Question 1:​​​​​​​​ (6 Marks) Khan Corporation is a midsize, privately

Question 1:​​​​​​​​    (6 Marks)

Khan Corporation is a midsize, privately owned, industrial instrument manufacturer supplying precision equipment to manufacturers in the Midwest. The corporation is 10 years old and uses an integrated ERP system. The administrative offices are located in a downtown building and the production, shipping, and receiving departments are housed in a renovated warehouse a few blocks away. Customers place orders on the company’s website, by fax, or by telephone. All sales are on credit, FOB destination. During the past year sales have increased dramatically, but 15% of credit sales have had to written off as uncollectible, including several large online orders to first-time customers who denied ordering or receiving the merchandise. Customer orders are picked and sent to the warehouse, where they are placed near the loading dock in alphabetical sequence by customer name. The loading dock is used both for outgoing shipments to customers and to receive incoming deliveries. There are ten to twenty incoming deliveries every day, from a variety of sources.

The increased volume of sales has resulted in a number of errors in which customers were sent the wrong items. There have also been some delays in shipping because items that supposedly were in stock could not be found in the warehouse. Although a perpetual inventory is maintained, there has not been a physical count of inventory for two years. When an item is missing, the warehouse staff writes the information down in log book. Once a week, the warehouse staff uses the log book to update the inventory records. The system is configured to prepare the sales invoice only after shipping employees enter the actual quantities sent to a customer, thereby ensuring that customers are billed only for items actually sent and not for anything on back order. 

Questions:

A. Identify at least three weaknesses in Khan Corporation’s revenue cycle activities.  [2 points]

B. Describe the problem resulting from each weakness. [2point]

C. Recommend control procedures that should be added to the system to correct the weakness.  [2 point]

Question 2:​​​​​​    (2Marks)

One of the threats associated with having employees telecommute is that they may use company-provided resources (e.g., laptop, printer, etc.) for a side business. What are some other threats?

Question 3:​​​​​​    (2Marks)

Identify and discuss two methods of production planning?

2

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Service Encounter Journal and Paper

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Again turn to our VM and use the built-in Linux

Again turn to our VM and use the built-in Linux firewall and the tool netcat to learn some firewall basics. iptables is a common Linux firewall that can be found in a variety of unexpected locations. It is extremely powerful with a lot of capabilities but we are going to

For this assignment you need to review a video lecture

  For this assignment you need  to review a video lecture (please print the slides from the FX rate presentation Download presentation to follow along) that explains how to do currency conversions.  Once you finish looking over at the presentation, then do the practice exercises Download practice exercises and look

Assignment: Developing a Program Evaluation To ensure the success of

Assignment: Developing a Program Evaluation To ensure the success of a program evaluation, a social worker must generate a specific detailed plan. That plan should describe the goal of the evaluation, the information needed, and the methods and analysis to be used. In addition, the plan should identify and address

Instructions: You are required to write an 8-page research paper

Instructions: You are required to write an 8-page research paper on the topic “Information Technology Security Auditing”. Attached is the paper outline for you to follow when preparing the paper. Submission Instructions: Be sure your paper meets the following requirements: You will be required to write one research paper this

Is it realistic to expect that the interests of various

  Is it realistic to expect that the interests of various affected parties will not impact on accounting regulation processes? Is it appropriate to have one globally standardised set of accounting standards? How particular accounting based agreements with parties such as debtholders and managers can provide incentives for managers to

Why is it that some organizations do not place enough

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

GENERAL INSTRUCTIONS FOR DISCUSSIONS: Your contributions should be thoughtful and

  GENERAL INSTRUCTIONS FOR DISCUSSIONS:   Your contributions should be thoughtful and developed.  Answer all parts of the question and use concepts from the course materials.  Use a professional style of communication, with attention to grammar, spelling, and typos; cite your sources.    Choose ONE of the following options for a play and

Judaism – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Hi, I need help with my Data Analytics assessment. Need

Hi, I need help with my Data Analytics assessment. Need to create 14 PowerPoint slides to describe and explain what has been asked in the assessment manual. I need the assessment by 11th April, Monday – 2 pm AEST. It needs to be 100% authentic, can’t be plagiarized. Referencing must

Sometimes you can be holding inventory, and it is not

Sometimes you can be holding inventory, and it is not yours. Other times you can have inventory with a customer that is still yours. For example, consigned inventory is inventory being held by retailers but owned by the manufacturer.  Knowing when ownership inventory passes from you to your customers or

There is a plethora of research which shows there is

There is a plethora of research which shows there is a lack of education and knowledge pertaining to nurses in the intensive care unit being prepared to care for patients during their end of life. Prepare an outline of you Doctorate of Nursing Practice (DNP) project pertaining to this topic. 

 PERSONAL PHILOSOPHY OF NURSING REFLECTION PAPER  Very important for

 PERSONAL PHILOSOPHY OF NURSING REFLECTION PAPER  Very important for me******* 15% of final grade******* The purpose of this paper is to define, describe and explain your personal beliefs about the four concepts of the nursing metaparadigm and their inter-relationship to one another as they guide your current nursing practice. There

Assignment Content After reading the Chapter 5, view the three

 Assignment Content After reading the Chapter 5, view the three videos (video 1, video 2, video 3). Writ a response to the following questions, in essy format. 1. What was the common practice with each scenario?2. Was best practices adhered to in each case? If no, what could have been done differently? If yes, what were the strong

Your assignment this week chapters 6 and 7. Chapter 6.

Your assignment this week chapters 6 and 7. Chapter 6.  Using Figures 6.1-6.11 find examples online that represent each of the lighting arrangements pictured. Be sure to look at each figure and READ the description applied to the arrangement. Chapter 7. Using Figures 7.12 – 7.17 find examples of a

Part one. An example of how this part can be

Part one. An example of how this part can be done is attached as a file. This week, you’ll do some ethnographic field research by observing and taking notes.  Spend one day documenting your media consumption, from the time you get up to the time you go to sleep.   Keep