(AUDI) Quizzer #4
(AUDI) Quizzer #4
____ 31. Before reaching a final decision on the opinion to be issued, a conference generally is held with the client.
At this meeting, all of the following may be expected, except:
a. an oral report of the auditor’s major findings.
b. the auditor’s rationale for proposed adjustments or additional disclosures.
c. an agreement between the auditor and the client on the changes to be made in the financial
statements.
d. the delivery of the management letter.
____ 32. When a higher than normal ratio of long-term debt to net worth is coupled with a lower than average ratio of
profits to total assets, the company
a. is highly successful. c. has a high risk of financial failure.
b. is comparable with industry standards. d. has a liquidity problem.
____ 33. Which of the following income statement accounts is least likely to be subject to extensive detailed tests of
balances?
a. Legal and professional fees c. Cost of sales
b. Contributions d. Officers’ salaries
____ 34. An auditor is concerned with completing various phases of the audit after the balance sheet date. This
subsequent period extends to the date of the
a. Delivery of the auditor's report to the client.
b. Auditor's report.
c. Final review of the audit Working papers.
d. Public issuance of the financial statements.
____ 35. The written representations shall be in the form of a representation letter addressed to the
a. Entity's management c. Entity's chief executive officer
b. Auditor d. Entity's chief financial officer
____ 36. Which of the following is not an advantage of a computerized accounting system?
a. Computers process transactions uniformly.
b. Computers help alleviate human errors.
c. Computers can process many transactions quickly.
d. Computers leave a thorough audit trail which can be easily followed.
____ 37. Which of the following would result to an ineffective control in a computer-based information system?
a. The computer librarian maintains custody of computer program instructions and detailed
listings.
b. Computer operators have access to operator instructions and detailed program listings.
c. The control group is solely responsible for the distribution of all computer output.
d. Computer programmers write and debug programs which perform routines designed by
the systems analyst.
____ 38. All activities related to a particular application in a manual system are recorded in a journal. The name of the
corresponding item in a computerized system is a
a. master file. c. year-to-date file.
b. transaction file. d. current balance file.
____ 39. Unauthorized alteration of on-line records can be prevented by employing:
a. Key verification. c. Computer matching.
b. Computer sequence checks. d. Data base access controls.
____ 40. Given the increasing use of microcomputers as a means for accessing data bases, along with on-line real-time
processing, companies face a serious challenge relating to data security. Which of the following is not an
appropriate means for meeting this challenge?
a. Institute a policy of strict identification and password controls housed in the computer
software that permit only specified individuals to access the computer files and perform a
given function.
b. Limit terminals to perform only certain transactions.
c. Program software to produce a log of transactions showing date, time, type of transaction,
and operator.
d. Prohibit the networking of microcomputers and do not permit users to access centralized
data bases.
____ 41. Generalized audit software is of primary interest to the auditor in terms of its capability to
a. Access information stored on computer files.
b. Select a sample of items for testing.
c. Evaluate sample test results.
d. Test the accuracy of the client's calculations.
____ 42. A control to verify that the dollar amounts for all debits and credits for incoming transactions are posted to a
receivables master file is the:
a. Generation number check. c. Hash total.
b. Master reference check. d. Control total.
____ 43. Which of the following controls would be most efficient in reducing common data input errors?
a. Keystroke verification. c. Balancing and reconciliation.
b. A set of well-designed edit checks. d. Batch totals.
-END OF MATERIAL-