Concept explainers
a.
Introduction: Allowance for doubtful accounts is a contra asset account which is used to provide provision for losses which may result due to non-receipt of
To describe: Basis for valuation of allowances for doubtful account, its comparison with account balances based on recorded transactions and precision requirement for balances containing estimates.
b.
Introduction: Uncollectible debt represent the debt which is not likely to be realized by the company, depending on the certainty of un-collectability, either an allowance (provision) can be made for the same or the debt can be written off by recognizing it as ‘
To describe:Information that the company may use to make the estimate of the allowance for uncollectible debt.
c.
Introduction: Audit Evidence refers to the evidence obtained by the auditor by performing
To describe: Evidence needed to be collected by auditor in order to determine the fairness of client’s estimate of the allowance for uncollectible accounts.
d.
Introduction: When the allowance is estimated based on past trends, as a percentage of sales, the same rate cannot be taken in the current period since the customer base has been altered and therefore, management would have to determine a new methodology for estimation.
To discuss:Effect of sale to low credit customers on estimate of allowance for doubtful debt.
e.
Introduction: Economic conditions are the prevalent market conditions within which the business operates, a business can only operate profitably when the economic environment within which it exits, allows the business sufficient opportunities.
To describe: Importance of change in economic conditions in estimation of allowance for doubtful accounts.
Want to see the full answer?
Check out a sample textbook solutionChapter 6 Solutions
Auditing: A Risk Based-Approach to Conducting a Quality Audit
- Which of the following is NOT a trend in Corporate Fraud? a) Anti-fraud controls have little impact on reduced fraud losses and shorter fraud duration b) Tips are consistently the most common detection method c) Banking, financial services, government/public administration and manufacturing have the greatest number of fraud cases reportedarrow_forward2. FRAUD SCHEME PURCHASING AGENT A purchasing agent for a large hardware retailer has sole discretion in selecting vendors for the parts and supplies sold by the company. The agent directs a disproportionate number of purchase orders to a supply company owned by the agent's brother- in-law, which charges above-market prices for its products. The agent's relationship with the supplier is unknown to his employer. C ta th di Required What type of fraud is this, and what controls can be implemented to prevent or detect the fraud? Re a.arrow_forwardWorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s management used to carry out the fraud?arrow_forward
- The following paragraphs describe fraudulent accounting committed by the company Rite-Aid in 1999. After reading the paragraphs, list the journal entries you think Rite-Aid would have used to do what is described here. You will have to make an educated guess as to what journal entries the company would use to cover up the fraud. Rite Aid failed to record an accrued expense for stock appreciation rights it had granted to employees, in a program that gave the recipients the right to receive cash or stock in amounts tied to increases in the market price of Rite Aid stock. Rite Aid should have accrued an expense of $22 million in FY 1998 and $33 million in FY 1999 for these obligations.arrow_forwardThe Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…arrow_forwardTypes of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forward
- What is a good response to... 1. Embezzlement can result from: skimming cash, manipulating refunds, or creating fake transactions. It is possible that the coworker could have inflated expenses, recorded false refunds, or pocketed cash from sales without recording them in the system. Another possibility is underreporting sales or voiding transactions and then taking the difference. 2. Using the store’s accounting software, there is the option to analyze transaction logs for unusual activity i.e. high numbers of refunds, voided transactions, or manual adjustments. Cross-checking daily sales reports, register totals, and bank deposits are also another way to identify missing funds. 3. Finding should be reported to the supervisor/store manager and/or loss prevention department. 4. No, I would not confront my coworker as confronting them could jeopardize the investigation and raise tensions with that individual. Instead, I would just relay my finding to management and document when that…arrow_forwardRohini works as an accountant with PQR Ltd. She embezzled $20,000 from the company bank account. She was caught in the annual audit of the company. She justified her action saying that her employer has not given any pay rise, so she had to take $20,000 from the account. Explain in your own words the internal control that may have failed in the above situation. Also explain which element of the fraud triangle Rohini is referring to justify her action.arrow_forwardSome of the largest business frauds ever perpetrated have involved the misstatement of inventory. Two classics were at Leslie Fay and McKesson Corporation. Feel free to check them out to get a feel for the impact that it has. There is considerable information regarding inventory frauds available on the Internet. Search for information about another instance of inventory fraud at any other company, and prepare an explanation of the nature of the inventory fraud.arrow_forward
- Computer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardthe madoff debacle case? what are the lessons? question 4:arrow_forwardAssume that you are interviewed by a student newspaper regarding the nature of accounting fraud. The reporter says, "As I understand it, asset misappropriations are more likely to be found in small organizations, but not in larger organizations. On the other hand, fraudulent financial reporting is more likely to be found in larger organizations." How would you respond to the reporter's observation?arrow_forward
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage