BEC 10 Flashcards

1
Q

Snuggly Whippet Corp. has assigned a staff analyst to investigate privacy laws and regulations related to its business of selling whippet puppies to an international clientele of wealthy purchasers. In relation to the framework for cybersecurity, this is an example of:

Detecting threats.
Recovering from a cyber incident
Responding to a cyber incident
Identifying references

A

Identifying references

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When using the first-in, first-out method of process costing, total equivalent units of production for a given period of time is equal to the number of units

In work in process at the beginning of the period times the percent of work necessary to complete the items, plus the number of units started during the period, less the number of units remaining in work in process at the end of the period times the percent of work necessary to complete the items.

In work in process at the beginning of the period, plus the number of units started during the period, plus the number of units remaining in work in process at the end of the period times the percent of work necessary to complete the items.

Started into process during the period, plus the number of units in work in process at the beginning of the period.

Transferred out during the period, plus the number of units remaining in work in process at the end of the period times the percent of work necessary to complete the items.

A

In work in process at the beginning of the period times the percent of work necessary to complete the items, plus the number of units started during the period, less the number of units remaining in work in process at the end of the period times the percent of work necessary to complete the items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following statements about investment decision models is true?

The discounted payback rate takes into account cash flows for all periods.

The payback rule ignores all cash flows after the end of the payback period.

The net present value model says to accept investment opportunities when their rates of return exceed the company’s incremental borrowing rate.

The internal rate of return rule is to accept the investment if the opportunity cost of capital is greater than the internal rate of return.

A

The payback rule ignores all cash flows after the end of the payback period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following formulas should be used to calculate the historic economic rate of return on common stock?

(Dividends + change in price) divided by beginning price.

(Net income - preferred dividend) divided by common shares outstanding.

Market price per share divided by earnings per share.

Dividends per share divided by market price per share.

A

(Dividends + change in price) divided by beginning price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statements related to business analytics is true?

Business analytics is primarily a technology issue.

For internal control reasons, business analytics and company strategy should be kept separate.

Company strategy should drive business analytics strategy.

Business analytics should drive company strategy.

A

Company strategy should drive business analytics strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In computing the reorder point for an item of inventory, which of the following factors are used?

I. Cost of inventory.

II. Inventory usage per day.

III. Acquisition lead-time.

I and II are correct.
II and III are correct.
I and III are correct.
I, II and III are correct.

A

II and III are correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Each of the listed IT policies is matched to its description except:

Quality—statement of IT performance standards.

Values and service culture—policies for ensuring the quality of live IT services.

Electronic communications use—policy related to employ use of the Internet, intranet, email, and so on.

Security—related to guarding against physical or electronic threats to IT.

A

Values and service culture—policies for ensuring the quality of live IT services.

Correct! This is a false statement.The description given is of the “service management and operational service problem solving” policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ concerns whether confidential information is protected consistent with the organization’s commitments and agreements.
Quality
Processing integrity
Privacy
Confidentiality

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A 4% increase in the market price of Commodity X resulted in an 8% increase in the quantity of Commodity X supplied. Which one of the following statements is correct?
Supply is inelastic.
Supply is unitary.
Supply is elastic.
Supply is price neutral.

A

Supply is elastic.

Since the percentage change in supply (8%) was greater than the percentage change in price (4%), supply is elastic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly