Categories
Writers Solution

form annotated bibliography. Confuses logic and emotion. Information taken from reliable sources but without a coherent analysis or synthesis.

AS SESSMENT 1A BRIEF
Subject Code and Title MGT502 Business Communication
Assessment Part A: Annotated Bibliography
Individual/Group Individual
Length 1500 words
Learning Outcomes This assessment addresses the following Subject Learning Outcomes:
a) Apply research, academic and communication skills appropriate to the level of study and observe academic referencing requirements
b) Critically analyse texts and/or multimedia material in both a business and academic context
Weighting 30 %
Total Marks 30 marks
Context
The assessment supports students in developing their skills and knowledge in sourcing books, periodicals and other documents, as well as evaluating the relevance, accuracy, and quality of the materials. Creating an annotated bibliography calls for the application of succinct analytical and reflective skills, as well as informed online and library research. This assessment provides experience and understanding of information literacy and the analysis and synthesis of a range of resources involved in academic research and writing.
Instructions
In this assessment, you will address a contemporary organisational or business issue and apply research skills to identify, select and analyse 10 sources to form an annotated bibliography. The issue and resources used in Assessment 1A will also form the basis for Assessment 1B – Forming an Argument.
A digital communications topic will be selected by your lecturer in week 1. The selected topic will be the basis of student research for all three assessments.
Your lecturer will stipulate the topic in your Announcements on Blackboard.
When examining a topic(decided by the facilitator), consider the following:
• Locate material (books, periodicals, white papers and other documents) that may contain useful information and ideas on your issue.
• Briefly examine and review the items and select 10 that represent a variety of perspectives on the issue.
• Write an annotation of 150 words for each reference summarising the central theme and scope. The annotation should include one or more sentences that, o evaluate the authority or background of the author
o comment on the intended audience
o compare or contrast this work with another you have cited o explain how this work illuminates your bibliography topic
• Reference the book, article, or document using APA 7th style in the reference list.
o Use at least 1 in-text citation per annotation.
Be sure to review a variety of resources before selecting the 10 most suitable ones. Please include a title page, use the APA 7th referencing style, and list the materials in alphabetical order.
Students are responsible for:
• Staying within the word limit
• Keeping drafts and backups of their assignment
• Submitting the assignment via Blackboard by the due date
• Ensuring their assignment is written and submitted while observing and committing to the Academic Integrity policy
Please note that if you require an extension for this assignment, you must apply using the university application form and provide verifiable evidence of extenuating circumstances before the due date and include your most recent draft. Please also treat the prescribed word limit as a limit not to be breached.
Referencing:
It is essential that you use the appropriate APA style for citing and referencing research. Please see more information on referencing here http://library.laureate.net.au/research_skills/referencing
Submission Instructions:
A rubric will be attached to the assessment. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades.
Marking Rubric:
Your assessment will be marked against the rubric which is shown on the next pages. Please ensure that your submission addresses all three of the Assessment Attributes in the rubric.
Assessment Rubric
Assessment Attributes Fail (Unacceptable) 0-49% Pass
(Functional)
50-64% Credit
(Proficient) 65-74% Distinction
(Advanced)
75 -84% High Distinction
(Exceptional)
85-100%
Evaluation of sources and information selected for annotated bibliography
Percentage for this
criterion
40 %
Limited understanding of key concepts required to
form annotated bibliography.
Confuses logic and emotion. Information taken from reliable sources but without a coherent analysis or synthesis.
Viewpoints of experts are taken as fact with little questioning.
Resembles a recall or summary of key ideas.
Often conflates/confuses assertion of personal opinion with information substantiated by evidence from the research/course materials.
Analysis and evaluation do not reflect expert judgement, intellectual independence, rigor and adaptability.
Analyses and summarises information from the research/course materials.
Demonstrates a capacity to explain and apply relevant concepts.
Identify logical flaws.
Questions viewpoints of experts.
Discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.
Well demonstrated capacity
to explain and apply relevant concepts.
Viewpoint of experts are subject to questioning.
Systematically and critically discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.
Information is taken from sources with a high level of interpretation/evaluation to develop a comprehensive critical analysis or synthesis.
Analysis and evaluation reflect growing judgement, intellectual independence, rigor and adaptability. Identifies gaps in knowledge.
Exhibits intellectual independence, rigor, good judgement and adaptability.
Effective
Communication
Percentage for this
Difficult to understand for audience, no logical/clear structure, poor flow of ideas, argument lacks supporting evidence.
Audience cannot follow
Information, arguments and evidence are presented in a way that is not always clear and logical.
Line of reasoning is often difficult to follow.
Information, arguments and evidence are well presented, mostly clear flow of ideas and arguments.
Line of reasoning is easy to follow.
Information, arguments and evidence are very well presented; the presentation is logical, clear and well supported by evidence.
Demonstrates an
Expertly presented; the presentation is logical, persuasive, and well supported by evidence, demonstrating a clear flow of ideas and arguments.
MGT502_Assessment_1A_Brief_Annotated Bibliography_Module 3.1 Page 4 of 5
criterion
25 % the line of reasoning. understanding of the topic. Engages and sustains audience’s interest in the topic.
Correct citation of key
resources and evidence
Percentage for this
criterion
35 %
Demonstrates inconsistent use of good quality, credible and relevant resources to support and develop ideas
Demonstrates use of credible and relevant resources to support and develop ideas, but these are not always explicit or well developed.
Demonstrates use of credible resources to support and develop ideas.
Demonstrates use of good quality, credible and relevant resources to support and develop arguments and statements.
Demonstrates use of high- quality, credible and relevant resources to support and develop arguments and position statements.
Show evidence of wide scope within the organisation for sourcing evidence.
Show evidence of wide scope within and without the organisation for sourcing evidence.
MGT502_Assessment_1A_Brief_Annotated Bibliography_Module 3.1 Page 5 of 5

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. form annotated bibliography.
    Confuses logic and emotion. Information taken from reliable sources but without a coherent analysis or synthesis.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

new work is focused on aspects of logic and logical methods of thinking and problem-solving

new work is focused on aspects of logic and logical methods of thinking and problem-solving.

One important area is inductive and deductive reasoning.  We use these types of reasoning to draw conclusions or make decisions or solve problems.

Chapter 1 section 1-1 in the e-text presents information about these two types of reasoning.

After carefully studying this section respond to the below tasks in the context of Math 105:

  1. Provide an example in the context of Math 105 of a conclusion or decision you made based on inductive reasoning.  Explain why inductive reasoning was involved.  
  2. Provide an example in the context of Math 105 of when you used deductive reasoning.  Explain why this was a use of deductive reasoning.

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliverycapitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. new work is focused on aspects of logic and logical methods of thinking and problem-solving

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Input Validation and Business Logic Security Controls

Homework details: Input Validation and Business Logic Security Controls

Overview:

This homework will demonstrate your knowledge of testing security controls aligned with Input

validation and business logic. You will also use the recommended OWASP testing guide reporting format

to report your test findings.

Assignment: Total 100 points

Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions

or discussion:

1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)

 The OWASP site list multiple approaches and examples for blackbox testing reflected XSS

vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and

describe 4 different examples that could be used for testing. Be sure to conduct additional

research for each example to provide your own unique test example. This most likely means you

will need to conduct some research on Javascript to make sure your syntax is correct.

2. Testing for Stored Cross site scripting (OTG-INPVAL-002)

 The OWASP site list multiple approaches and examples for blackbox testing Stored XSS

vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2

different examples that could be used for testing. Be sure to conduct additional research for

each example to provide your own unique test example. This most likely means you will need to

conduct some research on Javascript to make sure your syntax is correct.

3. Testing for SQL Injection (OTG-INPVAL-005)

 SQL Injection remains a problem in applications yet could easily fixed. The following SQL

statement is in an HTML form as code with the $ variables directly input from the user.

SELECT * FROM Students WHERE EMPLID=’$EMPLID’ AND EMAIL=’$email’

Would a form or application that includes this code be susceptible to SQL Injection? Why?

What specific tests would you perform to determine if the applications was vulnerable?

How would you fix this problem? Be specific be providing the exact code in a Language of your choice.

(e.g. Java, PHP, Python …)

4. Test business logic data validation (OTG-BUSLOGIC-001)

 While reviewing some Java code, an analysis provided the following code snippets that contain

logic errors. For each example, describe the issue and provide code that would fix the logical

error:

a.

2

int x; x = x + 1; System.out.println(“X = ” + x);

b.

for (i=1; i<=5; i++) ; { System.out.println(“Number is ” + i); }

c.

if ( z > d) ; { System.out.println(“Z is bigger”); }

d.

String m1=”one”;

String m2=”two”;

if(m1 == m2) {

System.out.println(“M1 is equal to M2”);

}

e. The formula for the area of a trapezoid is:

A = (b1+b2)/2 * h

The following Java code is the implementation. Fix the logical error

double area;

double base1 = 2.3;

double base2 = 4.8;

double height = 12.5;

area = base1 + base2/2.0 * height;

Demonstrate your fixed code work as anticipated with a couple different test

cases.

5. Test integrity checks (OTG-BUSLOGIC-003)

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-003. In

your own words describe and provide 2 unique examples of integrity checks. For your

examples, provide specific testing methods for each case.

6. Test defenses against Circumvention of Work Flows (OTG-BUSLOGIC-006)

3

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-006. In

your own words describe and provide 2 unique examples of circumvention of work flow. For

your examples, provide specific testing methods for each case.

You should document the results for the tests and your comments, and recommendations for improved

security for each security control tested in a word or PDF document. Discuss any issues found and

possible mitigations.

Deliverables:

You should submit your document by the due date. Your document should be well-organized, include all

references used and contain minimal spelling and grammar errors.

Grading Rubric:

Attribute Meets

Reflected Cross site scripting

10 points Describes Reflected Cross Site scripting. Then, Lists and describes 4 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

Stored Cross site scripting

10 points Describes Stored Cross Site scripting. Then, Lists and describes 2 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

SQL Injection 25 points Answers: would a form or application that includes this code be susceptible to SQL Injection? Why? Answers: What specific tests would you perform to determine if the applications was vulnerable? Answers: How would you fix this problem? Provides the exact code in a Language of your choice.

Business logic data validation

15 points For each example, describes the issue and provides code that would fix the logical error.

Integrity checks 10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-003. In your own words describes and provides 2 unique examples of integrity checks. Provides specific testing methods for each case.

Defenses against workflow intervention

10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-006. In your own words describes and provides 2 unique examples of circumvention of work flow. Provides specific testing methods for each case.

Documentation and Submission

20 points Your document should be well-organized, include all references used and contain minimal spelling and grammar errors

  • GET SOLUTION FOR THIS ASSIGNMENT

    CLICK HERE TO MAKE YOUR ORDER

    TO BE RE-WRITTEN FROM THE SCRATCH

    NO PLAGIARISM

    • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
    • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
    • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
    • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
    • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
    • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Input Validation and Business Logic Security Controls
    • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

    Get Professionally Written Papers From The Writing Experts 

    Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Input Validation and Business Logic Security Controls

Homework 4

Input Validation and Business Logic Security Controls

Overview:

This homework will demonstrate your knowledge of testing security controls aligned with Input

validation and business logic. You will also use the recommended OWASP testing guide reporting format

to report your test findings.

Assignment: Total 100 points

Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions

or discussion:

1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)

 The OWASP site list multiple approaches and examples for blackbox testing reflected XSS

vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and

describe 4 different examples that could be used for testing. Be sure to conduct additional

research for each example to provide your own unique test example. This most likely means you

will need to conduct some research on Javascript to make sure your syntax is correct.

2. Testing for Stored Cross site scripting (OTG-INPVAL-002)

 The OWASP site list multiple approaches and examples for blackbox testing Stored XSS

vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2

different examples that could be used for testing. Be sure to conduct additional research for

each example to provide your own unique test example. This most likely means you will need to

conduct some research on Javascript to make sure your syntax is correct.

3. Testing for SQL Injection (OTG-INPVAL-005)

 SQL Injection remains a problem in applications yet could easily fixed. The following SQL

statement is in an HTML form as code with the $ variables directly input from the user.

SELECT * FROM Students WHERE EMPLID=’$EMPLID’ AND EMAIL=’$email’

Would a form or application that includes this code be susceptible to SQL Injection? Why?

What specific tests would you perform to determine if the applications was vulnerable?

How would you fix this problem? Be specific be providing the exact code in a Language of your choice.

(e.g. Java, PHP, Python …)

4. Test business logic data validation (OTG-BUSLOGIC-001)

 While reviewing some Java code, an analysis provided the following code snippets that contain

logic errors. For each example, describe the issue and provide code that would fix the logical

error:

a.

2

int x; x = x + 1; System.out.println(“X = ” + x);

b.

for (i=1; i<=5; i++) ; { System.out.println(“Number is ” + i); }

c.

if ( z > d) ; { System.out.println(“Z is bigger”); }

d.

String m1=”one”;

String m2=”two”;

if(m1 == m2) {

System.out.println(“M1 is equal to M2”);

}

e. The formula for the area of a trapezoid is:

A = (b1+b2)/2 * h

The following Java code is the implementation. Fix the logical error

double area;

double base1 = 2.3;

double base2 = 4.8;

double height = 12.5;

area = base1 + base2/2.0 * height;

Demonstrate your fixed code work as anticipated with a couple different test

cases.

5. Test integrity checks (OTG-BUSLOGIC-003)

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-003. In

your own words describe and provide 2 unique examples of integrity checks. For your

examples, provide specific testing methods for each case.

6. Test defenses against Circumvention of Work Flows (OTG-BUSLOGIC-006)

3

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-006. In

your own words describe and provide 2 unique examples of circumvention of work flow. For

your examples, provide specific testing methods for each case.

You should document the results for the tests and your comments, and recommendations for improved

security for each security control tested in a word or PDF document. Discuss any issues found and

possible mitigations.

Deliverables:

You should submit your document by the due date. Your document should be well-organized, include all

references used and contain minimal spelling and grammar errors.

Grading Rubric:

Attribute Meets

Reflected Cross site scripting

10 points Describes Reflected Cross Site scripting. Then, Lists and describes 4 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

Stored Cross site scripting

10 points Describes Stored Cross Site scripting. Then, Lists and describes 2 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

SQL Injection 25 points Answers: would a form or application that includes this code be susceptible to SQL Injection? Why? Answers: What specific tests would you perform to determine if the applications was vulnerable? Answers: How would you fix this problem? Provides the exact code in a Language of your choice.

Business logic data validation

15 points For each example, describes the issue and provides code that would fix the logical error.

Integrity checks 10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-003. In your own words describes and provides 2 unique examples of integrity checks. Provides specific testing methods for each case.

Defenses against workflow intervention

10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-006. In your own words describes and provides 2 unique examples of circumvention of work flow. Provides specific testing methods for each case.

Documentation and Submission

20 points Your document should be well-organized, include all references used and contain minimal spelling and grammar errors

  • GET SOLUTION FOR THIS ASSIGNMENT

    CLICK HERE TO MAKE YOUR ORDER

    TO BE RE-WRITTEN FROM THE SCRATCH

    NO PLAGIARISM

    • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
    • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
    • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
    • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
    • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
    • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Input Validation and Business Logic Security Controls
    • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

    Get Professionally Written Papers From The Writing Experts 

    Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Programmable Logic Controllers.

You will prepare and submit a term paper on Programmable Logic Controllers. Your paper should be a minimum of 3000 words in length. The major advantage of a modular PLC is that modules can be added as per the requirement of a particular machine. Modular PLCs are commonly arranged on a rack or railing that allows the easy arrangement of modules. Siemens Step S& PLCs are modular PLCs. Systems can be expanded according to the need.

Rack Mounting PLCs are similar to the modular PLCs. however, rack mounting PLC is standardized as the particular cards that have a slot in a cabinet. Rack mounting PLCs can be expanded according to the requirement.

Typically, PLCs are designed to work with an external 24-volt power supply. However, the input voltages for operation and input relays may range from 10-30 volts DC for input relays (Commonly 12 volt and 24 volts) and 110 to 250 volts AC. Special types of PLCs may have different voltage ranges but mostly PLCs come in the above-mentioned voltage ranges.

Selector Switches and Pushbuttons open or close a circuit that power input relays or transistors of a PLC. The PLC is programmed to accepts the command and proceed with an operation as desired. Selector switches and push buttons are manually pressed by the operator to execute a PLC operation (Ab.rockwellautomation.com, 2015).

Limit switches work on a similar principle as that of the selector switches and push buttons, but limit switches are pressed by the “machine (in a process)” or “arm of a machine”. Limit switches stop or start a process. Like opening and closing of a machine door. A motor opens or closes the door until a limit. As the limit is approached, limit switches either open or close the circuit and send PLC command either to stop the motor or run the motor. Limit switched are either normally close (NC) or normally open (NO). NC terminals complete circuit when the limit switch is in normal position and opens the circuit path when&nbsp.pressed. NO terminals complete the circuit when the switch is pressed.&nbsp.Some sensors are fitted with the actuators to enable the total functionality of the actuator. &nbsp.


Assignment status
Solved by our Writing Team at 
CapitalEssayWriting.comCLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

Categories
Writers Solution

Understand the logic and assumptions of accounting procedures

Assessment Task – Tutorial Questions Assignment 2
Unit Code: HA1020
Unit Name: Accounting Principles and Practices
Assignment: Tutorial Questions Assignment 2
Weighting: 25%
Total Assignment Marks: 50 Marks
Purpose:
This assignment is designed to assess your level of knowledge of the key topics covered in this unit
Unit Learning Outcomes Assessed:
1. Understand the logic and assumptions of accounting procedures;
2. Record business transactions in the journals and ledgers that make up a business accounting system;
3. Prepare financial statements; and
4. Analyse and interpret financial statements.
Description: Each week students were provided with three tutorial questions of varying degrees of difficulty. These tutorial questions are available in the Tutorial Folder for each week on Blackboard. The Interactive Tutorials are designed to assist students with the process, skills and knowledge to answer the provided tutorial questions. Your task is to answer a selection of tutorial questions for weeks 6 to 10 inclusive and submit these answers in a single document.
The questions to be answered are;
Week 6 – Question 1 (10 marks)
(Note this question is 2 in the Pre-recorded Tutorial Questions)
Peakhurst Limited had the following trial balance at 1 January 2016:
Debit $ Credit $
Cash 200 000
Accounts receivable 600 000
Inventory 700 000
Prepaid insurance 60 000
Prepaid rent 50 000
Equipment 1 000 000
Allowance for doubtful debt 20 000
Accumulated depreciation 200 000
Accounts payable 500 000
Revenue received in advance 100 000
Income tax payable 500 000
Loan 570 000
Share capital 400 000
Retained profits 320 000
2 610 000 2 610 000
You are given the following additional information for the year ended 31 December 2016:
a) Bad debts of $8000 were written off.
b) It was decided that allowance for doubtful debts should be 4 per cent of accounts receivable.
Required:
1) Prepare journal entries for these transactions. (4 marks)
2) Show the T-ledger accounts for the following for the year ended 31 December 2016:
a) accounts receivable (2 marks)
b) allowance for doubtful debts (2 marks)
c) bad debts expense (2 marks)
Week 7 – Question 2 (10 marks)
(Note this question is 2 in the Pre-recorded Tutorial Questions)
a) Compare the periodic versus the perpetual system as a control device. (4 marks)
b) What sort of organisations are likely to use the periodic inventory system? What kind of organisations will prefer to use perpetual inventory system? (3 marks)
c) If management overstated the valuation of inventory, would it affect profit for the year? (3 marks)
Week 8 – Question 3 (10 marks)
(Note this question is 3 in the Pre-recorded Tutorial Questions)
Perform a bank reconciliation.
a) Reconcile Jack Steel’s month end cash balance as of 31 Jul 2019 (8 marks)
b) Based on your analysis, propose adjusting entries (if any). (2 marks)
Transactions and balances:
• 31 Jul 2019 Bank Statement balance $ 58,791
• 31 Jul 2019 balance per Jack’s records $ 57,371
• Jack received a payment that he has not deposited $ 250
• Jack issued a cheque payable to Pandora’s Jewels to pay for a belated Mother’s Day gift to his grandmother that has not been presented to the bank $ 1,612
• Bank charges for the month of July were $40
• Interest on bank balance credited to Jack’s account $ 98
Week 9 – Question 4 (10 marks)
(Note this question is 3 in the Pre-recorded Tutorial Questions)
Murrays Ltd. purchased a new bus for $200,000. The company expects the bus to be used for trips between Sydney and Canberra for 10 years, or 800,000 miles, with an estimated residual value of $30,000 at the end of that time. During the 3rd year the bus was driven 96,000 miles. Calculate the depreciation expense for the 3rd year for each of the methods below. Show your solutions.
I. Straight-line (3 marks)
II. Diminishing balance at 20% p.a. (3.5 marks)
III. Units-of-activity (3.5 marks)
Week 10 – Question 5 (10 marks)
(Note this question is 3 in the Pre-recorded Tutorial Questions)
Banksia Company completed the following transactions during 2018-2019. The annual accounting period ends 30 June 2019.
a) Purchased inventory on credit at cost of AUD 16,800; perpetual inventory system is used.
b) Received a customer deposit of AUD 18,000 from ABC Ltd for services to be rendered in the future.
c) Borrowed AUD 900,000 from the bank on 1 March 2019 by giving the bank a six-month, 9% interest bearing note payable.
d) Performed AUD 8,000 of the services paid for by ABC Ltd; the rest will be rendered in August 2019.
e) Received the electricity bill for AUD 24,200, which will be paid in early July.
f) On 1 June 2019 received rent in advance of AUD 21,600 from XYZ Ltd for a 3 month lease of premises from 1 June until 31 August 2019.
g) Wages accrued in the last weekly payroll amounted to AUD 23,000 and will be paid on 5 July 2019.
Required:
1) Prepare the journal entries for each of these transactions. (7 marks)
2) Prepare all adjusting entries required on 30 June 2019. (3 marks)
Submission Directions:
The assignment has to be submitted via Blackboard. Each student will be permitted one submission to Blackboard only. Each student needs to ensure that the document submitted is the correct one. Academic Integrity
Academic honesty is highly valued at Holmes Institute. Students must always submit work that represents their original words or ideas. If any words or ideas used in a class posting or assignment submission do not represent the student’s original words or ideas, the student must cite all relevant sources and make clear the extent to which such sources were used. Written assignments that include material similar to course reading materials or other sources should include a citation including source, author, and page number.
In addition, written assignments that are similar or identical to those of another student in the class is also a violation of the Holmes Institute’s Academic Conduct and Integrity Policy. The consequence for a violation of this policy can incur a range of penalties varying from a 50% penalty through to suspension of enrolment. The penalty would be dependent on the extent of academic misconduct and the student’s history of academic misconduct issues. All assessments will be automatically submitted to Safe-Assign to assess their originality.
Further Information:
For further information and additional learning resources, students should refer to their Discussion Board for the unit.

Assignment statusSolved by our Writing Team at EssayCabinet.com
CLICK HERE TO ORDER THIS PAPER AT EssayCabinet.com

  1. GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS
  2. NO PLAGIARISM