When writing a business memorandum, the writer should choose a writing style that achieves all of the following except:

When writing a business memorandum, the writer should choose a writing style that achieves all of the following except:A . Draws positive attention to the writing style.B . Treats all receivers with respect.C . Suits the method of presentation and delivery.D . Develops ideas without overstatement.View AnswerAnswer: A

January 27, 2020 No Comments READ MORE +

During a review of a web-based application used by customers to check the status of their bank accounts, it would be most important for the internal auditor to ensure that:

During a review of a web-based application used by customers to check the status of their bank accounts, it would be most important for the internal auditor to ensure that:A . Access to read application logs is restricted to authorized users.B . Account balance information is encrypted in the database.C...

January 27, 2020 No Comments READ MORE +

Which is the least effective form of risk management?

Which is the least effective form of risk management?A . Systems-based preventive control.B . People-based preventive control.C . Systems-based detective control.D . People-based detective control.View AnswerAnswer: D

January 26, 2020 No Comments READ MORE +

Preferred stock is less risky for investors than is common stock because:

Preferred stock is less risky for investors than is common stock because:A . Common stock pays dividends as a stated percentage of face value.B . Common stock has priority over preferred stock with regard to earnings and assets.C . Preferred dividends are usually cumulative.D . Preferred stock with no conversion...

January 26, 2020 No Comments READ MORE +

For an engineering department with a total quality management program, important elements of quality management include all of the following except:

For an engineering department with a total quality management program, important elements of quality management include all of the following except:A . Basing performance evaluations on the number of projects completed.B . Comparing results with those of other engineering departments.C . Creating a quality council within the engineering department.D ....

January 26, 2020 No Comments READ MORE +

In mergers and acquisitions, which of the following is an example of a horizontal combination?

In mergers and acquisitions, which of the following is an example of a horizontal combination?A . Dairy manufacturing company taking over a large dairy farm.B . A movie producer acquires movie theaters.C . A petroleum processing company acquires an agro-processing firm.D . A baker taking over a competitor.View AnswerAnswer: D

January 26, 2020 No Comments READ MORE +

Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?

Which of the following distinguishes the added-value negotiation method from traditional negotiating methods?A . Each party's negotiator presents a menu of options to the other party.B . Each party adopts one initial position from which to start.C . Each negotiator minimizes the information provided to the other party.D . Each...

January 25, 2020 No Comments READ MORE +

A key advantage of developing a computer application by using the prototyping approach is that it:

A key advantage of developing a computer application by using the prototyping approach is that it:A . Does not require testing for user acceptance.B . Allows applications to be portable across multiple system platforms.C . Is less expensive since it is self-documenting.D . Better involves users in the design process.View...

January 25, 2020 No Comments READ MORE +

Which of the following conflict resolution methods should be applied when the intention of the parties is to solve the problem by clarifying differences and attaining everyone's objectives?

Which of the following conflict resolution methods should be applied when the intention of the parties is to solve the problem by clarifying differences and attaining everyone's objectives?A . Accommodating.B . Compromising.C . Collaborating.D . Competing.View AnswerAnswer: C

January 24, 2020 No Comments READ MORE +

Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?

Which of the following statements is true regarding the use of public key encryption to secure data while it is being transmitted across a network?A . Both the key used to encrypt the data and the key used to decrypt the data are made public.B . The key used to...

January 24, 2020 No Comments READ MORE +