山西省2020年ACCA国际会计师报考指南——新手报考必看

发布时间:2020-01-09


2020年伊始,相信各位资深”ACCAer们都知道ACCA国际注册会计师考试是有免试政策的,你了解到自己能免试几个科目吗?51题库考试学习网再次温馨提示一下:这里免试是指的可以不用考试,但免试考试科目的考试费还是要缴的哟~

知道自己能免试几科的ACCAer们虽然可以相对轻松一些,但仍然不可放松警惕、抓紧时间复习才是王道。当然,51题库考试学习网在这里为大家提供了一套关于报考考试科目顺序的宝典(也有除去免试科目的哟),建议各位ACCAer们收藏分享哦~

首先大家先看看最新的免试政策,看看你符合哪个条件,到底能免试几个科目:  

一、ACCA对中国教育部认可的全日制大学在读生(会计或金融专业)设置的免试政策:

1.会计学或金融学(完成第一学年课程):可以注册为ACCA正式学员,无免试,仅有报名参加ACCA考试资格。

2.会计学或金融学(完成第二学年课程):也就是完成大二学业,可以免试3门课程(AB-FA)

3.会计学或金融学(完成第三学年课程):完成大三学业,免试5门课程(AB-PM)

4.其他专业(在校生完成大一后):非会计或者金融专业的,完成大一学业之后,即可注册但无免试

二、ACCA对中国教育部认可高校毕业生设置的免试政策:

1.会计学(获得学士学位):本科毕业会计专业的,免试5门课程(AB-PM)

2.会计学(辅修专业):指的是大学第二选修专业为会计的,免试3门课程(AB-FA)

3.金融专业:本科毕业金融专业的,免试5门课程(AB-PM)

4.法律专业:完成本科法律学习获得学位证的,免试1门课程(LW)

5.商务及管理专业:完成商务专业学习或管理专业学习的,免试1门课程(AB)

6.MPAcc专业(获得MPAcc学位或完成MPAcc大纲规定的所有课程、只有论文待完成但需要出具相关证明哟):原则上免试九门课程(AB-FM),其中F6(税务)的免试条件:CICPA全科通过或MPAcc课程中选修了中国税制课程。

7.MBA学位(获得MBA学位):免试3门课程(AB-FA)

8.非相关专业:非以上说描述的专业,则无免试

三、注册会计师考生:

1.2009CICPA“6+1”新制度实行之前获得CICPA全科通过的人员:免试5门课程(AB-LWTX)

2.2009CICPA“6+1”新制度实行之后获得CICPA全科通过的人员:免试9们课程(AB-FM)

3.如果在学习ACCA基础阶段科目的过程中获得了CICPA全科合格证(2009“6+1”制度实行后的新版证书),可以自行决定是否申请追加免试。

四、其他

1.CMA(美国注册管理会计师)全科通过并取得证书:免试AB-FA

2.USCPA(美国注册会计师)全科通过:免试AB-TXAAFM(共免8)

看完以上最新免试条件,相信各位ACCAer们清楚自己是否有免试的资格和免试几个科目了,那么接下来就是大家十分期待的:如何合理搭配考试科目,才能最大化的通过考试?

ACCA考试科目共15科,分为四个大模块:知识模块(ACCA考试科目AB-FA)、技能模块(ACCA考试科目LW-FM)、核心模块(ACCA考试科目SBL&SBR)、选修模块(ACCA考试科目AFM-AAA)。学员只需要通过11门必修科目及2门选修科目共13门课程即可通过考试,获得ACCA证书。

不过,总体来说,ACCA考试科目有两个部分:基础阶段和专业阶段。主要的学习内容是哪些呢?它们各自有哪些特点呢?

第一部分为基础阶段,主要分为知识课程和技能课程两个部分。知识课程主要涉及财务会计和管理会计方面的核心知识,也为接下去进行技能阶段的详细学习搭建了一个平台。技能课程共有六门课程,广泛的涵盖了一名会计师所涉及的知识领域及必须掌握的技能。这一部分是对学员基础知识的考核和巩固,在ACCA考试中也只有通过了基础阶段的部分才可以报考专业阶段的部分,这个顺序是固定的不能变的。

第二部分为专业阶段,主要分为核心课程和选修(四选二)课程。该阶段的课程相当于硕士阶段的课程难度,是对第一部分课程的引申和发展。因此对各位考生的要求将会更加的严格,该阶段课程引入了作为未来的高级会计师所必须的更高级的职业技能和知识技能。选修课程为从事高级管理咨询或顾问职业的学员,设计了解决更高级和更复杂的问题的技能。因此这一部分必须要求考试基础十分牢固,并且理解能力和学习能力都要更上一层楼才可以。

51题库考试学习网先大致将考生的情况分成三种:无免考、免考1~2科、免考超过3科,免考的科目数目的不同,考试科目的搭配建议有所不同。

1、无免考情况考试科目搭配

51题库考试学习网建议各位考生从相对简单的科目入手,层层深入,让自己慢慢适应考试难度。所以还是从最基本的科目F1F2F3开始考,F1F2F3相对较简单,如果不想一次考三科,可以按F1-F3-F2这个顺序来报考。这三科为机考形式,有70%的选择题,所以在ACCA的入门阶段还是相对较简单的,通过率相对于后面的科目还是高很多的,中国考生的通过率也普遍较高。

F6F7F9,这些科目计算偏多,考试时笔试语言相对其他科目较少,接受起来相对容易;F4F5F8属于文字较多的科目,对于写作能力要求相对强一些。因此计算能力强或者说对数字敏感的考生可以报考F6F7F9,而擅长写作和语言能力的考试就先报考F4F5F8。注意哦,这里不建议一次性报考所以计算科目或者语言文字类的科目,建议将这两类考试分开报,擅长哪一类就多报一科即可。

2、免考1-2科情况考试科目搭配

对于英语能力稍强的同学,建议还是按科目本身的顺序来报考。如果是第一次考的话,报考最多不要超过2科,压力可能会有点大,防止后期学习时间无法保证,可能会导致需要放弃某科考试而浪费金钱和时间的后果,得不偿失。因此,建议考生要根据自己的实际能力来报考考试,因为毕竟考试的有效期是7年,时间还算长,不用担心通过的考试成绩过期无效。

3、免考超过3科情况考试科目搭配

如果是英语能力稍弱的同学,建议可以从计算偏多的科目开始报考,比如F6F7F9,这些科目计算多于论述,因此备考起来相对容易;相对地,F4F5F8属于需要写的比较多的科目,对于英语的文字能力要求相对强一些。当然,这些只是建议,学员也可以根据自身的具体情况来决定报考科目,学会搭配科目可以大大地促进学习效率。51题库考试学习网建议大家科学地备考,善于发现科目与科目之间存在的相似性,或许一个知识点可以反复在不同考试科目中利用也说不定哦~

此外,根据网上对1000ACCA自学考生的调查发现:2门科目最佳搭配组合是:F7/F8F4/F5F8/F9F4/F6F5/F9F6/F7。以此类推,当然这具体需要按照自己对各科目的知识点熟悉程度综合而定。

科目搭配报考是门学问,考生根据具体情况,按照自身对项目知识点的熟悉程度进行合理的科目搭配,第一次的话每次报考两门课程,不要超过三门,以免后期学习时间无法保证,导致需要放弃某科考试而浪费金钱和时间。

以上就是关于ACCA考试报考科目顺序的一些建议,总而言之,大家还是需要根据自己实际的学习情况来报考,毕竟这些技巧是死的,人是活的,只有适合自己的才是最科学的方法,最后祝大家考试顺利通过~


下面小编为大家准备了 ACCA考试 的相关考题,供大家学习参考。

This information was taken from an internal newsletter of The Knowledge Partnership LLP (TKP), a company which offers project and software consultancy work for clients based in Zeeland. The newsletter was dated 2 November 2014 and describes two projects currently being undertaken by the partnership.

Project One

In this project, one of our clients was just about to place a contract for a time recording system to help them monitor and estimate construction contracts when we were called in by the Finance Director. He was concerned about the company supplying the software package. ‘They only have an annual revenue of $5m’, he said, ‘and that worries me.’ TKP analysed software companies operating in Zeeland. It found that 200 software companies were registered in Zeeland with annual revenues of between $3m and $10m. Of these, 20 went out of business last year. This compared to a 1% failure rate for software companies with revenues of more than $100m per year. We presented this information to the client and suggested that this could cause a short-term support problem. The client immediately re-opened the procurement process. Eventually they bought a solution from a much larger well-known software supplier. It is a popular software solution, used in many larger companies.

The client has now asked us to help with the implementation of the package. A budget for the project has been agreed and has been documented in an agreed, signed-off, business case. The client has a policy of never re-visiting its business cases once they have been accepted; they see this as essential for effective cost control. We are currently working with the primary users of the software – account managers (using time and cost data to monitor contracts) and the project support office (using time and cost data to improve contract estimating) – to ensure that they can use the software effectively when it is implemented. We have also given ‘drop in’ briefing sessions for the client’s employees who are entering the time and cost data analysed by the software. They already record this information on a legacy system and so all they will see is a bright new user interface, but we need to keep them informed about our implementation. We are also looking at data migration from the current legacy system. We think some of the current data might be of poor quality, so we have established a strategy for data cleansing (through offshore data input) if this problem materialises. We currently estimate that the project will go live in May 2015.

Project Two

In this project, the client is the developer of the iProjector, a tiny phone-size projector which is portable, easy to use and offers high definition projection. The client was concerned that their product is completely dependent on a specialist image-enhancing chip designed and produced by a small start-up technology company. They asked TKP to investigate this company. We confirmed their fears. The company has been trading for less than three years and it has a very inexperienced management team. We suggested that the client should establish an escrow agreement for design details of the chip and suggested a suitable third party to hold this agreement. We also suggested that significant stocks of the chip should be maintained. The client also asked TKP to look at establishing patents for the iProjector throughout the world. Again, using our customer contacts, we put them in touch with a company which specialises in this. We are currently engaged with the client in examining the risk that a major telephone producer will launch a competitive product with functionality and features similar to the iProjector.

The iProjector is due to be launched on 1 May 2015 and we have been engaged to give advice on the launch of the product. The launch has been heavily publicised, a prestigious venue booked and over 400 attendees are expected. TKP have arranged for many newspaper journalists to attend. The product is not quite finished, so although orders will be taken at the launch, the product is not expected to ship until June 2015.

Further information:

TKP only undertakes projects in the business culture which it understands and where it feels comfortable. Consequently, it does not undertake assignments outside Zeeland.

TKP has $10,000,000 of consultant’s liability insurance underwritten by Zeeland Insurance Group (ZIG).

Required:

(a) Analyse how TKP itself and the two projects described in the scenario demonstrate the principles of effective risk management. (15 marks)

(b) Describe the principle of the triple constraint (scope, time and cost) on projects and discuss its implications in the two projects described in the scenario. (10 marks)

正确答案:

(a) The first stages of risk management are the identification, descriptions and assessment of the risk. This assessment is primarily concerned with the likelihood of them occurring and the severity of impact on the organisation or project should they occur. Sometimes the likelihood is a subjective probability, the opinions of experienced managers or experts in the field. On other occasions, there is some statistical evidence on which to base the assessment. For example, in project 1, TKP identified that 20 IT software companies with annual revenues between $3m and $10m went out of business last year. This represented 10% of the total number of software companies reporting such revenues. Its report to the client suggested that there was a 10% chance of the current preferred supplier (who had a turnover of $5m) ceasing business and this would have a significant short-term support implication. This compared to a business failure rate of 1% for software companies with an annual revenue exceeding $100m. The client felt that the probability of supplier failure was too high, so eventually bought a software solution from a much larger, well-known, software supplier. In this case, the likelihood of the risk led the client to changing its procurement decision. The risk itself does not go away, large companies also fail, but the probability of the risk occurring is reduced.

The avoidance (or prevention) of a risk is a legitimate risk response. In project 1, the client could avoid the risk ‘failure of the supplier’ by commissioning an in-house bespoke solution. Similarly, TKP itself avoids the risks associated with trading in different cultures, by restricting its projects to clients based in Zeeland.

There are three further responses to risks.

Risk mitigation (or risk contingency) actions are what the organisation will do to counter the risk, should the risk take place. Mitigation actions are designed to lessen the impact on the organisation of the risk occurring. In project 2, TKP recommends that the producers of the iProjector should establish an escrow agreement with the company which produces the chip which enhances the quality of the projected image. It was agreed that design details of this chip should be lodged with a third party who would make them available to the producers of the iProjector should the company which owned the enhanced image technology cease trading. This is a mitigation approach to the risk ‘failure of the supplier’. The supplier is relatively high risk (less than three years of trading, inexperienced management team), and the product (the iProjector) is completely dependent upon the supply of the image enhancing chip. The failure of the business supplying the chips would have significant impact on iProjector production. If the escrow agreement had to be enacted, then it would take the producers of the iProjector some time to establish alternative production. Consequently (and TKP have suggested this), it might be prudent to hold significant stocks of the chips to ensure continued production. In such circumstances, the need to mitigate risk is more important than implementing contemporary just-in-time supply practices. In some instances a mitigation action can be put in place immediately. In other instances risk mitigation actions are only enacted should the risk occur. The risk has been recognised and the organisation has a rehearsed or planned response. For example, in project 1, TKP has identified ‘poor quality of current data’ as a risk associated with the migration of data from the current systems to the proposed software package solution. It has established a strategy for data cleansing if that risk actually materialises. Importantly, the client knows in advance how to respond to a risk. It avoids making a hasty, ill-thought out response to an unforeseen event.

Risk transfer actions are concerned with transferring the risk and the assessment and consequences of that risk to another party. This can be done in a number of ways. TKP itself has liability insurance which potentially protects the company from the financial consequences of being sued by clients for giving poor advice. TKP has identified this as a risk, but is unlikely to be able to assess either the probability of that risk occurring or establishing meaningful mitigation measures to minimise the effect of that risk. Consequently, the responsibility for both of these is transferred to an insurance company. They establish the risk, through a series of questions, and compute a premium which reflects the risk and the compensation maximum which will have to be paid if that risk occurs. TKP pays the insurance premiums. TKP itself also transfers risks in project 2. It is unsure about how to establish patents and so it refers the client to another company. Transferring avoids the risk associated with ‘establishing the patent incorrectly’ and the financial consequences of this.

Finally, risk may be identified but just accepted as part of doing business. Risk acceptance is particularly appropriate when the probability of the risk is low or the impact of that risk is relatively insignificant. Risks may also be accepted when there are no realistic mitigation or transfer actions. In project 2, the producers of the iProjector are concerned that there is ‘a risk that a major telephone producer will launch a product with features and functionality similar to ours’. This is a risk, but there is little that can be done about it. Risks of competition are often best accepted.

The discussion above is primarily concerned with deciding what action to take for each risk. Once these actions are agreed, then a plan may be required to put them into place. For example, establishing an escrow agreement will require certain activities to be done.

Risks must also be monitored. For example, in project 2, the risk of supplier failure can be monitored through a company checking agency. Many of these companies offer a continuous monitoring service which evaluates financial results, share prices and other significant business movements. Reports are produced, highlighting factors which may be of particular concern. Risks will also disappear once certain stages of the project have been completed and, similarly, new ones will appear, often due to changes in the business environment. Many organisations use a risk register or risk log to document and monitor risks and such logs often specify a risk owner, a person responsible for adequate management of the risk.

(b) Every project is constrained in some way by its scope, time and cost. These limitations are often called the triple constraint. The scope concerns what has to be delivered by the project, time is when the project should deliver by, and cost is concerned with how much can be spent on achieving the deliverable (the budget). Quality is also an important feature of projects. Some authors include quality in their triple constraint (instead of scope), others add it as a further constraint (quadruple constraint), whilst others believe that quality considerations are inherent in setting the scope, time and cost goals of a project. How a particular project is managed depends greatly on the pressures in the triple constraint.

In project 1, the reluctance of the company to re-visit the business case means that the budget (or cost) of the solution is fixed. The implementation date might be desirable, but it does not seem to be business critical. It is an internal system and so any delays in implementation will not affect customers. It will also be a relatively seamless transition for most employees in the company. They already record the time record details which the new system will collect and so all they will see is a changed user interface. Only the direct users of the output (account managers and the project office) will be affected by any delay. The scope of the software package is also pre-defined. If it fails to meet requirements, then the users will have to adjust their expectations or business methods. There is no money to finance customisation or add-on systems, so in this sense the scope of the solution is also fixed. The quality of the software, in terms of its reliability and robustness, should also be good, as it is a popular software solution used in many large companies.

In project 2, the launch date is fixed. It has been heavily publicised, the venue is booked and over 400 attendees are expected, including newspaper journalists. Thus the time of the project is fixed. However, although orders will be taken at the launch, the product is not expected to ship until a month after launch. Thus the scope of the product shown at the launch date might be restricted and inherent quality problems might not yet be solved. Any defects can be explained away (this is a pre-production model) or, more effectively, they may be avoided by ensuring that the product is demonstrated to attendees, not used by them. The project manager must ensure that key functionality of the product is available on launch date (such as producing an image of a certain quality), but other functionality, not central to the presentation (for example, promised support for all image file formats) could be delayed until after the presentation. The company should make extra funds available to ensure that the launch date is successful.


5 You are an audit manager in Fox & Steeple, a firm of Chartered Certified Accountants, responsible for allocating staff

to the following three audits of financial statements for the year ending 31 December 2006:

(a) Blythe Co is a new audit client. This private company is a local manufacturer and distributor of sportswear. The

company’s finance director, Peter, sees little value in the audit and put it out to tender last year as a cost-cutting

exercise. In accordance with the requirements of the invitation to tender your firm indicated that there would not

be an interim audit.

(b) Huggins Co, a long-standing client, operates a national supermarket chain. Your firm provided Huggins Co with

corporate financial advice on obtaining a listing on a recognised stock exchange in 2005. Senior management

expects a thorough examination of the company’s computerised systems, and are also seeking assurance that

the annual report will not attract adverse criticism.

(c) Gray Co has been an audit client since 1999 after your firm advised management on a successful buyout. Gray

provides communication services and software solutions. Your firm provides Gray with technical advice on

financial reporting and tax services. Most recently you have been asked to conduct due diligence reviews on

potential acquisitions.

Required:

For these assignments, compare and contrast:

(i) the threats to independence;

(ii) the other professional and practical matters that arise; and

(iii) the implications for allocating staff.

(15 marks)

正确答案:
5 FOX & STEEPLE – THREE AUDIT ASSIGNMENTS
(i) Threats to independence
Self-interest
Tutorial note: This threat arises when a firm or a member of the audit team could benefit from a financial interest in, or
other self-interest conflict with, an assurance client.
■ A self-interest threat could potentially arise in respect of any (or all) of these assignments as, regardless of any fee
restrictions (e.g. per IFAC’s ‘Code of Ethics for Professional Accountants’), the auditor is remunerated by clients for
services provided.
■ This threat is likely to be greater for Huggins Co (larger/listed) and Gray Co (requires other services) than for Blythe Co
(audit a statutory necessity).
■ The self-interest threat may be greatest for Huggins Co. As a company listed on a recognised stock exchange it may
give prestige and credibility to Fox & Steeple (though this may be reciprocated). Fox & Steeple could be pressurised into
taking evasive action to avoid the loss of a listed client (e.g. concurring with an inappropriate accounting treatment).
Self-review
Tutorial note: This arises when, for example, any product or judgment of a previous engagement needs to be re-evaluated
in reaching conclusions on the audit engagement.
■ This threat is also likely to be greater for Huggins and Gray where Fox & Steeple is providing other (non-audit) services.
■ A self-review threat may be created by Fox & Steeple providing Huggins with a ‘thorough examination’ of its computerised
systems if it involves an extension of the procedures required to conduct an audit in accordance with International
Standards on Auditing (ISAs).
■ Appropriate safeguards must be put in place if Fox & Steeple assists Huggins in the performance of internal audit
activities. In particular, Fox & Steeple’s personnel must not act (or appear to act) in a capacity equivalent to a member
of Huggins’ management (e.g. reporting, in a management role, to those charged with governance).
■ Fox & Steeple may provide Gray with accounting and bookkeeping services, as Gray is not a listed entity, provided that
any self-review threat created is reduced to an acceptable level. In particular, in giving technical advice on financial
reporting, Fox & Steeple must take care not to make managerial decisions such as determining or changing journal
entries without obtaining Gray’s approval.
■ Taxation services comprise a broad range of services, including compliance, planning, provision of formal taxation
opinions and assistance in the resolution of tax disputes. Such assignments are generally not seen to create threats to
independence.
Tutorial note: It is assumed that the provision of tax services is permitted in the jurisdiction (i.e. that Fox and Steeple
are not providing such services if prohibited).
■ The due diligence reviews for Gray may create a self-review threat (e.g. on the fair valuation of net assets acquired).
However, safeguards may be available to reduce these threats to an acceptable level.
■ If staff involved in providing other services are also assigned to the audit, their work should be reviewed by more senior
staff not involved in the provision of the other services (to the extent that the other service is relevant to the audit).
■ The reporting lines of any staff involved in the audit of Huggins and the provision of other services for Huggins should
be different. (Similarly for Gray.)
Familiarity
Tutorial note: This arises when, by virtue of a close relationship with an audit client (or its management or employees) an
audit firm (or a member of the audit team) becomes too sympathetic to the client’s interests.
■ Long association of a senior member of an audit team with an audit client may create a familiarity threat. This threat
is likely to be greatest for Huggins, a long-standing client. It may also be significant for Gray as Fox & Steeple have had
dealings with this client for seven years now.
■ As Blythe is a new audit client this particular threat does not appear to be relevant.
■ Senior personnel should be rotated off the Huggins and Gray audit teams. If this is not possible (for either client), an
additional professional accountant who was not a member of the audit team should be required to independently review
the work done by the senior personnel.
■ The familiarity threat of using the same lead engagement partner on an audit over a prolonged period is particularly
relevant to Huggins, which is now a listed entity. IFAC’s ‘Code of Ethics for Professional Accountants’ requires that the
lead engagement partner should be rotated after a pre-defined period, normally no more than seven years. Although it
might be time for the lead engagement partner of Huggins to be changed, the current lead engagement partner may
continue to serve for the 2006 audit.
Tutorial note: Two additional years are permitted when an existing client becomes listed, since it may not be in the
client’s best interests to have an immediate rotation of engagement partner.
Intimidation
Tutorial note: This arises when a member of the audit team may be deterred from acting objectively and exercising
professional skepticism by threat (actual or perceived), from the audit client.
■ This threat is most likely to come from Blythe as auditors are threatened with a tendering process to keep fees down.
■ Peter may have already applied pressure to reduce inappropriately the extent of audit work performed in order to reduce
fees, by stipulating that there should not be an interim audit.
■ The audit senior allocated to Blythe will need to be experienced in standing up to client management personnel such as
Peter.
Tutorial note: ‘Correct’ classification under ‘ethical’, ‘other professional’, ‘practical’ or ‘staff implications’ is not as important
as identifying the matters.
(ii) Other professional and practical matters
Tutorial note: ‘Other professional’ includes quality control.
■ The experience of staff allocated to each assignment should be commensurate with the assessment of associated risk.
For example, there may be a risk that insufficient audit evidence is obtained within the budget for the audit of Blythe.
Huggins, as a listed client, carries a high reputational risk.
■ Sufficient appropriate staff should be allocated to each audit to ensure adequate quality control (in particular in the
direction, supervision, review of each assignment). It may be appropriate for a second partner to be assigned to carry
out a ‘hot review’ (before the auditor’s report is signed) of:
– Blythe, because it is the first audit of a new client; and
– Huggins, as it is listed.
■ Existing clients (Huggins and Gray) may already have some expectation regarding who should be assigned to their
audits. There is no reason why there should not be some continuity of staff providing appropriate safeguards are put in
place (e.g. to overcome any familiarity threat).
■ Senior staff assigned to Blythe should be alerted to the need to exercise a high degree of professional skepticism (in the
light of Peter’s attitude towards the audit).
■ New staff assigned to Huggins and Gray would perhaps be less likely to assume unquestioned honesty than staff
previously involved with these audits.
Logistics (practical)
■ All three assignments have the same financial year end, therefore there will be an element of ‘competition’ for the staff
to be assigned to the year-end visits and final audit assignments. As a listed company, Huggins is likely to have the
tightest reporting deadline and so have a ‘priority’ for staff.
■ Blythe is a local and private company. Staff involved in the year-end visit (e.g. to attend the physical inventory count)
should also be involved in the final audit. As this is a new client, staff assigned to this audit should get involved at every
stage to increase their knowledge and understanding of the business.
■ Huggins is a national operation and may require numerous staff to attend year-end procedures. It would not be expected
that all staff assigned to year-end visits should all be involved in the final audit.
Time/fee/staff budgets
■ Time budgets will need to be prepared for each assignment to determine manpower requirements (and to schedule audit
work).
(iii) Implications for allocating staff
■ Fox & Steeple should allocate staff so that those providing other services to Huggins and Gray (that may create a selfreview
threat) do not participate in the audit engagement.
Competence and due care (Qualifications/Specialisation)
■ All audit assignments will require competent staff.
■ Huggins will require staff with an in-depth knowledge of their computerised system.
■ Gray will require senior audit staff to be experienced in financial reporting matters specific to communications and
software solutions (e.g. in revenue recognition issues and accounting for internally-generated intangible assets).
■ Specialists providing tax services and undertaking the due diligence reviews for Gray may not be required to have any
involvement in the audit assignment.

19 At 30 June 2004 a company’s allowance for receivables was $39,000. At 30 June 2005 trade receivables totalled $517,000. It was decided to write off debts totalling $37,000 and to adjust the allowance for receivables to the equivalent of 5 per cent of the trade receivables based on past events.

What figure should appear in the income statement for these items?

A $61,000

B $22,000

C $24,000

D $23,850

正确答案:B

声明:本文内容由互联网用户自发贡献自行上传,本网站不拥有所有权,未作人工编辑处理,也不承担相关法律责任。如果您发现有涉嫌版权的内容,欢迎发送邮件至:contact@51tk.com 进行举报,并提供相关证据,工作人员会在5个工作日内联系你,一经查实,本站将立刻删除涉嫌侵权内容。