ACCT 3122- second half of past quiz questions Flashcards

1
Q

Which of the following is the control component that reflects the attitude and actions of the board and management regarding the significance of control within the organization?

a. control activities
b. risk assessment
c. monitoring
d. control environment

A

d. control environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The company allows individuals who handle cash to also record transactions in the accounting system. This is an example of

a. lack of commitment to integrity and ethical values
b. deficiency in design
c. control activities
d. communication of deficiencies
e. deficiency in operation

A

b. deficiency in design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Many organizations bond employees who handle cash (i.e. purchase insurance against theft). Regarding the risks associated with employee theft, which of the following risk management techniques does this represent?

a. accepting
b. mitigating
c. transferring
d. controlling

A

c. transferring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internal control can provide only reasonable assurance that the organization’s objectives will be met efficiently and effectively. One factor limiting the likelihood of achieving those objectives is that

a. the board is active and independent
b. the cost of internal control should not exceed its benefits
c. the internal auditor’s primary responsibility is the detection of fraud
d. management monitors performance

A

b. the cost of internal control should not exceed its benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Assessing whether the controller of the business has a CPA and prior experience at an accounting firm falls under which area of COSO?

a. control activities
b. monitoring
c. information and communication
d. control environment
e. risk assessment

A

d. control environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The company uses the inventory turnover ratio to determine whether inventory is becoming obsolete. this is an example of what type of information?

a. a key performance indicator
b. budget vs. actual analysis
c. deficiency in operation
d. a key risk indicator

A

a. a key performance indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The company has an internal control procedure that requires a manager to review the invoice and associated paperwork before approving it for payment. One of the managers is very busy and signs all the invoices, so he can get back to his other duties. This is an example of:

a. control activities
b. deficiency in design
c. lack of commitment to integrity and ethical values
d. communication of deficiencies
e. deficiency in operation

A

e. deficiency in operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The COSO framework treats internal control as a process designed to provide reasonable assurance regarding the achievemment of objectives related to

a. compliance with applicable laws and regulations
b. reliability of financial reporting
c. all of the other answers are correct
d. effectiveness and efficiency of operations

A

c. all of the other answers are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

According to COSO, which of the following is the most effective method to transmit a message of ethical behavior throughout an organization?

a. removing pressures to meet unrealistic targets, particularly for short-term results
b. strengthening internal audit’s ability to deter and report improper behavior
c. specifying the competence levels for every job in organization and translating those levels to requisite knowledge and skills
`

A

d. demonstrating appropriate behavior by example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

within the COSO internal control- integrated framework, which of the following components is designed to ensure that internal controls continue to operate effectively?

a. monitoring
b. control environment
c. information and communication
d. risk assessment

A

a. monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

research and development expenses are an example of:

a. bill of material costs
b. period costs
c. a production order
d. product costs

A

b. period costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which of the following is not correct regarding a physical inventory count?

a. during the physical inventory count all production and sales are shutdown whereas production and sales are not shut down for cycle counting
b. inventory records are usually more accurate when a company uses a physical inventory count versus cycle counting
c. a physical inventory count occurs sporadically whereas cycle counting occurs on a regular basis
d. a physical inventory count involves counting all the inventory versus some of the inventory

A

b. inventory records are usually more accurate when a company uses a physical inventory count versus cycle counting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a list of the different inventory components that are used to construct a finished good is called

a. a routing
b. an assembled item
c. a master stock item
d. a bill of material
e. a sub stock item

A

d. a bill of material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the company uses the periodic method. what account will be debited when the company makes a sale?

a. cost of goods sold
b. inventory
c. sales revenue and cost of goods sold
d. accounts receivable
e. accounts receivable and cost of goods sold

A

d. accounts receivable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

differences between inventory records and actual inventory levels can be due to all the following except for

a. spoiled inventory
b. stolen inventory
c. inventory obsolescence
d. forgone sales
e. damaged inventory

A

d. forgone sales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

safety stock is:

a. extra inventory that the company keeps on hand to ensure that it can fulfill the needs of its customers
b. the minimum quantity that i can purchase of an inventory item
c. costs that are directly related to the production of a product or service intended for sale
d. the internal control procedures used to protect inventory from theft

A

a. extra inventory that the company keeps on hand to ensure that it can fulfill the needs of its customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a request to manufacture a product is called a :

a. sales order
b. routing
c. production order
d. purchase order
e. bill of lading

A

c. production order

18
Q

the difference between inventory quantity on hand and inventory available is :

a. there is no difference between the two measures
b. inventory pledged to sales orders
c. inventory pledged to sales orders and production orders
d. inventory pledged to production orders

A

c. inventory pledged to sales orders and production orders

19
Q

the company uses the periodic method. what account will be debited when the company purchases inventory?

a. inventory expense
b. cost of goods sold
c. purchases
d. supplies
e. inventory

A

c. purchases

20
Q

which of the following is a characteristic of cycle counting?

a. involves counting a small subset of the total inventory
b. usually conducted on a quarterly or annual basis
c. involves shutting down all production and sales while counting occurs
d. may be required for tax regulations or financial accounting rules

A

a. involves counting a small subset of the total inventory

21
Q

Which of the following is not a characteristic of a risky customer?

a. incompetent management
b. taking advantage of payment incentives
c. a history of losses from operations
d. a poor payment record
e. inadequate working capital

A

b. taking advantage of payment incentives

22
Q

lockboxes are what type of internal controls?

a. adequate documents and records
b. human resource controls
c. access controls
d. segregation of duties
e. authorization of transactions
f. independent checks of performance

A

c. access controls

23
Q

which of the following of the following is a disadvantage of using the automated clearing house (ACH) method to handle cash receipts?

a. ACH is not a very secure way to handle transactions
b. ACH is a very expensive way to process cash receipts
c. it is more difficult to account for ACH transactions
d. not all customers can use ACH to pay their bills

A

d. not all customers can use ACH to pay their bills

24
Q

a very important customer does not pay his or her invoice on time. how should the company react?

a. have the credit manager contact the customer to discuss the matter. do not stop shipments to customer
b. send the customer threating letters
c. immediately stop all shipments t the customer
d. send the invoice to collections

A

a. have the credit manager contact the customer to discuss the matter. do not stop shipments to customer

25
Q

methods to reduce credit risk include all the following except:

a. credit limits
b. dunning letters
c. letters of credit
d. advance payments
e. terms

A

b. dunning letters

26
Q

if the company is assigning which invoices are overdue, the company should age receivables based on:

a. payment date
b. invoice date
c. invoice due date
d. all the other methods would be useful in assessing overdue collections

A

c. invoice due date

27
Q

when should the accounting system flag the customer’s order?

a. the order plus previous unpaid orders does not exceed the customer’s credit limit
b. the order does not exceed the customer’s credit limit
c. the customer is paying with cash
d. a new customer with no credit history wants to place an order

A

d. a new customer with no credit history wants to place an order

28
Q

a decrease in the days of sales outstanding (DSO) may be due to all the following except:

a. customers taking advantage of sales discounts
b. tightening of credit terns
c. an improvement in the overall economy
d. not performing credit checks

A

d. not performing credit checks

29
Q

the process of applying a customer’s payment to an open invoice is referred to as

a. manual deposit
b. cash application
c. payment incentives
d. the collection process

A

b. cash application

30
Q

the law that allows individuals to submit electronic images of a check rather than physically depositing a check is referred to as:

a. cash application
b. account stratification
c. check 21
d. the dunning rule

A

c. check 21

31
Q

all the following are examples of checks that stolen or forged except:

a. void is written on a check that was mangled by the check printer
b. the payee on the check is “cash”
c. out of order check numbers
d. duplicate check numbers

A

a. void is written on a check that was mangled by the check printer

32
Q

positive pay involves

a. submitting a phony invoice for payments
b. sending the bank a file identifying the checks written by the company
c. segregation of check signing responsibilities from storage of the check stock
d. using a purchasing card to make purchases from a supplier

A

b. sending the bank a file identifying the checks written by the company

33
Q

which of the following is not a method for handling small dollar invoices?

a. negative assurance
b. evaluated receipt settlement
c. all the other choices are methods for handling small dollar invoices
d. P-cards

A

b. evaluated receipt settlement

34
Q

maintenance of the vendor master should be:

a. does not requiring purging of one-time vendors
b. automated as much as possible to reduce costs
c. does not need to be reviewed periodically
d. should be done manually

A

d. should be done manually

35
Q

all the following are common problems associated with processing payments to suppliers except

a. negative assurance
b. fraudulent invoices
c. invoices that do not match the receiving report
d. small dollar invoices

A

a. negative assurance

36
Q

segregation of duties involving checks involves:

a. ensuring that the check signer also handles the bank recs
b. ensuring that the check signer properly secures the signature plate in a safe location when not in service
c. ensuring that the person who records the vendor invoices also distributes the vendor checks
d. ensuring that the person who records the vendor invoice can also sign the checks
e. ensuring that the check signer has access to the check stock (blank checks)

A

b. ensuring that the check signer properly secures the signature plate in a safe location when not in service

37
Q

with evaluated receipt settlement, what document is eliminated?

a. the purchase order
b. the invoice
c. the purchase requisition
d. the receiving report

A

b. the invoice

38
Q

what is a rush check?

a. a check that is sent electronically versus through the mail
b. a check where the company has rushed to stop payment
c. a check that needs to go out immediately and does not follow the normal accounting procedures
d. a check written to the band “rush”

A

c. a check that needs to go out immediately and does not follow the normal accounting procedures

39
Q

important internal controls for the vendor master include all the following except:

a. calling the supplier to verify that the information is accurate
b. making the supplier complete a vendor application form before paying the supplier
c. including one time vendors ( vendors that are paid only once) in the vendor master
d. requiring approval by independent person before the change is made to vendor master
e. performing an independent review of any changes to the vendor master file

A

c. including one time vendors ( vendors that are paid only once) in the vendor master

40
Q

business email compromise involves
a. fraudsters sending fake invoices through email
b. a hacker gaining access to the company’s email system
c. fraudsters sending emails pretending to be vendors or company senior management requesting either a change in bank account information or a transfer of funds to a fraudulent account
d. an accounts payable clerk compromising with the supplier regarding the amount of the invoice

A

c. fraudsters sending emails pretending to be vendors or company senior management requesting either a change in bank account information or a transfer of funds to a fraudulent account

41
Q
A