看过来:2020年宁夏ACCA考试成绩查询相关事宜

发布时间:2020-10-19


宁夏的小伙伴注意了,9ACCA考试可以查询成绩了,各位已经查询成绩了吗?还未查询的小伙伴也不要着急,先来看看本文的相关内容,再查询成绩也不迟。

20209ACCA考试成绩已公布,考生现在登录ACCA官网即可查询。

ACCA考试成绩查询方式一共有三种,分别是:手机短信通知、邮件通知、在线查询。

(一)手机短信通知

(二)邮件通知

ACCA官方会根据所有考生的预留手机号和注册邮箱地址,通过短信和电子邮件的形式将成绩单发送给各位考生。不过,要实现这一功能,需要学员自行登录My ACCA账户中,设置邮件或短信通知成绩这一选项。

(三)在线查询

1. 进入ACCA官网http://www.accaglobal.com/hk/en.html 点击右上角My ACCA进行登录;

2. 输入账号、密码登录后进入主页面,点击Exam status & Results

3. 跳转页面后选择View your status report

ACCA成绩查询结果显示:

ACCA全球官方网站http://www.accaglobal.com/hk/en.html;点击Myacca登陆,点左面框架里的“EXAMS”进入页面,中间有一段:

EXAM STATUS REPORT Your status report provides details of the ACCA exams you have already passed and those you have still to complete EXAM STATUS REPORT Your status report provides details of the ACCA exams you have already passed and those you have still to complete View your status report——这个是超级链接,点击进入就可以查看学员全部的考试分数记录。

9ACCA考试成绩常见问题:

1ACCA成绩有效期

ACCA 应用知识和技能课程阶段的成绩永久有效,但战略阶段课程成绩仅7年内有效。即:从学员通过战略阶段的第一门科目开始,7年内需完成战略阶段所要求的所有科目,否则从第8年开始第1年所考过的战略阶段科目成绩将会被视为过期作废。

此政策实行滚动式废除,也就是说不会在第8年时把之前7年所有考过的P阶段科目成绩都废除,只会废除第1年考过的战略阶段科目成绩,第9年会废除前2年所通过的战略阶段科目成绩,以此类推。

2、何时申请成绩复议,具体步骤

学员须在考试成绩发布日后的15个工作日内提出复议申请,具体申请的步骤为:

(1):登录进入Myacca

(2):点击“Exam Status and Results”里面有“Administrative Review”

(3):填写和提交表格即可。

一旦成绩有误,那么学员会在下次报考截止日期前收到改正后的考试成绩。

说明:因考试政策、内容不断变化与调整,51题库考试学习网提供的考试信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

以上就是今日51题库考试学习网分享的全部内容,各位小伙伴一定记得找时间查询成绩,如需了解更多ACCA考试的相关内容,记得关注51题库考试学习网!


下面小编为大家准备了 ACCA考试 的相关考题,供大家学习参考。

(ii) Describe the basis for the calculation of the provision for deferred taxation on first time adoption of IFRS

including the provision in the opening IFRS balance sheet. (4 marks)

正确答案:
(ii) A company has to apply IAS12 to the temporary differences between the carrying amount of the assets and liabilities in
its opening IFRS balance sheet (1 November 2003) and their tax bases (IFRS1 ‘First time adoption of IFRS’). The
deferred tax provision will be calculated using tax rates that have been enacted or substantially enacted by the balance
sheet date. The carrying values of the assets and liabilities at the opening balance sheet date will be determined by
reference to IFRS1 and will use the applicable IFRS in the first IFRS financial statements. Any adjustments required to
the deferred tax balance will be recognised directly in retained earnings.
Subsequent balance sheets (at 31 October 2004 and 31 October 2005) will be drawn up using the IFRS used in the
financial statements to 31 October 2005. The deferred tax provision will be adjusted as at 31 October 2004 and thenas at 31 October 2005 to reflect the temporary differences arising at those dates.

This information was taken from an internal newsletter of The Knowledge Partnership LLP (TKP), a company which offers project and software consultancy work for clients based in Zeeland. The newsletter was dated 2 November 2014 and describes two projects currently being undertaken by the partnership.

Project One

In this project, one of our clients was just about to place a contract for a time recording system to help them monitor and estimate construction contracts when we were called in by the Finance Director. He was concerned about the company supplying the software package. ‘They only have an annual revenue of $5m’, he said, ‘and that worries me.’ TKP analysed software companies operating in Zeeland. It found that 200 software companies were registered in Zeeland with annual revenues of between $3m and $10m. Of these, 20 went out of business last year. This compared to a 1% failure rate for software companies with revenues of more than $100m per year. We presented this information to the client and suggested that this could cause a short-term support problem. The client immediately re-opened the procurement process. Eventually they bought a solution from a much larger well-known software supplier. It is a popular software solution, used in many larger companies.

The client has now asked us to help with the implementation of the package. A budget for the project has been agreed and has been documented in an agreed, signed-off, business case. The client has a policy of never re-visiting its business cases once they have been accepted; they see this as essential for effective cost control. We are currently working with the primary users of the software – account managers (using time and cost data to monitor contracts) and the project support office (using time and cost data to improve contract estimating) – to ensure that they can use the software effectively when it is implemented. We have also given ‘drop in’ briefing sessions for the client’s employees who are entering the time and cost data analysed by the software. They already record this information on a legacy system and so all they will see is a bright new user interface, but we need to keep them informed about our implementation. We are also looking at data migration from the current legacy system. We think some of the current data might be of poor quality, so we have established a strategy for data cleansing (through offshore data input) if this problem materialises. We currently estimate that the project will go live in May 2015.

Project Two

In this project, the client is the developer of the iProjector, a tiny phone-size projector which is portable, easy to use and offers high definition projection. The client was concerned that their product is completely dependent on a specialist image-enhancing chip designed and produced by a small start-up technology company. They asked TKP to investigate this company. We confirmed their fears. The company has been trading for less than three years and it has a very inexperienced management team. We suggested that the client should establish an escrow agreement for design details of the chip and suggested a suitable third party to hold this agreement. We also suggested that significant stocks of the chip should be maintained. The client also asked TKP to look at establishing patents for the iProjector throughout the world. Again, using our customer contacts, we put them in touch with a company which specialises in this. We are currently engaged with the client in examining the risk that a major telephone producer will launch a competitive product with functionality and features similar to the iProjector.

The iProjector is due to be launched on 1 May 2015 and we have been engaged to give advice on the launch of the product. The launch has been heavily publicised, a prestigious venue booked and over 400 attendees are expected. TKP have arranged for many newspaper journalists to attend. The product is not quite finished, so although orders will be taken at the launch, the product is not expected to ship until June 2015.

Further information:

TKP only undertakes projects in the business culture which it understands and where it feels comfortable. Consequently, it does not undertake assignments outside Zeeland.

TKP has $10,000,000 of consultant’s liability insurance underwritten by Zeeland Insurance Group (ZIG).

Required:

(a) Analyse how TKP itself and the two projects described in the scenario demonstrate the principles of effective risk management. (15 marks)

(b) Describe the principle of the triple constraint (scope, time and cost) on projects and discuss its implications in the two projects described in the scenario. (10 marks)

正确答案:

(a) The first stages of risk management are the identification, descriptions and assessment of the risk. This assessment is primarily concerned with the likelihood of them occurring and the severity of impact on the organisation or project should they occur. Sometimes the likelihood is a subjective probability, the opinions of experienced managers or experts in the field. On other occasions, there is some statistical evidence on which to base the assessment. For example, in project 1, TKP identified that 20 IT software companies with annual revenues between $3m and $10m went out of business last year. This represented 10% of the total number of software companies reporting such revenues. Its report to the client suggested that there was a 10% chance of the current preferred supplier (who had a turnover of $5m) ceasing business and this would have a significant short-term support implication. This compared to a business failure rate of 1% for software companies with an annual revenue exceeding $100m. The client felt that the probability of supplier failure was too high, so eventually bought a software solution from a much larger, well-known, software supplier. In this case, the likelihood of the risk led the client to changing its procurement decision. The risk itself does not go away, large companies also fail, but the probability of the risk occurring is reduced.

The avoidance (or prevention) of a risk is a legitimate risk response. In project 1, the client could avoid the risk ‘failure of the supplier’ by commissioning an in-house bespoke solution. Similarly, TKP itself avoids the risks associated with trading in different cultures, by restricting its projects to clients based in Zeeland.

There are three further responses to risks.

Risk mitigation (or risk contingency) actions are what the organisation will do to counter the risk, should the risk take place. Mitigation actions are designed to lessen the impact on the organisation of the risk occurring. In project 2, TKP recommends that the producers of the iProjector should establish an escrow agreement with the company which produces the chip which enhances the quality of the projected image. It was agreed that design details of this chip should be lodged with a third party who would make them available to the producers of the iProjector should the company which owned the enhanced image technology cease trading. This is a mitigation approach to the risk ‘failure of the supplier’. The supplier is relatively high risk (less than three years of trading, inexperienced management team), and the product (the iProjector) is completely dependent upon the supply of the image enhancing chip. The failure of the business supplying the chips would have significant impact on iProjector production. If the escrow agreement had to be enacted, then it would take the producers of the iProjector some time to establish alternative production. Consequently (and TKP have suggested this), it might be prudent to hold significant stocks of the chips to ensure continued production. In such circumstances, the need to mitigate risk is more important than implementing contemporary just-in-time supply practices. In some instances a mitigation action can be put in place immediately. In other instances risk mitigation actions are only enacted should the risk occur. The risk has been recognised and the organisation has a rehearsed or planned response. For example, in project 1, TKP has identified ‘poor quality of current data’ as a risk associated with the migration of data from the current systems to the proposed software package solution. It has established a strategy for data cleansing if that risk actually materialises. Importantly, the client knows in advance how to respond to a risk. It avoids making a hasty, ill-thought out response to an unforeseen event.

Risk transfer actions are concerned with transferring the risk and the assessment and consequences of that risk to another party. This can be done in a number of ways. TKP itself has liability insurance which potentially protects the company from the financial consequences of being sued by clients for giving poor advice. TKP has identified this as a risk, but is unlikely to be able to assess either the probability of that risk occurring or establishing meaningful mitigation measures to minimise the effect of that risk. Consequently, the responsibility for both of these is transferred to an insurance company. They establish the risk, through a series of questions, and compute a premium which reflects the risk and the compensation maximum which will have to be paid if that risk occurs. TKP pays the insurance premiums. TKP itself also transfers risks in project 2. It is unsure about how to establish patents and so it refers the client to another company. Transferring avoids the risk associated with ‘establishing the patent incorrectly’ and the financial consequences of this.

Finally, risk may be identified but just accepted as part of doing business. Risk acceptance is particularly appropriate when the probability of the risk is low or the impact of that risk is relatively insignificant. Risks may also be accepted when there are no realistic mitigation or transfer actions. In project 2, the producers of the iProjector are concerned that there is ‘a risk that a major telephone producer will launch a product with features and functionality similar to ours’. This is a risk, but there is little that can be done about it. Risks of competition are often best accepted.

The discussion above is primarily concerned with deciding what action to take for each risk. Once these actions are agreed, then a plan may be required to put them into place. For example, establishing an escrow agreement will require certain activities to be done.

Risks must also be monitored. For example, in project 2, the risk of supplier failure can be monitored through a company checking agency. Many of these companies offer a continuous monitoring service which evaluates financial results, share prices and other significant business movements. Reports are produced, highlighting factors which may be of particular concern. Risks will also disappear once certain stages of the project have been completed and, similarly, new ones will appear, often due to changes in the business environment. Many organisations use a risk register or risk log to document and monitor risks and such logs often specify a risk owner, a person responsible for adequate management of the risk.

(b) Every project is constrained in some way by its scope, time and cost. These limitations are often called the triple constraint. The scope concerns what has to be delivered by the project, time is when the project should deliver by, and cost is concerned with how much can be spent on achieving the deliverable (the budget). Quality is also an important feature of projects. Some authors include quality in their triple constraint (instead of scope), others add it as a further constraint (quadruple constraint), whilst others believe that quality considerations are inherent in setting the scope, time and cost goals of a project. How a particular project is managed depends greatly on the pressures in the triple constraint.

In project 1, the reluctance of the company to re-visit the business case means that the budget (or cost) of the solution is fixed. The implementation date might be desirable, but it does not seem to be business critical. It is an internal system and so any delays in implementation will not affect customers. It will also be a relatively seamless transition for most employees in the company. They already record the time record details which the new system will collect and so all they will see is a changed user interface. Only the direct users of the output (account managers and the project office) will be affected by any delay. The scope of the software package is also pre-defined. If it fails to meet requirements, then the users will have to adjust their expectations or business methods. There is no money to finance customisation or add-on systems, so in this sense the scope of the solution is also fixed. The quality of the software, in terms of its reliability and robustness, should also be good, as it is a popular software solution used in many large companies.

In project 2, the launch date is fixed. It has been heavily publicised, the venue is booked and over 400 attendees are expected, including newspaper journalists. Thus the time of the project is fixed. However, although orders will be taken at the launch, the product is not expected to ship until a month after launch. Thus the scope of the product shown at the launch date might be restricted and inherent quality problems might not yet be solved. Any defects can be explained away (this is a pre-production model) or, more effectively, they may be avoided by ensuring that the product is demonstrated to attendees, not used by them. The project manager must ensure that key functionality of the product is available on launch date (such as producing an image of a certain quality), but other functionality, not central to the presentation (for example, promised support for all image file formats) could be delayed until after the presentation. The company should make extra funds available to ensure that the launch date is successful.


(ii) Discuss whether gains and losses that have been reported initially in one section of the performance

statement should be ‘recycled’ in a later period in another section and whether only ‘realised’ gains and

losses should be included in such a statement. (9 marks)

正确答案:
(ii) Recycling is an issue for both the current performance statements and the single statement. Recycling occurs where an
item of financial performance is reported in more than one accounting period because the nature of the item has in some
way changed. It raises the question as to whether gains and losses originally reported in one section of the statement
should be reported in another section at a later date. An example would be gains/losses on the retranslation of the net
investment in an overseas subsidiary. These gains could be reported annually on the retranslation of the subsidiary and
then again when the subsidiary was sold.
The main arguments for recycling to take place are as follows:
1. when unrealised items become realised they should be shown again
2. when uncertain measurements become certain they should be reported again
3. all items should be shown in operating or financing activities at some point in time as all items of performance are
ultimately part of operating or financing activities of an entity.
There is no conceptual justification for recycling. Once an item has been recognised in a statement of financial
performance it should not be recognised again in a future period in a different part of that statement. Once an item is
recognised in the statement there is an assumption that it can be reliably measured and therefore it should be recognised
in the appropriate section of the statement with no reason to show it again.
Gains and losses should not be based on the notion of realisation. Realisation may have been a critical event historically
but given the current financial exposures of many entities, such a principle has limited value. A realised gain reflects the
same economic gain as an unrealised gain. Items should be classified in the performance statement on the basis of
characteristics which are more useful than realisation. The effect of realisation is explained better in the cash flow
statement. Realisation means different things in different countries. In Europe and Asia it refers to the amount of
distributable profits but in the USA it refers to capital maintenance. The amount of distributable profits is not an
accounting but a legal issue, and therefore realisation should not be the overriding determinant of the reporting of gains
and losses.
An alternative view could be that an unrealised gain is more subjective than a realised gain. In many countries, realised
gains are recognised for distribution purposes because of their certainty because this gives more economic stability to
the payment of dividends.

(b) Distinguish between strategic and operational risks, and explain why the secrecy option would be a source

of strategic risk. (10 marks)

正确答案:
(b) Strategic and operational risks
Strategic risks
These arise from the overall strategic positioning of the company in its environment. Some strategic positions give rise to
greater risk exposures than others. Because strategic issues typically affect the whole of an organisation and not just one or
more of its parts, strategic risks can potentially concern very high stakes – they can have very high hazards and high returns.
Because of this, they are managed at board level in an organisation and form. a key part of strategic management.
Operational risks
Operational risks refer to potential losses arising from the normal business operations. Accordingly, they affect the day-to-day
running of operations and business systems in contrast to strategic risks that arise from the organisation’s strategic positioning.
Operational risks are managed at risk management level (not necessarily board level) and can be managed and mitigated by
internal control systems.
The secrecy option would be a strategic risk for the following reasons.
It would radically change the environment that SHC is in by reducing competition. This would radically change SHC’s strategic
fit with its competitive environment. In particular, it would change its ‘five forces’ positioning which would change its risk
profile.
It would involve the largest investment programme in the company’s history with new debt substantially changing the
company’s financial structure and making it more vulnerable to short term liquidity problems and monetary pressure (interest
rates).
It would change the way that stakeholders view SHC, for better or worse. It is a ‘crisis issue’, certain to polarise opinion either
way.
It will change the economics of the industry thereby radically affecting future cost, revenue and profit forecasts.
There may be retaliatory behaviour by SHC’s close competitor on 25% of the market.
[Tutorial note: similar reasons if relevant and well argued will attract marks]

声明:本文内容由互联网用户自发贡献自行上传,本网站不拥有所有权,未作人工编辑处理,也不承担相关法律责任。如果您发现有涉嫌版权的内容,欢迎发送邮件至:contact@51tk.com 进行举报,并提供相关证据,工作人员会在5个工作日内联系你,一经查实,本站将立刻删除涉嫌侵权内容。