Principles Of Auditing & Other Assurance Services
21st Edition
ISBN: 9781259916984
Author: WHITTINGTON, Ray, Pany, Kurt
Publisher: Mcgraw-hill Education,
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 34P
a.
To determine
Explain the auditing approach of auditing “around” the computer.
b.
To determine
Explain the conditions behind using the audit through the computer instead of around the computer.
c.
To determine
Explain test data and the use of test data.
d.
To determine
Explain the condition when the CPAs would be satisfied that the computer programs presented to them for testing are actually those used by the client for processing accounting data.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
CPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data.
c. In auditing through the computer, CPAs may use test data.
(1) What are test data?
(2) Why do CPAs use test data?
CPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data.
b. Under what conditions do CPAs decide to audit through the computer instead of around the computer?
CPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data.
d. How can the CPAs be satisfied that the computer programs presented to them for testing are actually those used by the client for processing accounting data?
Chapter 8 Solutions
Principles Of Auditing & Other Assurance Services
Ch. 8 - List and describe the major components of an...Ch. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Distinguish general control activities from...Ch. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - What is the difference between an Internet-based...Ch. 8 - Prob. 15RQCh. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22QRACh. 8 - Prob. 23QRACh. 8 - Prob. 24QRACh. 8 - Prob. 25QRACh. 8 - Prob. 26QRACh. 8 - Prob. 27QRACh. 8 - Prob. 28QRACh. 8 - Prob. 29AOQCh. 8 - Prob. 29BOQCh. 8 - Prob. 29COQCh. 8 - Prob. 29DOQCh. 8 - When an online real-time (OLRT) IT processing...Ch. 8 - Prob. 29FOQCh. 8 - Prob. 29GOQCh. 8 - Prob. 29HOQCh. 8 - Prob. 29IOQCh. 8 - Prob. 29JOQCh. 8 - Prob. 29KOQCh. 8 - Prob. 29LOQCh. 8 - Prob. 30OQCh. 8 - Prob. 31OQCh. 8 - For each definition (or partial definition) in the...Ch. 8 - Prob. 33PCh. 8 - Prob. 34PCh. 8 - Prob. 35PCh. 8 - Prob. 36PCh. 8 - Prob. 37PCh. 8 - Prob. 38ITC
Knowledge Booster
Similar questions
- 1. CPAs may audit around or through computers in the examination of financial statements of client who utilize computer to process accounting data. Required: a. Describe the auditing approach referred to as auditing around the computer. b. Under what condition does the CPA decide to audit through the computer instead of around the computer?arrow_forwardCPAs may audit around or through computers in the audit of the financial statements of clients who use IT to process accounting data. a. Describe the auditing approach referred to as “auditing around the computer."arrow_forwardCPAs may audit around or through computers in the examination of financial statements of clients who utilize computer to process accounting data. Required: Under what condition does the CPA decide to audit through the computer instead of around the computer?arrow_forward
- CPAs may audit around or through computers in the examination of financial statements of clients who utilize computer to process accounting data. Required: Describe the auditing approach referred to as auditing around the computer.arrow_forwardYour client has outsourced the majority of the accounting information system to a third-party data center. What impact does that have on your audit of the financial statements?arrow_forwardased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments.arrow_forward
- Based on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. c. Describe the advantages of using data analytics software to identify unusual transactions or entries.arrow_forwardAn internal auditor is examining the effectiveness of procedures management established to protect customer data from cyberattacks and whether those procedures are cost effective. This is an example of an operational audit. Question options: True Falsearrow_forwardHow would you distinguish forensic accounting, fraud auditing, and investigative auditing from financial auditing?arrow_forward
- Describe the differences between auditing around the computer and auditing through the computer? Which one is more effective in a computerized accounting information system? Why?arrow_forward1. Please answer ASAP!!arrow_forwardWhich of the following can be used as a fundamental source of information in an audit? a. Money in the safe b. Oral testimony of the person responsible for accounting c. An e-mail from a supplier d. None e. Income statementarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub