All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
essentials of accounting for governmental
Questions and Answers of
Essentials Of Accounting For Governmental
Brenda is married to Tom. Three years ago, Tom confided in Brenda that he had overstated certain expenses of his unincorporated business in order to lower the amount of taxes to be paid. Brenda knows
Robert Anderson is the CIO for Zona Verde, a medium-sized lawn maintenance company that services most of western Pennsylvania. Zona Verde has built up its business over a 25-year period and now has
Mary Church, an internal accountant for Wardak Construction Consulting, is investigating a loss of \($100,000\) via four checks for \($25,000\) each. It appears that the checks had been stolen from
Tania Greenbar is the controller for Malwick Department Store. Malwick is a family-run business that has been around for 80 years. Despite the onslaught of discount stores and department store
Frans Cutler is in charge of information technology for GreenSpace Manufacturing Inc. GreenSpace manufactures portable office cubicles that can be inserted inside existing office buildings. The
You have been contacted by law enforcement to help prepare a case against the owners of Lomares, a large sea- food restaurant on the north central coast of Florida. It is believed that the restaurant
The Amigito Insurace Agency (continued from chapter 8) First thing Monday morning. Jason arrived at Perdido's agency. Luckily, his client load was very light, so he I was able to take his first
Which of the following is not a type of occupational fraud?a. Corruption.b. Asset misappropriation.c. Conflict of interest.d. All of the above are types of occupational fraud.
Which of the following is not an example of an external fraud?a. An outsider giving a kickback to a purchasing officer.b. An offshore hacker stealing customer credit card data.c. A customer opens a
The profile of the typical fraudster in the organizations suggests.a. A criminal background.b. A dysfunctional psychological background.c. Antisocial tendencies.d. None of the above.
POS schemes are a form ofa. Sales skimming schemes.b. Corruption schemes.c. Lapping schemes.d. None of the above.
The absence of a voucher package would most likely be associated with a(n).a. Vendor.b. Corruption.c. Payroll.d. None of the above.
Check washing is most likely to be associated with,a. A payroll fraud scheme.b. Identity theft. fraud scheme.c. Fake credit accounts.d. None of the above.
Generally speaking, the most likely issue in production fraud is.a. Improper hiring of production employees.b. Inventory losses.c. A lack of adequate supervision.d. None of the above.
Which is not a vector of attack in electronic systems?a. Input manipulation.b. Program alteration.c. Sabotage.d. All of the above are vectors of attack in electronic systems.
A scheme in which a vendor seeks to overbill involvesa. Balanced billing.b. Balance billing.c. Invoice billing.d. None of the above.
____________________ provides an exemption for workplace investigations for suspected misconduct relating to employ- ment, a suspected violation of state or federal laws, or a violation of a
Which of the following is not associated with identity theft?a. Hackers.b. Shoulder surfers.c. Street thieves.d. All of the above are associated with identity theft.
Which money-laundering technique involves making many small deposits in different locations?a. Currency structuring.b. Smurfing.c. The use of a financial intermediary.d. None of the above.
Which of the following is not a traditional area of crime for the LCN?a. Loansharking.b. Labor racketeering.c. Gambling.d. All of the above are traditional areas of crime for the LCN.
Terrorism representsa. A special type of organized crime. b. An organization that engages in reverse money laundering.c. Both a andd. Neither a nor b.
Why are there no Chapters 1, 2, 3, 4, 5, or 6 bankruptcy proceedings?
When might VS section 100 apply to a CPA's work in a bankruptcy proceeding?
The means test is applicable to consumers in which bankruptcy chapter?
What is the significance of Rule 2004?
Name three bankruptcy crimes.
Why might a fraudster use a stolen identity to file bankruptcy?
Who appoints bankruptcy trustees?
In what way is divorce similar to bankruptcy?
Why might a loan application be a good place to look for evidence of hidden assets?
What is a bust-out scheme?
What is a bleed-out scheme?
How might an involuntary bankruptcy be used as part of a bankruptcy fraud scheme?
What is a Section 341 hearing?
What is the debtor audit program?
You have been engaged as a consultant by a bankruptcy creditor. Your client believes that the debtor has secretly transferred assets to a sister company. How might you investigate?
You are a CPA, CFE, and forensic accountant, and you have been asked to serve as a private trustee in a bankruptcy proceeding. Would such an engagement be consistent with your serving as an expert
You have been engaged to assist a creditor with performing a Rule 2004 examination of a debtor. Your client suspects that the debtor has hidden bank accounts. How would you proceed to investigate?
You have been engaged to assist a creditor in a Section 341 hearing. How might your interviewing skills help?
You have been asked to investigate a possible bust-out scheme in a bankruptcy case for a department store. In many cases, apparent bust-out schemes are really just poor management. What can you
You are investigating a debtor in a bankruptcy hearing. Your thorough search of public records shows no trace of any reference to the debtor. What might this mean?
You are investigating a debtor in a bankruptcy proceeding. The debtor has a very slick lawyer who has handled many bankruptcies for failed businesses in the past. In the four cases that you have
You are investigating a failed business for hidden assets. Your reconciliation of physical assets to the balance sheet shows that all assets are accounted for. What else must you do to make sure
You are acting as the trustee in a bankruptcy proceeding. The case has progressed to the end, and the court is ready to issue a final order discharging all debt. However, one creditor comes to you
You have consulted for debtors in many bankruptcy proceedings, but for the first time, you are engaged with a client to see if her husband is concealing assets in the couple's divorce. How should you
Visit www.justice.gov and find the minimum qualifications for appointment as a bankruptcy panel trustee. Write a brief report on your findings.
Research "bankruptcy accounting" and "bankruptcy examiner" and 11 US. Code 1104 on the Internet. What is a bankruptcy examiner? What are the qualifications of a bank examiner? How does bankruptcy
Research Rule 2004 and answer the following questions:a. Who may examine and be examined under Rule 2004?b. How does a party obtain approval to conduct a 2004 examination?c. How can a Rule 2004
What is a gap trustee? To what type(s) of bankruptcy does a gap trustee apply? How does a gap trustee differ from a "regular" trustee?
Visit the IRS's website (www.irs.gov/compliance/criminal-investigation/bankruptcy-fraud-criminal- investigation-cl) and write a brief summary of the IRS Bankruptcy Fraud Investigation Program.
The GXY Clothier Company failed and filed for Chapter 7 bankruptcy. Only one day after GXY closed its doors. the same owners opened up GKY, a new store directly across the street from GXY with nearly
Debra Car is a credit manager for GlobalRed Wireless Services. She works with franchise stores that sell her company's wireless services and phones. She recently had to deal with one of her large
Jay Larkin is a county judge who has served on the bench for over 20 years. He is very popular and well-liked for his professional treatment of lawyers, his knowledge of the law, and his fair
Mary Bell is the loss manager for Abrick Jewelry Store. Abrick focuses on diamond jewelry for special occasions like engagements and anniversaries. Abrick's markup is as much as 10 times cost. For
You have been engaged to assist in a bankruptcy proceeding Your client, Barae Pharmaceuticals, won a \($2\) mil- lion judgment against Bara Pharmaceuticals for misuse of Barae's name in the
The Amigito Insurance Agency (continued from chapter 9) Jason remembered something that Bruce had said on the phone. "Don't be fooled by the looks of Matilda's office. Jason understood Bruce's
In which of the following roles is the practitioner not permitted to serve in bankruptcy proceedings? a. Consultant. b. Trustee.c. Examiner.d. The practitioner is permitted to serve in all the
Generally speaking, if the practitioner provides bankruptcy services in some other role besides that of a consultant,a. CS section 100 applies.b. CS section 100 applies to roles other than trustee.c.
Means testing individuals is a central part of the most recent reforms in bankruptcy laws and has made it more difficult for individuals to have their debtsa. Totally dismissed.b. Subjected to a
If a consumer debtor's current median income (adjusted for certain IRS-allowed deductions) exceeds specific maximum-income thresholds.. may request that the case be dismissed.a. Only the trustee.b.
The bankruptcy law requires __________________ to investigate the client's filing. a. Practitioners. b. Attorneys.c. The bankruptcy magistrate.d. None of the above.
Withholding documents related to the debtor's property or financial affairs from the standing trustee or other officer of the court is an example ofa. A discovery violation.b. A violation of the
Secretly transferring assets and selling assets below market value refers toa. A fraudulent conveyance.b. A filing scheme. c. Undocumented transfers.d. None of the above.
Which of the following schedules and statements is not typically included with a bankruptcy filing?a. Statement of financial affairs.b. Creditors holding standard unsecured claims.c. Co-debtor.d. All
Rule 2004 of the Federal Bankruptcy Code permits involved with the case.a. The trustee only.b. Creditors only. to obtain a court order to examine any entity c. The court only.d. Any party in
In business bankruptcies, audited financial reports,a. Are reliable sources of information in identifying assets subject to bankruptcy proceedings.b. Are not reliable sources of information in
Depleted pension funds would most likely be associated witha. A bust-out scheme.b. A bleed-out scheme. c. A debtor-creditor collusive scheme.d. None of the above.
Which of the following situations does not involve concealed-assets frauds?a. Divorces.b. Partnership dissolutions. c. Estates.d. All of the above involve concealed-asset frauds.
Debtor-creditor schemes are most likely to occur in cases ofa. The debtor having been barred from filing for bankruptcyb. The creditor having recently acquired a new company.c. The debtor having
What is the relationship between digital forensics and computer forensics?
What possible Fourth Amendment issue may arise in a digital search and seizure action?
What do a CSI and a computer forensics examiner have in common?
Name three important requirements for a digital forensics lab.
What are basic digital forensics skills?
What are some special skills of fraud auditors?
What is slack space?
Why are bit-stream copies used?
Why is IP tracing limited?
What special issues exist with acquiring data from RAID drives?
What is the relationship between data analytics and computer forensics?
What is the difference between "basic analytics" and "high-level analytics"?
How might a forensic accountant rely on advanced data analytics in an expert report?
Why are data marts needed?
How is a data warehouse different from a simple file storage system?
You have been asked to assist a detective with writing a probable cause affidavit in support of a request for a search warrant. The target of the investigation is a bookkeeper in a small business.
A junior associate in your firm has asked you what she must do to become a digital forensics expert. How do you respond?
You are a forensic accountant in a small practice. You have seized a computer for further examination. Where can you take the computer if you don't have a forensics lab?
You are examining a computer and looking for files that might have been deleted. How do you proceed?
You have received an incriminating word processor document via e-mail. You are unsuccessful in using IP trac- ing to identify the source of the message. What else might you do?
You investigate an office computer for evidence of participation in a misappropriation fraud. You find several spreadsheet files that you suspect may contain incriminating information. But the files
You remove a hard drive from a computer and take it back to your office lab for examination, but the entire hard drive is fully encrypted. What are your options?
You are hired to investigate suspected financial statement fraud in a company that is in bankruptcy. What types of skills will you need to conduct your investigation?
Someone is sending a series of threatening e-mail messages to employees in your company. How do you investigate?
You visit a company to investigate a fraud involving the company's computer network. The data you want to examine are on an enormous RAID server. The storage capacity of the server far exceeds what
You are advising a company that has an ongoing problem with bad debt in customer accounts. You suspect some type of fraud being committed by an employee or by customers, but don't have a good fraud
Find the FBI's website and research the requirements for employment as a member of an FBI CART or an RCFL
Search the Internet and find the most interesting case that involves computer forensics.
Visit all the individual RCFL sites and write a brief report on the types of cases on which the RCFLs focus. The RCFL directory is located at www.rcfl.gov.
Search the Internet and find an accounting firm that offers digital forensics services. Write a brief report on what you find.
Search the Internet and write a brief report on how computer forensics have helped with anti-terrorism efforts.
Showing 300 - 400
of 1650
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last