Principles Of Auditing & Other Assurance Services
21st Edition
ISBN: 9781259916984
Author: WHITTINGTON, Ray, Pany, Kurt
Publisher: Mcgraw-hill Education,
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 29GOQ
To determine
Identify the appropriate answer related to the least likely purpose for using the software by the auditor.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following is NOT an audit technique for auditing computerized AIS?
a.
Continuous auditing
b.
All of the above are techniques used to audit computerized AIS
c.
parallel simulation
d.
Use of specialized control software
Which of the following is an advantage of computer-assisted audit techniques (CAATs)?a. All the CAATs programs are written in one computer language.b. The software can be used for audits of clients that use differing computer equipment and file formats.c. The use of CAATs has reduced the need for the auditor to study input controls for computer-related procedures.d. The use of CAATs can be substituted for a relatively large part of the required testing.
Auditing by testing the input and output of a computer system instead of the computer program itself will:
Chapter 8 Solutions
Principles Of Auditing & Other Assurance Services
Ch. 8 - List and describe the major components of an...Ch. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Distinguish general control activities from...Ch. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - What is the difference between an Internet-based...Ch. 8 - Prob. 15RQCh. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22QRACh. 8 - Prob. 23QRACh. 8 - Prob. 24QRACh. 8 - Prob. 25QRACh. 8 - Prob. 26QRACh. 8 - Prob. 27QRACh. 8 - Prob. 28QRACh. 8 - Prob. 29AOQCh. 8 - Prob. 29BOQCh. 8 - Prob. 29COQCh. 8 - Prob. 29DOQCh. 8 - When an online real-time (OLRT) IT processing...Ch. 8 - Prob. 29FOQCh. 8 - Prob. 29GOQCh. 8 - Prob. 29HOQCh. 8 - Prob. 29IOQCh. 8 - Prob. 29JOQCh. 8 - Prob. 29KOQCh. 8 - Prob. 29LOQCh. 8 - Prob. 30OQCh. 8 - Prob. 31OQCh. 8 - For each definition (or partial definition) in the...Ch. 8 - Prob. 33PCh. 8 - Prob. 34PCh. 8 - Prob. 35PCh. 8 - Prob. 36PCh. 8 - Prob. 37PCh. 8 - Prob. 38ITC
Knowledge Booster
Similar questions
- Consider “control environment.” Why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls? Now consider “segregation of duties.” Determine why it is important in an IT environment. What are some advantages of using IT and audit software when conducting an audit?arrow_forwardA primary advantage of using generalized audit software packages to audit the financial statements of a client that uses a computer system is that the auditor may: a.Access information stored on computer files while having a limited understanding of the client’s hardware and software features. b.Consider increasing the use of substantive tests of transactions in place of analytical procedures. c.Substantiate the accuracy of data through selfchecking digits and hash totals. d.Reduce the level of required tests of controls to a relatively small amount.arrow_forwardWhen an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach? A. Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions. B. Test data programs need NOT be tailor-made by the auditor for each client's computer applications. C. Test data programs usually consist of all possible valid and invalid conditions reguarding compliance with internal controls. D. Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.arrow_forward
- Identify two specific IT-related risks in computerized accounting information systems. Propose a strategy that might be implemented to mitigate or eliminate each selected risk. Be sure to effectively support your rationale.arrow_forwardWhich of the following is not a major reason for maintaining an audit trail for a computer system? a. Analytical procedures. b. Query answering. c. Deterrent to fraud. d. Monitoring purposes.arrow_forwardWhy might an auditor use a program flowchart?arrow_forward
- When using test data, why are audit teams required to prepare only one transaction to test each IT control?a. The speed and efficiency of the computer results in reduced sample sizes.b. The risk of misstatement is typically lower in an IT environment.c. Audit teams generally perform more extensive substantive testing in an IT environment, resulting in less need to test processing controls.d. In an IT environment, each transaction is handled in an identical manner.arrow_forwardAn internal auditor is examining the effectiveness of procedures management established to protect customer data from cyberattacks and whether those procedures are cost effective. This is an example of an operational audit. Question options: True Falsearrow_forwardHow can Embedded Audit Modules in software be utilized in an audit?arrow_forward
- The client’s computerized exception reporting system helps audit teams conduct a moreefficient audit because ita. Condenses data significantly.b. Highlights abnormal conditions.c. Decreases the necessary level of tests of computer controls.d. Is an efficient computer input control.arrow_forward1. Explain how client internal controls can be improved through the proper installation of IT. 2. Distinguish between random error resulting from manual processing and systematic error resulting from IT processing and give an example of each category of error. 3. Explain what is meant by auditing around the computer, and describe what must be present for this approach to be effective in the audit of a client that uses IT to process accounting information. 4. An audit client is in the process of creating an online Web-based sales ordering system for customers to purchase products using personal credit cards for payment. Identify three risks related to an online sales system that management should consider. For each risk, identify an internal control that could be implemented to reduce that risk. 00000000000arrow_forwardWhat are the possible scenarios in the delivery creation process? Can a SAP user create a delivery without referencing any existing order? Write a few audit techniques applied to audit computerized AIS?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning