Acct 451 Exam #3

Ace your homework & exams now with Quizwiz!

Data concurrency a. occurs when a deadlock is triggered b. is a security issue in partitioned databases c. may result in data lockout d. is implemented using timestamping

is implemented using timestamping

Which of the following is usually not part of an ERP's OLAP applications? a. logistics b. what-if analysis c. ad hoc analysis d. decision support systems

logistics

Data currency is preserved in a centralized database by a. replicating the database b. using a lockout procedure c. partitioning the database d. implementing concurrency controls

using a lockout procedure

Which method does not manage or control data collisions that might occur on a network? a. polling b. token passing c. carrier sensing d. multiplexing

multiplexing

Which of the following associations would most likely describe the relationship between an internal agent and an economic event? a. 1:M b. 1:1 c. 0:M d. none of the above

1:M

Which statement is least accurate? a. Implementing an ERP system has as much to do with changing the way an organization does business as it does with technology. b. To take full advantage of the ERP process, reengineering will need to occur. c. A common reason for ERP failure is that the ERP does not support one or more important business processes of the organization. d. The big bang approach to ERP implementation is generally riskier than the phased-in approach.

A common reason for ERP failure is that the ERP does not support one or more important business processes of the organization.

Which of the following is a reason that data warehouses are created and maintained separately from operational databases? a. A separate centralized data warehouse is an effective means of collecting data from diverse sources. b. No ERP system incorporates data warehousing capability. c. Audit controls require that data for management analysis be kept separate from transaction data. d. The data is used in different ways that requires it to be physically separate.

A separate centralized data warehouse is an effective means of collecting data from diverse sources.

Which of the following is not a risk associated with ERP implementation? a. opposition to changes in the business culture b. choosing the wrong ERP c. choosing the wrong consultant d. All of these are risks associated with ERP implementations.

All of these are risks associated with ERP implementations

Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies always contain encrypted data. c. Cookies contain the URLs of sites visited by the user. d. Cookies are text files and never contain encrypted data.

Cookies contain the URLs of sites visited by the user

Which statement is true? a. ERPs are infinitely scalable. b. Performance problems usually stem from technical problems, not business process reengineering. c. ERP systems can be modified using bolt-on software. d. The higher-end ERP can handle any problems an organization can have.

ERP systems can be modified using bolt-on software

Which of the following statements is not true? a. In three-tier client server architecture, one tier is for user presentations, one is for database and applications, and the third is for Internet access. b. Client computers are responsible for presenting data to the user and passing user input back to the server. c. The database and application functions are separate in the three-tier model. d. In a typical two-tier client server system, the server handles both application and database duties.

In three-tier client server architecture, one tier is for user presentations, one is for database and applications, and the third is for Internet access

A message that is made to look as though it is coming from a trusted source but is not is called a. URL masquerading b. a denial of service attack c. Internet protocol spoofing d. digital signature forging

Internet protocol spoofing

Which of the following statements is least likely to be true about a data warehouse? a. It may be deployed by organizations that have not implemented an ERP. b. It is constructed for quick searching and ad hoc queries. c. It contains data that are normally extracted periodically from the operating databases. d. It was an original part of all ERP systems.

It was an original part of all ERP systems.

Which of the following associations requires a separate link table? a. 1:1 b. 1:M c. M:M d. none of the above

M:M

Which statements about data warehousing is not correct? a. Drill-down is a data-mining tool available to users of OLAP. b. Data cleansing is a process of transforming data into standard form. c. The data warehouse should be separate from the operational system. d. Normalization is a requirement of databases included in a data warehouse.

Normalization is a requirement of databases included in a data warehouse.

Which of the following is usually not part of an ERP's core applications? a. OLTP applications b. business planning applications c. sales and distribution applications d. OLAP applications

OLAP Applications

Which of the following statements is correct? a. The REA model requires that phenomena be characterized in a manner consistent with the development of a multiple user view. b. The REA model requires that phenomena be characterized in a manner consistent with the development of a unique user view. c. The REA model requires that phenomena be characterized in a manner consistent with the development of a single user view. d. The REA model requires that phenomena be characterized in a manner consistent with the development of a selected user view.

The REA model requires that phenomena be characterized in a manner consistent with the development of a multiple user view

Which of the following are characteristics of internal agents? a. They participate in economic events, but do not assume control of the resources. b. They are employees of the company whose system is being modeled. c. They participate in economic events, but not in support events. d. All of the above.

They are employees of the company whose system is being modeled.

Which statement about ERP installation is least accurate? a. The phased-in approach is more suited to diversified businesses. b. ERP fails because some important business process is not supported. c. When a business is diversified, little is gained from ERP installation. d. For the ERP to be successful, process reengineering must occur.

When a business is diversified, little is gained from ERP installation

A data mart is a. a data warehouse created for a single function or department b. an enterprise resource planning system c. a database that provides data to an organization's customers d. another name for a data warehouse

a data warehouse created for a single function or department

Closed database architecture is a. a data warehouse control that prevents unclean data from entering the warehouse b. a limitation inherent in traditional information systems that prevents data sharing c. a control technique intended to prevent unauthorized access from trading partners d. a database structure that many of the leading ERPs use to support OLTP applications

a limitation inherent in traditional information systems that prevents data sharing

Which statement is not true? REA resources are: a. under the control of agents b. scarce c. assets d. affected by support events

affected by support events

The 'A' in REA stands for

agents

Which of the following is a level of the database that is defined by the data definition language? a. user view b. schema c. internal view d. all are levels or views of the database

all are levels or views of the database

Core applications are a. sales and distribution b. business planning c. shop floor control and logistics d. all of the above

all of the above

Protocols a. facilitate the physical connection between the network devices b. synchronize the transfer of data between physical devices c. provide a basis for error checking and measuring network performance d. all of the above

all of the above

The setup of a data warehouse includes a. modeling the data b. extracting data from operational databases c. cleansing the data d. all of the above

all of the above

Which of the following is true? a. REA diagram entities are arranged in constellations by entity class. b. ER diagrams present a static picture of the underlying business phenomena. c. Events entity names in REA diagrams are in the verb form. d. All of the above are true statements.

all of the above are true statements

Auditors of ERP systems a. are concerned that managers fail to exercise adequate care in assigning permissions b. need not review access levels granted to users because these are determined when the system is configured and never change c. need not be concerned about segregation of duties because these systems possess strong computer controls d. focus on output controls such as independent verification to reconcile batch totals

are concerned that managers fail to exercise adequate care in assigning permissions

The big bang method a. is more ambitious than the phased-in method b. has been associated with many failures c. both a. and b. d. neither a. nor b.

both a and b

Users access the database a. by constantly interacting with systems programmers b. all of the above c. by developing operating software d. by direct query

by direct query

All of the following are examples of economic events except a. shipping product to a customer b. checking a customer's credit prior to processing a sales order c. receiving raw materials from a supplier d. disbursing cash for inventories received

checking a customer's credit prior to processing a sales order

Most ERPs are based on which network model? a. peer to peer b. client-server c. ring topology d. bus topology

client-server

Which term is not associated with the relational database model? a. tuple b. attribute c. collision d. relation

collision

What control maintains complete, current, and consistent data at all information processing units? a. gateway control b. concurrency control c. replication control d. deadlock control

concurrency control

Data warehousing processes do not include a. transforming data b. extracting data c. modeling data d. condensing data

condensing data

Which procedure will prevent two end users from accessing the same data element at the same time? a. data redundancy b. none of the above c. data replication d. data lockout

data lockout

All of the following are elements of the DBMS which facilitate user access to the database except a. data definition language b. data access language c. data manipulation language d. query language

data access language

In the relational database model a. data is represented as a tree structure b. the user perceives that files are linked using pointers c. relationships are explicit d. data is represented on two-dimensional tables

data is represented on two-dimensional tables

The task of searching the database to locate a stored record for processing is called a. data attribution b. data deletion c. data retrieval d. data storage

data retrieval

The advantages of a partitioned database include all of the following except a. user control is enhanced b. response time is improved c. data transmission volume is increased d. risk of destruction of entire database is reduced

data transmission volume is increased

All of the following are advantages of a partitioned database except a. increased user control by having the data stored locally b. deadlocks are eliminated c. partitioning can reduce losses in case of disaster d. transaction processing response time is improved

deadlocks are eliminated

A user view a. is the logical abstract structure of the database b. specifies the relationship of data elements in the database c. defines how a particular user sees the database d. presents the physical arrangement of records in a database for a particular user

defines how a particular user sees the database

A digital signature is a. derived from the digest of a document that has been encrypted with the sender's private key b. the encrypted mathematical value of the message sender's name c. a tool that allows digital messages to be sent over analog telephone lines d. the computed digest of the sender's digital certificate

derived from the digest of a document that has been encrypted with the sender's private key

The data manipulation language a. transfers data to the buffer area for manipulation b. enables application programs to interact with and manipulate the database c. defines the database to the database management system d. describes every data element in the database

enables application programs to interact with and manipulate the database

The 'E' in REA stands for

events

When developing an REA model: a. link tables are explicitly depicted b. the same resource is both increased and decreased by the duality association c. events are organized in sequence of occurrence d. accounting artifacts are represented as support events

events are organized in sequence of occurrence

The events depicted on an REA diagram are transformed into computer processes while the resources and agents become relational database tables

false

Legacy systems are a. old manual systems that are still in place b. advanced systems without a data warehouse c. stable database systems after debugging d. flat file mainframe systems developed before client-server computing became standard

flat file mainframe systems developed before client-server computing became standard

A star topology is appropriate a. for centralized databases only b. for environments where network nodes routinely communicate with each other c. when the central database does not have to be concurrent with the nodes d. for a wide area network with a mainframe for a central computer

for a wide area network with a mainframe for a central computer

A table is in second normal form when it is a. free of insert anomalies b. free of partial dependencies c. free of repeating group data d. free of transitive dependencies

free of partial dependencies

A table is in first normal form when it is a. free of update anomalies b. free of repeating group data c. free of partial dependencies d. free of transitive dependencies

free of repeating group data

A table is in third normal form when it is a. free of partial dependencies b. free of deletion anomalies c. free of transitive dependencies d. free of repeating group data

free of transitive dependencies

Online transaction processing programs a. are available in two models—two-tier and three-tier b. allow users to analyze complex data relationships c. are bolt-on programs used with commercially available ERPs d. handle large numbers of relatively simple transactions

handle large numbers of relatively simple transactions

Goals of ERP include all of the following except a. reduced production time b. increased production c. improved customer service d. improvements of legacy systems

improvements of legacy systems

In a star topology, when the central site fails a. individual workstations can communicate with each other b. individual workstations cannot function locally and cannot communicate with other workstations c. the functions of the central site are taken over by a designated workstation d. individual workstations can function locally but cannot communicate with other workstations

individual workstations can function locally but cannot communicate with other workstations

What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area? a. multidrop network b. LAN c. intranet d. decentralized network

intranet

Which of the following tables would most likely have a composite key? a. Cash b. Ship Product c. Take Order d. Inventory Ship Link

inventory ship link

IP spoofing a. is a temporary phenomenon that disrupts transaction processing and resolves itself when the primary computer completes processing its transaction and releases the IP address needed by other users b. combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributed randomly among the targeted users c. is a form of masquerading to gain unauthorized access to a web server d. is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session

is a form of masquerading to gain unauthorized access to a web server

A virtual private network a. defines the path to a facility or file on the web b. is a private network within a public network c. is an Internet facility that links user sites locally and around the world

is a private network within a public network

The big bang approach

is more ambitious and risky than the phased-in approach

Which of the following statements is correct about TCP/IP? a. It controls web browsers that access the Internet. b. It is the basic protocol that permits communication between Internet sites. c. It is a low-level encryption scheme used to secure transmissions in HTTP format. d. It is the file format used to produce web pages.

is the basic protocol that permits communication between Internet sites

An IP address a. is represented by a 64-bit data packet b. is the address of the protocol rules and standards that govern the design of Internet hardware and software c. is the unique address that every computer node and host attached to the Internet must have d. defines the path to a facility or file on the web

is the unique address that every computer node and host attached to the Internet must have

NNTP a. is the document format used to produce web pages b. is used to connect to Usenet groups on the Internet c. controls web browsers that access the web d. is used to transfer text files, programs, spreadsheets, and databases across the Internet

is used to connect to Usenet groups on the Internet

Packet switching a. is used to establish temporary connections between network devices for the duration of a communication session. b. combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users. c. is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a garbled message. d. is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.

is used to establish temporary connections between network devices for the duration of a communication session

Each of the following is a relational algebra function except a. restrict b. join c. link d. project

link

In a REA diagram each economic event is always

linked to another economic event

Supply chain management software a. is typically under the control of external partners in the chain b. links all of the partners in the chain, including vendors, carriers, third-party firms, and information systems providers c. cannot be integrated into an overall ERP d. none of the above

links all of the partners in the chain, including vendors, carriers, third-party firms, and information systems providers

The deletion anomaly in unnormalized databases a. may result in the loss of important data b. is easily detected by users c. requires the user to perform excessive updates d. complicates adding records to the database

may result in the loss of important data

A distributed denial of service (DDoS) attack a. may take the form of either a SYN flood or smurf attack b. is more intensive that a DoS attack because it emanates from single source c. is so named because it effects many victims simultaneously, which are distributed across the Internet d. turns the target victims' computers into zombies that are unable to access the Internet

may take the form of either a SYN flood or smurf attack

To physically connect a workstation to a LAN requires a a. bridge b. multiplexer c. file server d. network interface card

network interface card

The concept of duality means that a REA diagram must consist of: a. two events, one of them economic and the other support b. two agents, one of them internal and the other external c. two resources, one increased and the other decreased by the same event d. none of the above

none of the above

Entities are a. data that describe the characteristics of properties of resources b. nouns that are depicted by rectangles on an entity relationship diagram c. sets of data needed to make a decision d. associations among elements

nouns that are depicted by rectangles on an entity relationship diagram

The update anomaly in unnormalized databases a. may result in the loss of important data b. often results in excessive record insertions c. complicates adding records to the database d. occurs because of data redundancy

occurs because of data redundancy

In the relational database model all of the following are true except a. data can be extracted from specified rows from specified tables b. only one-to-many relationships can be supported c. a new table can be built by joining two tables d. data is presented to users as tables

only one-to-many relationships can be supported

An example of a distributed database is a. partitioned database b. centralized database c. networked database d. all are examples of distributed databases

partitioned database

This class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor. a. infrastructure-as-a-service b. platform-as-a-service c. computing-as-a-service d. software-as-a-service

platform-as-a-service

Which of the following events would be least likely to be modeled in a REA diagram? a. customer inquiries b. receiving cash c. sales to a customer d. posting accounts payable

posting accounts payable

Which of the following is not an example of an economic event? a. Prepare cash disbursements voucher b. Receive goods c. Ship goods d. Get employee time

prepare cash disbursement voucher

The client-server topology a. functions only with a ring and bus topology b. reduces the number of records that must be locked by having the file server perform record searches c. increases the amount of data that is transmitted between the central file and the network node d. eliminates the need for nodes to communicate with each other

reduces the number of records that must be locked by having the file server perform record searches

Extracting data for a data warehouse a. cannot be done from flat files b. should only involve active files c. requires that the files be out of service d. all of the above

requires that the files be out of service

Which statement is not correct? A query language like SQL a. requires user familiarity with COBOL b. is written in a fourth-generation language c. reduces reliance on programmers d. allows users to retrieve and modify data

requires user familiarity with COBOL

The 'R' in REA stands for

resources

Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology, the central computer manages and controls data communications among the network nodes. a. ring topology b. bus topology c. client/server topology d. star topology

star topology

Data cleansing involves all of the following except a. filtering out or repairing invalid data b. transforming data into standard business terms c. summarizing data for ease of extraction d. formatting data from legacy systems

summarizing data for ease of extraction

Which statement is false? a. The DBMS is special software that is programmed to know which data elements each user is authorized to access. b. The DBMS does not control access to the database. c. During processing, the DBMS periodically makes backup copies of the physical database. d. User programs send requests for data to the DBMS.

the DBMS does not control access to the database

In an REA model, events are described from the perspective of a. the user b. the organization c. the designer d. the customer

the organization

The primary difference between a LAN and a WAN is a. the type of workstation used b. the geographical area covered by the network c. the transmission technology used d. the size of the company

the geographical area covered by the network

Which characteristic is not associated with the database approach to data management? a. the ability to control access to the data b. constant production of backups c. the inability to determine what data is available d. the ability to process data without the help of a programmer

the inability to determine what data is available

A description of the physical arrangement of records in the database is a. the subschema b. the external view c. the conceptual view d. the internal view

the internal view

When assigning foreign keys in a 1:1 association, a. the primary key of each table should be embedded as a foreign key in the related table b. the primary key on the (0,1) side of the relation should be embedded as the foreign key on the (1,1) side c. the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,1) side d. none of the above is true

the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,1) side

When assigning foreign keys in a 1:M association, a. the primary key of each table should be embedded as a foreign key in the related table b. the primary key on the (0,M) side of the relation should be embedded as the foreign key on the (1,1) side c. the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,M) side d. none of the above is true

the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,M) side

Which of the following may provide many distinct views of the database? a. the schema b. the internal view c. the user view d. the conceptual view

the user view

In a hierarchical model a. the way to access data is by following a predefined data path b. links between related records are implicit c. a member (child) record may have more than one owner (parent) d. an owner (parent) record may own just one member (child) record

the way to access data is by following a predefined data path

A replicated database is appropriate when a. there is no risk of the deadlock phenomenon b. there is minimal data sharing among information processing units c. most data sharing consists of read-write transactions d. there exists a high degree of data sharing and no primary user

there exists a high degree of data sharing and no primary user

Which duty is not the responsibility of the database administrator? a. to implement security controls b. to design application programs c. to develop and maintain the data dictionary d. to design the subschema

to design application programs

Modern managers need both financial and nonfinancial information that traditional GAAP-based accounting systems are incapable of providing.

true

The formal name for a row in the physical database table is

tuple

Task-data dependency is a. another term for data redundancy b. user's inability to obtain additional information as needs change c. none of the above d. failure to update the files of all users affected by a change

user's inability to obtain additional information as needs change

REA diagrams include all of the following entities except a. economic events b. users c. support events d. internal agents

users


Related study sets

Independent, Dependent and Controlled Variables

View Set

Community - Women's Health Promotion missed questions

View Set

Section E: East India Company under Lord Cornwallis

View Set

5/14: Mental/physical co-morbidity in adults

View Set

AP Bio homework quiz #1- animal form and function

View Set

Oxygen and Aerobic Metabolism Physiology Lab

View Set

Chapter 33 "Limited Partnerships and Limited Liability Companies"

View Set

Chapter 9 - Cryptography Implementation

View Set