Ais Chapter 5
Ais Chapter 5
Chapter Introduction
Learning Objectives
After studying this chapter, you should:
Recognize the fundamental tasks that constitute the purchases and cash disbursements process.
Be able to identify the functional areas involved in purchases and cash disbursements activities,
and trace the flow of these transactions through the organization.
Be able to specify the documents, journals, and accounts that provide audit trails, promote the
maintenance of historical records, and support internal decision making and financial reporting.
Understand the risks associated with purchases and cash disbursements activities and be familiar
with the controls that reduce these risks.
Be aware of the operational features and the control implications of technologies used in
purchases and cash disbursements systems.
The objective of the expenditure cycle is to convert the organization’s cash into physical
materials and human resources it needs to conduct business. In this chapter, we
concentrate on systems and procedures for acquiring raw materials and finished goods
from suppliers. We examine payroll and fixed asset systems in Chapter 6.
Most business entities operate on a credit basis and do not pay for resources until after
acquiring them. The time lag between these events splits the procurement process into
two phases:
(1) the physical phase, involving the acquisition of the resource, and
(2) the financial phase, involving the disbursement of cash.
As a practical matter, these are treated as independent transactions that are processed
through separate subsystems.
This chapter examines the principal features of the two major subsystems that constitute
the expenditure cycle:
Figure 5-2Purchase Requisition
For efficiency and control purposes, the purchase requisition contains routine ordering
information taken from the inventory subsidiary ledger and valid vendor file. This
includes the name and address of the primary supplier, the economic order quantity of
the item, and the standard or expected unit cost of the item. Providing this information to
the purchasing agent allows him or her to deal with routine purchases as efficiently as
good control permits and to devote his or her primary efforts to nonroutine problems
such as sourcing scarce, expensive, or unusual inventory items. The valid vendor file
provides an important control by listing only approved vendors. The purpose is to ensure
that the organization purchases inventories only from authorized vendors. This helps to
reduce certain vendor fraud schemes such as an agent buying from suppliers with whom
he or she has a relationship (a relative or friend) or buying at excessive prices from
vendors in exchange for a kickback or bribe.
Although procedures vary from firm to firm, typically a separate purchase requisition is
prepared for each inventory item as the need is recognized. This often results in multiple
purchase requisitions for a single vendor. The purchase requisitions therefore need to be
combined into a single purchase order (discussed next), which is then sent to the vendor.
In this type of system, each purchase order is associated with one or more purchase
requisitions.
Figure 5-3Purchase Order
Receive Goods
Most firms encounter a time lag (sometimes a significant one) between placing the order
and receiving the inventory. During this time, the copies of the PO reside in temporary
files in various departments. Note that no economic event has yet occurred. At this point,
the firm has received no inventories and incurred no financial obligation. Hence, there is
no basis for making a formal entry into any accounting record. Companies will often,
however, make memo entries of pending inventory receipts and associated obligations.
The next event in the expenditure cycle is the receipt of the inventory. Goods arriving
from the vendor are reconciled with the blind copy of the PO. The blind copy, illustrated
in Figure 5-4, contains no quantity or price information about the products being
received. The purpose of the blind copy is to force the receiving clerk to count and
inspect inventories prior to completing the receiving report. At times, receiving docks are
very busy, and receiving staff are under pressure to unload the delivery trucks and sign
the bills of lading so the truck drivers can go on their way. If receiving clerks are
provided with quantity information, they may be tempted to accept deliveries on the
basis of this information alone, rather than verify the quantity and condition of the goods.
Shipments that are missing items or contain damaged or incorrect items must be
detected before the firm accepts and places the goods in the inventory. The blind copy is
an important control in reducing this risk.
Figure 5-5Receiving Report
Update Inventory Records
Depending on the inventory valuation method in place, the inventory control procedures
may vary somewhat among firms. Organizations that use a standard cost system carry
their inventories at a predetermined standard value regardless of the price actually paid
to the vendor. Figure 5-6 presents a copy of a standard cost inventory ledger.
Posting to a standard cost inventory ledger requires only information about the
quantities received. Because the receiving report contains the quantity information, it
serves this purpose. Updating an actual cost inventory ledger requires additional
financial information, such as a copy of the supplier’s invoice when it arrives.
Set up Accounts Payable
During the course of this transaction, the set up AP function has received and temporarily
filed copies of the PO and receiving report. The organization has received inventories
from the vendor and has incurred (realized) an obligation to pay for the goods.
At this point in the process, however, the firm has not received the supplier’s invoice
containing the financial information needed to record the transaction. The firm will thus
defer recording (recognizing) the liability until the invoice arrives. This common
situation creates a slight lag (a few days) in the recording process, during which time the
firm’s liabilities are technically understated. As a practical matter, this misstatement is a
problem only at period-end when the firm prepares financial statements. To close the
books, the accountant will need to estimate the value of the obligation until the invoice
arrives. If the estimate is materially incorrect, an adjusting entry must be made to correct
the error. Because the receipt of the invoice typically triggers AP procedures, accountants
need to be aware that unrecorded liabilities may exist at period-end closing.
When the invoice arrives, the AP clerk reconciles the financial information with the
receiving report and PO in the AP pending file. This is called a three-way match, which
verifies that what was ordered was received and is fairly priced. Once the reconciliation
is complete, the AP clerk prepares an AP packet, which consists of the supporting
documents (PO, receiving report, and invoice), and files the AP packet in the open AP
file. Once reconciled, the AP packet is the formal authority to record the liability and to
subsequently make payment. Next, the transaction is recorded in the purchases journal
and posted to the supplier’s account in the AP subsidiary ledger. Figure 5-7 shows the
relationship between these accounting records.
Figure 5-7Relationship between Purchase Journal, AP Subsidiary Ledger,
and Journal Voucher
Recall that the inventory valuation method will determine how inventory control will
have recorded the receipt of inventories. If the firm is using the actual cost method, the
AP clerk will send a copy of the supplier’s invoice to inventory control. If standard costing
is used, this step is not necessary.
Finally, the AP clerk summarizes the entries in the purchases journal for the period (or
batch) and prepares a journal voucher for the general ledger function (see Figure 5-7).
Assuming the organization uses the perpetual inventory method, the journal entry will
be:
DR CR
Inventory—Control 6,800.00
DR CR
Accounts Payable—Control
Figure 5-9Voucher Register
Depending on the organization’s materiality threshold, the check may require additional
approval by the cash disbursements department manager or treasurer (not shown
in Figure 5-10). The negotiable portion of the check is mailed to the supplier; a copy of it
is attached to the AP packet as proof of payment; and a check copy is filed in the
department. The clerk marks the documents in the packet paid and returns them to the
AP clerk. Finally, the cash disbursements clerk summarizes the entries made to the check
register and sends a journal voucher with the following journal entry in to the general
ledger function:
DR CR
Cash XXXX.XX
Update AP Record
Upon receipt of the paid AP packet, the AP clerk removes the liability by debiting the
vendor’s AP subsidiary ledger account. The AP packet is then filed in the closed AP file,
and an account summary is prepared and sent to the general ledger function.
Systems at different points on the continuum operate differently and present different
internal control issues. The objectives of this section are to:
(1)
illustrate accounting information systems (AIS) functionality and work flow
patterns under different levels of technology and
(2)
demonstrate how the internal control profile changes as the technology/human
mix changes.
To accomplish this we review examples of systems at different points on the continuum.
The first example is a basic technology system that employs independent PCs, which
function primarily as record-keeping devices. The second example is an advanced
technology system that integrates all business functions through a centralized computer
application.
5-2aBasic Technology Expenditure Cycle
This section presents examples of basic technology expenditure cycle systems. The
computers used in these systems are independent (non-networked) PCs. Therefore,
information flows between departments are communicated via hard-copy documents. In
addition, in such systems, maintaining physical files of source documents is critical to the
audit trail. As we walk through the flowcharts, notice that in many departments, after an
individual completes his or her assigned task, documents are filed as evidence that the
tasks were performed.
Purchasing Department
The purchasing department receives the purchase requisitions, sorts them by vendor,
and adds a record to the digital open purchase order file. The clerk then prints a
multipart PO for each vendor. One copy of the PO is sent to the vendor. One copy is sent
to inventory control, where the clerk files it with the open purchase requisition. One copy
of the PO is sent to the AP for filing in the AP pending file. One copy (the blind copy) is
sent to the receiving department, where it is filed until the inventories arrive. The clerk
files the last copy along with the purchase requisition in the department.
Receiving
The receiving department clerk receives the goods and the packing slip from the vendor
and reconciles the goods with the blind copy of the PO. Upon completion of the physical
count and inspection, the receiving clerk adds a digital record to the receiving report file
and prints a multipart hard-copy receiving report stating the quantity and condition of
the inventories. One copy of the receiving report accompanies the physical inventories to
the storeroom. Another copy is sent to the purchasing department, where the purchasing
clerk reconciles it with the open PO and closes the digital record in the open PO file. The
purchasing clerk then files the hard-copy receiving report along with the previously filed
purchase requisition and the PO.
The third copy of the receiving report is sent to inventory control where (assuming a
standard cost system) the clerk uses the department PC to update the digital inventory
subsidiary ledger. The system automatically removes the “on-order” flag that was set
when the purchase requisition was created. The inventory control clerk then files the
hard-copy receiving report in the department, along with the PO and the purchase
requisition.
The fourth copy of the receiving report is sent to the AP department, where it is filed in
the AP pending file. Finally, the receiving clerk files the blind copy PO and the packing
slip in the receiving department.
AP Department
When the supplier’s invoice arrives, the AP clerk reconciles the invoice, purchase order,
and receiving report (three-way match) and prepares an AP packet, which in this paper-
oriented system is simply a folder containing the reconciled supporting documents. The
clerk next records the transaction in the digital purchases journal, and posts the liability
to the supplier’s account in the AP subsidiary ledger. The clerk then files the AP packet in
the open AP file.
The check, along with the supporting documents, goes to the cash disbursements
department manager, or treasurer, for his or her signature. The negotiable portion of the
check is mailed to the supplier. The clerk returns the AP packet and check copy to the AP
department and files one copy of the check. Finally, the clerk summarizes the entries
made to the check register and sends a journal voucher to the general ledger department.
AP Department
Upon receipt of the AP packet, the AP clerk removes the liability by debiting the vendor’s
digital AP subsidiary record. Next, the AP packet is filed in the closed AP file. Finally, the
clerk sends an AP summary to the general ledger department.
1. The system reads the purchases requisition file for items that need to be
replenished. The requisitions are then sorted by the vendor and matched against
the valid vendor file for vendor address and contact information.
2. Hard-copy purchase orders are prepared and sent to the vendor.
3. A record is added to the open PO file.
4. A digital transaction listing of POs is created, which is downloaded by the
purchasing agent, reviewed, and filed in the department.
Receiving Department
When the goods arrive, the receiving clerk accesses a blind copy of the open PO file in
real time by entering the PO number taken from the packing slip. The receiving screen,
illustrated in Figure 5-15, then prompts the clerk to enter the quantities received for each
item on the PO. The following tasks are performed automatically by the system:
Figure 5-15Receiving Screen
Figure 5-16File Structure for AP Supporting Documents
1. Using the PO number as a common attribute, the system links the vendor invoice
to the associated purchase order and receiving report records (see Figure 5-16).
2. The system reconciles the supporting documents and creates a virtual AP packet
to authorize payment.
3. The system displays the virtual AP packet on the AP clerk’s computer screen for
review. Figure 5-17 presents an example of an AP packet screen display. The
virtual AP packet allows the AP clerk to browse the supporting documents and
modify documents if necessary to reconcile quantity or price discrepancies that
may exist.
4. Assuming no discrepancies that demand the AP clerk’s intervention, the system
automatically approves payment and sets a payment due date.
Figure 5-17Virtual AP Packet
1. Checks are automatically printed, signed, and distributed to the mail room for
mailing to vendors. Checks above a preset materiality threshold will receive
additional signatures (not shown) prior to being mailed.
2. The payments are automatically recorded in the check register file.
3. Vendor invoices are closed by placing the check number in the closed flag field
(see Figure 5-18).
4. The general ledger AP control and cash accounts are updated.
5. Reports detailing these transactions are transmitted via a terminal to the AP and
cash disbursements departments for management review and filing.
Table 5-1
Summary of Expenditure Cycle Risks and Controls
Risk Physical Control IT Control
Inaccurate record keeping Transaction authorization—AP department authorizes Input data edits
cash disbursements to make payment
Error Messages
Accounting records—audit trail documents, journals,
accounts, and files Automated posting to accounts
Physical Controls
Transaction Authorization
The objective of transaction authorization is to ensure that only valid transactions are
processed. When inventory levels drop to their predetermined reorder points, inventory
control formally authorizes replenishment with a purchase requisition to trigger the
purchasing function. Formalizing the authorization process promotes efficient inventory
management and ensures the legitimacy of purchase transactions with valid vendors.
IT Controls
Automated Purchase Approval
The objective of automated purchase approval is to prevent unauthorized purchases
from unapproved vendors. Therefore, computer logic, not a human being, decides when
to purchase, what to purchase, and from which vendor. The key attributes needed to
execute this logic come from the purchase requisition file and the valid vendor file.
Proper functioning of this control depends on adequate procedures for identifying
vendors and placing them on the valid vendor list. If access to the valid vendor file is not
specifically controlled via password and/or encryption (discussed in Chapter 12), an
unapproved vendor could be added to the file, and the control would be circumvented.
To allow for operational flexibility in unusual circumstances, however, the system should
provide a management override option to purchase from unapproved vendors, which
may be performed only by a supervisor. Any such overrides should be fully documented
in management reports.
Physical Controls
Independent Verification
When goods arrive from the supplier, receiving clerks verify that the items are correct in
type and quantity and inspect them for condition (damage, spoilage, etc.). To perform
this verification, the clerk obtains a “blind copy” of the original PO from purchasing. A
blind PO has all the relevant information about the goods being received except for the
quantities and prices. To obtain quantity information, which is needed for the receiving
report, the receiving personnel are forced to physically count and inspect the goods.
Supervision
Supervision is critical at this point to ensure that the clerks properly carry out these
important duties. Packing slips, which contain quantity information and could be used to
circumvent the inspection process, typically accompany the incoming goods. A
supervisor should take custody of the packing slip while receiving clerks count and
inspect the goods. If receiving clerks are provided with quantity information via an open
PO or packing slip, they may be tempted to transfer this information to the receiving
report without performing a physical count and inspection.
IT Controls
Scanner Technology
The basic concept of inspection can be enhanced through the use of IT controls. Product
code scanners in the receiving department and warehouse will reduce the risk of human
error in receiving and storing incorrect products. When scanned by the receiving clerk
and the warehouse, the system will verify that the items received match those on the
purchase order.
Accounting Records
The control objective of accounting records is to maintain an audit trail adequate for
tracing a transaction from its source document to the financial statements. The
expenditure cycle employs the following accounting records: AP subsidiary ledger, check
register, and general ledger. The auditor’s concern in the expenditure cycle is
that obligations may be materially understated on financial statements because of
unrecorded transactions. This is a normal occurrence at year-end closing simply because
some supplier invoices do not arrive in time to record the liabilities. This also happens,
however, in an attempt to intentionally underreport liabilities. Hence, in addition to the
routine accounting records, expenditure cycle systems must be designed to provide
supporting information, such as the purchase requisition file, the PO file, and the
receiving report file. By reviewing these peripheral files, auditors may obtain evidence of
inventory purchases that have not been recorded as liabilities.
Independent Verification
The general ledger function provides an important independent verification in the
system. It receives journal vouchers and summary reports from inventory control,
accounts payable, and cash disbursements. From these sources, the general ledger
function verifies that the total obligations recorded equal the total inventories received
and that the total reductions in accounts payable equal the total disbursements of cash.
Many transaction errors that might occur in the source subsystems will be flagged by
discrepancies in the summary numbers that they submit.
IT Controls
Input Data Edits
Recall that a basic assumption in transaction processing system design is that master
files, such as the inventory, the accounts payable, and the general ledger, are “clean” and
error-free. Transaction data, in contrast, are assumed to be “dirty” and contain various
errors such as transposed digits in account numbers, invalid inventory part numbers, and
clerical errors. If not detected before being processed, these errors will corrupt the
master files of the system.
Input controls are edits that focus on the integrity of transaction data being entered into
the application. The following edits are programed into the system to minimize the risk
from data input errors.
1. Controls, including checks for missing data, numeric-alphabetic data, and invalid
data values, will reduce the risk of undetected data entry errors by clerks in the
AP, inventory control, receiving, and cash disbursements departments.
2. Check digit control will provide control over accessing the wrong accounts. Long
vendor and inventory account numbers are susceptible to transcription and
transposition errors during data entry. A check digit control will reduce the risk of
such errors when department clerks enter account numbers into their systems.
Error Messages
When posting to the inventory and AP subsidiary ledgers, the computer program logic
must correctly identify the inventory and vendor records being updated by matching the
inventory item numbers and the vendor account numbers in the receiving report and
supplier’s invoice to those in the inventory and AP subsidiary files, respectively. Any
mismatch conditions should produce an error message to the computer operator.
These automation benefits depend upon the proper functioning of the computer
applications that perform accounting tasks. An undetected program error may affect
thousands or even millions of transactions with devastating consequences to the
financial statements. An organization’s systems development and program change
process is therefore critical to ensuring that computer applications do what they are
intended to do when they are placed into service and are protected from accidental,
malicious, or fraudulent modifications over their service lifetime. In assessing application
integrity, auditors seek answers to such questions as: Is the logic of the computer
program correct? Has anyone tampered with the application since it was last tested?
Have changes been made to the program that could have caused an undisclosed error?
The general controls and audit tests that provide answers to these questions are
discussed at length in Chapter 16.
File Backup
The physical loss, destruction, or corruption of digital accounting records are serious
concerns that were discussed in Chapter 3. File backup procedures need to be in place as
part of the daily processing of transaction data. The accountant should verify that such
procedures are performed for all subsidiary and general ledger files.
Physical Controls
Supervision
Receiving departments are sometimes hectic and cluttered during busy periods. In this
environment, incoming inventories are exposed to theft until they are secured in the
warehouse. Inadequate supervision can create an environment conducive to the theft of
inventories in transit.
Independent Verification
The AP function plays a vital role in the verification of the work others in this system
have done. Copies of key source documents flow into this department for review and
comparison. Each document contains unique facts about the purchase transaction, which
the AP clerk must reconcile before the firm recognizes an obligation. This control is called
a three-way match and involves the following three documents:
1. The PO, which shows that the purchasing agent ordered only the needed
inventories from a valid vendor.
2. The receiving report, which is evidence of the physical receipt of the goods, their
condition, and the quantities received. The reconciliation of this document with
the PO signifies that the organization has a legitimate obligation to pay.
3. The supplier’s invoice, which provides the financial information needed to record
the obligation as an account payable. The AP clerk verifies that the prices on the
invoice are reasonable compared with the expected prices on the PO.
Segregation of Duties—Inventory Control from Inventory Warehouse
This point was made in Chapter 4. Inventory control keeps the detailed records of the
asset, while the warehouse (stores) has asset custody. These tasks should be kept
separate. At any point, an auditor should be able to reconcile inventory records to the
physical inventory.
IT Controls
Automated Three-Way Match and Payment Approval
An automated three-way match replicates the manual counterpart as follows: When the
AP clerk receives the supplier’s invoice, the clerk accesses the system and adds a record
to the vendor invoice file. This act prompts the system to automatically create a virtual
AP packet by linking the vendor invoice to the associated purchase order and receiving
report records, using the PO number as a common attribute. The application then
reconciles the supporting documents, using programmed criteria for assessing
discrepancies. For example, the system may be programmed to approve payment of any
invoice amount that does not exceed $100 and 1 percent of the estimated price on the
purchase order. Items that fall within limits are automatically approved and paid on their
due date. Discrepancies in excess of the threshold are submitted to management for
review and manual approval. Through the virtual AP packet screen, management may
view the supporting documents and exercise an override of the system controls to force
payment. The override should be performed only by authorized management and should
be fully documented in management reports.
Multilevel Security
This is a programmed technique that allows multiple individuals to simultaneously
access a system, but provides segregation of duties to limit their access privileges and
activities. This technique is discussed further in the next section.
Segregation of Duties
An objective of segregation of duties provided in Chapter 3 states that:
The organization should be so structured that the perpetration of a fraud requires collusion between two or
more individuals.
To achieve this objective, certain record-keeping tasks should be separated. Specifically,
subsidiary ledgers (accounts payable and inventory), journals (purchases and cash
disbursements), and the general ledger should be separately maintained. An individual
with total record-keeping responsibility, in collusion with someone with asset custody, is
in a position to perpetrate a fraud. Although not entirely eliminated, the risk of collusion
is reduced while segregating these tasks. The more people involved in a task, the more
difficult it is to collude and greater the risk of detection. This will have a deterrent effect
on those contemplating fraud.
IT Controls
Password Control
In Chapter 4, we discussed how digital accounting records are vulnerable to
unauthorized access. To mitigate these risks, organization management should
implement a robust password control policy to prevent unauthorized access to computer
files and programs that reside in each of the departments. The application logic should
require, and prompt, users to change passwords periodically. Corporate policy should
require strong passwords of six or eight characters that consist of both alphabetic and
numeric characters. We examine password control issues in detail in Chapter 15.
Multilevel Security
Chapter 4 introduced the concept of multilevel security, which employs programmed
techniques that permit simultaneous access to a central system by many users with
different access privileges, but prevents them from obtaining information for which they
lack authorization. Two methods for achieving multilevel security are the access control
list (ACL) and role-based access control (RBAC). Through these techniques, purchasing,
receiving, AP, cash disbursements, and general ledger personnel are limited in their
access based on the privileges assigned to them. ACL and RBAC are discussed in greater
detail in later chapters.
5-2fReengineering Using EDI
We saw in Chapter 4 that EDI technology was devised to expedite routine transaction
processing between manufacturers, wholesalers, and retailers by connecting buyer and
seller computers via a private network or the Internet. When the buyer’s computer
system detects the need to order inventory, it automatically transmits a purchase order
to the seller, which is approved and processed by the vendor system with little or no
human involvement.
The Ford Motor Company employed more than 500 clerks in its North American AP
department. Analysis of the function showed that a large part of the clerks’ time was
devoted to reconciling discrepancies among supplier invoices, receiving reports, and POs.
These discrepancies were the result of too many vendors and unreliable vendors. The
first step in solving the problem was to change the business environment; therefore, Ford
initiated trading partner agreements with a reduced number of suppliers. The parties
agreed in advance to terms of trade such as price, quality, quantities to be shipped,
discounts, and lead times. Also, each item used by Ford would be supplied by a single
vendor. With key sources of discrepancy eliminated, Ford reengineered its work flow to
take advantage of the new environment. The key features of the system are as follows:
1. As inventory needs are detected, the system automatically sends a digital EDI
purchase order to the vendor.
2. When the goods arrive, receiving personnel perform only cursory inspection since
quality and quantity are guaranteed by the trading partner agreement.
3. Because the financial information about purchases is known in advance from the
trading partner agreement, the vendor’s invoice provides no critical information
that cannot be derived from the receiving report. By eliminating this source of
potential discrepancy, Ford was able to eliminate the three-way match for the
majority of purchase transactions.
4. Payment is made automatically by EFT directly to the vendor’s bank account.
As a result of its reengineering effort, Ford was able to simplify its work flow and reduce
its AP staff from 500 to 125.
Some organizations have taken reengineering even further by eliminating the receiving
function entirely. The objective of this is to send goods directly to the production
department and thus bypass the receiving area and avoid production delays and the
associated handling costs. An accounting and auditing problem that must be overcome is
how to account for inventory receipts when there is no receiving function and no
receiving report. One way of dealing with this is to calculate the number of parts received
based on the products produced in which the parts are components. Supplier payments
are distributed based on production (part usage), and by having only one supplier per
part, the question of which supplier to pay is self-evident. An additional problem to deal
with is accounting for scrap in the production process. Since scrap does not end up in
finished production, it will not be counted, and vendors will not be paid for materials that
were scrapped. Separate accounting procedures need to be implemented to record and
monitor scrap. This issue is examined in Chapter 7.
5-3aSummary
This chapter is organized into two primary sections. The first examined conceptually the
expenditure cycle of a typical merchandising firm and focused on (1) the functional areas
and the flow of transaction information that triggers key tasks and (2) the documents,
journals, and accounts that support audit trails, decision making, and financial reporting.
The second section examined physical expenditure cycle systems that lie at different
points on the technology/human continuum. The objectives of this section were to (1)
illustrate system functionality, efficiency issues, and work flow characteristics of
different technologies and (2) demonstrate how internal control issues differ between
systems at various points on the technology/human continuum. The section reviewed
physical controls and computer controls associated with basic technology systems and
advanced integrated systems. The chapter concluded by outlining the benefits, key
features, and risks associated with EDI systems. EDI systems are discussed in detail in
later chapters.
Chapter Review
5-3bKey Terms
actual cost inventory ledger
AP packet
AP pending file
AP subsidiary ledger
blind copy
cash disbursement vouchers
cash disbursements journal
check register
closed AP file
open AP file
open purchase order file
open purchase requisition file
open/closed purchase order file
purchase order
purchase requisition
purchase requisition file
receiving report
receiving report file
standard cost system
supplier’s invoice
valid vendor file
vendor’s invoice
voucher register
vouchers payable file
vouchers payable system
Chapter Review
5-3cReview Questions
1. Differentiate between a purchase requisition and a purchase order.
2. What purpose does a purchasing department serve?
3. Distinguish between an AP file and a vouchers payable file.
4. What are the three logical steps of the cash disbursements system?
5. What general ledger journal entries does the purchases system trigger? From which departments
do these journal entries arise?
6. What two types of risks can close supervision of the receiving department reduce?
7. What is a three-way match?
8. What steps of independent verification does the general ledger department perform?
9. What is (are) the purpose(s) of maintaining a valid vendor file?
10. Some organizations do not use an AP subsidiary ledger or a purchases journal. How is this
possible?
11. What is the purpose of the blind copy of a PO?
12. Give one advantage of using a vouchers payable system.