Preview

Kieso15e Testbank Ch23

Powerful Essays
Open Document
Open Document
15086 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kieso15e Testbank Ch23
CHAPTER 23

STATEMENT OF CASH FLOWS

IFRS questions are available at the end of this chapter.

TRUE-FALSe—Conceptual
Answer No. Description F 1. Primary purpose of the statement of cash flows. T 2. Information provided by statement of cash flows. T 3. Classification of operating activities. F 4. First step in cash flow statement preparation. T 5. Reconciling beginning and ending cash balances. F 6. FASB’s recommended method. T 7. Decrease in accounts receivable and cash-basis revenues. F 8. Decrease in prepaid expenses. F 9. Net income and net cash flow from operating activities. T 10. Converting net income to net cash flow from operating activities. F 11. Income from equity method investment. T 12. Computing cash receipts from customers. F 13. Computing cash payments for operating expenses. F 14. Reporting cash receipts/disbursements in direct method. T 15. Indirect method adjustments. F 16. Amortization of bond premium. T 17. Purchases and sales of trading securities. T 18. Disclosing noncash investing and financing activities. F 19. Use of cash flow worksheet. T 20. Reporting stock dividends on worksheet.

Multiple Choice—Conceptual
Answer No. Description c 21. Objective of the statement of cash flows. c 22. Primary purpose of the statement of cash flows. c S23. Answers provided by the statement of cash flows. b S24. First step in cash flow statement preparation. d 25. Definition of cash equivalents. d 26. Cash flow effect of a short-term nontrade note payable. c P27. Classifying items as investing activities. b P28. Classification of a financing activity. b S29. Reporting amortization of bond premium. c S30. Converting accrual based expense to cash basis. c S31. Reporting revenues and expenses on a cash basis. c 32. Cash flow effects of major repairs on machinery. b 33. Adjustment to income for inventory increase. c 34. Adjustment under the direct and indirect methods. c 35. Adjustment to cost of goods sold under the direct

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 4 Test Paper

    • 371 Words
    • 2 Pages

    Types of Cables analyzers all in all, analyzers utilized on premises cabling can be separated into three classifications.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Some security advantages that displaying the login screen on resume offer is that it offers security from anyone coming along and…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Why is it important to put the swap file on a separate partition from the root (/)partition?…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The number isn’t equal to 2 raised to the power of the number of bits because you always have to take away 2 from the network for the network and broadcast address…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ka lab report

    • 692 Words
    • 3 Pages

    We will be using the LoggerPro and LabPro in order to help us determine our data. The purpose of this experiment is to follow the changes of pH during the titration of an acid and a base in order to determine the of the weak acid, . is a constant for a given acid at a given temperature. In this experiment we determined the Ka using two different methods: 1) the measurement of the pH of a solution containing a known concentration of a weak acid, and 2) measurement of the pH at the half-neutralization point in the titration of a weak acid and a strong base.…

    • 692 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive. It has 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works offers powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 381 Words
    • 2 Pages

    1. Create an insert function that will take nodes and add them up in the binary tree.…

    • 381 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1430 Chapter 6 labs

    • 297 Words
    • 3 Pages

    You should become comfortable using the Linux command line and the online help utilities to manage files and directories.…

    • 297 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Kin 302 Test 2

    • 2096 Words
    • 9 Pages

    What is the phenomenon in which progressively larger doses of a drug are needed to produce the desired effects? tolerance addiction withdrawal compulsion…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    cj01e471 unit 1 assessment

    • 1571 Words
    • 7 Pages

    If a crisis worker hoped that the client would gain insight from some earlier childhood experience to help solve the crisis, she would be using_________ theory…

    • 1571 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    2. Reconnaissance would be the only legal way to obtain information about a target, footprinting would be rolled into this step.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    1. Which tool is better at performing protocol captures and which tool is better at performing protocol analysis?…

    • 696 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kieso15e Testbank Ch19

    • 13073 Words
    • 76 Pages

    b 21. Differences between taxable and accounting income. c 22. Differences between taxable and accounting income. b 23.…

    • 13073 Words
    • 76 Pages
    Powerful Essays