Peach Blossom Assingmnet 2

In: Other Topics

Submitted By supermiki
Words 1339
Pages 6
Assignment #2

The information that follows is grouped into two categories: 1) Internal Control and 2) Substantive Audit Procedures. This information is to be used to complete the exercises for this assignment.

Relevant Information
Internal Control

Peach Blossom Cologne Company’s general disbursement checking account (account number 101) is with the Big City National Bank, Main at Michigan Avenue, Chicago, Illinois. It is used for all cash receipts and disbursements transactions.

The following internal control questionnaire pertaining to cash receipts, cash disbursements, and cash balances was completed by Jasper Parsons on December 15, 2009. Review this questionnaire carefully along with the Permanent File material describing the control environment, as well as the accounting and control procedures related to the various cash subsystems. Your firm has found that personnel involved in this area are generally competent.

As you read this material and analyze the internal control questionnaire, keep in mind the six control procedure categories: (1) segregation of duties, (2) access, (3) authorization, (4) input controls, (5) processing controls, and (6) output controls. Then consider possible errors or irregularities that could occur in the accounting system related to cash transactions and balances.

Typical errors or irregularities involving cash receipts, disbursements, and balances include:

Cash Receipts

1. Cash receipts may have been deposited in the bank but not recorded in the cash receipts journal.
2. Cash receipts may have been recorded but not deposited in the bank.
3. The offsetting credit for the cash receipt may have been placed in the wrong account.
4. The amount of cash receipts may have been incorrectly recorded.
5. Cash receipts may have been recorded in the wrong accounting period.

Cash Disbursements


Similar Documents

Club It 2

...Club IT Part 2 After looking at club IT website I believe it should be upgraded to showcase the fun nightlife the clubs brings. This can be done by adding video footage of club events to the website also testimonials from club patrons speaking on their experience in club IT. With this marking system club IT can attract people not just in their area, but people from all over the world looking for a nice upscale safe club to party at when they are in town on vacation etc. The three business problems I see with club IT is lack of E-commerce, there back office in terms of internet access and efficient product and service. In order to gain more revenue Cub IT must make changes to their back office starting with the replacement of the speed of the internet from a dial up connection to the fastest speed available to them. As stated, at the moment Club IT sells advance tickets for special Friday and Saturday night concerts by phone or in person. However, my recommendation to the owners of club IT is to expand ticket sale not only on Special Friday and Saturday night concerts but all the days the club is open for business. This action will give customers more of an opportunity to buy advanced tickets and not have to wait on long lines to gain entry to club IT. Moreover, the implementation of a website as Ruben stated to sell tickets can also be used to advertize the club which in turn can have a positive impact on business. Forging new relationships between businesses is becoming...

Words: 719 - Pages: 3

Unit 2 Assign 2

...Unit 2 Assignment 2: Microsoft Environment Analysis Vulnerabilities: * “Cross-site request forgery (CSRF) vulnerability in the Services module 6.x-3.x and 7.x-3.x before 7.x-3.4 for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors”. * “SQL injection vulnerability in the Backend History module in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 allows remote authenticated backend users to execute arbitrary SQL commands via unspecified vectors”. * “The HP StoreOnce D2D backup system with software before 3.0.0 has a default password of badg3r5 for the HPSupport account, which allows remote attackers to obtain administrative access and delete data via an SSH session.” * “The default configuration of the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 contains a known SSH private key, which makes it easier for remote attackers to obtain root access, and spoof alerts, via an SSH session.” * Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.” Elevation/Priority: * The priority level is medium, also should be seen to when possible. Priority Level =......

Words: 565 - Pages: 3

Jet 2 Task 2

...Rachel Johnson Addy JET Task 2 March 29, 2014 JET Task 2 1. A budget is an itemized estimate of expected income as well as estimated expenses over a specified period of time. The reason to design a budget is to regulate spending. There are multiple causes of concern with Competition Bikes budget plan. The main cause for concern is that the sales estimated for year 9 is 3,510 units. This estimate is not supported by past sales data. Due to the current economic status, the amount of units sold from year 7 to 8 decreased 15% according to the horizontal analysis. Rider sponsorships were also reduced and will most likely remain limited in the future (WGU, 2014). There is some misleading and inaccurate information posted within the budget. Under the Selling, General, and Administrative breakdown “utilities” is listed at $150,000 on the vertical analysis for year 8 and year 9. Then there is another listing for “utilities and services” of $54,000. This is misleading because this entry was not listed in the expenses from the previous year. Another cause of concern is that the cash budget is not included in the uncollected receivables. CB makes expensive bikes so there should be room for uncollectable accounts. The uncollectable receivables budget could be used to cover the any uncollected payments. The reduction of sponsorships and the slow economy could possibly cause a rise in uncollectable accounts. There is also some concern because the operating income is......

Words: 1749 - Pages: 7

Blossom and Grueba

...Blossom and Grueba Blossom and Grueba Deep in a swamp in a faraway town lied a lily pad community known for its marshy waters and remoteness, called Caymaris. Within its population there was a beautiful bullfrog named Blossom whom every one envied, for her long green legs, slender torso, and stunning emerald eyes, she was the talk of the bog. Other Inhabitants all prayed one day to be as alluring as her. Though Blossom was the fairest Bullfrog in her town, her sister Grueba did not have any of these attributes. She was polar opposite of Blossom, the kindest, hardworking Frog you could ever meet. She was always willing to lend a helping hand to anyone in need and volunteered to deliver food to all the hungry frogs of the town. Her torso was compact, round, and her eyes were off centered and as black as coal, and the legs she used to carry out her kindness were short and stumpy. Blossom never wanted any of the bayou to know that Grueba was her sister, for she thought she’d be ridiculed. Daily Blossom would go about her routine of awaking dressing prim and proper even styling her hair with a neatly done ponytail and a gigantic white bow adhering it together. While Grueba's hair was always a mess, and all the kids teased her and called her names. Every morning on their treacherous walk to school across the wetland and through the forest Blossom would be sure to stride far ahead of Grueba, to ensure that none of her classmates could see that they were......

Words: 1144 - Pages: 5

Menu Project Part 2

...sliced fresh strawberries ½ oz graham crackers (2 crackers) ½ cup diced peaches, Water ½ oz wheat crackers (4 crackers) ½ oz cheddar cheese Water Lunch • Milk • Bread • Fruit/Vegetable • Fruit/Vegetable • Protein ½ turkey sandwich with 1.5oz turkey ½ cup cooked vegetables ½ banana ¾ cup low-fat milk 1 Pizza Pocket 1/2 cup green salad w/1 Tbsp low-fat dressing 1/2 cup apricot halves 4 oz low-fat yogurt ¾ cup low-fat milk 1.5oz Baked Chicken 1/2 cup boiled carrots 1/2 cup fresh orange sections ¼ cup cooked rice ¾ cup low-fat milk 1 ½ oz lean, broiled hamburger patty 1/2 cup lettuce and tomato salad 1/2 cup pineapple ½ whole wheat bun ¾ cup low-fat milk ½ Toasted Cheese and Tomato Sandwich with 1.5 oz low-fat cheese 1/2 cup broccoli ½ cup sliced peaches ¾ cup low-fat milk Afternoon Snack • Bread • Fruit/Vegetable or Milk ½ bagel 1.5oz cream cheese Water 1/2 slice banana bread ¾ cup low-fat milk ½ cup sliced pears ¾ cup low-fat milk ½ whole wheat roll with 1Tbsp peanut butter ¾ cup low-fat milk ½ biscuit ½ cup diced fresh pineapple Water Part II: Menu Cont. Children 3-5 Years Old Monday Tuesday Wednesday Thursday Friday Diner • Milk • Bread • Fruit/Vegetable • Fruit/Vegetable • Protein 1.5oz. cooked meat ½ cup cooked mixed vegetables ½ cup fresh orange sections ½ cup rice or pasta 3/4 cup low-fat milk 1.5oz Oven-Baked Parmesan Chicken 1/2 cup steamed broccoli 1/2 cup fresh apple slices ½ whole wheat roll ¾......

Words: 605 - Pages: 3

Unit 2 Asignment 2

...Unit 2 Assignment 1 Blank Answer Sheet Name: Date: Electronics ET2530 Chapter 2 (pp. 111-113) 2. A 1500 kHz carrier and a 2 kHz intelligence signal are combined in a non-linear device. List all the frequency components produced. - 1498, 1500, and 1520KHz 3.If a carrier is amplitude modulated what causes the sideband frequencies? - The non-linear mixing of the carrier and intelligence frequencies. 
 4.What determines the bandwidth of emission for an AM transmission? - It is twice the frequency of the highest audio frequency transmitted. The upper sideband is fc +FM where fc is the carrier frequency and FM is the modulation (audio) frequency .The lower sideband is fc – FM. The total bandwidth is 2*FM 5.Explain the difference between a sideband and a side frequency. - A sideband carries the modulation or "information". in old fashioned AM and FM transmission schemes, a carrier is broadcast in addition to the sideband(s). Only the sideband is needed to communicate. A spurious frequency that happens when a carrier is transmitted has no added "information" and just adds to the transmission bandwidth. Sometimes these occur by intermixing within the transmitter. a common example is CB splatter from overdrive of RF amps. 
 9.Draw a diagram (or indicate which text book Figure # shows this) of a carrier wave envelope when modulated by 50% by a sinusoidal wave. Indicate on the diagram the dimension from which the percentage of modulation is......

Words: 734 - Pages: 3

Peach Blossom Cologne Company

...Audit Planning Memo To: Peach Blossom Cologne From: Anderson, Olds, and Watershed Date: December 28, 2010 RE: Audit Plan  Our audit team, Anderson, Olds, and Watershed, will be auditing the financial statements for the year ended December 31, 2010. We will begin on January 11, 2011 and end February 5, 2011. The audit will follow a tentative time budget (reference P-1 Time Budget). Our objective is to correctly attest, following AICPA rules, as to whether the company Peach Blossom Cologne has issued financial statements that are fair by GAAP. The team has identified various risk factors involved in this audit engagement. As evidenced by our Internal Control Questionnaire, PBC has failed to prepare an organization chart, which would ensure that the employees are aware of their restricted duties and responsibilities to the company. We have also identified that management does not require personnel who have financial responsibilities to take annual vacations, which increases risks that frauds and/or errors may not be caught in the absence of the employee. Also, output devices such as printers are not located in a secure area and LAN reports are left unlocked. Upon further consideration of internal controls, we have noticed a few weaknesses regarding the handling of mail and separation of duties. All of these internal control deficiencies will be considered in the audit of PBC’s financial statements. Our team’s initial horizontal, vertical and ratio analyses have raised a......

Words: 328 - Pages: 2

Peach Tree a

...2 Risk and Return Peachtree Securities, Inc. (A) Peachtree Securities is a regional brokerage house based in Atlanta. Although the firm is only 20 years old, it has prospered by following a simple goal – providing quality personal brokerage services to small investors. Jake Taylor, the firm’s founder and president, is well-satisfied with Peachtree’s progress. However, he is apprehensive about the future, as more and more of the firm’s customers are buying mutual funds rather than individual stocks and bonds. Thus, even though the number of customers per office has been increasing because of population growth, the number of transactions per customer has been decreasing, and hence sales growth has slackened. Taylor believes this trend will continue, so he has been actively expanding his product line in an effort to increase sales volume. As a first step, Peachtree began offering trust and portfolio management services five years ago. Many of the trust clients are retirees who are interested primarily in current income rather than capital gains. Thus, an average portfolio consists mostly of bonds and high yield stocks. The stock component is heavily weighted with electric utilities, an industry that has traditionally paid high dividends. For example, the average electric company’s dividend yield was about 6.3 percent in 1992, versus an average stock’s yield of 3.1 percent. Until 1993, Peachtree had no in- house security analysts –all stock and bond selections were based on......

Words: 2382 - Pages: 10

Blossom Gardens

...1. Describe what you perceive to be the pros and cons of this deal from a qualitative perspective. Pros: There’re several obvious advantages of this deal, including: Superior location: This apartment is located on Dickens Street, one block South of Ventura Boulevard. The convenient transportation with easy access to 405 and 101 Freeways makes it an ideal place to live in for those who work in the major employment centers such as Burbank, Hollywood and Beverly Hills. Moreover, it provides the tenants with abundant necessities like shopping centers and restaurants. Well-designed with high quality construction: The apartment has excellent unit mix of Studio, 1 bd/1 ba, 2 bd/1 ba, and 3 ba/2 ba. With the combination of different kinds of units, the apartment better meets the potential tenants’ need and will lead to an easier tenants bring-in and suffer less volatility in future. Also, the well maintained Courtyard with swimming pool and outdoor eating area provides a nice environment. What’s more, the new copper pluming system, vaulted ceiling, central air and heat system add value to this apartment and differentiate it from other potential deals. Potential high capital gain: Due to low historic interest rates and a growing population, price of the area’s single family and condominium went through a continuous rise in recent years. This not only widen the rent/own affordability gap which may result in lower vacancy rate, but also provides the possibility of an extra capital......

Words: 1055 - Pages: 5

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2


...Ninguno ÍNDICE 1. Situación de la empresa y/o de la persona que toma las decisiones 2. Problema central 3. Hechos relevantes al problema central 4. Análisis 1. Análisis cuantitativo 2. Análisis cualitativo 5. Alternativas de solución 5.1. Rediseño del flujo de procesos 5.2. Reestructuración de la distribución de planta 5.3. Implementación del área de desarrollo de producto 5.4. Manual de organización y funciones 6. Política de compras de Eastern Gear Inc 7. Política de ventas 8. Conclusiones 9. Recomendaciones SITUACIÓN DE LA EMPRESA Y/O DE LA PERSONA QUE TOMA LAS DECISIONES: Se sabe que los negocios de la empresa han crecido ya que los dos primeros años la empresa perdió dinero, pero durante los últimos meses se ha logrado una pequeña utilidad. La ventas han aumentado el último trimestre y se proyecta un mayor crecimiento, pese a esto es necesario que se reduzca el lead time y rediseñar el flujo de procesos de tal manera que se genere mayor utilidad. PROBLEMA CENTRAL La situación actual de la empresa manifiesta un flujo de procesos inadecuado para el giro del negocio, falta de protocolos, reuniones, pactos, acuerdos, políticas, estrategias, objetivos, etc. genera que la empresa incurra en muchos reprocesos y desaceleración del flujo normal operativo, generando cuellos de botellas, cayendo en muchos casos en la poca respuesta ante el cambio de productos (demora en el suministro de materiales), volumen del pedido......

Words: 4385 - Pages: 18

Assignment 2 care administrator today is the changing structure of health care and a declining workforce. Hospitals are becoming specialized where top dollar reimbursement can be achieved which leaves a gap in basic traditional services. The declining workforce is seeing a stress on the worker as the American workforce does not want to work weekends or long shifts and the world of many health care organizations such as hospitals is a 24 hour 7 day a week operation. We will need to work with our staff to in order to meet the organizations needs as well as the individuals. The greatest lesson taken from this article is to hire individuals who posses the skills you need within your health care organization and then allow your employees to blossom. While being well versed in financial aspects of the operations it was stressed by Spaethe to keep in mind that health care is a people business and being able to relate and bring the best out in your employees is needed. Reference: Grazier, K. L. (2005, May). Interview with Ronald G. Spaeth, FACHE, president, Evanston Northwestern Healthcare Foundation, Northbrook, Illinois. Retrieved January 24, 2016, from

Words: 455 - Pages: 2

Stock Case Peach Tree

...president, gave Donahue her second task: determine the value of TECO Energy’s securities (common stock, preferred stock, and bonds) and prepare a seminar to explain the valuation process to the firm’s customers. To begin, Donahue reviewed the Value Line Investment Survey data. Next Donahue examined Teco’s latest Annual Report, especially Note E to the Consolidated Financial Statements. This note lists TECO’s long-term debt obligations, including its first- mortgage bonds, installment contracts, and term loans. Table 1 contains information on three of the first-mortgage bonds listed in the Annual Report. Table 1 Partial Long Term Debt Listing for TECO Energy Face Amount Coupon Rate Maturity Year Years to Maturity $ 48,000,000 4 1/2% 1997 5 32,000,000 8 ¼ 2007 15 100,000,000 12 5/8 2017 25 Note: The terms stated here are modified slightly from the actual terms to simplify the case. A concern which immediately occurred to Donahue was the phenomenon of “event risk.” Recently, many investors have shied away from the industrial bond market because of the wave of leveraged buyouts (LBOs) and debt-financed corporate takeovers that took place during the 1980s. These takeovers were financed by issuing large amounts of new debt—often high-risk “junk” bonds—which caused the credit rating of the firm’s existing bonds to drop, the required rate of return to increase, and the price of the bonds to decline. Donahue wondered if this trend would affect the required......

Words: 1215 - Pages: 5

Assingmnet Coca Cola

...Chapter 2: The Business Concept 10 2.1. Brief Discussion of the Business Idea: 10 2.2. Business Objectives 10 2.3. Mission 11 2.4. Keys to Success 11 2.5. Product Description 11 Chapter 3: Feasibility 14 3.1. Primary and secondary market research 14 3.1.1. The UK market 14 3.1.2. The UK Domestic Production 16 3.1.3. Third Party Importing Activities: 17 3.2. Feasibility 17 3.2.1. Products Positioning 17 3.2.2. Industry/Market: 18 3.2.3. Organizational 19 3.2.3. Financial Feasibility 19 3.3. Resource requirement evaluation 21 Chapter 4: Strategic Analysis and Business Model 23 4.1 Strategic Analysis of the business idea 23 4.2 SWOT analysis 24 4.3 Sources of competitive advantage and sustainability 26 4.4 Selection of strategies for success 26 4.5 Development of appropriate Business Model 27 Chapter 5: Business Plan 29 5.1. Overall assessment of the Business Development Proposal 29 5.2. Business Plan 29 5.2.1. Marketing Strategy 29 (1) Beds 29 (2) Wardrobes 29 (3) Chairs 29 (4) Tables 29 (5) Doors 30 (6) Other Art Nouveau product applications 30 5.2.2. Pricing Strategy 30 5.2.3. Promotion Activity 31 5.2.4. Store Location 32 5.3. Discussion of critical success/failure factors 33 5.3.1. Political Risks 33 5.3.2 Legal Risks 33 5.3.3 Cultural Risks 35 5.3.4 Financial Risks 36 5.3.5 Competitive Risks 36 5.4. Schedule for First Year Operation 37 5.4.1 Quarter 1 – 2012 37 5.4.2 Quarter 2 –......

Words: 9630 - Pages: 39

Unit 2 Assignment 2

...Unit 2 Assign.2 Last 5 Published or Updated Security Advisories: Microsoft Security Advisory (2737111) Vulnerabilities in Microsoft Exchange and FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution Published or Last Updated: Wednesday, July 25, 2012 Microsoft Security Advisory (2728973) Unauthorized Digital Certificates Could Allow Spoofing Published or Last Updated: Wednesday, July 11, 2012 Microsoft Security Advisory (2719662) Vulnerabilities in Gadgets Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2719615) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution Published or Last Updated: Tuesday, July 10, 2012 Microsoft Security Advisory (2491888) Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of Privilege Tuesday, March 08, 2011 2. Do any vulnerability involve privilege elevation? Is this considered a high priority issue? Yes one, but its importance was not considered a high priority issue as asked 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Advisory Number: 977981 Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.......

Words: 337 - Pages: 2