Fundamentals of Financial Accounting
5th Edition
ISBN: 9780078025914
Author: Fred Phillips Associate Professor, Robert Libby, Patricia Libby
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 2.4SDC
Requirement – 1
To determine
To show: Theeffects on
Requirement – 2
To determine
To explain: Whether there is a possibility for Company P sustain the business for over eight months even if the first two lenders are repaid their original loan amounts plus the 50% interest.
Requirement – 3
To determine
To indicate: The persons who are harmed by P’s scheme.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The Perfect Crime?
Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…
Consider each of the following situations. Is there a potential problem? Which part of the fraud triangle is involved, if any?
A. Susan is an accounts payable clerk. She sets up creditors in a financial database and pays invoices as they come in. Last year, she won employee of the year and is a valued employee. Through the grapevine, Susan's boss just learned that Susan's brother has a gambling problem.
B. Now suppose that Susan from situation A is now secretary for the head of the marketing department. She keeps track of the vice president of marketing's schedule and handles the correspondence.
C. Keith has been employed for 6 months as a teller at a community bank. All is going well, and his cash drawer has had shortages only twice (of less than P500). The shortages were traced and the problems corrected.
D. At the company Memorial Day picnic and golf outing last week, Nancy noticed that June moved her ball to a better lie when she thought no one was looking. There…
Accounts payable fraud is an issue that may arise. Find an Accounts payable fraud story on the internet
Discuss the following:
What was the purpose of the fraud?
What were the actions and consequences?
Who benefitted from the fraud?
How did the fraud get discovered?
What controls should have been in place to prevent fraud?
Chapter 2 Solutions
Fundamentals of Financial Accounting
Ch. 2 - Define the following: a. Asset b. Current asset c....Ch. 2 - Define a transaction anti give an example of each...Ch. 2 - For accounting purposes, what is an account?...Ch. 2 - What is the basic accounting equation?Ch. 2 - Prob. 5QCh. 2 - Prob. 6QCh. 2 - Prob. 7QCh. 2 - What is a journal entry? What is the typical...Ch. 2 - What is a T-account? What is its purpose?Ch. 2 - Prob. 10Q
Ch. 2 - Prob. 11QCh. 2 - Which of the following is not an asset account? a....Ch. 2 - Which of the following statements describe...Ch. 2 - Total assets on a balance sheet prepared on any...Ch. 2 - The duality of effects can best be described as...Ch. 2 - The T-account is used to summarize which of the...Ch. 2 - Prob. 6MCCh. 2 - A company was recently formed with 50,000 cash...Ch. 2 - Which of the following statements would be...Ch. 2 - Prob. 9MCCh. 2 - Prob. 10MCCh. 2 - Prob. 2.1MECh. 2 - Prob. 2.2MECh. 2 - Matching Terms with Definitions Match each term...Ch. 2 - Prob. 2.4MECh. 2 - Prob. 2.5MECh. 2 - Prob. 2.6MECh. 2 - Prob. 2.7MECh. 2 - Identifying Events as Accounting Transactions Half...Ch. 2 - Determining Financial Statement Effects of Several...Ch. 2 - Preparing Journal Entries For each of the...Ch. 2 - Posting to T-Accounts For each of the transactions...Ch. 2 - Reporting a Classified Balance Sheet Given the...Ch. 2 - Prob. 2.13MECh. 2 - Prob. 2.14MECh. 2 - Identifying Transactions and Preparing Journal...Ch. 2 - Prob. 2.16MECh. 2 - Prob. 2.17MECh. 2 - Prob. 2.18MECh. 2 - Prob. 2.19MECh. 2 - Prob. 2.20MECh. 2 - Prob. 2.21MECh. 2 - Prob. 2.22MECh. 2 - Prob. 2.23MECh. 2 - Prob. 2.24MECh. 2 - Prob. 2.25MECh. 2 - Prob. 2.1ECh. 2 - Prob. 2.2ECh. 2 - Classifying Accounts and Their Usual Balances As...Ch. 2 - Determining Financial Statement Effects of Several...Ch. 2 - Prob. 2.5ECh. 2 - Recording Journal Entries Refer to E2-4. Required:...Ch. 2 - Prob. 2.7ECh. 2 - Analyzing the Effects of Transactions in...Ch. 2 - Inferring Investing and Financing Transactions and...Ch. 2 - Analyzing Accounting Equation Effects, Recording...Ch. 2 - Recording Journal Entries and Preparing a...Ch. 2 - Analyzing the Effects of Transactions Using...Ch. 2 - Explaining the Effects of Transactions on Balance...Ch. 2 - Prob. 2.14ECh. 2 - Prob. 2.15ECh. 2 - Determining Financial Statement Effects of Various...Ch. 2 - Recording Transactions (in a Journal and...Ch. 2 - Recording Transactions (in a Journal and...Ch. 2 - Determining Financial Statement Effects of Various...Ch. 2 - Recording Transactions (in a Journal and...Ch. 2 - Recording Transactions (in a Journal and...Ch. 2 - Determining Financial Statement Effects of Various...Ch. 2 - Prob. 2.2PBCh. 2 - Prob. 2.3PBCh. 2 - Prob. 2.1SDCCh. 2 - Prob. 2.2SDCCh. 2 - Prob. 2.4SDCCh. 2 - Prob. 2.5SDCCh. 2 - Accounting for the Establishment of a Business...
Knowledge Booster
Similar questions
- 1. How do you understand Fraud in your own words? Please provide explanation. 2. How do you understand the Fraud Triangle? Please provide explanation. 3. Favorite topic in Forensic Accounting? 4. What recommendations will you give to prevent fraud? 5. Will you consider becoming a Fraud investigator in the Future? Why or why not.arrow_forwardSelect the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true about computer fraud perpetrators? a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community. b. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money. c. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold. d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.arrow_forwardAssume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forward
- WorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s management used to carry out the fraud?arrow_forwardThe Dude Fraud Case Scenario In his own words, Daniel Jones was “The Dude.” With his waist-long dreadlocks, part-time rock band, and a well-paid job managing a company’s online search directory—he seemed to have it all. Originally from Germany, Jones, now age 32, earned his doctorate and taught at the University of Munich before coming to the United States, where he started his career in computers. In 1996, Jones started working with the company as a director of operations for the U.S.- Speech Engineering Service and Retrieval Technology—working on a new, closely guarded search engine tied to the company’s .net concept. The company allows employees to order an unlimited amount of software and hardware, at no cost, for business purposes. Between December 2001 and November 2002, Jones ordered or used his assistant and other employees (including a high school intern) to order nearly 1,700 pieces of software which had very low cost but were worth a lot on the street. He then resold them…arrow_forwardA multimediacourse graduate used design software to create paychecks that lookedidentical to those of a company in his town.The paychecks were deposited electronically into ofhis friends’ accounts. What type of fraud did hecommit? Select one: a. output fraud. b. input fraud. c. computer instruction fraud. d. processor fraud.arrow_forward
- Upon hearing that you are enrolled in a fraud class, a manager of a local business asks, “I don’t understand what is happening with all these major scandals such as the Bernie Madoff scandal, the Goldman Sachs accusations, and the Enron fraud. There are billions of dollars being stolen and manipulated. How can any good auditornot notice when billions of dollars are missing?” How would you respond?arrow_forwardCan anyone help? The Sarbanes-Oxley Act is a product of a series of scandals that took place around the turn of the millennium. A) Has Sarbanes-Oxley really done anything to curb fraud? B) How does the Sarbanes-Oxley Act affect U.S. companies as they compete globally?arrow_forwardGladys is in charge of receiving all customer payments, recording the payments, and depositing them at the bank. What element of the fraud triangle is best described here? Group of answer choices Opportunity Rationalization Incentive/Pressure Attribution Gladys has large amounts of student loan debt and a crippling gambling habit. She works part-time job in another city. What element of the fraud triangle is best described here? Group of answer choices Opportunity Fraudy fraud Pressure/incentive Rationalizationarrow_forward
- “Identity theft is often applied to a wide range of crimes, including checking account fraud, counterfeiting, forgery, auto theft using false documentation, trafficking in human beings, and terrorism, most policymakers, and researchers agree that identity theft includes the misuse of another individual’s personal information to commit fraud”. Required: Where does identity theft fraud happen often? Explain any five steps that victims should need to take once identity theft occurs.arrow_forwardthe madoff debacle case? what are the lessons? question 4:arrow_forwardAll companies are vulnerable to fraud, but small businesses are particularly vulnerable. Why do you think this may be the case? What signs of possible fraud may be more pronounced in small businesses when compared to larger ones?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Century 21 Accounting Multicolumn JournalAccountingISBN:9781337679503Author:GilbertsonPublisher:CengageAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage