EBK PRINCIPLES OF AUDITING & OTHER ASSU
21st Edition
ISBN: 9781260299434
Author: WHITTINGTON
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 29COQ
To determine
Identify the appropriate answer related to the party which reviews the exceptional report.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Explain the normal process an auditor would expect to find in the client's systems.
governing changes to computer programs. Why is an auditor concerned about
program changes?
The installation of a database management system is likely to have the least impact ona. data redundancy.b. entity-wide sharing of common data.c. exclusive ownership of data.d. the logic needed to solve a problem in an application program.e. the internal controls over data access.
When an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach?
A. Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions.
B. Test data programs need NOT be tailor-made by the auditor for each client's computer applications.
C. Test data programs usually consist of all possible valid and invalid conditions reguarding compliance with internal controls.
D. Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.
Chapter 8 Solutions
EBK PRINCIPLES OF AUDITING & OTHER ASSU
Ch. 8 - List and describe the major components of an...Ch. 8 - Prob. 2RQCh. 8 - Prob. 3RQCh. 8 - Prob. 4RQCh. 8 - Prob. 5RQCh. 8 - Distinguish general control activities from...Ch. 8 - Prob. 7RQCh. 8 - Prob. 8RQCh. 8 - Prob. 9RQCh. 8 - Prob. 10RQ
Ch. 8 - Prob. 11RQCh. 8 - Prob. 12RQCh. 8 - Prob. 13RQCh. 8 - What is the difference between an Internet-based...Ch. 8 - Prob. 15RQCh. 8 - Prob. 16RQCh. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - Prob. 19RQCh. 8 - Prob. 20RQCh. 8 - Prob. 21RQCh. 8 - Prob. 22QRACh. 8 - Prob. 23QRACh. 8 - Prob. 24QRACh. 8 - Prob. 25QRACh. 8 - Prob. 26QRACh. 8 - Prob. 27QRACh. 8 - Prob. 28QRACh. 8 - Prob. 29AOQCh. 8 - Prob. 29BOQCh. 8 - Prob. 29COQCh. 8 - Prob. 29DOQCh. 8 - When an online real-time (OLRT) IT processing...Ch. 8 - Prob. 29FOQCh. 8 - Prob. 29GOQCh. 8 - Prob. 29HOQCh. 8 - Prob. 29IOQCh. 8 - Prob. 29JOQCh. 8 - Prob. 29KOQCh. 8 - Prob. 29LOQCh. 8 - Prob. 30OQCh. 8 - Prob. 31OQCh. 8 - For each definition (or partial definition) in the...Ch. 8 - Prob. 33PCh. 8 - Prob. 34PCh. 8 - Prob. 35PCh. 8 - Prob. 36PCh. 8 - Prob. 37PCh. 8 - Prob. 38ITC
Knowledge Booster
Similar questions
- Which of the following is least likely to be a general control over computer activities? a. Procedures for developing new programs and systems b. Requirements for system documentation c. An access control d. A control total Required: choose the correct answer and Justify your answers in at least 6 sentences.arrow_forwardWhich of the following is NOT part of the systems implementation process? a. converting databases b. documentation c. systems design d. testing and correctionarrow_forwardThe computer processing portion of a sales order system is represented by the flowchart. Answer the following questions.a. What type of data processing system is this? Explain, and be specific.b. The auditor suggests that this system can be greatly simplified by changing to direct access files. Explain the major operational changes that would occur in the system if this were done.c. The auditor warns of control implications from this change that must be considered. Explain the nature of the control implications.d. Sketch a flowchart (the computerized portion only) of the proposed new system. Use correct symbols and label the diagram.arrow_forward
- Assumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.arrow_forwardThe most significant control challenges in end-user computer settings are as follows:arrow_forwardWhich of the following would strengthen organizational control over a large-scale data processing center?a. Requiring the user departments to specify the general control standards necessary for processing transactions.b. Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.c. Having the database administrator report to the manager of computer operations.d. Assigning maintenance responsibility to the original system designer who best knows its logic.e. None of the above.arrow_forward
- Which of the following is NOT an audit technique for auditing computerized AIS? a. Continuous auditing b. All of the above are techniques used to audit computerized AIS c. parallel simulation d. Use of specialized control softwarearrow_forward1. Explain how client internal controls can be improved through the proper installation of IT. 2. Distinguish between random error resulting from manual processing and systematic error resulting from IT processing and give an example of each category of error. 3. Explain what is meant by auditing around the computer, and describe what must be present for this approach to be effective in the audit of a client that uses IT to process accounting information. 4. An audit client is in the process of creating an online Web-based sales ordering system for customers to purchase products using personal credit cards for payment. Identify three risks related to an online sales system that management should consider. For each risk, identify an internal control that could be implemented to reduce that risk. 00000000000arrow_forwardCategorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forward
- Computer Internal Control Questionnaire Evaluation. Assume that, when conductingprocedures to obtain an understanding of Denton Seed Company’s internal controls, youchecked “No” to the following internal control questionnaire items:∙ Does access to online files require specific passwords to be entered to identify and validate the terminal user?∙ Does the user establish control totals prior to submitting data for processing? (Orderentry application subsystem.)∙ Are input control totals reconciled to output control totals? (Order entry applicationsubsystem.)Required:Describe the errors and frauds that could occur because of the weaknesses indicated by thelack of IT controlsarrow_forwardConsider “control environment.” Why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls? Now consider “segregation of duties.” Determine why it is important in an IT environment. What are some advantages of using IT and audit software when conducting an audit?arrow_forwardThe database approach has several unique characteristics not found in traditional (flat-file) systems. Which of the following statements does not apply to the database model? a. Database systems have data independence; that is, the data and the programs are maintained separately except during processing. b. Database systems contain a data-definition language that helps describe each schema and subschema. c. The database administrator is the part of the software package that instructs the operating aspects of the program when data are retrieved. d. A primary goal of database systems is to minimize data redundancy. e. Database systems provide increased accessibility to data and flexibility in its usage.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning