Reference no: EM13762301
A client of yours, a rapidly growing retailer in New Jersey, is seeking a loan at the bank. The bank has informed the client that in order for the loan to be considered, the company will need a certified audit. For several years your CPA firm has been providing tax services and financial statements for this rapidly growing retailer.
At the present time, there are two office personnel that handle the accounting. One, Jill, handles accounts receivables, cash and other related matters. Rita, the second office employee, performs the inventory and accounts payable functions. The cash deposits are made by Rita. If Rita cannot make the deposit due to her absence, Jill is glad to help out and take the money to the bank. Each person has been doing the same functions for many years. Both individuals are considered to be competent in their positions.
The owner has not bonded either employee and has complete trust in their honesty.
The financial information is summarized each month by the company's owner and sent to the CPA firm for the preparation of financial statements and tax returns.
The company's owner is not an accountant, but prides himself on obtaining an "A" in his high school bookkeeping class that he took before personal computers were invented.
Discuss in two paragraphs if internal controls in this scenario are adequate for the rendering of a certified opinion? What recommendations would you make in order to increase the use of internal controls in this area?
Assuming that internal controls are not adequate in this area, comment on what the auditor should tell the client?
Analyze the basic principles of selected learning theories
: Analyze the basic principles of selected teaching and learning theories. Evaluate the methods that businesses and other post-secondary education environments use to respond to adult learning needs.
|
Develop an algorithm that will work with any combination
: Given the above scenario, develop an algorithm (final design presented as a flow chart) that will work with any combination of items. Your algorithm shou4 generate some form of packing instructions for staff to follow, which should include at leas..
|
Research cloud computing topologies
: Explain some of the challenges in implementing and managing cloud topologies (make sure you include relevant skills needed to manage a cloud network for an organization.
|
Middle-range theories based problems
: The background of the theorist and any concepts that developed from applying the theory to your scenario.
|
Rendering of a certified opinion
: Discuss in two paragraphs if internal controls in this scenario are adequate for the rendering of a certified opinion? What recommendations would you make in order to increase the use of internal controls in this area?
|
Major information security threats
: Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today. This portion of the assignment should provide a foundation for the sections to be added in Weeks 3 and 4
|
What you think are the normative implications of the article
: Find a recent newspaper editorial on monetary policy, interest rates, or macroeconomics and give the title of the article, date, source and columnist name if applicable - what you think are the normative implications of the article.
|
Deal of information about the entity
: Ratios provide the users of financial statements with a great deal of information about the entity. Do ratios tell the whole story? How could liquidity ratios be used by investors to determine whether or not to invest in a company?
|
Dss projects
: DSS projects succeed more often than they fail or are challenged.
|