FINANCIAL ACCT-CONNECT
8th Edition
ISBN: 9781266627903
Author: Wild
Publisher: INTER MCG
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
The flowchart labeled Problem 14 depicts the responsibilities of an accounting clerk in a small company.
Required
Identify any control problems in the system.
What sorts of fraud are possible in this system?
As the CFO of the organization, you are
currently working at, you have been charged
with creating new policies and procedures
with the IT department. As the CFO you
currently oversee payroll, cash collections
(revenue), and cash disbursements (expenses).
What are some detection controls that you
could put in place for those modules within a
system?
Andy is a junior accounts clerk. Andy has the responsibility of keying transactions into the accounting information system. Andy also has the authorization and sanctions to post those journal entries into the ledger.
Identify the risk(s) in the situation and assess what and how controls can be deployed to this situation.
Chapter 6 Solutions
FINANCIAL ACCT-CONNECT
Ch. 6 - List the seven braod principles of internal...Ch. 6 - Prob. 2DQCh. 6 - Prob. 3DQCh. 6 - Prob. 4DQCh. 6 - Prob. 5DQCh. 6 - Prob. 6DQCh. 6 - Prob. 7DQCh. 6 - Prob. 8DQCh. 6 - Prob. 9DQCh. 6 - Prob. 10DQ
Ch. 6 - Prob. 11DQCh. 6 - Prob. 12DQCh. 6 - Prob. 13DQCh. 6 - Prob. 1QSCh. 6 - Prob. 2QSCh. 6 - Prob. 3QSCh. 6 - Prob. 4QSCh. 6 - Prob. 5QSCh. 6 - Prob. 6QSCh. 6 - Prob. 7QSCh. 6 - Prob. 8QSCh. 6 - Prob. 9QSCh. 6 - Prob. 10QSCh. 6 - Prob. 1ECh. 6 - Prob. 2ECh. 6 - Prob. 4ECh. 6 - Prob. 5ECh. 6 - Prob. 6ECh. 6 - Prob. 7ECh. 6 - Prob. 8ECh. 6 - Prob. 9ECh. 6 - Prob. 10ECh. 6 - Prob. 11ECh. 6 - Prob. 12ECh. 6 - Prob. 13ECh. 6 - Prob. 1PSACh. 6 - Prob. 2PSACh. 6 - Prob. 3PSACh. 6 - Prob. 4PSACh. 6 - Prob. 1PSBCh. 6 - Prob. 2PSBCh. 6 - Prob. 3PSBCh. 6 - Prob. 4PSBCh. 6 - Prob. 6SPCh. 6 - Prob. 2BTNCh. 6 - Prob. 3BTNCh. 6 - Prob. 4BTNCh. 6 - Prob. 7BTNCh. 6 - Prob. 8BTNCh. 6 - Prob. 9BTN
Knowledge Booster
Similar questions
- y to the physiclan who is the managing partner. 10 All four clerical employees perform their tasks on PCs that are connected through a local area network. Each PC is accessible with a password that is known only to the individual employee and the managing partner. Southwest uses a standard software package that was acquired from a software company and that cannot be modifled by Southwest's employees. None of the clerical employees are able to write checks on the company's account. For each of the following conditions, indicate whether they represent an internal control "strength" or "deficiency." If the condition is not an internal strength or deficiency, respond that the condition is "neither." 02:15:41 Conditions a. Computer software cannot be modified by Southwest's employees. The office manager approves the extension of credit to patients and also approves the write-offs of uncollectible patient b. receivables. Prenumbered service slips are accounted for on a monthly basis by the…arrow_forwardAndy is a junior accounts clerk. Andy has the responsibility of keying transactions into the accounting information system. Andy also has the authorization and sanctions to post those journal entries into the ledger. Required: Identify the risk(s) in the situation and assess what and how controls can be deployed to this situation.arrow_forwardFollowing are five separate cases involving internal control issues. Required: 1. For each case, identify the principle(s) of internal control that is violated. a. Chi Han receives all incoming customer cash receipts for her employer and posts the customer payments to their respective accounts. b. Sutton Company has two employees handling acquisitions of inventory. One employee places purchase orders and pays vendors. The second employee receives the merchandise. c. Ben Shales prides himself on hiring quality workers who require little supervision. As office manager, Ben gives his employees full discretion over their tasks and for years has seen no reason to perform independent reviews of their work. d. At Tico Company, Julia and Trevor alternate lunch hours. Julia is the petty cash custodian, but if someone needs petty cash when she is at lunch, Trevor fills in as custodian. e. Nori Nozumi posts all patient charges and payments at the Hopeville Medical Clinic. Each night Nori backs up…arrow_forward
- The best way to enact a broad fraud prevention program is toa. Install airtight control systems of checks and supervision.b. Name an “ethics officer” who is responsible for receiving and acting on fraud tips.c. Place dedicated hotline telephones on walls around the workplace with direct communication to the company ethics officer.d. Practice management “of the people and for the people” to help them share personal and professional problems.arrow_forwardThe best way to enact a broad fraud prevention program is toa. Install airtight control systems of checks and supervision.b. Name an ethics officer who is responsible for receiving and acting upon fraud tips.c. Place dedicated hotline telephones on walls around the workplace with direct communication to the company ethics officer.d. Establish a corporate culture conducive to ethical behavior in the workplacearrow_forwardA company employs three accounts payable clerks and one treasurer. Their responsibilities are as follows: Employee Responsibility Clerk 1 Reviews vendor invoices for proper signature approval Clerk 2 Enters vendor invoices into the accounting system and verifies payment terms Clerk 3 Posts entered vendor invoices to the accounts payable ledger for payment and mails checks. Treasurer Reviews the vendor invoices and signs each check. Which of the following would indicate a weakness in the company’s internal control?a. Clerk 1 opens all of the incoming mail.b. Clerk 2 reconciles the accounts payable ledger with the general ledger monthly.c. Clerk 3 mails the checks and remittances after they have been signed.d. The treasurer uses a stamp for signing checks.arrow_forward
- Consider the following short case as you respond to the question:SPC Corporation sells computer security software. They maintain their AIS using general ledger software; data files are backed up twice a day. Sales staff can access the customer database, inventory files and general ledger, as well as sales-related documents such as invoices and sales orders. Newly hired sales staff members at SPC receive the company procedures manual which explains the process used to complete the steps in the sales/collection process. To minimize costs, SPC designates up to five sales staff members each month who can do credit checks for all new customers in addition to processing sales. SPC bills its clients monthly and uses the balance forward method of accounting for receivables; all cash receipts from clients are processed using a lockbox procedure. The lockbox firm's fee is 3% of all collections. SPC's accounting department estimates bad debts at the end of each fiscal year; they are normally…arrow_forwardDetermine whether each procedure described below is an internal control strength or weakness; then identify the internal control violated or followed for each procedure. The company does not use electronic time clocks because it fears it will hurt employee morale. The same employee requests, records, and makes payment for purchases of inventory. Several salesclerks share the same cash drawer. Employees that handle easily transferable assets such as cash are bonded. The company devotes resources towards keeping accurate accounting records for machineryarrow_forwardCharles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) discussed in lectures network risks and auditing could you use to help detect this type of fraud?arrow_forward
- Which of the following is NOT an example of an opportunity to commit fraud in the accounting information system? a. The need to sell confidential information from the database for cash to pay for his medical bills b. User names and passwords of most employees are stored in a shared Google document file c. The employee's discovery that passwords are not required to enter any modules in the accounting information system d. Supervisors are not required to approve transactions entered into by their staff in the accounting systemarrow_forwardWhich of the following is an example of poor internal control in an organization?a. The company rotates employees through various jobs.b. The accounting department compares goods received with the related purchase order.c. The mailroom clerk records daily cash receipts in the journal.d. Employees must take vacations.arrow_forwardRichard Palm is the accounting clerk of Olive Limited. He uses the source documents such as purchase orders, sales invoices, and suppliers’ invoices to prepare journal vouchers for general ledger entries. Each day he posts the journal vouchers to the general ledger and the related subsidiary ledgers. At the end of each month, he reconciles the subsidiary accounts to their control accounts in the general ledger to ensure they balance. Discuss the internal control weaknesses and risks associated with the above process. (maximum 300 words)arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,