Auditing: A Risk Based-Approach (MindTap Course List)
11th Edition
ISBN: 9781337619455
Author: Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 5, Problem 32RQSC
To determine
Introduction: Auditing means the inspection of financial accounts of the company to determine if the records are accurate as per the rules and regulations of accounting or not. There are two types of auditors i.e. internal auditors and external auditors, that carry out the
To state: The important objective that should be kept in mind before performing an audit test of computerized controls also specify the test that can be performed. Provide suggestion in case these controls do not work efficiently.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Consider “control environment.” Why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls?
Now consider “segregation of duties.” Determine why it is important in an IT environment. What are some advantages of using IT and audit software when conducting an audit?
Consider the “control environment.” Asses why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls?
Exactly what is the advantage of using Generalized Audit Software during an audit?
Chapter 5 Solutions
Auditing: A Risk Based-Approach (MindTap Course List)
Ch. 5 - Prob. 1CYBKCh. 5 - Prob. 2CYBKCh. 5 - Prob. 3CYBKCh. 5 - Prob. 4CYBKCh. 5 - Prob. 5CYBKCh. 5 - Prob. 6CYBKCh. 5 - Prob. 7CYBKCh. 5 - Prob. 8CYBKCh. 5 - Prob. 9CYBKCh. 5 - Prob. 10CYBK
Ch. 5 - Prob. 11CYBKCh. 5 - Prob. 12CYBKCh. 5 - Prob. 13CYBKCh. 5 - Prob. 14CYBKCh. 5 - Prob. 15CYBKCh. 5 - Which of the following accounts would not be...Ch. 5 - Prob. 17CYBKCh. 5 - Prob. 18CYBKCh. 5 - Prob. 19CYBKCh. 5 - Which management assertion is usually most...Ch. 5 - Prob. 21CYBKCh. 5 - Prob. 22CYBKCh. 5 - Prob. 23CYBKCh. 5 - Prob. 24CYBKCh. 5 - Prob. 25CYBKCh. 5 - Prob. 26CYBKCh. 5 - Prob. 27CYBKCh. 5 - Prob. 28CYBKCh. 5 - Prob. 29CYBKCh. 5 - Prob. 30CYBKCh. 5 - Prob. 31CYBKCh. 5 - Prob. 32CYBKCh. 5 - Prob. 33CYBKCh. 5 - Prob. 34CYBKCh. 5 - Prob. 35CYBKCh. 5 - Prob. 36CYBKCh. 5 - Prob. 37CYBKCh. 5 - Prob. 38CYBKCh. 5 - Prob. 39CYBKCh. 5 - Prob. 40CYBKCh. 5 - Prob. 41CYBKCh. 5 - Prob. 42CYBKCh. 5 - Prob. 43CYBKCh. 5 - Prob. 44CYBKCh. 5 - Prob. 45CYBKCh. 5 - Prob. 46CYBKCh. 5 - Prob. 47CYBKCh. 5 - Prob. 48CYBKCh. 5 - Prob. 1RQSCCh. 5 - Prob. 2RQSCCh. 5 - Prob. 3RQSCCh. 5 - Prob. 4RQSCCh. 5 - Prob. 5RQSCCh. 5 - Prob. 6RQSCCh. 5 - Professional guidance indicates that the auditor...Ch. 5 - Identify the accounts associated with the...Ch. 5 - Assume that an organization asserts that it has...Ch. 5 - Prob. 10RQSCCh. 5 - Prob. 11RQSCCh. 5 - Prob. 12RQSCCh. 5 - Prob. 13RQSCCh. 5 - List factors that might affect an audit firm’s...Ch. 5 - Prob. 15RQSCCh. 5 - Prob. 16RQSCCh. 5 - Prob. 17RQSCCh. 5 - Prob. 18RQSCCh. 5 - Prob. 19RQSCCh. 5 - Prob. 20RQSCCh. 5 - Prob. 21RQSCCh. 5 - Prob. 22RQSCCh. 5 - Prob. 23RQSCCh. 5 - Prob. 24RQSCCh. 5 - Prob. 25RQSCCh. 5 - Prob. 26RQSCCh. 5 - Prob. 27RQSCCh. 5 - Prob. 28RQSCCh. 5 - Prob. 29RQSCCh. 5 - Prob. 30RQSCCh. 5 - Prob. 32RQSCCh. 5 - Prob. 33RQSCCh. 5 - Prob. 34RQSCCh. 5 - Prob. 35RQSCCh. 5 - Prob. 36RQSCCh. 5 - Prob. 37RQSCCh. 5 - Prob. 38RQSCCh. 5 - Prob. 39RQSCCh. 5 - Prob. 40RQSCCh. 5 - Prob. 42RQSCCh. 5 - Prob. 43RQSCCh. 5 - Prob. 44FF
Knowledge Booster
Similar questions
- When can an audit of IT be performed without directly interacting with the system?arrow_forwardWhat is lapping? How can it be detected by an auditor and how can it be prevented?arrow_forwardExplain how we might evaluate auditors’ whistleblowing intentions? Why would this be important to do?arrow_forward
- What is the benefit of Generalized Audit Software in an audit?arrow_forwardWhich of the following is not a major reason for maintaining an audit trail for a computer system? a. Analytical procedures. b. Query answering. c. Deterrent to fraud. d. Monitoring purposes.arrow_forwardSelect one method an auditor can use to audit through the computer system. Explain how the method works, any risks associated with the method, and how you would justify using the method from a cost-benefit perspective.arrow_forward
- Which of the following is an advantage of computer-assisted audit techniques (CAATs)?a. All the CAATs programs are written in one computer language.b. The software can be used for audits of clients that use differing computer equipment and file formats.c. The use of CAATs has reduced the need for the auditor to study input controls for computer-related procedures.d. The use of CAATs can be substituted for a relatively large part of the required testing.arrow_forwardWhich of the following is NOT an audit technique for auditing computerized AIS? a. Continuous auditing b. All of the above are techniques used to audit computerized AIS c. parallel simulation d. Use of specialized control softwarearrow_forward1) Which of the following statements is the most accurate? a. Data analytics can be exploratory but never confirmatory. b. Data analytics allows auditors to broaden scope of their assurance activities. c. An auditor can always rely more on IT controls than manual controls. d. Application controls can always be relied on when general controls are deemed effective.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Business/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage