1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
12

Richard Palm is the accounting clerk of Olive Limited. He uses the source documents such as purchase orders, sales invoices and

suppliers’ invoices to prepare journal vouchers for general ledger entries. Each day he posts the journal vouchers to the general ledger and the related subsidiary ledgers. At the end of each month, he reconciles the subsidiary accounts to their control accounts in the general ledger to ensure they balance.
Discuss the internal control weaknesses and risks associated with the above process. (maximum 300 words)
Computers and Technology
1 answer:
sdas [7]3 years ago
5 0

Answer:

Lack of segregation of duties

Explanation:

Internal Controls are set of rules and guidelines that are followed to ensure effectiveness of business operations. The main risk in the business is weak internal controls. There are some organizations with strong internal controls but implementation of such controls is a challenge for organizations. There are human errors, IT security risks, fraud and compliance risk.

The risks associated with Olive limited is that there is no segregation of duties, Richard Palm is preparing journal vouchers, posts the journal vouchers and reconciles the balance himself. If he makes an error in recording a transaction there is no one who reviews his work and can identify an error. Also if Richard is involved in a fraud and collaborates with purchase department or sales department staff, he can pass a transaction without any supervision.

You might be interested in
What are "open-loop" and "closed-loop" systems
frozen [14]

open loop is by the fact that the output signal or condition is neither measured nor “fed back” for comparison with the input signal or system set point. Closed-loop an automatic control system in which an operation, process, or mechanism is regulated by feedback.


6 0
3 years ago
Units for measuring computer memory
lyudmila [28]

A kilobyte (KB) is 1,024 bytes, not one thousand bytes as might be expected, because computers use binary (base two) math, instead of a decimal (base ten) system. Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information.

6 0
4 years ago
How do l write a program which countdown from 10 to 3​
earnstyle [38]

Answer:

use loop

for(int i =10;i>2; i--)

{

System.out.println(i+"\n")

}

4 0
3 years ago
Question 6 (2 points)
OLga [1]

Answer:

It is all of the above

Explanation:

Technology is seen everywhere like in DVD player , a new medical treatment and skills needed to purify water

4 0
3 years ago
You hear someone make the following comment: "A blueprint is a design for a house. A carpenter can use the blueprint to build th
max2010maxim [7]

Answer:

The answer is "classes are the blueprints"

Explanation:

According to the class definition, it is a collection of data members and member methods, in which all the data members can't return any value, and member methods or functions return a value.

  • In this question, the carpenter uses the blueprint to build the house, if he uses class and object model.
  • This model also known as an entity blueprint, which sets the properties and functions with an object type.
4 0
4 years ago
Other questions:
  • You grant them remote access to your computer to enable them to act as you to fix the situation. what type of os must be install
    9·1 answer
  • Which of these decisions would u most likely make on ur own
    8·2 answers
  • What is computer hacking? describe some examples
    6·1 answer
  • Write the reverseO function recursively. This function takes a string and the length of the string as arguments and returns the
    15·2 answers
  • From the following list choose all the tasks an operating system performs.
    5·2 answers
  • Select the correct answer.
    5·1 answer
  • Who is Mr.Anonymous?
    5·2 answers
  • What size segment will be allocated for a 39 KB request on a system using the Buddy system for kernel memory allocation?A) 42 KB
    11·1 answer
  • Why is myConcerto considered essential to Accenture's work with enterprise<br> systems?
    13·1 answer
  • Make a presentation on ms word
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!