Beruflich Dokumente
Kultur Dokumente
1 A management accountant in an organisation carries out which TWO of the following activities?
1. Budgeting
2. Investing funds
3. Measuring costs
4. Currency dealing
A 1 and 2
B 1 and 3
C 3 and 4
D 2 and 3
2
5 Which TWO of the following are key purposes of internal control?
1. To ensure all errors are detected
2. To ensure all assets are safeguarded
3. To ensure every transaction is checked
4. To ensure the completeness and accuracy of records
A 1 and 2
B 2 and 3
C 3 and 4
D 2 and 4
9 Which TWO of the following are management styles represented on Blake and Mouton’s managerial grid?
1. Impoverished
2. Autocratic
3. Laissez-faire
4. Country Club
A 1 and 3
B 2 and 4
C 1 and 4
D 2 and 3
3 [P.T.O.
11 Which TWO of the following are ‘off the job’ training methods?
1. Coaching from a manager
2. Studying distance learning materials
3. Attending a college course
4. Mentoring by a colleague
A 1 and 2
B 2 and 4
C 2 and 3
D 3 and 4
12 Which of the following terms describes a fault in the communications process that leads to the meaning of the
message being misunderstood?
A Noise
B Distortion
C Feedback
D Disruption
(24 marks)
4
Section B – ALL FIVE questions are compulsory and MUST be attempted
(b) Identify and describe the four key stages of a human resource plan. (12 marks)
(14 marks)
2 (a) Identify four types of control procedures that can be used to control weekly wages paid in cash, giving one
example for each procedure. (8 marks)
(b) Explain three control procedures that can be used to control monthly salaries paid by bank transfer.
(6 marks)
(14 marks)
3 (a) List any six of the team roles referred to in the work of Belbin. (6 marks)
(b) Describe the characteristics of any four of the team roles listed in part (a). (8 marks)
(14 marks)
4 (a) Explain the four different learning styles classified by Honey and Mumford. (8 marks)
(14 marks)
5 (a) Describe four different controls to help prevent computer hacking. (8 marks)
(b) In addition to hacking, identify and explain three further risks to computerised systems and explain how they
can be prevented. (12 marks)
(20 marks)