Test 3 Flashcards
The credit approval process involves which of the following?
a. Establishing a credit limit
b. Investigating the credit history of the customer
c. Verifying the customer order does not exceed an authorized limit
d. All of the above.
d.All of the above.
The billing activity part of the revenue cycle includes the following: a.shipping
b. updating accounts receivable
c. making bank deposits
d. approving customer credit
b.updating accounts receivable
The open invoice method involves which of the following activities?a.customers pay from a balance on a monthly statement.
b. remittances are applied against a total account balance.
c. customers pay specific invoices.
d. None of the above.
c.customers pay specific invoices.
A credit memo
a. is issued by the customer.
b. is issued by the cashier.
c. is issued by the credit manager.
d. increases accounts receivable.
c.is issued by the credit manager.
Aging of accounts receivable is based on the:
a. sales order date
b. picking ticket date
c. invoice date
d. bill of lading date
c.invoice date
Which of the following provide useful information for evaluating current credit policies and for deciding whether to increase the credit limit for specific customers?
a. Cash budget
b. Profitability analysis reports
c. Sales analysis reports
d. Accounts receivable aging schedule
e. None of the above.
d.Accounts receivable aging schedule
Which of the following is a threat to the Sales Order Entry Processing activity of the Revenue Cycle?
a. Uncollectible accounts.
b. Failure to bill.
c. Billing errors.
d. Theft of inventory.
a.Uncollectible accounts.
Which of the following is NOT a control for mitigating the risk of posting errors in accounts receivable?
a. Data entry controls.
b. Set proper credit limits.
c. Reconciliation of batch totals.
d. Mailing monthly statements to customers.
b.Set proper credit limits.
Operational data is needed to monitor performance and to perform the following recurring tasks:
a. Respond to customer inquiries about account balances and order status
b. Select methods for delivering merchandise
c. Determine inventory availability
d. B and C
e. All of the above
e.All of the above
Which of the following is NOT a threat associated with billing and accounts receivable?
a. Failure to bill customers
b. An error in billing
c. Posting errors in updating accounts receivable
d. Theft of cash
d.Theft of cash
Steps to reduce the risk of inventory theft include:
a. inventory is kept in a secure location, with limited physical access.
b. all inventory transfers within the company are documented.
c. inventory is released only upon approved sales orders.
d. All of the above.
d.All of the above.
The control known as closed loop verification is associated with:
a. accuracy of updating customer accounts.
b. preventing the theft of cash.
c. encryption controls.
d. separation of billing and shipping functions.
a.accuracy of updating customer accounts.
A general threat throughout the revenue cycle includes:
a. Loss or destruction of data
b. Invalid orders
c. Theft of inventory
d. All of the above
e. None of the above
a.Loss or destruction of data
A useful report for management to control for the threat of uncollectible accounts is:
a. Customer list
b. Accounts receivable aging report
c. Sales order report
d. Inventory report
b.Accounts receivable aging report
The following lists the quantity and description of each item included in the shipment:
a. Picking ticket
b. Bill of lading
c. Sales order
d. Packing slip
d.Packing slip
The two basic methods to maintain accounts receivable are:
a. Real-time and open-invoice
b. Real-time and balance-forward
c. Open-invoice and balance-forward
d. None of the above
c. Open-invoice and balance-forward
The applicable control procedure for the threat of incomplete or inaccurate customer orders is:
a. Customer relationship management (CRM)
b. Segregation of duties
c. Data entry edit controls
d. Reconciliation of sales order with the picking ticket
c. Data entry edit controls
The applicable control for theft of cash is:
a. Lockboxes
b. Segregation of duties
c. Use of cash registers
d. All of the above
d.All of the above
The threat of inaccurate inventory records can be mitigated by which of the following controls?
a. Bar coding or RFID tags
b. Review of purchase orders
c. Verification of invoice accuracy
d. Supplier audits
e. None of the above.
a.Bar coding or RFID tags
Ordering unnecessary items can result from:
a. Competitive bidding.
b. Inaccurate perpetual inventory records.
c. Require receiving employees to sign the receiving report.
d. None of the above.
b.Inaccurate perpetual inventory records.
What is a method that companies use to minimize the risk of inferior quality products?
a. Tracking and monitoring product quality by supplier.
b. Using encryption techniques
c. Providing adequate storage
d. All of the above.
a.Tracking and monitoring product quality by supplier.
The practice of allowing kickbacks:
a. improves the position of the company.
b. results in higher quality purchases.
c. impairs the objectivity of the purchaser.
d. provides quantity discounts.
c.impairs the objectivity of the purchaser.
What is the most effective technique used to minimize the risk of an inaccurate inventory counts?
a. Quick visual comparison of amounts received and those indicated on the packing slip
b. Using the Economic Order Quantity model
c. The use of a bar-coding or radio frequency identification tag (RFID) system
d. The use of just-in-time (JIT) accounting systems.
c.The use of a bar-coding or radio frequency identification tag (RFID) system
An effective method of reducing the risk of inventory theft is
a. an annual inventory count.
b. proper segregation of duties.
c. requiring the employee who maintains custody of inventory to also record inventory transactions.
d. All of the above.
e. None of the above.
b.proper segregation of duties.
What control procedures reduce the risk of paying the same invoice twice?
a. Invoices are approved for payment only when accompanied by a complete voucher packet.
b. Only the original invoice copy should be paid.
c. Paid invoices should be marked “paid”.
d. Payment should never be made on an invoice copy.
e. All of the above.
e.All of the above.
Which inventory system attempts to minimize inventory costs by only purchasing goods required for actual sales orders?
a. Material requirements planning (MRP)
b. Economic order quantity (EOQ)
c. Just-in-time (JIT)
d. Reorder point
c.Just-in-time (JIT)
What are the typical expenditure cycle functions?
a. Verify the accuracy of vendor invoices
b. Select the appropriate vendors from whom to order
c. Decide if appropriate discounts have been taken
d. Monitor cash flow needed to pay obligations
e. All of the above.
e.All of the above.
The major cost driver in the purchasing function is:
a. the number of purchase orders processed
b. the price of the items purchased
c. the reputation of the supplier
d. none of the above.
a.the number of purchase orders processed