Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

CHAPTER 9: Auditing the Revenue Cycle and AP subsidiary ledgers

c. the inventory control clerk authorizes inventory purchases


1. Which document is not prepared by the sales d. the AR clerk prepares customer statements
department? every month
a. packing slip
b. shipping notice 9. The bill of lading is prepared by the
c. bill of lading a. sales clerk.
d. stock release b. warehouse clerk.
c. shipping clerk.
2. Which document triggers the update of the d. billing clerk.
inventory subsidiary ledger?
a. bill of lading 10. Which of following functions should be segregated?
b. stock release a. opening the mail and recording cash receipts
c. sales order in the journal
d. shipping notice b. authorizing credit and determining reorder
quantities
3. Which function should not be performed by the c. shipping goods and preparing the bill of
billing department? lading
a. recording the sales in the sales journal d. providing information on inventory levels
b. sending the ledger copy of the sales order to and reconciling the bank statement
accounts receivable
c. sending the stock release document and the
shipping notice to the billing department as
proof of shipment
d. sending the stock release document to inventory control

4. When will a credit check approval most likely require


specific authorization by the credit department?
a. when verifying that the current transaction
does not exceed the customer’s credit limit
b. when verifying that the current transaction is
with a valid customer
c. when a valid customer places a materially
large order
d. when a valid customer returns goods

5. Which type of control is considered to be a compensating


control?
a. segregation of duties
b. access control
c. supervision
d. accounting records

6. Which of the following is not an output control?


a. The shipping department verifies that the
goods sent from the warehouse are correct in
type and quantity.
b. General ledger clerks reconcile journal vouchers that were
independently prepared in
various departments.
c. The sales clerk uses pre-numbered sales orders.

d. The billing department reconciles the shipping notice with the


sales invoice to ensure
that customers are billed only for the quantities shipped.

7. Which function or department below records the


decrease in inventory due to a sale?
a. warehouse
b. sales department
c. billing department
d. inventory control

8. Which situation indicates a weak internal control


structure?
a. the AR clerk authorizes the write off of bad
debts
b. the record-keeping clerk maintains both AR
CHAPTER 10: Auditing the Expenditure Cycle
8. Which one of the following situations represents
1. Which document helps to ensure that the receiving clerks a strength in the internal control for purchasing
actually count the number of goods and accounts payable?
received? a. Prenumbered receiving reports are issued
a. packing list randomly.
b. blind copy of purchase order b. Invoices are approved for payment by the
c. shipping notice purchasing department.
d. invoice c. Unmatched receiving reports are reviewed on
an annual basis.
2. When the goods are received and the receiving d. Vendors’ invoices are matched against purchase orders and
report has been prepared, which ledger may be receiving reports before a
updated? liability is recorded.
a. standard cost inventory ledger e. The purchasing department reconciles the
b. inventory subsidiary ledger accounts payable subsidiary vendor ledger
c. general ledger with the general ledger control account.
d. accounts payable subsidiary ledger
9. Which of the following tasks should the cash disbursement clerk
3. Which statement is not correct for an expenditure NOT perform?
system with proper internal controls? a. review the supporting documents for completeness and accuracy
a. Cash disbursements maintain the check b. prepare checks
register. c. approve the liability
b. Accounts payable maintains the accounts d. mark the supporting documents paid
payable subsidiary ledger.
c. Accounts payable is responsible for paying 10. Which of the following is true?
invoices. a. The cash disbursement function is part of
d. Accounts payable is responsible for authorizing invoices. accounts payable.
b. Cash disbursements is an independent accounting function.
4. Which duties should be segregated? c. Cash disbursements is a treasury function.
a. matching purchase requisitions, receiving reports, and invoices d. The cash disbursement function is part of the
and authorizing payment general ledger department.
b. authorizing payment and maintaining the
check register 11. The document that captures the total amount of
c. writing checks and maintaining the check time that individual workers spend on each production job is called
register a
d. authorizing payment and maintaining the accounts payable a. time card.
subsidiary ledger b. job ticket.
c. personnel action form.
5. Which documents would an auditor most likely d. labor distribution form.
choose to examine closely in order to ascertain
that all expenditures incurred during the accounting period have 12. An important reconciliation in the payroll system
been recorded as a liability? is when
a. invoices a. the general ledger department compares the
b. purchase orders labor distribution summary from cost accounting to the
c. purchase requisitions disbursement voucher from
d. receiving reports accounts payable.
b. the personnel department compares the
6. Which task must still require human intervention number of employees authorized to receive
in an automated purchases/cash disbursements a paycheck to the number of paychecks
system? prepared.
a. determination of inventory requirements c. the production department compares the
b. preparation of a purchase order number of hours reported on job tickets to
c. preparation of a receiving report the number of hours reported on time
cards.
d. the payroll department compares the labor
d. preparation of a check register distribution summary to the hours reported
on time cards.
7. In a well-designed internal control structure, two
tasks that should be performed by different persons are 13. Which internal control is not an important part
a. preparation of purchase orders and authorization of monthly of the payroll system?
payroll. a. supervisors verify the accuracy of employee
b. preparation of bank reconciliations and recording of cash time cards
disbursements. b. paychecks are distributed by an independent
c. distribution of payroll checks and approval of paymaster
credit sales. c. the accounts payable department verifies the
d. posting of amounts from both the cash receipts journal and cash accuracy of the payroll register before transferring payroll funds to
disbursements journal to the general ledger. the general checking
e. posting of amounts from the cash receipts account
journal to the general ledger and distribution d. the general ledger department reconciles the
of payroll checks. labor distribution summary and the payroll
disbursement voucher

14. The department responsible for approving pay


rate changes is
a. payroll
b. treasurer
c. personnel
d. cash disbursements

15. Which function should distribute paychecks?


a. personnel
b. timekeeping
c. paymaster
d. payroll
CHAPTER 11: Leading ERP (Enterprise Resource Planning) data mining tools available to the user.
Products b. The data warehouse should be separate from
operational systems.
1. Closed database architecture is c. Denormalization of data involves dividing
a. a control technique intended to prevent unauthorized access the data into very small tables that support
from trading partners. detailed analysis.
b. a limitation inherent in traditional information systems that d. Some decisions supported by a data warehouse are not
prevents data sharing. fundamentally different from
c. a data warehouse control that prevents unclean data from those that are supported by traditional
entering the warehouse. databases.
d. a technique used to restrict access to data e. Data cleansing involves transforming data
marts. into standard business terms with standard
e. a database structure that many of the leading data values.
ERPs use to support OLTP applications.
7. Which statement is LEAST accurate?
2. Each of the following is a necessary element for a. Implementing an ERP system has more to do
the successful warehousing of data EXCEPT with changing the way that an organization
a. cleansing extracted data. does business than it does with technology.
b. transforming data. b. The phased-in approach to ERP implementation is particularly
c. modeling data. suited to diversified organizations whose units do not share
d. loading data. common
e. all of the above are necessary. processes and data.
c. Because the primary reason for implementing
3. Which of the following is typically NOT part of an ERP is to standardize and integrate operations, diversified
an ERP’s OLAP applications? organizations whose units do
a. decision support systems not share common processes and data do not
b. information retrieval benefit and tend not to implement ERPs.
c. ad hoc reporting/analysis d. To take full advantage of the ERP process,
d. logistics reengineering will need to occur.
e. what-if analysis e. A common reason for ERP failure is that the
ERP does not support one or more important
4. There are a number of risks that may be associated with ERP business processes of the organization.
implementation. Which of the following was NOT stated as a risk
in the chapter?
a. A drop in firm performance after implementation because the
firm looks and works differently than it did while using a legacy
8. SAP, one of the leading ERP producers, makes
system.
several modules available to adopters. Which of
b. Implementing companies have found that
the following is not a SAP module?
staff members, employed by ERP consulting
a. Business Process Support
firms, do not have sufficient experience in
b. Internet Development Support
implementing new systems.
c. Logistics
c. Implementing firms fail to select systems that
d. E-Commerce Support
properly support their business activities.
e. Human Resources
d. The selected system does not adequately
meet the adopting firm’s economic growth.
9. Auditors of ERP systems
e. ERPs are too large, complex, and generic for
a. need not be concerned about segregation of
them to be well integrated into most company cultures.
duties because these systems possess strong
computer controls.
5. Which statement is NOT true?
b. focus on output controls such as independent
a. In a typical two-tier client-server architecture, the server handles
verification to reconcile batch totals.
both application
c. are concerned that managers fail to exercise
and database duties.
adequate care in assigning permissions.
d. do not see the data warehouse as an audit or
control issue at all because financial records
are not stored there.
b. Client computers are responsible for presenting data to the user
e. need not review access levels granted to users
and passing user input
because these are determined when the system is configured and
back to the server.
never change.
c. Two-tier architecture is for local area network applications
where the demand on the
10. Which statement is most correct?
server is restricted to a relatively small population of users.
a. SAP is more suited to service industries than
d. The database and application functions are
manufacturing clients.
separated in the three-tier model.
b. J. D. Edwards’s ERP is designed to accept the
e. In three-tier client-server architectures, one
best-practices modules of other vendors.
tier is for user presentation, one is for database and applications
c. Oracle evolved from a human resources
access, and the third is
system.
for Internet access.
d. PeopleSoft is the world’s leading supplier of
software for information management.
6. Which statement is NOT true?
e. SoftBrands provides enterprise software for
a. Drill-down capability is an OLAP feature of
the hospitality and manufacturing sectors.
Chapter 12: Business Ethics, Fraud, and Fraud Detection 9. The importance to the accounting profession of
1. All of the following are issues of computer security except the Sarbanes-Oxley Act of 2002 is that
a. releasing incorrect data to authorized a. bribery will be eliminated.
individuals. b. management will not be able to override the
b. permitting computer operators unlimited access to the computer company’s internal controls.
room. c. firms are required to have an effective internal control system.
c. permitting access to data by unauthorized d. firms will not be exposed to lawsuits.
individuals.
d. providing correct data to unauthorized individuals. 10. The board of directors consists entirely of the
CEO’s close business associates and management
2. Which characteristic is not associated with software as of the organization. This
intellectual property? a. indicates a weakness in the accounting system.
a. uniqueness of the product b. is incompliant with the Sarbanes-Oxley Act.
b. possibility of exact replication c. is a red flag for auditors to review and report
c. automated monitoring to detect intruders on executive compensation.
d. ease of dissemination d. is a normal board structure and not an issue
of audit concern.
3. For an action to be called fraudulent, all of the
following conditions are required except 11. Business ethics involves
a. poor judgment. a. how managers decide on what is right in
b. false representation. conducting business.
Fraud Detection Techniques 617 b. how managers achieve what they decide is
c. intent to deceive. right for the business.
d. injury or loss. c. both a and b.
d. only a.
4. One characteristic of employee fraud is that the
fraud 12. All of the following are conditions for fraud
a. is perpetrated at a level to which internal except
controls do not apply. a. false representation.
b. involves misstating financial statements. b. injury or loss.
c. involves the direct conversion of cash or other c. intent.
assets to the employee’s personal benefit. d. material reliance.
d. involves misappropriating assets in a series of 13. Management can expect various benefits to follow
complex transactions involving third parties. from implementing a system of strong internal
control. Which of the following benefits is least
5. Forces that may permit fraud to occur do not likely to occur?
include a. reduced cost of an external audit
a. a gambling addiction. b. preventing employee collusion to commit
b. lack of segregation of duties. fraud
c. centralized decision-making environment. c. availability of reliable data for decisionmaking purposes
d. questionable integrity of employees. d. some assurance of compliance with the
Foreign Corrupt Practices Act of 1977
6. Who is responsible for establishing and maintaining the internal e. some assurance that important documents
control system? and records are protected
a. the internal auditor
b. the accountant 14. Which of the following situations is not a segregation of duties
c. management violation?
d. the external auditor a. The treasurer has the authority to sign
7. Which of the following indicates a strong internal checks but gives the signature block to the
control environment? assistant treasurer to run the check-signing
a. The internal audit group reports to the audit machine.
committee of the board of directors. b. The warehouse clerk, who has the custodial
b. There is no segregation of duties between organization responsibility over inventory in the warehouse, selects the vendor
functions. and authorizes purchases when inventories are low.
c. There are questions about the integrity of c. The sales manager has the responsibility to
management. approve credit and the authority to write off
d. Adverse business conditions exist in the industry. accounts.
d. The department time clerk is given the undistributed payroll
8. Employee fraud involves three steps. Of the following, which is checks to mail to absent
not involved? employees.
a. concealing the crime to avoid detection e. The accounting clerk who shares the recordkeeping
b. stealing something of value responsibility for the accounts
c. misstating financial statements receivable subsidiary ledger performs the
d. converting the asset to a usable form monthly reconciliation of the subsidiary ledger and the control
account.
a. altering program logic to cause the application to process data
15. What does the underlying assumption of reasonable assurance incorrectly.
regarding implementation of internal control mean? b. misusing the firm’s computer resources.
a. Auditors are reasonably assured that fraud c. destroying or corrupting a program’s logic
has not occurred in the period. using a computer virus.
b. Auditors are reasonably assured that employee carelessness can d. creating illegal programs that can access data
weaken an internal files to alter, delete, or insert values
control structure.
c. Implementation of the control procedure
should not have a significant adverse effect
on efficiency or profitability.
d. Management assertions about control effectiveness should
provide auditors with reasonable assurance.
e. A control applies reasonably well to all forms
of computer technology.

16. To conceal the theft of cash receipts from customers in


payment of their accounts, which of the
following journal entries should the bookkeeper
make?
DR CR
a. Miscellaneous Expense Cash
b. Petty Cash Cash
c. Cash Accounts Receivable
d. Sales Returns Accounts Receivable
e. None of the above

17. Which of the following controls would best prevent the lapping
of accounts receivable?
a. Segregate duties so that the clerk responsible
for recording in the accounts receivable subsidiary ledger has no
access to the general
ledger.
b. Request that customers review their monthly
statements and report any unrecorded cash
payments.
c. Require customers to send payments directly
to the company’s bank.
d. Request that customers make the check payable to the company.

18. Providing timely information about transactions


in sufficient detail to permit proper classification
and financial reporting is an example of
a. the control environment.
b. risk assessment.
c. information and communication.
d. monitoring.

19. What fraud scheme is similar to the “borrowing


from Peter to pay Paul” scheme?
a. expense account fraud
b. kiting
c. lapping
d. transaction fraud

20. Which of the following best describes lapping?


a. applying cash receipts to a different customer’s account in an
attempt to conceal previous thefts of funds
b. inflating bank balances by transferring
money among different bank accounts
c. expensing an asset that has been stolen
d. creating a false transaction

21. Operations fraud includes

You might also like