Premium Essay

Week 3 Lab Assignment

In: Other Topics

Submitted By jsmall
Words 3080
Pages 13
GENERAL LEDGER APPLICATIONS USING PEACHTREE COMPLETE ACCOUNTING 2010 ®: The Winery At Chateau Americana
LEARNING OBJECTIVES
After completing and discussing this assignment, you should be able to:
• Recognize the managerial and technological issues associated with the implementation of a general ledger package
• Complete sample transactions
• Understand the implications of the design of the user interface
• Recognize and evaluate the strengths and weaknesses of controls embedded in a general ledger package
• Compare and contrast a general ledger package with a manual accounting information system
BACKGROUND
As the winery has grown, Rob Breeden, the chief financial officer, has realized that management does not have timely information about the financial condition of the company. This has resulted in several instances in which the decisions made were not optimal. Therefore, he has determined that it is time to convert the current system to a general ledger package. After investigating the possibilities, he has decided to utilize Peachtree Complete Accounting 2010®. Chateau Americana has hired you to convert the system.
REQUIREMENTS
Using the Peachtree Complete Accounting 2010® software program contained in your CAST package or in your school computer lab, you are to convert Chateau Americana from a manual system to a general ledger software package. If you are working on this assignment on your home computer, load the software following the instructions contained on the CD envelope.
As with any other computer file, it is important to back up frequently to another storage medium.
SETTING UP A NEW COMPANY
Requirements
1. Start Peachtree Complete Accounting 2010® and click on Create a new company.
Figure 1

2. The Introduction screen that appears next alerts the user to information that will be required throughout the set-up procedure. Click on Next.…...

Similar Documents

Premium Essay

Week 3 Assignment

...Week 3 Assignment 1.1 Karen Gassler Professor Evans ENG115 April 26, 2013 In the story, “On Becoming a Writer” by Russell Baker, he shows a great example of chasing after a dream. At such a young age in his life when people claim you have no clue where or what you want to do with your life, he was able to figure it all out. Mr. Baker was able to show that anything in life is possible as long as you stick to it and give it your all. Russell was not someone who enjoyed English. In fact, he hated and dreaded taking English in his high school years; he recalls it as “dull and baffling.” (p 66). When he entered his third year in high school, he would have never guessed that at some point in that year, he would finally realize what he wanted to do with his life. Not only did he figure out what he wanted to do with his life, but he also found out it would be in something that he once in his life hated! “He constantly sprinkled his sentences with “don’t you see.” It wasn’t a question but an exclamation of mild surprise at our ignorance.” (p 67). Russell Baker can recall how everyone would simply made fun of Mr. Fleagle for making such a misunderstood statement. I found this to be one of the most important parts of his story. He makes it clear that even the tiniest statements that someone makes to you can mean so much more when you really understand it. No one ever understood what Mr. Fleagle was trying to make by saying this statement all the time until Russell was graded......

Words: 646 - Pages: 3

Free Essay

Mgmt520 Week 3 Assignment

...1. What is the most “jealously” protected kind of speech, according to the court in this case? According to the notes on the case, “the most jealously protected [kind of] speech is that which advances the free, uninhibited flow of ideas and opinions on matters of public interest and concern” (236 A.D.2d 186, 1997).  In other words, the freedom of speech is the most protected form of speech, however, cases and claims that focus on people who are not considered to be “public figures”, is less strictly protected. 2. What court decided the case in the assignment? The Supreme Court of New York, Appellate Division, Third Department. 3. Briefly – state the facts of this case, using the information found in the case in LexisNexis. A radio station broadcast an “ugly bride” competition in which debasing title was made to the bride’s wedding picture which happened to be in their local newspaper. The radio station’s listeners were encouraged to send in their own insulting remarks, and the bride was identified by name and by her employer, who happened to be the owner of one of the competing radio stations. The bride then filed litigation against the radio station (236 A.D.2d 186, 1997). 4. According to the case, why was this not defamation, and what tort did the court approve a filing for? A statement is only considered defamatory if it happens to expose the plaintiff to public hatred, contempt, ridicule or disgrace; in other words, if it would be considered......

Words: 912 - Pages: 4

Free Essay

Week 3 Assignment

...What is the most “jealously” protected kind of speech, according to the court in this case? (3 points) Free Speech What court decided the case in the assignment? (2 points) Supreme Court Briefly – state the facts of this case, using the information found in the case in LexisNexis. (5 points) The radio station decided to have a contest using newspaper wedding photos to decide who was the ugliest bride. Listener were encouraged to call in and make additional comments on how ugly the bride was. The brides full name was given which differed from prior contests. The brides coworkers were listener to the station. The bride sue the radio station claiming the station intentional Infliction of emotional distress and defamation. According to the case, why was this not defamation, and what tort did the court approve a filing for? (5 points) It was decided that the broadcaster was simply express their opinion. The court approved the basis of intentional infliction of emotional distress. In the decision, why does the court state further proceedings will be required? (5 points) The decision of the court was the plaintiff can move forward with case regarding intentional infliction of emotional distress. Do you agree with this decision? Why or why not? (5 points) Yes I agree with the court decision. Stating someone is ugly subjective and is protected by the first amendment. However, comments by the station were design to embarrass the plaintiff...

Words: 523 - Pages: 3

Premium Essay

Week 3 Assignment

...Week 3 Assignment John Smith INF 336 Professor Smith July 14, 2014 Week 3 Assignment The differences between needs identification and defining commercial equivalents are that needs identification is initial phase of a program/project when the customer comes to an organization with a need and the types of needs are identified for the project and analyzed. Once the needs are identified, these needs are then converted into commercial equivalents. That helps the potential suppliers know why it is needed and what is needed. It is preferable to separate into two stages because every organization really needs to identify why and what is needed. Nothing can be failed to spot during any of these actions. When an early supplier involvement (ESI) is implemented effectively, the value to the organization is improved tremendously. As stated in the textbook, “Early supply involvement and early supplier involvement (ESI) help assure that what is specified is also procurable and represents good value. Various organizational approaches, such as staffing the supply area with engineers, co-locating supply people in the engineering or design areas, and using cross-functional teams on new product development or product or service reviews, have been used to address effective early supply involvement.” (Johnson, Leenders, & Flynn, 2010) One of the advantages of specifying by performance is that it has the supplier with the decision making on how to “provide the most suitable......

Words: 441 - Pages: 2

Free Essay

Netw310 Week 3 Lab

...NETW310 Week 3 Lab Report To complete your Week 3 lab report, discuss the questions below concerning the installation of structured cabling. Create your report using the template starting on page 2 and submit it to the Week 3 Dropbox by the due date. Lab #3, Installation of Structured Cabling Lab Report Each answer is worth 2.8 points. Use a red colored font for you answers. Place the answers below the questions 1. How often are network standards reviewed? Every 5 years 2. What category of UTP cabling is the minimum for a telephone cable? Cat 3 cable 3. What category of cabling should be installed as a best practice for a telephone cable? Cat 6 cable 4. What is the problem with leaving abandoned cable in place in a building? The problem with leaving cable is it is deemed a fire hazard. 5. Why must the twisting in the individual wires be maintained in a UTP cable? Twisting wire need to be maintained because incase cable become untwisted it no longer provide protection from crosstalk and other interference. 6. How many wires does a gigabit cable use? 8 wires 7. Is the labeling standard commonly used or not used? It is commonly used about half of time in the industry. 8. Grounding should be attached to what in the building? It should be attached from the replay rack to telecomm bus bar. 9. Horizontal cabling connects what areas to each other? It connects the equipment rooms to the work areas. 10.......

Words: 531 - Pages: 3

Free Essay

Is4670 Week 3 Lab

...Week 3 Laboratory Week 3 Lab Part 1: Automate Digital Evidence Discovery Using Paraben’s P2 Commander Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Open an existing case file using P2 Commander * Analyze the data in the image and the files saved in the case * Sort and identify evidence file types in a case using Paraben's P2 Commander forensic tool * Use P2 Commander to identify information for potential evidence contained in chat logs such as Skype chat * Analyze the contents of user profiles and data using the P2 Commander browser Week 3 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab available in the Practice section of Learning Space Unit 5 and then answer the questions below. The video will demonstrate the use of Paraben's P2 Commander and outline the different forensics capabilities of the tool. Lab Assessment Questions & Answers 1. When talking about Information Security, what does the 'CIA' stands for? CIA in information security stands for confidentiality, integrity and availability. 2. When would it be a good practice to classify data? It would be a good practice to classify data when you need to extract files from a hard drive or system for investigating in order to accurately organize the findings. 3. What is Security classification? Security classification is the security level assigned to a government document,......

Words: 635 - Pages: 3

Premium Essay

Week 7 Assignment 3

...Week 7 Assignment 3 - LEG 500 August 15, 2014 PharmaCARE Company is one of the leading world pharmaceutical companies, that enjoys an honest name of a caring and well-run company and that act ethically toward its stakeholders. It provides with the high-quality products and saves people’s lives increasing its quality. However, the case with the African nation of Colberia, where the PharmaCARE holds its big manufacturing object, raise community fears as for the unethical attitude toward the indigenous population of this land. The following paper will illustrate the main unethical considerations of the Company, will describe the key characteristics of its stakeholders, and will illustrate the human rights issues presented by PharmaCARE's treatment. The paper will also suggest the changes that PharmaCARE can perform to be more ethical. The key characteristics of the stakeholders within the PharmaCARE PharmaCARE follows the open-door policy and culture among its employees. It stands for the employment equity and promotes the development and progress of its people. The company conducts workshops and training sessions to create its employees’ awareness of and ensures with the training of new processes and new technology that it establishes. It often presents health care staff with the challenging issues to ensure the staff to be aware of new medication nutritional care, some potential side effects......

Words: 2024 - Pages: 9

Free Essay

Lab Assignment 3

...Week 3 - Lab 3: Exploring Busses (computer and paper) Requirements 1. Label each type of port in the picture below: P/S 2 Ethernet Parallel Port HDMI Port IEEE Mouse Port Port 1394a Port P/S 2 Keyboard USB Ports Serial Port VGA Port Speakers Line In Microphone Port 2. Locate and print a picture of a: a. Secure Digital (SD) card or card reader b. Compact Flash (CF) card or card reader c. Micro Drive or reader d. Memory Stick or reader 3. Be sure to label each picture, and a flash drive is not the same as any of these devices. A. Secure Digital (SD) card B. Compact Flash (CF) card C. Micro Drive D. Memory Stick http://www.google.com/search?q=secure+digital+card&biw=1301&bih=641&source=lnms&tbm=isch&sa=X&ei=jXs1VJrDKsWeyATV6oLwAQ&sqi=2&ved=0CAcQ_AUoAg#facr...

Words: 286 - Pages: 2

Free Essay

Nt1310 Week 3 Lab

...parks NT1310 Week 3 Lab: Building a New Structure-Codes NFPA 10 NFPA 10 provides requirements to ensure that portable fire extinguishers will work as intended to provide a first line of defense against fires of limited size. Criteria cover installations for Class A, B, C, D, and K hazards as well as the selection, inspection, maintenance, recharging, and testing of portable fire extinguishing equipment. Includes a list of obsolete fire extinguishers that should be removed from service. NFPA 1, Fire Code, advances fire and life safety for the public and first responders as well as property protection by providing a comprehensive, integrated approach to fire code regulation and hazard management. It addresses all the bases with extracts from and references to more than 130 NFPA® codes and standards including such industry benchmarks as NFPA 101, NFPA 54, NFPA 58, NFPA 30, NFPA 13, NFPA 25, and NFPA 72. Requirements cover the full range of fire and life safety issues from fire protection systems and equipment and occupant safety in new and existing buildings to hazardous materials, flammable and combustible liquids, LP-Gas, and more. NFPA 11 This standard covers the design, installation, operation, testing, and maintenance of low-, medium-, and high-expansion foam systems for fire protection. Criteria apply to fixed, semi-fixed, or portable systems for interior and exterior hazards. General requirements include system components and system types, specifications and plan......

Words: 448 - Pages: 2

Premium Essay

Week 3 Assignment

... Week 3 Assignment Chapter 9 Discussion Question 9 (Page 258) Define special or abnormal returns. * According to our book this refers to gains beyond what the market would normally provide after adjustment for risk. Chapter 9 Discussion Question 20 (Page 259) What does Table 9–5 on page 252 indicate about the relationship between a firm’s P/E ratio and its average quarterly return? * The table is indicating that the lower the P/E ratio the higher the will be the anticipated risk adjusted quarterly return. Chapter 10 Discussion Question 3 (Page 280) If you “buy straw hats in winter” or buy “when there is blood in the street,” what kind of investor are you? * You would be considered a contrarian investor because you are not following the trend, instead of buying the hats in summer when everyone is you chose to buy them in the opposite season. Chapter 10 Discussion Question 9 (Page 281) What is technical analysis? * A Technical analysis is a method of evaluating securities by analyzing statistics generated by market activity. Chapter 10 Discussion Question 11 (Page 281) Outline the basic assumptions of technical analysis. * Market value is determined solely by the interaction of demand and supply. * It is assumed that though there are minor fluctuations in the market, stock prices tend to move in trends that persist for long periods. * Reversals of trends are caused by shifts in demand and supply. * Shifts in......

Words: 275 - Pages: 2

Premium Essay

Week 3 Team a Assignment

...Week 3 Team A assignment How are the hospital’s revenues and expenses grouped for planning and control? The way of which a hospital’s revenues and expenses are grouped varies from hospital to hospital. The revenues and expenses are grouped will also vary depending upon the type of hospital, may it be for-profit or non-profit hospital. How the patient care is delivered in the hospital affects the flow of revenues and expenses. The different services offered to the patients, the number of patients and their insurance services, the types of services a hospital offers, and the frequency of use of different services are just a few factors that affect the hospital revenues and expenses. Most hospital revenue comes from billing for patient care services. In most cases, this means billing to private insurance companies as well as federal Medicare and state Medical programs. Hospitals maintain contracts with a broad selection of private health plans, with agreed schedules of reimbursement for basically every type of medical services. Also, supplies make up about 15 percent of the average community hospital's expenses. Of course, these costs are offset through billing to patients for supplies used in the course of their treatment. Capital expenditures can be a huge part of a hospital's expenses. However, the amount and percentage of the budget can vary dramatically by hospital. For example, when a hospital undergoing a major expansion or construction......

Words: 337 - Pages: 2

Premium Essay

Week 3 Lab

...Assessment Worksheet Implementing an Information Systems Security Policy Overview In this lab, you acted as a member of the network security team. You were given an assignment to implement two security standards that have been accepted by the organization. First, you enforced a newly adopted corporate password policy using the Group Policy Management console. Additionally, you joined a standalone Linux machine to the Active Directory domain using an open source tool, PowerBroker Identity Services Open. Screenshots required by lab: Lab Assessment Questions & Answers 1. What is the correct command syntax to force GPO settings? a. /force GPO b. gpupdate /now c. gpupdate /force d. policyupdate /force 2. Why is it important to set a strict password policy as part of your security template? It helps guard against unauthorized access to the system from unauthorized personnel and also against bruteforce attempts, however employees can still create strict passwords and make them insecure by having them part of a series by changing only one or two characters in the password recycling most of it. By making passwords too complex it will result in the employee base recording passwords on post it notes and other documents that can be seen by anyone. 3. Why is it important to bring standalone systems into the Domain? To provide good password management practices and help prevent unauthorized access to network......

Words: 298 - Pages: 2

Premium Essay

Nt2580 Unit 3 Assignment & Lab

...NT2580 Unit 3 Assignment & Lab Unit 3. Assignment 1 - Remote Access Control Policy Definition There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentication. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must......

Words: 477 - Pages: 2

Premium Essay

Week 3 Assignment

...Professor Abate Week 3 assignment Lei and Dalman are considering opening two more locations, and timing everything. (SWOT) stands for strength, weakness, opportunity, and threats. Strength By talking and discussing the possibilities of op another franchise in another location, is actually a good thing. Lei and Dalman know that if they are going to do this, then they need to act quickly. Acting on something such as opening another business, requires time consuming. There initial capabilities and resources will give the company a competitive advantage. Weaknesses I think one of the weaknesses that Lei and Dalman has to consider should the franchise be a small expansion, or should they try something on a larger scale. Any company can suffer if it has a poor brand recognition. What Lei and Dalman need do is suggest how best to position a company against a rival that is stronger. Opportunity After noticing the two other franchise operations that offered food and beverages similar to that of sandwich blitz; the companies may not have entered the market yet, but having the resources to open two additional locations, only if good places are found. When opportunity knocks then answer, and when wanting to expand a chain of franchise, location is important. The classy the location, the better the business will be. Threat A possible threat since the recent economic downturn has adversity affected the occupancy rates. Lei and Dalman need to act quickly it they want to go......

Words: 460 - Pages: 2

Premium Essay

Fi516- Week 3 Assignment

...Spring 2011 Week 3 Assignment Chap 8-1 Exercise value = $30 (Current stock price) – $25 (strike price) = $5 Time value = $7 (Option price) – $5 (Exercise value) = $2 Chap 8-2 Time Value = Market price of option - Exercise value $5 = V - $22 V = $27. Exercise value = P0 - Strike price $22 = P0 - $15 P0 = $37. Chap 15-8 a. = D + S = 0 + ($15/share)(200,000 # share) = $3,000,000(value) WACC = wd rd(1-T) + wcers = 0 + (1.0)(0.10) = 10% WACC = wd rd(1-T) + wcers = (0.30)(.07)(1-0.40taxes) + (0.70)(.11) = 8.96%. b. Debt = wd V = 0.30($3,000,000) = $900,000 S = V – D = $900,000 P = [S + (D – D0)]/n0 = [$200,000 + ($900,000) – 0)]/200,000 = $5.50 c. X = (D – D0)/P = $200,000 / $5.50 = 36363.636 n = 200,000 – 36363.636 = 163636.364. Initial position EPS = NI/n0 = [(EBIT – Int.)(1-T)] / n0 = [($500,000 – 0)(1-0.40)] / 200,000 = $1.50. Using financial leverage EPS = [($500,000 – 0.07($200,000) (1-0.40)] / 163636.364 = [($500,000 – $14000) (1-0.40)] / 163636.364 = $486,000 / 163636.364 = $1.782 If we add more debt the EPS will increase d. with 30% in debt TIE = = EBIT/I =EBIT/14,000 Probability TIE 0.10 (7.14) 0.20 14.2 0.40 35.71 0.20 57.14 0.10 78.57 Chap 23-3 Settled at......

Words: 334 - Pages: 2