Accounting (Text Only)
Accounting (Text Only)
26th Edition
ISBN: 9781285743615
Author: Carl Warren, James M. Reeve, Jonathan Duchac
Publisher: Cengage Learning
Question
Book Icon
Chapter 8, Problem 8.3CP
To determine

Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations.

Five elements of internal control:

  • Control Environment: Control Environment refers to the attitude of top brass of the company or the corporate culture. The top brass of the company must set the tone to improve the morale for rest of the employees of the business.
  • Risk assessment: The business must be able identify the risk associated with it, and accordingly use the internal control to safeguard its assets and ensures fairness in presentation in accounting information.
  • Control procedures: The objective of setting the control procedure is to ensure that the business achieves its objectives.
  • Monitoring controls: The internal control used in the business is being monitored by the internal auditors who are hired by the business, to ensure that the employees are adhering to the policies of the business and running the operations efficiently. The external auditors on the other hand ensures that the business accounting records are being maintained in accordance with the Generally Accepted Accounting Principles (GAAP).
  • Information and communication: Information and communication system is important for a business and hence only authorized persons should be allowed the access to the confidential accounting information. Approvals are also should be made mandatory for the transactions by the control system.

To suggest: Appropriate control procedures for preventing / detecting the theft of grocery items by failing to scan their prices:

Blurred answer
Students have asked these similar questions
The following is an excerpt from a conversation between the store manager of Wholesome Grocery Stores, Kara Dahl, and Lynn Shutes, president of Wholesome Grocery Stores:Lynn: Kara, I’m concerned about this new scanning system.Kara: What’s the problem?Lynn: Well, how do we know the clerks are ringing up all the merchandise?Kara: That’s one of the strong points about the system. The scanner automatically rings up each item based on its bar code. We update the prices daily, so we’re sure the sale is rung up for the right price.Lynn: That’s not my concern. What keeps a clerk from pretending to scan items and then simply not charging his friends? If his friends were buying 10–15 items, it would be easy for the clerk to pass several items through putting his finger over the bar code or just pass the merchandise through the scanner with the wrong side showing. It would look normal for anyone observing. In the old days, we at least could hear the cash register ringing up each sale.Kara: I see…
Case Study A Scenario A major retailer asked the IS auditor to review their readiness for complying with credit card company requirements for protecting cardholder information. The IS auditor subsequently learned the following information. The retailer uses wireless point-of-sale registers that connect to application servers located at each store. These registers use wired equivalent protection (WEP) encryption. The application server, usually located in the middle of the store’s customer service area, forwards all sales data over a frame relay network to database servers located at the retailer’s corporate headquarters, and using strong encryption over an Internet virtual private network (VPN) to the credit card processor for approval of the sale. Corporate databases are located on a protected screened subset of the corporate local area network. Additionally, weekly aggregate sales data by product line is copied from the corporate databases to magnetic media and mailed to a…
RISK ANALYSIS AND INTERNAL CONTROL The following describes the purchases and cash disbursements procedures for a lawn and garden supply wholesaler that uses a central computer system with distributed terminals in departments. The inventory control clerk visually reviews inventory levels from his computer terminal to identify items that need to be ordered. He then prints and sends a hard copy purchase requisition for the needed items to the purchasing agent. Based on the requisition, the purchasing agent selects a vendor and adds a digital record to the purchase order file from his terminal in the purchasing department. The clerk then prints a hard copy of the purchase order and mails it to the vendor. Finally, the purchasing agent destroys the purchase requisition, which it is no longer needed since the relevant details are on the PO. When the materials arrive at the receiving department a receiving clerk prints a copy of the purchase order from his terminal and reconciles it to the…

Chapter 8 Solutions

Accounting (Text Only)

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Survey of Accounting (Accounting I)
Accounting
ISBN:9781305961883
Author:Carl Warren
Publisher:Cengage Learning
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Text book image
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Text book image
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Text book image
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L