AIS Helpful Cards

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is XBRL

-extensible business reporting language -an open, global standard for exchanging financial reporting inflormation

Which of these project costs would be considered to be acquisition costs and which would be considered to be operating costs? 1.Hardware replacement 2.Help desk support 3.Software upgrade 4.Development 5.Initial training 6.Ongoing training 7.Maintenance contracts 8.Project management

1,2,3,6,7: Operating costs 4,5, 8: acquisition costs

If an IT project costs $150,000 and returns net cash flows of $100,000 per year, what is the payback period? 1 year 1.5 years 2 years 2.5 years None of the choices are correct.

1.5 years

A rule requiring 100 percent planning of all tasks, including all of the internal, external, and interim tasks.

100% Rule

A rule suggesting that if a project is more than 15 percent over budget or 15 percent off the planned schedule, it will likely never recoup the time or cost necessary to be considered successful. At this point, a decision needs to be made on if or how to proceed.

15-15 Rule

If an IT project costs $150,000 and returns net cash flows of $100,000 per year, what is the accounting rate of return? 33 percent 50 percent 67 percent 75 percent None of the choices are correct.

67 percent

According to the 2015 Standish Report, the percentage of IT projects that either fail or are challenged is: 71 percent. 52 percent. 29 percent. 19 percent.

71 percent.

According to estimates considered in the chapter, up to what percentage of a data analyst's time is spent cleaning (or scrubbing) the data to be ready for analysis? 90% 80% 30% 10%

90%

Which organization created the Reporting on an Entity's Cybersecurity Risk Management Program and Controls: Attestation Guide in 2017? SEC AICPA US Congress Department of Homeland Security

AICPA

The process of cleaning and scrubbing the data before data analysis can take place.

AMPS: Master the data

Delivering the findings to the decision maker of which firms our company should approve for credit.

AMPS: Share the story

The planning phase should recognize the capability and capacity of the firm to deliver solutions within the stated planning timeframe.

Achievability

XBRL style sheets: Add presentation elements to instance documents. Add stylized notation to instance documents. Provide technical data to pull appropriate data elements. Provide the appropriate XBRL taxonomy to the instance documents.

Add presentation elements to instance documents.

The planning phase should support and complement the business strategy of the firm.

Alignment

Select a correct statement describing encryption or hashing process. Encryption process is reversible. Hashing results are called message digests. Hashing process is used to obtain a digital signature. Encryption process is to maintain confidentiality. All of the choices are correct.

All of the choices are correct.

Which of the following can be used to quantify benefits on an IT investment? Gathering expert opinions Benchmarking against competitor performance Comparing against the probability of future benefits if investment is forgone Conducting simulations All of the choices are correct.

All of the choices are correct.

Which of the following is a question that companies should answer when preparing the business case for an IT investment? How much will it cost? What are the risks? What are the alternatives? How will success be measured? All of the choices are correct.

All of the choices are correct.

Which of the following are examples of direct costs of acquiring and implementing an IT investment? Cost of hiring consultants to assess system requirements Personnel costs of the project team Training costs of employees who will use the system Cost of new computer hardware necessary to run the system All of the choices are direct costs of acquiring and implementing an IT investment.

All of the choices are direct costs of acquiring and implementing an IT investment.

Which of the following is not an example of benefits of an IT investment? Increased revenues from access to new markets Decreased costs from automating manual tasks Facilitating employee work-from-home arrangements Allowing compliance with new federal regulations Reducing the number of inventory count errors All of these are benefits of an IT investment.

All of these are benefits of an IT investment.

Which of the following describes the difference between artificial intelligence, machine learning, and deep learning? Machine learning is a subset of AI. Deep learning is a subset of machine learning. AI encompasses machine learning and deep learning. All of these choices are correct.

All of these choices are correct.

Which of the following fields is one of the foundations of the artificial intelligence field? Philosophy. Neuroscience. Cybernetics. Psychology. All of these choices are correct.

All of these choices are correct.

Which of the following technologies are used in blockchain? hashing cryptography smart contracts for business rules All of these choices are correct.

All of these choices are correct.

Tableau supports which of the following joins between tables? Inner join (blue only highlights the overlapping part of the circles). Left join (blue highlights the left circle). Right join (blue highlights the right circle). Full outer join (blue highlights both circles). All of these.

All of these.

Which of the following is a way to use a table for basic data analytics? Add a Total Row to the bottom of the table. Use column filters to view summary information. Chart information is the total rows. All of these.

All of these.

Which of the following best describes the Show Me tool in Tableau? Allows easy selection of the relevant visualization options. Helps users select the best formatting for their visualization. Provides context-sensitive help. None of these.

Allows easy selection of the relevant visualization options.

Which of the following best describes the purpose of Data View in Power BI? Allows editing, formatting, and calculating new fields. Allows setting or editing relationships among tables. Allows creating or editing visualizations. None of these.

Allows editing, formatting, and calculating new fields.

The phase of the SDLC that involves a complete, detailed analysis of the systems needs of the end user as well as a proposed solution.

Analysis phase

The A in the AMPS model stands for which of the following? Ask the Question Answer the Question Address the Question Ask the Decision Maker

Ask the Question

What is the order of events for the economic justification process? Identify potential solutions ➞ Assess business requirements ➞ Estimate costs ➞ Assess value Assess business requirements ➞ Estimate costs ➞ Identify potential solutions ➞ Assess value Identify potential solutions ➞ Estimate benefits ➞ Assess business requirements ➞ Assess value Assess business requirements ➞ Identify potential solutions ➞ Estimate costs ➞ Assess value None of the choices are correct.

Assess business requirements ➞ Identify potential solutions ➞ Estimate costs ➞ Assess value

What is the first step in the economic justification process? Multiple Choice Identify potential solutions. Assess the value proposition. Assess business requirements. Estimate costs. All of the choices are correct.

Assess business requirements.

To prevent repudiation in conducting e-business, companies must be able to authenticate their trading partners. Which of the following encryption methods can be used for authentication purpose? Symmetric-key encryption method Asymmetric-key encryption method Both symmetric-key and asymmetric-key encryption methods are good for authentication.

Asymmetric-key encryption method

Select a correct statement regarding encryption methods. Most companies prefer using asymmetric-key encryption method for data transmission. Symmetric-key encryption method is used to authenticate trading partners. Only asymmetric-key encryption method can ensure confidentiality. Asymmetric-key encryption method is used to create digital signatures.

Asymmetric-key encryption method is used to create digital signatures.

The AICPA developed standards called ADS for the formatting of data files and fields typically needed to support an external audit in a given financial business process area. What does the acronym ADS stand for? Accounting Doctoral Scholars Accounting Data Standards Audit Data Standards Auditor Data Standards

Audit Data Standards

A standard format for data files and fields typically needed to support an external audit.

Audit data standards

Posting the amount of a sale to a customer account that does not exist.

Authorization (for sales transactions) or the use of a validity check on the customer number.

Which duties should be completed by different people to achieve strong separation of duties? Journalizing and posting Receivables and payables Authorization, custody and recordkeeping Document numbering and document completion

Authorization, custody and recordkeeping

The resulting plan that comes out of the planning phase should be communicated widely.

Awareness

Costs of implementation should be commensurate with the tangible and intangible benefits expected to be realized.

Benefits realization

Datasets that are too large and complex for businesses' existing systems to handle using their traditional capabilities to capture, store, manage, and analyze these datasets.

Big data

Activities required to keep a firm running during a period of displacement or interruption of normal operations

Business continuity management

Which of the following would be considered indirect acquisition costs when estimating costs associated with an IT initiative? Networking and communications Business disruption Ongoing training Software upgrades None of the choices are correct.

Business disruption

The computer-based technique to provide real-time information on business processes is called: Business intelligence. Data Warehouse. Digital Dashboard. XBRL.

Business intelligence.

After identifying relevant risks, the project team often employs risk-minimization techniques to lessen the probability or impact of the risk. Match the description/example of the risk mitigation technique with the type of risk being mitigated. Give employees adequate incentive to use the new IT.

Change risk

Entering the contract number of a critical contract as 13688 instead of 16388, which is a serious mistake for the company.

Check digit verification

Which of the following is not an important consideration when developing and presenting a visualization? Choosing the right visualization tool. Choosing the right chart for the information. Keeping the user/decision maker in mind. Directing user to the most important information.

Choosing the right visualization tool.

After creating tables in Excel, which of the following would you do to create table relationships? Click Insert > Tables > Recommended Pivot Tables. Click Data > Data Tools > Relationships. Click Table Design > Tools > Summarize with Pivot Table. Click Formulas > Function Library > Relationships. None of these.

Click Data > Data Tools > Relationships.

To change formatting (such as changing a general number to currency) for the field dragged to the Σ Values area, you would do which of the following? Click on the field name and select Value Field Settings from the popup menu. Go back to the original table and set the format for the field. You can't change formatting at this point, so do nothing. None of these.

Click on the field name and select Value Field Settings from the popup menu.

A service model in which a third-party service provider offers computing resources, including hardware and software applications, to cloud users over the Internet, and the service provider charges on a per-user basis

Cloud computing

Which of the following can be considered as a good alternative to back up data and applications? Continuous monitoring Business continuity management Cloud computing Disaster recovery planning

Cloud computing

Which of the following is not a common problem with visualizations? Comparison of performance metrics. Too many lines. All slices of similar size. Too much detail and lack of clear relationships. Bins too large to show detail.

Comparison of performance metrics.

Internal Databases that might be included in a data warehouse would not include: General Ledger. Competitor Information. Sales Information. Purchases Information.

Competitor Information.

Approving a customer order without the customer's address so the order was not shipped on time.

Completeness check

After starting Tableau, which of the following is the first step in your data analysis? Connect to the data. Set relationships between worksheets. Drag Dimensions to Shelves. Create calculated fields. None of these.

Connect to the data.

The organization deploys control activities through policies that establish what is expected and procedures that put policies into place.

Control activities

Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.

Control environment

The organization holds individuals accountable for their internal control responsibilities in the pursuit of objectives.

Control environment

Installing an accounting system that supports international financial standards will lower the cost when international financial standards are required.

Cost avoidance

A supply chain system will help us source cheaper sources of raw materials to build our projects.

Cost savings

Which of the following are not examples of operating costs for an IT investment? Multiple Choice Costs of routine hardware replacements over time Cost of contract for help desk support Costs of disposal of electronics at end of life Costs of software license renewals All of the choices are examples of operating costs.

Costs of disposal of electronics at end of life

Which term is used to describe the science of examining raw data, removing excess noise from the dataset, and organizing the data with the purpose of drawing conclusions for decision making? Big Data Data Analytics Information Analytics Extract, Transform and Load

Data Analytics

A subset of a data warehouse for a specific purpose is called a: Small Data Warehouse. Data Mart. Data Convenience Store. Business Intelligence.

Data Mart.

A subset of the information from the data warehouse to serve a specific purpose. Data mart Decision support system Data warehouse business intelligence

Data mart

Which of the following is the best description of a data visualization? Data visualizations require an analytics mindset. Each data analytics software product includes its own data visualization tool. Data visualizations are graphical representations that present information to decision makers. Data visualization tools include Excel, Tableau, Power BI.

Data visualizations are graphical representations that present information to decision makers.

A collection of information gathered from an assortment of external and operational (i.e, internal) databases to facilitate reporting for decision making and business analysis. Data mart Decision support system Data warehouse business intelligence

Data warehouse

A computer-based information system that facilitates business decision-making activities. Data mart Decision support system Data warehouse business intelligence

Decision support system

Which type of analytics would be associated with summarizing what happened in the past? Descriptive Prescriptive Diagnostic Predictive

Descriptive

Process of summarizing accounts receivable by how long it has been outstanding.

Descriptive analysis

The phase of the SDLC that involves describing in detail the desired features of the system that were uncovered in the analysis phase.

Design phase

Which phase of the systems development life cycle would include describing in detail the desired features of the system? Planning phase Maintenance phase Design phase Implementation phase Analysis phase

Design phase

Which type of analytics addresses "Why did it happen"? Descriptive Prescriptive Diagnostic Predictive

Diagnostic

Process of determining how separation of duties was violated at the company.

Diagnostic Analysis

(CPA exam, adapted) An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing? System hardware policy System security policy Internal control policy Disaster recovery plan Supply chain management policy

Disaster recovery plan

A clearly defined and documented plan that covers key personnel, resources including IT infrastructure and applications, and actions required to be carried out in order to continue or resume the systems for critical business functions

Disaster recovery planning

A process that identifies significant events that may threaten a firms operations and outline the procedures to ensure that the firm will resume operations if such events occur

Disaster recovery planning

XBRL Instance Documents include: Underlying technical details of XBRL. Presentation elements of XBRL. Definitions of each key data element of XBRL. Document containing XBRL elements.

Document containing XBRL elements.

Once you connect to the data source in Tableau, what is the next step (assuming the data source includes multiple tables)? Drag the desired tables to the canvas. Set the primary and foreign keys in each table. Go to your first worksheet to create a visualization. None of these.

Drag the desired tables to the canvas.

Comparing encryption with hashing, which one of the following is correct? Hashing process is reversible. Encryption is used to ensure data integrity. Hashing results are large data. Encryption results are called cyphertext.

Encryption results are called cyphertext.

If the AI application predicts three classifications, how may rows would be in the confusion matrix to summarize results? Only 1. Two or more. Exactly 2. Exactly 3.

Exactly 3.

Consulting with a seasoned consultant to establish a likely benefit

Expert Opinion

Compare and contrast the results with projects of competitors or similar firms

External Benchmarks

Which of the following is not a component of COSO ERM? Event identification External environment Internal control evaluation External environment and Internal control evaluation

External environment and Internal control evaluation

The acronym, ETL, in the process of readying data for use in data analysis refers to what three words? Extrapolate, Transform and Lift Extrapolate, Transpose and Load Extract, Transform and Load Extract, Transform and Lift

Extract, Transform and Load

A major reason of internal controls implemented for an information system is to provide perfect assurance that the goals of each business process are achieved. True or False

False

Using redundant units to provide a system with the ability to continue functioning when part of the system fails

Fault tolerance

Which of the following statements is correct? SOC 1 reports provide the evaluations on a broader set of controls implemented by the service provider. Fault tolerance uses redundant units to provide a system with the ability to continue functioning when part of the system fails. A spam will send a network packet that appears to come from a source other than its actual source. Multifactor authentication is less secure than requiring a user always entering a password to access a network.

Fault tolerance uses redundant units to provide a system with the ability to continue functioning when part of the system fails.

Which of the following is not a category of IT initiative risk? Alignment Technological Financial misstatement Solution All of the choices are examples of IT initiative risk.

Financial misstatement

XBRL GL offers an extensible, multinational solution that can exchange the data required by internal finance, accountants, and creditors. Flexibility System independence reporting independence consolidation

Flexibility

What is the major difference between the proof of authority (PoA) consensus algorithm and proof of work (PoW) consensus algorithm? For PoA, validator identities are known. For PoW, smaller number of validators is required. For PoW, only a select group of participants in the network is creating blocks. For PoA, all participants must compete to gain the consensus as the validator.

For PoA, validator identities are known.

How many copies of the ledger are in a blockchain network with 4 participating nodes? One Two Three Four

Four

A data warehouse may include a: Digital Dashboard. XBRL style sheet. General Economic Information. iPads and iPhones.

General Economic Information.

A message digest is the result of hashing. Which of the following statements about the hashing process is true? It is reversible. Comparing the hashing results can ensure confidentiality. Hashing is the best approach to make sure that two files are identical. None of the choices are true.

Hashing is the best approach to make sure that two files are identical.

Bill is responsible for custody of the finished goods in the warehouse. If his company wishes to maintain strong internal control, which of the following responsibilities are incompatible with his primary job? He is responsible for the company's fix asset control ledger. He is responsible for receiving of goods into the warehouse. He is responsible for the accounting records for all the receipts and shipments of goods from the warehouse. He is responsible for issuing goods for shipment.

He is responsible for the accounting records for all the receipts and shipments of goods from the warehouse.

Mining does not exist in Multiple Choice Bitcoin Ethereum Hyperledger None of these choices is correct.

Hyperledger

Which statement is false? Each block of Bitcoin takes about 10 minutes to be added to the blockchain Ethereum uses smart contract Corda is an open source blockchain Hyperledger is developed for the banking industry

Hyperledger is developed for the banking industry

(CISA exam, adapted) To ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the receive message? Private Public I II Both I and II Neither I nor II

I

The phase of the SDLC that involves development, testing, and implementation of the new proposed system.

Implementation phase

The organization obtains or generates and uses relevant, quality information to support the functioning of internal control.

Information and communication

Which of the following is considered a control environment factor by the COSO definition of internal control? Control objectives Integrity and ethical values Reasonable assurance Risk assessment

Integrity and ethical values

Which of the following is the best description of artificial intelligence? Sophia the robot developed by Hanson Robotics. A broad field in data analytics. Intelligence exhibited by machines rather than humans. The use of technology to support decision making.

Intelligence exhibited by machines rather than humans.

Which of the following best describes the purpose of the slicer for pivot tables? It sorts the pivot table. It produces grand totals for the data in the pivot table. It filters the output of the pivot table. None of these.

It filters the output of the pivot table.

Regarding GDPR, which of the following statements is/are correct? It is a regulation enforced by EU. It is to protect EU citizens' personal data. It is not relevant to the companies in the U.S. It is a regulation enforced by EU and it is to protect EU citizens' personal data. It is a regulation enforced by EU, it is to protect EU citizens' personal data and it is not relevant to the companies in the U.S.

It is a regulation enforced by EU and it is to protect EU citizens' personal data.

The IFAC suggested 10 core principles of effective information technology planning. Which of the following is not one of those 10 core principles? Reassessment Justifiable cost Achievability Accountability

Justifiable cost

Which of the following best describes machine learning? Machine learning is a technique by which a software model is trained using data. Machine learning involves a computer's ability to learn from specific instructions. Machine learning uses complex, multi-layer neural networks. None of these choices is correct.

Machine learning is a technique by which a software model is trained using data.

The final phase of the SDLC that includes making changes, corrections, additions, and upgrades (generally smaller in scope) to ensure the system continues to meet the business requirements that have been set out for it.

Maintenance phase

The planning phase should provide a means to measure and monitor project performance and a means of communicating success to stakeholders both inside and outside the firm.

Measurable performance

Ebay may use business intelligence to: Track the cost of iPhones on its website. Monitor the price of iPads at Amazon. Track the cost of their airplane fuel. Monitor prices on competitive routes.

Monitor the price of iPads at Amazon.

The organization evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate.

Monitoring activities

Which of the following would be considered direct acquisition costs when estimating costs associated with an IT initiative? Networking and communications. Business disruption. Employee downtime. Help desk support. None of the choices are correct.

Networking and communications.

The stated advantages of XBRL GL do not include: Reporting independence. System independence. Neutrality. Flexibility.

Neutrality.

Which of the following is a not an example of a complementary change necessary to allow an IT initiative to achieve its goals? Outsource the IT initiative. Retrain employees. Redefine job descriptions. Provide incentives for employees to make the change successfully. None of the choices are correct.

Outsource the IT initiative.

The phase of the SDLC that summarizes the business needs with a high-level view of the intended project.

Planning phase

Which phase of the systems development life cycle summarizes the business needs with a high-level view of the intended project? Analysis phase Maintenance phase Design phase Planning phase Implementation phase

Planning phase

Which phase of the systems development life cycle would include a feasibility analysis? Planning phase Design phase Implementation phase Analysis phase

Planning phase

Which type of analytics would be associated with forecasting future sales amounts for a company? Descriptive Prescriptive Diagnostic Predictive

Predictive

Which type of analytics would be associated with finding the sales amount needed to break even? Descriptive Prescriptive Diagnostic Predictive

Prescriptive

After identifying relevant risks, the project team often employs risk-minimization techniques to lessen the probability or impact of the risk. Match the description/example of the risk mitigation technique with the type of risk being mitigated. Ensure active top management support for the project.

Project risk

What type of IT initiative risk is it if top management does not have active support for the project? Financial risk Alignment risk Technological risk Project risk Solution risk

Project risk

Which member of the project team will take responsibility for the success of the project? IT lead Project manager Project sponsor CEO None of the choices are correct

Project sponsor

Which edit check compares entered data to a predetermined acceptable upper and lower limit? Range check Valid check Field check Sequence check

Range check

Sophisticated financial analysis comparing the probability of achieving expected benefits

Real Option Theory

An intern's pay rate was entered as $150 per hour, not $15 per hour.

Reasonableness check

The plan should be periodically reassessed to ensure it is relevant to the evolving business strategy of the firm.

Reassessment

To ensure the data sent over the Internet are protected, which of the following keys is required to encrypt the data (before transmission) using an asymmetric-key encryption method? Receiver's private key Sender's public key Receiver's public key Sender's private key

Receiver's public key

The overall scope of the planning phase should be established to facilitate formulation of effective ways to address the business needs.

Relevant scope

An appropriate planning horizon should be developed.

Relevant timeframe

Which is least likely to be provided by an application control? Accuracy Completeness Reliability Authorization

Reliability

Which of the following is not a metric used to assess the performance of a model? Precision. Reliability. Accuracy. Recall. None of these choices is correct.

Reliability.

Under COSO ERM framework, which of the following objectives involves parties external to the organization? Strategic objectives Compliance objectives Operation objectives Reporting objectives

Reporting objectives

The new system will be able to identify additional products that customers might be interested in.

Revenue enhancement

Adding tracking information to shipments was important to not lose sales to competitors.

Revenue protection

The organization considers the potential for fraud in assessing risks to the achievement of objectives.

Risk assessment

Avoiding, accepting, reducing and sharing are components of _____ in Enterprise Risk Management? Risk response Risk assessment Control activities Communication and monitoring

Risk response

Which of the following groups/laws was the earliest to encourage auditors to incorporate fraud examination into audit programs? COSO PCAOB COBIT Sarbanes-Oxley Act SAS No. 99

SAS No. 99

Which group required the use of XBRL by all of its members? NASDAQ. NASCAR. SEC. IRS.

SEC.

Which term defines the broadening of a project that occurs after the project begins? Project planning Scope creep Cost overrun 15-15 rule None of the choices are correct

Scope creep

To convert raw data to a table in Excel, you select any cell within the data and then do which of the following? Select Insert > Tables > Table Select Data > Outline > Group Select View > Get External Data > From Access Select Insert > Tables > Pivot Table

Select Insert > Tables > Table

Which of the following is not a common step in preparing data and developing visualizations? Get data. Set relationships among tables. Select attributes for visualizations. Select the visualization tool.

Select the visualization tool.

To authenticate the message sender in an asymmetric-key encryption system, which of the following keys is required to decrypt the received message? Receiver's public key Sender's public key Sender's private key Receiver's private key

Sender's public key

Software that allows you to consider the impact under a variety of assumptions

Simulation

A customer entering too many characters into the five-digit zip code while making an online purchase, causing the server to crash.

Size check

After identifying relevant risks, the project team often employs risk-minimization techniques to lessen the probability or impact of the risk. Match the description/example of the risk mitigation technique with the type of risk being mitigated. Use sensitivity analysis to consider likely alternative benefit levels.

Solution risk

Any developer can create import and export routines to convert information from any system to XBRL GL format. Flexibility System independence reporting independence consolidation

System independence

After identifying relevant risks, the project team often employs risk-minimization techniques to lessen the probability or impact of the risk. Match the description/example of the risk mitigation technique with the type of risk being mitigated. Ask Microsoft to demonstrate that its software can meet the system requirements.

Technological risk

What type of IT initiative risk is it if hardware/software vendors do not meet system requirements? Alignment risk Financial risk Solution risk Technological risk Project risk

Technological risk

Which of the following best describes supervised learning? The computer discovers patterns in the data. The model discerns how elements of the dataset are alike. The output is a known set of values to predict from the input. None of these choices is correct.

The output is a known set of values to predict from the input.

Three factors that constrain information technology and other projects: cost, scope, and time.

Triple Constraint

Batch Processing is the aggregation of several business events over a set period of time with eventual processing of the related data (periodic processing). True or False

True

Which one of the following vulnerabilities would create the most serious risk to a firm? Employees writing instant messages with friends during office hours Unauthorized access to the firm's network Employees recording passwords in Excel files Using open source software (downloaded for free) on the firm's network

Unauthorized access to the firm's network

A device using battery power to enable a system to operate long enough to back up critical data and shut down properly during the loss of power

Uninterruptible power supply

What is fault tolerance? A policy allowing employees to make mistakes Using redundant units to continue functioning when a system is failing An application that can detect mistakes and correct mistakes automatically Two of the choices are correct.

Using redundant units to continue functioning when a system is failing

Big Data is often described by the four V's, or Volume, Velocity, Veracity and Variety Volume, Velocity, Volatility and Veracity Volume, Volatility, Variability, and Variety Volume, Volatility, Veracity, and Variability

Volume, Velocity, Veracity and Variety

Which of the following is not one of the five basic questions that machine learning applications answer? What data should I use? What should I do next? How are these alike? Is it different?

What data should I use?

The process of identifying all tasks needed to complete a project.

Work Breakdown Structure

A document containing XBRL elements. XBRL instance document XBRL style sheet XBRL taxonomy XBRL specification

XBRL instance document

Provides the underlying technical details of what XBRL is and how it works. XBRL instance document XBRL style sheet XBRL taxonomy XBRL specification

XBRL specification

Adds presentation elements to XBRL instance documents to make them more readable to people. XBRL instance document XBRL style sheet XBRL taxonomy XBRL specification

XBRL style sheet

Defines and describes each key data element (e.g., total assets, accounts payable, net income, etc.). XBRL instance document XBRL style sheet XBRL taxonomy XBRL specification

XBRL taxonomy

To link tables in Excel, you do which of the following? Pick the table with the foreign key first. Pick the related lookup table with the primary key second. Link the column with the foreign key to the column with the primary key. You would do all of these.

You would do all of these.

In this chapter, projects are defined as: merging two databases into one turning raw talent into an NFL-quality quarterback. turning blueprints from an architect into a completed building. a series of tasks performed in a defined sequence.

a series of tasks performed in a defined sequence.

Identify the main components of vulnerability management and assessment. a. Prioritize vulnerabilities b. Design a risk response plan c. monitor vulnerabilities d. establish policy and requirements e. identify vulnerabilities

a,e: Vulnerability assessment b-d: Vulnerability management

Data Analytics can be disaggregated into four steps as part of the AMPS. Which of these AMPS processes would be considered mastering the data [or ETL (extract, transform, and load)] or performing the analysis? a. Removing extraneous data and noise. b. Looking for trends in the data that might predict new sales opportunities. c. Finding the necessary data from the financial reporting system to give to the external auditor for analysis. d. Performing test of internal controls by the external auditor. e. Considering Champaign, Illinois, weather patterns to predict corn production in the immediate area. f. Consolidating large volumes of data from multiple sources and platforms.

a. ETL b. Analysis c. ETL d. Analysis e. Analysis f. ETL

Identify each of the following internal controls as a primarily preventive, detective, or corrective control. a. Limit access to petty cash funds. b. Reconcile the petty cash fund before replenishing it. c. Require two signatures on checks above a specified limit. d. Enable hidden flags or audit trails on accounting software. e. Examine credit card statements and corresponding receipts each month, independently, to determine whether charges are appropriate. f. Keep checks in a locked box or drawer and restrict the number of employees who have access to the key. g. Back up accounting records daily.

a. Preventive control b. Detective control c. Preventive control d. Detective control e. Detective control f. Preventive control g. Corrective control

Match the following internal controls with the categories of control activities. a. Separate handling cash (receipt and deposit) functions from record-keeping functions (recording transactions in the accounts receivable subsidiary ledger). b. Require purchases, payroll, and cash disbursements to be authorized by a designated person. c. Require accounting department employees to take vacations. d. Separate purchasing functions from payables functions. e. Ensure that the same person isn't authorized to write and sign a check. f. When opening mail, endorse or stamp checks "For Deposit Only". g. Periodically reconcile the incoming check log against deposits. h. Require supervisors to approve employees' time sheets before payroll is prepared. i. List customer checks on a log before turning them over to the person responsible for depositing receipts.

a. Segregation of duties b. Authorization c. Independent verification d. Segregation of duties e. Segregation of duties f. Access control g. Independent verification h. Authorization i. Accounting documents and records

Match the descriptions with each encryption method. a. Good for large data sets b. slow in processing c. Convenient for key distribution and key management d. Each user has a public key and a private key e. Good for authentication

a. Symmetric-key encryption b-e. Asymmetric-key encryption

Match these definitions with either of the four Vs to describe Big Data: a. Unstructured and unprocessed data, such as comments in social media, emails, global positioning system measurements, etc. b. The massive amount of streaming data involved c. Data coming in at fast speeds or in real time, such as streaming videos and news feeds d. Opinions or facts e. Data with a lot of missing observations f. Stock market data that updates every 5 seconds g. Financial statement data that appears in tables h. All Twitter data from 2021

a. Variety b. Volume c. velocity d. veracity e. veracity f. velocity g. variety h. volume

Projects are considered challenged if they: are completed early. are delivered but never used. are canceled prior to completion. are late, are over budget, or do not have the required features and functions.

are late, are over budget, or do not have the required features and functions.

A computer-based technique for accumulating and analyzing data from databases and data warehouses to support managerial decision making. Data mart Decision support system Data warehouse business intelligence

business intelligence

XBRL GL can be used to combine the operations of multiple organizations. Flexibility System independence reporting independence consolidation

consolidation

Business continuity management is a preventive control. detective control. corrective control. Two of the choices are correct.

corrective control.

Disaster recovery plan is a preventive control. detective control. corrective control. Two of the choices are correct.

corrective control.

XBRL stands for: XML Business Reporting Language. eXtensible Business Reporting Language. eXcellent Business Reporting Language. eXcellent Business Reporting and Languages.

eXtensible Business Reporting Language.

Incentive to commit fraud usually will include all of the following, except: alcohol, drug, or gambling addiction. financial pressure. personal habits and lifestyle. feelings of resentment. inadequate segregation of duties.

inadequate segregation of duties.

A digital certificate: is a trusted entity to certify and revoke Certificate Authorities (CA). is used to certify public-key and private-key pairs. ensures that the symmetric-key encryption method functions well. indicates that the subscriber identified has sole control and access to the private key.

indicates that the subscriber identified has sole control and access to the private key.

What is the blockchain analogous to? messaging text file ledger code executable

ledger

The 100% rule suggests that before a PERT chart is done, a project manager must: make sure 100 percent of the project tasks are defined. make sure that each person on the project team got 100 percent on his or her project management final exam. make sure the project team is devoted solely, or 100 percent, to the project. make sure 100 percent of the project is funded.

make sure 100 percent of the project tasks are defined.

The technology acceptance model addresses: intention to adopt mobile technology. perceived ease of use. perceived usage. perceived ability to address technical difficulties. None of the choices are correct.

perceived ease of use.

The technology acceptance model does not address: perceived ease of use. perceived systems quality. perceived usefulness. intention to use.

perceived systems quality.

Encryption is a preventive control. detective control. corrective control. Two of the choices are correct.

preventive control.

What type of blockchain does not restrict participation in the network? public private permission consortium

public

The fraud triangle indicates which of the following condition(s) exist for a fraud to be perpetrated? rationalization. pressure. legal environment. rationalization and pressure. rationalization, pressure and legal environment.

rationalization and pressure.

Permits the representation of information using traditional summaries and through flexible links. Flexibility System independence reporting independence consolidation

reporting independence

(CMA exam, adapted) Data processing activities may be classified in terms of three stages or processes: input, processing, and output. An activity that is not normally associated with the input stage is: verifying. batching. recording. reporting.

reporting.

(CISA exam, adapted) Authentication is the process by which the: user identifies him- or herself to the system. system verifies the identity of the user. system verifies that the user is entitled to enter the transaction requested. user indicates to the system that the transaction was processed correctly.

system verifies the identity of the user.

The triple constraints of project management do not include the constraint of: cost. technical issues. scope. time.

technical issues.

The Sarbanes-Oxley Act's section 404 reports require management and auditors to report on the effectiveness of the internal controls over the company's accounting information system. the quality of the project management planning. the academic background and experience of the company's accounting leadership. the financial condition of the firm.

the effectiveness of the internal controls over the company's accounting information system.

The critical path in a PERT chart represents: the tasks that must be completed without errors. the sequencing of tasks. the most important tasks of the whole project. the longest path of tasks needed for project completion.

the longest path of tasks needed for project completion.

The symmetric-key encryption method: is not appropriate for encrypting large data sets. uses the same key for both senders and receivers for encryption and decryption. is slow. solves problems in key distribution and key management.

uses the same key for both senders and receivers for encryption and decryption.


संबंधित स्टडी सेट्स

HL - IB Biology Option B: Biotechnology and Bioinformatics

View Set

Fall 2023 Management & OB (MGMT-301-05)

View Set

Cheatsheet quizlet for Dr. Davis musculoskeletal

View Set

IBM (Chapter 17 Connect Assignment(Done!))

View Set

WorldatWork Total Rewards Management

View Set