GM Test Series: Top 50 Questions
GM Test Series: Top 50 Questions
GM Test Series: Top 50 Questions
EIS AND SM
EIS AND SM
TOP 50 QUESTIONS
Q-1 Write a short note on the general ledger process and list the various steps involved in it.
Q-2 Mr. Suresh Kumar is a qualified commerce graduate working in Kartar Logistics &
Transports, a goods transportation company located in Punjab State. In the search of better
career opportunities, he recently appeared in a job interview conducted at P&G. Ltd., one of
India’s largest FMCG Company. During the job interview, an interviewer asked Mr. Suresh to
explain the Procure to Pay business process and list the risks and control objectives of Procure
to Pay (P2P) business process at the Masters level that an organisation should consider. Prepare
an appropriate draft reply.
Q-3 After qualifying the Chartered Accountancy examination, Mr. A got an interview call from
Hindustan Plastics, a large plastics and metal tools maker. During a job interview, an
interviewer asked Mr. A to explain the with Order-To-Cash (O2C) business process and list out
all the risks and their controls associated with Order-To-Cash business process at transactions
level. Prepare an appropriate draft reply.
Q-4 Cybercrime is no different from the traditional crime and the only difference is that in
cybercrime, computer and technology is involved. In the light of above statement, mention any
six cybercrimes that are being faced by individuals and organisations.
GMTESTSERIES.COM®
Page 2
Q-5 Mr. Bhavesh is the managing director of Bhavesh Textile Ltd., a large family owned
business. Considering the needs of the business, Mr. Bhavesh is considering to automate the
order receipt and delivery system of the company. In this process, company has determined
the objectives and goals to be achieved from the BPA exercise. What is the next step company
should consider in this regard? Explain briefly with the aspects needed consideration for the
same.
Q-6 A renowned travel agency ABC Private Ltd. wishes to implement an automated Grievance
Management System at its workplace to manage and handle the problems with an aim of
solving them. Determine the major benefits that will be drawn out of automating this Grievance
related business process.
Q-7 Bharat Plastics is a manufacturing company having good sales. To improve the efficiency
and reduce the overall time, it wishes to automate its purchase order generation process. One of
the purposes of automation is to provide better service to its customers. Prepare a list of
various steps that are required to be taken while automating the purchase order generation
process & explain each of the steps briefly.
Q-8 Though Human Resource (HR) Department plays a important role in development of any
enterprise, yet it has certain risks associated at every stage of its life cycle. Describe all the
risks related to Human Resource Department.
Q-9 In an organization, effective risk management procedure is very critical for its survival and
success and involves identification of high-level risk exposures and their analysis. Discuss all the
GMTESTSERIES.COM®
Page 3
risk management strategies available out of which the Senior Management of an organization
may choose to adopt for their organisation based on the analysis of risks.
Q-10 Enterprise Risk Management (ERM) may be defined as a process, affected by an entity’s
Board of Directors, management and other personnel, applied in strategy setting and across the
enterprise, designed to identify potential events that may affect the entity, and manage risk to
be within its risk appetite, to provide reasonable assurance regarding the achievement of entity
objectives. List the various benefits of Enterprise Risk Management
Q-11 ERP implementation is the difficult task as the organization which is in the process of
implementing ERP should keep abreast of latest technological development. Describe the
different risks associated with technology while implementing ERP.
Q-12 What are the types of access rights that can be granted to different employees with
respect to the master data, transaction data and reports of the organisation? Mr. Alok is the
HR Manager of Bharat Tools Ltd., a manufacturing company. According to you what kinds of
access rights that can be granted and what access rights that can be denied to Mr. Alok.
Q-13 Mr. Sarvan is the Chartered Accountant who recently got an assignment of conducting
the audit of an ERP system of BRD Ltd. You are required to list some of the questions that Mr.
Sarvan should ask during the ERP system audit of BRD Ltd.
Q-14 Business Intelligence assists the company in better planning their business affairs and is
getting more and more significant in today’s world. Analyze the statement “The potential
benefits of Business Intelligence (BI) programs include improved decision making; boosts
GMTESTSERIES.COM®
Page 4
business performance; improves operational efficiency; driving new revenues; and gaining
competitive advantages.” Determine its justification and also explain some of the BI tools in
brief.
Q-15 List some of the tasks that can be performed by the XBRL software.
Q-16 List the various benefits of the cyber law from the perspective of e-commerce in India.
Q-17 List the various vouchers used in the inventory module of the accounting software and
also mention their uses.
Q-18 Write a short note on voucher. Also list some of the points to be considered in voucher
numbering.
Q-19 State the main reasons that why separate front-end and back-end is needed in the
software.
Q-20 Discuss the different ways in which Database Administrator (DBA) can store the data of
ABC enterprise which is planning to implement Accounting Information System (AIS).
Q-21 What is data mining? Also steps what are the steps involved in Data Mining Process?
Q-22 What are the criteria’s to be meet by the MIS Reports to be useful for the organisation?
GMTESTSERIES.COM®
Page 5
Q-24 Write a short note on programming management controls mentioning the phases and the
associated audit trails.
Q-26 Mr. Avinash has recently joined a Manufacturing company where he has been briefed
about the functioning of different modules like Financial Accounting, Sales & Distribution,
Human Resource, Material Management, Production Planning, Plant Maintenance, Customer
Relationship etc. by the management. You are required to prepare a brief description on the
Financial Accounting Module stating its key features on behalf of Mr. Avinash.
Q-27 What are the different activities involved in the sales and distribution process? Mention
through a diagram. No explanation is required. Also briefly explain the pre-sale activities
involved in the sales and distribution process.
Q-28 Mr. A is a System Administrator of the company who must ensure the protection of
Operating System used in information system of the company. How can this purpose be
achieved?
GMTESTSERIES.COM®
Page 6
Q-29 Database Management System (DBMS) provides the facility to create and maintain a well
organised database for any enterprise. Describe the various advantages of Database
Management System used in an organization.
Q-30 What is big data? Also list some of the benefits of big data processing.
(i) e-Shops
(ii) e-Malls
(iii) Buyer Aggregators
Q-35 What is Bring Your Own Device (BYOD)? Also list some of the advantages of BYOD.
Q-36 Discuss various Commercial Laws that govern e-Commerce or m-Commerce transactions in
India.
GMTESTSERIES.COM®
Page 7
Q-37 The Prime Minister Office of a country X plans to establish specific infrastructure setup
with its access shared amongst members of the group constituting of some selected high-
profiled dignitaries and officers from different ministries. The objective of the group is to carry
out certain assignments related to nation’s security and integrity. Which is the most suitable
choice of the cloud under Cloud Computing? Discuss its advantages and limitations as well.
Q-38 ABC university wants to conduct online exams for its different courses for which a
contract is given to vendor XYZ. The vendor provides computing resources such as processing
power, memory, storage, and networks to ABC university users to run their online exam
application on-demand. Identify the Service Model of Cloud Computing that vendor XYZ is
providing to ABC university and also describe its characteristics.
Q-39 Write a short note on Segregation of Duties. Also mention any three Segregation of Duties
Controls.
Q-40 The management of the company PQR wants to get audit of its Logical Access controls
that are implemented in the company’s infrastructure and information systems. As an IS
Auditor, determine the checklist while Auditing User Access Logs.
Q-42 Write a short note on the risk and controls in the loans and advances process.
GMTESTSERIES.COM®
Page 8
Q-43 A Book Publisher offers discount to customers on the basis of customer type and number
of copies ordered as shown below:
Q-45 Write a short note on Machine Learning. Also list any five application areas of Machine
Learning.
Q-46 There are various stages involved in the deployment & implementation of CBS. These
stages should be controlled at various stages to ensure that banks automation objectives are
achieved.
Q-47 Internal controls must be integrated in the IT solution implemented at the bank’s
branches to mitigate risks. State few examples indicating the internal controls in banks.
Q-48 E-commerce business is subject to various risks and it is necessary to protect it from those
risks. As an IT consultant, you are required to give some tips to an aspiring e-commerce vendor
so that his business can be protected from intrusion.
GMTESTSERIES.COM®
Page 9
Q-49 Do the growing reliance on technology, IT risks are becoming major security threats for
the banking industry. Write a short note on the IT Controls in Bank.
Q-50 Make a diagrammatic representation of Business Process Flow of Current & Savings
Accounts (CASA).
Q-51 Write the advantages of simple organisational structure. How simple structure results in
competitive advantage compared to larger rivals?
Q-52 Write a short note on logistics management and mention few of the advantages that the
business organisation would get by following the logistics management approach.
Q-53 “Supply Chain Management is conceptually wider than Logistic Management”. Explain.
Q-55 Amit Ltd., a well-known manufacturing company, is preparing to draft the strategy for the
next period. Its manager is advised about considering the competitive landscape of Amit Ltd.
What are technology leader firms? Also list major points Manager should consider in the
determination of the competitive landscape of Amit Ltd.?
Q-56 It is considered that business policy is the starting point in the evolution of strategic
management. How Business Policy evolved into Strategic Management? Explain briefly.
GMTESTSERIES.COM®
Page 10
Q-57 Define the term strategy. Is strategy substitute of management? Briefly explain.
Q-58 Strategy formulation is the part of overall strategic management process. Differentiate
between strategy and strategy management.
Q-59 Do you agree with the statement that “Strategic Management concepts are of no use to
Government organizations and Medical organizations”? Explain with reasons.
Q-61 What is the purpose of SWOT analysis? Why is it necessary to do a SWOT analysis before
selecting a particular strategy for a business organization?
Q-62 B Ltd. wants to implement supply chain management in its organisation. List the steps
involved in implementing the Supply Chain Management System.
GMTESTSERIES.COM®
Page 11
(a) A Ltd. has received total ₹200 Lakhs from the shareholders in the form of paid-up share
capital.
(b) An valuation firm has estimated the goodwill of ₹50 Lakhs of A Ltd. which the company
thinks is a conservative estimation.
(c) There is total inventory worth ₹20 Lakhs but its realisable value is just ₹16 Lakhs.
(d) A Ltd. also considers that assets worth ₹12 Lakh is overvalued and represented in asset side
with the amount of ₹18 Lakhs.
Q-65 Briefly explain forward linkage & backward linkage in the context of strategy formulation
& implementation.
Q-66 Define the term industry along with some examples of industry. Also list few factors that
can be considered as the dominant economic features of the Industry
Q-67 B Ltd. is considering entering into the automobile industry. As competition is very intense,
the management is reluctant to take any quick decision about the expansion. You as a
consultant are required to explain what is key factor in the context of an industry
Q-68 Write a short note on Strategic Group Mapping and explain the procedure for
constructing a strategic group map.
Q-69 M Ltd. used to earn high profit compared to the industry average & one of the reasons
was it was able to create competitive advantage by integrating resources & capabilities
properly. But gradually its performance declined & it fallen into losses. What are the factors on
which the sustainability of competitive advantage depends?
GMTESTSERIES.COM®
Page 12
Q-70 Briefly explain about market penetration and market development in the context of
Ansoff’s Product Market Growth Matrix.
Q-71 Rohit Sodhi runs a charitable organisation for promotion of sports in the country. His
organisation conducts regular free training camps for youths interested in playing cricket,
football, hockey, badminton and so on. Many of his trainees have reached national level
contests. Rohit noticed that with success of IPL (Cricket) tournament there is an increasing
trend to extend similar format in other sports as well. He wishes to know how the development
is going help sports and to which industries it will offer opportunities and threats.
Q-72 Rahul is Managing Director of T Ltd. which is manufacturing trucks. He is worried about
the entry of new businesses. What kind of barriers will help Rahul against such a threat?
Q-73 ‘Coffee Beans’ is a coffeehouse chain that operates across the globe in different countries.
‘Coffee Beans’ has adopted a strategy to build business by establishing product uniqueness or
qualities and gain competitive advantage based on features of its offerings in coffee business.
Which type of strategy ‘Coffee Beans’ has adopted?
Q-74 Zumba Robots, an electronic robot manufacturing company is a leader in its business
segment. Over a period of time, it started losing its grip on the market as its overall position
started to weaken. Discuss the type of audit that you would like to suggest to analyse the
situation of the company?
GMTESTSERIES.COM®
Page 13
Q-75 Telecom industry is growing at a rapid speed in India. There is a cut throat competition
among the service providers in the industry. Identify the capabilities that will best serve as a
source of competitive advantage for a firm over its rivals?
Q-76 Value for Money’ is a leading retail chain, on account of its ability to operate its business
at low costs. The retail chain aims to further strengthen its top position in the retail industry.
Marshal, the CEO of the retail chain is of the view that to achieve the goals they should focus on
lowering the costs of procurement of products. Highlight and explain the core competence of
the ‘Value for Money’ retail chain.
Q-77 Rohit Patel is having a small chemist shop in the central part of Ahmedabad. What kind of
competencies Rohit can build to gain competitive advantage over online medicine sellers?
Q-78 Mr. Shridhar Khanna who is running a medium size cloth manufacturing business in
Panipat wishes to understand the driving forces that trigger change. He has sought advice from
you and wishes to know common driving forces. Briefly explain.
Q-79 Shri Alok Kumar is having his own medium size factory in Aligarh manufacturing hardware
consisting handles, hinges, tower bolts and so on. He has a staff of more than 220 in his
organisation. One of the leading brand of Hardware seller in India is rebranding and selling the
material from his factory. Shri Alok Kumar, believes in close supervision and takes all major and
minor decisions in the organisation. Do you think Shri Alok should take all decisions himself?
What should be nature of decisions that should be taken by him.
Q-80 Vastralok Ltd., was started as a textile company to manufacture cloth. Currently, they are
in the manufacturing of silk cloth. The top management desires to expand the business of the
GMTESTSERIES.COM®
Page 14
Q-81 Write a short note on vertically integrated diversification explaining Forward Integration
and Backward Integration.
Q-82 “A strategic vision is a road map of a company's future." Comment. Draft a strategic vision
statement of any well-known national level Educational Institution you know.
Q-83 How product life cycle can be used in the diagnoses of a portfolio of product or business?
Explain.
Q-84 How Business Process Reengineering differs from the other process improvement
methods? Explain briefly.
Q-85 Define the term benchmarking. Also briefly explain the steps involved in the
benchmarking process.
Q-86 Entrepreneur & Intrapreneur are the buzzing words today. Differentiate between
Entrepreneur & Intrapreneur.
Q-87 List the issues which are to be considered in the strategy implementation.
Q-88 There are two prominent leadership style namely Transactional Leadership and
GMTESTSERIES.COM®
Page 15
Q-91 Differentiate between the Cost Leadership Strategy and Differentiation Strategy.
Q-92 Do you think that competition is always bad for organisations? Explain Porter’s five forces
model as to how businesses can deal with the competition.
Q-93 What are acquisitions? Discuss with example of two companies resorting to this strategy?
Q-95 The CFO of a sick company manufacturing various electrical home appliances seeks your
advice for an appropriate retrenchment strategy. It has huge accumulated losses which have
eroded its net worth what will be your advice and why?
Q-96 Kewal Kapadia is the MD of KK Ltd. located in Kanpur. In a review meeting with the CFO
Kuldeep Khaitan, he said that in the first five years of last decade the company grew @ 8-10%
every year, then the growth rate started falling and in previous year the company managed 1%.
Kuldeep replied that the company is facing twin issues, one the strategy is not being
implemented as planned; and two the results produced by the strategy are not in conformity
with the intended goals. There is mismatch between strategy formulation and implementation.
GMTESTSERIES.COM®
Page 16
Kewal disagreed and stated that he takes personal care in implementing all strategic plans. You
have been hired as a strategy consultant by the KK Industries. Advise the way forward for the
KK Ltd. by identifying the problem areas and correct the strategic approaches that have not
been effective.
Q-97 What do you understand by the term core processes? Explain along with some examples
of core processes from different industries.
Q-98 ABC Ltd is a company that has grown significantly in last five years. With the increase in
size, it is facing difficulty in managing things. Many a times functional level is not in sync with
the corporate level. What will you like to advise to the company and why?
Q-99 AMJ Ltd. has decided to keep very low price for the product sweety it is considering to
launch in the near future. You are required explain what pricing policies a company can opt for
pricing its new product and identify the pricing policy of AMJ Ltd. for its new product. Also list
what are the objectives that must be kept in mind while designing a pricing strategy of a new
product?
Q-100 What are the three major research and development approaches for implementing
strategies?
GMTESTSERIES.COM®
Page 17
A-1 General Ledger is the process of recording the transactions in the system to finally
generating the financial reports like Balance Sheet, Profit and Loss Account, Cash Flow
Statement etc. The input for the General Ledger Process Flow is the financial transactions and
the outputs are various types of financial reports. The steps in the general ledger process flow
are as follows:
(i) Entering financial transactions into the system
A-2The various risks and control objectives associated with the Procure to Pay (P2P) business
process are as follows:
S.N. Risk Control Objective
1. System access to supplier System access to supplier
master not restricted to master restricted to authorized users only
authorized users only
2. Supplier master not upto date Supplier master are upto date
3. Invalid changes made to the Only valid changes made to the
supplier master supplier master
4. Changes made to supplier Changes made to supplier
master not correct master are correct
5. All valid changes in supplier All valid changes in supplier
master not input or processed master are input & processed
6. Changes to supplier Changes to supplier master are processed in
master delayed or not timely manner.
GMTESTSERIES.COM®
Page 18
processed in the
timely manner
A-3 The various risks and control objectives associated with the Order- To-Cash (O2C) business
process are as follows:
S.N. Risk Control Objective
1. System access to process System access to process transaction are
transaction not restricted to restricted to
authorized users only authorized users only
2. All orders received from All orders received from customer are
customer not input or processed input &
processed
3. Invalid orders input or processed Only valid orders input &
by system processed by system
4. Orders not approved by All orders are approved by the
management for price & terms of sale management for price & terms of sale
5. Orders and order cancellations Orders & order cancellation
not input accurately are input accurately
6. Goods shipped without invoice All goods are shipped with
invoice
7. Invoice raised for invalid Invoice raised only for the valid
shipments shipments
8. Invoice not accurately calculated All invoice accurately
& recorded calculated & recorded
A-4 Some of the cybercrimes that are being faced by individuals and organisations are as
follows:
GMTESTSERIES.COM®
Page 19
(a) Computer Hacking - Many organizations store their confidential data in computer systems
which may be targeted by rivals, criminals or even employees. Hacking refers to unauthorized
intrusion into a computer system or a network even without touching the computer to be
hacked and sitting somewhere else.
(b) Credit Card Fraud - Stealing & misusing victim's credit card to make unauthorized online
transactions.
(c) Harassment via Fake Profile on Social Media - Creating a fake profile of the victim and
labelling him as a person of loose character, fraudulent person etc.
(d) Theft of Confidential Information - Theft of confidential business and customer related
information from company’s server.
(e) Phishing & Emails Scams - Fraudulently acquiring sensitive information such as usernames,
passwords credit card details, bank details etc. through fake emails, websites.
(f) Introducing Viruses, Trojans, Bugs etc. - Introducing viruses, trojans, spy ware or any
malicious program to destroy or gain access to some electronic information system.
A-5 As given in the question that Mr. Bhavesh has already determined the objectives and goals
to be achieved from the implementation of BPA exercise. This is the fourth step in the BPA
implementation process. After determining the objectives and goals to be achieved, entity
should now engage the business process consultant. Business process consultant is the expert
who takes the BPA implementation task forward and provides the necessary consultancy to the
organisation in this regard. However before engaging the business process consultant, entity
should consider the following aspects about the business process consultant:
• Does the consultant have experience with entity business process?
GMTESTSERIES.COM®
Page 20
• Does the consultant can clearly articulate the business value of every aspect of the proposed
solution?
A-6 The major benefits that will be drawn out of automating the Grievance related business
process and implementing the Grievance Management System are as follows:
• Time Saving: As repetitive processes are automated, it saves lot of employee’s time.
• Reduced Costs: Manual tasks are performed at slower rate than an automated task and
consumes more time and resources. Automation results in cost saving.
• Reduced Turnaround Times: Automation of process reduces the associated time and
streamlines the entire process. This helps in reducing the turnaround time.
• Quality & Consistency: The task performed by the automated system produces identical
result every time which results in high quality and consistency.
• Visibility: As automated processes are controlled and operated within a specified range, it
gives better visibility of the process status to the organisation.
A-7 Various steps involved in the automation of the purchase order generation process are as
follows:
Step 1: Define why we plan to go for a BPA?
The first step is Bharat Plastics needs to justify the reasons of automation. Some of the issues
due to which it wants to go for BPA may be:
• Non-availability of critical raw material
GMTESTSERIES.COM®
Page 21
The company should calculate the ROI from the BPA project. For calculating the ROI, entity
should determine the cost involved in the BPA exercise and the expected benefits from the
BPA. The benefits include:
• Reduction in stock-out situation.
• Elimination of delays occurring in production
GMTESTSERIES.COM®
Page 22
A-8 The various risks associated with Human Resource Department are as given below:
(a) Employees have system access in excess of their job requirements.
(c) New employees are not added to the payroll master files.
(d) Terminated employees are not removed from payroll master files.
(h) Employees who have left company continue to have system access.
(i) System access to process employee master changes has not been restricted to the
authorized users.
A-9 When risks are identified and analyzed, it may not appropriate to implement controls to
counter them as some of the risks may be minor, and it may not be cost effective to implement
expensive control processes for them. The various risk management strategies organisation
can choose from are as follows:
• Tolerate/Accept the risk: Some risks may be considered minor because their impact and
probability of occurrence is low. In this case, accepting the risk as a cost of doing business is
appropriate, as well as periodically reviewing the risk to ensure its impact remains low.
• Terminate/Eliminate the risk: It is possible for a risk to be associated with the use of a
technology, supplier, or vendor. The risk can be eliminated by replacing the technology with
more robust products and by seeking more capable suppliers and vendors.
GMTESTSERIES.COM®
Page 23
• Transfer/Share the risk: Risks can be can be shared with trading partners and suppliers like
outsourcing infrastructure management. In such a case, the supplier mitigates the risks
associated with managing the IT infrastructure by being more capable and having access to
more skilled staff than the primary organization. Risk also may be mitigated by transferring the
cost of realized risk to an insurance provider by insuring the asset, facilities, personals etc.
• Treat/mitigate the risk: Where other options have been eliminated, suitable controls must be
devised and implemented to prevent the risk from manifesting itself or to minimize its effects.
• Turn back: When the probability or impact of the risk is very low, then management may
decide to ignore the risk.
(ii) Rationalize Capital - Having better information about entity’s total risk allows management
to better assess the overall capital needs and improves capital allocation.
(iii) Links Growth, Risk and Return - ERM gives enhanced ability to identify and assess risk and
management can accordingly establish acceptable risk levels relative to growth and return
objectives.
(iv) Align Risk Appetite and Strategy - Risk appetite means degree of risk management is willing
to accept in achieving its goals. Now once management stablish the risk appetite, it will
accordingly choose the strategy which will fall within the risk appetite of the management.
(v) Provides Integrated Response to Multiple Risk - Instead of responding different risk in
different ways, ERM will help the entity in providing an integrated response to multiple risk.
(vi) Seize Opportunities - ERM exercise may bring events which may have potential opportunity
there by letting the organization to seize those business opportunities.
GMTESTSERIES.COM®
Page 24
(vii) Enhances Risk Response Decision - ERM enables the entity to identify and select the most
appropriate risk response decision to respond to any potential risk.
A-11 The organizations implementing ERP system should be updated about the latest
technological developments. The associated risks and related controls are as follows:
A-12 Considering the role of the user in the organization, user can be granted the following
types of access rights with respect to the master data, transaction data and reports:
(i) Create – Allows user to create data.
GMTESTSERIES.COM®
Page 25
As Mr. Alok is the HR Manager of the organisation, he may be granted all kinds of access rights
like creation, alter, view & print of HR related data from all kinds of files (Master, Transaction &
Report). However he may be denied all other kinds of access rights other than the HR related
data.
A-13 Some of the questions that Mr. Sarvan should ask during the ERP system audit of BRD Ltd.
are as follows:
• Is there an ERP system administrator with clearly defined responsibilities?
• Does the system process data according to Indian GAAP and generally accepted auditing
standards?
• Does system protect the information assets from unauthorized access and uses?
A-14 BI tools are the software that are used to perform data analysis and reports that process
data to the different users. BI tools can be straightforward programs or can combine many data
analysis applications like Online Analytical Processing (OLAP), Mobile BI, Real time BI, Software
as a Service BI, Open Source BI, Collaborative BI etc. BI tools provide various advantages to the
organisation and it can be justified as follows:
• BI applications can be bought separately from different vendors or from a single vendor.
GMTESTSERIES.COM®
Page 26
• Before it can be used in BI applications, raw data from different source systems must be
integrated, consolidated and cleansed to ensure that data is accurate and consistent.
• BI technology also includes data visualization software for designing charts and other
infographics.
• Initially, BI tools were used by data analysts and other IT professionals. However, business
executives and workers are using BI software themselves due to the development of Self-
Service BI.
A-15 XBRL makes reporting more accurate and efficient. Some of the tasks performed by XBRL
are:
• People can publish report with confidence that information provided in the report will be
used and analyzed correctly.
• People can use information provided in report with confidence that data provided to them
are as per the pre-defined rules and definitions.
• Through XBRL, people can use the information in the way that best suits their needs like
different language, currency etc.
A-16 Some of the major advantages of Cyber Law or Information Technology Act, 2000 (as
amended in 2008) from the perspective of E-Commerce in India are as follows:
• Companies can carry E-Commerce using the legal infrastructure provided by the Act.
• Email is considered as valid and legal form of communication and can be accepted in the
court of law.
GMTESTSERIES.COM®
Page 27
• Companies can file forms, applications and other documents for any legal purposes in
electronic form.
• Government is allowed to issue notifications etc. on the web thus promoting e-government.
A-17 The various voucers used in the inventory module and their uses are as follows:
S.N. Voucher Module Uses
Name
GMTESTSERIES.COM®
Page 28
• Vouchers should be recorded in chronological order and vouchers recorded earlier shall have
an earlier number.
A-19 Reasons of having separate front end & back end in the software are as follows:
Reasons Explanation
Domain Front end part of the software is meant for dealing with the users. Back end
Expertise is meant for storing and processing of data.
Presentation Front End is capable of presenting the information in proper format, colors,
fonts etc. Back End is not meant for it.
User Experience Front end provides user interface to the user through which he can interact
with the software and thereby providing great user experience. Front end
handles processed data while back end handles raw data.
Speed Using single software for both the aspects would increase the load and slow
down the speed. Separate back end software is used for handling data only.
This reduces the load and increases speed of operations.
Language Front end speaks in the language which could be understood by the user
and understands language spoken by the Backend. Back end speaks in
technical language not understood by a layman. Front end can speak in both
the languages, user’s language and technical language.
A-20 In the Accounting Information System, data can be stored in the following two ways:
GMTESTSERIES.COM®
Page 29
(a) Master Data: Master data is relatively permanent data that is not expected to change
frequently. It may change, but not frequently. In accounting systems, there may be following
type of master data:
(i) Accounting Master Data – This includes names of ledgers, groups, cost centres, accounting
voucher types, etc. Like capital ledger is created once and do not change frequently.
(ii) Inventory Master Data – This includes stock items, stock groups, godowns, inventory
voucher types, etc. Stock item is something which is bought and sold for business purpose,
trading goods.
(iii) Payroll Master Data – Payroll is a system for calculation of salary and recoding of
transactions relating to employees. Master data in case of payroll can be names of employees,
group of employees, salary structure, pay heads, etc. These data are not expected to change
frequently.
(iv) Statutory Master Data – This is a master data relating to statute. It may be different for
different type of taxes. In case of change in tax rates, forms, categories, entity need to update
the master data.
All business process modules must use common master data.
(b) Non-Master Data: It is a data which is expected to change frequently, again and again and
not a permanent data. E.g. Amounts recorded in each transaction shall be different every time
and expected to change again and again. Date recorded in each transaction is expected to
change again and again and will not be constant in all the transactions.
A-21 Data Mining is the process of analysing data to find previously unknown trends, patterns,
and associations to make decisions. The steps involved in the Data Mining process are as
follows:
(a) Data Integration: Firstly, the data are collected and integrated from different sources.
(b) Data Selection: It may be possible that all the data collected may not be required hence
entity should select only those data that are useful for data mining.
GMTESTSERIES.COM®
Page 30
(c) Data Cleaning: The data that is collected may not clean and may contain errors, missing
values or inconsistent data. Thus, entity need to apply data cleansing techniques.
(d) Data Transformation: Data even after cleaning are not ready for mining as it needs to be
transformed into a common format.
(e) Data Mining: Now various data mining tools and techniques are applied on the data to
discover the hidden trends and patterns.
(f) Pattern Evaluation and Knowledge Presentation: This step involves removing redundant
patterns, visualization of patterns etc. from the patterns generated.
(g) Decisions/Use of Discovered Knowledge: Finally user can use the knowledge acquired
through the data mining process to take better decisions.
A-22 MIS Report will be more useful for the entity if it meets the following criteria:
(i) Relevant - MIS Report will be more useful if it is relevant to the area it is made for and adding
unnecessary information in the MIS report should be avoided.
(ii) Timely - As MIS Report are used for decision making purposes, it should be timely and
contain the recent period data and adding very historical data should be avoided.
(iii) Accurate - Management relying on the MIS report cannot make sound decisions if data
contained in the MIS report is inaccurate. Hence the details provided in the MIS report should
be accurate.
(iv) Structured - MIS report contains many detailed and complicate data and hence to make it
easily readable and understandable, it should be properly structured.
GMTESTSERIES.COM®
Page 31
• E-commerce companies uses data analytics to analysis visitors who are more likely to buy a
product or service based on navigation and page-viewing patterns in their website.
• Mobile network operators examine customer data to forecast so they can take steps to
prevent defections to business rivals.
• Healthcare organizations mine patient data to evaluate the effectiveness of treatments for
cancer and other diseases.
A-24 Program development and implementation is a major phase within the systems
development life cycle. The primary objectives of this phase are to produce or acquire and to
implement high-quality programs. The Control phase runs in parallel for all other phases during
software development or acquisition.
Phase Audit Trails
Planning Auditor should evaluate whether the nature of and extent of planning are
appropriate to different types of software that are developed or acquired and
how well the plans are executed.
Control Auditor should evaluate whether the control activities are appropriate for the
different types of software that are developed or acquired and how effective
these control procedures are.
Design Auditors should determine whether programmers use some type of systematic
approach to design. Auditors can obtain evidence of the design practices
through interviews, observations and reviews of documentation.
Coding Auditors should seek evidence –
• To determine whether programming management ensures that programmers
follow structured programming approach.
• Whether programming management has chosen a module implementation
and integration strategy.
• To check whether programmers employ automated facilities to assist them.
GMTESTSERIES.COM®
Page 32
Testing Auditors can use interviews, observe and examine the documentation to
evaluate how well unit testing is conducted. Auditors primary concern is to see
that whole-of-program tests have been undertaken for all material programs
and that these tests have been well-designed and executed.
Operation & Auditors need to ensure effective and timely reporting of maintenance needs
Maintenance whether maintenance is carried out in a well-controlled manner. Auditors
should ensure that management has implemented a review system for the
maintenance needs.
• Social networking sites: Social networking sites such as Facebook, LinkedIn, Twitter etc.
should be searched to see what employees and others are saying about the organization. Any
authorized or unauthorized "fan pages" should also be searched.
• Online sales sites: Sites such as Amazon and eBay should be searched to see if anything
related to the organization is sold online.
• Domain names: The auditor should gather information for known domain names & related
domain names.
GMTESTSERIES.COM®
Page 33
• Justification of Online Presence: The auditor should examine business records to determine
on what basis the organization established online capabilities such as e-mail, web sites, e-
commerce, Internet access for employees etc. These services add cost and risks.
A-26 Financial Accounting Module is one of the most important modules of the ERP system
which also connects different modules to each other. Key features of this module are:
(i) Tracks and integrates the financial and accounting data across the organisation.
(ii) Creation of organisational structure (like defining company, company codes, business areas,
functional areas etc.)
(iii) Financial accounting global setting (like setting fiscal year, posting period, document types
etc.)
A-27 Different activities involved in the sales and distribution process can be listed through the
following diagram:
GMTESTSERIES.COM®
Page 34
Pre-Sales Activities are the activities which are performed to generate order from the
customers. Pre-sale activities includes:
A-28 Some of the ways through which the operating system protection can be achieved are as
follows:
• Automated terminal identification: This will help to ensure that a specified session could only
be initiated from a certain location or a computer terminal.
• Terminal log-in procedures: A log-in procedure is the first line of defence against
unauthorized access. When the user initiates the log-on process by entering user-id and
password, the system compares the ID and password to a database of valid users and
accordingly authorizes the log-in.
• Access Token: If the log-in attempt is successful, the operating system creates an access token
that contains key information about the user including user-id, password, user group and
privileges granted to the user.
• Access Control List: This list contains information that defines the access privileges for all valid
users of the resource. When a user attempts to access a resource, the system compasses his
user-id and privileges contained in the access token with those contained in the access control
list. If there is a match, the user is granted access.
GMTESTSERIES.COM®
Page 35
• Discretionary Access Control: The system administrator usually determines who is granted
access to specific resources and maintains the access control list. However, in distributed
systems, resources may be controlled by the end-user.
• User identification and authentication: The users must be identified and authenticated in a
fool-proof manner. Depending on risk assessment, more stringent methods like Biometric
Authentication or Cryptographic means like Digital Certificates should be employed.
• Integrity can be maintained: Data integrity is maintained by having accurate, consistent, and
up-to-date data. Updates and changes to the data only must be made in one place in DBMS
ensuring Integrity.
• Program and File consistency: Using a DBMS, file formats and programs are standardized. The
level of consistency across files and
programs makes it easier to manage data when multiple programmers are involved as same
rules & guidelines apply across all types of data.
• User-friendly: DBMS makes the data access and manipulation easier for the user. DBMS also
reduces the reliance of users on computer experts to meet their data needs.
• Improved security: DBMS allows multiple users to access the same data resources securely.
Using passwords, DBMS can be used to restrict data access to only those who should see it.
GMTESTSERIES.COM®
Page 36
A-30 Big data refers to the massive data sets which conventional database tools do not have
enough processing power to process and analyze them. Ability to process Big Data brings
following benefits:
(i) Better Decision making and strategy making
(ii) Improved customer service - Traditional customer feedback systems are getting irrelevant.
Today, Big Data are being used to read and evaluate consumer responses.
(iii) Better operational efficiency - Integration of Big Data technologies and data warehouse
help organization to offload infrequently accessed data, thus leading to better operational
efficiency.
A-31
e-Shops An e-shop is a virtual store that sells products and services online. Orders are
placed and payments made. They are convenient way of direct sales to
customers and allows manufacturers to bypass intermediaries and reduce costs
& delivery times. Like www.dell.com.
e-Malls The e-mall is a e-retailing model of a shopping mall where different shops are
situated in the e-commerce website like www.alibaba.com.
Buyer It brings together large numbers of individual buyers and provide products at
Aggregators reduced prices. In this, the firm contacts goods or service providers, make them
their partners, and sell their products or services under its own brand. Example
– www.zomato.com
Virtual Virtual Community is a community of users who share a common interest and
Communities communicate with each other. These are highly scalable so that more people
GMTESTSERIES.COM®
Page 37
can join it. The services may be provided free of cost or for a subscription fee.
Like quora.com.
(ii) Privacy & Security – In e-commerce transactions as data is needed to be transacted online,
privacy & security of data is a major concern. Also, there is threat of theft, copy or duplication
of data.
(iii) Hidden Costs – Particularly in case of goods ordered from other countries, there may be
hidden costs imposed by the company.
(v) Lack of Infrastructure – Growth of e-commerce needs not only digital infrastructure but also
physical infrastructure like roads, railway etc. In developing countries, this is a major challenge.
(vi) Non-Recognition of e-transaction – If e-transaction & digital signature is not recognised as
evidence in the court of law, e-commerce can never grow.
(vii) Problem of privacy – If intellectual properly are transacted through e-commerce platform,
there are very high risk of its privacy.
A-33 Cards are provided by banks to their customers. Cards are one of the most used digital
payment modes but now modern methods are gaining ground. Different types of cards are:
(a) Credit Cards – It is a small plastic card issued by bank & other issuers to the eligible
customers. Through credit card customer can purchase products or services on credit & their
cash flow position is not immediately impacted. Customer has to make payment to the card
issuers at the end of the billing cycle. i.e. month end.
GMTESTSERIES.COM®
Page 38
(b) Debit Cards – Debit card is a small plastic card issued by bank to their customers. Customer
can purchase goods or services and pay with the debit card & his account immediately gets
debited by the amount of payment. It is like a pre-paid card.
• Security Standards: Security is a major concern in mobile computing field particularly due to
the wireless nature of communication. There are security mechanisms like encryption, virtual
private network (VPN) etc. but still security is a serious concern in mobile computing field.
• Power consumption: When a power outlet or plug is not available, mobile devices have to rely
entirely on the battery power. Hence it is
necessary that battery capacity of mobile devices should be strong enough to provide
reasonable working time.
• Transmission interferences: Mobile signals can get affected by various factors like weather,
nearest tower range etc. Also signal reception in basements, hilly areas etc. is often poor.
• Potential health hazards: Mobile devices may generate radiations due to which long usages of
mobile devices may cause serious health issues. Using mobile devices while driving can cause
road accidents.
• Human interface with device: Mobile devices have smaller screen and keyboard which makes
them difficult to operate.
GMTESTSERIES.COM®
Page 39
A-35 BYOD refers to the business policy where companies allows employees to bring and use
their own preferred computing devices like smart phone laptop, tablet etc. for the business or
office related work. The main advantages of the BYOD Policy are:
(i) Happy Employees: Employees feels more comfortable in using their own devices at the
workplace.
(ii) Increased employee efficiency: As employees uses their own computing devices, their
efficiency and productivity increases.
(iii) Lower IT budgets: As employees uses their own computing devices, companies are not
required to incur money on the acquisition of such devices thereby lowering the IT budgets.
(iv) Reduced IT support requirement: IT department does not have to provide end user support
and Maintenance Services.
(v) Early adoption of new Technologies: Employees are usually proactive in adopting new
technologies, in this way organisations also gets the benefits of latest technologies.
A-36 Various commercial laws are applicable to e-commerce and m-commerce transactions in
India are as follows:
• Income Tax Act, 1961: Income Tax Act contains provisions regarding the taxation of income of
companies engaged in the e-commerce and m-commerce business in India.
• Companies Act, 2013: As most of the merchants in e-commerce / m-commerce business are
companies, the companies Act is directly applicable on them.
• Foreign Trade (Development and Regulation) Act, 1992: This is an act to provide for the
development and regulation of foreign trade by facilitating imports into and exports from India.
• The Custom Act, 1962: This act defines import and export of goods or services from India and
provides for levy of customs duty.
• The Goods and Services Tax Act, 2017 (GST): This Act requires e-commerce/m-commerce
merchants to comply with various provisions like uploading invoices, filing return, payment of
tax etc.
GMTESTSERIES.COM®
Page 40
• Consumer Protection Act, 1986: This law protects the consumer rights in the e-commerce and
m-commerce transactions.
A-37 The most suitable choice is Community Cloud which is the cloud infrastructure provisioned
for exclusive use by a specific community of consumers from organizations that have shared
concerns. It may be owned, managed, and operated by one or more of the organizations in the
community, a third party or some combination of them, and it may exist on or off premises. In
this, a private cloud is shared between several organizations. This model is suitable for
organizations that cannot afford a private cloud and cannot rely on the public cloud either.
Advantages of Community Cloud are as follows:
• It allows establishing a low-cost private cloud.
The limitation of the Community Cloud is that the autonomy of the organization is lost and
some of the security features are not as good as the private cloud. It is not suitable in the cases
where there is no collaboration.
A-38 The Service Model provided by vendor XYZ to ABC university is Infrastructure as a Service
(IaaS). Characteristics of Infrastructure as a Service (IaaS) of Cloud Computing are as follows:
• Web access to the resources: The IaaS model enables the IT users to access IT infrastructure
resources over the Internet.
GMTESTSERIES.COM®
Page 41
• Centralized Management: The resources distributed across different parts can be controlled
from central console that ensures effective resource management and effective resource
utilization.
• Elasticity and Dynamic Scaling: Depending on the load, IaaS services can provide the resources
and elastic services where the usage of resources can be increased or decreased according to
the needs.
• Shared infrastructure: IaaS follows a one-to-many delivery model and allows multiple IT users
to share the same physical infrastructure and thus ensure high resource utilization.
• Metered Services: IaaS allows the IT users to rent the computing resources instead of buying
it. The services consumed by the IT user will be measured, and the users will be charged by the
IaaS providers based on the amount of usage.
A-39 Segregation of Duties (SOD) ensures that single individuals do not possess excess
privileges that could result in unauthorized activities such as fraud or the manipulation of
sensitive data. Some of the SOD controls are as follows:
• Transaction Authorization: Information systems can be programmed to require two or more
persons to approve certain transactions. Like in banking industry there is the signatory
requirement by a senior level manager also when transaction value exceeds certain limit.
• Split custody of high-value assets: High value assets can be protected using split custody. Like
Banks do this for central vaults, where a vault combination is split into two or more pieces so
that two or more persons are required to open it. Hence through proper SOD, high value assets
can be protected.
• Periodic reviews: IT personnel should periodically review user access rights to identify
whether any segregation of duties issues exist. This review is necessary for the effective SOD
mechanism.
GMTESTSERIES.COM®
Page 42
A-40 The IS auditor needs to determine what events are recorded in access logs. He needs to
understand the capabilities of the system being audited and determine if right events are being
logged or not.
• Centralized access logs: IS auditor should determine if organization’s access logs are centrally
managed or stored in individual systems.
• Access log protection: The auditor needs to determine if access logs can be altered,
destroyed, or attacked to cause the system to stop logging events. For sensitivity environments,
he needs to determine if logs should be written to media that is unalterable like optical WORM
(write once read many) media.
• Access log review: The IS auditor needs to determine if there are policies, processes, or
procedures regarding access log review and how it is functioning.
• Access log retention: The IS auditor should determine how long access logs are retained by
the organization and if they are back up.
• He is provided with the user ID & password through which he can access the internet banking
services.
• Customer will access the bank’s website through the internet browser and internet from
where he will be directed to a secured web server where he will insert his user ID and password
for login.
• The web server will forward the login details entered by the user to the internet banking
application server (IBAS) which then access the internet banking channel server (IBCS) to
authenticate the login details entered by the users.
• The information received through the web server is verified and if information is not
matched, an access denied message will be displayed and customer will have to log in again.
Customer is usually provided three log-in attempts.
GMTESTSERIES.COM®
Page 43
• Balance inquiry
• Fund transfer
• Change of password
A-42 Risk & key controls loans and advances process flow are as follows:
S.N. Risk Key Controls
1. Credit line setup is unauthorized The credit team shall check the financial ratios, net
and not in accordance with the worth and other factors before offering the credit
bank's policy line to the client.
2. Credit lines set up in CBS is Access rights to authorize the credit limit should be
unauthorized restricted to authorized persons only
3. Breach of credit line set up Transactions cannot be made if aggregate limit of
outstanding amount exceeds the credit limit
assigned to the customer.
4. Customer master defined in CBS is Access rights to authorize the customer master in
not in accordance with pre- CBS should be restricted to authorized persons only.
disbursement certificate
5. Inaccurate interest or charges Interest or charges should be calculated
being calculated automatically in the CBS software as per the defined
rules and masters.
GMTESTSERIES.COM®
Page 44
6. Lower interest or commission Loan or other credit facility will be restricted by CBS
charged if interest or commission is charged is lower than
what has been defined in the Customer Master in
CBS.
A-43
GMTESTSERIES.COM®
Page 45
A-44 In the context of CBS software, configuration refers the way a software system is set-up.
Whenever a software is installed, value of different parameters has to be configured as per the
policies of the bank and rules applicable in the banking industry. Configuration will define how
software will function and what menu options will be displayed. The various modules of the
bank such as advances, deposits, treasury etc. have to be configured. Some examples of
configuration (task performed at configuration level) are:
• Password management
A-45 Machine Learning is a type of Artificial Intelligence (AI) that provides computers with the
ability to learn without being explicitly programmed. Some of the application areas of Machine
Learning are:
• Autonomous vehicles like drones, self-driving cars etc.
A-46 The various stages involved in deployment & implementation of CBS. These stages should
be controlled at various stages to ensure that banks automation objectives are achieved. The
various stages are:
GMTESTSERIES.COM®
Page 46
• Planning: Banks should plan for CBS considering its strategic and business objectives.
• Approval: The decision to implement CBS requires high investment and recurring costs hence
it must be approved by the highest authorities of the bank.
• Selection: There are multiple vendors of CBS, each solution has different features and
advantages. Hence, bank should select the right CBS solution for itself so to meet its business
objectives.
• Design and develop or procure: CBS solutions may be developed in-house by the bank or
procured from market.
• Testing: Extensive testing must be done before the CBS becomes live i.e. put to actual use.
The testing is to be done at different phases like procurement phase, processing phase etc.
• Updation: Different CBS modules must be updated based on business needs, technology
updates or regulatory requirements.
A-47 Some of the internal controls that could be adopted by the Bank or Bank Branch are:
• Work of one staff to be verified by another staff (maker-checker principle).
• System of job rotation exists for staff.
• Fraud-prone items such as currency, demand draft, deposit receipts etc. should be in the
custody of at least two officials.
• Financial & administrative powers of officials should be fixed & communicated to all
concerned person.
• Branch manager must send periodic compliance report to his controlling authority.
GMTESTSERIES.COM®
Page 47
• All books should be periodically balanced and balancing should be confirmed by authorized
officials.
A-48 Some of the tips to protect any e-Commerce business from intrusion are as follows:
• Viruses – Entity should protect itself from viruses as viruses may cause loss of valuable data.
• Hackers – Entity should regularly assess its capability to protect itself from hackers.
• Regular software updates – Website of the e-commerce vendor should be up to date with the
latest security software.
• Passwords – Ensure that password are changed at regular intervals & password used by
former employee are made ineffective.
• Sensitive data – Use encryption software & other security software to protect sensitive data.
A-49 Do the growing reliance on technology, IT risks are becoming major security threats for
the banking industry. If left unchecked, IT risks can lead to serious consequences for the banks
and adversely impact its business. Sample list of IT related controls are:
• System to maintain the record of all log-ins and log-outs.
• There should be a user time-out system where if no activity is performed from a logged-in
account for a certain period, user will be automatically logged-out.
• Once end-of-the day process are over, ledger can be opened only with a supervisory level
password.
• If transaction wants to post something in the in-operative or dormant account, it can be done
only with a supervisory level password.
• Users can access only specified data and files and access rights should be given on ‘need to
know’ basis based on their role in organisation.
GMTESTSERIES.COM®
Page 48
• All exception situations like limit excess, reactivating dormant account etc. can be done only
with a supervisory level password.
A-50
GMTESTSERIES.COM®
Page 49
A-52 Management of logistics is a process which integrates the flow of supplies into, through
and out of an organization, transportation, warehousing, material handling, order fulfilment
etc. Organizations try to keep the cost of transportation as low as possible while ensuring safe
and reliable delivery. Some ways how logistics management can help a business organisation
are as follows:
• Cost savings
• Reduced inventory
• Customer satisfaction
• Competitive advantage
A-54
GMTESTSERIES.COM®
Page 50
A-55 Technology Leader Firms are the firms who develops new technologies and takes a lead in
the R&D hence they are called Technology Leaders. This strategy involves huge risk as it causes
high R&D costs and there is no surety that the ultimate product would be a commercial success.
However this strategy offers the highest reward as well.
GMTESTSERIES.COM®
Page 51
To understand the Competitive Landscape of the company, manager of Amit Ltd. should
consider the following factors:
(i) Identify the competitor
A-56 Prior to the Year 1908, Business was conducted on adhoc basis with very little or no
formal planning. In the year 1908 Harvard Business School (HBS) Started using interactive case
studies to teach the students about Management and planning.
In the Year 1911, HBS formally introduced a course to create and enhance the general
management capabilities of the Students. This was the time when the concept of “Business
Policy “established. In the Year 1959, Business policy was formally introduced in Academics.
In the Year 1969, American Assembly of Collegiate Schools of Business (AACSB) made it
mandatory to have a course on Business Policy for the recognition of Business Schools in USA.
There was further evolution of Business Policy as Managers started having long term planning
instead of day to day planning or short-term planning and finally moved to Strategic Planning
for managing the business and strategic management came into existence.
As the Business environment become more and more uncertain, dynamic and complex,
Business Policy evolved and finally replaced by Strategic Management. So practically, today
business organisation uses the concepts of strategic management for managing their
businesses.
GMTESTSERIES.COM®
Page 52
• direction and
• destination
Strategy determines
• Where an organization wants to be
As the Business environment is dynamic uncertain and complex, it is essential for the
organization to have a well-crafted strategy. Well Crafted strategy helps the management to
better deal with environment and convert the opportunities in the favour of the organization.
To Survive and Succeed, entity needs well-crafted strategy but strategy is not the substitute or
replacement of a sound and alert Management System.
Strategy no matter how well-crafted it may be, it can never be perfect, flawless & optimal. The
continuous changes taking place in the environment will make even the most perfect strategies
irrelevant. Hence it is the duty of the management to continuously monitor the business
environment and review the strategy to make the necessary charges as needed in the strategy.
A-58
Strategy Strategic Management
Strategy implies long-range blueprint of an Strategic Management refers to the
organisation designed image, direction & managerial process of developing a strategic
destination. vision, mission, setting objectives, formulating
&
implementing strategy and initiating
corrective actions as needed.
GMTESTSERIES.COM®
Page 53
It has narrow scope compared to Strategic Strategic Management has a broader scope.
Management
A-59 Organizations may be classified into commercial (for profit) and non-commercial (NGOs)
on the basis of interest they have. Compared to the for-profit organisations, not-for-profit
organisations usually dependent upon charity, donation and other similar sources for their
financing needs. It is very important for medical organizations & government organisations to
use concepts of strategic management while running their operations.
With the advancement of computers and internet technologies the entire medical system has
undergone significant changes. Medical organizations needs to be very efficient in their
working. Strategic Management concepts are playing significant role in making the hospitals
more efficient and competitive. Through Strategic Management concepts, hospitals can:
• Generate sufficient fund for meeting their objectives
GMTESTSERIES.COM®
Page 54
A-60
Strategy Formulation Strategy Implementation
It is an entrepreneurial activity. It is an administrative task.
It deals with formulating appropriate It is the process of putting the strategy
strategies for entity. formulated into actions.
It is primarily on intellectual process. It is primarily on operational process.
It needs sound knowledge and analytical skills. It needs strong motivational and leadership
skills.
It focuses on effectiveness. It focuses on efficiency.
It requires coordination among few It requires organization wide coordination.
individuals.
GMTESTSERIES.COM®
Page 55
• Threat: A threat is an unfavourable condition in the environment which causes a risk for, or
damage to, the organisation’s position.
SWOT analysis helps managers to craft a business model (or models) that will allow a company
to gain a competitive advantage in its industry (or industries). Competitive advantage leads to
increased profitability, and this maximizes a company’s chances of surviving in the fast-
changing, competitive environment. Key reasons for SWOT analyses are:
• It provides a logical framework.
A-62 Implementing the supply chain management system will involve the following steps:
(i) Product Development: Organisation must work with the customers and suppliers in product
development process. Active involvement of them is necessary as it will help the company to
bring the exact product the market demands and that too in a shorter duration.
(ii) Procurement: Procurement requires careful planning, identifying sources, negotiation, order
placement, inbound transportation and storage of raw material. Organizations should have
effective procurement mechanism in place.
(iii) Manufacturing: Companies should adopt flexible manufacturing process to quickly respond
to market changes. Manufacturing should be done on the basis of just-in-time (JIT) and keep
the inventory as low as possible
(iv) Physical Distribution: Availability of the products at the right place at right time is essential
for the success of organization. It should ensure that there does not remain any unsatisfied
demand.
(v) Outsourcing: As competition is increasing, companies all over the world are focusing on their
core competencies and performing only those tasks internally on which they are best and
outsourcing all other tasks to outside parties who can perform those tasks at a lower cost.
GMTESTSERIES.COM®
Page 56
(vi) Customer Services: Customers are the king and companies must serve them properly to win
their loyalty. Organisations should ensure proper after sale services to their customers.
(ii) Training: The workforce will be more competent if they are well trained to perform their
jobs.
(iv) Compensation: A firm can increase the competency of its workforce by offering salary
packages that are more attractive than those of their competitors.
A-64
Statement of Net Worth of A Ltd. (Rs in Lakh)
Paid-up capital 140
Additional Paid-up capital (securities 60
premium)
Retained Earnings 80
Total 280
GMTESTSERIES.COM®
Page 57
Add: Goodwill 50
Less: Inventory Value (4)
Less: Asset overvalued (6)
Less: other fictitious assets (6)
Net worth of A Ltd. 314
A-65 Forward Linkages refers the situation where entity formulates a strategy it will pursue in
future but with the formulation of new strategy many changes have to be made in the
organization like organizational Structure, Culture, Leadership etc. may have to be modified
according to the new strategies. So in this way, the formulation of the strategy have the
forward linkage with the implementation. Forward linkage is most suited if entity wants to
change or modify its strategies as per the changing market situations.
Backward Linkage refers the situation where entity finds it very difficult implement new
strategies as new strategies might require changes in existing structure, culture etc. Hence
entity tends to adopt those strategies which can be implemented with the help of existing
culture, structure and other resources. This approach is known as backward integration. Here
entity makes incremental improvements to achieve its strategies. This approach is suitable for
those entities who wants to continue with the existing strategy without making any major
changes.
A-66 Industry is a group of similar firms whose products or servers having similar features and
attributes & they compete for the same buyers. Like Real Estate Industry, Auto Mobile Industry,
Telecom Industry etc. Some of the factors that can be considered as the dominant economic
features of the Industry are as follows:
GMTESTSERIES.COM®
Page 58
A-67 An industry's Key Success Factors (KSFs) are factors that affects the industry members'
ability to prosper in the market. KSFs are so important that all firms in the industry must pay
close attention to them. The answers to three questions help identify an industry's KSFs:
• On what basis do customers choose between the sellers?
• What does it take for the sellers to develop those resources & capabilities?
Understanding the industry key success factors should be the top most priority of the managers
and if they mis-understood these factors, they may end up crafting a misleading strategy. Any
industry usually has at most three or four key success factors at a time & key success factors
vary from industry to industry.
A-68 Strategic Group mapping is a tool for comparing the market positions of rival firms. A
strategic group consists of those rival firms with similar competitive approaches and positions
in the market. Companies in the same strategic group may be due to having comparable
product-line, price range, distribution channels etc. The procedure for constructing a strategic
group map is:
• Identify the competitive characteristics that differentiate firms in the industry. General
variables could be price range; geographic coverage; product-line breadth etc.
GMTESTSERIES.COM®
Page 59
• Plot the firms on a two-variable map using pairs of these differentiating characteristics.
• Assign firms having the same strategic approach to the same strategic group.
A-69 The sustainability of competitive advantage and a firm’s ability to earn profits from its
competitive advantage depends upon four major characteristics or factors of resources and
capabilities:
(i) Durability: The period over which a competitive advantage is sustained depends on the rate
at which a firm’s resources and capabilities deteriorate. In industries where the rate of product
innovation is fast, the rate of deterioration is high.
(ii) Transferability: Even if the resources and capabilities on which a competitive advantage is
based are durable, it is likely to be eroded by competition from rivals. The ability of rivals to
attack position of competitive advantage relies on their gaining access to the necessary
resources and capabilities. The easier it is to transfer resources and capabilities between
companies, the less sustainable will be the competitive advantage which is based on them.
(iii) Imitability: If resources and capabilities cannot be purchased by the competitors, then they
must be built from the scratch. How easily and quickly can the competitors build the resources
and capabilities on which a firm’s competitive advantage is based affects the sustainability of
the competitive advantage.
(iv) Appropriability: It refers to the ability of the firm’s owners to appropriate the returns on its
resource base. Even where resources and capabilities are capable of offering sustainable
advantage, there is an issue as to who receives the returns on these resources.
A-70 Market Penetration is the most common expansion strategy is market penetration or
concentration. In this strategy, firm uses its existing products and markets and sells it in the
GMTESTSERIES.COM®
Page 60
larger quantity to achieve growth. Entity can do the following to increase its market share in the
market penetration strategy:
• Increase product usage
A-72 A firm’s profitability tends to be higher when other firms are blocked from entering the
industry. New entrants can reduce industry profitability. Barriers to entry represent economic
forces that slow down or prevents entry by other firms. Common barriers to entry include (now
explain each of the following):
• Capital Requirements
GMTESTSERIES.COM®
Page 61
• Economies of Scale
• Product Differentiation
• Switching Costs
• Brand Identity
A-73 According to Michael Porter, strategies allow organizations to gain competitive advantage
from three different bases namely cost leadership, differentiation, and focus. Porter called
these as generic strategies.
Based on the facts given in the question, Coffee Beans has opted differentiation strategy. Its
products are designed having unique features and qualities that are different from the
competitors. Highly differentiated and unique products enable Coffee Beans to charge premium
prices for its products hence making higher.
A-74 The audit of management performance with regard to its strategies helps ‘Zumba Robots’
identify problem areas and correct the strategic approaches that have not been effective so far.
A strategy audit is a review of a company's business plan and strategies to identify weaknesses
and shortcomings and enable a successful development of the company. An assessment of the
external environment shows where changes happen and where organization’s strategic
management no longer match the demands of the marketplace. Based on such analysis, Zumba
Robots can improve its business performance significantly by periodically conducting such an
audit.
GMTESTSERIES.COM®
Page 62
A-75 Core competencies are capabilities that serve as a source of competitive advantage for a
firm over its rivals. Core competency as the collective learning in the organization, especially
coordinating diverse production skills and integrating multiple streams of technologies. An
organization’s combination of technological and managerial know-how, wisdom and experience
are a complex set of capabilities and resources that can lead to a competitive advantage
compared to a competitor.
A-76 A core competence is a unique strength of an organization which may not be shared by
others. Core competencies are those capabilities that are critical to a business in achieving
competitive advantage. Considering the facts of the case, ‘Value for Money’ is the leader on
account of its ability to keep costs low. The cost advantage that ‘Value for Money’ has created
for itself has allowed it to price goods lower than competitors. The core competency in this case
is derived from its ability to generate large sales volume because of its low-cost, allowing the
company to remain profitable even with low profit margin.
A-77 Capabilities that are valuable, rare, costly to imitate, and non-substitutable are core
competencies. A small chemist shop has a local presence and functions within a limited area.
Still it can build its own competencies to gain competitive advantage. Rohit Patel can build
competencies in the areas of:
(a) Giving personal attention to the customers
GMTESTSERIES.COM®
Page 63
A-78 Industry in which entity operates change due to new trends and developments taking
place in the environment. The most dominant forces are called driving forces as they have the
biggest influence on what kinds of changes will take place in industry. Some of the examples of
drivers are:
• Internet and e-commerce
• Globalization
• Mobilization of resources
• Product innovation
• Marketing innovation
A-79 Considering the facts of the case, as Sri Alok Kumar is running a big company where lot of
decisions both small and big, are needed to be taken, hence it is not possible for him to take all
decisions by himself. Shri Alok Kumar should concentrate on strategic decisions only. These are
higher level decisions having organisation wide implications. The major dimensions of strategic
decisions are as follows:
• Strategic decisions require top-management involvement.
• Strategic decisions are likely to have a significant impact on the long-term prosperity of the
firm.
GMTESTSERIES.COM®
Page 64
A-80 Based on the facts given in the question, Vastralok Ltd. is currently manufacturing silk
cloth and its top management has decided to expand its business by manufacturing cotton
cloth. Both the products are similar in nature within the same industry. The diversification
strategy that the top management of Vastralok Ltd. has opted is concentric in nature. They
were in business of manufacturing silk and now they will manufacture cotton as well.
Concentric diversification amounts to related diversification. In concentric diversification, the
new business is linked to the existing businesses through process, technology or marketing.
A-81 In vertically integrated diversification strategy, the entity opts to engage in businesses that
one related to the existing business of the firm. The firm remains vertically with in same
product value chain moving either forward or backward in the chain and enters in to new
business areas.
Vertically integrated diversification could be in the firm of Forward Integration or Backward
Integration.
In backward integration, entity enters in to the business of the input provider or supplier with
the intention to create a effective supply chain. Through backward integration, entity gets a
better control over the input and manages its quality, availability and cost by itself. Like a super
market chain can acquire the dairy farm business to get the fresh supply of milk and other
related products.
On the other hand, in forward integration, entity moves forward in the value chain and enters
in to the business that uses the existing product of the entity (its customers). Through forward
integration, entity gets better control over the distribution chain of the product.
A-82 A Strategic vision is a roadmap of a company’s future providing specifics about technology
and customer focus, the geographic and product markets to be pursued and the kind of
company that management is trying to create. The vision of ICAI is ‘World’s leading accounting
GMTESTSERIES.COM®
Page 65
body, a regulator and developer of trusted and independent professionals with world class
competencies in accounting, assurance, taxation, finance and business advisory services’.
A-83 Product life cycle is a “S” shaped curve which represents the relationship of sales of the
product with respect to time as product passes through its life cycle. There are four phases in
product life cycle. These are:
(i) Introduction phase – This is the first phase in the product life cycle where the product is
introduced in the Market. Demand and competition remain low as the customer and
competitions are unaware about the product. In this phase, prices remain high.
(ii) Growth phase – In this phase, Market starts expanding due to which demand and sales
increases. Competition also increases due to which prices start falling.
(iii) Maturity phase – In this phase competition becomes Very intense due to which demand
does not grow and sales become stagnant.
(iv) Decline phase – This is the last phase of the product life cycle where there is a real decline
in the product demand and sale falls sharply.
The biggest advantage of product life cycle is that entity can get a significant insight about the
product and depending upon the insight, appropriate strategic decision can be taken. Like it a
business or product is in their introduction/initial or growth phase, Expansion should be the
GMTESTSERIES.COM®
Page 66
favourable approach. For matured business or product, Hold or Harvest are the best option and
for the declining business or product, Harvest or Retrenchment are best option.
A-84 Business Process Reengineering (BPR) differs from the other process improvement
methods in the following Manner:
(i) Re-engineering works on fundamental rethinking and does not have any scope for any partial
modification or marginal improvement. At the core of BPR is the concept of discontinuous
thinking. It challenges the existing rules & procedures and discards them to evolve new
processes.
(ii) BPR recognises the potential of IT for the efficient redesign of processes. BPR uses IT to
evolve new processes instead at automating the existing process.
(iii) BPR views the organisation from cross-functional perspective and disregards the constraints
of departmental boundaries.
(iv) BPR may require massive organisation change and re-structuring. BPR causes not just the
change in the process but also changes in many other areas too.
A-85 A benchmark may be defined as a standard or a point of reference against which things
may be compared. Benchmarking is an approach of setting goals & measuring performance
based on best industry practices.
Benchmarking process involves following steps:
(i) Identifying the need for benchmarking: The first step is to understand the needs of
benchmarking. Here objectives of the benchmarking are determined.
(iii) Identify best processes: Now entity should identify best practices & processes for
benchmarking.
GMTESTSERIES.COM®
Page 67
(iv) Compare own processes with others: From the selected best processes or benchmarks,
entity should compare its own processes. Then gaps in performance is analyzed.
(v) Prepare report & implement necessary steps: A report on the Benchmarking initiatives
containing recommendations is prepared and steps are taken to fulfil the performance gaps.
(vi) Evaluation: Organization should evaluate the results of the benchmarking process it
undertook in terms of improvements achieved compared to the objectives established.
A-86
GMTESTSERIES.COM®
Page 68
A-87 Given below are the issues which are to be considered in the strategy implementation:
(i) Programme Implementation
A-88
Transactional Leadership Transformational Leadership
This is the formalized approach of leadership. This is the informalized approach of
leadership.
This leadership style is suitable for: This leadership style is suitable for:
• Matured organisations • Organisations in initial stage
• Organisations performing well • Poor performing entities
• Organisations working in stable environment • Entities facing unstable environment
This leadership style is appropriate when the This leadership style is appropriate when the
organization wants to continue existing organization wants to adopt some major
system without going for any major change. changes.
This leadership style uses top-down approach. This leadership style uses bottom-up
approach.
This leadership style provides the scope of This leadership style provides the scope of
only one leader at a time. more than one leader at a time.
GMTESTSERIES.COM®
Page 69
A-89 Typically, all organizations uses 4 P’s of marketing mix made of Product, Price, Place &
Promotion but this is not exhaustive in nature. It is important to discuss a few more elements
that may form part of an organizational marketing mix strategy. They have got more
significance in recent years and growth of services has a major role for the inclusion of newer
elements in marketing mix. A few new Ps are:
• People: All human element who play a part in delivery of the market offering and thus
influence the buyer’s perception like the firm’s employees.
• Process: Actual procedures, methods & flow of activities by which product or service is
delivered.
• Physical evidence: The environment in which the market offering is delivered and where the
firm and customer interact.
A-90 To survive and succeed in this competitive marketplace, entity adopts various strategies
for its different business levels, stage of business life cycle or product life cycle and also the
competitive situation in the market. The various strategies an organisation may adopt are as
follows:
Basis Types
Organisational Level Corporate Level Business Level Functional Level
Stages of Business Life Introduction Stage - Market Penetration Strategy Growth Stage -
Cycle Growth/Expansion Strategy Maturity Stage - Stability Strategy
GMTESTSERIES.COM®
Page 70
A-91
Cost Leadership Strategy Differentiation Strategy
It is one of the generic strategies specified by It is one of the generic strategies specified by
Michael Porter. Michael Porter.
Cost leadership strategy means having the In differentiation strategy, entity tries to
lowest cost of operation, production, develop a product or service with unique
procurement, storage and distribution in the features or attributes that are different from
industry. the competitors.
This strategy is directed towards the price- This strategy is particularly applicable for the
sensitive buyers. buyers who are relatively price insensitive.
Through cost leadership strategy, organisation Successful differentiation strategy allows firm
tries to undercut its competitors through the to charge a premium price for its product and
prices. services and to gain customer loyalty.
To achieve cost leadership, entity needs tight Differentiation strategy needs strong
cost control, proper supervision, intolerance innovation & research capabilities, rapid
towards waste, very high efficiency etc. product innovations, increase brand image
and value etc.
The risk of pursuing cost leadership strategy is Major risk associated with differentiation
that competitors may recognise the successful strategy is that customers may not value the
cost leadership strategy and copy it. differentiating features offered by the
company and may not pay the premium prices
thus causing failure of differentiation strategy.
GMTESTSERIES.COM®
Page 71
A-92 Although competition makes organizations work harder, intense competition is neither a
coincidence nor bad luck. All organizations faces competition. To gain a deep understanding of
a company’s industry and competitive environment, managers do not need to gather all the
information they can find and waste a lot of time digesting it. Rather, the task is much more
focused. A powerful and widely used tool for systematically diagnosing the significant
competitive pressures in a market and assessing the strength and importance of each is the
Porter’s five-force model of competition. This model holds that the state of competition in an
industry is a composite of competitive pressures operating in five areas of the overall market.
These are:
(i) Threat of new entrants
A-93 Acquisition of existing concern is a means of achieving the growth and expansion. Apart
from the urge to grow, acquisitions and mergers are resorted to for purposes of achieving a
measure of synergy between the parent and the acquired enterprises. Synergy may result from
the physical facilities, technical and managerial skills, distribution channels, research and
development and so on. Some of the popular acquisition are:
• Tata Steel’s acquisition of Corus
GMTESTSERIES.COM®
Page 72
A-94
Concentric Diversification Conglomeratic Diversification
If the new business opted by the entity is If the new business opted by the entity is
linked with its existing business through totally disjoint or unrelated with its existing
process, market or technology, it is called business, it is called conglomeratic
concentric diversification. diversification.
It is also called related diversification. It is also called unrelated diversification.
For example, if a school book publishing For example, if a school book publishing
company enters into the business of school company enters into the business of stock
stationery and school uniform, it is concentric broking, it is known as horizontally integrated
diversification. diversification.
A-95 A sick company is a company which has huge accumulated losses which have eroded its
net worth. Electric home appliance is a sick company and is evaluating retrenchment strategy.
Retrenchment strategy is followed when an organization wants to substantially reduce the
scope of its activity. The various kinds of retrenchment strategy are:
(i) Turnaround Strategy: Retrenchment may be done either internally or externally. For internal
retrenchment to take place, emphasis is on improving internal efficiency, known as turnaround
strategy. Through turnaround strategy, organisation focus on ways to reverse the process of
decline. It may try to reduce costs, eliminate unprofitable outputs, generate revenue, improve
coordination, better control, and so on. It may also involve changes in top management and
reorienting leadership.
(ii) Divestment Strategy: Divestment strategy involves the sale or liquidation of a portion of
business, or a major division, profit centre or SBU. Divestment is usually a part of restructuring
plan and is adopted when a turnaround has been attempted but has proved to be unsuccessful.
(iii) Liquidation Strategy: In retrenchment, the most extreme and unattractive is liquidation
strategy. It involves closing down a firm and selling its assets. It is considered as the last resort
because it leads to serious consequences such as loss of employment for workers. Liquidation
GMTESTSERIES.COM®
Page 73
strategy may be unpleasant as a strategic alternative but when a "dead business is worth more
than alive", it is a good proposition.
The appropriate retrenchment strategy will depend on the circumstances and goals of the
company.
A-96 Considering the facts of the case, the company needs to conduct strategy audit. Strategy
audit is needed under following conditions:
(i) When performance indicators reflect that a strategy is not working properly or is not
producing desired outcomes.
(ii) When the goals and objectives of the strategy are not being accomplished.
(iii) When a major change takes place in the external environment of the organization.
(iv) When the top management plans: - to fine-tune existing strategies and introduce new
strategies & - to ensure that a strategy that has worked in the past continues to work despite
the internal and external changes that may have occurred.
A-97 There are some processes which are extremely critical for the success and survival of the
entity. These processes are called core processes. Core processes if properly managed,
enhances the capabilities of the organisation and provides it competitive advantage. Some of
the core processes are:
• In FMCG sector, marketing is a core process.
• In electronics and semi-conductor industry, the new product development is core process.
• In insurance industry, premium charged from customer and profit earned by company after
settlement of claim is a core process.
GMTESTSERIES.COM®
Page 74
A-98 ABC Ltd. needs to break higher level strategies into functional strategies for
implementation. These functional strategies, in form of Marketing, Finance, HR, Production,
Research and Development help in achieving the organisational objective. The reasons why
functional strategies are needed can be enumerated as follows:
• Functional strategies lay down clearly what is to be done at the functional level.
• They facilitate the implementation of corporate and the business level strategies.
• They act as basis for controlling activities in the different functional areas of business.
• Similar situations occurring in different functional areas are handled in a consistent manner.
A-99 For a new product pricing, an organization may either choose to skim or penetrate the
market. In skimming prices are set at a very high level. In penetration pricing firm keeps a low
price for a new product to grab a large market share. In the given case, as the company has
kept a low price for its product, it has adopted a penetration pricing policy. In pricing a really
new product at least three objectives must be kept in mind:
(i) Making the product acceptable to the customers
(ii) Producing a reasonable margin over cost
A-100 There are three major research and development approaches for implementing
strategies.
(i) Technology Leaders: These are the firms who develops new technologies. These firms take a
lead in R&D hence they are called Technology Leaders. This strategy involves huge risk as it
causes high R&D costs and there is no surety that the ultimate product would be a commercial
GMTESTSERIES.COM®
Page 75
success. However this strategy offers the highest reward as well. E.g. Nokia, Apple, BMW,
Boeing etc.
(ii) Technology Imitator / Innovative Imitator: These are the firms who do not take lead in R&D
but imitates the successful products and services based on the new technologies. These kinds
of firms must have a very innovative and capable R&D Team who can successfully imitate the
new technologies on timely basis. Here risks and rewards are less compared to technology
leader firms.
(iii) Lower End Technology Followers: These are the low-cost producers who mass produce
products similar to but significantly less expansive compared to the products of technology
leaders or technology imitator firms. These firms are not required to make high R&D
investments but needs high investment in plant and machineries to mass produce the product.
GMTESTSERIES.COM®