Sunteți pe pagina 1din 17

Foreign Currency Risk

Mr. Roberts said that he is inclined to accept the arrangement however, he is concerned about the
Thai firm's proposal that transactions be stated and paid in the Thai currency, the Baht. He asks that
you explain in a memorandum what the implications would be if he agrees to accept payment in
Baht.

Type your communication below the line in the response area below.

REMINDER: In CPAexcel, the Written Communications are graded on key words. These
are words that need to be included in the message in order to address the subject matter.
However, on the exam itself, "Your response will be graded for both technical content and
writing skills. Technical content will be evaluated for information that is helpful to the
intended reader and clearly relevant to the issue. Writing skills will be evaluated for
development, organization, and the appropriate expression of ideas in professional
correspondence. Use a standard business memorandum or letter format with a clear
beginning, middle, and end. Do not convey information in the form of a table, bullet point
list, or other abbreviated presentation."

To: Mr. Paul Roberts, CEO, Best Alloy, Inc.


From: I.M. Candidate
Re: Transactions in Baht

This is to respond to your request for information about the implications if Best Alloy
accepts payment in a foreign currency (Thai Baht).

When the terms of a business contract provide that transactions will be settled in a
currency other than an entity's domestic currency, the transactions are said to be
"denominated in a foreign currency." For Best Alloy, agreeing to accept payments from
the Thai firm in Baht would result in the transactions being denominated in a foreign
currency.

A company that has accounts receivable denominated (to be settled) in a foreign currency
face a currency exchange risk that does not occur when accounts receivable are collected
in the domestic currency of the company. Because the rate at which one currency will
exchange for another currency may change continuously, there is the risk that an
unfavorable exchange rate change will occur between the time a receivable is established
and the time it is collected.

For example, assume that the dollar value of a receivable to be satisfied in a foreign
currency is $100 when the receivable is recognized. Subsequent to recognizing the
receivable, but before it is collected, the exchange rate between the dollar and the
foreign currency changes. As a result of the change in exchange rates, at the date the
receivable is collected and the foreign currency received, the dollar value of the foreign
currency is less than $100. To the extent the dollar value of the foreign currency at the
date of collection is less than the dollar value at the date the receivable was recognized
(i.e., the date of the sale), a loss has occurred. That loss, which would be reported as a
currency exchange loss, would reduce net income from the sale transaction.

It also is possible that a favorable change in the exchange rate could occur. In that case,
the dollar value of the foreign currency when it is collected would be greater than the
dollar value of the original receivable, and a gain would be recognized.

Please let me know if you would like additional information or if I can be of further help.
I.M. Candidate

Compensating Balance

In a meeting with Ron Jacobs, the manager of your company, he disclosed that the firm is in
the early stages of negotiating a $100,000 short-term loan with Block Bank, a local
commercial bank with which your firm has no previous relationship. The loan would be used to
temporarily increase inventory to meet higher seasonal demand.

The bank has offered a one-year, $100,000 loan at 6.00%, with a requirement that 10% of the
original loan be maintained as a compensating balance. Mr. Jacobs asks that you explain in a
memorandum what a compensating balance is and what effect it would have on the cost or
other elements of the proposed borrowing.

To: Mr. Ron Jacobs, Manager


From: I.M. Candidate
Re: Compensating Balances

This is to provide the information you requested concerning the nature of a


compensating balance when required by a bank and the implications of such a
requirement.

A compensating balance is an amount that a borrower is required by the terms of a


loan agreement to maintain in a demand deposit account with the lender during the
term of the loan. The amount of the compensating balance is usually expressed as a
percent of the original loan amount.

A requirement to maintain a compensating balance has two primary effects on the


borrowing. First, the actual amount of the loan that is available to be used is reduced
by the amount of the required compensating balance. Under the terms proposed by
Block Bank, only $90,000 of the $100,000 would be available for inventory
purchases. The other $10,000 (.10 x $100,000) would continue to be held in our
account with Block Bank as a condition of the loan.

The second effect on the borrowing is that the effective interest rate would be
greater than the 6.00% stated rate. Since only $90,000 of the loan is available to
use, the effective cost of the borrowing should be based on $90,000, not $100,000.
Thus, under the Block Bank proposal, the annual interest cost of $6,000 ($100,000
x .06) is effectively the cost of borrowing $90,000 and the effective interest rate is
6.67% ($6,000/$90,000), not 6.00%.

Please let me know I can provide additional information.

I.M. Candidate
Enterprise-Level Risks

Alex Poindexter is the controller of Ensenada Products, a small, publicly held manufacturing
company that operates in both the U.S. and Mexico. Ensenada Products Board of Directors
concerns about, and interest in, how to better manage enterprise-level risks motivates their
request that Alex write a letter that defines enterprise risk management (ERM) and discusses
what risks should be considered as a part of ERM. The Board also wants Alex to explain what
benefits accrue to an organization that implements an effective system for managing
enterprise-level risks.

To: Ensenada Products Board of Directors


From: Alex Poindexter
Re: Enterprise-Level Risks

Enterprise risk management (ERM) concerns the identification and management of


events and circumstances that may impact the ability of an entity to achieve its
objectives. A number of corporate frauds, including Enron Corp., WorldCom, Adelphia
Communications, Tyco International, Global Crossing, and Qwest Communications
scandals have increased concern with, and attention to, enterprise risk
management.

A number of risks should be considered as a part of enterprise risk management.


These risks include damage to the organization's reputation, business interruption
due to disaster (e.g., flood) or human events (e.g., a labor strike), liability to third
parties, distribution or supply chain failure, risk related to the market environment,
to regulatory or legislative changes, due to market competition or failure to attract
or retain key staff or management, technology failure, failure of a disaster recovery
plan, and loss of data. COSO's ERM framework (a cube) includes four objectives,
eight components, and three levels of organizational units.

The benefits of effectively implementing systems for managing enterprise-level risks


include aligning the organization's risk appetite with its strategy such that the
organization chooses to assume an appropriate level of risk, rather than assuming
an unknown or inappropriately low or high level of risk. Assessment of an
organization's risk appetite and strategy also enables the development of
mechanisms to better manage risk. Risk management also creates the possibility for
improving an organization's risk responses. For example, organizations may choose
to avoid, reduce, share, or to accept, risks. Better management of enterprise-level
risks also reduces the likelihood of disruptive operational surprises and losses.

Enterprise level risk management enables organizations to better identify potential


risk events and to establish responses, thereby reducing surprises in the associated
costs and losses. Risk management also enables the ability to manage multiple and
cross enterprise risks. For example, Ensenada Products has divisions both in the
United States and Mexico. The risks related to political instability along the U.S.,
Mexican border, coupled with risks of smuggling and drug traffic at the border must
be assessed jointly to determine whether and how they pose risks and threats to
Ensenada's operations. The assessment of enterprise-level risks can also lead to the
identification of opportunities to enhance an organization's business prospects. For
example, assessing the risks related to online sales and activities may give rise to
the realization that additional opportunities exist in online markets that have not
been previously considered. Finally, enterprise-level risk assessment can improve
capital deployment. Specifically, risk information can allow management to better
assess its capital needs and to improve capital allocations among competing projects
and alternatives.
In short, enterprise-level risk assessment promises a number of important insights
and advantages to Ensenada Products. I look forward to exploring these
opportunities further with you.

Sincerely,

Internal Control

Issues related to corporate governance are of increasing concern in capital markets. Write a
memorandum to a corporate Board of Directors that considers some of the events that
transpired at WorldCom. WorldCom's CEO (Bernard Ebbers) and CFO (Scott Sullivan),
authorized, executed, and recorded falsified accounting transactions that inflated revenue by
about $11 billion. WorldCom's Board of Directors approved these transactions. This fraud
earned Ebbers and Sullivan 25 year and 15 year prison terms, respectively. The specific topics
that the board would like you to cover are a definition of internal control and how the events
at WorldCom relate to the goal of an appropriate "tone at the top" in relation to an
organization's system of accounting control. The board would also like you to discuss what
controls might have helped prevent the WorldCom fraud.

To: Board of Directors


From: Accountant
Re: Internal Control at WorldCom

Internal control is a set of processes that are designed to provide reasonable


assurance regarding the achievement of objectives related to the effectiveness and
efficiency of operations, reliability of financial reporting, and compliance with
applicable laws and regulations. Internal control is primarily the responsibility of
management and the entity's Board of Directors.

An organization desiring an effective internal control must have top management


that is ethical and pro-active in establishing this tone and culture. That this tone was
lacking at WorldCom, is evidenced by the events described above. Positive strategies
for creating an ethical culture include management emphasizing the critical role of
ethics and integrity to organizational success, and, emphasizing the role of mission
statements and codes of conduct in promoting integrity. In addition, managements'
actions, as well as their words, must embody a culture of integrity and ethical
conduct.

Controls that might have helped prevent the fraud that occurred at WorldCom
include the segregation of duties between the accounting functions that authorized,
executed, and recorded the falsified accounting transactions is one important
(absent) control in this scenario. In addition, the WorldCom Board of Directors did
not appear to be independent of management and did not effectively execute its
oversight function. Hence a stronger, independent Board of Directors likely would've
helped prevent the WorldCom fraud. Finally, a similarly strong, independent,
professional WorldCom Audit Committee might also have lessened the likelihood or
success of the WorldCom fraud.

In short, the WorldCom case illustrates the hazards of an unethical management


"tone at the top", inadequate segregation of duties, and a Board of Directors that
failed its fiduciary responsibility of management oversight.

Sincerely,
Credit Card Processing and Encryption

Melanie Hogsbath has started a successful pet lodging, grooming, care and entertainment,
e.g., dog walking, business, Hogsbath's PetPoria. Many of Melanie's transactions are executed
by credit card at her website. A customer of Melanie's recently expressed concerns regarding
entering credit card information into Melanie's website. Melanie has called you to ask about
the possibility of providing her with a more secure credit card processing system. More
specifically, she has recently read an article about "encryption" and asks your opinion of its
value to her business. Please write Ms. Hogsbath a memo that discusses encryption - what it is
and how it may be useful to her business. Explain what system risks it may help her address.
Briefly describe symmetric versus asymmetric encryption and the implications to Melanie for
implementing either type of encryption for credit card information at her website.

To: Ms. Hogsbath


From: Accountant
Re: The role and importance of "encryption" in credit card processing

Encryption is the process of transforming information using an algorithm to make it


unreadable to anyone except those possessing special knowledge, usually referred
to as a key (source: Wikipedia). Encryption technology uses a mathematical
algorithm to translate cleartext (plaintext) - text that can be read and understood -
into ciphertext (text which has been mathematically scrambled so that its meaning
cannot be determined). A key is then required to translate the ciphertext back into
plaintext.

An effective implementation of encryption can guard against risks to privacy, i.e.,


the protection of data-in-transit against unauthorized access, and authentication,
i.e., user identification. Hence, well designed and implemented encryption lessens
the likelihood of the theft of credit card numbers and personal information from her
website.

Symmetric encryption -- also called Single-key encryption or private-key encryption


uses a single algorithm to encrypt and decrypt the text. The sender uses the
encryption algorithm to create the ciphertext and sends the encrypted text to the
recipient; the sender must also let the recipient know which algorithm was used to
encrypt the text; the recipient then uses the same algorithm (essentially running it
in reverse) to decrypt the text.

Asymmetric encryption -- also called public/private-key encryption and private-key


encryption uses two paired encryption algorithms to encrypt and decrypt the text. If
the public key is used to encrypt the text, the private key must be used to decrypt
the text; conversely, if the private key is used to encrypt the text, the public key
must be used to decrypt the text.

To acquire a public/private key pair, the user applies to a certificate authority (CA);
the CA registers the public key on its server and sends the private key to the user;
when someone wants to communicate securely with the user, they access the public
key from the CA server, encrypt the message and send it to the user; the user then
uses the private key to decrypt the message.

Although the ciphertext created with symmetric encryption can be very secure, the
symmetric encryption methodology itself is inherently insecure because the sender
must always find a way to let the recipient know which encryption algorithm to use.
Hence, symmetric encryption is most commonly used with "data-at-rest," i.e., data
that is stored in an archive or data warehouse.
Asymmetric encryption is more complicated, cumbersome, and secure. With
asymmetric encryption the transmission is more secure because only the private key
can decrypt the message and only the user has access to the private key. Hence,
well designed asymmetric encryption offers a higher level of security but (also adds
a bit of complexity to the system). In addition, as computing moves towards
ubiquitous or mobile computing (e.g., m-commerce), asymmetric encryption can
create compatibility problems since the certificate authority system may not yet be
adapted to the latest technology platforms.

To summarize, your online customers may desire the level and type of assurance
that is provided by encryption. Specifically, encryption can be useful in reducing
consumer concerns about credit card number and identity theft in online
transactions. A number of alternatives exist for implementing encryption technology
into online transactions. The best alternative for your business would depend of the
level of security that you desire and the corresponding costs (and potential
complexities) associated with that level of encryption.

Business Continuity Plan

Willie Dixon, the President and CEO of "The Back Door Man" has a growing and successful
business repairing and replacing screen doors, entry doors, and garage doors. His business
includes about 1000 employees at a headquarters and 23 branch offices. The business does
not have business continuity (BCPs) or disaster recovery plans (DRPs). President Dixon has
requested that you draft a letter suggesting the motivation, and a process, for creating a BCP.

To: President Willie Dixon


From: Accountant
Re: Business Continuity Plan

A business continuity plan (BCP) is critical to enabling your business to recover in


the event of a natural or human-based disaster, or a disruption of services. Creating
a BCP is one element of organizational risk management. Hence, developing a BCP
should be part of a broader strategy and approach to addressing significant strategic
and business threats and risks. The following six steps present one model of the
process for developing a BCP.

Create a business continuity policy and program -- Create a framework and


structure for the BCM, based in an overall risk management strategy. Identify the
scope of the plan, its key roles, and assign individuals to roles.

Understand and evaluate organizational risks -- Identify key organizational


activities and processes to determine the activities, and their costs, that are needed
to prevent their interruption, and, ensure their restoration in the event of
interruption. Identify the maximum tolerable interruption periods by function and
organizational activity.

Choose business continuity strategies -- Define alternative methods to ensure


sustainable delivery of products and services. Key decisions will likely include
desired recovery times, distance to recovery facilities, required personnel,
supporting technologies, and impact on stakeholders.

Develop and complete a BCP response -- Document and formalize the BCP plan.
Define protocols for defining and handling crisis incidents. Create, assign roles to,
and train the incidence response team(s).
Exercise, maintain and review the plan -- -- Test the required technology and
implement all proposed recovery processes. Update the plan as business processes
and risks evolve.

Embed the plan in the organization's culture -- Design and deliver education,
training and awareness materials to enable effective responses to identified risks.
Manage change processes to ensure that the BCP integrates into the organization's
culture.

Following these steps should enable the creation of a BCP that greatly reduces the
threat of key organizational risks disrupting future business success.

Biometric Security System

GenghisKhan.Com Airlines is considering ways to enhance the physical security of its data
center, which is located in a suburb of New York City, consists of 10,000 ft. 2, and is regularly
used by about 30 employees. Currently, access to the data center requires a proximity card;
individual employees receive cards. The company is considering implementing a biometric
fingerprint scanner to increase security. Please define each of the following security risks, and
comment on the effectiveness of the proposed biometric security in addressing them: (1)
Piggybacking; (2) Phishing; (3) Sharing access cards; (4) Packet sniffing.

To: GenghisKhan.Com Airlines


From: Accountant
Re: Proposed biometric security system

Biometric scanning technologies authenticate identity using an individual's unique


body features, such as voice, retina, fingerprint, or signature. The cost of biometric
identification technologies are dropping and such systems are increasingly reliable
and valid. In considering such systems, GenghisKhan.Com should consider an
integrated system that combines multi-factor identification, potentially including by
knowledge (e.g., password), by device (e.g., a keycard) and by body (e.g., voice
print or fingerprint). The proposed biometric fingerprint scanning technology would
relate to the security risks as follows:

In piggybacking, an unauthorized user gains entry into a restricted area by


following an authorized user, using the authorized user's entry credentials to gain
access. The level of piggybacking might be reduced by the proposed biometric
system, but a better (though perhaps more expensive) control over this risk would
be hiring security guards or installing video systems to monitor entry stations.

Phishing attempts are requests for information delivered via email or text
messaging (when sent by text message, these are called smishing). This risk would
be unaffected by the use of biometric identification technologies.

Sharing access cards. The proposed biometric systems would eliminate this risk.
Employees could not share access cards in a system that included biometric
identification.

Packet sniffing programs capture packets of data as they move across a computer
network. This risk would be unaffected by the use of biometric identification
technologies.
Control Procedures

Roger Johnson, a CPA, worked as a volunteer at the International Commonwealth Track and
Field Games (ICTFG). Each day of the six-day games, about $100,000 in cash and $2 million
in credit card revenues came into the accounting office. Roger's volunteer duties included
counting cash each evening and reconciling the credit card receipts and credit card fee
payments to the cash receipts journal and general ledger. Control procedures required at least
two individuals to be present in the accounting office at all times. However, Melanie Smurf, the
other volunteer who was to work with Roger on Thursday evening, had a six-year-old daughter
who was ill. Hence, Melanie requested that Roger count the cash and perform the
reconciliations for this day by himself, since she could not fulfill her volunteer duties that
evening.

Please write a memo discussing the role of monitoring of internal control in improving
corporate governance and how the monitoring of internal control is relevant to the issue
identified in this question.

Memo:

Over time, controls deteriorate. This deterioration is called "entropy." Control


monitoring is important because people forget, quit jobs, get lazy, get distracted, or,
come to work drunk, stoned, or hung over; in addition, machines fail and technology
changes.

Monitoring is the core, foundational component in the COSO ERM model. Its position,
i.e., as the foundation of risk management, is intentional. Monitoring is essential to
achieving strong internal control and effective risk management. With good control
monitoring control problems are identified, and identified more quickly. Decision
makers receive better, more timely information. Certifications of internal control are
easier and more timely, and organizations are more efficient and have lower costs.

Effective cash control requires segregation of duties. Monitoring the control


requirement, i.e., that at least two individuals be present for cash counts, would
reveal that a backup, additional individual is needed in the system, to ensure that no
individual ever counts cash alone. Hence, monitoring is useful, as in this case, in
revealing that the specified control procedures are infeasible or inadequate.

In short, the situation at ICTFG suggests a control deficiency that should be


identified by effective monitoring and corrected through proper segregation of
duties.

Sincerely,

Accountant
Enterprise Resource Planning System

he Cup-O-Cake Company (COCC) manufactures cupcakes, wedding cakes, and other baked
desserts which are delivered through grocery stores, caterers, and restaurants. COCC has
recently begun a complex IT project, built around an enterprise resource planning system, to
replace accounting, customer relations management, supply chain management, and
inventory control systems. Although the system is built around SAP, management decided to
customize many of the SAP modules to ensure a better fit with existing organizational
processes. Unfortunately, the implementation is not going well. Implemented modules, after
initial testing, are evidencing difficulties, including transactions failing to execute, and data
errors emerging in the enterprise-wide databases. Please write a memo to the head of the IT
steering committee that considers:

1. the major roles of each of the following in resolving the above issues and problems: the
IT steering committee, the lead systems analyst, applications programmers, and end-users,

2. what processes, within the systems development lifecycle, may have led to the above
failures.

Type your communication below the line in the response area below.

To: IT Steering Committee Chair


From: Accountant
Re: Resolving SAP implementation issues at COCC

Question #1: In relation to the issues that are emerging in the SAP implementation
at COCC, the roles of the following parties should be:

The IT steering committee: bears primary responsibility for approving and


prioritizing information technology projects. Their responsibility in relation to
implementation failures would depend upon how their role was defined in relation to
the project. Hence, it is not clear from the case what the role of the IT steering
committee would be in resolving these issues.

The lead systems analyst: Responsible for developing overall programming logic and
functionality. Failures of the system may be an indicator of problems in this
responsibility. Should be interviewed regarding why the implementation is not
proceeding smoothly.

Applications programmers: Given that considerable customization is occurring in the


implementation, pinpointing the causes of these failures will be a critical diagnostic
activity. Hence, interview applications programmers to help determine why these
implementation failures are occurring, particularly in relation to customized
programming.

End-users: Gathering additional information about when, why and how the system is
failing to operate as promised will be an additional critical diagnostic activity. Hence,
interviewing end users as to these issues should be informative in resolving them,
by allowing for more precise diagnosis of the nature of the failures.

Question #2: Failures at the implementation stage may be traced back to one of
several possible failures earlier in the systems development process. For example:
Feasibility may have been mis-assessed in the planning and feasibility assessment
stage. Hence, the system, as conceived and implemented, may be infeasible.

The assessment of system requirements may have been poorly executed, meaning
that actual system requirements do not match those proposed in the system
planning documents.

Failure at the design stage would lead to an improper specification of the technical
system architecture or the definition of the interfaces between modules and
subsystems. This could also explain the system failure.

Failure at the development stage could result in inadequate hardware and IT


infrastructure for the system. This would mean that the hardware and other IT (for
example network) resources may be inadequate to the demands of the system.

A failure at the testing stage may result from inadequate testing at normal
operational loads, meaning that the system may work in a test environment but may
fail in the more demanding, actual environment within which the system must work.

A failure at the implementation stage may result from inadequate training of users in
the new system or in insufficient time to allow users to gain a complete working
knowledge of the new system.

Sincerely,

Accountant

Segregation of Duties

Skyview, Inc., a small start-up company, has hired you as a consultant to assess its financial
systems and related processes. During your review, you learned that the company accountant
is responsible for providing general ledger access to others in the company, processing of
transactions in the general ledger, and printing checks. The president of the company must
authorize write-offs in the system, but the accountant has access to the president's user name
and password.

Prepare a memorandum to Skyview's president assessing these responsibilities in the context


of segregation of duties. Also assess the possibility of the accountant committing fraud.

To: Skyview President


Re: Redemption Treatment

You have requested that an independent assessment of Skyview's financial systems


and related processes. In a properly controlled financial system the duties of
authorization of transactions, approval of transactions, custody of assets, and record
keeping should all be segregated. In other words, these functions should all be
performed by different individuals. Your current financial system and processes do
not include this proper segregation of duties. Skyview's accountant has incompatible
duties that would allow him to make an error or perpetrate a fraud and prevent its
detection. He processes transactions and has access to assets (printed checks). As
an example, he could process fictitious purchase transactions to his own shell
companies and cause payments to be made for goods or services that were not
received by Skyview.
In addition, the fact that the accountant has access to your user name and password
allows him to circumvent the control provided by your being the only individual
authorized to write off accounts. This would allow the accountant to process an
unauthorized sales transaction to his own shell company and use your user name
and password to write off the account.

I recommend that you purchase or develop a new financial accounting system that
would include appropriate segregation of duties to ensure that no individual in the
organization has the ability to perpetrate errors or fraud without it being detected in
the normal course of operations. In addition, you should establish polices regarding
the maintenance and confidentiality of user names and passwords to ensure that the
controls cannot be circumvented. While such actions will, in the short-term increase
the costs of the accounting system, they will help to prevent the potentially
disastrous occurrence of a major fraud at Skyview.

If you have any questions, please contact me.

Enterprise Risk Management

Assume that you are acting as a consultant for Winston Co. The president of the company is
considering implementing an enterprise risk management system. To evaluate whether to go
forward with the project, the president has asked you to describe the limitations of an
enterprise risk management system.

Prepare a memorandum to Winston's president describing the purpose and limitations of an


enterprise risk management system.

To: Winston Co. President


Re: Limitations of an enterprise risk management system

You have requested that I provide you with information about an enterprise risk
management system. You are particularly concerned with the limitations of such a
system. The primary purpose of an enterprise risk management system is to provide
processes to identify potential risks to achieving a company's objectives, and, to
manage those risks to be within the company's risk appetite.

In considering implementation of an enterprise risk management system, it is


important to recognize that these systems have limitations. All enterprise risk
management systems rely on judgments about future events that may or may not
occur. Also, while an enterprise risk management system provides information about
risks to achieving the company's objectives, it does not provide complete assurance
that the objectives will be achieved. Finally, as with all control systems, an
enterprise risk management system can break down for a number of reasons,
including bad judgments about risks and their impact, collusion among two or more
individuals, or override by management. Also, due to cost-benefit constraints, no
enterprise risk management system can be perfect.

Adopting a structured plan for assessing the need for and developing a high-quality
ERM system can mitigate these risks. If you have any additional questions about
enterprise risk management systems, please contact me.
Real-time Processing

Tintco, Inc. is a distributor of auto supplies. Currently, the corporation has a batch processing
system for processing all transactions and maintaining its inventory records. Batches are
processed monthly. George Wilson, the chief information officer for the corporation, is
considering adopting an online, real-time processing system. He has asked you (a consultant)
to prepare a memorandum describing the advantages of adopting such a system for the
corporation.

To: Mr. George Wilson, CIO


Tintco, Inc.
From: CPA Candidate

As you requested, this memorandum describes the advantages of implementing an


online, real-time processing system for inventory. As you are aware, Tintco, Inc.
currently uses a batch processing system that processes transactions monthly. The
primary advantage of an online, real-time processing system is that it provides more
timely (and therefore more accurate) information for decisions. In a batch system,
inventory data are only accurate when the records are updated (i.e., each month).
Therefore, decisions about ordering inventory, inventory value, and company
profitability are not based on timely information. As a result, management cannot do
a very good job of managing inventory. If the company implements an online, real-
time system, information about inventory levels, inventory investment, and cost of
goods sold would be available on a continuous basis. As a result, business decisions
will be based on accurate and timely information. This should result in much better
decisions and better financial performance.

It is clear that an online, real-time inventory system is superior to your current


batch processing system. If you would like to have additional information about
implementation of a new inventory processing system, please contact me.

Payback and Accounting Rate of Return Methods

Yeager Company is considering several alternative capital investments. In evaluating the


investments, management of the company has used the payback and accounting rate of
return methods. Prepare a memorandum to Linda Gordon, the chief financial officer, describing
the limitations of these two methods for evaluating investments and suggesting other methods
that might be more appropriate.

To: Ms. Linda Gordon, CFO


Yeager Company
From: CPA Candidate

You have requested that I provide an evaluation of the two methods that Yeager
Company uses for capital budgeting: the payback and the accounting rate of return
methods.

As you know, the payback method evaluates investments based on the length of
time it takes to recapture the initial investment. The payback method has two major
limitations. First, it ignores the overall profitability of the investment. Second, it
does not take into account the time value of money. These are major limitations
which can result in selecting investments that are not consistent with maximization
of the company's return on investment.
The accounting rate of return method evaluates investment alternatives based on
their rate of accounting return. Like the payback method, the accounting rate of
return method ignores the time value of money. As a result, it too can result in
choosing investments that may not result in maximization of the company's return
on investment.

The most effective capital budgeting techniques are those that consider the time
value of money. As an example, the net present value method evaluates investment
alternatives based on the present values of the future cash flows of the investments.
It considers both the total profitability of the investment and the time value of
money. Another technique, the internal rate of return method, evaluates investment
alternatives based on their time-adjusted rates of return. This technique also
considers the total profitability of the investment and adjusts for the time value of
money.

I would suggest that you consider replacing your current techniques for capital
budgeting with a technique or techniques that are superior, such as the present
value and the internal rate of return techniques. If you have any other questions
about capital budgeting, please contact me.

Advantages and Disadvantages of Going Public

Talon, Inc. is a privately held manufacturing company. Management of the company is


considering taking the company public through the issuance of common stock.

Terry Savage, the president of the company, has asked you prepare a memorandum describing
the advantages and disadvantages of going public.

To: Mr. Terry Savage, President


Talon, Inc.
From: CPA Candidate

As you requested, this memorandum describes the advantages and disadvantages of


taking your company, Talon, Inc., public. A primary advantage of going public is that
Talon will have access to a much larger pool of equity capital. The company's stock
will trade on an organized market. Therefore, the company can more easily issue
additional stock. Because the stock of the company is publicly traded, it can be used
for business acquisitions, and the company can offer stock-based compensation to
Talon's employees. Finally, the owners of Talon are afforded the opportunity to
readily sell all, or a portion, of their investment in the company. Therefore, the
owners' investments become liquid.

The primary disadvantage of going public is the cost. There are significant costs
involved in the initial public offering of stock, and the continuing costs of compliance
with SEC laws and regulations, including the Sarbanes-Oxley Act. Being a public
company necessarily causes management to focus on maximizing stock price, which
may not be in the best long-term interest of Talon. Finally, public companies must
disclose significant amounts of information that becomes available to competitors,
customers, and potential corporate raiders.

Because of these significant costs and benefits, it is important that the board of
directors of Talon carefully evaluate the decision about whether or not to go public.
If you need any additional information, please contact me.
Balanced Scorecard

The management of Hewitt Company is considering adopting a balanced scorecard to measure


performance. Karen Wells, the chief financial officer for the company, has asked you to
prepare a memorandum describing a balanced scorecard and the advantages of adopting such
a system.

To: Ms. Karen Wells, CFO


Hewitt Company
From: CPA Candidate

I understand that you are considering implementing a balanced scorecard


performance measurement system at Hewitt Company. This memorandum explains
the nature and benefits of such a system.

The balanced scorecard is a performance measurement system that includes both


financial and nonfinancial measures. It includes measures in the four perspectives of
financial, customer, internal business processes, and learning and growth. By
measuring performance with multiple measures across these four perspectives, a
balanced scorecard is more strategic than other systems that rely primarily on
financial measures. It aids in communicating the company's strategy to all members
of the organization and helps insure that they work to achieve the organization's
strategic goals.

I suggest that you continue with your plan to implement a balanced scorecard
system because I believe that it is superior to other single-dimensional systems.

If you have any questions, please contact me.

Performance Measures

The management of Taylor Corporation is attempting to adopt new performance measures.


Henry Warren, the chief executive officer, has asked you to prepare a memorandum describing
how management should choose between alternative measures.

To: Mr. Henry Warren, CEO


Taylor Corporation
From: CPA Candidate

This memorandum is designed to assist you in deciding how to select among


different performance measures for Taylor Corporation.

Selecting among different performance measures requires an understanding how the


measures will be used. Possible uses include for compensation, resource allocation,
and business unit performance. Different measures are more appropriate for
different purposes.

It is important that all performance measures reflect the strategy of the company.
Measures that are strategic communicate the goals of the organization and motivate
management to pursue those goals. Performance measures must also represent
economic reality. They should provide a clear and accurate measure of relative
performance. Finally, if the measures are used to evaluate and compensate
managers, they should be sensitive to factors that are in the manager's control and
not sensitive to factors beyond the manager's control. The measures should be
clearly controllable by the manager being evaluated.

As you can see, selection of appropriate performance measures is a complex


process. If you would like to discuss your selection of measures in more detail,
please contact me.

Cost System

The controller of Tennyson, Inc., Howard Lester, is concerned that the company's costing
system is not providing good information about product costs. As a result, he fears that the
company is not making good sales or production decisions. Currently, the company uses a
simple job order costing system and allocates service department costs on the direct method.
Prepare a memorandum to Mr. Lester describing the importance of having good cost
information and ways in which the existing system may be improved.

To: Mr. Howard Lester, Controller


Tennyson, Inc.
From: CPA Candidate

At your request, this memorandum provides information about the importance of a


good cost system and the manner in which Tennyson's system may be improved.

It is essential that a company's cost system reflect accurately the costs of


production. Product cost information is a very important input into a number of
business decisions, including those involving product pricing, inventory levels, and
allocation of productive resources. Historically, the company has allocated service
department costs on the direct method. This method simply allocates the costs of
each service department to production departments based on the relative level of
use. The direct method can result in inaccurate costing when service departments
provide significant amounts of services to other service departments.

Two methods of cost allocation are superior to the direct method: the step method
and the reciprocal method. The step method allocates service department costs to
other service departments as well as the production departments, starting with the
service departments that provide the most services to other service departments.
The reciprocal method uses simultaneous equations to allocate costs to production
departments, resulting in the most accurate allocation of costs when service
departments provide services to other service departments.

Because of the importance of developing accurate cost information, I encourage you


to evaluate your current system of costing. As described, the step and the reciprocal
methods of allocation of service department costs are superior to the direct method
which is currently being used by the firm.

Enterprise Resource Management System

Assume that you are a consultant providing services for Webster Corp. Webster is performing
a significant project based implementation of a new enterprise resource system. The company
is concerned about the difficulties in performing the project. Compose a memorandum to
management describing the risks involved in executing a project that is cross-functional in
nature.

To: Webster Corp. President


Re: ERP project management
From: CPA Candidate

You have requested that we provide information about the issues involved in
executing a project to implement an enterprise resource management system. In
particular, you are concerned that the cross-functional nature of the project will be
difficult to manage.

You should understand that the cross-functional nature of this project creates
additional risk of failure that must be controlled. The most important requirement
for success of a cross-functional project is full support by top management. The
team must have this support to get adequate cooperation from the various
functional managers of the organization. This also means that the relationships
between the project manager and various functional managers must be clearly
defined to avoid conflict. Finally, senior management must support the project
manager's decisions, recognizing that these decisions must be made quickly and
with limited information to ensure that the project remains on schedule. If senior
management recognizes and resolves these issues, the risk of failure will be
significantly reduced.

If you have any additional questions about the issues regarding completing the
project, please contact me.

Responsibility Accounting System

Tom Miller, the controller of Winston Corporation, is considering establishing a responsibility


accounting system for the corporation. Tom would like you to prepare a memorandum
describing a responsibility accounting system and its advantages over a typical budgeting and
reporting systems.

To: Mr. Tom Miller, Controller


Winston Corporation
From: CPA Candidate

As we discussed, Winston Corporation is considering implementing a responsibility


accounting system. A responsibility accounting system is one that evaluates center
managers based on reports that include only revenues and costs that a particular
manager can control. If the manager is responsible for both revenues and costs, the
center is referred to as a profit center. A cost center is one in which the manager is
only responsible for costs.

The primary advantage of a responsibility accounting system is that managers are


rewarded based on factors that are within their control, creating a direct
relationship between their performance and their performance evaluation. When
being evaluated with a responsibility accounting system, managers are not
frustrated by receiving performance evaluations that are influenced significantly by
external factors. Also they are not rewarded for performance that results from
factors outside of their control. Therefore, from a management evaluation
standpoint, a responsibility accounting system has a significant advantage over
traditional accounting systems.

If you need any additional information about such systems, please contact me.

S-ar putea să vă placă și