FNSACC416 Background Knowledge and Reflections | My Assignment Tutor

Assessment Coversheet Unit/s AssessedFNSACC416 Set up and operate a computerised accounting systemAssessment NameFNSACC416 Background Knowledge and Reflections Type of Assessment This summative assessment will enable your assessor to make a judgement of competency based on the submission of your completed assessments against the requirements of the unit/s of competency in this module. Benchmark The Assessment Benchmark developed for each unit of competency is the evidence criteria used to judge the quality of performance (i.e. the assessment decision-making rules). Assessors use these benchmarks to make judgements on whether competency has been achieved and to determine if you have performed to the standard expected to meet the unit requirements. Reasonable Adjustment Where appropriate Monarch Institute will allow flexibility in the way in which each unit is assessed based on the needs of an individual. Assessment Coding Assessment of this course is based on competency-based principles. S = Satisfactory NS = Not Satisfactory If you fail to perform satisfactorily for the assessment in the prescribed way you may be assessed as ‘Not Satisfactory’. You are required to be assessed as ‘Satisfactory’ in all assessments for each unit of competency. Re-assessment Your assessment can be submitted after you have reviewed the learning materials and practiced enough to feel confident in your resubmission. You have two weeks from your last submission feedback to resubmit. You are re-assessed in only the areas where your assessor has indicated you were initially assessed as NS. It is at the assessor’s discretion to re-assess the entire assessment should an overall understanding not be demonstrated.  When you are re-assessed as ‘satisfactory’ after re-submission you will achieve competency for this assessment. Declaration of Understanding and Authenticity I acknowledge the assessment process has been explained and agree that I am ready to undertake assessment. I am aware of where to find the assessor’s feedback for the assessment. I am aware of the appeals process, should the need arise. I also understand I must be assessed as ‘satisfactory’ in all parts of the assessment/s to gain an overall competent result for the unit/s of competency. If I am found to be NS after a second attempt, it is at the assessor ‘s discretion whether I may be permitted one final attempt. I am aware that a ‘not competent’ final outcome means I may incur fees for re-enrolment in the unit/s. I certify that the attached material is my original work. No other person’s work has been used without due acknowledgement. I understand that the work submitted may be reproduced and/or communicated for the purpose of detecting plagiarism. I understand a person found responsible for academic misconduct will be subject to disciplinary action (refer to Student Information Guide). * I understand that by typing my name or inserting a digital signature into this box that I agree and am bound by the above student declaration. Student Name*:Date: Submission instructions: Complete the Declaration of Understanding and Authenticity (above).The text boxes provided for answering questions will automatically expand as you type.Once you have completed all parts of the assessment login to the Monarch Learning Management System (LMS) to submit your assessment.In the LMS, click on the link to ‘Submit [assessment name]’ in your course and upload your assessment files. Click save and then click submit assignmentPlease be sure to click ‘continue’ after clicking ‘submit assignment’. Activity 1 Computerised accounting systems: general knowledge Name six (6) key features of desktop and cloud-based computerised accounting systems (like Xero or MYOB). THINK: things that are easier, faster or automated with accounting software. 1.2.3.4.5.6. Describe one (1) of the advantages of cloud-based software and systems, over desktop-only systems. Activity 2 Privacy and data security Background information The Privacy Act 1988 is one of the main pieces of legislation governing the use of computerised accounting systems. If you don’t already have a copy, download one here: https://www.legislation.gov.au/Details/C2018C00292/Download List and briefly describe each of the 13 Australian Privacy Principles. NAME OF PRINCIPLEDESCRIPTION12345678910111213 Describe how Your Name Pty Ltd / Yabby Books Pty Ltd would meet each of these principles. In particular, relate this to computerised accounting systems. 12345678910111213 Part 3C of the Act refers to the Notifiable Data Breaches scheme. Provide a summary of the scheme, and explain how the scheme would affect your work as a bookkeeper? Minimum of 1 paragraph each. Scheme Summary: Affect on your work: Activity 3 Your business: reflecting on your approach Which accounting policies and procedures must be taken into consideration when setting up a new Xero / MYOB file. For e.g., Chart of Accounts. (detailed in your Xero / MYOB assignment) Minimum 5 responses. 1.2.3.4.5. Which accounting policies and procedures would be referred to in the day-to-day use of Xero / MYOB. For e.g., Purchases (detailed in your Xero / MYOB assignment). Minimum 5 responses. 1.2.3.4.5. When entering the purchase invoices into Xero / MYOB, what were the main pieces of information on those invoices that you entered? Minimum 5 responses. 1.2.3.4.5. When entering the purchase invoices into Xero / MYOB, was there any information on those invoices that you did not need to enter? Please state below: While working on your Xero / MYOB assignment, describe the steps that you took to keep your information secure, for eg passwords, anti-virus software, storage. Minimum 2 paragraphs (the text box will expand as you type). Which Australian Privacy Principle does this refer to? Activity 4 Establishing an information security and storage system: workplace scenario We wish to introduce an information security policy for Your Name Pty Ltd / Yabby Books Pty Ltd. What do the Australian Privacy Principles require the business to do in relation to information security. Minimum one paragraph. Requirement: Which particular principle does this refer to? APP: How does Xero / MYOB assist in keeping information secure, for e.g. user id and password. Minimum 2 paragraphs (the text box will expand as you type) Name 3 other steps Your Name Pty Ltd / Yabby Books Pty Ltd would use to keep information secure, for e.g. password, antivirus software, storage. 1.2.3. Write an information security policy for Your Name Pty Ltd / Yabby Books Pty Ltd, in line with the other policies in your Xero / MYOB assignment. Minimum 3 paragraphs For each of the 3 steps in c), write a procedure (step by step guide) for Your Name Pty Ltd / Yabby Books Pty Ltd on how to carry that step out. Activity 5 Video role play question This is a video role play question. You (the owner of Your Name Pty Ltd / Yabby Books Pty Ltd ) are having a meeting with Mary (the office manager), to explain to her the new information security policy and 3 procedures, detailed in your answers to Q4. Instructions: The other participant, playing the role of Mary, must be able to be heard in your video submission. The roleplay must be recorded, and this can include using a smart phone. The video recording is submitted together with the assignment. You will be assessed on: Student explains legislative requirements for storing information securelyStudent explains the new policy and proceduresStudent answers a question from the other participantStudent demonstrates active listeningStudent is visible and all participants are audible throughout the video. Instructions You will need a partner for this exercise, to read/play Mary’s part. Give them the role play script (see below) titled ‘Information security and storage system’. Record your meeting with Mary. Upload the meeting video when you upload this assignment document. Please name your roleplay file with your surname followed by mod 3.1 For example, Smith Mod3.1 General instructions: Students must perform with at least 1 other person. Using just 1 other person to play multiple roles is completely OK. Alternatively, you can use as many other persons as there are roles. The other person(s) can play multiple roles except for the role required to be played by the student. There is no requirement for the other person(s) to be visible in the video, so if your partner(s) would prefer not to be visible, that’s OK. The student must be visible throughout the video. All persons must be audible throughout the recording. Using a camera phone is often a quick and easy way to record the video. For the role play, we suggest the following: Have a quiet, private space where you can effectively record the video. This could be your spare room at home, an office at your workplace, or even a study room at your local library. Be appropriately dressed. When you’re conducting the role play, don’t forget about: Using appropriate body language and gestures, including eye contact Speaking professionally, and at the appropriate pace Using plain English Listening without interrupting Respond appropriately to what is said. Role Play Script – Information security and storage system Instructions: The parts are indicated with names in brackets, like this: [YOU] [MARY]When something is written in bold, it’s just a guide – not a line you have to read word-for-word. There’s often no script for what the director/owner says; just guidelines. That’s part of the challenge! Don’t read these lines out. Instead, answer in a way that fulfils the guidelines. For example, if the guideline for you were: [YOU]: Name and describe a fruit. Say something good and something bad about the fruit. …you might say “Apples. They’re red, juicy, and crunchy. They’re high in fibre, but you can’t eat the core.” Normal speech is written as follows. Read these parts out.[MARY]: Let’s get this meeting started. Instructions for actions or body language are written in italics as follows. Don’t read these parts out.[FRED]: Look angry and raise your hand. – – – – – – – Script: [YOU]: Greet Mary. Advise her that you would like to bring her up to speed on the new information security policy and procedures. [MARY]: “No problem. But why do we need a new policy though, we have so many already!” [YOU]: Explain what the law requires the business to do about information security (refer to Q4a) [MARY]: “That makes sense, but don’t we cover a lot of that already?” [YOU]: Acknowledge Mary’s comment. Explain the purpose of putting an official policy and procedures in place. [MARY]: “I’ve got it. So, what are the new policy and procedures?” [YOU]: Explain the new policy and procedures to Mary (refer to Q4d & e). [MARY]: Listen to the new procedures. Choose a procedure that sounds a little complex to you and ask a question about it. [YOU]: Answer Mary’s question. [MARY]: “OK, I think I’ve got it. I’ll make a plan for working these new procedures in to my schedule.” [YOU]: Thank Mary and close the meeting. – – – – – – –

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published. Required fields are marked *