapping accounts receivable
H. Selling stolen inventory to gct easl
C. Stealing inventory from the warehouse
D). Creating false journal entries to overstate revenue

t Which of the following is the bet way to hide theft of assets?


A. Only steal an immaterial amount of assets
H Coner»ion of stolen assct into cash
C. Stcaling cash from cu»tomer A and then using customer D's balance to pay
customer A's account receivahle
D. Charging the stolen a»et to an expense aa:ount

u/IN'Lt-4 -2 el //
~ CamScanner
7) Computer systems are particultly loenshMe tu coinputer fraud becaue
A perpetrator can tel, destrv, or alter massive mount of data in very little
time, often leaving le evidence
II compute fraud can be much mote difficult to detect than other types of fraud
t computer program need to Pew mo«hfied illegally only one for them to operate
properly ft as logs the} are in use
D all of the above

) An ll auditor eamined we#logs that tracked very time a pron tned to login to th
omnpany wctite [he l] dot need a very long It of attempted Join attempt
that we varwu us«ernmnes frown the' sane ll' adrew lbe ll au»tot hkel sewg
perwn try to do which of te follow hog'
A. hijaslug attack
I phishng attal
t. ditiwnary attal
D password raking

Roland t an a suntant tot (ahty l'aper Company. which ha»w strict corporate policies
on approprate use of sotponte tesounes He Air» weel of February, Roland saw
Judas, the branch met patting a pack of A4 sheets into hi briefcase on his way
out the dot. his situation bet retleet a weakness in which apest of the control
entronment, a discussed in the COO Framework
t. Rid, management pllosoph
[H Intent and cthiel vale
tRestrut aces to sat
D Methods of asstmtg authority and responsibility.

I(low i epectcd loss calculated when performing rush assessrncnt''


A, Impact times epcted loss
• Impact times hlchihof.
C. Inherent risk times hkelihad.
D Residual rsi times hkehhod

I9)Of the following cam ples of fraud. when will be the mo difficult to prevent and
detect' Assure the cemnpamy enforces adequate segregation of duties
A. maul room cmphce stcals a chxuue teened from a customer ard destroys
the do umncnttwn
H lhe accounts reseable clerk does not record sales invoies fr friend or
lammly, so the can tescn tree god
t. An employee puts inventory behind the dumpster while unloading a vendor's
delivery truxl. then pnls up the mentor later in the day and puts it in her car.
D. credit manager issues stedrt cards to hunset and a staff accountant in the
sounting office, and when the credit cand talanes are just under
6lHs1,000 00, the staff ascouwntant wnites at the scounts as bad debt. The
credit manager then issues ms sands

f+tu,wt4u/44
3 ¥ if

~ CamScanner
?) Whieh of the following duties cold be pertoned by the same individual without
violating segregation of duties sontrot'
• lroramming ne tole lot counting software and testing accounting
software upgrades
I Apposing accounting software tamge requests and testing production
sheduhin software changes
t Apposing software change» and unplementng the upgraded software
D Managing asoants payable fun~trn and rerun code for accounting software
to mote efficient/ ptoesw discount due dates on vendor invoices

Ii\th a rited wk fore and a dets to maintain strong internal control, which
own/nation of lutes would veult in the lot rl eptre''
I plating the mentor thry ledgers ard teeth purchases in the
purchases journal
II, pptong a sale return on a u·tort's ,count and depositing customer,
checks in the bawl
t. Entenin parents to vcnden the cash disbursements journal and enterim
ash cencd from customers in the cash teepts journal.
D t'pdasting the general ledger and working in the iwcntoty warehouse

I4) lhe bet example ot an etetnc payroll transaction file financial total would most
hlely he
4. total number ot employee
B. sum of hours wwried
( sum ot net p»
D total of employees' svial sc,unt number

d l

~ CamScanner
m an uel Aboage

t) he total overtime hours ts t0 hour. Which data entry control would bet prevent
similar data entry errors in the futute'
I '
A. Scene check.
I. Valdut check
t Cheli digit
D. Reasonableness test

''l J I icn1" l\11111\II, ",111hl 1101 he u-.c:f11I if y,,u LUC rccuohn" the
7)\ lh1 of t1he 1 fol1l1 owing 1al ? ,

checkout of hibany bools by member


A. Sequence check
Prompting
tValdit check.
D. Concurrent update control

I) ta data entry input control that imvolcs checking the accuracy of input
data hy using it to retneve and diply other related information
A ahdit chesk
I. Duplicate data checl
c. Closed-loop verification
D. Check digit verification

I) All of the following controls for onlie entry ot a sale order would he useful except
A. check digit verification on the edi amount of the order.
B. validity check on the imventor item number.
C. field check on the customer ID and dollar amount of the order.
D. concurrent update control

20) A payroll clerk, accidentally entered an employee's hours worked for the week as 400
instead of 40. The data entry control tht would best prevent this error would be
A ache.k digit
I, batch total reconciliation
C. alimit check.
D. afield check.

2I)Cancellation and storage of dourents n one example of atn)


A. output control
I ptoessing control
( input control
D). data entry control
~ CamScanner
. ~

2)When the accountant enter n sotret tamer number, the data entry screen displays
the customer name and address This an tuple of
A prompting
I4, pefomatting
t closed-loop verification
D, error checking

2IA isadata entry control tht enparts the ID number in transaction data to
a master file to venfy that the ID number eists
eonablenes test
lH user review
t data matching
D validity hel

24)A computer optator accidentally used the wrong mater file when updating
transaction file As a result, the master file data is now unreadable Which control could
et
have prevented this from happening'
A Header tesotd
II Validity check
C railer record
D. Panity check.

25)hieh of the following is an nprtant control to prevent buffet overflow


vulnerabhtes'
A. Lt check
H sue.heck.
C. Range checl
D. Field check

26) enables a system to continue functioning in the event that a particular


component fails.
A. An incremental backup pros&dune
Iault tolerance
€( Preventive maintenanse
D 4deduphation backup prcdure

27) The accounting department at Synergy Hydroelectns records an avcrage of 12,$00


transactions per hour. Iy cost-benefit analysis, managers have concluded that the
maximum acceptable los of data in the event of a system failure is 50,000 transactions
[f the firm's recovery tine objective is a minutes, then the worst cae recovery time
objective is
A. 2hours
I. 4hours.
€ thours
D ¥hours

ntp@ et4 z l
~ CamScanner
2l f a firm es an t!RP, the best st to mitigate le ti»l of the detrtion of matet
data is to
A truently plate the IR!' s em
D. integrate the R!' stem nth all II function
t implement the I R]' «stem in three separate irtan«c
D. periodically audit the Rl' sy em

29)Consider the following revenue ele senano lhe company ha been epoed to
customnet dissatisfaction and the n!'tested control pro«lure to he nplemented i tu
tall and use bar-code scanners What is tle threat'
A The company ms be hipping the wrong quantities of merchanlie
IH lhe comnpany may be hippwng the wrong menhardi
( lhe company may be shrpug oner to the wrong auhdre»
D All of the above threats my apply to this enanio

u ln a revenue syle with pper controls, the ho reports to the li


not imvoled in any cash hdhing aetn1ties
A casher, controller
H aslier, treasurer
( acount receivable clerk. Ire.utsr
D assountsreisbMe clerk, controllet

34A serwus epowsure in the revenue syle is loss ol assets. What is the related threat and
Apple ble control proedare that address this epowsun'
A shipping errors; reconcilution of sales order with picking ticket and packing
hip
theft of cash; segregation of duties and mumization of cash handling
C. making sales that turn out to be uncollectible; force sales people to male
collection calls en customer with past due balance
D, poor perforanse, preparation and review of performance reports

?)Which of the following duties could be prtermed by the same individual and not
violate segregation of duty cont10ls?
A. handling cash and posting to customer accounts
[H, issuing redt memos and maintain customer acounts
C. handling cash and authorizing credit memos
D handling sash receipts and mailing supplier payments

)lt has been discovered that credit sales hnc been made to customers with a poor credit
rating If this continues, the company will face intasing uncollectible receivables and
loses due to bad debts. Separation of duties between nd should
help resolve the problem
A. shipping, billing dutie
I. credit approval, marketing
C. billing; credit approval
D. marketing, accounts receivable

t./attn.tMnA 4 77 y(/
~ CamScanner
~ ~~
34) suppose management wanted to increase the speed ol pn
es sin
''
custorner Dayymcnls.
l}
One way to speed up payment transaction pressing n to
A. ealD
h. use JED] analysis soft»wre
( eliminate credit sales
D etend the amount of credit otleted e customer

15)Segregation of duties control dtatc th,au the solltion and recording functions be
kept separate from each other. However, t acounts receivable department needs to
know when customers pay their imwe tyWht is a solution to this potential internal
control problem
A. Establish a lolbo arrangement wuh a tanl.
I Have customers send a emittance ahie with their payment.
(Have mailroom personnel prepare a remittance list which can be forwarded to
counts rcen able.
D. AMI of the above

6) ldentity in which of the following scenarios a company could adjust the balance due
the vendor ty issuing a debit memo.
A quantity different from that ordered
I damage to the goods
C goods that fail inspextnon tot quhity
D. All of the above are possible scenario s

37)Whh of the following would probably be the least etfective control to mitigate the
risl, of paying a phony imvoe payahle ft mentor purchases that were never made'!
A. Require three·way match for ll inventory purchase invoices.
BH Cancel all imvoi,es and supporting dumentatin when paid.
€ Only pay from origi nal imvwises
D. L.stablish strict access and authorization controls for the approved vendor
master file

Jlf duties are properly seyregated, the authorization function is performed by • the
recording function is performed b , and cash handling is performed by the
A accounts payable; punchsng: cashier
I. purchasing; accounts pyable; cashier
C purchasing; cashier; assounts payable
D, purchasing, accounts payable, treasurer

9)Direct labor must be tracl.cd and accounted tor as part of the production process.
Traditionally, direct labor was tnaked using but an Al enhancement is to
use to record and tna.l direct labor costs
A. job-time tickets; coded identification sands
[4. move tnkets, «oded identification ands
t employee carings records, job-time tickcts
D). time sands, cltron tumc entry terminals

5/
~ CamScanner
40) Which type of information belo should not be maintained by the AIS in accounting
for fied assets
A Identification/'serial number
Cot
(Improvement
D Malet value

4])Detailed data about reasons for warranty and tepair sot is considered an applicable
control used to mitigate the threat l
\ underproluton I]
overproduction
C poot prolust design
D) suboptimal investment of fied asset

l) Tonto Ventures determines the cost per delivery by summing the average cost of
loading, unloading, transporting, and maintenance. What coting approach doe» Tonto
Ventures ue''
A Joh-stdet
lH pn€cs
(activity-based
D umt-based

4)Ihe payroll transaction file should sent


A. entries to add new tunes
I. changes ta rate
€ time card data
D All of the above are correct

44)hen using elettomi douments,


A. access controls
D. separation ot dunes
( general controls
D. application control

45)lf you believe not all adjusting cntnie were posted in the general ledger, you should
prepare a general ledger control report liting journal voucher in
A.numerical scqucncc
Ii. chronoloneal order.
(general ledger assount number under
D. any otder, sic you have to review them all an way

46) Maria Gonzale is an accountant at (ansa limited. Maria received the following error
message while making an au!justing entry to the general ledger·"Ihe amounts debited
and credited are not tual l'leas« orrt and try again." [his is an eamnple of a
A. validity chel
I. fetd check
t' zero-balance check.
[) oinpletenes test.

I/

~ CamScanner
. ~-
47) Although Gillette uses canned software in its business operations, it does so with th ·, 1
intention of creating a competitive advantage Identify how Gillette aims to gain a
rater competitive advantage twomn in canned sotlwaft
A From deciding how the software should be used
II From deciding what soltwate should he uad
t From the cost savings it gas try usag canned software
p From deciding when software shold t uscd

48)Identity the system below that end uers should not he allowed to develop
A \payroll pressing prota
I. program that perfonns "what·if statistical modeling
(Developing an application sing pvewritten software such as a spreadsheet or
database system
D. leparing a shedule or list suh as a depreciation schedule

49))Why are end-user created systems often poorly documented'


sy
4. L/sens often do not know how to loument stems properly
Ii, I'sers often consider systcm documentation to be unimportant.
(Users often believe it is too epensnve to properly oumnent systems.
D. Users are often unaware they need to properly do rent systems.

(Firms shoald consider prepanmng a software prototype it the software


A wll be used for a snit.al fun,tin Aile acounts resen able
I can be produced using ep<re available in-hose
C alornte an unstrutuned or semi-structurd task.
D. is available as a canned paxi,c

Mt/is44 yo 4 I/
~ CamScanner
SECTION D [I0 Marks]
Answer the following ques tion ia the Supplementary Answer Shee t
Question One
The following data is extracted from tbe pyroll of SAJO5PAR limited for the month of

] Employee M11n1h unJY,·.u


Number '
to study"' <re fully and answerhe qtuestions that follow.
February 2024. You are required
l'J,\

I
fl1•ur,
mate
(lHs
Grc~,
worked
lk,lu~rlon~ N,·t f'J)'
lay
GHs
GlHs GHs
l
i@swz [g? j?so, [is zooo @ooo '6oo
soi
.0¥ Ti @'too
'
11i'o11 l7~,~1
[%o%
'

Rlf,Ci-1 j II~ "!,J ~IJMI- t,~,.-- 1


·«.t:.i @:. tiii "s:@ ion jsia
[he following riles poem payroll Lat t SAJOsPAR rited
i) Employee number are fie digits in length and range from 10000 to 99999,
ii) The mamum pay rate is GHs200.00, and mmmum is Gs90 00)
ii) Hours wok.ed should never eceed 40
n) Deductions should be between I6r+ ant 5%of gross pry.
Required .
dentif fie error or probable errors in the data set ahone and eplain peifie controls that
would have prevented or detected thee crrot

04twp 4
~ CamScanner

You might also like