Trending ▼   ResFinder  

CA IPCC : Question Paper (with Answers) - INFORMATION TECHNOLOGY & STRATEGIC MANAGEMENT Nov 2014

19 pages, 38 questions, 0 questions with responses, 0 total responses,    0    0
CA IPCC
Tilak Vidyalaya Higher Secondary School (TVHSS), Kallidaikurichi
+Fave Message
 Home > ca_ipcc >   F Also featured on: seethalakshmi123 rohityadav27

Formatting page ...

DISCLAIMER The Suggested Answers hosted in the website do not constitute the basis for evaluation of the students answers in the examination. The answers are prepared by the Faculty of the Board of Studies with a view to assist the students in their education. While due care is taken in preparation of the answers, if any errors or omissions are noticed, the same may be brought to the attention of the Director of Studies. The Council of the Institute is not in anyway responsible for the correctness or otherwise of the answers published herein. The Institute of Chartered Accountants of India PAPER 7 : INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT SECTION A : INFORMATION TECHNOLOGY Question No. 1 is compulsory Answer any five questions from the rest. Question 1 Answer all the following questions in brief: (a) Differentiate between flow-chart and data flow diagram. (b) What is Bluetooth? Name any two devices that utilize Bluetooth technology. (c) Define Virtual Private Networks (VPN). (d) What is the difference between electronic cheque and paper cheque? (e) What are the objectives of business process automation? (2 x 5 = 10 Marks) Answer (a) Flowchart Data Flow Diagram Flow chart presents steps to complete a process. Data Flow Diagram presents the flow of data. Flow chart does not have any input from or output to an external source. DFD describes the path of data from an external source to internal source or vice versa. The timing and sequence of the process is aptly shown by a flowchart. Whether processing of data is taking place in a particular order or several processes are taking place simultaneously is described by a DFD. Flow chart shows how to make a system function. DFD defines the functionality of a system. Flow chart is used in designing a process. DFD is used to describe the path of data that will complete the process. Types of Flow charts System, Data, Document and Program. Types of DFD Physical data flow and Logical data flow. (b) Bluetooth: Bluetooth is a wireless technology standard for exchanging data over short distances up to 50 meters (164 feet) from fixed and mobile devices, creating Personal Area Networks (PANs) with high levels of security. Bluetooth is like a very low-power, short-range radio signal. Bluetooth signals are secure from the moment they're sent. The Institute of Chartered Accountants of India 44 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 Few devices that utilize Bluetooth technology are as follows: Keyboards; Mice; Printers; Mobile Phones; Headsets; PDAs (Personal Digital Assistants); Desktop; Laptop Computers; Digital Cameras; and Remotes. (c) Virtual Private Network: It is a private network that uses a public network (usually the Internet) to connect remote sites or users together. By using a VPN, businesses ensure security anyone intercepting the encrypted data can t read it. VPN is a secure network that uses the Internet as its main backbone network, but relies on the firewalls and other security features of the Internet and Intranet connections and those of participating organizations. (d) An e-cheque is an instrument where one person issues it to pay another person but there is no paper involved. Everything is electronic. An electronic cheque can be protected against any fraud by encoding sender s account number with the bank s public key thereby not revealing the sender s account number to the merchant. As with the SET protocol, digital certificates can be used to authenticate the payer, the payer s bank, and bank account. However, no such encoding of sender s account number is possible in case of paper cheque. E-cheque is faster and more convenient than paper cheque. It is environmentally friendly too. (e) The objectives of Business Process Automation are as follows: Confidentiality: To ensure that data is only available to persons who have right to see the same; Integrity: To ensure that no un-authorized amendments can be made in the data; Availability: To ensure that data is available when asked for; and Timeliness: To ensure that data is made available in at the right time. Question 2 (a) What are the various key factors to be considered in implementing Business Process Management (BPM) in an enterprise? (4 Marks) The Institute of Chartered Accountants of India PAPER 7: INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT 45 (b) What are the major reasons for failure of Business Process Management System (BPMS)? (4 Marks) Answer (a) Various key factors to be considered in implementing Business Process Management (BPM) in an enterprise are as follows: Factors Key Considerations Scope A single process, a department, the entire company. Goals Process understanding, Process Improvement, Process Automation/ Optimization and Process re-engineering. Methods to be used Six Sigma, BPM Life Cycle Method, TQM, Informal methods. Skills Required Consultants, Train Employees, Formal Certification, Basic Education, Existing Skill sets. Tools to be used White-Boards, Sticky Notes, Software For Mapping, Documenting, Software for Simulation, Comprehensive BPMS. Investments to Make Training, Tools, Time. Sponsorship/Buy-in Needed Executive Level, Department Level, Process Owner Level, Employee Level. (b) Major reasons for the failure of Business Process Management Systems (BPMS) include the following: Inadequate investment in ongoing training for involved personnel; Lack of corporate policy protecting the integrity of the data in the BPM Systems; Superficial or deficient executive involvement; Deficient project management; Breakdown in gap analysis; Limited options for customization of the BPM software are required; Not flexible enough or too complicated to be customized to meet the precise workflow and business process; Failure to identify future business needs; Inadequate assessment of the need for change management; Persistent compatibility problems with the diverse legacy systems of the partners; Resources not available when desirable; Software fails to meet business needs; The Institute of Chartered Accountants of India 46 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 System may be over-engineered when compared to the actual requirements; and Technological obsolescence. Question 3 (a) What is cloud computing? Describe any three types of clouds in cloud computing environment. (4 Marks) (b) What is mobile computing? What are the three major concerns related to mobile computing? (4 Marks) Answer (a) Cloud Computing: Cloud computing is the use of various services, such as software development platforms, servers, storage, and software, over the Internet, often referred to as the "Cloud." The Cloud Computing environment can consist of multiple types of clouds based on their deployment and usage. They are Public Cloud, Private/Internal Cloud, Community Cloud and Hybrid Cloud. Public Cloud: The public cloud is made available to the general public or a large industry group. They are administrated by third parties or vendors over the Internet, and services are offered on pay-per-use basis. It is widely used in the development, deployment and management of enterprise applications, at affordable costs; and allows organizations to deliver highly scalable and reliable applications rapidly and at more affordable costs. Private/Internal Cloud: This cloud computing environment resides within the boundaries of an organization and is used exclusively for the organization s benefits. They are built primarily by IT departments within enterprises who seek to optimize utilization of infrastructure resources within the enterprise and have more control. Community Cloud: This refers to the sharing of computing infrastructure in between organizations of the same community. For example, all Government organizations within India may share computing infrastructure on the cloud to manage data. The risk is that data may be stored with the data of competitors. Hybrid Cloud: It is a composition of two or more clouds (Private, Community or Public) and is maintained by both internal and external providers. They are bound together by standardized data and application portability. With a hybrid cloud, organizations might run non-core applications in a public cloud, while maintaining core applications and sensitive data in-house in a private cloud. (b) Mobile Computing: Mobile Computing is the use of portable computing devices (such as laptop and handheld computers) in conjunction with mobile communication technologies to enable users to access the Internet and data on their home or work computers from The Institute of Chartered Accountants of India PAPER 7: INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT 47 anywhere in the world. Mobile computing is enabled by use of mobile devices (portable and hand held computing devices) such as PDA, laptops, mobile phones, MP3 players, digital cameras, tablet PC and Palmtops on a wireless network. Major concerns relating to mobile computing are given as follows: Mobile computing has its fair share of security concerns as any other technology. Dangers of misrepresentation - Another problem plaguing mobile computing are credential verification. Power consumption - When a power outlet or portable generator is not available, mobile computers must rely entirely on battery power. Potential health hazards. Question 4 (a) What is Bus Topology? List its two advantages and two disadvantages. (3 Marks) (b) What do you mean by threat and vulnerability? Explain any three facts responsible for occurrence of vulnerabilities in the software. (5 Marks) Answer (a) Bus Topology: In a Bus Topology, a single length of wire, cable, or optical fiber connects a number of computers. All communications travel along this cable, which is called a bus. Advantages of Bus Topology include the following: There is no host computer or file server, which makes bus network reliable as well as easy to use and understand. If one of the microcomputers fails, it will not affect the entire network. It requires the least amount of cable to connect the computers together and therefore is less expensive than other cabling arrangements. It is easy to extend. Two cables can be easily joined with a connector, making a longer cable for more computers to join the network. A repeater can also be used to extend a bus configuration. Disadvantages of Bus Topology include the following: Heavy network traffic can slow a bus considerably since any computer can transmit at any time. Each connection between two cables weakens the electrical signal. The bus configuration can be difficult to troubleshoot. A cable break or malfunctioning computer can be difficult to find and can cause the whole network to stop functioning. The Institute of Chartered Accountants of India 48 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 (b) Threat: A threat is anything that can disrupt the operation, functioning, integrity, or availability of a network or system. Vulnerability: Vulnerability is an inherent weakness in the design, configuration, or implementation of a network or system that renders it susceptible to a threat. The following facts are responsible for occurrence of vulnerabilities in the software: Software Bugs - Software bugs are so common that users have developed techniques to work around the consequences, and bugs that make saving work necessary every half an hour or crash the computer every so often are considered to be a normal part of computing. For example - buffer overflow, failure to handle exceptional conditions, access validation error, input validation errors are some of the common software flaws. Timing Windows - This problem may occur when a temporary file is exploited by an intruder to gain access to the file, overwrite important data, and use the file as a gateway for advancing further into the system. Insecure default configurations - Insecure default configurations occur when vendors use known default passwords to make it as easy as possible for consumers to set up new systems. Unfortunately, most intruders know these passwords and can access systems effortlessly. Trusting Untrustworthy information - This is usually a problem that affects routers, or those computers that connect one network to another. When routers are not programmed to verify that they are receiving information from a unique host, bogus routers can gain access to systems and do damage. End users - Generally, users of computer systems are not professionals and are not always security conscious. For example, when the number of passwords of a user increases, user may start writing them down, in the worst case to places from where they are easy to find. In addition to this, users do human errors, for example save confidential files to places where they are not properly protected. Question 5 (a) Briefly explain the two main approaches to establish access controls in Software Systems. (4 Marks) (b) Explain the different components of Decision Support Systems. (4 Marks) Answer (a) The two main approaches to establish access controls in Software systems are as follows: Role-based Access Control (RBAC): RBAC largely eliminates discretion when providing access to objects. Instead, administrators or automated systems place subjects into roles. Subjects receive only the rights and permissions assigned to The Institute of Chartered Accountants of India PAPER 7: INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT 49 those roles. RBAC uses a centrally administered set of controls to determine how subjects and objects interact. When an employee changes jobs, all previous access is removed, and the rights and permissions of the new role are assigned. RBAC enforces static constraints based on a user s role. It is the best system for an organization that has high turnover. Rules-based Access Control (RAC): RAC is largely context-based that takes into account the data affected, the identity attempting to perform a task, and other triggers governed by business rules. RAC uses specific rules that indicate what can and cannot happen between a subject and an object. A manager, for example, has the ability to approve his/her employees hours worked. However, when s/he attempts to approve his/her own hours, a rule built into the application compares the employee record and the user, sees they are the same, and temporarily removes approval privilege. It is not necessarily identity based. (b) The components of Decision Support Systems (DSS) are as follows: (i) The user: The user is usually a manager with an unstructured or semi-structured problem to solve and may be at management - level of an organization. (ii) One or more databases: Databases contain both routine and non-routine data from both internal and external sources. (iii) Planning languages: Planning languages can either be general-purpose or special purpose allowing users to perform routine tasks and specific tasks respectively. (iv) Model Base: Model base is the brain of the DSS as it performs data manipulations and computations with the data provided to it by the user and the database. The planning language in DSS allows the user to maintain a dialogue with the model base. Question 6 (a) List out different types of delivery channels though which information is delivered to the user. (4 Marks) (b) Briefly explain Grid Computing. What are possible reasons of using grid computing? (4 Marks) Answer (a) Delivery channels refer to the mode through which information or products are delivered to users. Delivery Channels for Information include the following: Intranet: Network within the company/enterprise; E-mail: The most widely used delivery channel for information today; Internal newsletters and magazines; Staff briefings, meetings and other face-to-face communications methods; The Institute of Chartered Accountants of India 50 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 Notice boards in communal areas; Manuals, guides and other printed resources; Hand-held devices (PDAs, etc.); and Social networking sites like Facebook, WhatsApp etc. (b) Grid Computing: Grid Computing is a computer network in which each computer's resources are shared with every other computer in the system. In the ideal grid computing system, every resource is shared, turning a computer network into a powerful supercomputer. With the right user interface, accessing a grid computing system is no different than accessing a local machine's resources. Some of the reasons of using Grid Computing are as follows: Civil engineers collaborate to design, execute, & analyze shake table experiments. An insurance company mines data from partner hospitals for fraud detection. An application service provider offloads excess load to a compute cycle provider. An enterprise configures internal & external resources to support e-Business workload. Large-scale science and engineering are done through the interaction of people, heterogeneous computing resources, information systems and instruments, all of which are geographically and organizationally dispersed. Question 7 Write short notes on any four of the following: (a) Hardware Virtualization (b) Total Quality Management (TQM) (c) HTTPS (d) eXtensible Business Reporting Language (XBRL) (e) Software as a Service (SaaS) (2 x 4 = 8 Marks) Answer (a) Hardware Virtualization: Hardware Virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system. Software executed on these virtual machines is separated from the underlying hardware resources. Hardware virtualization can give root access to a virtual machine. (b) Total Quality Management (TQM): It is the organization-wide effort to install and make permanent a climate in which it continuously improves its ability to deliver high-quality products and services to customers. The Institute of Chartered Accountants of India PAPER 7: INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT 51 (c) HTTPS: HyperText Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. The security of HTTPS uses long term public and secret keys to exchange a short term session key to encrypt the data flow between client and server. (d) eXtensible Business Reporting Language (XBRL): XBRL is freely available international standards-based business reporting language developed by accountants for financial reporting. It is a single reporting language to report to government. (e) Software as a Service (SaaS): It includes a complete software offering on the cloud. Users can access a software application hosted by the cloud vendor on pay-per-use basis. SaaS is a model of software deployment where an application is hosted as a service provided to customers across the Internet by removing the need to install and run an application on a user s own computer. SaaS can alleviate the burden of software maintenance and support but users relinquish control over software versions and requirements. The Institute of Chartered Accountants of India 52 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 SECTION B Question No. 8 is compulsory Answer any five questions from the rest Question 8 (a) You have been hired as a consultant by a company to advise it on factors it need to consider for environmental scanning. Explain briefly these factors. (3 Marks) (b) A strategic vision is a road map of a company's future." Comment. Draft a strategic vision statement of any well known national level Educational Institution you are familiar with. (3 Marks) (c) In your view what are the Key Success Factors for operating in a competitive market place? (3 Marks) (d) How would you argue that Research and Development Personnel are important for effectively strategy implementation? (3 Marks) (e) What steps would you suggest to change a company's problem culture? (3 Marks) Answer (a) Organizational environment consists of both external and internal factors. Environment must be scanned so as to determine development and forecasts of factors that will influence organizational success. The factors that need to be considered are explained below: Events: Events are important and specific happenings in the internal or external organisational environment which can be observed and tracked. Trends: Trends are grouping of similar or related events that tend to move in a given direction, increasing or decreasing in strength of frequency of observation. Issues are the current concerns that arise in response to events and trends. Identifying an emerging issue is more difficult. Expectations are the demands made by interested groups in the light of their concern for issues. (b) A Strategic vision is a roadmap of a company s future providing specifics about technology and customer focus, the geographic and product markets to be pursued, the capabilities it plans to develop, and the kind of company that management is trying to create. The vision of ICAI is - World s leading accounting body, a regulator and developer of trusted and independent professionals with world class competencies in accounting, assurance, taxation, finance and business advisory services. The Institute of Chartered Accountants of India PAPER 7: INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT 53 (c) KSFs are the rules that shape whether a company will be financially and competitively successful. Important key success factors for operating in competitive markets are: Cost structure of the market. The price sensitivity of the market. Technological structure of the market. The existing distribution system of the market. Is the market mature? (d) Research and development (R&D) personnel can play an integral part in strategy implementation. These individuals are generally charged with developing new products and improving old products in a way that will allow effective strategy implementation. R&D employees and managers perform tasks that include transferring complex technology, adjusting processes to local raw materials, adapting processes to local markets, and altering products to particular tastes and specifications. Strategies such as product development, market penetration, and concentric diversification require that new products be successfully developed and that old products be significantly improved. But the level of management support for R&D is often constrained by resource availability. (e) Changing problem cultures is very difficult because of deeply held values and habits. It takes concerted management action over a period of time to replace an unhealthy culture with a healthy culture or to root out certain unwanted cultural obstacles and instil ones that are more strategy-supportive. The first step is to diagnose which facets of the present culture are strategy supportive and which are not. Then, managers have to talk openly and forthrightly to all concerned about those aspects of the culture that have to be changed. The talk has to be followed swiftly by visible, aggressive actions to modify the cultureactions that everyone will understand are intended to establish a new culture more in tune with the strategy. The menu of culture-changing actions includes revising policies and procedures, altering incentive compensation, recruiting and hiring new managers and employees, replacing key executives, communication on need and basis to employees and so on. Question 9 (a) State with reasons which of the following statements is correct or incorrect: (i) Strategic vision and mission statements are needed only by large business houses. (ii) An industry can have more than one strategic group. The Institute of Chartered Accountants of India (2 x 2 = 4 Marks) 54 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 (b) What is meant by backward integration? Name any two backward integration strategies that hospitals may pursue. (1 + 2 = 3 Marks) Answer (a) (i) Incorrect: Every organization whether it is large or small requires strategic vision and mission statements. Organisations irrespective of their size face similar business environment and have to sail through competition. Small organizations have to plan strategies for their survival in the market where large organizations are also present. (ii) Correct: An industry contains only one strategic group when all sellers pursue essentially identical strategies and have comparable market positions. At the other extreme, there are as many strategic groups as there are competitors when each rival pursues a distinctively different competitive approach and occupies a substantially different competitive position in the marketplace. (b) Backward integration is a step towards, creation of effective supply by entering business of input providers. Strategy employed to expand profits and gain greater control over production of a product whereby a company will purchase or build a business that will increase its own supply capability or lessen its cost of production. In case of hospitals there can be number of businesses that can be entered. Following are indicative list of backward integration strategies that hospitals may pursue: Drugs and pharmaceuticals Specific drugs can be manufactured or traded. Business of gases required in hospitals oxygen. Pathology labs / diagnostic services. This can be created in-house if not available already. Alternatively, a chain can be started. Blood Banks. Ambulance services. Question 10 How does the Internet Technology influence an industry's competitive environment? Explain. (7 Marks) Answer The impact of the Internet and the rapidly emerging e-commerce environment is substantial and widespread. Growing use of the Internet by businesses and consumers reshapes the economic landscape and alters traditional industry boundaries. Characteristics of E-commerce environment changing competitive scenario are as under: (a) The Internet makes it feasible for companies everywhere to compete in global markets. The Institute of Chartered Accountants of India PAPER 7: INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT 55 (b) There are new e-commerce strategic initiatives of existing rivals and new entrants in form of e-commerce rivals. (c) Entry barriers into the e-commerce world are relatively low. (d) Increased bargaining power of customers to compare the products, prices and other terms. (e) Possibility for business organizations to locate the best suppliers across the world to gain cost advantage and collaborate closely with them to achieve efficiency gains and cost savings. (f) Internet and PC technologies are advancing rapidly, often in uncertain and unexpected directions. Such changes are often bringing in new opportunities and challenges. (g) Organisations in emerging countries and elsewhere can use the internet to monitor the latest technological developments and to stay abreast of what is happening in developed markets. (h) The e-commerce environment demands that companies move swiftly. In the exploding ecommerce world, speed is a condition of survival. (i) E-commerce technology opens up a host of opportunities for reconfiguring industry and company value chains. (j) The Internet can be an economical means of delivering customer service. Organisations are discovering ways to deliver service in a centralised manner online or through telephone. (k) The capital for funding potentially profitable e-commerce businesses is readily available. (l) The needed e-commerce resource in short supply is human talent-in the form of both technological expertise and managerial know-how. Question 11 (a) Management of internal linkages in the value chain could create competitive advantage in a number of ways . Briefly explain. (4 Marks) (b) How strategic decisions differ in nature from other routine decisions taken in day-today working of an organization? Explain. (3 Marks) Answer (a) The management of internal linkages in the value chain could create competitive advantage in a number of ways: There may be important linkages between the primary activities. For example, a decision to hold high levels of finished stock might ease production scheduling problems and provide for a faster response time to the customer. However, an assessment needs to be made whether the value added to the customer by this faster response through holding stocks is greater than the added cost. The Institute of Chartered Accountants of India 56 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 It is easy to miss this issue of managing linkages between primary activities in an analysis if, for example, the organization's competences in marketing activities and operations are assessed separately. The operations may look good because they are geared to high-volume, low-variety, low-unit-cost production. However, at the same time, the marketing team may be selling speed, flexibility and variety to the customers. So competence in separate activities need to be compatible. The management of the linkages between a primary activity and a support activity may be the basis of a core competence. It may be key investments in systems or infrastructure which provides the basis on which the company outperforms competition. Computer-based systems have been exploited in many different types of service organization and have fundamentally transformed the customer experience. Linkages between different support activities may also be the basis of core competences. For example, the extent to which human resource development is in tune with new technologies has been a key feature in the implementation of new production and office technologies. Many companies have failed to become competent in managing this linkage properly and have lost out competitively. (b) Strategic decisions are different in nature than all other decisions which are taken at various levels of the organization during day-to-day working of the organizations. The major dimensions of strategic decisions are given below: Strategic issues require top-management decisions. Strategic issues involve the allocation of large amounts of company resources. Strategic issues are likely to have a significant impact on the long term prosperity of the firm. Strategic issues are future oriented. Strategic issues usually have major multifunctional or multi-business consequences. Strategic issues necessitate consideration of factors in the firm s external environment. Question 12 (a) In the context of Ansoff s Product-Market Growth Matrix, identify with reasons, the type of growth strategies followed in the following cases: (i) A leading producer of tooth paste, advises its customers to brush teeth twice a day to keep breath fresh. (ii) A business giant in hotel industry decides to enter into dairy business. (iii) One of India's premier utility vehicles manufacturing company ventures to foray into foreign markets. The Institute of Chartered Accountants of India PAPER 7: INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT 57 (iv) A renowned auto manufacturing company launches ungeared scooters in the market. (4 Marks) (b) To which industries the following developments offer opportunities and threats? "Increasing trend in India to organize IPL (Cricket) type of tournaments in other sports also." (3 Marks) Answer (a) The Ansoff s product market growth matrix (proposed by Igor Ansoff) is a useful tool that helps businesses decide their product and market growth strategy. This matrix further helps to analyse different strategic directions. According to Ansoff there are four strategies that organisation might follow. (i) Market Penetration: A leading producer of toothpaste, advises its customers to brush teeth twice a day to keep breath fresh. It refers to a growth strategy where the business focuses on selling existing products into existing markets. (ii) Diversification: A business giant in hotel industry decides to enter into dairy business. It refers to a growth strategy where a business markets new products in new markets. (iii) Market Development: One of India s premier utility vehicles manufacturing company ventures to foray into foreign markets. It refers to a growth strategy where the business seeks to sell its existing products into new markets. (iv) Product Development: A renowned auto manufacturing company launches ungeared scooters in the market. It refers to a growth strategy where business aims to introduce new products into existing markets. (b) An opportunity is a favourable condition in the organisation s environment which enables it to strengthen its position. On the other hand a threat is an unfavourable condition in the organisation s environment which causes a risk for, or damage to, the organisation s position. An opportunity is also a threat in case internal weaknesses do not allow organization to take their advantage in a manner rivals can. The IPL (Cricket) tournament is highly profit and entertainment driven. A number of entities and process are involved in this IPL type tournament. So financial opportunity are for: Stadiums. Sports Industry. Manufactures of sports items. Media Industry Sports channels / television, advertisers. It is also threat to entertainment industry as competitors will be fighting for same viewers. Tourism and hotel Industry. The Institute of Chartered Accountants of India 58 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 Event Management. Question 13 Distinguish between: (a) Divestment strategy and Liquidation strategy. (4 Marks) (b) Unfreezing the situation and Refreezing - the two stages of Kurt Lewin change process. (3 Marks) Answer (a) Divestment Strategy: Divestment strategy involves the sale or liquidation of a portion of business, or a major division, profit centre or SBU. Divestment is usually a part of rehabilitation or restructuring plan and is adopted when a turnaround has been attempted but has proved to be unsuccessful. The option of a turnaround may even be ignored if it is obvious that divestment is the only answer. Liquidation Strategy: Liquidation as a form of retrenchment strategy is considered as the most extreme and unattractive. It involves closing down a firm and selling its assets. It is considered as the last resort because it leads to serious consequences such as loss of employment for workers and other employees, termination of opportunities a firm could pursue, and the stigma of failure. (b) Unfreezing the situation: The process of unfreezing simply makes the individuals or organizations aware of the necessity for change and prepares them for such a change. Lewin proposes that the changes should not come as a surprise to the members of the organization. Unfreezing is the process of breaking down the old attitudes and behaviours, customs and traditions so that they start with a clean slate. This can be achieved by making announcements, holding meetings and promoting the ideas throughout the organization. Refreezing: Refreezing occurs when the new behaviour becomes a normal way of life. The new behaviour must replace the former behaviour completely for successful and permanent change to take place. In order for the new behaviour to become permanent, it must be continuously reinforced so that this new acquired behaviour does not diminish or extinguish. Question 14 Write short notes on the following: (a) Strategic responses to business environment. (4 Marks) (b) Expansion through acquisitions and mergers. (3 Marks) OR Expanded Marketing Mix. Answer The Institute of Chartered Accountants of India PAPER 7: INFORMATION TECHNOLOGY AND STRATEGIC MANAGEMENT 59 (a) The business organization and its many environments have innumerous interrelationship that at times it becomes difficult to determine exactly where the organization ends and where its environment begins. It is also difficult to determine exactly what business should do in response to a particular situation in the environment. Strategically, the businesses should make efforts to exploit the opportunity and avoid the threats. In this context following are the approaches: (i) Least resistance: Some businesses just manage to survive by way of coping with their changing external environments. They are simple goal-maintaining units. They are very passive in their behaviour and are solely guided by the signals of the external environment. They are not ambitious but are content with taking simple paths of least resistance in their goal-seeking and resource transforming behaviour. (ii) Proceed with caution: At the next level, are the businesses that take an intelligent interest to adapt with the changing external environment. They seek to monitor the changes in that environment, analyse their impact on their own goals and activities and translate their assessment in terms of specific strategies for survival, stability and strength. This is an sophisticated strategy than to wait for changes to occur and then take corrective-adaptive action. (iii) Dynamic response: At a still higher sophisticated level, are those businesses that regard the external environmental forces as partially manageable and controllable by their actions. Their feedback systems are highly dynamic and powerful. They not merely recognise and ward off threats; they convert threats into opportunities. They are highly conscious and confident of their own strengths and the weaknesses of their external environmental adversaries . They generate a contingent set of alternative courses of action to be picked up in tune with the changing environment. (b) Acquisitions and mergers are basically combination strategies. Some organizations prefer to grow through mergers. Merger is considered to be a process when two or more companies come together to expand their business operations. In such a case the deal gets finalized on friendly terms and both the organizations share profits in the newly created entity. In a merger two organizations combine to increase their strength and financial gains along with breaking the trade barriers. When one organization takes over the other organization and controls all its business operations, it is known as acquisition. In this process of acquisition, one financially strong organization overpowers the weaker one. Acquisitions often happen during recession in economy or during declining profit margins. In this process, one that is financially stronger and bigger establishes it power. The combined operations then run under the name of the powerful entity. A deal in case of an acquisition is often done in an unfriendly manner, it is more or less a forced association where the powerful organization either consumes the operation or a company in loss is forced to sell its entity. OR The Institute of Chartered Accountants of India 60 INTERMEDIATE (IPC) EXAMINATION: NOVEMBER, 2014 Expanded Marketing Mix: Typically, all organizations use a combination of 4 Ps in some form or the other. However, the above elements of marketing mix are not exhaustive. There are a few more elements that may form part of an organizational marketing mix strategy as follows: People: all human actors who play a part in delivery of the market offering and thus influence the buyer s perception, namely the firm s personnel and the customer. Physical evidence: the environment in which the market offering is delivered and where the firm and customer interact. Process: the actual procedures, mechanisms and flow of activities by which the product / service is delivered. The Institute of Chartered Accountants of India

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 


Tags : CA IPCC, sample / model / mock / past / previous / old / online test papers, Group I, Group II, accounting technician course, atc, accounts, accounting, business laws, ethics, communiation, cost accounts, cost accounting, financial management, fm, tax, taxation, advanced accounting, audit, auditing, assurance, itsm, it & sm, information technology, strategic management, Integrated Professional Competence Course, may, november, 2015, 2014, 2013, 2012, 2011, 2010, 2009.  


© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

ca_ipcc chat