2.99 See Answer

Question: Describe corporate governance breakdowns in the


Describe corporate governance breakdowns in the facilitation of Enron’s fraudulent acts.


> What is a collateralized debt obligation (CDO)?

> What is the effect of market liquidity and segmentation on a firm capital.

> Why have eurocurrencies and LIBOR remained the centerpiece of the global financial marketplace for so long?

> If a country follows a fixed exchange rate regime, what macroeconomic variables could cause the fixed exchange rate to be devalued?

> The measurement of all international economic transactions between the residents of a country and foreign residents is called the balance of payments (BOP). What institution provides the primary source of similar statistics for balance of payments and ec

> It has been claimed that failures in corporate governance have hampered the growth and profitability of some prominent firms located in emerging markets. What are some typical causes of these failures in corporate governance?

> Technically, what is a sovereign default?

> Brazil has experienced periodic depreciation of its currency over the past 20 years, despite occasionally running a current account surplus. Why has this phenomenon occurred?

> The U.S. dollar has maintained or increased its value over the past 20 years, despite running a gradually increasing current account deficit. Why has this phenomenon occurred?

> The IMF classifies all exchange rate regimes into eight specific categories that are summarized in this chapter. Under which exchange rate regime would you classify each of the following countries?

> Convert the following indirect quotes to direct quotes, and direct quotes to indirect quotes: a. Euro: €1.22/$ (indirect quote) b. Russia: Rubl 30/$ (indirect quote c. Canada: $0.72/C$ (direct quote) d. Denmark: $0.1644/DKr (direct quote)

> Smith Company and Jones Company enter into an interest rate swap, with Smith paying fixed interest to Jones, and Jones paying floating interest to Smith. Smith now goes bankrupt, and so defaults on its remaining interest payments. What is the financial d

> How should an MNE factor host country inflation into its evaluation of an investment proposal?

> The newspaper reports that a given June Eurodollar future settled at 93.55. What was the annual yield? How many dollars does this represent?

> Check The Wall Street Journal to find the United States locations for trading foreign exchange futures contracts.

> What is a mortgage-backed security (MBS)?

> Name the four main contractual instruments used to hedge transaction exposure.

> What are the major differences in translating liabilities between the current rate method and the temporal method?

> An alternative arrangement for managing operating exposure between firms with a continuing buyer-supplier relationship is risk sharing. Explain how risk sharing works.

> Answer the following: a. Explain how matching currency cash flows can offset operating exposure. b. Give an example of matching currency cash flows.

> Operating and transaction exposures can be partially managed by adopting operating or financing policies that offset anticipated foreign exchange exposures. What are four of the most commonly employed proactive policies?

> The objective of both operating and transaction exposure management is to anticipate and influence the effect of unexpected changes in exchange rates on a firm’s future cash flows. What strategic alternative policies exist to enable management to manage

> Explain how the concept of macroeconomic uncertainty expands the scope of analyzing operating exposure.

> If all national markets have market risk, is all market risk the same?

> How may improper asset valuation inflate the current ratio?

> What issues are generally involved in improper disclosures?

> In what types of cases may a forensic accountant serve as an expert witness?

> What are the four criteria necessary for a sale to be complete?

> What is the primary purpose of admission-seeking questions?

> Why shouldn’t an interviewer use closed or leading questions during the information-gathering phase of the interview?

> What is the purpose of timelines in an investigation?

> What are the two categories of data mining and knowledge discovery software?

> What is meant by the acronym CAATTs and what are they used for?

> Far off in the woods, there is a cabin. The cabin contains 3 people. Two are in one room; the other is alone in another room. All doors to the cabin are locked tight and have not been opened. All three people are dead. There was no sign of violence in th

> A married couple goes to a movie. During the movie the husband strangles the wife. He is able to get her body home without attracting attention. How is this possible?

> This is an unusual paragraph. I’m curious how quickly you can find out what is so unusual about it. It looks so plain you would think nothing was wrong with it. In fact, nothing is wrong with it! It is unusual though. Study it, and think about it, but yo

> What are the benefits of strong interviewing and interrogation skills?

> A murderer is condemned to death. He has to choose between three rooms. The first is full of raging fires, the second is full of assassins with loaded guns, and the third is full of lions that haven’t eaten in 3 years. Which room is safest for him?

> Five pieces of coal, a carrot and a scarf are lying on the lawn. Nobody put them on the lawn but there is a perfectly logical reason why they should be there. What happened? How do you explain this?

> What are some common virus carriers?

> What is meant by a conflict of interest?

> How do bribery and illegal gratuities differ?

> A woman had two sons who were born on the same hour of the same day of the same year, but they were not twins. How could this be so?

> Why are today’s viruses more difficult to detect?

> Why does collusion pose unique prevention and detection challenges?

> What is the difference between tax avoidance and tax evasion?

> What are the five classifications of financial statement fraud?

> What are the different types of schemes associated with complex frauds?

> A woman came home with a bag of groceries, got the mail, and walked into the house. On the way to the kitchen, she walked through the living room. In the living room, she glanced in her husband’s direction. Sadly, her husband had blown his brains out. Sh

> Explain the relationship between an employee’s position and the level of theft (according to Hollinger and Clark’s research).

> Other than accounting, which disciplines do fraud examination and financial forensics encompass?

> Explain fraud examination methodology.

> Describe the fraud examiner/forensic accountant’s approach to investigations.

> Give examples of non-fraud forensic and litigation advisory engagements.

> Identify common fraud schemes.

> List the legal elements of fraud.

> What is the purpose of practice aids in forensic and valuation services?

> How do employees overstate legitimate expenses on their expense reports?

> What are the five principal categories of check tampering?

> What are the five major categories of fraudulent disbursements?

> What are the five major categories of fraudulent disbursements?

> Explain the theory of the fraud triangle.

> Identify the six situational categories that cause non-shareable problems from Cressey’s research.

> What role do fraud examination and financial forensic skills have in the corporate governance area?

> Why are manhole covers round?

> Anthony and Cleopatra are lying dead on the floor in a villa. Nearby on the floor is a broken bowl. There is no mark on either of their bodies and they were not poisoned. With this information, determine how they died.

> In the criminal justice system, how is probation different from parole?

> What are the different types of consulting and litigation support activities for fraud and forensic professionals?

> What approaches are used by investigators to obtain documents?

> Under what circumstances would a Miranda Warning be required?

> What are some red flags that may indicate that fraud is occurring?

> What is meant by inventory “shrinkage?”

> In cash larceny schemes, what methods may be used to conceal these schemes at the point of sale?

> What techniques are generally used to conceal a receivables skimming scheme?

> Why is sales skimming called an “off- book” fraud?

> What is the role of the external auditor in the financial reporting process?

> What constitutes evidence?

> How can financial statement fraud be deterred?

> A woman shoots her husband. Then she holds him under water for over 5 minutes. Finally, she hangs him. But 5 minutes later they both go out together and enjoy a wonderful dinner together. How can this be?

> Match threats in the first column to appropriate control procedures in the second column. More than one control may be applicable. Threat Control Procedure   Failing to take available purchase discounts for prompt payment. Only accept deliveries for

> Revlon hired Logisticon to install a real-time invoice and inventory processing system. Seven months later, when the system crashed, Revlon blamed the Logisticon programming bugs they discovered and withheld payment on the contract. Logisticon contended

> Match the terms in the left column with their definitions from the right column: 1. Bill of materials a. A factor that causes costs to change.  2. Operations list b. A measure of the number of good units produced in a period of time.  3. Master

> Use Table 14-1 to create a questionnaire checklist that can be used to evaluate controls for each of the basic activities in the production cycle (product design, planning and scheduling, production operations, and cost accounting). a. For each control i

> Use Table 13-2 to create a questionnaire checklist that can be used to evaluate controls for each of the basic activities in the expenditure cycle (ordering goods, receiving, approving supplier invoices, and cash disbursements). a. For each control issue

> (Hint: For help on steps b and c, see the article “Dial a Forecast,” by James A. Weisel, in the December 2006 issue of the Journal of Accountancy. The Journal of Accountancy is available in print or online at the AICPA’s Web site: www.aicpa.org Required

> Match the terms in the left column with their appropriate definition in the right column. Terms Definitions   economic order quantity A document that creates a legal obligation to buy and pay for goods or services.   materials requirements planning

> How would you respond to the treasurer of a small charity who tells you that the organization does not use a separate checking account for payroll because the benefits are not worth the extra monthly service fee?

> Match the term in the left column with its definition in the right column. 1. CRM system a. Document used to authorize reducing the balance in a customer account  2. Open-invoice method b. Process of dividing customer account master file into subset

> Why do you think that surveys continue to find that a sizable percentage of organizations either do not have formal disaster recovery and business continuity plans or have not tested and revised those plans for more than a year?

> What is the difference between authentication and authorization?  

> In what situations would you expect to model a relationship between an agent and a resource?

> Identify the DFD elements in the following narrative: A customer purchases a few items from a local grocery store. Jill, a salesclerk, enters the transaction in the cash register and takes the customer’s money. At closing, Jill gives both the cash and th

> Although XBRL facilitates the electronic exchange of financial information, some external users do not think it goes far enough. They would like access to the entire general ledger, not just to XBRL-tagged financial reports that summarize general ledger

> Most DBMS packages contain data definition, data manipulation, and data query languages. For each of the following, indicate which language would be used and why.

> a. Identify three potential users and design a subschema for each. Justify your design by explaining why each user needs access to the subschema data elements. b. Use Microsoft Access or some other relational database product to create the schema tables.

> Required: Download the spreadsheet for this problem from the course website and perform the following tasks: 1. Explore Excel’s AutoFilter function. a. At the bottom of the table, in cell C79 enter the words “Total (sum)” and in cell D79 enter the SUM fu

> Answer all of the following multiple-choice questions. 1. Which of the following pairs of duties combines the functions of custody and authorization in a manner that would allow an employee to conceal the theft of a customer’s payment? a. Handling cash r

> Clint Grace has been business over 30 years and has definite ideas about how his ten retail stores should be run. He is financially conservative and is reluctant to make expenditures that do not have a clear financial payoff. Store profitability has decl

> Match the following terms with their definitions: 1. business continuity plan (BCP) a. A file used to store information for long periods of time.  2. completeness check b. A plan that describes how to resume IT functionality after a disaster.  3.

> Under what conditions (if any) should a company install a forced-distribution rating system for PFP?

2.99

See Answer