Please read and follow the instructions as per Assignment requirements.Don't include the content from sources like course hero that shows most of the plagiarism.Tutorial Questions Assignment
Page 1 of 8 Assessment Task – Tutorial Questions Unit Code: HI5019 Unit Name: Strategic Information Systems for Business and Enterprise Assignment: Tutorial Questions Due: Week 13, dated 16th October 2020, on Friday at 05:30 pm. Weighting: 50% Purpose: This assignment is designed to assess your level of knowledge of the key topics covered in this unit Unit Learning Outcomes Assessed.: 1. Critically evaluate the purpose and role of accounting information systems in today’s business environment. 2. Articulate the various transaction cycles, financial reporting, management reporting systems and e-commerce systems to technical and non-technical stakeholders. 3. Evaluate systems development methodologies and the role of accountants in system development projects. 4. Appraise the risks inherent in computer-based systems/ERP, including the role of ethics and the various internal control processes that need to be in place. 5. Critically evaluate the range of cultural, security, privacy and ethical issues facing individuals and organizations as a result of information systems. Description: Each week students were provided with three tutorial questions of varying degrees of difficulty. The tutorial questions are available in the Tutorial Folder, for each week, on Blackboard. The Interactive Tutorials are designed to assist students with the process, skills, and knowledge to answer the provided tutorial questions. Your task is to answer a selection of tutorial question for weeks 1 to 11 inclusive and submit these answers in a single document. Page 2 of 8 The questions to be answered are: Question 1: Week 4, 7 Marks. [Words Limit: Up to 400 words.] a) Internal controls play an important role in reducing the risks of fraudulent activities in any organization. Further, advanced technology helps accountants in reducing fraud. Explain how an advanced technology transaction processing system reduces fraudulent activities from any organizing. [4 Marks. Words Limit: Up to 200 words] b) Refer to the given system flowchart, and we have discussed the control weakness and the risk associated with these control weaknesses. Based on these control weaknesses and the associated risk, what types of frauds are possible in this business environment. [3 Marks. Word Limit: Up to 200 words] --------------------------------------------------------------------------------------------------------------------- Page 3 of 8 Question 2: Week 5, 11 Marks. [Words Limit: Up to 400 words.] The flowchart below illustrates two alternative inventory ordering methods. Answer part 1 to 3 based on this flowchart. Required: 1. Some organizations prefer using alternative two. What are the advantages of using alternative two instead of the alternative one? Be specific. [2 Marks] 2. What is the difference between purchase requisition and purchase order? [2 Marks] Page 4 of 8 3. Under what circumstances can you envision management using alternative one rather than alternative two? [3 Marks] 4. Some accountants argue that the receiving department should be eliminated. Discuss the objective of eliminating the receiving function. What accounting/audit problems need to be resolved. [4 Marks] --------------------------------------------------------------------------------------------------------------------- Question 3: Week 6, 7 Marks. [Words Limit: Up to 300 words.] HARDA Limited employs 650 workers in ten different departments. These workers work in various capacities, including the manufacturing workers, technician, and janitorial workers. Each department has a supervisor who is responsible for supervising departmental activities. In addition to supervising operations, the supervisors of the departments are responsible for recruiting, hiring, and firing workers within their areas of responsibility. The organization attracts casual labour and experiences a 20 to 30 per cent turnover rate in employees per year. Employees clock on and off the job each day to record their attendance on time cards. Each department has its clock machine located in an unattended room away from the main production area. Each week, the supervisors gather the time cards, review them for accuracy, and sign and submit them to the payroll department for processing. Besides, the supervisors submit personnel action forms to reflect newly hired and terminated employees. From these documents, the payroll department signs the paychecks, which are drawn on the general cash account, and sends them to the department supervisors for distribution to the employees. A payroll register is sent to the cash disbursements department where it is filed. Required: a) Discuss the risks for payroll fraud in the HARDA Limited payroll system. [3 Marks] b) What controls would you implement to reduce the risks? [4 Marks] --------------------------------------------------------------------------------------------------------------------- Page 5 of 8 Question 4: Week 8, 11 Marks. [Words Limit: Up to 300 words.] Marketing system provides some useful insights regarding the sales order. Different departments use this information. For instance, the production process uses this information to forecast the expected sale for next month. The production clerk uses this to create an online production schedule. From this schedule, the system automatically prepares weekly online work orders to be used by the production department. The production supervisor assesses the work orders from his terminal and prepares the necessary paper-based move tickets and materials requisitions. Then, the move tickets and two copies of the materials requisitions are distributed to each work centre. Later, work centre employees submit the two copies of the materials requisitions to the warehouse in exchange for materials and sub-assemblies. If additional new materials are needed beyond the standard quantity, the supervisor issues additional materials requisitions. Work centre employees record their work hours on paper-based job cards and send them to the accounting department. After the production is completed in a work centre, the move ticket is submitted to the accounting department. Upon the completion of a production batch, the production supervisor closes the open work order file. The warehouse manager files one copy of the materials requisition and updates the materials inventory file in the computer in her office. The manager then sends a second copy of the materials requisition to the accounting department. At the end of the day, the manager prepares a digital journal voucher and post it to the general ledger control account. The accounting clerk assesses the work orders and set up a work-in-process account for a production batch. Throughout the production period, the clerk also receives move tickets, job tickets, and materials requisitions, which he uses to post to the work-in-process account. At the end of each day, the accounting clerk prepares a digital journal voucher and post it to the general ledger control account to reflect the status of work-in-process and to record transfers of work-in-process to finished goods inventory. Required: Analyse the risks associated with the following business processes of a manufacturing company. --------------------------------------------------------------------------------------------------------------------- Page 6 of 8 Question 5: Week 10, 7 Marks. [Words Limit: Up to 350 words.] You are working in a mid-size company for the last couple of years. Recently you are promoted as a Chief Information Officer (CIO) and excited to perform your new role efficiently. David Savage, Chief Operation Officer (CEO) of your company has decided to implement an Enterprise Resource Planning (ERP) system. David Savage has met with a consulting ERP firm based on a recommendation from a friend at his club. During a recent meeting, David Savage introduced the chief consultant, who was charming, was personable, and seemed very knowledgeable. The CEO’s first instinct was to sign a contract with the consultant, but he decided to hold off until he had received your input. Required: David Savage asked you to write a memo presenting the issues and the risks associated with consultants. Further, outline a set of procedures that could be used as a guide in selecting a consultant. --------------------------------------------------------------------------------------------------------------------- Question 6: Week 11, 7 Marks. [Words Limit: Up to 350 words.] a) Lecture 10 and Interactive Tutorial 11 discusses the acronym TELOS which provides guidance for accessing project feasibility. The term stands for technical, economic, legal, operational and schedules feasibility. Discuss these feasibilities briefly. And elaborate cost-benefit analysis under economic feasibility. [4 Marks] b) Accountants should be involved in the detailed design and implementation of the system development life cycle. Comment on the statement. [3 Marks] Submission Directions: The assignment will be submitted via Blackboard. Each student will be permitted only ONE submission to Blackboard. You need to ensure that the document submitted is the correct one. Page 7 of 8 Academic Integrity Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing guidelines and support resources. Many of these resources can also be found through the Study Skills link on Blackboard. Academic Integrity breaches are a serious offence punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment. Table 1: Six categories of Academic Integrity breaches Plagiarism Reproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is