Question

QUESTION 1 The risk that the information is wrong is known as: a-Information risk. b-Inherent risk...

QUESTION 1
The risk that the information is wrong is known as:

a-Information risk.
b-Inherent risk
c-Relative risk.
d-Business risk.

QUESTION 2
An auditor plans to examine a sample of 20 checks for counter signatures as prescribed by the client's control procedures. One of the checks in the chosen sample of 20 can not be found. The auditor should consider the reasons for this limitation and:

a-Evaluate the results as if the sample size had been 19.
b-Treat the missing check as a deviation for the purpose of evaluating the sample.
c-Treat the missing check in the same manner as the majority of the other 19 checks, i.e., countersigned or not.
d-Choose another check to replace the missing check in the sample.

QUESTION 3
Which of the following would be considered by the auditors as a weakness in an IT system?

a-Operators have access to terminals.
b-The programmers are allowed access to the file library.
c-The reprocessing of the exceptions detected by the computer is managed by a data control group.
d-More than one employee is present when the installation of the computer is in use.

QUESTION 4
Computer-based auditing is more likely to be used when:

a-Input transactions are batch processed and the system logic is simple.

b-Processing consists mainly of ordering the input data and updating the master file sequentially.
c-The processing is mainly online and the update is in real time.
d-The outputs are in printed form.

Homework Answers

Answer #1

Solution 1:

The risk that the information is wrong is known as "Information Risk"

Hence option a is correct.

Solution 2:

One of the checks in the chosen sample of 20 can not be found. The auditor should consider the reasons for this limitation and "Treat the missing check as a deviation for the purpose of evaluating the sample"

Hence option b is correct.

Solution 3:

Weakness in an IT system considered by the auditors is "The programmers are allowed access to the file library."

Hence option b is correct.

Solution 4:

Computer-based auditing is more likely to be used when "The processing is mainly online and the update is in real time"

Hence option c is correct.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
TO-DO LIST QUESTIONS 1.In a well designed internal control system which of the following is an...
TO-DO LIST QUESTIONS 1.In a well designed internal control system which of the following is an example of general authorization? A. acceptance of special orders B Granting of credit C. Two signatures on large denominated checks D.All of the above are examples of specific authorization circumstances 2.As an in-charge auditor you are reviewing a communication about reportable conditions related to internal control over cash receipts and disbursements. Which of the following conditions, standing alone, should cause you the most concern?...
Which of the following best illustrates the concept of sampling risk? A. An A/P clerk pays...
Which of the following best illustrates the concept of sampling risk? A. An A/P clerk pays $10,000 to the auditor to say that controls are effective when the sample evidence suggests that they are ineffective. B. The auditor misreads the dates on several bank reconciliations, causing her to accept a control as ineffective when in fact the control are effective. C. A sample of sales invoices happens to include a larger percentage of above limit credit sales without required explanations...
Question 12 (1 point) Regarding internal control in a technological environment, which group designs the information...
Question 12 (1 point) Regarding internal control in a technological environment, which group designs the information system? Question 12 options: Database administration Data control Systems analysis Telecommunications Question 13 (1 point) Which internal control document identifies employees and the tasks they perform in addition to how their duties are segregated? Question 13 options: Flowchart Internal control questionnaire Walk-through Written narrative Question 14 (1 point) Which of the following application control activities is concerned with input validation checks? Question 14 options:...
1.Production planning and control is part of which transaction cycle? Select one: a. Revenue cycle b....
1.Production planning and control is part of which transaction cycle? Select one: a. Revenue cycle b. Expenditure cycle c. Profit cycle     d. Conversion cycle 2.All the following are examples of database backup controls except: Select one: a. Database authorization table b. Transaction log c. Checkpoint d. Recovery module 3.During transaction processing, we may need to access a list of customers who have been granted specific discounts to ensure we apply the correct rates. Such information can be found in:...
9.In statistical sampling for tests of controls, determining the appropriate confidence level and desired precision are...
9.In statistical sampling for tests of controls, determining the appropriate confidence level and desired precision are decisions made by the auditor that will affect sample size for the test. Which of the following should TYPICALLY not factor into sample size when performing statistical sampling for test of controls? A. desired sampling risk B. population size C. audit resources available for execution of the sampling plan D. objective of the test E. Both b&c F. Both c&d 10. An auditor’s tolerable...
Which economist proposed a theory of government failure? Question 18 options: a) Elinor Ostrom b) George...
Which economist proposed a theory of government failure? Question 18 options: a) Elinor Ostrom b) George Stigler c) Arthur Pigou d) Ronald Coase Which event would cause the budget line to shift outward? Question 19 options: a) An increase in the price of one of the goods. b) A decrease in income. c) A decrease in the price of one of the goods. d) An increase in income. Jaslyn saw a dress she liked in her favorite department store a...
3. The two most common ways that commissions may be fraudulently increased are: MULTIPLE CHOICE a....
3. The two most common ways that commissions may be fraudulently increased are: MULTIPLE CHOICE a. Skimming and theft of non cash assets.     b. Larceny and bribing.     c. False sales and increasing the rate of the commission. d. Misuse of non cash assets and shorting company purchases. 5. Which of the following is not a strong control for protecting blank checks? MULTIPLE CHOICE a. Blank checks should be kept under lock and key. b. The key to the blank checks...
1. A client suffered a billing system failure near year-end. Invoices were not prepared or processed...
1. A client suffered a billing system failure near year-end. Invoices were not prepared or processed until after year-end. If S-Sale, AR-Accounting Receivable, COS-Cost of sales and INV-Inventory, how will the following ratios appear to behave? COS/S S/AR COS/INV a. higher lower same a. higher higher same a. lower lower   lower a. lower lower higher 2. The risk of overreliance [acceptable risk of assessing control risk too low] is the risk that? a. the auditor incorrectly concludes that controls are...
1)This question may require some research. If a computer wants to send a broadcast message to...
1)This question may require some research. If a computer wants to send a broadcast message to all other computers on the same network, what MAC address does it put in the Destination Address field of the frame? 2)This question may require some research. In one of the videos this week we mentioned that Uplink ports have the transmit and receive connectors reversed from the regular ports. What would be the purpose for doing that? 3)Which of the following is the...
Items 1 through 10 represent possible errors and fraud that an auditor suspects are present. The...
Items 1 through 10 represent possible errors and fraud that an auditor suspects are present. The accompanying List of Auditing Procedures that the auditor would consider performing to gather evidence concerning possible errors and fraud. For each item, select one or two procedures, as indicated, that the auditor most likely would perform to gather evidence in support of that item and explain why you choose. Possible misstatements due to error and fraud 1. The auditor suspects that the controller wrote...