Mod 41 and 42 Wrong Answers Flashcards

1
Q

Identify the software least likely to be included in office suite

A

Operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify software that performs a variety of technical operations

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does MIPS stand for?

A

Millions of instructions per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MIPS is a unit for measuring…

A

The execution speed of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify the type of general IT system that is designed to improve productivity of supporting daily work of employees?

A

Office automation systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What phase is a needs assessment most likely to be performed?

A

Analysis phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify the implementation model that has the advantage of a full operational test of the system before it is implemented?

A

Parallel implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the most frequently used mainframe computer application?

A

Data bases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unix is…

A

An operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify the most frequent current format for computer processing of data.

A

Digital approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital approach is a…

A

Binary numerical approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify the computer technology that is being widely adopted by organizations to lower computer hardware costs and reduce energy costs by allowing multiple operating systems to coexist

A

Virtualization software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Assembly language is a…

A

Second generation programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name 2 third generation programming languages?

A

1 COBOL

2 C++

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What language interface would a database administrator use to establish structure of database tables?

A

DDL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify the function used in a database query to combine several tables?

A

Joining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Identify a reason that user acceptance testing is more important in an object oriented development process than a traditional environment?

A

Inheritance of properties in hierarchies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Identify the best way to protect a client server/system from unauthorized access? Through a combination of…2

A

1 application and

2 general access control techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What technology converts a paper document into a computer file?

A

Optical character recognition software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The posting of a transaction, as it occurs, to several files, without intermediate printouts is…

A

Not characteristic of a batch processed computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identify the most direct output of edit check included in an online sales order processing system, this would create a…

A

File of all rejected sales transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identify a direct output of sorting, editing and updating program

A

Report showing exceptions and control totals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is grandfather son updating back up concept relatively difficult to implement for disk files?

A

Updating destroys old records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Procedure or problem oriented language is converted to a machine language through…

A

A compiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Computer that is designed to provide software and other application to other computers is referred to as…

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which is least likely to be considered a component of a computer network?

A

Application program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Identify the type of network used to link widely separated portions of an organization though a wide geographical area?

A

Wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Identify the risk being controlled when a company using EDI makes it a practice to track functional acknowledgements from trading partners

A

Transmission of EDI transactions to trading partners may sometimes fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Identify the least likely part of a company’s policy on electronic mail…

A

Erasing all employee’s electronic mail upon employment termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Identify the most likely risk relating to end user computing system as compared to mainframe computing system?

A

Applications that are difficult to integrate with other information
Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Identify the risk that is not greater in an EFT (electronic funds. Transfer) environment as compared to a manual system using paper transactions

A

Higher cost per transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Identify a type of software package that uses a large set of organized data that presents computer as an expert on a particular topic?

A

Expert system

33
Q

Identify the reply that is not a method to minimize the risk of unlicensed microcomputer software

A

Regular monitoring of network access and startup scripts

34
Q

Whose responsibility is it to backup software and data files in a distributed cooperative system?

A

User management

35
Q

End user computing is an example of

A

Decentralized processing

36
Q

End user computing is most likely to use…

A

Personal computers

37
Q

Organizations must use firewalls if they wish to…

A

Maintain security over internal data

38
Q

Client server systems do not have complexities pertaining to the use of…

A

Relational databases

39
Q

Identify what an auditor would ordinarily consider the greatest risk regarding the entity’s use of electronic data interchange (EDI)

A

Improper distribution of EDI transactions

40
Q

Which of the following is considered a component of a local area network?

A

Transmission media

41
Q

What is a disadvantage of keeping microcomputer data files rather than manually prepared files?

A

Easier for Unauthorized access to files

42
Q

Identify a benefit of transmitting transactions in an electronic data interchange (EDI) environment? 2

A

1 compressed business cycle with

2 lower year end receivables balances

43
Q

Business processes is not a…

A

Not a COBIT 5 principle

44
Q

Identify the type of back up site a company would most likely consider when there is concern about a power outage and desires for a fully configured ready to operate system?

A

Hot site

45
Q

Define hot site

A

Site already configured to meet user’s requirements

46
Q

Most commercial software is…

It is not…

A

Is copyrighted

Is not copy protected

47
Q

A hot site is most frequently associated with…

A

Disaster recovery

48
Q

A major concern by the auditor when a client processes sales transactions on the Internet…

A

Computer disruptions may result in incorrect recording of sales

49
Q

In EDI systems preventative controls are generally more important than…

A

Detective controls

50
Q

Which of the following are essential elements of the audit trail in an electronic data interchange system?

A

Network and sender recipient acknowledgements

51
Q

Identify the security control that would best prevent unauthorized access to sensitive data through an unattended data terminal?

A

Automatic log off of inactive users

52
Q

Identify the activity most likely to be performed in the information systems department

A

Conversion of information to machine readable form

53
Q

The use of header label in conjunction with magnetic tape is most likely to prevent Errors by the…

A

Computer operator

54
Q

Algebraic ally determined number produced by the other digits of the employee number is an example of…

A

Check digit

55
Q

Accounts receivable master file will be accessed during…

A

The revenue cycle

56
Q

Parallel simulation involves processing actual client data through…

A

An auditor’s program

57
Q

The existence on the flowchart of a credit memo and sales invoice would indicate that this portion of the flowchart deals with cash receipts therefore the flow chart would include…

A

Remittance advices

58
Q

A decrease in the price of a complementary good will…

A

Increase demand for joint commodity

59
Q

Demand for a product tends to be price in elastic if…

A

People spend a large share of their income on the product

60
Q

A rise in the price of a complementary commodity has what affect on the demand curve?

A

Causes the demand curve to shift left

61
Q

Total quantity demanded Price per unit
100. $50
150. $45
Using the arc method what is the price elasticity of demand when the price decreases from $50 to $45?

A

(150-100)/[(150 + 100)/2]
_______________________. = xxx
($50 - $45)/[($50 + $45)/2]

62
Q

Changes in consumer income will…

A

Not affect the supply of the good

63
Q

During the recessionary phase of a business cycle…

A

Potential national income will exceed actual national income

64
Q

An increase in reserve requirement will leave financial institutions with…

A

Less money to lend

65
Q

An increase in reserve requirement will leave financial institutions with less money to lend and therefore…

A

Decrease the money supply

66
Q

Define reserve ratio

A

Percentage of total checking deposits that financial institution must
Hold on reserve in the central bank

67
Q

Federal budget deficit

A

Amount by which the government’s expenditures exceed revenues
In a given year

68
Q

Price of a basket of commodities at the point of first commercial sale. What is this a definition of?

A

Producer price index

69
Q

Requiring a floating exchange rate is…

A

Not a foreign exchange control

70
Q

What is an appropriate response by an importing country for payment of export subsidies by an exporting country?

A

Countervailing duties

71
Q

A currency market in which the country’s central bank keeps the rate from deviating too far from a target band or value?

A

Pegged exchange rate

72
Q

Which of the following is not a means by which a firm might hedge the political risk of an investment in another country?

A

Buy futures contracts for future delivery of the country’s currency

73
Q

Patents are an example of…

A

Entry barriers

74
Q

Monopolistic competition is a market that has…

A

Numerous sellers of a product

75
Q

The area of customer relations is…

A

Not a primary focus of supply chain management

76
Q

Target market analysis involves…

A

Understanding and segmenting the firm’s customer markets

77
Q

General economic conditions are…

A

Not part of Porter’s industry analysis

78
Q

Which of the following is a defining characteristic of supply chain management?

A

Sharing info with suppliers and customers

79
Q

Which of the following measures of unemployment would be of least importance to management when trying to predict the future of the economy?

A

Frictional unemployment