Incorrect Questions Flashcards
Review
Hadoop
Open source software framework that stores large amount of data and runs applications on clusters of commodity hardware
What should be part of any risk model involving inventory valuation
The price at the time of purchase is the only price that matters in inventory valuation
What function do Utility Programs perform
Routine functions (e.g., sorting and copying), they are available to all users, and are promptly available for many different applications. Utility programs are one of the more serious weaknesses in data access security because some can bypass normal access controls.
Primary objective of security software
Control access to information system resources, such as program libraries, data files, and proprietary software.
Security software identifies and authenticates users, controls access to information, and records and investigates security related events and data
Best policy for the protection of a company’s vital information resources from computer viruses
Policies and procedures used in conjunction with antivirus and access control software
Antivirus not acceptable alone - Software programs can identify and neutralize known viruses but may not recognize and properly neutralize new strains of a computer virus
Spontaneous sources of financing for a firm
Arises automatically as part of a purchase transaction. Because of its ease in use, trade credit is the largest source of short-term financing for many firms, both large and small.
A disadvantage of brainstorming
Dispersal of accountability, Groupthink
Essential element of activity-based costing (ABC)
Driver analysis, which identifies the cause-and-effect relationship between an activity and its consumption of resources and for an activity and the demands made on it by a cost object.
Which strategy is too vendor-dependent when vital operations require almost immediate availability of computer resources (contingency plan)
A cold site has all needed assets in place except the needed computer equipment and is vendor-dependent for timely delivery of equipment.
Synergy
Occurs when he combination of formerly separate elements has a greater effect than the sum of their individual effects. Reflect complementary sharing of resources, technology, or competencies
Objective of logical security controls for information systems
To restrict access to data and resources (both hardware and software) to only authorized individuals.
(EUC) application was implemented, it did not meet certain business requirements in the department and had to be substantially rewritten. What risk could have led to it?
They are not reviewed by systems analysts prior to implementation, Unlike IT-developed and supported applications
Under the variable costing method, which costs are assigned to inventory
Only variable manufacturing costs (E.g Variable manufacturing overhead)
What is the basic DuPont equation
Return on assets = Profit Margin x Total Asset Turnover
Formula written out:
*Profit Margin = Profit avail ordinary SH ÷ Sales
*Total Asset Turnover = Sales ÷ Total Assets
What is the extended DuPont equation
Return on ordinary equity = Return on Asset x Leverage Factor*
*Also called equity multiplier = Total assets ÷ Ordinary equity at carrying amount
Simplified:
Return on ordinary equity =
Profit avail ordinary SH ÷ Ordinary equity at carrying amount
Disadvantage of the life cycle approach to system development
Not suited for unstructured projects
Approach is best suited for system development for projects that are unstructured
Prototyping
Approach is best suited for system development for projects that are structured
Life cycle approach, each stage of development is highly structured, and requirements are clearly defined.
Bonds are sold at a Discount and the effective interest method of amortization is used, interest expense will
Equals the cash payment plus the amortized discount (periodic interest expense equals an ever-increasing carrying amount times a constant interest rate)
Bonds are sold at a Premium and the effective interest method of amortization is used, interest expense will
Equals the cash payment minus the amortized premium (periodic interest expense equals an ever-decreasing carrying amount times a constant interest rate)
Prime costs
Direct Material and Direct labour
Conversion cost
Direct Labor and Overhead costs
Manufacturing/ Product / Inventoriable cost
Direct Material, Direct labour and Manufacturing Overheads
Public-key system
Used to encrypt the message prior to transmission, and the private key is needed to decrypt (decode) the message