Auditing: A Risk Based-Approach to Conducting a Quality Audit
10th Edition
ISBN: 9781305080577
Author: Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher: South-Western College Pub
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 9, Problem 75FF
ZYNGA
(LO Z 3, 4, 5, 6, 8)
Refer to the Why It Matters feature “How to Account for Virtual Sales at Zynga.”
a. What are the inherent risks associated with the revenue transactions at Zynga?
b. What are management’s incentives to fraudulently misstate revenue transactions?
c. What controls should Zynga management have in place to mitigate the risks associated with revenue transactions?
d. How might auditors use planning analytical procedures to identify any potential concerns with Zynga’s revenue?
e. What might be considered sufficient appropriate evidence when auditing Zynga’s revenue transactions?
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A serious exposure in the revenue cycle is customer dissatisfaction. What is the related threat and applicable control procedure that address this exposure?
A. failure to bill; separation of billing and shipping functions
B. failure to bill; bar-codes and RFID technology
C. billing errors; reconciliation of shipping documents to sales order
D. theft of cash; using ETFs
1. What does it mean to say that internal control has limitations and what are these limitations?
2. Provide an appropriate response based on the following scenarios.
Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented?
Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?
3. What is petty cash and what purpose(s) does it serve?
4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash?
5. Prepare the necessary journal entries for each of the following:
(a) On March 1, issued a check to establish a petty cash fund of $1,410
(b)…
An effective revenue security system will help you accomplish the following important tasks:
a) Verification of product issues
b) Verification of guest charges
c) Verification of sales receipts
d) Verification of sales deposits
e) All of the above
Chapter 9 Solutions
Auditing: A Risk Based-Approach to Conducting a Quality Audit
Ch. 9 - Prob. 1TFQCh. 9 - Prob. 2TFQCh. 9 - Prob. 3TFQCh. 9 - Prob. 4TFQCh. 9 - Prob. 5TFQCh. 9 - Prob. 6TFQCh. 9 - Prob. 7TFQCh. 9 - Prob. 8TFQCh. 9 - Prob. 9TFQCh. 9 - Prob. 10TFQ
Ch. 9 - Prob. 11TFQCh. 9 - Prob. 12TFQCh. 9 - Prob. 13TFQCh. 9 - Prob. 14TFQCh. 9 - Prob. 15TFQCh. 9 - Prob. 16TFQCh. 9 - Which of the following statements is true...Ch. 9 - Prob. 18MCQCh. 9 - Prob. 19MCQCh. 9 - Prob. 20MCQCh. 9 - Prob. 21MCQCh. 9 - Prob. 22MCQCh. 9 - Prob. 23MCQCh. 9 - Prob. 24MCQCh. 9 - Which of the following statements is false...Ch. 9 - Prob. 26MCQCh. 9 - Prob. 27MCQCh. 9 - Prob. 28MCQCh. 9 - Prob. 29MCQCh. 9 - Prob. 30MCQCh. 9 - Prob. 31MCQCh. 9 - Prob. 32MCQCh. 9 - Refer to Exhibit 9.1. Which accounts are relevant...Ch. 9 - Prob. 34RSCQCh. 9 - Prob. 35RSCQCh. 9 - An important task ¡n the audit of the revenue...Ch. 9 - Prob. 37RSCQCh. 9 - Prob. 38RSCQCh. 9 - Prob. 39RSCQCh. 9 - Prob. 40RSCQCh. 9 - Prob. 41RSCQCh. 9 - Prob. 42RSCQCh. 9 - Prob. 43RSCQCh. 9 - Prob. 45RSCQCh. 9 - Prob. 46RSCQCh. 9 - Prob. 47RSCQCh. 9 - Stainless Steel Specialties (SSS) is a...Ch. 9 - Prob. 49RSCQCh. 9 - Prob. 50RSCQCh. 9 - Prob. 51RSCQCh. 9 - Prob. 52RSCQCh. 9 - Prob. 53RSCQCh. 9 - Prob. 54RSCQCh. 9 - Prob. 55RSCQCh. 9 - Prob. 56RSCQCh. 9 - Prob. 57RSCQCh. 9 - Prob. 58RSCQCh. 9 - Prob. 59RSCQCh. 9 - Prob. 60RSCQCh. 9 - Prob. 61RSCQCh. 9 - Prob. 62RSCQCh. 9 - Prob. 63RSCQCh. 9 - Prob. 64RSCQCh. 9 - Prob. 65RSCQCh. 9 - Prob. 66RSCQCh. 9 - Prob. 67RSCQCh. 9 - Prob. 68RSCQCh. 9 - Prob. 69RSCQCh. 9 - Prob. 70RSCQCh. 9 - Prob. 71RSCQCh. 9 - Read the following scenario about Strang...Ch. 9 - Prob. 73RSCQCh. 9 - Prob. 74RSCQCh. 9 - ZYNGA (LO Z 3, 4, 5, 6, 8) Refer to the Why It...Ch. 9 - Prob. 76FFCh. 9 - UTSTARCOM, INC. (LO 2, 3, 4, 5, 6, 8) UTStarcom is...Ch. 9 - Prob. 78FFCh. 9 - Prob. 79FF
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- answer quicklyarrow_forwardWhat is a good response to... 1. Embezzlement can result from: skimming cash, manipulating refunds, or creating fake transactions. It is possible that the coworker could have inflated expenses, recorded false refunds, or pocketed cash from sales without recording them in the system. Another possibility is underreporting sales or voiding transactions and then taking the difference. 2. Using the store’s accounting software, there is the option to analyze transaction logs for unusual activity i.e. high numbers of refunds, voided transactions, or manual adjustments. Cross-checking daily sales reports, register totals, and bank deposits are also another way to identify missing funds. 3. Finding should be reported to the supervisor/store manager and/or loss prevention department. 4. No, I would not confront my coworker as confronting them could jeopardize the investigation and raise tensions with that individual. Instead, I would just relay my finding to management and document when that…arrow_forwardased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments.arrow_forward
- Assume you are considering an entity’s internal controls over credit sales and cash collection. System documentation was accomplished through a questionnaire and written narratives and, in conjunction with a transaction walk-through, revealed the following potential weaknesses in internal control, some of which, depending on their severity, could prompt you to set control risk at the maximum. a. New customers are not approved before ordered good are shipped. b. Sales prices vary from customer to custom. c. No approval is required for returned goods from customers. d. Subsidiary accounts receivable records do not always agree with the general ledger control account. e. Blank checks are left unprotected in an unlocked safe. Required: For each potential weakness, indicate a control or controls that management could implement to reduce the likelihood of errors or frauds. Case 4 (Adapted) During your audit of Grace Company’s December 31, 2013 financial…arrow_forwardWhich of the following is NOT an issue with the Bradmark internal controls as it pertains to the revenue cycle? James Walker authorizes and executes transactions. The credit manager verbally authorizes credit increases. The warehouse clerk has access to assets and record keeping. Mary receives checks and remittances from the customer.arrow_forwardWhich of the following is false about accounting information systems? A. They provide reports that people analyze. B. They prevent errors and stop employees from stealing inventory. C. They are designed to gather data about the companys transactions. D. They consist of processes that involve input of data from source documents, processing, output, and storage.arrow_forward
- Accounting What role does internal control play in ensuring accurate revenue recognition and preventing fraud?arrow_forwardChoose only one answer as well as state their reasons/rationale for the answer chosen. 3) A sales representative mistakenly entered a nonexistent account number into the system. As a result, the goods were shipped but the customer was never billed. Which type of control would be most effective in preventing this type of problem?a. Turnaround documentb. Completeness checkc. Field checkd. Validity checke. Check digit verificationarrow_forwardWhich one of the following is not an objective of a system of internal controls? Select one: 1. Overstate liabilities in order to be conservative 2. Enhance the accuracy and reliability of accounting records 3. Safeguard company assets 4. Reduce the risks of errorsarrow_forward
- Assertion Associations. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15).Required:For each error/control objective, identify the assertion about classes of transactions and events most benefited by the control.arrow_forwardNeed help for this questionarrow_forwardWhich of the following is false about accounting information systems?A. They provide reports that people analyze.B. They prevent errors and stop employees from stealing inventory.C. They are designed to gather data about the company’s transactions.D. They consist of processes that involve input of data from source documents, processing, output, andstorage.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPrinciples of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub
Revenue recognition explained; Author: The Finance Storyteller;https://www.youtube.com/watch?v=816Q6pOaGv4;License: Standard Youtube License