FUND.ACCT.PRIN.
25th Edition
ISBN: 9781260247985
Author: Wild
Publisher: RENT MCG
expand_more
expand_more
format_list_bulleted
Question
Chapter 1, Problem 3QS
To determine
Introduction: The financial statements of a company include a
To state: The fraud triangle.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Identify the fraud triangle risk factor (Opportunity, Pressure, or Rationalization) in each situation.
1. The business has no cameras or security devices at its warehouse.
2. A worker sees other employees regularly take inventory for personal use.
3. Payroll manager feels she is greatly underpaid.
4. No one matches the cash in the register to receipts when shifts end.
5. Managers are expected to grow business or be fired.
6. Managers are told to make extreme cuts in expenses.
Opportunity
Rationalization
Pressure
Opportunity
Pressure
Pressure
Internal Control-Fraud Triangle
Identify the fraud triangle risk factor (opportunity-O, pressure-P or
rationalization-R) in each situation.
1.
2.
3.
Employeees are told to report increased income or be fired.
Several sales clerks share the same cash drawer.
A worker did not receive a bonus this year and now feels it's okay
to use the company credit cared for personal expenses.
4.
Doors safeguarding valuable merchandise are not locked with a
passcode.
An employee feels underpaid and believes stealing inventory is
justified.
5.
if a manager is incharge of the Credit Right Software Corp department which involves sells leading account sooftare product and two of his employess commited fraud. How should the manager prepare himself to understand what causes individuals to commit fraud and how it happens?
Chapter 1 Solutions
FUND.ACCT.PRIN.
Ch. 1 - Prob. 1QSCh. 1 - Prob. 2QSCh. 1 - Prob. 3QSCh. 1 - Prob. 4QSCh. 1 - Prob. 5QSCh. 1 - Prob. 6QSCh. 1 - This icon highlights assignments that enhance...Ch. 1 - Prob. 8QSCh. 1 - Prob. 9QSCh. 1 - Prob. 10QS
Ch. 1 - Prob. 11QSCh. 1 - Identifying items with financial statements P2...Ch. 1 - P2
Classify each of the following items as...Ch. 1 - P2
Classify each of the following items as assets...Ch. 1 - Preparing an income statement P2...Ch. 1 - Prob. 16QSCh. 1 - Prob. 17QSCh. 1 - Prob. 18QSCh. 1 - Prob. 19QSCh. 1 - Prob. 20QSCh. 1 - Prob. 21QSCh. 1 - Prob. 1ECh. 1 - Exercise 1-2 Identifying accounting users and uses...Ch. 1 - Prob. 3ECh. 1 - Prob. 4ECh. 1 - Prob. 5ECh. 1 - Prob. 6ECh. 1 - Prob. 7ECh. 1 - Prob. 8ECh. 1 - Prob. 9ECh. 1 - Prob. 10ECh. 1 - Prob. 11ECh. 1 - Prob. 12ECh. 1 - Prob. 13ECh. 1 - Prob. 14ECh. 1 - Prob. 15ECh. 1 - Prob. 16ECh. 1 - Prob. 17ECh. 1 - Prob. 18ECh. 1 - Prob. 19ECh. 1 - Prob. 20ECh. 1 - Prob. 21ECh. 1 - Prob. 22ECh. 1 - Prob. 23ECh. 1 - Prob. 24ECh. 1 - Prob. 25ECh. 1 - Prob. 1PSACh. 1 - Prob. 2PSACh. 1 - Prob. 3PSACh. 1 - Prob. 4PSACh. 1 - Prob. 5PSACh. 1 - Prob. 6PSACh. 1 - Prob. 7PSACh. 1 - Prob. 8PSACh. 1 - Prob. 9PSACh. 1 - Prob. 10PSACh. 1 - Prob. 11PSACh. 1 - Prob. 1PSBCh. 1 - Prob. 2PSBCh. 1 - Prob. 3PSBCh. 1 - Prob. 4PSBCh. 1 - Prob. 5PSBCh. 1 - Prob. 6PSBCh. 1 - Prob. 7PSBCh. 1 - Prob. 8PSBCh. 1 - Prob. 9PSBCh. 1 - Prob. 10PSBCh. 1 - Prob. 11PSBCh. 1 - On October 1. 2019, Santana Rev launched a...Ch. 1 - Prob. 1AACh. 1 - Prob. 2AACh. 1 - Prob. 3AACh. 1 - Prob. 1DQCh. 1 - Technology is increasingly used to process...Ch. 1 - Prob. 3DQCh. 1 - What are at least three questions business owners...Ch. 1 - Prob. 5DQCh. 1 - Describe the internal role of accounting for...Ch. 1 - Identify three type of services typically offered...Ch. 1 - Prob. 8DQCh. 1 - Why is accounting described as a service activity?Ch. 1 - What are some accounting-related professions?Ch. 1 - Prob. 11DQCh. 1 - Prob. 12DQCh. 1 - Prob. 13DQCh. 1 - A business reports its own office stationary on...Ch. 1 - Why is the revenue recognition principle needed?...Ch. 1 - Prob. 16DQCh. 1 - Prob. 17DQCh. 1 - What events or transactions change equity?Ch. 1 - Prob. 19DQCh. 1 - What do accountants mean by the term revenue?Ch. 1 - 21. Define net income and explain its...Ch. 1 - Identify the four basics financial statements of a...Ch. 1 - Prob. 23DQCh. 1 - 24. Give two examples of expenses a business might...Ch. 1 - Prob. 25DQCh. 1 - Prob. 26DQCh. 1 - Prob. 27DQCh. 1 - Prob. 28DQCh. 1 - Prob. 1BTNCh. 1 - Prob. 2BTNCh. 1 - Visit the EDGAR database at SEC.gov. Access the...Ch. 1 - Prob. 4BTN
Knowledge Booster
Similar questions
- The fraud triangle asserts that the following three factors must exist for a person to commit fraud.A. Opportunity B. Pressure C. RationalizationIdentify the fraud risk factor (A, B, or C) in each of the following situations. A worker sees other employees regularly take inventory for personal use.arrow_forwardCollecting Evidence in a Fraud Examination. A fraud examiner was called into a businessbecause of a suspicion of fraud. An assistant manager in a bookstore is taking books off theshelf, bringing them to the return book area, completing a customer return form, and pocketing the money. This is done late in the day when few other employees are in the store and areinvolved in closing activities that occupy them in other areas.Required:a. What are the objectives of the fraud examiner in performing a fraud examination?b. What evidence could the fraud examiner obtain that would help reach the objectives ofthe audit?c. How should the fraud examiner handle the evidence obtained?arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forward
- Which of the following is NOT an example of an opportunity to commit fraud in the accounting information system? a. The need to sell confidential information from the database for cash to pay for his medical bills b. User names and passwords of most employees are stored in a shared Google document file c. The employee's discovery that passwords are not required to enter any modules in the accounting information system d. Supervisors are not required to approve transactions entered into by their staff in the accounting systemarrow_forwardFraud refers to any intentional act to achieve gain, usually monetary. Committing a fraud isunethical and resulting in bad consequences, not just to the perpetrator, but also others (e.g.shareholders, workers etc.). Several example of fraud scenario are listed as follows:i). Store manager misused company’s car for personal purpose because he is the onlyperson that monitor the movement and usage of the car.ii). The accountant and the store keeper of AAA Enterprise co-operate in stealing thecompany’s inventory and they gain a lot of money from it.iii). The Chief Financial officer (CFO) of ABC Sdn Bhd had reported over $700,000 fakeearnings because he wants to achieve sales target.iv). XYZ Sdn Bhd booked revenues earlier than it should have because it was at risk ofmissing analyst estimates.Required;a. Identify the type of fraud committed in the scenario i). to iv). b. Based on the fraud triangle (i.e. pressure, opportunity and rationalization), identify thecause of fraud happen in the…arrow_forwardWhich of the following is an example of poor internal control in an organization?a. The company rotates employees through various jobs.b. The accounting department compares goods received with the related purchase order.c. The mailroom clerk records daily cash receipts in the journal.d. Employees must take vacations.arrow_forward
- Question 2 What internal control or procedure(s) would provide protection against the following threats? Workers on the shipping dock steal goods, claiming that the inventory shortages reflect errors in the inventory records. An employee authorizes a credit memo for a sales return when the goods were never actually returned A waiter steals cash by destroying the customer sales ticket for customers who paid cash. A business loses all information about amounts owed by customers in Gaza City because the master database for that office was destroyed in a fire. The cashier steals funds by cashing several checks from customers.arrow_forwardWhich of the following is an example of fraudulent financial reporting? a. The treasurer diverts customer payments to his personal due, concealing his actions by debiting an expense account, thus overstating expenses. O b. An employee steals inventory and the "shrinkage" is recorded in cost of goods sold. O c. Company management changes inventory count tags and overstates ending inventory, while understating cost of goods sold. O d. An employee steals small tools from the company and neglects to return them; the cost is reported as a miscellaneous operating expense.arrow_forwardDetermine whether each procedure described below is an internal control strength or weakness; then identify the internal control violated or followed for each procedure. 1. The owner does not use ID scanners to limit access to expensive merchandise. Instead, the owner argues they hire honest employees. 2. Several salesclerks share the same cash drawer. 3. The company devotes resources towards keeping accurate accounting records for machinery. 4. The company does not allow employees with access to cash to modify accounting records. 5. Employees that handle easily transferable assets such as cash are bonded. Weakness or Strength 1. Weakness 2. Weakness 3. Strength 4. Strength 5. Strength Internal Control Principle Apply technological controls Establish responsibilities Maintain adequate records Separate recordkeeping from custody of assets Insure assets and bond key employeesarrow_forward
- Determine whether each procedure described below is an internal control strength or weakness; then identify the internal control principle violated or followed for each procedure. 1. The company does not use electronic time clocks because it fears it will hurt employee morale. 2. An employee cannot approve their own request for purchases of inventory. 3. Several salesclerks share the same cash drawer. 4. Employees that handle easily transferable assets such as cash are bonded. 5. The company does not allow employees with access to cash to modify accounting records. Weakness or Strength Internal Control Principle 1. 2. 3. 4. 5.arrow_forwardDetermine whether each procedure described below is an internal control strength or weakness; then identify the internal control violated or followed for each procedure. 1. The owner does not use ID scanners to limit access to expensive merchandise. Instead, the owner argues they hire honest employees. 2. Several salesclerks share the same cash drawer. 3. The company devotes resources towards keeping accurate accounting records for machinery. 4. The company does not allow employees with access to cash to modify accounting records. 5. Employees that handle easily transferable assets such as cash are bonded. Weakness or Strength 1. Weakness 2. Weakness 3. Strength 4. Strength 5. Strength Internal Control Principlearrow_forward1. As an accountant, why you need to study the revenue cycle? 2. If you are going to audit the cash receipts cycle, what are the things you need to prepare? 3. Some large businesses have adopted Invoiceless pricing for business-to-business transactions. What do you think are the barriers, if any, to its use in sales to consumers? 4. How could an employee embezzle funds by issuing an unauthorized sales credit memo if the appropriate segregation of duties and authorization controls were not in place?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,