CT6 Data analytics for accounting

User Generated

znaqlaryyvf

Business Finance

Metropolitan State University of Denver

Description

I need help on a data analytics for accounting project.

****See attachment for details***

Please review all the information before excepting to help. I need help with the lab assignments (6-1 & 9-1) plus a 3–4-page APA written analysis plus a presentation in PowerPoint with speaker notes.

  • The first lab (6-1) is evaluating the master data
  • The written essay is an analysis of the lab and should include:
    • APA format with Reference page
    • Be 3-4 pages
    • And please indicate the answers to the lab questions as (Q1), (Q2), ect.
  • The second lab (9-1) is state sales taxes and creating a data visualization
  • With this lab the analysis is a PowerPoint presentation with speaker notes
    • Include APA format with Reference page

The data files are too large to upload. To access the files, use this link: https://1drv.ms/u/s!Ag7dwnIidJhopmrOn8dQj439bJSA?e...

Unformatted Attachment Preview

CT 6 Option #1: Analytics in Audit and Tax (Using Excel) You are required to complete both parts A and B. Section 1: Part A: Complete Lab 6-1 Evaluate the Master Data for Interesting Addresses (pp. 248 - 250) in your textbook. Part B: Your analysis should be written as an essay and include the following: • Introduction • Analysis o Headings - Part 1, Part 2, Part 3, Part 4 (i.e., Part 1: Identify the Questions) – headings are shown in the Lab. • Communicate your findings to the audit committee and then write a brief paragraph of your analysis in layman’s terms. (For example, what were the key findings from your analysis?) • Conclusion. Submit your analysis as a Word document and submit any additional requirements noted in the Lab (i.e., Excel files, tables, etc.). SECTION 2. Part A: Complete Lab 9-1 State Sales Taxes and Create a Data Visualization (pp. 375 - 379) in your textbook. Part B: Your analysis should include the following: • Introduction • Analysis o Headings - Part 1, Part 2, Part 3 (i.e., Part 1: Identify the Questions) – headings are shown in the Lab. • Communicate your findings to the tax manager – write a brief paragraph of your analysis in layman’s terms. (For example, what were the key findings from your analysis?) • Conclusion. Submit your analysis as a slide presentation. Submit any additional requirements noted in the Lab (i.e., Excel files, tables, etc.). Other Requirements • Your paper should be 3-4 pages in length--not including the required cover and references pages or other requirements of the Lab such as Excel files and tables • Conform to the APA guidelines. • Include at least two scholarly references in addition to the course textbook. ***Keep Scrolling down for the Lab until you see “End of Lab”*** 8 Pages ***Second Lab 9-1 below, keep scrolling*** ****End of Both Labs****
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.here is lab 6-3. I'm finishing the powerpoint right now.

LAB 6-1 EVALUATE THE MASTER DATA FOR INTERESTING ADDRESSES

1

Introduction
As companies expand and databases grow, detecting probable fraudulent activities gets
harder. Raw data is not very useful and can contain material mistakes which can even be
intentional. Data must be purged in order to identify possible material mistakes and determine
whether they were introduced on purpose for hiding possible fraud. Validating data in order to
verify its accuracy is the first step auditors must take to start investigating potential fraud
schemes (Fay & Negangard, 2017). Auditors cannot assume that unvalidated data is accurate.
Analysis
When dealing with large amounts of data, auditors must rely upon data management tools
that help them identify potential misstatements. The amount of data that companies possess is so
large, that doing it manually is possible but would take too long. On the other hand, using data
management tolls reduces work and time spent, while increasing accuracy.
Part 1: Identify the Questions
When employees are trying to hide fraudulent activities, they will tend to introduce
changes that make databases assume that addresses are different or simply input addresses that
are hard to verify. The most suspicious addresses are always those that only include a P.O. Box
since it doesn’t include any type of street address to compare. When a database user (employee)
inputs the vendor’s data, they simply input the P.O. Box in the address field. Sometimes fields
can be set to require both letters and numbers to record addresses, but that is not an obstacle
since a person can input P.O. Box 12345. It includes both letters and numbers.

LAB 6-1 EVALUATE THE MASTER DATA FOR INTERESTING ADDRESSES

2

Part 2: Master the Employee and Vendor Data
Databases are many times divided into several fields especially when there are many data
inputs and many IDs to record. For example, the User_Listing database includes 105 users and
the Supplier_Listing which includes all the vendors that provide goods and services to the
company includes 142 vendors. These are large numbers of IDs, but they can be handled by a
PC. Sometimes, databases are divided into several files because they are accessed by different
users. For example, human resources department will have access to the users’ database since it
includes employees but only the procurement department should have access to the suppliers’
listing. In order to properly work with both databases, they have to be included in one single
Excel spreadsheet. The following screenshot shows how two separate spreadsheets (or more) can
be merged into one single spreadsheet.

Each database is included in a separate sheet.

LAB 6-1 EVALUATE THE MASTER DATA FOR INTERESTING ADDRESSES

3

Part 3: Perform the Analysis
When looking for suspicious activities related to possible frauds, auditors must look for
data inputted that tries to conceal information. As stated before, the most suspicious addresses
are P.O. Boxes. By converting the data fields into tables, we can easily identify P.O. Boxes.
Once we convert the filed into tables, we can select a filter that will show us all the addresses
that contain the word box. There are several ways a P.O. Bos can be inputted: P.O. Box, PO Box,
or simply Box. That all these have in common is the word box, so we can simply search for that
word on the corresponding field.

Only three suppliers have a P.O. Box address as their physical address. These are clues
that must be investigated to determine whether the address only contains a P.O. Box to conceal
who is really in charge of the company or was it a choice made by the company for whatever
reason they had. It is legal to use a P.O. box as a business address...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags