AIS Exam 3 ludlum19

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following associations would most likely describe the relationship between an internal agent and an economic event? a. 1:M b. 1:1 c. 0:M d. none of the above

a. 1:M

A ping signal is used to initiate a. Internet protocol spoofing b. a smurf attack c. digital signature forging d. URL masquerading

b. a smurf attack

The primary difference between a LAN and a WAN is a. the transmission technology used b. the geographical area covered by the network c. the type of workstation used d. the size of the company

b. the geographical area covered by the network

The events depicted on an REA diagram are transformed into computer processes while the resources and agents become relational database tables. a. True b. False

b. False

All of the following are advantages of a partitioned database except a. increased user control by having the data stored locally b. deadlocks are eliminated c. partitioning can reduce losses in case of disaster d. transaction processing response time is improved

b. deadlocks are eliminated

Data currency is preserved in a centralized database by a. replicating the database b. using a lockout procedure c. partitioning the database d. implementing concurrency controls

b. using a lockout procedure

Which of the following tables would most likely have a composite key? a. Ship Product b. Take Order c. Cash d. Inventory Ship Link

d. Inventory Ship Link

Which of the following is usually not part of an ERP's core applications? a. OLTP applications b. sales and distribution applications c. business planning applications d. OLAP applications

d. OLAP applications

The 'A' in REA stands for a. allocation b. assets c. apportionment d. agents

d. agents

Which of the following statements is not true? a. In three-tier client server architecture, one tier is for user presentations, one is for database and applications, and the third is for Internet access. b. Client computers are responsible for presenting data to the user and passing user input back to the server. c. The database and application functions are separate in the three-tier model. d. In a typical two-tier client server system, the server handles both application and database duties.

a. In three-tier client server architecture, one tier is for user presentations, one is for database and applications, and the third is for Internet access.

Which of the following is not an example of an economic event? a. Prepare cash disbursements voucher b. Get employee time c. Ship goods d. Receive goods

a. Prepare cash disbursements voucher

Which statement is not true? REA resources are: a. affected by support events b. scarce c. assets d. under the control of agents

a. affected by support events

A digital signature is a. derived from the digest of a document that has been encrypted with the sender's private key b. the computed digest of the sender's digital certificate c. a tool that allows digital messages to be sent over analog telephone lines d. the encrypted mathematical value of the message sender's name

a. derived from the digest of a document that has been encrypted with the sender's private key

Goals of ERP include all of the following except a. improvements of legacy systems b. improved customer service c. reduced production time d. increased production

a. improvements of legacy systems

What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area? a. intranet b. multidrop network c. decentralized network d. LAN

a. intranet

The big bang approach a. is more ambitious and risky than the phased-in approach b. is a popular alternative to the phased-in approach c. reduces the chance of system failure d. all of the above

a. is more ambitious and risky than the phased-in approach

An IP address a. is the unique address that every computer node and host attached to the Internet must have b. is represented by a 64-bit data packet c. defines the path to a facility or file on the web d. is the address of the protocol rules and standards that govern the design of Internet hardware and software

a. is the unique address that every computer node and host attached to the Internet must have

Which of the following is usually not part of an ERP's OLAP applications? a. logistics b. ad hoc analysis c. what-if analysis d. decision support systems

a. logistics

A distributed denial of service (DDoS) attack a. may take the form of either a SYN flood or smurf attack b. is more intensive that a DoS attack because it emanates from single source c. turns the target victims' computers into zombies that are unable to access the Internet d. is so named because it effects many victims simultaneously, which are distributed across the Internet

a. may take the form of either a SYN flood or smurf attack

Which of the following events would be least likely to be modeled in a REA diagram? a. posting accounts payable b. customer inquiries c. sales to a customer d. receiving cash

a. posting accounts payable

Data cleansing involves all of the following except a. summarizing data for ease of extraction b. formatting data from legacy systems c. filtering out or repairing invalid data d. transforming data into standard business terms

a. summarizing data for ease of extraction

In an REA model, events are described from the perspective of a. the organization b. the customer c. the user d. the designer

a. the organization

Modern managers need both financial and nonfinancial information that traditional GAAP-based accounting systems are incapable of providing. a. True b. False

a. True

The deletion anomaly in unnormalized databases a. may result in the loss of important data b. is easily detected by users c. requires the user to perform excessive updates d. complicates adding records to the database

a. may result in the loss of important data

An example of a distributed database is a. partitioned database b. centralized database c. networked database d. all are examples of distributed databases

a. partitioned database

Which statement is not correct? A query language like SQL a. requires user familiarity with COBOL b. is written in a fourth-generation language c. reduces reliance on programmers d. allows users to retrieve and modify data

a. requires user familiarity with COBOL

In a hierarchical model a. the way to access data is by following a predefined data path b. links between related records are implicit c. a member (child) record may have more than one owner (parent) d. an owner (parent) record may own just one member (child) record

a. the way to access data is by following a predefined data path

Which statement is true? a. The higher-end ERP can handle any problems an organization can have. b. ERP systems can be modified using bolt-on software. c. ERPs are infinitely scalable. d. Performance problems usually stem from technical problems, not business process reengineering.

b. ERP systems can be modified using bolt-on software.

Which statements about data warehousing is not correct? a. The data warehouse should be separate from the operational system. b. Normalization is a requirement of databases included in a data warehouse. c. Drill-down is a data-mining tool available to users of OLAP. d. Data cleansing is a process of transforming data into standard form.

b. Normalization is a requirement of databases included in a data warehouse.

Which of the following are characteristics of internal agents? a. They participate in economic events, but do not assume control of the resources. b. They are employees of the company whose system is being modeled. c. They participate in economic events, but not in support events. d. All of the above.

b. They are employees of the company whose system is being modeled.

Most ERPs are based on which network model? a. peer to peer b. client-server c. bus topology d. ring topology

b. client-server

HTTP a. is used to transfer text files, programs, spreadsheets, and databases across the Internet b. controls web browsers that access the web c. is the document format used to produce web pages d. is used to connect to Usenet groups on the Internet

b. controls web browsers that access the web

The 'E' in REA stands for a. estimates b. events c. entities d. economics

b. events

When developing an REA model: a. accounting artifacts are represented as support events b. events are organized in sequence of occurrence c. the same resource is both increased and decreased by the duality association d. link tables are explicitly depicted

b. events are organized in sequence of occurrence

Online transaction processing programs a. are bolt-on programs used with commercially available ERPs b. handle large numbers of relatively simple transactions c. allow users to analyze complex data relationships d. are available in two models—two-tier and three-tier

b. handle large numbers of relatively simple transactions

A virtual private network a. is a password-controlled network for private users rather than the general public b. is a private network within a public network c. defines the path to a facility or file on the web d. is an Internet facility that links user sites locally and around the world

b. is a private network within a public network

NNTP a. is the document format used to produce web pages b. is used to connect to Usenet groups on the Internet c. controls web browsers that access the web d. is used to transfer text files, programs, spreadsheets, and databases across the Internet

b. is used to connect to Usenet groups on the Internet

Supply chain management software a. is typically under the control of external partners in the chain b. links all of the partners in the chain, including vendors, carriers, third-party firms, and information systems providers c. cannot be integrated into an overall ERP d. none of the above

b. links all of the partners in the chain, including vendors, carriers, third-party firms, and information systems providers

The client-server topology a. increases the amount of data that is transmitted between the central file and the network node b. reduces the number of records that must be locked by having the file server perform record searches c. functions only with a ring and bus topology d. eliminates the need for nodes to communicate with each other

b. reduces the number of records that must be locked by having the file server perform record searches

Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology, the central computer manages and controls data communications among the network nodes. a. bus topology b. star topology c. ring topology d. client/server topology

b. star topology

Auditors of ERP systems a. focus on output controls such as independent verification to reconcile batch totals b. are concerned that managers fail to exercise adequate care in assigning permissions c. need not be concerned about segregation of duties because these systems possess strong computer controls d. need not review access levels granted to users because these are determined when the system is configured and never change

b. are concerned that managers fail to exercise adequate care in assigning permissions

Which statement is false? a. The DBMS is special software that is programmed to know which data elements each user is authorized to access. b. The DBMS does not control access to the database. c. During processing, the DBMS periodically makes backup copies of the physical database. d. User programs send requests for data to the DBMS.

b. The DBMS does not control access to the database.

What control maintains complete, current, and consistent data at all information processing units? a. gateway control b. concurrency control c. replication control d. deadlock control

b. concurrency control

All of the following are elements of the DBMS which facilitate user access to the database except a. data definition language b. data access language c. data manipulation language d. query language

b. data access language

The data manipulation language a. transfers data to the buffer area for manipulation b. enables application programs to interact with and manipulate the database c. defines the database to the database management system d. describes every data element in the database

b. enables application programs to interact with and manipulate the database

A table is in second normal form when it is a. free of insert anomalies b. free of partial dependencies c. free of repeating group data d. free of transitive dependencies

b. free of partial dependencies

A table is in first normal form when it is a. free of update anomalies b. free of repeating group data c. free of partial dependencies d. free of transitive dependencies

b. free of repeating group data

Entities are a. data that describe the characteristics of properties of resources b. nouns that are depicted by rectangles on an entity relationship diagram c. sets of data needed to make a decision d. associations among elements

b. nouns that are depicted by rectangles on an entity relationship diagram

In the relational database model all of the following are true except a. data can be extracted from specified rows from specified tables b. only one-to-many relationships can be supported c. a new table can be built by joining two tables d. data is presented to users as tables

b. only one-to-many relationships can be supported

Which duty is not the responsibility of the database administrator? a. to implement security controls b. to design application programs c. to develop and maintain the data dictionary d. to design the subschema

b. to design application programs

Task-data dependency is a. another term for data redundancy b. user's inability to obtain additional information as needs change c. none of the above d. failure to update the files of all users affected by a change

b. user's inability to obtain additional information as needs change

Which statement is least accurate? a. To take full advantage of the ERP process, reengineering will need to occur. b. The big bang approach to ERP implementation is generally riskier than the phased-in approach. c. A common reason for ERP failure is that the ERP does not support one or more important business processes of the organization. d. Implementing an ERP system has as much to do with changing the way an organization does business as it does with technology.

c. A common reason for ERP failure is that the ERP does not support one or more important business processes of the organization.

A message that is made to look as though it is coming from a trusted source but is not is called a. digital signature forging b. URL masquerading c. Internet protocol spoofing d. a denial of service attack

c. Internet protocol spoofing

Which of the following statements is least likely to be true about a data warehouse? a. It may be deployed by organizations that have not implemented an ERP. b. It contains data that are normally extracted periodically from the operating databases. c. It was an original part of all ERP systems. d. It is constructed for quick searching and ad hoc queries.

c. It was an original part of all ERP systems.

Which of the following associations requires a separate link table? a. 1:1 b. 1:M c. M:M d. none of the above

c. M:M

Closed database architecture is a. a data warehouse control that prevents unclean data from entering the warehouse b. a database structure that many of the leading ERPs use to support OLTP applications c. a limitation inherent in traditional information systems that prevents data sharing d. a control technique intended to prevent unauthorized access from trading partners

c. a limitation inherent in traditional information systems that prevents data sharing

The big bang method a. is more ambitious than the phased-in method b. has been associated with many failures c. both a. and b. d. neither a. nor b.

c. both a. and b.

Which of the following statements is correct? The client-server model a. is most effective used with a bus topology b. is more efficient than the bus or ring topologies c. distributes both data and processing tasks to the server's node d. is best suited to the token-ring topology because the random-access method used by this model detects data collisions

c. distributes both data and processing tasks to the server's node

A star topology is appropriate a. for environments where network nodes routinely communicate with each other b. when the central database does not have to be concurrent with the nodes c. for a wide area network with a mainframe for a central computer d. for centralized databases only

c. for a wide area network with a mainframe for a central computer

Packet switching a. is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization. b. combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users. c. is used to establish temporary connections between network devices for the duration of a communication session. d. is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a garbled message.

c. is used to establish temporary connections between network devices for the duration of a communication session.

To physically connect a workstation to a LAN requires a a. bridge b. file server c. network interface card d. multiplexer

c. network interface card

Extracting data for a data warehouse a. cannot be done from flat files b. should only involve active files c. requires that the files be out of service d. all of the above

c. requires that the files be out of service

When assigning foreign keys in a 1:1 association, a. the primary key of each table should be embedded as a foreign key in the related table b. the primary key on the (0,1) side of the relation should be embedded as the foreign key on the (1,1) side c. the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,1) side d. none of the above is true

c. the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,1) side

When assigning foreign keys in a 1:M association, a. the primary key of each table should be embedded as a foreign key in the related table b. the primary key on the (0,M) side of the relation should be embedded as the foreign key on the (1,1) side c. the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,M) side d. none of the above is true

c. the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,M) side

REA diagrams include all of the following entities except a. support events b. internal agents c. users d. economic events

c. users

Which term is not associated with the relational database model? a. tuple b. attribute c. collision d. relation

c. collision

The task of searching the database to locate a stored record for processing is called a. data attribution b. data deletion c. data retrieval d. data storage

c. data retrieval

The advantages of a partitioned database include all of the following except a. user control is enhanced b. response time is improved c. data transmission volume is increased d. risk of destruction of entire database is reduced

c. data transmission volume is increased

A user view a. is the logical abstract structure of the database b. specifies the relationship of data elements in the database c. defines how a particular user sees the database d. presents the physical arrangement of records in a database for a particular user

c. defines how a particular user sees the database

A table is in third normal form when it is a. free of partial dependencies b. free of deletion anomalies c. free of transitive dependencies d. free of repeating group data

c. free of transitive dependencies

Each of the following is a relational algebra function except a. restrict b. join c. link d. project

c. link

Which characteristic is not associated with the database approach to data management? a. the ability to control access to the data b. constant production of backups c. the inability to determine what data is available d. the ability to process data without the help of a programmer

c. the inability to determine what data is available

Which of the following may provide many distinct views of the database? a. the schema b. the internal view c. the user view d. the conceptual view

c. the user view

The formal name for a row in the physical database table is a. link b. attribute c. tuple d. schema

c. tuple

Which of the following is true? a. REA diagram entities are arranged in constellations by entity class. b. ER diagrams present a static picture of the underlying business phenomena. c. Events entity names in REA diagrams are in the verb form. d. All of the above are true statements.

d. All of the above are true statements.

Which of the following is not a risk associated with ERP implementation? a. opposition to changes in the business culture b. choosing the wrong ERP c. choosing the wrong consultant d. All of these are risks associated with ERP implementations.

d. All of these are risks associated with ERP implementations.

Which of the following is a reason that data warehouses are created and maintained separately from operational databases? a. The data is used in different ways that requires it to be physically separate. b. A separate centralized data warehouse is an effective means of collecting data from diverse sources. c. No ERP system incorporates data warehousing capability. d. Audit controls require that data for management analysis be kept separate from transaction data

d. Audit controls require that data for management analysis be kept separate from transaction data

Which of the following statements is correct about TCP/IP? a. It controls web browsers that access the Internet. b. It is a low-level encryption scheme used to secure transmissions in HTTP format. c. It is the file format used to produce web pages. d. It is the basic protocol that permits communication between Internet sites.

d. It is the basic protocol that permits communication between Internet sites.

Which of the following statements is correct? a. The REA model requires that phenomena be characterized in a manner consistent with the development of a single user view. b. The REA model requires that phenomena be characterized in a manner consistent with the development of a selected user view. c. The REA model requires that phenomena be characterized in a manner consistent with the development of a unique user view. d. The REA model requires that phenomena be characterized in a manner consistent with the development of a multiple user view.

d. The REA model requires that phenomena be characterized in a manner consistent with the development of a multiple user view.

Which statement about ERP installation is least accurate? a. ERP fails because some important business process is not supported. b. For the ERP to be successful, process reengineering must occur. c. The phased-in approach is more suited to diversified businesses. d. When a business is diversified, little is gained from ERP installation.

d. When a business is diversified, little is gained from ERP installation.

A data mart is a. another name for a data warehouse b. an enterprise resource planning system c. a database that provides data to an organization's customers d. a data warehouse created for a single function or department

d. a data warehouse created for a single function or department

Core applications are a. sales and distribution b. business planning c. shop floor control and logistics d. all of the above

d. all of the above

The setup of a data warehouse includes a. modeling the data b. extracting data from operational databases c. cleansing the data d. all of the above

d. all of the above

All of the following are examples of economic events except a. receiving raw materials from a supplier b. disbursing cash for inventories received c. shipping product to a customer d. checking a customer's credit prior to processing a sales order

d. checking a customer's credit prior to processing a sales order

Data warehousing processes do not include a. modeling data b. extracting data c. transforming data d. condensing data

d. condensing data

Legacy systems are a. advanced systems without a data warehouse b. stable database systems after debugging c. old manual systems that are still in place d. flat file mainframe systems developed before client-server computing became standard

d. flat file mainframe systems developed before client-server computing became standard

In a star topology, when the central site fails a. individual workstations can communicate with each other b. the functions of the central site are taken over by a designated workstation c. individual workstations cannot function locally and cannot communicate with other workstations d. individual workstations can function locally but cannot communicate with other workstations

d. individual workstations can function locally but cannot communicate with other workstations

IP spoofing a. is a temporary phenomenon that disrupts transaction processing and resolves itself when the primary computer completes processing its transaction and releases the IP address needed by other users b. combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributed randomly among the targeted users c. is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session d. is a form of masquerading to gain unauthorized access to a web server

d. is a form of masquerading to gain unauthorized access to a web server

In a REA diagram each economic event is always a. linked to two internal agents b. linked to at least two resource entities c. linked to two external agents

d. linked to another economic event

The concept of duality means that a REA diagram must consist of: a. two events, one of them economic and the other support b. two agents, one of them internal and the other external c. two resources, one increased and the other decreased by the same event d. none of the above

d. none of the above

The 'R' in REA stands for a. ratios b. relationships c. reserves d. resources

d. resources

Sniffer software is a. an illegal program downloaded from the Internet to sniff passwords from the encrypted data of Internet customers b. used by bus topology intranets to sniff for a carrier before transmitting a message to avoid data collisions c. software used by malicious websites to sniff data from cookies stored on the user's hard drive d. used by network administrators to analyze network traffic

d. used by network administrators to analyze network traffic

Which of the following is a level of the database that is defined by the data definition language? a. user view b. schema c. internal view d. all are levels or views of the database

d. all are levels or views of the database

Users access the database a. by constantly interacting with systems programmers b. all of the above c. by developing operating software d. by direct query

d. by direct query

In the relational database model a. data is represented as a tree structure b. the user perceives that files are linked using pointers c. relationships are explicit d. data is represented on two-dimensional tables

d. data is represented on two-dimensional tables

Which procedure will prevent two end users from accessing the same data element at the same time? a. data redundancy b. none of the above c. data replication d. data lockout

d. data lockout

Data concurrency a. occurs when a deadlock is triggered b. is a security issue in partitioned databases c. may result in data lockout d. is implemented using timestamping

d. is implemented using timestamping

The update anomaly in unnormalized databases a. may result in the loss of important data b. often results in excessive record insertions c. complicates adding records to the database d. occurs because of data redundancy

d. occurs because of data redundancy

A description of the physical arrangement of records in the database is a. the subschema b. the external view c. the conceptual view d. the internal view

d. the internal view

A replicated database is appropriate when a. there is no risk of the deadlock phenomenon b. there is minimal data sharing among information processing units c. most data sharing consists of read-write transactions d. there exists a high degree of data sharing and no primary user

d. there exists a high degree of data sharing and no primary user


संबंधित स्टडी सेट्स

Test 1 Collocations with beat/catch/earn/hold/keep/lose/miss/pass/play/save/spend/win

View Set

Ch. 5 Cultural & Spiritual assessment

View Set

Module 5 - Chapter 7 - Equity Markets and Stock Valuation

View Set

Business: Understanding the role and importance of stakeholders

View Set

Ch. 1 & 2 Intro to Micro & Cell biology of Prokaryotes

View Set

Principles of Economics Exam 1 Quiz 1-4

View Set

IT Essentials Final Exam (Chapters 1-9 V 7.0) part 3

View Set