Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Match each term to the phrase that describes it. . Enter the capital letter that corresponds to the correct answer. 1. The possibility that a

Match each term to the phrase that describes it. . Enter the capital letter that corresponds to the correct answer.

1. The possibility that a material error will occur even though the auditors are following proper audit procedures and using good judgment.

2. Evidence collection method that provides an understanding of how a particular accounting or internal control system is supposed to function.

3. Type of risk that cannot be avoided.

4. Determining why, how, when and by whom the audit will be performed.

5. Involves reperformance of procedures, audit sampling, and analytical reviews.

6. The likelihood that the control structure is flawed.

7. Evidence collection method that considers the relationships and trends among information to detect items to investigate further.

8. Evidence collection method that involves obtaining information from a third party

9. Evidence collection method that examines all supporting documents in order to determine the validity of a transaction

10. Where the findings and conclusions of an audit are documented

11. Documents the control procedures applied to each field of an input record.

12. Requires creation of fictitious vendors, employees, etc., in a companys databases.

13. Flagged transactions are automatically displayed on an auditors monitor.

14. Using a verified copy of a program to analyze results and compare the output to the companys output.

15. Uses the auditors created program to process clients data and compare results.

16. An audit technique that provides a computer audit trail of all relevant processing steps applied to a specific transaction.

17. Identifies unexecuted program code.

18. A listing of transactions electronically collected during an audit.

19. Audit routines that flag suspicious transactions.

20. Computer assisted audit technique particularly suited for examining large data files to identify records in need of further scrutiny.

A. Analytical Review
B. Audit Control Language
C. Audit hooks
D. Audit log
E. Audit planning
F. Collection of audit evidence
G. Confirmation
H. Control Risk
I.Detection Risk
J. Inherent Risk
K. Input Control Matrix
L. Integrated Test Facility
N. Parallel Simulation
O. Questionnaires
P. Real-time Notification
Q. Reprocessing
R. Review of Documentation
S. Snapshot
T.Test Data Generator
U.Tracing
M.Mapping
V.Vouching
W.Working Papers

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing Security And Controls Of Windows Active Directory Domains

Authors: Derek Melber

1st Edition

0894135635, 978-0894135637

More Books

Students also viewed these Accounting questions

Question

7-16 Compare Web 2.0 and Web 3.0.

Answered: 1 week ago