Survey of Accounting (Accounting I)
8th Edition
ISBN: 9781305961883
Author: Carl Warren
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 5.7E
To determine
Introduction:
Separating the responsibility of operations, custody of assets and keeping accounting records is important because it helps in checking the employees and their operating managers for any errors or frauds.
To state:
The strengths and weaknesses of controlassociated to the fraud.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
An auditor suspects that certain client
employees are ordering merchandise for
themselves over the Internet without recording
the purchase or receipt of the merchandise.
When vendors' invoices arrive, one of the
employees approves the invoices for payment.
After the invoices are paid, the employee
destroys the invoices and the related vouchers.
In gathering evidence regarding the fraud, the
auditor most likely would select items for testing
from the file of all:
Multiple Choice
Cash disbursements.
Approved vouchers.
Receiving reports.
Vendors' invoices.
All-Around Sound Co. discovered a fraud whereby one of its front office administrative employees used company funds to purchase goods such as computers, digital cameras, and other electronic items for her own use. The fraud was discovered when employees noticed an increase in the frequency of deliveries from vendors and the use of unusual vendors. After some investigation, it was discovered that the employee would alter thedescription or change the quantity on an invoice in order to explain the cost on the bill.What general internal control weaknesses contributed to this fraud?
What internal control or procedure(s) would provide protection against the following threats?
An employee makes a credit sale to a customer who is already four months behind in making payments on his account.
An employee writes off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer
Customers are billed for the quantity ordered, but the quantity shipped is actually less because some items have been back ordered.
The mailroom clerk steals checks and then endorses them for deposit into the clerk’s personal bank account
Goods are shipped to a customer, but that customer is not billed.
Chapter 5 Solutions
Survey of Accounting (Accounting I)
Ch. 5 - Prob. 1SEQCh. 5 - Prob. 2SEQCh. 5 - Prob. 3SEQCh. 5 - Adjustments to the company’s records based on the...Ch. 5 - Prob. 5SEQCh. 5 - Prob. 1CDQCh. 5 - Prob. 2CDQCh. 5 - Prob. 3CDQCh. 5 - Prob. 4CDQCh. 5 - Prob. 5CDQ
Ch. 5 - Prob. 6CDQCh. 5 - Prob. 7CDQCh. 5 - Prob. 8CDQCh. 5 - Prob. 9CDQCh. 5 - Assume that Leslie Hunter, accounts payable clerk...Ch. 5 - Prob. 11CDQCh. 5 - The accounting clerk pays all obligations by...Ch. 5 - Prob. 13CDQCh. 5 - Prob. 14CDQCh. 5 - Do items reported as a credit memorandum on the...Ch. 5 - Prob. 16CDQCh. 5 - Prob. 17CDQCh. 5 - Prob. 5.1ECh. 5 - Prob. 5.2ECh. 5 - Prob. 5.3ECh. 5 - Prob. 5.4ECh. 5 - Prob. 5.5ECh. 5 - Prob. 5.6ECh. 5 - Prob. 5.7ECh. 5 - Prob. 5.8ECh. 5 - Prob. 5.9ECh. 5 - Prob. 5.10ECh. 5 - Prob. 5.11ECh. 5 - Prob. 5.12ECh. 5 - Prob. 5.13ECh. 5 - Prob. 5.14ECh. 5 - Prob. 5.15ECh. 5 - Prob. 5.16ECh. 5 - Prob. 5.17ECh. 5 - Prob. 5.18ECh. 5 - Prob. 5.19ECh. 5 - Entries for note collected by bank Accompanying a...Ch. 5 - Prob. 5.21ECh. 5 - Prob. 5.22ECh. 5 - Prob. 5.23ECh. 5 - Prob. 5.24ECh. 5 - Prob. 5.25ECh. 5 - Prob. 5.1PCh. 5 - Prob. 5.2.1PCh. 5 - Prob. 5.2.2PCh. 5 - Prob. 5.3.1PCh. 5 - Prob. 5.3.2PCh. 5 - Prob. 5.4.1PCh. 5 - Prob. 5.4.2PCh. 5 - Prob. 5.4.3PCh. 5 - Prob. 5.4.4PCh. 5 - Prob. 5.1.1MBACh. 5 - Prob. 5.1.2MBACh. 5 - Prob. 5.1.3MBACh. 5 - Prob. 5.1.4MBACh. 5 - Ratio of cash to monthly cash expenses AcelRx...Ch. 5 - Prob. 5.2.1MBACh. 5 - Prob. 5.2.2MBACh. 5 - Ratio of cash to monthly cash expenses Pacira...Ch. 5 - Ratio of cash to monthly cash expenses Pacira...Ch. 5 - Prob. 5.2.5MBACh. 5 - Prob. 5.3.1MBACh. 5 - Prob. 5.3.2MBACh. 5 - Prob. 5.3.3MBACh. 5 - Prob. 5.3.4MBACh. 5 - Prob. 5.3.5MBACh. 5 - Prob. 5.4.1MBACh. 5 - Prob. 5.4.2MBACh. 5 - Prob. 5.1CCh. 5 - Prob. 5.2CCh. 5 - Prob. 5.3CCh. 5 - Prob. 5.4CCh. 5 - Prob. 5.5.1CCh. 5 - Prob. 5.5.2CCh. 5 - Prob. 5.5.3CCh. 5 - Prob. 5.6C
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- Assume that Brooke Miles, accounts payable clerk for West Coast Design Inc., stole $48,350 by paying fictitious invoices for goods that were neverreceived. The clerk set up accounts in the names of the fictitious companies and cashed the checks at a local bank. Describe a control procedure thatwould have prevented or detected the fraud.arrow_forwardAssume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardWhat internal control or procedure(s) would provide protection against the following threats? A company is late in paying a particular invoice. Consequently, a second invoice is sent, which crosses the first invoice’s payment in the mail. The second invoice is submitted for processing and also paid. A clerical employee obtains a blank check and writes a large amount payable to a fictitious company. The employee then cashes the check A fictitious invoice is received and a check is issued to pay for goods that were never ordered or delivered A purchasing agent adds a new record to the supplier master file. The company does not exist. Subsequently, the purchasing agent submits invoices from the fake company for various cleaning services. The invoices are paid. Cash disbursement department updates account payable once payment is due.arrow_forward
- 1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardParagon Tech Company, a communications equipment manufacturer, recently fell victim to a fraud scheme developed by one of its employees. To understand the scheme, it is necessary to review Paragon Tech’s procedures for the purchase of services. The purchasing agent is responsible for ordering services (such as repairs to a photocopy machine or office cleaning) after receiving a service requisition from an authorizedmanager. However, because no tangible goods are delivered, a receiving report is not prepared. When the Accounting Department receives an invoice billing Paragon Tech for a service call, the accounts payable clerk calls the manager who requested the service in order to verify that it was performed.The fraud scheme involves Mae Jansma, the manager of plant and facilities. Mae arranged for her uncle’s company, Radiate Systems, to be placed on Paragon Tech’s approved vendor list. Mae did not disclose the family relationship. On several occasions, Mae would submit a requisition…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Financial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Computer Fraud; Author: Mitch Wenger (Accounting Systems & Tech);https://www.youtube.com/watch?v=-s82SCuMaTI;License: Standard Youtube License