Which risks should be given the highest priority?
Which risks should be given the highest priority?A . Risks which have a high impact and have a low likelihood of arising.B . Risks which have a low impact but which arise frequently.C . Risks which have a low impact and a low likelihood of arising.D . Risks which have...
The shares of a company have a beta factor of 1.15. Therefore, which of the following must be true?
The shares of a company have a beta factor of 1.15. Therefore, which of the following must be true?A . The shares have more unsystematic risk than the stock market average.B . The shares have more systematic risk than the stock market average.C . The shares have more total risk...
Which method of quantifying risk exposure can be used to calculate the maximum loss on a portfolio occurring within a period of time with a given probability?
Which method of quantifying risk exposure can be used to calculate the maximum loss on a portfolio occurring within a period of time with a given probability?A . Value at RiskB . Regression analysisC . SimulationD . Expected valueView AnswerAnswer: D
How should the finding from this post completion audit be interpreted?
YGH has recently completed a post completion audit on a five year contract that has only recently come to a conclusion. The main finding was that the project delivered most of the expected benefits, but that it cost significantly more to implement than had been anticipated at the project appraisal...
Which TWO of the following statements about budgets suggest that they should not always be used to measure performance?
Achieving the budget is often used as a good performance measure. However, there are problems with budgets which may mean they are not always good measures of performance. Which TWO of the following statements about budgets suggest that they should not always be used to measure performance?A . Budgets may...
Which THREE of the following are characteristics of a Firewall?
A Firewall is an element of a company's Information Technology infrastructure. Which THREE of the following are characteristics of a Firewall?A . A Firewall determines the boundary of the "Trusted" components of the company's Information Technology infrastructure.B . A Firewall protects sensitive data against accidental or malicious damage.C . A...
You have just been appointed Financial Controller of Y, a marketing consultancy.
You have just been appointed Financial Controller of Y, a marketing consultancy. You are in a meeting with the Chief Executive Officer (CEO) of Y, and have been discussing the need for a major upgrade of all the information systems throughout Y, as they are all very old. Knowing that...
Which of the following statements are correct?
Which of the following statements are correct?A . It is always possible to remove all risks when undertaking large projects.B . If a project has high risks it should always be accepted as the rewards will always be high.C . If a project has low risks it will usually have...
Which TWO of the following changes would be most likely to improve the overall control system?
CW is a large company in the food production industry. It has grown over the years by the acquisition of several smaller rivals CW has ten branches located in its home country and has just opened a foreign branch for the first time It has recently made some changes to...
What are the likely consequences of the new Sales Director's policy?
M plc is an IT company that bids for large contracts to sell computer systems and also to service existing systems. M plc's senior management has always set budgets which are hard to achieve and have made no allowances for the recession. The economy has improved and M plc's senior...