Accounting
27th Edition
ISBN: 9781337514071
Author: WARREN
Publisher: Cengage
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8.15EX
To determine
Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information.
Five elements of internal control:
- Control Environment: Control Environment refers to the attitude of top brass of the company or the corporate culture. The top brass of the company must set the tone to improve the morale for rest of the employees of the business.
- Risk assessment: The business must be able identify the risk associated with it, and accordingly use the internal control to safeguard its assets and ensures fairness in presentation in accounting information.
- Control procedures: The objective of setting the control procedure is to ensure that the business achieves its objectives.
- Monitoring controls: The internal control used in the business is being monitored by the internal auditors who are hired by the business, to ensure that the employees are adhering to the policies of the business and running the operations efficiently. The external auditors on the other hand ensure that the business accounting records are being maintained in accordance with the Generally Accepted Accounting Principles (GAAP).
- Information and communication: Information and communication system is important for a business and hence only authorized persons should be allowed the access to the confidential accounting information. Approvals are also should be made mandatory for the transactions by the
control system.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
An auditor suspects that certain client
employees are ordering merchandise for
themselves over the Internet without recording
the purchase or receipt of the merchandise.
When vendors' invoices arrive, one of the
employees approves the invoices for payment.
After the invoices are paid, the employee
destroys the invoices and the related vouchers.
In gathering evidence regarding the fraud, the
auditor most likely would select items for testing
from the file of all:
Multiple Choice
Cash disbursements.
Approved vouchers.
Receiving reports.
Vendors' invoices.
Required:
Which internal control(s) would you recommend to prevent the following situations from occurring?
Situation
a. Authorization of a credit memo for a customer's account (on receivables) when the goods were never
actually returned.
b. Theft of funds by the cashier, who cashed several checks and did not record their receipt.
c. Inventory stolen by receiving dock personnel. The receiving clerk claimed the inventory was sent to the
warehouse, but the warehouse clerk did not record properly.
d. Writing off a customer's accounts receivable balances as uncollectible in order to conceal the theft of
subsequent cash collections.
e. Billing customers for the quantity ordered when the quantity shipped was actually less due to back-
ordering of some items.
Answer
FRAUD SCHEME – PURCHASING AGENT
A purchasing agent for a large hardware retailer has sole discretion in selecting vendors for the parts and supplies sold by the company. The agent directs a disproportionate number of purchase orders to a supply company owned by the agent’s brother-in-law, which charges above-market prices for its products. The agent’s relationship with the supplier is unknown to his employer.
Required
What type of fraud is this, and what controls can be implemented to prevent or detect a fraud?
2. MAIL ROOM FRAUD AND INTERNAL CONTROL
Sarah Sethi, a professional criminal, took a job as a mail room clerk at Benson & Abernathy Company, a large department store. The mail room was an extremely hectic work environment consisting of a supervisor and 45 clerks. The clerks were responsible for handling promotional mailings, catalogs, and inter office mails, as well as receiving and distributing wide range of outside correspondence to various internal departments. One…
Chapter 8 Solutions
Accounting
Ch. 8 - Prob. 1DQCh. 8 - Why should the employee who handles cash receipts...Ch. 8 - Prob. 3DQCh. 8 - Why should the responsibility for maintaining the...Ch. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - The balance of Cash is likely to differ from the...Ch. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - (a) How are cash equivalents reported in the...
Ch. 8 - Internal control elements Identify each of the...Ch. 8 - Prob. 8.1BPECh. 8 - Prob. 8.2APECh. 8 - Prob. 8.2BPECh. 8 - Prob. 8.3APECh. 8 - Prob. 8.3BPECh. 8 - Prob. 8.4APECh. 8 - Prob. 8.4BPECh. 8 - Prob. 8.5APECh. 8 - Prob. 8.5BPECh. 8 - Sarbanes-Oxley internal control report Using...Ch. 8 - Prob. 8.2EXCh. 8 - Prob. 8.3EXCh. 8 - Prob. 8.4EXCh. 8 - Prob. 8.5EXCh. 8 - Prob. 8.6EXCh. 8 - Prob. 8.7EXCh. 8 - Prob. 8.8EXCh. 8 - Prob. 8.9EXCh. 8 - Prob. 8.10EXCh. 8 - Prob. 8.11EXCh. 8 - Entry for cash sales; cash short The actual cash...Ch. 8 - Entry for cash sales; cash over The actual cash...Ch. 8 - Internal control of cash payments Abbe Co. is a...Ch. 8 - Prob. 8.15EXCh. 8 - Prob. 8.16EXCh. 8 - Prob. 8.17EXCh. 8 - Prob. 8.18EXCh. 8 - Prob. 8.19EXCh. 8 - Prob. 8.20EXCh. 8 - Prob. 8.21EXCh. 8 - Prob. 8.22EXCh. 8 - Prob. 8.23EXCh. 8 - Prob. 8.24EXCh. 8 - Prob. 8.25EXCh. 8 - Cash to monthly cash expenses ratio El Dorado Inc....Ch. 8 - Prob. 8.27EXCh. 8 - Prob. 8.28EXCh. 8 - Prob. 8.1APRCh. 8 - Prob. 8.2APRCh. 8 - Prob. 8.3APRCh. 8 - Prob. 8.4APRCh. 8 - Prob. 8.5APRCh. 8 - Prob. 8.1BPRCh. 8 - Prob. 8.2BPRCh. 8 - Prob. 8.3BPRCh. 8 - Prob. 4BPRCh. 8 - Prob. 5BPRCh. 8 - Ethics in Action Tehra Dactyl is an accountant for...Ch. 8 - Ethics in Action During the preparation of the...Ch. 8 - Prob. 8.5CPCh. 8 - Prob. 8.6CPCh. 8 - Prob. 8.7CPCh. 8 - Prob. 8.8CPCh. 8 - Prob. 8.9CP
Knowledge Booster
Similar questions
- There are several elements to internal controls. Which of the following would not address the issue of having cash transactions reported in the accounting records? A. One employee would have access to the cash register. B. The cash drawer should be closed out, and cash and the sales register should be reconciled on a prenumbered form. C. Ask customers to report to a manager if they do not receive a sales receipt or invoice. D. The person behind the cash register should also be responsible for making price adjustments.arrow_forwardWhat is the advantage of using technology in the internal control system? A. Passwords can be used to allow access by employees. B. Any cash received does not need to be reconciled because the computer tracks all transactions. C. Transactions are easily changed. D. Employees cannot steal because all cash transactions are recorded by the computer/cash register.arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forward
- What is a good response to... 1. Embezzlement can result from: skimming cash, manipulating refunds, or creating fake transactions. It is possible that the coworker could have inflated expenses, recorded false refunds, or pocketed cash from sales without recording them in the system. Another possibility is underreporting sales or voiding transactions and then taking the difference. 2. Using the store’s accounting software, there is the option to analyze transaction logs for unusual activity i.e. high numbers of refunds, voided transactions, or manual adjustments. Cross-checking daily sales reports, register totals, and bank deposits are also another way to identify missing funds. 3. Finding should be reported to the supervisor/store manager and/or loss prevention department. 4. No, I would not confront my coworker as confronting them could jeopardize the investigation and raise tensions with that individual. Instead, I would just relay my finding to management and document when that…arrow_forwardSadaf Oman Co. is using internal control procedures to mitigate the risks to which it is exposed. Listed below are some internal control procedures applicable to Sadaf Oman Co's revenues and receivable system. Match the most appropriate one of the following risks mitigated to the correct internal control procedure stated below. Risks mitigated: (A) Sales staff misappropriate sales receipts then write off bad debts in the general ledger (B) Sales are made to customers who cannot pay (C) Sales are not made to existing customers (D) Sales staff do not communicate with the accounts staff regularly, so the debt uncollected at the end of the period are written off in the ledger by the accounts staff (E) Customer refuses to pay for goods allegedly not received (F) Customer orders are not being fulfilled. (G) Revenues on books are overstated and exceed actual revenues in bank (H) Posting a sale that is beyond the credit limit of the customers ) Company employees steal collections (U) Without…arrow_forwardDetermine whether each procedure described below is an internal control strength or weakness; then identify the internal control violated or followed for each procedure. 1. The owner does not use ID scanners to limit access to expensive merchandise. Instead, the owner argues they hire honest employees. 2. Several salesclerks share the same cash drawer. 3. The company devotes resources towards keeping accurate accounting records for machinery. 4. The company does not allow employees with access to cash to modify accounting records. 5. Employees that handle easily transferable assets such as cash are bonded. Weakness or Strength 1. Weakness 2. Weakness 3. Strength 4. Strength 5. Strength Internal Control Principle Apply technological controls Establish responsibilities Maintain adequate records Separate recordkeeping from custody of assets Insure assets and bond key employeesarrow_forward
- Determine whether each procedure described below is an internal control strength or weakness; then identify the internal control violated or followed for each procedure. 1. The owner does not use ID scanners to limit access to expensive merchandise. Instead, the owner argues they hire honest employees. 2. Several salesclerks share the same cash drawer. 3. The company devotes resources towards keeping accurate accounting records for machinery. 4. The company does not allow employees with access to cash to modify accounting records. 5. Employees that handle easily transferable assets such as cash are bonded. Weakness or Strength 1. Weakness 2. Weakness 3. Strength 4. Strength 5. Strength Internal Control Principlearrow_forwardWhich of the following scenarios reduces the risk of an employee fraud? Group of answer choices An accountant being responsible for approving payments to a vendor The bank reconciliation being prepared by an accountant Remittance advices being sent directly to the cashier A sales clerk having access to the cash registerarrow_forward2. FRAUD SCHEME PURCHASING AGENT A purchasing agent for a large hardware retailer has sole discretion in selecting vendors for the parts and supplies sold by the company. The agent directs a disproportionate number of purchase orders to a supply company owned by the agent's brother- in-law, which charges above-market prices for its products. The agent's relationship with the supplier is unknown to his employer. C ta th di Required What type of fraud is this, and what controls can be implemented to prevent or detect the fraud? Re a.arrow_forward
- Which of the following internal controls is the most effective in preventing employees from using company funds to purchase personal items? A. Adequate separation of duties between the cash receipts and the recording of cash receipts. B. Cash reconciliations are performed daily. C. The purchase requisition forms are required for all purchases and the warehouse staff check the deliveries against the approved purchase requisition forms to make sure the delivered items match the pre-approved orders. D. Cash payments need to be approved based on supporting documents, such as purchase orders and receiving reports. E. purchase requisition forms are pre-numbered, and their sequence is accounted for.arrow_forwardWhat internal control procedure(s) would provide protection against the following threats? a. Theft of goods by the shipping dock workers, who claim that the inventory shortages reflect errors in the inventory records.b. Posting the sales amount to the wrong customer account because a customer account number was incorrectly keyed into the system .c. Making a credit sale to a customer who is already four months behind in making payments on his account. d. Authorizing a credit memo for a sales return when the goods were never actually returned. e. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. f. Billing customers for the quantity ordered when the quantity shipped was actually less due to back ordering of some items .g. Lost sales because of stockouts of several products for which the computer records indicated there was adequate quantity on hand. h. A sales clerk sold a $7,000 wide-screen TV…arrow_forwardWhich of the following is NOT an example of an opportunity to commit fraud in the accounting information system? a. The need to sell confidential information from the database for cash to pay for his medical bills b. User names and passwords of most employees are stored in a shared Google document file c. The employee's discovery that passwords are not required to enter any modules in the accounting information system d. Supervisors are not required to approve transactions entered into by their staff in the accounting systemarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Financial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning