389 Exam 2 Flashcards

1
Q

Internal Controls

A

Policies, plans and procedures designed to protect the assets of the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internal Control System

A

the methods used to achieve the following objectives:

  • safeguarding assets
  • checking the accuracy and reliability of accounting data
  • promoting operational efficiency
  • encouraging adherence to prescribed managerial policies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A

any potential adverse occurrence or unwanted event that could injure the AIS or the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exposure / Impact

A

the potential dollar loss that would occur if the threat becomes a reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

risk / likelihood

A

the probability that the threat will occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of threats:

A

natural and political, software errors and equipment malfunction, unintentional acts, intentional acts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

internal controls perform three important functions:

A
  • preventive controls
  • detective controls
  • corrective controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

preventive controls? examples?

A

deter problems before they arise

i. e. firewall
i. e. locking doors before leaving home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

detective controls? examples?

A

discover problems when they do arise.

i. e. an alarm system. if someone were to get in your home the alarm would sound.
i. e. bank reconciliation
i. e. a trial balance making sure debits and credits balance and making sure nothing crazy is going on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Corrective controls? examples?

A

remedy problems that have occurred by:

identifying the cause, correcting the resulting errors, modifying the system to prevent future problems of this sort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some regulations of controls?

A

Foreign Corrupt Practices Act, COSO, SOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

COSO meaning and what they do:

A

Committee of Sponsoring Organizations of Internal Control

  • control environment
  • risk assessment
  • control activities
  • information and communication
  • monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control environment:

A

establishes the tone of a company, influencing the control awareness of the company’s employees.

Is the general attitude towards the control environment within a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Factors included within the control environment are:

A

integrity, ethical values and competence of employees

management philosophy and operating style

Assignment of authority and responsibility

effectiveness of the board of directors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Control environment starts ___ and ___

A

at the top and works it way down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk assessment:

A

an important consideration when designing controls for a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risks come from

A

internal and external sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risks that may affect the accomplishment of a company’s goals and objectives should be ____

A

identified, analyzed and promptly addressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

cost-benefit analysis

A

does the benefits of a particular control implementation outweigh the costs?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A measure of lost should include ___

A

both the exposure and risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Control activities:

A

relate to the policies and procedures that help ensure that management directives are carried out in an effective manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Audit trail

A

enables auditors and accountants to follow the path of a transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Sound personal policies and competent employees

A

specific hiring procedures… rotation of certain key employees in different jobs, enforced vacations… regular performance reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Separation of Duties:

A

A control activity within an internal control system that essential says that one employees serves as a monitor for another employee. Keep separate custody of assets, recording transactions, and authorizing transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Separation of duties, custodial functions:

A

handling cash, inventories, tools, or fixed assets, writing checks, receiving checks in the mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Separation of duties, recording functions:

A

Preparing source documents, maintaining journals, ledgers or other files, preparing reconciliations, p preparing performance reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

separation on duties, authorization functions:

A

authorization of transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

collude:

A

come together.

this makes segregation of duties impotent and controls can be overridden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Physical protection of assets:

A

a process to safeguard inventory… how about cast?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

internal audits

A

perform periodic reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

opperational audits:

A

performed to evaluate the efficiency and effectiveness of that particular department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

information:

A

refers to the output of the accounting system

  • it includes the methods used to record, process, summarize and report a company’s transactions and maintain accountability for assets, liabilities, and equity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Communication:

A

refers to providing a company’s personnel with an understanding of their role and responsibilities pertaining to internal control over financial reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Monitoring:

A

relates to the process that assesses the quality of internal control performance on continuous basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

examples of monitoring:

A

perform internal control evaluations, implement effective supervision, use responsibility accounting systems such as budgets, schedules, standard costs, etc., tract purchased software and mobile devices, periodic audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

9-14 why?

a. separate cash payments from cash receipts

A

Both are custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

9-14 why?

b. lock up signature plates

A

prevents unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

9-14 why?

c. match invoices to receiving reports

A

ensure item was received and invoice quantity is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

9-14 why?

d. checks mailed by person not preparing check

A

separation of duties: person mailing may notice suspicious payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

9-14 why?

e. match invoices to POs

A

Ensure purchase is authorized and invoice price is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

9-14 why?

f. keep checks under lock

A

prevent unauthorized payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

9-14 why?

g. impress payroll account (deposit inly payroll amt.)

A

identify payroll fraud / error and limit loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

9-14 why?

h. separate bank reconciliation from writing checks or handling cash

A

separation of duties- prevents concealing a theft by making it appear that GL cash reconciles to bank statement cash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

9-14 why?

i. use check protector:

A

keep people from changing check amount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

9-14 why?

j. conduct surprise counts of cash

A

catch thieves who do not generate fictitious support documents at the time of the theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

9-14 why?

k. use approved vendors:

A

prevent vendors that are 1.) fictitious, 2.) have high prices, 3.) have poor quality products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

9-14 why?

l. all purchases made by purchasing department

A

prevent vendors that are 1.) fictitious, 2.) have high prices, 3.) have poor quality products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

electronic eavesdropping:

A

security risk with wireless technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

data encryption

A

this can stop eavesdropping. this means the data is scrambled and only receiver can de-scramble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

VPN

A

Virtual private network:

security appliance that allows remote access to a company’s system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Security for wireless system:

A

electronic eavesdropping, data encryption, VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Security for hard-wired system:

A

in distributed data processing processing, data processing is handled by many PCs

Routing verification procedures -

message acknowledgment procedures -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

in distributed data processing processing, data processing is handled by many PCs

A

PCS are linked to a central computer

Electronic eavesdropping could be a problem here as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Routing verification procedures

A

ensure that messages are routed to the correct computer

Header label: i.e. identify message destination

checked before acceptance of message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

message acknowledgment procedures

A

prevent loss of part of message

trailer label: i.e. data indicating message length
checked after data received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Management is responsible for:

A

directing and controlling operations and establishing, communication, monitoring all company policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

security policies:

A

help protect the organization from internal and external threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

5 components of internal control process

A
  • control environment
  • risk assessment
  • control activities
  • information and communication
  • monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Types of general computer controls:

A

personnel controls, file security, backup, contingency planning, computer facility controls, access to computer files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

file security controls:

purposes:
examples:

A

protect computer files from either accidental or intentional abuse.

i.e. external file labels, internal file labels, lockout procedures (prevents 2 applications from simultaneously updating file, read-only files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

fault-tolerant systems

purpose:
core concept:
types:

A

to tolerate computer errors and keep functioning.

Redundancy

consensus-based protocols, watchdog processor, disk mirroring or disk shadowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

consensus-based protocols:

A

have odd number or processors, ignore incongruent processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

watchdog processor:

A

second processor that takes over if main processor fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

disk mirroring or disk shadowing

A

write all data to two disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

backup procedures:

A

similar to fault-tolerant systems but not exactly the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

purpose of backup procedures:

A

mitigate risk of losing data before, during, or after processing work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Grandparent-parent-child procedure:

A

a backup procedure that

keep three generations of the master file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

electronic vaulting:

A

a backup procedure that

electronically transmit data to a remote location for backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

contingency planning purpose:

A

ready the organization for disaster that could affect data processing capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

offsite location types:

A

cold site
hot site
flying start site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Disaster recovery plan:

A

procedures to be followed in case of an emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

cold site:

A

location where system could be installed quickly.

literally a room with nothing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

hot site:

A

location with a working system.

room plus you have a site and software you just don’t have data

74
Q

flying start site:

A

hot site with backup data

location, data, system and software.

75
Q

computer facility controls purpose:

A

protect the physical assets of a data processing center

76
Q

key points of computer facility controls

A

data center location should be safe, employee access to data center should be listed, physical assets should be insured.

77
Q

access to computer files purpose:

A

safeguards sensitive data.

78
Q

key points to access to computer files

A

strong password policies, limiting logical access by authority, removing users from system after termination, limiting controlling remote login capability

79
Q

application controls:

A

controls designed to prevent errors in transaction processing

80
Q

three classifications of application controls:

A

input controls
processing controls
output controls

81
Q

types of inputs control:

A

observations

edit tests

82
Q

input controls - observation:

A

dual observation - having multiple employees involved in input process

recording safeguards- UPC, barcode scanners, POS devices

Standard AJEs

83
Q

input controls - edit tests:

A

edit checks

84
Q

Field check:

A

proper type of characters in a field

i.e. 9o210.
it won’t process that because it is suppose to be 90210

85
Q

Field Size check:

A

ensures that the input data will fit into the assigned field

i.e. twitter character count.

86
Q

sign check

A

appropriate arithmetic sign

87
Q

limit check

A

tests a numerical amount against a fixed value

floor or ceiling

88
Q

reasonableness check:

A

determines the correctness of a logical relationship between two data items

89
Q

types of processing controls

A

data access controls

data manipulation controls

90
Q

types of data access controls:

A

financial totals
has totals
record count
social security numbers

91
Q

types of data manipulation controls:

A

review software documentation

ensure proper programming using test data.

92
Q

Fraud:

A

any act of deception with intent to gain an unfair advantage over another person.

93
Q

Computer fraud:

A

illegal act that requires computer knowledge / use to perpetuate.

94
Q

Types of fraud:

A

misappropriation of assets, corruption, fraudulent financial reporting

95
Q

Examples of misappropriation of assets

A

Embezzlement, theft of money or property

96
Q

Examples of Corruption

A

Using your position to take advantage

97
Q

Example of Fraudulent financial reporting

A

intentional manipulation of financial statements i.e. Healthsouth

98
Q

Computer Crime:

A

the us of a computer for illegal financial gain or infliction of measurable loss on a person.

99
Q

Computer abuse:

A

mischievous, unauthorized use of a computer that is contrary to the owner’s wishes i.e. invasion of privacy.

100
Q

The Computer Fraud and Abuse Act of 1986 covers the following issues:

A
  1. Use of, or conspiracy to use computer resources to commit a felony
  2. Theft, use, access, modification, copying or destruction of software or data.
  3. Theft of money by altering computer records, or theft of computer time.
  4. Theft or vandalism of computer hardware.
  5. Intent to illegally obtain information or property using the computer.
  6. Trafficking in passwords or other login information.
  7. Extortion using a computer system as a target.
101
Q

What are some techniques used to commit computer crimes?

A

Trojan Horse
Data diddling
Hacking
Phishing

102
Q

What is a trojan horse?

A

unauthorized commands hidden in authorized programs/

103
Q

What are different types of trojan horses?

A

Virus
Worm
Logic Bomb
Salami Technique

104
Q

What is a virus?

A

A program that attaches to other files or programs and spreads by copying itself. They can destroy programs and data and perform denial of service attacks.

105
Q

What is a worm?

A

A stand-alone program that replicates itself until all memory is utilized. Can also be used in denial of service attacks.

Target puts a worm on walmart. If walmart is slow, customers will choose target instead.

106
Q

What is a logic bomb?

A

A program that remains dormant until triggered by some event.
- Logic bombs can destroy programs and data.

107
Q

What is the salami technique?

A

A program that makes small adjustments to many accounts in an effort to steal large amounts of money in small increments.

108
Q

What is data diddling?

A

changing data before, during, or after an entry.

109
Q

What is hacking?

A

Gaining unauthorized access to a system.

110
Q

What is phishing?

A

e.g. pose as legitimate company.

111
Q

Types of security technologies:

A
  1. Antivirus software
  2. Firewalls
  3. Access controls
  4. Physical security
  5. Intrusion detection systems
  6. Data encryption
112
Q

Steps to identifying computer crime:

A
  1. Look for accounting irregularities, or anomalous data.
  2. Look for employees with lifestyle changes or unusually extravagant lifestyles given their income.
  3. Look for employees with bizarre behavior. i.e. secretive and unwilling to take vacation.
113
Q

Forensic accountants:

A

specialize in preventing or detecting fraud or white-collar crime.

114
Q

Is it okay for your employer to read emails from your work account?

A

Yes

115
Q

Is it fair for your potential or current employers to use Facebook or Twitter to monitor employees?

A

Yes it is okay.

116
Q

When does the accounting cycle begin?

A

When the accounting personnel analyze a transaction from a source document.

117
Q

What is a source document?

A

A puede of paper or electronic form that records a business activity such as the purchase or sale of goods.

118
Q

Subsidiary ledger:

A

contains detailed records pertaining to a type of account (e.g. A/R, A/P, Payroll)

119
Q

General Ledger:

A

a collection of account balances.

120
Q

What is coding?

A

AIS depend on it to record, store, classify, and retrieve financial data.

121
Q

What is the purpose of coding?

A

uniquely identify transactions and accounts, compress data, aid in classification process, and convey special meaning.

122
Q

Types of codes:

A

mnemonic codes
Sequence codes
Block Codes
Group Codes

123
Q

Mnemonic Codes:

A

give visible clues concerning the objects they represent (e.g. S, M, L, XL)

124
Q

Sequence Codes

A

assign numbers or letters in consecutive order

125
Q

Block Codes

A

sequential codes in which blocks of numbers are reserved for particular use.

126
Q

Group codes:

A

Combines two or more codes.

127
Q

A payroll clerk created a ghost employee and entered the name into the payroll system. He then prepared a paycheck for this employee, endorsed it to himself, took the paycheck to the bank, and deposited the check.

A

Require supervisors to approve time worked.

Have someone other than payroll clerk distribute signed checks.

Use direct deposit

Have employees sign for checks.

Have employees clock-in electronically (use badged)

Use a record count of employees

Use a hash total.

128
Q

In a charitable organization, a cashier set aside checks for donations, endorsed them, and cashed them. She then sent gift acknowledgement cards to the donors.

A
  • Use restrictive endorsement only (remove authority to cash checks).
  • Have donations sent to a lockbox (remove custody).
  • Accept donations online.
  • Have 2 clerks open mail together.
  • Have gift acknowledgement cards sent by someone other than cashier (separation of duties).
  • Independently reconcile donations to gift acknowledgements (independent check).
129
Q

A computer programmer obtained the payroll master file, loaded it into the system, and changed his salary.

A
  • Have someone independent of payroll review all changes to the employee master file.
  • Limit access to payroll data entry.
  • Outsource payroll.
  • Use a financial total (hourly or other pay rates).
130
Q

A programmer quit in the middle of an assignment. Because no other programmers could make sense of the work already completed, the project was started over from scratch.

A

• Document systems in the planning and implementation phases.

131
Q
  1. During keying in a customer’s payment, the digit 0 in a payment of $102.34 was mistakenly entered as the letter O. As a result, the transaction was not processed correctly, and the customer received an incorrect statement.
A

• Use a field check (preventive control).

132
Q
  1. An employee gained unauthorized access to the system by observing her supervisor’s user name and then correctly guessing her password after 12 attempts.
A
  • Limit numbers of attempts to enter system.
  • Use smart passwords
  • Change passwords frequently
133
Q
  1. A salesperson for a PC manufacturer, keying in a customer order from a remote laptop computer, entered an incorrect stock number. As a result, an order of 50 printers was placed for a customer who wanted to order 50 PCs.
A
  • Redundant data check

* Confirmation of order with customer

134
Q
  1. A salesperson keying in a customer order from a remote computer inadvertently omitted the delivery address from the order.
A
  • Completeness check

* Confirmation of order with customer

135
Q

Acme Glass Company makes glass windows. In the final step, the windows are cleaned on a raised table in order to protect workers from work-related injuries. During cleaning the windows are secured by a tether to avoid damage. In 2% of the cases, the tether malfunctions and the window falls off the table. In 5% of the falls, the window is broken. Each broken window costs Acme $800. Acme makes 24,000 windows each year.

The Enron Tether Maintenance Company has agreed to provide monthly tether maintenance to Acme at a cost of $1,000 per month. If Enron provides tether maintenance, the likelihood of a window falling off the table is cut in half. The likelihood of breakage as the result of a fall is not affected by Enron’s tether maintenance.

  1. Without purchasing tether maintenance, what is the expected loss due to breakage each year?
A

Expected cost = Risk * Exposure

Risk is 2% of windows fall and 5% of those break. Risk = 2% * 5% = 0.001.
If 0.001 of all windows break, and there are 24,000 windows per year, there are 24 breaks (on average) per year.

Exposure is $800 per window.

24 breaks @ $800 each = $19,200 expected cost
136
Q

Acme Glass Company makes glass windows. In the final step, the windows are cleaned on a raised table in order to protect workers from work-related injuries. During cleaning the windows are secured by a tether to avoid damage. In 2% of the cases, the tether malfunctions and the window falls off the table. In 5% of the falls, the window is broken. Each broken window costs Acme $800. Acme makes 24,000 windows each year.

The Enron Tether Maintenance Company has agreed to provide monthly tether maintenance to Acme at a cost of $1,000 per month. If Enron provides tether maintenance, the likelihood of a window falling off the table is cut in half. The likelihood of breakage as the result of a fall is not affected by Enron’s tether maintenance.

  1. Without purchasing tether maintenance, what is the expected loss due to breakage each year?
A

Expected cost without Enron Maintenance $19,200
Expected cost with Enron Maintenance $9,600*

	Savings with Enron Maintenance			  $9,600
	Cost of Enron Maintenance				$12,000
	Net Cost						($2,400)
*with Enron Maintenance, cost is ½ of current cost or:

1% * 5% = 0.0005 * 24,000 windows = 12 window breaks @ $800 each
137
Q

Design of an effective AIS begins by

A

considering the outputs from the system.

138
Q

Outputs of an AIS include:

A
  1. Reports to MGT
  2. Reports to investors and creditors.
  3. Files that retain transaction data.
  4. Files that retain current data about accounts.
139
Q

Business process:

A

a collection of events

140
Q

what are the two types of events in a business process?

A
  • an economical event (accounting transaction)

- a business event does not affect the financial statements but still needs to be recorded (a sales order)

141
Q

What are the 2 core business processes?

A

sales

purchasing.

142
Q

The sales process begins with…

A

a customer order of goods or services and ends with the collection of cash from the customer.

143
Q

Simple description of Sales Process

A

GOODS OUT, CASH IN.

144
Q

What are the steps in the sales process?

A

sales order, shipment of goods, bill customer, and cash receipt. (maybe sales return)

145
Q

What are the o objectives of the sales process?

A

tracking sales, filing customer orders, billing customers, collecting payment, forecasting sales and cash receipts.

146
Q

Inputs to the sales process (or source documents)

A

sales order, sales invoice, check, remittance advice, shipping notice, debit/ credit memo.

147
Q

Outputs of the sales process:

A

customer billing statement, aging report, bad debt report, cash receipts forecast, approved customer list.

148
Q

Threat: incomplete or inaccurate customer orders:

control?

A

data entry edit checks.

149
Q

threat: credit sales to customers with poor credit.

A

credit approval by credit manager, not by sales function; accurate records of customer account balances.

150
Q

threat: legitimacy of orders:

A

signatures on paper documents; digital signatures and digital certificates for e-business.

151
Q

threat: stockout, carrying costs, and markdowns.

A

inventory control systems, improved sales forecast, supply chain management.

152
Q

threat: Shipping errors:

A

reconciliation of sales order with picking ticket and packing slip; bar code scanners ; data entry control application controls.

153
Q

threat: theft of inventory:

A

restrict physical access to inventory.
documentation of all internal transfers of inventory and reconciliation of counts of recorded amounts.
Separate inventory custody from recording inventory usage from authorization to ship.

154
Q

threat: failure to bill customers:

A

separation of shipping and billing functions.
renumbering of all shipping documents and periodic reconciliation to invoices; reconciliation of picking tickets and bills of lading with sales orders.

155
Q

threat: billing errors:

A

data entry edit control.
price lists
reconcile the sales order and shipping documents to the invoice.

156
Q

posting errors in updating account receivables

A

reconciliation of subsidiary accounts receivable ledger with general ledger; monthly statements to customers.

157
Q

threat: theft of cash:

A

segregation of duties; minimization of cash handling; lockbox arrangements; prompt endorsement and deposit of all receipts
periodic reconciliation of bank statements with records by someone not involved in cash receipts processing.

158
Q

threat: loss of data

A

backup and disaster recovery procedures. access controls.

159
Q

threat: poor performance.

A

preparation and review of performance reports.

160
Q

the purchasing process begins with

A

a request for goods or services and ends with a payment to the vendor.

161
Q

the purchasing process simplified:

A

goods in; cash out.

162
Q

steps in the purchasing process:

A

purchase requisition, purchase order, receive goods, approve payments and cash disbursements.

163
Q

objectives of the purchasing process:

A

tracking purchases of goods and services from vendors.

tracking amounts owed (A/P)

Maintaining vendor records.

controlling inventory

making timely and accurate vendor payments

forecasting purchases and cash outflows.

164
Q

inputs to the purchasing process:

A
purchase requisitions 
purchase order
invoice from vendor.
receiving report
bill of lading
packing slip
debit/credit memo.
165
Q

outputs of the purchasing process.

A

discrepancy reports
vendor checks
check register
cash requirements forecast.

166
Q

threat: prevent stockout or excess inventory:

A

inventory control systems bar code scanners; periodic counts of inventory

167
Q

threat: request unnecessary items:

A

accurate perpetual inventory records; require purchase requisition approval

168
Q

threat: inflated prices.

A

bids; approved suppliers; approved purchase orders; budget review.

169
Q

threat: inferior quality:

A

approved suppliers; approved purchase orders; monitory supplier performance.

170
Q

threat: unauthorized suppliers:

A

require purchase order approval; restrict access to supplier master files approved suppliers.

171
Q

kickback threat:

A

require disclosure of financial interests in suppliers; vendor audits.

172
Q

threat: receive unordered goods.

A

receiving department require the existence of valid purchase order prior to acceptance.

173
Q

threat: errors in counting goods.

A

bar code scanners; accuracy incentives.

174
Q

threat: theft of inventory:

A

restrict physical access; decrement all internal transfers of inventory’ periodic physical counts; reconciliation of counts to recorded amounts

Separate inventory custody from recording inventory usage from authorization to receive goods.

175
Q

threat: uncaught errors in invoice:

A

train AP staff

Reconcile invoice to PO and receiving report.

176
Q

threat- pay for goods not received.

A

reconcile invoice to receiving report

177
Q

threat- missed purchase discounts

A

proper filing; cash flow budgets.

178
Q

threat- pay same invoice twice-

A

support invoice with original voucher package.; timely cancel voucher package.

179
Q

threat- recording pristine errors in aP

A

Data entry and processing edit controls

180
Q

threat- theft of cash:

A

Segregation of duties between AP (approval and recording) and cashier; reconciliation of bank account by someone independent of cash disbursement; restrict access to blank checks; two signatures for higher check amounts