Exam 2 b
The relevant time frame for most IT initiatives is ____ years or less, since technology changes rapidly.
3
Which of the statements below best defines an embedded audit module?
A programmed module added to the system so that the auditors can monitor and collect data over online transactions.
What is the white-box approach in auditing systems? Select all statements that apply.
Auditors need to create test cases to verify specific logic and controls in a system. It requires auditors to understand the internal logic of the system/application being tested.
Computer-assisted audit techniques enable auditors to gather and analyze audit ____ to test the adequacy and reliability of financial information and internal controls in a computerized environment.
Blank 1: evidence
_____ prioritizing the alternative IT initiatives based on the financial metrics, the project team should test the impact of changes in assumptions on the various financial metrics of the project.
Before
____ IT are those that restructure interactions within the organization as well as with external partners.
Blank 1: Enterprise
____ Fill in the blanks to complete the sentence. Blank 1 of 1 IT are those that perform a single function, such as enhancing productivity for standalone tasks.
Blank 1: Function
You can use Value Field Settings to specify a Custom ____ for a field.
Blank 1: Name
____ ____ ____ is calculated as the sum of the present value of cash inflows minus the sum of the present value of cash outflows.
Blank 1: Net Blank 2: Present Blank 3: Value
____ IT are those that allow people to communicate with one another.
Blank 1: Network
Management of IT benefits over an investment's life cycle is called the ____ IT framework.
Blank 1: Val
A wireless network is comprised of two fundamental architectural components: ____ points and ____.
Blank 1: access Blank 2: stations or station
The term "computer-assisted audit techniques (CAATs)" refers to any ____ audit techniques that can be used by an auditor to perform audits or achieve audit objectives.
Blank 1: automated
Both payback period and ____ analysis both compare the costs with benefits of an IT project with considering the time value of money.
Blank 1: breakeven
Organizations need to create a business ____ for an IT investment.
Blank 1: case
Dimensions in Tableau are ____ fields.
Blank 1: categorical
Treemaps show relationships among nested ____
Blank 1: categories
Vertical column charts typically show fewer ____ than horizontal bar charts.
Blank 1: categories
When joining two tables in Tableau, the overlapping ____ indicate the type of join.
Blank 1: circles
For horizontal bar charts, the purpose is to ____ information among categories.
Blank 1: compare
General security objectives for both wired LANs and wireless LANs include: ____ ____ ____, and access control.
Blank 1: confidentiality Blank 2: integrity Blank 3: availability
Accounting-based measures ____ the success of the firm's investments in learning and growth, process performance, and ability to deliver value to customers.
Blank 1: confirm or measure
With ____ auditing, theoretically, an audit report/opinion can be issued simultaneously with, or shortly after, the occurrence of the events under review.
Blank 1: continuous
A ____ ____ occurs when audit-related activities are performed on a continuous basis.
Blank 1: continuous Blank 2: audit
IT projects offer important benefits to organizations but also involve substantial ____
Blank 1: costs
In the relationships view in Power BI, inactive relationships are shown with a ____ line.
Blank 1: dashed
On the left, the Power BI report view screen shows icons representing the three different views: report, ____, and relationships.
Blank 1: data
The ____ view in Power BI lets you calculate new fields and set formatting for fields, such as currency fields.
Blank 1: data
In today's electronic world, most accounting records are stored is a ____
Blank 1: database or databases
Internal rate of return is the ____ rate that makes the project's net present value equal to zero.
Blank 1: discount
Present value equals the cash flow for each period divided by one plus the ____ rate to the power "t."
Blank 1: discount
A type of attack called ____ could be described as the attacker passively monitors wireless networks for data, including authentication credentials.
Blank 1: eavesdropping
The ____ ____ module is a programmed audit module that is added to the system under review. Hence, the auditors can monitor and collect data over online transactions. The collected data are analyzed by auditors in evaluating control risks and effectiveness.
Blank 1: embedded Blank 2: audit
To use the Tableau Show Me tool, select one or more of the ____ of interest while holding down the control (CTRL) key.
Blank 1: fields
The benefits of an IT investment should be measurable in ____ terms.
Blank 1: financial
`The balanced scorecard framework uses accounting-based measures of performance in the ____ perspective.
Blank 1: financial
The balanced scorecard framework describes firm performance from ____ different perspectives based on the firm's strategy to achieve shareholder value.
Blank 1: four
The first step in preparing the data and developing visualizations is to ____ data.
Blank 1: get or obtain
An important part of understanding the data involves questioning how the data supports the overall ____ of the visualizations.
Blank 1: goal, objective, goals, or objectives
In the Power BI report view, the Visualizations area allows you to click on an ____ to select specific types of charts or visualizations.
Blank 1: icon
In the learning and growth perspective, the organization sets goals to ensure that it is strategically ready to continuously ____ its process performance.
Blank 1: improve
The total acquisition cost includes direct and ____ costs required to acquire and deploy technology.
Blank 1: indirect
In the learning and growth perspective, the firm addresses goals for investments in human capital, organizational capital, and ____ capital.
Blank 1: information
The payback period equals the ____ investment divided by the increased cash flow per period.
Blank 1: initial or total
The ____ ____ ____ (ITF) approach is an automated technique that enables test data to be continually evaluated during the normal operation of a system. The auditor creates fictitious situations and performs a wide variety of tests over the system.
Blank 1: integrated Blank 2: test Blank 3: facility
In a recent survey, more than 40% of executives reported that their company's investments in IT are providing little or no return on ____
Blank 1: investment
The ____ and ____ perspective describes the firm's objectives for improvements in tangible and intangible infrastructure.
Blank 1: learning Blank 2: growth
A ____ ____ ____ ____ (LAN) is a group of computers, printers, and other devices connected to the same network and covers a limited geographic range such as a home, small office, or a campus building.
Blank 1: local Blank 2: area Blank 3: network
The business case should specify how ____ the project is expected to take.
Blank 1: long
After developing a strategy map, companies then plan, implement, and monitor performance using the balanced scorecard ____ process.
Blank 1: management
Understanding the data also includes selection of appropriate ____
Blank 1: metrics
A common security threat, ____, is that the attacker steals or makes unauthorized use of a service.
Blank 1: misappropriation
The three categories of information technology are function, ____, and enterprise.
Blank 1: network
Information technology can affect all ____ elements of the business model canvas.
Blank 1: nine or 9
Benefits should be measured in comparison to the revenues and costs that will occur if the IT initiative is ____ implemented.
Blank 1: not
Measures are ____ fields.
Blank 1: numeric
The ___ system is the most important system software because it performs the tasks that enable a computer to operate.
Blank 1: operating
Security controls for wireless networks can be categorized into three groups: management, ____, and technical controls.
Blank 1: operational or operating
Under the ____ simulation approach, the auditors write a computer program to reprocess the firm's actual data for a past period to generate simulated results to audit the system.
Blank 1: parallel
A strategy map allows firms to assess and prioritize gaps between their current and desired ____ levels.
Blank 1: performance
To create relationships among Excel tables, you link foreign keys to ____ keys.
Blank 1: primary
The ____ perspective describes that firm's objectives for its business processes so that firm operates efficiently while also delivering products and services that meet its customers' requirements.
Blank 1: process
The term "benefit dependency" indicates that IT functionality must be combined with complementary changes to deliver business ____ change that results in improved performance.
Blank 1: process or processes
The final step in the process is to assemble the analyses for alternative IT initiatives and ____ the preferred alternative.
Blank 1: recommend or recommended
In Power BI, the ____ view allows you to set connections among tables.
Blank 1: relationships
The second step in preparing the data and developing visualizations is to set ____ among tables to exploit any database structure.
Blank 1: relationships or associations
After connect to data sources in Tableau, the next step is to create ___ among the tables.
Blank 1: relationships, associations, or joins
In considering alternative IT investments, ____ costs include incremental expenses of developing, implementing, and operating proposed IT initiatives.
Blank 1: relevant
To create a table visualization in ____ view in Power BI, click on the Table icon in the visualizations area and then select the appropriate fields.
Blank 1: report
The value proposition defines what the organization does to attract and ____ customers.
Blank 1: retain or keep
The business case should consider the ____ of not doing the project.
Blank 1: risks or risk
The attacker of a wireless network sometimes uses a ____ access point to set up an unsecured wireless network near the enterprise with an identical name and to intercepts any messages sent by unsuspecting users that who log onto it.
Blank 1: rogue
A revenue stream is the result of selling products and services to each customer ____
Blank 1: segment
Fill in the blanks to complete the sentence. Because each financial metric has both strengths and weaknesses, IT initiatives should be evaluated using ____ metrics.
Blank 1: several, multiple, or various
In auditing information systems, auditors use parallel ____ to verify the firm's key features or processes. Under this approach, the auditors write a computer program to reprocess the firm's actual data for a past period to generate simulated results.
Blank 1: simulation or simulations
Part of understanding the data is to find relevant ___ for the data.
Blank 1: sources
A business model implements business ____
Blank 1: strategy
Part of getting the Excel data is to convert the raw data into ___
Blank 1: tables
Security controls for wireless networks can be categorized into three groups: management, operational, and ____ controls.
Blank 1: technical
The ____ ____ technique uses a set of input data to validate system integrity in auditing a system. When creating the test data, auditors need to prepare both valid and invalid data to examine critical logics and controls of the system.
Blank 1: test Blank 2: data
Line charts typically are used to show values over ____
Blank 1: time
To audit a system, auditors use the test data technique to ____ system integrity. When creating the test data, auditors need to prepare both valid and invalid data to examine critical logics and controls of the system.
Blank 1: validate
The development of a business model canvas starts with the ____ proposition.
Blank 1: value
The firm's ____ proposition includes attributes of its products, such as price, quality, and selection, as well as attributes of its relationship with its customers and its brand image.
Blank 1: value
The last step in the economic justification process is to describe the ____ proposition for the preferred alternative.
Blank 1: value
A data ____ is a centralized collection of firm-wide data for a relatively long period of time.
Blank 1: warehouse
The data in a data ____ are pulled periodically from each of the operational databases (ranging from a couple of times a day to once a year) and often maintained for 5 to 10 years.
Blank 1: warehouse or warehouses
To use the ____-box approach to audit systems, auditors need to understand the internal logic of the system/application being tested.
Blank 1: white
Pie charts are typically used to show the composition of a _____.
Blank 1: whole
The business case should determine ____ the company is doing the project.
Blank 1: why
The business case should determine ____ the company is doing the project. Listen to the complete question
Blank 1: why
A ____ ____ network (WAN) links different sites together; transmits information across geographically dispersed networks; and covers a broad geographic area such as a city, region, nation, or an international link.
Blank 1: wide Blank 2: area
Which of the following is not an example of direct acquisition costs?
Business disruption costs
Select the benefits of using wireless technology.
Convenient online access without a physical network using cables for connections Freely setting up or removing wireless networks at different locations
Which of the following are examples of enterprise IT?
Customer relationship management software Supply chain management software
Which of the following is NOT true about data visualizations.
Data visualizations are the only way to present data
The four steps to implementing Val IT include all of the following:
Define characteristics of the ideal future state. Recognize problems with prior IT investments. Take action.
Which of the following could be potential sources of cost savings from an IT investment?
Elimination of manually intensive activities Reducing errors
Which of the following are examples of network IT?
Email software Instant messaging
Which of the following can help companies achieve a positive return on investment for their IT investments according to IndustryWeek magazine?
Employ a formal, structured approach
True or false: A local area network is a group of computers, printers, and other devices connected to the same network and covers a large geographic range such as a city, a county, or a state.
False
True or false: Excel is always the best visualization tool.
False
True or false: In Power BI, you can add a simple table to the report view page by clicking on the pie chart icon in the visualizations area and then selecting the fields to include.
False
True or false: In Tableau, there is one best type of visualization for each combination of dimensions and measures.
False
True or false: Raw data must have blank rows or columns to be easily turned into an Excel table.
False
True or false: The business model canvas is completely different from a strategy map.
False
True or false: Unlike Microsoft Access, you can't create relationships among tables in Excel.
False
Which of the following are examples of direct costs of acquiring information technology?
Hardware costs Software costs Training costs
All but the following are examples of direct operating costs incurred after implementing an IT project.
IT implementation costs
Which of the following is NOT a feature of the business model canvas?
It does not show the impact of IT
What is the black-box approach in auditing systems? Select all statements that apply.
It is adequate when automated systems applications are relatively simple. It is to audit around the computer. The advantage of this approach is that the systems will not be interrupted for auditing purposes.
Select the correct statement regarding the black-box approach in auditing systems.
It is also called auditing around the computer.
Which of the following are reasons that companies develop business cases for major IT investments?
Justification of anticipated value Thorough consideration of alternatives
Select all of the following that are elements of the business model canvas.
Key activities Customer segments Channels Cost structure Key resources Key partners Value proposition Customer relationships Revenue streams
Which of the following is NOT an element of the business model canvas?
Key technologies
Which of the following correctly describe relationships among the four balanced scorecard perspectives?
Learning and Growth affects Process Process affects Customer Process affects Financial
Which of the following are examples of direct operating costs after implementing an IT project?
Maintenance contracts Software upgrades Disposal costs
Which of the following are relevant costs of IT investments?
Maintenance costs Acquisition costs
Which of the following is NOT a well-known visualization tool?
Microsoft Access
Which of the following financial metrics consider the time value of money?
Net present value Internal rate of return
Which of the following is NOT usually listed under the revenue streams element of a business model canvas?
Personnel expense
Treemaps are similar in purpose to which of the following charts?
Pie charts
The benefits of an IT investment should be measured in which of the following terms?
Revenue enhancement Revenue protection Cost avoidance
Which of the following must be determined to use capital budgeting techniques for each IT alternative?
Select appropriate discount rate Establish relevant time frame Assess sensitivity to assumptions
Which of the following is NOT part of selecting and modifying the visualization?
Set relationships among tables
Which of the following are categories of IT initiative risks that should be addressed?
Solution risk Alignment risk Change risk
Which of the following are potential impacts of IT on the elements of a business model canvas (select all that apply)?
Support key activities Gather data about customer segments Coordination with key partners Track key resources
What is continuous auditing?
Testing in continuous audits often consists of continuous controls monitoring and continuous data assurance. Continuous auditing is to perform audit-related activities on a continuous basis.
The business case should focus on which of the following?
The change and proposed technology The anticipated benefits The likelihood of achieving the benefits
Which of the following is not a product characteristic that affects customers' willingness to buy?
The product supplier
Which of the following is NOT true of pie charts?
They compare values across time
Which of the following are true about IT investments?
They offer opportunities to create value. They involve substantial costs. As much as 20% of IT spending is wasted.
Which of the following is NOT true about line charts?
They show distribution of a single variable
Identify the main purposes for a wide area network (WAN).
To provide remote access to employees or customers To link various sites within the firm To provide corporate access to the Internet
True or false: According to IndustryWeek magazine, a formal, structured approach that links IT investment to business performance can help avoid return on IT investment problems by providing a focus that is often missing.
True
True or false: Bar charts compare information among categories.
True
True or false: Common benefits of using wireless technology include mobility, rapid deployment, and flexibility and scalability of a network.
True
True or false: In data view in Power BI, you can set formatting for a field by selecting Modeling > Formatting and then selecting the appropriate format.
True
True or false: Most threats with regard to wireless networks typically involve an attacker with access to the radio link between a station and an access point, or between two stations.
True
True or false: The firm's senior executives need to understand the financial implications of the IT initiative so they can decide whether to allocate resources to it.
True
True or false: a data visualization is a graphical means of presenting information to decision makers.
True
True or false: both vertical column and horizontal bar charts can be used to compare information among categories.
True
True or false: in Excel, a slicer can be used to filter pivot table and pivot chart output.
True
A framework intended to help managers create business value from IT investments is called:
Val IT
Which of the following is an example of function IT?
Word processing software Spreadsheet software Map applications
In our electronic world, all or most accounting records are stored in a database. A database is:
a shared collection of logically related data that meets the information needs of a firm
When considering "benefit dependency", IT functionality and _____ are precursors to business process change.
complementary changes
The operating system performs the tasks that enable a computer to operate. It is comprised of system utilities and programs that:
control the flow of multiprogramming. allocate computer resources to users and applications. ensure the integrity of the system.
The process perspective describes that firm's objectives for its business processes so that firm operates _______ while also delivering products and services that meet its customers' requirements.
efficiently
The three categories of information technology are _____, network and enterprise.
function
Total acquisition costs include all direct and indirect costs to acquire and ____________ the IT initiative.
implement
The discount rate that makes the project's net present value equal to zero is called the _____.
internal rate of return
A weakness of the payback period is _____.
it ignores the time value of money
The balanced scorecard management process allows companies to:
monitor their performance describe their implementation strategy
Which of the following are attributes of a firm product relevant to the firm's value proposition.
price quality
Each of the following are implementation steps for Val IT except:
providing oversight of all organization's IT investments programs.
A _____ map allows firms to assess and prioritize gaps between their current and desired performance levels.
strategy
The first step in the economic justification process is _____.
to assess business requirements