
Objectives of application controls and the techniques within each to ensure maintenance of
maximum feasible levels of control
1. Input controls
These controls ensure that there has been a complete and accurate conversion of data
from the source document to the input media. The checking needs to detect missing data
or incorrect digits or nay type of deviation in the entry.
Input techniques include:
i) Transaction codes: - In any organisation, data represents people, events, assets
objects etc. and so codes can be allocated to each transaction document, field record
or file.
ii) Form design: - When a source document is required for the collection of data, this
form can be designed to force more legible entries by the use of individual blocks for
each character to be recorded.
iii) Verification: - Source documents prepared by the clerk can be verified or proof-read
by another to improve accuracy. In a data conversion operation such as keypunching
or keyboard to storage, a second operator can verify each document.
iv) Control totals: - To minimise loss of data when it is being transported from one
location to another or to check on the results of different processes control totals are
prepared for specific batches of data
v) Check digits: - This control technique ensures maintenance of feasible levels of
control through ensuring: -
a) That only data essential for the purpose of the system should be collected.
b) Only persons specifically authorised to have access to the data should do so and
their use of the data must conform to that of the agreed system.
c) Strong security measures are applied to minimise the risks that the data is
accidentally or deliberately distorted or revealed.
2. Processing controls
These are procedures incorporated into the program to ensure that there is complete and
accurate processing of the data that has been entered into the system.
Processing control techniques include:
i) The edit run: - This consists of a series of checks e.g. programmed checks which
would include records counts control totals, hash totals, numerical fields, alphabetic
data in alphabetic fields.
ii) Limit checks and overflow tests: - These perform arithmetical accuracy.
iii) Other checks to ensure that correct files are being processed by reference to external
labels, internal labels and volume labels.
Feasible levels of control are achieved through:
i) Ensuring that only beneficial systems are developed.
ii) Ensuring that suitable operational and administrative controls are built into systems
design.
3. Out put controls
These are controls established as final checks on the accuracy and completeness of the
processed information. The following control procedures are related to output controls.
i) An initial screening should be conducted to detect obvious errors.
ii) Output should be immediately rooted to a controlled area and distributed by any
authorised persons to authorised person.
iii) Output control totals should be reconciled to input control totals to ensure that no data
have been changed, lost or added during processing or transmission, e.g. the number of
input records divided for processing should equal the number of records processed.
iv) Any highly sensitive output that should not be accessible by computer centre should be
generated via an output device in a secure location away from the computer room.
v) Control errors and exception reporting would also be art of output controls. These
controls should specify how exceptions and errors should be handled.
The objectives of these controls to ensure feasible control levels are:
a) To ensure that output is guarded against distribution to the wrong persons or
unauthorised access thus data security is improved.
b) To safeguard data privacy whole disclosure may be costly to the organisation, for
example, business secrets.
gregorymasila answered the question on November 29, 2017 at 09:25
-
Name four types of accounting information systems which DSS may address
(Solved)
Name four types of accounting information systems which DSS may address.
Date posted:
November 27, 2017
.
Answers (1)
-
During output design, the designer‘s ideas are put to test. Some ideas are essential while others are dictated by circumstances. Required:(i) State the general principles applied...
(Solved)
During output design, the designer's ideas are put to test. Some ideas are essential while others are dictated by circumstances.
Required:
(i) State the general principles applied in output design.
(ii) Outline the ?Steps taken in designing an output.
Date posted:
November 27, 2017
.
Answers (1)
-
Discuss the changes that would take place if the expert system was implemented in terms of position, status; tasks and responsibilities of engineers at the...
(Solved)
Discuss the changes that would take place if the expert system was implemented in
terms of position, status; tasks and responsibilities of engineers at the company‘s
repair centre and in the field.
Date posted:
November 27, 2017
.
Answers (1)
-
The term computer describes a device made up of a combination of electronic and electro-mechanical components. By itself, a computer has no intelligence and is...
(Solved)
The term computer describes a device made up of a combination of electronic and electro-mechanical components. By itself, a computer has no intelligence and is referred to as hardware which means simply the physical equipment. Tile hardware cannot be used, until it is connected to other elements,
all of which constitute the six parts-of a computer-based information system.
Required:
Describe the six components of a computer-based information system.
Date posted:
November 27, 2017
.
Answers (1)
-
In a file set up or development process, the file‘s structure is defined and its contents identified. The four characteristics considered in defining the structure...
(Solved)
In a file set up or development process, the file‘s structure is defined and its contents identified. The four characteristics considered in defining the structure and identifying the contents in a file set up or development process are; volatility, activity, size and growth.
Required:
(i) Using the example of a payroll file, explain the terms; volatility, activity, size and growth.
(ii) Explain how each of the characteristics in (i) above may influence decisions to do with a file structure design and in planning whether the mode of access should be sequential, indexed sequential or random.
Date posted:
November 27, 2017
.
Answers (1)
-
Witu Ltd., a motor vehicle spare parts dealer, has its head office in Nairobi. The company has eight branches in Kenya, two in Uganda and...
(Solved)
Witu Ltd., a motor vehicle spare parts dealer, has its head office in Nairobi. The company has eight branches in Kenya, two in Uganda and one in Rwanda. To enable the branches share data and other resources, the company has a large database that is replicated in the computers located in the branches. These computers are interconnected through data communication networks. The database is centrally administered from Nairobi but the branches have flexibility and may customize the database to meet their needs.
(i)State and briefly explain advantages and disadvantages of the database used by
Witu Ltd.
(ii)Explain the business reasons that may have encouraged Witu Ltd. to use this
database.
Date posted:
November 27, 2017
.
Answers (1)
-
Explain how the following systems development tools or techniques can assist a systems developer to reduce an application‘s development period and costs.(i) Fourth generation languages (4GLs)....
(Solved)
Explain how the following systems development tools or techniques can assist a
systems developer to reduce an application‘s development period and costs.
(i) Fourth generation languages (4GLs).
(ii) Prototyping
(iii) Computer aided software engineering (CASE) tools.
Date posted:
November 27, 2017
.
Answers (1)
-
List four scanning devices and explain how a scanning device works
(Solved)
List four scanning devices and explain how a scanning device works. (8 marks)
Date posted:
November 27, 2017
.
Answers (1)
-
Outline the functions of Read Only Memory (ROM).
(Solved)
Outline the functions of Read Only Memory (ROM).
Date posted:
November 25, 2017
.
Answers (1)
-
Certain financial problems such as simplified bread-even analysis models for predicting profits can be computerized.P = (Sp – Vc) U – F cWhere:P = ProfitsSp...
(Solved)
Certain financial problems such as simplified bread-even analysis models for predicting
profits can be computerized.
P = (Sp – Vc) U – F c
Where:
P = Profits
Sp = Selling price per unit
Vc = Variable cost per unit
U = Number of units of sales
Fc = Fixed cost
Required:
Using the above model, describe any three decisions that management can make form the
break-even analysis model.
Why do organizations automate reasoning or decision-making tasks which human beings are
naturally better able to perform than computers?
Date posted:
November 24, 2017
.
Answers (1)
-
Differentiate between deterministic and random systems giving examples in each case
(Solved)
Differentiate between deterministic and random systems giving examples in each case.
Date posted:
November 24, 2017
.
Answers (1)
-
Name the basic requirements for internet connectivity.
(Solved)
Name the basic requirements for internet connectivity.
Date posted:
November 24, 2017
.
Answers (1)
-
Explain the five stages of a transaction processing cycle
(Solved)
Explain the five stages of a transaction processing cycle.
Date posted:
November 24, 2017
.
Answers (1)
-
What are the limitations of a graphical user interface?
(Solved)
What are the limitations of a graphical user interface?
Date posted:
November 24, 2017
.
Answers (1)
-
Explain the advantages to an organization in having users involved in developing an information systems application.
(Solved)
Explain the advantages to an organization in having users involved in developing an information systems application.
Date posted:
November 24, 2017
.
Answers (1)
-
Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology
(Solved)
Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology.
Date posted:
November 24, 2017
.
Answers (1)
-
Examine two disadvantages of using direct access storage devices
(Solved)
Examine two disadvantages of using direct access storage devices.
Date posted:
November 23, 2017
.
Answers (1)
-
Differentiate between the following terms:(i.) Hardware and software;(ii.) Application software and system software;(iii.) Bit and byte; (iv.) RAM and ROM;...
(Solved)
Differentiate between the following terms:
(i.) Hardware and software;
(ii.) Application software and system software;
(iii.) Bit and byte;
(iv.) RAM and ROM;
(v.) Data and information.
Date posted:
November 23, 2017
.
Answers (1)
-
List four problems encountered when using standard files for data processing systems.
(Solved)
List four problems encountered when using standard files for data processing systems.
Date posted:
November 22, 2017
.
Answers (1)
-
Outline factors to be considered while selecting data transmission system.
(Solved)
Outline factors to be considered while selecting data transmission system.
Date posted:
November 21, 2017
.
Answers (1)