Professional Documents
Culture Documents
ملخص نقاط الايساي Cma Part 1
ملخص نقاط الايساي Cma Part 1
FAR
A- Balance sheet show financial position for the company at point in time that may vary few
days later
B- Recording of fixed assets at historical costs
C- preparation require human judgment
D- B.S omits many items that have value like intellectual capital
A- Not all items reported in income statement some items reported at OCI
B- I.S Report accrual basis so I.S may show money in the company but actually no
C- preparation require human judgment
A- Cash Flow statement not sufficient for forecasting profitability of the firm because it includes
only cash items
B- it is not represent the true liquid position of the firm
C- information can be manipulated by management of the firm
A- the lease transfers the ownership of the leased asset to the lessee at the end of the contract
B- the lease include an option of purchase the assets at the end of the lease
C- the lease is more than 75% of the lease life
D- the present value of the sum of the lease payments and any guarantee more than 90% of the
fair value of leased assets.
E- the leased assets has no alternative use.
7- difinition of integrated reporting, integrated thinking and integrated report.
8- six capitals.
A- Materiality
B- Data quality
C- assurance
D- lack of standards
E- tone at the top
The benefits of IR include
a) Linking financial and nonfinancial information, which provides more clarity about
the value-creation process
b) Better decision making and resource allocation- improve governance-better internal control
COST
A- Non-controllable cost that cost that a particular manager does not have authority to change
B- Committed cost arise from holding property, plant and equipment like insurance real estate
tax lease payments and depreciation they are long term and cannot be reduced by lowering
short term production
C- discretionary cost represent uncertainty in the degree of causation between level of output
and the quantity of resources consumed costs that outlay periodic annually like advertising R&D
maintenance cost.
D- Sunk cost that costs that already paid or committed to incur.
E- Relevant cost future cost that vary with action taken
Advantages
A- Better decision making
B- Analysis provide information to value and non-value adding activities that produce efficiency
C- Improve scheduling production through analysis and now that best way to produce(moving
components-waiting for the next operation step-inspecting output-storing inventory)
D- the most benefit when company produce wide variety of products and high fixed cost
Disadvantages
A- Increase time and efforts to make accounting system that capture resources cost, drivers and
cost pools
B- Initial cost are high
C- No advantage if company produce one product
D- May not conform with GAAP
Advantages
A- supply chain management system that integrates all parts from supplier to final customer
B- lower inventory costs
C- reduce labor cost and greater productivity
D- enhanced decision making
E- elimination of data redundancy and centralization of data and data integrity
F- avoidance of costs for other means for IT
G- increased customer satisfaction
H- more rapid and flexible response to changes
I- standardization of decision making process
Disadvantages
A- losses from unsuccessful implementation
B- purchasing hardware-software-service
C- data conversion from old system to new system is difficult
D- training
E- customization is difficult
F- software maintenance and upgrades-salaries of implementation employees
Advantage
A- reliable service
B- avoidance of obsolescence risk
C- access to technology
D- risk sharing
Disadvantages
A- dependence on outside party
B- loss of control over necessary functions
C- quality of service
D- security issues
E- language barriers
A- the firm must identify their size, type, vertical integration and competitor response
B- forecast demand, input cost and technological development
C- analysis of competitor to determine when each will expand
D- using information the company predict capacity
E- testing of inconsistencies
value chain is how costs and customer values accumulated along chain of activities
value adding activities adds value to the customer
non-value adding activities does not add value to product or customer
Primary activities (R&D-production design-manufacturing-marketing and distribution-
customer service)
supportive activities (HR-inventory management-plant maintenance-IT-contract management)
Value chain analysis strategic analysis tool allows firm focus on activities that are consistent
with overall strategy
A- identify the firm value creating activities
B- determine how each value creating activity can produce competitive advantage
(cost reduction-differentiation-)
C- identify the way in which value adding activities provide value to customer
D- identify activities that candidate for cost reduction
E- identify value adding way in which activities that adds value can be linked
f- management accountant collaborate with engineering, production marketing, distribution and
customer service to identify strengths, weaknesses, opportunities, and threats in the value chain
analysis results
A- select and prioritize benchmarking (determine the reason for existence and understand
critical success factors)
B- organize benchmarking team
C- the team investigate and document internal processes(development of measures for internal
processes)
D- researching and identifying best in class performance(difficult step)
E- identifying performance gaps
F- process improvement find and implement way to improve performance
the firm can identify strengths and weaknesses through benchmarking
Conformance costs
A- prevention cost try to prevent defective products (preventive maintenance-employee
training-review of equipment design-evaluation of supplier-quality training to employee
B- appraisal cost include activities that statistical quality program (inspection-testing)
Nonconformance costs
A- internal failure costs occur when defective products are detected before shipment
(scrap-rework-tooling changes-downtime-redesign-re-inspecting-retesting-expediting of
operation after delays-lost learning opportunities-correcting problems)
B- External failure costs lost profit and costs after the customer receive the product
(customer service complains-rejection-returns-repairs-warranty obligations-product liability
claims-customer losses)
BUDGET
Benefits
A- A given data set generates specific results. The results can be used to draw conclusions and
make predictions.
B- Regression analysis is an important tool for drawing insights, making recommendations, and
decision-making.
Limitations
A- To use regression analysis, historical data are required. If historical data are not available,
regression analysis cannot be used.
B- Even when historical data are available, the use of historical data is questionable for making
predictions if a significant change has taken place in the conditions surrounding that data
C- The usefulness of the data generated by regression analysis depends on the choice of
independent variable(s). If the choice of independent variable(s) is inappropriate, the results can
be misleading
D- The statistical relationships that can be developed using regression analysis may be valid only
for the range of data in the sample.
Benefits
A- Learning curves can be used in the development of production and labor budgets when
changes such as new products are planned.
B-In calculating the cost of a contract, learning curve analysis can ensure that the cost estimates
are accurate over the life of the contract, leading to better, more competitive bidding on
projects.
C- Make or buy decisions
D- Recognizing that higher costs will occur in the early phase of the product life cycle allows
more effective evaluation of managers.
E-learning causes standard costs to decrease over time.
Limitations
A- Learning curve analysis is appropriate only for labor-intensive operations involving repetitive
tasks
B- The learning rate is assumed to be constant. In real life, the decline in labor time might not be
constant
C- may not be able to accurately forecast the amount of improvement that may result from
learning that will take place.
D- The company may or may not be able to actually realize efficiencies from learning.
29- Steps in strategic management process
strategic management is the set of overall objectives for entity and guides the process
through achieving those objectives (upper management responsibility)
strategic planning is the design and implementation of specific steps and processes to
reach overall objectives the both closely linked
A- rivalry among existing firms(stage of industry life cycle-fixed cost high-capacity expansion)
B- threats of entry market
C- threat of substitutes(substitute relative price-customer intent-cost of switching)
D- threat of buyer`s bargaining power
E- threat of supplier bargaining power
Operational strategies
Dogs (low relative market share-low market growth rate) net cash flow modest
Question mark (low relative market share-high growth rate) poor cash and need more
investment to increase relative market share
Cash cows (high relative market share-low growth rate) strong competition and cash generator
Stars (high relative market share-high growth rate) strong competition in high growth markets
net cash flow is modest because it require more expenses for R&D
Budget is a written plan for the future that try to evaluate assumptions and objectives
identified in the budgeting process
A- budget as a planning tool
B- budget as a control tool(cost help control cost by setting cost guidance
manager will refuse to incur not important cost if he know it will be compared to budget
C- budget as a motivational tool(budget help employee to do good job if they help for preparing
the budget
D- budget as a communication tool(help to tell employees what goal firm need to achieve)
E- budget promotes goal congruence(every one working for the same goal)
Advantages of bottom up
A- acceptance at all level
B- make employees link performance with reward or penalties
C- provide more information for budgeting through participation
Disadvantages
A- high cost-more time-more complex
B- employees may work for their interest of their divisions
C- creation of budgetary slacks
A- lower level manager think that top management cut costs and increase targets
B- budget usually build for year, quarter or monthly so need to wait to make correction
C- some manager wait until the end of the period to compare budget to actual results
D- some manager refuse revision of the budget
VARIANCE
Benefits
A- As a planning tool, the flexible budget allows management to estimate income at more than
one level of output.
B- As an evaluation tool, actual results are compared with standard costs for actual output. This
provides for a fairer comparison and allows for variance computations to better assess
performance.
C- Make better use of historical budget information to improve future planning
D- As an evaluation tool, comparing actual results to the flexible budget will not hide poor
performance.
Limitations
A- Flexible budgeting needs to be used with a standard costing system. The two go together,
and one is meaningless without the other
B- If sales decline below the planned level, the decline does need to be addressed and a flexible
budget will not be useful for pinpointing a decline in sales below what was planned
C- we must wait until actual results appear to prepare flexible budget
D- it need more time for preparation
Cost center is responsible for cost only (maintenance department) Cost and revenue measure with
Revenue center is responsible for revenue only (sales department) variance and nonfinancial measures
Profit center is responsible for cost and revenue (retail store department responsible for cost
and revenue)
Investment center responsible for revenue expense and invested capital(branch office)
ROI is the relationship between income and investment in assets to generate income
ROI =
Benefits of ROI
A- improve projects through analyzing data collected and know how to improve project
B- secure funding through forecasting of positive ROI about money will invest
C- comparative analysis compare between alternative investment to determine the best
D- discontinue ineffective product or operation that non-value added
Limitation of ROI
A- investment center reject projects with ROI more than the center but lower than the
investment center.
B- ROI measures return as a percentage rather than as a monetary amount.
42- Residual income
is a variation of ROI that measure performance in dollar amount than percentage
Methods used
A- variable costing used variable cost as a transfer price if there is unused capacity
Advantages used excess capacity motivate buyer`s division to solve excess capacity problem
Dis advantages no incentive for the seller for production and reduction of costs
B- Full (absorption) costing charge full cost for the buying department
Advantages insure that selling will not incur loss and providing more incentive for buyer to
purchase internally not from market
Disadvantages no motivation for seller to control production cost
C- Market price use market price as a transfer price used when the company operates at full
capacity
Advantages it is useful when the company operates at full capacity-goal congruence
Disadvantages it is not beneficial when the company has excess capacity and if the company use
price lower than market it may motivate both divisions
D- Negotiation price the best and it is the price accepted by two divisions used in most freely
divisions
Advantages it is best when no market price exist
promote goal congruence
accepted by both parties
45- Factors affecting the choice of transfer pricing poicy
INTERNAL CONTROL
A- The audit committee is responsible for selecting and nominating the external auditor,
approving audit fees, supervising the external auditor, overseeing auditor qualifications and
independence, discussing with the auditors matters required under generally accepted auditing
standards, and reviewing the audit scope, plan, and results
B- prepare an audit committee report as required by the SEC
C- The audit committee is to review the annual and quarterly financial statements and the
MD&A (Management Discussion and Analysis) in the company’s annual report filed with the SEC
and discuss them with management and the independent auditors
D- The audit committee is to review with the independent auditor any audit problems
E- They oversee the internal audit function and monitor internal control systems for compliance
with legal and regulatory requirements.
A- The responsibilities of the CEO are determined by the corporation’s board of directors. A
CEO’s responsibilities and authority can be extensive, or they can be very limited, depending on
how much authority and responsibility the board of directors delegates to the CEO
B- establish and maintaining system of internal control
C- carry out day-to-day operations
D- establish tone at the top for the company
1- Control environment
A- The control environment includes the standards, processes, and structures that provide the
foundation for carrying out internal control the board of directors and senior management are
responsible for establishing the “tone at the top,”
B- a commitment to integrity and ethical values
C- board of directors demonstrates independence from management and exercises oversight
D- management establishes structures, reporting lines, and appropriate authorities and
responsibilities (The board of directors delegates authority and assigns responsibility to senior
management. Senior management delegates authority and assigns responsibility at the entity
level and to its subunits)
E- commitment to attract, develop, and retain competent individuals in alignment with
objectives
F- holds individuals accountable for their internal control responsibilities
2- Risk assessment
Risk assessment is the process of identifying, analyzing, and managing the risks that have the
potential to prevent the organization from achieving its objectives
Three types of risk
3- Control activities
A- selects and develops control activities that contribute to reducing to acceptable levels the
identified risks
B- The control activities include a variety of controls including both manual and automated and
preventive and detective controls
Preventive controls are controls designed to avoid an unwanted event such as an error or fraud
before it occurs
Detective controls are controls designed to discover an unwanted event after it has occurred
but before the ultimate objective has occurred
C- Segregation of duties
5- Monitoring activities
A- selects, develops, and performs ongoing evaluations, separate evaluations, or some
combination of both
B- Internal control deficiencies are evaluated and communicated for corrective action
Authorization-Recordkeeping-Custody-Reconciliation
Notes about transaction cycles
A- Anti-Bribery Provisions apply to all companies, regardless of whether they are publicly traded
or privately held.it is illegal for any company or anyone acting on behalf of a company to bribe
any foreign official to obtain or retain business
B- Internal Control Provision The fundamental premise of the internal control requirements of
the FCPA is that effective internal control acts as a deterrent to illegal payments
C- Required to maintain books, records, and accounts that accurately and fairly reflect
transactions and to develop and maintain a system of internal accounting control
D- a written code of ethics should be established and revised by internal auditor
Section 201: Services outside the Scope and Practice of Auditors (Bookkeeping services-
Financial information systems design and implementation-Actuarial services-Internal audit)
Section 203: Audit Partner Rotation audit partner must rotate off a particular client’s audit after
five years the person who audit not all the auditing company
Section 204: Auditor Reports to Audit Committees each public accounting firm registered with
the PCAOB that performs an audit for an issuer of publicly traded securities to report the
following in a timely manner to the issuer’s audit committee
Section 302: Corporate Responsibility for Financial Reports financial report filed or submitted
to the SEC in accordance with the Securities Exchange Act of 1934 must include certifications by
the company’s principal executive officer or officers and its principal financial officer or officers.
The certification must indicate the following:
The signing officer has reviewed the report-Based on the signing officer’s knowledge, the report
does not contain any untrue material statement or omit to state any material fact that could
cause the report to be misleading-the report present fairly
The signing officers certify that they
responsible for establishing and maintaining internal controls
have evaluated the effectiveness of the company’s internal controls
Section 404: Management Assessment of Internal Control Over Financial Reporting and the
Independent Auditor’s Attestation to Management’s Assessment of Internal Control Over
Financial Reporting
require management to establish and document internal control procedures and include in the
annual report a report on internal control over financial reporting this report include
statement of management responsibility of internal control-management assessment over the
effectiveness of internal control-identification of the framework used (COSO-COCO)
Section 407: Audit committee financial expert at least one member must be financial expert.
56- PACOB standards in auditing
A- Integrate financial statement audit with internal control over financial reporting because
internal control affect the financial statement assertion
B- the auditor should use top-down (risk based) approach begin with financial statement level
focusing in entity level controls and then significant accounts.
A- Statement of Objectives a written proposal is prepared, including the need for the new
system
B- Investigation and Feasibility Study of Alternative Solutions Needs are identified and
feasibility of alternative solutions are assessed, including the availability of required technology
and resources. A cost-benefit analysis is done
C- Systems Analysis The current system is analyzed to identify its strong and weak points, and
the information needs from the new system, such as reports to be generated, database needs,
and the characteristics of its operation are determined. Inputs, processing requirements, and
output requirements should be defined and documented. All security requirements should be
identified and justified. A structured analysis process should be used
D- Conceptual Design The conceptual design is what the users are expecting the system to be.
Systems analysts work with users to create the design specifications and verify them against
user requirements. System flowcharts and report layouts are developed. The applications,
network, databases, user interfaces, and system interfaces are designed.
E- Physical Design The physical system design involves determining the workflow, what and
where programs and controls are needed, the needed hardware, backups, security measures,
and data communications. Hardware and software selection should identify mandatory and
optional requirements
F- Development and testing the design is implemented into source code Programs are coded
according to the specifications developed in the systems design and make tests
G- System Implementation and Conversion the site is prepared, equipment is acquired and
installed, and conversion procedures, including data conversion, are implemented.
Documentation is completed and users are trained
I- Operations and Maintenance
A-Electronic eavesdropping can occur if computer users are able to observe transmissions
intended for someone else
B- computer virus is a program that alters the way another computer operates Viruses can
damage programs, delete files, or reformat the hard disk
C- A Trojan horse is different from a virus. A very important distinction between Trojan horses
and viruses is that Trojan horses do not replicate themselves
D- A worm is a program that replicates itself from system to system without the use of any host
file The difference between a worm and a virus is that the worm does not require the use of an
infected host file, while the virus does require the spreading of an infected host file
59- Cybercrime
A- Firewall a firewall serves as a barrier between the internal and the external networks and
prevents unauthorized access to the internal network-An organization may also use a proxy
server, which is a computer and software that creates a gateway to and from the Internet
B- anti-sniffers are available to defend against sniffers
C- The best defense against phishing and other scams is in the hands of the recipient.
Recipients need to know not to respond to any email that requests personal or financial
information and not to click on any link given in such an email that could take them to a spoofed
website-antivirus program
D- Encryption converts data into a code and then a key is required to convert the code back to
data
E- Ethical hacking
Business continuity planning involves defining the risks facing a company in the event of a
disaster, assessing those risks, creating procedures to mitigate those risks, regularly testing
those procedures to ensure that they work as expected, and periodically reviewing the
procedures to make sure that they are up to date
A disaster recovery plan specifies
A- Which employees will participate in disaster recovery and their responsibilities
B- What hardware, software, and facilities will be used
C- The priority of applications that should be processed
Hot site or mirror data center is a backup facility that has a computer system similar to the one
used regularly. The hot site must be fully operational and immediately available, with all
necessary telecommunications hookups for online processing. A hot site also has current, live
data being replicated to it in real time from the live site by automated data communications
cold site is a facility where space, electric power, and heating and air conditioning are available
and processing equipment can be installed, though the equipment and the necessary
telecommunications are not immediately available. If an organization uses a cold site, its
disaster recovery plan must include arrangements to quickly get computer equipment installed
and operational
Warm site is in between a hot site and a cold site. It has the computer equipment and necessary
data and communications links installed, just as a hot site does. However, it does not have live
data. If use of the warm site is required because of a disaster, current data will need to be
restored to it
Input controls provide reasonable assurance data submitted for processing are authorized,
accurate, and complete
A- online input controls when data are keyed are input into an input screen
preformatting input data in all necessary fields
edit field check (validity check) prevent incorrect data from entering system
limit reasonableness check appropriate range for data
check digit algorithm like sum of digit 1+3+6
prompting asking questions of the user to ensure data entry
Batch input controls are used when data are processed in batches
management release batch is not processed until management review and approve it
record count record count and match with system
Control total validation routines sum of dollar amount calculated by the user equal to system
Hash total arithmetic sum of numeric field has no meaning
Processing controls provide reasonable assurance that all data submitted for processing are
processed and only approved data are processed
validation match process identifier against master file to determine existence
completeness reject record with missing data
arithmetic controls zero balance checking usually for entries ensure debit and credit=zero
sequence check ensure data processed in logical order number
run-to-run controls check after each stage of processing when it processed in multiple stages
key integrity number that identify the process and we cannot change
Output controls provide assurance that processing are complete and accurate
complete audit trial consists of batch number-time of submission –time of completion-number
of records-total dollar in batch-number of record rejected-total dollar rejected it is submitted to
user for check and correct errors
error listing report all transaction reported by the system
Storage controls
dual write routines store data in two separate physical devices
spooling store data for temporary period for another use like print
validity check-physical control-snapshot-cloud computing
Auditing around the computer is not appropriate when the system are sophisticated it is
appropriate for simple system
Auditing through the computer it is appropriate for complex systems many types
A- processing test data
B- parallel simulation
C- generalized audit software package
D- data extraction techniques
E- integrated test facility
F- program embedded audit modules
IT
A- An organization’s accounting information system (AIS) interacts with every process in the
value chain. The AIS adds value to the organization by providing accurate and timely information
so that all the value chain activities can be performed efficiently and effectively
B- AIS can provide other information that improves management decision-making.
C- For instance: It can store information about the results of previous decisions that can be used
in making future decisions.
C The information provided can assist management in choosing from among alternative actions.
D- A well-designed accounting information system can improve the efficiency and effectiveness
of a company’s supply chain, thus enhancing the company’s profitability
A- Journal are used to record accounting transactions and then posted to ledger
B- General ledger It maintains the record of all the financial transactions that have taken place
C- Trial balance The transaction details in the general ledger are compiled periodically to
produce a trial balance
D- Chart of accounts The general ledger contains a separate account for each type of
transaction. The list of general ledger accounts used by an organization
E- Master file store permanent information, such as general ledger account numbers and history
or customer account numbers and historical data for each customer transaction file used to
update master file
F- Special journals are used for specific kinds of transactions, and in a computerized system, the
journals are known as modules
67- Database
It is used to create the database, maintain it, safeguard the data, and make the data available
for applications and inquiries A database management system is not a database but rather a
set of separate computer programs that enables the database administrator to create, modify,
and utilize database information; it also enables applications and users to query the database
Database management systems and data base administrator perform four primary functions
A- database development when a relational database is developed, the data fields and records
to be used in the database must be structured. The database administrator uses a database
management system and a Data Definition Language (DDL) the structure include (scheme-
subschemas-record structure)
B- database maintenance A data manipulation language (DML) is used to maintain a database
and consists of “insert,” “delete,” and “update” statements (commands). As a result users need
not to know data manipulation language
C- Database interrogation ( )االستعالم عن البياناتUsers can retrieve data from a database by using
a query language. Structured Query Language (SQL) is a query language, and it is also a data
definition language and a data manipulation language
D- Application development for database
Data warehouse a copy of all the historical data for the entire organization can be stored in a
single location known as a data warehouse, or an enterprise data warehouse. A data warehouse
is not used for everyday transaction processing. Managers can use business intelligence tools to
extract information from the data warehouse. Business intelligence is the use of software and
services to collect, store, and analyze data produced by a firm’s business activities
to be useful data stored in data warehouse should be
A- be free from errors
B- Be uniformly defined.
C- Cover a longer time span than the company’s transactions systems to enable historical
research
D- Allow users to write queries that can draw information from several different areas of the
database
Data mart a data mart is a subsection of a data warehouse that provides users with analytical
capabilities for a restricted set of data. A data mart can provide security for sensitive data
because it isolates the data certain people are authorized to use and prevents them from seeing
data that needs to be kept confidential. Three types of data mart
dependent depend on data warehouse
independent data mart is created without the use of a data warehouse through a bottom-up
approach. The data for just one data mart for a single business function is uploaded,
transformed, and then loaded directly into the data mart
hybrid consists of dependent and independent
Data lake consists of unstructured data that captured by the system. Use NOSQL to analyze data
70- Enterprise performance management EPM
A- Corporate governance includes all the means by which businesses are directed and
controlled, including the rules, regulations, processes, customs, policies, procedures,
institutions, and laws that affect the way the business is administered. Corporate governance
spells out the rules and procedures to be followed in making decisions for the corporation
B- Data governance is similar, but it is specific to data and information technology. Data
governance encompasses the practices, procedures, processes, methods, technologies, and
activities that deal with the overall management of the data assets and data flows within
organization data governance include
Data availability-data usability-data integration-data security-data integrity-system availability-
system maintenance-compliance with regulations-roles and responsibility-data flow
A- Processes
B- Organizational structure
C- principle polices and framework
D- information
E- culture ethics and behavior
F- people skills and competences
G- services infrastructure and applications
73- Data life cycle
Every organization should have a documented records management policy that establishes
how records are to be maintained, identified, retrieved, preserved, and when and how they
are to be destroyed
Factors to be considered in developing a records management policy include:
A- Federal, state, and local document retention requirements
B- Requirements of the Sarbanes-Oxley Act of 2002
C- Records of records
benefits of record retention policy
A- Locating documents that are needed is easier and more efficient
B- the probability of the organization’s compliance with all federal, state, and local regulations
C- Records will be adequately protected, and their accessibility will be maintained
D- Records that are no longer needed or that are no longer of value will be destroyed at the
appropriate time.
is used to analyze a business process to determine the specific way the process is presently
being accomplished from beginning to end
Steps
A- determine the process to be analyzed
B- collect data about the process need to analyze it
C- map and visualize the process
D- analyze the process
E- determine potential improvement not include implementation
76- Robotic process automation
A type of artificial intelligence is not the same thing as the use of industrial robots. Robotic
process automation software automates repetitive tasks by interacting with other IT
applications to execute business processes that would otherwise require a human. RPA
software can communicate with other systems to perform a vast number of repetitive jobs,
and it can operate around the clock with no human errors RPA software cannot replace an
employee, but it can increase the employee’s productivity The RPA software is not part of the
organization’s IT infrastructure. Instead, it interacts with the IT infrastructure, so no change is
needed to the existing IT systems. Thus, RPA allows the organization to automate what would
otherwise be a manual process without changing the existing systems
Benefits of RPA
A- Developing a process in RPA software does not require coding knowledge
B- It enables employees to be more productive because they can focus on more advanced and
engaging tasks
C- Once an RPA process has been set up, the process can be completed much more rapidly
D- cost saving
E- Robots follow rules consistently, do not need to sleep, do not take vacations, do not get sick
Limitation of RPA
A- Robots are not infallible. Like any machine, their reliability is not 100%
B- Robots cannot replicate human reasoning
C- Robots have no “common sense.” If a flaw in the instructions creates an error
Block chain is innovative technology that has potential to change accounting and it is a type of
digital database or leger that provides proof of who owns what at any moment in time because
each transaction added to ledger. It contains the history of every transaction when a change in
ownership occurs a new block is linked to the original chain to form new chain
crypto currency is a digital asset designed to be a medium of exchange using cryptography or
encryption to secure the transaction bit coin is a form of crypto currency
consensus mechanism is a cryptographic process that take control of the ledger from one party
and allows it to examined and maintained by multiple independent entities no centralized
organization control the chain
Miners authenticate the transaction by approve what the current block chain should be
distributed ledger the ledger is a type of distributed ledger that is encrypted public and shared
widely for anyone to view every transaction make the ledger grow larger there is no central
administrator
Nonce - The nonce in a block is a random string of numbers that is appended to the transaction
information in the block before the block is hashed
Hash, hashing – Hashing is taking an input string of any length and giving it an output of a fixed
length using a hashing algorithm
Nodes are computers on a peer-to-peer network. Nodes keep the network running by
participating in the relay of information
Smart contracts are computerized transaction protocols that execute the term of the contract
and it is a collection of data and codes that is deployed using cryptographically signed
transaction on block chain network
Benefits of smart contracts
A- Smart contracts can self-execute
B- The decentralized, distributed ledger on the block chain prevents modifications not
authorized or agreed to by the parties
C- Smart contracts can enhance market activity and efficiency by facilitating trade execution
D- Automation reduces transaction times and manual processes
E- Smart contracts can perform prompt regulatory reporting
Limitation of smart contracts
A- smart contract could introduce operational, technical, and cyber security risk
B- A smart contract may be subject to fraud and manipulation
80- Data analytics
Data analytics is the process of gathering and analyzing data in a way that produces
meaningful information that can be used to aid in decision-making.
Types of data analytics
Descriptive analysis report past performance. Descriptive analytics are the simplest type of data
analytics, and they answer the question, “What happened”?
Diagnostic analysis is used with descriptive analytics to answer the question, “Why did it
happen”? The historical data is mined to understand the past performance and to look for the
reasons behind success or failure
Predictive analytics answer the question, “What is likely to happen”? Historical data is
combined with other data using rules and algorithms. Large quantities of data are processed to
identify patterns and relationships between and among known random variables or data sets.
Those patterns and relationships are then used to make predictions about what is likely to occur
in the future
Prescriptive analytics answer the question “What needs to happen?” by charting the best
course of action based on an objective interpretation of the data. Prescriptive analytics make
use of structured and unstructured data and apply rules to predict what will happen and to help
management decide how best to take advantage of the predicted events to create added value.
Prescriptive analytics are the type of analytics likely to yield the most impact for an organization,
but they are also the most complex type of analytics. If sales of a particular product have
declined, prescriptive analytics could help management develop plans to reverse the decline
Refers to vast datasets that are too large to be analyzed using standard software tools
Big Data can be broken down into three categories:
Structured data is in an organized format that enables it to be input into a relational database
management system and analyzed
Unstructured data has no defined format or structure. It is typically free-form and text-heavy,
making in-depth analysis difficult
Semi-structured data has some format or structure but does not follow a defined model it is
data that contain structured and unstructured data
Big Data is characterized by four attributes, known as the four V’s:
Data science is a field of study and analysis that uses algorithms and processes to extract
hidden knowledge and insights from data. The objective of data science is to use structured,
unstructured, and semi-structured data to extract information that can be used to develop
knowledge and insights for forecasting and strategic decision making The difference between
data analytics and data science is in their goals The goal of data analytics is to provide
information about issues that the analyst or manager either knows or knows he or she does
not know (that is, “known unknowns”). On the other hand, the goal of data science is to
provide actionable insights into issues where the analyst or manager does not know what he
or she does not know (that is, “unknown unknowns”). Data and data science capabilities are
strategic assets to an organization, but they are complementary assets.
A time series looks at relationships between the passage of time as the independent variable
and another variable as the dependent variable A time series can be descriptive or predictive.
Benefits
A- Sensitivity analysis can identify the most critical variables, that is, the variables that are most
likely to affect the result if they are inaccurate
B- Simulation is flexible and can be used for a wide variety of problems
C- Both sensitivity analysis and simulation analysis can be used for “what-if” situations
D- Both sensitivity analysis and simulation analysis are easily understood.
Limitations
A- The variables used in a sensitivity analysis are likely to be interrelated.
B- The results of sensitivity analysis or simulation analysis can be ambiguous
C- there is no guarantee it will be the best estimation
D- The results will be only as accurate as the model that is used.
Benefits
A- The process of cleaning the data preparatory to processing it can detect errors, duplicate
information, and missing values
B- The results of data analytics done correctly can lead to improved sales revenues and profits
C- It can help to reduce fraud losses by recognizing potentially fraudulent transactions
D- The use of data analytics can vastly improve forecasting
Limitations
A- Big Data is used in data analytics to find correlations between variables. However, correlation
does not prove causation
B- if the wrong questions are asked of the data, the answer will be meaningless
C- Failure to take into consideration all relevant variables can lead to inaccurate predictions
D- In addition to the cost of the data analytics tools themselves
E- Selection of the right data analytics tools can be difficult
F- data may contain useless information
is the visual representation of information. It is used for better understanding data and
predictions from data in the data mining process, visualization is primarily used in exploration
and cleansing of the data in the preprocessing step of data mining and in the reduction of the
data dimensions step of the process.
Benefits
A- Data visualization can make data more understandable
B- It can promote quick presentation of large amounts of data
C- Visualization can illustrate relationships between data items and events,
D- Visualization can be used in data mining to help the data analyst determine which variables
to include and which may not be necessary
E- Visualization can enable identification of trends and better interpretation of the data
Limitations
A- Data that would be meaningful may be excluded in choosing the data to use in the
visualization, leading to biased results.
B- The information presented in the visualization may be oversimplified
C- The potential exists for misrepresentation or distortion of the data either accidentally or
deliberately through choices made in the way it is presented
Types of visualization tools
Variables
Scatter plot can be used to show all the values for a dataset, typically when there are two
variables, and illustrate the relationship between the variables. A scatter plot shows the
intersection of the two variables. One variable may be independent and the other value
dependent, or both variables may be independent
a bubble chart can be used to illustrate relationships between variables, but a bubble chart
replaces data points with bubbles that vary in size according to the size of the values they
depict, thus adding the relative sizes of the values plotted as an additional dimension to the
chart.
Summarized Statistics
Dot Plot provides information in the form of dots. A dot plot can be used to visualize
summarized data points for each category on the x-axis.
Bar Chart is useful for comparing a statistic across groups it works well for depicting data that
can be easily categorized
Pie charts are primarily for showing proportions. A pie chart is in the form of a circle that
portrays one value for each category, marked as pieces of a pie
Line Chart can be used to visualize several observations for each category, using one line for
each series of observations. A line chart can also work well to depict change over time, such as
in a time series
Entire distribution
a histogram shows the frequencies of a variable using a series of vertical bars. The values of the
variable may occur over time, or they may be as of a moment in time. A histogram looks like a
bar graph. However, it is different from a bar graph. A bar graph relates two variables to one
another, whereas a histogram communicates only one variable, and a histogram is used to
depict the frequency distribution of that variable. To construct a histogram, the range of values
of the variable must be first divided into intervals
boxplot is another type of chart that can be used to display the full distribution of a variable