ttcyftxycf (108)-14
pdf
keyboard_arrow_up
School
University of Florida *
*We aren’t endorsed by this school
Course
206
Subject
Finance
Date
Nov 24, 2024
Type
Pages
1
Uploaded by ChiefOpossum3761
A. Outsourcing B. Verification C. Matching D. Hedging -
✔✔
A
Some treasury management systems are capable of initiating investment purchases and loan
drawdowns automatically. The automating of these transactions is related to which of the following
treasury management functions?
A. Payment management
B. Liquidity management
C. International trade management D. Capital budget management -
✔✔
B
When using the internet to access auction markets, companies may use certificate authorities to reduce
their exposure to which of the following types of risk?
A. Credit
B. Valuation
C. Counter party
D. Foreign exchange -
✔✔
C
A large, nation-wide, retailer of plumbing fixtures is considering implementing ACH technology to
improve its accounts receivable processing. Which of the following pre- authorized ACH transactions can
the company use for this application?
A. ARC (Accounts Receivable Conversion)
B. CIE (Customer-Initiated Entry) C. TEL (Telephone-Initiated Entry) D. WEB (Internet-Initiated Entry) -
✔✔
B
A treasurer has been advised that his privately held company has just lost its largest customer, which
will have a significant impact on earnings. The treasurer applies an aggressive working capital strategy.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Related Questions
Using the following table as a guide, describe for each function (see Figure 11.1):
A risk (an event or action that will cause the organization to fail to meet its goals/objectives).
A control/process or use of technology that will address the risk.
Function
Risks
Controls and Technology
Marketing
Finance
Billing
AR (debit)
Sales (credit)
Collections
Cash (debit)
AR (credit)
arrow_forward
Which of the following assets require the strongest of internal controls?
Group of answer choices
inventory
credit cards
computer equipment
cash
arrow_forward
Business Valuation Strategies vary by industry and are constantly changing. Use the keywords business valuation method to find an article in the CSU Global Library database to discuss. Summarize the valuation method's calculation and discuss how it relates to fraud investigations. Be sure to identify the type of industry the valuation can be used for.
arrow_forward
Which one of the following statements is true of E-commerce?
a.It involves the exchange of an electronic item for cash.
b.Banks are reducing their use of e-commerce platforms because of cyber attacks.
c.Includes trading and transferring of funds by using computer networks.
d.E-commerce is not as secure as traditional delivery channels.
arrow_forward
Match definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerb. ___________________occurs when management prepares misleading financial statements
arrow_forward
Please do not give solution in image formate thanku.
arrow_forward
ou are an investment banker performing due diligence on a potential acquisition for a financial buyer. For this particular transaction, the ability of the acquisition target to continue operations in severe weather is critical for profitability and the transaction’s success. As part of your due diligence you would most likely review which of the following reports?
1. SOC 1
2. PCI Compliance
3. SOC 2
4. SOC for cybersecurity
arrow_forward
You have been assigned to review the payment system of an enterprise. The finance director suspects that some duplicate payments may have been made. List five control procedures which you would expect to find.
arrow_forward
Which of the following is true about M-Pesa? a. virtual cash can be swapped and transferred between mobile users with a simple text message and a system of codes b. a network which provides financial and policy advocacy suppot to MFIs c. a for profit insurance company that provides simplified single risk products to microfinance customers d. a zero interest peer to peer lending platform
arrow_forward
Match definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerg. A/An _____________is an electronic barrier that prevents unauthorized access to an organization’s computer network
arrow_forward
Which of the following assets require the strongest of internal controls?
Group of answer choices
1.credit cards
2.computer equipment
3.inventory
4.cash
arrow_forward
Identify an investment bank of your choice and explain (a) the type of bank it is and (b) the various conflicts of interest that its activities may involve. Include in your answer examples of deals to illustrate the conflicts you identify.
arrow_forward
Business Valuation Strategies vary by industry and are constantly changing. Use an article to summarize the valuation method's calculation and discuss how it relates to fraud investigations. Be sure to identify the type of industry the valuation can be used for.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Related Questions
- Using the following table as a guide, describe for each function (see Figure 11.1): A risk (an event or action that will cause the organization to fail to meet its goals/objectives). A control/process or use of technology that will address the risk. Function Risks Controls and Technology Marketing Finance Billing AR (debit) Sales (credit) Collections Cash (debit) AR (credit)arrow_forwardWhich of the following assets require the strongest of internal controls? Group of answer choices inventory credit cards computer equipment casharrow_forwardBusiness Valuation Strategies vary by industry and are constantly changing. Use the keywords business valuation method to find an article in the CSU Global Library database to discuss. Summarize the valuation method's calculation and discuss how it relates to fraud investigations. Be sure to identify the type of industry the valuation can be used for.arrow_forward
- Which one of the following statements is true of E-commerce? a.It involves the exchange of an electronic item for cash. b.Banks are reducing their use of e-commerce platforms because of cyber attacks. c.Includes trading and transferring of funds by using computer networks. d.E-commerce is not as secure as traditional delivery channels.arrow_forwardMatch definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerb. ___________________occurs when management prepares misleading financial statementsarrow_forwardPlease do not give solution in image formate thanku.arrow_forward
- ou are an investment banker performing due diligence on a potential acquisition for a financial buyer. For this particular transaction, the ability of the acquisition target to continue operations in severe weather is critical for profitability and the transaction’s success. As part of your due diligence you would most likely review which of the following reports? 1. SOC 1 2. PCI Compliance 3. SOC 2 4. SOC for cybersecurityarrow_forwardYou have been assigned to review the payment system of an enterprise. The finance director suspects that some duplicate payments may have been made. List five control procedures which you would expect to find.arrow_forwardWhich of the following is true about M-Pesa? a. virtual cash can be swapped and transferred between mobile users with a simple text message and a system of codes b. a network which provides financial and policy advocacy suppot to MFIs c. a for profit insurance company that provides simplified single risk products to microfinance customers d. a zero interest peer to peer lending platformarrow_forward
- Match definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerg. A/An _____________is an electronic barrier that prevents unauthorized access to an organization’s computer networkarrow_forwardWhich of the following assets require the strongest of internal controls? Group of answer choices 1.credit cards 2.computer equipment 3.inventory 4.casharrow_forwardIdentify an investment bank of your choice and explain (a) the type of bank it is and (b) the various conflicts of interest that its activities may involve. Include in your answer examples of deals to illustrate the conflicts you identify.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,