AIS 5-8 Missed Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following can be used to detect fraud occurrences in near real time?

Business analytics

A knowledge base:

Is a collection of a company's files and documents, Is analogous to a database, Generally contains proprietary information

Which of the following is true about recursive relationships?

They occur between two different instances of an entity

_________ is a special code or password that enables programmers to bypass the security features of the program to access the program.

Back door

Describe the basic differences between ES and NN

NNs develop their own knowledge base and continue to learn

Coding schemes on relational databases do not include:

Normalized coding

Which of the following situations is not a segregation of duties violation within the revenue cycle?

The AR clerk reconciles the AR subledger to the Control account in the general ledger on a monthly basis and investigates discrepancies.

Which statement is true regarding knowledge management?

The primary enabler is information technology

Explain when a database designer might use a relationship table in constructing a relational database.

To link two relational tables in a M:N relationship

Dependencies cause several problems, called _______ _______:

Update anomalies

All of the following is true of databases

1) A collection of data within an interconnected series of files is a centralized database 2) Decentralized data is when the system must store and maintain multiple versions of the same data in different files 3) Business event data are copied periodically into a separate database (a data warehouse).

Intelligent Agents:

1. Are frequently used by search engines 2. Perform their tasks without further direction from the user 3. Are sometimes called "bots"

Organizations use a database management system to:

1. Coordinate the activities of functional areas 2. Simplify the tasks of creating, accessing, and managing a centralized database 3. Provide data useful to managers

In entity-relationship modeling the designer:

1. Draws a diagram of the relational model 2. Identifies how the things are related to each other 3. Identifies the entities

All of the following are true about composite primary keys:

1. Is created by breaking the key down into its component sub-attributes 2. Is formed from the primary keys of two other tables 3. Is needed in M:N relationships

A tuple is:

1. One employee in an instance of the EMPLOYEE relation 2. A set of data that describes a single instance of the entity represented by a relation 3. A row in a relational database

A well-documented application typically includes:

1. Systems documentation 2. Program documentation 3. Operations run and user manuals

What advantages do intelligent agents have in the operation of a decision support system?

1. They can perform time-consuming tasks 2. They can collect specific information from the Internet or large data warehouses 3. They can identify factors that should be considered when using a system for decision making

Which of the following is an objective in the development of an REA model?

1. To incorporate financial and non-financial data, and accounting and non-accounting data 2. To identify the data required by managers and other users to perform effectively 3. To integrate the data in a way that allows those users to efficiently access the information needed

Which of the following statements is true concerning normalization?

2NF does not contain partial dependencies

What is an entity-relationship model (E-R model)?

A diagram of the relational model

Relationships are:

Associations between entities.

What is referential integrity?

Can serve as an effective control

What factors distinguish DSS from EIS?

DSSs can provide "recommendations", but EISs do not usually do so

A major difference between the centralized database approach and the applications approach is decoupling, also known as _______ ______:

Data independence

The first step in E-R modeling is to:

Determine users' requirements for the database

Which of the following is not a control goal of information processes?

Ensure security of resources

In a relational database, a separate relational table is created for each ______.

Entity

When does functional dependence exist?

If a value for the first attribute determines a single value for the second attribute

Which of the following cannot be the maximum cardinalities of two relational tables?

M:0

Which of the following is true about an entity in a relational database?

Is represented as a table

A key attribute:

Is the attribute whose value is unique

A primary key:

Is used for linking database tables together

Why have knowledge management systems become important?

Knowledge management systems help capture, store, organize, present, distribute, and control access to the knowledge base

Which of the following is not a part of monitoring control plans?

Monitoring, and observing the work of others

______ ______is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance.

Organizational governance

Which type of control plan influences the effectiveness of the control plans at lower levels of the control hierarchys?

Pervasive control plan

______control plans relate to a multitude of goals and processes and business _______control plans relate to the technology used to implement the process

Pervasive, process

Program change controls:

Provide assurance that all modifications to programs are authorized and documented

Which approach to developing models of accounting databases ensures that a system captures all data related to business events?

Resources-events-agents

The difference between risks and opportunities is:

Risks could have a negative impact and opportunities could have a positive impact on the organization's objectives.

_________ are unauthorized instructions inserted into a program to systematically steal very small amounts.

Salami slicing

Which of the following objectives are high-level goals aligned with and supporting the organization's mission?

Strategic

The participation constraint:

Specifies the degree of participation

Which of the following is not one the steps in the three step strategy for effectively identifying the relationships that should be included in a database model?

Specify the degree of minimum participation of one entity in the relationship with the other entity

A ________ guides the IT organization in establishing and meeting user information requirements.

Steering committee

Which of the following procedures would an entity most likely include in its BDP?

Store duplicate copies of files in a location away from the computer center

The SOX section that establishes an independent board to oversee public company audits is:

Title I - Public Company Accounting Oversight Board

The SOX section that requires a company's CEO and CFO to certify quarterly and annual reports is:

Title III - Corporate Responsibility

What is a partial dependency?

When an attribute is dependent on a portion of the primary key, not on the entire key


Ensembles d'études connexes

Cisco Introduction to Networking Chapter 1

View Set

Focus on personal finance - ch 1

View Set

Living Environment Regents questions

View Set

CompTIA Security+ SY0-601 (Section 5.0 Governance, Risk and Compliance)

View Set