Assinale a opção que indica uma exceção aos princípios fundamentais de ética profissional relevantes para o auditor na condução de trabalhos de auditoria das demonstrações contábeis.

O Sistema de Intermediação Financeira fundamenta-se

Com Ferramentas de Gerenciamento de Projetos, o gerente de projeto pode definir uma

A respeito de planejamento na realização de auditorias é correto afirmar:

imagem-retificada-texto-001.jpg

The text highlights Petrobras´ public-share offering which

O Decreto n. 1.171, de 22 de junho de 1994, aprovou o Código de Ética Profissional do Servidor Público Civil do Poder Executivo Federal e, entre outras providências, determinou que os órgãos e entidades da Administração Pública Federal direta e indireta constituíssem as respectivas Comissões de Ética. A respeito dos termos desse Código, assinale a opção incorreta.

imagem-retificada-texto-002.jpg

According to paragraph 1, Mercosur and the Andean Community

Read the text below entitled 10 Ways to Protect Your
Privacy Online in order to answer questions 17 to
20:

10 Ways to Protect Your Privacy Online
Source: www.newsweek.com (Adapted) Oct, 22nd 2010


Up to a couple of years ago, I used to say that
the average person could protect his or her privacy
on the Web. Even as the founder of an online
reputation-management company, I believed it was
possible so long as you were willing to commit some
time doing it. Today, I tell people this: the landscape
of personal data mining and exploitation is shifting
faster than ever; trying to protect your online privacy
is like trying to build your own antivirus software
really, really difficult. But whether or not you have the
time (or money) to invest in the pros, there are a few
simple steps we can all take to reduce the risk to our
private data.

1. Do not put your full birth date on your social-
networkingprofiles.

Identity thieves use birth dates as cornerstones
of their craft. If you want your friends to know your
birthday, try just the month and day, and leave out
the year.


2. Use multiple usernames and passwords.
Keep your usernames and passwords for social
networks, online banking, e-mail, and online shopping
all separate. Having distinct passwords is not enough
nowadays: if you have the same username across
different Web sites, your entire life can be mapped
and re-created with simple algorithms.

3. Shred.
If you are going to throw away credit-card offers, bank
statements, or anything else that might come in hard
copy to your house, rip them up into tiny bits first.

According to the author, the year of your birthday must be

Entre os procedimentos recomendados pela Resolução n. 14 do CONARQ, encontramos aquele que permite a preservação de parcela de documentos de conjunto documental destinado à eliminação, com o objetivo de resgatar práticas administrativas vigentes em determinada época ou lugar. Esse procedimento é denominado:

Na elaboração da documentação de auditoria (Papéis de Trabalho), no que se refere à forma, ao conteúdo e a extensão, o auditor deve levar em conta os seguintes fatores, exceto:

imagem-retificada-texto-001.jpg

According to the text, Brazil´s growth pace is likely to

São permissões granulares associadas com papéis de servidor fixo:

Read the text below entitled 10 Ways to Protect Your
Privacy Online in order to answer questions 17 to
20:

10 Ways to Protect Your Privacy Online
Source: www.newsweek.com (Adapted) Oct, 22nd 2010


Up to a couple of years ago, I used to say that
the average person could protect his or her privacy
on the Web. Even as the founder of an online
reputation-management company, I believed it was
possible so long as you were willing to commit some
time doing it. Today, I tell people this: the landscape
of personal data mining and exploitation is shifting
faster than ever; trying to protect your online privacy
is like trying to build your own antivirus software
really, really difficult. But whether or not you have the
time (or money) to invest in the pros, there are a few
simple steps we can all take to reduce the risk to our
private data.

1. Do not put your full birth date on your social-
networkingprofiles.

Identity thieves use birth dates as cornerstones
of their craft. If you want your friends to know your
birthday, try just the month and day, and leave out
the year.


2. Use multiple usernames and passwords.
Keep your usernames and passwords for social
networks, online banking, e-mail, and online shopping
all separate. Having distinct passwords is not enough
nowadays: if you have the same username across
different Web sites, your entire life can be mapped
and re-created with simple algorithms.

3. Shred.
If you are going to throw away credit-card offers, bank
statements, or anything else that might come in hard
copy to your house, rip them up into tiny bits first.

According to the author, when throwing away credit card offers or bank statements, one should

imagem-retificada-texto-003.jpg

According to the author, usernames and passwords

imagem-retificada-texto-002.jpg

According to the text, there will be a seamless network of Latin American stock exchanges, which means this network will

imagem-retificada-texto-002.jpg

According to paragraph 2, a Latin American capital market is

Visando manter a qualidade e a credibilidade do seu trabalho, ao identificar ameaças que possam comprometer a sua independência, o auditor deve tomar a seguinte providência:

Conforme consta no documento e-ARQ Brasil, a incorporação de um documento ao SIGAD chama-se:

Quando ocorrer incerteza quanto a fato relevante, cujo desfecho possa afetar significativamente o patrimônio e o resultado da entidade, o auditor deve emitir um parecer

De acordo com a Lei n. 8.159, de 8 de janeiro de 1991, assinale a assertativa correta.

Página 1