Nobody downloaded yet

Specific Aspects of Auditing in a Computer-Based Environment - Assignment Example

Comments (0) Cite this document
Summary
The paper "Specific Aspects of Auditing in a Computer-Based Environment " will begin with the statement that input controls generally appear in the dimension of application control based mechanism, which looks after efficient performances of the transactions relating to varied data transactions…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Specific Aspects of Auditing in a Computer-Based Environment
Read TextPreview

Extract of sample "Specific Aspects of Auditing in a Computer-Based Environment"

Download file to see previous pages The value of a particular sales invoice is ought to be compatible with the sales amount of tax being charged on the invoice (ACCA, 2011).
Processing controls are attached to developing varied programmed routines (Pearson, n.d.). This particular system acts as an effective specific control in the form of supporting the managers or supervisors to adopt and apply routine decisions. Especially mentioning, it contributes to maintaining the reliability of data by extracting valuable data from a specific database to compile various important reports. These reports can be reckoned as financial statements, sales analyses and inventory-level based details among others (Collins, 2015).
It is regarded as an efficient interactive system, which tends to gather, incorporate and analyze data from varied sources. More importantly, it aids in supporting the business managers of an organization to make several routine decisions. The maintenance of data reliability through this particular system could be better understood from the adoption as well as the application of relevant decisions while operating different business functions (Collins, 2015).
Output controls mainly relate to work upon the performance of the transactions whether input or output. This specific control relating to the output segment helps in preserving accuracy and determining the completeness of the different processing outputs. It will be vital to mention that the conception of run control totals would aid in ensuring greater data reliability in the form of various ways. These ways entail authorizing all such data transactions that are already processed, ensuring that no such transactions are being omitted also making sure that unlawful transactions are being added (Alkhatib & Labban, n.d). ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Written Essay Assignment Example | Topics and Well Written Essays - 1500 words”, n.d.)
Written Essay Assignment Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1684308-written-essay-assignment
(Written Essay Assignment Example | Topics and Well Written Essays - 1500 Words)
Written Essay Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1684308-written-essay-assignment.
“Written Essay Assignment Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1684308-written-essay-assignment.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Specific Aspects of Auditing in a Computer-Based Environment

Computer-Based Crimes

...? Running Head: COMPUTER-BASED CRIMES Computer-Based Crimes: Identity Theft, Phishing and Pharming Scams School Computer-Based Crimes Modern information technology, such as the internet has initiated new forms of crimes and made perpetration of old felonies effortless. Computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and violation of copyrights. Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files. The misuse of the...
7 Pages(1750 words)Essay

Computer-Based Crimes

...activity where criminals target a computer, or use computers to violate the law (Mooney, Knox, & Schacht, 2011). In recent years, criminals have used computers to commit crime such as stealing credit cards from unsuspecting users. With the number of computer crimes growing, there is significant interest on how users can enhance their safety when using computers. In most computer-based crime, criminal with knowledge of computer systems exploit flaws or users awareness on various aspects of computers to commit crime. Because of...
4 Pages(1000 words)Research Paper

Auditing

.... The auditing committee received ?13 million for audit of the company’s accounts and other services in the organization. They received this amount on completion of their auditing duties in the organization. An auditor is required to execute numerous duties and responsibilities for adequate completion of their tasks and roles. Before remunerating the auditing committee, the company should ensure that all the duties and responsibilities of the auditors have been fulfilled adequately (Gomez, 2012). In this case, BP p.l.c should have ensured that the auditors have adequately fulfilled the requirements of their job specifications before receiving their...
3 Pages(750 words)Coursework

Computer Based Learning

...technology may have to offer, they are finding it difficult to both learn themselves and teach to secondary education students. Many teachers find that certain types of technology in the classroom make presentation of material easier. Others find that it hinders their efforts, as secondary education students tend to use it for entertainment and not as intended. Within the context of writing classes and writing research, Computer Based Learning (CBL) / Computer Assisted Assessment (CAA) have been employed primarily to support collaborative writing endeavours. (Zakrzewski 2003) The feature sets of CBL and CAAs provide a rich environment for the activities of group...
12 Pages(3000 words)Essay

Better Use Computer Assisted Auditing Techniques for Auditing

...and accurate measure for conclusions. Traditional audit techniques use manual working papers to gather audit evidence; those manual working papers are to be kept for a long period of time, according to ISA 230 audit documentation should be retained for five years from completion of the audit. This technique of retaining hard copies of working papers for years would be susceptible to either getting lost, burned accidentally, etc; CAAT use IT based files to store these working papers on computer and having their back up created in any other drive so that if one of them is lost, it can be retrieved from the other source. Most importantly,...
14 Pages(3500 words)Thesis

Better Use Computer Assisted Auditing Techniques for Auditing

...the conclusion, as well as making it stronger. On the other hand, a limited assurance engagement gives out a negative assurance report and the evidence gathered in an assurance engagement is only related to the specific subject matter that is being audited rather than the entire financial statement. Such assurances help the users of the financial statements to decide upon their investment in any particular company or venture. The use of computers in business information systems has fundamental effects on the nature of business transacted and procedures followed. Many businesses are on computers in their everyday operations. They have gained a lot of benefits, such as...
16 Pages(4000 words)Essay

Computer-Based Instruction

...Computer-Based Instruction Number: Introduction Computer Based Instruction (CBI) refers to use of computers in delivering, tracking, and managing instructions with the computer among other devices like tablets being the main mode of content delivery. These instructions vary in their forms with some being in the form of images, texts, and feedback though the modern development of the software has given room for incorporation of other essential features like sound clips, videos, graphics, animation, and audio narrations into a single presentation played in a computer. Computer based...
10 Pages(2500 words)Term Paper

Auditing

...Nathans Finance NZ Limited Nathans Finance NZ Limited Managing Partner, Ben Ron Chartered Accountants From: Senior Associate Date: May 5, 2014 Subjects: Analytical Review Dear Sir, This report has been prepared as per our discussion, to highlight the probable risk areas in the financial report of Nathans Finance NZ Limited. I have performed analytical review and the results of the same are mentioned below under different headings. (1)High Risk Areas Some of the items that may result in audit risk are mentioned below and these are categorized as inherent risk, control risk or detection risk. Inherent risk (IR) Inherent risk can be defined as the risk that an account balance, disclosure or a note in financial statement is...
4 Pages(1000 words)Case Study

Computer Based Training (CBT)

...Computer Based Training Affiliation Computer Based Training It is true that there is no one training method that will fit any particular employee. Nevertheless, the improvement and advancement in technology has made it easier for companies to choose computer based training over other training methods. It is expected that, in this current times, every employee should be technologically knowledgeable. Managing of knowledge in the company is one of the vital aspects that is currently been regarded as a fundamental asset. Hence, by choosing computer based training, managers and many...
1 Pages(250 words)Essay

Computer-Based information system

...Computer-based information systems of AT&T Telecommunication Company Computer-based information systems of AT&T Telecommunication Company For the last two decade, it had been considerably challenging for companies as well as individuals to get organizations that are willing and capable of providing both telephone and telegraph systems. Businesses were looking for an information system that would be able to carry out their telephone services, telegraphs and more importantly a system that would manage their information system. Successful attempts to offer these services led to the establishment of the American Telephone and Telegraph Telecommunication Company. This paper...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Specific Aspects of Auditing in a Computer-Based Environment for FREE!

Contact Us