BEC Multiple Choice
What type of computer system is characterized by data that is assembled from more than one location and records that are updated immediately? a. Microcomputer system b. Minicomputer system c. Batch processing system d. Online real-time system
D
Where disk files are used, the grandfather-father-son updating backup concept is relatively difficult to implement because the a. Location of information points on disks is an extremely time-consuming task b. Magnetic fields and other environmental factors cause off-site storage to be impractical c. Information must be dumped in the form of hard copy if it is to be reviewed before used in updating d. Process of updating old records is destructive
D
Samco Inc. is in the process of designing a new customer relations system. In which phase of the development life cycle would a needs assessment most likely be performed? a. Analysis b. Design c. Development d. Testing
A
Securing client/server systems is a complex task because of all of the following factors except a. The use of relational databases b. The number of access points c. Concurrent operation of multiple user sessions d. Widespread data access and update capabilities
A
Analysis of data in a database using tools which look for trends or anomalies without knowledge in advance of the meaning of the data is referred to as a. Artificial intelligence b. Data mining c. Virtual reality d. Transitory analysis
B
GUI is the abbreviation for a. Grandfather, Uncle, Individual b. Graphical User Interface c. Graphics Utilization Institutes d. Grand Union Internet
B
In a spreadsheet, which of the following is correct concerning rows and columns? Rows/Columns a. Numbered/Numbered b. Numbered/Lettered c. Lettered/Numbered d. Lettered/Lettered
B
LAN is the abbreviation for a. Large Area Network b. Local Area Network c. Longitudinal Analogue Network d. Low Analytical Nets
B
A company's management is concerned about computer data eavesdropping and wants to maintain the confidentiality of its information as it is transmitted. The company should utilize a. Data encryption b. Dial-back systems c. Message acknowledgement procedures d. Password codes
A
A general type of IT system that is designed to improve the productivity of daily office work is referred to as a(n) a. Office automation system b. Transaction processing system c. Decision support system d. Executive information system
A
A set of step-by-step procedures used to accomplish a task is a(n) a. Algorithm b. Compilation master c. Linux d. Transistor
A
Client/server architecture may potentially involve a variety of hardware, systems software, and application software from any vendors. The best way to protect a client/server system from unauthorized access is through a. A combination of application and general access control techniques b. Use of a commercially available authentication system c. Encryption of all network traffic d. Thorough testing and evaluation of remote procedure calls
A
Computer memory which is used to store programs that must be accessed immediately by the central processing unit is a. Primary storage b. Secondary storage c. Tertiary storage d. Tape storage
A
First Federal S&L has an online real-time system, with terminals installed in all of its branches. This system will not accept a customer's cash withdrawal instructions in excess of $1,000 without the use of a "terminal audit key." After a supervisor authorizes the transaction, the bank teller then processes the transaction with the audit key. This control can be strengthened by a. Online recording of the transaction on an audit override sheet b. Increasing the dollar amount to $1,500 c. Requiring manual, rather than online, recording of all such transactions d. Using parallel simulation
A
In a spreadsheet, each specific cell may be identified by a specific a. Address b. Column c. Row d. Diagonal
A
In building an electronic data interchange (EDI) system, what process is used to determine which elements in the entity's computer system correspond to the standard data elements? a. Mapping b. Translation c. Encryption d. Decoding
A
In traditional information systems, computer operators are generally responsible for backing up software and data file on a regular basis. In distributed or cooperative systems, ensuring that adequate backups are taken is the responsibility of a. User management b. Systems programmers c. Data entry clerks d. Tape librarians
A
Several language interfaces exist in a database management system. These typically include a data definition language (DDL), a data control language (DCL), a data manipulation language (DML), and a database query language (DQL). What language interface would a database administrator use to establish the structure of database tables? a. DDL b. DCL c. DML d. DQL
A
Mill Co. uses a batch processing method to process its sales transactions. Data on Mill's sales transaction tape are electronically sorted by customer number and are subjected to programmed edit checks in preparing its invoices, sales journals, and updated customer account balances. One of the direct outputs of the creation of this tape most likely would be a a. Report showing exceptions and control totals b. Printout of the updated inventory records c. Report showing overdue accounts receivable d. Printout of the sales price master file
A
An auditor is least likely to find that a client's data is input through a. Magnetic tape reader b. Dynamic linking character reader c. Point-of-sale recorders d. Touch sensitive screens
B
The internal auditor is reviewing a new policy on electronic mail. Appropriate elements of such a policy would include all of the following except a. Erasing all employee's electronic mail immediately upon employment termination b. Encrypting electronic mail messages when transmitted over phone lines c. Limiting the number of electronic mail packages adopted by the organization d. Directing that personnel do not send highly sensitive or confidential messages using electronic mail
A
Unix is a(n) a. Operating system b. Singular disk drive c. Central processing unit d. Logic unit
A
Users making database queries often need to combine several tables to get the information they want. One approach to combining tables is known as a. Joining b. Merging c. Projecting d. Pointing
A
What is the hierarchy of data organization, from smallest to largest unit, for a relational database? a. Bit, byte, field, record, table, database b. Byte, bit, record, field, table, database c. Byte, bit, table, field, record, database d. Database, table, field, record, byte, bit
A
What technology is needed in order to convert a paper document into a computer file? a. Optical character recognition b. Electronic data interchange c. Bar-coding scanning d. Joining and merging
A
Which computer application is most frequently used on mainframe computers? a. Databases b. Graphics c. Spreadsheets d. Word processing
A
Which is least likely to be considered a component of a computer network? a. Applications programs b. Computers c. Software d. Routers
A
Which of the following characteristics distinguishes computer processing from manual processing? a. Computer processing virtually eliminates the occurrence of computational error normally associated with manual processing b. Errors or fraud in computer processing will be detected soon after their occurrences c. The potential for systematic error is ordinarily greater in manual processing than in computerized processing d. Most computer systems are designed so that transaction trails useful for audit purposes do not exist
A
Which of the following characteristics distinguishes electronic data interchange (EDI) from other forms of electronic commerce? a. EDI transactions are formatted using the standards that are uniform worldwide b. EDI transactions need not comply with generally accepted accounting principles c. EDI transactions ordinarily are processed without the Internet d. EDI transactions are usually recorded without security and privacy concerns.
A
Which of the following is a password security problem? a. Users are assigned passwords when accounts are created, but do not change them b. Users have accounts on several systems with different passwords c. Users copy their passwords on note paper, which is kept in their wallets d. Users select passwords that are not listed in any online dictionary
A
Which of the following is an example of application software that a large client is most likely to use? a. Enterprise resource planning b. Operating system c. Central processing unit d. Value-added network
A
Which of the following is an example of how specific controls in a database environment may differ from controls in a nondatabase environment? a. Controls should exist to ensure that users have access to and can update only the data elements that they have been authorized to access b. Controls over data sharing by diverse users within an entity should be the same for every user c. The employee who managed the computer hardware should also develop and debug the computer programs d. Controls can provide assurance that all processed transactions are authorized, but cannot verify that all authorized transactions are processed
A
Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment? a. A compressed business cycle with lower year-end receivables balances b. A reduced need to test computer controls related to sales and collections transactions c. An increased opportunity to apply statistical sampling techniques to account balances d. No need to rely on third-part service providers to ensure security
A
Which of the following passwords would be most difficult to crack? a. OrCa!F1Si b. language c. 12 HOUSE 24 d. pass56word
A
Which of the following statements is correct regarding the Internet as a commercially viable network? a. Organizations must use firewalls if they wish to maintain security over internal data b. Companies must apply to the Internet to gain permission to create a homepage to engage in electronic commerce c. Companies that wish to engage in electronic commerce on the Internet must meet required security standards established by the collation of Internet providers d. All of the above
A
Which of the following system implementation models has the advantage of achieving a full operational test of the new system before it is implemented? a. Parallel implementation b. Plunge implementation c. Pilot implementation d. Phased implementation
A
31. The 2nd generation programming language that is generally specific to a computer architecture (i.e. it is not portable) is a. Binary b. Assembly language c. COBOL d. C++
B
A company using EDI made it a practice to track the functional acknowledgments from trading partners and to issue warning messages if acknowledgements did not occur within a reasonable length of time. What risk was the company attempting to address by this practice? a. Transactions that have not originated from a legitimate trading partner may be inserted into the EDI network b. Transmission of EDI transactions to trading partners may sometimes fail c. There may be disagreement between the parties as to whether the EDI transactions form a legal contract d. EDI data may not be accurately and completely processed by the EDI software
B
A current day instruction to a computer such as "Extract all Customers where 'Name' is Smith" would most likely relate to a a. First generation programming language b. Fourth generation programming language c. Seventh generation programming language d. Ninth generation programming language
B
A retail entity uses electronic data interchange (EDI) in executing and recording most of its purchase transactions. The entity's auditor recognized that the documentation of the transactions would be retained for only a short period of time. To compensate for this limitation, the auditor most likely would a. Increase the sample of EDI transactions to be selected for cutoff tests b. Perform tests several times during the year, rather than only at year-end c. Plan to make a 100% count of the entity's inventory at or near the year-end d. Decrease the accessed level of control risk for the existence or occurrence assertion
B
A software package that is used with a large set or organized data that presents the computer as an expert on a particular topic is referred to as a(n) a. Data mining b. Expert system c. Artificial intelligence d. Virtual reality
B
Able Co. uses an online sales order processing system to process its sales transactions. Able's sales data are electronically sorted and subjected to edit checks. A direct output of the edit checks most likely would be a a. Report of all missing sales invoices b. File of all rejected sales transactions c. Printout of all user code numbers and passwords d. List of all voided shipping documents
B
An "office suite" of software is least likely to include a(n) a. Database b. Operating system c. Spreadsheet d. Word processing
B
Laptop computers provide automation outside of the normal office location. Which of the following would provide the least security for sensitive data stored on a laptop computer? a. Encryption of data files on the laptop computer b. Setting up a password for the screensaver program on the laptop computer c. Using a laptop computer with a removable hard drive d. Using a locking device that can secure the laptop computer to an immovable object
B
MIPS stands for a. Memory in protocol standards b. Millions of instructions per second c. Mitigating individualistic personnel standards d. Multiple input physical savings
B
Most current computers process data using which of the following formats a. Analog b. Digital c. Memory enhanced d. Organic
B
One major category of computer viruses is programs that attach themselves to other programs, thus infecting the other programs. While many of these viruses are relatively harmless, some have the potential to cause significant damage. Which of the following is an indication that a computer virus of this category is present? a. Frequent power surges that harm computer equipment b. Unexplainable losses of or changes to data c. Inadequate backup, recover, and contingency plans d. Numerous copyright violations due to unauthorized use of purchased software
B
The most common output device is a(n) a. Mouse b. Printer c. Expert system d. Keyboard
B
The most common type of primary storage in a computer is referred to as a. CMAN b. RAM c. ROM d. Flash memory
B
The wireless input device that is used for inventory control and similar to bar-codes technology but does not require line-of sight access is a. MICR b. RFID c. Touch screen d. Point-of-sale recorders
B
Which of the following is a risk that is higher when an electronic funds transfer (EFT) system is used? a. Improper change control procedures b. Unauthorized access and activity c. Insufficient online edit checks d. Inadequate backups and disaster recovery procedures
B
Which of the following is likely to be a benefit of electronic data interchange (EDI)? a. Increased transmission speed of actual documents b. Improved business relationships with trading partners c. Decreased liability related to protection of proprietary business data d. Decreased requirements for backup and contingency planning
B
Which of the following is not considered an exposure involved with electronic data interchange (EDI) systems as compared to other systems? a. Increased reliance upon computer systems b. Delayed transaction processing time c. Possible loss of confidentiality of information d. Increased reliance upon third parties
B
Which of the following is not one of the five principles of COBIT 5? a. Meeting stakeholder needs b. Business processes c. Covering the enterprise end-to-end d. Applying a single integrated framework
B
Which of the following procedures would an entity most likely include in its computer disaster recovery plan? a. Develop an auxiliary power supply to provide uninterrupted electricity b. Store duplicate copies of critical files in a location away from the computer center c. Maintain a listing of entity passwords with the network manager d. Translate data for storage purposes with a cryptographic secret code
B
Which of the following statements is correct concerning internal control when a client is using an electronic data interchange system for its sales? a. Controls should be established over determining that all suppliers are included in the system b. Encryption controls may help to assure that messages are unreadable to unauthorized persons c. A value-added network (VAN) must be used to assure proper control d. Attention must be paid to both the electronic and "paper" versions of transactions
B
A computer that is designed to provide software and other applications to other computers is referred to as a a. Microcomputer b. Network computer c. Server d. Supercomputer
C
A manufacturer of complex electronic equipment such as oscilloscopes and microscopes has been shipping its products with think paper manuals but wants to reduce the cost of producing and shipping this document. Of the following, the best medium for the manufacturer to use to accomplish this is a. Write-once-read-many b. Digital audio tape c. Compact disc/read-only memory d. Computer-output-to-microform
C
A set of rules for exchanging data between two computers is a a. Communicator b. Operating system c. Protocol d. Transmission speed
C
All of the following are methods for distributing a relational database across multiple servers except: a. Snapshot (making a copy of the database for distribution) b. Replication (creating and maintaining replica copies at multiple locations) c. Normalization (separating the database into logical tables for easier user processing) d. Fragmentation (separating the database into parts and distributing whether they are needed)
C
End-user computing is most likely to occur on which of the following types of computers? a. Mainframe b. Minicomputers c. Personal computers d. Personal reference assistants
C
In a computerized system, procedure or problem-oriented language is converted to machine language through a(n) a. Interpreter b. Verifier c. Compiler d. Converter
C
Management is concerned that data uploaded from a microcomputer to the company's mainframe system in batch processing may be erroneous. Which of the following controls would best address this issue? a. The mainframe computer should be backed up on a regular basis b. Two persons should be present at the microcomputer when it is uploading data c. The mainframe computer should subject the data to the same edits and validation routines that online data entry would require d. The users should be required to review a random sample of processed data
C
Many of the Web 2.0 applications rely on an XML-based application that facilitates the sharing and syndication of web content, by subscription. Which of the applications below represents this XML application? a. Wiki b. Blog c. RSS/Atom Feeds d. Twitter
C
Methods to minimize the installation of unlicensed microcomputer software include all of the following except a. Employee awareness programs b. Regular audits for unlicensed software c. Regular monitoring of network access and start-up scripts d. An organizational policy that includes software licensing requirements
C
Misstatements in a batch computer system caused by incorrect programs or data may not be detected immediately because a. Errors in some transactions may cause rejection of other transactions in the batch b. The identification of errors in input data typically is not part of the program c. There are time delays in processing transactions in a batch system d. The processing of transactions in a batch system is not uniform
C
One major category of computer viruses is programs that attach themselves to other programs, thus infecting the other programs. While many of these viruses are relatively harmless, some have the potential to cause significant damage.Which of the following operating procedures increases an organization's exposure to computer viruses? a. Encryption of data files b. Frequent backup of files c. Downloading public-domain software from electronic bulletin boards d. Installing original copies of purchased software on hard disk drives
C
The Control Objectives for Information and Related Technology (COBIT) framework has been established by a. The American Institute of Certified Public Accountants b. The Information Technology Institute c. The Information Systems Audit and Control Association d. The Committee of Sponsoring Organizations
C
The Systems Development Life Cycle (SDLC) is the traditional methodology for developing information systems. In which phase of the SDLC would the activity of identifying the problem(s) that need to be solved most likely occur? a. Analysis b. Implementation c. Planning d. Development
C
The network most frequently used for private operations designed to link computers within widely separated portions of an organization is referred to as a(n) a. Bulletin board service b. Local area network c. Wide area network d. Zero base network
C
The part of the computer that does most of the data processing is referred to as the a. Analyzer b. Compiler c. CPU d. Printer
C
The use of message encryption software a. Guarantees the secrecy of data b. Requires manual distribution of keys c. Increases system overhead d. Reduces the need for periodic password changes
C
What type of secondary storage device requires no moving parts for read/write operations? a. Magnetic tape b. Compact discs c. Solid State drives d. RAID
C
When developing a new computer system that will handle customer orders and process customer payments, a high-level systems design phase would include determination of which of the following? a. How the new system will affect current inventory and general ledger systems b. How the file layouts will be structured for the customer order records c. Whether to purchase a turn-key system or modify an existing system d. Whether formal approval by top management is needed for the new system
C
Which computer application is most frequently used to analyze numbers and financial information? a. Computer graphics programs b. WAN applications c. Spreadsheets d. Word processing programs
C
Which of the following is a network node that is used to improve network traffic and to set up as a boundary that prevents traffic from one segment to cross over to another? a. Router b. Gateway c. Firewall d. Heuristic
C
Which of the following is considered a component of a local area network? a. Program flowchart b. Loop verification c. Transmission media d. Input routine
C
Which of the following represents an additional cost of transmitting business transactions by means of electronic data interchange (EDI) rather than in a traditional paper environment? a. Redundant data checks are needed to verify that individual EDI transactions are not recorded twice b. Internal audit work is needed because the potential for random data entry errors is increased c. Translation software is needed to convert transactions from the entity's internal format to a standard EDI format d. More supervisory personnel are needed because the amount of data entry is greater in an EDI system
C
Which of the following risks is most likely to be encountered in an end-user computing (EUC) environment as compared to a mainframe computer system? a. Inability to afford adequate uninterruptible power supply systems b. User input screens without a graphical user interface (GUI) c. Applications that are difficult to integrate with other information systems d. Lack of adequate utility programs
C
Which of the following risks is not greater in an electronic funds transfer (EFT) environment than in a manual system using paper transactions? a. Unauthorized access and activity b. Duplicate transaction processing c. Higher cost per transaction d. Inadequate backup and recovery capabilities
C
Which of the following would an auditor ordinarily consider the greatest risk regarding an entity's use of electronic data interchange (EDI)? a. Authorization of EDI transactions b. Duplication of EDI transactions c. Improper distribution of EDI transactions d. Elimination of paper documents
C
A company is concerned that a power outage or disaster could impair the computer hardware's ability to function as designed. The company desires off-site backup hardware facilities that are fully configured and ready to operate within several hours. The company most likely should consider a a. Cold site b. Cool site c. Warm site d. Hot site
D
A company's management has expressed concern over the varied system architectures that the organization uses. Potential security and control concerns would include all of the following except: a. Users may have different user ID codes and passwords to remember for the several systems that they use b. There are difficulties in developing uniform security standards for the various platforms c. Backup file storage administration is often decentralized d. Having data distributed across many computers throughout the organization increases the risk that a single disaster would destroy large portions of the organization's data
D
A web page is most frequently created using a. Java or C++ b. Visual Basic c. SQL d. HTML or XML
D
Another term for cloud-based storage is a. RAID b. Solid state storage c. Analog d. Storage-as-a-Service
D
End-user computing is an example of which of the following? a. Client/server processing b. A distributed system c. Data mining d. Decentralized processing
D
Software that performs a variety of general technical computer-controlling operations is a(n) a. Integrated "suite" b. Shareware c. Database d. Operating system
D
The online analytical processing term that represents a combination of systems that help aggregate, access, and analyze business data and assist in the business decision-making process is a. Artificial intelligence b. Data mart c. Decision support system d. Business intelligence
D
To reduce security exposure when transmitting proprietary data over communication lines, a company should use a. Asynchronous modems b. Authentic techniques c. Call-back procedures d. Cryptographic devices
D
Unauthorized alteration of online records can be prevented by employing a. Key verification b. Computer sequence checks c. Computer matching d. Database access controls
D
User acceptance testing is more important in an object-oriented development process than in a traditional environment because of the implications of the a. Absence of traditional design documents b. Lack of a tracking system for changes c. Potential for continuous monitoring d. Inheritance of properties in hierarchies
D
Which of the following characteristics distinguish electronic data interchange (EDI) from other forms of electronic commerce? a. The cost of sending EDI transactions using a value-added network (VAN) is less than the cost of using the Internet b. Software maintenance contracts are unnecessary because translation software for EDI transactions need not be updated c. EDI commerce is ordinarily conducted without establishing legally binding contracts between trading partners d. EDI transactions are formatted using strict standards that have been agreed to worldwide
D
Which of the following compiles a complete translation of a program in a high-level computer language before the program is run for the first time? a. Visual Basic b. Java c. Algorithm d. Compiler
D
Which of the following is an encryption feature that can be used to authenticate the originator of a document and ensure that the message is intact and has not been tampered with? a. Heuristic terminal b. Perimeter switch c. Default settings d. Digital signatures
D
Which of the following is least likely to be considered an advantage of a database? a. Easy to store large quantities of information b. Easy to retrieve information quickly c. Easy to organize and reorganize information d. Easy to distribute information to every possible user
D
Which of the following is not a characteristic of a batch processed computer system? a. The collection of like transactions which are sorted and processed sequentially against a master file b. Keypunching of transactions, followed by machine processing c. The production of numerous printouts d. The posting of a transaction, as it occurs, to several files, without intermediate printouts.
D
Which of the following is not a part of the central processing unit? a. Control unit b. Arithmetic unit c. Logic unit d. Printer unit
D
Which of the following procedures would an entity most likely include in its disaster recovery plan? a. Convert all data from EDI format to an internal company format b. Maintain a Trojan horse program to prevent illicit activity c. Develop an auxiliary power supply to provide uninterrupted electricity d. Store duplicate copies of files in a location away from the computer center
D
Which of the following statements most likely represents a disadvantage for an entity that keeps microcomputer-prepared data files rather than manually prepared files? a. Random error associated with processing similar transactions in different ways is usually greater b. It is usually more difficult to compare recorded accountability with physical count of assets c. Attention is focused on the accuracy of the programming process rather than errors in individual transactions d. It is usually easier for unauthorized persons to access and alter the files
D
Which term below describes the technology that allows multiple operating systems to run simultaneously on a single computer? a. Client b. Mainframe c. Linux d. Virtualization
D