Which of the following price adjustment strategies encourages prompt payment?
Which of the following price adjustment strategies encourages prompt payment?A . Cash discounts.B . Quantity discounts.C . Functional discounts.D . Seasonal discounts.View AnswerAnswer: A
Which of the following costs would be incurred in an inventory stockout?
Which of the following costs would be incurred in an inventory stockout?A . Lost sales, lost customers, and backorder.B . Lost sales, safety stock, and backorder.C . Lost customers, safety stock, and backorder.D . Lost sales, lost customers, and safety stock.View AnswerAnswer: A
If the value-added tax (VAT) rate is 20 percent and the corporate tax rate is 30 percent, which of the following is the amount of VAT that the organization has to pay?
An organization has recorded the following profit and expenses: Profit before interest and tax $200,000 Sales $2,300,000 Purchases of materials $700,000 Interest expenses $30,000 If the value-added tax (VAT) rate is 20 percent and the corporate tax rate is 30 percent, which of the following is the amount of VAT...
Which of the following corporate social responsibility strategies is likely to be most effective in minimizing confrontations with influential activists and lobbyists?
Which of the following corporate social responsibility strategies is likely to be most effective in minimizing confrontations with influential activists and lobbyists?A . Continually evaluate the needs and opinions of all stakeholder groups.B . Ensure strict compliance with applicable laws and regulations to avoid incidents.C . Maintain a comprehensive publicity...
Overall system costs are lower.
Overall system costs are lower.A . 1 and 2 onlyB . 1 and 3 onlyC . 2 and 4 onlyD . 3 and 4 onlyView AnswerAnswer: C
Which of the following would best prevent unauthorized external changes to an organization's data?
Which of the following would best prevent unauthorized external changes to an organization's data?A . Antivirus software, firewall, data encryption.B . Firewall, data encryption, backup procedures.C . Antivirus software, firewall, backup procedures.D . Antivirus software, data encryption, change logs.View AnswerAnswer: A
What are the objectives of governance as defined by the Standards?
What are the objectives of governance as defined by the Standards?A . Inform, direct, manage, and monitor.B . Identify, assess, manage, and control.C . Organize, assign, authorize, and implement.D . Add value, improve, assure, and conform.View AnswerAnswer: A
The ability to test the effectiveness of the control.
The ability to test the effectiveness of the control.A . 1, 2, and 3B . 1, 2, and 4C . 1, 3, and 4D . 2, 3, and 4View AnswerAnswer: C
Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?
Which of the following is always true regarding the use of encryption algorithms based on public key infrastructure (PKI)?A . PKI uses an independent administrator to manage the public key.B . The public key is authenticated against reliable third-party identification.C . PKI's public accessibility allows it to be used readily...
Which of the following is false with regard to Internet connection firewalls?
Which of the following is false with regard to Internet connection firewalls?A . Firewalls can protect against computer viruses.B . Firewalls monitor attacks from the Internet.C . Firewalls provide network administrators tools to retaliate against hackers.D . Firewalls may be software-based or hardware-based.View AnswerAnswer: A