Principles Of Auditing & Other Assurance Services
21st Edition
ISBN: 9781259916984
Author: WHITTINGTON, Ray, Pany, Kurt
Publisher: Mcgraw-hill Education,
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 24QRA
a.
To determine
Explain the difference between users operated computers and large computer systems.
b.
To determine
Explain the conditions when the auditor is concerned with internal control over the use of user-operated computers.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
1. Computer Assisted Audit Techniques (CAATs) are important tools than an IS auditor uses to gather and analyze data during an IS audit. One type of tool is the Generalized Audit Software (GAS). In your own words, how does CAATs affect the work of an IS auditor? What are the benefits of using CAATs in conducting an Audit?
2. Every organization has controls in place. Such controls must be effective. They are effective if they prevent, detect, or contain incidents and enable recovery from events that cause risks. Enumerate those three types of control and explain how these controls effectively address those events that cause risks
An internal auditor is examining the effectiveness of procedures management established to protect customer data from cyberattacks and whether those procedures are cost effective. This is an example of an operational audit.
Question options:
True
False
A primary advantage of using generalized audit software packages to audit the financial statements of a client that uses a computer system is that the auditor may:
a.Access information stored on computer files while having a limited understanding of the client’s hardware and software features.
b.Consider increasing the use of substantive tests of transactions in place of analytical procedures.
c.Substantiate the accuracy of data through selfchecking digits and hash totals.
d.Reduce the level of required tests of controls to a relatively small amount.
Chapter 8 Solutions
Principles Of Auditing & Other Assurance Services
Ch. 8 - List and describe the major components of an...Ch. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Distinguish general control activities from...Ch. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - What is the difference between an Internet-based...Ch. 8 - Prob. 15RQCh. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22QRACh. 8 - Prob. 23QRACh. 8 - Prob. 24QRACh. 8 - Prob. 25QRACh. 8 - Prob. 26QRACh. 8 - Prob. 27QRACh. 8 - Prob. 28QRACh. 8 - Prob. 29AOQCh. 8 - Prob. 29BOQCh. 8 - Prob. 29COQCh. 8 - Prob. 29DOQCh. 8 - When an online real-time (OLRT) IT processing...Ch. 8 - Prob. 29FOQCh. 8 - Prob. 29GOQCh. 8 - Prob. 29HOQCh. 8 - Prob. 29IOQCh. 8 - Prob. 29JOQCh. 8 - Prob. 29KOQCh. 8 - Prob. 29LOQCh. 8 - Prob. 30OQCh. 8 - Prob. 31OQCh. 8 - For each definition (or partial definition) in the...Ch. 8 - Prob. 33PCh. 8 - Prob. 34PCh. 8 - Prob. 35PCh. 8 - Prob. 36PCh. 8 - Prob. 37PCh. 8 - Prob. 38ITC
Knowledge Booster
Similar questions
- Consider “control environment.” Why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls? Now consider “segregation of duties.” Determine why it is important in an IT environment. What are some advantages of using IT and audit software when conducting an audit?arrow_forwardWhen an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach? A. Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions. B. Test data programs need NOT be tailor-made by the auditor for each client's computer applications. C. Test data programs usually consist of all possible valid and invalid conditions reguarding compliance with internal controls. D. Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.arrow_forwardWhich of the following is NOT a general control?* a. Backup of live data b. Use of passwords c. Setting an acceptable range for working hours d. Calamity-proof IT facilities ABOUT AUDITING/ACCOUNTING TOPICSarrow_forward
- Consider the “control environment.” Asses why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls?arrow_forwardWhich of the following audit techniques ordinarily would provide an auditor with the least assurance about the operating effectiveness of an internal control activity? a. Inquiry of client personnel. b. Inspection of documents and reports. c. Observation of client personnel. d. Preparation of system flowcharts.arrow_forwardWhat challenges do auditors face when using big data, data analytics and new technologies during an audit?arrow_forward
- 1. Explain how client internal controls can be improved through the proper installation of IT. 2. Distinguish between random error resulting from manual processing and systematic error resulting from IT processing and give an example of each category of error. 3. Explain what is meant by auditing around the computer, and describe what must be present for this approach to be effective in the audit of a client that uses IT to process accounting information. 4. An audit client is in the process of creating an online Web-based sales ordering system for customers to purchase products using personal credit cards for payment. Identify three risks related to an online sales system that management should consider. For each risk, identify an internal control that could be implemented to reduce that risk. 00000000000arrow_forwardList the management reports and computer files that can be used for audit evidence. What information in them can be useful to auditors?arrow_forwardAudit sampling for tests of controls is generally appropriatewhen the application of the control leaves audit evidence of performance (for example, initials of the credit manager on a sales invoice indicating credit approval, or evidence of authorization of data input to a microcomputer based data processing system). TRUE OR FALSE? WHY?arrow_forward
- Client Control Procedures and Audit Tests of Controls. Exhibit 7.64.1 contains an arrangement of examples of transaction errors (lettered a–g) and a set of client control procedures and devices (numbered 1–15).Required:For each client control procedure numbered 1–15, write a test of controls that could produce evidence on the question of whether the client’s control procedure has been implemented and is in operation.arrow_forwardTesting a company's internal controls through inspection of documents to see if approval or other checking was performed is specifically referred as ________. a. Documents Trial b. No Trial c. Audit Test d. Test of Controlsarrow_forwardThe most reliable evidence regarding the existence of newly acquired computer equipment isa. Inquiry of management.b. Documentation prepared externally.c. Evaluation of the client’s procedures.d. Physical observation.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning