Premium Essay

Chapter 1 Review Questions

In: Business and Management

Submitted By MizukiAnn
Words 857
Pages 4
CHAPTER 1 SOLUTIONS
1-2
There is a demand for auditing in a free-market economy because in the agency relationship there is a natural conflict of interest between an absentee owner and a manager and due to the information asymmetry that exists between the owner and manager. As a result, the agent agrees to be monitored as part of his/her employment contract. Auditing appears to be a cost-effective form of monitoring.
The empirical evidence suggests auditing was demanded prior to government regulation such as statutory audit requirements. Additionally, many private companies and other entities not subject to government auditing regulations also purchase various forms of auditing and assurance services.
1-3
There is a natural conflict of interest in the agency relationship between an owner and manager because of differences in the two parties’ goals. For example, the manager may spend funds on excessive personal benefits or favour entity growth at the expense of stockholders values. If both parties seek to maximize their own self-interest, it is likely that the manager will not act in the best interest of the owner and may manipulate the information provided to the owner accordingly.
1-7
Audit risk is defined as the risk that ‘the auditor expresses an inappropriate audit opinion when the financial statements are materially misstated’ (ISA 200).
Materiality: ‘Misstatements, including omissions, are considered to be material if they, individually or in the aggregate, could reasonably be expected to influence the economic decisions of users taken on the basis of the financial statements.’(ISA 320).
The audit report states that the auditor obtains ‘reasonable assurance’ whether the financial statements are free from ‘material’ misstatement. The term ‘reasonable assurance’ informs the reader that there is some level of risk that the audit did not…...

Similar Documents

Premium Essay

Chapter 4 Review Questions 1-5

...Chapter 4 “IT Infrastructure: Hardware and Software” Review Questions 1-5 1. What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components. IT infrastructure consists of the shared technology resources that provide the platform for the firm’s specific information system applications. Major IT infrastructure components include computer hardware, software, data management technology, networking and telecommunications technology, and technology services. 2. What are the major computer hardware, data storage, input, and output technologies used in business? * Computer Hardware: Mainframes, midrange computers, PC’s, workstations, and supercomputers. * Data Storage: Magnetic disk, optical disc, magnetic tape and storage networks. * Input devices: Keyboards, computer mice, touch screens (including those with multitouch), magnetic ink and optical character recognition devices, pen-based instruments, digital scanners, sensors, audio input devices, and radio-frequency identification devices. * Output devices: Display monitors, printers, and audio output devices. • List and describes the various type of computers available to businesses today. * Mainframes are a large-capacity, high-performance computer that can process large amounts of data very rapidly. * Midrange computers are servers computers are specifically optimized to support a computer network, enabling users to share......

Words: 3229 - Pages: 13

Premium Essay

Chapter 10 Exercises Review Questions 1-10

...Chapter 10 Exercises Review Questions 1-10 1. Define the term system architecture. Define the term scalability, and explain why it is important to consider scalability in system design. System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. Then, Scalability is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is important to consider in implementing systems that are volume related, such as transaction processing systems. 2. When selecting an architecture, what items should a systems analyst consider as part of the overall design checklist? Before selecting a system architecture, the analyst must consider the following issues: Enterprise resource planning (ERP) Initial cost and (TCO) Scalability Web integration Legacy system interface requirements Processing options Security issues 3. What is enterprise resource planning (ERP)? What is supply chain management? Enterprise resource planning (ERP) defines a specific architecture, including standards for data, processing, network, and user interface design. It is important because it describes a specific hardware and software environment that ensures hardware connectivity and easyintegration of future applications, including in house software and commercial packages. ERP also can extend to suppliers......

Words: 404 - Pages: 2

Premium Essay

Review Questions: Chapter 1

...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a......

Words: 2493 - Pages: 10

Premium Essay

Chapter 6 Review Questions

...Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and have cost estimates. Networks provide the project schedule by identifying dependencies, sequencing, and timing of activities. 2. How are WBS and project networks linked? Project networks are developed from the WBS. Work packages from the WBS are used to build the activities found in the project network. The network uses the time estimates from the WBS to generate dates for the project. Integration of the WBS and project network is crucial to effective project management. 3. Why bother creating a WBS? Why not go straight to a project network and forget the WBS? Project networks depend on the WBS because work packages from the WBS are used to develop the project network. A network activity can include one or more work packages but all activity time estimates are derived from the task times in the work package. Unlike the project network, the WBS defines all the elements of the project in a hierarchical framework and establishes their relationships to project deliverables. 4. Why is slack important to the project......

Words: 541 - Pages: 3

Premium Essay

Chapter 7 Review Questions

...Chapter 7 Review Questions 1. What is a knowledge management system? a. A Knowledge management system attempt to help organizations achieve their goals. They usually help in means of increasing profits or reducing costs. 2. What is a chief knowledge officer? What are his or her duties? b. A chief knowledge officer is a top level executive who helps the organization work with a knowledge management system to create, store, and use knowledge to achieve organizational goals. The duties that the CKO is responsible for are to work with other executives and vice presidents, including the chief executive officer, chief financial offer and others. 3. What is natural language processing? What are the three levels of voice recognition? c. Natural language processing allows a computer to understand and react to statements and commands made in a “natural” language, like English. The three levels of voice recognition are converting sound waves into words, then the natural language system processing system reacts to the words or commands by performing different tasks. 4. What is a learning system? Give a practical example of such a system. d. A learning system is a combination of software and hardware that allows a computer to change how it functions or reacts to situations based on the feedback it receives. A practical example of such a system would be, some computerized games have learning abilities. If the computer loses a game, it......

Words: 605 - Pages: 3

Premium Essay

Caff 321 Chapter 1-4 Review Questions

...MICHELLE LU - 011810966 CAFF 321 CHAPTER REVIEW QUESTIONS (1-4) Chapter 1 1. Why does Daniel Gilbert, author of Stumbling on Happiness, say that experiences might bring more satisfaction than durable goods? Do you agree or disagree? Although happiness is not easily defined and it really depends on who you ask and what their degree of happiness is in their life, Gilbert the author of Stumbling on Happiness, explains that experiences might bring more satisfaction than that of durable goods.  With this he is simply stating the fact that happiness is dependent the things you do in life and not the objects. It is the time that you share with friends and family what makes life meaningful and that creates happiness. All the objects in the world that money can buy is meaningless when you don't have anyone to share it with. 2. Harvard economists Alberto Alesina and Paolo Giuliano say that strong family ties imply more reliance on the family as an economic unit that provides goods and services and less on outside institutions such as those found in the market place and government.  Why does household production (doing things together or making things within the home) activity have such an impact on family ties?  Can you give an example from your own family?   Not completely sure if I am answering this question correctly but basically the way I see things, I must say I agree with both economists who say that strong family ties imply more reliance on the family as an economic unit......

Words: 2837 - Pages: 12

Free Essay

Chapter 30 Review Questions

...BL-162-01 March 2, 2015 Chapter 30 Review Questions 1. In this case, Alice worked as an agent of Peter. She was authorized to collect accounts. Peter wrongfully discharged Alice before the agreed upon termination of the agency. Peter failed to notify his customers of Alice’s termination. Alice continued to work as an agent and took collections from one of Peter’s clients, Tom. She also collected from a new prospect, Laura. She secured an order, collected payment, sent the order to Peter, and disappeared with the collections. Peter delivered the goods that Laura ordered. In the accounts of Tom, Peter would be unable to sue due to the fact that Alice had actual authority, which is power conferred upon by actual consent given by the principal, although Peter had terminated his agency with Alice he failed to make this known to others. Therefore Tom cannot be penalized because he was unaware of the change in agency and was still in belief that Alice was a working agent of Peter. As for Laura, she was a new prospect. Laura had reason to believe that Alice was an agent of Peter’s. Peter had delivered the goods that Laura ordered through Alice. This gives Laura the impression that Alice was a working agent because she received the order. Based off this fact pattern, Peter would be unable to receive compensation if he sues either Laura or Tom, he failed to notify them that Alice was no longer an agent of his, and he also delivered goods that were ordered through Alice......

Words: 1283 - Pages: 6

Premium Essay

Database Design Chapter 1 Review Questions

...1. a. Data – Raw facts b. Field – An alphabetic or numeric character or group of characters that defines a characteristic of a person, place, or thing. c. Record – A collection of related fields. d. File – A named collection of related records 2. Data redundancy occurs when the same data are stored in multiple places unnecessarily. Have more than one incorrect copies of information can cause it. 3. Data independence exists when you can change the data storage characteristics without impeding the program's ability to access the data. It is lacking because of how it has to tell the computer what to do, and how to do it. Causing the program to have much more lines of code than should be needed. 4. It is a software tool that makes it possible to organize data in a database. Its functions are data dictionary management, data storage management, data transformation and presentation. 5. Structural independence exists when you can change the file structure without affecting the application's ability to access the data. If it did not exist, any change to a files structure would require several extra steps for every single record in the file. 6. Data is raw facts that have not been processed. Information is data that has been processed and given context. Databases help to organize the manipulation of data to create information by providing an organizational structure that makes relationships and connections between data explicit. 7. The DBMS serves as the......

Words: 480 - Pages: 2

Premium Essay

Business Management Chapter 1 Review Questions

...Chapter 1 – Subject Review Questions 1. I have worked for my current boss, Mr. Ford, in the field of youth social services for nearly a decade. Due to his leadership, I have remained with the agency throughout tumultuous periods. He has always challenged his employees to strive for quality of service at the greatest speed possible. Mr. Ford organizes employees to create a dynamic workforce capable of adapting to changes affected by the macroenvironment. In an effort to continue to win Requests for Proposal bids, Mr. Ford has consistently operated an efficient service program that is cost competitive with other service providers and fiscally sustainable. 2. One of the greatest ways that the Internet impacts my life on a daily basis involves how it has allowed knowledge to be shared instantaneously and with increasing accuracy. I am able to receive information about events and interests in real time. Instead of having to search libraries for dated information, as I did as a youth, I can find information that is relevant and current from trusted sources. Now it is possible to access peer-reviewed publications from esteemed institutions. Globalization, in conjunction with the Internet, has provided access to news and information from around the world. I enjoy reading articles from the perspectives of those of other nationalities and now, thanks to Google Translate, I can read articles that were written in foreign languages. 3. I have always admired Google for......

Words: 542 - Pages: 3

Premium Essay

Chapter 2 Review Question

...Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal review allows the producer to......

Words: 334 - Pages: 2

Premium Essay

Chapter 1 Review Questions

...CHAPTER 1 REVIEW QUESTIONS 1. Define each of the following terms: a) Data: raw data not processed. This usually includes telephone numbers, a date of birth, customer name etc. It has little meaning until it is turned into information. b) Field: A character or group of characters that has a specific meaning. A field is used to define and store data. c) Record: A logically connected set of one or more fields that describes a person, place, or thing.  d) File: A collection of related records. 2. What is data redundancy, and which characteristics of the file system can lead to it? a. Data redundancy is when the same data are stored unnecessarily at different places. This can lead to poor data security, and data inconsistency. 3. What is data independence, and why is it lacking in file systems? b. Data independence is when you change the data storage characterizes and it doesn’t affect the program’s ability to access the data. 4. What is a DBMS, and what are its functions? c. A DBMS (database management system) is a collection of program that stores and manages data and control access to the data in the collection. It is responsible for creating, editing, deleting and maintain all the data inserted. 5. What is structural independence, and why is it important? d. Access to a file is dependent on the structure of the database. Without structural independence new changes such as adding a field, or a decimal in a......

Words: 1121 - Pages: 5

Free Essay

Chapter 2 Review Questions

...Chapter 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Managing information security has more to do with policy and enforcement rather than technology. Management must address information security in terms of business impact and the cost. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect? Data in an organization represents its transaction records and its ability to deliver to its customer. Without this the organization would not be able to carry out day to day work. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? Both management and IT management are responsible for implementing security to protect an organizations ability to function. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking is usually considered to have created more risk for businesses that use information security. The reason is that potential attackers have reader access to the information system. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text Information extortion is the act of an attacker or trusted insider who steals information from a computer system and demand compensation for its return or for an......

Words: 1152 - Pages: 5

Premium Essay

Project Management Chapter 1 Review Questions

...Chapter 1: Review Questions 1. What is a project? It is a temporary effort intended to create a unique product, service, or result. 2. What is project management? It is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements. 3. How are projects different from ongoing operations? Projects are temporary and unique while operations are continuous. Operations are an ongoing process to ensure that an organization continues to work effectively. For instance, operation managers can often use checklists to guide much of their work, but project managers rarely have checklists that identify all of the activities they need to accomplish. 4. What types of constraints are common to most projects? Time and budget constraints are common to most projects for clients, and the amount of resources available and the decision maker’s risk tolerance are constraints from an internal point of view. 5. Which deliverable authorizes the project team to move from Selecting and Initiating to Planning? The approval of a charter 6. At what stage of a project life cycle are the majority of the “hands-on” tasks completed? At the execution stage 7. During which state of the project life cycle are loose ends tied up? During the Closing stage 8. What are the five process groups of project management? Initiating, planning, executing, monitoring and controlling, and closing 9. Which process group...

Words: 868 - Pages: 4

Premium Essay

Chapter Review Question Solutions

...Chapter 3 ANSWERS TO QUESTIONS Q3­1 A primary objective of financial reporting is to provide information that is useful to present and potential investors and creditors and other users in making rational investment, credit, and similar decisions. An accounting system is the means by which a company records and stores the financial and managerial information from its transactions so that it can retrieve and report the information in an accounting statement. A double­entry system standardizes the method that a company uses to record changes in its accounts resulting from various transactions or events. For each transaction or event that a company records, the dollar amount of the debits entered in all the related accounts must be equal to the total dollar amount of the credits. These debit or credit entries affect two or more accounts in the assets, liabilities, and stockholders' equity (including the temporary accounts). All normal accounts on the left side of the accounting equation (assets) are increased by debits and decreased by credits whereas accounts on the right side of the equation (liabilities and stockholders' equity) are increased by credits and decreased by debits. A permanent account is an account whose balance at the end of the accounting period is carried forward into the next accounting period. Examples: Cash, Accounts Payable, Capital Stock. A temporary account is an account that is used temporarily to determine the change in retained earnings that occurred......

Words: 25366 - Pages: 102

Premium Essay

Chapter 2 Review Questions

...Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This is a volatile type of memory that is used only for temporary storage while a program is running. A. RAM 7. A type of memory that can hold data for long periods of time—even when there is no power to the computer—is called Secondary storage. 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative......

Words: 727 - Pages: 3