How does the embedded audit module support the auditor?

What will be an ideal response?


The EAM approach allows selected transactions to be captured throughout the audit period.  Captured transactions are made available to the auditor in real time, at period end, or any time during the period, significantly reducing the amount of work the auditor must do to identify significant transactions for substantive testing.
PTS: 1

Computer Science & Information Technology

You might also like to view...

____ can be created to record use and even keystroke data.

A. System logs B. Application logs C. Specialized logs D. User logs

Computer Science & Information Technology

Typical billing rates for multimedia production companies and Web designers range from:

a. $15 to $30 an hour. b. $30 to $50 an hour. c. $60 to $150 an hour. d. $150 to $200 an hour.

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. A C-string variable is an array, so it can be indexed to access individual character positions (indexed variables of type character). 2. A C-string is a sequence of characters terminated by the null character.

Computer Science & Information Technology

In a query, the ____ clause is used to specify the records you want to select in the dataset.

A. Select B. From C. Where D. Order

Computer Science & Information Technology