Chapter 04
12 Pages

Chapter 04

Course Number: COM 308, Fall 2010

College/University: St. Leo

Word Count: 2936

Rating:

Document Preview

04 True/False Indicate whether the statement is true or false. ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. The general management of an organization must structure the IT and information security functions to lead a successful defense of the organizations information assets. 2. If you know the enemy and know yourself, you will succumb in every battle." (Sun Tzu) 3. Once the threats have been identified,...

Unformatted Document Excerpt
Coursehero >> Florida >> St. Leo >> COM 308

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Indicate 04 True/False whether the statement is true or false. ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. The general management of an organization must structure the IT and information security functions to lead a successful defense of the organizations information assets. 2. If you know the enemy and know yourself, you will succumb in every battle." (Sun Tzu) 3. Once the threats have been identified, an assets identification process is undertaken. 4. Identifying human resources, documentation, and data information is less difficult than identifying hardware and software assets. 5. You should adopt naming standards that do not convey information to potential system attackers. 6. Comprehensive means that an information asset should fit in only one category. 7. A certificate authority would be categorized as a software security component. 8. Examples of exceptionally grave damage include 1) armed hostilities against the United States or its allies and 2) disruption of foreign relations vitally affecting the national security. 9. You can use only qualitative measures to rank values. ____ 10. Protocols are activities performed within the organization to improve security. ____ 11. With lattice-based access control, the column of attributes associated with a particular object (such as a printer) are referred to as the access control table. ____ 12. Discretionary controls are managed by a central authority in the organization. ____ 13. The results from risk assessment activities can be delivered in a number of ways: a report on a systematic approach to risk control, a project-based risk assessment, or a topic-specific risk assessment. ____ 14. Every organization should have the collective will and budget to manage every threat by applying controls. ____ 15. Organizations should communicate with system users throughout the development of the security program, letting them know that change is occurring. ____ 16. Internal benchmarking can provide the foundation for baselining. ____ 17. One problem with benchmarking is that there are many organizations that are identical. ____ 18. A best practice proposed for a small home office setting is always appropriate to help design control strategies for a multinational company. ____ 19. Best business practices are often called recommended practices. ____ 20. Metrics-based measures are generally less focused on numbers and more strategic than process-based measures. ____ 21. The CBA is solely based on the cost of the proposed control. ____ 22. The amount of money spent to protect an asset is often based in part on the value of the asset. ____ 23. The components of asset valuation include equipment critical to the success of the organization. ____ 24. The value of intellectual property influences asset valuation. ____ 25. When selecting a risk control strategy, one should consider if potential loss could be substantial. ____ 26. Leaving unattended computers on is one of the top information security mistakes made by individuals. ____ 27. Risk control involves selecting an appropriate risk control strategy for each vulnerability. ____ 28. If every vulnerability identified in the organization is handled through mitigation, it may reflect an organizations inability to conduct proactive security activities and an apathetic approach to security in general. ____ 29. Eliminating a threat is an impossible proposition. ____ 30. Some argue that it is virtually impossible to determine the true value of information and information-bearing assets accurately. Modified True/False Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true. ____ 31. Risk control is the process of examining and documenting the security posture of an organizations information technology and the risks it faces. _________________________ ____ 32. Establishing a competitive business model, method, or technique allows an organization to provide a product or service that is superior and creates a(n) competitive advantage. _________________________ ____ 33. Mutually exclusive means that all information assets must fit in the list somewhere. _________________________ ____ 34. One way to determine which information assets are critical is by evaluating how much of the organizations revenue depends on a particular asset. _________________________ ____ 35. Each of the threats must be examined to assess its potential to endanger the organization and explore ways to reduce the risk it poses. This examination is known as a threat profile. _________________________ ____ 36. Risk evaluation assigns a risk rating or score to each information asset. _________________________ ____ 37. Likelihood risk is the risk that remains to the information asset even after the existing control has been applied. _________________________ ____ 38. Policies are documents that specify an organizations approach to security. _________________________ ____ 39. In a(n) task-based access control, users are assigned a matrix of authorizations for particular areas of access. _________________________ ____ 40. The most common of the mitigation procedures is the disaster recovery plan. _________________________ ____ 41. Transference is the control approach that attempts to shift the risk to other assets, other processes, or other organizations. _________________________ ____ 42. A(n) Disaster Recovery plan dictates the actions an organization can and perhaps should take while an incident is in progress. _________________________ ____ 43. Benefit is the value that an organization realizes by using controls to prevent losses associated with a specific vulnerability. _________________________ ____ 44. A(n) exposure factor is the expected percentage of loss that would occur from a particular attack. _________________________ ____ 45. ALE determines whether or not the control alternative being evaluated is worth the associated cost incurred to control the specific vulnerability. _________________________ ____ 46. Qualitative-based measures are comparisons based on numerical standards, such as numbers of successful attacks. _________________________ ____ 47. Within best practices, the optimum standard is a subcategory of practices that are typically viewed as the best of the best. _________________________ ____ 48. Security efforts that seek to provide a superior level of performance in the protection of information are referred to as best business practices. _________________________ ____ 49. In information security, benchmarking baselining is the comparison of security activities and events against the organizations future performance. _________________________ ____ 50. Operational feasibility is also known as behavioral feasibility. _________________________ ____ 51. Within organizations, technical feasibility defines what can and cannot occur based on the consensus and relationships between the communities of interest. _________________________ ____ 52. Risk measure defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility. _________________________ ____ 53. Major risk is a combined function of (1) a threat less the effect of threat-reducing safeguards, (2) a vulnerability less the effect of vulnerability reducing safeguards, and (3) an asset less the effect of asset value-reducing safeguards. _________________________ ____ 54. A(n) qualitative assessment is based on characteristics that do not use numerical measures. _________________________ ____ 55. When the organization is pursuing an overall risk management program, it requires a(n) systematic report that enumerates the opportunities for controlling risk. _________________________ Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 56. Risk ____ is the process of applying safeguards to reduce the risks to an organizations data and information systems. a. management c. identification b. control d. security ____ 57. The concept of competitive ____ refers to the need to avoid falling behind the competition. a. disadvantage c. failure b. advantage d. benefit ____ 58. The first phase of risk management is ____. a. risk identification c. risk control b. design d. risk evaluation ____ 59. ____ addresses are sometimes called electronic serial numbers or hardware addresses. a. HTTP c. DHCP b. IP d. MAC ____ 60. When deciding which information assets to track, which of the following asset attributes should be considered? a. People c. Data b. Procedures d. All of the above ____ 61. A(n) ____ is an authorization issued by the equipment manufacturer for the repair, modification, or update of a piece of equipment that is already in service a. IP c. CTO ____ 62. ____ 63. ____ 64. ____ 65. ____ 66. ____ 67. ____ 68. ____ 69. ____ 70. ____ 71. ____ 72. ____ 73. ____ 74. b. FCO d. HTTP In a(n) _____, each information asset is assigned a score for each critical factor. a. OPSEC c. weighted factor analysis b. COMSEC d. data classification scheme The military uses a(n) _____-level classification scheme. a. three c. five b. four d. six In the U.S. military classification scheme, ____ data is any information or material the unauthorized disclosure of which reasonably could be expected to cause damage to the national security. a. confidential c. top secret b. secret d. sensitive Management of classified data includes its storage and ____. a. distribution c. destruction b. portability d. All of the above There are individuals who search trash and recycling a practice known as ____ to retrieve information that could embarrass a company or compromise information security. a. side view c. recycle diving b. dumpster diving d. garbage collection ____ equals likelihood of vulnerability occurrence times value (or impact) minus percentage risk already controlled plus an element of uncertainty. a. Probability c. Possibility b. Risk d. Chance The ____ security policy is an executive-level document that outlines the organizations approach and attitude towards information security and relates the strategic value of information security within the organization. a. general c. issue-specific b. agency d. system-specific The ____ security policy is a planning document that outlines the process of implementing security in the organization. a. program c. issue-specific b. agency d. system-specific Access controls can be ____. a. mandatory c. discretionary b. nondiscretionary d. All of the above In a lattice-based access control structure, the row of attributes associated with a particular subject (such as a user) is referred to as a(n) ____. a. access control list c. lattice table b. capabilities table d. mandatory list ____ are implemented at the discretion or option of the data user. a. c. DAC NAC b. MAC d. SAC The actions an organization can and perhaps should take while the incident is in progress should be defined in a document referred to as the ____. a. BCP c. IRP b. DRP d. BRP ____ usually include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the floodwaters recede. a. IRPs c. BCPs b. DRPs d. BRPs ____ 75. ____ is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation. a. Avoidance of risk c. Mitigation b. Transference d. Acceptance of risk ____ 76. The formal process used in decision making regarding the adoption of specific controls is called a(n) ____. a. ARO c. ALE b. CBA d. SLE ____ 77. The probability of a threat occurring is usually a loosely derived table indicating the probability of an attack from each threat type within a given time frame. This value is commonly referred to as the ____. a. ARO c. ALE b. CBA d. SLE ____ 78. When organizations adopt levels of security for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as a(n) ____. a. due diligence c. golden standard b. best practices d. standard of due care ____ 79. ____ feasibility addresses user acceptance and support, management acceptance and support, and the overall requirements of the organizations stakeholders. a. Organizational c. Operational b. Technical d. Political ____ 80. Risk ____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility. a. benefit c. acceptance b. appetite d. avoidance Completion Complete each statement. 81. ____________________ requires two major undertakings: risk identification and risk control. 82. ____________________ is the process of identifying vulnerabilities in an organizations information systems and taking carefully reasoned steps to ensure the confidentiality, integrity, and availability of all the components in the organizations information system. 83. ____________________ are defined as information and the systems that use, store, and transmit information. 84. For hardware devices, the ____________________ number can uniquely identify a specific device. 85. You can calculate the relative importance of each asset using a straightforward process known as ____________________ analysis. 86. Georgia-Pacific Corporation uses a corporate data classification ____________________ throughout the company that helps secure confidentiality and integrity of information. 87. Overriding an individual employees security ____________________ requires that the need-to-know standard be met. 88. A(n) ____________________ desk policy requires that employees secure all information in appropriate storage containers at the end of each day. 89. You can assess the relative risk for each of the vulnerabilities by a process called risk ____________________. 90. ____________________ is the probability that a specific vulnerability within an organization will be successfully attacked. 91. Security ____________________ are the technical implementations of the policies defined by the organization. 92. A(n) ____________________ control specifically addresses admission of a user into a trusted area of the organization. 93. ____________________ access controls are implemented at the discretion or option of the data user. 94. ____________________ is the risk control strategy that attempts to prevent the exploitation of the vulnerability. 95. ____________________ is the control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation. 96. Of the three types of mitigation plans, the ____________________ plan is the most strategic and long term. 97. Cost ____________________ is the process of avoiding the financial impact of an incident by implementing a control. 98. Asset ____________________ is the process of assigning financial value or worth to each information asset. 99. A single loss ____________________ is the calculation of the value associated with the most likely loss from an attack. 100. ____________________ is the process of seeking out and studying the practices used in other organizations that produce results you would like to duplicate in your organization. 101. The difference between an organizations measures and those of others is often referred to as a performance ____________________. 102. Due ____________________ is the demonstration that the organization is diligent in ensuring that the implemented standards continue to provide the required level of protection. 103. A(n) ____________________ is a value or profile of a performance metric against which changes in the performance metric can be usefully compared. 104. Operational ____________________ addresses user acceptance and support, management acceptance and support, and the overall requirements of the organizations stakeholders. 105. Behavioral feasibility is also known as ____________________. Essay 106. Describe five new subdivisions of information system components of SecSDLC/risk management. 107. Describe several different types of access controls. 108. List seven key areas identified by Microsoft as best security practices for home users. 04 Answer Section TRUE/FALSE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: Register to View AnswerF F F T F T T F F F F T F T F F F T F F T T T T T T F F T PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 116 118 119 122 122 124 124 130 134 141 142 142 163 162 161 159 159 157 156 155 151 151 125 127-128 150 147 149 149 145 151-152 MODIFIED TRUE/FALSE 31. Register to View Answeridentification PTS: 1 REF: 117 32. Register to View Answer33. Register to View AnswerComprehensive PTS: 1 REF: 124 PTS: 1 REF: 116 34. Register to View Answer35. Register to View Answerassessment PTS: 1 REF: 134 36. Register to View Answerassessment PTS: 1 37. Register to View AnswerResidual PTS: 1 38. Register to View Answer39. Register to View Answerlattice REF: 139 REF: 141 PTS: 1 REF: 126 PTS: 1 REF: 141 PTS: 1 REF: 142 40. Register to View Answer41. Register to View Answer42. Register to View AnswerIncident Response PTS: 43. ANS: 44. ANS: 45. ANS: 1 T T F, CBA REF: 147 PTS: 1 PTS: 1 REF: 147 REF: 146 PTS: 1 PTS: 1 REF: 153 REF: 151 REF: 152 PTS: 1 46. Register to View AnswerMetrics Quantitative PTS: 1 47. Register to View Answergold REF: 154-155 PTS: 1 REF: 157 48. Register to View Answer49. Register to View Answerbaselining PTS: 1 50. Register to View Answer51. Register to View Answerpolitical PTS: 1 52. Register to View Answerappetite PTS: 1 53. Register to View AnswerResidual PTS: 1 54. Register to View Answer55. Register to View AnswerREF: 159 PTS: 1 REF: 156 PTS: 1 REF: 161 REF: 162 REF: 162-163 PTS: 1 PTS: 1 REF: 160 REF: 154 REF: 163 MULTIPLE CHOICE 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: Register to View AnswerA A D D B C C A D B B A A D B A C B D B A D C B PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 117 116 117 122 120-121 123 128 129 129 131 132 140 141 141 141 142 142 147 147-148 149 151 153 156 160 162 COMPLETION 81. ANS: Risk management PTS: 1 REF: 117 82. ANS: Risk management PTS: 1 83. ANS: Assets PTS: 1 84. ANS: electronic serial MAC address REF: 117 REF: 118 PTS: 1 REF: 122 85. ANS: weighted factor PTS: 1 86. ANS: scheme PTS: 1 87. ANS: clearance PTS: 1 88. ANS: clean PTS: 1 89. ANS: assessment PTS: 1 90. ANS: Likelihood REF: 128 REF: 129 REF: 131 REF: 132 REF: 139 PTS: 1 REF: 140 91. ANS: technologies PTS: 1 92. ANS: access REF: 141 PTS: 1 REF: 141 93. ANS: Discretionary PTS: 1 94. ANS: Avoidance PTS: 1 95. ANS: Mitigation REF: 142 REF: 145 PTS: 1 REF: 147 96. ANS: BC Business Continuity BC (business continuity) business continuity (BC) PTS: 1 97. ANS: avoidance PTS: 1 98. ANS: valuation PTS: 1 99. ANS: expectancy REF: 148 REF: 151 REF: 151 PTS: 1 REF: 152 100. ANS: Benchmarking PTS: 1 101. ANS: gap PTS: 1 102. ANS: diligence PTS: 1 103. ANS: baseline PTS: 1 104. ANS: feasibility REF: 155 REF: 155 REF: 156 REF: 159 PTS: 1 REF: 160 105. ANS: operational feasibility PTS: 1 ESSAY 106. ANS: People include employees and nonemployees. Procedures fall into two categories: IT and business standard procedures, and IT and business sensitive procedures. Data components have been expanded to account for the management of information in all states: transmission, processing, and storage. Software components can be assigned to one of three categories: applications, operating systems, or security components. Hardware is assigned to one of two categories: the usual systems devices and their peripherals, and the devices that are part of information security control systems. Hardware components have been separated into two categories: devices and peripherals, and networks. PTS: 1 REF: 120-121 107. ANS: Access controls can be mandatory, nondiscretionary, or discretionary. Mandatory access controls (MACs): MACs are structured and coordinated with a data classification scheme. Mandatory access controls give users and data owners limited control over access to information resources. Nondiscretionary controls are managed by a central authority in the organization and can be based on an individuals role role-based controls or a specified set of tasks the individual is assignedtask-based controls. Task-based controls can also be based on lists maintained on subjects or objects. Role-based controls are tied to the role a user performs in an organization, and task-based controls are tied to a particular assignment or responsibility. Discretionary access controls (DAC): Discretionary access controls are implemented at the discretion or option of the data user. The ability to share resources in a peer-to-peer configuration allows users to control and possibly provide access to information or resources at their disposal. PTS: 1 REF: 141-142 108. ANS: 1. Use antivirus software. REF: 160 2. Use strong passwords. 3. Verify your software security settings. 4. Update product security. 5. Build personal firewalls. 6. Back up early and often. 7. Protect against power surges and loss. PTS: 1 REF: 158

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

St. Leo - COM - 308
05True/False Indicate whether the statement is true or false. _ _ _ _ _ _ _ _ _ 1. A standard is a plan or course of action used to convey instructions from an organizations senior-most management to those who make decisions, take actions, and perform ot
St. Leo - COM - 308
06True/False Indicate whether the statement is true or false. _ _ _ _ _ _ _ _ _ 1. Firewalls can be categorized by processing mode, development era, or structure. 2. The firewall can often be deployed as a separate network containing a number of supporti
St. Leo - COM - 308
07True/False Indicate whether the statement is true or false. _ _ _ 1. IDPS responses can be classified as active or passive. 2. A passive response is one in which a definitive action is initiated when certain types of alerts are triggered. 3. The Simple
St. Leo - COM - 308
08True/False Indicate whether the statement is true or false. _ _ _ _ _ _ _ _ _ 1. Hashing functions require the use of keys. 2. When an asymmetric cryptographic process uses the senders private key to encrypt a message, the senders public key must be us
St. Leo - COM - 308
09True/False Indicate whether the statement is true or false. _ _ _ _ _ _ _ _ _ 1. A name badge is typically worn concealed. 2. Locks can be divided into four categories based on the triggering process: manual, programmable, electronic, and biometric. 3.
St. Leo - COM - 308
10True/False Indicate whether the statement is true or false. _ _ _ _ _ _ _ _ _ 1. Weak management support, with overdelegated responsibility and no champion, sentences the project to almost-certain failure. 2. Unfreezing in the Lewin change model involv
St. Leo - COM - 308
11True/False Indicate whether the statement is true or false. _ _ _ _ _ _ _ _ _ 1. The general management community of interest must work with the information security professionals to integrate solid information security concepts into the personnel mana
St. Leo - COM - 308
12True/False Indicate whether the statement is true or false. _ _ _ _ _ _ _ _ _ 1. If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment, the existing security improvement program
Art Inst. San Diego - ECON - 101
TheFEARGaugeAnIntroductiontotheVolatility Index byAmyAckersWhatistheVolatilityIndex?BriefOverview Markettoolforinvestors Def:Indexofimpliedvolatilityofeightput/call options,nearthemoneyandsecondnearthe money,fortwostatedstrikepricesgivenbythe S&P100Op
N.E. Illinois - ACTG - 310
Chapter 1Introduction to Federal Taxation2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.comChapter 1 Exhibits1. 2. 3. 4. 5. 6. 4 Major Types of Federal Taxes Tax Revenue Statistics Tax Avoidance
N.E. Illinois - ACTG - 310
Chapter 3Individual Taxation An Overview2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.comChapter 3 Exhibits1. 2. 3. 4. 5. 6. 7. 8. 9. Federal Tax Formula Gross Income Examples of For AGI Deduct
N.E. Illinois - ACTG - 310
Chapter 4Gross Income2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.comChapter 4 Exhibits1. 2. 3. 4. 5. 6. 7. 8. 9. Constructive Receipt Doctrine Community Property Income Items Included in Gros
N.E. Illinois - ACTG - 310
Chapter 5Gross Income Exclusions2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.comChapter 5 Exhibits1. 2. 3. 4. 5. 6. 7. 8. 9. Social Security Benefits Interest on U.S. Savings Bonds EE Bonds Us
Ill. Chicago - ACTG - 516
FSA 09 Fa MidT 1Ram T. S. Ramakrishnan 2301, University Hall, 312 996-3270 rramakri@uic.eduhttp:/www.uic.edu/classes/actg/actg516rtr/Open Book and Notes October 19, 2009 MondayShow all your work in the answer sheets. You will not get credit for a righ
Ill. Chicago - ACTG - 516
FedEx 09 Analysis 1Fedex Corporation Consolidated Statements of Cash FlowsNet income a b c d Depreciation and amortization Total goodwill amortized in 2009 was $ Total Intangible assets amortized in 2009 was $ a-b-c Depreciation 1,975 120 98 1,75710030
Ill. Chicago - ACTG - 516
Ill. Chicago - ACTG - 516
Ill. Chicago - ACTG - 516
Procter and Gamble Solution1 of 5A. The Max Factor acquisition effect must be removed as the purchase is an investing activitydoes not affect operations.Consolidated Statement of Cash FlowsYears Ended June 30 (Millions of Dollars Except Per Share Amo
Ill. Chicago - ACTG - 516
Ill. Chicago - ACTG - 516
Walgreen 2009 1Ram T. S. Ramakrishnan 2303, University Hall, 996-3270 rramakri@uic.edu http:/www.uic.edu/classes/actg/actg516rtr/ March 11, 2010 ThursdayOpen Book and NotesShow all your work in the answer sheets. You will not get credit for a right ans
Ill. Chicago - ACT - 516
Walgreen 2009 Analysis 11 1In Millions, Except Per Share Data 1003181Cash flow from operating activities Net Earnings Depreciation and amortization Change in Accounts receivable, net Inventories Other current assets Trade accounts payable Accrued expe
Ill. Chicago - ACTG - 585
0ba89c7d54989c4728b4dc7b68faef24cf4f82f1.xls EXHIBIT 1 - Excerpts from The Gap's 1991 Annual Report CONSOLIDATED BALANCE SHEETS [$000] February 1, 1992 ASSETS Current Assets Cash and equivalents Accounts receivable Merchandise inventory Prepaid expenses a
Ill. Chicago - ACTG - 585
56f69efaf45e058293bd92c26a70b99f3a8e889f.xls EXHIBIT 1 - Excerpts from The Gap's 1991 Annual Report CONSOLIDATED BALANCE SHEETS [$000] February 1, 1992 ASSETS Current Assets Cash and equivalents Accounts receivable Merchandise inventory Prepaid expenses a
Ill. Chicago - ACTG - 585
97def5cb910c411ae7085fd8a57bfcfd2d0c0f89.xls EXHIBIT 1 - Excerpts from The Gap's 1991 Annual Report CONSOLIDATED BALANCE SHEETS [$000] February 1, 1992 ASSETS Current Assets Cash and equivalents Accounts receivable Merchandise inventory Prepaid expenses a
Ill. Chicago - ACTG - 585
ad14b84d99c6279ffae3c51c4f72b2a2ed819b19.xls EXHIBIT 1 - Excerpts from The Gap's 1991 Annual Report CONSOLIDATED BALANCE SHEETS [$000] February 1, 1992 ASSETS Current Assets Cash and equivalents Accounts receivable Merchandise inventory Prepaid expenses a
Ill. Chicago - ACTG - 516
Chapter 1 - SolutionsOverview: Problem Length cfw_S 1 to 23 [M] 24 1.cfw_S(i) Problem #sShort-term lenders are concerned primarily with liquidity. Accounting standards would focus primarily on near-term cash flows and might include cash flow forecasting
Ill. Chicago - ACTG - 516
Chapter 2 SolutionsOverview: Problem Length cfw_S cfw_M 1.cfw_S(i) Problem #s 1, 2, 4 - 11, 15, 16, and 18 - 20 3, 12 - 14, 17, and 21 - 23When the product is a commodity with a known price and liquid market.(ii) When collection is assured because the
Ill. Chicago - ACTG - 516
Chapter 3 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_Sa. Problem #s 1, 3 2, 7, 8, 12, 13 4 - 6, 9 - 11, 14, 15Palomba Pizza Stores Statement of Cash Flows Year Ended December 31, 2000Cash Flows from Operating Activities: Cash Collectio
Ill. Chicago - ACTG - 516
Chapter 4 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_S a. The identical amount is subtracted from both numerator (CA) and denominator (CL). Since the ratio (before subtraction) is greater than 1 , the effect will be to increase the ratio.
Ill. Chicago - ACTG - 516
Chapter 5 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 1,4,5,6,12-15 2,3,7,8,10,11 9NOTE: The problems in this chapter are designed primarily as a basis for discussion of the issues covered in this chapter. There are no absolutely ri
Ill. Chicago - ACTG - 516
Chapter 7 SolutionsOverview: Problem Length cfw_S cfw_M cfw_M cfw_L 1.cfw_M Problem #s 2, 3, 5, 8, and 10 1, 4, 6, 7, 9, 11, 12, and 13 Appendices 7A-1 and 7B-1 7A-2 and 7B-2Exhibit 7S-1 contains the calculations required.Exhibit 7S-1. Chevron Adjustme
Ill. Chicago - ACTG - 516
Chapter 8 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 2, 4, 5, 6, 7, 8, 9 and 15. 1, 3, 10, 12, 13, 14 and 16. 11 and 8A-1.1.cfw_M(i) Straight-line depreciation (ii) Sum-of-years digits Depreciable base Sum-of-yearsdigits Year 1 2 3 4
Ill. Chicago - ACTG - 516
Chapter 8 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 2, 4, 5, 6, 7, 8, 9 and 15. 1, 3, 10, 12, 13, 14 and 16. 11 and 8A-1.1.cfw_M(i) Straight-line depreciation (ii) Sum-of-years digits Depreciable base Sum-of-yearsdigits Year 1 2 3 4
Ill. Chicago - ACTG - 516
Chapter 9 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 1 - 4, 6, 11, 15 5, 7 - 9, 13, 14, 16 10, 121.cfw_SDeferred taxes can be found in all of the categories listed. Examples are: (i) Current liabilities may include deferred tax liabi
Ill. Chicago - ACTG - 516
Chapter 9 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 1 - 4, 6, 11, 15 5, 7 - 9, 13, 14, 16 10, 121.cfw_SDeferred taxes can be found in all of the categories listed. Examples are: (i) Current liabilities may include deferred tax liabi
Ill. Chicago - ACTG - 516
Chapter 10 - SolutionsOverview: Problem Length cfw_S cfw_M 1.cfw_Sa. Problem #s 1 - 2, 6 - 22, and 25 3 - 5, and 23 - 24When full-coupon debt is issued, interest paid reduces cash from operations (CFO). When zero-coupon debt is issued, however, no cash
Ill. Chicago - ACTG - 516
Chapter 11 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_S(i) Problem #s 1 - 4, 9, 11, 12, 15, 16, 21, 22 5, 7, 8, 10, 13, 14, 17, 18, 20, 23, 24 6, 19, 25Interest expense = 12% x $10,000 (beginning balance of lease obligation) = $1,200.(ii
Ill. Chicago - ACTG - 516
Chapter 12 SolutionsProblem Overview cfw_S cfw_M cfw_L 1.cfw_Sa. Problem #s 1, 6, 9 - 11, 13, 15, 18, 22 4, 5, 8, 12, 16, 19, 21 2, 3, 7, 14, 17, 20The effect of an increase in the discount rate: (i) The projected benefit obligation (PBO) will decrease
Ill. Chicago - ACTG - 516
Chapter 13 SolutionsOverview: Problem Length: cfw_S cfw_M cfw_L 1.cfw_Ma. (i) Problem #s 4, 8, 11, 14 1, 5, 6, 12, 15 2, 3, 7, 9, 10, 13, 16 Dividend income: X: Z: Total $10,000 (100,000 x $.10) 0 $10,000Dividends are not recorded as income for Y (40% o
Ill. Chicago - ACTG - 516
Chapter 14 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_Ma. Problem #s 6 - 11 1-5 12 - 13Martin Sales (Amounts in $millions) Method Purchase method Pooling method 2000 $435 $525 ($435 + $90) 2001 $610 ($550 + $60) $670 ($550 + $120) 2002
Ill. Chicago - ACTG - 516
Chapter 16 - SolutionsOverview: Problem Length cfw_S cfw_M 1.cfw_Sa. Problem #s 1-4, 7-9 10Because their stated interest rate remained constant at 6.5% on both 12/31/00 and 12/31/01, the Notes due 8/12/02 must be the fixed rate notes. The stated interes
Ill. Chicago - ACTG - 516
Chapter 18 - SolutionsOverview: Problem Length cfw_S cfw_M Problem #s 3,7 1, 2, 4 - 6, 8 - 10Problems 1-3 deal with the takeover of Kraft by Philip Morris. If assigned together, they would require approximately 1 1/2 hrs of work.1.cfw_Ma. Pretax intere
Ill. Chicago - ACTG - 516
Chapter 19 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 1, 2, 15,16,17 3,4,5, 7, 10,11,12, 14 6, 8, 9, 131.cfw_SThe models should give identical results. Using 2003 expected dividends of $4.50, a discount rate r of 20%, and growth ra
Ill. Chicago - ACTG - 516
CASE 1-1 Analysis of Contingent Obligation: Bristol-Myers SquibbINTRODUCTIONIn 1992, Bristol-Myers Squibb [BMY], a major U.S. based drug company, reported substantial litigation against the company by recipients of breast implants manufactured and sold
Ill. Chicago - ACTG - 516
Chapter 6 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_Sa. Problem #s 1, 2, 7, 14, 15, 17, 19 - 23 3, 4, 10 - 13, 16, 18, 24 5, 6, 8, 9Start with the basic inventory relationship BI + P = COGS + EI Opening inventory Purchases Total (i) 40
Ill. Chicago - ACTG - 516
Chapter 15 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_Ma. Problem #s 4, 5, 7, 12 1 - 3, 6, 9, 10, 13 -15 8, 11Because the functional currency of Nippon MT is the yen, the current rate method should be used to translate the yen financial
N.E. Illinois - MNGT - 377
136 Instructor's Manual 1Chapter 7Statistical Inference and SamplingCHAPTER OVERVIEW AND OBJECTIVES Chapter 6 introduced several continuous probability distributions, including the very important normal distribution. In this chapter, the use of the nor
Clemson - CHEM - 101
Project 17: Soaps and Detergents Final Lab Report Briana Ply Chemistry 102 Laboratory, Section 42 Instructor: Bradley Stadelman February 23, 2010My signature indicates that this document represents my own work. Outside of shared data, the information, th
Clemson - CHEM - 224
Project 7: Acids and Bases Final Lab Report Briana Ply Chemistry 102 Laboratory, Section 42 Instructor: Bradley Stadelman April 6, 2010My signature indicates that this document represents my own work. Outside of shared data, the information, thoughts and
Kaplan University - BUSINESS - GB520
Strategic Human Resource Management at InfosysCase AnalysisThomas N. Bailey2/1/2011Kaplan University GB520 Term 1101D Unit 21. IntroductionInfosys is a software company based out of India. It had a humble beginning in 1981, but by March 2003, revenu
Kaplan University - BUSINESS - GB520
Heidrick & Struggles International, Inc.Case AnalysisThomas N. Bailey2/8/2011Kaplan University GB520 Term 1101D Unit 31. IntroductionHeidrick & Struggles International, Inc. is one of the largest U.S. recruiting firms. The company has approximately
ITESM - MECHATRONI - 001
MRAC+HFaultTolerantControlfor LinearParameterVaryingSystemsClicktoeditMastersubtitlestyle AdrianaVargasMartnezVicenPuig LuisE.GarzaCastan RubenMoralesMenendez3/10/11IntroductionThe main intention of this work is to develop apassivestructureofFTCable
N. Arizona - GOVERNMENT - 101
Name: In this next unit we will be taking closer look at political socialization and voting. In order to give you a better understanding of the people who live in the U.S. you will be looking at information found in the following website: http:/ show.mapp
N. Arizona - GOVERNMENT - 101
Living Room Candidate AnalysisLivingRoomCandidateComputerLabAssignmentDIRECTIONS:WelcometotheLivingRoomCandidate,whereTVpoliticaladvertisingisanalyzedfrom1952 2004.a. Accesswww.livingroomcandidate.org b. Youwillanalyzefiveadvertisements,twoareselectedf
N. Arizona - GOVERNMENT - 101
Living Room Candidate AnalysisLiving Room Candidate Computer Lab Assignment DIRECTIONS: Welcome to the Living Room Candidate, where TV political advertising is analyzed from 1952-2004. a. Access www.livingroomcandidate.org b. You will analyze five advert
N. Arizona - GOVERNMENT - 101
Name: In this next unit we will be taking closer look at political socialization and voting. In order to give you a better understanding of the people who live in the U.S. you will be looking at information found in the following website: http:/ show.mapp
N. Arizona - GOVERNMENT - 101
United States President AP Government You are going to do a small amount of research on the presidents of the United States. Make the following lists and answer the following questions. Dont get bogged down in detail.1.Write a list of the presidents, in
University of Phoenix - MANAGEMENT - 520
Problem Solution: Intersect Investments1Intersect Investments Transformational LeadershipProblem Solution: Intersect Investments Since September 11, 2001, financial service organizations have struggled to maintain existing clientele and gain additional
CUNY Baruch - MARKETING - 101
AdvertisingMiriam Reynoso Mercy College Curtis Abel Assignment#1 December 8, 2010#Print AdSince the first time I saw this ad, I completely fell in love. This ad is part of a Nike campaign that have as main focus different parts of the body that women a
UBC - ECON - 302
ECON 302 1.SAMPLE MIDTERM QUESTIONSA non-parallel shift in the production function implies: a. b. c. d. only a substitution effect only a wealth effect both a wealth and substitution effect * that the marginal product of labour schedule stays in its ori
UOIT - ENGR - 2680
Problems 1)2)3)4)Solutions 1) The air in an insulated, rigid compressed-air tank is released until the pressure in the tank reduces to a specified value. The final temperature of the air in the tank is to be determined. Assumptions 1 This is an unstea