EBK AUDITING & ASSURANCE SERVICES: A SY
11th Edition
ISBN: 9781260687668
Author: Jr
Publisher: MCGRAW-HILL LEARNING SOLN.(CC)
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 7.33MCQ
To determine
Concept Introduction:
Internal controls are policies and procedures defined by the management to ensure the smooth functioning of the business processes. Internal controls ensure the complete and correct accounting and safeguards to the assets.
To choose: the option that indicates weakness in internal control of IT system.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A primary advantage of using generalized audit software packages to audit the financial statements of a client that uses a computer system is that the auditor may:
a.Access information stored on computer files while having a limited understanding of the client’s hardware and software features.
b.Consider increasing the use of substantive tests of transactions in place of analytical procedures.
c.Substantiate the accuracy of data through selfchecking digits and hash totals.
d.Reduce the level of required tests of controls to a relatively small amount.
Which of the following is not a major reason for maintaining an audit trail for a computer system?
a.
Analytical procedures.
b.
Query answering.
c.
Deterrent to fraud.
d.
Monitoring purposes.
Consider “control environment.” Why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls?
Now consider “segregation of duties.” Determine why it is important in an IT environment. What are some advantages of using IT and audit software when conducting an audit?
Chapter 7 Solutions
EBK AUDITING & ASSURANCE SERVICES: A SY
Ch. 7 - Prob. 7.1RQCh. 7 - Prob. 7.2RQCh. 7 - Prob. 7.3RQCh. 7 - Prob. 7.4RQCh. 7 - Prob. 7.5RQCh. 7 - Prob. 7.6RQCh. 7 - Prob. 7.7RQCh. 7 - Prob. 7.8RQCh. 7 - Prob. 7.9RQCh. 7 - Prob. 7.10RQ
Ch. 7 - Prob. 7.11RQCh. 7 - Prob. 7.12RQCh. 7 - Prob. 7.13RQCh. 7 - Prob. 7.14RQCh. 7 - Prob. 7.15RQCh. 7 - Prob. 7.16RQCh. 7 - Prob. 7.17RQCh. 7 - Prob. 7.18RQCh. 7 - Prob. 7.19MCQCh. 7 - Prob. 7.20MCQCh. 7 - Prob. 7.21MCQCh. 7 - Prob. 7.22MCQCh. 7 - Prob. 7.23MCQCh. 7 - Prob. 7.24MCQCh. 7 - Prob. 7.25MCQCh. 7 - Prob. 7.26MCQCh. 7 - Prob. 7.27MCQCh. 7 - Prob. 7.28MCQCh. 7 - Prob. 7.29MCQCh. 7 - Prob. 7.30MCQCh. 7 - Prob. 7.31MCQCh. 7 - Prob. 7.32MCQCh. 7 - Prob. 7.33MCQCh. 7 - Prob. 7.34PCh. 7 - Prob. 7.35PCh. 7 - Prob. 7.36PCh. 7 - Prob. 7.37PCh. 7 - Prob. 7.38PCh. 7 - Prob. 7.39PCh. 7 - Prob. 7.40PCh. 7 - Prob. 7.41PCh. 7 - Prob. 7.42PCh. 7 - Prob. 7.43PCh. 7 - Prob. 7.44PCh. 7 - Prob. 7.45P
Knowledge Booster
Similar questions
- Which of the following is an advantage of computer-assisted audit techniques (CAATs)?a. All the CAATs programs are written in one computer language.b. The software can be used for audits of clients that use differing computer equipment and file formats.c. The use of CAATs has reduced the need for the auditor to study input controls for computer-related procedures.d. The use of CAATs can be substituted for a relatively large part of the required testing.arrow_forwardWhen an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach? A. Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions. B. Test data programs need NOT be tailor-made by the auditor for each client's computer applications. C. Test data programs usually consist of all possible valid and invalid conditions reguarding compliance with internal controls. D. Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.arrow_forward1) Which of the following statements is the most accurate? a. Data analytics can be exploratory but never confirmatory. b. Data analytics allows auditors to broaden scope of their assurance activities. c. An auditor can always rely more on IT controls than manual controls. d. Application controls can always be relied on when general controls are deemed effective.arrow_forward
- A primary advantage of using CAATs in the audit of an advanced computerized system is that it enables the auditor toa. Substantiate the accuracy of data through self-checking digits and hash totals.b. Utilize the speed and accuracy of the computer.c. Verify the performance of machine operations that leave visible evidence of the occurrence.d. Gather and store large amounts of supportive audit evidence in machine-readable form.arrow_forwardExplain how client internal controls can be improved through the proper installation of IT. Identify risks for accounting systems that rely heavily on IT functions. Define what is meant by an audit trail and explain how it can be affected by the client’s integration of IT. Distinguish between random error resulting from manual processing and systematic error resulting from IT processing and give an example of each category of error. Identify the traditionally segregated duties in noncomplex IT systems and explain how increases in the complexity of the IT function affect that separation. Distinguish between general controls and application controls and give two examples of each. Identify the typical duties within an IT function and describe how those duties should be segregated among IT personnel. Explain how the effectiveness of general controls affects the auditor’s tests of automated application controls, including the auditor’s ability to rely on tests done in prior auditsarrow_forwardQuestions Explain how client internal controls can be improved through the proper installation of IT. Identify risks for accounting systems that rely heavily on IT functions. Define what is meant by an audit trail and explain how it can be affected by the client’s integration of IT. Distinguish between random error resulting from manual processing and systematic error resulting from IT processing and give an example of each category of error. Identify the traditionally segregated duties in noncomplex IT systems and explain how increases in the complexity of the IT function affect that separation. Distinguish between general controls and application controls and give two examples of each. Identify the typical duties within an IT function and describe how those duties should be segregated among IT personnel. Explain how the effectiveness of general controls affects the auditor’s tests of automated application controls, including the auditor’s ability to rely on tests done in prior…arrow_forward
- In performing a risk-based audit, when developing audit recommendations, the IT auditor should: a) Use Computer Assisted Audit Techniques (CAATs) to test transactions. b) Analyze the inherent risk, residual risk, and the cost of additional controls in relation to the potential for loss. c) Determine if the risk is material based solely on auditor judgement. d) Perform substantive procedures to eliminate control riskarrow_forwardEvaluating data reliability is a critical part of the audit process. Explain the differences among the following in terms of reliability: Data from internal versus external sources. Written data versus verbal conversation records. Data obtained from direct versus indirect methods. Data obtained from original documents versus electronic scans.arrow_forwardased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments.arrow_forward
- Based on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. c. Describe the advantages of using data analytics software to identify unusual transactions or entries.arrow_forwardAuditors can engage in the activity of tracing by looking the audit trail to make sure there are no irregularities. Essentially an audit trail is a detailed chronological record of accounting records, transactions or other financial data. In many enviroments like the financial sector is a required to maintain one for auditing, but it is generally good to have one regardless because it makes for a cheaper and stress-free audit for the company. Thankfully with the help of technology, an audit trail can be developed and updated automatically making the process of maintaing one less time consuming. As far as the reliability of evidence is concerned, which types of procedures used to obtain evidence generally provide the most highly reliable evidence?arrow_forwardComputer-assisted Audit Techniques (CAATs) are imperative tools for auditors to conduct an audit in accordance with heightened auditing standards. Discuss the above statement explaining: The role of internal auditors according to auditing standards. and Different approaches to apply CAATs.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Business/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage