Exam 2 (ch 15) Flashcards

1
Q

Basic Expenditure Cycle Activities

A
  • Order materials, supplies, and services
  • Receive materials, supplies, and services
  • Approve supplier (vendor) invoice
  • Cash disbursement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key decisions

A
  • What is the optimal level of inventory?
  • Which suppliers provide the best quality at the best price?
  • How can IT be used to improve the efficiency and accuracy of logistics?
    -How can we take advantage of vendor discounts?
  • How can we maximize cash flow?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

General Threats

A

1) Inaccurate or invalid master data
2) Unauthorized disclosure of sensitive information
3) Loss or destruction of data
4) Poor performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

General Controls

A

1) - Data processing integrity controls
- Restriction of access to master data
- Review of all changes to master data
2) - Access Controls
- Encryption
3) - Backup and disaster recovery procedures
4) - Managerial reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Order Goods (Material/Supplies)
or Services
Processing Steps

A

Identify what, when, and how much to purchase
- Source Document: Purchase requisition
(Someone needs to request a purchase
and someone to approve it)

Choose a supplier
- Source Document: Purchase Order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ordering Goods/Services

Threats

A
  • Stockouts and excess inventory
  • Purchasing items not needed
  • Purchasing items at inflated prices
  • Purchasing goods of poor quality
  • Unreliable suppliers
  • Purchasing from unauthorized suppliers
  • Kickbacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Controls to this threat:

(stockouts and excess inventory)

A
  • Perpetual inventory system
  • Bar-coding, RFID
  • Periodic physical counts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Controls to this threat:

(Purchasing Items not needed)

A
  • Perpetual Inventory Systems
  • Review and approval of purchase requisitions
  • Centralized purchasing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Controls to this threat:

(Purchasing items at inflating prices)

A
  • Price lists
  • Competitive bids
  • Review purchase orders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Controls to this threat:

(Purchasing goods of poor quality)

A
  • Use approved suppliers
  • Review and approve purchases from new suppliers
  • Monitor product quality by supplier
  • Hold purchasing managers responsible for rework and scrap cost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Controls to this threat:

(Unreliable suppliers)

A
  • Monitor supplier performance
  • Require quality certification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Controls to this threat:

(Purchasing from unauthorized suppliers)

A
  • Purchase from approved suppliers
  • Review approval from purchases of new suppliers
  • EDI specific controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Controls to this threat:

(Kickbacks)

A
  • Supplier audits
  • prohibit gifts
  • Job rotation & mandatory vacations
  • Required disclosure of financial and personal interests in suppliers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Receiving Process

A
  • Goods arrive
    • Verify goods ordered against the
      purchase order (what, how much, quality)
    • Source Document: Receiving Report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Receiving Goods or Services

Threats

A
  • Accepting unordered items
  • Mistakes in counting
  • Verifying receipt of services
  • Inventory theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controls to this threat:

(Accepting unordered items)

A
  • Authorized purchase orders needed before receiving goods
17
Q

Controls to this threat:

(Mistakes in counting)

A
  • Bar codes or RFID
  • Receiving employees sign receiving-report
  • Do not inform receiving of quantity-ordered
18
Q

Controls to this threat:

(Verifying receipt of services)

A
  • Budget controls and audits
19
Q

Controls to this threat:

(Inventory theft)

A
  • Restrict physical access to inventory
  • Document all inventory transfers
  • Segregate custody vs receiving of inventory
20
Q

Voucher

A

Supplier invoice + Receiving report + purchase order

21
Q

Review pages 21-26 on the papers

A

Review pages 21-26 on the papers

22
Q

Approve Supplier Invoice

threats

A
  • Errors in supplier invoice
  • Mistakes in posting to accounts payable
23
Q

Controls to this threat:

(Errors in suppliers invoice)

A
  • Verify invoice accuracy
  • Require detailed receipts for p-cards
  • Restrict access to supplier master data
24
Q

Controls to this threat:

(Mistakes in posting to accounts payable)

A
  • Data entry edit controls
  • Reconcile detailed accounts payable records to the general ledger accounts payable account
25
Q

Cash Disbursements

Threats

A
  • Failure to take discounts
  • Pay for items not received
  • Duplicate payments
  • Theft of cash
  • Check alteration
  • Cash flow problems
26
Q

Controls to this threat:

(Failure to take discounts)

A
  • File invoices by the due date to take advantage of discounts
27
Q

Controls to this threat:

(Pay for items not received)

A
  • Match supplier invoice to supporting documents (Purchase order, receiving report)
28
Q

Controls to this threat:

(Duplicate Payments)

A
  • Pay only original invoices
  • Cancel supporting document when payment is made
29
Q

Controls to this threat:

(Theft of cash)

A
  • Physical security of checks
  • Separation of duties
  • Reconcile bank accounts
30
Q

Controls to this threat:

(Check Alteration)

A
  • Check protection machines
  • Special inks/papers
31
Q

Controls to this threat:

(Cash flow problems)

A
  • Cash flow budget