Principles Of Auditing & Other Assurance Services
21st Edition
ISBN: 9781259916984
Author: WHITTINGTON, Ray, Pany, Kurt
Publisher: Mcgraw-hill Education,
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 29IOQ
To determine
Identify the appropriate answer related to the least likely activity in case of information technology specialist on an audit.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A CIS environment exists when a computer of any type o. size is involved in the
processing of an entity's financial information. If an auditor is involved in the
configuration and system development prior to the implementation, is the financial
information is considered reliable and free from error?
1) Why is Responsibility Accounting necessary and how is it implemented?
2) Determination of control risk in the HR cycle (personnel) include an example of the explanation you gave?
3) To design an audit program for testing controls, what stages must the auditor go through when auditing a banking service company?
Which of the following procedures would provide the most reliable audit evidence?a. Inquiries of the client’s internal audit staff.b. Inspection of prenumbered client purchase orders filed in the vouchers payable department.c. Inspection of vendor sales invoices received from client personnel.d. Inspection of bank statements obtained directly from the client’s financial institution.
Chapter 8 Solutions
Principles Of Auditing & Other Assurance Services
Ch. 8 - List and describe the major components of an...Ch. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Distinguish general control activities from...Ch. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - What is the difference between an Internet-based...Ch. 8 - Prob. 15RQCh. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22QRACh. 8 - Prob. 23QRACh. 8 - Prob. 24QRACh. 8 - Prob. 25QRACh. 8 - Prob. 26QRACh. 8 - Prob. 27QRACh. 8 - Prob. 28QRACh. 8 - Prob. 29AOQCh. 8 - Prob. 29BOQCh. 8 - Prob. 29COQCh. 8 - Prob. 29DOQCh. 8 - When an online real-time (OLRT) IT processing...Ch. 8 - Prob. 29FOQCh. 8 - Prob. 29GOQCh. 8 - Prob. 29HOQCh. 8 - Prob. 29IOQCh. 8 - Prob. 29JOQCh. 8 - Prob. 29KOQCh. 8 - Prob. 29LOQCh. 8 - Prob. 30OQCh. 8 - Prob. 31OQCh. 8 - For each definition (or partial definition) in the...Ch. 8 - Prob. 33PCh. 8 - Prob. 34PCh. 8 - Prob. 35PCh. 8 - Prob. 36PCh. 8 - Prob. 37PCh. 8 - Prob. 38ITC
Knowledge Booster
Similar questions
- Your client has outsourced the majority of the accounting information system to a third-party data center. What impact does that have on your audit of the financial statements?arrow_forwardased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments.arrow_forwardWhich of the following benefits of an effective accounting information system provides safeguards for a business’s assets and reduces the likelihood of fraud and errors? Flexibility Relevance Control Compatibilityarrow_forward
- An internal auditor is examining the effectiveness of procedures management established to protect customer data from cyberattacks and whether those procedures are cost effective. This is an example of an operational audit. Question options: True Falsearrow_forwardWho are the professional organizations who are in charge of fraud auditing? Birefly elucidates.arrow_forwardPrepare a broad audit plan:1. What material types of transactions and transaction cycles are involved?2. What are the high-risk areas?3. What are the low-risk areas?4. If management faced tremendous pressure regarding the entity’s financial performance, what opportunities might exist for them to engage in fraudulent financial reporting?5. To what extent do you believe it will be appropriate to reduce assessed control risk?6. How will audit effort be allocated among geographical areas?7. What form of auditors’ report do you expect will be issued; what does it mean?8. Indicate as an appendix to the report how the project team was organized and how it functioned on the project and submit appendix with Team Project.arrow_forward
- A transaction-level internal control activity is best described asa. An action taken by auditors to obtain evidence.b. An action taken by client personnel for the purpose of preventing, detecting, and correcting errors and frauds in transactions to eliminate or mitigate risks identified by thecompany.c. A method for recording, summarizing, and reporting financial information.d. The functioning of the board of directors in support of its audit committee.arrow_forwardCPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data. b. Under what conditions do CPAs decide to audit through the computer instead of around the computer?arrow_forwardWhat is the audit committee’s potential role in overseeing cyber risk?arrow_forward
- Who is the professional bodies that responsible in fraud audit? Birefly explain.arrow_forwardBased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. c. Describe the advantages of using data analytics software to identify unusual transactions or entries.arrow_forwardCPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data. a. Describe the auditing approach referred to as “auditing around the computer."arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning