Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

need help with he following explain Question 6 4 pts The assertions of management related to financial statements include (1) the existence of assets and

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

need help with he following explain

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
Question 6 4 pts The assertions of management related to financial statements include (1) the existence of assets and transactions, (2) the completeness of the transactions reflected in the financial statements and related notes, (3) proper disclosure of all rights and obligations associated with assets and liabilities, (4) the reasonableness of the valuation of transactions and balances reflected in the financial statements, and (5) O Proper financial statement presentation and disclosure of the related notes O Certification of responsibility for the internal control environment O Formal attestation of any incidents of known fraud since prior audit O Internal auditor statement that they have not been coerced into overriding controlsElectronic evidence refers to any evidence captured 0 With the assistance of IT or MIS professionals working in collaboration with investigators 0 By examining the unused space on computer hard drives (assuming les have not been lost due to defragging) 0 Through the use of digital tools such as Road MASSter 3 and EnCase 0 By computers and electronic devices \fStudents (of forensic accounting and fraud examination) should understand that, with regard to digital evidence, only those with specialized training, experience, and appropriate professional certications should 0 Be involved in establishing materiality thresholds for IT audits 0 Use CAATTs to do \"black box\" or \"white box\" investigations 0 Initially handle digital evidence 0 Provide expert testimony Question 9 4 pts It may be possible to recover deleted emails if Q A program such as Privacy Guardian was used by the perpetrator O The service provider is named in the warrant (e.g., Google for gmail) 0 An MIS or IT professional uses the \"Defrag\" command while the computer is in safe mode 0 An email recovery tool is used prior to com paction/overwrite of data storage location Fraud examiners and auditors use data analysis software as , detecting a potential fraud in situations for which manual examination would prove extremely difficult or impossible. O A substitute for paper and pencil computations for O An internal control useful for O The ultimate system of red flags O Supplements to analytical work in

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction to Managerial Accounting

Authors: Peter C. Brewer, Ray H. Garrison, Eric Noreen, Suresh Kalagnanam, Ganesh Vaidyanathan

5th Canadian edition

77429494, 1259105709, 1260480798, 978-1259105708

More Books

Students also viewed these Accounting questions

Question

kindly solve python syntax error

Answered: 1 week ago