1. What does it mean to say that internal control has limitations and what are these limitations?
2. Provide an appropriate response based on the following scenarios.
Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented?
Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?
3. What is petty cash and what purpose(s) does it serve?
4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash?
5. Prepare the necessary
(a) On March 1, issued a check to establish a petty cash fund of $1,410
(b) On April 1, the amount of cash in the petty cash fund is $440. Issued a check to replenish the fund, based on the following summary of petty cash receipts: repair expense, $850, and miscellaneous selling expense, $80. Record any missing funds in the cash short and over account.
6. What is the difference between an
7. What is the formula for calculating interest on a note receivable?
8. Please calculate the interest on a $10,000, 120-day, 12 percent note. Once you have determined the interest amount, briefly explain what it means. When does the interest get recorded?
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
- 1. How do you understand Fraud in your own words? Please provide explanation. 2. How do you understand the Fraud Triangle? Please provide explanation. 3. Favorite topic in Forensic Accounting? 4. What recommendations will you give to prevent fraud? 5. Will you consider becoming a Fraud investigator in the Future? Why or why not.arrow_forwardWhat documents does a perpetrator use to commit billing fraud? example? What are the three categories in payroll fraud? example?arrow_forwardExplain the difference between computer fraud and general fraud. Explain both categories of fraud in relation to accounting information system.arrow_forward
- In the case of The Canny Cashier, name one control that could have revealed signs of the embezzlement.arrow_forwardsooner answer neededarrow_forwardFraud consists of some deceitful practice or willful device, resorted to with intent to deprive another of his right. Fraud is generally categorized as follows: Asset Misappropriation a) May include employee theft – typically cash, physical assets (computers), or intellectual property. b) May encompass a variety of wrongful acts, such as, among others, bribes or kickbacks. c) Deliberate misrepresentation of the financial statements.arrow_forward
- Collusion is an intentional act of two or more employees to accomplish theft of company assets. Which control activity is designed to make fraud less likely because it would require collusion among employees? A. Adequate documents and records B. Clearly defined authority and responsibility C. Safeguards over assets and records D. Segregation of dutiesarrow_forwardWhy is it important for companies to analyze revenue and accounts receivable? How can these areas lend themselves to fraud when left with lack of segregation of duties, weak controls and recordkeeping delays?arrow_forwardWhat are the three different types of Check Fraud.What steps could you take to protect your customer and the bank from check fraud?arrow_forward
- Fraud consists of some deceitful practice or willful device, resorted to with intent to deprive another of his right. Fraud is generally categorized as follows: Financial Statement Fraud a) May include employee theft – typically cash, physical assets (computers), or intellectual property. b) May encompass a variety of wrongful acts, such as, among others, bribes or kickbacks. c) Deliberate misrepresentation of the financial statements.arrow_forward“Identity theft is often applied to a wide range of crimes, including checking account fraud, counterfeiting, forgery, auto theft using false documentation, trafficking in human beings, and terrorism, most policymakers, and researchers agree that identity theft includes the misuse of another individual’s personal information to commit fraud”. Required: Where does identity theft fraud happen often? Explain any five steps that victims should need to take once identity theft occurs.arrow_forwardThe crime of obtaining money or some other benefit by deliberate deception. oa) skimming ob) pretexting oc) phishing od) fraud Save plit creen 3) Using spam or pop-up messages to obtain personal information. Unit Resources a) skimmina W earrow_forward
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education