Burke AUD Module IV

Card Set Information

Burke AUD Module IV
2011-02-28 22:57:02
Burke AUD Module IV

AUD Module IV
Show Answers:

  1. an advantage of using systems flow charts to documentinformation about internal control considered using internal control questionnaires is that systems flow charts
    provide a visual depiction of clients activities
  2. a flowchart is most frequently used by and auditor in connection with the
    review of the clients internal control
  3. Matthews Corp. as change from a system of recording time worked on the clock cards to a computerized payroll system in which employees record time in and out with magnetic cards. The computer system automatically updates all payroll records. Because of this change
    part of the audit trail is altered
  4. which of the following is correct concerning batch processing of transactions
    is more likely to result in an easy-to-follow audit trail than is online transaction processing
  5. and auditor would be most likely to assist control risk at the maximum level an electronic environment with automated system generated information when
    fixed asset transactions are few in number, but large in dollar amount
  6. in a highly automated information processing system tests of control
    may be required in some circumstances
  7. which of the following is least likely to be considered by an auditor considering engagement of an information technology specialist on an audit
    requirements to assess going concern status
  8. which of the following strategies would a see PA most likely considering auditing an entity that processes most of its financial data only in electronic form, such as a paperless system
    continuous monitoring and analysis of transaction processing within embedded audit module
  9. which of the following is not a major reason for maintaining an audit trail for a computer system
    analytical procedures
  10. computer systems are typically supported by a variety of utility software packages that are important to when auditor because they
    may enable unauthorized changes to data files if not properly controlled
  11. and auditor would most likely be concerned with which of the following controls in a distributed data processing system
    access controls
  12. which of the following types of evidence would in auditor most likely examined to determine whether internal control is operating as designed
    client records documenting the use of computer programs
  13. in auditor anticipates assessing control risk at a low level and a computerized environment. Under these circumstances, on which of the following activities with the auditor initially focus
    general control activities
  14. after the preliminary phase of the review of a client computer controls, and auditor may decide not to form tests of controls related to the controls within the computer portion on the clients internal control. Which of the following would not be a valid reason for choosing to admit such tests
    the controls appear adequate
  15. auditing by testing the input and output of the computer system instead of the computer program itself will
    not detect program areas which do not show up in the output sample
  16. which of the following client information technology systems generally can be audited without examining or directly testing the IT computer programs of the system
    system that performs relatively uncomplicated processes and produces detailed output
  17. in auditor wishes to capture and entities data as transactions are processed in continuously test the entities computerized information system most likely would use which of the following techniques
    embedded audit module
  18. which of the following computer-assisted auditing techniques processes client input data on a controlled program under the auditors control to test controls in the computer system
    parallel simulation
  19. to obtain evidence that online access controls are properly functioning, and auditor most likely would
    enter invalid identification numbers or passwords to ascertain whether the system rejects them
  20. and auditor most likely would introduce test data into a computerized payroll system to test controls related to the
    discovery of invalid employee ID numbers
  21. when in auditor test a computerized accounting system, which of the following is true of the test data approach
    test data are processed by the clients computer programs under the auditors control
  22. which of the following is not among the errors that and auditor might include in the test data when auditing a client computer system
    numeric characters in alphanumeric fields
  23. which of the following computer-assisted auditing techniques allows fictitious in real transactions to be processed together without client operating personnel being aware of the testing process
    integrated test facility
  24. which of the following methods of testing application controls utilizes a generalized audit software package prepared by the auditors
    parallel simulation
  25. in creating leads schedules for an audit engagement, A CPA often uses automated workpaper software. What client information is needed to begin this process
    general ledger information such as account numbers, prior year account balances, and current year unadjusted information
  26. using microcomputers in auditing may affect the methods used to review the work of staff assistance because
    working paper documentation may not contain readily observable details of calculations
  27. in auditor would least likely use computer software to
    assess computer control risk
  28. a primary advantage of using generalized audit software packages to audit the financial statements of the client that uses a computer system is that the auditor may
    access information stored on computer files while having limited understanding of the clients hardware and software features
  29. auditors often make use of computer programs that perform routine processing functions such as sorting and merging. These programs are made available by electronic data processing companies and others and are specifically referred to as
    utility programs press
  30. Smith Corporation has numerous customers. A customer file is kept on disk storage. Each customer file contains name, address, credit limit, and account balance. The auditor wishes to test is filed to determine whether credit limits are being exceeded. The best procedure for the auditor to follow would be to
    develop a program to compare credit limits with account balances and print out the details of any account with the balance exceeding its credit limit
  31. in auditor most likely would tests for the presence of unauthorized computer program changes by running a
    source code comparison program
  32. in entity has the following invoices in a batch invoice number, product, quantity, unit price

    invoice numbers are 201, 202, 203, 204. Data in a 4 x 3 matrix exists on the other three columns.

    Which of the following numbers represents the record count