四川省考生报名的缴费方式有哪些?应当注意什么问题?

发布时间:2020-01-10


ACCA考试是一个报名门槛较低但考试规定及其严格的考试,其证书的含金量和社会认可度吸引着众多的学子和公职人员不约而同地报考。在报考的时候不要忘了最重要的事情,就是缴费!那么缴费流程又是怎样的呢?且随51题库考试学习网一起去了解了解,建议收藏哦。

ACCA协会官方规定,即使申请免考通过,免考的几门科目要等同于需考试的科目,需要交与考试费相等的免考费。

在收到ACCA寄来的免试通知后尽快缴纳,若收到时间与考试报名时间比较接近,也可以与考试费一起缴纳。不用一次性交清的,注册报名时只需交注册费(按当年费用标准),以后收到ACCA寄来付费通知(如免试费、年费、考试费)时,再逐项交纳。如果只是免试费的话是不着急的,完全可以和你下次的考试费用一起缴纳,一般同一年度里就行。

缴费流程:

1.登录ACCA官网www.accaglobal.com点击My ACCA

2、输入自己的7位ACCA ID和密码,点击Sign in to MY ACCA

3、在左边菜单中点击ACCOUNT ADMINISTRATION并选择Fees,payments and Print Receipts 4、页面跳转后选择需要付款的选项(Annual Subscription Fee-Sub Fee)在前面小方框里打√最后点击上方的Pay键

若ACCOUNT BALANCE数值为0,即表示年费账单还未生成,可以过几天再登录账户查看

5、点击后生成缴款页确认需要缴款的数额是否正确然后再次点击Pay键

注意事项:现在ACCA官网已开通支付宝支付方式,但用支付宝会存在支付不成功的风险,如果支付不成功,款项会被退回到自己的账户中,需要重新支付,请大家不要慌!

6、交付后会生成以下页面如需ACCA考试缴费发票可点击下方Print Receipt按钮

7、点击下方Continue后回到TRANSACTIONS SUMMARY如看到Account Balance显示0.00即为缴费成功(如果显示为95,可以刷新一下试试;刷新无效的,等两天再查看自己的账户,如果还是95即缴费失败,请重新支付,第一次付款会原路退回自己的账户里)

温馨提示:如果过了最后缴费期限,那么当年算没有交年费,你将面临ACCA账户被冻结的影响,已经成为会员也无法再以ACCA会员作为对外称呼,也无法参加ACCA考试,会直接影响你的考试进度的,不过别担心,你只需要邮件联系官方,开通付费窗口,从付费窗口将之前没有交的年费重新支付,另外还要支付一定数额的罚金,罚金数目与未缴纳年费的年数有关,具体费用由官方界定。全部完成以后被冻结的会员将重新获得ACCA会员的头衔

每年的ACCA年费是在一月几号前要交掉呢?还是每年交年费之前会来信通知啊

答:“学员和会员一样都要交年费,每一年的年费都应该在前一年的12月31号前结清,当然晚一点也没关系,不过不交年费的话ACCA会除名,并且根本没资格参加下次考试”

看到这里,相信大家对ACCA考试的缴费也有了一定的了解,希望这些消息能对初次报考ACCA的同学有些许的帮助,51题库考试学习网提前预祝大家顺利通过考试!


下面小编为大家准备了 ACCA考试 的相关考题,供大家学习参考。

This information was taken from an internal newsletter of The Knowledge Partnership LLP (TKP), a company which offers project and software consultancy work for clients based in Zeeland. The newsletter was dated 2 November 2014 and describes two projects currently being undertaken by the partnership.

Project One

In this project, one of our clients was just about to place a contract for a time recording system to help them monitor and estimate construction contracts when we were called in by the Finance Director. He was concerned about the company supplying the software package. ‘They only have an annual revenue of $5m’, he said, ‘and that worries me.’ TKP analysed software companies operating in Zeeland. It found that 200 software companies were registered in Zeeland with annual revenues of between $3m and $10m. Of these, 20 went out of business last year. This compared to a 1% failure rate for software companies with revenues of more than $100m per year. We presented this information to the client and suggested that this could cause a short-term support problem. The client immediately re-opened the procurement process. Eventually they bought a solution from a much larger well-known software supplier. It is a popular software solution, used in many larger companies.

The client has now asked us to help with the implementation of the package. A budget for the project has been agreed and has been documented in an agreed, signed-off, business case. The client has a policy of never re-visiting its business cases once they have been accepted; they see this as essential for effective cost control. We are currently working with the primary users of the software – account managers (using time and cost data to monitor contracts) and the project support office (using time and cost data to improve contract estimating) – to ensure that they can use the software effectively when it is implemented. We have also given ‘drop in’ briefing sessions for the client’s employees who are entering the time and cost data analysed by the software. They already record this information on a legacy system and so all they will see is a bright new user interface, but we need to keep them informed about our implementation. We are also looking at data migration from the current legacy system. We think some of the current data might be of poor quality, so we have established a strategy for data cleansing (through offshore data input) if this problem materialises. We currently estimate that the project will go live in May 2015.

Project Two

In this project, the client is the developer of the iProjector, a tiny phone-size projector which is portable, easy to use and offers high definition projection. The client was concerned that their product is completely dependent on a specialist image-enhancing chip designed and produced by a small start-up technology company. They asked TKP to investigate this company. We confirmed their fears. The company has been trading for less than three years and it has a very inexperienced management team. We suggested that the client should establish an escrow agreement for design details of the chip and suggested a suitable third party to hold this agreement. We also suggested that significant stocks of the chip should be maintained. The client also asked TKP to look at establishing patents for the iProjector throughout the world. Again, using our customer contacts, we put them in touch with a company which specialises in this. We are currently engaged with the client in examining the risk that a major telephone producer will launch a competitive product with functionality and features similar to the iProjector.

The iProjector is due to be launched on 1 May 2015 and we have been engaged to give advice on the launch of the product. The launch has been heavily publicised, a prestigious venue booked and over 400 attendees are expected. TKP have arranged for many newspaper journalists to attend. The product is not quite finished, so although orders will be taken at the launch, the product is not expected to ship until June 2015.

Further information:

TKP only undertakes projects in the business culture which it understands and where it feels comfortable. Consequently, it does not undertake assignments outside Zeeland.

TKP has $10,000,000 of consultant’s liability insurance underwritten by Zeeland Insurance Group (ZIG).

Required:

(a) Analyse how TKP itself and the two projects described in the scenario demonstrate the principles of effective risk management. (15 marks)

(b) Describe the principle of the triple constraint (scope, time and cost) on projects and discuss its implications in the two projects described in the scenario. (10 marks)

正确答案:

(a) The first stages of risk management are the identification, descriptions and assessment of the risk. This assessment is primarily concerned with the likelihood of them occurring and the severity of impact on the organisation or project should they occur. Sometimes the likelihood is a subjective probability, the opinions of experienced managers or experts in the field. On other occasions, there is some statistical evidence on which to base the assessment. For example, in project 1, TKP identified that 20 IT software companies with annual revenues between $3m and $10m went out of business last year. This represented 10% of the total number of software companies reporting such revenues. Its report to the client suggested that there was a 10% chance of the current preferred supplier (who had a turnover of $5m) ceasing business and this would have a significant short-term support implication. This compared to a business failure rate of 1% for software companies with an annual revenue exceeding $100m. The client felt that the probability of supplier failure was too high, so eventually bought a software solution from a much larger, well-known, software supplier. In this case, the likelihood of the risk led the client to changing its procurement decision. The risk itself does not go away, large companies also fail, but the probability of the risk occurring is reduced.

The avoidance (or prevention) of a risk is a legitimate risk response. In project 1, the client could avoid the risk ‘failure of the supplier’ by commissioning an in-house bespoke solution. Similarly, TKP itself avoids the risks associated with trading in different cultures, by restricting its projects to clients based in Zeeland.

There are three further responses to risks.

Risk mitigation (or risk contingency) actions are what the organisation will do to counter the risk, should the risk take place. Mitigation actions are designed to lessen the impact on the organisation of the risk occurring. In project 2, TKP recommends that the producers of the iProjector should establish an escrow agreement with the company which produces the chip which enhances the quality of the projected image. It was agreed that design details of this chip should be lodged with a third party who would make them available to the producers of the iProjector should the company which owned the enhanced image technology cease trading. This is a mitigation approach to the risk ‘failure of the supplier’. The supplier is relatively high risk (less than three years of trading, inexperienced management team), and the product (the iProjector) is completely dependent upon the supply of the image enhancing chip. The failure of the business supplying the chips would have significant impact on iProjector production. If the escrow agreement had to be enacted, then it would take the producers of the iProjector some time to establish alternative production. Consequently (and TKP have suggested this), it might be prudent to hold significant stocks of the chips to ensure continued production. In such circumstances, the need to mitigate risk is more important than implementing contemporary just-in-time supply practices. In some instances a mitigation action can be put in place immediately. In other instances risk mitigation actions are only enacted should the risk occur. The risk has been recognised and the organisation has a rehearsed or planned response. For example, in project 1, TKP has identified ‘poor quality of current data’ as a risk associated with the migration of data from the current systems to the proposed software package solution. It has established a strategy for data cleansing if that risk actually materialises. Importantly, the client knows in advance how to respond to a risk. It avoids making a hasty, ill-thought out response to an unforeseen event.

Risk transfer actions are concerned with transferring the risk and the assessment and consequences of that risk to another party. This can be done in a number of ways. TKP itself has liability insurance which potentially protects the company from the financial consequences of being sued by clients for giving poor advice. TKP has identified this as a risk, but is unlikely to be able to assess either the probability of that risk occurring or establishing meaningful mitigation measures to minimise the effect of that risk. Consequently, the responsibility for both of these is transferred to an insurance company. They establish the risk, through a series of questions, and compute a premium which reflects the risk and the compensation maximum which will have to be paid if that risk occurs. TKP pays the insurance premiums. TKP itself also transfers risks in project 2. It is unsure about how to establish patents and so it refers the client to another company. Transferring avoids the risk associated with ‘establishing the patent incorrectly’ and the financial consequences of this.

Finally, risk may be identified but just accepted as part of doing business. Risk acceptance is particularly appropriate when the probability of the risk is low or the impact of that risk is relatively insignificant. Risks may also be accepted when there are no realistic mitigation or transfer actions. In project 2, the producers of the iProjector are concerned that there is ‘a risk that a major telephone producer will launch a product with features and functionality similar to ours’. This is a risk, but there is little that can be done about it. Risks of competition are often best accepted.

The discussion above is primarily concerned with deciding what action to take for each risk. Once these actions are agreed, then a plan may be required to put them into place. For example, establishing an escrow agreement will require certain activities to be done.

Risks must also be monitored. For example, in project 2, the risk of supplier failure can be monitored through a company checking agency. Many of these companies offer a continuous monitoring service which evaluates financial results, share prices and other significant business movements. Reports are produced, highlighting factors which may be of particular concern. Risks will also disappear once certain stages of the project have been completed and, similarly, new ones will appear, often due to changes in the business environment. Many organisations use a risk register or risk log to document and monitor risks and such logs often specify a risk owner, a person responsible for adequate management of the risk.

(b) Every project is constrained in some way by its scope, time and cost. These limitations are often called the triple constraint. The scope concerns what has to be delivered by the project, time is when the project should deliver by, and cost is concerned with how much can be spent on achieving the deliverable (the budget). Quality is also an important feature of projects. Some authors include quality in their triple constraint (instead of scope), others add it as a further constraint (quadruple constraint), whilst others believe that quality considerations are inherent in setting the scope, time and cost goals of a project. How a particular project is managed depends greatly on the pressures in the triple constraint.

In project 1, the reluctance of the company to re-visit the business case means that the budget (or cost) of the solution is fixed. The implementation date might be desirable, but it does not seem to be business critical. It is an internal system and so any delays in implementation will not affect customers. It will also be a relatively seamless transition for most employees in the company. They already record the time record details which the new system will collect and so all they will see is a changed user interface. Only the direct users of the output (account managers and the project office) will be affected by any delay. The scope of the software package is also pre-defined. If it fails to meet requirements, then the users will have to adjust their expectations or business methods. There is no money to finance customisation or add-on systems, so in this sense the scope of the solution is also fixed. The quality of the software, in terms of its reliability and robustness, should also be good, as it is a popular software solution used in many large companies.

In project 2, the launch date is fixed. It has been heavily publicised, the venue is booked and over 400 attendees are expected, including newspaper journalists. Thus the time of the project is fixed. However, although orders will be taken at the launch, the product is not expected to ship until a month after launch. Thus the scope of the product shown at the launch date might be restricted and inherent quality problems might not yet be solved. Any defects can be explained away (this is a pre-production model) or, more effectively, they may be avoided by ensuring that the product is demonstrated to attendees, not used by them. The project manager must ensure that key functionality of the product is available on launch date (such as producing an image of a certain quality), but other functionality, not central to the presentation (for example, promised support for all image file formats) could be delayed until after the presentation. The company should make extra funds available to ensure that the launch date is successful.


(ii) how effective delegation might be achieved; (6 marks)

正确答案:
(ii) Effective delegation can be achieved by assigning agreed tasks to the subordinate, ensuring that resources are allocated and by specifying expected performance levels and ensuring that they are understood. In addition, it is necessary to ensure that the subordinate has the ability and experience to undertake the tasks by maintaining frequent contact and ensuring that the subordinate has authority to do the job. Sufficient authority must be delegated to fulfil the task. This authority in turn may be specific or general; the scenario suggests that the authority of the managers and supervisors is specific. The subordinate should not refer decisions upwards, and the superior should not expect this. In addition there should be no doubts over boundaries; they must be clearly defined as to who holds what authority and who accounts to whom. Therefore there must be clarity as to departmental functions and individual authority, which is at the root of the problem at Flavours Fine Foods.

(b) While the refrigeration units were undergoing modernisation Lamont outsourced all its cold storage requirements

to Hogg Warehousing Services. At 31 March 2007 it was not possible to physically inspect Lamont’s inventory

held by Hogg due to health and safety requirements preventing unauthorised access to cold storage areas.

Lamont’s management has provided written representation that inventory held at 31 March 2007 was

$10·1 million (2006 – $6·7 million). This amount has been agreed to a costing of Hogg’s monthly return of

quantities held at 31 March 2007. (7 marks)

Required:

For each of the above issues:

(i) comment on the matters that you should consider; and

(ii) state the audit evidence that you should expect to find,

in undertaking your review of the audit working papers and financial statements of Lamont Co for the year ended

31 March 2007.

NOTE: The mark allocation is shown against each of the three issues.

正确答案:
(b) Outsourced cold storage
(i) Matters
■ Inventory at 31 March 2007 represents 21% of total assets (10·1/48·0) and is therefore a very material item in the
balance sheet.
■ The value of inventory has increased by 50% though revenue has increased by only 7·5%. Inventory may be
overvalued if no allowance has been made for slow-moving/perished items in accordance with IAS 2 Inventories.
■ Inventory turnover has fallen to 6·6 times per annum (2006 – 9·3 times). This may indicate a build up of
unsaleable items.
Tutorial note: In the absence of cost of sales information, this is calculated on revenue. It may also be expressed
as the number of days sales in inventory, having increased from 39 to 55 days.
■ Inability to inspect inventory may amount to a limitation in scope if the auditor cannot obtain sufficient audit
evidence regarding quantity and its condition. This would result in an ‘except for’ opinion.
■ Although Hogg’s monthly return provides third party documentary evidence concerning the quantity of inventory it
does not provide sufficient evidence with regard to its valuation. Inventory will need to be written down if, for
example, it was contaminated by the leakage (before being moved to Hogg’s cold storage) or defrosted during
transfer.
■ Lamont’s written representation does not provide sufficient evidence regarding the valuation of inventory as
presumably Lamont’s management did not have access to physically inspect it either. If this is the case this may
call into question the value of any other representations made by management.
■ Whether, since the balance sheet date, inventory has been moved back from Hogg’s cold storage to Lamont’s
refrigeration units. If so, a physical inspection and roll-back of the most significant fish lines should have been
undertaken.
Tutorial note: Credit will be awarded for other relevant accounting issues. For example a candidate may question
whether, for example, cold storage costs have been capitalised into the cost of inventory. Or whether inventory moves
on a FIFO basis in deep storage (rather than LIFO).
(ii) Audit evidence
■ A copy of the health and safety regulation preventing the auditor from gaining access to Hogg’s cold storage to
inspect Lamont’s inventory.
■ Analysis of Hogg’s monthly returns and agreement of significant movements to purchase/sales invoices.
■ Analytical procedures such as month-on-month comparison of gross profit percentage and inventory turnover to
identify any trend that may account for the increase in inventory valuation (e.g. if Lamont has purchased
replacement inventory but spoiled items have not been written off).
■ Physical inspection of any inventory in Lamont’s refrigeration units after the balance sheet date to confirm its
condition.
■ An aged-inventory analysis and recalculation of any allowance for slow-moving items.
■ A review of after-date sales invoices for large quantities of fish to confirm that fair value (less costs to sell) exceed
carrying amount.
■ A review of after-date credit notes for any returns of contaminated/perished or otherwise substandard fish.

声明:本文内容由互联网用户自发贡献自行上传,本网站不拥有所有权,未作人工编辑处理,也不承担相关法律责任。如果您发现有涉嫌版权的内容,欢迎发送邮件至:contact@51tk.com 进行举报,并提供相关证据,工作人员会在5个工作日内联系你,一经查实,本站将立刻删除涉嫌侵权内容。