In: Other Topics

Submitted By Spopal
Words 3073
Pages 13
Financial Accounting and Information Systems
Exam 2
Fall 2010

True/False (1 point)

1) According to GAAP revenue recognition criteria, in order for revenue to be recognized on the income statement, it must be earned and realized (realizable).T

2) Realized gains and losses on investments classified as trading securities are reported in a company's net income in the period that they are realized.

3) Accounts receivable (net) reported in the current asset section of a company's balance sheet represents the total amount owed by customers within the next year. F

4) In 2009, Dow Chemical Corporation plans to build a laboratory dedicated to a special project. The company will not use the laboratory after the project is finished. Under GAAP, this laboratory should be expensed.

5) Unearned revenue, a current operating liability, arises when a company receives cash before any goods are delivered or services are rendered. T

6) Contingent liabilities that are "probable" can be reasonably estimated are recorded on the balance sheet as a liability and as an expense in the income statement. T

7) For an item to be classified as extraordinary, it needs to be both unusual and infrequent. However, there is an exception for material items - for one-time items that are extremely large, firms have the option of classify these items as extraordinary to provide better information to investors.

8) LIFO inventory costing yields more accurate reporting of the inventory balance on the balance sheet.F

9) Available-for-sale is the only classification that requires fair-value accounting.F

10) For tax purposes, companies typically transfer more of the asset's cost from the balance sheet to the income statement in the earlier years of the asset's life. This is called accelerated depreciation and it is a benefit to the company. Thus, companies record deferred tax…...

Similar Documents

Ef3333 Assignment1

...Assignment1 1. A change in interest rate will affect the cost of borrowing, the income generated from tangible assets and stock’s value that the financial institution owns that will lead to profits or losses as a result. 2. The Federal Reserve’s Policies such as monetary policy could affect interest rates, inflation, and the supply of the money. These three factors are directly related to the profitability of financial companies. So the managers care so much about the Fed activities. 3. The family members are closed to you than a stranger. You could know the credibility of the family members but not the strangers. Under the asymmetric information, you can reduce the risk of being bad debt by borrowing the money to family members instead of the strangers. 4. The nominal interest rate=2%+6%=8%. At the end of one year, I will have $1080 in account ($1000*1.08). At that time, the stereo will sell for $1050*1.06=$1113. I don’t have enough money to buy it. I still need $33 ($1113-1180=$33) in order to buy it. 5. Years Cash payment PV OF CP Weights Weighted maturity 1 60 56.07 5.76 0.06 2 60 52.41 5.38 0.11 3 1060 865.28 88.86 2.67 973.73 Duration 2.83 The expected price changes if interest rate drops to 6.75%: %△P = -2.83*(-0.0025/1+0.07)=0.0066=0.66% 6. It will increase the interest rates if prices in the bond market become volatile,. Since the price volatility in bond market will increase the risks of investing bonds, the demand for bonds will fall...

Words: 377 - Pages: 2


...Problem Definition: The problem here is to calculate the usable area in square feet of house. We are to assume that the house has a maximum of four rooms, and that each room is rectangular. Problem Analysis Objective: Devise a program that calculates the usable area of a house. This is minimally what is being requested. • Outputs: This problem calls for a simple output, the total usable square foot of the house, with a maximum of four rooms, each room being rectangular. Total number of square foot = Area of Room1 + Area of Room2 + Area of Room3 + Area of Room4 • Inputs: The problem will require us to know the length and width of each of the four rectangular rooms in order to compute the correct output, the total number of square foot. The length multiplied by the width of each of the four rectangular rooms will give us area of each room. We will receive these data points by measuring the dimensions of the room. Length1 x Width1 = Area of Room1 • Calculation Approach: In order to calculate the Total Square Foot of the house, we will need to take the sum of the areas of each room. o Area of Room 1 = Length of Room1 x Width of Room1 o (Repeated four times – once for each room) o Total Square Foot of House = Area of Room1 + Area of Room2 + Area of Room3 + Area of Room4 • Define variables: AreaofRoom1 = square foot area of the room 1 AreaofRoom2 = square foot......

Words: 928 - Pages: 4

Nt1230 Unit2 Assignment1

...Lydell Smith NT1230 Unit2 assignment1 1. What does RAID stand for? Redundant Array of Independent Disk 2. When would we use Raid? To divide and replicate data into physical drives. 3. Define the following types of RAID: a. RAID 0-is simply data striped over several disks. This gives a performance advantage, as it is possible to read parts of a file in parallel. However not only is there no data protection, it is actually less reliable than a single disk, as all the data is lost if a single disk in the array stripe fails. b. RAID 1-is data mirroring. Two copies of the data are held on two physical disks, and the data is always identical. RAID1 has a performance advantage, as reads can come from either disk, and is simple to implement. However, it is expensive, as twice as many disks are needed to store the data. c. RAID 5-data is written in blocks onto data disks, and parity is generated and rotated around the data disks. Good general performance, and reasonably cheap to implement. Used extensively for general data. d. RAID 6-is growing in popularity as it is seen as the best way to guarantee data integrity as it uses double parity. It was originally used in SUN V2X devices, where there are a lot of disks in a RAID array, and so a higher chance of multiple failures. RAID6 as implemented by SUN does not have a write overhead, as the data is always written out to a different block. 4. Why is RAID 0 of any use if it offers no redundancy? Fast performs and additional......

Words: 433 - Pages: 2


...Assignment 1: Project Management Assessment Submitted by: Muhammad Naman Submitted to: Dr. Johnnie E. Drake, Jr. Submission Date: April 4, 2014 Course : EBM 680 Project Management ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Project Selected: Adelaide Desalination Plant ------------------------------------------------- Research Problem: South Australia, as the "driest state in the driest (inhabited) continent", experienced severe water shortages during periods of drought...

Words: 593 - Pages: 3

Unit 1 Assignment1: Integrated Circuit Technology

...275,000 | 1988 | 80386SX | - | 1988 | i960 | 250,000 | 1989 | 80486 | 1,180,000 | 1989 | i860 | 1,000,000 | 1993 | Pentium | 3.1 | 1995 | Pentium Pro | 5.5 | 1997 | Pentium II | 7.5 | 1999 | Pentium III | 9.5 | 2000 | Pentium 4 | 42 | 2001 | Itanium | 25 | 2002 | Itanium 2 | 410 | 2003 | Pentium M | 77 | 2005 | Pentium D | 115 | 2006 | Core Duo | 151 | 2006 | Core 2 | 291 | 2006 | Itanium "Montecito" | 1720 | 2008 | Atom | 47 | 2008 | Core i7 | 730 | *2010 | Itanium "Tukwila" | 2000 * | 2010 | Xeon "Nehalem-EX" | 2300 | 2010 | Intel "Westmere" | 1170 | 2011 | Intel "Sandy Bridge" | 995 | 2011 | Xeon E7 | 2600 | 2012 | Itanium "Poulson" | 3100 | 2013 | Intel "Haswell" | 1400 | UNIT 1 ASSIGNMENT1: Integrated Circuit Technology * Indicates the processor model and year when two billion transistors were placed on a single processor chip* Sources: 1. According to Computer Structure and Logic, Chapter 1: Introduction to Computers pg. 15, “The growth in the number of transistors used in integrated circuits is reasonable, because it does hold true to the Moore's Law. Gordon Moore's Law states that "each new chip contained roughly twice as much capacity as its predecessor and each chip was released within 18-24 months of the previous chip." 2. Moore’s Law states that the growth will be......

Words: 306 - Pages: 2


...Homework #1 Calculate the usable area in square feet of a house. Assume that the house has a maximum of four rooms, and that each room is rectangular. Program Description The purpose of this program is to calculate the usable area (square feet) of a four room house. Analysis To calculate the usable area in square feet in the house I would first need to identify the inputs and outputs. I know the house has a maximum of 4 rooms that are rectangular in shape, this is my input. Using the area formula (L x W) I can determine the square feet for each room. Adding the square feet for each room will provide the amount of usable area in square feet of the house and my output for this program. Test Plan Test Case # | Input | Expected Output | Results | 1 | Room 1: length = 16, width = 14Room 2 length = 13, width = 13Room 3: length = 10, width = 11 | 503 square feet | Pass | 2 | Room 1: length = 12, width = 16Room 2 length = 11, width = 14Room 3: length = 10, width = 11 | 456 square feet | Pass | 3 | Room 1: length = 12, width = 12Room 2 length = 12, width = 11Room 3: length = 11, width = 10 | 386 square feet | Pass | Pseudocode //This program will calculate the usable area in square feet of a four room house //Declare WidthRoom1, LengthRoom1 As Float // Declare WidthRoom2, LengthRoom2 As Float //Declare WidthRoom3, LengthRoom3 As Float //Declare WidthRoom4, LengthRoom4 As Float //Declare TotalHouseSquareFeet As Float Write “This program will help you......

Words: 273 - Pages: 2


...Terry Addison Course: IT-550 Kaplan University September 28, 2014 TABLE OF CONTENTS ABSTRACT 3 UNIT 1 Assignment 4 Introduction Terrorist Security Breach of a Network in Large Corporations What constitutes a cyber-terrorism case? Evidence related to cyber-terrorism and its meaning E-Discovery Process Conclusion 10 REFERENCES 11 Abstract This document discusses security breach at a large commercial corporation. It talks about what constitutes a cyber- crime. It also identifies the threats these important items are subject to It includes the meaning behind different types of evidence related to cyber-crimes and provides a description of the actual e-discovery process to be taken using forensics tools and techniques. Introduction At the point when a wrongdoing is perpetrated and the time it now, time for proof to be gathered guidelines and methods must be taken after to keep up equity inside the privileges of the criminally charged and the individuals who are on the arraigning side. To do this precisely and inside the extent of the law everything must be archived from the time it is seized to the time the proof found is displayed in court. Inside this documentation a rundown of all areas it was held, individuals who had admittance to it and any changes or tests utilized on the proof and by whom should likewise be recorded. The initial phase in assembling any sort of proof is seizing the confirmation from the spot or spots the......

Words: 2461 - Pages: 10


...Estimating the standard deviation of grouped data The Internal Revenue Service (IRS) determines which income tax returns to audit by looking at, among other things, whether there are any unusual deductions claimed on the return. Last year, charitable deductions for a family of four earning between and averaged , with a standard deviation of . The IRS wishes to know whether the standard deviation this year is still around . To determine this, income tax returns for families of four earning between and were randomly selected from this year's tax filings. The charitable deductions claimed on the returns are summarized in the following histogram: 20 15 10 5 0 Frequency 4 16 12 4 4 900 1000 1100 1200 1300 1400 Charitable deduction (in dollars) Based on this histogram, estimate the standard deviation of the sample of deduction amounts. Carry your intermediate computations to at least four decimal places, and round your answer to at least one decimal place. (If necessary, consult a list of formulas.) The process for solving these problems is fairly long. Aleks recommends: . Then . I watched a video that condenses the process a bit. Its easier to group the sections included in this process into 4 rows and 4 columns. The first column should list the frequencies in the histogram. Next list the midpoints in the 2nd column. Then multiply the two columns by one another which produces column 3. Next......

Words: 309 - Pages: 2


...History of Dell Computers Michael Dell, Founder. Dell started business as a student in 1983. Company renamed Dell Computer in 1987. 1987 Dell Computers hit Fortune 500 in 1992. Became the leader of PC industry in the U.S. in 1999. Became the worldwide leader in PCs in 2001. Dell Inc. in 2005 Michael Dell, Founder of Dell Computers Products Dell’s principal products include: Desktop PCs Notebook computers Workstations Servers Printers Storage devices MP3 players LCD and Plasma TVs Digital cameras Memory cards … How Well has Dell been Performing? 2004 U.S. market share Global market share Revenue (millions) Gross profit Operating expenses Net income 33.10% 2003 30.90% 2002 27.90% 2001 23.50% 2000 19.70% 1999 16.60% 1998 13.20% 18.40% $41,444 $7,552 16.90% $35,404 $6,349 15.20% $31,168 $5,507 12.90% $31,888 $6,443 10.60% $25,265 $5,218 10.50% $18,243 $4,106 8.50% $12,327 $2,722 $4,008 $2,645 $3,505 $2,122 $3,718 $1,246 $3,780 $2,177 $2,955 $1,666 $2,060 $1,460 $1,406 $944 How Well has Dell been Performing? 2004 2003 2002 2001 2000 1999 1998 Dell Inc. Performance Market shares continue to grow, so do revenues and net profits. Able to maintain profit margins. Able to i in Abl t gain i operational efficiency. ti l ffi i Overall, a great company! U.S. share growth Global share growth 7.12% 10.75% 18.72% 19.29% 18.67% 25.76% 8.88% 11.18% 17.83% 21.70% 0.95% 23.53% Revenue growth Gross profit......

Words: 951 - Pages: 4


...Assignment 3: Project Presentation Due Week 10 and worth 300 points   Please use the project from Assignment 1 and 2 to complete this assignment.   Your project is now in its closing process. You are ready to present a final report to your major stakeholders.   Develop a Closing Process PowerPoint Presentation. Your PowerPoint must have speaker notes and these speaker notes must be written as if you were presenting this project to your stakeholders. A template is provided for your use. You can modify the template based on your professor’s instructions. Do not omit any information from the template because the information aligns with the rubric. Note:The template can be found here or in the Student Center.      Prepare a twelve to fifteen (12-15) slide presentation in which you: 1. Identify the project objectives and how the project team has met each of the identified objectives. 2. Analyze the Work Breakdown Structure (WBS), along with explanation for each task. 3. Create a timeline, and note the critical path. 4. Identify stakeholders on the project team matrix. 5. Establish the approved budget, and identify the cost for resources. 6. Recommend plans for the project communication. 7. Determine risks, the competitive analysis, and project benefits. 8. Distinguish the scope, time, and cost constraints. 9. Assess any project dependencies. 10. Compile a list of six (6) best practices arising from this project’s lessons learned. ...

Words: 377 - Pages: 2


...MBA8000 ASSIGNMENT 1: Critical Reflection Due Date (12 April 2016) Word Limit (2,500) This assignment has three parts. In Part 1 you will describe an ethical dilemma that you had to face. In Part 2 you will analyze it. In Part 3 you will reflect on it. Part 1: Description (Word Limit = 500) Discuss an ethical dilemma that you have had to face in the workplace or at college / university. Give as much details as possible within the word limit. Please include the following: (You can replace the real names and places with fictional ones) * Describe the situation * Describe who was involved * Describe where the situation took place * Describe when it happened and what was going on.  * Describe the values and norms that were in conflict. * Describe your thoughts and feeling. * Describe what you did. (How was the dilemma resolved or what was the outcome?) * Rate your decision. On a scale from 1-10 how happy were you with your decision? (1 = Very unhappy 10= Very happy) and state why you thought that. Part 2: Analysis (Word Limit = 1,500) In this section you are going to analyze the ethical dilemma described in Part 1 above Please include the following: * Choose three of the normative ethical theories discussed in the course and use those three ethical theories to analyze the ethical dilemma described in Part 1. You should include critical thinking and use about 500 words with each one If you do not know how to......

Words: 1002 - Pages: 5


...Practice 1: Overview This is the first of many practices in this course. Practices are intended to cover all topics that are presented in the corresponding lesson. Note the following location for the lab files: E:\labs\SQL1\labs If you are asked to save any lab files, save them at this location. To start ISQL*Plus, start your browser. You need to enter a URL to access iSQL*Plus. The URL requires the host name, which your instructor will provide. Enter the following command, replacing the host name with the value that your instructor provides: http://<HOSTNAME:5561>/isqlplus In any practice, there may be exercises that are prefaced with the phrases “If you have time” or “If you want an extra challenge.” Work on these exercises only if you have completed all other exercises in the allocated time and would like a further challenge to your skills. Perform the practices slowly and precisely. You can experiment with saving and running command files. If you have any questions at any time, ask your instructor. Practice 1 Test your knowledge: 1. Initiate an iSQL*Plus session using the user ID and password that are provided by the instructor. 2. iSQL*Plus commands access the database. True/False 3. The following SELECT statement executes successfully: SELECT last_name, job_id, salary AS Sal FROM employees; True/False 4. The following SELECT statement executes successfully: SELECT * FROM job_grades; True/False 5. There are......

Words: 520 - Pages: 3


...Fiber Optic Connector Identification Sheet The following photos will assist you in identifying the Fiber Optic connector types used to terminate each end of a fiber optic cable. Fiber optic patch panels are also presented in this document. Brazil Link: US Link: [pic] The above photo shows a duplex “LC” connector inserted into an SFP module in a Cisco 3750G-12S switch. [pic] Photo above represents a fiber optic “LC” connector patch panel in a 19 inch rack. [pic] Pictured above is a duplex “LC” fiber optic plug on the end of a patch cable. [pic] This photo depicts a simplex “SC” connector on a rack mounted fiber patch panel. [pic] The above picture depicts an integrated duplex “SC” jack on a Cisco 2900 XL switch. [pic] Illustration above denotes the fiber optic duplex “SC” connector in a patch panel within a 19 inch rack installation. [pic] The above photograph shows a duplex “SC” fiber optic plug on the end of a patch cable. [pic] The above picture shows a single “ST” fiber connector installed in a wall mounted patch panel. [pic] This picture displays two “ST” style fiber optic plugs. One for transmit the other for receive. Note the locking slots in the mounting ring. This is a bayonet coupling mount. Insert the connector into position and turn the locking cap a ¼ turn to lock it into place. [pic] The above picture denotes a wall......

Words: 625 - Pages: 3


...Assignment 1.1 Communication Process Model - Who was the sender? My Supervisor - Who was the receiver? Myself - What was the message? My supervisor told me to get in the boat that we were working on. - What was the channel used to send the message? The channel that was used to send the message was a face to face verbal communication - What was the misunderstanding that occurred? I did not understand why he yelled at me and told me to get in the boat when I was standing at the back of the boat working on the lower unit when there were other co-workers around not doing anything and when he yelled at me that was very rude and made me feel like he was picking with me so I yelled back at him and asked him for what reason did he want me to get in the boat when you see me busy already working on the boat and the rest of my co-workers are standing around laughing at the situation. This also made me feel like he was trying to show off for the people and or power trip but he later told me the reason why he wanted me to get in the boat was to troubleshoot something in the console on the boat after he apologized for yelling at me. - How could the misunderstanding have been avoided? The misunderstanding could have been avoided by him not yelling at me. 1 what did you learn about the communication process from this activity? I learned that the communication between me and my supervisor had a barrier it was called internal noise due to my belief in if you want respect you give......

Words: 525 - Pages: 3


...Employment-At-Will Doctrine Name: Sarabjit Singh Prof. John F. Rodgers, J.D. LEG-500-Law, Ethics and Corp.Governance July20, 2012 1. Describe what steps you would take to address the following scenario involving skills, competence, and abilities: · The employee seems to be unable to learn the computer applications that are basic to her job responsibilities, but, consistently “tells” her boss that she is “a good worker and a genius” and that he does not “appreciate her”. Even after a few months of training and support, she is unable to use the computer tools to be productive and efficient in completing the required tasks. Answer: Every job needs some special kind of attributes, skills, competence and abilities to perform the required tasks and these job requirements are specified in job description before hiring an employee. In this case of Jennifer being unable to perform her basic job responsibilities. a. Initially I think recruitment process need to be reviewed, because an inefficient employee was hired, who is not able to perform her basic duties and responsibilities. b. After providing few months’ job training, if she is still unable to learn computer applications, then her job needs to be rotated and assign her different roles and responsibilities. c. Finally, if she is still not able to perform her basic job responsibilities as per set standards of job performance, then issue her warning notice and eventually termination . 2. Describe what steps you......

Words: 839 - Pages: 4