Final Examination: The University of The South Pacific
Final Examination: The University of The South Pacific
(Semester 1 / 2010)
(Laucala Campus)
FINAL EXAMINATION
(Time allowed: 3 hours + 10 min extra reading time)
(Weighting: 50% towards Coursework)
(Minimum 40% in Final Exam)
5. A new technology that is used to authenticate users is one that plugs into
the USB port and eliminates the need for a card reader. This item is called
a:
A. Biometric reader
B. Smart card
C. USB smart key
D. Security token
2
6. The reason that detailed data must be collected and stored is:
1. The data must be stored for future transactions or followup.
2. The data must be incorporated into the accounting system so that
regular financial statements can be prepared.
3. Management needs to examine and analyze data from transactions
to operate the organization.
A. Only 1.
B. Only 1 and 2.
C. Only 1, 2, and 3.
D. Include 1, 2, and 3 amoung other reasons.
8. The internal control activity related to the adequate records and documents,
related to sales, includes which of the following?
3
10. A computer software technique in which the computer software matches an
invoice to its related purchase order and receiving report is called a(n):
11. An electronic payroll time keeping device that collects time and attendance
data when employees enter their time sheets is called:
A. Timekeeper
B. Paymaster
C. Electronic time clock
D. Badge readers
13. E-business:
A. 1 only.
B. 2 and 3 only.
C. 2, 3, and 4 only.
D. 1, 2, 3, and 4.
4
15. An example of a domain name is:
A. jhs-email.com.
B. cjb@jhs-email.com.
C. http://www.cjb.org.
D. All of the above, A, B, and C, are examples of domain names.
17. With the advent of technology, the Internet, and the WWW:
19. Fraudsters typically try to justify their behavior by telling themselves that
they intend to repay the amount stolen or that they believe the
organization owes them the amount stolen. This justification is referred to
as:
A. Opportunity.
B. Rationalization.
C. Incentive.
D. Concealment.
5
20. The theft of proprietary company information is called:
A. Vendor fraud.
B. Customer fraud.
C. Espionage.
D. Management fraud.
21. The study of the current system to determine the strengths and
weaknesses and the user needs of that system is called:
A. Systems Analysis
B. Systems Design
C. Systems Planning
D. Systems Implementation
22. A system conversion method in which the system is operated in only one or
a few sub-units of the organization.
6
_______________________________________________________________
Question 2 Theory Questions (35 marks)
1. The ‘Total Service Station’ is a petrol station and convenience store
(Bonjour) similar to any BP or Mobil service and convenience stores. Total
Service Station is a regional chain of service station and convenience marts
located in Fiji with many locations.
2. Why do you think there have been so many business failures among “dot-
com” companies that were devoted only to retail e-commerce such as
buying and selling on the Internet? [5 marks]
5. Describe the 3 components of the fraud triangle and how each would relate
to defraud businesses. [5 marks]
7. The following are the selected MYOB screens. Identify the action used in
these MYOB accounting screens and explain the procedure as to how you
will enter the required information on these screens. [5 marks]
7
Screen 1
Screen 2
Screen 3
Screen 4
Screen 5
8
_______________________________________________________________
Question 3 Mini Case Questions (40 marks)
Part A (10 marks)
Upon receipt of student cheques, the finance cashier issues a current semester
medical decal and a receipt of payment received. These items are mailed to each
student at the address noted on the cheque. A daily listing of cheque received is
prepared and filed by date. A photocopy of the cheque is made and placed in a
file organized by the student’s last name. Accordingly, each student has a
medical file maintained in the medical centre. These cheques are endorsed and
deposited in the bank on a daily basis. Once each month, the finance manager
reconciles the bank statement.
Required:
Required:
9
Part C (10 marks)
Balancing books Ltd. runs 4 private colleges which provide education and
training for people in the bookkeeping industry. Its 2-year course includes training
in debits and credits and accounting information systems. The tangible fixed
assets of each college are recorded in an asset register which is maintained at
each college location by each college manager. The system operates as
described below:
2. The requisition is sent to head office, where the purchasing officer checks
the requisition for approval and completes a purchase order for the new
asset.
3. Assets costing more than $5000 are approved by the financial accountant.
All assets over $20000 require board approval.
4. The purchase order is then sent to the supplier and a copy is sent to the
central store at the head office location.
5. The asset is received by the central store where the receiving clerk checks
that all the asset details agree with those on the receiving report and the
copy of the purchase order. The receiving clerk then issues the asset with
its computer-generated sequential barcode number. This barcode is fixed
to the asset and written on the receiving report and the supplier invoice.
6. The relevant college manager inputs the new asset details into the asset
register using a copy of the purchase order, the original requisition and the
asset’s barcode.
Required:
From the case above, identify 5 internal control strengths in accounting systems.
[10 marks]
10
Part D (10 marks)
Required:
Consider the duties you would assign to each of the 3 employees (supervisor’s
name ‘Michael’; employee 1’s name ‘Mitchell’; and employee 2’s name ‘Kristine’).
No employee should have more than 3 tasks and there should be a proper
separation of duties to achieve appropriate internal control. List the 3 people, the
duties you assigned to each, and a description of why those assignments should
achieve proper separation of duties.
[10 marks]
THE END
11