Report steps necessary evidence and protect company

Assignment Help Basic Computer Science
Reference no: EM1355684

Jonathan Simpson owns a construction company. One day a subcontractor calls him, saying that he needs a replacement check for the job he completed at 1437 West Maple Avenue. Jonathan looks up the job on his accounting program and agrees to reissue the check for $12,750.00. The subcontractor says that the original check was for only $10, 750.00. Jonathan looks around the office and cannot find the company checkbook or ledger. Only one other person has access to the accounting program. Jonathan calls you to investigate. How would you proceed? Write a one-page report detailing the steps Jonathan and you need to take to obtain the necessary evidence and protect the company.

Reference no: EM1355684

Questions Cloud

Determine the value of per share : This company pays a perpetual annual dividend of 2.5 percent of its par value. Par value is $100 per share. If investors require rate of return on this stock is 15%, determine the value of per share?
Illustrate what do you think about the idea that technologic : Illustrate what Do You Think About The Idea That Technological And Medical Advances Would Bring An End To Hunger, Disease, Drudgery, And Unemployment In The United States
Find the market value of assets : Beckman Engineering and Associates has 25 million shares outstanding. Shares are trading at $8. Beckman Engineering and Associates management plans to raise $60 million to by issuing debt to repurchase shares.
Loss-gain contingencies : Generally accepted accounting principles (GAAP) require loss contingencies to be accrued in the period the contingency becomes known. However, GAAP specifically disallows booking gain contingencies until the gain is realized.
Report steps necessary evidence and protect company : Jonathan Simpson owns a construction company. Write a one-page report detailing the steps Jonathan and you need to take to obtain the necessary evidence and protect the company.
Protecting the company against fraud - mf global : Show what measures can and should be taken to make it easier for corporate employees to? Blow the whistle? On a fraudulent scheme within an organization.
Determining accounting and gaap : Discuss what is Accounting and why is it important? Be sure to include the different types of users of Accounting and their need for accounting.
Global alliance : What are the challenges in implementing a global alliance? Once an alliance is reached, what steps are involved in strategic implementation of the venture?
Personal beliefs or biases : Please help me with describing at least two personal beliefs or biases that could interfere with ones perception of an interviewee, establishing rapport with him or her, and the interview process itself.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Cost data incurred in processing lot quality cost data

What conclusions can be drawn from cost data incurred in processing lot, as found in the Excel workbook Quality Cost Data? Customer returns are simply scrapped and replaced.

  K-map to simplify output function using don-t care

Use K-map to simplify output function of x by don't care conditions.

  Explaining benefits of reconnaissance tools

Write down some popular reconnaissance tools? Compare three reconnaissance tools and describe the benefits and limitations of each.

  Explaining records are stored and accessed on storage medium

Which of the given correctly explains a way in which data records are stored and accessed on storage medium?

  Pseudocode or code for simple task

Then post pseudocode or code you would write for simple task (making peanut butter sandwich, for example) as well as three simple control structures that could be used to create this algorithm

  Significant tool to help discover security breaches

Auditing is an significant tool to help discover security breaches, yet many organizations do not implement auditing practices.

  Explaining topic important for network administrators

Why is the topic important for network administrators today?

  Explaining accuracy when using training set data

Explain what can you say about accuracy when using training set data and when using separate percentage to train?

  Explaining minor or major virus threats

Write down two recent virus threats, are they minor or major threats? What software would you utilize to remove these threats?

  Truth table validity of demorgan-s theorem for variables

Find out by means of truth table validity of DeMorgan's theorem for three variables: (ABC)' = A' + B' + C'. Simplify given expressions by using Boolean algebra.

  Cloud computing to the rescue

Cloud Computing to the Rescue,  Describe the hardware, software, and network architectural design of the infrastructure used to build cloud computing infrastructures. Use Microsoft Visio to generate the architectural diagrams.

  Intelligent systems for health maintenance organization

Aacquiring a company in the health maintenance organization (HMO) field. DSS, ES, ESS, or intelligent systems can be used in such a situation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd