Categories
Writers Solution

Describe the various transaction cycles, financial reporting, management reporting systems and e-commerce. (ULO 2)

Assessment Details and Submission Guidelines
Trimester T3 2019
Unit Code HI5019
Unit Title Strategic Information Systems for Business and Enterprise
Assessment Type Individual assignment
Assessment Title Case Study – Giant Eggplant
Purpose of the
assessment (with ULO Mapping) Students are required to:
· Describe the various transaction cycles, financial reporting, management reporting systems and e-commerce. (ULO 2)
· Understand the risks inherent in computer-based systems/ERP, including e
commerce, the role of ethics and the various internal control processes that need to be in place. (ULO 4)
· Appreciate the opportunities for computer fraud and the security measures in electronic commerce that need to be taken to overcome this. (ULO 5)
Weight 20% of the total assessments
Total Marks 20
Word limit Not more than 2,000 words
Due Date Week 8, Friday 5:00 pm (AEDT)
Submission Guidelines · All work must be submitted on Blackboard by the due date along with a completed Assignment Cover Page.
· The assignment must be in MS Word format, no spacing, 12-pt Arial font and 2 cm margins on all four sides of your page with appropriate section headings and page numbers.
· Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Harvard referencing style.
HI5019 Strategic Information Systems for Business and Enterprise Individual Assignment
Page 2 of 5
Assignment Specifications
Background
You are recently employed as an internal auditor at Giant Eggplant, a fruit and vegetable market in Rowville, Victoria. Giant Eggplant offers a range of agricultural, dairy and bakery products from local farms and bakeries. The company currently has 25 employees. These includes sales staff, store supervisors and administrative staff. The general manager of Giant Eggplant has recently noticed a decline in sales and profit while the purchases of products for resales continued to rise and you are commissioned to evaluate the company’s processes and procedures for revenue and expenditure cycles.
Revenue Cycle
Customers push their shopping carts to the checkout counter where a sales staff processes the sales. The company has five registers but they are not dedicated to specific sales staff because they play many roles in the day-to-day operations. In addition to checking out customers, sales staffs will stock shelves and perform other tasks as demand in various areas throughout the day. This fluid work demand makes the assignment of sales staffs to specific registers impractical.
At the beginning of the shift, a store supervisor collects five cash register drawers from the finance clerk in an office at the back of the market. The drawers contain $100 cash in coins and small bills (known as float) to enable the sales staffs to make change. The supervisor signs a log indicating that he/she has taken custody of the float and places the drawers into the respective cash registers.
Sales to customers are for cash and credit card. Credit card sales are performed in the usual way. The customers tap the credit card on the EFTPOS terminal located in front of the register and enter password if required. Receipts of the purchase and of the credited card transaction are provided to the customer after the completion of the transaction.
The majority of the sales are for cash. The sales staff receives the cash from the customer, makes changes and issues a receipt for the purchases.
At the end of the shift, the supervisor returns the cash registers drawers containing the cash and credit card receipts to the finance clerk and signs a log that he has handed in the cash drawers. The finance clerk later counts the cash and credit card sales. Using a stand-alone finance department computer, the clerk records the total sales amount in the sales journals and the general ledger Sales and Cash accounts. The finance clerk then prepares a deposit slip and delivers the cash to the local branch of the bank.
Expenditure Cycle
The expenditure cycle begins in the warehouse adjacent to the market where the inventory of non-perishable goods such as canned goods are kept. The company also maintain a one-day inventory of produce and other perishable products in the warehouse so sales staffs can quick restock the shelves when necessary. At close of business each evening, the warehouse clerk reviews the market shelves for items that need to be replenished. The clerk restocks the shelves and adjusts the electronic stock records accordingly from the warehouse computer. At this time, the clerk takes note of what needs to be reordered from the suppliers and prints purchase orders from the computer. Depending upon the nature of the product and urgency of the need, the clerk either mails the purchase order to the supplier or orders by phone. Phone orders are followed up by faxing the purchase order to the supplier. When the goods arrive from the vendor, the warehouse clerk reviews the packing slip,
HI5019 Strategic Information Systems for Business and Enterprise Individual Assignment
Page 3 of 5 restocks the warehouse shelves, and updates the stock records from the computer. At the end of the day, the clerk prepares a hard-copy purchases summary from the computer and sends it to the finance clerk for posting to general ledger.
The vendor’s invoice is sent to the accounting clerk. The clerk examines it for correctness and files it in a temporary file until it is due to be paid. The clerk reviews the temporary file daily looking for invoices to be paid. Using the accounting department computer, the clerk records all cheques in the electronic cheque register. The clerk then files the invoice and mails the cheque to the supplier. At the end of the day, the accounting clerk prints a hard-copy journal voucher from the computer, which summarise the day’s cash disbursements, and sends it to the finance clerk for posting to the general ledger.
Using the finance department computer, the finance clerk posts the journal voucher and purchases summary information to the appropriate general ledger accounts.
Required
Prepare a report to the general manager to evaluate the processes, risks and internal controls for Giant Eggplant’s revenue and expenditure cycle. In your report, you need to include the following items:
· Data flow diagram of revenue cycle
· Data flow diagram of expenditure cycle
· Analysis of physical internal control weaknesses in Giant Eggplant’s systems
· Description of IT controls that should be in place in Giant Eggplant’s systems
Assignment Structure
The report should include the following components:
· Assignment cover page clearly stating your name and student number
· A table of contents
· A brief introduction of what the report is about
· Body of the report with sections to answer the above issues and with appropriate section headings
· Conclusion
· List of references
The report should be grounded on relevant literature and all references must be properly cited and included in the reference list.
Marking criteria
Marking criteria Weighting
Data flow diagram of revenue cycle 2%
Data flow diagram of expenditure cycle 2%
Analysis of physical internal control weaknesses in Giant Eggplant’s systems 6%
Description of IT controls that should be in place in Giant Eggplant’s systems 6%
Presentation 2%
Research quality 2%
TOTAL Weight 20%
HI5019 Strategic Information Systems for Business and Enterprise Individual Assignment
Page 4 of 5
Marking Rubric
Excellent Very Good Good Satisfactory Unsatisfactory
Data flow diagram of revenue cycle
/2 Present a data flow diagram that correctly depict the whole revenue cycle. Present a data flow diagram that correctly depict the whole revenue cycle with minor errors. Present a data flow diagram that depict the revenue cycle with some errors and/or omissions. Present a data flow diagram that depict the revenue cycle with errors and/or omissions throughout the diagram. Present a data flow diagram that does not properly represent the revenue cycle.
Data flow diagram of expenditure cycle
/2 Present a data flow diagram that correctly depict the whole expenditure cycle. Present a data flow diagram that correctly depict the whole expenditure cycle with minor errors. Present a data flow diagram that depict the expenditure cycle with some errors and/or omissions. Present a data flow diagram that depict the expenditure cycle with errors and/or omissions throughout the diagram. Present a data flow diagram that does not properly represent the expenditure cycle.
Analysis of physical internal control weaknesses in Giant Eggplant’s systems
/6 Present an excellent analysis of internal control weakness in Giant Eggplant’s systems. Present a very good analysis of internal control weakness in Giant Eggplant’s systems. Present a good analysis of internal control weakness in Giant Eggplant’s systems. Present a reasonable analysis of internal control weakness in Giant Eggplant’s systems. Present a weak or inadequate analysis of internal control weakness in Giant Eggplant’s systems.
Description of IT controls that should be in place in Giant Eggplant’s systems
/6 Present an excellent discussion of IT controls that should be in place in Giant Eggplant’s systems. Present a very good discussion of IT controls that should be in place in Giant Eggplant’s systems.. Present a good discussion of IT controls that should be in place in Giant Eggplant’s systems. Present a reasonable discussion of IT controls that should be in place in Giant Eggplant’s systems. Present a weak or inadequate discussion of IT controls that should be in place in Giant Eggplant’s systems.
Page 5 of 5
Presentation Report included Report included Report included Report included Report lacked
all elements and all elements and all elements and most elements some elements
/2 was very well was well was generally and was and was poorly
presented. presented. presented adequately presented.
Writing flowed Writing flowed appropriately. presented. Writing often
clearly and clearly and Writing mostly Writing did not flow
sections were sections were flowed well and sometimes did clearly leaving
linked very linked sections were not flow clearly the paper to
effectively. effectively. linked. leaving the seem somewhat
Referencing was Referencing was Referencing was paper to seem disjointed.
exemplary. of a high in accordance disjointed in Referencing was
English was used standard. with guidelines. areas. not entirely in
very effectively English was used English was used Referencing was accordance with
and was error- effectively with effectively with somewhat in relevant
free. very few errors few errors accordance with guidelines. Basic
present. present. guidelines. Basic English was used with some errors present. English was used with errors present.
Research Quality An extensive A broad range of An adequate An adequate Little or no peer
amount of high- quality peer- range of peer- range of peer- reviewed journal
/2 quality evidence reviewed journal reviewed journal reviewed journal references were
from peer- references and references was references was included and
reviewed journal other sources included and included and these were
articles and was included used to support used to a basic rarely used to
other sources and used discussion. extent to support
was included effectively to support discussion
and used effectively to support discussion. support discussion. discussion. effectively.

Categories
Writers Solution

Identify and briefly describe the Functional and non-Functional requirements for the proposed information system.

Assessment item 2 – Elaboration Phase

Value: 25%

Length: 2000 words

Submission method options: Alternative submission method

TASK

Refer to the project overview submitted in Assignment 1 and the relevant case study. In this phase, you are required to prepare a report that elaborates the project requirements in detail and illustrate those requirements using UML models. For this purpose, you should attempt the

following tasks:

1. Identify and briefly describe the Functional and non-Functional requirements for the proposed information system.

2. Identify use cases and draw use case diagram(s) for the new information system that show major use cases and actors.

3. Write one fully developed use case description for one of the important use cases identified. Select an important use case that is a key part of the system, not a basic simple one.

4. Draw the UML domain model class diagram(s) for the new information system. Be as specific and accurate as possible, given the information provided. If needed information is not provided, make realistic assumptions.

Maximum word count is 2000, excluding the diagrams.

To demonstrate academic integrity, cite all the information sources in APA 6th edition style.

RATIONALE

This assessment task will assess the following learning outcome/s:

• be able to explain and apply the concepts of object orientation methodology.

• be able to describe the relationship of analysis and design activities to the System Development Life Cycle (SDLC).

• be able to analyse system requirements to determine the use cases for the creation of a domain model of the problem domain.

• be able to create analysis and design diagrams with UML notation.

• be able to model various aspects of systems to construct quality diagrams for use in a system development project.

This assessment tasks covers the fundamental concepts of object modeling, use cases and dynamic models. The purpose of the assessment task is to strengthen the student’s skill in developing a detailed OO design using UML notation, based on a set of user requirements. 

Categories
Writers Solution

Describe the impact of adding Active Directory to an existing Windows network.

Purpose

This course-wide project introduces you to a variety of tasks and skills that are required for an entry-level security administrator who is tasked with securing systems in a Microsoft Windows environment.

The following tools and resources will be needed to complete this project:

§ Course textbook

§ Access to the Internet

Learning Objectives and Outcomes

You will be able to:

§ Describe the impact of adding Active Directory to an existing Windows network.

§ Develop procedures for changing access controls.

§ Develop procedures for ensuring a malware-free environment.

§ Recommend Group Policy Objects for a Windows environment.

§ Develop procedures for auditing security in a Windows system.

§ Develop procedures for restoring a failed Windows system.

§ Recommend Windows hardening techniques.

§ Describe security goals and write policies for securing Windows applications.

§ Ensure the integrity of all evidence collected in a Windows environment.

Overall Project Scenario

Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia.

The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection.

Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information.

Project Part 1: Active Directory Recommendations

Scenario

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 2 to 4 pages

Self-Assessment Checklist

§ I addressed all questions required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines

Categories
Writers Solution

Describe the problem from Jeff Bliss’s perspective as well as from Ms. Phung’s perspective.

In Chapter 12, Wardle (2013) summarizes the important characteristics  of a culturally relevant teacher. Use this information as a guide or  resource throughout this assignment to help inspire your thinking as you  apply your knowledge of culturally relevant pedagogy toward specific  solutions to problems facing a teacher with a very diverse student  population. This exercise provides excellent practice over the  application of culturally relevant principles in the design of effective  instructional solutions. You will need to design such instructional  solutions within the Final Project, so it is very important to practice  such skills here. Specifically, for this assignment, you will view a  brief video taken with a cell phone by a student in a high school social  studies class. Student “Jeff Bliss” Mad at Teacher at Duncanville High (Links to an external site.) (Bliss,  2013) documents a meltdown Bliss experienced during his World History  course at Duncanville High School in Duncanville, Texas.

Review the Instructor Guidance before this task. In your paper, include the following:

  • Address the items below based on your inferences and ideas after viewing the events captured in the cellphone video. (2 points)
    • Describe the problem from Jeff Bliss’s perspective as well as from Ms. Phung’s perspective.
    • Explain what probably caused it.
    • Identify who benefits and who loses.
    • Indicate your position on this issue.
    • Discuss how a more equitable, culturally relevant approach to the class could improve the situation.
    • Express how Ms. Phung might respond differently to Jeff’s concerns.
    • Describe any equity strategies you noticed or inferred being implemented in the video. (2.5 points)
    • Suggest at least one strategy for each of the following four  categories that the teacher could have utilized to help meet student  needs in a more equitable fashion: 
      • Instruction
      • Classroom Environment
      • Student Grouping
      • Student Recognition/leadership
    • Describe evidence of any culturally relevant pedagogy in action in the cellphone video. (2.5. points)
    • List at least three strategies that could be used to create a more  culturally relevant classroom. Such strategies might be drawn from the  following areas: 
      • Maximizing academic success through relevant instructional experiences
      • Addressing cultural competence through reinforcing students’ cultural integrity
      • Involving students in the construction of knowledge
      • Building on students’ interests and linguistic resources
      • Tapping home and community resources
      • Understanding students’ cultural knowledge
      • Using interactive and constructivist teaching strategies
      • Examining the curriculum from multiple perspectives
      • Promoting critical consciousness through opportunities to challenge predominant elements of the students’ social norms

If you are enrolled in the MAED Program, it is imperative that you  keep copies of all assignments completed in this course. You will return  to them for the portfolio that you will create in your final MAED  course. This portfolio is a culminating project that will demonstrate  that you have met program outcomes.

Review this week’s Instructor Guidance for additional information  about completing this assignment. Contact your instructor for  clarifications about this or any assessment in the course before the due  date using the “Ask Your Instructor” forum. Then, also using the  Grading Rubric as a guide for your performance on this assignment,  construct your assignment to meet each of the content and written  communication expectations.

Review your assignment with the Grading Rubric to be sure you have  achieved the distinguished levels of performance for each criterion and  submit the assignment for evaluation no later than Day 7

Categories
Writers Solution

Describe the differences in physical characteristics between a lotic and lentic environment.

i) Describe the differences in physical characteristics between a lotic and lentic environment. 

ii) Identify the benthic invertebrates from each aquatic community, and describe the differences found between a lotic and lentic environment.