Unit 4 Test Flashcards

1
Q

What is a characteristic of the flat-file approach to data management?

Management owns the data files.
Users own the data files.
The external auditors own the data files.
The information technology (IT) department owns the data files.
A

Users own the data files.

The correct answer is “Users own the data files.” Exclusive data ownership is a characteristic of the flat-file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which three types of data management problems are a result of data redundancy?

Data storage, data updating, and task-data dependency
Task-data dependency, data updating, and currency of information
Data storage, data updating, and currency of information
Data storage, task-data dependency, and currency of information
A

Data storage, data updating, and currency of information

The correct answer is “Data storage, data updating, and currency of information.” Data storage, data updating, and currency of information problems are caused by data redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization uses a flat-file data management system.
Which problem is caused when customers change their address?

Data storage
Information integration
Data updating
Task-data dependency
A

Data updating

The correct answer is “Data updating.” When customers change their address, the address needs to be updated in every file where it appears. The address may be stored across different departments, and it would need to be updated with each one of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which flat-file system problem is solved by using a database approach?

Anomalies
Internal views
Task-data independence
Usage reporting
A

Task-data independence

The correct answer is “Task-data independence.” Task-data independence is a problem of flat files that a database approach can solve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are order entry, manufacturing, procurement, accounts payable, payroll, and human resources examples of?

Key processes of inventory
Key processes of management
Key processes of an organization
Key processes of an accounting department
A

Key processes of an organization

The correct answer is “Key processes of an organization.” Key processes of the organization include order entry, manufacturing, procurement, accounts payable, payroll, and human resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is there is a high degree of data redundancy in a closed database environment?

  • Each department enters its data, which are then accessible and usable by all other departments and functional areas.
  • One department enters the data for each department and functional area.
  • Merged databases exist because the data have to be entered in each department and functional area.
  • Distinct, separate, and independent databases exist because the data remain in the application.
A

Distinct, separate, and independent databases exist because the data remain in the application.

The correct answer is “Distinct, separate, and independent databases exist because the data remain in the application.” Each department and functional area has its own database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which list shows the details of vendor shipments and expected receipts of products and components needed for an order?

Inventory requisitions
Materials requirements list
Staff requests
Exception report
A

Materials requirements list

The correct answer is “Materials requirements list.” The materials requirements list shows the details of vendor shipments and expected receipts of products and components needed for the order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which system represents multiple module software packages that evolved primarily from traditional manufacturing resource planning (MRP II) systems?

Flat file
Data warehousing
Online analytical processing (OLAP)
Enterprise resource planning (ERP) system
A

Enterprise resource planning (ERP) system

The correct answer is “Enterprise resource planning (ERP) system.” ERPs evolved from in-house systems that were not able to successfully integrate with systems outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used in a traditional system to provide proof that a transaction has occurred?

Digital signatures
Digital certificates
Signed invoices
Penetration tests
A

Signed invoices

The correct answer is “Signed invoices.” Physical documents, sales agreements, and signed invoices are used to provide proof that a transaction has occurred in traditional systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What was designed to overcome a private key encryption security weakness?

Symmetric key
Public key
Cryptographic key
Physical key
A

Public key

The correct answer is “Public key.” Public key encryption uses two different keys: one for encoding messages and the other for decoding. Receivers never need to share private keys with senders, which reduces the likelihood the keys will fall into the hands of an intruder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which third-party trust organization issues three classes of certificates?

Verisign, Inc.
Better Business Bureau (BBB)
American Institute of Certified Public Accountants (AICPA)
International Computer Security Association (ICSA)
A

Verisign, Inc.

The correct answer is “Verisign, Inc.” Verisign, Inc. issues three classes of certificates to individuals, businesses, and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What exemplifies the use of continuous auditing?

Identifying patterns on dissimilar events
Searching electronic transactions for anomalies
Automatically alerting executive management
Using accountant-defined heuristics
A

Searching electronic transactions for anomalies

The correct answer is “Searching electronic transactions for anomalies.” An intelligent control agent searches electronic transactions for anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What describes encryption?

Masking information with layers of security
Conversion of data into a secret code
Scrambling messages so they are illegible
Redacting cleartext so it is not readable
A

Conversion of data into a secret code

The correct answer is “Conversion of data into a secret code.” Encryption is the conversion of data into a secret code for storage in databases and transmission over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which operation represents the steps for the encryption of data?

  • Convert cleartext message, encrypt into ciphertext, decode back to cleartext message
  • Code cleartext to ciphertext, send to pick-up location, recipient decodes ciphertext to cleartext
  • Apply ciphertext on top of cleartext, transmit to recipient, recipient removes ciphertext to read cleartext
  • Code ciphertext to cleartext, send to pick-up location, recipient decodes cleartext to ciphertext
A

Convert cleartext message, encrypt into ciphertext, decode back to cleartext message

The correct answer is “Convert cleartext message, encrypt into ciphertext, decode back to cleartext message”. The sender uses an encryption algorithm to convert the original message (called cleartext) into a coded equivalent (called ciphertext). At the receiving end, the ciphertext is decoded (decrypted) back into cleartext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of a database management system (DBMS)?

Allows users to access any data available
Empowers accountants to control data access
Ensures the data match the user needs
Provides controlled access to a database
A

Provides controlled access to a database

The correct answer is “ Provides controlled access to a database.” The DBMS provides controlled access to the database. It is programmed to know which data elements each user is authorized to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What describes an efficient information system?

Stores custom data for private needs
Manages various data collection procedures
Duplicates data multiple times
Makes data available for multiple requests
A

Makes data available for multiple requests

The correct answer is “ Makes data available for multiple requests.” An efficient system makes the same data available for requests from different users.

17
Q

An organization uses a flat-file data management system. The shipping department receives notice that shipping costs are increasing by 10% effective immediately. Customers placing new orders are still billed with the old shipping costs.
Which problem is exemplified in this scenario?

Data storage
Task-data dependency
Data standardization
Currency of information
A

Currency of information

The correct answer is “ Currency of information.” The shipping department must inform the billing department of any changes in shipping costs, or the bills will be issued based on outdated information.

18
Q

Which flat-file system problem is solved by using a database approach?

Usage reporting
Task-data independence
Anomalies
Internal views
A

Task-data independence

The correct answer is “ Task-data independence.” Task-data independence is a problem of flat files that a database approach can solve.

19
Q

What is a potential result of redundant tasks in a closed database environment?

Quick order turnaround
Delays in orders
Effortless order tracking
Data entry proficiency
A

Delays in orders

The correct answer is “ Delays in orders.” Delays could be caused by redundant data entry.

20
Q

While in-house, custom-designed systems dealt efficiently with their designated tasks, they did not provide strategic decision support at the enterprise level.
What is the reason that they lacked support?

  • They lacked the integration needed for information transfer across organizational boundaries.
  • They lacked the customization needed for information transfer across organizational boundaries
  • They lacked the ability to exist on multiple platforms removing their ability to efficiently perform.
  • They lacked the ability to address a specific operational problem.
A

They lacked the integration needed for information transfer across organizational boundaries.

The correct answer is “They lacked the integration needed for information transfer across organizational boundaries.” Customization made systems very organization specific. This specificity made combining with systems outside of the organization extremely difficult.

21
Q

An organization could have more than one system in place; there could be an in-house system along with a newer commercial system.
How is the communication among many different systems made possible?

  • By duplicating tasks throughout the different systems
  • By isolating fragmented operations and removing them
  • By providing special instructions to employees so they can access both systems
  • By applying special software patches where needed
A

By applying special software patches where needed

The correct answer is “ By applying special software patches where needed.” Special software patches need to be applied.

22
Q

An enterprise resource planning (ERP) system is more than simply an elaborate transaction processing system.
What else does an ERP system provide?

Real-time decision-making information
List of past projects
List of previous decisions
Extended time to make decisions
A

Real-time decision-making information

The correct answer is “ Real-time decision-making information.” It is a decision support tool that supplies management with real-time information and permits timely decisions that are needed to improve performance and achieve competitive advantage.

23
Q

What can be used to assess the adequacy of a client’s access controls?

Computing digests
Penetration testing
Social engineering
Continuous auditing

A

Penetration testing

The correct answer is “ Penetration testing.” Many firms are now performing penetration tests designed to assess access control by imitating known techniques that hackers use.

24
Q

Which attributes are used to describe data that are reliable for use according to the Safe Harbor Agreement?

Precise, current, and complete
Encrypted, accurate, and complete
Accurate, complete, and current
Formatted, accurate, and current
A

Accurate, complete, and current

The correct answer is “ Accurate, complete, and current.” Organizations need to ensure that the data they maintain are accurate, complete, and current, and thus reliable for use.

25
Q

Which condition of the Safe Harbor Agreement addresses the privacy concern related to the purposes for which an organization collects and uses information?

Notice
Enforcement
Data Integrity
Security
A

Notice

The correct answer is “ Notice.” An organization must provide individuals with clear notice of “the purposes for which it collects and uses information about them and the types of third parties to which it discloses the information.”

26
Q

Which statement describes the condition of onward transfer?

  • Sharing information with organizations that belong to or follow the Safe Harbor Agreement principles unless instructed otherwise
  • Accepting information contingent on the Safe Harbor Agreement conditions and the individual’s approval
  • Refusing information provided by organizations that do not follow the Safe Harbor Agreement principles unless it is encrypted
  • Reporting violations of the Safe Harbor Agreement information exchange when not authorized by the individual
A

Sharing information with organizations that belong to or follow the Safe Harbor Agreement principles unless instructed otherwise

The correct answer is “ Sharing information with organizations that belong to or follow the Safe Harbor Agreement principles unless instructed otherwise.” Unless they have the individual’s permission to do otherwise, organizations may share information only with those third parties that belong to the Safe Harbor Agreement or that follow its principles.

27
Q

Which standard does the Safe Harbor Agreement establish for information?

Size
Format
Transmittal
Structure
A

Transmittal

The correct answer is “Transmittal.” The two-way agreement between the United States and the European Union establishes standards for information transmittal.

28
Q

What exemplifies the use of continuous auditing?

Automatically alerting executive management
Using accountant-defined heuristics
Searching electronic transactions for anomalies
Identifying patterns on dissimilar events
A

Searching electronic transactions for anomalies

The correct answer is “ Searching electronic transactions for anomalies.” An intelligent control agent searches electronic transactions for anomalies.