Financial & Managerial Accounting
14th Edition
ISBN: 9781337119207
Author: Carl Warren, James M. Reeve, Jonathan Duchac
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 7, Problem 5DQ
To determine
Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations.
The following are the some of the internal control procedures:
- Competent personnel, rotating duties, and mandatory vacations
- Separating responsibilities for related operations
- Separating operations, custody of assets, and accounting
- Proofs and security measures
To describe: The internal control procedure that will prevent or detect fraud.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?
Allison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.
The Perfect Crime?
Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…
Chapter 7 Solutions
Financial & Managerial Accounting
Ch. 7 - Prob. 1DQCh. 7 - Prob. 2DQCh. 7 - Prob. 3DQCh. 7 - Prob. 4DQCh. 7 - Prob. 5DQCh. 7 - Prob. 6DQCh. 7 - Prob. 7DQCh. 7 - Prob. 8DQCh. 7 - Prob. 9DQCh. 7 - Prob. 10DQ
Ch. 7 - Internal control elements Identify each of the...Ch. 7 - Prob. 7.2BECh. 7 - Prob. 7.3BECh. 7 - Prob. 7.4BECh. 7 - Sarbanes-Oxley internal control report Using...Ch. 7 - Prob. 7.2EXCh. 7 - Prob. 7.3EXCh. 7 - Prob. 7.4EXCh. 7 - Prob. 7.5EXCh. 7 - Prob. 7.6EXCh. 7 - Prob. 7.7EXCh. 7 - Prob. 7.8EXCh. 7 - Prob. 7.9EXCh. 7 - Prob. 7.10EXCh. 7 - Prob. 7.11EXCh. 7 - Entry for cash sales; cash short The actual cash...Ch. 7 - Entry for cash sales; cash over The actual cash...Ch. 7 - Prob. 7.14EXCh. 7 - Prob. 7.15EXCh. 7 - Prob. 7.16EXCh. 7 - Prob. 7.17EXCh. 7 - Prob. 7.18EXCh. 7 - Prob. 7.19EXCh. 7 - Prob. 7.20EXCh. 7 - Prob. 7.21EXCh. 7 - Prob. 7.22EXCh. 7 - Prob. 7.23EXCh. 7 - Prob. 7.24EXCh. 7 - Prob. 7.1APRCh. 7 - Prob. 7.2APRCh. 7 - Prob. 7.3APRCh. 7 - Prob. 7.4APRCh. 7 - Prob. 7.5APRCh. 7 - Prob. 7.1BPRCh. 7 - Prob. 7.2BPRCh. 7 - Prob. 7.3BPRCh. 7 - Prob. 7.4BPRCh. 7 - Prob. 7.5BPRCh. 7 - Continuing Company AnalysisAmazon: Days cash on...Ch. 7 - Apache: Days cash on hand Apache Corporation is an...Ch. 7 - Krispy Kreme and Dunkin: Days cash on hand Krispy...Ch. 7 - Nike, lululemon, and Under Armour: Days cash on...Ch. 7 - Prob. 7.1TIFCh. 7 - Communication Wholesome and Happy Foods is a...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- An auditor suspects that certain client employees are ordering merchandise for themselves over the Internet without recording the purchase or receipt of the merchandise. When vendors' invoices arrive, one of the employees approves the invoices for payment. After the invoices are paid, the employee destroys the invoices and the related vouchers. In gathering evidence regarding the fraud, the auditor most likely would select items for testing from the file of all: Multiple Choice Cash disbursements. Approved vouchers. Receiving reports. Vendors' invoices.arrow_forwardInvestigating a Fraud. Suppose you are auditing cash disbursements and discover severalpayments to a company you are unfamiliar with and cannot find information about this company on the Internet or in the local telephone directory. The invoices from this company have numbers very close to each other in the sequence, there is no phone number on the invoice, and each bill is for a dollar amount just under the amount that would require additional approvals before payment. Based on this information, you now suspect this may be a fraud.Required:Based on your suspicions, how would you change the audit procedures you would perform, and how might you change the evidence you gather?arrow_forward“Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?arrow_forward
- You are a forensic accountant for a public accounting firm whose client hired your team to perform a fraud investigation of the accounts payable processes. As part of your fraud testing, you have acquired vendor data including bank accounts to which payments are sent and employee data including bank accounts for direct deposit of paychecks. You need to compare the main vendor table to the main employee table to search for potential fictitious vendors. Analyze the fields in the two tables on the next page, looking for identical or similar fields. Based on what you find, identify three red flags for accounts payable fraud. Provide the record numbers from the tables in your answer. Vendor record # Employee Record# ________ ___________ ________ ____________ _________ ____________arrow_forwardYou are a forensic accountant for a public accounting firm whose client hired your team to perform a fraud investigation of the accounts payable processes. As part of your fraud testing, you have acquired vendor data including bank accounts to which payments are sent and employee data including bank accounts for direct deposit of paychecks. You need to compare the main vendor table to the main employee table to search for potential fictitious vendors. Analyze the fields in the two tables on the next page, looking for identical or similar fields. Based on what you find, identify three red flags for accounts payable fraud. Provide the record numbers from the tables in your answer. Vendor record # Employee Record# ________ ___________ ________ ____________ _________ ____________arrow_forwardTypes of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forward
- An auditor suspects that a client's cashier is misappropriating cash receipts for personal use by lapping customer checks received in the mail. In attempting to uncover this embezzlement scheme, the auditor most likely would compare the Group of answer choices Daily cash summaries with the sums of the cash receipts journal entries. Individual bank deposit slips with the details of the monthly bank statements. Dates checks are deposited per bank statements with the dates remittance credits are recorded. Dates uncollectible accounts are authorized to be written off with the dates the write-offs are actually recorded.arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardWhich of the following is true in the case of forgery? Forgery does not include anything done by typing or word-processing. If a person signs his own check for $100 cash, knowing that there is only $50 in the account, and manages to cash it, the check is a forgery. The "forged instrument" must in some way be false, as in a false signature, a backdating of an existing instrument, or falsely modifying a corporate name. Forgery can be committed only by forging signatures. Alteration of an already existing document does not constitute forgery.arrow_forward
- What is a good response to.... Embezzlement is a type of fraud that happens when someone within an organization misuses their position of trust to steal money. This breach of trust is an intentional form of deceit to misappropriately utilize these funds for their own gain. Reviewing sales, refunds, returns, cash deposits, and voided transactions would help identify any form of fraud as an assistant manager. If there are any discrepancies identified, it would help to review logs of who accessed software at specific times to help identify the culprit. If there was something identified the next step would be to reports the findings to higher management depending on company protocol and be a confidant during the investigation process. It is not advisable to have direct confrontation as it could lead to further deceitful actions with the intent to cover up their actions.arrow_forwardThe fraud triangle asserts that the following three factors must exist for a person to commit fraud. A. Opportunity B. Pressure C. Rationalization. Identify the fraud risk factor (A, B, or C) in each of the following situations.arrow_forwardWhat is a good response to... 1. Embezzlement can result from: skimming cash, manipulating refunds, or creating fake transactions. It is possible that the coworker could have inflated expenses, recorded false refunds, or pocketed cash from sales without recording them in the system. Another possibility is underreporting sales or voiding transactions and then taking the difference. 2. Using the store’s accounting software, there is the option to analyze transaction logs for unusual activity i.e. high numbers of refunds, voided transactions, or manual adjustments. Cross-checking daily sales reports, register totals, and bank deposits are also another way to identify missing funds. 3. Finding should be reported to the supervisor/store manager and/or loss prevention department. 4. No, I would not confront my coworker as confronting them could jeopardize the investigation and raise tensions with that individual. Instead, I would just relay my finding to management and document when that…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning