Working Papers, Chapters 1-17 for Warren/Reeve/Duchac's Accounting, 26th and Financial Accounting, 14th
26th Edition
ISBN: 9781305392373
Author: Carl Warren, Jim Reeve, Jonathan Duchac
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8.15EX
To determine
Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information.
Five elements of internal control:
- Control Environment: Control Environment refers to the attitude of top brass of the company or the corporate culture. The top brass of the company must set the tone to improve the morale for rest of the employees of the business.
- Risk assessment: The business must be able identify the risk associated with it, and accordingly use the internal control to safeguard its assets and ensures fairness in presentation in accounting information.
- Control procedures: The objective of setting the control procedure is to ensure that the business achieves its objectives.
- Monitoring controls: The internal control used in the business is being monitored by the internal auditors who are hired by the business, to ensure that the employees are adhering to the policies of the business and running the operations efficiently. The external auditors on the other hand ensure that the business accounting records are being maintained in accordance with the Generally Accepted Accounting Principles (GAAP).
- Information and communication: Information and communication system is important for a business and hence only authorized persons should be allowed the access to the confidential accounting information. Approvals are also should be made mandatory for the transactions by the
control system.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
An auditor suspects that certain client
employees are ordering merchandise for
themselves over the Internet without recording
the purchase or receipt of the merchandise.
When vendors' invoices arrive, one of the
employees approves the invoices for payment.
After the invoices are paid, the employee
destroys the invoices and the related vouchers.
In gathering evidence regarding the fraud, the
auditor most likely would select items for testing
from the file of all:
Multiple Choice
Cash disbursements.
Approved vouchers.
Receiving reports.
Vendors' invoices.
Paragon Tech Company, a communications equipment manufacturer, recently fell victim to a fraud scheme developed by one of its employees. To understand the scheme, it is necessary to review Paragon Tech’s procedures for the purchase of services. The purchasing agent is responsible for ordering services (such as repairs to a photocopy machine or office cleaning) after receiving a service requisition from an authorizedmanager. However, because no tangible goods are delivered, a receiving report is not prepared. When the Accounting Department receives an invoice billing Paragon Tech for a service call, the accounts payable clerk calls the manager who requested the service in order to verify that it was performed.The fraud scheme involves Mae Jansma, the manager of plant and facilities. Mae arranged for her uncle’s company, Radiate Systems, to be placed on Paragon Tech’s approved vendor list. Mae did not disclose the family relationship. On several occasions, Mae would submit a requisition…
FRAUD SCHEME – PURCHASING AGENT
A purchasing agent for a large hardware retailer has sole discretion in selecting vendors for the parts and supplies sold by the company. The agent directs a disproportionate number of purchase orders to a supply company owned by the agent’s brother-in-law, which charges above-market prices for its products. The agent’s relationship with the supplier is unknown to his employer.
Required
What type of fraud is this, and what controls can be implemented to prevent or detect a fraud?
2. MAIL ROOM FRAUD AND INTERNAL CONTROL
Sarah Sethi, a professional criminal, took a job as a mail room clerk at Benson & Abernathy Company, a large department store. The mail room was an extremely hectic work environment consisting of a supervisor and 45 clerks. The clerks were responsible for handling promotional mailings, catalogs, and inter office mails, as well as receiving and distributing wide range of outside correspondence to various internal departments. One…
Chapter 8 Solutions
Working Papers, Chapters 1-17 for Warren/Reeve/Duchac's Accounting, 26th and Financial Accounting, 14th
Ch. 8 - Prob. 1DQCh. 8 - Why should the employee who handles cash receipts...Ch. 8 - Prob. 3DQCh. 8 - Why should the responsibility for maintaining the...Ch. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - The balance of Cash is likely to differ from the...Ch. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - (a) How are cash equivalents reported in the...
Ch. 8 - Internal control elements Identify each of the...Ch. 8 - Prob. 8.1APECh. 8 - Prob. 8.2BPECh. 8 - Prob. 8.2APECh. 8 - Prob. 8.3APECh. 8 - Prob. 8.3BPECh. 8 - Prob. 8.4APECh. 8 - Prob. 8.4BPECh. 8 - Prob. 8.5APECh. 8 - Prob. 8.5BPECh. 8 - Sarbanes-Oxley internal control report Using...Ch. 8 - Prob. 8.2EXCh. 8 - Prob. 8.3EXCh. 8 - Prob. 8.4EXCh. 8 - Prob. 8.5EXCh. 8 - Prob. 8.6EXCh. 8 - Prob. 8.7EXCh. 8 - Prob. 8.8EXCh. 8 - Prob. 8.9EXCh. 8 - Prob. 8.10EXCh. 8 - Prob. 8.11EXCh. 8 - Prob. 8.12EXCh. 8 - Prob. 8.13EXCh. 8 - Internal control of cash payments Abbe Co. is a...Ch. 8 - Prob. 8.15EXCh. 8 - Prob. 8.16EXCh. 8 - Prob. 8.17EXCh. 8 - Prob. 8.18EXCh. 8 - Prob. 8.19EXCh. 8 - Prob. 8.20EXCh. 8 - Prob. 8.21EXCh. 8 - Prob. 8.22EXCh. 8 - Prob. 8.23EXCh. 8 - Prob. 8.24EXCh. 8 - Prob. 8.25EXCh. 8 - Cash to monthly cash expenses ratio El Dorado Inc....Ch. 8 - Prob. 8.27EXCh. 8 - Prob. 8.28EXCh. 8 - Prob. 8.1APRCh. 8 - Prob. 8.2APRCh. 8 - Prob. 8.3APRCh. 8 - Prob. 8.4APRCh. 8 - Prob. 8.5APRCh. 8 - Prob. 8.1BPRCh. 8 - Prob. 8.2BPRCh. 8 - Prob. 8.3BPRCh. 8 - Prob. 8.4BPRCh. 8 - Prob. 8.5BPRCh. 8 - Ethics in Action During the preparation of the...Ch. 8 - Prob. 8.2CPCh. 8 - Prob. 8.3CPCh. 8 - Prob. 8.4CPCh. 8 - Prob. 8.5CPCh. 8 - Prob. 8.7CP
Knowledge Booster
Similar questions
- There are several elements to internal controls. Which of the following would not address the issue of having cash transactions reported in the accounting records? A. One employee would have access to the cash register. B. The cash drawer should be closed out, and cash and the sales register should be reconciled on a prenumbered form. C. Ask customers to report to a manager if they do not receive a sales receipt or invoice. D. The person behind the cash register should also be responsible for making price adjustments.arrow_forwardWhat is the advantage of using technology in the internal control system? A. Passwords can be used to allow access by employees. B. Any cash received does not need to be reconciled because the computer tracks all transactions. C. Transactions are easily changed. D. Employees cannot steal because all cash transactions are recorded by the computer/cash register.arrow_forwardRequired: Which internal control(s) would you recommend to prevent the following situations from occurring? Situation a. Authorization of a credit memo for a customer's account (on receivables) when the goods were never actually returned. b. Theft of funds by the cashier, who cashed several checks and did not record their receipt. c. Inventory stolen by receiving dock personnel. The receiving clerk claimed the inventory was sent to the warehouse, but the warehouse clerk did not record properly. d. Writing off a customer's accounts receivable balances as uncollectible in order to conceal the theft of subsequent cash collections. e. Billing customers for the quantity ordered when the quantity shipped was actually less due to back- ordering of some items. Answerarrow_forward
- 1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardSadaf Oman Co. is using internal control procedures to mitigate the risks to which it is exposed. Listed below are some internal control procedures applicable to Sadaf Oman Co's revenues and receivable system. Match the most appropriate one of the following risks mitigated to the correct internal control procedure stated below. Risks mitigated: (A) Sales staff misappropriate sales receipts then write off bad debts in the general ledger (B) Sales are made to customers who cannot pay (C) Sales are not made to existing customers (D) Sales staff do not communicate with the accounts staff regularly, so the debt uncollected at the end of the period are written off in the ledger by the accounts staff (E) Customer refuses to pay for goods allegedly not received (F) Customer orders are not being fulfilled. (G) Revenues on books are overstated and exceed actual revenues in bank (H) Posting a sale that is beyond the credit limit of the customers ) Company employees steal collections (U) Without…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Financial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning