Exam 2 b

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The relevant time frame for most IT initiatives is ____ years or less, since technology changes rapidly.

3

Which of the statements below best defines an embedded audit module?

A programmed module added to the system so that the auditors can monitor and collect data over online transactions.

What is the white-box approach in auditing systems? Select all statements that apply.

Auditors need to create test cases to verify specific logic and controls in a system. It requires auditors to understand the internal logic of the system/application being tested.

Computer-assisted audit techniques enable auditors to gather and analyze audit ____ to test the adequacy and reliability of financial information and internal controls in a computerized environment.

Blank 1: evidence

_____ prioritizing the alternative IT initiatives based on the financial metrics, the project team should test the impact of changes in assumptions on the various financial metrics of the project.

Before

____ IT are those that restructure interactions within the organization as well as with external partners.

Blank 1: Enterprise

____ Fill in the blanks to complete the sentence. Blank 1 of 1 IT are those that perform a single function, such as enhancing productivity for standalone tasks.

Blank 1: Function

You can use Value Field Settings to specify a Custom ____ for a field.

Blank 1: Name

____ ____ ____ is calculated as the sum of the present value of cash inflows minus the sum of the present value of cash outflows.

Blank 1: Net Blank 2: Present Blank 3: Value

____ IT are those that allow people to communicate with one another.

Blank 1: Network

Management of IT benefits over an investment's life cycle is called the ____ IT framework.

Blank 1: Val

A wireless network is comprised of two fundamental architectural components: ____ points and ____.

Blank 1: access Blank 2: stations or station

The term "computer-assisted audit techniques (CAATs)" refers to any ____ audit techniques that can be used by an auditor to perform audits or achieve audit objectives.

Blank 1: automated

Both payback period and ____ analysis both compare the costs with benefits of an IT project with considering the time value of money.

Blank 1: breakeven

Organizations need to create a business ____ for an IT investment.

Blank 1: case

Dimensions in Tableau are ____ fields.

Blank 1: categorical

Treemaps show relationships among nested ____

Blank 1: categories

Vertical column charts typically show fewer ____ than horizontal bar charts.

Blank 1: categories

When joining two tables in Tableau, the overlapping ____ indicate the type of join.

Blank 1: circles

For horizontal bar charts, the purpose is to ____ information among categories.

Blank 1: compare

General security objectives for both wired LANs and wireless LANs include: ____ ____ ____, and access control.

Blank 1: confidentiality Blank 2: integrity Blank 3: availability

Accounting-based measures ____ the success of the firm's investments in learning and growth, process performance, and ability to deliver value to customers.

Blank 1: confirm or measure

With ____ auditing, theoretically, an audit report/opinion can be issued simultaneously with, or shortly after, the occurrence of the events under review.

Blank 1: continuous

A ____ ____ occurs when audit-related activities are performed on a continuous basis.

Blank 1: continuous Blank 2: audit

IT projects offer important benefits to organizations but also involve substantial ____

Blank 1: costs

In the relationships view in Power BI, inactive relationships are shown with a ____ line.

Blank 1: dashed

On the left, the Power BI report view screen shows icons representing the three different views: report, ____, and relationships.

Blank 1: data

The ____ view in Power BI lets you calculate new fields and set formatting for fields, such as currency fields.

Blank 1: data

In today's electronic world, most accounting records are stored is a ____

Blank 1: database or databases

Internal rate of return is the ____ rate that makes the project's net present value equal to zero.

Blank 1: discount

Present value equals the cash flow for each period divided by one plus the ____ rate to the power "t."

Blank 1: discount

A type of attack called ____ could be described as the attacker passively monitors wireless networks for data, including authentication credentials.

Blank 1: eavesdropping

The ____ ____ module is a programmed audit module that is added to the system under review. Hence, the auditors can monitor and collect data over online transactions. The collected data are analyzed by auditors in evaluating control risks and effectiveness.

Blank 1: embedded Blank 2: audit

To use the Tableau Show Me tool, select one or more of the ____ of interest while holding down the control (CTRL) key.

Blank 1: fields

The benefits of an IT investment should be measurable in ____ terms.

Blank 1: financial

`The balanced scorecard framework uses accounting-based measures of performance in the ____ perspective.

Blank 1: financial

The balanced scorecard framework describes firm performance from ____ different perspectives based on the firm's strategy to achieve shareholder value.

Blank 1: four

The first step in preparing the data and developing visualizations is to ____ data.

Blank 1: get or obtain

An important part of understanding the data involves questioning how the data supports the overall ____ of the visualizations.

Blank 1: goal, objective, goals, or objectives

In the Power BI report view, the Visualizations area allows you to click on an ____ to select specific types of charts or visualizations.

Blank 1: icon

In the learning and growth perspective, the organization sets goals to ensure that it is strategically ready to continuously ____ its process performance.

Blank 1: improve

The total acquisition cost includes direct and ____ costs required to acquire and deploy technology.

Blank 1: indirect

In the learning and growth perspective, the firm addresses goals for investments in human capital, organizational capital, and ____ capital.

Blank 1: information

The payback period equals the ____ investment divided by the increased cash flow per period.

Blank 1: initial or total

The ____ ____ ____ (ITF) approach is an automated technique that enables test data to be continually evaluated during the normal operation of a system. The auditor creates fictitious situations and performs a wide variety of tests over the system.

Blank 1: integrated Blank 2: test Blank 3: facility

In a recent survey, more than 40% of executives reported that their company's investments in IT are providing little or no return on ____

Blank 1: investment

The ____ and ____ perspective describes the firm's objectives for improvements in tangible and intangible infrastructure.

Blank 1: learning Blank 2: growth

A ____ ____ ____ ____ (LAN) is a group of computers, printers, and other devices connected to the same network and covers a limited geographic range such as a home, small office, or a campus building.

Blank 1: local Blank 2: area Blank 3: network

The business case should specify how ____ the project is expected to take.

Blank 1: long

After developing a strategy map, companies then plan, implement, and monitor performance using the balanced scorecard ____ process.

Blank 1: management

Understanding the data also includes selection of appropriate ____

Blank 1: metrics

A common security threat, ____, is that the attacker steals or makes unauthorized use of a service.

Blank 1: misappropriation

The three categories of information technology are function, ____, and enterprise.

Blank 1: network

Information technology can affect all ____ elements of the business model canvas.

Blank 1: nine or 9

Benefits should be measured in comparison to the revenues and costs that will occur if the IT initiative is ____ implemented.

Blank 1: not

Measures are ____ fields.

Blank 1: numeric

The ___ system is the most important system software because it performs the tasks that enable a computer to operate.

Blank 1: operating

Security controls for wireless networks can be categorized into three groups: management, ____, and technical controls.

Blank 1: operational or operating

Under the ____ simulation approach, the auditors write a computer program to reprocess the firm's actual data for a past period to generate simulated results to audit the system.

Blank 1: parallel

A strategy map allows firms to assess and prioritize gaps between their current and desired ____ levels.

Blank 1: performance

To create relationships among Excel tables, you link foreign keys to ____ keys.

Blank 1: primary

The ____ perspective describes that firm's objectives for its business processes so that firm operates efficiently while also delivering products and services that meet its customers' requirements.

Blank 1: process

The term "benefit dependency" indicates that IT functionality must be combined with complementary changes to deliver business ____ change that results in improved performance.

Blank 1: process or processes

The final step in the process is to assemble the analyses for alternative IT initiatives and ____ the preferred alternative.

Blank 1: recommend or recommended

In Power BI, the ____ view allows you to set connections among tables.

Blank 1: relationships

The second step in preparing the data and developing visualizations is to set ____ among tables to exploit any database structure.

Blank 1: relationships or associations

After connect to data sources in Tableau, the next step is to create ___ among the tables.

Blank 1: relationships, associations, or joins

In considering alternative IT investments, ____ costs include incremental expenses of developing, implementing, and operating proposed IT initiatives.

Blank 1: relevant

To create a table visualization in ____ view in Power BI, click on the Table icon in the visualizations area and then select the appropriate fields.

Blank 1: report

The value proposition defines what the organization does to attract and ____ customers.

Blank 1: retain or keep

The business case should consider the ____ of not doing the project.

Blank 1: risks or risk

The attacker of a wireless network sometimes uses a ____ access point to set up an unsecured wireless network near the enterprise with an identical name and to intercepts any messages sent by unsuspecting users that who log onto it.

Blank 1: rogue

A revenue stream is the result of selling products and services to each customer ____

Blank 1: segment

Fill in the blanks to complete the sentence. Because each financial metric has both strengths and weaknesses, IT initiatives should be evaluated using ____ metrics.

Blank 1: several, multiple, or various

In auditing information systems, auditors use parallel ____ to verify the firm's key features or processes. Under this approach, the auditors write a computer program to reprocess the firm's actual data for a past period to generate simulated results.

Blank 1: simulation or simulations

Part of understanding the data is to find relevant ___ for the data.

Blank 1: sources

A business model implements business ____

Blank 1: strategy

Part of getting the Excel data is to convert the raw data into ___

Blank 1: tables

Security controls for wireless networks can be categorized into three groups: management, operational, and ____ controls.

Blank 1: technical

The ____ ____ technique uses a set of input data to validate system integrity in auditing a system. When creating the test data, auditors need to prepare both valid and invalid data to examine critical logics and controls of the system.

Blank 1: test Blank 2: data

Line charts typically are used to show values over ____

Blank 1: time

To audit a system, auditors use the test data technique to ____ system integrity. When creating the test data, auditors need to prepare both valid and invalid data to examine critical logics and controls of the system.

Blank 1: validate

The development of a business model canvas starts with the ____ proposition.

Blank 1: value

The firm's ____ proposition includes attributes of its products, such as price, quality, and selection, as well as attributes of its relationship with its customers and its brand image.

Blank 1: value

The last step in the economic justification process is to describe the ____ proposition for the preferred alternative.

Blank 1: value

A data ____ is a centralized collection of firm-wide data for a relatively long period of time.

Blank 1: warehouse

The data in a data ____ are pulled periodically from each of the operational databases (ranging from a couple of times a day to once a year) and often maintained for 5 to 10 years.

Blank 1: warehouse or warehouses

To use the ____-box approach to audit systems, auditors need to understand the internal logic of the system/application being tested.

Blank 1: white

Pie charts are typically used to show the composition of a _____.

Blank 1: whole

The business case should determine ____ the company is doing the project.

Blank 1: why

The business case should determine ____ the company is doing the project. Listen to the complete question

Blank 1: why

A ____ ____ network (WAN) links different sites together; transmits information across geographically dispersed networks; and covers a broad geographic area such as a city, region, nation, or an international link.

Blank 1: wide Blank 2: area

Which of the following is not an example of direct acquisition costs?

Business disruption costs

Select the benefits of using wireless technology.

Convenient online access without a physical network using cables for connections Freely setting up or removing wireless networks at different locations

Which of the following are examples of enterprise IT?

Customer relationship management software Supply chain management software

Which of the following is NOT true about data visualizations.

Data visualizations are the only way to present data

The four steps to implementing Val IT include all of the following:

Define characteristics of the ideal future state. Recognize problems with prior IT investments. Take action.

Which of the following could be potential sources of cost savings from an IT investment?

Elimination of manually intensive activities Reducing errors

Which of the following are examples of network IT?

Email software Instant messaging

Which of the following can help companies achieve a positive return on investment for their IT investments according to IndustryWeek magazine?

Employ a formal, structured approach

True or false: A local area network is a group of computers, printers, and other devices connected to the same network and covers a large geographic range such as a city, a county, or a state.

False

True or false: Excel is always the best visualization tool.

False

True or false: In Power BI, you can add a simple table to the report view page by clicking on the pie chart icon in the visualizations area and then selecting the fields to include.

False

True or false: In Tableau, there is one best type of visualization for each combination of dimensions and measures.

False

True or false: Raw data must have blank rows or columns to be easily turned into an Excel table.

False

True or false: The business model canvas is completely different from a strategy map.

False

True or false: Unlike Microsoft Access, you can't create relationships among tables in Excel.

False

Which of the following are examples of direct costs of acquiring information technology?

Hardware costs Software costs Training costs

All but the following are examples of direct operating costs incurred after implementing an IT project.

IT implementation costs

Which of the following is NOT a feature of the business model canvas?

It does not show the impact of IT

What is the black-box approach in auditing systems? Select all statements that apply.

It is adequate when automated systems applications are relatively simple. It is to audit around the computer. The advantage of this approach is that the systems will not be interrupted for auditing purposes.

Select the correct statement regarding the black-box approach in auditing systems.

It is also called auditing around the computer.

Which of the following are reasons that companies develop business cases for major IT investments?

Justification of anticipated value Thorough consideration of alternatives

Select all of the following that are elements of the business model canvas.

Key activities Customer segments Channels Cost structure Key resources Key partners Value proposition Customer relationships Revenue streams

Which of the following is NOT an element of the business model canvas?

Key technologies

Which of the following correctly describe relationships among the four balanced scorecard perspectives?

Learning and Growth affects Process Process affects Customer Process affects Financial

Which of the following are examples of direct operating costs after implementing an IT project?

Maintenance contracts Software upgrades Disposal costs

Which of the following are relevant costs of IT investments?

Maintenance costs Acquisition costs

Which of the following is NOT a well-known visualization tool?

Microsoft Access

Which of the following financial metrics consider the time value of money?

Net present value Internal rate of return

Which of the following is NOT usually listed under the revenue streams element of a business model canvas?

Personnel expense

Treemaps are similar in purpose to which of the following charts?

Pie charts

The benefits of an IT investment should be measured in which of the following terms?

Revenue enhancement Revenue protection Cost avoidance

Which of the following must be determined to use capital budgeting techniques for each IT alternative?

Select appropriate discount rate Establish relevant time frame Assess sensitivity to assumptions

Which of the following is NOT part of selecting and modifying the visualization?

Set relationships among tables

Which of the following are categories of IT initiative risks that should be addressed?

Solution risk Alignment risk Change risk

Which of the following are potential impacts of IT on the elements of a business model canvas (select all that apply)?

Support key activities Gather data about customer segments Coordination with key partners Track key resources

What is continuous auditing?

Testing in continuous audits often consists of continuous controls monitoring and continuous data assurance. Continuous auditing is to perform audit-related activities on a continuous basis.

The business case should focus on which of the following?

The change and proposed technology The anticipated benefits The likelihood of achieving the benefits

Which of the following is not a product characteristic that affects customers' willingness to buy?

The product supplier

Which of the following is NOT true of pie charts?

They compare values across time

Which of the following are true about IT investments?

They offer opportunities to create value. They involve substantial costs. As much as 20% of IT spending is wasted.

Which of the following is NOT true about line charts?

They show distribution of a single variable

Identify the main purposes for a wide area network (WAN).

To provide remote access to employees or customers To link various sites within the firm To provide corporate access to the Internet

True or false: According to IndustryWeek magazine, a formal, structured approach that links IT investment to business performance can help avoid return on IT investment problems by providing a focus that is often missing.

True

True or false: Bar charts compare information among categories.

True

True or false: Common benefits of using wireless technology include mobility, rapid deployment, and flexibility and scalability of a network.

True

True or false: In data view in Power BI, you can set formatting for a field by selecting Modeling > Formatting and then selecting the appropriate format.

True

True or false: Most threats with regard to wireless networks typically involve an attacker with access to the radio link between a station and an access point, or between two stations.

True

True or false: The firm's senior executives need to understand the financial implications of the IT initiative so they can decide whether to allocate resources to it.

True

True or false: a data visualization is a graphical means of presenting information to decision makers.

True

True or false: both vertical column and horizontal bar charts can be used to compare information among categories.

True

True or false: in Excel, a slicer can be used to filter pivot table and pivot chart output.

True

A framework intended to help managers create business value from IT investments is called:

Val IT

Which of the following is an example of function IT?

Word processing software Spreadsheet software Map applications

In our electronic world, all or most accounting records are stored in a database. A database is:

a shared collection of logically related data that meets the information needs of a firm

When considering "benefit dependency", IT functionality and _____ are precursors to business process change.

complementary changes

The operating system performs the tasks that enable a computer to operate. It is comprised of system utilities and programs that:

control the flow of multiprogramming. allocate computer resources to users and applications. ensure the integrity of the system.

The process perspective describes that firm's objectives for its business processes so that firm operates _______ while also delivering products and services that meet its customers' requirements.

efficiently

The three categories of information technology are _____, network and enterprise.

function

Total acquisition costs include all direct and indirect costs to acquire and ____________ the IT initiative.

implement

The discount rate that makes the project's net present value equal to zero is called the _____.

internal rate of return

A weakness of the payback period is _____.

it ignores the time value of money

The balanced scorecard management process allows companies to:

monitor their performance describe their implementation strategy

Which of the following are attributes of a firm product relevant to the firm's value proposition.

price quality

Each of the following are implementation steps for Val IT except:

providing oversight of all organization's IT investments programs.

A _____ map allows firms to assess and prioritize gaps between their current and desired performance levels.

strategy

The first step in the economic justification process is _____.

to assess business requirements


संबंधित स्टडी सेट्स

Observation and Assessment Midterm

View Set

MKT Chap. 8, 9, & 10 Concept Checks

View Set

NUR 398 Noninfectious Lower Respiratory Problems: Asthma & COPD

View Set

Vocabulary Workshop Level E Unit 6 - Complete Sentences

View Set

Personal and Community Health - CH 2

View Set

Hormones and Paracrines that Act in Digestion

View Set

Chapter 10: Cultura ¿Cierto o falso? (p.340)

View Set

ASSESSMENT: 1.0.1 AWS CLOUD CONCEPTS

View Set