Exam 9: Expenditures Processes and Controls - Purchases
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
The internal control process that requires vendor statements to be reviewed monthly and reconciled with accounts payable records, will help to minimize the risk of:
(Multiple Choice)
4.8/5
(42)
The accounts payable department keeps copies of purchase orders and receiving reports, that will be compared to the related invoice, to be sure that the invoices represent goods that were ordered and received.
(True/False)
4.9/5
(32)
A purchase requisition is essentially an internal document, one that does not go outside the company, whereas a purchase order is an external document, which will be presented to an entity outside the company.
(True/False)
4.9/5
(42)
Corporate governance policies and procedures must be in place to assure that funds are expended only to the benefit the organization and its owners.
(True/False)
5.0/5
(33)
Which of the following questions would most likely be included in an internal control questionnaire concerning the completeness of purchasing transactions?
(Multiple Choice)
4.9/5
(35)
The date that is the end of the accounting period is referred to as the:
(Multiple Choice)
4.7/5
(30)
A company may reject goods received due to a number of reasons.The process related to this is referred to as:
(Multiple Choice)
4.8/5
(34)
A purchase order is essentially an internal document, one that does not go outside the company, whereas a purchase requisition is an external document, which will be presented to an entity outside the company.
(True/False)
4.9/5
(32)
A computer software technique in which the computer software matches a Purchase Order to its related receiving report and invoice is called an):
(Multiple Choice)
4.8/5
(34)
The internal control process that requires purchase return records be matched with the original purchase documentation and verified for item descriptions, quantities, dates, and prices, will help to minimize the risk of:
(Multiple Choice)
4.8/5
(40)
The internal control process that requires the approval of the purchase return transaction take place before the preparation of the debit memo, will help to minimize the risk of:
(Multiple Choice)
4.8/5
(32)
This control requires the approval and signature of two authorized persons, on checks over the predetermined threshold amount, which reduces the risk of significant fraud or error.
(Multiple Choice)
4.7/5
(37)
Because the evaluated receipts settlement process relies heavily on an IT system that can quickly access online purchase-order files, a system slowdown could halt all receiving activity.
(True/False)
4.8/5
(46)
The security of assets and documents related to cash disbursements would include all of the following, except:
(Multiple Choice)
4.9/5
(24)
Advantages of an automated system includes all of the following, except:
(Multiple Choice)
4.8/5
(44)
A record keeping tool used to record purchases in a manual accounting system.This "tool" would consist of recording all of the purchased orders issued to vendors in a chronological order.
(Multiple Choice)
4.8/5
(43)
Cash should be periodically verified by comparing the balance in the check book with the balance in the cash account in the general ledger.
(True/False)
4.8/5
(41)
In order to institute an automated matching system, all of the relevant files must exist in the same physical room.
(True/False)
4.8/5
(31)
In order to help safeguard the security and confidentiality in an electronic business environment, a company should implement controls such as user ID, password, log-in procedures, access levels, and authority tables in order to reduce the risk of:
(Multiple Choice)
5.0/5
(42)
Showing 61 - 80 of 128
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)