1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
4 years ago
13

The COSO internal control framework identifies five components of an entity's internal control. Which, if any, of those five com

ponents of Avon's internal control were flawed? Explain. If there were multiple flaws in Avon's internal control, identify which one you believe was most serious and defend your choice.
Computers and Technology
1 answer:
Llana [10]4 years ago
7 0

Answer:

The COSO internal control framework identifies five components of an entity's internal control.

Which, if any, of those five components of Avon's internal control were flawed?

Of those five components of Avon´s internal control the following were flawed:

1) Information and communication

2) Monitoring

3) Control environment

Explanation:

1) Avon’s global internal audit staff thought about offering CPA provisions´s training to the employees, but it never happended due to budgetary limitations, nor it was informed or communicated to them. It was uncovered that the payments were being made to Chinese government officials in 2005,  however working for a U.S. Company, those bribes were not allowed.}

2) Monitoring: In December 2006, Avon’s global internal audit staff followed up doubtful  activity regarding this matter, but there was no monitoring or evaluations that the deficiencies within the internal control were changed to legal practices.

3)  This is a major internal control flaw as Avon discovered that there were illegal bribes being paid to Chinese government officials, thought about informing their employees that is was unacceptable but then chose not to, and finally was surprised when the bribes continued for another year.  This demonstred a lack of commitment to integrity and ethical values.  

You might be interested in
All ofthe following are correct EXCEPT one option when it comes towriting disappointing news letters. Identify theexception.
Nikolay [14]

Answer: d) Avoid a neutral or buffered opening

Explanation: A newsletter is a piece of a report that is having knowledge about the activities of the business ,organizations,their members and owner etc.When the news letter contains contains a disappointing news it should not not have a buffered or neutral opening .The start of the news letter should not be impartial or prejudiced to make bad opening. Therefore, option(d)is the correct option.

3 0
4 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
What can you learn at Udemy.com?
PtichkaEL [24]
You can learn all sorts of Programming tutorial and other stuff from udemy.com.
Thank you.
5 0
3 years ago
Which of the following terms describes surgery through a small incision in the abdomen?
ra1l [238]
Which of the following terms describes surgery through a small incision in the abdomen? Laparoscopy. Laparoscopy is super done by using a fiber-optic instrument that is inserted through the abdomen. When this type of instrument is used, the incision is small and there are smaller cuts made to the person being operated on. 
4 0
4 years ago
Which part of the cryosphere comes directly from the atmosphere?
marin [14]
The answer to this question is C.
4 0
3 years ago
Read 2 more answers
Other questions:
  • 10 points!!!! Giving brainly to correct answers ! how do you make your questions wroth 5 points? mine only goes down to 10 >:
    15·1 answer
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft
    10·1 answer
  • Which technology uses regular phone lines and transmits at speeds up to 256 kbps?
    15·2 answers
  • Question 16 (2 points) Question 16 Unsaved
    11·1 answer
  • When you type into a basic search engine like Google, Bing, or Yahoo!, the sites that appear at the top or on the side of the re
    7·1 answer
  • Which of the following is not true about a computer byte? A) It is made up of 8 bits. B) Each letter of the alphabet is stored i
    15·1 answer
  • Why do you need to back up important data?
    5·2 answers
  • What does phishing mean?
    9·2 answers
  • You want to boot a linux system into singer user mode/ what options might you add to a linux kernel options list in a boot loade
    9·1 answer
  • 4. Arnold curates articles that feature trending lists for an online website. His department is responsible
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!