Refer to Exhibit and identify the nine types of audit procedures. Assume that you are planning the
Question:
Refer to Exhibit and identify the nine types of audit procedures. Assume that you are planning the audit of the PageDoc Company’s inventory. PageDoc manufactures a variety of office equipment. Describe how each of the nine procedures could be used in the audit of inventory and identify the related assertion(s) the procedure is designed to test.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 72% (18 reviews)
Procedure How Used examples Assertion s Tested 1 Observation Observe client personnel taking a physi...View the full answer
Answered By
PALASH JHANWAR
I am a Chartered Accountant with AIR 45 in CA - IPCC. I am a Merit Holder ( B.Com ). The following is my educational details.
PLEASE ACCESS MY RESUME FROM THE FOLLOWING LINK: https://drive.google.com/file/d/1hYR1uch-ff6MRC_cDB07K6VqY9kQ3SFL/view?usp=sharing
3.80+
3+ Reviews
10+ Question Solved
Related Book For
Auditing a risk based approach to conducting a quality audit
ISBN: 978-1133939153
9th edition
Authors: Karla Johnstone, Audrey Gramling, Larry Rittenberg
Question Posted:
Students also viewed these Auditing questions
-
Assume that you are planning to test a client's reconciliation. You could test by either inspecting documentation of the reconciliation or by reperforming the reconciliation. What factors would cause...
-
Assume that you are planning to purchase a 50-inch plasma television. In groups of three or four, determine the lowest cost for the television, considering the available alternatives and the...
-
Assume that you are planning to purchase a Samsung LED-LCD, 55 inch television. In groups of three or four, determine the lowest cost for the television, considering the available alternatives and...
-
One type of systematic error arises because people tend to think of benefits in percentage terms rather than in absolute dollar amounts. As an example, Samir is willing to drive 20 minutes out of his...
-
A rigid 10-L vessel initially contains a mixture of liquid water and vapor at 100oC with 12.3 percent quality. The mixture is then heated until its temperature is 150oC. Calculate the heat transfer...
-
Consider a society where people throw garbage on the streets. A person who does so inflicts negative externalities on others: suppose that the (psychic) dollar cost to any one person is an, where a >...
-
Use the data in Assignment Problem 16 to calculate a 95% confidence interval for the correlation between attachment and green-space area. Data from problem 16 In an increasingly urban world, are...
-
Past records indicate that the probability of online retail orders that turn out to be fraudulent is 0.08. Suppose that, on a given day, 20 online retail orders are placed. Assume that the number of...
-
Consider the following piece of C code running on UNIX: void main() { int pid fork (); if (pid == 0) fork(); pid fork(); if (pid != 0); fork (); exit(0); How many child processes are created when...
-
Entries into T accounts and Trial Balance Marjorie Knaus, an architect, organized Knaus Architects on January 1, 20Y4. During the month, Knaus Architects completed the following transactions: a....
-
Discuss the relative reliability of internal and external documentation. Give two examples of each type of documentation.
-
Refer to Exhibit 6.5 to identify the nine types of audit procedures used as part of the audit evidence-gathering process. Following is a list of audit procedures performed. For each procedure (listed...
-
Based on the American Chemical Society, there is a 0.9 probability that in the United States, a randomly selected dollar bill is tainted with traces of cocaine. Assume that eight dollar bills are...
-
4. Suppose we have 220 bytes of virtual memory and 26 bytes of physical main memory. Suppose the page size is 28 bytes. a. How many pages are there in the virtual memory? b. How many page frames are...
-
In the HTTP request message as the following, the Accept-charset line means GET /index.html HTTP/1.1 , Host: www-net.cs.umass.edu Firefox/3.6.10 User-Agent: Accept: text/html, application/xhtml+xml...
-
a. Consider the following hash function. Messages are in the form of a sequence of numbers in Zn, M (a1, a2, = at). The hash value h is calculated for some predefined value n. Does this hash as ......
-
With the network 129.25.0.0, design a new network to accommodate at least 21 subnets. Answer the following questions and show your work /calculation 1. Determine the # of borrowed host bits to...
-
What is a port in networking ? a. It is a logical number that helps to identify and map between the different network applications/services that are running on a machine. b. USB is an example of a...
-
Research a firm whose goods or services you purchase or admire. Learn what you can about the organizations culture. Would you be an effective manager in this culture? Why or why not? Share your...
-
The overall reaction and equilibrium constant value for a hydrogenoxygen fuel cell at 298 K is 2H 2 (g) + O 2 (g) 2H 2 O(l) K = 1.28 10 83 a. Calculate E cell and G 8 at 298 K for the fuel cell...
-
Adjusting entries have been utilized to improperly manage earnings. Required a. Identify two types of "routine" adjusting entries and two types of non-routine adjusting entries that might be made...
-
For context, the auditor is assigned to analyze and test the controls related to purchasing, including inventory items as well as items that are expensed. There are three purchasing agents for a...
-
One of the fundamental changes that occurred upon passage of the Sarbanes-Oxley Act of 2002 is that the audit profession is no longer allowed to be self-regulatory. Now, the Public Company Accounting...
-
Organize U provides inventory services to corporate clients. In March, Warehouse A, used the services of Organize U to organize outdated inventory. Organize U assigned the number A101 to this job....
-
If Capital has been credited, it is likely that A) services were provided to a cash customer. B) the owner made an investment. C) services were provided to a charge customer. D) All of these are...
-
Information Privacy PRIVACY -- when we talk about ethical issues and problems that come up because of new technologies, privacy is often a topic that is at the center of attention! - what privacy is...
Study smarter with the SolutionInn App