Preview

Accounting Security

Satisfactory Essays
Open Document
Open Document
374 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Accounting Security
I recently implemented controls for the flight log of the Moose Wings Cooperative Flight Club and I wanted to take the time to explain what these controls are and how they prevent and detect input errors. The first controls that I implemented pertain to the “Member #” attribute. The first control I implemented on this attribute was a field check. The field check prevents a user from inputting a member number that contains non-numeric characters and can detect if any member number values contain non-numeric characters as well. The second control I implemented on the member number attribute was a range check. The range check allows users to only enter numbers between 0001 and 1368 which represents the number of members in the club and allows users to detect an invalid member number outside this range. The next control that I implemented pertained to the “Flight Date” attribute. I implemented a limit check to prevent a user from inputting a date that was not equal to 09/01/10. If someone previously had entered in another date, the limit check would be able to detect the erroneous date. (Entry #1) For the “Plane Used” attribute, I decided to implement a validity check. The validity check confirms that the plane codes entered in are actually valid codes used by the club. This prevents users from inputting codes that do not exist and detects any inputted codes that do not match any of the actual plane codes. For the “Takeoff Time” and “Landing Time” data fields, I implemented limit checks. I did this by using landing times as the fixed values to be tested against the takeoff times and vice versa. For the takeoff time attribute, I made the control so that the takeoff times had to be earlier than the landing times. Meanwhile, for the landing time attribute, I made the control so that the landing times had to be later than the takeoff times. These controls work together to detect any errors in the takeoff or landing times and prevent the input of flight times that

You May Also Find These Documents Helpful

  • Good Essays

    List the relational operators and logical operators that can be used to form a validation rule.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Good Essays

    After they purchased the business of Airtex Aviation, Frank and Ted implemented a control system across the whole company. I would like to discuss both action controls and personnel controls in the system.…

    • 780 Words
    • 3 Pages
    Good Essays
  • Better Essays

    introduction

    • 5346 Words
    • 41 Pages

    Pratt, R (2000). Flight Control Systems: practical issues in design and implementation. Institution of Electrical Engineers.…

    • 5346 Words
    • 41 Pages
    Better Essays
  • Good Essays

    Acl Chapter 9

    • 517 Words
    • 3 Pages

    The control is considered to be ineffective as the upper error limit frequency is 17.95% exceeds the tolerable misstatement, which is…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Please expand on the control. Add that the processor has the override capability; however, if a number greater than zero was meant to be entered the required override would alert that there is an issue.…

    • 558 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Q1. I classified the following controls based on what I read in appendix 1. For IT General Control, it talks to controls that are set in place so that a client's IT system operates correctly. These controls primarily focus on ensuring that changes to applications are properly authorized, tested, and approved before they are implemented and that only authorized persons and applications have access to data, and then only to perform specifically defined functions. Because of this, the physical access to the server room has been classified as an IT General Control. For Application Control, it talks more to automated controls that apply to the processing of individual transactions. They include such controls as edit checks, validations, calculations, interfaces, and reporting. Because of it being more automated and IT verification, the system requiring a complete and valid order number and only allowing a purchasing manager to approve purchases up to a certain amount fall under here. These are rules that are set in place that will automatically verify what is going on in the IT system before a manual view is needed. The last IT control, IT Dependent Manual Control is more detective in nature, which relies on computer produced information but has a manual oversight on it. Both the overdue receivable account being reviewed by the Credit Manager and bank reconciliations reviewed by the controller fall here as they both rely on information produced by the computer system but still need a manual review before anything is processed. I have assigned these controls to their parent categories in the tables below.…

    • 1966 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The Civil war was possibly the greatest tragedy that this country had ever faced. Years of constant arguing, compromises and cynical ideas about slavery pushed this so called "United Nation" into an atrocious collision between the Northern abolitionists and the Southern proslavery farmers and plantation owners. The nation suffered enormous losses economically and went into a downward spiral. The reconstruction period began with many leaders stepping up to try and fix this crippled country, but it didn't turn out like everyone hoped. Slavery was still the largest issue and the reconstruction halted because of the disagreements the people faced. After many years of working, compromising and passing laws, the task proved itself to be impossible, as the country remained to be separated. The lack of unity was present because most of the amendments, laws and rules passed during reconstruction were created to protect and ensure the rights of African Americans. However the South continued to promote slavery and "putting blacks in their place" until the 1950's.…

    • 1265 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Case Bellagio Questions

    • 1177 Words
    • 5 Pages

    2. Prepare a list of the controls described in the case. What control problems are they designed to address? Are the managers interviewed for the case justified in being proud of their company’s control system? Why or why not?…

    • 1177 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Medical Coding

    • 450 Words
    • 2 Pages

    II. Once a code has been located, the code must be verified in the Tabular List.…

    • 450 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Security Controls

    • 467 Words
    • 2 Pages

    Technical Controls are logical and/or software related controls designed to restrict access to the network infrastructure, components, and data. Controls such as discretionary, mandatory access controls, rule- and role-based access controls, and passwords are all examples of technical controls. Physical controls are used to prevent physical access to the physical components; whereas technical controls are implemented to prevent digital/logical access if physical access is achieved. Some physical hardware can also fall under the technical control category because they contain the software utilized to prevent…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Home Loan

    • 1268 Words
    • 6 Pages

    2) Did Al use the wrong types of controls? Or did he use the right types but fail to implement them properly?…

    • 1268 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Based on the Total Cost of Ownership and Total Benefit of Ownership analysis, developing a customized flight planning and tracking system is recommended. This has high relevance to meet the organizational goals.…

    • 903 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Control Structures are divided into three categories: Sequence, Selection and Repetition. These three control structures when properly applied are very advantageous to both the programmer and the end-user. Each of these control structures are encompassed in the flow chart which is an excellent visual representation for whatever a program is doing within the computer.…

    • 772 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Four Steps for Control

    • 1160 Words
    • 5 Pages

    “Bureaucratic control is the use of rules, standards, regulations, hierarchy, and legitimate authority to guide performance” (Bateman & Snell, 2011, pp. 296). In my opinion, this is exactly the type of control system needed. In order to prevent the practice of misreporting hours from happening again, Dalman and Lei must establish and implement a feedforward control system pertaining to this particular issue. According to our text, Management, every control system has four steps, which include:…

    • 1160 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cprogramming

    • 746 Words
    • 3 Pages

    If the person types 1, then your program should assign a seat in the first class section (seats 1 – 5). If the person types 2, then your program should assign a seat in the economy section (seats 6 – 10). Your program should then print a boarding pass indication the pass indicating the person’s seat number and whether it is in the first class or economy section of the plane.…

    • 746 Words
    • 3 Pages
    Better Essays