Matching Type: Choose appropriate controls with the given possible frauds and errors. - You can choose multiple controls for 1 number of possible errors and controls - controls already answered from preceding number can still be answered for succeeding number.
Q: What features of Kerberos were included to make it more resistant to assaults in dispersed…
A: This question tells about features of Kerberos were included to make it more resistant to assaults…
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: Internal controls: The process is designed, implemented, and maintained by those charged with…
Q: Well-designed internal control will prevent all fraud by top management. True or False
A: A WELL-DESIGNED INTERNAL CONTROL SYSTEM WILL NOT PREVENT ALL THE FRAUD BY TOP MANAGEMENT . A…
Q: Refer to the given system flowchart, and we have discussed the control weakness and the risk…
A: Frauds in sales department are as follows: Recording fake invoices Misrepresenting the excessive or…
Q: Which of the following statements about the client-server model is correct?a. It is best suited to…
A: Accounting Information system is a set of components used for gathering, making, storing, preparing,…
Q: 1. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be…
A: Introduction: Internal controls are policies and procedures framed by companies to ensure that the…
Q: Which of the following is NOT a test for identifying application errors? a. reconciling the source…
A: Application errors are those errors which occur when an application fails to work according to the…
Q: Give one example of an error that a check digit control detects.
A:
Q: When a fraud has occurred within an organization, management must decide what follow-up action (s)…
A: An organization usually does not take any legal action against the person who has done fraud as it…
Q: Refer to the given system flowchart, and we have discussed the control weakness and the risk…
A: Business risks are associated with the internal control systems that every company needs to follow.…
Q: This method of documenting understanding of internal control structure is advantageous because it…
A: This method of documenting understanding of internal control structure is advantageous because it…
Q: Refer to the system flowchart labeled Problem 4.Requireda. Discuss the uncontrolled risks associated…
A: Accounting information system is system which used by businesses for storing, collecting, managing,…
Q: Choose only one answer as well as state their reasons/rationale for the answer chosen. 7) Which…
A: Size check restricts the length of the characters to be entered as an input in a particular field.…
Q: The practice of bringing specific issues to the attention of management if they depart from…
A: Management by exception is a recognition and interaction device that alerts a manager whenever and…
Q: Each of the following are input controls. Please give an example of how they may be used: Thank…
A: 1). Range check Range check is a check which can be applied on numeric fields. This check ensure…
Q: For each of the following file processing operations, indicate whether a sequential file, indexed…
A: Access Method: Access method is the method by which data stored in the database can be located or…
Q: the procedures used to test the effectiveness of controls in support of a reduced assessed control…
A: Auditors generally test operating effectiveness of controls selected for testing by analysing that…
Q: Following is a list of eight generic control goals (A-H), followed by eight descriptions of either…
A: Control goals can be defined as the business process objectives which is a part of internal control…
Q: Refer to the given system flowchart, and we have discussed the control weakness and the risk…
A: Frauds in sales department are as follows: Recording fake invoices Misrepresenting the excessive or…
Q: A DDos attacka. is more intensive than a Dos attack because it emanates from single source.b. may…
A: DDoS Attack: Distributed denial of service (DDoS) attack is an attempt where the victims are…
Q: Controls used in the management of a computer center to minimize the possibility of using an…
A: Auditing is the process by which assertions made by management about financial transactions of a…
Q: Why is human behavior considered one of the biggest potential threats to operating system…
A: “Since you have asked multiple questions, we will solve the first question for you. If you want a…
Q: Which of the following is least likely to be a general control over computer activities? a.…
A: Audit is conducted in order to verify whether the financial statements are accurately presented.…
Q: The purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b.…
A: The purpose of a checkpoint procedure is to facilitate restarting after data processing errors.
Q: Following is a list of eight generic control goals (A-H), followed by eight descriptions of either…
A: Given: Control Goals A Ensure effectiveness of operations B Ensure efficient employment of…
Q: a. Identify the internal control weaknesses in this system. b. Describe the uncontrolled risks that…
A: Internal Control Weaknesses: Internal control weaknesses can be defined as the lack of the…
Q: When is the timing of substantive procedures most flexible? O detection risk is assessed as low O…
A: Substantive procedure refers to a process performed by the auditor in order to detect the material…
Q: Select the correct answer(s) for the following multiple-choice questions. Note that there may be…
A: b) The type of computer fraud that is the most difficult because it requires the most skill is…
Q: Match each word or phrase with the best description of it. Descriptions Words / Phrases…
A: Answer a: Allows multiple users to access the system at the same time.- Network - Compatible…
Q: The advantages to using a partitioned database approach include all of the following EXCEPT a. the…
A: Computerized accounting includes using the computers and accounting software for recording, storing…
Q: Which of the following is not a risk specific to CIS environment ? a. reliance on the…
A: CIS environment refers to using of Computer in order to perform the processing of the entity, in…
Q: 1. _____ are controls that do not rely on the client's information technology (IT) environment for…
A: Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: Which of the following is a component of general controls? a. processing controls b.…
A: General controls are the IT/computerized controls that are applicable to the entire organization and…
Q: Controls over data management systems fall into two categories: access controls and backup controls.…
A: Data Management System: It is a software program that is used to create, modify, retrieve, and…
Q: Three difficulties associated with using embedded audit software as part of the audit process.
A: Auditing software are used to assist the auditors in the process of auditing. Various auditing…
Q: Question 7 Z scores are: A. Used to evaluate the quality of imaged files B. Used to identify…
A: Introduction:- It describes a value's relationship to the mean of a group of values. Z score is…
Q: For this assignment, you are to construct a diagram of the Fraud Triangle and clearly label each…
A: The fraud triangle is a concept that auditors use to explain why someone might choose to conduct a…
Q: Can you verify step 2 from the answer with error?Thanks
A: Solution b: Contribution margin per unit = Selling price per unit - Variable cost per unit = $15 -…
Q: implementation (any of these steps: ERP product brand selection, module design, installation,…
A: Answer: Threat 1: Losing Data - Data recorded after implementation of ERP might be lost due to…
Q: An employee in the receiving department keyed in a shipment from a remote terminal and inadvertently…
A: System Control: System control can be defined as a set of procedures used for controlling and…
Q: Is a POS system that uses bar coding and a laser light scanner foolproof against inaccurate updates?…
A: POS System: Point of sale system is implemented in retail sectors where sale transaction takes…
Q: General Controls. Indicate the benefits of each of the following examples of general controls. a.…
A: a) Echo checks are designed and built in to the computer by the manufacturer. This enables the…
Q: Discuss six ways that threats from destructive programs can be substantially reduced through a…
A: It controls the reduce the threats posed by malicious software system integrity and security are two…
Q: Hackers can disguise their message packets to look as if they came from an authorized user and gain…
A: The right answer is option a . spoofing.
Matching Type: Choose appropriate controls with the given possible frauds and errors.
- You can choose multiple controls for 1 number of possible errors and controls
- controls already answered from preceding number can still be answered for succeeding number.
Step by step
Solved in 2 steps
- Choose the one correct answer 3. If the objective of a test of detail of transaction is to detect overstatement of sales, the auditor’s direction of testing should be from: * A. Cash receipts journal to sales journalB. Sales journal to cash receipt journalC. Source documents to accounting recordsD. Accounting records to source documentsE. None of the above 5. The following statements relate to nature of positive and negative confirmation requests. Which statement is true? *A. In positive confirmation, the customer is requested to reply directly to the client stating whether the balance appearing in the reply portion of the confirmation request is correct or not, and if not, to indicate details of difference.B. In a negative confirmation, the customer is asked to sign a confirmation form showing the account balance and return it in a stamped, addressed enveloped that is enclosedC. A positive confirmation request seeks a response from the debtor as to whether or not the balance is…Which of the following errors will be detected by a trial balance? a. Posting a credit to Sales instead of the Accounts Payable b. Incorrecty computing the balance of the cash account c. Not journalizing a complete sales transaction d. Forgetting to post a complete purchase transaction1. As an accountant, why you need to study the revenue cycle? 2. If you are going to audit the cash receipts cycle, what are the things you need to prepare? 3. Some large businesses have adopted Invoiceless pricing for business-to-business transactions. What do you think are the barriers, if any, to its use in sales to consumers? 4. How could an employee embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of duties and authorization controls were not in place?
- A company that records credit purchases in a purchases journal and records purchases returns in a general journal made the following errors. Enter A, B, or C indicating when each error should be discovered. A. When preparing the schedule of accounts payable. B. When crossfooting the purchases journal. C. When preparing the trial balance. 1. Made an addition error in totaling the Office Supplies column of the purchases journal. 2. Made an addition error in determining the balance of a creditor’s subsidiary account. 3. Posted a purchases return to the Accounts Payable account and to the creditor’s subsidiary account but did not post the purchases return to the Inventory account. 4. Correctly recorded an $8,000 purchase in the purchases journal but posted it to the creditor’s subsidiary account as an $800 purchase. 5. Posted a purchases return to the Inventory account and to the Accounts Payable account but did not post to the creditor’s subsidiary account.Which, if any,of the followingsituations represent improper segregationof functions? Explain your answer. a. The billing deparment prepares the customers' invoices and records the sale in the sales journal. b. Mail room clerk opens cash receipts envelopes from customers and also prepares the remittance list. c. Accounting clerk receives journal vouchers from various departments and also posts to the GL accounts. d. The sales department approves sales credit memos as the result of product returns and forwards these to the AR department, which adjusts the customer accounts to reflect the return.What internal control procedure(s) would provide protection against the following threats? a. Theft of goods by the shipping dock workers, who claim that the inventory shortages reflect errors in the inventory records.b. Posting the sales amount to the wrong customer account because a customer account number was incorrectly keyed into the system .c. Making a credit sale to a customer who is already four months behind in making payments on his account. d. Authorizing a credit memo for a sales return when the goods were never actually returned. e. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. f. Billing customers for the quantity ordered when the quantity shipped was actually less due to back ordering of some items .g. Lost sales because of stockouts of several products for which the computer records indicated there was adequate quantity on hand. h. A sales clerk sold a $7,000 wide-screen TV…
- 1. Granting the credit is one business function of the sales returns and allowance class of transaction. True False 2. The revenue should be recognized by the company once the cash is collected. False True 3. Which one of the following procedures performed for the billing function provides evidence for the occurrence assertion? a. Making sure that no shipment has been billed more than twice or to the wrong customer b. Making sure that each shipment is billed at the correct amount c. Making sure that each shipment is billed on the proper period d. Making sure that all shipments have been billed 4. The sales and collection cycle applies to: a. Non-profit organizations. b. Corporates. c. none of the mentioned answers. d. Governmental Bodies 5. Sales revenue should be recognized when: a. sales are invoiced. b. payment is received from the customer. c. the customer's order is received. d. goods are shipped. 6. Which one…You have Noticed that the A/R clerk has created abnormally high number of credit memos . You also notice the inventory does not reflect the additional inventory resulting from the sales returns. What would you do, and how would you document your decision?A serious exposure in the revenue cycle is customer dissatisfaction. What is the related threat and applicable control procedure that address this exposure? A. failure to bill; separation of billing and shipping functions B. failure to bill; bar-codes and RFID technology C. billing errors; reconciliation of shipping documents to sales order D. theft of cash; using ETFs
- The following misstatements are sometimes found in the salesand collection cycle’s account balances:1. Several cash receipts were posted to the incorrect customer accounts.2. Several accounts receivable in the accounts receivable master file are not includedin the aged trial balance.3. One account receivable in the accounts receivable master file is included on theaged trial balance twice.4. A shipment made in the subsequent period is recorded as a current period sale.5. The allowance for uncollectible accounts is inadequate because of the client’sfailure to reflect depressed economic conditions in the allowance.6. Several accounts receivable are in dispute as a result of claims of defective merchandise.7. The pledging of accounts receivable to the bank for a loan is not disclosed in thefinancial statements.8. Goods were returned for credit on the last day of the fiscal year but the sales returnwas not recorded until the following fiscal year.9. Long-term interest-bearing notes…1. A threat to the expenditure cycle that involves an employee creating and approving fictitious purchase orders is known as: A. Inventory theft B. Unauthorized access C. Check tampering D. Billing schemes 2. Purchase orders are used to initiate a payment in the disbursement cycle. True or False 3.Vendor audits are conducted to address the threat of unauthorized access in the disbursement cycle. True or falseWhich of the following is not an example of control procedures over accounts receivable? A.Monitoring the total amount of "credit card sales" and investigating reasons for increases in the amount B.Sending monthly statements to customers who purchased on credit C.Denying additional credit to customers with very overdue accounts D.Requiring customers complete a credit application before granting credit to the customer