Preview

acl tuturial 1

Powerful Essays
Open Document
Open Document
492 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
acl tuturial 1
ACL 9
Tutorial 1

COMMANDS:
ANALYZE -> TOTAL
ANALYZE -> PROFILE
ANALYZE -> STATISTICS
SAMPLING -> SAMPLE
ANALYZE -> SEQUENCE
DATA -> SORT
ANALYZE -> DUPLICATES
ANALYZE -> GAPS

The tutorials in this folder are supplemental exercises that relate to ACL 9 topics covered in chapters 8, 9, 10, and 12 in the Hall, IT Auditing, 3rd edition textbook. The tutorials presume that the student has installed ACL from the CD accompanying the text and has worked through the ACLStart.pdf document in the ACL Manual folded. The tutorials are not a substitute for this basic ACL knowledge.

These tutorials use data tables stored in the Sample Project.acl that is automatically installed with ACL. Open the sample project and click on the appropriate table to perform the tutorial. The name of the table is indicated in bold type prior to each section in the tutorial (e.g. AP TRANS).

AP_TRANS

1. Using the TOTAL command, develop a hash control total and an amount control total for AP-TRANS.
Invoice_Amount
278,641.33
Quantity
37,107
Unit_Cost
1,522.29

What recommendation would you make to develop a field for hash control total?

2. Run PROFILE on the file, Invoice Amount.
Field Name
Total Value
Absolute Value
Minimum
Maximum
Invoice Amount
278,641.33
278,641.33
14.88
56,767.20

Can you determine if there are any negative transactions? Explain.
There aren’t, the smallest transaction was for $14.88

3. Run STATISTICS on each of the four available fields with the Std Dev box checked.
4. Invoice Amount
5.
Number
Total
Average
Range
-
56,752.32
-
Positive
102
278,641.33
2,731.78
Negative
0
0.00
0.00
Zeros
0
-
-
Totals
102
278,641.33
2,731.78
Abs Value
-
278,641.33
-
Std. Dev.
-
6,609.23
-

Highest
Lowest
56,767.20
14.88
20,386.19
21.12
18,883.34
31.68
16,642.56
46.08
15,444.80
49.68

Invoice Date

Number
Total
Average
Range
-
334
«Empty Date»
Positive
102
3,748,395
08/12/2000

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Select the option “Tools” from the menu and select data analysis (in case data analysis function is not available – then you double click ‘Add-in’ option and select Analytical Tool Pak option, then you go to tools and select data analysis.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Name your Access database file using Lab3_, your first initial, and your last name (e.g., Lab3_JSmith.accdb). Create and save your Access database file. When you are done, submit your database to the Course Project Dropbox.…

    • 694 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Simpson Case ACL

    • 651 Words
    • 10 Pages

    Question 6. Determine whether there are any transaction types other than the four included in the introduction to the case. List the exceptions, if any, and describe the likely cause of exception.…

    • 651 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Acc 422 E9-1 & E9-12

    • 383 Words
    • 2 Pages

    E9-1 (Lower-of-Cost-or-Market) The inventory of Oheto Company on December 31, 2011, consists of the following items.…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You are required to use OpenOffice software to write and execute queries with tables you created in project prt 1.…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks,…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    You can use StatCrunch or the TI to help with this test. Needed information for both tools include:…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bis245 Ilab

    • 2683 Words
    • 11 Pages

    D. Deliverables Section Part B Step 4 Part C Step 6 E. Lab Steps Preparation 1. Get the Database from Doc Sharing: a. Download Lab1_Nwind.accdb file from your course Doc Sharing panel (Labs view), and Save the file to your local drive b. Download Lab1C_Questions.docx from your course Doc Sharing panel, and Save the file to your local drive. 2. Using Citrix for MS Visio and/or MS Access a. If you are using the Citrix remote lab, follow the login instructions located in the iLab tab in Course Home. b. You will have to upload the Lab1_Nwind.accdb file to your…

    • 2683 Words
    • 11 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TDA 2.3 Question sheet

    • 314 Words
    • 2 Pages

    4.1 To raise your awareness in this area describe what are the legal requirements covering:-…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    The American Institute of Certified Public Accounts (AICPA) Code of Professional Conduct is a body of principals that has a goal to guide Certified Public Accountants (CPA’s) in the “performance of it professional responsibilities” (Mintz, 2011). The AICPA Code of Professional Conduct has six essential principles and they are: Responsibilities, the Public Interest, Integrity, Objectivity and Independence, Due Care, and Scope and Nature of Services. Each of these principles is meant to be followed by the members of the AICPA. These articles are used to explain the responsibilities that CPA’s have to clients, colleagues and to the public.…

    • 417 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    The IT Governance Institute, Information Systems Audit and Control Association [the “Owner(s)”] and the authors have…

    • 8174 Words
    • 33 Pages
    Better Essays

Related Topics