Question

In the payroll process, the transactions for the pay period are gathered and sorted by employee...

In the payroll process, the transactions for the pay period are gathered and sorted by employee ID prior to the prepartion of checks. The performance of the gathering and sorting of transaction steps indicates a certain kind of computer processing system. what type of processing is this? and List all the reasons for processing payroll that way, as opposed to the altermative form of processing. what is the name of the alternative form of computer processing?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

A Transaction Processing System is software that keeps track of transactions by processing the data in an online recording system. There are several ways in which a computer, under the influences of an operating system is designed to process data.

Examples of processing modes are:

  1. online processing
  2. real time processing
  3. distributed processing
  4. Time sharing
  5. Batch processing
  6. multiprocessing
  7. multitasking
  8. interactive processing

Out of these the two popular methods are Real time processing and Batch processing.

1. Batch processing

Data is accumulated as a group (batch) over a specified period of time e.g. daily, weekly or monthly. The batch is then processed at once. This method, although designed to be efficient for breaking down bulky series of programs, has a drawback as there is a delay in the transaction result.

For example in payroll processing system, employees details concerning the number of hours worked, rate of pay, and other details are collected for a period of time say, one month. These details are then used to process the payment for the duration worked. Most printing systems use the batch processing to print documents.

2. Real-time Processing

Real-time processing carries out its transactions exclusively; this method ensures a swift reply on the condition of the transaction result. This means as and when transaction occurs. It is an ideal technique for dealing with singular transactions.

Conclusion:

In the given question in the payroll process, the transactions for the pay period are gathered and sorted by employee ID prior to the preparation of checks. The performance of the gathering and sorting of transaction steps indicates a certain kind of computer processing system that is batch processing. The transactions for the pay period are gathered and sorted by employee ID prior because the two employees may have same name but employee ID will be different and then they are processed using batch processing.

List all the reasons for processing payroll that way, as opposed to the alternative form of processing.

  • The processing of a group of transactions uniquely differentiates the batch processing from the real-time processing that only runs exclusive transactions.
  • Batch processing is extremely valuable for reducing costs for large organizations that deal with high data traffic. All of this is very different from real-time processing that is efficient in less complex situations.
  • In payroll system as the transaction are similar in type and are in volume that is why batch processing works effectively over here rather the real time.
  • The real-time processing offers timely results on each processed transaction that makes it more applicable for smaller enterprises, unlike the batch processing that is time-consuming.
  • In batch processing, user interaction is not required as soon as the transaction begins, however, the real-time processing needs user interface to process each transaction completely.
Add a comment
Know the answer?
Add Answer to:
In the payroll process, the transactions for the pay period are gathered and sorted by employee...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • You are the Auditor-in-Charge assigned to conduct an assurance engagement of the BFF Corp’s payroll process.  This...

    You are the Auditor-in-Charge assigned to conduct an assurance engagement of the BFF Corp’s payroll process.  This process hasn’t been audited for three years. There have been no significant changes since the previous audit:  there were no system changes, no reorganization of personnel, and no substantive procedural changes.  However, during the latest audit, internal audit identified several observations, some of which were considered significant.  The significant observations were: Information pertaining to employees leaving the company was not communicated to the IT department, resulting in...

  • 13.7 please 13.7 Table 13.3 (page 602) identifies three risks typically encountered when updating the general ledger Required (a) Analyse the degree of exposure to each of these risks for...

    13.7 please 13.7 Table 13.3 (page 602) identifies three risks typically encountered when updating the general ledger Required (a) Analyse the degree of exposure to each of these risks for the update the general ledger process at AB Hi-Fi. update general ledger process at AB Hi-Fi. the update the general ledger process is, and how comprehensive the current internal (b) Determine how many of the common controls described in table 13.3 are present in the (c) Prepare a short report...

  • You are the internal audit senior responsible for conducting an assurance engagement of the XYZ Company...

    You are the internal audit senior responsible for conducting an assurance engagement of the XYZ Company payroll process. This process has not been audited for three years and, as such, is due in the normal audit cycle. There have been no significant changes since the previous audit, that is, there were no system changes, no reorganization of personnel, and no substantive procedural changes. However, during the last assurance engagement, the internal audit function identified several observations, some of which were...

  • You are the internal audit senior responsible for conducting an assurance engagement of the XYZ Company...

    You are the internal audit senior responsible for conducting an assurance engagement of the XYZ Company payroll process. This process has not been audited for three years and, as such, is due in the normal audit cycle. There have been no significant changes since the previous audit, that is, there were no system changes, no reorganization of personnel, and no substantive procedural changes. However, during the last assurance engagement, the internal audit function identified several observations, some of which were...

  • Give at least two points that a working accountant will find useful (using complete sentences). THE...

    Give at least two points that a working accountant will find useful (using complete sentences). THE BOTTOM Changes to Revenue Recoqnition Requirements By Quinn R. Martin, Matthew J. Frazier and Michael J. Devereux Revenue is considered one of the most important financial statement measures. It is used to assess a company's past financial performance, fut ure growth potential and finan- cial well-being. This makes revenue recognition one of the accounting topics most scrutinized by business owners. The Accounting Standards Codification...

  • A test specification provides designers with what needs to be known in order to perform a...

    A test specification provides designers with what needs to be known in order to perform a specific test, and to validate and verify the requirement to be tested. The test script is divided into the test script, which is the generic condition to be tested, and one or more test cases within the test script. Provide a test script and test case for at least 3 of your requirements identified in your requirements specification. Provide the following format for an...

  • internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3...

    internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3 carefully. Then write concise answers to the following questions regarding the internal control system of Duarf, Inc. Clearly label your responses with proper headings and subheadings. Be very specific and precise. Answers that appear to be beating around the bush will not get any credit. 1. What are the controls in place that under normal conditions should function well to prevent embezzlements or frauds?...

  • Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee

    1. Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee? A. Management's failure to renegotiate unfavorable long-term purchase commitments.B. Recurring operating losses that may indicate going concern problems.C. Evidence of a lack of objectivity by those responsible for accounting decisions.D. Management's current plans to reduce its ownership equity in the entity. 2. After obtaining an understanding of internal control and arriving at a preliminary assessed level...

  • LO 10-6, 10 10-36 Based on an assessment of audit risk, the auditors are concerned with...

    LO 10-6, 10 10-36 Based on an assessment of audit risk, the auditors are concerned with the following two risks: 1. The risk that that the client might be making duplicate payments to vendors. 2. The risk that the client's accounting clerk might be making unauthorized payments to himself. a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT