ACCT 3301 CH 5,6,7,8,9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The word zombie is related to which type of computer attack? A.War dialing B.Botnet C.Data diddling D.Salami technique E.Masquerading

B

Unauthorized access, modification, or use of an electronic device or some element of a computer system is called A.hijacking. B.hacking. C.denial-of-service attack. D.spamming.

B

Danny Ferrar, the owner of BuysUSA.com, was sentenced to six years in prison for selling $4.1 million of copyrighted software for much less than the suggested retail price. Ferrar was guilty of: A.Software diddling B.Internet auction fraud C.Phreaking D.Click fraud E.Software piracy

E

Which data set would be considered to be at the level of aggregation associated with a Vendor? A.VendorID, ProductID, Sum(ProductQuantity) B.VendorID, VendorName, Sum(PurchaseOrderTotal) C.VendorID, ProductDescr, Avg(ListPrice) D.VendorID, EmployeeID, Avg(PurchaseOrderTotal)

B

Which details would not be lost if purchase data were at the level of aggregation associated with a Vendor? A.EmployeeName B.TotalPurchases C.MaxQuantityPerProduct D.ProductDescr

B

Which of the following best describes what data pivoting means? A.Summarizing data in a different form B.Rotating data from rows to columns C.Joining data from two different database tables D.Replacing column names

B

Which of the following is an example of output fraud? A.An employee at the Veteran's Memorial Coliseum sold customers full-price tickets, entered them as half-price tickets, and pocketed the difference. B.A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks. C.The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities. D.An insurance company installed software to detect abnormal system activity and found that employees were using company computers to run an illegal gambling website.

B

Fraud is gaining an unfair advantage over another person. Legally, for an act to be fraudulent there must be: A.An intent to deceive B.Unfairness C.An exchange of monetary consideration D.All of these are correct

A

Hackers created malicious and self-replicating code to exploit a weakness in the Windows Server service. Two weeks after it was released, it had infected almost 9 million computers worldwide. In addition to looking for other computers to infect, the code downloaded additional malware on the hijacked computers. The code, named Downadup, is an example of what kind of computer fraud and abuse technique? A.Worm B.Packet sniffer C.Keylogger D.Rootkit E.Bluesnarfing

A

Individuals who control an army of malware-infected zombie computers are called _______________. A.botnet owners B.zombie commanders C.malware writers D.guarantors

A

Individuals who perpetrate fraud are often referred to as A.white-collar criminals. B.bad actors. C.blue-collar criminals. D.All of these

A

Misappropriation of assets is an example of what type of accounting information threat? A.Intentional acts B.Natural and political disasters C.Software errors and equipment malfunctions D.Unintentional acts

A

On your dream vacation to Hawaii you decide to log into the hotel's Wi-Fi network and notice that there are two networks with very similar names. You select one and are immediately connected to the network without having to enter the access code given you at check in. Weeks later you find that your identity has been stolen. You were a victim of which computer fraud and abuse technique? A.Evil twin B.Carding C.Chipping D.Tab napping E.Typosquatting

A

Organizations can make fraud less likely to occur by requiring an annual employee ____________ A.to vacation. B.a promotion. C.to participate in a training program. D.to retreat.

A

When confirmatory data analysis techniques are used, what type of analytic is likely being computed? A.Diagnostic analytic B.Predictive analytic C.Prescriptive analytic D.Descriptive analytic

A

Fraudsters take advantage of which of the following human traits to entice a person to reveal information or take a specific action? (Check all that apply.) A.Trust B.Compassion C.Urgency D.Vanity E.Fear

A,B,C,D

Computer systems are particularly vulnerable to fraud for the following reasons: (Check all that apply.) A.It is difficult to control physical access to each electronic device that accesses a network B.Perpetrators who break into corporate databases can steal or destroy massive amounts of data in very little time, often leaving little evidence C.Most employees and suppliers with access to a computer system will eventually perpetrate a computer fraud, irrespective of the strength of the Internal controls D.Few companies design controls into their computer systems E.Computer programs need to be illegally modified only once, in order for them to operate improperly for as long as they are in use

A,B,E

Which of the following statements about data analytics is true? (Check all that apply.) A.Fraud is often detected by identifying trends, patterns, anomalies, and exceptions within data. B.Detecting and preventing fraud is an easy task. C.To use data analytics effectively, investigators must understand the analytics tool used, the organization's business, and the data. D.New technologies provide perpetrators with new ways to perpetrate fraud.

A,C,D

A hacker was able to break into the system that transmitted the daily transactions of a retail store to the company's central office. Every night for several weeks he copied the transaction data that included customer names, credit card numbers, and other confidential data. Hundreds of thousands of customers were affected. This is an example of what type of fraud? A.Input fraud B.Data fraud C.Computer instruction fraud D.Output fraud E.Processor fraud

B

A hijacker placing himself between a client and a host to intercept network traffic is called _______________. A.phreaking B.man-in-the-middle C.torpedo software D.SQL injection

B

A pharmaceutical company is trying to develop a drug that will help cure the most people with a serious disease. To choose the drug that can cure the most people, the data analyst should look at what? A.Type II error rate B.Effect size C.Type I error rate D.P-value (level of statistical significance)

B

A woman sent her company fictitious medical bills from doctors who did not exist. The bills were processed in the normal way by her employer, and payments went to her husband's office address. She bilked her company out of millions of dollars. This is an example of what type of fraud? A.Output fraud B.Input fraud C.Computer instruction fraud D.Data fraud E.Processor fraud

B

After a fraud has occurred, which one of the following is the best way to reduce the loss from that fraud? A.Implement computer-based controls over data input, computer processing, data storage, data transmission, and information output B.Collect on fraud insurance purchased before the fraud C.Increase the penalty for committing fraud by prosecuting fraud perpetrators more vigorously D.Create an organizational culture that stresses integrity and commitment to ethical values and competence E.Develop and implement a strong system of internal controls

B

An attack between the time a new software vulnerability is discovered and the time a software developer releases a patch that fixes the problem is called A.hijacking. B.zero-day attack. C.buffer overflow attack. D.SQL injection attack.

B

In the movie "Identity Thief," Melissa McCarthy used an invented scenario to get the name and other identifying information of Jason Bateman, enabling her to steal his identity. Which computer fraud and abuse technique did she use? A.Posing B.Pretexting C.Pharming D.Piggybacking E.Phishing

B

Jake Malone is running an online business that specialized in buying and reselling stolen credit card information. Jake is engaging in _______________. A.pharming B.carding C.typosquatting D.phishing

B

Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or stop a website, often to prevent legitimate users from accessing the website? A.Cross-site scripting attack B.DoS attack C.Dictionary attack D.Man-in-the-middle attack E.Spoofing attack

B

Organizations can increase the difficulty of committing fraud by all of the following except: A.Restricting access to company assets and data. B.Maintaining adequate insurance. C.Implementing strong internal controls. D.Encrypting stored and transmitted data.

B

Spoofing is making an electronic communication look like it came from someone other than the actual sender. Which of the following is not one of the types of spoofing mentioned in the text? A.Caller ID spoofing B.Identity theft spoofing C.E-mail spoofing D.Web page spoofing E.IP address spoofing

B

Which of the following is not an example of asset misappropriation? A.A warehouse employee takes home five boxes of iPhones without authorization. B.The controller of the company falsely adds $50 million to accounts receivable. C.The president of the company utilizes the organization's cash to pay for her overseas vacation. D.The treasurer of the company makes an unauthorized wire transfer from the organization's bank to a personal account.

B

Which of the following will make fraud and errors less likely to occur? (Check all that apply.) A.Develop a comprehensive business continuity plan B.Develop anti-fraud policies that clearly set forth the expectation for honest and ethical behavior C.Effectively supervise employees and monitor their performance D.Create an organizational culture that stresses integrity and commitment to ethical values and competence

B,C,D

Which of the following will increase the difficulty of committing fraud? (Check all that apply.) A.Develop a comprehensive, disaster recovery plan B.Segregate the accounting functions of authorization, recording, and custody C.When disposing of used computers, destroy the hard drive D.Develop and implement a strong system of internal controls

B,D

Communications that request recipients to disclose confidential information by responding to an e-mail or visiting a website is called: A.Dictionary attacking B.Hijacking C.Phishing D.Cross-site scripting

C

In a hurry to catch a train, a man in Grand Central Station made a quick ATM stop to withdraw $40. Before he went to bed, he checked his bank account and found his $40 withdrawal, as well as five additional withdrawals, for a total of $700, all made within a minute of his. This man was most likely a victim of _______________. A.scavenging B.carding C.shoulder surfing D.eavesdropping E.chipping

C

Logic errors is an example of what type of AIS threat? A.Software errors and equipment malfunctions B.Natural and political disasters C.Unintentional acts D.Intentional acts

C

Sending an unsolicited message to many people at the same time is called _______________. A.posing B.tabnapping C.spamming D.podslurping

C

Techniques or psychological tricks are used to get people to comply with the perpetrator's wishes in order to gain physical or logical access to a building, computer, server, or network. It is usually to get the information needed to obtain confidential data is called _______________. A.Lebanese looping B.Internet misinformation C.social engineering D.web cramming

C

The day after you downloaded a new game on your laptop from a free software site, pop-up ads begin to appear on your computer, even though your browser says that pop-up ads are being blocked. You also occasionally find your web browser jumping to Web sites you did not ask it to display. You have most likely become a victim of what type of malware? A.Bluebugging B.Trap door C.Adware D.Superzapping E.Packet sniffer

C

Employees at a large brokerage house used their employer's computer system to run a large and lucrative side business that their employer knew nothing about. This is an example of what type of fraud? A.Computer instruction fraud B.Output fraud C.Input fraud D.Data fraud E.Processor fraud

E

A 17-year-old broke into the Bell Laboratories network, destroyed files, copied 52 proprietary software programs, and published confidential information on underground bulletin boards. Which computer fraud and abuse technique is this? A.Dictionary attack B.Spamming attack C.Botnet attack D.Hacking attack E.Denial of service attack

D

A construction company classifies their projects into one of seven different types. To keep track of project classification, the clerk enters a number from 1 to 7 in the ProjectType field. The values 1 to 7 are best described as ________. A.imputed data values B.misfielded data values C.duplicate data values D.cryptic data values

D

After visiting a large number of Web sites to complete your research for a lengthy research paper, your computer begins to act up. Your CPU is running much slower, your software frequently crashes, and you have difficulty connecting to the Internet. You have most likely become a victim of what type of malware? A.Logic bomb B.Ransomware C.Scareware D.Spyware E.Steganography

D

Unauthorized theft, use, access, modification, copying, or destruction of software, hardware, or data is called A.hacking. B.technology fraud. C.Asset misappropriation. D.computer fraud.

D

Using spyware to record what a person types into the computer is called: A.Spamming B.Splogging C.Salami technique D.Keylogging

D

Which of the following is an example of how a fraud perpetrator would rationalize his actions? A.There is a lack of internal control in the organization. B.Sense of dissatisfaction against the company. C.The need to have additional funds to pay for a gambling addiction. D.Belief that no one is going to be harmed.

D

Which of the following is not a true statement about malware? A.Malware is a constant and growing concern. B.Malware is any software that is used to do harm. C.Most malware is the result of installation or injection by a remote attacker. D.Malware is restricted to computers.

D

Which of the following will improve the ability to detect fraud? (Check all that apply.) A.Implement project development and acquisition controls, as well as change management controls B.Provide employee support programs so they know where they can get help to deal with pressures that might tempt them to perpetrate fraud C.Restrict physical and remote access to system resources to authorized personnel D.Implement a fraud hotline E.Implement whistleblower rewards

D,E

A programmer at a large bank inserted code into the company's computer system that told the computer to not only ignore any overdrafts on his accounts, but to not charge his accounts any late or service fees. This is an example of what type of fraud? A.Output fraud B.Data fraud C.Processor fraud D.Input fraud E.Computer instruction fraud

E

In your haste to watch a video that you heard about, you type in yuube.com and are taken to a site with the familiar YouTube logo but find that the site sells a video ad blocker that allows you to watch YouTube without having to watch the ads. This is an example of _______________. A.vishing B.scavenging C.chipping D.skimming E.typosquatting

E

On March 20, at 2 p.m. local time, the hard drives and master boot records of computers at three banks and two media companies in South Korea were wiped clean. The computers were then restarted, and the message "Boot device not found. Please install an operating system and then reboot the system" appeared on those computer screens. These companies were victims of what kind of computer fraud and abuse technique? A.Superzapping B.Trap door C.Scareware D.Keylogger E.Time bomb

E

The FBI arrested Russian spies and accused them of encoding messages into pictures that were posted on publically accessible Web sites. To retrieve the messages, the recipients used special software to decode the messages hidden in the pixels of the pictures. The Russian spies were using which computer fraud and abuse technique? A.Man-in-the-middle B.Adware C.Web cramming D.Masquerading E.Steganography

E

A collection of structure, semi-structured, and unstructured data stored in a single location is called a ___________. A.data lake B.data warehouse C.metadata D.database

A

A company has collected performance data (machine movements, units produced, quality measures) from a production machine for several months. Each day the company has increased speed by 0.05 percent. The company plans on building a model to estimate the machine's quality measures assuming an additional 2% increase in machine speed. Which type of analytic will be performed? A.Predictive B.Prescriptive C.Diagnostic D.Descriptive

A

According to EY, which of the following techniques should be developed to an "Awareness" level? A.Neural networks, artificial intelligence B.Cluster analysis, inferential statistics C.Forecasting, aggregation D.Querying, regression

A

According to the text, which type of threat represents the greatest risk to information systems and causes the greatest dollar losses? A.Unintentional acts B.Intentional acts C.Software errors and equipment failures D.Natural and political disasters

A

Amitola created a dashboard showing key metrics about the accounts payable process at her organization. The dashboard showed various metrics including: the total number of vendors, the amount saved by paying vendors on early, and the number of late payments to vendors. Which of the following best describes the type of analytics included in the dashboard? A.Descriptive analytics B.Prescriptive analytics C.Predictive analytics D.Diagnostic analytics

A

An analytic that answers the question, "what might happen in the future?" is best described as which of the following? A.Predictive analytic B.Diagnostic analytic C.Descriptive analytic D.Prescriptive analytic

A

At a local supermarket, a data analyst used video data of the parking lots to identify the times when customer carts are most often left out in the parking lot. The analyst then designed the scheduling program to schedule more employee baggers to work during the time when shopping carts are left outside. The data analyst used what type of analytics in this scenario? A.Prescriptive analytics B.Diagnostic analytics C.Descriptive analytics D.Predictive analytics

A

At what point in the ETL process should data validation take place? A.All of these B.During data cleaning C.During data structuring D.During data standardization

A

Bernard prepares a data dashboard to send to the CFO. The CFO's objective for the dashboard is to see the "free cash" position of the company each morning in less than one minute. The dashboard fits on a single computer screen and contains 22 different charts. Which storytelling principles are supported by this dashboard? A.None of these B.Appropriate level of detail C.Communicate effectively D.Communicate quickly

A

Good questions should be "SMART." Which of the SMART objectives suggests that a question should relate to the objectives of the organization or the situation under consideration? A.Relevant B.Specific C.Measurable D.Achievable

A

Which of the following statements are true with respect to fraudulent financial reporting? (Check all that apply.) A.Management falsifies financial statements in order to deceive investors and creditors, increase a company's stock price, meet cash flow needs, or hide company losses and problems. B.Frequent "cook the books" schemes involve fictitiously inflating revenues, recognizing revenues before they are earned, delaying expenses to a later period, overstating inventories, and concealing liabilities. C.The ACFE found that fraudulent financial reporting is as much as 17 times more likely than asset misappropriation. D.Auditors and management are just as concerned with misappropriations as they are with fraudulent financial reporting.

A,B

Check all techniques that can be used to emphasize in a visualization. A.Orientation B.Color C.Highlighting D.Weighting

A,B,C,D

Check all techniques that can be used to simplify a visualization. A.Quantity B.Color C.Orientation D.Distance

A,B,C,D

Check each item listed below that is part of the process for transforming data. A.Document the transformation process B.Validate data quality and verify data meets data requirements C.Standardize, structure, and clean the data D.Understand the data and the desired outcome

A,B,C,D

A rationalization allows a person to convince him or herself that his or her actions are not illegal or dishonest. There are several different types of rationalizations: (Check all that apply.) A.A lack of personal integrity that makes what a person wants more important than acting honestly B.A justification, such as "I am underpaid, so they owe it to me" C.A mental defect that makes a person think that they own the item that they took D.An attitude, such as "the rules do not apply to me"

A,B,D

Which of the following statements are true about fraud perpetrators? (Check all that apply.) A.Researchers found significant psychological and demographic differences between violent and white-collar criminals. B.Most first-time, unprosecuted fraud perpetrators never commit another fraud. C.Researchers found few psychological and demographic differences between white-collar criminals and the public. D.Most white-collar criminals have a previous criminal record; and they were honest and respected members of their community.

A,C

Which of the following statements are true? (Check all that apply.) A.The controls used to protect corporate assets make it more difficult for an outsider to steal from a company. B.Small businesses are less vulnerable to fraud than large companies because small companies typically have more effective internal controls than larger companies. C.Most fraud perpetrators are knowledgeable insiders with the requisite access, skills, and resources. D.A typical organization loses 5% of its annual revenue to fraud, indicating yearly global fraud losses of over $3.7 trillion. E.Fraud perpetrators are often referred to as blue-collar criminals.

A,C,D

For most first-time fraud perpetrators, three conditions are present when fraud occurs. These include: (Check all that apply.) A.A pressure, incentive, or motivation B.A criminal mindset C.An opportunity D.The inability to distinguish between right and wrongE.A rationalization that allows a perpetrator to justify the illegal behavior

A,C,E

Opportunity is the condition or situation that allows a perpetrator to: (Check all that apply.) A.Convert the theft into a personal gain B.Control those who may know of his or her actions C.Conceal the fraud D.Convince the perpetrator that he or she will not be caught E.Commit the fraud

A,C,E

Legally, for an act to be fraudulent there must be: (Check all that apply.) A.A material fact that induces a person to act B.An intent to do bodily harm to the victim C.An injury or loss suffered by the perpetrator D.A justifiable reliance, where a person relies on a misrepresentation to take an action E.A false statement, representation, or disclosure

A,D,E

According to the EY Foundation, over which data analytic techniques should accountants gain mastery? A.Data mining, artificial intelligence B.Querying, trends, forecasting C.Correlation, regression D.Cluster analysis, inferential statistics

B

Aggregating data, data joining, and data pivoting are examples of which of the following? A.Data cleaning B.Data structuring C.Data validation D.Data standardization

B

Among the following statements, which is likely to be detected using visual inspection? The setting: a company extracts data from one system, transforms the data into a new format, and then loads it into a new system. The visual inspection validation tests are performed on a portion of the data in the new setting. A.Not all data was loaded into the new system. B.Data from two fields was not concatenated into one field during the transformation process. C.Not all data was extracted from the original system. D.There are minor data imputation errors for some missing values.

B

An analytic that answers the question, "why did this happen?" is best described as which of the following? A.Descriptive analytic B.Diagnostic analytic C.Predictive analytic D.Prescriptive analytic

B

If analytics are performed well, it is certain that ____________________________. A.None of these are necessarily certain. B.high-quality judgments will follow. C.fraud will be reduced. D.efficiency will be gained.

A

Jane needs to create a data dashboard for each employee showing their performance during the last quarter. To build this dashboard, she must download data from a system, reformat it, upload it to a new system, and then build a visualization. To do this, Jane uses a program to automatically do all of these steps. What Jane built is an example of which of the following? A.Automation B.Data storytelling C.Diagnostic Analytic D.Descriptive Analytic

A

Joleen queried the company database and returned 23 columns of information for her report. In examining the data, she noticed that one column only had values half of the time. Joleen decided to delete this column from her report. This is an example of which of the following? A.Data filtering B.Data de-duplication C.Data entry error D.Data imputation

A

Making sure to use separate training datasets and test datasets is especially important for creating what type of analytic? A.Predictive analytic B.Prescriptive analytic C.Diagnostic analytic D.Descriptive analytic

A

Santiago reviewed a recent extract of data about customer credit limits. He noticed that one company had a credit limit of $1,000,000,000 USD, whereas the next highest credit limit was $10,000 USD. What might have Santiago discovered? A.Data threshold violation B.Violated attribute dependency C.Data contradiction error D.None of these

A

Supposing you are presenting a line chart with values ranking from .01 to 79.3 on the y-axis. How many decimal places should be shown in the labels of the tick marks on the y-axis? A.Zero B.1 C.2 D.3

A

Suzette sends Jimmy a flat file with a list of all sales transactions the company made during the last year. Each line contains all the information about a single sale. Jimmy prepares a report that shows three different views of the data (1) the total sales for each quarter, (2) the total sales by customer, and (3) the total sales for the entire year. To make this report, Jimmy had to do which of the following to the data Suzette sent? A.Aggregate data B.Join data C.Pivot data D.All of these

A

Terrorist attacks are considered which type of threat? A.Natural and political disasters B.Intentional acts C.Unintentional acts D.Software errors and equipment failures

A

To answer the question of "What should be done," one would apply ____________________. A.prescriptive analytics B.descriptive analytics C.diagnostic analytics D.predictive analytics

A

Using Robotic Process Automation is best for tasks that are ________________. A.repetitive B.complex C.interesting D.changing

A

When accountants build bots to help them with the tasks of their job, what description best explains the type of bot they would build? A.A computer program that is designed to perform a specific task B.A machine that performs a task more quickly than a human C.None of these D.A robot that uses artificial intelligence to act like a human

A

When data is aggregated, some of the detailed information is lost. Which of the following is needed if you want to show both the aggregated and disaggregated data together? A.Joining the aggregated data with the disaggregated data B.Pivoting the aggregated data C.Cleaning the aggregated data D.None of these will restore the lost information.

A

When data is joined together it is called _________, when it is split apart it is called ________. A.data concatenation, data parsing B.data standardization, data formatting C.data parsing, data concatenation D.data formatting, data standardization

A

Which of the following is not a principle to avoid in trying to create ethical data presentations? A.All of these are important principles to follow for creating ethical data presentations B.Show representations of numbers proportional to the reported number C.Present complete data given the context D.In vizs designed to depict trends, show time progressing from left to right on the x-axis

A

Which of the following techniques is most likely to discover an error where a data analyst did not correctly parse data from one field into two fields? A.Visual inspection B.Basic statistical tests C.Advanced testing techniques D.All of these will likely catch this problem

A

________ often make use of exploratory data analytic techniques, while _______ make use of machine learning techniques. A.Descriptive analytics, predictive analytics B.Descriptive analytic, prescriptive analytics C.Diagnostic analytics, predictive analytics D.Diagnostic analytics, prescriptive analytics

A

____________ is a process of changing data into a format that another program can use. A.Transforming B.Delimiting C.Visualizing D.Cleaning

A

Analyn spent the entire day entering information about suppliers into the company database. She did not make a single spelling mistake in any of the entries. However, at the end of the day, Analyn notices that she entered the state into the country field for all of the data. The mistaken data values in the country field are best described as which of the following? A.Data formatting errors B.Misfielded data values C.Cryptic data values D.Data contradiction errors

B

Assuming you need to validate data cleansing on a very large dataset, which technique would be most useful? A.Statistical tests B.All these options work for very large datasets C.Audit a sample D.Visual inspection

B

Before becoming the CEO, Kurt designed a new toy for the company. Although the sales of the new toy are the same as other toys in the company, the CEO gives employees in the new toy division a reward and bonus. The CEO is likely showing what? A.A data analysis error B.A confirmation bias C.A data sharing error D.Correlation can be causation

B

Cindy, the controller at the organization, asks David, an accounts receivable clerk, "We want to be able to collect all cash from customers who make purchases. Which customers were more than 30 days late paying for their merchandise?" This question does the worst at accomplishing which of the following SMART objectives? A.Specific B.Timely C.Relevant D.Measurable

B

Computer software that can be programmed to automatically perform tasks across applications just as human workers do is called _______. A.analytics software B.robotic process automation (RPA) software C.ETL software D.big data software

B

Given you have deep knowledge of the relation between employee records and pension records, you can implement which validation technique? A.Visual inspection B.Advanced Testing C.Audit a sample D.Statistical tests

B

Suppose your salespersons are given great latitude is setting product prices to their customers. You are tasked with showing how much each salesperson varies in prices for one particular product. Which viz is most appropriate? A.Bar chart B.Boxplot C.Area chart D.Heatmap

B

Testing a hypothesis is an example of ___________ analytics. A.prescriptive B.diagnostic C.descriptive D.predictive

B

The process of translating complex data into easier to understand terms is called ________. A.data visualization B.data storytelling C.data dashboard D.data transformation

B

When an employee makes a mistake typing data into the system, it is called a _______. A.misfielded data value error B.data entry error C.data contradiction error D.data duplication error

B

When discussing the amount of attention an element attracts, you are discussing _______________. A.ordering B.visual weight C.highlighting D.distance

B

Which of the following is the best example of correlation not being the same as causation? A.A company pays sales employees more for each sale and each employee starts selling more goods. The company concludes that paying employees more for a sale causes employees to sell more items. B.During an economic downturn, a company changes its computer policy to only allow purchases of windows-based laptops and see profits go down. The company concludes that windows-based laptops cause profits to go down. C.A company redesigns a production process and afterwards it takes less time to produce products. The company concludes that redesigning processes causes production efficiency gains. D.After a poorly performing quarter, a company sends out coupons in the mail and sees an increase in sales. The company concludes that sending coupons causes sales to increase.

B

________ is the process of changing the organization and relationships among data fields to prepare the data for analysis. A.Data standardization B.Data structuring C.Data validation D.Data cleaning

B

Which of the following classification of pressures motivate people to perpetrate employee fraud? (Check all that apply.) A.Management characteristics and pressures B.Lifestyle pressures C.Emotional pressures D.Financial pressures E.Industry pressures and conditions

B,C,D

Which of the following statements are true with respect to asset misappropriation? (Check all that apply.) A.Few misappropriation frauds are self-perpetuating; that is, they do not require the perpetrator to continue the fraud scheme to avoid detection. B.The sheer magnitude of some frauds leads to their detection. C.A significant contributor to most misappropriations is the absence of internal controls and/or the failure to enforce existing internal controls. D.Since few perpetrators voluntarily stop their frauds, there are no small frauds—only large ones that are detected early. E.Rarely do fraud perpetrators adopt a more lavish lifestyle that requires even greater amounts of money.

B,C,D

Which of the following statements are true? (Check all that apply.) A.Investment fraud is dishonest conduct, such as bribery and bid rigging, by those in power that often involves illegitimate or immoral actions. B.Misappropriation of assets is the theft of company assets by employees. C.Corruption is misrepresenting or leaving out facts in order to promote an investment that promises fantastic profits with little or no risk. D.Fraudulent financial reporting is intentional or reckless conduct that results in materially misleading financial statements.

B,D

A delimiter is _________. A.a data element used in the data dictionary B.a data element that identifies numeric values C.a data element that separates field values D.a data element that allows large text sizes

C

Adi queries the company database to return all values from the field "FullAddress." Adi reviews the information and finds that half of the time the values store the city and country values before the street address and the other half of the time the street address is listed before the city and country. What type of error did Adi find in the database? A.Misfielded data value error B.Cryptic data value error C.Data consistency error D.Data formatting error

C

Billy-Bob Barker bakes big, beautiful brownies. However, Billy-Bob notices that the recipe he printed from the company database correctly states that the recipe needs flour but incorrectly lists the approved flour company and instead lists the approved salt vendor. This is an example of which of the following? A.Data duplication error B.Data contradiction error C.Violated attribute dependency D.Data imputation error

C

Comparing means and medians is an example of __________________ analytics. A.predictive B.diagnostic C.descriptive D.prescriptive

C

Joining ProductID with ProductDescription into a single field is an example of ____________________. A.parsing B.pivoting C.concatenation D.delimiting

C

Julie knows that her report printout should have only two columns of information from the database and that each column should have a dummy variable in it. The report she receives from IT has a single column and some examples of the values in the column are "10", "01", "11", "00." Julie surmises that what likely is the problem? A.The database has become corrupted and has nonsensical values in all fields. B.The fields in the database have misfielded data values. C.The IT department improperly concatenated the data. D.The IT department did not properly parse the data.

C

Pie charts are the most over-used type of charts. This is because they are often used to show comparison. Select which chart type is best for making comparisons. A.Histogram B.Scatterplot C.Bar chart D.Line chart

C

Pivoting data _____________________. A.makes the original data obsolete B.disaggregates data C.often loses some detailed data D.cannot be done on structured data

C

The text mentions four different AIS threats. Which type of threat is sabotage? A.Natural and political disasters B.Software errors and equipment failures C.Intentional acts D.Unintentional acts

C

Threats that arise from human carelessness, failure to follow established procedures, and poorly supervised personnel are which type of threat? A.Intentional acts B.Software errors and equipment failures C.Unintentional acts D.Natural and political disasters

C

Check each example of structured data in the list below. A.Photographs of all employees saved in the human resource database B.HTML website data saved on the company's website C.Customer addresses saved in a customer relation database D.Phone numbers of employees saved in a database

C,D

Check each option below that demonstrates when data analytics may not be the correct tool for making a decision. A.When there is a long history of reliable data B.When decisions must be accurate C.When making an ethical decision D.When something is very difficult to measure, such as emotions

C,D

Check good visualization design principles among the four options given. A.Use text and not data visualizations B.Do not use data dashboards C.Simplify the presentation of data. D.Choose the right type of visualization

C,D

Check the likely benefits of using robotic process automation among the four options below. A.RPA is better adapting to changing environments than a human. B.RPA can do more cognitively challenging tasks than a human. C.RPA performs tasks faster than a human. D.RPA will make fewer mistakes for rules based tasks than a human.

C,D

A data owner sends you an e-mail with a file to prepare for analysis. The file contains data from multiple database tables all merged into a single file. There are multiple fields in the file each separated by a "~" symbol. For fields that contain large amounts of text, the file contains a "+" at the beginning and end of the text field. Indicate which of the following best describes (1) the type of file the data owner sent, (2), what the "+" is called, and (3) what the "~" is called. A.Flat file, delimiter, text qualifier B.Relational database file, text qualifier, delimiter C.Relational database file, delimiter, text qualifier D.Flat file, text qualifier, delimiter

D

An analysis of the current profitability of a product line such as Cost-Volume-Profit (CVP) analysis is an example of ____________ analytics. A.prescriptive B.diagnostic C.predictive D.descriptive

D

Asking the right questions involves questions that are ____________. A.mindful B.motivated C.macro (big picture) oriented D.measurable

D

Asking the right questions is the first step of an analytics mindset. Which of the following is not part of the analytics mindset as defined by the accounting firm EY? A.Apply appropriate data analytic techniques B.Extract, transform, and load relevant data C.Interpret and share the results with stakeholders D.Exercise professional skepticism when using data

D

Catalina was reviewing the data imputation formula for missing values in a customer's credit score. She found that two lines of data had the exact same customer name, birthdate, address, and buying history, but they had two different social security numbers. Assuming there was no fraud by the customer, what best describes what Catalina likely found? A.Misfielded data value B.Data threshold violation C.Violated attribute dependency D.Data contradiction error

D

Chibuzo creates a chart to show the percentage of activities in the accounting function have been automated over time. She wants to stress the slow rate of change by the department to adopt automation. What is the purpose of Chibuzo's visualization and what type of chart would be best for this purpose? A.Correlation, scatterplot B.Comparison, bar chart C.Comparison, line chart D.Trend evaluation, line chart

D

Chunhua has been building financial forecasting models for the company for several years. For each model, she saves all the data that could possibly be used in the model, even if she doesn't use all the data in her finished model. She does not document anything about the different items she has saved. When her intern, Minsuh pulls the data, she cannot understand what all the fields mean. How would Minsuh most accurately describe the data? A.The data is now dark data B.The data is not part of the data warehouse C.The data contains metadata D.The data has become a data swamp

D

Extracting zip code from within an address field into a separate field is called _______________. A.concatenation B.divoting C.delimiting D.parsing

D

Following the creation of an ETL process, the following action should be performed. A.Remove commas B.Transform the data C.Create structured data D.Update the data dictionary

D

Indicate which option orders the type of analytic from the one that provides the most value added to an organization to the least value added to the organization. A.Prescriptive, predictive, descriptive, diagnostic B.Predictive, prescriptive, descriptive, diagnostic C.Predictive, prescriptive, diagnostic, descriptive D.Prescriptive, predictive, diagnostic, descriptive

D

Power outages and fluctuations can result in which type of threat? A.Natural and political disasters B.Unintentional acts C.Intentional acts D.Software errors and equipment failures

D

The process of translating complex data analyses into easier to understand terms is ______________________. A.statistical analysis B.data visualization C.data dashboard D.data storytelling

D

Understanding what big data means helps to know what types of questions can be fruitfully examined using data. Big data differs from regular data in four ways, often called the "four V's." Which of the following is not one of the four V's? A.Variety B.Velocity C.Veracity D.Validity

D

Using the number 4 to represent the East division of a football league is an example of ____________________. A.data reduction B.parsing C.consistency D.cryptic data

D

Using which of the following data validation techniques, can the validator estimate a likely error rate in the population of data? A.Advanced testing techniques B.Visual inspection C.Basic statistical tests D.Audit a sample

D

What do the letters in the acronym ETL stand for? A.Enrich, Transcribe, and Launch B.Extract, Transcribe, and Launch C.Enrich, Transform, and Load D.Extract, Transform, and Load

D

What is the definition of a question that is measurable? A.A question that has a defined time horizon for answering. B.A question that should be able to be answered and the answer should cause a decision maker to act. C.A question that is direct and focused to produce a meaningful answer. D.A question that is amenable to data analysis: the inputs are measurable with data.

D

Which of the following techniques is most likely to discover a very large data threshold violation in a dataset containing 10 billion transactions? A.Visual inspection B.Advanced testing techniques C.Audit a sample D.Basic statistical tests

D

While cleaning data, you reduce the dataset to rows with the same values in all columns except one. Most likely you are looking for ____________. A.data duplication B.data imputation errors C.threshold violations D.data contradiction errors

D

While cleaning data, you run a routine to reduce a dataset to rows with all the same values. Most likely you are looking for ____________. A.threshold violation B.data entry errors C.violated attribute dependencies D.data duplication

D

You are tasked with presenting a viz that compares sales for four different products. Which viz is likely most appropriate? A.Pie hart B.Area chart C.Histogram D.Bar chart

D

You are tasked with representing how much of total product sales is represented by each of four product lines. Which viz is most appropriate? A.Bullet chart B.Area chart C.Bar chart D.Treemap

D

You overhear the CFO and the treasurer talking about a cash flow training dataset. You are confident that they are talking about performing which type of analytic? A.Prescriptive B.Diagnostic C.Descriptive D.Predictive

D


संबंधित स्टडी सेट्स

Chapter 8 Valuation Using Income Approach

View Set

The Art of Public Speaking ch. 7 Successful Interviews

View Set

F212: Molecules, Biodiversity, Food and Health

View Set

Chapter 9 International Business

View Set

From "The American Crisis" by Thomas Paine

View Set

SIMULATED EXAMS - MISSED QUESTIONS

View Set

Wei Wei Sun PHSC 101 Final part 2

View Set