Exam 10: The Impact of Information Technology on the Audit Process
Exam 1: Demand for Audit and Assurance Services74 Questions
Exam 2: Auditors Legal Environment89 Questions
Exam 3: Audit Quality and Ethics101 Questions
Exam 4: Audit Responsibilities and Objectives113 Questions
Exam 5: Audit Evidence118 Questions
Exam 6: Audit Planning and Documentation106 Questions
Exam 7: Materiality and Risk106 Questions
Exam 8: Internal Control and Control Risk120 Questions
Exam 9: Fraud Auditing75 Questions
Exam 10: The Impact of Information Technology on the Audit Process107 Questions
Exam 11: Overall Audit Plan and Audit Program105 Questions
Exam 12: Audit of the Sales and Collection Cycle: Tests of Controls and Substantive Tests of Transactions120 Questions
Exam 13: Completing Tests in the Sales and Collection Cycle: Accounts Receivable109 Questions
Exam 14: Audit Sampling146 Questions
Exam 15: Audit of Transaction Cycles and Financial Statement Balances I138 Questions
Exam 16: Audit of Transaction Cycles and Financial Statement Balances II137 Questions
Exam 17: Completing the Audit100 Questions
Exam 18: Audit Reporting85 Questions
Exam 19: Other Auditing and Assurance Engagements103 Questions
Select questions type
Discuss the four areas of responsibility under the IT function that should be segregated in large companies.
(Essay)
4.7/5
(31)
Encryption techniques protect the security of electronic communication during transmission.
(True/False)
4.9/5
(40)
A control which relates to all parts of the IT system is called:
(Multiple Choice)
4.8/5
(37)
Application controls vary with each application in the IT system. In attempting to review and gain an understanding of the internal control system, the auditor must evaluate the application controls for:
(Multiple Choice)
4.9/5
(41)
The use of 'encryption' techniques protect the security of electronic communication during the:
(Multiple Choice)
4.9/5
(42)
Should the auditor feel, after obtaining an understanding of IT internal control, that control risk cannot be reduced, he or she will:
(Multiple Choice)
4.8/5
(32)
Control risk is often affected by a complex IT system even if it enhances internal controls.
(True/False)
4.7/5
(32)
The objective of understanding internal control and assessing control risk in an IT system is:
(Multiple Choice)
4.8/5
(36)
When auditing a computerised system, an auditor may use the test data approach as an audit tool. This technique:
(Multiple Choice)
4.9/5
(28)
There are three concerns or difficulties that must be overcome before the test data approach can be used by the auditor. Discuss each of these concerns.
(Essay)
4.9/5
(36)
Oversight of the IT function to ensure that all activities are carried out consistently with the IT strategic plan is the responsibility of the:
(Multiple Choice)
4.8/5
(42)
One potential disadvantage of IT systems is the increased risk of destruction of entire data files.
(True/False)
4.7/5
(35)
Assume you are using generalised audit software (GAS) during your audit of accounts receivable. Discuss four kinds of tests or audit procedures you can perform with the GAS if the client's data are in machine- readable form.
(Essay)
4.7/5
(39)
Pre- designed formats for audit working papers and letters can be created and saved using both electronic spreadsheets and word processors. These are called:
(Multiple Choice)
4.7/5
(42)
One common use of generalised audit software is to help the auditor identify weaknesses in the client's IT control procedures.
(True/False)
4.9/5
(41)
When the client uses a computer but the auditor chooses to use only the non- IT segment of internal control to assess control risk, it is referred to as auditing around the computer. Which one of the following conditions need NOT be present in order to audit around the computer?
(Multiple Choice)
4.9/5
(43)
Showing 81 - 100 of 107
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)