Horngren's Financial & Managerial Accounting (5th Edition)
5th Edition
ISBN: 9780133866292
Author: Tracie L. Miller-Nobles, Brenda L. Mattison, Ella Mae Matsumura
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter C, Problem C.1CTFC
Didrikson Rubin, the auditor of Red Barn Farm Equipment, was verifying cash payments to vendors for the past several months. She noticed that several checks had been paid to a specific vendor, but she couldn’t find a record of the transactions in the computerized system. Didrikson suspects that an employee is issuing checks to a fictitious “vendor” and then deleting the transactions from the computerized system. How might Didrikson investigate the suspected fraud?
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
An auditor suspects that certain client
employees are ordering merchandise for
themselves over the Internet without recording
the purchase or receipt of the merchandise.
When vendors' invoices arrive, one of the
employees approves the invoices for payment.
After the invoices are paid, the employee
destroys the invoices and the related vouchers.
In gathering evidence regarding the fraud, the
auditor most likely would select items for testing
from the file of all:
Multiple Choice
Cash disbursements.
Approved vouchers.
Receiving reports.
Vendors' invoices.
Baker is an auditor for ABC Company. As part of a proactive fraud audit, Baker runs the following tests: (1) a review of the Sales Register for dormant customer accounts that posted a sale within the last two months; and (2) a comparison of the Sales Register and the Shipment Register for shipping documents that have no associated sales order. Taken together, what type of non-cash scheme is Baker most likely to find with these tests? Explain how each one might identify fraud.
Allison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.
Chapter C Solutions
Horngren's Financial & Managerial Accounting (5th Edition)
Ch. C - Prob. 1QCCh. C - Prob. 2QCCh. C - Prob. 3QCCh. C - Prob. 4QCCh. C - Prob. 5QCCh. C - Centex Sound Systems purchased merchandise...Ch. C - Every transaction recorded in the cash payments...Ch. C - Prob. 8QCCh. C - Prob. 9QCCh. C - What is an accounting information system (AIS)?
Ch. C - Prob. 2RQCh. C - Explain the three basic components of an...Ch. C - Prob. 4RQCh. C - What is the purpose of a subsidiary ledger?Ch. C - Prob. 6RQCh. C - List the four special journals often used in a...Ch. C - Explain the posting process of the sales journal.Ch. C - Provide some examples of transactions that would...Ch. C - Explain the posting process of the cash payments...Ch. C - When is the general journal used in a manual...Ch. C - Prob. 14RQCh. C - Prob. 15RQCh. C - Prob. 16RQCh. C - How would a business record a sale of services on...Ch. C - Prob. 18RQCh. C - Evaluating features of an effective accounting...Ch. C - Prob. C.2SECh. C - Identifying special journals Use the following...Ch. C - Prob. C.4SECh. C - Prob. C.6SECh. C - Prob. C.8SECh. C - Prob. C.9SECh. C - Prob. C.10SECh. C - Posting transactions from a cash payments journal...Ch. C - Prob. C.12SECh. C - Prob. C.13SECh. C - Recording transactions-sales journal Feb. 1 Sold...Ch. C - Prob. C.15ECh. C - Prob. C.16ECh. C - Prob. C.17ECh. C - Prob. C.18ECh. C - Prob. C.19ECh. C - Prob. C.20ECh. C - Prob. C.21ECh. C - Prob. C.22ECh. C - Prob. C.23ECh. C - Prob. C.24APCh. C - Using the purchases, cash payments, and general...Ch. C - Prob. C.26APCh. C - Prob. C.27BPCh. C - Prob. C.28BPCh. C - Prob. C.29BPCh. C - Prob. C.30CPCh. C - Prob. C.31PSCh. C - Prob. 1COPCh. C - Prob. C.1CTDCCh. C - Didrikson Rubin, the auditor of Red Barn Farm...Ch. C - Communication Activity C-1 In 150 words or fewer,...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardAll-Around Sound Co. discovered a fraud whereby one of its front office administrative employees used company funds to purchase goods such as computers, digital cameras, and other electronic items for her own use. The fraud was discovered when employees noticed an increase in the frequency of deliveries from vendors and the use of unusual vendors. After some investigation, it was discovered that the employee would alter thedescription or change the quantity on an invoice in order to explain the cost on the bill.What general internal control weaknesses contributed to this fraud?arrow_forwardYou are a forensic accountant for a public accounting firm whose client hired your team to perform a fraud investigation of the accounts payable processes. As part of your fraud testing, you have acquired vendor data including bank accounts to which payments are sent and employee data including bank accounts for direct deposit of paychecks. You need to compare the main vendor table to the main employee table to search for potential fictitious vendors. Analyze the fields in the two tables on the next page, looking for identical or similar fields. Based on what you find, identify three red flags for accounts payable fraud. Provide the record numbers from the tables in your answer. Vendor record # Employee Record# ________ ___________ ________ ____________ _________ ____________arrow_forward
- You are a forensic accountant for a public accounting firm whose client hired your team to perform a fraud investigation of the accounts payable processes. As part of your fraud testing, you have acquired vendor data including bank accounts to which payments are sent and employee data including bank accounts for direct deposit of paychecks. You need to compare the main vendor table to the main employee table to search for potential fictitious vendors. Analyze the fields in the two tables on the next page, looking for identical or similar fields. Based on what you find, identify three red flags for accounts payable fraud. Provide the record numbers from the tables in your answer. Vendor record # Employee Record# ________ ___________ ________ ____________ _________ ____________arrow_forwardCharles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in lectures network risks and auditing could you use to help detect this type of fraud?arrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying a premium to the check’s value. He then scanned the check and used a variety of software packages to prepare fictitious paychecks from the employer. The group arrived on the next payday, cashed the checks at the local establishment, and moved to another town before the check was presented for payment at the local bank. This is an example of what type of fraud? a. Input fraud b. Processor fraud c. Computer instruction Fraud d. Data fraud e. Output fraudarrow_forward
- You are the auditor for Office Supply, which is opening a new location next week. The store manager has established all the controls you recommended for ensuring that sales are recorded properly, and cash is accounted for. The manager has heard from other locations that employees often used returned goods as a means of skimming money from the register. Choose one of the following questions to discuss: How might an employee use returned goods to skim money from the register? What controls would you recommend to prevent or detect fraudulent returns? What audit procedures might you perform to detect fraudulent returns?arrow_forwardCarico Ltd, a manufacturer of construction blocks, operates with a fiscal year-end of June 30th, 2021. With a trading history spanning over 25 years, Carico caters to a diverse range of customers, including both large and small hardware stores nationwide. The company's operations encompass a manufacturing plant, five warehouses, and a central head office. Following the manufacturing process, the blocks are stored in one of the warehouses until they are dispatched to customers. It is important to note that Carico currently does not possess an internal audit department. The following is a reflection of the sales system: • • Each customer is assigned a distinct customer account number, which is utilized to input sales orders upon receiving written requests from customers. The responsibility of entering orders lies with an order clerk, and the system performs an automated verification to ensure product availability and prevent the customer from exceeding their credit limit. maintains a New…arrow_forwardRohini works as an accountant with PQR Ltd. She embezzled $20,000 from the company bank account. She was caught in the annual audit of the company. She justified her action saying that her employer has not given any pay rise, so she had to take $20,000 from the account. Explain in your own words the internal control that may have failed in the above situation. Also explain which element of the fraud triangle Rohini is referring to justify her action.arrow_forward
- Jim Block, CFE, is investigating Randy Smith for his role in a potential kickback scheme. Gathering evidence about Randy's financial activity has been difficult. While on a stakeout at Randy's home, Jim sees Randy's wife take out the garbage and place it on the curb. Jim takes the trash bag, sorts through its contents, and discovers multiple bank statements that provide details about some of Randy's illicit financial transactions. Is jim's acquirement of the bank statements legal even though there was no search warrant? Fully explain!arrow_forwardEric Wilson works at Lime Inc. He used Lime Inc.'s Sam's Club card to make personal purchases. Immediately before the company paid the bill for the Sam's Club charges each month, Eric placed his receipt in with the legitimate work-related receipts for Sam's Club. The accounts payable clerk rarely verified that the receipts were signed by authorized employees or that the purchases were actually for work-related items. What type of fraud is this? Forged maker Pay and return Personal purchases Pass-through 4arrow_forwardAn auditor suspects that a client's cashier is misappropriating cash receipts for personal use by lapping customer checks received in the mail. In attempting to uncover this embezzlement scheme, the auditor most likely would compare the Group of answer choices Daily cash summaries with the sums of the cash receipts journal entries. Individual bank deposit slips with the details of the monthly bank statements. Dates checks are deposited per bank statements with the dates remittance credits are recorded. Dates uncollectible accounts are authorized to be written off with the dates the write-offs are actually recorded.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Business Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:Cengage
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License