Indicate whether each procedure is a preventive or detective control.
a.
authorizing a credit sale
Preventive
Detective
b.
preparing a bank reconciliation
Preventive
Detective
c.
locking the warehouse
Preventive
Detective
d.
preparing a trial balance
Preventive
Detective
e.
counting inventory
Preventive
Detective

What will be an ideal response?


A. preventive; B. detective; C. preventive; D. detective; E. detective

PTS: 1


Use the internal control procedures listed below to complete statements 6 through 12.

 segregation of dutiesspecific authorization
 general authorizationaccounting records
 access controlsindependent verification
 supervision 

Computer Science & Information Technology

You might also like to view...

One way to customize your browser is to install a wireframe.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The compound operator ____ is used to add a string to an existing string.

A. &= B. =& C. && D. ==

Computer Science & Information Technology

When you click Item E in the accompanying figure, which of the following will you not see on the list that opens?

A. Check Box B. Signature Field C. Interactive Text Box D. Radio Button

Computer Science & Information Technology

The AT&T long-distance network did not collapse entirely on January 15, 1990, because

a. the U.S. Secret Service arrested the culprits before they could do any further damage. b. AT&T technicians rapidly fixed the software bug in the routing switches. c. MCI loaned some equipment to AT&T. d. the faulty computers shut themselves off before they could do any further damage. e. not all the routing switches had been converted to the latest software.

Computer Science & Information Technology