Reference no: EM132216065
Question
You are the auditor of Green Machine Ltd, a manufacturer. You have obtained a summary of the property, plant and equipment for the year ended 30 June 2018, which identifies cost and accumulated depreciation brought forward, additions and disposals in the year and depreciation charges.
A review of the management letter from the previous year's audit shows that there were some problems in relation to making a distinction between capital and revenue expenditure; some items were capitalized when they should have been expensed and other capital items were included in repairs and maintenance in the income statement.
Another risk identified from prior years relates to depreciation calculations: there is a range of depreciation rates within categories and there has been concern that the rates applied to some assets have been too low. The depreciation policy disclosed in the financial report shows:
- Building: 2 - 4% straight line
- Plant and machinery: 5 -10% straight line
- Fixtures fittings and equipment: 5 - 20% straight line
REQUIRED
(a) Identify and explain the two key assertions at risk in relation to property, plant and equipment
(b) Identify and describe two substantive audit procedures that you could perform in response to each risk identified above
(c) Explain the requirement of ASA 701 Communicating Key Audit Matters in the Auditor's Report and the rationale for this auditing standard.
Determine if the above matters are key audit matters, providing full rationale for the determination. If it is determined that they are Key Audit Matters, provide the disclosures which are required in Key Audit Matters Section of the Auditors report as required under ASA 701.
Describe the four critical success factors
: List and describe the four critical success factors for effective IT strategy development. Research Subway, Walmart, or Google.
|
Assess the personal relationship
: Assess the personal relationship you have with a professional service provide, such as university lecture , doctor, counsellor, financial advisor
|
Attitude to a perticular service
: How would you classify yourself and your colleagues in terms of your customer attitude to a perticular service? could everyone be converted into Allies
|
Discussion on disaster recovery
: Over the last decade, financial data breaches that expose the payment card industry (PCI) and personal identifiable information (PII), medical records.
|
Identify and describe two substantive audit procedures
: Identify and explain the two key assertions at risk in relation to property, plant and equipment - Identify and describe two substantive audit procedures
|
Flow of products throughout the supply chain
: Outsourcing can be used to permit organizations to focus on their core competencies by
|
Discuss about the identification of the attack vectors
: With the Attack Vector and Attribution Analysis complete, in this step your nation team will assess the impact of identified threats and prioritize.
|
Hours of operation between failures
: An electronic monitoring unit averages 3000 hours of operation between failures. When a failure occurs, the unit must be diagnosed and then serviced (repaired).
|
Determine what the policy is for the company
: Based on your reading and on additional research on line, what are the major components of an IT or cyber security policy?
|