Premium Essay

Adms 4510 Term Paper

In:

Submitted By teeta
Words 974
Pages 4
ADMS4510 TERM PROJECT
Question 4: For a performance obligation that an entity satisfies over time and expects at contract inception to satisfy over a period of time greater than one year, paragraph 86 states that the entity should recognize a liability and a corresponding expense if the performance obligation is onerous. Do you agree with the proposed scope of the onerous test? If not, what alternative scope do you recommend and why?
According to paragraph 86 and 87, a performance obligation is onerous if the lowest cost of settling the performance obligation exceeds the amount of the transaction price allocated to that performance obligation. The lowest cost of settling the performance obligation is the lower of a) the costs that relate directly to satisfying the performance obligation by transferring the promised goods and services, and b) the amounts that the entity would be permitted to pay to exit the performance obligation. An entity should initially recognize an onerous performance obligation as a liability and update the measurement of the liability for this onerous performance obligation for changes in circumstances at each reporting date. The onerous test acts as an application of accounting conservatism in revenue recognition, which requires recognizing all probable losses as they are discovered and deferring revenue until it is verified.
As providing users with important information by, in effect, remeasuring performance obligations to reflect significant adverse changes in circumstances on a timely basis, the onerous test increases the relevance because the estimated loss on performance obligation is recognized early on the financial statement. However, the financial statement information may not fully faithfully represent what it is intended to present, which implies that onerous test decreases reliability.
Firstly, the early loss the onerous test

Similar Documents

Free Essay

Hacking the Art of Exploitation

...no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher: William Pollock Production Editors: Christina Samuell and Megan Dunchak Cover Design: Octopod Studios Developmental Editor: Tyler Ortman Technical Reviewer: Aaron Adams Copyeditors: Dmitry Kirsanov and Megan Dunchak Compositors: Christina Samuell and Kathleen Mish Proofreader: Jim Brook Indexer: Nancy Guenther For information on book distributors or translations, please contact No Starch Press,...

Words: 139438 - Pages: 558