Section 3: Quiz 25 - Control Identification and Design

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The business information system that provides answers to semi-structured issues and validates business decisions is which of the following? A. A DSS B. An executive support system C. A transaction processing system D. A vendor support system

A. A DSS Explanation: A DSS is a semi-structured interactive decision-making framework. A DSS collects data from a variety of sources and gives managers useful information. A DSS supports semi-structured or less structured decisions. A DSS is flexible and user-friendly when it comes to changing environments and with regard to the user's approach to decision making. Executive support systems are more focused on strategic problems.

Which of the following is a feature of DSS? A. DSS enables flexibility in the user's approach to decision-making. B. DSS only supports structured tasks related to decision-making. C. DSS is designed to solve highly structured problems. D. DSS uses non-traditional data access and restoration techniques.

A. It enables flexibility in the user's approach to decision-making Explanation: The characteristics of DSS are as follows: It supports decisions that are either semi-organized or less organized. It uses standard data access and retrieval techniques. It is flexible and user-friendly when it comes to changing environments and user decision-making.

Which of the following techniques helps to detect errors in a network transmission? A. Parity bits B. Checksums C. Validation control D. Redundancy checks

D. Redundancy checks Explanation: Parity checks, checksums, and cyclic redundancy are used to verify and validate complete and accurate data transmission. However, CRCs/redundancy checks involve applying complex mathematical calculations and are more accurate than parity bits and checksums. CRCs can check for a block of transmitted data. The sending computer generates the CRC and transmits it with the data. The receiving machine again generates a CRC and compares it to the transmitted CRC. If both of them are equal, then the block is assumed error-free.

The data integrity principle of atomicity ensures which of the following? A. That a database survives a hardware or software failure B. That a transaction is completed in its entirety C. That database consistency is maintained D. That each transaction is separated from other transactions

B : A transaction is completed in its entirety. Explanation: Data integrity principles of ACID (atomicity, completeness, isolation, and durability) are as follow: Atomicity: The principle of atomicity prescribes that a transaction is either processed completely or should not be processed at all. In the case of an error or interruption, partial processing, if any, should be rolled back. Consistency: The principle of consistency prescribes that all integrity conditions must be applied to each transaction of the database. Isolation: The principle of isolation prescribes that each transaction should be separated from other transactions. Durability: The principle of durability prescribes that the database should be resilient enough to survive any system failures.

The data integrity principle, which prescribes that a transaction is either processed completely or not processed at all, falls under which of the following principles? A. Consistency B. Atomicity C. Isolation D. Durability

B. Atomicity Explanation: The data integrity principles of ACID (Atomicity, Completeness, Isolation, and Durability) are as follows: Atomicity: The principle of atomicity prescribes that a transaction is either processed completely or should not be processed at all. In the case of an error or interruption, partial processing, if any, should be rolled back. Consistency: The principle of consistency prescribes that all integrity conditions must be applied to each transaction of the database. Isolation: The principle of isolation prescribes that each transaction should be separated from other transactions. Durability: The principle of durability prescribes that the database should be resilient enough to survive any system failures.

To detect transposition and transcription errors, which of the following controls is the most effective? A. Limit checks B. Check digits C. Automated system balancing D. Range checks

B. Check digits Explanation: A check digit is a form of redundancy check used for error detection on identification numbers. It helps to ensure that the original data is not tampered with or altered. Check digits help to prevent transposition and transcription errors.

Questionnaires to guide the user through a set of choices to arrive at a conclusion is used by which of the following? A. Audit checklists B. Decision trees C. Logical analysis D. Budget checklists

B. Decision trees Explanation: A decision tree uses a set of questions to guide the user through a set of choices to arrive at a conclusion.

The knowledge domain of an expert system, which uses questionnaires to guide the user through a series of choices before coming to a conclusion, is known as which of the following? A. Diagram trees B. Decision trees C. Semantic nets D. Networks trees

B. Decision trees Explanation: A decision tree uses a set of questions to guide the user through a set of choices to arrive at a conclusion.

Which of the following techniques helps to detect as well as correct the errors by transmitting redundant information with each character? A. Parity bits B. Forward error control C. Checksums D. Redundancy checks

B. Forward error control Explanation: Forward error control works on same principle as redundancy checksums. In addition to detecting errors, they have the capability to correct the errors found. It helps the receiver computer to correct the error.

The technique to control the completeness of data transmission is which of the following? A. Limit checks B. Parity bits C. Sequence checks D. Range checks

B. Parity bits Explanation: Parity bits are used to verify complete and accurate data transmission. Parity bits are used as the simplest form of error-detecting code when data is transferred from one computer to another. An extra bit is added to the data in such a way that the total number of 1 bits in the data string is either even or odd. This extra bit is called a parity bit. This parity is then verified by the receiving computer to validate the data accuracy and completeness during transmission.

When reviewing the decision support system, an IS auditor should be most concerned with which of the following? A. Input data quality B. The level of skills and experience contained in the knowledge base C. The system's logical access control D. The processing controls implemented in the system

B. The level of skills and experience contained in the knowledge base Explanation: A primary issue for the IS auditor is the level of expertise or competence in the knowledge base, as errors in decision-making based on a lack of information may have a significant effect on the organization.

Which of the following is the best control to ensure that no transactions are lost during processing? A. Limit checks B. Check digits C. Automated system balancing D. Validation control

C. Automated system balancing Explanation: Automated system balancing reconciles the total input and total output. Any difference will be shown as an error for further investigation and correction. Automated system balancing helps to determine whether any transactions are lost during the processing as any mismatch in input and output will be highlighted for further investigation.

The technique used by banks for the prevention of transposition and transcription mistakes, thus ensuring the integrity of bank account numbers allotted to customers, is which of the following? A. Limit checks B. Parity bits C. Check digits D. Range checks

C. Check digits Explanation: A check digit is a form of redundancy check used for error detection on identification numbers. It helps to ensure that the original data is not tampered with or altered. Check digits help to prevent transposition and transcription errors. A check digit is a mathematically calculated value that is added to data to ensure that the original data has not been altered.

A DSS does which of the following? A. Focuses on the highly structured problems B. Supports only the top management requirements C. Emphasizes flexibility in the user's approach to decision-making D. Fails to support unstructured problems

C. It emphasizes flexibility in the user's approach to decision-making Explanation: DSS puts emphasis on flexibility in the users' approach to decision making. The characteristics of DSS are given as follows: It supports decisions that are semi-organized or less organized. It uses methods that include traditional data access and retrieval functions. It is flexible and functional in terms of changing environments and the user's approach to decision making.

Which of the following is the best control to address input errors? A. The hash total B. The run-to-run total C. Limit checks D. Daily reconciliation

C. Limit checks Explanation: Limit checks restrict the data input up to certain predefined limits. Data is checked for certain limits, either upper or lower, as in, the number entered should not be greater than 100. A limit check is an input control. It is a preventive control to restrict invalid input into the system. It ensures that only data within the predefined limit can enter the system. All other options are controls that address the output.

The technique to prevent duplication of a voucher during data entry is which of the following? A. Limit checks B. Check digits C. Sequence checks D. Range checks

C. Sequence checks Explanation: Sequence checks involve testing a list of items or files of records for the correct ascending or descending sequence based on predefined requirements. It checks whether vouchers are in sequence and thus prevents the duplication of the vouchers.

The main risk of using a DSS is which of the following? A. It does not support semi-structured problems. B. The cost of implementing the system. C. The inability to specify purpose and usage patterns. D. The constant change in decision-making processes.

C. The inability to specify the purpose and usage patterns Explanation: The inability to define objective and usage patterns is a risk to be expected by developers when implementing a DSS.

Which of the following is the purpose of the checksum control? A. To ensure confidentiality B. To ensure availability C. To ensure integrity D. To ensure non-repudiation

C. To ensure integrity Explanation: The purpose of a checksum is to ensure data integrity and data completeness. It requires adding an extra bit to the data in such a way that the total number of 1 bits in the data string is either even or odd. This parity is verified by the receiving computer to ensure data completeness and data integrity during transmission.

Parity bits are implemented to validate which of the following? A. Data confidentiality B. The data source C. Data availability D. Data completeness

D. Data completeness Explanation: Parity bits are used to verify complete and accurate data transmission. Parity bits are used as the simplest form of error-detecting code when data is transferred from one computer to another. An extra bit is added to the data in such a way that the total number of 1 bits in the data string is either even or odd. This extra bit is called a parity bit. This parity is then verified by the receiving computer to validate the data accuracy and completeness during transmission.

The best method to find transmission mistakes by adding an extra bit at the end of segment is which of the following? A. Parity bits B. Checksums C. Validation control D. Redundancy checks

D. Redundancy checks Explanation: Parity checks, checksums, and cyclic redundancy are used to verify and validate complete and accurate data transmission. However, CRCs/redundancy checks involve applying complex mathematical calculations and are more accurate than parity bits and checksums.


Kaugnay na mga set ng pag-aaral

AP Psychology - Human Development

View Set

Ch. 49 Mythical Impressions: Program Music at the End of the Nineteenth Century

View Set

PSY 100GENERAL PSYCHOLOGY Unit 2

View Set

Ch 2.-The Resolution of Private Disputes

View Set