Académique Documents
Professionnel Documents
Culture Documents
1. The Sarbanes-Oxley Act of 2002 (SOX) 2002 requires the management of all companies and their
auditors to assess and report on the design and effectiveness of internal control over financial
reporting annually.
True False
2. According to the Sarbanes-Oxley Act of 2002, it is the responsibility of the Board of Directors to
establish and maintain the effectiveness of internal control.
True False
True False
True False
5. Segregation of duties reduces the risk of errors and irregularities in accounting records.
True False
6. The chief executive officer is ultimately responsible for enterprise risk management.
True False
10-1
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
7. The risk of a company's internal auditing processes failing to catch the misstated dollar amount of
revenue on the company's income statement is classified as inherent risk.
True False
True False
9. COBIT (Control Objectives for Information and related Technology) is a generally accepted
framework for IT governance in the U.S.
True False
10. The main objective of the ISO 27000 series is to provide a model for establishing, implementing,
operating, monitoring, maintaining, and improving information security.
True False
11. Given the requirement of the Sarbanes-Oxley Act of 2002 (SOX), the Public Company Accounting
Oversight Board (PCAOB) established the Securities and Exchange Commission (SEC) to provide
independent oversight of public accounting firms.
True False
12. Public Company Accounting Oversight Board (PCAOB) Auditing Standard No. 5 (AS 5) encourages
auditors to start from the basic/bottom of financial records to identify the key controls.
True False
13. Corporate governance is a set of processes and policies in managing an organization with sound
ethics to safeguard the interests of its stakeholders.
True False
10-2
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
14. Internal control is a process consisting of ongoing tasks and activities. It is a means to an end, not
an end in itself.
True False
15. A firm must establish control policies, procedures, and practices that ensure the firm's business
objectives are achieved and its risk mitigation strategies are carried out.
True False
16. According to COSO, which of the following components of the enterprise risk management
addresses an entity's integrity and ethical values?
17. Which of the following items is one of the eight components of COSO's enterprise risk
management framework?
A. Operations.
B. Reporting.
C. Monitoring.
D. Compliance.
10-3
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
18. In a large pubic corporation, evaluating internal control procedures should be responsibility of:
20. Which of the following is the best way to compensate for the lack of adequate segregation of
duties in a small organization?
A. Disclosing lack of segregation of duties to external auditors during the annual review.
B. Replacing personnel every three or four years.
C. Requiring accountants to pass a yearly background check.
D. Allowing for greater management oversight of incompatible activities.
21. Review of the audit log is an example of which of the following types of security control?
A. Governance.
B. Detective.
C. Preventive.
D. Corrective.
10-4
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
22. Which of the following is not a component of internal control as defined by COSO?
A. Control environment.
B. Control activities.
C. Inherent risk
D. Monitoring.
24. Which of the following control activities should be taken to reduce the risk of incorrect processing
in a newly installed computerized accounting system?
A. Segregation of duties.
B. Ensure proper authorization of transactions.
C. Adequately safeguard assets.
D. Independently verify the transactions.
10-5
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
26. Obtaining an understanding of an internal control involves evaluating the design of the control
and determining whether the control has been:
A. Authorized.
B. Implemented.
C. Tested.
D. Monitored.
27. A manufacturing firm identified that it would have difficulty sourcing raw materials locally, so it
decided to relocate its production facilities. According to COSO, this decision represents which of
the following response to the risk?
A. Risk reduction.
B. Prospect theory.
C. Risk sharing.
D. Risk acceptance.
28. Each of the following types of controls is considered to be an entity-level control, except those:
29. Controls in the information technology area are classified into preventive, detective, and corrective
categories. Which of the following is preventive control?
A. Contingency planning.
B. Hash total.
C. Echo check.
D. Access control software.
10-6
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
30. All of the following are examples of internal control procedures except
31. The Public Company Accounting Oversight Board (PCAOB) is not responsible for standards related
to:
A. Accounting practice.
B. Attestation.
C. Auditing.
D. Quality control over attestation and/or assurance.
32. Which of the following most likely would not be considered as an inherent limitation of the
effectiveness of a firm's internal control?
A. Incompatible duties.
B. Management override.
C. Mistakes in judgment.
D. Collusion among employees.
33. According to COSO which of the following is not a component of internal control?
A. Control risk.
B. Control activities.
C. Monitoring.
D. Control environment.
10-7
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
34. When considering internal control, an auditor should be aware of reasonable assurance, which
recognizes that
A. Internal control may be ineffective due to mistakes in judgment and personal carelessness.
B. Adequate safeguards over access to assets and records should permit an entity to maintain
proper accountability.
C. Establishing and maintaining internal control is an important responsibility of management.
D. The cost of an entity's internal control should not exceed the benefits expected to be derived.
35. Proper segregation of duties calls for separation of the following functions:
37. The overall attitude and awareness of a firm's top management and board of directors concerning
the importance of internal control is often reflected in its
A. Computer-based controls.
B. System of segregation of duties.
C. Control environment.
D. Safeguards over access to assets.
10-8
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
38. Management philosophy and operating style would have a relatively less significant influence on a
firm's control environment when
A. Specific controls.
B. Types of potential fraud.
C. Financial statement assertions.
D. Control environment factors.
41. The framework could be used by management in its internal control assessment under
requirements of SOX is the:
10-9
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
42. The internal control provisions of SOX apply to which companies in the United States?
A. All companies.
B. SEC registrants.
C. All issuer (public) companies and nonissuer (nonpublic) companies with more than $100,000,000
of net worth.
D. All nonissuer companies.
A. Detective.
B. Preventive.
C. Adjustive.
D. Non-routine.
44. Sound internal control dictates that immediately upon receiving checks from customers by mail, a
responsible employee should
45. Tracing shipping documents to pre-numbered sales invoices provides evidence that
10-10
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
46. Which of the following input controls is a numeric value computed to provide assurance that the
original value has not been altered in construction or transmission?
A. Hash total.
B. Parity check.
C. Encryption.
D. Check digit.
47. A customer intended to order 100 units of a product A, but incorrectly ordered nonexistent
product B. Which of the following controls most likely would detect this error?
A. Validity check
B. Record count
C. Hash total
D. Parity check
A. The computer ensures that a numerical amount in a record does not exceed some
predetermined amount.
B. As the computer corrects errors and data are successfully resubmitted to the system, the causes
of the errors are printed out.
C. The computer flags any transmission for which the control field value did not match that of an
existing file record.
D. After data for a transaction are entered, the computer sends certain data back to the terminal
for comparison with data originally sent.
10-11
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
49. Which of the following is a computer test made to ascertain whether a given characteristic belongs
to the group?
A. Check digit.
B. Validity check.
C. Echo check.
D. Limit check.
Essay Questions
10-12
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
50. Put the listed steps in the corresponding parentheses in the risk assessment and response
approach diagram below.
10-13
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
51. What is the impact of the Sarbanes-Oxley Act of 2002 (SOX) on public companies and public
accounting firms?
52. Describe the three categories of objectives and five essential components of the COSO 2.0
framework.
10-14
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
54. What are the definitions of "governance" and "management" in the COBIT 5.0 framework?
55. Discuss the ethical values created in Starbucks. How do they help to form the firm's control
environment?
56. The information system of Company ABC is deemed to be 90% reliable. A major threat has been
identified with an exposure of $5,000,000. Two control procedures exist to deal with the threat.
Implementation of control A would cost of $140,000 and reduce the risk to 4%. Implementation of
control B would cost $100,000 and reduce the risk to 6%. Implementation of both controls would
cost $220,000 and reduce the risk to 2%. Given the data and based solely on an economic analysis
of costs and benefits, which control procedure should you choose?
10-15
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
57. Which internal control(s) would you recommend to prevent the following situations from
occurring?
a. While entering the details about a large credit sale, a clerk mistakenly typed in a nonexistent
account number. Consequently, the company never received the payment from this customer.
b. A customer filled in a wrong account number on the remittance advice. Consequently, a clerk
entered the same number into the system, and the payment was credited to another customer's
account.
c. After processing a large sales transaction, the inventory records showed negative quantities on
hand for several items.
10-16
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Chapter 10 Accounting Information Systems and Internal Controls Answer
Key
1. The Sarbanes-Oxley Act of 2002 (SOX) 2002 requires the management of all companies and
their auditors to assess and report on the design and effectiveness of internal control over
financial reporting annually.
FALSE
2. According to the Sarbanes-Oxley Act of 2002, it is the responsibility of the Board of Directors to
establish and maintain the effectiveness of internal control.
FALSE
10-17
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
3. In a computerized environment, internal controls can be categorized as general controls and
application controls.
TRUE
FALSE
5. Segregation of duties reduces the risk of errors and irregularities in accounting records.
TRUE
10-18
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
6. The chief executive officer is ultimately responsible for enterprise risk management.
TRUE
7. The risk of a company's internal auditing processes failing to catch the misstated dollar amount
of revenue on the company's income statement is classified as inherent risk.
FALSE
FALSE
10-19
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
9. COBIT (Control Objectives for Information and related Technology) is a generally accepted
framework for IT governance in the U.S.
TRUE
10. The main objective of the ISO 27000 series is to provide a model for establishing,
implementing, operating, monitoring, maintaining, and improving information security.
TRUE
11. Given the requirement of the Sarbanes-Oxley Act of 2002 (SOX), the Public Company
Accounting Oversight Board (PCAOB) established the Securities and Exchange Commission
(SEC) to provide independent oversight of public accounting firms.
FALSE
10-20
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
12. Public Company Accounting Oversight Board (PCAOB) Auditing Standard No. 5 (AS 5)
encourages auditors to start from the basic/bottom of financial records to identify the key
controls.
FALSE
13. Corporate governance is a set of processes and policies in managing an organization with
sound ethics to safeguard the interests of its stakeholders.
TRUE
14. Internal control is a process consisting of ongoing tasks and activities. It is a means to an end,
not an end in itself.
TRUE
10-21
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Topic: Ethics, Sarbanes-Oxley Act 2002 and Corporate Governance
15. A firm must establish control policies, procedures, and practices that ensure the firm's business
objectives are achieved and its risk mitigation strategies are carried out.
TRUE
16. According to COSO, which of the following components of the enterprise risk management
addresses an entity's integrity and ethical values?
10-22
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
17. Which of the following items is one of the eight components of COSO's enterprise risk
management framework?
A. Operations.
B. Reporting.
C. Monitoring.
D. Compliance.
18. In a large pubic corporation, evaluating internal control procedures should be responsibility of:
10-23
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
19. Which of the following represents an inherent limitation of internal controls?
20. Which of the following is the best way to compensate for the lack of adequate segregation of
duties in a small organization?
A. Disclosing lack of segregation of duties to external auditors during the annual review.
B. Replacing personnel every three or four years.
C. Requiring accountants to pass a yearly background check.
D. Allowing for greater management oversight of incompatible activities.
10-24
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
21. Review of the audit log is an example of which of the following types of security control?
A. Governance.
B. Detective.
C. Preventive.
D. Corrective.
22. Which of the following is not a component of internal control as defined by COSO?
A. Control environment.
B. Control activities.
C. Inherent risk
D. Monitoring.
10-25
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
23. Which of the following is considered an application input control?
24. Which of the following control activities should be taken to reduce the risk of incorrect
processing in a newly installed computerized accounting system?
A. Segregation of duties.
B. Ensure proper authorization of transactions.
C. Adequately safeguard assets.
D. Independently verify the transactions.
10-26
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
25. Which of the following statement is correct regarding internal control?
26. Obtaining an understanding of an internal control involves evaluating the design of the control
and determining whether the control has been:
A. Authorized.
B. Implemented.
C. Tested.
D. Monitored.
10-27
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
27. A manufacturing firm identified that it would have difficulty sourcing raw materials locally, so it
decided to relocate its production facilities. According to COSO, this decision represents which
of the following response to the risk?
A. Risk reduction.
B. Prospect theory.
C. Risk sharing.
D. Risk acceptance.
28. Each of the following types of controls is considered to be an entity-level control, except those:
10-28
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
29. Controls in the information technology area are classified into preventive, detective, and
corrective categories. Which of the following is preventive control?
A. Contingency planning.
B. Hash total.
C. Echo check.
D. Access control software.
30. All of the following are examples of internal control procedures except
10-29
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
31. The Public Company Accounting Oversight Board (PCAOB) is not responsible for standards
related to:
A. Accounting practice.
B. Attestation.
C. Auditing.
D. Quality control over attestation and/or assurance.
32. Which of the following most likely would not be considered as an inherent limitation of the
effectiveness of a firm's internal control?
A. Incompatible duties.
B. Management override.
C. Mistakes in judgment.
D. Collusion among employees.
10-30
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
33. According to COSO which of the following is not a component of internal control?
A. Control risk.
B. Control activities.
C. Monitoring.
D. Control environment.
34. When considering internal control, an auditor should be aware of reasonable assurance, which
recognizes that
A. Internal control may be ineffective due to mistakes in judgment and personal carelessness.
B. Adequate safeguards over access to assets and records should permit an entity to maintain
proper accountability.
C. Establishing and maintaining internal control is an important responsibility of management.
D. The cost of an entity's internal control should not exceed the benefits expected to be
derived.
10-31
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
35. Proper segregation of duties calls for separation of the following functions:
10-32
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
37. The overall attitude and awareness of a firm's top management and board of directors
concerning the importance of internal control is often reflected in its
A. Computer-based controls.
B. System of segregation of duties.
C. Control environment.
D. Safeguards over access to assets.
38. Management philosophy and operating style would have a relatively less significant influence
on a firm's control environment when
10-33
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
39. Control risk should be assessed in terms of
A. Specific controls.
B. Types of potential fraud.
C. Financial statement assertions.
D. Control environment factors.
10-34
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
41. The framework could be used by management in its internal control assessment under
requirements of SOX is the:
42. The internal control provisions of SOX apply to which companies in the United States?
A. All companies.
B. SEC registrants.
C. All issuer (public) companies and nonissuer (nonpublic) companies with more than
$100,000,000 of net worth.
D. All nonissuer companies.
10-35
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
43. Reconciliation of cash accounts may be referred to as what type of control?
A. Detective.
B. Preventive.
C. Adjustive.
D. Non-routine.
44. Sound internal control dictates that immediately upon receiving checks from customers by mail,
a responsible employee should
10-36
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
45. Tracing shipping documents to pre-numbered sales invoices provides evidence that
46. Which of the following input controls is a numeric value computed to provide assurance that
the original value has not been altered in construction or transmission?
A. Hash total.
B. Parity check.
C. Encryption.
D. Check digit.
10-37
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
47. A customer intended to order 100 units of a product A, but incorrectly ordered nonexistent
product B. Which of the following controls most likely would detect this error?
A. Validity check
B. Record count
C. Hash total
D. Parity check
A. The computer ensures that a numerical amount in a record does not exceed some
predetermined amount.
B. As the computer corrects errors and data are successfully resubmitted to the system, the
causes of the errors are printed out.
C. The computer flags any transmission for which the control field value did not match that of
an existing file record.
D. After data for a transaction are entered, the computer sends certain data back to the
terminal for comparison with data originally sent.
10-38
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
49. Which of the following is a computer test made to ascertain whether a given characteristic
belongs to the group?
A. Check digit.
B. Validity check.
C. Echo check.
D. Limit check.
Essay Questions
10-39
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
50. Put the listed steps in the corresponding parentheses in the risk assessment and response
approach diagram below.
G D H E F C A (No) B (yes)
10-40
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
AACSB: Reflective Thinking
AICPA BB: Industry
AICPA FN: Decision Making
Blooms: Understand
Difficulty: 2 Medium
Learning Objective: 10-02 Explain the objectives and components of the COSO internal control framework and the COSO
enterprise risk management framework.
Source: Original
Topic: Control and Governance Frameworks
10-41
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
51. What is the impact of the Sarbanes-Oxley Act of 2002 (SOX) on public companies and public
accounting firms?
SOX requires public companies registered with the SEC and their auditors to annually assess
and report on the design and effectiveness of internal control over financial reporting.
SOX also established the Public Company Accounting Oversight Board (PCAOB) to provide
independent oversight of public accounting firms. The PCAOB issues auditing standards and
oversees quality controls of public accounting firms.
10-42
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
52. Describe the three categories of objectives and five essential components of the COSO 2.0
framework.
Objectives:
1) Control Environment include the management's philosophy and operating style, integrity
and ethical values of employees, organizational structure, the role of the audit committee,
proper board oversight for the development and performance of internal control, and
personnel policies and practices.
2) Risk Assessment Risk assessment involves a dynamic process for identifying and analyzing
a firm's risks from external and internal environments.
3) Control Activities A firm must establish control policies, procedures, and practices that
ensure the firm's objectives are achieved and risk mitigation strategies are carried out.
4) Information and Communication Relevant information should be identified, captured, and
communicated in a form and timeframe that enables employees to carry out their duties.
5) Monitoring Activities The design and effectiveness of internal controls should be
monitored by management and other parties outside the process in an ongoing basis.
10-43
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
53. What are the three main functions of COSO ERM?
54. What are the definitions of "governance" and "management" in the COBIT 5.0 framework?
COBIT 5.0 defines "governance" as ensuring that firm objectives are achieved by evaluating
stakeholder needs; setting direction through decision making; and monitoring performance,
compliance and progress. In most firms, the board of directors is responsible for governance.
Per COBIT 5, "management" includes planning, building, running and monitoring activities in
alignment with the direction in achieving the firm objectives.
10-44
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
55. Discuss the ethical values created in Starbucks. How do they help to form the firm's control
environment?
56. The information system of Company ABC is deemed to be 90% reliable. A major threat has
been identified with an exposure of $5,000,000. Two control procedures exist to deal with the
threat. Implementation of control A would cost of $140,000 and reduce the risk to 4%.
Implementation of control B would cost $100,000 and reduce the risk to 6%. Implementation of
both controls would cost $220,000 and reduce the risk to 2%. Given the data and based solely
on an economic analysis of costs and benefits, which control procedure should you choose?
Estimate value of control A: 5,000,000*(10% - 4%) = $300,000 (problem states that Control A
reduces the risk TO 4%)
Estimate value of control B: 5,000,000*(10% - 6%) = $200,000 (problem states that Control A
reduced the risk TO 6%)
Estimate value of control A&B: 5,000,000*(10% - 2%) = $400,000
Benefits exceed cost of A: 300,000 - 140,000 = 160,000
Benefits exceed cost of B: 200,000 - 100,000 = 100,000
Benefits exceed cost of A&B: 400,000 - 220,000 = 180,000
Choose Control C.
10-45
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.
Blooms: Apply
Difficulty: 3 Hard
Learning Objective: 10-02 Explain the objectives and components of the COSO internal control framework and the COSO
enterprise risk management framework.
Source: Original
Topic: Control and Governance Frameworks
57. Which internal control(s) would you recommend to prevent the following situations from
occurring?
a. While entering the details about a large credit sale, a clerk mistakenly typed in a nonexistent
account number. Consequently, the company never received the payment from this customer.
b. A customer filled in a wrong account number on the remittance advice. Consequently, a clerk
entered the same number into the system, and the payment was credited to another
customer's account.
c. After processing a large sales transaction, the inventory records showed negative quantities
on hand for several items.
10-46
Copyright 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of
McGraw-Hill Education.