Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment Task – Tutorial Questions Unit Code: HI5019 Unit Name: Strategic Information Systems for Business and Enterprise Assignment: Tutorial Questions 1 Due: 11:30pm 29th May 2020 Weighting: 25%...

1 answer below »
Assessment Task – Tutorial Questions

Unit Code: HI5019

Unit Name: Strategic Information Systems for Business and Enterprise

Assignment: Tutorial Questions 1

Due: 11:30pm 29th May 2020

Weighting: 25%

Total Assignment Marks: 50 marks

Purpose: This assignment is designed to assess your level of knowledge of the key topics covered in
this unit

Unit Learning Outcomes Assessed:

1. Critically evaluate the purpose and role of accounting information systems in today’s business
2. Articulate the various transaction cycles, financial reporting, management reporting systems and
e-commerce systems to technical and non-technical stakeholders;
3. Evaluate systems development methodologies and the role of accountants in system
development projects;
4. Critically evaluate the range of cultural, security, privacy and ethical issues facing individuals and
organisations as a result of information systems.

Description: Each week students were provided with three tutorial questions of varying degrees of
difficulty. These tutorial questions are available in the Tutorial Folder for each week on Blackboard.
The Interactive Tutorials are designed to assist students with the process, skills and knowledge to
answer the provided tutorial questions. Your task is to answer a selection of tutorial questions for
weeks 1 to 5 inclusive and submit these answers in a single document.

The questions to be answered are:

Week 1
What is the relationship between data, information and an information system? (10 marks, maximum
300 words)

Week 2
A council health inspector threatens to close down a restaurant by issuing a fake health violation
notice if the owner does not make a financial payment to him. If the restaurant owner does not
cooperate, the restaurant cannot be opened for business and the negative publicity will drive
customers away. Faced with the potential economic loss, the owner makes the payment.

a) What type of fraud is this? (4 marks, maximum 150 words)
) What controls can be implemented to prevent or detect the fraud? (6 marks, maximum 200

Week 3
How is a credit check in the advanced technology system fundamentally different from a credit check
in the basic technology system? (10 marks, maximum 300 words)

Week 4
The following is the description of cash disbursements system of Two Symbols Limited:

Upon receipt of the documents from accounts payable department, the cash disbursements clerk files
the documents until their payment due date. On the due date, the clerk prepares a cheque for the
invoiced amount, which is sent to the treasurer who signs it and mails back to the supplier.

The cash disbursement clerk then updates the cheque register, accounts payable ledger, and accounts
payable control account from the clerk’s terminal. Finally, the clerk files the invoice and copy of
purchase order, receiving report, cheque in the department.

Describe the internal control weakness in Two Symbols’ cash disbursements system and discuss the
isk associated with the weakness. (10 marks, maximum 300 words)

Week 5
Leon Jones worked in the warehouse of a large building supply company. One day he unexpected left
for Fiji, never to return. His supervisor seized the opportunity to continue submit time cards for Leon
to the payroll department. Each week, as part of his normal duties, the supervisor received the
employee pay cheques from payroll and distribute them to the workers on his shift. As Leon was not
present to collect his pay cheque, the supervisor forged Leon’s name and cashed it.

Describe two control techniques to prevent or detect this fraud scheme. (10 marks, maximum 300

Submission Directions:

The assignment has to be submitted via Blackboard. Each student will be permitted one
submission to Blackboard only. Each student needs to ensure that the document submitted
is the co
ect one.
Academic Integrity
Academic honesty is highly valued at Holmes Institute. Students must always submit work
that represents their original words or ideas. If any words or ideas used in a class posting or
assignment submission do not represent the student’s original words or ideas, the student
must cite all relevant sources and make clear the extent to which such sources were used.
Written assignments that include material similar to course reading materials or other
sources should include a citation including source, author, and page number.
In addition, written assignments that are similar or identical to those of another student in
the class is also a violation of the Holmes Institute’s Academic Conduct and Integrity Policy.
The consequence for a violation of this policy can incur a range of penalties varying from a
50% penalty through to suspension of enrolment. The penalty would be dependent on the
extent of academic misconduct and the student’s history of academic misconduct issues.
All assessments will be automatically submitted to SafeAssign to assess their originality.

Further Information:
For further information and additional learning resources, students should refer to their Discussion
Board for the unit.
Answered Same Day May 26, 2021 HI5019


Rishi answered on May 27 2021
114 Votes
Week 1 Solution
Relationship between data, information and information system: -
A data over which any processing has been done is considered as Information. Data is facts and the information are an output from presenting the data. For example, a spreadsheet that contain Name, class, subjects, roll number and marks obtained is data when such data is presented in graphs that shows the percentage of the student got more than 80% marks in each subject is an information. Data itself does not have any value unless it is processed as we can’t get any meaning out of it. Let us take another example “76”, “Sam”, "Science”, “in”, “marks”,” Scored” Itself is a data. But when it is a
anged in a sentence “Sam scored 76 marks in science” this became information. Wrong data can lead to wrong information which has no use for its users.
An information system is a group of resources that are used for processing of data so that information can be generated. An information system consists of multiple components such as Hardware, Software, data, network and people.
Usually once the data is collected from internal or external sources is inserted into the information system. Then some processing is done on this data to convert it into meaningful information. Then this information is stored in the information system so that it can be used in future and shared with other users for its application. These activity helps the users to take decisions and analyze the problems.
Information system plays important roles by providing important operational and managerial supports to the organization. With the use of information system, the information can be analyzed, stored, processed, and collected. The type of information system to be used will depend the type of data is available and processed.
Week 2 Solution
Type of fraud:
Threatening calls to issue fake health violation notices is a type of Economic extortion fraud.
Economic extortion is a type of fraud where the perpetrator demands some economic favor from the owner to make some decisions in favor. In the present case a council health inspector threatens to a restaurant by use of his power. It is just reverse of
ibery. Where Instead of a business offering favor to a person to influence his business, the perpetrator demands that the business pay him for favorable influence or to avoid unfavorable treatment.
It is relatively tough to perceive the economic extortion fraud because companies do not have records of the actions of the external person. In the recent times those business which are regulated by some laws have reported mistrustful actions from external individual clamming to be health inspector.
Control to be implemented:
If the business is contacted by any external perpetrator as a Public Health Inspector who is attempting to issue fake health...

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here