Horngren's Accounting (12th Edition)
12th Edition
ISBN: 9780134486444
Author: Tracie L. Miller-Nobles, Brenda L. Mattison, Ella Mae Matsumura
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 7, Problem 7.1FC
Fraud Case 7-1
Didrikson Rubin, the auditor of Red Barn Farm Equipment was verifying cash payments to vendors for the past several months. She noticed that several checks had been paid to a specific vendor, but she couldn’t find a record of the transactions in the computerized system. Didrikson suspects that an employee is issuing checks to a fictitious vendor and then deleting the transactions from the computerized system. How might Didrikson investigate the suspected fraud?
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?
An auditor suspects that certain client
employees are ordering merchandise for
themselves over the Internet without recording
the purchase or receipt of the merchandise.
When vendors' invoices arrive, one of the
employees approves the invoices for payment.
After the invoices are paid, the employee
destroys the invoices and the related vouchers.
In gathering evidence regarding the fraud, the
auditor most likely would select items for testing
from the file of all:
Multiple Choice
Cash disbursements.
Approved vouchers.
Receiving reports.
Vendors' invoices.
Allison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.
Chapter 7 Solutions
Horngren's Accounting (12th Edition)
Ch. 7 - Which of the following benefits of an effective...Ch. 7 - Prob. 2QCCh. 7 - Which of the following is not a special journal?...Ch. 7 - Mountain Day Spa sold merchandise inventory on...Ch. 7 - Prob. 5QCCh. 7 - Centex Sound Systems purchased merchandise...Ch. 7 - Every transaction recorded in the cash payments...Ch. 7 - Prob. 8QCCh. 7 - Which is a disadvantage of an enterprise resource...Ch. 7 - Prob. 1RQ
Ch. 7 - Prob. 2RQCh. 7 - Explain the three basic components of an...Ch. 7 - What is a special journal?Ch. 7 - What is the purpose of a subsidiary ledger?Ch. 7 - Prob. 6RQCh. 7 - List the four special journals often used in a...Ch. 7 - Explain the posting process of the sales journal.Ch. 7 - Provide some examples of transactions that would...Ch. 7 - What are the columns that are typically used in...Ch. 7 - Prob. 11RQCh. 7 - When is the general journal used in a manual...Ch. 7 - Explain the two components of a computerized...Ch. 7 - Prob. 14RQCh. 7 - What is an enterprise resource planning (ERP)...Ch. 7 - Prob. 16RQCh. 7 - How would a business record a sale of services on...Ch. 7 - How would a business record a bill received in...Ch. 7 - Prob. S7.1SECh. 7 - Defining components of an accounting information...Ch. 7 - Identifying special journals Learning Objective 2...Ch. 7 - Prob. S7.4SECh. 7 - Posting transactions from a sales journal to a...Ch. 7 - Prob. S7.6SECh. 7 - Posting transactions from a cash receipts journal...Ch. 7 - Recording transactions in a purchases journal...Ch. 7 - Posting transactions from a purchases journal to a...Ch. 7 - Prob. S7.10SECh. 7 - Prob. S7.11SECh. 7 - Prob. S7.12SECh. 7 - Prob. S7.13SECh. 7 - Prob. E7.14ECh. 7 - Prob. E7.15ECh. 7 - Using the sales and cash receipts journals...Ch. 7 - Prob. E7.17ECh. 7 - Prob. E7.18ECh. 7 - Prob. E7.19ECh. 7 - Recording transactions-cash payments journal...Ch. 7 - Posting from the purchases journal; balancing the...Ch. 7 - Identifying transactions in the accounts payable...Ch. 7 - Prob. E7.23ECh. 7 - Prob. P7.24APGACh. 7 - Prob. P7.25APGACh. 7 - Prob. P7.26APGACh. 7 - Prob. P7.27BPGBCh. 7 - Using the purchases, cash payments, and general...Ch. 7 - Using all Journals, posting, and balancing the...Ch. 7 - Continuing Problem P7-3D Using aft journals This...Ch. 7 - Using all journals 2 This problem continues the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Comprehensive Problem for Chapter 7 Completing the...Ch. 7 - Tying It All Together Case Before you begin this...Ch. 7 - Decision Case 7-1 A fire destroyed certain...Ch. 7 - Fraud Case 7-1 Didrikson Rubin, the auditor of Red...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Investigating a Fraud. Suppose you are auditing cash disbursements and discover severalpayments to a company you are unfamiliar with and cannot find information about this company on the Internet or in the local telephone directory. The invoices from this company have numbers very close to each other in the sequence, there is no phone number on the invoice, and each bill is for a dollar amount just under the amount that would require additional approvals before payment. Based on this information, you now suspect this may be a fraud.Required:Based on your suspicions, how would you change the audit procedures you would perform, and how might you change the evidence you gather?arrow_forwardWhich of the following is least indicative of fraudulent activity?a. Numerous cash refunds have been made to different people at the same post office box address.b. Internal auditors cannot locate several credit memos to support reductions of customers’ balances.c. Bank reconciliation has no outstanding checks or deposits older than 15 days.d. Three people were absent the day the auditors handed out the paychecks and have not picked them up four weeks later.arrow_forwardCharles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 PM unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in this chapter could you use to help detect this type of fraud?arrow_forward
- Scenario: You are an assistant manager of a high-end retail store and, through routine end-of-day accounting procedures, you have discovered your long-time coworker, who is also an assistant manager and good friend, has been embezzling from the company. Use your knowledge related to the ways employees conduct fraud to build a case for how your coworker might have embezzled money. How would you utilize the store’s accounting software to access data and find the proper evidence to determine if it truly is fraud? To whom would you report your findings? Would you confront your coworker/friend?arrow_forwardListed below are seven errors or problems that might occur in the processing of cash transactions. Also shown is a list of internal control principles. Evaluate each possible error and cite a principle that is listed that would reduce the probability of the error occurring. If none of the principles given will correct the problem, write "None." If you think more than one principle is appropriate, list all principles that apply. Internal Control Principles Establishment of responsibility Segregation of duties Physical control devices Documentation procedures e. Independent internal verification a. b. C. d. f. Human resource controlsarrow_forwardEric Wilson works at Lime Inc. He used Lime Inc.'s Sam's Club card to make personal purchases. Immediately before the company paid the bill for the Sam's Club charges each month, Eric placed his receipt in with the legitimate work-related receipts for Sam's Club. The accounts payable clerk rarely verified that the receipts were signed by authorized employees or that the purchases were actually for work-related items. What type of fraud is this? Forged maker Pay and return Personal purchases Pass-through 4arrow_forward
- Computer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardAn auditor suspects that a client's cashier is misappropriating cash receipts for personal use by lapping customer checks received in the mail. In attempting to uncover this embezzlement scheme, the auditor most likely would compare the Group of answer choices Daily cash summaries with the sums of the cash receipts journal entries. Individual bank deposit slips with the details of the monthly bank statements. Dates checks are deposited per bank statements with the dates remittance credits are recorded. Dates uncollectible accounts are authorized to be written off with the dates the write-offs are actually recorded.arrow_forwardCase of the Missing Petty Cash The case below tells the actual story of a cash embezzlement scheme. The case has two major parts: (1) problem and (2) audit approach. For the case, please consider how the auditor may have discovered the cash embezzlement scheme.ProblemThe petty cash custodian (1) brought postage receipts from home and paid them from the fund, (2) persuaded the supervisor to sign blank authorization slips the custodian could use when the supervisor was away and used them to pay for fictitious meals and minor supplies, and (3) took cash to get through the weekend, replacing it the next week. Postagereceipts were from a distant post office station the company did not use. The blank authorization slips were dated on days the supervisor was absent. The fund was cash short during the weekend and for a few days the following week. The fund was small ($500), but the custodian replenished it about every two working days, stealing about $50 each time. With about 260 working days…arrow_forward
- The Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…arrow_forwardThe Laundry Money Skim The case below tells the actual story of a cash embezzlement scheme. The case has two major parts: (1) problem and (2) audit approach. For the case, please consider how the auditor may have discovered the cash embezzlement scheme.ProblemAlbert owned and operated 40 coin laundries around town. As the business grew, he could no longer visit each one, empty the cash boxes, and deposit the receipts. Each location grossed about $140 to $160 per day, operating 365 days per year—gross receipts of about $2 million per year. Each of four part-time employees visited 10 locations, collecting the cash boxes and delivering them to Albert’s office where he would count the coins and currency (from the change machine) and prepare a bank deposit. One of the employees skimmed $5 to $10 from each location visited each day.The daily theft does not seem like much, but at an average of $7.50 per day from each of 10 locations, totaled about $27,000 per year. If all four of the…arrow_forwardDuring the preparation of the bank reconciliation for Apache Grading Co., Sarah Ferrari, the assistant controller, discovered that Rocky Spring Bank incorrectly recorded a $610 check written by Apache Grading Co. as $160. Sarah has decided not to notify the bank but wait for the bank to detect the error. Sarah plans to record the $450 error as Other Income if the bank fails to detect the error within the next three months. Discuss whether Sarah is behaving in a professional manner.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Financial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License