Economic Concepts And Analysis Flashcards

1
Q

What is the objective of sovereign wealth funds?

A

To invest in technologies, brands, resources, better access to international markets, and protectionist impulses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is country risk?

A

Political and financial risks of conducting business in a particular location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Batch processing of business transactions can be the appropriate mode when:

A

When a high volume of transactions exist, economies of scale can be gained by utilizing batch processing since many transactions are processed in the same run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does batch processing mean?

A

Transactions are accumulated for some period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Management reporting systems

A

Relies on a mix of internal and external data. They also combine financial and operational data so that managers have flexibility in determining the information that they will use for decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a distributed data processing network?

A

Is a network of interdependent computers where certain functions are centralized and other functions are decentralized and processing is shared among two or more computers. In a distributed data processing network, each computer can also process its own data. Distributed data processing is and alternative to both centralization and decentralization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which one of the following input validation routines is nit likely to be appropriate in a real-time operation?

A. Field Check
B. Sign Check
C. Sequence Check
D. Redundant data check

A

In real-time operations, transactions are processed as they occur without regard to any particular sequence. Therefore, a sequence check would not be an appropriate input validation routine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following procedures would an entity most likely include in its disaster recovery plan?

A. Convert all data from EDI format to an internal company format.
B. Maintain a Trojan horse program to prevent illicit activity.
C. Develop an auxiliary power supply to provide uninterrupted electricity.
D. Store duplicate copies of files in a location away from the computer center

A

In the event of certain disasters, the company will need to restore computer files. For certain disasters, the backup will only be possible if the copies are stored at a separate location.

The computer operations procedures should call for a backup of the files. This is a process of making duplicate copies of files and storing them in a different location to protect against loss through fire, flood, and other disasters. If the backup copies are needed, they are copied back to the primary storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following computerized control procedures would be most effective in ensuring that data uploaded from personal computers to a mainframe are complete and that no additional data are added?

A. Self-checking digits to ensure that only authorized part numbers are added to the database
B. Batch control totals, including control totals and hash totals
C. Passwords that effectively limit access to only those authorized to upload the data to the mainframe computer
D. Field-level edit controls which test each field for alpha/numerical integrity

A

Batch control totals, including control totals and hash totals, is the best procedure because the batch control totals for the data transferred can be reconciled with the batch control totals in the existing file. This provides information on the completion of the data transfer.

Although self-checking digits are an effective control to ensure that a correct part has been identified, passwords help ensure that only authorized personnel make the transfer, and field-level edit controls are effective data-entry control procedures, the objective here is to ensure that data transfer is complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A department store company with stores in 11 cities is planning to install a network so that stores can transmit daily sales by item to headquarters and store salespeople can fill customer orders from merchandise held at the nearest store. Management believes that having daily sales statistics will permit better inventory management than is the case now with weekly deliveries of sales reports on paper. Salespeople have been asking about online inventory availability as a way to retain the customers that now go to another company’s stores when merchandise is not available. The planning committee anticipates many more applications so that in a short time the network would be used at or near its capacity.

The planning committee was concerned that unauthorized people might attempt to gain access to the network. If the company installs a network using leased lines, then it should ensure that:

A. phone numbers for the network are kept confidential.
B. tone suppression devices are installed on all ports.
C. transmission facilities on its premises are secure.
D. network availability is limited to certain times of the day

A

If the company installs a leased-line network, it should ensure that transmission facilities on its premises are secure.

In a leased-line network, there are no phone numbers and hence no ports with tone devices for incoming calls. Limiting network availability to certain times of the day is often associated with public switched lines, not leased lines, to reduce the time during which unauthorized people could potentially gain access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is important to maintain proper segregation of duties in a computer environment. Which of the following access setups is appropriate?

A. Users have update access for production data
B. Users have update access for production data and application programmers have update access for production programs
C. Application programmers have update access for production data and users have update access for production programs
D. Users have update access for production data and application programmers have update access for both production data and programs

A

Users need to update data through applications programs.

Application programmers should not be able to change production programs. They should submit changes to the change control unit.

Application programmers should never have update access to production data. Users have no need to change production programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The gross margin ratio can be subjected to detailed analysis by a firm’s:

A. creditors.
B. customers.
C. investors.
D. management.

A

Sales = Unit Price x Number of Units
COGS = Unit Cost x Number of Units
Gross Margin = (Unit Price - Unit Cost) x Number of Units
The above detailed information is available only to the firm’s management.

Thus, a detailed analysis could not be performed by the other parties mentioned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company purchases inventory on terms of net 30 days and resells to its customers on terms of net 15 days. The inventory conversion period averages 60 days. What is the company’s cash conversion cycle?

A. 15 days
B. 45 days
C. 75 days
D. 105 days

A

The cash conversion cycle is the time between the investment of cash in inventory and the return of cash after the sale and collection of the related account receivable. In this case, cash is not invested in the inventory until 30 days into the 60-day inventory conversion cycle. The remaining 30 days of the inventory conversion cycle plus the 15-day receivable collection period results in a 45-day cash conversion cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using the expenditure approach, GDP equals

A

Personal consumption + gross domestic private investment + government purchases + (exports - imports)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Contribution margin ratio is

A

the contribution margin divided by the sales revenue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Breakeven revenue is found by

A

Dividing the fixed costs by the contribution margin ratio

17
Q

Database management system (DBMS) does not

A

run applications