EBK AUDITING & ASSURANCE SERVICES: A SY
11th Edition
ISBN: 9781260687668
Author: Jr
Publisher: MCGRAW-HILL LEARNING SOLN.(CC)
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 7.32MCQ
To determine
Concept Introduction:
Internal controls are policies and procedures defined by the management to ensure the smooth functioning of the business processes. Internal controls ensure the complete and correct accounting and safeguards to the assets.
To choose: the option that indicates weakness in internal control of IT system.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.
Which of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.
Explain how internal control can be enhanced through the proper installation of Information Technology
Identify the risks for accounting systems that rely heavily on IT functions.
Distinguish between general controls and application controls and give examples at least five
Which duties should be segregated in a computer department?
Describe the typical duties of computer personnel.
What aspects of documentation, file security and retention control procedures are unique to computer systems?
What are the responsibilities of the database administrator (DBA) function?
Compare the risks associated with network environment to those associated with centralized IT functions.
Chapter 7 Solutions
EBK AUDITING & ASSURANCE SERVICES: A SY
Ch. 7 - Prob. 7.1RQCh. 7 - Prob. 7.2RQCh. 7 - Prob. 7.3RQCh. 7 - Prob. 7.4RQCh. 7 - Prob. 7.5RQCh. 7 - Prob. 7.6RQCh. 7 - Prob. 7.7RQCh. 7 - Prob. 7.8RQCh. 7 - Prob. 7.9RQCh. 7 - Prob. 7.10RQ
Ch. 7 - Prob. 7.11RQCh. 7 - Prob. 7.12RQCh. 7 - Prob. 7.13RQCh. 7 - Prob. 7.14RQCh. 7 - Prob. 7.15RQCh. 7 - Prob. 7.16RQCh. 7 - Prob. 7.17RQCh. 7 - Prob. 7.18RQCh. 7 - Prob. 7.19MCQCh. 7 - Prob. 7.20MCQCh. 7 - Prob. 7.21MCQCh. 7 - Prob. 7.22MCQCh. 7 - Prob. 7.23MCQCh. 7 - Prob. 7.24MCQCh. 7 - Prob. 7.25MCQCh. 7 - Prob. 7.26MCQCh. 7 - Prob. 7.27MCQCh. 7 - Prob. 7.28MCQCh. 7 - Prob. 7.29MCQCh. 7 - Prob. 7.30MCQCh. 7 - Prob. 7.31MCQCh. 7 - Prob. 7.32MCQCh. 7 - Prob. 7.33MCQCh. 7 - Prob. 7.34PCh. 7 - Prob. 7.35PCh. 7 - Prob. 7.36PCh. 7 - Prob. 7.37PCh. 7 - Prob. 7.38PCh. 7 - Prob. 7.39PCh. 7 - Prob. 7.40PCh. 7 - Prob. 7.41PCh. 7 - Prob. 7.42PCh. 7 - Prob. 7.43PCh. 7 - Prob. 7.44PCh. 7 - Prob. 7.45P
Knowledge Booster
Similar questions
- Which of the following statements is most accurate? a. ERP systems are commercial software packages that are sometimes called turnkey systems because they can be implemented by the user with little or no modification. b. Substantive tests provide evidence focused on the system controls. c. Public accounting firms that provide attest services are not allowed under SOX to offer IT advisory services. d. Both small and large firms that have standardized information needs are potential customers for commercial software. e. External auditors may rely on the work of internal auditors only if they report to the controller or the CEO of the client company.arrow_forwardThe computer processing portion of a sales order system is represented by the flowchart. Answer the following questions.a. What type of data processing system is this? Explain, and be specific.b. The auditor suggests that this system can be greatly simplified by changing to direct access files. Explain the major operational changes that would occur in the system if this were done.c. The auditor warns of control implications from this change that must be considered. Explain the nature of the control implications.d. Sketch a flowchart (the computerized portion only) of the proposed new system. Use correct symbols and label the diagram.arrow_forwardComputer accounting control procedures are referred to as general or application controls. The primary objective of application controls in a computer environment is toa. ensure that the computer system operates efficiently.b. ensure the validity, completeness, and accuracy of financial transactions.c. provide controls over the electronic functioning of the hardware.d. plan for the protection of the facilities and backup for the systems.arrow_forward
- Explain the normal process an auditor would expect to find in the client's systems. governing changes to computer programs. Why is an auditor concerned about program changes?arrow_forwardWhen an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach? A. Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions. B. Test data programs need NOT be tailor-made by the auditor for each client's computer applications. C. Test data programs usually consist of all possible valid and invalid conditions reguarding compliance with internal controls. D. Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.arrow_forwardOperating system security involves policies, procedures, and controls that determine who can access the operating system. User access privileges are assigned to individuals and to entire workgroups authorized to use the system.The way access privileges are assigned influences system security. Priviliges should be carefully administered and closely monitored for compliance with organizational policy. Choose one of the options below, that is not a test of control of the audit objective relating to access privileges. a. Review employee records to determine whether users have formally acknowledged their responsibility to maintain the confidentiality of company data.b. Review the privileges of a selection of user groups and individuals to determine if their access rights are appropriate for their job descriptions and positions.c. The auditor should verify that individuals are granted access to data and programs based on their need to know.d. Review the account lockout policy and procedures…arrow_forward
- Assumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.arrow_forwardRequired: a. Create a document flowchart of the existing system. b. Analyze the internal control weaknesses in the system. Model your response according to the six categories of physical control activities specified in SAS 78. 1.Transaction Authorization 2.Segregation of Duties 3.Supervision 4.Accounting Records 5.Access Control 6.Independent Verificationarrow_forwardIn auditing program change control, the IT auditor will: a. Not need to inspect program authorization forms for signatures b. Ensure an organization is following the process described in their documentation for program change control c. Make sure that only computer programmers move their own changes into a production environment d. Make sure that only computer programmers have tested the changes they made to programsarrow_forward
- A CIS environment exists when a computer of any type o. size is involved in the processing of an entity's financial information. If an auditor is involved in the configuration and system development prior to the implementation, is the financial information is considered reliable and free from error?arrow_forwardQuestions Explain how client internal controls can be improved through the proper installation of IT. Identify risks for accounting systems that rely heavily on IT functions. Define what is meant by an audit trail and explain how it can be affected by the client’s integration of IT. Distinguish between random error resulting from manual processing and systematic error resulting from IT processing and give an example of each category of error. Identify the traditionally segregated duties in noncomplex IT systems and explain how increases in the complexity of the IT function affect that separation. Distinguish between general controls and application controls and give two examples of each. Identify the typical duties within an IT function and describe how those duties should be segregated among IT personnel. Explain how the effectiveness of general controls affects the auditor’s tests of automated application controls, including the auditor’s ability to rely on tests done in prior…arrow_forward1.Explain the relation ship between application controls and transaction related audit objectives . 2.explain what is meant by auditing around the computer and describe what must be present for this approach to be effective when auditing clients who use IT to process accounting information 3.explain what meant by the test data approach. What are the major difficulties with using this approach?define parallel simulation with audit software and provide an exmaple of how it can be used to test a client's payroll system 4.describe risks that are associated with purchasing software to be installed on desktop computer hard drives.what precautions can clients take to reduce those risks? 5.compare the risks associated with network systems to those associated with centralized IT functions 6.how does the use of a database management system affect risks? 7.an audit client is in the process of creating an online web-based sales ordering system for customers to purchase products using personal…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L