Inter CA EIS - Chapter 1
Inter CA EIS - Chapter 1
CHAPTER OVERVIEW
Operational
Categories Supporting
Management
Objectives
Automation Benefits
Implementation
ENTERPRISE BUSINESS PROCESS
Human Resources
Specific Business
Processes Fixed Assets
General Ledger
Flowcharts
Diagrammatic
Representation
Data Flow Diagrams
1 01
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
For example, when a customer places an order, the data flow automatically to other
fractions of the company that are affected by them leading to the enhanced coordination
between these different parts of the business which in turn lowers costs and increase
customer satisfaction.
• The order transaction triggers the warehouse to pick the ordered products and
schedule shipment.
• Customer service representatives track the progress if the order through every step to
inform customers about the status of their orders.
1 02
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 03
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 04
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
BUDGETING PROCESS
1 05
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Today most of the business processes have been automated to make enterprises
more efficient and to handle the large volumes of transactions in today's world.
This is what has led to Business Process Automation (BPA).
• Business Process Automation (BPA) is the technology-enabled automation of
activities or services that accomplish a specific function and can be implemented
for many different functions of company activities, including sales,
management, operations, supply chain, human resources, information
technology, etc.
• In other words, BPA is the tactic a business uses to automate processes to operate
efficiently and effectively.
• It consists of integrating applications and using software applications
throughout the organization.
• BPA is the tradition of analyzing, documenting, optimizing and then automating
business processes.
Timeliness
1 06
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Processes having significant impact on other processes and systems: Some processes
are cross- functional and have significant impact on other processes and systems.
Automating these processes results in sharing information and improving the
efficiency and effectiveness of business processes.
1 07
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Staff Resistance: In most cases, human factor issues are the main obstacle to the
acceptance of automated processes. Staff may see process automation as a way of
reducing their decision-making power. This is due to the reason that with automated
processes, the management has a greater visibility of the process and can make
decisions that used to be made by the staff earlier. Moreover, the staff may perceive
automated processes as threat to their jobs.
1 08
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• It frees up time to work on items that add genuine value to the business, allowing
innovation and increasing employees' levels of motivation.
Reduced Costs
• Manual tasks, given that they are performed one-at-a-time and at a slower rate
than an automated task, will cost more. Automation allows us to accomplish more
by utilising fewer resources.
Visibility
• Automated processes are controlled and consistently operate accurately within the
defined timeline. It gives visibility of the process status to the organization.
Reliability
• The consistency of automated processes means stakeholders can rely on business
processes to operate and offer reliable processes to customers, maintaining a
competitive advantage.
9. Explain How to go about BPA? (Explain steps in implementing Business Process Automation.)
Ans. Business process automation is a complex task especially for organizations involved in
complex processes. In addition, it is difficult to automate all the business processes
therefore organization should analyze the critical processes which will provide better
benefits through automation.
The steps to go about implementing business process automation:
1 09
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Step 1: Define why we plan to implement a BPA - The primary purpose for which enterprise
implements automation may vary from enterprise to enterprise.
• Errors in manual processes leading to higher costs.
• Payment processes not streamlined, due to duplicate or late payments, missing early
pay discounts, and losing revenue.
• Paying for goods and services not received.
• Poor debtor management leading to high invoice aging and poor cash flow.
• Not being able to find documents quickly during an audit or law suit or not being able
to find all documents.
• Poor customer service.
Step 2: Understand the rules / regulation under which enterprise needs to comply with - One of
the most important steps in automating any business process is to understand the rules
of engagement, which include the rules, adhering to regulations and document retention
requirements. i.e. BPA should be as per applicable laws and policies. It is important to
understand that laws may require documents to be retained for specified number of
years and in a specified format. Entity needs to ensure that any BPA adheres to the
requirements of law.
Step 3: Document the process, we wish to automate - At this step, the processes which
organization wants to automate should be documented. The processes are designed on
paper or with computer software. The design of the process is normally prepared with
flowcharts.
The key benefits of documenting the processes are:
• Provides clarity about the processes
• It helps to determine the problems and issues in the processes
Step 4: Define the objectives / goals to be achieved by implementing BPA - Once the above
steps have been completed, entity needs to determine the key objectives / reasons of the
process improvement activities. The BPA needs to follow the SMART principle i.e.;
• Specific: Clearly defined,
• Measurable: Easily quantifiable in monetary terms,
• Attainable: Achievable through best efforts,
1 10
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Step 5: Engage the business process consultant - To achieve BPA, decide which company /
consultant to partner with, depends upon following:
• Objectivity of consultant in understanding/evaluating entity situation.
• Does the consultant have experience with entity business process?
• Is the consultant experienced in resolving critical business issues?
• Whether the consultant is capable of recommending and implementing a
combination of hardware, software and services as appropriate to meeting
enterprise BPA requirements?
Step 6: Calculate the ROI for project - The right stakeholders need to be engaged and
involved to ensure that the benefits of BPA are clearly communicated and
implementation becomes successful.
Some of points which may justify BPA implementation are;
• Cost Savings, being clearly computed and demonstrated.
• How BPA could lead to reduction in required manpower leading to no new recruits
need to be hired and how existing employees can be re-deployed or used for further
expansion.
• Savings in employee salary by not having to replace those due to attrition.
• The cost of space regained from paper, file cabinets, reduced.
• Eliminating fines to be paid by entity due to delays being avoided.
• Reducing the cost of audits and lawsuits.
• Taking advantage of early payment discounts and eliminating duplicate payments.
• New revenue generation opportunities.
• Collecting accounts receivable faster and improving cash flow.
Step 7: Developing the BPA - Once the requirements have been document, ROI has been
computed and top management approval to go ahead has been received, the consultant
develops the requisite BPA.
1 11
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Step 8: Testing the BPA - Once developed, it is important to test the new process to
determine how well it works and the process of testing is an iterative process, the
objective being to remove all problems during this phase.
Step 1: Define why we plan to implement The answer to this question will provide
BPA? justification for implementing BPA.
Step2: Understand the rules/ regulation The underlying issue is that any BPA
under which it needs to comply created needs to comply with applicable
with? laws and regulations.
Step 3: Document the process, we wish to The current processes which are planned
automate. to be automated need to be correctly and
completely documented at this step.
Step 4: Define the objectives/goals to be
This enables the developer and user to
achieved by implementing BPA.
understand the reasons for going for BPA.
The goals need to be precise and clear.
Step 5: Engage the business process Once the entity has been able to define the
consultant. above, the entity needs to appoint an
expert, who can implement it for the
entity.
Step 6: Calculate the Rol for project. The answer to this question can be used for
convincing top management to say 'yes' to
the BPA exercise.
Step 7: Development of BPA.
Once the top management grant their
approval, the right business solution has
to be procured and implemented or
developed and implemented covering the
necessary BPA.
Step 8: Testing the BPA. Before making the process live, the BPA
solutions should be fully tested.
1 12
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
products or services. The degree of risk associated with an event is determined by the
Sources of Risk
The most important step in risk management process is to identify the sources of risk, the
areas from where risks can occur. This will give information about the possible threats,
vulnerabilities and accordingly appropriate risk mitigation strategy can be adapted.
Some of the common sources of risk are Commercial and Legal Relationships, Economic
Circumstances, Human Behavior, Natural Events, Political Circumstances, Technology
and Technical Issues, Management Activities and Controls, and Individual Activities.
Broadly, risk has the following characteristics:
• Potential loss that exists as the result of threat/vulnerability process;
• Uncertainty of loss expressed in terms of probability of such loss; and
• The probability/likelihood that a threat agent mounting a specific attack against a
particular system.
1 13
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Regulatory (Compliance) Risk: Risk that could expose the organization to fines and
penalties from a regulatory agency due to non-compliance with laws and
regulations. Examples include Violation of laws or regulations governing areas such
as environmental, employee health and safety, protection of personal data in
accordance with global data protection requirements and local tax or statutory
laws.
• Operational Risk: Risk that could prevent the organization from operating in the most
effective and efficient manner or be disruptive to other operations. Examples include
risks related to the organization's human resources, business processes, technology,
business continuity, channel effectiveness, customer satisfaction, health and safety,
environment, product/service failure, efficiency, capacity, and change integration.
• Hazard Risk: Risks that are insurable, such as natural disasters; various insurable
liabilities; impairment of physical assets; terrorism etc.
• Residual Risk: Any risk remaining even after the counter measures are analyzed and
implemented is called Residual Risk.
An organization's management of risk should consider these two areas: Acceptance
of residual risk and Selection of safeguards. Even when safeguards are applied, there
is probably going to be some residual risk. The risk can be minimized, but it can
seldom be eliminated. Residual risk must be kept at a minimal, acceptable level. As
long as it is kept at an acceptable level, (i.e. the likelihood of the event occurring or
the severity of the consequence is sufficiently reduced) the risk can be managed
1 14
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 15
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Terminate/Eliminate the risk. It is possible for a risk to be associated with the use of a
technology, supplier, or vendor. The risk can be eliminated by replacing the
technology with more robust products and by seeking more capable suppliers and
vendors.
• Transfer/Share the risk. Risk mitigation approaches can be shared with trading
partners and suppliers. A good example is outsourcing infrastructure management.
In such a case, the supplier mitigates the risks associated with managing the IT
infrastructure by being more capable and having access to more highly skilled staff
than the primary organization. Risk also may be mitigated by transferring the cost of
realized risk to an insurance provider.
• Treat/mitigate the risk. Where other options have been eliminated, suitable controls
must be devised and implemented to prevent the risk from manifesting itself or to
minimize its effects.
1 16
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Turn back. Where the probability or impact of the risk is very low, then management
may decide to ignore the risk.
The system of internal control is said to be well designed and properly operated when:
• All transactions are executed in accordance with management's general or specific
authorization;
• All transactions are promptly recorded in the correct amount, in the appropriate
accounts and in the accounting period during which it is executed to permit
preparation of financial information within a framework of recognized accounting
policies and practices and relevant statutory requirements, if any, and to maintain
accountability for assets;
• Assets are safeguarded from unauthorized access, use or disposition; and
• The recorded assets are compared with the existing assets at reasonable intervals
and appropriate action is taken to reconcile any differences.
• Manual Control: Manually verify that the goods ordered in PO (A) are received (B) in
good quality and the vendor invoice (C) reflects the quantity & price are as per the PO
(A).
1 17
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Semi-Automated Control: Verification of. Goods Receipt (E) with PO (D) could be
automated but the vendor invoice matching could be done manually in a
reconciliation process (G).
Example - Purchase to Pay: Given below is a simple example of controls for the Purchase to
Pay cycle, which is broken down to four main components as shown in the Fig.
• Purchases: When an employee working in a specific department (i.e., marketing,
operations, sales, etc.) wants to purchase something required for carrying out the job,
he/she will submit a Purchase Requisition (PR) to a manager for approval. Based on
the approved PR a Purchase Order (PO) is raised. The PO may be raised manually and
then input into the computer system or raised directly by the computer system.
• Goods Receipt: The PO is then sent to the vendor, who will deliver the goods as per the
specifications mentioned in the PO. When the goods are received at the warehouse,
the receiving staff checks the delivery note, PO number etc. and acknowledges the
receipt of the material. Quantity and quality are checked and any unfit items are
rejected and sent back to the vendor. A Goods Receipt Note (GRN) is raised indicating
the quantity received. The GRN may be raised manually and then input into the
computer system or raised directly by the computer system.
1 18
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Applying IT Controls
It is important for an organization to identify controls as per policy, procedures and its
structure and configure it within IT software as used in the organization.
There are different options for implementing controls as per risk management strategy.
For example, the way banking is done in a nationalized bank is traditional way with rigid
organization structure of managers at different levels, officers and clerks and clear
1 19
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 20
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Value Add areas of Service Level Agreements (SLA): SLA with vendors is regularly
reviewed to ensure that the services are delivered as per specified performance
parameters.
1 21
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 22
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
I. Control Environment
• The Control Environment is the set of standards, processes, and structures that
provide the basis for carrying out internal control across the organization.
• The board of directors and senior management establish the tone at the top
regarding the importance of internal control, including expected standards of
conduct.
• The control environment is manifested in management's operating style, the
ways authority and responsibility are assigned, the functional method of the
audit committee, the methods used to plan and monitor performance and so on.
1 23
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
V. Monitoring of Controls
• Ongoing evaluations, separate evaluations, or some combination of the two are
used to ascertain whether each of the five components of internal control present
and functioning. Findings are evaluated against management's criteria and
deficiencies are communicated to management and the board of directors as
appropriate.
1 24
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
assurance and not absolute assurance about achieving the entity's operational, financial
reporting and compliance objectives. Internal control systems are subject to certain
inherent limitations, such as:
• Management's consideration that the cost of an internal control doesn't exceed the
expected benefits to be derived.
• The fact that most internal controls do not tend to be directed at transactions of
unusual nature. The potential for human error, such as, due to carelessness,
distraction, mistakes of judgement and misunderstanding of instructions.
• The possibility of circumvention of internal controls through collusion with
employees or with parties outside the entity.
• The possibility that a person responsible for exercising an internal control could
abuse that responsibility, for example, a member of management overriding an
internal control.
• Manipulations by management with respect to transactions or estimates and
judgements required in the preparation of financial statements.
1 25
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Link growth, risk and return: Entities accept risk as part of value creation and
preservation, and they expect return matching with the risk. ERM provides an
enhanced ability to identify and assess risks, and establish acceptable levels of risk
relative to growth and return objectives.
• Minimize operational surprises and losses: Entities have enhanced capability to identify
potential events, assess risk and establish responses, thereby reducing the
occurrence of surprises and related costs or losses.
• Seize opportunities: Management considers potential events, rather than just risks,
and by considering a full range of events, management gains an understanding of
how certain events represent opportunities.
1 26
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Enhance risk response decisions: ERM provides the means to identify and select among
alternative risk responses - risk avoidance, reduction, sharing and acceptance. ERM
provides methodologies and techniques for making these decisions.
• Identify and manage cross-enterprise risks: Every entity faces number of risks affecting
different parts of the enterprise. Management needs to not only manage individual
risks, but also understand interrelated impacts.
• Provide integrated responses to multiple risks: Business processes carry many inherent
risks, and ERM enables integrated solutions for managing the risks.
b. Objective Setting: Objectives in line with entity's mission / vision should be set before
management can identify events potentially affecting their achievement.
c. Event Identification: Potential events which includes risks and opportunities that
might have an impact on the entity should be identified. Event identification includes
identifying factors - internal and external - that influence how potential events may
affect strategy implementation and achievement of objectives.
1 27
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
d. Risk Assessment: Identified risks are analyzed to form a basis for determining
how they should be managed. Risk assessment is done to identify impact of such risks
on the organization objectives and strategy.
f. Control Activities: Policies and procedures are established and executed to help
ensure that the risk responses management selected, are effectively carried out.
1 28
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
I.Flowcharting Symbols
BASIC FLOWCHART SHAPES
Pre-defined Process Stored Date Internal Storage Sequential Data Direct Data Manual Input
Auto Height Text Dynamic Connector Line Curve Connector Control Transfer Annotation
1 29
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 30
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 31
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Process Payment
Order Generated
OK? Stopped
Completed Addressed
Yes
No
Invoicing
Credit &
Yes
Order Check OK? Credit Invoice Shipped Invoice
Received Credit OK Prepared Order Sent
Production
Control
Order No
Entered In Stock?
Yes
Copying
Production Diskettes
Scheduled Copied
Assembly &
Order
Shipping
Packages
Assembled Picked
Order
Shipped
1 32
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 33
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
(iii) Vendor
• The vendor receives the PO and carries out his own internal checks.
• Matches the PO with the quotation sent and in the event of any discrepancy will
seek clarification from the enterprise.
• If there are no discrepancies, the vendor will raise an internal sales order within the
enterprise.
• The material is then shipped to the address indicated in the PO.
• The Vendor Invoice (VI) is sent to the Accounts Payable department, based on the
address indicated in the PO.
(iv) Stores
• Receives the material.
• Checks the quantity received with the PO and quality with the users (Quality
Department). If there is any discrepancy the vendor is immediately informed.
1 34
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• The Goods Received Note (GRN) is prepared based on the actual receipt of material
and the stores stock updated. The GRN is then, sent to the Accounts Payable
department for processing the payment.
• A Material Issue Note is created and the material is sent to the concerned user
(Production Department).
1 35
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
No
Send the
Invoice to
Vendor
'Bill To'
Matches with Send the
Receives Prepares a address of
Quote Checks for Material to
the PO Sales Order Customer
Credit Limit 'Ship To' address
Yes
of Customer
Prepare the
Goods
Issue the
Stores
No
Put the
Invoice on
Hold: Clear
the query
1 36
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1. Configuration
• Configuration refers to the way a software system is set up. Configuration is the
process of defining options that are provided.
• Configuration will define how software will function and what menu options are
displayed.
• When the any software is installed, values for various parameters should be set up
(configured) as per policies and business process work flow and business process
rules of the enterprise.
• The various modules of the enterprise such as Purchase, Sales, Inventory, Finance,
User Access etc. have to be configured. Some examples of configuration are given
below:
F User activation and deactivation
F User Access & privileges - Configuration & its management
F Password Management
2. Masters
• Masters refer to the way various parameters are set up for all modules of software,
like Purchase, Sales, Inventory, Finance etc. These drives how the software will
process relevant transactions.
• The masters are set up first time during installation and these are changed whenever
the business process rules or parameters are changed.
1 37
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Examples are Vendor Master, Customer Master, Material Master, Accounts Master,
Employee Master etc.
• Any changes to these data have to be authorised by appropriate personnel and these
are logged and captured in exception reports.
• The way masters are set up will drive the way software will process transactions of
that type.
For example: The Customer Master will have the credit limit of the customer. When an
invoice is raised, the system will check against the approved credit limit and if the
amount invoiced is within the credit limit the invoice will be created if not the invoice
will be put on “credit hold” till proper approvals are obtained.
Some examples of masters are given here:
F Vendor Master: Credit period, vendor bank account details, etc.
F Customer Master: Credit limit, Bill to address, Ship to address, etc.
F Material Master: Material type, Material description, Unit of measure, etc.
F Employee Master: Employee name, designation, salary details, etc.
3. Transactions
Transactions refer to the actual transactions entered through menus and functions in
the application software, through which all transactions for specific modules are
initiated, authorized or approved. For example:
• Sales transactions
• Purchase transactions
• Stock transfer transactions
• Journal entries
• Payment transactions
30. Give two examples each of the Risks and Control Objectives for the following business
processes:
Ans. A) Procure to Pay B) Order to Cash
C) Inventory Cycle D) Human Resource Management
E) Fixed Assets F) General Ledger Account
1 38
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 39
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 40
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Masters
Risks and Control Objectives (Masters-Inventory)
1 41
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 42
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 43
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 44
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Masters
Risks and Control Objectives (Masters-Fixed Assets)
Transactions
Risks and Control Objectives (Transactions-Fixed Assets)
Risk Control Objective
Fixed asset acquisitions are not Fixed asset acquisitions are accurately
accurately recorded. recorded.
Fixed asset acquisitions are not recorded Fixed asset acquisitions are recorded in
in the appropriate period. the appropriate period.
Fixed asset acquisitions are not recorded. All fixed asset acquisitions are recorded.
Depreciation charges are not recorded in All depreciation-charges are recorded in
the appropriate period. the appropriate period.
Fixed asset disposals/transfers are not All fixed asset disposals/transfers are
recorded. recorded.
Fixed asset disposals/transfers are not Fixed asset disposals/transfers are
recorded in the appropriate period. recorded in the appropriate period.
System access to process fixed asset System access to process fixed asset
transactions has not been restricted to transactions has been restricted to the
the authorized users. authorized users.
1 45
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 46
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 47
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
31. Explain the salient features of Section 134 & Section 143 of the Companies Act 2013.
Ans. The Companies Act, 2013
The Companies Act, 2013 has two very important Sections - Section 134 and Section 143,
which have a direct impact on the audit and accounting profession.
(i) Section 134
Section 134 of the Companies Act, 2013 on “Financial statement, Board's report, etc.”
states inter alia:
The Directors' Responsibility Statement referred to in clause (c) of sub-section (3)
shall state that:
The Directors had taken proper and sufficient care for the maintenance of adequate
accounting records in accordance with the provisions of this Act for safeguarding the
assets of the company and for preventing and detecting fraud and other
irregularities;
The Directors, in the case of a listed company, had laid down internal financial
controls to be followed by the company and that such internal financial controls are
adequate and were operating effectively.
Explanation: For the purposes of this clause, the term “internal financial controls”
means the policies and procedures adopted by the company for ensuring the orderly
and efficient conduct of its business, including adherence to company's policies, the
safeguarding of its assets, the prevention and detection of frauds and errors, the
accuracy and completeness of the accounting records, and the timely preparation of
reliable financial information the directors had devised proper systems to ensure
compliance with the provisions of all applicable laws and that such systems were
adequate and operating effectively.
(ii) Section 143
Section 143, of the Companies Act 2013, on “Powers and duties of auditors and
auditing standards” states inter alia:
Section 143(3) contains the auditor's report which states:
“whether the company has adequate internal financial controls system in place and
the operating effectiveness of such controls”;
When we talk in terms of “adequacy and effectiveness of controls”; it refers to the
adequacy of the control design and whether the control has been working effectively
during the relevant financial year. The impact of this statement is that it involves
1 48
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
continuous control monitoring during the year and not a review “as at” a particular
date.
For example, let us assume that a company has a sales invoicing control wherein all
sales invoices raised by the salesman which is greater that `50,000/- are reviewed
and approved by the sales manager. In terms of the of the control design this control
may seem adequate. However, if during audit, it was found that, during the year,
there were many invoices raised by the salesman which was greater than ` 50,000/-
and not reviewed and approved by the sale's manager. In such a case, although the
control design was adequate, the control was not working effectively, due to many
exceptions without proper approval.
As per ICAI's “Guidance Note on Audit of Internal Financial Controls over Financial
Reporting”:
Clause (i) of Sub-section 3 of Section 143 of the Companies Act, 2013 (“the 2013 Act”
or “the Act”) requires the auditors' report to state whether the company has adequate
internal financial controls system in place and the operating effectiveness of such
controls.
I. Auditors' Responsibility
The auditor's objective in an audit of internal financial controls over financial
reporting is to express an opinion on the effectiveness of the company's internal
financial controls over financial reporting and the procedures in respect thereof are
carried out along with an audit of the financial statements. Because a company's
internal controls cannot be considered effective if one or more material weakness
exists, to form a basis for expressing an opinion, the auditor should plan and perform
the audit to obtain sufficient appropriate evidence to obtain reasonable assurance
about whether material weakness exists as of the date specified in management's
assessment. A material weakness in internal financial controls may exist even when
the financial statements are not materially misstated.
1 49
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Risk Identification
Risk
Assessment Risk Analysis
Risk Prioritization
Risk
Management
Risk Reduction
Risk Mitigation
/ Control Risk Planning
Risk Monitoring
1 50
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
(iii) Alternative Actions: deciding and considering other feasible steps to minimize risks.
(iv) Share or Insure: transferring or sharing a portion of the risk, to finance it.
(v) Accept: no action is taken, due to a cost/benefit decision.
32. Explain cyber crime. List out computer related crime defined u/s 43 of IT Act, 2000.
Ans. Cyber Crime: The term 'Cyber Crime' finds no mention either in The Information
Technology Act 2000 or in any legislation of the Country. Cyber Crime is not different than
the traditional crime. The only difference is that in Cyber Crime the computer technology
is involved and thus it is a Computer related crime. This can be explained by the following
instance:
• Traditional Theft: Thief 'A' enters in B's house and steals an object kept in the house.
• Hacking: Many business organizations store their confidential information in
computer system which is often targeted by rivals, criminals and disgruntled
employees. Hacking generally refers to unauthorized intrusion into a computer or a
network. This may be done by either altering system or security features to
accomplish a goal that differs from the original purpose of the system.
I. Computer related offences
Section 43 provides for Penalty and compensation for damage to computer,
computer system, etc.
If any person without permission of the owner or any other person who is in-charge
of a computer, computer system or computer network, or computer resource:
• Accesses or secures access to such computer, computer system or computer
network;
• Downloads, copies or extracts any data, computer database or information from
such computer, computer system or computer network including information or
data held or stored in any removable storage medium;
• Introduces or causes to be introduced any computer contaminant or computer
virus into any computer, computer system or computer network;
• Damages or causes to be damaged any computer, computer system or computer
network, data, computer database or any other programs residing in such
computer, computer system or computer network;
• Disrupts or causes disruption of any computer, computer system or computer
network;
1 51
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Denies or causes the denial of access to any person authorized to access any
computer, computer system or computer network by any means;
• provides any assistance to any person to facilitate access to a computer, computer
system or computer network in contravention of the provisions of this Act, rules or
regulations made thereunder;
• Changes the services availed of by a person to the account of another person by
tampering with or manipulating any computer, computer system, or computer network,
• Destroys, deletes or alters any information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;
• Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention
to cause damage; shall be liable to pay damages by way of compensation to the
person so affected.
33. Explain provisions covering IT related crime and it’s penalties under Information
Technology Act,2000.
Ans. 1. Section 43A: - Compensation for failure to protect data
Where a body corporate, possessing, dealing or handling any sensitive personal data
or information in a computer resource which it owns, controls or operates, (Crime) is
negligent in implementing and maintaining reasonable security practices and
procedures and thereby causes wrongful loss or wrongful gain to any person,
(Punishment)such body corporate shall be liable to pay damages by way of
compensation to the person so affected.
1 52
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 53
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 54
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
having regard to all relevant circumstances, to read, see or hear the matter
contained or embodied in it,
(punishment) shall be punished on first conviction with imprisonment of either
description for a term which may extend to three years and with fine which may
extend to five lakh rupees and in the event of a second or subsequent conviction with
imprisonment of either description for a term which may extend to five years and
also with fine which may extend to ten lakh rupees.
1 55
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
PROVIDED that provisions of Section 67, Section 67A and this section does not extend to
any book, pamphlet, paper, writing, drawing, painting representation or figure in
electronic form –
(i) the publication of which is proved to be justified as being for the public good on the
ground that such book, pamphlet, paper writing, drawing, painting, representation
or figure is in the interest of science, literature, art or learning or other objects of
general concern; or
(ii) which is kept or used for bona fide heritage or religious purposes.
34. Give five examples of Computer Related Offences that can be prosecuted under the
IT Act 2000 (amended via 2008)
Ans. Common Cyber-crime scenarios : Let us look at some common cyber-crime scenarios which
can attract prosecution as per the penalties and offences prescribed in IT Act 2000
(amended via 2008) Act.
• Harassment via fake public profile on social networking site (Section 67): A fake
profile of a person is created on a social networking site with the correct address,
residential information or contact details but he/she is labelled as a person of ‘loose
character’. This leads to harassment of the victim.
• Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, and Bugs: All these are
some sort of malicious programs which are used to destroy or gain access to some
electronic information. Sections 43 and 66 of IT Act, 2000 are applicable in this case.
1 56
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Examples:
• hacking computer systems,
• web site defacing,
• denial-of-service attacks,
• introducing viruses,
• terroristic threats.
Sections 43, 66, 66A of IT Act, 2000 are applicable in this case.
• Email Account Hacking: If any once’s email account is hacked and offensive emails
are sent to contacts stored in that email account. Sections 43, 66, 66A, 66C, 67, 67A
and 67B of IT Act, 2000 are applicable in this case.
• Credit Card Fraud: Unsuspecting victims would use infected computers to make
online transactions.
Sections 43, 66, 66C, 66D of IT Act, 2000 are applicable in this case.
• Online sale of illegal Articles: Where sale of narcotics, drugs, weapons and wildlife is
facilitated by the Internet.
1 57
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
• Source Code Theft: A Source code generally is the most coveted and important
“crown jewel” asset of a company. (include coding for precious software)
Sections 43, 65, 66 and 66B of IT Act, 2000 are applicable in this case.
III. Privacy
• When people access the Web, they often they provide their vital personal information
like their name, address, credit card number, etc. to their Internet Service Providers
and to the websites they accessed. (E.g Amazon.com)
• Information so collected may fall into wrong hands and may be used for illegitimate
purposes (by hacker or organisation).
• The organizations that collect and manage the personal information of people must
also protect it against misuse.
• Multi-national companies often receive information in one country and process this
information in some other country where privacy laws are altogether different.
The main principles on data protection and privacy enumerated under the IT Act, 2000
are as follows:
• Defining ‘data’, ‘computer database’, ‘information’, ‘electronic form’, ‘originator’,
‘addressee’ etc.
• creating civil liability if any person accesses or secures access to computer, computer
system or computer network
1 58
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 59
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 60
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Q.2 Draw a flowchart to calculate discount on sales, where discount is 5 % of sales Output
needs name & PAN also.
Q.3 Draw a flowchart to calculate & print discounted amount, discount rate is 20 % , if sale
is < `10,000 Or else 30 %
Q.4 The goods imported from the foreign countries are classified into four categories for the
purpose of levying custom duty. The rate of custom duty and value of goods for each
category is given in data base :
1. Electronic items 10% 2. Heavy machinery 15%
3. Footwear items 20% 4. All Other Uncategorized items 25%
Draw a flow chart to compute appropriate custom duty including Educational Cess at
the rate of 3% of the value of custom duty
Q. 5. Draw a Flowchart to compute and print income tax, surcharge and education cess on
the income of a person, where income is to be read from terminal and tax is to be
calculated as per the following rates:
Slab(`) Rate
(1) 1 to 1,00,000 No Tax
(2) 1,00,001 to 1,50,000 @10% amount above ` 1,00,000
(3) 1,50,001 to 2,50,000 ` 5,000 + 20% of Amount above ` 1,50,000
(4) 2,50,001 onwards ` 25,000 + 30% of Amount above ` 2,50,000
Q.6. (I) Input name & basic salary for 100 employees.
Each employee contributes 10 % of basic salary towards provident fund. Find and
print the name , P.F. contribution made by each employee.
(II) Also print the total contribution of all employees
1 61
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Q.7. A book publisher offers discount to customers on the basis of customer type and
number of copies ordered as shown below
Customer type Number of Copies Ordered % of discount
Book Seller More than 10 25
Less than or equal to 10 15
Library More than 5 20
Less than or equal to 5 10
Customer number , name , type , book number , number of copies ordered and unit
price are given as input . Draw a flow chart to calculate the net amount of the bill
for each customer and print it . The above is to be carried out for 50 customers.
Q.8. An electric supply company charges the following rates from its consumers
No. of Units consumed Charges (` /unit )
For the first 200 units 2.50
For the next 300 units 3.50
Over 500 units 5.00
Computer database of the company has the following information :
1) Consumer name 2) Address 3) Unit consumed
4) Bill Date 5) Payment date
• If the consumer pays his bill within 15 days from the bill date,10 % discount is
given.
• If he makes the payment after 15 days from the bill date,5 % surcharge is
levied.
Draw a flow chart to calculate the net amount of the bill for each consumer
and print it.
1 62
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
bill within 15 days, no discount is given. If he makes the payment after 15 days of the
bill date, 10% surcharge is levied.
For the non-domestic consumers (commercial or industry), corresponding percentages
be 10%, 0% and 15% respectively draw a flow chart to calculate the bill amount,
discount, surcharge and net amount of the bill for each type of consumer and print it.
Q.10. A bicycle shop in a city hires bicycles by the day at different rates for different models as
below
Model no Hire rate per day (`)
Model No.1 14.00
Model No.2 12.00
Model No.3 10.00
In order to attract customers , the shopkeeper gives a discount on the number of days a
bicycle is hired for .The policy of discount is as given below
No.of days Discount Rate(%)
1-5 0.00
6-10 8
11 and over 15
For every bicycle hired a deposit of Rs.30.00 must be paid. Develop a flow chart to print
out details for each customer such as name of the customer, bicycle model number,
number of days a bicycle is hired for, hire charges, discount and total charges.
Q.11. A Housing Society in a newly developed Smart City has provided several advanced
security systems to each house in that city. Based on the value of these advanced
security systems installed in each house, the Society has divided all the houses in four
categories and fixed the criteria for annual maintenance charges as under:
House Category Maintenance charges as % of value of
advanced security systems installed at house
A 8%
B 6%
C 4%
D 3%
1 63
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Q.13. The GST of 50 items is to be calculated as per the following details. With Code No. and
Value of Supply as input, draw a flowchart to calculate the Tax and print the Tax,
Code No. of the Item and the Type of Item. (Note: The rates have been taken
hypothetically)
Code No.(C_No) Types of Items Tax Rate
001 Perishable 15%
002 Textiles 10%
003 Luxury Items 20%
004 Machinery 12%
1 64
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Q.14 A bicycle shop in Delhi provides hired bicycles for day(s) at different rates as shown in
table:
Season Charges per day
Spring (March - May) ₹ 8.00
Summer (June - August) ₹ 9.50
Autumn (Sept - Nov.) ₹ 5.00
Winter (Dec. - Feb.) ₹ 6.00
To attract his customers, the proprietor also gives a discount on the number of days a
bicycle is hired for. If the hire period is more than 10 days, a reduction of 15% is made.
For every bicycle hired, a deposit of ₹ 20 must be paid.
Develop a flowchart to print out the details for each customer such as name of
customer, number of days a bicycle is hired for, hire-charges and total charges
including the deposit. It is also assumed that there are 25 customers and complete
details for each customer such as name of customer, season and number of days the
bicycle is required for is inputted through console.
START
S=Z
Z=Y
Y=X
X=S
I=I+1
No
Step B If
I=1
Yes
PRINT X,Y,Z
STOP
1 65
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Q.16. (a) Draw a flow chart to incorporate for the following steps:
L1 N =1
L2 PRINT N
L3 N=N x (N+1)
L4 STOP when N exceeds 100
L5 GOTO L2
Note that in step L3, 'x' denotes multiplication sign.
(b) List the output for the above program.
(c) List the output if the above program is modified in the step L 1 as N =0
1 66
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
CLASSWORK SECTION
1. Risk Management: Risk Management is the process of assessing risk, taking steps to
reduce risk to an acceptable level and maintaining that level of risk. Risk
management involves identifying, measuring, and minimizing uncertain events
affecting resources.
1 67
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
4. Threat: Any entity, circumstance, or event with the potential to harm the software
system or component through its unauthorized access, destruction, modification,
and/or denial of service is called a Threat. It is an action, event or condition where
there is a compromise in the system, its quality and ability to inflict harm to the
organization. Threat has capability to attack on a system with intent to harm.
5. Exposure: An exposure is the extent of loss the enterprise has to face when a risk
materializes. It is not just the immediate impact, but the real harm that occurs in the
long run. For example - loss of business, failure to perform the system's mission, loss
of reputation, violation of privacy and loss of resources etc.
6. Likelihood: Likelihood of the threat occurring is the estimation of the probability that
the threat will succeed in achieving an undesirable event. The presence, tenacity and
strengths of threats, as well as the effectiveness of safeguards must be considered
while assessing the likelihood of the threat occurring.
that may be
reduced by
may be aware of
Vulnerabili es
Threat Agents
leading to
Risk
give that
rise exploit to
that increase
to
Threats to
Assets
wish to abuse and/or may damage
1 68
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
9. Risk can be defined as the potential harm caused if a threat exploits a particular
vulnerability to cause damage to an asset.
10. Risk Analysis is defined as the process of identifying security risks and determining
their magnitude and impact on an organization.
Example 1: Draw a Flowchart for finding the sum of first 100 odd numbers.
Solution : The flowchart is drawn as Fig. 1.7.3 and is explained step by step below. The
step numbers are shown in the flowchart in circles and as such are not a part of the
flowchart but only a referencing device.
Our purpose is to find the sum of the series 1, 3, 5, 7, 9,................(100 terms.) The student
can verify that the 100th term would be 199. We propose to set A = 1 and then go on
incrementing it by 2 so that it holds the various terms of the series in turn. B is an
accumulator in the sense that A is added to B whenever A is incremented. Thus, B will
hold:
1 69
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1
1+3=4
4 + 5 = 9,
9 + 7 = 16, etc. in turn.
Step 1 - All working locations are set at zero. This is necessary because if they are
holding some data of the previous program, that data is liable to corrupt the
result of the flowchart.
Step 2 - A is set at 1 so that subsequently by incrementing it successively by 2, we get
the wanted odd terms: 1,3,5,7 etc.
Step 3 - A is poured into B i.e., added to B. B being 0 at the moment and A being 1, B
becomes 0 + 1 = 1.
Step 4 - poses a question. “Has A become 1999” if not, go to step 5, we shall increment
A by 2. So that although at the moment A is 1, it will be made 3 in step 5, and
so on. Then go back to step 3 by forming loop.
START
1
CLEAR WORKING
LOCATIONS
SET 2
A=1
5
B=B+A 3
A=A+2
A=199
? 4
NO
YES
PRINT B 6
END
1 70
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Example 2
An E-commerce site has the following cash back offers.
(i) If the purchase mode is via website, an initial discount of 10% is given on the bill
amount.
(ii) If the purchase mode is via phone app, an initial discount of 20% is given on the bill
amount.
(iii) If done via any other purchase mode, the customer is not eligible for any discount.
Every purchase eligible to discount is given 10 reward points.
(a) If the reward points are between 100 and 200 points, the customer is eligible for a
further 30% discount on the bill amount after initial discount.
(b) If the reward points exceed 200 points, the customer is eligible for a further 40%
discount on the bill amount after initial discount.
Taking purchase mode, bill amount and number of purchases as input; draw a
flowchart to calculate and display the total reward points and total bill amount
payable by the customer after all the discount calculation.
Solution
PM: Purchase Mode,
BA: Bill Amount,
TBA: Total Bilk Amount,
NOP: Number of Purchases,
TRP: Total Reward Points, IN DISC: Initial Discount
ET_DISC: Extra Discount on purchases
N: Counter (to track the no. of purchases),
1 71
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Start
TRP = 0, TBA = O, BA = 0
Yes
If PM = Website? IN_DISC = 0.10
No
Yes
If PM = Phone App?
IN_DISC = 0.20
No
IN_DISC = 0 TRP = NOP* 10
BA = BA - (BA*IN_DISC)
Yes
ET_DISC = 0.30 If 100 <= TRP <= 200?
No
Yes
ET_DISC = 0.40 If TRP > 200?
No
TBA = BA - (BA*ET_DISC) TBA = BA
Example 3
A bank has 500 employees. The salary paid to each employee is sum of his Basic Pay (BP),
Dearness Allowance (DA) and House Rent Allowance (HRA). For computing HRA, bank
has classified his employees into three classes A, B and C. The HRA for each class is
computed at the rate of 30%, 20% and 10% of the BP Pay respectively. The DA is
computed at a flat rate of 60% of the Basic Pay. Draw a flow chart to determine
percentage of employee falling in the each of following salary slabs:
(i) Above ` 30,000
(ii) ` 15,001 to ` 30,000
(iii) ` 8,001 to ` 15,000
(iv) Less than or equal to ` 8,000
1 72
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Solution
START
I=1
IF No IF No
CLASS=“A” CLASS=“B” HRA = 0.1*BASIC
? ?
Yes Yes
HRA = 0.3 * BASIC HRA = 0.2*BASIC
DA = 0.6 * BASIC
P4= C4*100/500
Stop
1 73
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
2(a) “Access” with its grammatical variations and cognate expressions means gaining
entry into, instructing or communicating with the logical, arithmetical, or memory
function resources of a computer, computer system or computer network;
2(i) “Computer” means any electronic, magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic, and memory
functions by manipulations of electronic, magnetic or optical impulses, and includes
all input, output, processing, storage, computer software, or communication
facilities which are connected or related to the computer in a computer system or
computer network;
2(v) “Information” includes data, message, text, images, sound, voice, codes, computer
programmes, software and databases or microfilm or computer generated
microfiche;
In a cyber-crime, computer or the data are the target or the object of offence or a tool
in committing some other offence. The definition of term computer elaborates that
computer is not only the computer or laptop on our tables, as per the definition
computer means any electronic, magnetic, optical or other high speed data
1 74
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
processing devise of system which performs logical, arithmetic and memory function
by manipulations of electronic, magnetic or optical impulses, and includes all input,
output, processing, storage, computer software or communication facilities which
are connected or related to the computer in a computer system or computer network.
Thus, the definition is much wider to include mobile phones, automatic washing
machines, micro-wave ovens etc.
1 75
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
Q.1 Draw a flowchart to draw & print discounted amount, where Discount is 5 %
Q.2 Draw a flowchart to calculate Simple Interest, if rate of interest for Indians 10 % and for
others 20 %
Q. 3 Draw flow chart to compute and print income-tax and surcharge on the income of the
individual, the income is to be read from terminal and tax is to be calculated as per the
following rates:
Income (in `) Rate
Up to 50,000 No tax
From 50,001 to 60,000 @10% of amount above ` 50,000
From 60,001 to 1,50,000 ` 1000+20% of amount above ` 60,000
Above Rs. 1,50,000 `19,000 + 30% of amount above ` 1,50,000
Charge surcharge @5% on the amount of tax, if the income of a person exceeds ` 60,000
Q.4 Draw a flowchart to calculate Simple Interest of 50 customers & calculate total simple
interest of 50 customers
Q.5 An electric supply company charges the following rates from its consumers
No. of Unit consumed Charges/unit (`)
For the first 200 units 2.50
For the next 300 units 3.50
Over 500 units 5.00
Surcharge @ 20 % of bill is to be added to the charges to the bill .
Draw a flowchart to read the consumer no & no of units consumed & print out Total
charges with customer number & units consumed
1 76
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
(1) If the payment mode chosen is 'Paxis Credit,' then a 20% discount is given to the user.
(2) If the payment mode chosen is 'Paxis Debit,' then a 10% discount is given to the user.
(3) If other payment modes are used, then no discount is given.
Also, to promote the downloads of its new smartphone app, the company has decided to
give the following offer:
(1) If the purchase mode is 'Mobile App,' then no surcharge is levied on the user.
(2) If any other purchase mode is used, then additional 5% surcharge is levied on the
user.
This surcharge is applied on the bill after all necessary discounts have been applied.
With bill amount, payment mode and purchase mode as inputs, draw a flowchart for the
billing procedure for Leebay.
Q.7 A company is selling three types of products, namely, A, B and C to two different types of
customers viz, dealers and retailers. To promote the sales, the company is offering the
following discounts:
(i) 10% discount is allowed on Product A, irrespective of the category of customers and
the value of order.
(ii) On product B, 8% discount is allowed to retailers and 12% discount to dealers,
irrespective of the value of order.
(iii) On product C, 15% discount is allowed to retailers irrespective of the value of order
and 20% discount to dealers if the value of order is minimum of `10,000.
Draw a flowchart to calculate the discount for the above policy.
Q.8 A bicycle shop in a city provides rental facility to its customers at different rates for
different models as given below:
Model No. Hire rate per day
Model No. 1 ` 10
Model No. 2 `9
Model No. 3 `8
Model No. 4 `7
To attract customers, the shopkeeper gives a discount of 15 percent to all those
customers, who hire a bicycle for more than one-week period. Further to attract women
customer, he gives additional discount of 10 percent irrespective of hire period. For
1 77
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
every bicycle hired, a security deposit of ` 25 must be paid. Draw a flow chart to print out
the details of each customer such as name of customer, bicycle model number, number
of days a bicycle is hired for, hire charges, discount and total charges including deposits.
1 78
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 79
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
9. Which one of the following deals with Section 143 of the Companies Act 2013?
(a) Acquisition and Mergers
(b) Powers and duties of Board of Directors
(c) Powers and duties of auditors and auditing standards
(d) Penalties due to non-compliance
10. Which one of the following is not defined as Sensitive Personal Information?
(a) Home address (b) Password
(c) Financial information (d) Biometric information
11. Which one of the following represents Management Processes?
(a) Deals with legal compliance
(b) Deal with the core business and value chain
(c) Deal with core processes and functions within an organization
(d) Deals with measuring, monitoring and control activities
12. Which one of the following deals with Section 134 of the Companies Act 2013?
(a) Acquisition and Mergers
(b) Powers and duties of Board of Directors
(c) Powers and duties of auditors and auditing standards
(d) Penalties due to non-compliance
13. Which one of the following is not a benefit of Enterprise Risk Management?
(a) Align Risk appetite with strategy
(b) Link risk, return and growth
(c) Seize opportunity
(d) Reduce turnaround time
14. Which one of the following is not an objective of Business process Automation or
Success factors of BPA?
(a) Confidentiality (b) Integrity
(c) Adequacy (d) Timeliness
15. Which one of the following is not a benefit of flow charts?
(a) Quicker grasp of relationships (b) Documentation
(c) Program Debugging (d) Reproduction
16. Which of the following is not a symbol of DFD?
(a) Process (b) Decision Box
(c) Data Flow (d) External Agent
1 80
CHAPTER 1 : AUTOMATED BUSINESS PROCESSES
1 B 2 B 3 C 4 D 5 A 6 D
7 B 8 B 9 C 10 A 11 D 12 B
13 D 14 C 15 D 16 B 17 B 18 A
19 A 20 C 21 D 22 C
1 81