![Accounting Information Systems 9th Edition](https://www.bartleby.com/isbn_cover_images/9781305756700/9781305756700_smallCoverImage.jpg)
Accounting Information Systems 9th Edition
9th Edition
ISBN: 9781305756700
Author: Hall
Publisher: CENGAGE C
expand_more
expand_more
format_list_bulleted
Question
Chapter 15, Problem 10MCQ
To determine
Identify the statement which is not true regarding the SSAE 16 report.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
The Information Systems Audit and Control Association (ISACA) developed guidelines and procedures on how to follow the standards that apply specifically to the specialized nature of the IS Audit. The guidelines serve as guidance the IS auditor should normally follow. However, there may be situations where the auditor will not follow that guidance. In this case, what happens now to the work done by the IS auditor?
If a firm decides early to go with a special-purpose system, such as SAP, based upon the recommendations of the external audit firm, should the SDLC be bypassed?
1.) The Information Systems Audit and Control Association (ISACA) developed guidelines and procedures on how to follow the standards that apply specifically to the specialized nature of the IS Audit. The guidelines serve as guidance the IS auditor should normally follow. However, there may be situations where the auditor will not follow that guidance. In this case, what happens now to the work done by the IS auditor?
2.) Audits are conducted for various reasons. It can help an organization ensure effective operations, affirm its compliance with various regulations, and confirm that the business is functioning well and is prepared to meet potential challenges. There are three typical phases in an Audit, explain each phase and its relation to the other.
Chapter 15 Solutions
Accounting Information Systems 9th Edition
Ch. 15 - Prob. 1RQCh. 15 - Prob. 2RQCh. 15 - Prob. 3RQCh. 15 - Prob. 4RQCh. 15 - Prob. 5RQCh. 15 - Prob. 6RQCh. 15 - Prob. 7RQCh. 15 - Prob. 8RQCh. 15 - Prob. 9RQCh. 15 - Prob. 10RQ
Ch. 15 - What are the three primary IT functions that must...Ch. 15 - Prob. 12RQCh. 15 - Prob. 13RQCh. 15 - What are the primary reasons for separating...Ch. 15 - Prob. 15RQCh. 15 - Prob. 16RQCh. 15 - Prob. 17RQCh. 15 - Prob. 18RQCh. 15 - Prob. 19RQCh. 15 - Prob. 20RQCh. 15 - Prob. 21RQCh. 15 - Prob. 22RQCh. 15 - Prob. 23RQCh. 15 - Prob. 24RQCh. 15 - Prob. 25RQCh. 15 - Prob. 26RQCh. 15 - Prob. 27RQCh. 15 - Prob. 28RQCh. 15 - Prob. 29RQCh. 15 - Prob. 30RQCh. 15 - Prob. 31RQCh. 15 - Prob. 32RQCh. 15 - Distinguish between errors and irregularities....Ch. 15 - Prob. 34RQCh. 15 - Prob. 35RQCh. 15 - Prob. 36RQCh. 15 - Prob. 37RQCh. 15 - Prob. 38RQCh. 15 - Prob. 39RQCh. 15 - Define commodity IT asset.Ch. 15 - Prob. 41RQCh. 15 - Prob. 42RQCh. 15 - Prob. 1DQCh. 15 - Prob. 2DQCh. 15 - Prob. 3DQCh. 15 - Prob. 4DQCh. 15 - Prob. 5DQCh. 15 - Prob. 6DQCh. 15 - Prob. 7DQCh. 15 - Prob. 8DQCh. 15 - Prob. 9DQCh. 15 - Prob. 10DQCh. 15 - Prob. 11DQCh. 15 - Who should determine and prioritize the critical...Ch. 15 - Prob. 13DQCh. 15 - Define the management assertions of existence or...Ch. 15 - Prob. 15DQCh. 15 - Prob. 16DQCh. 15 - Prob. 17DQCh. 15 - Prob. 18DQCh. 15 - Prob. 19DQCh. 15 - Prob. 20DQCh. 15 - Prob. 21DQCh. 15 - Prob. 22DQCh. 15 - Prob. 23DQCh. 15 - Explain how IT outsourcing can lead to loss of...Ch. 15 - Prob. 25DQCh. 15 - Prob. 26DQCh. 15 - Prob. 27DQCh. 15 - Prob. 1MCQCh. 15 - Prob. 2MCQCh. 15 - Prob. 3MCQCh. 15 - Prob. 4MCQCh. 15 - Prob. 5MCQCh. 15 - Prob. 6MCQCh. 15 - Prob. 7MCQCh. 15 - Prob. 8MCQCh. 15 - Prob. 9MCQCh. 15 - Prob. 10MCQCh. 15 - Prob. 1PCh. 15 - Prob. 2PCh. 15 - Prob. 3PCh. 15 - Prob. 4PCh. 15 - Prob. 5PCh. 15 - Prob. 6PCh. 15 - Prob. 8PCh. 15 - DISASTER RECOVERY PLAN Hexagon is an online...Ch. 15 - Prob. 10PCh. 15 - Prob. 11PCh. 15 - Prob. 12PCh. 15 - Prob. 13P
Knowledge Booster
Similar questions
- Which of the following are common issues with benchmarking tool used by internal auditors? Benchmarking need face-to-face contact or discussion with other organizations O Benchmarking information is often proprietary and organizations are reluctant to share it with other organizations. Benchmarking can show areas of excellence within the organization but internal audits should focus on exception-based reporting O Typical metrics used in benchmarking are time, quality, and costarrow_forward1.) The Information Systems Audit and Control Association (ISACA) developed guidelines and procedures on how to follow the standards that apply specifically to the specialized nature of the IS Audit. The guidelines serve as guidance the IS auditor should normally follow. However, there may be situations where the auditor will not follow that guidance. In this case, what happens now to the work done by the IS auditor? 2.) Audits are conducted for various reasons. It can help an organization ensure effective operations, affirm its compliance with various regulations, and confirm that the business is functioning well and is prepared to meet potential challenges. There are three typical phases in an Audit, explain each phase and its relation to the other. 3.) Every organization has controls in place. Such controls must be effective. They are effective if they prevent, detect, or contain incidents and enable recovery from events that cause risks. Enumerate those three types of control…arrow_forwardWhich of the following statements is most accurate? a. ERP systems are commercial software packages that are sometimes called turnkey systems because they can be implemented by the user with little or no modification. b. Substantive tests provide evidence focused on the system controls. c. Public accounting firms that provide attest services are not allowed under SOX to offer IT advisory services. d. Both small and large firms that have standardized information needs are potential customers for commercial software. e. External auditors may rely on the work of internal auditors only if they report to the controller or the CEO of the client company.arrow_forward
- a. Why do you think it is so difficult to find an actual report?b. If you found an auditor’s report, were any deficiencies noted? If so, what were they?c. Why would a service organization publicize the results of its auditor’s report?arrow_forward23. Which of the following are common issues with benchmarking tool used by internal auditors? Group of answer choices Benchmarking information is often proprietary and organizations are reluctant to share it with other organizations. Benchmarking need face-to-face contact or discussion with other organizations Benchmarking can show areas of excellence within the organization but internal audits should focus on exception-based reporting Typical metrics used in benchmarking are time, quality, and costarrow_forwardExplain why it is important for audit documentation to include each of the following: identification of the name of the client, period covered, description of the contents, initials of the preparer and the reviewer, dates of the preparation and review, and an index code. (If an input field is not used in the table, leave the input field empty; do not select a label.) In audit documents Name of the client Period covered Description of the contents Initials of the preparer Date of preparation Index code Why is it important?arrow_forward
- Which of the following is not a function or benefit of a checklist? Providing evidence of audit planning Reducing workload for the auditee Reducing risk of auditor bias Maintaining the audit pace and continuityarrow_forwardWhen an auditor tests the internal controls of a computerized accounting system, which of the following is true of the test data approach? A. Test data are coded to a dummy subsidiary so they can be extracted from the system under actual operating conditions. B. Test data programs need NOT be tailor-made by the auditor for each client's computer applications. C. Test data programs usually consist of all possible valid and invalid conditions reguarding compliance with internal controls. D. Test data are processed with the client's computer and the results are compared with the auditor's predetermined results.arrow_forwardWhich of the following activities should the internal audit function NOT be involved in?a. Monitoring of management's performanceb. Reviewing adequacy of management information for decision-making purposesc. Taking responsibility for the implementation of a new sales ledger systemd. Assessing compliance with regulation Internal auditors may not perform:a. Audits of financial statements resulting in reports intended for management’s use only.b. Integrated audits leading to an audit opinion issued in accordance with PCAOB standards.c. Forensic audits.d. All of the above. An “integrated audit”, as required by Sarbanes-Oxley Act for U.S. public companies,includes an audit ofa. The company’s internal controlsb. The company’s financial statementsc. The company’s compliance with its rules and policiesd. Both A and B The auditor’s opinions on the effectiveness of internal control over financial reporting (ICFR) in anintegrated audit in accordance with PCAOB AS include the following types…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Business/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619455/9781337619455_smallCoverImage.gif)
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305080577/9781305080577_smallCoverImage.gif)
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage