GB 518 Unit 2 discussion
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
GB518
Subject
Accounting
Date
Nov 24, 2024
Type
docx
Pages
1
Uploaded by DrKomodoDragonMaster40
GB 518 Unit 2 discussion
I chose Option 1:
A. The stakeholders in this situation would be the internal and
external stakeholders for the company IBT Company.
B. The ethical issues involved are the fact that she is forcing
the debits and credits into balance by adding the amount of
difference to the equipment account. She is currently falsifying
financial documents which can have serious repercussions for
her and the company.
C. The alternatives she could have done would have been to
reach out to her higher ups and explained to them what the
issue was and see if they could get an extension of a couple
days or some extra hands to research what the issue is to
figure out how to fix it that way Vanessa can stay away from
doing something unethical or illegal in order to still meet the
deadline. There are many other options she could have chosen
before falsifying financial documents and forcing the debits
and credits to work.
References:
Kimmel, P. D. (2021).
Financial accounting : tools for business
decision making
. John Wiley & Sons, Inc.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Related Questions
Tutor provide answer for this
arrow_forward
Please Solve In 20mins
arrow_forward
G
Multiple Choice
1. Lo 8.1 Which of the following would a fraudster perceive as a pressure?
A. lack of management oversight
B. everyone does it
C.
living beyond one's means
D. lack of an internal audit function
O
(3.51 MB)
2.10 8.2 Internal control is said to be the backbone of all businesses. Which of the
description of internal controls?
A. Internal controls ensure that the financial statements published are correct.
B.
The only role of internal controls is to protect customer data.
Internal controls and company policies are important to protect and safeguar
company data and are designed to protect the company from fraud.
D. Internal controls are designed to keep emplovees from committina fraud agai
C.
Page
31 1 2 -
arrow_forward
I need help with question solution
arrow_forward
?!
arrow_forward
Question 3
Which of the following IT events would create the most serious risk to financial reporting?
A.
Employees writing down passwords on sticky notes
B.
Using software on the company network that has been downloaded from a warez website
C.
Finding an employee running a personal business on company computers
D.
Unauthorized access to the corporate network
arrow_forward
Please answer all 3 subparts
Question 1
(i) Which of the following is not an example of internal control risk?A. Risks of errors or fraud in accounting systems and accounting and finance activities.B. Risks that important laws and regulations will not be complied with properly.C. Risks that arise in the business environment and markets in which the company operatesD. The risk of losses resulting from inadequate or failed internal processes, people and systems or external events.
(ii) Which of the following is NOT a statutory duty of a director?A. Duty to disclose any money received in connection of a transfer of company property.B. Duty to exercise due diligence in their work C. Duty to contribute an appropriate sum of money to the board on joining the companyD. Duty to keep proper accounting records and make such records available for inspection.
(iii) Which of the following would be the best way for a shareholder (not being an institutional shareholder) to become involved in the…
arrow_forward
Required answer question 4 and 5
arrow_forward
DQ 1: Electronic Payment Systems:
What are the differences, and the benefits and the risks, of payment systems that are designed for cyberspace? Which requirements of negotiability seem unnecessary for an online transaction? Is there any part of the HDC (holder in due course) concept that would need to be changed to adapt it to an electronic payment system?
DQ2: Electronic Transactions:
Should only banks and regulated financial institutions be allowed to issue ATM cards? Why or why not? How else might the government regulate digital funds to reduce the potential for cyber laundering?
Is private electronic "cash" legal? To what extent should private authorities be liable when a fraud is perpetrated in the context of an electronic transfer of funds via the Internet? Is the current law sufficient in this regard? If not, what changes need to be made?
DQ3: Reorganization:
What can a small business do to prepare for a reorganization or business restructering?
DQ4: The…
arrow_forward
Answer
arrow_forward
Help me account tutor
arrow_forward
A-3
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619455/9781337619455_smallCoverImage.gif)
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Related Questions
- Tutor provide answer for thisarrow_forwardPlease Solve In 20minsarrow_forwardG Multiple Choice 1. Lo 8.1 Which of the following would a fraudster perceive as a pressure? A. lack of management oversight B. everyone does it C. living beyond one's means D. lack of an internal audit function O (3.51 MB) 2.10 8.2 Internal control is said to be the backbone of all businesses. Which of the description of internal controls? A. Internal controls ensure that the financial statements published are correct. B. The only role of internal controls is to protect customer data. Internal controls and company policies are important to protect and safeguar company data and are designed to protect the company from fraud. D. Internal controls are designed to keep emplovees from committina fraud agai C. Page 31 1 2 -arrow_forward
- I need help with question solutionarrow_forward?!arrow_forwardQuestion 3 Which of the following IT events would create the most serious risk to financial reporting? A. Employees writing down passwords on sticky notes B. Using software on the company network that has been downloaded from a warez website C. Finding an employee running a personal business on company computers D. Unauthorized access to the corporate networkarrow_forward
- Please answer all 3 subparts Question 1 (i) Which of the following is not an example of internal control risk?A. Risks of errors or fraud in accounting systems and accounting and finance activities.B. Risks that important laws and regulations will not be complied with properly.C. Risks that arise in the business environment and markets in which the company operatesD. The risk of losses resulting from inadequate or failed internal processes, people and systems or external events. (ii) Which of the following is NOT a statutory duty of a director?A. Duty to disclose any money received in connection of a transfer of company property.B. Duty to exercise due diligence in their work C. Duty to contribute an appropriate sum of money to the board on joining the companyD. Duty to keep proper accounting records and make such records available for inspection. (iii) Which of the following would be the best way for a shareholder (not being an institutional shareholder) to become involved in the…arrow_forwardRequired answer question 4 and 5arrow_forwardDQ 1: Electronic Payment Systems: What are the differences, and the benefits and the risks, of payment systems that are designed for cyberspace? Which requirements of negotiability seem unnecessary for an online transaction? Is there any part of the HDC (holder in due course) concept that would need to be changed to adapt it to an electronic payment system? DQ2: Electronic Transactions: Should only banks and regulated financial institutions be allowed to issue ATM cards? Why or why not? How else might the government regulate digital funds to reduce the potential for cyber laundering? Is private electronic "cash" legal? To what extent should private authorities be liable when a fraud is perpetrated in the context of an electronic transfer of funds via the Internet? Is the current law sufficient in this regard? If not, what changes need to be made? DQ3: Reorganization: What can a small business do to prepare for a reorganization or business restructering? DQ4: The…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619455/9781337619455_smallCoverImage.gif)
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning