Chapter 11 To 29
Chapter 11 To 29
Chapter 11 To 29
I. Review Questions
When CR is AR is
0.10 0.009 or 0.9 percent
0.50 0.045 or 4.5 percent
0.70 0.063 or 6.3 percent
0.90 0.081 or 8.1 percent
1.00 0.090 or 9.0 percent
3. Assessing the control risk too low causes auditors to assign less control risk
(CR) in planning procedures than proper evaluation would cause them to assign.
The result could be (1) inadvertently conducting less audit work than properly
necessary and taking more audit risk (AR) than originally contemplated, perhaps
to the unpleasant results of failing to detect material misstatements (damaging
the effectiveness of the audit) or (2) discovering in the course of the audit work
that control is not as good as first believed, causing an increase in the audit
work, perhaps at a time when doing so is very costly (damaging the efficiency of
the audit).
Some auditors may be willing to accept high risks of assessing the control risk
too high because they intend to overaudit anyway, and the audit budget can
support the work.
Technically, the risk of assessing control risk too high in relation to an attribute
sample is the probability of finding in the sample (n) one deviation more than
the “acceptable number” for the sampling plan. For example, if the plan called
for a sample of 100 units and a tolerable rate of 3 percent at a 0.10 risk of
assessing control risk too low, the “acceptable number” is zero deviations.
5. All the elements of the risk model are products of auditors’ professional
judgments. Auditors must judge:
Inherent risk – the probability that material errors or irregularities have entered
the accounting system used to develop financial statements.
Audit Working Papers 14-3
Internal control risk – the probability that client’s system of internal control
policies and procedures will fail to detect material errors and irregularities,
provided any enter the data accounting system in the first place.
Analytical procedures risk – the probability that auditors’ analytical procedures
will fail to produce evidence of material errors and irregularities, provided
any have entered the accounting system in the first place and have not been
detected and corrected by the client’s internal control procedures.
Audit risk – the probability that auditors will not discover by any means errors
and irregularities that cause an account balance to be materially misstated.
Test of detail risk appears at first glance to be the product of a formula and not a
professional judgment. However, everything in the risk model is a judgment, so
the test of detail derived from the model is no less a judgment.
7. Detection risk is the component of audit risk that is controllable by the auditor.
It may be raised or lowered by reducing or increasing the amount of substantive
audit testing. It is determined by the auditor’s assessment of inherent risk and
control risk.
8. The auditor deals with both inherent risk and control risk during the planning
phase of the audit. Inquiry of client personnel, study of the business and
industry, application of analytical procedures, and documentation of the
auditor’s initial understanding of internal control are all performed during the
planning phase of the audit. Further study of internal control procedures may
occur after the planning phase if the auditor wishes to further reduce the
assessed level of control risk, and considers it economically feasible to do so.
10. When the auditor assesses control risk at a level lower than maximum, the
auditor may generally perform fewer substantive tests.
14-4 Solutions Manual - Principles of Auditing and Other Assurance
Services
11. The audit risk model is useful in managing audit risk for assertions. By
determining planned audit risk for an assertion, assessing inherent and control
risks, an auditor can determine the allowable detection risk (the amount of
detection risk an auditor can allow) for an assertion. Allowable detection risk is
used to determine the nature, timing, and extent of audit procedures for the
assertion.
12. Detection risk exists because auditors (1) may use an inappropriate audit
procedure, (2) may misapply an audit procedure, (3) may misinterpret the
findings, or (4) do not examine 100 percent of an account balance or transaction
class.
13. The amount of audit evidence an auditor must gather varies inversely with
allowable detection risk. As allowable detection risk decreases, the amount of
evidence required increases, and vice versa. Chapter 12 introduces audit
procedures and discusses how auditors modify audit procedures to obtain
sufficient competent evidential matter by changing (1) the nature, (2) the timing,
or (3) the extent of procedures.
Audit risk (AR) = Inherent risk (IR) x Control risk (CR) x Detection risk (DR)
15. Risks identified at the financial statement level may have a substantial impact on
the assessment of inherent risk for specific assertions. For example, concern
about management integrity, identified as a risk at the financial statement level,
would cause an auditor to assess a higher level of inherent risk for existence of
sales.
Case 1. Factors that will affect your evaluation of audit risk include
integrity of management – Jimenez’s reputation and lawsuit.
trend toward domination of operating and financial decisions by
Jimenez.
increased management compensation based on performance.
aggressive attitude toward financial reporting by new personnel.
profitability inconsistent with the industry.
Case 2. The factors that will affect Josefina’s audit risk and business risk are (a) this is a
special audit, (b) the audit will be used to set the value of certain assets, (c) the
auditor is to evaluate any disputed amount (although this is a common provision
in purchase agreements, one might question whether auditors should agree to
such terms), and (d) the materiality level is set at P50,000, even though that is
considerably below an amount that might be determined using a percentage of
assets and/or income. These factors will increase the risk at the financial
statement level and potentially increase business risk.
In the third situation, the auditor does not have to accumulate any evidence
because inherent risk and control risk give the appropriate level of planned
audit risk.
CHAPTER 12
AUDIT PROCEDURES
I. Review Questions
The nature of a procedure is its description – usually associated with one of the
seven general audit procedures. For example, the nature of a procedure may be
confirmation, document, vouching, etc.
The extent of a procedure is the number of details audited with it, or another
measure of intensity or frequency. Oftentimes, extent is measured by the sample
size.
6. Confirmations are usually considered more reliable because they are from
outside parties, while inquiries are made of client personnel.
7. When equivalent procedures are available to satisfy the need for evidence, an
auditor may consider cost in selecting among the alternatives.
1. c 3. c 5. c 7. a 9. d
2. d 4. a 6. c 8. d
Case 1. The objectives for the audit of Wesson’s securities investments at December 31
are to obtain evidence about the assertions implicit in the financial presentation,
specifically:
1. Existence. Obtain evidence that the securities are bona fide and held by
Wesson or by a responsible custodian.
2. Occurrence. Obtain evidence that the loan transaction and securities
purchase transactions actually took place during the year under audit.
3. Completeness. Obtain evidence that all the securities purchase transactions
were recorded.
4. Rights. Obtain evidence that the securities are owned by Wesson.
Obligation. Obtain evidence that P500,000 is the amount actually owed on
the loan.
5. Valuation. Obtain evidence of the cost and market value of the securities
held at December 31. Decide whether any writedowns to market are
required by GAAP.
6. Measurement.
7. Presentation and Disclosure. Obtain evidence of the committed nature of
the assets, which should mean they should be in a non-current classification
Audit Working Papers 14-9
like the loan. Obtain evidence that restrictions on the use of the assets is
disclosed fully and agrees with the loan documents.
Case 5. a. A material decline in sales may indicate unrecorded sales; a decrease in cost
of goods sold may be due to unrecorded purchases; and an increase in cost
of good sold may be the result of omissions from the ending inventory. An
increase or decrease in gross profit will result from any one or a
combination of the above omissions.
Case 7.
1. f 8. n
2. l 9. k
3. h 10. c
4. e 11. a
5. p 12. g
6. m 13. b
7. d 14. j
Case 8.
1. observation
2. inspection (analytical procedures)
3. inspection (examination of documents)
4. inspection (examination of documents)
5. inquiry
6. inspection (mechanical accuracy tests)
7. inspection (examination of documents)
8. confirmation
14-12 Solutions Manual - Principles of Auditing and Other Assurance
Services
CHAPTER 13
audit evidence
I. Review Questions
9. Factual evidence is direct evidence, in that conclusions may be drawn from the
evidence without further corroboration. An example of factual audit evidence is
physical observation of inventory for existence. Inferential evidence is indirect,
in that direct conclusions cannot be drawn from the evidence. The auditor
typically examines other evidence to further corroborate the inferences drawn.
An oral statement by a product manager that one or more products are fully
saleable and not obsolete is an example of inferential evidence. The auditor may
perform inventory turnover tests and/or determine the date of last sale of the
product to further corroborate the product manager’s statement.
10. Sufficiency of audit evidence is a matter of audit judgment. Materiality and the
quality of internal control are important ingredients in determining sufficiency.
If internal control produces over sales processing and cash receipts, for example,
are effective, the auditor may elect to confirm fewer customers’ accounts
receivables than under conditions of weak internal control.
11. Physical evidence tests the existence assertion. Examples of physical evidence
are inventory observation, examination of securities, inspection of plant asset
additions, and count of cash on hand.
12. The quality of existing internal control is the major factor supporting the
strength of documentary evidence. A voucher produced under conditions of
strong internal control over the processing of vendors’ invoices, for example,
possesses greater validity and is therefore stronger evidence than vouchers
produced under weak control conditions.
15. Evidence is persuasive if the auditor considers the evidence to be sufficient and
competent enough to afford a reasonable basis for an opinion.
1. d 4. c 7. d 10. d 13. b
2. d 5. a 8. b 11. a
3. c 6. d 9. d 12. b
2.
c. Audit computation of expense 1. Mathematical (based on
amounts unaudited data)
Audit Working Papers 14-15
a. Letter from bond trustee 2. External
d. Cancelled checks 3. External-internal
b. Minutes of directors’ meetings 4. Internal
CHAPTER 14
I. Review Questions
7. Client personnel may prepare working papers to reduce the time spent by the
auditor on the engagement. When client personnel prepare working papers, the
auditor should give the client personnel detailed instructions. Working papers
prepared by the client should be identified as PBC (prepared by client) and
should involve no decision making. The auditor should test completed working
papers against underlying documentation.
14-16 Solutions Manual - Principles of Auditing and Other Assurance
Services
10. The prior year’s audit working papers are a useful guide to staff assistants
because the audit procedures performed in the prior year usually are similar to
those of the current year. By referring to last year’s working papers, the
assistant can see how the procedures were documented and is given a possible
format for organizing the current year’s working paper. In addition, exceptions
noted in last year’s working papers may alert the assistant to possible problems
in the current year. Finally, the prior year’s working papers contain information
substantiating the beginning balances for the current year.
11. The more common types of audit working papers and their principal purposes
may be summarized as follows:
(1) Audit administrative working papers – aid the auditors in planning and
administration of the audit, and include such items as the audit programs,
questionnaires and flowcharts, decision aids, time budgets, and
engagement letters.
(2) Working trial balance – represents the backbone of the auditors’ working
papers, for it contains the balances of the ledger accounts, the adjustments
and reclassifications deemed necessary by the auditors, and the adjusted
amounts that appear in the financial statements. It also contains references
to all supporting schedules and analyses, thus serving to control the other
types of working papers.
(3) Lead schedules – working papers that serve to combine similar general
ledger accounts, the total of which appears on the working trial balance.
(4) Adjusting journal entries – material misstatements in the accounts disclosed by
the auditors’ investigation are corrected by means of adjusting journal entries.
These appear on the auditors’ working trial balance, and in addition, a list of
such entries is turned over to the client at the conclusion of the audit with the
request that they be approved and entered in the accounting records.
Audit Working Papers 14-17
(5) Reclassification entries – entries necessary to properly reflect financial
results but not representing misstatements in the financial records of the
client.
(6) Supporting schedules – although the term schedule is at times applied to
various types of working papers, the preferred usage is to designate a
listing of the details or elements comprising the balance in an account at a
specified date. Preparation of such a listing is often an essential step in
determining the nature of an account.
(7) Analyses – consist of working papers showing the changes which occurred in an
account during a given period. By analyzing an account, the auditors determine
its nature and contents.
(8) Reconciliations – working papers that prove the relationship between two
amounts obtained from different sources.
(9) Computational working papers – used to verify such data as interest
expense, income taxes, and earnings per share.
(10) Corroborating documents – working papers that provide support for specific
representations made in the financial statements, such as letters of
representations from clients, lawyers’ letters, audit confirmations, and copies of
the contracts.
12. Audit working papers are the property of the auditor; however, they must not
violate the confidential relationship between client and auditors by making the
papers available to outsiders or even to the client’s employees without specific
permission from the client.
13. Refer to page 535, 1st and 2nd paragraphs of the textbook.
1. d 9. b 17. d 25. b
2. d 10. b 18. c 26. d
3. c 11. a 19. c 27. d
4. a 12. d 20. d 28. c
5. d 13. d 21. b 29. d
6. c 14. b 22. d 30. c
7. c 15. d 23. a 31. d
8. d 16. d 24. b 32. d
b. The factors that affect the CPA’s judgment of the type and content of the
working papers for a particular engagement include:
1. The nature of the auditor’s report.
2. The nature of the client’s business.
3. The nature of the financial statements, schedules or other information
upon which the CPA is reporting and the materiality of the items
included therein.
4. The nature and condition of the client’s records and internal controls.
5. The needs for supervision and review of work performed by assistants.
Case 2. In general, the working paper is not set up in a logical manner to show what the
auditor wants to accomplish. The primary objective of the working paper is to
verify the ending balance in notes receivable and interest receivable. A
secondary objective is to account for all interest income, cash received and cash
Audit Working Papers 14-19
disbursed for new notes, collateral as security, and other information about the
notes for disclosure purposes.
a. b.
DEFICIENCY IMPROVEMENT
1. Tick mark explanation “tested” Should have separate tick marks
does not indicate specifically meaning:
what was done. Agreed to confirmation
Footed
Traced to cash receipts journal
Recomputed, etc.
2. Explanation of some tick marks is Explain all tick marks on the same
not given. page of the working paper.
3. Classification of long-term Recompute portions of notes which are
portion indicates no verification. long-term.
4. Paid-to-date row is confusing. Column should say “date paid to” and
this should be confirmed.
5. Due dates are missing for C.C. Include due dates on working paper
Co., P. Pablo and Tetra Co. for these notes.
c. SPREADSHEET SOLUTION
The purpose of using an Excel spreadsheet in this problem is to give the
student some experience in preparing a simple working paper using an
Excel spreadsheet. It should be explained to students that this type of
working paper may or may not be prepared in actual practice, and that often
templates are used to prepare more time-consuming working papers. Also,
whether or not tick marks are computerized is a matter to be decided. The
advantage is that the completed audit work can then be stored and reviewed
electronically, a direction many firms are going. On the other hand, it may
be more efficient to indicate audit work manually as it is performed, and a
contrast in the color of the tick marks through use of a colored pencil may
be desirable.
f f f f, cf f f f f, cf
tp wtb tb op wtb
CHAPTER 15
I. Review Questions
1. Refer to page 548, 3rd paragraph and page 549, 1st paragraph of the textbook.
4. All internal control systems, due to the human factor, contain certain inherent
limitations. Because of these inherent limitations, internal control provides
reasonable, but not absolute, assurance as to the achievement of control
objectives.
18-22
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
management attitude geared toward excessive risk-taking hampers goal
attainment and thereby compromises control.
8. Monitoring affects all of the other controls by assuring their effectiveness over
time. “Ongoing” monitoring is recurring and somewhat automatic. An example
is the periodic analysis of cost variances and follow-up control where the
variance is material and controllable. “Separate evaluation” applies to those
controls not conducive to ongoing monitoring. Integrity, ethical values, and
competence, for example, cannot be monitored on a “real-time” basis, but
require periodic review for effectiveness.
10. Any internal control system, regardless of how sound it is, has certain inherent
limitations. The system can be circumvented by collusion among two or more
employees; management can override the structure; and the procedures can
break down temporarily causing a lag in the adaptation of the controls. For
these reasons, an effective system of internal control provides reasonable, but
not absolute assurance as to the prevention and detection of material errors or
irregularities. Auditors, therefore, must not rely totally on a sound control
system as support for their audit opinion. Rather, they must recognize the
inherent limitations and, at the very least, perform a minimum amount of
substantive audit testing.
11. Small entities, typically, cannot afford the degree of separation of functional
responsibilities existing in larger firms. Also, small firms, typically, cannot
support a separate internal audit staff. For these reasons, compensating controls
are necessary in smaller organizations. Such compensating controls ordinarily
require that the owner/manager assume an active role in reviewing transactions,
examining documents, reconciling bank accounts, and otherwise performing
many of the tasks normally done by internal auditors in larger organizations.
18-23
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
13. Most controls can be classified as either prevention controls or detection
controls. A control environment, for example, that reflects strong
management support of effective control activities and proper ethical
behavior, will encourage organizational personnel to be conscientious in
performing their assigned tasks, and thereby assist in preventing errors or
irregularities. Periodic inventories and comparisons, on the other hand, will
assist in detecting errors or irregularities which have already occurred.
Both types of controls are vital to an effective system of internal control.
14. A company control procedure is an action taken for the purpose of preventing,
detecting, or correcting errors and irregularities in transactions.
18. Assuming that the general category of transaction has already been authorized
by top management, at least three employees or departments should usually
participate in each transaction to achieve strong internal control. One employee
approves the transaction after determining that the details conform to company
policies, another employee records the transaction in the accounting records, and
the third employee executes the transaction by releasing and/or taking custody
of the related assets. (Note: the approval function may be omitted in an
extremely simple transaction such as a cash sale not involving a check).
18-24
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
1. d 4. d 7. b 10. a
2. d 5. d 8. a 11. c
3. b 6. b 9. d 12. c
III. Comprehensive Cases
Case 1.
RELEVANT TO ASSERTION HOW
AUDIT? AFFECTED AFFECTED?
a. Yes Completeness Year-end adjustments for accruals
Valuation and/or allocations may be
overlooked.
b. Yes Existence Customers may be billed for goods
Valuation not shipped. If so, customer
accounts may not be valid.
c. No N/A N/A
d. Yes Valuation Debits and credits to incorrect
Presentation accounts are likely to cause
materiality errors.
e. Yes No assertions are adversely affected, given the
compensating control of conducting an annual physical
inventory
f. Yes Completeness Some cash receipts may not be
deposited.
Valuation Cash in bank and/or accounts
receivable may be overstated,
depending on whether or not
undeposited cash was recorded.
g. Yes Presentation Trade accounts receivable should
be kept separate from nontrade
receivables. Credit balances in
customer accounts should be
reported as current liabilities.
h. Yes Existence Invoices may be submitted a
Valuation second time for payment and the
signed disbursement checks
misappropriated. The result may
be debits to inventory or other
accounts for nonexistent goods or
services.
i. No N/A N/A
18-25
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
Case 2.
INHERENT OR CONTROL TYPE OF INHERENT OR
WEAKNESS CONTROL REMEDY
a. Inherent Temporary breakdown: environmental
changes not accompanied by revised
controls.
b. Control Chart of accounts and accounting
manuals; training of personnel who
determine debits to various expenditure
accounts; review of account distribution
by second person; internal auditor
review of transactions on a test basis.
c. Inherent Management override.
d. Control Bills of lading evidencing shipment of
goods should be prenumbered and
signed by the carrier. A copy should be
forwarded to accounts receivable and
should trigger the mailing of an invoice
to the customer. The numeric sequence
of used bills of lading should be
accounted for periodically and bills of
lading should be matched with customer
invoices on a test basis.
e. Control Billing clerks should not handle cash
receipts. Incoming cash receipts should
be prelisted and compared with daily
deposits. Credits to customer accounts
should be made from remittance advices.
Checks should be forwarded directly to
the treasurer (cashier) for deposit.
Writeoffs of customer accounts should
require approval by the credit manager
or some other responsible officer.
f. Inherent Collusion
Case 3. a. The planned assessed level of control risk is the level the auditors intend to
use in performing the audit for a particular financial statement assertion.
For example, after obtaining the understanding of internal control necessary
18-26
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
to plan the audit, the auditors will project a planned assessed level of
control risk based on their understanding of the internal control structure.
The assessed level of control risk is the level of risk based on the tests of
controls performed to evaluate control risk for an assertion. Control risk is
the actual, but unknown, level of risk pertaining to an assertion.
b. While obtaining an understanding of the internal control structure, the
auditors may determine a planned assessed level of control risk for the
existence of accounts receivable which requires them to test a sample of
sales transactions. Based on the results of the tests of controls for sales, the
auditors may arrive at an assessed level of control risk that is either higher
or lower than the level planned. The actual level of control risk for
existence of receivables is, as always, at an unknown level.
Case 5. Since Vasquez’s consideration of the internal control structure shows that
controls are very weak, he may omit performing tests of controls. He must,
however, have an adequate understanding of internal control to plan the
remainder of the audit. At a minimum, Vasquez should obtain a basic
understanding of the control environment, accounting system, and important
18-27
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
control procedures. He should document this understanding, and also document
that control risk is assessed at the maximum level.
Case 6. a. (1) The primary advantage of the internal control questionnaire is that
control weaknesses, including the absence of control procedures, are
prominently identified by the “no” answers. Another advantage of the
questionnaire is its simplicity. If the questions have been
predetermined, as is usual, the auditors’ responsibility includes the
completion of the questionnaire with yes-or-no answers, and written
explanations are required only for the “no” or unfavorable answers.
Also, the comprehensive list of questions provides assurance of
complete coverage of significant control areas.
(2) An advantage of the written narrative approach in reviewing internal
control is that the description is designed to explain the precise controls
applicable to each examination. In this sense, the working paper
description is tailor-made for each engagement and thus offers
flexibility in its design and application. A second advantage is that its
preparation normally requires a penetrating analysis of the client’s
system. In requiring a written description of the flow of transactions,
records maintained, and the division of responsibilities, the
memorandum method minimizes the tendency to perform a perfunctory
review.
(3) The use of a flowchart in documenting internal control offers the
advantage of a graphic presentation of a system or a series of sequential
processes. It shows the steps required and the flow of forms or other
documents from person to person in carrying out the function depicted.
Thus, the tendency to overlook the controls existing between functions
or departments is minimized. Another advantage is that the flowchart
method avoids the detailed study of written descriptions of procedures
without sacrificing the CPA’s ability to appraise the effectiveness of
internal controls under review. An experienced auditor can gain a
working understanding of the system much more readily by reviewing
a flowchart than by reading questionnaires or lengthy narratives.
Information about specific procedures, documents, and accounting
records can also be located more quickly in a flowchart. Because of
these advantages, flowcharting has become the most widely used
method of describing internal control in audit working papers.
b. Even though internal control appears to be strong, the auditors are required
to conduct tests of controls. Just because policies and procedures are prescribed
does not mean that the client’s personnel are adhering to those requirements.
Employees may not understand their assigned duties, or may perform those
duties in a careless manner, or other factors may cause the internal controls
actually in place to differ from those prescribed.
18-28
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
Through tests of controls the CPAs obtain reasonable assurance that the
internal control policies and procedures are in use and are operating as
planned, and they may detect material errors of types not susceptible to
effective internal control. In addition, such testing enables the CPAs to
comply with the third standard of field work which calls for obtaining
sufficient competent evidential matter to provide a reasonable basis for an
opinion.
Note to instructor – Auditors may forego tests of controls if they conclude
that internal controls are so weak as to provide no basis for assessing
control risk at a level lower than the maximum.
Case 7.
PURPLE CORP.
Raw Materials Recording and Transferring System Flowchart
December 31, 2003
ACCOUNTING
Start INVENTORY CLERK MANUFACTURING
STORES
Clerk
Prepares
Goods
Stock-in Requisition
from
Report
Supplier
Requisition
Storeskeeper Posts Inventory 1
Prepares Perpetual Records at 2
Stock-in Inventory Standard
Report Records Cost
Supervisor
Approves
Stock-in Filed
Requisition
Report 1 by
2
2 date
Approved Approved
Filed Requisition 1
by Requisition
1 2
date
Reviews
for
Completeness Filed
by Job
3 Order
18-29
Posts Transfer to Inventory
Perpetual Records at
Inventory Standard
Records Cost
Filed
by
4
date
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
Case 8. a. The quantity of serially numbered tickets issued during the shift of each
cashier is multiplied by the price per ticket to determine the amount of cash
which the cashier should have on hand at the end of the shift.
b. The following steps should be taken by the manager to make these controls
work effectively:
(1) Maintain careful control over unused rolls of tickets.
(2) Make a record of the serial number of the first and last ticket issued on
each cashier’s shift.
(3) Count the cash in possession of cashier at beginning and end of shift.
In addition to these regular routines, the manager should take the following
steps at unannounced intervals:
(4) Observe that the cashier never has loose tickets in his or her possession
and does not sell tickets in any manner other than ejecting them from the
ticket machine.
(5) Verify by inspection of tickets being presented by patrons to the door
attendant that only recently issued tickets (current serial numbers) are
being used.
c. Collusion by the cashier and door attendant to abstract cash receipts often
consists of the door attendant pocketing whole tickets presented by patrons
rather than tearing the ticket in half. He or she may then give these unused
tickets to the cashier; the cashier may then resell the tickets to customers at the
box office rather than punching out new tickets on the machines. The cashier
withholds the cash received from sales of these “used tickets” and divides it with
the door attendant.
18-30
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
d. Observation on a surprise basis by the manager of the serial numbers of
tickets being presented at the door by customers may reveal that these
tickets are not freshly issued ones. Observation of the cashier’s work may
reveal that this employee is handling loose tickets.
CHAPTER 16
I. Review Questions
18-31
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
May contain numerous irrelevant questions.
Tendency to treat it like another form to fill out.
Disadvantages:
Hard to write. Often lengthy.
Hard to revise in subsequent years.
3. Advantages of flowchart:
Graphic presentation of systems.
Shows the steps required and the flow of forms and documents.
Easy to read and analyze.
Easy to update in subsequent years.
Disadvantages:
Takes some time to draw neatly.
18-32
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
each. Such understanding is obtained by gathering evidence relating to the basic
elements of the client’s internal financial controls.
10. Testing of internal financial controls may permit the auditor to further reduce the
assessed level of control risk. This, in turn, should lead to a decrease in the
nature, timing, and/or extent of substantive audit testing in the circumstances.
11. The following factors may cause the auditor to decide not to test the client’s
internal financial controls beyond obtaining an initial understanding:
a. Controls may already have been evaluated as ineffective;
b. Further testing is not cost effective (i.e., the cost of further testing is
greater than the cost savings resulting from reduced substantive testing)
12. Some combination of the following means is typically utilized by the auditor in
testing a client’s internal financial controls:
a. Reprocessing transactions through the client’s system;
b. Observation of controls; and
c. Document examination and testing.
14. The following are some examples of internal control weaknesses and suggested
expanded substantive testing, given the weaknesses:
a. Perpetual inventory records not maintained: Expand test counts during
inventory observation
b. Bank accounts not reconciled: Expand year-end audit of cash accounts
18-33
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
c. Customer exceptions to monthly statements not investigated and
cleared: Expand accounts receivable confirmation at year-end.
15. Reportable conditions are matters coming to the auditor’s attention, as a result of
his/her study and evaluation of the client’s internal financial controls, relating to
significant deficiencies in the design or operation or of the internal controls that
could adversely affect the organization’s ability to record, process, summarize,
and report financial data consistent with the assertions of management in the
financial statements. The purpose of the reportable conditions letter is to inform
the audit committee, or similar body within the organization, of weaknesses for
which they may not be aware. Such communication increases the likelihood
that the weaknesses will be corrected on a timely basis.
16. Use of any one of the approaches to studying and documenting a client’s internal
financial controls, by itself, is inadequate. Each approach adds a needed
dimension to the analysis. The memorandum requires depth of analysis not
found in the flowchart. The flowchart, on the other hand, promotes ease of
understanding and ready identification of strengths and weaknesses in controls.
The questionnaires and checklists add the dimension of completeness of
coverage. By using the three tools in combination, the auditor is able to gain a
deeper and clearer understanding of each of the subsets of the transaction cycles,
including major control strengths and weaknesses, thereby permitting more
accurate control risk assessments and more useful substantive audit programs
based on such assessments.
1. b 8. a 15. d 22. a
2. a 9. b 16. c 23. a
3. b 10. c 17. b 24. d
4. d 11. b 18 b 25. b
5. b 12. a 19. a 26. d
6. b 13. b 20. d 27. b
7. b 14. b 21. a 28. d
Case 1. a. Given identified financial control weaknesses, the auditor may elect to
expand the extent of substantive testing, or search for and test compensating
controls. In the present case, the following errors and irregularities may
occur, given the control weaknesses in the payroll subset of the expenditure
cycle:
1. Hours may be in error, inasmuch as the time cards are prepared by
employees and not reviewed. This could lead to overstatement or
understatement of wages expense in the income statement. This
18-34
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
could also affect the carrying value of finished goods inventories if
Quicky is a manufacturing company.
2. The payroll could be “padded” inasmuch as signed checks are
returned to the department supervisors for distribution. This could
result in overstatements of salaries and wages expense on the
income statement. It could also cause a finished goods inventory
overstatement.
c. 1. Auditors must study and evaluate internal control each year because the
environment within which the client operates is subject to constant
change; and controls must adapt to these changes if the system is to
remain effective. The auditor must identify the environmental changes
and determine that the relevant control points remain covered after the
changes.
18-35
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
Case 2.
ISLANDER DRUG STORE, INC.
Processing Cash Collections
Internal Control Questionnaire
-Question Yes No
Are customers who pay by check identified via store I.D. card or
other means?
Does company policy prohibit accepting checks for anything
except merchandise sales plus a nominal cash amount?
Is a receipt produced by the cash register given to each
customer?
Is the reading of each cash register taken periodically by an
employee who is independent of the handling of cash
receipts?
Are cash counts made on a surprise basis by an individual who is
independent of the handling of cash receipts?
Is the reading of each cash register compared regularly to the
cash received?
Is a summary listing of cash register readings prepared by an
employee who is independent of physically handling cash
receipts?
Are receipts forwarded to an independent employee who makes
the bank deposits?
Are each day’s receipts deposited intact daily?
Is the summary listing of cash register receipts reconciled to the
duplicate deposit slips authenticated by the bank?
18-36
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
Are entries to the cash receipts journal prepared from duplicate
deposit slips or the summary listing of cash register
readings?
Are the entries to the cash receipts journal compared to the
deposits per bank statement?
Are areas involving the physical handling of cash reasonably
safeguarded?
Are employees who handle receipts bonded?
Are charged back items (NSF checks, etc.) directed to an
employee who does not physically handle receipts or have
access to the books?
CHAPTER 17
I. Review Questions
4. Audit conclusions can be made only about the population from which the
sample was drawn, and a conclusion can only be valid if the sample on which it
is based actually shows the characteristics of the population. Auditors can
attempt to achieve representativeness, but they cannot guarantee it. Sampling
risk – the probability that the sample does not adequately reflect the population
– always exists.
5. Refer to page 646, 2nd paragraph; page 647, 1st paragraph of the textbook.
9. Refer to page 653, 4th paragraph & page 654, 1st to 3rd paragraph of the textbook.
18-37
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
10. Sampling risk is the probability that the auditor’s conclusions concerning the
population will be in error. In terms of conclusions regarding internal control,
sampling risk consists of two subsets:
Alpha risk, the risk that the auditor will assess control risk too high and
perform more substantive testing than is necessary under the circumstances;
and
Beta risk, the risk that the auditor will assess control risk too low and
perform less substantive testing than is necessary.
For control testing purposes, the auditor is more concerned with beta risk than
alpha risk, because beta risk poses the threat of underauditing and is therefore
the basis for the audit opinion. The auditor controls this risk by setting beta risk
sufficiently low as to maintain overall audit risk at a level less than or equal to
10%.
11. Refer to pages 661 to 663 of the textbook.
1. b 3. d 5. d 7. a 9. a
2. c 4. c 6. b 8. d 10. c
Case 1. a. Areas requiring the auditors to make judgment decisions when statistical
sampling techniques are employed (only four required):
(1) Defining population, characteristics to be tested, and deviations.
Unless a relationship is defined between the occurrence rate of
deviations in the population and either the validity of the client’s
financial statement or the strength of internal control, little useful
information is gained by estimating the occurrence rate.
(2) Determining the appropriate statistical selection techniques for drawing
a random sample. The auditors must recognize the advantages and
disadvantages of stratified selection, unstratified selection, and
systematic selection, and determine which technique is appropriate for
selecting an economical random sample.
(3) Establishing the required maximum tolerable deviation rate and the risk
of assessing control risk too low for the procedure. This requires
judgment decisions regarding materiality, time, cost, and the planned
assessed level of control risk.
18-38
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
(4) Interpreting sample results. This requires a decision as to whether the
results support the auditors’ planned assessed level of control risk, or
whether additional sampling is necessary to reach a conclusion.
(5) Following up on the discovery of critical errors or unacceptable
deviation rates.
(6) Determining the circumstances under which statistical sampling is
appropriate, and those in which other techniques should be used in lieu,
of or to supplement, the statistical sampling techniques.
b. If the CPAs’ sample shows an unacceptable deviation rate, they may take
the following actions:
(1) They may enlarge their sample to increase the precision of their
estimate.
(2) They may isolate the type of deviation and expand examination as it
relates to the transactions that give rise to that type of misstatement.
(3) The auditors’ usual response to an unacceptably high deviation rate is
to increase their assessed level of control risk. Accordingly, the
auditors would increase the intensity of their substantive tests.
18-39
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
Select every 80th voucher (3,200/40) after each of the two random
starting points between 1 and 80 for each of the two sequences.
Case 2. a. (1) Since the results of tests of controls typically play a significant role in
determining the nature, timing, and extent of other audit procedures, the
auditors usually specify a low level of risk of assessing control risk too
low. It is usually set at 5 or 10 percent.
b. (1) There is a decrease in sample size if the acceptable level of the risk of
assessing control risk too low is increased.
18-40
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
CHAPTER 18
I. Questions
1. PERT is superior to Gantt Charts in complex projects because:
a. PERT charts are flexible and can reflect slippage or changes in plans,
but Gantt charts simply plot a bar chart against a calendar scale.
b. PERT charts reflect interdependencies among activities; Gantt charts
do not.
c. PERT charts reflect uncertainties or tolerances in the time estimates
for various activities; Gantt charts do not.
2. The use of PERT provides a structured foundation for planning complex
projects in sufficient detail to facilitate effective control.
A workable sequence of events that comprise the project are first
identified. Each key event should represent a task; then the
interdependent relationships between the events are structured.
After the network of events is constructed, cost and time parameters are
established for each package. Staffing plans are reviewed and analyzed.
The “critical path” computation identifies sequence of key events with
total time equal to the time allotted for the project’s completion. Jobs
which are not on the critical path can be slowed down and the slack
resources available on these activities reallocated to activities on the
critical path.
Use of PERT permits sufficient scheduling of effort by functional areas
and by geographic location. It also allows for restructuring scheduling
efforts and redeployment of workers as necessary to compensate for
18-41
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
delays or bottlenecks. The probability of completing this complex
project on time and within the allotted budget is increased.
3. Time slippage in noncritical activities may not warrant extensive
managerial analysis because of available slack, but activity cost usually
increases with time and should be monitored.
4. The critical path is the network path with the longest cumulative
expected activity time. It is critical because a slowdown along this path
delays the entire project.
5. Crashing the network means finding the minimum cost for completing
the project in minimum time in order to achieve an optimum tradeoff
between cost and time. The differential crash cost of an activity is the
additional cost of that activity for each period of time saved.
6. Slack is the amount of time an event can be delayed without affecting the
project’s completion date. Slack can be utilized by management as a
buffer against bottlenecks that may occur on the critical path.
7. Unit gross margin are typically computed with an allocation of fixed
costs. Total fixed costs generally will not change with a change in
volume within the relevant range. Unitizing the fixed costs results in
treating them as though they are variable costs when, in fact, they are
not. Moreover, when multiple products are manufactured, the relative
contribution becomes the criterion for selecting the optimal product mix.
Fixed costs allocations can distort the relative contributions and result in
a suboptimal decision.
8. This approach will maximize profits only if there are no constraints on
production or sales, or if both products use all scarce resources at an
equal rate. Otherwise management would want to maximize the
contribution per unit of scarce resource.
9. The opportunity cost of a constraint is the cost of not having additional
availability of the constrained resources. This is also called a shadow
price.
10. The feasible production region is the area which contains all possible
combinations of production outputs. It is bounded by the constraints
imposed on production possibilities. The production schedule which
management chooses must come from the feasible production region.
11. The accountant usually supplies the contribution margin data that is used
in formulating a profit-maximizing objective function. In addition, the
18-42
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
accountant participates in the analysis of linear programming outputs by
assessing the costs of additional capacity or of changes in product mix.
12. a. Hourly fee for inventory audit (C)
b. Salary of purchasing supervisor (N)
c. Costs to audit purchase orders and invoices (P)
d. Taxes on inventory (C)
e. Stockout costs (P)
f. Storage costs charged per unit in inventory (C)
g. Fire insurance on inventory (C)
h. Fire insurance on warehouse (N)
i. Obsolescence costs on inventory (C)
j. Shipping costs per shipment (P)
13. Although the inventory models are developed by operations researchers,
statisticians and computer specialists, their areas of expertise do not
extend to the evaluation of the differential costs for the inventory models.
Generally, discussions of inventory models take the costs as given. It is
the role of the accountant to determine which costs are appropriate for
inclusion in an inventory model.
14. Cost of capital represents the interest expense on funds if they were
borrowed or opportunity cost if funds were provided internally or by
owners. It is included as carrying cost of inventory because funds are
tied up in inventory.
15. Costs that vary with the average number of units in inventory:
Inventory insurance P 2.80
Inventory tax 2.05 (P102.25 x 2%)
Total P 4.85
Costs that vary with the number of units purchased:
Purchase price P102.25
Insurance on shipment 1.50
Total P103.75
Total carrying cost = (25% x P103.75) cost of capital + P4.85 = P25.94 +
P4.85 = P30.79
Order costs:
Shipping permit P201.65
Costs to arrange for the shipment 21.45
Unloading 80.20
18-43
Chapter 18 Application of Quantitative Techniques in Planning, Control and
Decision Making - II
Stockout costs 122.00
Total P425.30
II. Problems
Problem 2
Requirement (a)
The critical path through each of the three alternative paths calculated as the
longest is 0 - 1 - 6- 7- 8.
0-1-2-5-8 2 + 8 + 10 + 14 = 34
0-1-3-4-7-8 2+8+7+5+3 = 25
0-1-6-7-8 2 + 26 + 9 + 3 = 40*
________
* critical
Requirement (b)
40 - 3 - 5 = 32
Requirement (c)
Requirement (d)
The earliest time for reaching event 5 via 0 - 1 - 2 - 5 is 20, the sum of the
expected times.
Problem 3
18-44
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
No, they didn’t make a right decision, since they included fixed costs which
do not differ in the short run. If they had used contribution margin instead of
gross margin, they would have had P5 for G1 and P6.50 for G2, therefore
they would have decided to produce G2 exclusively.
18-45
Application of Quantitative Techniques in Planning, Control and Decision Making – II Chapter 18
Problem 1
Requirement (a)
TASKS 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
___________
X Dead Time
Requirement (b)
18-46
Application of Quantitative Techniques in Planning, Control and Decision Making
– II Chapter 18
Problem 4
a. Carrying costs:
QS 250 x P109.40
2 = 2 = P13,675.00
Order costs:
AP 1,500 x P878
= = P 5,268.00
Q 250
Total P18,943.00
2 x 1,500 x P878
Q* = = 24,077 = 155 units
P109.40
Carrying costs:
QS 155 x P109.40
2 = 2 = P 8,478.50
Order costs:
AP 1,500 x P878
= = P 8,496.77
Q 155
Total P16,975.27
18-47
11-48 Solutions Manual - Principles of Auditing and Other Assurance
Services
Problem 5
Additional computations:
a
15 is the number of orders per year.
b
It should be evident that at this level the carrying costs alone exceed
the total costs at a safety stock of 175 units. Therefore, it is not
possible for this or any safety-stock level larger than 250 to be less
costly than 175 units. Indeed, given a total cost at 175 units of
P5,507.5, stockout costs would have to occur with probability zero
for any safety stock greater than 225.72 units (i.e., P5,507.5 / P24.40
= P225.72).
18-48
A Risk-based Audit Approach – Part II 11-49
CHAPTER 19
I. Review Questions
2. The two methods of projecting the known misstatement to the population are the
average difference method and the ratio method. Refer to Chapter 19 for
formula expressions of each.
3. The important thing is to audit all the sample units. You cannot simply discard
one that is hard to audit in favor of adding to the sample a customer whose
balance is easy to audit. This action might bias the sample. If considering the
entire balance to be misstated will not alter your evaluation conclusion, then you
do not need to work on it any more. Your evaluation conclusion might be to
accept the book value, as long as the account counted in error is not big enough
to change the conclusion. Your evaluation conclusion might already be to reject
the book value, and considering another account to be misstated just reinforces
the decision.
4. Two main reasons for stratifying a population when sampling for variables
(peso) measurement:
a. Some units may be individually significant (e.g., large) and taking sampling risk
with respect to them is not a good idea.
b. Auditors may want to achieve audit coverage of a large proportion of pesos
in the balance by choosing the largest units (a protective sampling
objective, which is closely related to avoiding sampling risk).
18-49
11-50 Solutions Manual - Principles of Auditing and Other Assurance
Services
5. The tolerable misstatement (judged for the audit of a particular account balance)
must be less than the monetary misstatement considered material to the overall
financial statements. Also, the aggregation of multiple tolerable misstatement
amounts for several different balances under audit must be equal to or less than
the amount of monetary misstatement considered material to the overall
statements.
18-50
A Risk-based Audit Approach – Part II 11-51
3. Compare the likely misstatement (also called the projected misstatement) to the
tolerable misstatement for the account, and consider the
a. Risk of incorrect acceptance that likely misstatement could be less than tolerable
misstatement even though the actual misstatement in the population is
greater, or the
b. Risk of incorrect acceptance that likely misstatement could be greater
than tolerable misstatement even though the actual misstatement in the
population is smaller.
10. Account balances also can be audited, at least in part, at an interim date. When
account balance audit work is done before the company’s year-end date, auditors
must extend the interim-date audit conclusion to the balance-sheet date. The
process of extending the audit conclusion amounts to nothing more (and nothing
less) than performing substantive-purpose audit procedures on the transactions
in the remaining period and on the year-end balance to produce sufficient
competent evidence for a decision about the year-end balance.
18-51
11-52 Solutions Manual - Principles of Auditing and Other Assurance
Services
11. Classical variables sampling estimates the value of a population by calculating
the mean and standard deviation of a sample and imputing the results to the
population. Probability proportional to size sampling uses the results of
sampling to calculate an estimated upper error limit and compares this with a
preset tolerable error limit. Although used for substantive testing purposes, PPS
sampling is actually a variation for attribute sampling.
12. Detection (or beta) risk affects sample size inversely for substantive testing
purposes. That is, the higher the acceptable detection risk, the smaller the
sample size; and the lower the acceptable detection risk, the larger the sample
size.
13. Precision is the range + – within which the true answer most likely falls. It is
set by the auditor as a function of materiality and those levels of beta and alpha
risk deemed acceptable. Reliability is the likelihood that the sample range
contains the true value. Also referred to as the confidence level, reliability is set
by the auditor on the basis of overall audit risk.
14. PPS sampling is restricted to populations for which the auditor suspects a few
errors of overstatement only.
15. Several statistical software packages are available to facilitate audit sampling
applications. In addition to calculating sample size and evaluating sample
results, these packages can also assist in the following sampling areas:
a. Stratify populations for sampling purposes;
b. Generate random numbers to facilitate sample selection;
c. Draw the sample, given computerized data bases.
1. b 5. c 9. d 13. a 17. d
2. a 6. b 10. a 14. a 18. b
3. c&d 7. b 11. a 15. c 19. c
4. b 8. d 12. c 16. d 20. d
Supporting Computations:
Audited Value 47,520 490,000 x 0.99 = 485,100
3. c. Book Value 48,000 = 0.99 ; 490,000 – 485,100 = P4,900
P480
d. 120 = P4
1,200 x P4 = P4,800
P 17,500
P500,000
18-52
A Risk-based Audit Approach – Part II 11-53
7. = 3.5%
Case 1. a. Alpha risk is the risk of rejecting a population that is essentially correct.
Beta risk is the risk of accepting a population that is materially incorrect.
Alpha risk affects audit efficiency because overauditing results from
incorrectly rejecting a population. Beta risk impacts audit effectiveness
because underauditng results from incorrectly accepting a population.
Collectively, alpha and beta risk comprise sampling risk, defined as the
probability that the auditor will draw erroneous conclusions about a
population.
b. Attention to, and quantification of, alpha and beta risk assist the auditor in
applying an audit risk approach to substantive testing. During the audit
planning stage, the auditor identifies areas of high audit risk and sets
detection (beta) risk low for these areas. The result is that more substantive
testing is devoted to the high risk areas relative to the lower risk areas. This
approach enhances both audit efficiency and audit effectiveness.
c. Because it is closely related to the basis for the auditor’s opinion, alpha risk
is usually set equal to overall audit risk. Beta risk is set on the basis of the
auditor’s evaluation of inherent risk and control risk. The greater these risk
factors, as determined by the auditor during the audit planning stages, the
lower the beta risk set by the auditor. The lower the acceptable beta risk,
the larger the sample sizes for substantive testing purposes. Alpha and beta
risk, therefore, provide the necessary link between audit risk analysis and
substantive audit testing.
Case 2. a. (1) Mean-per-unit estimates the total value of a population by (1) using the
sample mean as an estimate of the true population mean, and (2)
extending this estimated population mean by the number of items in the
population. The computations are as follows:
(2) Ratio estimation estimates total population value by (1) using the ratio
of the sample audited values to book values as an estimate of the ratio
18-53
11-54 Solutions Manual - Principles of Auditing and Other Assurance
Services
of population audited value to book value, and (2) applying the
estimated ratio to the population book value. The computations are as
follows:
(1) Estimated ratio of audited to book value =
(3) Difference estimation estimates total population values by (1) using the
average difference between the audited and book values of sample
items as an estimate of the average difference for all population items,
(2) extending the estimated average difference by the number of items
in the population, and (3) using the resulting estimate of the total
difference between audited and book value to compute the estimated
total value. The computations are as follows:
The estimate of total value developed in ratio estimation is based upon the
ratio of audited values to book values, rather than upon mean peso value. If
this ratio has no tendency to vary with the peso value of the lot, the estimate
of total value is not affected by the mean value of items in the sample.
However, sampling error may still be present if the sample lots are not
18-54
A Risk-based Audit Approach – Part II 11-55
representative of the population with respect to the ratio of audited values
to book values.
Case 3. The auditors would project the misstatement found in the sample to the
population using either the ratio or difference approach. The ratio approach
would result in a projected misstatement of P65,500. This may be computed by
first calculating the ratio of the audited to book value as 1.0131 [P23,100 /
P22,800 (since there is a net understatement of P300, the audited value is
P23,100)] and estimating the audited value of the population as:
Case 4. The audit risk (ultimate risk) of material misstatement in the financial statements
(AR) is the product of:
(1) Inherent risk (IR), the risk of material misstatement in an assertion,
assuming there were no related internal controls.
(2) Control risks (CR), the risk of material misstatement occurring in an
assertion, and not being prevented or detected on a timely basis by the
internal control structure.
(3) Detection risk (DR), the risk that the auditors’ procedures will lead them to
conclude an assertion is not materially misstated, when in fact such
misstatement does exist.
AR = IR x CR x DR
This equation may be restated to solve for the allowable detection risk as
follows:
DR = AR / (CR x IR)
Using the risk levels set forth in the problem, the allowable risk of reliance upon
substantive tests is computed as illustrated below:
18-55
11-56 Solutions Manual - Principles of Auditing and Other Assurance
Services
P500,000 x 3
Sample size = P25,000 – (P2,000 x 1.6) = 69
Note: The reliability factor is from the zero misstatements row of the
PPS sampling table given in the case.
(2) The sampling interval is calculated simply by dividing the book value
of receivables by the sample size, as follows:
18-56
A Risk-based Audit Approach – Part II 11-57
Reliability Projected Incremental
Factor Incremen (Increment – 1) Misstatement Allowance
3.00
4.75 1.75 .75 P435 P326
6.30 1.55 .55 362 199
P525
= P23,460
NOTES:
Projected misstatement
(a) Tainting percentages are calculated as the difference between book
and audited value divided by book value (e.g., (P50 – P47) / P50 =
6%).
(b) No tainting percentage is calculated for items in excess of the
sample interval and the actual misstatement is extended to
projected misstatement (as for the third error).
Incremental allowance
(a) Reliability factors are read from the PPS sampling table given in
the case, starting at zero misstatements.
(b) “Increment – 1” is the difference in the two adjacent reliability
factors minus 1 (e.g., 4.75 – 3.00 – 1.00 = .75).
(c) Misstatements in excess of the sampling interval are not
considered in the incremental allowance. This is because the
nature of the process requires that all items in excess of the
sampling interval be included in the sample – therefore no
allowance for items not in the sample is necessary.
c. The results obtained in part b would indicate that the auditors may accept
the population as not containing a tolerable misstatement at the 5 percent
level of risk of incorrect acceptance. The auditors would also consider the
results obtained in conjunction with other audit tests.
18-57
11-58 Solutions Manual - Principles of Auditing and Other Assurance
Services
PPS sampling is generally easier to use than classical variables
sampling.
The size of a PPS sample is not based on the estimated variation of
audited amounts.
PPS sampling automatically results in a stratified sample.
Individually significant items are automatically identified.
If no misstatements are expected, PPS sampling will usually result
in a smaller sample size than classical variables sampling.
A PPS sample can be easily designed and sample selection can
begin before the complete population is available.
= P300,000 / 60 = P5,000
c. Projected misstatement =
CHAPTER 20
I. Review Questions
18-58
A Risk-based Audit Approach – Part II 11-59
are met, the sale is processed immediately and the sales invoice and shipping
order are produced.
4. In a batch system, files are stored off-line for the most part, and access control
assumes the form of safeguarding the programs, transaction files, and
master files by assigning responsibility for the files to a librarian and
instituting a formal checkout system. Only those persons authorized to
process transactions (computer operators) are permitted access to
transaction and master files; and programmers are permitted access to
programs only for testing and “debugging” purposes. In an on-line, real-
time system, transactions and master files are stored internally, often in a
system of integrated data bases. Access control in this type of data
environment assumes the form of controlling access to data bases and fixing
of responsibility for the data base components. Assigning a password to an
individual who is responsible for the data base component accessible by that
password, canceling passwords of former employees, and frequent changing
of existing employees’ passwords are examples of access controls in a real-
time system.
5. Recording forms and transaction logs assure consistency and completeness of
data inputs. The form or log should include codes describing such transaction
components as employee number, customer number, vendor number, department
number, stock number, purchased part number, or job number. The form should
also provide for quantities, prices, dates, and usually a short narrative
description of products, parts, materials, or services for purchase and sales
transactions.
6. A transaction file is the batch of entered data that has been converted into
machine-readable form. A transaction file may contain payroll information for a
specific period of time. It is similar to a journal in a manually prepared system.
A master file contains updated information through a particular time period. It is
similar to a ledger in a manual system.
18-59
11-60 Solutions Manual - Principles of Auditing and Other Assurance
Services
1. d 5. c 9. c 13. c 17. c
2. c 6. c 10. c 14. d 18. a
3. a 7. c 11. d 15. a 19. b
4. a 8. b 12. c 16. a 20. a
An auditor should have the following concerns about the Box system:
Does the system have any flaws or incompatibilities? (No one appears to
have tested the software or found out about others’ satisfaction with it.)
The computer sits out in the open. (Anyone could have access to and
damage the hardware.)
Anyone could come up with the password by guessing.
The backup disks are not stored in a safe place.
Was the conversion appropriately executed, with no data lost or added?
CHAPTER 21
I. Review Questions
18-60
A Risk-based Audit Approach – Part II 11-61
1. The proper installation of IT can lead to internal control enhancements by
replacing manually-performed controls with computer-performed controls. IT-
based accounting systems have the ability to handle tremendous volumes of
complex business transactions cost effectively. Computer-performed controls
can reduce the potential for human error by replacing manual controls with
programmed controls that apply checks and balances to each transaction
processed. The systematic nature of IT offers greater potential to reduce the risk
of material misstatements resulting from random, human errors in processing.
The use of IT based accounting systems also offers the potential for improved
management decisions by providing more and higher quality information on a
more timely basis than traditional manual systems. IT-based systems are usually
administered effectively because the complexity requires effective organization,
procedures, and documentation. That in turn enhances internal control.
18-61
11-62 Solutions Manual - Principles of Auditing and Other Assurance
Services
Need for IT experience. As companies rely to a greater extent on IT-based
systems, the need for personnel trained in IT systems increases in order to
install, maintain, and use systems.
3. General controls relate to all aspects of the IT function. They have a global
impact on all software applications. Examples of general controls include
controls related to the administration of the IT function; software acquisition and
maintenance; physical and on-line security over access to hardware, software,
and related backup; back-up planning in the event of unexpected emergencies;
and hardware controls. Application controls apply to the processing of
individual transactions. An example of an application control is a programmed
control that verifies that all time cards submitted are for valid employee ID
numbers included in the employee master file.
4. The most significant separation of duties unique to computer systems are those
performed by the systems analyst, programmer, computer operator, and data
base administrator. The idea is that anyone who designs a processing system
should not also do the technical work, and anyone who performs either of these
tasks should not also be the computer operator when real data is processed.
18-62
A Risk-based Audit Approach – Part II 11-63
9. Five things a person must have access to in order to facilitate computer fraud
are:
a. The computer itself.
b. Data files.
c. Computer programs.
d. System information (documentation).
e. Time and opportunity to convert assets to personal use.
18-63
11-64 Solutions Manual - Principles of Auditing and Other Assurance
Services
Case 1. Does access to on-line files require specific passwords to be entered to identify
and validate the terminal user?
POSSIBLE ERRORS OR IRREGULARITIES – unauthorized access may be obtained to
processing programs or accounting data resulting in the loss of assets or other
company resources.
Are control totals established by the user prior to submitting data for
processing?
POSSIBLE ERRORS OR IRREGULARITIES – sales transactions may be lost in data
conversion or processing, or errors made in data conversion or processing.
18-64
A Risk-based Audit Approach – Part II 11-65
Edits for completeness and reasonableness
Checklists to ensure input arrived and on time
2. Control procedures – processing controls
Prevention of loss or nonprocessing of data (e.g., control totals)
Performance of arithmetic functions
Assurance of proper posting (sample test of postings)
Correction of errors
Exclusion of unauthorized persons from operating areas (e.g.,
programmers)
3. Control procedures – output controls
Review performed by originating area of the reports and other
output data
Sampling and testing of individual transactions
Use of control totals obtained independently from prior processing
or original source data
Distribution lists used to route output only to authorized persons
Making inquiries as to whether the output is desired by the
recipient
Case 3. a. The primary internal control objectives in separating the programming and
operating functions are achieved by preventing operator access to the
computer or to input or to output documents, and by preventing operator
access to operating programs and operating program documentation, or by
preventing operators from writing or changing programs.
18-65
11-66 Solutions Manual - Principles of Auditing and Other Assurance
Services
An auditor may find the following compensating controls that are
particularly important when the programming and operating functions are
not separate:
1. Joint operation by two or more operators.
2. Rotation of computer duties.
3. Comparison of computer times to an average or norm.
4. Investigation of all excess computer time (errors).
5. Adequate supervision of all computer operations.
6. Periodic comparison of a program code value to a control value.
7. Required vacations for all employees.
18-66
A Risk-based Audit Approach – Part II 11-67
has helped to design. The AICPA has taken the position that making control
recommendations during system design is no different from auditor
recommendations for control improvements after the fact and documented
in the management letter.
d. The auditor may rely on the computer audit specialist to whatever degree
considered necessary to assure proper control installation and
implementation. The in-charge field auditor must keep in mind, however,
that use of a computer audit specialist does not compensate for the field
auditor’s lack of understanding of the internal control, including the EDP
applications.
CHAPTER 22
I. Review Questions
18-67
11-68 Solutions Manual - Principles of Auditing and Other Assurance
Services
The organizational structure – should include an understanding of the
organization of the computer function. Auditors should obtain and evaluate: (a)
a description of the computer resources and (b) a description of the
organizational structure of computer operations.
3. The “audit trail” is the source documents, journal postings and ledger account
postings maintained by a client in order to keep books. These are a “trail” of the
bookkeeping (transaction data processing) that the auditor can follow forward
with a tracing procedure or back ward with a vouching procedure.
In a manual system this “trail” is usually visible to the eye with posting
references in the journal and ledger and hard-copy documents in files. But in a
computer system, the posting references may not exist, and the “records must be
read using the computer rather than the naked eye.” Most systems still have
hard-copy papers for basic documentation, but in some advanced systems even
these might be absent.
4. The audit trail (sometimes called “management trail” as it is used more in daily
operations than by auditors) is composed of all manual and computer records
that allow one to follow the sequence of processing on (or because of) a
transaction.
The audit trail in advanced systems may not be in a human-readable form and
may exist for only a fraction of a second.
The first control implication is that concern for an audit trail needs to be
recognized at the time a system is designed. Techniques such as integrated test
18-68
A Risk-based Audit Approach – Part II 11-69
facility, audit files and extended records must be specified to the systems
designer. The second control implication is that if the audit trail exists only
momentarily in the form of transaction logs or master records before destructive
update, the external auditor must review and evaluate the transaction flow at
various times throughout the processing period. Alternatively, the external
auditor can rely more extensively on the internal auditor to monitor the audit
trail.
5. Major characteristics:
1. Staff and location of the computer – operated by small staff located within the
user department and without physical security.
2. Programs – supplied by computer manufacturers or software houses.
3. Processing mode – interactive data entry by users with most of the master file
accessible for inquiry and direct update.
Control Problems:
1. Lack of segregation of duties.
2. Lack of controls on the operating system and application programs.
3. Unlimited access to data files and programs.
4. No record of usage.
5. No backup of essential files.
6. No audit trail of processing.
7. No authorization or record of program changes.
6. Auditing through the computer refers to making use of the computer itself to test
the operative effectiveness of application controls in the program actually used
to process accounting data. Thus the term refers only to the proper study and
evaluation of internal control. Auditing with the computer refers both to the
study of internal control (the same as “auditing through”) and to the use of the
computer to perform audit tasks.
7. Both are audit procedures that use the computer to test controls that are included
in a computer program. The basic difference is that the test data procedure
utilizes the client’s program with auditor-created transactions, while parallel
simulation utilizes an auditor-created program with actual client transactions. In
the test data procedure the results from the client program are compared to the
auditor’s predetermined results to determine whether the controls work as
described. In the parallel simulation procedures the results from the auditor
program are compared to the results from the client program to determine
whether the controls work as described.
8. The test data technique utilizes simulated transactions created by the auditor,
processed by actual programs but at a time completely separate from the
processing of actual, live transactions. The integrated test facility technique is
18-69
11-70 Solutions Manual - Principles of Auditing and Other Assurance
Services
an extension of the test data technique, but the simulated transactions are
intermingled with the real transactions and run on the actual programs
processing actual data.
11.
Phases Noncomputer auditor involvement
1. Define the audit objectively 1. Primary responsibility
2. Feasibility 2. Evaluate alternatives
3. Planning 3. Review with computer auditor
4. Application design 4. none
5. Coding 5. none
6. Testing 6. Review final test results, compare to plan
7. Processing 7. Actual computer processing – none
Use of results – depends on application
8. Evaluation 8. Full responsibility
14. With either data base or spreadsheet software packages, macros (sets of
instructions) can be developed for retrieving data from the working trial balance
18-70
A Risk-based Audit Approach – Part II 11-71
and converting this data into classified financial statements. If one or more
subsidiaries are to be included, the consolidated process can also be automated
by the inclusion of special modules designed for that purpose. The standard
audit report, as well as recurring footnotes, can be included in the data base, and
modified to fit the circumstances of the current year’s audit results.
15. Relational data base packages have all the advantages of spreadsheets, and, in
addition, have the capacity to store and handle larger quantities of data. They
are especially useful in manipulating large data bases, such as customer accounts
receivable, plant assets, and inventories.
1. a 5. d 9. b 13. c 17. b
2. c 6. d 10. d 14. a 18. c
3. c 7. c 11. b 15. d 19. d
4. d 8. b 12. b 16. b
b. The CPA would decide to audit “through” the computer instead of “around”
the computer (1) when the computer applications become complex or (2)
when audit trails become partly obscured and external evidence is not
available.
18-71
11-72 Solutions Manual - Principles of Auditing and Other Assurance
Services
sample of transactions selected for auditing does not cover unusual
transactions that require special treatment.
c. (1) “Test data” is usually a set of data in the form of punched cards or
magnetic tape representing a full range of simulated transactions, some of
which may be erroneous, to test the effectiveness of the programmed
controls and to ascertain how transactions would be handled (accepted or
rejected) and if accepted, the effect they would have on the accumulated
accounting data.
(2) The auditor may use test data to gain a better understanding of what the
data processing system does, and to check its conformity to desired
objectives. Test data may be used to test the accuracy of programming
by comparing computer results with results predetermined manually.
Test data may also be used to determine whether errors can occur
without observation and thus test the system’s ability to detect
noncompliance with prescribed procedures and methods.
The CPA may also request, on a surprise basis, that the program be left in
the computer at the completion of processing data so that he can use the
program to process his test data. This procedure may reveal computer
operation intervention. If, so, ensures that a current version of the program
is being audited, an important procedure in computer installations newly
installed and undergoing many program changes. To gain further assurance
about this matter, the CPA should inquire into the client’s procedures and
controls for making program changes and erasing superseded program
tapes, and should examine log tapes where available.
18-72
A Risk-based Audit Approach – Part II 11-73
for adequate input editing, as well as some form of transaction log as
documentation at the input stage.
IMPACT ON THE INDEPENDENT AUDIT: In examining internal
control, under these circumstances, the auditor must rely more on
observation, inquiry, and reprocessing of transactions for control testing
purposes, and less on document testing. If documents are retained for only
a short period, the auditor should also consider the feasibility of frequent
visits for both substantive and control testing purposes.
b. Uniformity of processing
IMPACT ON THE INTERNAL CONTROL SYSTEM: The impact of this
internal control characteristic is to generally strengthen control by
increasing the consistency of processing. Once the proper controls are
installed and tested, processing consistency increases the accuracy of
transaction processing over that which exists in manual systems.
IMPACT ON THE INDEPENDENT AUDIT: The auditor must emphasize
control study and testing at the point of transaction input and processing to
determine that the necessary controls exist and are functioning. Upon
determining that the necessary input and processing controls are in place
and functioning properly, the auditor may elect to perform little or no
document testing.
c. Concentration of functions
IMPACT ON THE INTERNAL CONTROL SYSTEM: In manual systems,
separation of functional responsibilities provides a double-check for the
purpose of enhancing processing accuracy. In EDP accounting systems,
consistency of processing removes the need for double-check.
IMPACT ON THE INDEPENDENT AUDIT: The auditor must determine
that the necessary input editing controls are in place and functioning to
ensure that transactions are accurately introduced into the processing
stream. Moreover, to ensure checks and balances within the electronic data
processing function, the auditor should study the organizational structure of
the EDP group to ascertain proper separation among the following
functions:
Systems analysis and design
Program design, development, and testing
Computer operations involving data processing
Distribution of EDP output and reprocessing of errors
18-73
11-74 Solutions Manual - Principles of Auditing and Other Assurance
Services
IMPACT ON THE INTERNAL CONTROL SYSTEM: The greater the
number of input terminals providing access to data bases, and the more
integrated the data base, the greater the danger of unauthorized access. To
protect the data bases under these circumstances, the internal control
policies and procedures should provide for effective control over
identification codes and passwords permitting access to data bases; and the
control policies should also fix responsibility in designated individuals for
specified elements of data bases.
In batch systems, access to magnetic tape and disk files and programs
should be secured by assigning responsibility over these files to one or more
individuals designated as “librarians,” and instituting a formal “checkout”
system for releasing and reacquiring files and programs.
IMPACT ON THE INDEPENDENT AUDIT: The auditor should determine
that proper control over I.D. codes and passwords exists, that codes and
passwords are changed frequently and voided upon termination of
employment, and that responsibility for elements of data bases has been
appropriately fixed.
In batch systems, the auditors should determine that tape and disk files and
programs stored off-line are properly secured.
Case 3. a. Test data approach: The auditor prepares simulated input data (both valid
and invalid transactions) that are processed, under the auditor’s control, by
the client’s processing system.
ITF approach: The auditor creates a fictitious entity within the client’s
actual data files, and processes simulated data during live processing by
client. The auditor then compares the results of processing with anticipated
results.
18-74
A Risk-based Audit Approach – Part II 11-75
Tagging and tracing: This is a technique whereby an identifier or “tag” is
affixed to a transaction record; and the tag triggers “snapshots” during the
processing of transactions. Following the tagged transactions through the
system permits the auditor to evaluate the logic of the processing steps and
the adequacy of programmed controls.
Advantage: The use of actual data eliminates the need for removing data
from the client’s processing system.
Disadvantage: The auditor analyzes the transactions only after processing
is completed.
SCARF: A systems control audit review file is an audit log used to collect
information for subsequent analysis and review. An imbedded audit module
monitors selected transactions as they pass by specific processing points.
The module then captures the input data so that relevant information,
accessible only by the auditor, is displayed at key points in the processing
system.
18-75
11-76 Solutions Manual - Principles of Auditing and Other Assurance
Services
understanding of how the computer processes data, nor of the controls
which have been incorporated into the computer programs.
In auditing through the computer, the auditor actually tests the programmed
controls used in processing specific applications. Such techniques as design
phase auditing, ITF, tagging and tracing, SCARF, test data, and surprise
audit are examples of auditing through the computer.
Case 4. (a) Test decks, also called “test data,” are sets of computer input data which
reflect a variety of auditor-identified transactions for verification through
actual computer processing to detect invalid processing of results (i.e.,
existing programs run test data). Ideal test data should present the
application under examination with every possible combination of
transactions, master file situations, and processing logic which could be
encountered during actual comprehensive processing. Test data are usually
processed separately from actual data using copies of master files. Test
decks are most feasible when the variety of transactions processing and
controls is relatively limited (i.e., fairly simple files).
18-76
A Risk-based Audit Approach – Part II 11-77
results are matched with those from the live programs, providing a means
for testing through comparison.
(c) The integrated test facility approach permits the introduction of auditor-
selected test data into a computer system with actual or “live” data and then
traces the flow of transactions through the various system processing
functions for comparison to predetermined actual results. An ITF involves
the creation or establishment of a “dummy” entity (e.g., a branch or
division) to receive the results of the test processing. Therefore,
transactions are processed against the test entity together with actual
transactions. Test data must be removed from the entity’s records upon
completion of the test. Uses are identical to the test deck technique.
(d) Tagging and tracing and SCARF are forms of transaction tracking provided
only for auditor selected computer inputs carrying a special code. If the
capability is provided in the application system in advance, the attachment
of a code to any input transaction can be made to generate a printed
transaction trail for that item following each step of the application
processing.
The exercise of due audit care requires a critical review at every level of audit
supervision of the work done and the decisions made by auditors. Lacking the
requisite skills and lacking independent decisions, the due care expected of an
auditor at operational, supervisor, and review levels cannot be delivered.
18-77
11-78 Solutions Manual - Principles of Auditing and Other Assurance
Services
The Philippine Standards on Auditing require adequate planning and supervision
of assistants. Training and proficiency in computer systems auditing is
necessary in order to plan access to computerized records, programs, and to
obtain machine time for conducting audit procedures. The planning should
provide for an early examination of the computer system so that further
procedures involving non-computer control and accounting features may be
planned should they depend upon computer control procedures.
Training and proficiency are very important for being able to obtain an
understanding of the internal control structure in a computer system. Client
personnel will expect audit personnel to be capable of working with a computer
system.
The Philippine Standards on Auditing also require the auditor to obtain sufficient
competent evidential matter to provide a basis for an opinion on financial
statements. Documentary evidence relating to a computer system includes
program flow charts, logic diagrams, and decision tables that are not normally
used in non-computer systems. Since these types of documentation are a part of
the evidence, they must be understood by the auditor, and understanding of them
comes through training and proficiency in their use.
CHAPTER 23
TESTS OF CONTROLS
I. Review Questions
1. Directly. Higher levels of control risk induce auditors to audit larger samples of
receivables, with confirmation date closer to the fiscal year end date. As for
nature of the procedures: higher levels of control risk induce auditors to use
positive confirmations instead of negative confirmations, and to consider
vouching subsequent payments by the customers.
18-78
A Risk-based Audit Approach – Part II 11-79
The purpose of the “walk through” is to obtain an understanding of the
transaction flow, the control procedures and populations of documents that may
be utilized in test of controls auditing.
4. The internal auditors should, through periodic checks, ensure that the control
account is periodically reconciled to the customer subsidiary accounts, bank
statements are reconciled and that all prenumbered documents, especially
invoices, have all numbers accounted for. Some internal auditors also confirm
accounts receivable. Internal auditors also might review and evaluate customer
complaints for signs of weaknesses in the procedures leading to errors in
accounts receivable.
5. The features of a cash receipts internal control system which would be expected
to prevent an employee from absconding with company funds and covering with
funds from the employee pension fund is the prohibition against one employee
having custody of company funds and noncompany funds. The auditor can
detect such transfers by controlling and counting both funds simultaneously.
To prevent the cash receipts journal and recorded cash sales from reflecting
more than the amount shown on the daily deposit slip, the internal control
system should provide that receipts be recorded daily and intact. A careful bank
reconciliation by an independent person could detect such errors.
6. The evaluation after the review phase was to determine which controls appeared
adequate as a basis for justifying a low control risk assessment. The final
assessment after test of controls auditing is to determine if the controls are
actually operating as well as they appeared to be.
18-79
11-80 Solutions Manual - Principles of Auditing and Other Assurance
Services
receivable control account.
3. Transactions are authorized by 3. Cash receipts for transactions other
company policy. than merchandise sales (scrap
sales, sales of fixed assets) are
properly authorized.
4. Transaction peso amounts are 4. Cash receipts are compared to
properly calculated. invoice terms to determine proper
cash discounts.
5. Transactions are properly 5. Cash receipts for nonmerchandise
classified in the accounts. sales are posted to proper accounts.
6. Transaction accounting is 6. All cash receipts for credit sales are
complete. posted to customer individual
accounts.
7. Transactions are accounted in the 7. Cash receipts are deposited daily
proper period. intact and recorded as of date
received.
8. If the credit limits are set and entered incorrectly, the credit approval process
will be systematically deficient.
10. The “walk through” of a purchase transaction would begin with the preparation
of the requisition by the Stores department, through the bidding process and
preparation of the purchase order by the purchasing agent, to receipt of vendor’s
invoices and receiving report by the purchasing agent and finally to accounts
payable voucher preparation. Procedures would be observed and notations
made on document samples of procedures followed.
18-80
A Risk-based Audit Approach – Part II 11-81
b. Blank supporting documents (invoices, receiving reports, requisitions,
purchase orders) kept in secure locations available only to authorized
personnel.
c. Supporting documents canceled by Cash Disbursement function when
checks are prepared.
d. Separation of duties of preparers of supporting documents, preparation of
vouchers, check preparation, and check signing.
e. Vouchers and other supporting documents reviewed by check signers.
f. Checks mailed directly by signer and not returned to accounts payable.
13. The point of this quotation is to generate discussion on the source of errors and
therefore the controls necessary when an accounting process is computerized.
Discussion items might include the following:
1. People have bad days and make mistakes; computers do not have bad days.
2. Murphy’s Law – If it is possible to make an error, someone will find a way
to do it.
3. People initiate the transactions and will make errors.
4. All controls should be considered together (manual and computer).
Excellent computer controls cannot be relied upon if the related manual
controls are weak.
5. In computer systems, it is extremely important to establish extensive input
validation controls to prevent people errors from getting into the processing
(GIGO – garbage in, garbage out).
6. People can prevent a good computer system from working well if they are
not convinced it is in their best interests.
7. People will rarely question computer printed output, even though it may not
be correct.
8. Most computer controls are to prevent, detect, or correct errors made by
people.
14. The purpose of the auditor’s search for unrecorded liabilities is to gather
evidence as to whether the liability assertion is true. The same concern exists in
the internal control objective “all valid transactions are recorded and none are
omitted.” From an evidence gathering perspective, it is much more difficult to
gather evidence on unrecorded transactions than to gather evidence that recorded
transactions (and account balances) are proper.
The search for unrecorded liabilities includes procedures in other audit areas
such as questions on bank and insurance confirmations and vouching the source
18-81
11-82 Solutions Manual - Principles of Auditing and Other Assurance
Services
of funds for asset additions. Specific audit procedures in the search for
unrecorded liabilities include:
1. Obtain vendor’s invoices (or accounts payable vouchers) recorded for
several days after the balance sheet date to determine if the liability relates
to the balance sheet period under audit.
2. Scan cash disbursements for several days subsequent to year-end and vouch
to support to determine if cutoff was proper. Scan all cash disbursements
until the end of field work for unusual amounts and payees to determine if
amounts paid represent liabilities of the balance sheet period.
3. Examine BIR tax reports and correspondence and the audit reports of tax
authorities and trace additional tax assessments to the accounts.
4. Confirmation of accounts payable.
5. Use analytical procedures such as trend comparisons of accounts payable to
sales, sales taxes to sales, payroll taxes to gross payroll and interest expense
to average notes payable.
18-82
A Risk-based Audit Approach – Part II 11-83
Observe timekeeping, Reconciliation hours per
compare job tickets to clock cards to hours per
clock cards J.T.
Material used report Material used report Issue slips and
prepared (MUR) requisitions support
MUR.
Observe matching issue Records from sources
slips and material used reconciled.
report
Observe matching job Records from separate
time tickets (or labor sources reconciled.
distribution) to labor
report
Enter costs in job cost Job cost sheets (JCS) Support for all entries in
sheets JCS.
Summary entry Summary entry form Job cost sheets support
prepared. summary entries.
Trace summary entry to Separation of duties; cost
General Ledger posting accounting and general
ledger.
Preparation of Report of units Independent report of
completion report completed (RUC) production completed.
Observe units compared Independent check of
to RUC, post finished RUC.
records
Products received report Products received report Independent records of
prepared (PRR) units put into finished
goods inventory.
Observe comparison Records from separate
RUC and PRR sources reconciled.
Job sheets closed out, Summary entry form Closed job sheets, RUC
summary entry prepared and PRR support
summary entries.
Trace summary entry to Separation of duties; cost
General Ledger posting accounting and general
ledger.
16. Weaknesses (lack of control where auditors believe one is necessary) are not
audited because auditors do not rely upon weaknesses to prevent, detect or
18-83
11-84 Solutions Manual - Principles of Auditing and Other Assurance
Services
correct material errors. Auditors must consider the financial impact of
weaknesses on financial statements and plan substantive tests accordingly.
A control strength may be identified in interviews during the review phase (or in
preparing the flowcharts or questionnaires), but during test of controls auditing,
found to be nonexistent or operating ineffectively. For example, in the
conversion cycle the production management may state that foremen approve
workers’ job time tickets. However, when a sample of job time tickets are
examined by auditors for evidence of approval, none is found. Thus, a weakness
is not found until the control is tested. Therefore, control risk should not be
assessed low until evidence is gathered that the control is operating effectively.
17. The purpose of this review question is to foster discussion toward what
information an independent auditor needs to know. Items relevant to the
quotation might include:
1. Reference to the standard regarding “adequate technical training and proficiency
as an auditor.”
2. Reference to the standard regarding “due professional care.”
3. Obviously, the auditor must be knowledgeable about cost accounting to
audit a manufacturing company.
4. In a manufacturing company, the inventories most likely will be a major
asset which will require substantial audit work.
5. A proficient auditor must be knowledgeable in all phases of the business,
including production, marketing, finance as well as accounting data
processing.
18. The surprise observation enables the auditor to see how the distribution system
really works and increases his chances of detecting fraud. Such an observation
involves taking control of paychecks, then accompanying a client representative
as the distribution takes place. The auditor checks to see that each employee is
identified and that only one check is given to each individual. Unclaimed
checks are controlled and examined to detect any fictitious persons on the
payroll.
18-84
A Risk-based Audit Approach – Part II 11-85
Cost distribution Labor distribution sheet
Accounts payable Payroll voucher
Cash disbursement Payroll checks
If the payroll is processed by computer, the clock cards and job time tickets
would be traced to batch control in the timekeeping and production departments,
to data preparation (keying to machine sensible form), to edit and validation
error reports and other computer output indicating control and finally to
computer prepared checks, labor distribution reports and summary general
ledger entries.
1. c 5. a 9. d 13. b 17. d
2. c 6. c 10. b 14. a 18. d
3. b 7. c 11. a 15. c 19. c
4. c 8. b 12. a 16. d 20. b
18-85
11-86 Solutions Manual - Principles of Auditing and Other Assurance
Services
(Debit a customer’s payment to Returns and Allowances instead of to
cash, or just charge the control total improperly).
Case 2. The discussion could take several directions, including some or all of the
following:
1. Material Weakness. The facts seem to suggest “a condition in which
specific control features (few or none are described) or the degree of
compliance with them do not reduce to a relatively low level the risk that
errors or irregularities in amounts that could be material to the financial
statements may occur and not be detected within a timely period by
employees in the normal course of performing their assigned functions.”
Castro has authority and influence over too many interrelated activities.
Nothing he does seems to be subject to review or supervision. He even is
able to exclude the internal auditor.
18-86
A Risk-based Audit Approach – Part II 11-87
a. Segregation of Functional Responsibilities. Castro has authorization
and custodial responsibilities.
b. Authorization, Supervision. Castro is apparently subject to no
supervision or review. The accounting staff is probably powerless to
challenge transactions because of Samuel’s apparent approval of
Castro’s powers.
c. Controlled Access. The whole situation gives Castro access to
necessary papers, records, and assets to carry out his one-man show.
d. Periodic Comparison. No one else apparently has any access to the
materials inventory in order to conduct an actual count for comparison
to the book value (recorded accountability) of the inventory.
Case 3. The purpose of this question is to get the student to consider where the functions
that are considered incompatible in a manual system occur in a computer
system.
Different people should: indicate the sales order source document (authorize),
prepare the computer program (authorize and record), operate the computer
(record), have custody of inventory and correct errors (reconciliation).
Case 4. If the credit limits are set and entered incorrectly, the credit approval process
will be systematically deficient.
Case 5. Memorandum
You requested a report which identifies the weaknesses in the existing system of cash
admission fees and my recommendations. Below are the weaknesses that exist and my
recommendations for procedures that overcome these weaknesses. I will be pleased to
discuss these at the next board meeting and offer further explanations that may be necessary.
18-87
11-88 Solutions Manual - Principles of Auditing and Other Assurance
Services
Weakness: There is no segregation of duties between persons responsible for collecting
admission fees and persons responsible for authorizing admission.
Recommendation: One clerk (hereafter referred to as the collection clerk) should collect
admission fees and issue prenumbered tickets. The other clerk (hereafter referred to as the
admission clerk) should authorize admission upon receipt of the ticket or proof of
membership.
Weakness: Cash receipts are not promptly deposited. Cash should not be left undeposited
for a week.
Recommendation: Cash should be deposited at least once each day.
18-88
A Risk-based Audit Approach – Part II 11-89
b. Audit Program for Sales Divisions – Audit Steps
1. Prepare a schedule of transfer payments made by the branch for a
period covering two weeks prior and two weeks after the end of the
fiscal period showing:
Check number
Date of entry in cash disbursements book
Amount of check
Date of perforation by paying bank
Transfer checks outstanding at the date of cutoff
Transfer checks outstanding at the date of reconciliation.
2. Compare dates of issue on canceled checks and of entries.
3. Trace and compare dates of perforation and dates of payment on the
bank statement and the “cutoff” statement.
4. Compare dates of issue of checks to date of perforation looking for:
a. unusual delays in payment
b. discrepancy in accounting periods for the two dates.
5. Scan cancelled checks and cash disbursements records during the year
for:
a. names of payees,
b. consecutive numbers of checks to determine whether any payments
other than regular transfers to main office were made from this
account.
6. Reconcile individually several transfers during the year to
corresponding collections presumed to be transferred as of each
individual date.
7. Reconcile total collections for the year to total transfers.
18-89
11-90 Solutions Manual - Principles of Auditing and Other Assurance
Services
b. If payroll department personnel were also responsible for time records,
they would have effective control over transaction authorization (i.e.,
hours worked approval) and could overpay themselves or friends.
CHAPTER 24
SUBSTANTIVE TESTS OF
TRANSACTIONS AND BALANCES
I. Review Questions
1. The cutoff bank statement is a bank statement sent by the bank directly to the
auditor, and it is usually for a fifteen or twenty day period following the
reconciliation date. The basic use of the statement by the auditor is to determine
whether outstanding checks were actually mailed before the reconciliation date.
2. All cash funds (and negotiable investment stock and bond certificates) should be
counted at the same time (simultaneously) so that money (or securities) cannot
be shifted from one location to another to conceal a shortage. If simultaneous
count cannot be made, as each fund (or each negotiable asset) is counted, it
should be locked and sealed until all are counted.
18-90
A Risk-based Audit Approach – Part II 11-91
5. Generally, vouching of documentation underlying receivables balances is
deferred until after confirmation. Then vouching is performed in regard to
accounts for which confirmations were mailed but no replies received.
Additionally, vouching may be used to gather evidence about account
discrepancies and disputes indicated on confirmation responses.
9. Auditors get in the most trouble by missing overstated assets and understated
liabilities. Therefore, they need to audit for the existence of assets and the
completeness of liabilities.
10. Notes payable audit evidence obtained from a standard bank confirmation used
in the audit cash. Sales tax liability derived partially from the audit of sales
revenue (also commissions payable and excise taxes payable). Income tax
liability is derived from the net income number (audit of all revenue and
expense accounts).
11. The types of fraud and material misstatement with respect to cash disbursements
include:
1. The sending of checks to a fictitious person or company to accomplices outside
(coupled with internal record alterations).
2. The increasing (altering) of amounts payable to outside accomplices.
3. The intercepting of payments to a bank (coupled with internal record
alterations).
4. The drawing of checks payable to cash or bearer for one’s own use.
The procedures auditors use most frequently to detect cash disbursement embezzlement
schemes include:
1. A proof of cash – a recalculation – which reconciles cash receipts and
disbursements per the bank statement with receipts and disbursements
18-91
11-92 Solutions Manual - Principles of Auditing and Other Assurance
Services
recorded in the accounts. The auditor will satisfy himself as to the propriety
of all checks payable to “cash” or bearer, NSF checks, and checks drawn to
officers and other employees.
2. The confirmation with all bank creditors of amounts owed, terms and
activity during the period.
3. The auditor’s test of purchase transactions – vouching, tracing and
recalculation in regard to purchase orders, supplier invoices, cash
disbursement journal and voucher register.
4. The auditor’s obtaining satisfaction of the proper separation of functions:
To establish that a proper separation exist, the auditor will not only examine
internal records purporting a proper separation, he will also examine
documents for compliance and observe personally the flow of operations
and activities.
12. The characteristics that the auditor is looking for in his review of the client’s
inventory-taking instructions include:
1. Names of client personnel responsible for the count.
2. Dates and times of inventory-taking.
3. Names of client personnel who will participate in the inventory-taking.
4. Detail instructions for recording accurate descriptions of inventory items,
for count and double-count, and for measuring or translating physical
quantities.
5. Detail instructions for making notes of obsolete or worn items.
6. Detail instructions for the use of tags, punched cards, count sheets, or other
media devices, and for their collection and control.
7. Plans for shutting down plant operations or for taking inventory after store
closing hours, and plans for having goods in proper places.
8. Plans for counting or controlling movement of goods in receiving and
shipping areas if those operations are not shut down during the count.
9. Detail instructions for compiling the count media (e.g., tags and punched
cards) into final inventory listings or summaries.
10. Detail instructions for pricing the inventory items.
11. Detail instructions for review and approval of the inventory count, notations
of obsolescence, or other matters by supervisory personnel.
13. As is true in other areas of a financial audit, verbal inquiry is a valuable tool for
obtaining preliminary evidence in the audit of inventory and cost of sales. For
example, the auditor can gain information such as the locations of inventory,
dates for the physical count, inventory held by consignees and public
warehouses, the cost-flow assumption used to price cost of goods sold and
inventories, and the pledging of inventory as collateral on loans.
18-92
A Risk-based Audit Approach – Part II 11-93
apparently worn, damaged or obsolete inventory, and the existence of large
inventory stockpiles.
15. The auditor can obtain preliminary evidence through physically observing plant
facilities and making verbal inquiries; for example, evidence can be obtained
regarding the quantity and size of assets, their location and apparent physical
condition, the activity surrounding them, and ownership of the facilities.
16. To obtain relevant audit data about investment securities, auditors’ procedures
include:
1. Inspecting the securities in the presence of a responsible client officer.
2. Personally examining the securities while other negotiable fund sources are
sealed off or are being examined simultaneously.
3. Obtaining a written statement from the client’s representative that the
securities were returned intact.
4. Obtaining the information by confirmation from an independent party (e.g.,
trustee) who holds the securities.
17. Investment cost can be vouched to brokers’ advices, monthly statements and
canceled checks. The auditors can similarly vouch the price of securities sold
and investment income to this documentary evidence and then trace amounts to
income, gain and loss, and cash accounts.
18. If investments are sold at substantial losses early in the period following year-
end, there is evidence that the securities were overvalued at the balance sheet
date. Accordingly, the auditor will consider whether such securities should be
written down in the financial statements of the period under audit.
18-93
11-94 Solutions Manual - Principles of Auditing and Other Assurance
Services
19. The long-term liabilities (and fixed assets and owners’ equity) are characterized
by a few large transactions, unlike the current assets and liabilities which have
numerous small transactions. Except for the initial year of an audit, the entire
balance is not verified each year. Only the changes in the account that occurred
in the current period need to be audited. The results of the audit of prior year’s
changes are recorded in “carry-forward” working papers for these accounts.
22. The following matters are usually covered during the conference with the client
at audit completion:
a. Proposed audit adjustments;
b. Material internal financial control weaknesses;
c. Recommended footnote disclosures;
d. Type of audit report to be rendered.
1. b 5. c 9. b 13. c 17. d
2. b 6. c 10. c&d 14. d 18. a
3. d 7. c 11. b 15. d 19. a
4. d 8. b 12. b 16. c 20. c
Case 1. a. The CPA’s test of the sales cutoff at June 30 should include the following
steps:
1. Determine what JETO’s cutoff policy is, review the policy for
reasonableness, and compare it to the prior year for consistency.
18-94
A Risk-based Audit Approach – Part II 11-95
2. Select a sample of sales invoices (including the last serial invoice
number) from those recorded in the last few days of June and the first
few days of July.
3. Trace these sales invoices to shipping documents and determine that
sales have been recorded in the proper period in accordance with
company cutoff policy.
4. Determine that the cost of goods sold has been recorded in the period of
sale.
5. Select a sample of shipping documents for the same period and trace
these to the sales invoice. Determine that the sale and the cost of goods
sold have been recorded in the proper period.
6. Review the cutoff for sales returns and allowances, determine that it
has been based upon a consistent policy and that there have not been
abnormal sales returns and allowances in July; this might indicate
either an overstatement of sales during the audit period or the need for a
valuation account at June 30 to provide for future returns and
allowances.
b. (1) The CPA will use the July 10 cutoff bank statement in his review of the
June 30 bank reconciliation to determine whether:
(a) The opening balance on the cutoff bank statement agrees with the
“balance per bank” on the June 30 reconciliation.
(b) The June 30 bank reconciliation includes those canceled checks
that were returned with the cutoff bank statement and are dated or
bear bank endorsements prior to July 1.
(c) Deposits in transit cleared within a reasonable time.
(d) Interbank transfers have been considered properly in determining
the June 30 adjusted bank balance.
(e) Other reconciling items which had not cleared the bank at June 30
(such as bank errors) clear during the cutoff period.
Case 2. The procedure followed appears to be appropriate except that the examination of
detail transactions for three months might be considered to be excessive in view
of the exceptionally good internal control. A lighter test of such transactions,
designed to test the effectiveness of the control procedures, might be devised.
18-95
11-96 Solutions Manual - Principles of Auditing and Other Assurance
Services
1. Review the company’s method of sales cutoff at year-end and test billings
and shipments (including returns) for an adequate period before and after
year-end to establish that cut-off procedures have been adhered to.
2. Examine collections in early part of subsequent period to determine if a
substantial portion of the receivables has been collected.
3. Examine agreements entered into with the distributors. If price protection
clauses are included, review the current price position and distributor
inventory positions to determine whether a reserve for such protection is
needed.
4. When a company deals with a limited number of customers, it is dependent
upon the continued solvency of all such customers.
5. Obtain a representation letter from appropriate company officials covering
the receivables.
3. a. Valid liabilities are recorded and none omitted (sound error checking
practices).
b. Observe client personnel making comparisons. Review correcting
journal entries that result from the comparison.
c. Purchases or other liabilities may fail to be recorded and the error not
detected by any other means.
Case 4. a. The fact that the client made a journal entry to record vendors’ invoices
which were received late should simplify the CPA’s audit for unrecorded
liabilities and reduce the possibility of a need for a further adjustment, but
the CPA’s audit is nevertheless required. If the client has not journalized
18-96
A Risk-based Audit Approach – Part II 11-97
late invoices, the CPA is compelled in his testing to substantiate what will
ultimately be recorded as an adjusting entry. In this examination the CPA
should audit entries in the 2004 voucher register to ascertain that all items
which according to dates of receiving reports or vendors’ invoices were
applicable to 2004 have been included in the journal entry recorded by the
client.
b. No. The CPA should obtain a letter in which responsible executives of the
client’s organization represent that to the best of their knowledge all
liabilities have been organized. However, this is done as a normal audit
procedure to afford additional assurance to the CPA and it does not relieve
him of the responsibility for doing his own audit work.
d. In addition to the 2005 voucher register, the CPA should consider the
following sources for possible unrecorded liabilities:
1. Unentered vendors’ invoice file.
2. Status of tax returns for prior years still open.
3. Discussions with employees.
4. Representations from management.
5. Comparison of account balances with preceding year.
6. Examination of individual accounts during the year.
7. Existing contracts and agreements.
8. Minutes.
9. Attorney’s bills and letter of representation.
10. Status of renegotiable business.
11. Correspondence with principal suppliers.
12. Audit testing of cutoff date for reciprocal accounts, e.g., inventory and
fixed assets.
Case 5. a. Lourdes should find in the audit working papers a planning memo
describing the client’s inventory-taking plan and notes about the auditor’s
first-hand observation of the instructions being given to counters, along
with a memo about the auditors’ observation of the counting. This memo
18-97
11-98 Solutions Manual - Principles of Auditing and Other Assurance
Services
should tell about supervision of the audit staff, and the working papers (test
counts) should show the review signatures of the supervising auditors.
Case 6. The three categories of major losses or manipulations in the area of investments
are: theft of diversion of funds, manipulation of accounting, and business
espionage. Business espionage is generally outside the sphere of independent
auditors’ interest.
Case 7. a. The objectives (specific assertions) for the audit of non-current investment
securities are to obtain evidence regarding the:
Existence of the investment securities at the balance sheet date.
Ownership of the investment securities.
Cost and carrying value of the investment securities.
Proper presentation and disclosure of the investment securities in
the financial statement.
Proper recognition of interest income.
Proper recognition of investment gains and losses.
18-98
A Risk-based Audit Approach – Part II 11-99
Verify the calculation of interest income.
Review the propriety of the presentation and disclosure of the
securities in the financial statements.
Make certain that the client representation letter includes the
proper assertions concerning accounts payable.
Investigate and resolve confirmation exceptions and other matters
requiring follow-up.
Case 8. a. The audit objectives in the examination of long-term debt are to determine
that:
1. All liabilities were properly recorded.
2. Items recorded as liabilities are bona fide obligations.
3. Interest expense and/or amortization was properly computed and
recorded.
4. The client is not in violation of restrictions or requirements imposed on
it by the terms of the loan agreement.
5. Satisfactory authority existed to enter into long-term obligation
agreements.
6. All long-term obligations are properly classified in the balance sheet.
7. Assets pledged as security are adequately disclosed.
CHAPTER 25
18-99
11-100 Solutions Manual - Principles of Auditing and Other Assurance
Services
AUDITING FAIR VALUE MEASUREMENTS
AND DISCLOSURES
I. Review Questions
CHAPTER 26
I. Review Questions
18-100
A Risk-based Audit Approach – Part II 11-101
1. An auditor who reports on the financial statements of a combined entity when he
or she audited the major part of the combined entity is the principal auditor.
Auditing standards identify procedures to be followed by a principal auditor.
5. While the external auditor has sole responsibility for the audit opinion expressed
and for determining the nature, timing, and extent of external audit procedures,
certain parts of internal auditing work may be useful to the external auditor.
The external auditor should obtain a sufficient understanding of internal audit
activities to assist in planning the audit and developing an effective audit
approach.
Effective internal auditing will often allow a modification in the nature and
timing, and a reduction in the extent of procedures performed by the external
auditor but cannot eliminate them entirely. In some cases, however, having
considered the activities of internal auditing, the external auditor may decide
that internal auditing will have no effect on external audit procedures.
The external auditor’s preliminary assessment of the internal audit function will
influence the external auditor’s judgment about the use which may be made of
internal auditing in modifying the nature, timing and extent of external audit
procedures.
1. c 3. d 5. b
2. b 4. b 6. c
18-101
11-102 Solutions Manual - Principles of Auditing and Other Assurance
Services
a. Tan should ask San Nicolas to authorize Andres to respond fully to her inquiries.
If San Nicolas refuses or limits the responses, Tan should request San
Nicolas to explain the reasons. After obtaining the explanation, Tan should
consider whether to continue pursuing the engagement.
b. Tan will have to (1) obtain additional information about the client and
possibly about the industry, which Andres would have obtained in prior
years, (2) make a more detailed evaluation of whether to accept this
client, (3) obtain information about the client’s internal control, which
Andres would have obtained in prior years, and (4) obtain evidence about
beginning balance sheet balances, which Andres would have obtained in
prior years.
CHAPTER 28
I. Review Questions
1. Scope paragraph
(a) The objects of the audit are the financial statements – balance sheet(s), income
statement(s), and cash flow statement(s), and related footnote disclosure,
not the “books and records.”
* Professional judgment was exercised in performing the tests and choosing the
procedures to perform in the circumstances.
18-102
A Risk-based Audit Approach – Part II 11-103
Unqualified opinion X
Adverse opinion X
Opinion qualified for a
departure from SFAS X
Paragraph for
inconsistent GAAP
application X
Paragraph for an
uncertainty X
Disclaimer of opinion X
4. Students may identify more than one description of the “most important”
distinction between an opinion and a disclaimer. All the following are valid,
although (a) is intended to be the “Most Important:”
a. An opinion (unqualified, qualified or adverse) is an explicit statement of the
auditor’s conclusion(s), while a disclaimer is an (empty) assertion of “no
conclusion.”
b. An (unqualified) opinion is the highest level of assurance, while a
disclaimer is the lowest level (no assurance).
c. An opinion requires evidence as a basis, while a disclaimer results from
lack of evidence.
d. Auditors must be independent to give an opinion, while a disclaimer can
result from a CPA’s lack of independence.
18-103
11-104 Solutions Manual - Principles of Auditing and Other Assurance
Services
modification of the auditor’s opinion provided the auditor can obtain satisfaction
by alternate means.
6. A principal auditor is one who has examined the major portion of the combined
entity.
7. When financial statements of the prior year are presented together with those of
the current year, a continuing auditor must report on both years. In “updating”
the prior year’s report, the auditor must decide whether to restate the report in its
same form or modify it to reflect current information not available at the date of
issuance of the prior report.
The reevaluation may cause the updated version to be different from the report
previously issued (for example, a new reason to write a qualification may be
found).
An updated report carries a current date, not the date of the previous report.
A predecessor auditor usually does not have the current information necessary
to update a report.
9. A principal auditor is the one who (a) audits a material portion of a reporting
entity’s assets, liabilities, revenues and expenses (usually over 50 percent) and
(b) knows enough about the whole entity to sign the audit report.
10. The principal auditor’s reference in his report to another auditor is not a
qualification in scope. The reference only shows the divided responsibility for
the audit work.
18-104
A Risk-based Audit Approach – Part II 11-105
(An accountant, not an auditor, is the person associated with compiled and
reviewed financial statements. An accountant can give a compilation –
disclaimer – report on compiled unaudited financial statements).
12. When the “going concern assumption” is in doubt, auditors have serious
reservations about the recoverability and amounts of reported assets and the
amount and classification of reported liabilities. These opinions may be used,
depending on the circumstances:
a. Standard unqualified report with an uncertainty notice paragraph calling
attention to the going concern problem.
b. Disclaimer of opinion to express unwillingness to give an opinion on the
presentation.
c. Opinion qualified or adverse for departure from GAAP if all appropriate
disclosures are not made.
15. The auditor may decide to disclaim an opinion when confronted by a material
scope limitation that precludes gathering sufficient evidence to support an
opinion as to overall fairness of financial presentation. The auditor may also
disclaim an opinion if his/her name is associated with financial statements for
which an audit was not intended (e.g., compilations and reviews), or if the
auditor is not independent.
18-105
11-106 Solutions Manual - Principles of Auditing and Other Assurance
Services
17. An auditor may agree with a departure from a designated principle only when, in
his/her judgment, application of the designated principle would make the
financial statements materially misleading.
18. The audit opinion does not extend to the other information, and therefore, the
opinion is not affected by omission or inconsistency or incorrect supplemental
information.
19. The auditor must evaluate, on every audit, the ability of the entity to meet its
obligations on a continuing basis during a reasonable period (usually 12 months)
following the balance sheet date. Although the auditor is not required to apply
additional procedures in making the initial evaluation, if he/she has substantial
doubt as to ability of the client to continue, added procedures may have to be
applied to resolve the issues.
The greater the materiality, and the higher the probability of loss, the more
inclined will be the auditor to add the explanatory paragraph.
21. Upon learning of a change in accounting principle, the auditor should first
determine the materiality and appropriateness of the change. If material and the
auditor agree with the client’s justification for the change, an explanatory
paragraph should be added following the opinion paragraph. The paragraph will
refer to the footnote describing the change. If the change is not properly
accounted for or is inadequately disclosed, the auditor should consider issuing a
qualified or adverse opinion.
18-106
A Risk-based Audit Approach – Part II 11-107
2. d 12. b 22. c 32. c
3. a 13. d 23. a 33. b
4. c 14. a 24. d 34. c
5. c 15. b 25. c 35. d
6. c 16. d 26. a 36. b
7. c 17. d 27. a 37. d
8. a 18. a 28. c 38. a
9. d 19. b 29. c 39. d
10. c 20. c 30. b 40. b
Case 1. You must determine whether an unqualified opinion satisfies the GAAS
reporting standard, in particular:
a. Determine whether the financial statements are presented in conformity
with GAAP.
1. Read the footnote description of accounting policies.
2. Use a GAAP checklist.
3. Review the working papers for any indication of accounting policies
not described in the footnote or ones apparently not in conformity with
GAAP.
4. Determine if:
(i) The accounting principles are generally acceptable, having
authoritative support.
(ii) The accounting principles are appropriate in the circumstances.
(iii) The financial statements are informative.
(iv) The information is reasonably summarized.
(v) Material adjustments have not been waived without good reasons.
b. Determine whether any accounting changes have been made and whether
accounting principles have been applied consistently.
c. Determine whether the footnote disclosures are adequate to inform users of
any material information evident in the working papers.
Case 2. 1. The auditor is reporting to the body that has engaged the auditing services.
While the report may be read and used by others who are indirect
beneficiaries of the audit, current custom is not to address the report to the
unknown class of users.
18-107
11-108 Solutions Manual - Principles of Auditing and Other Assurance
Services
4. The alternative wording is similar to the typical British audit report, and
they seem to be able to live with it, but American auditors believe that
“opinion” connotes belief or judgment stronger than impression but less
strong than positive knowledge. American auditors do not wish to appear to
have full, positive knowledge about the statements on the grounds that it’s
not feasible to know all there is to know about the financial statements.
Also, the standard language leans heavily on GAAP as the criteria for fair
presentation whereas the alternative language contains no reference to
authoritative accounting criteria.
Case 3. 1. Title. The report needs a title referring to Rose as the independent auditor
or independent accountant.
2. Notice of audit. The report does not give the proper declaration of an audit
of the financial statements, especially the part about “in accordance with
your instructions,” which suggest that Rose surrendered some audit
independence. The reference to a “complete audit” is ill advised because it
suggests a 100% investigation, which is contradicted by the sentence about
“tests of the sales records.”
3. Responsibilities. The report says nothing about the auditor’s responsibility
for the audit report.
4. Opinion. The opinion sentence should not be modified with the phrase
“with the explanation given above.”
5. Opinion. The opinion sentence should not mention “minor errors we
consider immaterial,” but it should contain the phrase “presents fairly in all
material respects.”
6. Opinion/Identification of Financial Statements. The opinion should not
include reference to cash flows because the introductory paragraph did not
state that the cash flow statement was audited. This may be a deficiency in
the identification of the financial statements that were actually audited.
18-108
A Risk-based Audit Approach – Part II 11-109
7. Opinion. The opinion paragraph refers improperly to ASC
pronouncements. It should refer to “generally accepted accounting
principles.”
8. Date. The date accompanying Rose’s signature should be September 23 –
the day the field work was completed – not the company’s fiscal year-end
date.
9. Other. The commentary on the economy and the strike are not generally
appropriate for an audit report. Even if the auditor wanted to draw attention
to these matters, their relevance for understanding the financial statements
and their manner of expression are both questionable.
10. Other. The negative assurance (concerning the recording of sales) is not
permitted in audit reports.
Case 4.
Independent Auditor’s Report
To the shareholders and board of directors of Various Fabrics, Inc.:
We have audited the accompanying balance sheets of Various Fabrics, Inc. as of
January 31, 2004 and 2003 and the related statements of income, retained earnings,
and cash flows for the years then ended. These financial statements are the
responsibility of the company’s management. Our responsibility is to express an opinion
on these financial statements based on our audits.
We conducted our audits in accordance with generally accepted auditing standards.
Those standards require that we plan and perform the audit to obtain reasonable
assurance about whether the financial statements are free of material misstatement. An
audit includes examining, on a test basis, evidence supporting the amounts and
disclosures in the financial statements. An audit also includes assessing the accounting
principles used and significant estimates made by management, as well as evaluating
the overall financial statement presentation. We believe that our audits provide a
reasonable basis for our opinion.
In our opinion, the financial statements referred to above present fairly, in all material
respects, the financial position of Various Fabrics, Inc. as of January 31, 2004 and 2003
and the results of its operations and its cash flows for the years then ended in conformity
with generally accepted accounting principles.
Case 5. 1. F, L 5. B, I
2. B, I 6. B, I
3. B, Q 7. E, J
4. A, J
18-109
11-110 Solutions Manual - Principles of Auditing and Other Assurance
Services
Case 6. A. 1, 7c.
B. 2, 7a.
C. 4.
D. 1.
E. 6.
F. 5.
G. 2 (Note: The change in principle should be described in the descriptive
paragraph following the scope paragraph.)
H. 3, 7c.
I. 2, 7b.
J. 3, 7d.
K. 6. (given the materiality of property, plant, and equipment)
L. 1, 7e.
M. 1, 7b and 7e.
CHAPTER 29
I. Review Questions
1. The report simply states: “The financial statements are not intended to be
presented in conformity with generally accepted accounting principles.” The
opinion expression thereafter refers to a description of the comprehensive basis
used.
2. The following are four comprehensive bases of accounting other than GAAP:
18-110
A Risk-based Audit Approach – Part II 11-111
1. A basis of accounting to comply with the requirements of a governmental
regulatory agency (for example, insurance companies use a basis of
accounting pursuant to the rules of the insurance commission)
2. A basis of accounting used to file an income tax return
3. The cash receipts and disbursements basis of accounting (cash basis) and
modifications to the cash basis, such as recording depreciation on fixed
assets or accruing income tax.
4. A definite set of criteria having substantial support that is applied to all
material items in the financial statements, such as the price-level basis of
accounting.
Prior-year statements were unaudited: The auditor should label the prior-year
columns “Unaudited” and modify the report by adding a paragraph that
disclaims an opinion on the statements.
18-111
11-112 Solutions Manual - Principles of Auditing and Other Assurance
Services
Alternative 2: If predecessor’s report is not presented, the auditor
indicates in the introductory paragraph (1) that the financial statements
of the prior period were audited by another auditor (but does not name
the predecessor auditor), (2) the date of the report, (3) the type of report
issued by the predecessor auditor, and (4) if the report was not a
standard unqualified report, the substantive reasons therefor. When the
predecessor auditor’s report is not presented, the audit report would
have an added sentence at the end of the first paragraph, and the
opinion paragraph would refer only to the current-year statements.
1. b 5. b 9. a 13. d 17. b
2. a 6. a 10. a 14. a 18. c
3. c 7. a 11. d 15. a 19. b
4. a 8. a 12. d 16. a 20. a
Case 1.
To the Board of Directors of Neiny Ltd.:
We have reviewed the accompanying balance sheet of Neiny Ltd. as of December 31, 2004,
and the related statements of income, retained earnings, and cash flows for the year then
ended, in accordance with standards established by the Auditing Standards and Practices
Council. All information included in these financial statements is the representation of the
management of Neiny Ltd.
A review consists principally of inquiries of company personnel and analytical procedures
applied to financial data. It is substantially less in scope than an examination in accordance
with generally accepted auditing standards, the objective of which is the expression of an
opinion regarding the financial statements taken as a whole. Accordingly, we do not express
such an opinion.
Based on our review, we are not aware of any material modifications that should be made to
the accompanying 2004 financial statements in order for them to be in conformity with
generally accepted accounting principles.
The financial statements for the year ended December 31, 2003, were audited by us, and we
expressed an unqualified opinion on them in our report dated February 27, 2004, but we have
not performed any auditing procedures since that date.
18-112
A Risk-based Audit Approach – Part II 11-113
Case 2. a. The assertions that are incorrect and should otherwise be deleted are the
following:
1. Report should be addressed to Ms. Clean Corporation’s Board of
Directors.
2. Delete the entire paragraph describing the scope except for the
reference to cash in banks and accounts receivable.
3. Delete the opinion rendered on cash in banks and accounts receivable.
4. Delete the recommendation to acquire Ajacks.
b. The assertions that are missing and should be inserted are the following:
1. Date of the report.
2. Statement limiting the distribution of the report to Ms. Clean’s
management.
3. Description of the procedures performed.
4. Statement that the agreed-upon procedures applied are not adequate to
constitute a GAAS audit.
5. Description of the accountant’s findings.
6. Disclaimer of an opinion concerning cash in banks and accounts
receivable.
7. Statement limiting the report only to cash in banks and accounts
receivable and indicating that the report does not extend to the
financials taken as a whole.
Case 3.
Independent Auditor’s Report
[Addressee]
We have audited the statement of assets, liabilities, and capital (income tax [cash] basis) of
Vanda & Corona, a partnership, as of December 31, 2004, and the related statements of
revenue and expenses (income tax [cash] basis) and statement of changes in partners’
capital accounts (income tax [cash] basis) for the year then ended. These financial
statements are the responsibility of the company’s management. Our responsibility is to
express an opinion on these financial statements based on our audits.
We conducted our audits in accordance with generally accepted auditing standards. Those
standards require that we plan and perform the audit to obtain reasonable assurance about
whether the financial statements are free of material misstatement. An audit includes
examining, on a test basis, evidence supporting the amounts and disclosures in the financial
statements. An audit also includes assessing the accounting principles used and significant
estimates made by management, as well as evaluating the overall financial statement
presentation. We believe that our audits provide a reasonable basis for our opinion.
18-113
11-114 Solutions Manual - Principles of Auditing and Other Assurance
Services
As described in Note X, the partnership’s policy is to prepare its financial statements on the
accounting basis used for income tax purposes; consequently, certain revenue and related
assets are recognized when received rather than when earned, and certain expenses are
recognized when paid rather than when the obligation is incurred. Accordingly, the
accompanying financial statements are not intended to present financial position and results
of operations in conformity with generally accepted accounting principles.
In addition, the company is involved in continuing litigation relating to patent infringement.
The amount of damages resulting from this litigation, if any, cannot be determined at this time.
In our opinion, the financial statements referred to above present fairly the assets, liabilities,
and capital of the Vanda & Corona partnership as of December 31, 2004, and its revenue and
expenses and changes in its partners’ capital accounts for the year then ended, on the
income tax (cash) basis of accounting as described in Note X, which basis has been applied
in a manner consistent with that of the preceding year.
18-114