Compute the companys cm ratio and its break-even point

Assignment Help Financial Accounting
Reference no: EM131129440

Homework Assignment

1. DragNet Manufacturing sold 72,000 units of its product for $95 per unit in 2014. Variable cost per unit is $51.30 and total fixed costs are $5,350,000.

Required:

a. Compute the company's CM ratio and its break-even point in both units and dollars.

b. Assume that the company increased its monthly advertising budget by $66,000, which would result in a $5,500,000 increase in monthly sales. What would be the effect on the company's monthly net operating income or loss? (Use the incremental approach in preparing your answer.)

c. Refer to the original data. The CEO proposes a reduction in the selling price to $75, which would increase the monthly advertising budget by $102,200, and double unit sales. Prepare the new contribution format income statement.

2. Trendy Manufacturing uses normal costing based on a job-order costing system. Indirect costs are allocated to jobs using a plantwide overhead rate based on machine hours. At the beginning of 2014, the company made the following estimates:

Machine-hours required to support estimated production

200,000

Fixed manufacturing overhead cost

$950,000

Variable manufacturing overhead cost per machine-hour

$7.00

Required:

a. Compute the predetermined overhead rate.

b. During 2014, Job 450 was started and completed. The following information was available with respect to this job:

Direct materials requisitioned

$400

Direct labor cost

$270

Machine-hours used

45

Compute the total manufacturing cost assigned to Job 450.

c. During the year, the company worked a total of 189,000 machine-hours on all jobs and incurred actual manufacturing overhead costs of $2,200,750. What is the amount of underapplied or overapplied overhead for the year? If this amount were closed out entirely to Cost of Goods Sold, would the journal entry increase or decrease net operating income?

CASE 5-1 David L. Miller: Portrait of a White-Collar Criminal

There is an old saying: Crime doesn't pay. However, for David Miller crime paid for two Mercedes-Benz sedans; a lavish suburban home; a condominium at Myrtle Beach; expensive suits; tailored and monogrammed shirts; diamond, sapphire, ruby, and emerald rings for his wife; and a new car for his father-in-law. Though Miller confessed to embezzling funds from six different employers over a 20-year period, he has never been prosecuted or incarcerated-in large part because his employers never turned him in.

Miller was fired from his first employer for stealing $200. After an assortment of odd jobs, he worked as an accountant for a local baker. Miller was caught embezzling funds and paid back the $1,000 he stole. Again, law enforcement was not notified, and he was quietly dismissed.

Several months after Miller started work at Wheeling Bronze, his third victim, the president discovered a $30,000 cash shortfall and several missing returned checks. An extensive search found the canceled checks, with forged signatures, in an outdoor sand pile. Miller confessed to the scheme and was given the choice of repaying the stolen funds or being prosecuted. When Miller's parents mortgaged their home and repaid the stolen money, he escaped prosecution.

Miller's fourth victim was Robinson Pipe Cleaning. When Miller was caught embezzling funds, he again avoided prosecution by promising to repay the $20,000 he stole.

Miller's fifth victim was Crest Industries, where he worked as accountant. He was an ideal employee-dedicated and hard working, doing outstanding work. He was quickly promoted to office manager and soon purchased a new home, car, and wardrobe. Two years later, Crest auditors discovered that $31,000 was missing. Miller had written several checks to himself, recorded them as payments to suppliers, and intercepted and altered the monthly bank statements. With the stolen money, he financed his lifestyle and repaid Wheeling Bronze and Robinson Pipe Cleaning. Once again, Miller tearfully confessed, claiming he had never embezzled funds previously. Miller showed so much remorse that Crest hired a lawyer for him. He promised to repay the stolen money, gave Crest a lien on his house, and was quietly dismissed. Because Crest management did not want to harm Miller's wife and three children, Crest never pressed charges.

Miller's sixth victim was Rustcraft Broadcasting Company. When Rustcraft was acquired by Associated Communications, Miller moved to Pittsburgh to become Associated's new controller. Miller immediately began dipping into Associated's accounts. Over a six-year period, Miller embezzled $1.36 million, $450,000 of that after he was promoted to CFO. Miller circumvented the need for two signatures on checks by asking executives leaving on vacation to sign several checks "just in case" the company needed to disburse funds while he was gone. Miller used the checks to siphon funds to his personal account. To cover the theft, Miller removed the canceled check from the bank reconciliation and destroyed it. The stolen amount was charged to a unit's expense account to balance the company's books.

While working at Associated, Miller bought a new house, new cars, a vacation home, and an extravagant wardrobe. He was generous with tips and gifts. His $130,000 salary could not have supported this lifestyle, yet no one at Associated questioned the source of his conspicuous consumption. Miller's lifestyle came crashing down while he was on vacation and the bank called to inquire about a check written to Miller. Miller confessed and, as part of his out-of-court settlement, Associated received most of Miller's personal property.

Miller cannot explain why he was never prosecuted. His insistence that he was going to pay his victims back usually satisfied his employers and got him off the hook. He believes these agreements actually contributed to his subsequent thefts; one rationalization for stealing from a new employer was to pay back the former one. Miller believes his theft problem is an illness, like alcoholism or compulsive gambling, that is driven by a subconscious need to be admired and liked by others. He thought that by spending money, others would like him. Ironically, he was universally well liked and admired at each job, for reasons that had nothing to do with money. In fact, one Associated coworker was so surprised by the thefts that he said it was like finding out that your brother was an ax murderer. Miller claims he is not a bad person; he never intended to hurt anyone, but once he got started, he could not stop.

After leaving Associated, Miller was hired by a former colleague, underwent therapy, and now believes he has resolved his problem with compulsive embezzlement.

1. How does Miller fit the profile of the average fraud perpetrator? How does he differ? How did these characteristics make him difficult to detect?

2. Explain the three elements of the Opportunity Triangle (commit, conceal, convert), and discuss how Miller accomplished each when embezzling funds from Associated Communications. What specific concealment techniques did Miller use?

3. What pressures motivated Miller to embezzle? How did Miller rationalize his actions?

4. Miller had a framed T-shirt in his office that said, "He who dies with the most toys wins." What does this tell you about Miller? What lifestyle red flags could have tipped off the company to the possibility of fraud?

5. Why do companies hesitate to prosecute white-collar criminals? What are the consequences of not prosecuting? How could law enforcement officials encourage more prosecution?

6. What could the victimized companies have done to prevent Miller's embezzlement?

CASE 6-1 Shadowcrew

At 9:00 P.M., Andrew Mantovani, cofounder of the group Shadowcrew, received a knock at his door while chatting on his computer. For Mantovani and 27 others, that knock marked the end of Shadowcrew, which provided online marketplaces and discussion forums for identity thieves. Shadowcrew members used the organization's website to traffic in stolen Social Security numbers, names, e-mail addresses, counterfeit driver's licenses, birth certificates, and foreign and domestic passports. It also shared best practices for carrying out fraudulent activity. By the time it was shut down, Shadowcrew had trafficked in at least 1.7 million credit cards and it was responsible for more than $4.3 million in fraud losses.

Considered the online equivalent of the Russian Mafia, Shadowcrew operated as a highly sophisticated and hierarchical organization. All users operated under aliases, never revealing their true names or other personal information. Operations and communications were conducted using proxy servers that hid the location and identity of the users. Shadowcrew users were divided into five different roles: administrators, moderators, reviewers, vendors, and members.

Administrators Shadowcrew administrators were the heads of the organization.

Moderators A dozen moderators, chosen from the general membership based on proven skill in fraudulent activity, controlled the flow of information.

Reviewers Reviewers tested the quality of illicit goods (credit cards, passports, etc.) trafficked on the Shadowcrew site. For example, reviewers would run a test called a "dump check" on credit card numbers by hacking into a retailer's cash register system. The fraudster accessed the system through back doors used by technical support personnel to remotely perform maintenance or repairs. The reviewer would then enter a trivial charge of $1 or $2 to see whether the charge was approved.

Reviewers would then write up and post detailed descriptions of the credit cards or other merchandise tested.

Vendors Vendors managed the sale of stolen data. Prices were posted and products were sold using an auction forum much like eBay. Payments were processed via Western Union money transfers or an electronic currency and were made using a fraud victim's stolen data.

Members Thousands of people used the Shadowcrew website to gather and share information on committing identity fraud. Shadowcrew practiced open registration, but more sensitive discussion areas were password protected, and members needed another trusted member to vouch for them in order to join the forum.

Members could be promoted up the organization by providing quality products or by sharing new or unique tips or techniques for committing fraud. Shadowcrew punished acts of disloyalty. For instance, one disloyal group member had his actual name, address, and phone number posted on the website for all to see.

Shadowcrew's demise began when MasterCard informed the United States government that a hundred websites promoted and supported identity fraud. The United States Secret Service covertly infiltrated Shadowcrew. Acting as trusted members, agents set up a Virtual Private Network (VPN) over which Shadowcrew leaders could conduct illicit business. The VPN allowed the Secret Service to track the organization's doings and discover the real identities and locations of Shadowcrew users.

It was vital that all arrests occur simultaneously, because any one of the targets could instantly warn the others via Shadowcrew's discussion forum. With the help of the Justice Department, Homeland Security, the Royal Canadian Mounted Police, Europol, and local police departments, authorities simultaneously knocked on the suspects' doors at precisely 9:00 P.M. The operation led to 28 arrests, 21 in the United States. Rather than immediately deactivating the website, investigators replaced the home page with the following warning: "Activities by Shadowcrew members are being investigated by the United States Secret Service." Under a picture of hands clutching bars of a jail cell, agents listed the criminal charges that Shadowcrew members faced and called on visitors to turn themselves in: "Contact your local United States Secret Service field office before we contact you!"

(Source: J. McCormick and D. Gage, Baseline Security, March 7, 2005.)

1. How did Shadowcrew members conceal their identities? How can average citizens protect their identities while interacting online?

2. How has the Internet made detecting and identifying identity fraudsters difficult?

3. What are some of the most common electronic means of stealing personal information?

4. What is the most common way that fraudsters use personal data?

5. What measures can consumers take to protect against the online brokering of their personal data?

6. What are the most effective means of detecting identity theft?

7. What pieces of personal information are most valuable to identity fraudsters?

1. Is fraud perpetrated by employees against their companies (inside job) more prevalent than fraud perpetrated by outsiders against companies (outside job)? Explain your position. Describe what you think is the number one target of an inside job versus that of an outside job.

2. Segregation of duties (SoD) and other classic internal controls such as management oversight have been adapted to consider technology. Compare/contrast the classic controls with their adaptations for technology. Have one or more of the classic controls become obsolete when applied in technology? Additionally, describe any new controls that have become necessary because of technology.

3. How would you explain CVP analysis to a second grader?

4. Why is this analysis so important?

5. Describe, in detail, one of the steps in job order costing. Why is this step important?

Reference no: EM131129440

Questions Cloud

What problems created by leaderless organizational structure : In regards to patriot-militias, what problems are created by a leaderless organizational structure? Do you think these groups pose a serious threat to the U.S. government? Explain your answer in full
An internal source of financing for the firm : 1. Which of the following is an advantage of ownership of a corporation compared to that of a sole proprietorship?2. Which of the following is false?3. Which of the following is an internal source of financing for the firm?
Prepare the journal entry to record the sale of these bonds : Prepare the journal entry to record the first interest payment on July 1, 2010 (interest payable semiannually), assuming no previous accrual of interest.
Describe the teachings of the christian identity movement : Describe the teachings of the Christian identity movement. How have various hate and patriot-militia groups adopted these teachings
Compute the companys cm ratio and its break-even point : Compute the company's CM ratio and its break-even point in both units and dollars. What pressures motivated Miller to embezzle? How did Miller rationalize his actions?
Perform an internet search for creative spark : Write a 700- to 1,050-word summary of the salient points made in the talk and its supporting details that catch your interest - How the talk's content illuminates some of the stages of creativity
Explanation for the missing watch and jewelry : Should the sheriff attempt to provide an explanation for the missing watch and jewelry? You strongly suspect that the officers who put Sims in the "drunk tank" weren't particularly careful in removing Sims' personal effects
Some applications of the markov inequality : (a) The scores that high school juniors get on the verbal part of the PSAT/NMSQT test may be looked upon as values of a random variable with the mean μ = 41. Find an upper bound to the probability that one of the students will get a score of 65 or..
Where is quality assessed within the task set : How is this accomplished? How are the quality attributes discussed in Section 8.2.1 achieved?

Reviews

Write a Review

Financial Accounting Questions & Answers

  How much long-term debt does blackwell automotive have

Balance sheet: Tim Dye, the CFO of Blackwell Automotive, Inc., is putting together this year's financial statements. He has gathered the following balance sheet information: How much long-term debt does Blackwell Automotive have

  Fundraiser to benefit various environmental causes

Thoreau co. is planning a fundraiser to benefit various environmental causes. all proceeds in excess of costs will be donated to these causes. the planning committee has developed the following budget for the event: ballroom rental: 1900 entertainmen..

  Dextra computing sells merchandise

Dextra Computing sells merchandise for $17,000 cash on September 30 cost of merchandise is $11,900.

  Uses predetermined overhead rate based on direct labor-hours

Sawyer Manufacturing Corporation uses a predetermined overhead rate based on direct labor-hours to apply manufacturing overhead to jobs. Last year, the Corporation worked 48,000 actual direct labor-hours and incurred $552,000 of actual manufacturing ..

  What are the operating risks of the company

What is the name of the company? What is the industry sector and what are the operating risks of the company?

  Provide the entry to record the collection of the amounts

Provide the entry to record the billing of these amounts. Provide the entry to record the collection of these amounts. Provide the entry to record the payment of the sales taxes to the appropriate governmental unit.

  Complete the cost of goods sold section

The trial balance of Perine Company at the end of its fiscal year. Complete the cost of goods sold section (periodic system) for the year ending August 31.

  You have been asked by the president of your company to

you have been asked by the president of your company to determine the proposed acquisition of a new special-purpose

  Calculate the cash coverage ratio

What was Tommy Bad finger's cash coverage ratio for the year - Calculate the Cash Coverage Ratio

  A prepare the balanced scorecard for the norwalk

a prepare the balanced scorecard for the norwalk pharmaceutical division of chadwick inc. what parts of the business

  Interest rate to fund retirement goal

George Just hit the jackpot in Las Vegas and won $55,000! if he invests it now, at a 12% interest rate, how much will it be worth 15 years from now? Zach would like to have $4,000,000 saved by the time he retires 40 years from now. How much does he n..

  Calculate cost of goods sold and cost of ending inventory

Given the following data, calculate cost of goods sold and the cost of ending inventory.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd