2. Discuss the current accounting standards or principles applicable in Ethiopia as a base for
financial statement preparation and presentation.
3. Explain the underlying prescriptions of IFRS
4. Describe five types of business transactions with external parties and another five types of
business transactions from internal sources of a selected form of business company at your
nearby (please indicate the form of company you selected on the answer sheet) and explain
how they are journalized and then reported in the financial statements.
5. Discuss the accounting process as a cycle with a given period by explaining each of the
steps and by giving practical examples.
Porter’s Value chain model is a generic model that has been adopted by manufacturing
firms. Considering the above, outline the primary and support activities of
the value chain model.
Discuss cybercrimes including creation of malicious programs such as viruses, worms,
Trojan horses, and zombies as well as denial of service attacks, Internet scams, identity
theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.
MG Motors have been having a tough time from the time of their launch in India. They feel that there have been a lot of pilferages and wastage in their production and they need to sort it out as soon as possible. Also, the time taken to manufacturer one unit of their cars is extremely high as compared to global benchmarks. They have hired you as a consultant for the same? Can you explain the concepts of JIT and Lean Production to them and help them apply the same in order to reduce their troubles?
Distinguish between performance management and performance appraisal
Discuss some of the crucial challenges that organisations can be faced with during planning and
implementation phase of any training and development program.
Discuss some of the fundamental skills that organisations need to focus more in developing among
their employees if they want to keep their business at a competitive advantage in the 21 century.
Why is it important for security and privacy to be considered as one of the important factors, in
the design, development and maintenance of an HRIS?