Preview

ACL 9 Tutorial 4

Satisfactory Essays
Open Document
Open Document
568 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ACL 9 Tutorial 4
ACL 9
Tutorial 4

COMMANDS:
ANALYZE -> AGE
DATA -> JOIN
DATA -> MERGE

The tutorials in this folder are supplemental exercises that relate to ACL 9 topics covered in chapters 8, 9, 10, and 12 in the Hall, IT Auditing, 3rd edition textbook. The tutorials presume that the student has installed ACL from the CD accompanying the text and has worked through the ACLStart.pdf document in the ACL Manual folded. The tutorials are not a substitute for this basic ACL knowledge.

These tutorials use data tables stored in the Sample Project.acl that is automatically installed with ACL. Open the sample project and click on the appropriate table to perform the tutorial. The name of the table is indicated in bold type prior to each section in the tutorial (e.g. AP TRANS).

AR
1. The Aging of Accounts Receivable is a frequently used audit technique that is supported by the AGE command in ACL:

(a) Using AGE, develop an aging report of current, 30, 60, 90, 120, and above 120 days past due accounts. Set the cutoff date at December 31, 2000. Age on the DUE date field. Create a filter to include only Invoice type [IN] in the report.

-lots of uncollected money

EMPMAST

2. JOINING, RELATING, AND MERGING DATA

The JOIN command will combine the fields of two files with different structures to produce a third file. In ACL, this task requires one file to be designated the PRIMARY file and the other the SECONDARY file. If you JOIN a transaction file with a master file, the transaction file would be the PRIMARY file and the master file would be the SECONDARY file. You obtain a different result if the files are reversed. The PRIMARY file is the first file to be opened, and the SECONDARY file is the second file opened. You MUST sort the SECONDARY file in ascending sequence on the key character field before using JOIN. It is a good idea to also sort the PRIMARY file in ascending sequence on the key character fields. Instead of SORTing the PRIMARY file, you

You May Also Find These Documents Helpful

  • Powerful Essays

    Asa Tut8

    • 2637 Words
    • 11 Pages

    The auditor should use ASA 330.7a and the background information provided as guidance for determining the most appropriate audit approach. AC is a straightforward small business where staff members are related to the owner. This information supports a low inherent risk assessment, as the chance of material misstatements is low. However there is little…

    • 2637 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Many medical organizations with average patient accounts receivable that are greater than a specified amount, not including the allowance, must compute and record an Allowance for Doubtful Accounts on their balance sheet. This accounts receivable balance should be re-evaluated on an annual basis to determine reporting status. Often, it is not known which specific accounts receivable invoices will be uncollectible. An allowance is therefore established to estimate the value of those receivables believed to be uncollectible. This entry should be “recorded so the income statement and balance sheet are fairly stated at the amount expected to be collected in receivables, thus satisfying the matching principle. The entry creates a contra accounts receivable balance. When netted against the gross total of accounts receivable, the true value of the receivables is reported” (FMS,…

    • 780 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The following provides high-level information about auditing a fictional entity, called Sofitec Computers, created for this case study. This case does not include a complete description of the entity or the industry, nor does it provide comprehensive information on auditing; it is only intended to provide the information that will be necessary and helpful in completing this case study and answering discussion questions.…

    • 5390 Words
    • 36 Pages
    Powerful Essays
  • Satisfactory Essays

    Dq3 Why is it important to place emphasis on the existence and rights (ownership) assertions when auditing accounts receivable? Which audit procedures are usually the most useful for auditing the existence and rights assertions? What analytical procedures might be informative regarding the existence assertion?…

    • 900 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    ACCT 555 Week 6 HW KB

    • 2320 Words
    • 11 Pages

    d. Examine sales returns and write-offs of accounts during the year to determine if returns and write-offs are the result of customers unable to pay. Review aging of accounts receivable to determine if accounts in older aging categories include sales transactions that are unlikely to be collected.…

    • 2320 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    apollo shoes case study 4

    • 2736 Words
    • 11 Pages

    1. Obtain an aged trial balance of individual customer accounts. Recalculate the total and trace to the general ledger control account.…

    • 2736 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    This objective typically requires the utilization of an Aging of Accounts Receivable Schedule, which can be retrieved from resources such as financial department records. According to Emerson, P. (n.d.), “The accounts receivable schedule is a listing of the customers making up the total accounts receivable balance. Most businesses prepare an accounts receivable schedule at the end of the month.” Accessing this critical data can be quite useful and will give the company a much clearer picture as to why this issue is…

    • 867 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Basic accounting equations

    • 1049 Words
    • 5 Pages

    The following items appeared in the accounting records of Triguero 's, a retail music store that also sponsors concerts. Classify each of the items as an asset, liability; revenue; or expense from the company 's viewpoint. Also indicate the normal account balance of each item.…

    • 1049 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 John Pham

    • 2319 Words
    • 10 Pages

    The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called contoso.com. The computers required for this lab are listed in Table 2-1.…

    • 2319 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 838 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Acc 403

    • 5361 Words
    • 22 Pages

    |Arens, A., Elder, R.J., & Beasley, M. (2010). ACCT 403: Auditing and assurance services: 2010 custom edition (13th ed.). Upper Saddle River,|…

    • 5361 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Analyzing Data Checkpoint

    • 359 Words
    • 2 Pages

    The first step is to determine exactly what analyzes you want to perform and ensure that you gather all that is needed. Keep in mind to import into Access it has to be formatted properly as an excel document. The second step is to create a database. This can be done by opening Access and creating a blank database (file, new, blank database). You will be prompted to name the database and where you would like to save it. Step three is to edit and validate all data. Be sure to have a primary key and that all data is valid. If the data were imported without, identifying a primary key or the data is “dirty” or not valid these issues can be addressed by using the utility queries in Access. The fourth step is to connect data files. When multiple data files have been imported into tables, edited, and validated, you need to connect the tables by creating relationships. Typically, a relationship connects a primary key in one table to a regular field in another table. For example, the Customer Number in the Customers table (a primary key) can be connected to the Customer Number field in the Sales table. You also need to establish a relationship between the matching fields in original tables and their validating tables. In our example, you would establish a relationship between the Customer Type field in the Customers table and the Customer Type field in the Customer Types table. Repeat this step for all validating tables.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays