Auditing: A Risk Based-Approach to Conducting a Quality Audit
10th Edition
ISBN: 9781305080577
Author: Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher: South-Western College Pub
expand_more
expand_more
format_list_bulleted
Question
Chapter 3, Problem 37MCQ
To determine
Introduction: The deficiency in internal control exists when properly designed control is not implicated efficiently by the authority that is in charge ofthe organization’s control. Any deficiency in internal control is identified in the process of internal audit.
To identify: The correct statement for the given situation.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
An IT auditor is conducting data analysis procedures on an employee expense report file and notices several expenses for $24.99 from the same individual. The company’s policy requires that any expenses that are under $25.00 do not require a receipt. The IT auditor should: [SELECT ALL THAT APPLY
a) Maintain professional skepticism and investigate these transactions further
b) Pass on investigating these items further, focusing on higher dollar amounts
c) Evaluate the business process approval controls, and related procedures
d) Discuss fraud awareness and detection programs with management to gain an understanding of management’s commitment to fraud prevention and related entity-level anti-fraud controls.
If a client relies on information technology (IT) controls and the auditor plans to assess control risk as low for payroll assertions, the auditor will usually do all of the following, EXCEPT _______.
--test the effectiveness of manual controls
--use computer-assisted audit techniques (CAATs) to evaluate the effectiveness of IT application controls
--test the effectiveness of manual procedures to follow up on exceptions
--All of the answer choices are correct.
The following are typical questions that might appear on an internal control questionnaire for accounts payable.
1. Are monthly statements from vendors reconciled with the accounts payable listing?
2. Are vendors’ invoices matched with receiving reports before they are approved for payment?
Assuming that the operating effectiveness of each of the above procedures is found to be inadequate, describe how the auditors might alter their substantive procedures to compensate for the increased level of the risk of material misstatement.
Chapter 3 Solutions
Auditing: A Risk Based-Approach to Conducting a Quality Audit
Ch. 3 - Prob. 1TFQCh. 3 - Prob. 2TFQCh. 3 - Prob. 3TFQCh. 3 - Prob. 4TFQCh. 3 - Prob. 5TFQCh. 3 - The control environment is seen as the foundation...Ch. 3 - Prob. 7TFQCh. 3 - Prob. 8TFQCh. 3 - Prob. 9TFQCh. 3 - Prob. 10TFQ
Ch. 3 - Prob. 11TFQCh. 3 - Prob. 12TFQCh. 3 - Prob. 13TFQCh. 3 - Prob. 14TFQCh. 3 - Prob. 15TFQCh. 3 - Prob. 16TFQCh. 3 - Prob. 17TFQCh. 3 - Prob. 18TFQCh. 3 - Prob. 19TFQCh. 3 - Prob. 20TFQCh. 3 - Prob. 21MCQCh. 3 - Prob. 22MCQCh. 3 - What are the components of internal control per...Ch. 3 - Prob. 24MCQCh. 3 - Prob. 25MCQCh. 3 - Which one of the following components of internal...Ch. 3 - Prob. 27MCQCh. 3 - Prob. 28MCQCh. 3 - Prob. 29MCQCh. 3 - Prob. 30MCQCh. 3 - Prob. 31MCQCh. 3 - Prob. 32MCQCh. 3 - Prob. 33MCQCh. 3 - Prob. 34MCQCh. 3 - Prob. 35MCQCh. 3 - Prob. 36MCQCh. 3 - Prob. 37MCQCh. 3 - Prob. 38MCQCh. 3 - Prob. 39MCQCh. 3 - Prob. 40MCQCh. 3 - Prob. 41RSCQCh. 3 - Prob. 42RSCQCh. 3 - Prob. 43RSCQCh. 3 - Prob. 44RSCQCh. 3 - Distinguish between entity-wide and transaction...Ch. 3 - Refer to Exhibit 3.2. List the principles...Ch. 3 - Prob. 47RSCQCh. 3 - Prob. 48RSCQCh. 3 - Prob. 49RSCQCh. 3 - Prob. 50RSCQCh. 3 - Refer to Exhibit 3.3. For each risk assessment...Ch. 3 - Prob. 52RSCQCh. 3 - Prob. 53RSCQCh. 3 - Prob. 54RSCQCh. 3 - Prob. 55RSCQCh. 3 - Prob. 56RSCQCh. 3 - Prob. 57RSCQCh. 3 - Prob. 58RSCQCh. 3 - Authorization of transactions is a key control in...Ch. 3 - Prob. 60RSCQCh. 3 - Prob. 61RSCQCh. 3 - Prob. 62RSCQCh. 3 - Prob. 63RSCQCh. 3 - Prob. 64RSCQCh. 3 - Prob. 65RSCQCh. 3 - Prob. 66RSCQCh. 3 - Prob. 67RSCQCh. 3 - Prob. 68RSCQCh. 3 - Refer to Exhibit 3.9. What are the important...Ch. 3 - Refer to Exhibit 3.10 and Exhibit 3.11. Describe...Ch. 3 - Prob. 71RSCQCh. 3 - Prob. 72RSCQCh. 3 - Prob. 73RSCQCh. 3 - Prob. 74RSCQCh. 3 - Assume that management is gathering evidence as...Ch. 3 - Prob. 76RSCQCh. 3 - Prob. 77RSCQCh. 3 - Prob. 78RSCQCh. 3 - Prob. 79FFCh. 3 - Diamond Foods, Inc. (LO 8, 9) In February 2012,...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Similar questions
- The following internal controls were identified by the auditor while gaining an understanding of internal control for the sales cycle. Access to the customer master file is restricted to authorized personnel. Customers are added to the master file only after appropriate approval, including adequate background and credit checks. Sales are made only to approved customers. The computer system rejects orders if the customer number is invalid or the order exceeds the customer’s approved credit limit. The computer matches the products and quantities on the customer order, shipping document, and sales invoice and generates an exception report of differences for follow-up in the accounting department. The computer generates a daily list of unmatched shipping documents. The sales clerk follows up on each exception and electronically signs the report when they are resolved. Invoice prices are obtained from the price master file. Any changes to the standard prices on an invoice must be…arrow_forwardSir please help me urgentlyarrow_forwardBased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. c. Describe the advantages of using data analytics software to identify unusual transactions or entries.arrow_forward
- ased on an assessment of audit risk, the auditors are concerned with the following two risks: The risk that that the client might be making duplicate payments to vendors. The risk that the client’s accounting clerk might be making unauthorized payments to himself. Required: a. Assuming that the client has a manual accounting system, describe how the auditors can design a test to identify the duplicate payments and unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments. b. Assuming that the client has an IT accounting system, describe how the auditors might use data analytic software to design a test to identify the duplicate payments and the unauthorized payments.arrow_forwardIdentify Control Weaknesses and Recommendations. Georgia Beemster, CPA, is examining the financial statements of the Louisville Sales Corporation, which recently installed acomputerized processing system. The following comments have been extracted from Beemster’s notes on computer operations and the processing and control of shipping notices andcustomer invoices:∙ To minimize inconvenience, Louisville made the conversion to the new accounting information system without changing its existing system. The vendor supervised the conversion andtrained all computer department employees in systems design, operations, and programming.∙ Each computer run is assigned to a specific employee who is responsible for makingprogram changes, running the program, and answering questions. This procedure hasthe advantage of eliminating the need for records of computer operations because eachemployee is responsible for her or his own computer runs.∙ At least one computer department employee remains in the…arrow_forwardIdentify Computer Control Weaknesses. Ajax Inc., an audit client, recently installed anew accounting information system to process its shipping, billing, and accounts receivable records more efficiently. During interim work, an assistant completed the review of theaccounting information system and the internal controls. The assistant determined the following information concerning the new accounting information system and the processingand control of shipping notices and customer invoices.Each major computerized function (i.e., shipping, billing, accounts receivable) is permanently assigned to a specific computer operator who is responsible for making program changes,running the program, and reconciling the computer log. Responsibility for custody and controlover the various databases and system documentation is randomly rotated among the computer operators on a monthly basis to prevent any one person from access to the database anddocumentation. Each computer programmer and computer…arrow_forward
- An assistant on the Carter Company audit has been working in the revenue cycle and has compiled a list of possible errors and fraud that may result in the misstatement of Carter Company’s financial statements and a corresponding list of controls that, if properly designed and implemented, could assist in preventing or detecting the errors and fraud. For each possible error and fraud numbered a through o, select one internal control from the following answer list that, if properly designed and implemented, most likely could assist management in preventing or detecting the errors and fraud. Each response in the list of controls may be selected once, more than once, or not at all. A. Shipping clerks compare goods received from the warehouse with the details on the shipping documents. B. Approved sales orders are required for goods to be released from the warehouse. C. Monthly statements are mailed to all customers with outstanding balances. D. Shipping clerks compare…arrow_forwardA serious exposure in the revenue cycle is customer dissatisfaction. What is the related threat and applicable control procedure that address this exposure? A. failure to bill; separation of billing and shipping functions B. failure to bill; bar-codes and RFID technology C. billing errors; reconciliation of shipping documents to sales order D. theft of cash; using ETFsarrow_forwardAs the manager of the external audit team, you realize that the embedded audit module only writes material invoices to the audit file for the accounts receivable confirmation process. You are immediately concerned that the accounts receivable account may be substantially overstated this year and for the prior years in which this EAM was used.RequiredExplain why you are concerned because all ‘‘material’’ invoices are candidates for confirmation by the customer. Outline a plan for determining if the accounts receivable are overstated.arrow_forward
- One aspect of internal control requires companies to maintain adequate documentation and records. Which of the following statements is not correct with respect to an entity's maintenance of documents and records? A. Documents should be pre-numbered only if the client has no other means to maintain records of which documents have been used. B. Documents should be pre-numbered consecutively to facilitate control over missing documents. C. Documents should be sufficiently simple to ensure that they are clearly understood. D. Documents should be prepared at the time a transaction occurs or as soon thereafter as possible.arrow_forwardThe internal auditors of Brown Electrical Company report to the controller. Because of changes made in the past year to several of the transaction processing programs, the internal auditors created a new test data set. The external auditors requested that the old data set also be run. The internal auditors, embarrassed, explained that they overwrote the original test data set. Required: Outline any potential risks, and determine the courses of action the external auditor should take.arrow_forwardAssume you are considering an entity’s internal controls over credit sales and cash collection. System documentation was accomplished through a questionnaire and written narratives and, in conjunction with a transaction walk-through, revealed the following potential weaknesses in internal control, some of which, depending on their severity, could prompt you to set control risk at the maximum. a. New customers are not approved before ordered good are shipped. b. Sales prices vary from customer to custom. c. No approval is required for returned goods from customers. d. Subsidiary accounts receivable records do not always agree with the general ledger control account. e. Blank checks are left unprotected in an unlocked safe. Required: For each potential weakness, indicate a control or controls that management could implement to reduce the likelihood of errors or frauds. Case 4 (Adapted) During your audit of Grace Company’s December 31, 2013 financial…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Revenue recognition explained; Author: The Finance Storyteller;https://www.youtube.com/watch?v=816Q6pOaGv4;License: Standard Youtube License