Application Control Flashcards

1
Q

Application control

A

Application controls ensure that transactions are processed correctly within individual applications like revenue, purchases, or payroll. These controls can be manual or computerized. Here are some examples:

What It Is: Ensures data entered matches valid criteria.
Example: In a payroll system, department codes must be B, C, or P. If an invalid code is entered, an error report is generated.

What It Is: Ensures data falls within a specified range.
Example: Inventory codes must be between 2000 and 3999. If a code outside this range is entered, an error report is generated.

What It Is: Ensures documents are sequentially numbered.
Example: Invoice numbers should follow a sequence to ensure none are missing.

What It Is: Ensures required fields are not left blank.
Example: A sales order must have a customer name; it cannot be blank.

What It Is: Ensures new transactions are not duplicates.
Example: A system checks if an invoice has already been entered to prevent duplicates.

What It Is: Verifies that the total of input values matches the total of output values.
Example: If 100 transactions are entered, the system checks that all 100 are processed and matches the totals.

What It Is: Validates key numerical codes using an extra digit.
Example: A customer code 23467 gets a check digit 2, making it 234672. The system checks that the total of the digits, when weighted, is a multiple of 11.

Scenario: A company uses application controls to ensure accurate payroll processing.

  1. Existence Check: The payroll system checks that department codes are valid (B, C, or P).
  2. Range Check: Employee ID numbers must be within a specific range.
  3. Sequence Check: Pay slips are numbered sequentially to ensure none are missing.
  4. Completeness Check: Each payroll entry must include an employee ID and hours worked.
  5. Duplicate Check: The system checks for duplicate payroll entries.
  6. Batch Total: The total hours worked entered must match the total hours processed.
  7. Check Digits: Employee ID numbers include a check digit to validate the code.

These controls help ensure that payroll transactions are accurate, authorized, and complete.

Feel free to ask about another topic, and I’ll keep it simple and clear!

You’ve provided a great overview of log files and their importance in system performance analysis and auditing. Logs indeed play a crucial role in tracking and diagnosing system activities. Here are some key points and examples you mentioned:

  1. User Activity Logs:
    • Login details: Records of who logged in, when, and from where.
    • Failed login attempts: Helps identify potential security threats.
  2. Data Access Logs:
    • File access and amendments: Tracks who accessed or modified data.
  3. Program Change Logs:
    • Changes to programs: Details on what changes were made, when, and by whom.
  4. Physical Access Logs:
    • Building entry/exit: Monitors when employees enter or leave the premises.
  5. Specialized Logs:
    • Black box flight records: Critical for aviation safety.
    • CPU and broadband speed: Monitors system performance metrics.
    • Web access logs: Tracks which web pages users visit.
    • Cyber intrusion attempts: Identifies and helps mitigate security breaches.

These logs are invaluable for maintaining system integrity, security, and performance. They provide a detailed audit trail that can be used for troubleshooting, compliance, and improving overall system efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly