Practice Exam 8.16.23 Flashcards
Actual and budgeted information about the sales of a product are presented for June as follows.
The sales price variance for June was
A. $8,000 favorable.
B. $10,000 favorable.
C. $10,000 unfavorable.
D. $10,500 unfavorable.
A. $8,000 favorable.
The sales price variance is the difference between actual price and budgeted price, times actual units. Actual price was $11.50 ($92,000 ÷ 8,000). Budgeted price was $10.50 ($105,000 ÷ 10,000). Sales price variance is therefore $8,000 [8,000 actual units × ($11.50 – $10.50)]. The variance is favorable because actual sales price was greater than budgeted sales price.
Authentication is the process by which the
A. User indicates to the system that the transaction was processed correctly.
B. System verifies the identity of the user.
C. System verifies that the user is entitled to enter the transaction requested.
D. User identifies himself or herself to the system.
B. System verifies the identity of the user.
Identification is the process of uniquely distinguishing one user from all others. Authentication is the process of determining that individuals are who they say they are. For example, a password may identify but not authenticate its user if it is known by more than one individual.
**Each share of nonparticipating, 8%, cumulative preferred stock in a company that meets its dividend obligations has all of the following characteristics except
A. Dividend payments that are not tax deductible by the company.
B. No principal repayments.
C. A superior claim to common stock equity in the case of liquidation.
D. Voting rights in corporate elections.
D. Voting rights in corporate elections.
Preferred shareholders rarely have voting rights. Voting rights are exchanged for preferences regarding dividends and liquidation of assets.
Which of the following classifications of security controls includes smoke detectors, generators, security guards, and ID badges?
A. Technical.
B. Logical.
C. Physical.
D. Administrative.
C. Physical.
Physical controls limit physical access and environmental damage to computer equipment, data, and important documents. Smoke detectors, generators, security guards, and ID badges are some common examples.
A U.S. company currently has domestic operations only. It is considering an equal-size investment in either Canada or Britain. The data on expected rate of return and the risk associated with each of these proposed investments are given below.
The company plans to select the optimal combination of countries based on risk and return for the domestic and international investments taken together. Because the company is new to the international business environment, it is relatively risk averse. Based on the above data, which one of the following alternatives provides the best risk-adjusted return to the firm?
A. Undertake the British investment.
B. Unable to determine based on data given.
C. Do not undertake either investment.
D. Undertake the Canadian investment.
A. Undertake the British investment.
A risk-averse company will select the investment with the lower risk per unit of return. Thus, by choosing to invest in Britain, the risk per unit of return is the lowest of all the options mentioned, and it is equal to 0.1428 = 3% ÷ 21%.
If a product required a great deal of electricity to produce, and crude oil prices increased, which of the following costs most likely increased?
A. Prime costs.
B. Conversion costs.
C. Direct materials.
D. Direct labor.
B. Conversion costs.
Conversion costs consist of direct labor and manufacturing overhead. Overhead includes the costs of utilities, such as electricity. An increase in the price of crude oil, which is used to generate electricity, is therefore likely to increase conversion costs.
**Fact Pattern: Rokat Corporation is a manufacturer of tables sold to schools, restaurants, hotels, and other institutions. The table tops are manufactured by Rokat, but the table legs are purchased from an outside supplier. The Assembly Department takes a manufactured table top and attaches the four purchased table legs. It takes 20 minutes of labor to assemble a table. The company follows a policy of producing enough tables to ensure that 40% of next month’s sales are in the finished goods inventory. Rokat also purchases sufficient direct materials inventory to ensure that direct materials inventory is 60% of the following month’s scheduled production.
Assume Rokat’s required production for August and September is 1,600 and 1,800 units, respectively, and the July 31 direct materials inventory is 4,200 units. The number of table legs to be purchased in August is
A. 6,520 legs.
B. 9,400 legs.
C. 6,400 legs.
D. 2,200 legs.
A. 6,520 legs.
Some of the legs needed for August’s production are already included in the 4,200 units in direct materials. Legs needed for August are 6,400 (1,600 × 4), but there are already 4,200 legs in the July 31 direct materials inventory. Therefore, 2,200 legs should be purchased for August production. Rokat needs 4,320 legs (1,800 × 4 × 60%) for September production. Thus, the total amount of legs to be purchased is 6,520 (2,200 + 4,320).
During the month just ended, Nale Co. used $300,000 of direct materials. At month end, Nale’s direct materials inventory was $50,000 more than it was at the beginning of the month. Direct material purchases during the month amounted to
A. $300,000
B. $350,000
C. $250,000
D. $0
B. $350,000
The beginning direct materials inventory, plus direct material purchases, minus ending direct materials inventory equals the direct materials used.
The direct materials purchases for the month equal $350,000 ($300,000 + $50,000).
**Which of the following balanced scorecard perspectives examines a company’s success in targeted market segments?
A. Customer.
B. Learning and growth.
C. Internal business process.
D. Financial.
A. Customer.
Any critical success factor that addresses some aspect of the target market is included in the customer perspective.
**Which of the following variances would be useful in calling attention to a possible short-term problem in the control of overhead costs?
A. Spending Variance = Yes
Volume Variance = No
The spending variance, not the volume variance, is useful for calling attention to a possible short-term problem in the control of overhead costs.
In using regression analysis, which measure indicates the extent to which a change in the independent variable explains a change in the dependent variable?
A. p-value.
B. Standard error.
C. R-squared.
D. t-statistic.
C. R-squared.
R-squared is also known as the coefficient of determination. It is a measure of how good the fit between the independent and dependent variable is.
**Attacks on computer networks may take many forms. Which of the following uses the computers of innocent parties infected with Trojan horse programs?
A. A man-in-the-middle attack.
B. A brute-force attack.
C. A distributed denial-of-service attack.
D. A password-cracking attack.
C. A distributed denial-of-service attack.
A denial-of-service (DoS) attack is an attempt to overload a system (e.g., a network or web server) with false messages so that it cannot function (a system crash). A distributed DoS attack comes from multiple sources, for example, the machines of innocent parties infected by Trojan horses.
**Which of the following computerized control procedures is most effective in ensuring that files of data uploaded from personal computers to a server are complete and that no additional data are added?
A. Batch control totals, including control totals and hash totals.
B. Field-level edit controls that test each field for alphanumerical integrity.
C. Self-checking digits to ensure that only authorized part numbers are added to the database.
D. Passwords that effectively limit access to only those authorized to upload the data to the server.
A. Batch control totals, including control totals and hash totals.
Batch control totals for the data transferred can be reconciled with the batch control totals in the existing file. This comparison provides information on the completion of the data transfer. Batch totals may include record counts, totals of certain critical amounts, or hash totals. A hash total is a control total without a defined meaning, such as the total of employee numbers or invoice numbers, that is used to verify the completeness of data. Thus, the hash total for the employee listing by the personnel department could be compared with the total generated during the payroll run.
Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment?
A. Elimination of the need to continually update antivirus software.
B. Elimination of the need to verify the receipt of goods before making payment.
C. Assurance of the thoroughness of transaction data because of standardized controls.
D. Automatic protection of information that has electronically left the entity.
C. Assurance of the thoroughness of transaction data because of standardized controls.
Advantages of EDI include reduction of clerical errors and thoroughness of transaction data because of standardized controls, speed of transactions, and the elimination of repetitive clerical tasks.
Pro forma financial statements are part of the budgeting process. Normally, the last pro forma statement prepared is th
A. Capital expenditure plan.
B. Income statement.
C. Statement of cost of goods sold.
D. Statement of cash flows.
D. Statement of cash flows.
The statement of cash flows is usually the last of the listed items prepared. All other elements of the budget process must be completed before it can be developed.
Which of the following is not an element of SWOT analysis?
A. Weaknesses.
B. Opportunities.
C. Threats.
D. Strategies.
D. Strategies.
SWOT analysis is an acronym for strengths, weaknesses, opportunities, and threats.
Which of the following activities by small business clients best demonstrates management integrity in the absence of a written code of conduct?
A. Developing and maintaining formal descriptions of accounting procedures.
B. Documenting internal control procedures using flowcharts rather than narratives.
C. Emphasizing a strong ethical culture through oral communication and management example.
D. Reporting regularly to the board of directors about operations and finances.
C. Emphasizing a strong ethical culture through oral communication and management example.
A small business may not have a written code of conduct. However, it may have a culture emphasizing integrity and a strong ethical culture by means of oral communication and management example.
**Which of the following standard costing variances would be least controllable by a production supervisor?
A. Materials usage.
B. Overhead efficiency.
C. Overhead volume.
D. Labor efficiency.
C. Overhead volume.
The overhead volume variance measures the difference between the amount of fixed overhead applied and the amount of fixed overhead budgeted. The production supervisor has limited control over fixed overhead costs because they do not depend on the actual level of production during the current period.
If a manufacturing company uses responsibility centers, which one of the following items is least likely to appear in a performance report for a manager of an assembly line?
A. Repairs and maintenance.
B. Equipment depreciation.
C. Materials.
D. Supervisory salaries.
B. Equipment depreciation.
Responsibility centers hold managers responsible for factors they can influence. The depreciation of equipment will probably not appear on the performance report of an assembly-line manager because the manager usually has no influence over the depreciation calculations.
Which of the following networks provides the least secure means of data transmission?
A. Local area.
B. Private.
C. Public-switched.
D. Value-added.
C. Public-switched.
Public-switched networks are wide area networks that use public telephone lines. This arrangement may be the most economical, but data transmission may be of lower quality, no connection may be available, and security measures may be ineffective.
To manage its transactional data, Fort Company established the data stewardship structure in its data management program. Which of the following roles is responsible for authorizing access to transactional data?
A. Data owner.
B. Data custodian.
C. Data steward.
D. Data regulator.
C. Data steward.
Data stewards ensure that data assets are used and adopted properly, e.g., ensuring that transactional data are accurate and authorizing who can access it.
**A company has budgeted sales of 24,000 finished units for the forthcoming 6-month period. It takes 4 pounds of direct materials to make one finished unit. Given the following:
How many pounds of direct materials should be budgeted for purchase during the 6-month period?
A. 92,000
B. 48,000
C. 88,000
D. 96,000
A. 92,000
Required production of finished units is 22,000 units (target ending inventory of 12,000 + sales of 24,000 – beginning inventory of 14,000 lb.). Thus, 88,000 pounds of direct materials (22,000 × 4 lb. per unit) must be available. Required purchases of direct materials equal 92,000 pounds (target ending inventory of 48,000 + usage of 88,000 – beginning inventory of 44,000).
The fixed assets and related depreciation of a company are currently tracked on a password-protected spreadsheet. The information technology governance committee is designing a new enterprise-wide system and needs to determine whether the current fixed asset process should be included because the current system seems to be working properly. What long-term solution should the committee recommend?
A. Adopting the fixed-asset module of the new system for integration.
B. Continuing to use the current spreadsheet process because there have been no issues in this area.
C. Developing a new fixed-asset system to manage the assets and related depreciation.
D. Purchasing a stand-alone fixed asset program for managing the assets and related depreciation.
A. Adopting the fixed-asset module of the new system for integration.
Adopting a fully integrated fixed-asset module for the new system is the best long-term solution.
The letter x in the standard regression equation is best described as a(n)
A. Dependent variable.
B. Independent variable.
C. Coefficient of determination.
D. Constant coefficient.
B. Independent variable.