Professional Documents
Culture Documents
TRUE/FALSE
1. Processing more transactions at a lower unit cost makes batch processing more efficient than real-time
systems.
ANS: T PTS: 1
ANS: F PTS: 1
3. Directing work-in-process through its various stages of manufacturing is part of the conversion cycle.
ANS: T PTS: 1
4. The portion of the monthly bill from a credit card company is an example of a turn-around document.
ANS: T PTS: 1
5. The general journal is used to record recurring transactions that are similar in nature.
ANS: F PTS: 1
ANS: F PTS: 1
ANS: F PTS: 1
8. System flowcharts represent the input sources, programs, and output products of a computer system.
ANS: T PTS: 1
9. Program flowcharts are used to describe the logic represented in system flowcharts.
ANS: T PTS: 1
10. Batch processing systems can store data on direct access storage devices.
ANS: T PTS: 1
ANS: F PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
12. Auditors may prepare program flowcharts to verify the correctness of program logic.
ANS: T PTS: 1
13. A control account is a general ledger account which is supported by a subsidiary ledger.
ANS: T PTS: 1
14. Real time processing is used for routine transactions in large numbers.
ANS: F PTS: 1
15. An inverted triangle with the letter “N” represents a file in “name” order.
ANS: F PTS: 1
16. Real-time processing in systems that handle large volumes of transactions each day can create
operational inefficiencies.
ANS: T PTS: 1
17. Operational inefficiencies occur because accounts common to many concurrent transactions need to be
updated in real time.
ANS: T PTS: 1
18. The block code is the coding scheme most appropriate for a chart of accounts.
ANS: T PTS: 1
19. Sequential codes may be used to represent complex items or events involving two or more pieces of
related data.
ANS: F PTS: 1
20. For a given field size, a system that uses alphabetic codes can represent far more situations than a
system with that uses numeric codes.
ANS: T PTS: 1
21. Mnemonic codes are appropriate for items in either an ascending or descending sequence, such as the
numbering of checks or source documents.
ANS: F PTS: 1
22. The most common means of making entries in the general ledger is via the journal voucher.
ANS: T PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
23. Individuals with access authority to general ledger accounts should not prepare journal vouchers.
ANS: T PTS: 1
24. Each account in the chart of accounts has a separate record in the general ledger master file.
ANS: T PTS: 1
MULTIPLE CHOICE
2. Which system produces information used for inventory valuation, budgeting, cost control,
performance reporting, and make-buy decisions?
a. sales order processing
b. purchases/accounts payable
c. cash disbursements
d. cost accounting
ANS: D PTS: 1
8. System flowcharts
a. depict logical tasks that are being performed, but not who is performing them
b. illustrate the relationship between database entities in systems.
c. represent relationships between key elements of both manual and computer systems.
d. describe the internal logic of computer applications in systems. .
ANS: C PTS: 1
10. Both the revenue and the expenditure cycle can be viewed as having two key parts. These are
a. manual and computerized
b. physical and financial
c. input and output
d. batch and real-time
ANS: B PTS: 1
11. All of the following can provide evidence of an economic event except
a. source document
b. turn-around document
c. master document
d. product document
ANS: C PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
12. Which method of processing does not use the destructive update approach?
a. batch processing using direct access files
b. real-time processing
c. batch processing using sequential files
d. all of the above use the destructive update approach
ANS: C PTS: 1
b.
c.
d.
ANS: D PTS: 1
b.
c.
d.
ANS: A PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
b.
c.
d.
ANS: B PTS: 1
b.
c.
d.
ANS: A PTS: 1
17. A file that stores data used as a standard when processing transactions is
a. a reference file
b. a master file
c. a transaction file
d. an archive file
ANS: A PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
24. When a firm wants its coding system to convey meaning without reference to any other document, it
would choose
a. an alphabetic code
b. a mnemonic code
c. a group code
d. a block code
ANS: B PTS: 1
ANS: C PTS: 1
27. What type of data is found in the general ledger master file?
a. a chronological record of all transactions
b. the balance of each account in the chart of accounts
c. budget records for each account in the chart of accounts
d. subsidiary details supporting a control account
ANS: B PTS: 1
28. Which report is not an output of the Financial Reporting System (FRS)?
a. variance analysis report
b. statement of cash flows
c. tax return
d. comparative balance sheet
ANS: A PTS: 1
29. Risk exposures in the General Ledger and Financial Reporting Systems include all of the following
except
a. loss of the audit trail
b. unauthorized access to the general ledger
c. loss of physical assets
d. general ledger account out of balance with the subsidiary account
ANS: C PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
30. Which situation indicates an internal control risk in the General Ledger/Financial Reporting Systems
(GL/FRS)?
a. the employee who maintains the cash journal computes depreciation expense
b. the cash receipts journal voucher is approved by the Treasurer
c. the cash receipts journal vouchers are prenumbered and stored in a locked safe
d. the employee who maintains the cash receipts journal records transactions in the accounts
receivable subsidiary ledger
ANS: D PTS: 1
31. With a limited work force and a desire to maintain strong internal control, which combination of duties
performed by a single individual presents the least risk exposure?
a. maintaining the inventory ledger and recording the inventory journal voucher in the
general ledger
b. recording the inventory journal voucher in the general ledger and maintaining custody of
inventory
c. maintaining the cash disbursements journal and recording direct labor costs applied to
specific jobs
d. preparing the accounts payable journal voucher and recording it in the general ledger
ANS: C PTS: 1
32. XBRL
a. is the basic protocol that permits communication between Internet sites.
b. controls Web browsers that access the Web.
c. is the document format used to produce Web pages.
d. was designed to provide the financial community with a standardized method for
preparing
e. is a low-level encryption scheme used to secure transmissions in higher-level (HTTP)
format.
ANS: D PTS: 1
SHORT ANSWER
ANS:
expenditure cycle, conversion cycle, revenue cycle
PTS: 1
2. Documents that are created at the beginning of the transaction are called
__________________________.
ANS:
source documents
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
ANS:
Batch processing and real-time processing
PTS: 1
ANS:
credit card, electricity, water, or telephone bill, etc.
PTS: 1
ANS:
Special journals are used to record large volumes of recurring transactions that are similar in nature.
PTS: 1
ANS:
sales order processing, cash receipts
PTS: 1
ANS:
purchasing, cash disbursements, payroll, fixed asset system
PTS: 1
ANS:
entity-relationship diagrams, data flow diagrams, system flowcharts, program flowcharts
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
ANS:
The audit trail is used to track transactions from the source document to the financial statements and
vice versa. Accountants use the audit trail to correct errors, answer queries, and perform audits.
PTS: 1
10. Only four symbols are used in data flow diagrams. What are they?
ANS:
process, data store, data flow, entity
PTS: 1
ANS:
Entity relationship diagram
PTS: 1
12. In one sentence, what does updating a master file record involve?
ANS:
Updating a master file record involves changing the value of one or more of its variable fields to
reflect the effects of a transaction.
PTS: 1
ANS:
Destructive update involves replacing an old data value with a new value and thus destroying the
original.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
ANS:
1. Capture the transaction on source documents.
2. Record in special journals.
3. Post to subsidiary ledger.
4. Post to general ledger (using journal vouchers).
5. Prepare the unadjusted trial balance.
6. Make adjusting entries.
7. Journalize and post adjusting entries.
8. Prepare adjusted trial balance.
9. Prepare financial statements.
10. Journalize and post closing entries.
11. Prepare the post-closing trial balance.
PTS: 1
15. List two duties that the general ledger clerk should not perform.
ANS:
make entries in special journals or subsidiary ledgers;
prepare journal vouchers; maintain custody of physical assets
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
16. Explain the purpose and contents of the general ledger master file.
ANS:
The general ledger master file is the main file on the general ledger database. It is based on the firm’s
chart of accounts. Each record is either a general ledger account (e.g., sales) or a control account (e.g.,
the accounts payable control) for one of the subsidiary ledgers. The general ledger master file contains
the following for each account: the account number, description, account class (e.g., asset), the normal
balance (debit or credit), beginning balance, total debits for period, total credits for period, and current
balance.
PTS: 1
ANS:
XML (eXtensible Markup Language) is a meta-language for describing markup languages. The term
extensible means that any markup language can be created using XML. This includes the creation of
markup languages capable of storing data in relational form, where tags (formatting commands) are
mapped to data values.
PTS: 1
18. Why do many firms no longer use a general journal? What has taken its place?
ANS:
Many firms have replaced a traditional general journal with a journal voucher system. Each entry is
documented on a prenumbered journal voucher which contains additional information, such as
authorization, which enhances control. A voucher may contain information on a number of related
transactions.
PTS: 1
19. What are the major exposures in the general ledger/financial reporting system?
ANS:
The primary exposures are: a defective or lost audit trail, unauthorized access, GL accounts out of
balance with subsidiary ledger accounts, and incorrect account balances due to unauthorized or
incorrect entries.
PTS: 1
ANS:
The audit trail is needed for several reasons: to provide the ability to answer inquiries from customers
and suppliers, to reconstruct files if lost, to provide historical data to auditors, to satisfy government
regulations, and for error control.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
ESSAY
1. Describe the key activities in the revenue, conversion, and expenditure cycles.
ANS:
Revenue cycle: Sales order processing involves preparation of sales orders, credit granting, shipment
and billing. Cash receipts collects cash and makes bank deposits.
Conversion cycle: Production system involves planning, scheduling, and control of the
manufacturing process. Cost accounting system monitors the flow of cost information related to
production.
Expenditure cycle: Purchases/accounts payable involves the acquisition of physical inventory. Cash
disbursements authorizes payment and disburses funds. Payroll monitors labor usage and disburses
paychecks to employees.
PTS: 1
2. Categorize each of the following activities into the expenditure, conversion or revenue cycles and
identify the applicable subsystem.
a. Preparing the weekly payroll for manufacturing personnel.
b. Releasing raw materials for use in the manufacturing cycle.
c. Recording the receipt of payment for goods sold.
d. Recording the order placed by a customer.
e. Ordering raw materials.
f. Determining the amount of raw materials to order.
ANS:
a. Expenditure cycle-payroll subsystem.
b. Conversion cycle-production system subsystem.
c. Revenue cycle-cash receipts subsystem.
d. Revenue cycle-sales order processing subsystem.
e. Expenditure cycle-purchases subsystem.
f. Conversion cycle-production subsystem.
PTS: 1
3. What does an entity-relationship diagram represent? Why do accountants need to understand them?
ANS:
Entity relationship diagrams represent the relationship between entities in a system. An entity is
either 1) a resource (such as cash or inventory), 2) an event (such as a sale or a receipt of cash), or 3)
an agent (such as a customer or vendor). ERDs represent the relationship between entities graphically.
ERDs are used in the design of databases.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
4. Time lag is one characteristic used to distinguish between batch and real-time systems. Explain. Give
an example of when each is a realistic choice.
ANS:
Batch processing collects similar transactions into groups (batches) and processes them all at once.
Hence, affected files are up to date immediately after the update, but can be expected to be out of date
until the next run. Hence, there is a time lag between the event and its recording in the system. A
payroll system is often handled with batch processing since it must be up to date at fixed time periods
and need not be modified between pay dates.
Real-time systems process each transaction as it occurs and files are always up to date–there is no
time lag. This is preferred when there may be a need to query the system for the status of transactions.
A sales order processing system would benefit from real-time processing. Hence, customer questions
could be answered easily, without waiting for the next update (as would be required if the system was
batch).
PTS: 1
5. The revenue cycle has two subsystems. What are they and what occurs within each?
ANS:
The two subsystems of the revenue cycle are sales order processing and cash receipts. In the sales
order processing subsystem, the sales order is processed, credit granted, goods are shipped, customer is
billed, and related files updated (sales, accounts receivable, inventory, etc.). In the cash receipts
subsystem, cash is collected and deposited in the bank and files updated (cash, accounts receivable,
etc.).
PTS: 1
6. Give a brief description of each of the following documentation techniques: systems flowchart, and
program flowchart.
ANS:
System flowcharts portray the relationships between source data, transaction files, computer
programs, master files, and output, including the form or type of media of each.
Program flowcharts represent the logic of a particular program. Each step is represented by a separate
symbol, each of which represents one or more lines of computer instructions. The order of the steps is
represented by the flow lines.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
ANS:
Cardinality reflects normal business rules as well as organizational policy. For instance, the 1:1
cardinality between the entities “Salesperson” and “Company Car” suggests that each salesperson in
the organization is assigned one company car. If instead the organization’s policy were to assign a
single automobile to one or more salespersons who share it, this policy would be reflected by a 1:M
relationship.
PTS: 1
ANS:
An entity relationship (ER) diagram is a documentation technique used to represent the relationship
between entities. One common use for ER diagrams is to model an organization’s database.
PTS: 1
ANS:
Entities are physical resources (automobiles, cash, or inventory), events (ordering inventory, receiving
cash, shipping goods) and agents (salesperson, customer, or vendor) about which the organization
wishes to capture data.
PTS: 1
10. Is a DFD an effective documentation technique for identifying who or what performs a particular task?
Explain.
ANS:
No. A DFD shows which tasks are being performed, but not who performs them. It depicts the logical
system.
PTS: 1
11. Is a flowchart an effective documentation technique for identifying who or what performs a particular
task? Explain.
ANS:
Yes. A flowchart depicts the physical system and illustrates who, what, and where a task is performed.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
ANS:
A single transaction may affect several different accounts. Some of these accounts, however, may not
need to be updated in real-time. In fact, the task of doing so takes time which, when multiplied by
hundreds or thousands of transactions, can cause significant processing delays. Batch processing of
non-critical accounts, however, improves operational efficiency by eliminating unnecessary activities
at critical points in the process.
PTS: 1
13. If an organization processes large numbers of transactions that use common data records, what type of
system would work best (all else being equal)?
ANS:
Large-scale systems that process high volumes of transactions, often use real-time data collection and
batch updating. Master file records that are unique to a transaction such as customer accounts and
individual inventory records can be updated in real time without causing operational delays. Common
accounts should be updated in batch mode. Real-time processing is better suited to systems that
process lower transaction volumes and those that do not share common records.
PTS: 1
ANS:
When testing an application program, the auditor needs details about its internal logic provided by the
program flowchart to design the audit tests.
PTS: 1
15. How are computer system flowcharts and program flowcharts related?
ANS:
The system flowchart shows the relationship between two computer programs, the files that they use,
and the outputs that they produce. However, this level of documentation does not provide the
operational details that are sometimes needed. An auditor wishing to assess the correctness a
program’s logic cannot do so from the system flowchart. A program flowchart provides this detail.
Every program represented in a system flowchart should have a supporting program flowchart that
describes its logic.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
ANS:
Legacy systems tend to have the following distinguishing features: they are mainframe based
applications; they tend to be batch oriented; early legacy systems use flat-files for data storage,
however, hierarchical and network databases are often associated with later era legacy systems. These
highly structured and inflexible storage systems promote a single-user environment that discourages
information integration within business organizations.
PTS: 1
ANS:
Record layout diagrams are used to reveal the internal structure of the records that constitute a file or
database table. The layout diagram usually shows the name, data type, and length of each attribute (or
field) in the record.
PTS: 1
ANS:
The destructive update approach leaves no backup copy of the original master file. Only the current
value is available to the user. To preserve adequate accounting records in case the current master be-
comes damaged or corrupted, separate backup procedures must be implemented.
Prior to each batch update or periodically (for example, every 15 minutes), the master file being updat-
ed is copied to create a backup version of the original file. Should the current master be destroyed after
the update process, reconstruction is possible in two stages. First, a special recovery program uses the
backup file to create a pre-update version of the master file. Second, the file update process is repeated
using the previous batch of transactions to restore the master to its current condition. Because of the
potential risk to accounting records, accountants are naturally concerned about the adequacy of all
backup procedures.
PTS: 1
19. What are the reasons companies use coding schemes in their accounting information systems?
ANS:
Companies use coding schemes in their AISs because codes concisely represent large amounts of
complex information that would otherwise be unmanageable. They also provide a means of
accountability over the completeness of the transactions processed and identify unique transactions
and accounts within a file. In addition, coding supports the audit function by providing an effective
audit trail.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
20. Compare and contrast the relative advantages and disadvantages of sequential, block, group, alphabetic
and mnemonic codes.
ANS:
Sequential codes are appropriate for items in either an ascending or descending sequence, such as the
numbering of checks or source documents. An advantage is that during batch processing, any gap
detected in the sequence is a signal that a transaction may be missing. A disadvantage is that the codes
carry little, if any, information other than the sequence order. Another disadvantage is that sequential
codes are difficult to manage when items need to be added; the sequence needs either to be reordered
or the items must be added to the end of the list.
Block codes provide some remedies to sequential codes by restricting each class to a pre-specified
range. The first digit typically represents a class, whereas the following digits are sequential items
which may be spaced in intervals in case of future additions. An example of block coding is a chart of
accounts. A disadvantage of block coding is that the information content does not provide much
meaning, i.e. an account number only means something if the chart of accounts is known.
Group codes may be used to represent complex items or events involving two or more pieces of
related data. The code is comprised of fields which possess specific meaning. The advantages of group
codes over sequential and block codes are 1) they facilitate the representation of large amounts of
diverse data, 2) they allow complex data structures to be represented in a hierarchical form that is
logical and thus more easily remembered by humans, and 3) they permit detailed analysis and
reporting both within an item class and across different classes of items. A disadvantage is that the
codes may be overused to link classes which do not need to be linked, and thus creating a more
complex coding system that is necessary.
Alphabetic codes may be used sequentially or in block or group codes. An advantage is that a system
which uses alphabetic codes can represent far more situations than a system with numeric codes given
a specific field size. Some disadvantages are that sequentially assigned codes mostly have little
meaning. Also, humans typically find alphabetic codes more difficult to sort than numeric data.
Lastly, mnemonic codes are alphabetic characters in the form of acronyms, abbreviations or other
combinations that convey meaning. The meaning aspect is its advantage. A disadvantage of mnemonic
codes is that they are limited in their ability to represents items within a class i.e. names of all of
American Express's customers.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
IT Auditing 4th Ed. —Test Bank, Chapter 6
21. List and explain the six basic files in the general ledger database.
ANS:
The general ledger master file is the main file on the general ledger database. It is based on the firm’s
chart of accounts. Each record is either a separate general ledger account (e.g., sales) or a control
account (e.g., the accounts payable control) for one of the subsidiary ledgers.
The general ledger history file contains the same information for prior periods.
The journal voucher file contains all of the journal vouchers processed in the current period.
The journal voucher history file contains journal vouchers for past periods.
The responsibility center file contains the revenues, expenses, and other data for individual
responsibility centers.
The budget master file contains budgeted amounts for responsibility centers.
PTS: 1
22. Discuss the primary advantage of XBRL over traditional HTML as a means of on-line reporting of
financial information to users.
Online reporting of financial data has become a competitive necessity for publicly traded
organizations. Currently, most organizations accomplish this by placing their financial statements and
other financial reports on their respective Web sites as HTML (Hyper Text Markup Language)
documents. These documents can then be downloaded by users such as the SEC, financial analysts,
and other interested parties. The HTML reports, however, cannot be conveniently processed through
IT automation. Performing any analysis on the data contained in the reports requires them to be
manually entered into the user’s information system. The solution to this problem is eXtensible
Business Reporting Language (XBRL), which is the Internet standard specifically designed for
business reporting and information exchange. The objective of XBRL is to facilitate the publication,
exchange, and processing of financial and business information. XBRL documents can thus be
downloaded, interpreted, and analyzed using computer software with no additional manual data input
necessary.
PTS: 1
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Another random document with
no related content on Scribd:
"O sir, you wouldn't be so wicked, surely!" Dick broke in, in
accents of alarm. "We should starve outright, I believe,
without mother's Wednesday and Saturday earnings at the
Manor House. And the children ain't half fed as it is!" He
wound up with another flood of tears.
"Then hold your tongue, now that you know what your
silence is worth," replied Stephen. "I'm sure you needn't
make such a cry-baby of yourself. I haven't hurt you, and
I've given you a jolly little box."
"But the box isn't any use to me," Dick argued. "Please—
please give me back my shilling, Master Stephen. 'Tis
dreadful to be hungry; and mother started off to work this
morning without a bit of anything inside her lips, because
she knew if she ate breakfast there wouldn't have been
enough for the little ones."
"O Dick!" the little girl exclaimed, "What a long time you've
been! And how red the wind has made your poor eyes look
—just as if you had been crying!"
CHAPTER IV.
TEN SHILLINGS REWARD.
"Indeed I do!" sighed Mrs. Wilkins, and a hot tear fell upon
her work; she was knitting to-night by the uncertain light of
the fire. "Life's a struggle at the best of-times for poor
people," she went on; "and when the father of a family is
taken, it's bound to go hard with those he leaves behind."
"I don't need the use of my eyes to knit, dear," was the
widow's return. "If I was sewing, 'twould be different."
"Then you really think we shall have to part with him?" cried
Dick. "Oh! God must be very cruel if He lets it come to that.
I know our Stranger wouldn't ever love other folks as he
loves you and me and the children. And if we sold him or
gave him away, his new owner might kick him about as—as
some people do their dogs."
"Well, there's all next month for us to look around and try
to serape the money together, dear," the widow summoned
heart enough to remind her little boy. "As long as it's paid
by the last day of January it will be in time; and if 'tis right
for us to keep our dog, why then we shall find ways and
means for doing so. Don't fret, child, more than you can
help. Whatever happens will be sure to be for the best.
Now, dry your eyes, and we'll have our supper cosy like in
front of the fire. If you lose heart, Dick, what'll become of
us all?"
But though the old year died and the new one took its
place, no sign of better fortune could Mrs. Wilkins or Dick
see. Stranger must be disposed of—that seemed certain
beyond a doubt; and if no one could be induced to offer him
a home, why then he would have to be killed. It would be
terrible indeed to part with so faithful a friend.
"Dick, Dick, my little boy, what's the matter with you? Are
you ill?" demanded Mrs. Wilkins; for the small face at her
side had grown suddenly as pale as death, and the child
had clutched convulsively at her arm.
"What's true, Dick? I don't know what 'tis you're talking of."
"I didn't tell you because I didn't find it, and I could not
bring myself to worry you by saying how it got into my
hands," was the child's admission. Then, as they walked on
side by side in the direction of Leigh Grange, Dick narrated
the story of his meeting in the woods with Stephen Filmer,
adding, "And I thought God was so cruel to let that great
bully rob me of the shilling when I wanted it so badly. I little
dreamed that things would turn out as they have."
And now that the silver lining had appeared to his cloud,
Dick laughed merrily at the thought of how vexed the
squire's son would be when he discovered what he had lost
by not being able to restore the box.
CHAPTER V.
DICK'S INTERVIEW WITH THE COLONEL.
"Please, sir, I've brought back the match-box that you lost
some weeks ago," said Dick Wilkins, his heart beating so
loud that he fancied his questioner must hear it.
"O sir! O sir! Please to believe me when I tell you all about
it," sobbed poor Dick, "'cos Master Stephen's treated me
shameful, he has! He's the biggest bully in the place, and
he stole a shilling from me when he found me alone in the
woods."
"I shall pay the tax for our Stranger, sir. We should have
had to get rid of him if—if it hadn't been for this."
"So he's stayed with you ever since! I believe I have seen
him in the village on several occasions—a handsome
creature he seemed too."
"Wait, Stephen," said he; "I wish to speak to you about the
lost match-box that you assured me you would bring back
to-morrow. This lad has already brought it to me. What light
can you throw upon the matter?"
"I found the match-box," answered the boy sulkily. "I only
lent it to Dick Wilkins, and I suppose he's been dishonest
enough to claim the reward."
"Oh!" cried Dick, in shocked accents. "Oh! how can you say
so, Master Stephen?"
And the squire's son passed out of sight, for once in his life
really frightened and abashed.
"O sir!" gasped Dick, when he had gone, "I'm 'fraid he'll do
some mischief even now if he can. Supposing he should get
my mother out of her work at the Manor House! We should
starve! And—and our landlord's a hard man, he is!"
"Have you seen him, sir?" asked little Dick, scarcely able to
suppress his anxiety.
CHAPTER VI.
HARD TIMES.
How proud Dick felt next day when he walked into the
grocery establishment that was also the post-office, laid his
half-sovereign on the counter, and said he had come to pay
his dog-tax. Stranger was with him, and in such high spirits
that he found it hard to believe the dog did not understand
the nature of their errand.
"So you're not going to get rid of the retriever after all,
then," remarked the post-mistress, after filling in and
handing Dick the receipt for his money.
"No," said the little boy; and then he pointed at the notice
that had not yet been removed from the window, and
added, "That's how I got my half-sovereign, Mrs.
Mortimore. The colonel gave it to me for bringing his match-
box back to him last evening."
"Thank you very much for the tea," said Dick gratefully.
"Mother'll be glad of it, I'm sure." And with this he turned
towards the entrance of the shop, and would have gone his
way had not the talkative post-mistress called him back to
the counter again.
"If you take my advice, Dick Wilkins," she went on, "you'll
get that mother of yours to go and see the doctor. She's a
failing woman—you mark my words. Get Dr. Rogers to give
your mother something—there's a good boy!—or, in my
belief, you won't have a mother to care for you much
longer."
"Do you feel bad this evening?" asked the boy in anxious
tones. "I mean—does your side ache worse than usual?"
"No, dear, not worse than usual. Why, Dick, folks would
think I was a grand body, if they knew how careful you were
of me."
"I want you to see the doctor, mother. You do look ill and
bad!" declared Dick gravely.
"That's nonsense! It's the cold that nips me up," was the
prompt return. "'Tis freezing hard to-night again. I shouldn't
be surprised if the ice on the lake bears soon. Then you and
the children'll be able to go and watch the skating between
whiles. Lord Bentford is certain to throw his grounds open
to the public as usual. O—oh!"
"What made you cry out like that? Why, you've got your
hand tied up! What's amiss with it?"
"There's a sore place on one of the fingers; and when I
knocked it against the table, it made me cry out. 'Twill be
easier in a minute;" and Mrs. Wilkins turned her face aside
that Dick might not see it was drawn with pain.
"How long has your finger been bad?" the little boy
demanded.
"And you've been working with it sore all day!" cried Dick,
in much concern. "Hasn't it pained you, mother?"
Then all at once a bright idea flashed into Dick's mind. To-
morrow would be Saturday, and school holiday. He would
put a gimlet in his pocket, go to Lord Bentford's lake, which
by now was bearing, and try to earn a few coppers by
putting on the gentlefolks' skates. He would not breathe
one word of his intention to any one; no, not even to his
mother. So he went supperless to bed that night, full of
hope for the success of his new venture on the morrow.
CHAPTER VII.
A GALLANT RESCUE.
Not till this minute had it dawned on him that his dog had
followed. Had he loitered on his way, or even glanced once
behind, he must certainly have seen Stranger stealthily
tracking him. But he had done neither; and now as he
stared in vexation at the animal, his commonsense told him
that he must take him home before Lord Bentford or his
gamekeepers had a chance of seeing him.
Dick trembled at the threat, and set off after his wayward
property. But the ice was slippery, and he fell once or twice
and hurt himself badly. He had just picked himself up, when
a piercing shriek rang through the air, and was followed by
a woman's scream of alarm and a man's loud shout for
help.
"A rope, a rope!" some one was calling. "Bring a rope this
minute. There's a child in the water, near the boathouse,
where the ice has been broken for the swans. Quickly,
quickly, or we shall be too late!"
CHAPTER VIII.
STRANGER'S MISSION FULFILLED.