Auditing: A Risk Based-Approach to Conducting a Quality Audit
10th Edition
ISBN: 9781305080577
Author: Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher: South-Western College Pub
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem 53RSCQ
To determine
Introduction:Test of controls are the
The auditor needs to reperform the control to verify the effectiveness of internal control
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Consider “control environment.” Why it is important for auditors to understand a client’s control environment. What are some limitations of internal controls?
Now consider “segregation of duties.” Determine why it is important in an IT environment. What are some advantages of using IT and audit software when conducting an audit?
Explain the normal process an auditor would expect to find in the client's systems.
governing changes to computer programs. Why is an auditor concerned about
program changes?
What sources of information can auditors use in connection with deciding whether to accept a new client?
Chapter 9 Solutions
Auditing: A Risk Based-Approach to Conducting a Quality Audit
Ch. 9 - Prob. 1TFQCh. 9 - Prob. 2TFQCh. 9 - Prob. 3TFQCh. 9 - Prob. 4TFQCh. 9 - Prob. 5TFQCh. 9 - Prob. 6TFQCh. 9 - Prob. 7TFQCh. 9 - Prob. 8TFQCh. 9 - Prob. 9TFQCh. 9 - Prob. 10TFQ
Ch. 9 - Prob. 11TFQCh. 9 - Prob. 12TFQCh. 9 - Prob. 13TFQCh. 9 - Prob. 14TFQCh. 9 - Prob. 15TFQCh. 9 - Prob. 16TFQCh. 9 - Which of the following statements is true...Ch. 9 - Prob. 18MCQCh. 9 - Prob. 19MCQCh. 9 - Prob. 20MCQCh. 9 - Prob. 21MCQCh. 9 - Prob. 22MCQCh. 9 - Prob. 23MCQCh. 9 - Prob. 24MCQCh. 9 - Which of the following statements is false...Ch. 9 - Prob. 26MCQCh. 9 - Prob. 27MCQCh. 9 - Prob. 28MCQCh. 9 - Prob. 29MCQCh. 9 - Prob. 30MCQCh. 9 - Prob. 31MCQCh. 9 - Prob. 32MCQCh. 9 - Refer to Exhibit 9.1. Which accounts are relevant...Ch. 9 - Prob. 34RSCQCh. 9 - Prob. 35RSCQCh. 9 - An important task ¡n the audit of the revenue...Ch. 9 - Prob. 37RSCQCh. 9 - Prob. 38RSCQCh. 9 - Prob. 39RSCQCh. 9 - Prob. 40RSCQCh. 9 - Prob. 41RSCQCh. 9 - Prob. 42RSCQCh. 9 - Prob. 43RSCQCh. 9 - Prob. 45RSCQCh. 9 - Prob. 46RSCQCh. 9 - Prob. 47RSCQCh. 9 - Stainless Steel Specialties (SSS) is a...Ch. 9 - Prob. 49RSCQCh. 9 - Prob. 50RSCQCh. 9 - Prob. 51RSCQCh. 9 - Prob. 52RSCQCh. 9 - Prob. 53RSCQCh. 9 - Prob. 54RSCQCh. 9 - Prob. 55RSCQCh. 9 - Prob. 56RSCQCh. 9 - Prob. 57RSCQCh. 9 - Prob. 58RSCQCh. 9 - Prob. 59RSCQCh. 9 - Prob. 60RSCQCh. 9 - Prob. 61RSCQCh. 9 - Prob. 62RSCQCh. 9 - Prob. 63RSCQCh. 9 - Prob. 64RSCQCh. 9 - Prob. 65RSCQCh. 9 - Prob. 66RSCQCh. 9 - Prob. 67RSCQCh. 9 - Prob. 68RSCQCh. 9 - Prob. 69RSCQCh. 9 - Prob. 70RSCQCh. 9 - Prob. 71RSCQCh. 9 - Read the following scenario about Strang...Ch. 9 - Prob. 73RSCQCh. 9 - Prob. 74RSCQCh. 9 - ZYNGA (LO Z 3, 4, 5, 6, 8) Refer to the Why It...Ch. 9 - Prob. 76FFCh. 9 - UTSTARCOM, INC. (LO 2, 3, 4, 5, 6, 8) UTStarcom is...Ch. 9 - Prob. 78FFCh. 9 - Prob. 79FF
Knowledge Booster
Similar questions
- Compare the designs of your choice of two internal controls. Determine which is the preferred design for the implementation of internal controls and why it is more likely to detect accounting irregularities. Provide at least two reasons why the preferred design for internal controls is more effective than the other design. Provide a rational for your choice.arrow_forwardAn internal auditor is examining the effectiveness of procedures management established to protect customer data from cyberattacks and whether those procedures are cost effective. This is an example of an operational audit. Question options: True Falsearrow_forwardExactly what is the advantage of using Generalized Audit Software during an audit?arrow_forward
- What is the benefit of Generalized Audit Software in an audit?arrow_forwardContinuous assurance auditing will send signals or messages deviated from an audit limit or parameter to internal auditors. What auditing standards and methods are necessary to ensure the effectiveness and efficiency of continuous auditing services?arrow_forwardExplain how we might evaluate auditors’ whistleblowing intentions? Why would this be important to do?arrow_forward
- When an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach? A. Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions. B. Test data programs need NOT be tailor-made by the auditor for each client's computer applications. C. Test data programs usually consist of all possible valid and invalid conditions reguarding compliance with internal controls. D. Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.arrow_forwardIn performing a risk-based audit, when developing audit recommendations, the IT auditor should: a) Use Computer Assisted Audit Techniques (CAATs) to test transactions. b) Analyze the inherent risk, residual risk, and the cost of additional controls in relation to the potential for loss. c) Determine if the risk is material based solely on auditor judgement. d) Perform substantive procedures to eliminate control riskarrow_forwardOperating system security involves policies, procedures, and controls that determine who can access the operating system. User access privileges are assigned to individuals and to entire workgroups authorized to use the system.The way access privileges are assigned influences system security. Priviliges should be carefully administered and closely monitored for compliance with organizational policy. Choose one of the options below, that is not a test of control of the audit objective relating to access privileges. a. Review employee records to determine whether users have formally acknowledged their responsibility to maintain the confidentiality of company data.b. Review the privileges of a selection of user groups and individuals to determine if their access rights are appropriate for their job descriptions and positions.c. The auditor should verify that individuals are granted access to data and programs based on their need to know.d. Review the account lockout policy and procedures…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College PubAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,