Deck 3: Ethics,fraud,and Internal Control
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/158
العب
ملء الشاشة (f)
Deck 3: Ethics,fraud,and Internal Control
1
Business ethics is the analysis of the nature and social impact of computer technology,and the corresponding formulation and justification of policies for the ethical use of such technology.
False
2
The ethical principle of justice asserts that the benefits of the decision should be distributed fairly to those who share the risks.
True
3
Segregation of duties is an example of an internal control procedure.
True
4
A key modifying assumption in internal control is that the internal control system is the responsibility of management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
5
Preventive controls are passive techniques designed to reduce fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
6
Business bankruptcy cases always involve fraudulent behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
7
Employees should be made aware of the firm's commitment to ethics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
8
Ethical issues and legal issues are essentially the same.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
9
Database management fraud includes altering,updating,and deleting an organization's data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
10
The external auditor is responsible for establishing and maintaining the internal control system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
11
Of the three fraud factors (situational pressure,ethics,and opportunity),situational pressure is the factor that actually facilitates the act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ethical principle of informed consent suggests that the decision should be implemented so as to minimize all of the risks and to avoid any unnecessary risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
13
Computer programs are intellectual property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
14
The trend toward distributed data processing increases the exposure to fraud from remote locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Sarbanes-Oxley Act requires only that a firm keep good records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
16
Internal control systems are recommended but not required of firms subject to the Sarbanes-Oxley Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
17
Para computer ethics is the exposure to stories and reports found in the popular media regarding the good or bad ramifications of computer technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
18
Copyright laws and computer industry standards have been developed jointly and rarely conflict.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
19
Collusion among employees in the commission of a fraud is difficult to prevent but easy to detect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
20
Defalcation is another word for financial fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
21
A check digit is a method of detecting data coding errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
22
Cash larceny involves stealing cash from an organization before it is recorded on the organization's books and records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
23
Section 404 requires that corporate management (including the CEO)certify their organization's internal controls on a quarterly and annual basis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
24
The fraud triangle represents a geographic area in Southeast Asia where international fraud is prevalent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
25
Opportunity involves direct access to assets and/or access to information that controls assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
26
Spooling is a form of processing control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
27
The objective of SAS 99 is to seamlessly blend the auditor's consideration of fraud into all phases of the audit process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
28
Situational pressure includes personal or job related stresses that could coerce an individual to act dishonestly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
29
Systems that use sequential master files employ a backup technique called destructive update.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
30
While the Sarbanes-Oxley Act prohibits auditors from providing non-accounting services to their audit clients,they are not prohibited from performing such services for non-audit clients or privately held companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
31
In a computerized environment,all input controls are implemented after data is input.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which ethical principle states that the benefit from a decision must outweigh the risks,and that there is no alternative decision that provides the same or greater benefit with less risk?
A) minimize risk
B) justice
C) informed consent
D) proportionality
A) minimize risk
B) justice
C) informed consent
D) proportionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
33
Input controls are intended to detect errors in transaction data after processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
34
Shredding computer printouts is an example of an output control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
35
An input control that tests time card records to verify than no employee has worked more 50 hours in a pay period is an example of a range test.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
36
A run-to-run control is an example of an output control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
37
Section 302 requires the management of public companies to assess and formally report on the effectiveness of their organization's internal controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
38
The Sarbanes-Oxley Act requires the audit committee to hire and oversee the external auditors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
39
Skimming involves stealing cash from an organization after it is recorded on the organization's books and records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
40
Individuals who acquire some level of skill and knowledge in the field of computer ethics are involved in which level of computer ethics?
A) para computer ethics
B) pop computer ethics
C) theoretical computer ethics
D) practical computer ethics
A) para computer ethics
B) pop computer ethics
C) theoretical computer ethics
D) practical computer ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
41
Who is responsible for establishing and maintaining the internal control system?
A) the internal auditor
B) the accountant
C) management
D) the external auditor
A) the internal auditor
B) the accountant
C) management
D) the external auditor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following suggests a weakness in the internal control environment?
A) the firm has an up-to-date organizational chart
B) monthly reports comparing actual performance to budget are distributed to managers
C) performance evaluations are prepared every three years
D) the audit committee meets quarterly with the external auditors
A) the firm has an up-to-date organizational chart
B) monthly reports comparing actual performance to budget are distributed to managers
C) performance evaluations are prepared every three years
D) the audit committee meets quarterly with the external auditors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
43
Forces which may permit fraud to occur do not include
A) a gambling addiction
B) lack of segregation of duties
C) centralized decision making environment
D) questionable integrity of employees
A) a gambling addiction
B) lack of segregation of duties
C) centralized decision making environment
D) questionable integrity of employees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
44
In balancing the risks and benefits that are part of every ethical decision,managers receive guidance from each of the following except
A) justice
B) self interest
C) risk minimization
D) proportionality
A) justice
B) self interest
C) risk minimization
D) proportionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following is not a limitation of the internal control system?
A) errors are made due to employee fatigue
B) fraud occurs because of collusion between two employees
C) the industry is inherently risky
D) management instructs the bookkeeper to make fraudulent journal entries
A) errors are made due to employee fatigue
B) fraud occurs because of collusion between two employees
C) the industry is inherently risky
D) management instructs the bookkeeper to make fraudulent journal entries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
46
According to SAS 78,an effective accounting system performs all of the following except
A) identifies and records all valid financial transactions
B) records financial transactions in the appropriate accounting period
C) separates the duties of data entry and report generation
D) records all financial transactions promptly
A) identifies and records all valid financial transactions
B) records financial transactions in the appropriate accounting period
C) separates the duties of data entry and report generation
D) records all financial transactions promptly
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following indicates a strong internal control environment?
A) the internal audit group reports to the audit committee of the board of directors
B) there is no segregation of duties between organization functions
C) there are questions about the integrity of management
D) adverse business conditions exist in the industry
A) the internal audit group reports to the audit committee of the board of directors
B) there is no segregation of duties between organization functions
C) there are questions about the integrity of management
D) adverse business conditions exist in the industry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
48
A well-designed purchase order is an example of a
A) preventive control
B) detective control
C) corrective control
D) none of the above
A) preventive control
B) detective control
C) corrective control
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
49
The concept of reasonable assurance suggests that
A) the cost of an internal control should be less than the benefit it provides
B) a well-designed system of internal controls will detect all fraudulent activity
C) the objectives achieved by an internal control system vary depending on the data processing method
D) the effectiveness of internal controls is a function of the industry environment
A) the cost of an internal control should be less than the benefit it provides
B) a well-designed system of internal controls will detect all fraudulent activity
C) the objectives achieved by an internal control system vary depending on the data processing method
D) the effectiveness of internal controls is a function of the industry environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is a preventive control?
A) credit check before approving a sale on account
B) bank reconciliation
C) physical inventory count
D) comparing the accounts receivable subsidiary ledger to the control account
A) credit check before approving a sale on account
B) bank reconciliation
C) physical inventory count
D) comparing the accounts receivable subsidiary ledger to the control account
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which characteristic is not associated with software as intellectual property?
A) uniqueness of the product
B) possibility of exact replication
C) automated monitoring to detect intruders
D) ease of dissemination
A) uniqueness of the product
B) possibility of exact replication
C) automated monitoring to detect intruders
D) ease of dissemination
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
52
Skimming involves
A) stealing cash from an organization before it is recorded
B) Stealing cash from an organization after it has been recorded
C) manufacturing false purchase orders,receiving reports,and invoices
D) A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.
A) stealing cash from an organization before it is recorded
B) Stealing cash from an organization after it has been recorded
C) manufacturing false purchase orders,receiving reports,and invoices
D) A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
53
A physical inventory count is an example of a
A) preventive control
B) detective control
C) corrective control
D) feedforward control
A) preventive control
B) detective control
C) corrective control
D) feedforward control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
54
The most cost-effective type of internal control is
A) preventive control
B) accounting control
C) detective control
D) corrective control
A) preventive control
B) accounting control
C) detective control
D) corrective control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
55
The bank reconciliation uncovered a transposition error in the books.This is an example of a
A) preventive control
B) detective control
C) corrective control
D) none of the above
A) preventive control
B) detective control
C) corrective control
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
56
One characteristic of employee fraud is that the fraud
A) is perpetrated at a level to which internal controls do not apply
B) involves misstating financial statements
C) involves the direct conversion of cash or other assets to the employee's personal benefit
D) involves misappropriating assets in a series of complex transactions involving third parties
A) is perpetrated at a level to which internal controls do not apply
B) involves misstating financial statements
C) involves the direct conversion of cash or other assets to the employee's personal benefit
D) involves misappropriating assets in a series of complex transactions involving third parties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
57
All of the following are factors in the fraud triangle except
A) Ethical behavior of an individual
B) Pressure exerted on an individual at home and job related
C) Materiality of the assets
D) Opportunity to gain access to assets
A) Ethical behavior of an individual
B) Pressure exerted on an individual at home and job related
C) Materiality of the assets
D) Opportunity to gain access to assets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
58
For an action to be called fraudulent,all of the following conditions are required except
A) poor judgment
B) false representation
C) intent to deceive
D) injury or loss
A) poor judgment
B) false representation
C) intent to deceive
D) injury or loss
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following best describes lapping?
A) applying cash receipts to a different customer's account in an attempt to conceal previous thefts of funds
B) inflating bank balances by transferring money among different bank accounts
C) expensing an asset that has been stolen
D) creating a false transaction
A) applying cash receipts to a different customer's account in an attempt to conceal previous thefts of funds
B) inflating bank balances by transferring money among different bank accounts
C) expensing an asset that has been stolen
D) creating a false transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is not an element of the internal control environment?
A) management philosophy and operating style
B) organizational structure of the firm
C) well-designed documents and records
D) the functioning of the board of directors and the audit committee
A) management philosophy and operating style
B) organizational structure of the firm
C) well-designed documents and records
D) the functioning of the board of directors and the audit committee
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
61
When duties cannot be segregated,the most important internal control procedure is
A) supervision
B) independent verification
C) access controls
D) accounting records
A) supervision
B) independent verification
C) access controls
D) accounting records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
62
Cash larceny involves
A) stealing cash from an organization before it is recorded
B) stealing cash from an organization after it has been recorded
C) manufacturing false purchase orders,receiving reports,and invoices
D) A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.
A) stealing cash from an organization before it is recorded
B) stealing cash from an organization after it has been recorded
C) manufacturing false purchase orders,receiving reports,and invoices
D) A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following situations is not a segregation of duties violation?
A) The treasurer has the authority to sign checks but gives the signature block to the assistant treasurer to run the check-signing machine.
B) The warehouse clerk,who has the custodial responsibility over inventory in the warehouse,selects the vendor and authorizes purchases when inventories are low.
C) The sales manager has the responsibility to approve credit and the authority to write off accounts.
D) The department time clerk is given the undistributed payroll checks to mail to absent employees.
E) The accounting clerk who shares the record keeping responsibility for the accounts receivable subsidiary ledger performs the monthly reconciliation of the subsidiary ledger and the control account.
A) The treasurer has the authority to sign checks but gives the signature block to the assistant treasurer to run the check-signing machine.
B) The warehouse clerk,who has the custodial responsibility over inventory in the warehouse,selects the vendor and authorizes purchases when inventories are low.
C) The sales manager has the responsibility to approve credit and the authority to write off accounts.
D) The department time clerk is given the undistributed payroll checks to mail to absent employees.
E) The accounting clerk who shares the record keeping responsibility for the accounts receivable subsidiary ledger performs the monthly reconciliation of the subsidiary ledger and the control account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
64
The importance to the accounting profession of the Sarbanes-Oxley Act is that
A) bribery will be eliminated
B) management will not override the company's internal controls
C) management are required to certify their internal control system
D) firms will not be exposed to lawsuits
A) bribery will be eliminated
B) management will not override the company's internal controls
C) management are required to certify their internal control system
D) firms will not be exposed to lawsuits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
65
The board of directors consists entirely of personal friends of the chief executive officer.This indicates a weakness in
A) the accounting system
B) the control environment
C) control procedures
D) this is not a weakness
A) the accounting system
B) the control environment
C) control procedures
D) this is not a weakness
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
66
A shell company fraud involves
A) stealing cash from an organization before it is recorded
B) Stealing cash from an organization after it has been recorded
C) manufacturing false purchase orders,receiving reports,and invoices
D) A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.
A) stealing cash from an organization before it is recorded
B) Stealing cash from an organization after it has been recorded
C) manufacturing false purchase orders,receiving reports,and invoices
D) A clerk pays a vendor twice for the same products and cashes the reimbursement check issued by the vendor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
67
Employee fraud involves three steps.Of the following,which is not involved?
A) concealing the crime to avoid detection
B) stealing something of value
C) misstating financial statements
D) converting the asset to a usable form
A) concealing the crime to avoid detection
B) stealing something of value
C) misstating financial statements
D) converting the asset to a usable form
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
68
When certain customers made cash payments to reduce their accounts receivable,the bookkeeper embezzled the cash and wrote off the accounts as uncollectible.Which control procedure would most likely prevent this irregularity?
A) segregation of duties
B) accounting records
C) accounting system
D) access controls
A) segregation of duties
B) accounting records
C) accounting system
D) access controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
69
Control activities under SA 78/COSO include
A) IT Controls,preventative controls,and Corrective controls
B) physical controls,preventative controls,and corrective controls.
C) general controls,application controls,and physical controls.
D) transaction authorizations,segregation of duties,and risk assessment
A) IT Controls,preventative controls,and Corrective controls
B) physical controls,preventative controls,and corrective controls.
C) general controls,application controls,and physical controls.
D) transaction authorizations,segregation of duties,and risk assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
70
The decision to extend credit beyond the normal credit limit is an example of
A) independent verification
B) authorization
C) segregation of functions
D) supervision
A) independent verification
B) authorization
C) segregation of functions
D) supervision
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
71
All of the following are conditions for fraud except
A) false representation
B) injury or loss
C) intent
D) material reliance
A) false representation
B) injury or loss
C) intent
D) material reliance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
72
Management can expect various benefits to follow from implementing a system of strong internal control.Which of the following benefits is least likely to occur?
A) reduced cost of an external audit.
B) prevents employee collusion to commit fraud.
C) availability of reliable data for decision-making purposes.
D) some assurance of compliance with the Foreign Corrupt Practices Act of 1977.
E) some assurance that important documents and records are protected.
A) reduced cost of an external audit.
B) prevents employee collusion to commit fraud.
C) availability of reliable data for decision-making purposes.
D) some assurance of compliance with the Foreign Corrupt Practices Act of 1977.
E) some assurance that important documents and records are protected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
73
The office manager forgot to record in the accounting records the daily bank deposit.Which control procedure would most likely prevent or detect this error?
A) segregation of duties
B) independent verification
C) accounting records
D) supervision
A) segregation of duties
B) independent verification
C) accounting records
D) supervision
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
74
The four principal types of fraud include all of the following except
A) bribery
B) gratuities
C) conflict of interest
D) economic extortion
A) bribery
B) gratuities
C) conflict of interest
D) economic extortion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
75
Business ethics involves
A) how managers decide on what is right in conducting business
B) how managers achieve what they decide is right for the business
C) both a and b
D) none of the above
A) how managers decide on what is right in conducting business
B) how managers achieve what they decide is right for the business
C) both a and b
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
76
Which of the following is not an internal control procedure?
A) authorization
B) management's operating style
C) independent verification
D) accounting records
A) authorization
B) management's operating style
C) independent verification
D) accounting records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following is not an example of independent verification?
A) comparing fixed assets on hand to the accounting records
B) performing a bank reconciliation
C) comparing the accounts payable subsidiary ledger to the control account
D) permitting authorized users only to access the accounting system
A) comparing fixed assets on hand to the accounting records
B) performing a bank reconciliation
C) comparing the accounts payable subsidiary ledger to the control account
D) permitting authorized users only to access the accounting system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
78
Internal control system have limitations.These include all of the following except
A) possibility of honest error
B) circumvention
C) management override
D) stability of systems
A) possibility of honest error
B) circumvention
C) management override
D) stability of systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which of the following is the best reason to separate duties in a manual system?
A) to avoid collusion between the programmer and the computer operator
B) to ensure that supervision is not required
C) to prevent the record keeper from authorizing transactions
D) to enable the firm to function more efficiently
A) to avoid collusion between the programmer and the computer operator
B) to ensure that supervision is not required
C) to prevent the record keeper from authorizing transactions
D) to enable the firm to function more efficiently
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck
80
An accounting system that maintains an adequate audit trail is implementing which internal control procedure?
A) access controls
=b)
Segregation of functions
C) independent verification
D) accounting records
A) access controls
=b)
Segregation of functions
C) independent verification
D) accounting records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 158 في هذه المجموعة.
فتح الحزمة
k this deck

