Accounting
27th Edition
ISBN: 9780357155899
Author: Carl S. Warren; James M. Reeve; Jonathan Duchac
Publisher: Cengage Learning US
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 8, Problem 5DQ
To determine
Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations.
The following are the some of the internal control procedures:
- Competent personnel, rotating duties, and mandatory vacations
- Separating responsibilities for related operations
- Separating operations, custody of assets, and accounting
- Proofs and security measures
To describe: The internal control procedure that will prevent or detect fraud.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Assume that Brooke Miles, accounts payable clerk for West Coast Design Inc., stole $48,350 by paying fictitious invoices for goods that were neverreceived. The clerk set up accounts in the names of the fictitious companies and cashed the checks at a local bank. Describe a control procedure thatwould have prevented or detected the fraud.
Assume that Brooke Miles, accounts payable clerk for West Coast Design Inc., stole $48,350 by paying fictitious invoices for goods that were never received. The clerk set up accounts in the names of the fictitious companies and cashed the checks at a local bank. Please use at least 150 words to describe a control procedure that would have prevented or detected the fraud.
Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?
Chapter 8 Solutions
Accounting
Ch. 8 - Prob. 1DQCh. 8 - Why should the employee who handles cash receipts...Ch. 8 - Prob. 3DQCh. 8 - Why should the responsibility for maintaining the...Ch. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - The balance of Cash is likely to differ from the...Ch. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - (a) How are cash equivalents reported in the...
Ch. 8 - Internal control elements Identify each of the...Ch. 8 - Prob. 8.1BPECh. 8 - Prob. 8.2APECh. 8 - Prob. 8.2BPECh. 8 - Prob. 8.3APECh. 8 - Prob. 8.3BPECh. 8 - Prob. 8.4APECh. 8 - Prob. 8.4BPECh. 8 - Prob. 8.5APECh. 8 - Prob. 8.5BPECh. 8 - Sarbanes-Oxley internal control report Using...Ch. 8 - Prob. 8.2EXCh. 8 - Prob. 8.3EXCh. 8 - Prob. 8.4EXCh. 8 - Prob. 8.5EXCh. 8 - Prob. 8.6EXCh. 8 - Prob. 8.7EXCh. 8 - Prob. 8.8EXCh. 8 - Prob. 8.9EXCh. 8 - Prob. 8.10EXCh. 8 - Prob. 8.11EXCh. 8 - Entry for cash sales; cash short The actual cash...Ch. 8 - Entry for cash sales; cash over The actual cash...Ch. 8 - Internal control of cash payments Abbe Co. is a...Ch. 8 - Prob. 8.15EXCh. 8 - Prob. 8.16EXCh. 8 - Prob. 8.17EXCh. 8 - Prob. 8.18EXCh. 8 - Prob. 8.19EXCh. 8 - Prob. 8.20EXCh. 8 - Prob. 8.21EXCh. 8 - Prob. 8.22EXCh. 8 - Prob. 8.23EXCh. 8 - Prob. 8.24EXCh. 8 - Prob. 8.25EXCh. 8 - Cash to monthly cash expenses ratio El Dorado Inc....Ch. 8 - Prob. 8.27EXCh. 8 - Prob. 8.28EXCh. 8 - Prob. 8.1APRCh. 8 - Prob. 8.2APRCh. 8 - Prob. 8.3APRCh. 8 - Prob. 8.4APRCh. 8 - Prob. 8.5APRCh. 8 - Prob. 8.1BPRCh. 8 - Prob. 8.2BPRCh. 8 - Prob. 8.3BPRCh. 8 - Prob. 4BPRCh. 8 - Prob. 5BPRCh. 8 - Ethics in Action Tehra Dactyl is an accountant for...Ch. 8 - Ethics in Action During the preparation of the...Ch. 8 - Prob. 8.5CPCh. 8 - Prob. 8.6CPCh. 8 - Prob. 8.7CPCh. 8 - Prob. 8.8CPCh. 8 - Prob. 8.9CP
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Allison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.arrow_forwardConsider the scenario in which Brooke Miles, an accounts payable clerk for West Coast Design Inc., misappropriated $48,350 by paying false bills for commodities that were never delivered to the company. It was the clerk's responsibility to open accounts in the names of the phony corporations and pay the cheques at a nearby bank. Describe a fraud-prevention or detection method that may have been used to avoid or identify the scam.arrow_forwardDidrikson Rubin, the auditor of Red Barn Farm Equipment, was verifying cash payments to vendors for the past several months. She noticed that several checks had been paid to a specific vendor, but she couldn’t find a record of the transactions in the computerized system. Didrikson suspects that an employee is issuing checks to a fictitious “vendor” and then deleting the transactions from the computerized system. How might Didrikson investigate the suspected fraud?arrow_forward
- The Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…arrow_forwardAn auditor suspects that certain client employees are ordering merchandise for themselves over the Internet without recording the purchase or receipt of the merchandise. When vendors' invoices arrive, one of the employees approves the invoices for payment. After the invoices are paid, the employee destroys the invoices and the related vouchers. In gathering evidence regarding the fraud, the auditor most likely would select items for testing from the file of all: Multiple Choice Cash disbursements. Approved vouchers. Receiving reports. Vendors' invoices.arrow_forwardWhat internal control or procedure(s) would provide protection against the following threats? An employee makes a credit sale to a customer who is already four months behind in making payments on his account. An employee writes off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer Customers are billed for the quantity ordered, but the quantity shipped is actually less because some items have been back ordered. The mailroom clerk steals checks and then endorses them for deposit into the clerk’s personal bank account Goods are shipped to a customer, but that customer is not billed.arrow_forward
- What internal control or procedure(s) would provide protection against the following threats? Customers are billed for the quantity ordered, but the quantity shipped is actually less because some items have been back ordered. The mailroom clerk steals checks and then endorses them for deposit into the clerk’s personal bank account Goods are shipped to a customer, but that customer is not billed.arrow_forward“Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?arrow_forwardTypes of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forward
- Investigating a Fraud. Suppose you are auditing cash disbursements and discover severalpayments to a company you are unfamiliar with and cannot find information about this company on the Internet or in the local telephone directory. The invoices from this company have numbers very close to each other in the sequence, there is no phone number on the invoice, and each bill is for a dollar amount just under the amount that would require additional approvals before payment. Based on this information, you now suspect this may be a fraud.Required:Based on your suspicions, how would you change the audit procedures you would perform, and how might you change the evidence you gather?arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardWhat internal control procedure ( s ) would provide protection against the following threats ? An employee writes off a customer's accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer .arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning