CHAPTER20 THE COMPUTER ENVIRONMENT I Review Questions In a batch processing system, documents evidencing transactions and events are gathered and processed by groups The day’s sales invoices, for example, may be converted to machine-readable form and processed the next morning In a real time system, transactions are input into the system and processed as they occur A branch sale, for example, may be input into the system via a terminal at a remote location The computer checks for product availability, customer authenticity, customer credit approval, and shipping terms; and if all conditions are met, the sale is processed immediately and the sales invoice and shipping order are produced In a real-time system, much of the data are stored internally and documentation is often not as extensive as in a batch system Retrieval and audit of transaction data, therefore, are often more difficult in a real-time system Also, controls are more likely to be programmed in real-time systems, and for this reason, are more difficult to test Inasmuch as computer processing requires increased dependence on the computer systems and software for the accuracy and completeness of processing, documentation assumes major significance relative to effective control Documentation facilitates reviewing and updating systems and programs as the environment changes; and it also minimizes the probability of unauthorized system and program changes which could result in loss of control and decreased reliability of financial data In a batch system, files are stored off-line for the most part, and access control assumes the form of safeguarding the programs, transaction files, and master files by assigning responsibility for the files to a librarian and instituting a formal checkout system Only those persons authorized to process transactions (computer operators) are permitted access to transaction and master files; and programmers are permitted access to programs only for testing and “debugging” purposes In an on-line, real-time system, transactions and master files are stored internally, often in a system of integrated data bases Access control in this type of data environment assumes the form of controlling access to data bases and fixing of responsibility for the data base components Assigning a password to an individual who is responsible for the data base component accessible by that password, canceling passwords of former employees, and 20-2 Solutions Manual - Assurance Principles, Professional Ethics… frequent changing of existing employees’ passwords are examples of access controls in a real-time system Recording forms and transaction logs assure consistency and completeness of data inputs The form or log should include codes describing such transaction components as employee number, customer number, vendor number, department number, stock number, purchased part number, or job number The form should also provide for quantities, prices, dates, and usually a short narrative description of products, parts, materials, or services for purchase and sales transactions A transaction file is the batch of entered data that has been converted into machine-readable form A transaction file may contain payroll information for a specific period of time It is similar to a journal in a manually prepared system A master file contains updated information through a particular time period It is similar to a ledger in a manual system Small businesses have found that microcomputers or personal computer systems are cost effective for processing accounting data In small businesses, one would expect to find microcomputers (or personal computers) using commercially available software In the computerized system, documents to support a transaction may not be maintained in readable form, requiring associated performance of controls However, the computerized system will enable processing of transactions to be done more consistently, duties to be consolidated, and reports to be generated more easily II Multiple Choice Questions d c a a c c c b 10 11 12 c c d c 13 14 15 16 c d a a 17 18 19 20 c a b a III Comprehensive Cases An auditor should have the following concerns about the Box system: • Does the system have any flaws or incompatibilities? (No one appears to have tested the software or found out about others’ satisfaction with it.) • The computer sits out in the open (Anyone could have access to and damage the hardware.) • Anyone could come up with the password by guessing • The backup disks are not stored in a safe place The Computer Environment • 21-3 Was the conversion appropriately executed, with no data lost or added? ...20-2 Solutions Manual - Assurance Principles, Professional Ethics… frequent changing of existing employees’... is similar to a journal in a manually prepared system A master file contains updated information through a particular time period It is similar to a ledger in a manual system Small businesses... (Anyone could have access to and damage the hardware.) • Anyone could come up with the password by guessing • The backup disks are not stored in a safe place The Computer Environment • 21-3 Was