Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 4, Problem 5DQ
To determine
Explain the manner in which an employee can embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of duties and authorization controls were not in place.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
A serious exposure in the revenue cycle is customer dissatisfaction. What is the related threat and applicable control procedure that address this exposure?
A. failure to bill; separation of billing and shipping functions
B. failure to bill; bar-codes and RFID technology
C. billing errors; reconciliation of shipping documents to sales order
D. theft of cash; using ETFs
1. A threat to the expenditure cycle that involves an employee creating and approving fictitious purchase orders is known as:
A. Inventory theft
B. Unauthorized access
C. Check tampering
D. Billing schemes
2. Purchase orders are used to initiate a payment in the disbursement cycle. True or False
3.Vendor audits are conducted to address the threat of unauthorized access in the disbursement cycle. True or false
Proper segregation of duties reduces opportunities to allow any employee to be in a position to both:
A. journalize cash receipts and disbursements and prepare the financial statements.
B. Monitor internal controls and evaluate whether the controls are operating as intended.
C. Adopt new accounting pronouncements and authorize the recording of transactions.
D. Record and conceal fraudulent transactions in the normal course of assigned tasks.
Chapter 4 Solutions
Accounting Information Systems
Ch. 4 - Prob. 1RQCh. 4 - Prob. 2RQCh. 4 - What function does the receiving department serve...Ch. 4 - Prob. 4RQCh. 4 - Prob. 5RQCh. 4 - Prob. 6RQCh. 4 - Prob. 7RQCh. 4 - Prob. 8RQCh. 4 - Prob. 9RQCh. 4 - Distinguish between an edit run, a sort run, and...
Ch. 4 - Prob. 11RQCh. 4 - Prob. 12RQCh. 4 - Prob. 13RQCh. 4 - Prob. 14RQCh. 4 - Prob. 15RQCh. 4 - Prob. 16RQCh. 4 - In a manual system, after which event in the sales...Ch. 4 - Prob. 18RQCh. 4 - What document initiates the billing process?Ch. 4 - Prob. 20RQCh. 4 - Prob. 1DQCh. 4 - Prob. 2DQCh. 4 - Prob. 3DQCh. 4 - Prob. 4DQCh. 4 - Prob. 5DQCh. 4 - Prob. 6DQCh. 4 - Prob. 7DQCh. 4 - Prob. 8DQCh. 4 - What financial statement misrepresentations may...Ch. 4 - Prob. 10DQCh. 4 - Prob. 11DQCh. 4 - Prob. 12DQCh. 4 - Prob. 13DQCh. 4 - Prob. 14DQCh. 4 - Prob. 15DQCh. 4 - How is EDI more than technology? What unique...Ch. 4 - Prob. 17DQCh. 4 - Prob. 1MCQCh. 4 - Prob. 2MCQCh. 4 - Prob. 3MCQCh. 4 - Prob. 4MCQCh. 4 - Prob. 5MCQCh. 4 - Prob. 6MCQCh. 4 - Prob. 7MCQCh. 4 - Prob. 8MCQCh. 4 - Prob. 9MCQCh. 4 - Prob. 10MCQCh. 4 - Prob. 1PCh. 4 - Prob. 2PCh. 4 - Prob. 3PCh. 4 - Prob. 4PCh. 4 - Prob. 5PCh. 4 - Prob. 6PCh. 4 - Prob. 7PCh. 4 - Prob. 8PCh. 4 - Prob. 9PCh. 4 - Prob. 10PCh. 4 - Prob. 11PCh. 4 - Prob. 12PCh. 4 - In 1989, Robert Smith opened a small fruit and...Ch. 4 - Posavek is a wholesale supplier of building...Ch. 4 - Prob. 3ICCCh. 4 - (Prepared by Will Richens and Michael Catchpole,...Ch. 4 - Prob. 6ICC
Knowledge Booster
Similar questions
- 1. The primary objective of internal controls in the expenditure cycle is to: A. Ensure the accuracy and completeness of financial transactions B. Streamline the procurement process C. Minimize the cost of purchases D. Increase the speed of payment processing 2. A threat in the expenditure cycle that involves unauthorized individuals making purchases is known as: Unauthorized access Fraudulent disbursements Data breaches Inventory theft 3.arrow_forwardWhy do fraud examiners prefer documents over witnesses?arrow_forwardThere are several elements to internal controls. Which of the following would not address the issue of having cash transactions reported in the accounting records? A. One employee would have access to the cash register. B. The cash drawer should be closed out, and cash and the sales register should be reconciled on a prenumbered form. C. Ask customers to report to a manager if they do not receive a sales receipt or invoice. D. The person behind the cash register should also be responsible for making price adjustments.arrow_forward
- Which of the following would a fraudster perceive as a pressure? A. lack of management oversight B. everyone does it C. living beyond ones means D. lack of an internal audit functionarrow_forwardYou will have the opportunity in this discussion to recommend adequate internal controls over sales invoices and receivables. If controls are not in place over these functions, companies are susceptible to errors, fraud, and losses. In the following scenarios, recommend internal controls that need to be in place to eliminate the problems described: An inexperienced clerk does not have the knowledge to prepare sales invoices properly. They are confused about the actual items shipped. As a result, the clerk has been preparing invoices at prices below the company's sales prices. During your audit, the controller approaches you about a problem with missing invoices. They think that these missing invoices were never recorded in the system, which results in the accompanying receivables not being recorded either. They read the monthly sales data and calculates that the company has faced significant losses as a result.arrow_forwardCollusion is an intentional act of two or more employees to accomplish theft of company assets. Which control activity is designed to make fraud less likely because it would require collusion among employees? A. Adequate documents and records B. Clearly defined authority and responsibility C. Safeguards over assets and records D. Segregation of dutiesarrow_forward
- What internal control procedure(s) would provide protection against the following threats? a. Theft of goods by the shipping dock workers, who claim that the inventory shortages reflect errors in the inventory records.b. Posting the sales amount to the wrong customer account because a customer account number was incorrectly keyed into the system .c. Making a credit sale to a customer who is already four months behind in making payments on his account. d. Authorizing a credit memo for a sales return when the goods were never actually returned. e. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. f. Billing customers for the quantity ordered when the quantity shipped was actually less due to back ordering of some items .g. Lost sales because of stockouts of several products for which the computer records indicated there was adequate quantity on hand. h. A sales clerk sold a $7,000 wide-screen TV…arrow_forwardOne way to prevent employee collusion with a dishonest vendor is to: Make sure the employee procuring the services is not the one issuing the payment not pay an invoice that lacks the ordering employee’s initials without finding out whether the services were performed or the goods received call the vendor—no matter how long you have been using it—if anything looks out of order all of the abovearrow_forwardAllowing only certain employees to order goods and services for the company is an example of what internal control procedure? a.Proper authorization b.Independent verification c.Segregation of duties d.Safeguarding of assets and recordsarrow_forward
- which, if any of the following situations represents improper segregation of functions? Explain your answer. a. the billing department prepares the customers' invoices and records the sale in the sales journal b. The mailroom clerk opens a cash receipt envelopes from customers and also prepared the remittance risk c. Accounting clerk receives journal vouchers from various departments and also posts to the GL accounts d. The sales department approves sales credit memos as the result of product returns and forwards these to the AR department, which adjusts the customer accounts to reflect the return.arrow_forwardThe fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. A worker sees other employees regularly take inventory for personal use.arrow_forward1. A threat in the expenditure cycle that involves unauthorized individuals making purchases is known as: A. Unauthorized access B. Fraudulent disbursements C. Data breaches D. Inventory theft 2. What is the first step in the expenditure cycle? A. Placing the purchase order B. Recording the transaction C. Authorizing the purchase D. Receiving goods or services 3. Which of the following is not a step in the expenditure cycle? A. Approving the purchase requisition B. Collecting cash from customers C. Receiving goods or services D. Recording the transaction in the general ledgerarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Cornerstones of Financial AccountingAccountingISBN:9781337690881Author:Jay Rich, Jeff JonesPublisher:Cengage LearningPrinciples of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Cornerstones of Financial Accounting
Accounting
ISBN:9781337690881
Author:Jay Rich, Jeff Jones
Publisher:Cengage Learning
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College