AUDITING-TEXT (LOOSELEAF)
11th Edition
ISBN: 9781337619462
Author: JOHNSTONE
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 3, Problem 35CYBK
To determine
Introduction: The deficiency in internal control exists when properly designed control is not implicated efficiently by the authority that is in charge ofthe organization’s control. Any deficiency in internal control is identified in the process of internal audit.
To identify: The correct statement for the given situation.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
An IT auditor is conducting data analysis procedures on an employee expense report file and notices several expenses for $24.99 from the same individual. The company’s policy requires that any expenses that are under $25.00 do not require a receipt. The IT auditor should: [SELECT ALL THAT APPLY
a) Maintain professional skepticism and investigate these transactions further
b) Pass on investigating these items further, focusing on higher dollar amounts
c) Evaluate the business process approval controls, and related procedures
d) Discuss fraud awareness and detection programs with management to gain an understanding of management’s commitment to fraud prevention and related entity-level anti-fraud controls.
If a client relies on information technology (IT) controls and the auditor plans to assess control risk as low for payroll assertions, the auditor will usually do all of the following, EXCEPT _______.
--test the effectiveness of manual controls
--use computer-assisted audit techniques (CAATs) to evaluate the effectiveness of IT application controls
--test the effectiveness of manual procedures to follow up on exceptions
--All of the answer choices are correct.
The following are typical questions that might appear on an internal control questionnaire for accounts payable.
1. Are monthly statements from vendors reconciled with the accounts payable listing?
2. Are vendors’ invoices matched with receiving reports before they are approved for payment?
Assuming that the operating effectiveness of each of the above procedures is found to be inadequate, describe how the auditors might alter their substantive procedures to compensate for the increased level of the risk of material misstatement.
Chapter 3 Solutions
AUDITING-TEXT (LOOSELEAF)
Ch. 3 - Prob. 1CYBKCh. 3 - Prob. 2CYBKCh. 3 - Which of the following are affected by the quality...Ch. 3 - Prob. 4CYBKCh. 3 - Prob. 5CYBKCh. 3 - Prob. 6CYBKCh. 3 - What are the components of internal control per...Ch. 3 - Prob. 8CYBKCh. 3 - Prob. 9CYBKCh. 3 - The control environment is seen as the foundation...
Ch. 3 - Prob. 11CYBKCh. 3 - Which one of the following components of internal...Ch. 3 - Prob. 13CYBKCh. 3 - Prob. 14CYBKCh. 3 - Prob. 15CYBKCh. 3 - Prob. 16CYBKCh. 3 - Prob. 17CYBKCh. 3 - Prob. 18CYBKCh. 3 - Prob. 19CYBKCh. 3 - Prob. 20CYBKCh. 3 - Prob. 21CYBKCh. 3 - Prob. 22CYBKCh. 3 - Prob. 23CYBKCh. 3 - Prob. 24CYBKCh. 3 - Prob. 25CYBKCh. 3 - Prob. 26CYBKCh. 3 - Prob. 27CYBKCh. 3 - Prob. 28CYBKCh. 3 - Prob. 29CYBKCh. 3 - Prob. 30CYBKCh. 3 - Prob. 31CYBKCh. 3 - Prob. 32CYBKCh. 3 - Prob. 33CYBKCh. 3 - Prob. 34CYBKCh. 3 - Prob. 35CYBKCh. 3 - Prob. 36CYBKCh. 3 - Prob. 37CYBKCh. 3 - Prob. 38CYBKCh. 3 - Prob. 39CYBKCh. 3 - Prob. 40CYBKCh. 3 - Prob. 1RQSCCh. 3 - Prob. 2RQSCCh. 3 - Prob. 3RQSCCh. 3 - Prob. 4RQSCCh. 3 - Distinguish between entity-wide and transaction...Ch. 3 - Refer to Exhibit 3.2. List the principles...Ch. 3 - Prob. 7RQSCCh. 3 - Prob. 8RQSCCh. 3 - Prob. 9RQSCCh. 3 - Prob. 10RQSCCh. 3 - Refer to Exhibit 3.3. For each risk assessment...Ch. 3 - Prob. 12RQSCCh. 3 - Prob. 13RQSCCh. 3 - Prob. 14RQSCCh. 3 - Prob. 15RQSCCh. 3 - Prob. 16RQSCCh. 3 - Prob. 17RQSCCh. 3 - Prob. 18RQSCCh. 3 - Authorization of transactions is a key control in...Ch. 3 - Prob. 20RQSCCh. 3 - Prob. 21RQSCCh. 3 - Prob. 22RQSCCh. 3 - Prob. 23RQSCCh. 3 - Prob. 24RQSCCh. 3 - Prob. 25RQSCCh. 3 - Prob. 26RQSCCh. 3 - Prob. 27RQSCCh. 3 - Prob. 28RQSCCh. 3 - Refer to Exhibit 3.9. What are the important...Ch. 3 - Refer to Exhibit 3.10 and Exhibit 3.11. Describe...Ch. 3 - Prob. 31RQSCCh. 3 - Prob. 32RQSCCh. 3 - Prob. 33RQSCCh. 3 - Prob. 34RQSCCh. 3 - Assume that management is gathering evidence as...Ch. 3 - Prob. 36RQSCCh. 3 - Prob. 37RQSCCh. 3 - Prob. 38RQSCCh. 3 - Prob. 39RQSCCh. 3 - Prob. 40RQSCCh. 3 - Prob. 39FFCh. 3 - Diamond Foods, Inc. (LO 8, 9) In February 2012,...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- The following internal controls were identified by the auditor while gaining an understanding of internal control for the sales cycle. Access to the customer master file is restricted to authorized personnel. Customers are added to the master file only after appropriate approval, including adequate background and credit checks. Sales are made only to approved customers. The computer system rejects orders if the customer number is invalid or the order exceeds the customer’s approved credit limit. The computer matches the products and quantities on the customer order, shipping document, and sales invoice and generates an exception report of differences for follow-up in the accounting department. The computer generates a daily list of unmatched shipping documents. The sales clerk follows up on each exception and electronically signs the report when they are resolved. Invoice prices are obtained from the price master file. Any changes to the standard prices on an invoice must be…arrow_forwardBased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. c. Describe the advantages of using data analytics software to identify unusual transactions or entries.arrow_forwardased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments.arrow_forward
- Identify Control Weaknesses and Recommendations. Georgia Beemster, CPA, is examining the financial statements of the Louisville Sales Corporation, which recently installed acomputerized processing system. The following comments have been extracted from Beemster’s notes on computer operations and the processing and control of shipping notices andcustomer invoices:∙ To minimize inconvenience, Louisville made the conversion to the new accounting information system without changing its existing system. The vendor supervised the conversion andtrained all computer department employees in systems design, operations, and programming.∙ Each computer run is assigned to a specific employee who is responsible for makingprogram changes, running the program, and answering questions. This procedure hasthe advantage of eliminating the need for records of computer operations because eachemployee is responsible for her or his own computer runs.∙ At least one computer department employee remains in the…arrow_forwardIdentify Computer Control Weaknesses. Ajax Inc., an audit client, recently installed anew accounting information system to process its shipping, billing, and accounts receivable records more efficiently. During interim work, an assistant completed the review of theaccounting information system and the internal controls. The assistant determined the following information concerning the new accounting information system and the processingand control of shipping notices and customer invoices.Each major computerized function (i.e., shipping, billing, accounts receivable) is permanently assigned to a specific computer operator who is responsible for making program changes,running the program, and reconciling the computer log. Responsibility for custody and controlover the various databases and system documentation is randomly rotated among the computer operators on a monthly basis to prevent any one person from access to the database anddocumentation. Each computer programmer and computer…arrow_forwardAn assistant on the Carter Company audit has been working in the revenue cycle and has compiled a list of possible errors and fraud that may result in the misstatement of Carter Company’s financial statements and a corresponding list of controls that, if properly designed and implemented, could assist in preventing or detecting the errors and fraud. For each possible error and fraud numbered a through o, select one internal control from the following answer list that, if properly designed and implemented, most likely could assist management in preventing or detecting the errors and fraud. Each response in the list of controls may be selected once, more than once, or not at all. A. Shipping clerks compare goods received from the warehouse with the details on the shipping documents. B. Approved sales orders are required for goods to be released from the warehouse. C. Monthly statements are mailed to all customers with outstanding balances. D. Shipping clerks compare…arrow_forward
- As the manager of the external audit team, you realize that the embedded audit module only writes material invoices to the audit file for the accounts receivable confirmation process. You are immediately concerned that the accounts receivable account may be substantially overstated this year and for the prior years in which this EAM was used.RequiredExplain why you are concerned because all ‘‘material’’ invoices are candidates for confirmation by the customer. Outline a plan for determining if the accounts receivable are overstated.arrow_forwardOne aspect of internal control requires companies to maintain adequate documentation and records. Which of the following statements is not correct with respect to an entity's maintenance of documents and records? A. Documents should be pre-numbered only if the client has no other means to maintain records of which documents have been used. B. Documents should be pre-numbered consecutively to facilitate control over missing documents. C. Documents should be sufficiently simple to ensure that they are clearly understood. D. Documents should be prepared at the time a transaction occurs or as soon thereafter as possible.arrow_forwardThe internal auditors of Brown Electrical Company report to the controller. Because of changes made in the past year to several of the transaction processing programs, the internal auditors created a new test data set. The external auditors requested that the old data set also be run. The internal auditors, embarrassed, explained that they overwrote the original test data set. Required: Outline any potential risks, and determine the courses of action the external auditor should take.arrow_forward
- Machine learning is a technique and approach that is becoming increasingly prevalent in the world of auditing. Which of the following represents the best example of a scenario whereby machine learning could be used effectively? O A Chief Financial Officer wishes to ensure that all bad debt expense write offs are personally approved by him before being authorized. An auditor wishes to improve the response rate for accounts receivable positive confirmations. An auditor wishes to identify unauthorized revenue transactions in a client's general ledger. None of these answer choices are correct. Dan and Asher are discussing how a machine learning model might look one day after their auditing class. Dan mentions to Asher that in order for the model to be successful and accurate, which of the following would first have to happen? The firm installing the machine learning system and software would need to ensure that all scheduled updates are installed properly. O The auditor would need to…arrow_forwardResearch a company that had a fraud event happen due to inadequate accounting procedures. Review the fraud event that happened in the company in detail and identify at least two accounting control procedures that were deficient in this event. Propose an internal control system that would have eliminated the fraud, using the ERP system.arrow_forwardAs the auditor of Sample Limited you note the following matters relating to the internal control of its sales system. i) The sales department accepts order without first checking the inventory level with the warchouse, ii) Goods are dispatched to customers without recording customer's signatures as proof of receipt of goods. iii) Orders of goods placed by customers are properly recorded but they are not forwarded timely to the dispatch department for fulfilling the order. For each of the above deficiencies, identify the possible impact on the company's operation and recommend a control to address it. Explain why an auditor cannot perform only test of control in an audit.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Revenue recognition explained; Author: The Finance Storyteller;https://www.youtube.com/watch?v=816Q6pOaGv4;License: Standard Youtube License