EBK PRINCIPLES OF AUDITING & OTHER ASSU
21st Edition
ISBN: 9781260299434
Author: WHITTINGTON
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Question
Chapter 11, Problem 36COQ
To determine
Identify the option most likely to be an example of fraudulent financial reporting relating to sales.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A serious exposure in the revenue cycle is customer dissatisfaction. What is the related threat and applicable control procedure that address this exposure?
A. failure to bill; separation of billing and shipping functions
B. failure to bill; bar-codes and RFID technology
C. billing errors; reconciliation of shipping documents to sales order
D. theft of cash; using ETFs
Which of the following fraudulent activities most likely could be perpetrated due to the lack of effective internal controls in the revenue cycle?
a. Fictitious transactions may be recorded that cause an understatement of revenues and overstatement of receivables
b. Claim received from customers for goods returned may be intentionally recorded in other customer’s accounts.
c. Authorization of credit memos by personnel who receive cash may permit the misappropriation of cash
d. The failure to prepare shipping documents may cause an overstatement of inventory balances
Fraudulent reporting by management could include a. Fictitious revenues from a fake customer. b. Improper asset valuation. c. Mismatching revenues and expenses. d. All of the above.
Chapter 11 Solutions
EBK PRINCIPLES OF AUDITING & OTHER ASSU
Ch. 11 - Explain the difference between a customers order...Ch. 11 - Prob. 2RQCh. 11 - Prob. 3RQCh. 11 - State briefly the objective of the billing...Ch. 11 - Prob. 5RQCh. 11 - Prob. 6RQCh. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - Prob. 10RQ
Ch. 11 - Prob. 11RQCh. 11 - Prob. 12RQCh. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - Prob. 15RQCh. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Prob. 18RQCh. 11 - Prob. 19RQCh. 11 - Prob. 20RQCh. 11 - Prob. 21RQCh. 11 - Prob. 22RQCh. 11 - Give an example of a type of receivable...Ch. 11 - Prob. 24RQCh. 11 - Prob. 25QRACh. 11 - Prob. 26QRACh. 11 - Prob. 27QRACh. 11 - Prob. 28QRACh. 11 - Prob. 29QRACh. 11 - Prob. 30QRACh. 11 - Prob. 31QRACh. 11 - Prob. 32QRACh. 11 - Prob. 33QRACh. 11 - Prob. 34QRACh. 11 - Prob. 35QRACh. 11 - Prob. 36AOQCh. 11 - Which of the following would provide the most...Ch. 11 - Prob. 36COQCh. 11 - Prob. 36DOQCh. 11 - Prob. 36EOQCh. 11 - Under SEC rules, which of the following is not...Ch. 11 - Prob. 36GOQCh. 11 - Prob. 36HOQCh. 11 - Prob. 36IOQCh. 11 - Prob. 36JOQCh. 11 - Prob. 36KOQCh. 11 - Prob. 36LOQCh. 11 - Prob. 37OQCh. 11 - Prob. 38OQCh. 11 - An auditors working papers include the following...Ch. 11 - Prob. 40OQCh. 11 - Prob. 41OQCh. 11 - Prob. 42OQCh. 11 - Prob. 43OQCh. 11 - Prob. 44PCh. 11 - Prob. 45PCh. 11 - Prob. 46PCh. 11 - Prob. 47PCh. 11 - The July 31, 20X0, general ledger trial balance of...Ch. 11 - Prob. 49ITCCh. 11 - Prob. 50ECCh. 11 - Prob. 51EC
Knowledge Booster
Similar questions
- 1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardThe following situations represent errors and frauds that could occur in financial statements.Required:State how the ratio in question would compare (higher, equal, or lower) to what the ratio should have been had the error or fraud not occurred.a. The company recorded fictitious sales with credits to sales revenue accounts and debits to accounts receivable. Inventory was reduced, and cost of goods sold was increased for the profitable “sales.” Is the current ratio higher than, equal to, or lower than what it should have been?b. The company recorded cash disbursements by paying trade accounts payable but held the checks past the year-end date, meaning that the “disbursements” should not have been shown as credits to cash and debits to accounts payable. Is the current ratio higher than, equal to, or lower than what it should have been? Consider cases in which the currentratio before the improper “disbursement” recording was (1) higher than 1:1, (2) equal to 1:1, and (3) lower than…arrow_forwardWhich of the following evidence provides the least assurance of reliability? A. Accounts receivable B. Sales invoice C. Vendor invoice D. Bank statementsarrow_forward
- 1. A threat to the expenditure cycle that involves an employee creating and approving fictitious purchase orders is known as: A. Inventory theft B. Unauthorized access C. Check tampering D. Billing schemes 2. Purchase orders are used to initiate a payment in the disbursement cycle. True or False 3.Vendor audits are conducted to address the threat of unauthorized access in the disbursement cycle. True or falsearrow_forwardWhat is a good response to... 1. Embezzlement can result from: skimming cash, manipulating refunds, or creating fake transactions. It is possible that the coworker could have inflated expenses, recorded false refunds, or pocketed cash from sales without recording them in the system. Another possibility is underreporting sales or voiding transactions and then taking the difference. 2. Using the store’s accounting software, there is the option to analyze transaction logs for unusual activity i.e. high numbers of refunds, voided transactions, or manual adjustments. Cross-checking daily sales reports, register totals, and bank deposits are also another way to identify missing funds. 3. Finding should be reported to the supervisor/store manager and/or loss prevention department. 4. No, I would not confront my coworker as confronting them could jeopardize the investigation and raise tensions with that individual. Instead, I would just relay my finding to management and document when that…arrow_forwardA serious exposure for an organization that is connnected with the revenue cycle is the loss of assets. What is the related threat and applicable contrtol procudure associated with this exposure? A. receiving unordered goods; compare to valid order B. billing errors; reconciliation of shipping documents to sales order C. shipping errors, data entry controls D. theft of inventory; documentation of all internal transfers of inventoryarrow_forward
- 1. How may an employee embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of functions and authorization controls were not in place? Please asnwer this. thank youuuarrow_forwardWhat is a good response to.... One of the ways that financial information can fraudulently be reported to stakeholders is by overstating revenues. The motivation for this would be to show stakeholders that the company is exceeding expectations- or performing well. This can be done by recording revenues in a period they were not actually accrued in (like saying that revenues were earned before a product order was fulfilled), recording fictitious revenues, and even changing expenses to reflect incorrect periods or amounts. This “m” would be considered manipulation- because the accountant would be manipulating the financial statements (like the income statement) for potential personal gain. One case where this occurred was “last year involving Marvell Technology Group, the company was charged with pulling in sales from future quarters to close the gap between actual and forecasted revenue. The pull-ins amounted to as much as 16% of the company’s total quarterly revenues, according to the…arrow_forwardIf a company reported fi ctitious revenue, it could try to cover up its fraud by: A . decreasing assets.arrow_forward
- 1. A threat in the expenditure cycle that involves unauthorized individuals making purchases is known as: A. Unauthorized access B. Fraudulent disbursements C. Data breaches D. Inventory theft 2. What is the first step in the expenditure cycle? A. Placing the purchase order B. Recording the transaction C. Authorizing the purchase D. Receiving goods or services 3. Which of the following is not a step in the expenditure cycle? A. Approving the purchase requisition B. Collecting cash from customers C. Receiving goods or services D. Recording the transaction in the general ledgerarrow_forwardWhich of the following procedures is least effective in preventing the purchasing agent from receiving kickbacks? a. Prenumbering and periodically accounting for all purchase orders b. Requiring purchasing agents to disclose any financial investments in potential suppliers c. Requiring approval of all purchase orders d. Maintaining a list of approved vendors and requiring all purchases to be made from vendors on that listarrow_forwardGive an example of an error or fraud that would misstate financial statements to affect the accounts as follows, taking each case independently. (Note: “Overstate” means the account has a higher value than would be appropriate under GAAP and “understate” means it has a lower value.)a. Overstate one asset; understate another asset.b. Overstate an asset; overstate stockholders’ equity.c. Overstate an asset; overstate revenue.d. Overstate an asset; understate an expense.e. Overstate a liability; overstate an expense.f. Understate an asset; overstate an expense.g. Understate a liability; understate an expense.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningCornerstones of Financial AccountingAccountingISBN:9781337690881Author:Jay Rich, Jeff JonesPublisher:Cengage LearningPrinciples of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Cornerstones of Financial Accounting
Accounting
ISBN:9781337690881
Author:Jay Rich, Jeff Jones
Publisher:Cengage Learning
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub