Please Help me!!!!!!!!!!!!!
Chapter 11 - Do Questions 3, 4, 5, 6; Read Chapter 12 - Do Questions 7, 8, 12
Please answer the questions referred to in your reading assignment for this phase. The questions will be found in your textbook. Answering these questions will give you practice with the concepts learned in this phase.
Your response should address each of the major points of each question.
For paragraph answer questions, each response should be 1â?"3 paragraphs of original information.
For paragraph answer questions, each response should include at least 1 reference to text, and all sources should be cited in APA format.
Grammar, spelling, punctuation, and format should be correct and professional.
For the questions that include problem solutions, use the following guidelines for your answers:
The final solution should be correct.
The analytical process for solving the problem should be neatly laid out, and it should be logically defined.
The number of arithmetical errors will be considered.
The Questions are attached.© BrainMass Inc. brainmass.com October 25, 2018, 2:52 am ad1c9bdddf
X-charts, R-charts were prepared for various problems.
1. The natural sign of an asset is a:
2. Internal Auditors are referred to as independent auditors.
3. The three categories for standards for auditors as set forth by GAAS are general standards, standards of fieldwork, and standards of examination.
c. Maybe so
4. Auditing is a systematic process of obtaining and evaluating evidence regarding assertions about economic actions and events to ascertain the degree of correspondence between those assertions and established criteria and communicating the results to interested users.
c. No way
5 Audit Risk can be composed of the following components shown in the following formula:
a. AR = Debit + Credit
b. AR = IR - CR - DR
c. AR = IR x CR x DR
d. AR = Credit Risk + Inherent Risk + Control Risk
5. Materiality can be defined as follows:
a. When the inverse relationship of rates fluctuates with risk.
b. The amount of error and/or omission that would affect the judgment of a reasonable person.
c. When Detection Risk can no longer be measured.
d. Fraud exists.
6. All of the following consists of Management's Assertions except for:
a. Existence or Occurrence
c. Rights & Obligations
d. Fraud not yet committed
7. All of the following are auditing procedures for verifying the Management Assertion of Existence/Occurrence:
b. Observation, inspection and examination.
c. Preparation of Audit Engagement Letter.
d. Vouching, testing of transactions.
8. Performing Cut-Off procedures is where:
a. Writing up procedures for fraud.
b. Reviewing financial transactions to see they were posted in the proper accounting period.
c. Cutting off the audit ahead of audit schedule.
9. Basic concepts for competence of evidential matter are relevance and reliability.
10. An Audit Engagement Letter is the same thing as a Management Representation Letter except for the Management Representation Letter is done at the beginning of the audit while the Audit Engagement Letter is done at the conclusion of the audit.
11. Audit tests consists of the following except:
a. Tests of controls.
b. Substantive tests
c. Preparation of financial statements.
12. There are two major audit sampling methods, statistical sampling and non-statistical sampling. Statistical sampling is where the auditors specify the sampling risk they are willing to accept and then calculate a sample size that provides the degree of reliability and results are analyzed quantitatively. In non-statistical sampling the sample size is not mathematically determined and auditors use judgment in determining samples selected with the selected samples analyzed on a judgment basis.
13. The following are all sampling methods except:
a. Random sampling
b. Systematic selection
c. Bolean nucleaic method
d. Haphazard selection
14. The following are all internal controls in an information technology environment except for:
a. Hardware and software
c. Security and access
e. Controls on system development and modification
f. Operations and data control
15. All of the following are internal controls that could be implemented in an information technology environment except for:
a. Physical access and controls
b. Segregation of duties
c. Compliance with material misstatements