ACC 574 WEEK 7 DISCUSSION - 83729

Solution Posted by
olufunmilola

olufunmilola

Rating : (9)A+
Solution Detail
Price: $14.00
  • From: Business, Accounting
  • Posted on: Wed 31 Dec, 2014
  • Request id: None
  • Purchased: 0 time(s)
  • Average Rating: No rating
Request Description
1) Database Design" Please respond to the following: • Imagine that an auditor is reviewing a file containing 25 fields of data, only five of which are relevant to the auditor’s objective. Evaluate how ACL can be used to find irregularities or patterns in transactions that could indicate control weaknesses, indicating the effectiveness of the tool. • Identify the three types of update anomalies that could occur with database tables that have not been normalized. Explain how a university or your company can minimize each type of anomaly when updating database tables. Justify your answer 2) Audit Considerations" Please respond to the following: • Explain how an embedded audit module works and why auditors may choose not to use it. Determine the approach an auditor should consider instead. Explain your answer. • Discuss why auditors should be familiar with the principle of data normalization and if auditors should be required to specialize in IT. Justify your answer. NOTE: MORE THAN ONE ANSWER POSTED FOR THE PRICE OF ONE CHOOSE ANY
Solution Description

DISCUSSION 1

  • Imagine that an auditor is reviewing a file containing 25 fields of data, only five of which are relevant to the auditor’s objective. Evaluate how ACL can be used to find irregularities or patterns in transactions that could indicate control weaknesses, indicating the effectiveness of the tool.

ACL (audit command language) is the leader in the industry. ACL was designed as a meta-language for auditors to access data stored in various digital formats and to test them comprehensively. In fact, many of the problems associated with accessing complex data structures have been solved by ACL’s Open Database Connectivity (ODBC) interface. (Information Technology Auditing and Assurance, Third Edition James A. Hall 2011 page 363)

Some of the disadvantages are:

  • Access control
  • ACL Process
  • Platform Dependency

(An Auditors guide data analytics by Natasha DeKroon Duke Unversity)

Identify the three types of update anomalies that could occur with database tables that have not been normalized. Explain how a university or your company can minimize each type of anomaly when updating database tables. Justify your answer. 

1) Insertion Anomalies create the problems when we are creating the inconsistency in the RDBMS database while inserting the records into the columns of the given table.
2) Deletion Anomalies create the problems when we are deleting the records without taking care of the other portion of the database. It will create the confusion due to inconsistency in the database.
3) Modification Anomalies are occurs when we are not able to modifying the records in the data base without taking care of the other facts. ( Theories of MS-SQL Server

 

Resources: Theories of MS-SQL Server - http://ithopes.com/myblog/blog/update-anomalies-database-types-anomalies-available/

Information Technology Auditing and Assurance, Third Edition James A. Hall 2011; http://www.coursesmart.com/9781439079119/firstsection#X2ludGVybmFsX0J2ZGVwRmxhc2hSZWFkZXI/eG1saWQ9OTc4MTQzOTA3OTExOS8zNjM

An Auditors guide data analytics by Natasha DeKroon Duke Unversity 2013; https://chapters.theiia.org/.../2013_May_Raleigh%20IIA%20Presentation

OR

"Database Design" Please respond to the following:

•         Imagine that an auditor is reviewing a file containing 25 fields of data, only five of which are relevant to the auditor’s objective. Evaluate how ACL can be used to find irregularities or patterns in transactions that could indicate control weaknesses, indicating the effectiveness of the tool.

•         Identify the three types of update anomalies that could occur with database tables that have not been normalized. Explain how a university or your company can minimize each type of anomaly when updating database tables. Justify your answer.

 

What is ACL?  ACL is audit command language and “was designed as a meta-language for auditors to access data stored in various digital formats and to test them comprehensively” (Hall, 2011, p. 363).  Also according to Hall, “many of the problems associated with accessing complex data structures have been solved by ACL’s Open Database Connectivity (ODBC) interface” (Hall, 2011, p. 363).  ACL has the ability to read data in almost any format.  ACL also is able to filter data to ensure the auditor can perform certain tests on the data.  “When the auditor executes this filter procedure, ACL produces a new view of the inventory file containing four records with zero or negative quantity-on-hand levels.  This […] demonstrates how auditors use ACL to search for anomalies and unusual conditions in accounting files containing thousands of records that defy review by visually scanning t

Attachments
WEEK_7.docx
WEEK_7.docx