ACCT341, Study Guide for Test 2, Final

advertisement
ACCT341, Study Guide for Test 2, Final
Chapters 9-12, 14
The test will consist of two parts:
 The first part of the exam will be closed-book. It will cover the subject material on the
study guide below. This part of the exam should take no more than one-hour. Expect a
mixture of objective questions (e.g. T/F, MC) and short answers.
 The second part of the test will be open-book, open-note and you can use computers.
Anything we have covered since the mid-term (in the textbook or out of the textbook)
might show up on this part of the test. Doing your assignments, paying attention in class
and reading your chapters are prerequisites for doing well on this part.
Both parts of the test should be completed within the two-hour period, so if you take too long on
the closed-book portion, there may be insufficient time to complete the open-book portion
CLOSED-BOOK PORTION:
Chapter 9, Internal Controls in an AIS
1.
Be able to identify the five components of internal controls and the major controls that
fall under each component.
2.
Why are mandatory vacations important?
3.
How do fidelity bonds reduce the risk of loss caused by employee theft?
4.
In order to strengthen internal controls, which broad categories of duties should be
separated? (Remember ARCO).
5.
What is the fraud triangle? From the fraud cases covered, be able to use one case to
illustrate the fraud triangle.
6.
Be able to list at least four red flags of fraud.
7.
What percent of American workers steal on the job?
8.
What portion of asset misappropriation involves cash? Why?
9.
Know the definition of skimming, larceny and fraudulent disbursement and be able to
give a real-life example of each.
10.
Why are small business more vulnerable to fraud?
11.
What percent of revenue is estimated to be lost because of fraud?
12.
Which is more frequent or severe: asset misappropriation or financial statement fraud?
13.
In light of the most common initial detection method for fraud, what does the SarbanesOxley Act (SarbOx or Sox) require for public companies?
14.
What data support the effectiveness of anonymous hotlines?
15.
What relationship is there between the size of a fraud and the perpetrator’s position in the
company?
16.
Why are frauds committed by owner/executives more likely detected through a tip than
caught through internal controls?
17.
Define lapping and be able to give an example. Why do virtually all lapping schemes
eventually reveal themselves?
18.
How can shell companies be used to steal? What steps need to be taken to create a shell
company? Be familiar with the Starbucks case and other similar shell company cases.
19.
What internal controls can help prevent ghost employee fraud?
20.
What are two ways that cashiers can steal money?
21.
Why is it hard for top management to deal with an executive who commits fraud?
22.
What are the limitations of internal controls?
23.
Why are internal controls often ineffective against fraud perpetuated by top management?
24.
25.
Be able to give a real-life example.
We watched several videos in class. One video included a segment on the Crazy Eddie’s
case. Review the quiz over Crazy Eddie’s and be able to briefly summarize how and why
the fraud was perpetrated. Also, review the quiz about ZZZZ Best (Barry Minkow) video
and be able to briefly summarize the ZZZZ Best fraud and what Barry is doing today.
In light of the fraud cases we covered in the course, be prepared for a fraud case in which
you will need to identify the controls that could have prevented the fraud from occurring.
Chapter 10, Computer Controls in an AIS
26.
Be able to distinguish between the following and give real-life examples: cold site, hot
site, and flying-start site.
27.
If you owned a small business that used QuickBooks, how would you backup your files
in a responsible manner? Be specific.
28.
How much stronger is a 15-character password than an 8-character password?
29.
Distinguish between general and application controls.
30.
Study the various input controls (e.g. POS devices, input masks, edit tests, unfound
record tests, check digits) and know their purposes.
31.
Know the purpose of major processing controls, such as batch control totals and record
counts.
Chapter 11, Computer Crime & Ethics
32.
Review the following terms: salami technique, data diddling, logic bomb, hacker, virus,
worm, Trojan Horse, social engineering, lockout systems, forensic accountants (CFE),
dumpster diving, phishing, and smishing.
33.
Who is Kevin Mitnick? What did he do to get arrested and what is he doing now?
34.
Why is Robert Morris Jr. infamous and what did he do?
Chapter 12, Auditing AISs
35.
What is the primary concern of internal auditors? Who should they report to?
36.
What is the primary concern of external auditors?
37.
How does auditing around the computer differ from auditing through the computer?
Which is being done more today and why?
38.
Regarding the three approaches for auditing through the computer (test data, integrated
test facility, parallel simulation), know the advantages and disadvantages of each.
39.
Review the purpose of each of the following: audit hook, exception reports, transaction
tagging, snapshot technique.
40.
What is Benford’s Law and how can it be used? What is the probability that the first
digit in a number will be a 1? What about a 9?
41.
Which section of SarbOx deals with internal controls?
42.
What tools in Excel can be used to find spreadsheet errors?
Chapter 14, Accounting on the Internet
43.
Know the difference between HTML, XML and HTML.
44.
Understand how XBRL works, its benefits and its current status around the world. Has
the SEC mandated its use for public companies?
45.
Distinguish between e-payment and e-wallet.
46.
Understand the purpose of digital signatures, certificates and time stamps.
47.
Be able to decrypt a secret message using a simple encryption technique as illustrated in
your text.
Practice Set 2
48.
Know which windows in QB various transactions should be entered and how those
transactions affect the accounts (dr and cr). Transactions to know include: credit sales,
cash sales, receive payments, deposit money at bank, pay bills, pay sales tax, order
inventory, receive inventory ordered along with invoice, adjust inventory after physical
count, record depreciation, write-off to bad debts expense, adjust prepaid insurance, write
check to employee, record employer’s payroll, etc.
49.
What is the purpose of Form W-2? Form 941? Form 940? Who pays SS and MC tax?
How is FIT withholding determined? Who pays FUTA tax?
50.
Be able to explain the following terms: B&O tax, WCI tax, FUTA tax.
51.
Does QB allow a person to set up budgets and make comparison reports?
52.
What types of graphs does QB automatically produce?
53.
Be able to give an example for using the filter feature on QB.
54.
Be able to give an example of a form letter that QB automatically generates?
55.
Be able to give an example of how the password feature in QB can strengthen internal
controls.
56.
In QB, can you delete an account that has transactions posted in it? Can you merge two
accounts?
57.
In QB, what does it mean to make an account inactive? Is this the same as deleting an
account?
58.
Can a person customize invoices in QB and add letterhead or logos?
Practice Set 3
59.
Know the windows in Multiledger in which various transactions should be entered and
how the accounts are affected (dr and cr). For example, in which window would income
earned on credit (giving rise to a receivable) be entered?
60.
How is a profit from a partnership taxed? Which tax forms are sent to partner’s showing
their share of the taxable income?
61.
In a typical profit-sharing agreement, how are partners awarded for their work and for
their investment? Know the mechanics of how profits (losses) are distributed in a
partnership?
Practice Set 4 - Peachtree
62.
How is Peachtree (Sage50) similar to QuickBooks? Different? What options does
Peachtree allow that QuickBooks does not (and vice versa)? Which is your preference?
Why?
Download