Assessment Task – Tutorial Questions Unit Code: HI5019 Unit Name: Strategic Information Systems for Business and Enterprise Assignment: Tutorial Questions 1 Due: 11:30pm 29th May 2020 Weighting: 25%...

1 answer below »
i need those all weeks question answer need to be done.



Assessment Task – Tutorial Questions Unit Code: HI5019 Unit Name: Strategic Information Systems for Business and Enterprise Assignment: Tutorial Questions 1 Due: 11:30pm 29th May 2020 Weighting: 25% Total Assignment Marks: 50 marks Purpose: This assignment is designed to assess your level of knowledge of the key topics covered in this unit Unit Learning Outcomes Assessed: 1. Critically evaluate the purpose and role of accounting information systems in today’s business environment; 2. Articulate the various transaction cycles, financial reporting, management reporting systems and e-commerce systems to technical and non-technical stakeholders; 3. Evaluate systems development methodologies and the role of accountants in system development projects; 4. Critically evaluate the range of cultural, security, privacy and ethical issues facing individuals and organisations as a result of information systems. Description: Each week students were provided with three tutorial questions of varying degrees of difficulty. These tutorial questions are available in the Tutorial Folder for each week on Blackboard. The Interactive Tutorials are designed to assist students with the process, skills and knowledge to answer the provided tutorial questions. Your task is to answer a selection of tutorial questions for weeks 1 to 5 inclusive and submit these answers in a single document. The questions to be answered are: Week 1 What is the relationship between data, information and an information system? (10 marks, maximum 300 words) Week 2 A council health inspector threatens to close down a restaurant by issuing a fake health violation notice if the owner does not make a financial payment to him. If the restaurant owner does not cooperate, the restaurant cannot be opened for business and the negative publicity will drive customers away. Faced with the potential economic loss, the owner makes the payment. Required: a) What type of fraud is this? (4 marks, maximum 150 words) b) What controls can be implemented to prevent or detect the fraud? (6 marks, maximum 200 words) Week 3 How is a credit check in the advanced technology system fundamentally different from a credit check in the basic technology system? (10 marks, maximum 300 words) Week 4 The following is the description of cash disbursements system of Two Symbols Limited: Upon receipt of the documents from accounts payable department, the cash disbursements clerk files the documents until their payment due date. On the due date, the clerk prepares a cheque for the invoiced amount, which is sent to the treasurer who signs it and mails back to the supplier. The cash disbursement clerk then updates the cheque register, accounts payable ledger, and accounts payable control account from the clerk’s terminal. Finally, the clerk files the invoice and copy of purchase order, receiving report, cheque in the department. Required: Describe the internal control weakness in Two Symbols’ cash disbursements system and discuss the risk associated with the weakness. (10 marks, maximum 300 words) Week 5 Leon Jones worked in the warehouse of a large building supply company. One day he unexpected left for Fiji, never to return. His supervisor seized the opportunity to continue submit time cards for Leon to the payroll department. Each week, as part of his normal duties, the supervisor received the employee pay cheques from payroll and distribute them to the workers on his shift. As Leon was not present to collect his pay cheque, the supervisor forged Leon’s name and cashed it. Required: Describe two control techniques to prevent or detect this fraud scheme. (10 marks, maximum 300 words) Submission Directions: The assignment has to be submitted via Blackboard. Each student will be permitted one submission to Blackboard only. Each student needs to ensure that the document submitted is the correct one. Academic Integrity Academic honesty is highly valued at Holmes Institute. Students must always submit work that represents their original words or ideas. If any words or ideas used in a class posting or assignment submission do not represent the student’s original words or ideas, the student must cite all relevant sources and make clear the extent to which such sources were used. Written assignments that include material similar to course reading materials or other sources should include a citation including source, author, and page number. In addition, written assignments that are similar or identical to those of another student in the class is also a violation of the Holmes Institute’s Academic Conduct and Integrity Policy. The consequence for a violation of this policy can incur a range of penalties varying from a 50% penalty through to suspension of enrolment. The penalty would be dependent on the extent of academic misconduct and the student’s history of academic misconduct issues. All assessments will be automatically submitted to SafeAssign to assess their originality. Further Information: For further information and additional learning resources, students should refer to their Discussion Board for the unit.
Answered Same DayMay 26, 2021HI5019

Answer To: Assessment Task – Tutorial Questions Unit Code: HI5019 Unit Name: Strategic Information Systems for...

Rishi answered on May 27 2021
134 Votes
Week 1 Solution
Relationship between data, information and information system: -
A data over which any processing has been done is considered as Information. Data is facts and the information are an output from presenting the data. For example, a spreadsheet that contain Name, clas
s, subjects, roll number and marks obtained is data when such data is presented in graphs that shows the percentage of the student got more than 80% marks in each subject is an information. Data itself does not have any value unless it is processed as we can’t get any meaning out of it. Let us take another example “76”, “Sam”, "Science”, “in”, “marks”,” Scored” Itself is a data. But when it is arranged in a sentence “Sam scored 76 marks in science” this became information. Wrong data can lead to wrong information which has no use for its users.
An information system is a group of resources that are used for processing of data so that information can be generated. An information system consists of multiple components such as Hardware, Software, data, network and people.
Usually once the data is collected from internal or external sources is inserted into the information system. Then some processing is done on this data to convert it into meaningful information. Then this information is stored in the information system so that it can be used in future and shared with other users for its application. These activity helps the users to take decisions and analyze the problems.
Information system plays important roles by providing important operational and managerial supports to the organization. With the use of information system, the information can be analyzed, stored, processed, and collected. The type of information system to be used will depend the type of data is available and processed.
Week 2 Solution
Type of fraud:
Threatening calls to issue fake health violation notices is a type of Economic extortion fraud.
Economic extortion is a type of fraud where the perpetrator demands some economic favor from the owner to make some decisions in favor. In the present case a council health inspector threatens to a restaurant by use of his power. It is just reverse of bribery. Where Instead of a business offering favor to a person to influence his business, the perpetrator demands that the business pay him for favorable influence or to avoid unfavorable treatment.
It is relatively tough to perceive the economic extortion fraud because companies do not have records of the actions of the external person. In the recent times those business which are regulated by some laws have reported mistrustful actions from external individual clamming to be health inspector.
Control to be implemented:
If the business is contacted by any external perpetrator as a Public Health Inspector who is attempting to issue fake health...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here