Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 4, Problem 5DQ
To determine
Explain the manner in which an employee can embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of duties and authorization controls were not in place.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
1. How may an employee embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of functions and authorization controls were not in place? Please asnwer this. thank youuu
1. What does it mean to say that internal control has limitations and what are these limitations?
2. Provide an appropriate response based on the following scenarios.
Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented?
Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?
3. What is petty cash and what purpose(s) does it serve?
4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash?
5. Prepare the necessary journal entries for each of the following:
(a) On March 1, issued a check to establish a petty cash fund of $1,410
(b)…
Provide an appropriate response based on the following scenarios.
Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented?
Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?
Chapter 4 Solutions
Accounting Information Systems
Ch. 4 - Prob. 1RQCh. 4 - Prob. 2RQCh. 4 - What function does the receiving department serve...Ch. 4 - Prob. 4RQCh. 4 - Prob. 5RQCh. 4 - Prob. 6RQCh. 4 - Prob. 7RQCh. 4 - Prob. 8RQCh. 4 - Prob. 9RQCh. 4 - Distinguish between an edit run, a sort run, and...
Ch. 4 - Prob. 11RQCh. 4 - Prob. 12RQCh. 4 - Prob. 13RQCh. 4 - Prob. 14RQCh. 4 - Prob. 15RQCh. 4 - Prob. 16RQCh. 4 - In a manual system, after which event in the sales...Ch. 4 - Prob. 18RQCh. 4 - What document initiates the billing process?Ch. 4 - Prob. 20RQCh. 4 - Prob. 1DQCh. 4 - Prob. 2DQCh. 4 - Prob. 3DQCh. 4 - Prob. 4DQCh. 4 - Prob. 5DQCh. 4 - Prob. 6DQCh. 4 - Prob. 7DQCh. 4 - Prob. 8DQCh. 4 - What financial statement misrepresentations may...Ch. 4 - Prob. 10DQCh. 4 - Prob. 11DQCh. 4 - Prob. 12DQCh. 4 - Prob. 13DQCh. 4 - Prob. 14DQCh. 4 - Prob. 15DQCh. 4 - How is EDI more than technology? What unique...Ch. 4 - Prob. 17DQCh. 4 - Prob. 1MCQCh. 4 - Prob. 2MCQCh. 4 - Prob. 3MCQCh. 4 - Prob. 4MCQCh. 4 - Prob. 5MCQCh. 4 - Prob. 6MCQCh. 4 - Prob. 7MCQCh. 4 - Prob. 8MCQCh. 4 - Prob. 9MCQCh. 4 - Prob. 10MCQCh. 4 - Prob. 1PCh. 4 - Prob. 2PCh. 4 - Prob. 3PCh. 4 - Prob. 4PCh. 4 - Prob. 5PCh. 4 - Prob. 6PCh. 4 - Prob. 7PCh. 4 - Prob. 8PCh. 4 - INTERNAL CONTROL Iris Plant owns and operates...Ch. 4 - Prob. 10PCh. 4 - Prob. 11PCh. 4 - Prob. 12PCh. 4 - In 1989, Robert Smith opened a small fruit and...Ch. 4 - Prob. 2ICCCh. 4 - Prob. 3ICCCh. 4 - Prob. 4ICCCh. 4 - Prob. 5ICCCh. 4 - Prob. 6ICCCh. 4 - (Prepared by Will Richens and Michael Catchpole,...Ch. 4 - Prob. 8ICC
Knowledge Booster
Similar questions
- Which of the following fraudulent activities most likely could be perpetrated due to the lack of effective internal controls in the revenue cycle? a. Fictitious transactions may be recorded that cause an understatement of revenues and overstatement of receivables b. Claim received from customers for goods returned may be intentionally recorded in other customer’s accounts. c. Authorization of credit memos by personnel who receive cash may permit the misappropriation of cash d. The failure to prepare shipping documents may cause an overstatement of inventory balancesarrow_forwardA serious exposure in the revenue cycle is customer dissatisfaction. What is the related threat and applicable control procedure that address this exposure? A. failure to bill; separation of billing and shipping functions B. failure to bill; bar-codes and RFID technology C. billing errors; reconciliation of shipping documents to sales order D. theft of cash; using ETFsarrow_forwardWhat feature of the acquisition and expenditure control would be expected to prevent an employee’s embezzling cash through creation of fictitious vouchers?arrow_forward
- 1. A threat to the expenditure cycle that involves an employee creating and approving fictitious purchase orders is known as: A. Inventory theft B. Unauthorized access C. Check tampering D. Billing schemes 2. Purchase orders are used to initiate a payment in the disbursement cycle. True or False 3.Vendor audits are conducted to address the threat of unauthorized access in the disbursement cycle. True or falsearrow_forwardWhat internal control procedure ( s ) would provide protection against the following threats ? An employee writes off a customer's accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer .arrow_forwardWhen an employee is in a position to penetrate and hide fraud, incompatible roles exist. False or Truearrow_forward
- Which of the following combinations is a good way to conceal employee fraud but an ineffective means of perpetrating management (financial reporting) fraud?a. Overstating sales revenue and overstating customer accounts receivable balances.b. Overstating sales revenue and overstating bad debt expense. c. Understating interest expense and understating accrued interest payable.d. Omitting the disclosure information about related-party sales to the president’s relatives at below-market prices.arrow_forwardIf an employee skims sales from a customer, which of the following will likely occur? a. The stolen payment if not material, will not be noticed by the organization. b. The receivable will become past due C. The customer will not be able to show proof that payment has been made. O d. The organization is likely to notice the theft of the payment immediately.arrow_forwardExplain one gap the company has in internal control procedures in which fraud or errors could occur? What can the company do to prevent or detect this fraud or error?arrow_forward
- Proper segregation of duties reduces opportunities to allow any employee to be in a position to both: A. journalize cash receipts and disbursements and prepare the financial statements. B. Monitor internal controls and evaluate whether the controls are operating as intended. C. Adopt new accounting pronouncements and authorize the recording of transactions. D. Record and conceal fraudulent transactions in the normal course of assigned tasks.arrow_forwardWhich of the following is NOT an issue with the Bradmark internal controls as it pertains to the revenue cycle? James Walker authorizes and executes transactions. The credit manager verbally authorizes credit increases. The warehouse clerk has access to assets and record keeping. Mary receives checks and remittances from the customer.arrow_forwardAnswer the following questions and give an example for each case: What category does inventory related fraud fall into? What documents does a perpetrator use to commit billing fraud? What are the three categories in payroll fraud? How is skimming scheme fraud carried out? In which areas can the embezzlement scheme be identified? What can cause fraud to be committed in the presentation of financial statements?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub