Exam 10: The impact of information technology on the audit process
Exam 1: Demand for audit and assurance services74 Questions
Exam 2: Auditors’ legal environment89 Questions
Exam 3: Audit quality and ethics101 Questions
Exam 4: Audit responsibilities and objectives113 Questions
Exam 5: Audit evidence118 Questions
Exam 6: Audit planning and documentation105 Questions
Exam7: Materiality and risk105 Questions
Exam 8: Internal control and control risk119 Questions
Exam 9: Fraud auditing75 Questions
Exam 10: The impact of information technology on the audit process104 Questions
Exam 11: Overall audit plan and audit program105 Questions
Exam 12: Audit of the sales and collection cycle: Tests of controls and substantive tests of transactions120 Questions
Exam 13: Completing tests in the sales and collection cycle: Accounts receivable109 Questions
Exam 14: Audit sampling146 Questions
Exam 15: Audit of transaction cycles and financial statement balances I138 Questions
Exam 16: Audit of transaction cycles and financial statement balances II137 Questions
Exam 17: Completing the audit100 Questions
Exam 18: Audit reporting85 Questions
Exam 19: Other auditing and assurance engagements102 Questions
Select questions type
The objective of the computer audit technique known as the 'test data approach' is to determine whether the client's computer programs can correctly process valid and invalid transactions.
(True/False)
4.9/5
(35)
Discuss the four areas of responsibility under the IT function that should be segregated in large companies.
(Essay)
4.9/5
(29)
The major disadvantage of generalised audit software is that its complexity limits its use primarily to IT specialists.
(True/False)
4.8/5
(42)
Which of the following are key to a successful software purchase decision?
(Multiple Choice)
4.8/5
(39)
Application controls vary with each application in the IT system.In attempting to review and gain an understanding of the internal control system, the auditor must evaluate the application controls for every:
(Multiple Choice)
4.9/5
(43)
Using the test data approach, the auditor processes a set of the client's actual transaction data using the auditor's computer programs on the auditor's computer equipment to determine whether the client's computer programs and equipment are processing data correctly.
(True/False)
4.7/5
(38)
The audit approach in which the auditor runs his or her own program on a controlled basis in order to verify the client's data recorded in a machine language is:
(Multiple Choice)
4.9/5
(39)
After obtaining an understanding of IT internal control, if the auditor feels that control risk cannot be reduced, he or she will
(Multiple Choice)
4.9/5
(37)
Describe four common audit tasks that can be simplified by the use of microcomputers in practice.
(Essay)
4.7/5
(36)
Identify the three categories of application controls and give one example of each.
(Essay)
4.8/5
(37)
Tests of controls are normally performed only if the auditor believes the client's internal control may be effective.
(True/False)
4.9/5
(34)
IT controls are classified as either general or application controls.
(True/False)
4.8/5
(33)
Many clients have their data processed at an independent computer service centre (IT outsourcing).The difficulty the independent auditor faces when a computer service centre is used lies in:
(Multiple Choice)
4.9/5
(35)
In IT systems, if general controls are effective, it increases the auditor's ability to rely on application controls to reduce control risk.
(True/False)
4.8/5
(35)
Pre-designed formats for audit working papers and letters can be created and saved using both electronic spreadsheets and word processors.These are called:
(Multiple Choice)
4.8/5
(43)
Control risk is often affected by a complex IT system even if it enhances internal controls.
(True/False)
4.8/5
(39)
To obtain evidence that all external users in an e-commerce system are authorised, a 'firewall' channels all network connections through a:
(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 104
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)