Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

____ Which of the following is not a document that is part of the cash collection process? A. Remittance advice B. Cash receipts journal C.

image text in transcribed
____ Which of the following is not a document that is part of the cash collection process? A. Remittance advice B. Cash receipts journal C. Bank deposit slip D. Packing slip ____ Pre-numbering of source documents helps to verify that a) all transactions have been recorded since the numerical sequence serves as a control. b) no inventory has been misplaced. c) documents have been used in order. d) all cash has been collected. ____ Which control activity is intended to serve as a method to confirm the accuracy or completeness of data in the accounting system? A. authorization B. segregation of duties C. security of assets D. independent checks and reconciliations ____ When a company sells items over the Internet, there are many IT risks. The risk of hardware and software failures that prevent website sales would be a(n): A. Availability risk. B. Processing integrity risk. C. Security risk. D. Confidentiality risk. ____ The most difficult type of misstatement to discover is fraud that is concealed by: A. Over-recording the transactions B. Non-recorded transactions C. Recording the transactions in subsidiary records D. Related parties ____ Which of the following is not a condition in the fraud triangle? A. rationalization B. incentive. C. conversion D. opportunity. ____ According to the COSO report, there are five different interrelated components of internal control. Which of the following is not one of those five components? A. Code of Ethics B. Control Environment C Information and Communication D. Monitoring ____ The process of user identification to ensure that only authorized users are accessing the IT system, which occurs through the use of user ID, password, and other unique identifiers, is called: A. Processing Integrity B. Virtualization C. Availability D. Authentication

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Process Auditing Techniques Guide

Authors: J. P. Russell

1st Edition

0873895959, 978-0873895958

More Books

Students also viewed these Accounting questions