Practice Exam 6.23.23 Flashcards
Wilkinson, Inc., which has a cost of capital of 12%, invested in a project with an internal rate of return (IRR) of 14%. The project is expected to have a useful life of 4 years, and it will produce net cash inflows as follows:
The initial cost of this project amounted to
A. $9,647
B. $7,483
C. $12,540
D. $11,000
B. $7,483
The IRR of a capital project is the rate at which the present value of net cash inflows equals initial investment (NPV = 0). To find this project’s initial cost, the net cash inflows should be discounted at the internal rate of return (14%):
Because the present value of net cash inflows equals initial investment at an IRR rate of 14%, initial cost of this project is $7,483.
A company discovered incidents of unauthorized access to its internal system. Which of the following actions or practices is involved in implementation phase 5 of COBIT 2019?
A. Developing an action plan to create usernames and passwords for employees.
B. Creating a list of authorized employees who should be assigned usernames and passwords.
C. Identifying that the company lacks usernames and passwords for authorized employees.
D. Testing whether incidents of unauthorized access exist after implementing the plan.
B. Creating a list of authorized employees who should be assigned usernames and passwords.
Phase 5 (How do we get there?) of COBIT 2019 involves implementing the action plan to close the gap and establishing monitoring systems. Creating a list of authorized employees who should be assigned usernames and passwords is an action in implementing the action plan.
If a payroll system continues to pay employees who have been terminated, control weaknesses most likely exist because
A. Input file label checking routines built into the programs were ignored by the operator.
B. Programmed controls such as limit checks should have been built into the system.
C. There were inadequate manual controls maintained outside the computer system.
D. Procedures were not implemented to verify and control the receipt by the computer processing department of all transactions prior to processing.
C. There were inadequate manual controls maintained outside the computer system.
The authorization to pay employees comes from outside the computer department. Thus, inadequate controls external to the computer processing department are most likely the cause of allowing the payments to terminated employees to continue without detection.
A systems development approach used to quickly produce a model of user interfaces, user interactions with the system, and process logic is called
A. Application generation.
B. Neural networking.
C. Prototyping.
D. Reengineering.
C. Prototyping.
Prototyping produces the first model(s) of a new system. This technique usually employs a software tool for quick development of a model of the user interface (such as by report or screen), interaction of users with the system (for example, a menu-screen approach or data entry), and processing logic (the executable module). Prototyping stimulates user participation because the model allows for quick exploration of concepts and development of solutions with quick results.
Hagar Company’s bank requires a compensating balance of 20% on a $100,000 loan. If the stated interest on the loan is 7%, what is the effective cost of the loan?
A. 8.40%
B. 8.75%
C. 7.00%
D. 5.83%
B. 8.75%
The effective interest rate on a loan with a compensating balance can be calculated as follows:
Note that the amount of the loan is not needed to calculate the effective rate.
Which of the following represents the procedure managers use to identify whether the company has information that unauthorized individuals want, how these individuals could obtain the information, the value of the information, and the probability of unauthorized access occurring?
A. Systems assessment.
B. Disaster recovery plan assessment.
C. Risk assessment.
D. Test of controls.
C. Risk assessment.
The risk assessment forms the core of an organization’s contingency planning (business resiliency). A risk assessment involves assessing (1) the types of vulnerabilities to which each of the organization’s critical systems is subject, (2) the likelihood of each of the vulnerabilities being exploited, and (3) countermeasures to be taken, both preventive measures to stop the occurrence of breaches and corrective measures to compensate in the event of breaches.
Which of the following are the components of a business information system (BIS)?
A. Input, output, processing, storage.
B. Hardware, data, software, network, people.
C. Hardware, software, data, system, people, procedures.
D. Hardware, data, software, people, processing, storage.
B. Hardware, data, software, network, people.
A BIS is any combination of the hardware, software, data, people, network, and procedures employed to pursue an organizational objective.
Porter’s five forces analysis is
A. A framework for analyzing the level of competition within an industry and business strategy development.
B. An analysis of structured, semi-structured, and unstructured data that can be mined to reveal relationships and dependencies or predict outcomes and behaviors.
C. A structured planning method that evaluates the strengths, weaknesses, opportunities, and threats of a project or business venture.
D. A process that systematically surveys and interprets relevant data to identify external opportunities and threats.
A. A framework for analyzing the level of competition within an industry and business strategy development.
Porter’s five forces analysis is a framework that analyzes the level of competition within an industry and business strategy development.
A company’s gross profit for Year 2 and Year 1 was as follows:
Assuming that Year 2 selling prices were 15% lower than Year 1 selling prices, what was the decrease in gross profit caused by the selling price change?
A. $134,400
B. $167,718
C. $144,000
D. $142,560
B. $167,718
Given a 15% decrease in prices, Year 2 sales were 85% of Year 2 sales at Year 1 prices. Hence, Year 2 sales at Year 1 prices equal $1,118,118 ($950,400 ÷ 85%). Sales and gross profit were $167,718 ($1,118,118 – $950,400) lower because of the decrease in prices.
A company purchases inventory on terms of net 30 days and resells to its customers on terms of net 15 days. The inventory conversion period averages 60 days. What is the company’s cash conversion cycle?
A. 15 days.
B. 75 days.
C. 45 days.
D. 105 days.
C. 45 days.
A firm’s cash conversion cycle is the amount of time that passes between the actual outlay of cash for inventory purchases and the collection of cash from the sale of that inventory. Accordingly, the cash conversion cycle is equal to the average collection period plus days’ sales in inventory minus the average payables period. Per the formula, the company’s cash conversion cycle is 45 days (15 days average collection period + 60 days’ sales in inventory – 30 days average payables period).
For the year just ended, Abel Co. incurred direct costs of $500,000 based on a particular course of action during the year. If a different course of action had been taken, direct costs would have been $400,000. In addition, Abel’s fixed costs were $90,000. The incremental cost was
A. $190,000
B. $100,000
C. $90,000
D. $10,000
B. $100,000
Incremental cost is the difference in total cost between two decisions. Only the costs that will differ under the alternatives are relevant. Thus, Abel’s incremental cost is $100,000 ($500,000 – $400,000). The fixed costs of $90,000 are not relevant.
Learning curves are most often used to predict
A. Unit direct labor costs.
B. Total unit costs.
C. Overhead variances.
D. Unit material costs.
A. Unit direct labor costs.
Learning curves reflect the increased rate at which people perform tasks as they gain experience. Thus, they are useful in predicting unit direct labor costs.
If a firm borrows $500,000 at 10% and is required to maintain $50,000 as a minimum compensating balance at the bank, what is the effective interest rate on the loan?
A. 11.1%
B. 12.2%
C. 9.1%
D. 10.0%
A. 11.1%
At 10%, the interest on a $500,000 loan is $50,000 per year. However, the $500,000 loan is effectively reduced to $450,000 of usable funds by the compensating balance requirement. Thus, the borrower pays $50,000 of interest for a $450,000 loan, an effective rate of 11.1% ($50,000 ÷ $450,000).
In a standard cost system, the materials price variance is obtained by multiplying the
A. Actual quantity purchased by the difference between standard price and actual price.
B. Standard quantity used by the difference between actual price and standard price.
C. Actual price by the difference between actual quantity used and standard quantity used.
D. Standard price by the difference between expected quantity and budgeted quantity.
A. Actual quantity purchased by the difference between standard price and actual price.
The materials price variance is the portion of the flexible budget variance attributable entirely to a difference in purchased input unit cost. If it is recognized at the time of purchase, it is calculated by multiplying the actual quantity purchased (AQP) by the difference between standard price (SP) and actual price (AP) [AQP × (SP – AP)].
Which of the following represents the greatest exposure to the integrity of electronic funds transfer data transmitted from a remote terminal?
A. Poor physical access controls over the data center.
B. Network viruses.
C. Leased telephone circuits.
D. Poor system documentation.
C. Leased telephone circuits.
Leased telephone circuits represent a direct exposure to the risk of breached data integrity. They use public lines that can be easily identified and tapped.
Which of the following best defines blockchain?
A. A public database storing digital information that is shared among multiple parties.
B. A distributed ledger using consensus mechanism to improve centralized controls over data.
C. A piece of digital information owned by miners within a distributed ledger.
D. A type of cryptocurrency designed to secure the transactions and verify the transfer of funds.
A. A public database storing digital information that is shared among multiple parties.
A blockchain is a type of digital database (or ledger) that provides proof of who owns what at any moment in time because each transaction has been added to the ledger. The ledger is a type of distributed ledger that is encrypted, public, and shared widely for anyone to view.
A delivery company is implementing a system to compare the costs of purchasing and operating different vehicles in its fleet. Truck 415 is driven 125,000 miles per year at a variable cost of $0.13 per mile. Truck 415 has a capacity of 28,000 pounds and delivers 250 full loads per year. What amount is the truck’s delivery cost per pound?
A. $0.58036 per pound.
B. $1.72000 per pound.
C. $0.00232 per pound.
D. $0.00163 per pound.
C. $0.00232 per pound.
The truck’s variable delivery cost per pound equals the total variable cost divided by the total pounds delivered by the truck. The truck’s mileage cost is $16,250 (125,000 miles × $0.13 per mile). The truck delivered 7,000,000 pounds (28,000 pounds × 250 loads). The truck’s variable delivery cost per pound is therefore $0.00232 per pound ($16,250 ÷ 7,000,000 pounds).
Which of the following statements is true concerning the COBIT 5 framework?
A. Governance and management are synonyms for the activities of upper management.
B. Information and organizational structures are among the enablers identified in COBIT 5.
C. Minimization of risk and resource use are among the major goals of COBIT 5.
D. Information technology controls are most effectively designed and executed in isolation from other business processes.
B. Information and organizational structures are among the enablers identified in COBIT 5.
COBIT 5 describes seven categories of enablers that support comprehensive IT governance and management, among them information and organizational structures.
A company has gathered the following information from a recent production run:
What is the company’s variable overhead spending variance?
A. $50 unfavorable.
B. $40 unfavorable.
C. $50 favorable.
D. $40 favorable.
C. $50 favorable.
The variable overhead spending variance is equivalent to the materials price, or labor rate variance. It equals the actual quantity times the difference between the standard and actual rates. The variable overhead spending variance is therefore $50 [25 hours × ($10 – $8)]. The variance is favorable because the actual rate is less than the standard rate.
A company has an online order processing system. The company is in the process of determining the dollar amount of loss from user error. The company estimates the probability of occurrence of user error to be 90%, with evenly distributed losses ranging from $1,000 to $30,000. What is the expected annual loss from user error?
A. $13,050
B. $13,950
C. $13,500
D. $14,400
B. $13,950
The first step in calculating the expected annual loss from user error is determining the midpoint of the range of possible losses ($1,000 to $30,000). The midpoint of the range is $15,500 [($1,000 + $30,000) ÷ 2]. The expected annual loss from user error is thus $13,950 ($15,500 × 90%).
Parity checks and echo checks are examples of
A. Access controls.
B. Hardware controls.
Answer (B) is correct.
Hardware controls are built into the equipment by the manufacturer. They ensure the proper internal handling of data as they are moved and stored. Hardware controls include parity checks, echo checks, read-after-write checks, and any other procedure built into the equipment to ensure data integrity.
C. Logical controls.
D. Environmental controls.
B. Hardware controls.
Hardware controls are built into the equipment by the manufacturer. They ensure the proper internal handling of data as they are moved and stored. Hardware controls include parity checks, echo checks, read-after-write checks, and any other procedure built into the equipment to ensure data integrity.
Organizations that move to implement EDI often use value-added networks (VANs). Which of the following would not normally be performed by a VAN?
A. Store electronic purchase orders of one organization to be accessed by another organization.
B. Provide translations from clients’ computer applications to a standard protocol used for EDI communication.
C. Maintain a log of all transactions of an organization with its trading partner.
D. Provide common interfaces across organizations thereby eliminating the need for one organization to establish direct computer communication with a trading partner.
B. Provide translations from clients’ computer applications to a standard protocol used for EDI communication.
Companies must purchase their own software to translate their data to a national standard protocol for EDI purposes, either ANSI X.12 in the U.S. or EDIFACT in Europe and most of the rest of the world. Once the data are in the standard format, the VAN handles all aspects of the communication. VANs are privately owned telecommunications carriers that sell capacity to outside users. Among other things, a VAN provides a mailbox service permitting EDI messages to be sent, sorted, and held until needed in the recipient’s computer system.
The imputed interest rate used in the residual income approach to performance evaluation can best be described as the
A. Target return on investment set by the company’s management.
B. Average lending rate for the year being evaluated.
C. Average return on investments for the company over the last several years.
D. Historical weighted-average cost of capital for the company.
A. Target return on investment set by the company’s management.
Residual income is the excess of operating income over a targeted amount equal to an imputed interest charge on invested capital. The rate used ordinarily is set as a target return by management but is often equal to the weighted average cost of capital. Some entities prefer to measure managerial performance in terms of the amount of residual income rather than the percentage ROI because the firm will benefit from expansion as long as residual income is earned.
Which of the following statements is correct regarding information technology (IT) governance?
A. A primary goal of IT governance is to balance risk versus return over IT and its processes.
B. IT governance is an appropriate issue for organizations at the level of the board of directors only.
C. IT goals should be independent of strategic goals.
D. IT governance requires that the Control Objectives for Information and related Technology (COBIT) framework be adopted and implemented.
A. A primary goal of IT governance is to balance risk versus return over IT and its processes.
According to COBIT, IT governance has several focus areas, including resource management. Resource management is the optimal investment in and the proper management of critical IT resources. To maintain an optimal investment in IT resources, the return of the investment should be balanced against the associated risks of the investment.