BEC Review Flashcards

1
Q

Cyber breaches are:

A

Inevitable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Management uses a number of techniques to achieve its strategies. The balanced scorecard is primarily designed to

A

Measure performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the primary advantage of using a value-added network (VAN)?

A

It provides increased security for data transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A strategy initiative in the balanced scorecard framework is

A

A key action program required to achieve strategic objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adjusting journal entries are often the responsibility of

A

The controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following procedures would enhance the control of a computer operations department?

A

I. Periodic rotation of operators.
II. Mandatory vacations.
III. Controlled access to the facility.
IV. Segregation of personnel who are responsible for controlling input and output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a job-order cost system, the use of indirect materials would usually be reflected in the general ledger as an increase in

A

Factory overhead control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SnowDrift Ski Resorts has many celebrity visitors. At a recent meeting, the CIO presented a plan to ensure the complete privacy of all visitors, including compliance with relevant laws and regulations related to privacy. This plan is likely to also be found in a (an)

A

Regulatory compliance policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Winthrop P. Snigledorf pays his employees in bitcoins to avoid paying payroll taxes and so that his employees don’t have to pay income taxes on these earnings. Which of the following is an accurate assessment of these actions?

A

Winthrop is incorrect—both payroll taxes and income taxes must be paid on these earnings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not a limitation on the use of ROI as a performance measure?

A

It is unrelated to shareholder value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A manufacturing company properly classifies and accounts for one product as a by-product rather than as a main product because it

A

Has low sales value when compared to the main products. Product with no sales value is scrap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Under these circumstances, for products exchanged between divisions, the transfer price that will generally lead to optimal decisions for the manufacturing company would be a transfer price equal to the

A

Market price of product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Botnet

A

Zombie computer used in DoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Machine language program that results when a symbolic language program is translated is called:

A

Object program (machine readable program) whereas a symbolic language program is readable by humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantage of zero balance account system?

A

Maximizes float in cash dispursememts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Banker’s acceptance

A

Time draft payable on a specified date and guaranteed by the bank.

17
Q

Ability to add or update documentation in data dictionaries should be restricted to:

A

Database administrators

18
Q

Primary disadvantage of ROI vs RI?

A

ROI may lead to rejecting projects that yield positive cash flows.

19
Q

Type of documentation useful for maintaining software:

A

Program documentation

20
Q

Computer as target

A

Use computer to deny other’s access (DoS attacks)

21
Q

Computer as subject

A

Use computers on network to get to other computers (malware)

22
Q

Computer as tool

A

To gain access to data/resources (phishing, key loggers)

23
Q

Computer as symbol and user as target

A

Deceives user to obtain information

24
Q

What would be hash total for payroll application?

A

Department numbers- hash totals have no meaning other than to prove complete batch has been processed

25
Q

To prevent interrupted information systems operation, which of the following controls are included in disaster recover plan?

A

Backup and downtime controls

26
Q

Strategy map in balanced scorecard framework is:

A

Diagram of cause and effect relationships among strategic objectives.

27
Q

Serial bonds

A

Mature in installments

28
Q

Term bonds

A

Mature on a single date

29
Q

In COBIT model BLANK is example of information criterion and BLANK is example of IT resource.

A

Standards for user response times, network structure

30
Q

The machine language for a specific computer

A

Is determined by engineers who designed computer, languages differ among computers and programs

31
Q

Which of the following steps in the accounting cycle comes after preparing financial statements?

A

Prepare post-closing trial balance.

32
Q

Material efficiency variance is responsibility of

A

Production and industrial engineering