Deck 5 Flashcards
What is the Son-Father-Grandfather Concept?
It is a backup file system. The most recent file is called the son, the second most recent file is called the father, and the preceding file is called the grandfather. The process includes reading the previous file, recording transactions being processed, and then creating a new updated master file.
An example is if friday’s file is destroyed, a new file can be created using fridays transaction file and tursday’s file.
Which of the following components of ERM addresses an entity’s operating structure?
Review and Revision
Performance
Governance and culture
Information, communication, and reporting
Governance and culture
The governance and culture component of the Enterprise Risk Management Integrated Framework includes such foundational principles as: defines desired culture; exercises board oversight; demonstrates commitment to core values; attracts, develops, and retains employees; and establishes operating structure.
An increase in the demand and supply for a product will cause what to the price and quantity?
Price will increase, decrease, or remain unchanged
Quantity will increase
Make sure to be clear, the price with not only remain unchanged. It is unknown what price will do.
If a problem asks you to calculate the flexible budget variance relative to operating income, how do you calculate this?
First you calculate the flexible budget amounts using actual units * budgeted prices and budgeted fixed costs to get to the flexible budgeted operating income.
Then you take each line (sales, expenses, etc) and you take actual - flexible budget to get to the total flexible budget variance related to operating income.
An employee of a relatively small firm with a small number of application programmers, is a system programmer and an application programmer. Is this a problem?
Yes, Since the employee is a system programmer, the employee can more than likely override any system security and provide himself with unlimited access to application programs and data and would be able to hide such access. One employee acting as both a system programmer and an application programmer is a serious internal control weakness that is very difficult to overcome.
An employee in one function below should never be part of another function:
- System analyst and application programmer
- System administrator and System programmer
- Data librarian, Data control, data entry clerk, and file librarian.
How could a closed loop verification control help a company that had an employee incorrectly input a check received from a customer to the wrong account?
Closed-loop verification is a validation method that takes data entered into a system and uses it to retrieve and display other information to verify the accuracy of input data. In this scenario, the customer and the company can both receive system confirmation that the payment was made and applied to the correct place.
What would be considered a security policy supporting document?
Procedures
Standard and baselines
Regulations
Corporate culture
Procedures
Standard and baselines
Regulations
Corporate culture is generally not a document but instead defines the mutually understood manner in which a company does business. While corporate culture is compatible with security policy, it is not a supporting “document.”
in regards to internal control objectives of information systems, A secure system may have inherent risks due to managements analysis of trade-offs identified by cost-benefit studies.
One of the limitations of even a well-designed internal control system is management’s ability to override those controls. One reason management may override them is that the benefit of doing so exceeds the cost, which represents an inherent risk of even the strongest systems.
What is the calculation for the real rate of interest?
Nominal interest rate - Inflation rate
If the government sets a maximum ceiling price below equilibrium, what will happen in the short run and long run.
It will create shortages for that product in the short term and the long run.
Under the IT governance institute there are 5 areas of focus. What are characteristics of each:
Strategic Alignment Performance Measures Value Creation Risk Management Resource Management
Strategic Alignment - The linkage between business and IT plans is referred to as strategic alignment and includes defining, maintaining, and validating the IT value proposition, with a focus on customer satisfaction.
EXs: Business managers and IT managers discussing reporting options or best practices to view inventory
Performance Measures - Features of performance measurement include tracking and monitoring strategy implementation, project completion, resource usage, process performance, and service delivery. It is important to define milestones and/or deliverables throughout the project so that progress toward completion can be measured.
EX: Creating an IT balanced scorecard
Value Creation - Value creation is the key governance objective of any enterprise. It includes the provision by IT of promised benefits to the organization, while satisfying its customers and optimizing costs and risks.
EX: IT department accelerating requests for certain departments when their value proposition is growing.
Risk Management - Risk management is defined as risk awareness by senior management, characterized by understanding risk appetite and risk management responsibilities (e.g., event identification, risk assessments, and responses). Risk management begins with identification of risks faced, followed by determining how the company will respond to the risk. The company can avoid the risk, mitigate the risk, share the risk, or ignore the risk.
EX: Updating the disaster recovery plan or creating a formal IT risk framework.
Resource Management - Resource management focuses on the optimization of knowledge and infrastructure.
Ex: reorganizing of personnel during a special company initiative based on skill level rather than department.
How would you calculate gross margin?
(sales-Costs)/ sales = gross margin
Which of the following terms is used to describe the unique attribute that identifies a specific record in a table?
A foreign key
A primary key
A secondary key
A schema
A primary key - it serves as a unique identifier to allow a user to identify a specific record in a database. A primary key is required so that a table record is always uniquely identifiable.
The schema of a database is the organization of data that represents the construction of the database management system.
When the demand for a product is inelastic, a decrease in price has what effect on the number of units sold and total revenue?
The percentage change in price will be greater than the percentage change in quantity, and total revenue will fall.
How would you calculate free cash flow?
NI + Noncash expenses (like depreciation) - Increase in working capital - Capital expenditures