1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
14

How does one commit accounts receivable fraud?

Computers and Technology
2 answers:
disa [49]3 years ago
5 0
The answer is B) bill customers for the amount they purchased, but record lower purchases in the ledger and pocket the money. A fraud is one of two types of mistake in the recording process which done with a deliberate intention. The account receivable department responsible for recording sales transaction and billing the customers. Thus, the account receivable fraud can be committed in this process.
soldier1979 [14.2K]3 years ago
3 0

Answer:

Bill customers for the amount they purchased but record lower purchases in the ledger and pocket the money ( B )

Explanation:

Accounts receivable Fraud is an intentional act of stealing/diverting company or business funds made from the sales of goods and services made by the company. the staffs mostly responsible for this kind of Fraud is usually the cashiers or account clerks.

The duties of the cashiers or account clerks is to record transactions whether cash or card transactions made by the business/company in the company ledger. the most vulnerable of this kind of payments are cash receipt payments because the cashier might issue a receipt not equivalent to what is entered in the ledger book.

You might be interested in
Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that ca
sineoko [7]

Answer: seen below

Explanation:

There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.

Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.

A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.

Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.

B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.

C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.

D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.

E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.

cheers i hope this was helpful !!

7 0
3 years ago
1. What does a computer
k0ka [10]

Answer:

<h2>Resources </h2>

Explanation:

::::::::::::::::::::::

4 0
3 years ago
Read 2 more answers
Accenture has put together a coalition of several ecosystem partners to implement the principles of blockchain and Multi-party S
Anika [276]

Answer:

They include;

1. MAAG Pump Systems,

2. Automatik Plastics Machinery,

3. Gala Industries,

4. Reduction Engineering Scheer,

5. Ettlinger Kunststoffmaschinen and

6. XanTec EDV- und Steuerungstechnik

Explanation:

The MAAG group consists of six companies specialized in different aspects of polymer production. They provide their services to petrochemical, pharmaceutical and food production companies. They produce pellets, gear pumps, filtration systems and components, pelletizers, etc.

They have more than 1000 staff and their offices are located in about 11 countries of the world.

5 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Someone please help ASAP will brainlist
Arada [10]

Answer:

i cant help

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Is it possible to learn java s. and c# at the same time? if so I need help who can assist me.
    5·1 answer
  • Discuss three ways you could (or currently do) use the Excel software in your personal or professional life. Provide examples an
    12·1 answer
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • What is the process of copying items from ram to a storage device?
    8·1 answer
  • Name at least two types of career options that are available for someone with strong typing skills?
    10·2 answers
  • Object-oriented programs employ a group of techniques for handling errors called ________ handling.
    12·1 answer
  • While doing research on the Internet, what kind of website should you avoid because the information may be biased?
    11·1 answer
  • People, can anyone point me a highlighter for google chorme ?
    11·1 answer
  • What is the missing line of code?
    10·2 answers
  • You need to install Windows on a new computer. You also need to replace a motherboard in another computer, and both tasks need t
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!