Concept explainers
a.
Introduction: Allowance for doubtful accounts is a contra asset account which is used to provide provision for losses which may result due to non-receipt of
To describe: Basis for valuation of allowances for doubtful account, its comparison with account balances based on recorded transactions and precision requirement for balances containing estimates.
b.
Introduction: Uncollectible debt represent the debt which is not likely to be realized by the company, depending on the certainty of un-collectability, either an allowance (provision) can be made for the same or the debt can be written off by recognizing it as ‘
To describe:Information that the company may use to make the estimate of the allowance for uncollectible debt.
c.
Introduction: Audit Evidence refers to the evidence obtained by the auditor by performing
To describe: Evidence needed to be collected by auditor in order to determine the fairness of client’s estimate of the allowance for uncollectible accounts.
d.
Introduction: When the allowance is estimated based on past trends, as a percentage of sales, the same rate cannot be taken in the current period since the customer base has been altered and therefore, management would have to determine a new methodology for estimation.
To discuss:Effect of sale to low credit customers on estimate of allowance for doubtful debt.
e.
Introduction: Economic conditions are the prevalent market conditions within which the business operates, a business can only operate profitably when the economic environment within which it exits, allows the business sufficient opportunities.
To describe: Importance of change in economic conditions in estimation of allowance for doubtful accounts.
Want to see the full answer?
Check out a sample textbook solutionChapter 6 Solutions
ACP AUDITING - RISK BASED APPROACH
- 1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardWhich of the following is NOT a trend in Corporate Fraud? a) Anti-fraud controls have little impact on reduced fraud losses and shorter fraud duration b) Tips are consistently the most common detection method c) Banking, financial services, government/public administration and manufacturing have the greatest number of fraud cases reportedarrow_forwardSadaf Oman Co. is using internal control procedures to mitigate the risks to which it is exposed. Listed below are some internal control procedures applicable to Sadaf Oman Co's revenues and receivable system. Match the most appropriate one of the following risks mitigated to the correct internal control procedure stated below. Risks mitigated: (A) Sales staff misappropriate sales receipts then write off bad debts in the general ledger (B) Sales are made to customers who cannot pay (C) Sales are not made to existing customers (D) Sales staff do not communicate with the accounts staff regularly, so the debt uncollected at the end of the period are written off in the ledger by the accounts staff (E) Customer refuses to pay for goods allegedly not received (F) Customer orders are not being fulfilled. (G) Revenues on books are overstated and exceed actual revenues in bank (H) Posting a sale that is beyond the credit limit of the customers ) Company employees steal collections (U) Without…arrow_forward
- 2. FRAUD SCHEME PURCHASING AGENT A purchasing agent for a large hardware retailer has sole discretion in selecting vendors for the parts and supplies sold by the company. The agent directs a disproportionate number of purchase orders to a supply company owned by the agent's brother- in-law, which charges above-market prices for its products. The agent's relationship with the supplier is unknown to his employer. C ta th di Required What type of fraud is this, and what controls can be implemented to prevent or detect the fraud? Re a.arrow_forwardWorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s management used to carry out the fraud?arrow_forwardHannaford is a national grocery chain whose electronic payment processing system was breached by hackers as early as December 7, 2007. The hackers stole up to 4.2 million credit and debit card numbers, expiration dates, and security codes, but did not steal customer names. On February 27, 2008, Visa Inc. notified Hannaford that Hannaford’s system had been breached. Hannaford discovered the means of access on March 8, 2008, and contained the breach on March 10, 2008. Hannaford gave notice to certain financial institutions on March 10, 2008. On March 17, 2008, “Hannaford publicly announced for the first time that between December 7, 2007 and March 10, 2008, the security of its information technology systems had been breached, leading to the theft of as many as 4.2 million debit card and credit card numbers belonging to individuals who had made purchases at more than 270 of its stores.” It also announced “that it had already received reports of approximately 1,800 cases of fraud resulting…arrow_forward
- The Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…arrow_forwardPls explain first how you solve it. Thank you. F COMPANY, organized on March 1, 2021, has a very poor internal control system. Thecompany's cashier is also its accountant. After 9 months of operations, the company's managersuspects that the cashier-accountant has been misappropriating company collections. You havebeen engaged to audit the company's accounts to determine the extent of fraud, if any. You started the audit on November 15. On that date, the cash on hand per your surprise countwas P5,140. Also on that date, the bank confirmed that the balance of the company's currentaccount was P26,328. Your examination of the records reveals that a check for P1,852 wasoutstanding on November 15. The company's markup is 40% of sales. Further examination of the company's records reveals the following balances at November 15,2021:arrow_forwardTypes of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forward
- All-Around Sound Co. discovered a fraud whereby one of its front office administrative employees used company funds to purchase goods such as computers, digital cameras, and other electronic items for her own use. The fraud was discovered when employees noticed an increase in the frequency of deliveries from vendors and the use of unusual vendors. After some investigation, it was discovered that the employee would alter thedescription or change the quantity on an invoice in order to explain the cost on the bill.What general internal control weaknesses contributed to this fraud?arrow_forwardWhat is a good response to... 1. Embezzlement can result from: skimming cash, manipulating refunds, or creating fake transactions. It is possible that the coworker could have inflated expenses, recorded false refunds, or pocketed cash from sales without recording them in the system. Another possibility is underreporting sales or voiding transactions and then taking the difference. 2. Using the store’s accounting software, there is the option to analyze transaction logs for unusual activity i.e. high numbers of refunds, voided transactions, or manual adjustments. Cross-checking daily sales reports, register totals, and bank deposits are also another way to identify missing funds. 3. Finding should be reported to the supervisor/store manager and/or loss prevention department. 4. No, I would not confront my coworker as confronting them could jeopardize the investigation and raise tensions with that individual. Instead, I would just relay my finding to management and document when that…arrow_forwardRohini works as an accountant with PQR Ltd. She embezzled $20,000 from the company bank account. She was caught in the annual audit of the company. She justified her action saying that her employer has not given any pay rise, so she had to take $20,000 from the account. Explain in your own words the internal control that may have failed in the above situation. Also explain which element of the fraud triangle Rohini is referring to justify her action.arrow_forward
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub