Premium Essay

Audit Chapter 8 Solutions Manual

In: Business and Management

Submitted By satuliphin
Words 11678
Pages 47
Solutions for Chapter 8

Tools to Gather Audit Evidence

Review Questions:

8-1. The three main tools the auditor might use in gathering and evaluating audit evidence are:

• Audit sampling • Generalized Audit Software • Analytical procedures

8-2. Non-sampling risk is the risk that the auditor makes an improper assessment of inherent and/or control risk or did not apply audit procedures carefully. It can be minimized through: (1) Good hiring, training and supervision practices; and (2) Careful and knowledgeable review of audit documentation and audit procedures.

Sampling risk is the risk that the misstatement projections based on the sample results lead to the wrong conclusion about the population because of a non-representative sample. Sampling risk can be reduced by increasing the sample size – to the extreme of auditing the entire population therefore eliminating sampling risk altogether.

8-3. Factors to consider when choosing between statistical and nonstatistical sampling include: • Need to quantify and control sampling risks. • Additional cost of designing, selecting, and evaluating a statistical sample. • Availability of computer software to assist in designing, selecting, and/or evaluating the sample. • Ability of the audit staff to properly implement statistical sampling.

8-4. a. Tolerable deviation rate depends on the significance of the control procedure being tested and the degree of reliance the auditor wishes to place on it. The auditor, in essence, considers the effect of the failure on potential material misstatements in the financial statements. The tolerable failure rate is the rate beyond which the failure of an important control procedure could lead to material misstatements in the financial statements.

b. Expected failure rate is...

Similar Documents

Premium Essay

Intermediate Financial Accounting Chapter 1 Solution

...Chapter 1 Environment and Theoretical Structure of Financial Accounting AACSB assurance of learning standards in accounting and business education require documentation of outcomes assessment. Although schools, departments, and faculty may approach assessment and its documentation differently, one approach is to provide specific questions on exams that become the basis for assessment....

Words: 7572 - Pages: 31

Premium Essay

Solution

...20 Solutions Manual for Taxation for Decision Makers Solutions to Chapter 2 Problem Assignments Check Your Understanding 1. Tax Planning vs. Compliance Distinguish tax planning from tax compliance. Solution: Tax compliance involves the gathering of relevant information, evaluating and classifying that information, filing tax returns, and representing clients at Internal Revenue Service audits. Tax planning is the process of evaluating the tax consequences associated with a transaction and making recommendations to achieve the desired objective at minimal tax cost. It generally involves extensive tax research. 2. Tax vs. Nontax Factors For each of the following independent situations, identify whether the item would be primarily a tax or a nontax factor in performing tax planning. a. The taxpayer lost a quarter of her net worth when the dot-com bubble burst and does not want to own any investments with risk such as stock. b. The taxpayer hates to pay any federal income taxes and would rather pay an equal amount of money to an accountant or attorney than pay taxes to the federal government. c. The taxpayer has a large capital loss carryforward from last year. Solution: a. This is primarily a nontax factor situation. The taxpayer has specified that he or she is risk averse, a personal choice, due to having experienced prior losses. b....

Words: 9117 - Pages: 37

Premium Essay

Cloud Computing

...Compliments of on IBM Limited Editi ose, Consolidate Cl & Report Learn to: • Distinguish between the closing, consolidating, and financial reporting processes • Use integration and automation to ensure data integrity and streamline CCR activities • Identify the right CCR solution for your organization Maire Loughran These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited. Close, Consolidate & Report FOR DUMmIES by Maire Loughran ‰ IBM LIMITED EDITION These materials are the copyright of Wiley Publishing, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited. Close, Consolidate & Report For Dummies® IBM Limited Edition , Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher....

Words: 5922 - Pages: 24

Premium Essay

Internal Control

...CHAPTER 3 Auditors’ Ethical and Legal Responsibilities SOLUTIONS FOR REVIEW CHECKPOINTS 3.1 This arises from the three party accountability discussed in chapter 1. The auditor is hired because users expect there may be such a conflict. If users completely trusted management there would be no need to have an auditor. This is the only way to detect fraudulent or misleading reporting. The logic is to reduce this potential to an acceptable level of risk. If the auditor assumed this risk was zero to start with the auditor would not need to provide evidence that the possibility is low, and that contradicts the reason users demand an audit. 3-2 No, the auditor cannot detect deception without being skeptical. A non-skeptical auditor on finding evidence of fraud may not treat it with the significance it deserves. The rule that suspicious transactions or evidence of management deceit should automatically be considered material, even when the absolute amounts involved may be very small or insignificant, is an example of skeptical logic in action....

Words: 5626 - Pages: 23

Premium Essay

Case Application Pinnacle Manufacturing

...Auditing pinnacle case answers - free eBooks Auditing pinnacle case answers download on Caa2011-2.org free books and manuals search Banbury Impex Case Study http://www.caa2011-2.org/auditing-pinnacle-case-answers/ Pinnacle manufacturing auditing case solution Pinnacle manufacturing auditing case solution download on iubmb-2013-3.org free books and manuals search - CHAPTER 8 8 40 PINNACLE MANUFACTURING SOLUTION http://www.iubmb-2013-3.org/pinnacle-manufacturing-auditing-case-solution/ Pinnacle manufacturing case solution - free Pinnacle manufacturing case solution download on iubmb-2013-3.org free books and manuals search - TIVO HARVARD CASE SOLUTION http://www.iubmb-2013-3.org/pinnacle-manufacturing-case-solution/ Auditing Class Case Study Pinnacle Manufacturing Latest Auditing Class Case Study Pinnacle Manufacturing Solutions Chapter 16 into habitats baystat240 owner manual bendix ws 20 california tax http://www.platformusers.net/rt/auditing-class-case-study-pinnacle-manufacturing-solutions-chapter-16/ Solution For Pinnacle...

Words: 940 - Pages: 4

Premium Essay

Adms

...(Referred to as “Audit Text” in the Readings List) References for the 12th Canadian edition of the Audit text (as an alternative to the 11th edition) will be provided separately as a document on the course web site. Warnings: Photocopying more than 10% of a textbook is illegal, and may involve penalties. Do not duplicate textbooks or obtain these photocopies. Students are reminded of York University’s policy regarding academic dishonesty as outline in the York...

Words: 3433 - Pages: 14

Premium Essay

Auditing

...The accountant need not, and frequently does not, understand what auditors do, unless he or she is involved in doing audits, or has been trained as an auditor. 2-2 Solutions Manual - Principles of Auditing and Other Assurance Services 3. Audits of Financial Statements Compliance Audits Operational Audits Purpose To determine whether the financial statements are presented in accordance with GAAP. To determine whether the client is following specific procedures set by higher authority. Users of...

Words: 2252 - Pages: 10

Premium Essay

Audit

...Successful completion of this course will provide you with a basic understanding of: * The auditor's consideration of financial statement cycles, * The evaluation of audit evidence, and * The issues related to completing an audit. Honor Code: Each student is expected to behave in a manner that brings honor to himself or herself, to the student body, and to the university community. In keeping with this expectation, students should be familiar with requirements of the Honor System Constitution. All class assignments are expected to be your original work. You are not permitted to use solutions manuals, solutions from prior semester materials, or another student’s materials in completing assignments. All university policies regarding cheating, plagiarism, falsification, nonattendance, and illnesses will be strictly applied and enforced in this course. The Honor Code will be strictly enforced in this course and all aspects of your coursework are covered by Honor System. All assignments submitted to the instructor shall be...

Words: 1594 - Pages: 7

Premium Essay

Buisness and Management

...CHAPTER 14 Managerial Accounting ASSIGNMENT CLASSIFICATION TABLE Brief Exercises 1 A Problems B Problems Study Objectives *1. Explain the distinguishing features of managerial accounting. Identify the three broad functions of management. Define the three classes of manufacturing costs. Distinguish between product and period costs. Explain the difference between a merchandising and a manufacturing income statement. Indicate how cost of goods manufactured is determined. Explain the difference between a merchandising and a manufacturing balance sheet. Identify trends in managerial accounting. Prepare a worksheet and closing entries for a manufacturing company. Questions 1, 2, 3 Do It! 1 Exercises 1 *2. 4, 5, 6, 7, 8 11, 12 2, 3 1 *3. 4, 5, 7 2 2, 3, 4, 5, 6 3, 4, 5, 7, 13 8, 12, 13, 14, 15, 17 1A, 2A 1B, 2B *4. 13 6 2 1A, 2A 1B, 2B *5. 9, 14 3A, 4A, 5A 3B, 4B, 5B *6. 15, 16, 17, 18 8, 10, 11 3 8, 9, 10, 11, 12, 13, 14, 15, 16, 17 14, 15, 16, 17 3A, 4A, 5A 3B, 4B, 5B *7. 10, 19, 20, 21 9 3A, 4A 3B, 4B *8. 22, 23, 24 25, 26 27, 28, 29 12 4 18 *9. 19 6A *Note: All asterisked Questions, Exercises, and Problems relate to material contained in the appendix to the chapter. Copyright © 2011 John Wiley & Sons, Inc....

Words: 10435 - Pages: 42

Premium Essay

Paper

...Claudine Perez ACC 340 Final Examination 1. The essential steps in performing a systems study are (in order of occurrence): a) Analysis, design, implementation and initial operation, follow-up b) Design, planning, follow-up, analysis, and implementation c) Planning, system specification, analysis, production, implementation d) Planning, analysis, design, implementation, and follow-up 2. Which of the following is intended to solve the problem that financial data used in one application is not easily transferable to other applications? a) XMP b) ERP c) XBRL d) XMLP 3. Information systems auditors are: a) Auditors who are concerned with analyzing risks associated with computerized information systems b) Individuals who often work closely with financial auditors c) Auditors who have a lot of technical expertise related to information technology d) all of the above 4. Which of the following is not an ability of client/server computing? a) Alter data stored elsewhere on the network b) Process a transaction that may affect data stored on both client and server computers c) Query or manipulate the warehoused data on the server d) Increased networking capabilities between different file formats on multiple systems 5. Software that enables businesses and government agencies to transmit and manipulate financial......

Words: 2281 - Pages: 10

Premium Essay

Consumer Buying Behaviour in Fairnesscreem

...| ------------------------------------------------- Top of Form | | | | Language | | | | ------------------------------------------------- Top of Form |   Bottom of Form |    | | | | | * Tenders * Downloads * Income Tax Returns * Wealth Tax Return * Forms * Challans * International Taxation * Non Residents * Foreign Companies * Advance Rulings * Transfer Pricing * DTAA * Comprehensive agreements * Limited agreements * Other Agreements * Tax Information Exchange Agreement (TIEA) * Witholding Tax * Tax Law and Rules * Acts * Income Tax Act * Wealth Tax Act * Gift Tax Act * Expenditure Tax Act * Interest Tax Act * Finance Acts * Rules * Income Tax Rules * Wealth Tax Rules * Gift Tax Rules * Expenditure Tax Rules * Interest Tax Rules * Advance Ruling * ITAT Rules * Settlement Commission Rules * Circulars * Notifications * About Us * History of Direct Taxation * Vision, Mission, Values * Organisation and Functions * CBDT * Directorate Generals * Administration * Legal & Research * Systems * Vigilance * NADT * Exemptions * HRD * International Taxation...

Words: 12280 - Pages: 50

Premium Essay

Ch1 of Tax Business

...May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1-2 2012 Corporations Volume/Solutions Manual Status: Present Edition New Modified New New New New Modified Modified Unchanged Unchanged New Modified Modified Unchanged New Modified Modified New Unchanged Unchanged Unchanged New Modified Unchanged New...

Words: 6008 - Pages: 25

Premium Essay

Accounting Information Systems: Course Objectives, Description, Topics, and Assignments

...The concept of a paper trail has become a bit of a misnomer; today, because of accounting information systems, there is often no paper involved at all; however, it is important to establish the flow the data in different areas of the organization, or audit trail, so as to properly exercise internal controls. AISs help in this purpose. At the outset of this course, you will learn the basics of accounting information systems and business processes. Next, you will learn about database management systems, and the design of various database models. Finally, you will learn about how to use internal controls effectively for risk management, as well as the requirements for business reporting. After completing this course, you should not only have a clear idea of how accounting information systems work, but you should also be prepared to design and configure them to meet the record-keeping and risk management requirements of the organization. In addition, you will be prepared to design them to meet legal obligations—such as those defined in the United States’ Sarbanes-Oxley Act of 2002—as well as ethical obligations. LEARNING OUTCOMES: A. Develop a conceptual knowledge of the nature and functionality of an accounting information system and systems in general (Module 1). B. Explain how an accounting system captures business events,...

Words: 6838 - Pages: 28

Premium Essay

Chapter 6 Internal Control in a Financial Statement Audit

...CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT Answers to Review Questions 6-1 From management's perspective, the internal control provides a way to meet its stewardship or agency responsibilities. Management also needs a control system that generates reliable information for decision-making purposes. The importance of internal control to the auditor is rooted in the second standard of fieldwork. The controls that are relevant to the entity's ability to initiate, record, process, and report financial data consistent with management's assertions are the auditor's main concern. The auditor needs assurances about the reliability of the data generated within the entity's internal control system in terms of how it affects the fairness of the financial statements and how well the assets and records of the entity are safeguarded. 6-2 The potential benefits and risks to an entity’s internal control from information technology include (see Table 6-1): Benefits: • Consistent application of predefined business rules and performance of complex calculations in processing large volumes of transactions or data. • Enhancement of the timeliness, availability, and accuracy of information. • Facilitation of additional analysis of information. • Enhancement of the ability to monitor the performance of the entity's activities and its policies and procedures. • Reduction in the risk that controls will be circumvented....

Words: 3770 - Pages: 16

Premium Essay

Vulnerability-Assessment

...285_NSS_01.qxd 8/10/04 10:40 AM Page 1 Chapter 1 Vulnerability Assessment Solutions in this Chapter: I What Is a Vulnerability Assessment? I Automated Assessments I Two Approaches I Realistic Expectations Summary Solutions Fast Track Frequently Asked Questions 1 285_NSS_01.qxd 2 8/10/04 10:40 AM Page 2 Chapter 1 • Vulnerability Assessment Introduction In the war zone that is the modern Internet, manually reviewing each networked system for security flaws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack. Each technical advance brings wave after wave of security holes. A new protocol might result in dozens of actual implementations, each of which could contain exploitable programming errors. Logic errors, vendor-installed backdoors, and default configurations plague everything from modern operating systems to the simplest print server.Yesterday’s viruses seem positively tame compared to the highly optimized Internet worms that continuously assault every system attached to the global Internet. To combat these attacks, a network administrator needs the appropriate tools and knowledge to identify vulnerable systems and resolve their security problems before they can be exploited....

Words: 9203 - Pages: 37