Report steps necessary evidence and protect company

Assignment Help Basic Computer Science
Reference no: EM1355684

Jonathan Simpson owns a construction company. One day a subcontractor calls him, saying that he needs a replacement check for the job he completed at 1437 West Maple Avenue. Jonathan looks up the job on his accounting program and agrees to reissue the check for $12,750.00. The subcontractor says that the original check was for only $10, 750.00. Jonathan looks around the office and cannot find the company checkbook or ledger. Only one other person has access to the accounting program. Jonathan calls you to investigate. How would you proceed? Write a one-page report detailing the steps Jonathan and you need to take to obtain the necessary evidence and protect the company.

Reference no: EM1355684

Questions Cloud

Determine the value of per share : This company pays a perpetual annual dividend of 2.5 percent of its par value. Par value is $100 per share. If investors require rate of return on this stock is 15%, determine the value of per share?
Illustrate what do you think about the idea that technologic : Illustrate what Do You Think About The Idea That Technological And Medical Advances Would Bring An End To Hunger, Disease, Drudgery, And Unemployment In The United States
Find the market value of assets : Beckman Engineering and Associates has 25 million shares outstanding. Shares are trading at $8. Beckman Engineering and Associates management plans to raise $60 million to by issuing debt to repurchase shares.
Loss-gain contingencies : Generally accepted accounting principles (GAAP) require loss contingencies to be accrued in the period the contingency becomes known. However, GAAP specifically disallows booking gain contingencies until the gain is realized.
Report steps necessary evidence and protect company : Jonathan Simpson owns a construction company. Write a one-page report detailing the steps Jonathan and you need to take to obtain the necessary evidence and protect the company.
Protecting the company against fraud - mf global : Show what measures can and should be taken to make it easier for corporate employees to? Blow the whistle? On a fraudulent scheme within an organization.
Determining accounting and gaap : Discuss what is Accounting and why is it important? Be sure to include the different types of users of Accounting and their need for accounting.
Global alliance : What are the challenges in implementing a global alliance? Once an alliance is reached, what steps are involved in strategic implementation of the venture?
Personal beliefs or biases : Please help me with describing at least two personal beliefs or biases that could interfere with ones perception of an interviewee, establishing rapport with him or her, and the interview process itself.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determining accurate formula using undetermined coefficients

Determine a more accurate formula for f'(t) using method of undetermined coefficients. Let's say the formula is of the form f'(t)= Af(t + 2h) + Bf(t + h) - Bf(t - h) - Af(t - 2h).

  Study evidence for defence in law firm

You are engaged by law firm to study evidence for the defence. You uncover evidence that doesn't help your client's case but was not discovered by the prosecution.

  Explain sequences of signals that occur on address bus

Explain the sequences of signals that occur on address bus, control bus, and data bus when a simple microcomputer fetches an instruction.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Explaining service strategy or service design

Select a topic that most interests you from Service Strategy or Service Design and then write a paper around that topic. Try to use as much of your own creativity and originality when writing the paper.

  Business environment impacted development telecommunication

Describe in scholarly detail how business environment has influenced development of telecommunications technology.

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Explain techniques to recover passwords from protected files

Explain techniques to apply to recover passwords from the protected files.

  Tools or tactics for risks for computing infrastructure

As part of project to assess security risks for computing infrastructure, you have found that other managers often have different idea. List any tools or tactics that could be used.

  Explain different kinds of feasibility studies

When deciding whether to buy and implement digital dashboard or management cockpit sometimes a feasibility study is conducted.  Explain the different kinds of feasibility studies.

  Exploit wildcard feature in order to cheat system

How could Dave, dishonest teller, exploit the wildcard feature  to cheat the system? Dave would want to concentrate on vouchers that are nearly one year old since such vouchers are likely to have been lost.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd