The ____ are the primary models from which other models draw information
a. state chart diagram and the problem domain class diagram.
b. system sequence diagram and the activity diagram
c. use case diagram and the problem domain class diagram
d. use case description and the use case diagram
c
You might also like to view...
Donald Yates purchased 400 shares of Adco Mutual Fund for an offer price of $3.28. He later sold the shares at a net asset value of $5.16 per share. During the time Donald owned the shares, Adco paid a dividend of $.23 three times. What was Donald's return on his investment? (Round to the nearest tenth of a percent)
What will be an ideal response?
The Center for Audit Quality (CAQ) report identifies which of the following ways in which individuals involved in the financial reporting process can mitigate the risk of fraudulent financial reporting?
a. Individuals involved in financial reporting need to acknowledge that there needs to exist a strong, highly ethical tone at the top of an organization that permeates the corporate culture, including an effective fraud risk management program. b. Individuals involved in financial reporting need to continually exercise professional skepticism. c. Individuals involved in financial reporting need to remember that strong communication among those involved in the financial reporting process is critical. d. All of the above.
Mandy calls a local newspaper and pretends to be a neighbor who is away for the winter. She obtains account history and orders the newspaper for six months. Has Mandy committed a fraud? If yes, under which act?
a. No, the newspaper has not yet been delivered or paid. b. Yes, she is in violation of the Gramm-Leach Bliley Act of 1999. c. No, as the neighbor has not served any written notice to keep the information private. d. Yes, she is in violation of Fair and Accurate Credit Transactions Act of 2003.
The asset-liability method of interperiod tax allocation currently required by U.S. GAAP is an example of the
a. discounted comprehensive recognition approach. b. no-deferral approach. c. partial recognition approach. d. comprehensive recognition approach.