Documente Academic
Documente Profesional
Documente Cultură
Mr. Roberts said that he is inclined to accept the arrangement however, he is concerned about the
Thai firm's proposal that transactions be stated and paid in the Thai currency, the Baht. He asks that
you explain in a memorandum what the implications would be if he agrees to accept payment in
Baht.
Type your communication below the line in the response area below.
REMINDER: In CPAexcel, the Written Communications are graded on key words. These
are words that need to be included in the message in order to address the subject matter.
However, on the exam itself, "Your response will be graded for both technical content and
writing skills. Technical content will be evaluated for information that is helpful to the
intended reader and clearly relevant to the issue. Writing skills will be evaluated for
development, organization, and the appropriate expression of ideas in professional
correspondence. Use a standard business memorandum or letter format with a clear
beginning, middle, and end. Do not convey information in the form of a table, bullet point
list, or other abbreviated presentation."
This is to respond to your request for information about the implications if Best Alloy
accepts payment in a foreign currency (Thai Baht).
When the terms of a business contract provide that transactions will be settled in a
currency other than an entity's domestic currency, the transactions are said to be
"denominated in a foreign currency." For Best Alloy, agreeing to accept payments from
the Thai firm in Baht would result in the transactions being denominated in a foreign
currency.
A company that has accounts receivable denominated (to be settled) in a foreign currency
face a currency exchange risk that does not occur when accounts receivable are collected
in the domestic currency of the company. Because the rate at which one currency will
exchange for another currency may change continuously, there is the risk that an
unfavorable exchange rate change will occur between the time a receivable is established
and the time it is collected.
For example, assume that the dollar value of a receivable to be satisfied in a foreign
currency is $100 when the receivable is recognized. Subsequent to recognizing the
receivable, but before it is collected, the exchange rate between the dollar and the
foreign currency changes. As a result of the change in exchange rates, at the date the
receivable is collected and the foreign currency received, the dollar value of the foreign
currency is less than $100. To the extent the dollar value of the foreign currency at the
date of collection is less than the dollar value at the date the receivable was recognized
(i.e., the date of the sale), a loss has occurred. That loss, which would be reported as a
currency exchange loss, would reduce net income from the sale transaction.
It also is possible that a favorable change in the exchange rate could occur. In that case,
the dollar value of the foreign currency when it is collected would be greater than the
dollar value of the original receivable, and a gain would be recognized.
Please let me know if you would like additional information or if I can be of further help.
I.M. Candidate
Compensating Balance
In a meeting with Ron Jacobs, the manager of your company, he disclosed that the firm is in
the early stages of negotiating a $100,000 short-term loan with Block Bank, a local
commercial bank with which your firm has no previous relationship. The loan would be used to
temporarily increase inventory to meet higher seasonal demand.
The bank has offered a one-year, $100,000 loan at 6.00%, with a requirement that 10% of the
original loan be maintained as a compensating balance. Mr. Jacobs asks that you explain in a
memorandum what a compensating balance is and what effect it would have on the cost or
other elements of the proposed borrowing.
The second effect on the borrowing is that the effective interest rate would be
greater than the 6.00% stated rate. Since only $90,000 of the loan is available to
use, the effective cost of the borrowing should be based on $90,000, not $100,000.
Thus, under the Block Bank proposal, the annual interest cost of $6,000 ($100,000
x .06) is effectively the cost of borrowing $90,000 and the effective interest rate is
6.67% ($6,000/$90,000), not 6.00%.
I.M. Candidate
Enterprise-Level Risks
Alex Poindexter is the controller of Ensenada Products, a small, publicly held manufacturing
company that operates in both the U.S. and Mexico. Ensenada Products Board of Directors
concerns about, and interest in, how to better manage enterprise-level risks motivates their
request that Alex write a letter that defines enterprise risk management (ERM) and discusses
what risks should be considered as a part of ERM. The Board also wants Alex to explain what
benefits accrue to an organization that implements an effective system for managing
enterprise-level risks.
Sincerely,
Internal Control
Issues related to corporate governance are of increasing concern in capital markets. Write a
memorandum to a corporate Board of Directors that considers some of the events that
transpired at WorldCom. WorldCom's CEO (Bernard Ebbers) and CFO (Scott Sullivan),
authorized, executed, and recorded falsified accounting transactions that inflated revenue by
about $11 billion. WorldCom's Board of Directors approved these transactions. This fraud
earned Ebbers and Sullivan 25 year and 15 year prison terms, respectively. The specific topics
that the board would like you to cover are a definition of internal control and how the events
at WorldCom relate to the goal of an appropriate "tone at the top" in relation to an
organization's system of accounting control. The board would also like you to discuss what
controls might have helped prevent the WorldCom fraud.
Controls that might have helped prevent the fraud that occurred at WorldCom
include the segregation of duties between the accounting functions that authorized,
executed, and recorded the falsified accounting transactions is one important
(absent) control in this scenario. In addition, the WorldCom Board of Directors did
not appear to be independent of management and did not effectively execute its
oversight function. Hence a stronger, independent Board of Directors likely would've
helped prevent the WorldCom fraud. Finally, a similarly strong, independent,
professional WorldCom Audit Committee might also have lessened the likelihood or
success of the WorldCom fraud.
Sincerely,
Credit Card Processing and Encryption
Melanie Hogsbath has started a successful pet lodging, grooming, care and entertainment,
e.g., dog walking, business, Hogsbath's PetPoria. Many of Melanie's transactions are executed
by credit card at her website. A customer of Melanie's recently expressed concerns regarding
entering credit card information into Melanie's website. Melanie has called you to ask about
the possibility of providing her with a more secure credit card processing system. More
specifically, she has recently read an article about "encryption" and asks your opinion of its
value to her business. Please write Ms. Hogsbath a memo that discusses encryption - what it is
and how it may be useful to her business. Explain what system risks it may help her address.
Briefly describe symmetric versus asymmetric encryption and the implications to Melanie for
implementing either type of encryption for credit card information at her website.
To acquire a public/private key pair, the user applies to a certificate authority (CA);
the CA registers the public key on its server and sends the private key to the user;
when someone wants to communicate securely with the user, they access the public
key from the CA server, encrypt the message and send it to the user; the user then
uses the private key to decrypt the message.
Although the ciphertext created with symmetric encryption can be very secure, the
symmetric encryption methodology itself is inherently insecure because the sender
must always find a way to let the recipient know which encryption algorithm to use.
Hence, symmetric encryption is most commonly used with "data-at-rest," i.e., data
that is stored in an archive or data warehouse.
Asymmetric encryption is more complicated, cumbersome, and secure. With
asymmetric encryption the transmission is more secure because only the private key
can decrypt the message and only the user has access to the private key. Hence,
well designed asymmetric encryption offers a higher level of security but (also adds
a bit of complexity to the system). In addition, as computing moves towards
ubiquitous or mobile computing (e.g., m-commerce), asymmetric encryption can
create compatibility problems since the certificate authority system may not yet be
adapted to the latest technology platforms.
To summarize, your online customers may desire the level and type of assurance
that is provided by encryption. Specifically, encryption can be useful in reducing
consumer concerns about credit card number and identity theft in online
transactions. A number of alternatives exist for implementing encryption technology
into online transactions. The best alternative for your business would depend of the
level of security that you desire and the corresponding costs (and potential
complexities) associated with that level of encryption.
Willie Dixon, the President and CEO of "The Back Door Man" has a growing and successful
business repairing and replacing screen doors, entry doors, and garage doors. His business
includes about 1000 employees at a headquarters and 23 branch offices. The business does
not have business continuity (BCPs) or disaster recovery plans (DRPs). President Dixon has
requested that you draft a letter suggesting the motivation, and a process, for creating a BCP.
Develop and complete a BCP response -- Document and formalize the BCP plan.
Define protocols for defining and handling crisis incidents. Create, assign roles to,
and train the incidence response team(s).
Exercise, maintain and review the plan -- -- Test the required technology and
implement all proposed recovery processes. Update the plan as business processes
and risks evolve.
Embed the plan in the organization's culture -- Design and deliver education,
training and awareness materials to enable effective responses to identified risks.
Manage change processes to ensure that the BCP integrates into the organization's
culture.
Following these steps should enable the creation of a BCP that greatly reduces the
threat of key organizational risks disrupting future business success.
GenghisKhan.Com Airlines is considering ways to enhance the physical security of its data
center, which is located in a suburb of New York City, consists of 10,000 ft. 2, and is regularly
used by about 30 employees. Currently, access to the data center requires a proximity card;
individual employees receive cards. The company is considering implementing a biometric
fingerprint scanner to increase security. Please define each of the following security risks, and
comment on the effectiveness of the proposed biometric security in addressing them: (1)
Piggybacking; (2) Phishing; (3) Sharing access cards; (4) Packet sniffing.
Phishing attempts are requests for information delivered via email or text
messaging (when sent by text message, these are called smishing). This risk would
be unaffected by the use of biometric identification technologies.
Sharing access cards. The proposed biometric systems would eliminate this risk.
Employees could not share access cards in a system that included biometric
identification.
Packet sniffing programs capture packets of data as they move across a computer
network. This risk would be unaffected by the use of biometric identification
technologies.
Control Procedures
Roger Johnson, a CPA, worked as a volunteer at the International Commonwealth Track and
Field Games (ICTFG). Each day of the six-day games, about $100,000 in cash and $2 million
in credit card revenues came into the accounting office. Roger's volunteer duties included
counting cash each evening and reconciling the credit card receipts and credit card fee
payments to the cash receipts journal and general ledger. Control procedures required at least
two individuals to be present in the accounting office at all times. However, Melanie Smurf, the
other volunteer who was to work with Roger on Thursday evening, had a six-year-old daughter
who was ill. Hence, Melanie requested that Roger count the cash and perform the
reconciliations for this day by himself, since she could not fulfill her volunteer duties that
evening.
Please write a memo discussing the role of monitoring of internal control in improving
corporate governance and how the monitoring of internal control is relevant to the issue
identified in this question.
Memo:
Monitoring is the core, foundational component in the COSO ERM model. Its position,
i.e., as the foundation of risk management, is intentional. Monitoring is essential to
achieving strong internal control and effective risk management. With good control
monitoring control problems are identified, and identified more quickly. Decision
makers receive better, more timely information. Certifications of internal control are
easier and more timely, and organizations are more efficient and have lower costs.
Sincerely,
Accountant
Enterprise Resource Planning System
he Cup-O-Cake Company (COCC) manufactures cupcakes, wedding cakes, and other baked
desserts which are delivered through grocery stores, caterers, and restaurants. COCC has
recently begun a complex IT project, built around an enterprise resource planning system, to
replace accounting, customer relations management, supply chain management, and
inventory control systems. Although the system is built around SAP, management decided to
customize many of the SAP modules to ensure a better fit with existing organizational
processes. Unfortunately, the implementation is not going well. Implemented modules, after
initial testing, are evidencing difficulties, including transactions failing to execute, and data
errors emerging in the enterprise-wide databases. Please write a memo to the head of the IT
steering committee that considers:
1. the major roles of each of the following in resolving the above issues and problems: the
IT steering committee, the lead systems analyst, applications programmers, and end-users,
2. what processes, within the systems development lifecycle, may have led to the above
failures.
Type your communication below the line in the response area below.
Question #1: In relation to the issues that are emerging in the SAP implementation
at COCC, the roles of the following parties should be:
The lead systems analyst: Responsible for developing overall programming logic and
functionality. Failures of the system may be an indicator of problems in this
responsibility. Should be interviewed regarding why the implementation is not
proceeding smoothly.
End-users: Gathering additional information about when, why and how the system is
failing to operate as promised will be an additional critical diagnostic activity. Hence,
interviewing end users as to these issues should be informative in resolving them,
by allowing for more precise diagnosis of the nature of the failures.
Question #2: Failures at the implementation stage may be traced back to one of
several possible failures earlier in the systems development process. For example:
Feasibility may have been mis-assessed in the planning and feasibility assessment
stage. Hence, the system, as conceived and implemented, may be infeasible.
The assessment of system requirements may have been poorly executed, meaning
that actual system requirements do not match those proposed in the system
planning documents.
Failure at the design stage would lead to an improper specification of the technical
system architecture or the definition of the interfaces between modules and
subsystems. This could also explain the system failure.
A failure at the testing stage may result from inadequate testing at normal
operational loads, meaning that the system may work in a test environment but may
fail in the more demanding, actual environment within which the system must work.
A failure at the implementation stage may result from inadequate training of users in
the new system or in insufficient time to allow users to gain a complete working
knowledge of the new system.
Sincerely,
Accountant
Segregation of Duties
Skyview, Inc., a small start-up company, has hired you as a consultant to assess its financial
systems and related processes. During your review, you learned that the company accountant
is responsible for providing general ledger access to others in the company, processing of
transactions in the general ledger, and printing checks. The president of the company must
authorize write-offs in the system, but the accountant has access to the president's user name
and password.
I recommend that you purchase or develop a new financial accounting system that
would include appropriate segregation of duties to ensure that no individual in the
organization has the ability to perpetrate errors or fraud without it being detected in
the normal course of operations. In addition, you should establish polices regarding
the maintenance and confidentiality of user names and passwords to ensure that the
controls cannot be circumvented. While such actions will, in the short-term increase
the costs of the accounting system, they will help to prevent the potentially
disastrous occurrence of a major fraud at Skyview.
Assume that you are acting as a consultant for Winston Co. The president of the company is
considering implementing an enterprise risk management system. To evaluate whether to go
forward with the project, the president has asked you to describe the limitations of an
enterprise risk management system.
You have requested that I provide you with information about an enterprise risk
management system. You are particularly concerned with the limitations of such a
system. The primary purpose of an enterprise risk management system is to provide
processes to identify potential risks to achieving a company's objectives, and, to
manage those risks to be within the company's risk appetite.
Adopting a structured plan for assessing the need for and developing a high-quality
ERM system can mitigate these risks. If you have any additional questions about
enterprise risk management systems, please contact me.
Real-time Processing
Tintco, Inc. is a distributor of auto supplies. Currently, the corporation has a batch processing
system for processing all transactions and maintaining its inventory records. Batches are
processed monthly. George Wilson, the chief information officer for the corporation, is
considering adopting an online, real-time processing system. He has asked you (a consultant)
to prepare a memorandum describing the advantages of adopting such a system for the
corporation.
You have requested that I provide an evaluation of the two methods that Yeager
Company uses for capital budgeting: the payback and the accounting rate of return
methods.
As you know, the payback method evaluates investments based on the length of
time it takes to recapture the initial investment. The payback method has two major
limitations. First, it ignores the overall profitability of the investment. Second, it
does not take into account the time value of money. These are major limitations
which can result in selecting investments that are not consistent with maximization
of the company's return on investment.
The accounting rate of return method evaluates investment alternatives based on
their rate of accounting return. Like the payback method, the accounting rate of
return method ignores the time value of money. As a result, it too can result in
choosing investments that may not result in maximization of the company's return
on investment.
The most effective capital budgeting techniques are those that consider the time
value of money. As an example, the net present value method evaluates investment
alternatives based on the present values of the future cash flows of the investments.
It considers both the total profitability of the investment and the time value of
money. Another technique, the internal rate of return method, evaluates investment
alternatives based on their time-adjusted rates of return. This technique also
considers the total profitability of the investment and adjusts for the time value of
money.
I would suggest that you consider replacing your current techniques for capital
budgeting with a technique or techniques that are superior, such as the present
value and the internal rate of return techniques. If you have any other questions
about capital budgeting, please contact me.
Terry Savage, the president of the company, has asked you prepare a memorandum describing
the advantages and disadvantages of going public.
The primary disadvantage of going public is the cost. There are significant costs
involved in the initial public offering of stock, and the continuing costs of compliance
with SEC laws and regulations, including the Sarbanes-Oxley Act. Being a public
company necessarily causes management to focus on maximizing stock price, which
may not be in the best long-term interest of Talon. Finally, public companies must
disclose significant amounts of information that becomes available to competitors,
customers, and potential corporate raiders.
Because of these significant costs and benefits, it is important that the board of
directors of Talon carefully evaluate the decision about whether or not to go public.
If you need any additional information, please contact me.
Balanced Scorecard
I suggest that you continue with your plan to implement a balanced scorecard
system because I believe that it is superior to other single-dimensional systems.
Performance Measures
It is important that all performance measures reflect the strategy of the company.
Measures that are strategic communicate the goals of the organization and motivate
management to pursue those goals. Performance measures must also represent
economic reality. They should provide a clear and accurate measure of relative
performance. Finally, if the measures are used to evaluate and compensate
managers, they should be sensitive to factors that are in the manager's control and
not sensitive to factors beyond the manager's control. The measures should be
clearly controllable by the manager being evaluated.
Cost System
The controller of Tennyson, Inc., Howard Lester, is concerned that the company's costing
system is not providing good information about product costs. As a result, he fears that the
company is not making good sales or production decisions. Currently, the company uses a
simple job order costing system and allocates service department costs on the direct method.
Prepare a memorandum to Mr. Lester describing the importance of having good cost
information and ways in which the existing system may be improved.
Two methods of cost allocation are superior to the direct method: the step method
and the reciprocal method. The step method allocates service department costs to
other service departments as well as the production departments, starting with the
service departments that provide the most services to other service departments.
The reciprocal method uses simultaneous equations to allocate costs to production
departments, resulting in the most accurate allocation of costs when service
departments provide services to other service departments.
Assume that you are a consultant providing services for Webster Corp. Webster is performing
a significant project based implementation of a new enterprise resource system. The company
is concerned about the difficulties in performing the project. Compose a memorandum to
management describing the risks involved in executing a project that is cross-functional in
nature.
You have requested that we provide information about the issues involved in
executing a project to implement an enterprise resource management system. In
particular, you are concerned that the cross-functional nature of the project will be
difficult to manage.
You should understand that the cross-functional nature of this project creates
additional risk of failure that must be controlled. The most important requirement
for success of a cross-functional project is full support by top management. The
team must have this support to get adequate cooperation from the various
functional managers of the organization. This also means that the relationships
between the project manager and various functional managers must be clearly
defined to avoid conflict. Finally, senior management must support the project
manager's decisions, recognizing that these decisions must be made quickly and
with limited information to ensure that the project remains on schedule. If senior
management recognizes and resolves these issues, the risk of failure will be
significantly reduced.
If you have any additional questions about the issues regarding completing the
project, please contact me.
If you need any additional information about such systems, please contact me.