Acct 451 Exam #3
Data concurrency a. occurs when a deadlock is triggered b. is a security issue in partitioned databases c. may result in data lockout d. is implemented using timestamping
is implemented using timestamping
Which of the following is usually not part of an ERP's OLAP applications? a. logistics b. what-if analysis c. ad hoc analysis d. decision support systems
logistics
Data currency is preserved in a centralized database by a. replicating the database b. using a lockout procedure c. partitioning the database d. implementing concurrency controls
using a lockout procedure
Which method does not manage or control data collisions that might occur on a network? a. polling b. token passing c. carrier sensing d. multiplexing
multiplexing
Which of the following associations would most likely describe the relationship between an internal agent and an economic event? a. 1:M b. 1:1 c. 0:M d. none of the above
1:M
Which statement is least accurate? a. Implementing an ERP system has as much to do with changing the way an organization does business as it does with technology. b. To take full advantage of the ERP process, reengineering will need to occur. c. A common reason for ERP failure is that the ERP does not support one or more important business processes of the organization. d. The big bang approach to ERP implementation is generally riskier than the phased-in approach.
A common reason for ERP failure is that the ERP does not support one or more important business processes of the organization.
Which of the following is a reason that data warehouses are created and maintained separately from operational databases? a. A separate centralized data warehouse is an effective means of collecting data from diverse sources. b. No ERP system incorporates data warehousing capability. c. Audit controls require that data for management analysis be kept separate from transaction data. d. The data is used in different ways that requires it to be physically separate.
A separate centralized data warehouse is an effective means of collecting data from diverse sources.
Which of the following is not a risk associated with ERP implementation? a. opposition to changes in the business culture b. choosing the wrong ERP c. choosing the wrong consultant d. All of these are risks associated with ERP implementations.
All of these are risks associated with ERP implementations
Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies always contain encrypted data. c. Cookies contain the URLs of sites visited by the user. d. Cookies are text files and never contain encrypted data.
Cookies contain the URLs of sites visited by the user
Which statement is true? a. ERPs are infinitely scalable. b. Performance problems usually stem from technical problems, not business process reengineering. c. ERP systems can be modified using bolt-on software. d. The higher-end ERP can handle any problems an organization can have.
ERP systems can be modified using bolt-on software
Which of the following statements is not true? a. In three-tier client server architecture, one tier is for user presentations, one is for database and applications, and the third is for Internet access. b. Client computers are responsible for presenting data to the user and passing user input back to the server. c. The database and application functions are separate in the three-tier model. d. In a typical two-tier client server system, the server handles both application and database duties.
In three-tier client server architecture, one tier is for user presentations, one is for database and applications, and the third is for Internet access
A message that is made to look as though it is coming from a trusted source but is not is called a. URL masquerading b. a denial of service attack c. Internet protocol spoofing d. digital signature forging
Internet protocol spoofing
Which of the following statements is least likely to be true about a data warehouse? a. It may be deployed by organizations that have not implemented an ERP. b. It is constructed for quick searching and ad hoc queries. c. It contains data that are normally extracted periodically from the operating databases. d. It was an original part of all ERP systems.
It was an original part of all ERP systems.
Which of the following associations requires a separate link table? a. 1:1 b. 1:M c. M:M d. none of the above
M:M
Which statements about data warehousing is not correct? a. Drill-down is a data-mining tool available to users of OLAP. b. Data cleansing is a process of transforming data into standard form. c. The data warehouse should be separate from the operational system. d. Normalization is a requirement of databases included in a data warehouse.
Normalization is a requirement of databases included in a data warehouse.
Which of the following is usually not part of an ERP's core applications? a. OLTP applications b. business planning applications c. sales and distribution applications d. OLAP applications
OLAP Applications
Which of the following statements is correct? a. The REA model requires that phenomena be characterized in a manner consistent with the development of a multiple user view. b. The REA model requires that phenomena be characterized in a manner consistent with the development of a unique user view. c. The REA model requires that phenomena be characterized in a manner consistent with the development of a single user view. d. The REA model requires that phenomena be characterized in a manner consistent with the development of a selected user view.
The REA model requires that phenomena be characterized in a manner consistent with the development of a multiple user view
Which of the following are characteristics of internal agents? a. They participate in economic events, but do not assume control of the resources. b. They are employees of the company whose system is being modeled. c. They participate in economic events, but not in support events. d. All of the above.
They are employees of the company whose system is being modeled.
Which statement about ERP installation is least accurate? a. The phased-in approach is more suited to diversified businesses. b. ERP fails because some important business process is not supported. c. When a business is diversified, little is gained from ERP installation. d. For the ERP to be successful, process reengineering must occur.
When a business is diversified, little is gained from ERP installation
A data mart is a. a data warehouse created for a single function or department b. an enterprise resource planning system c. a database that provides data to an organization's customers d. another name for a data warehouse
a data warehouse created for a single function or department
Closed database architecture is a. a data warehouse control that prevents unclean data from entering the warehouse b. a limitation inherent in traditional information systems that prevents data sharing c. a control technique intended to prevent unauthorized access from trading partners d. a database structure that many of the leading ERPs use to support OLTP applications
a limitation inherent in traditional information systems that prevents data sharing
Which statement is not true? REA resources are: a. under the control of agents b. scarce c. assets d. affected by support events
affected by support events
The 'A' in REA stands for
agents
Which of the following is a level of the database that is defined by the data definition language? a. user view b. schema c. internal view d. all are levels or views of the database
all are levels or views of the database
Core applications are a. sales and distribution b. business planning c. shop floor control and logistics d. all of the above
all of the above
Protocols a. facilitate the physical connection between the network devices b. synchronize the transfer of data between physical devices c. provide a basis for error checking and measuring network performance d. all of the above
all of the above
The setup of a data warehouse includes a. modeling the data b. extracting data from operational databases c. cleansing the data d. all of the above
all of the above
Which of the following is true? a. REA diagram entities are arranged in constellations by entity class. b. ER diagrams present a static picture of the underlying business phenomena. c. Events entity names in REA diagrams are in the verb form. d. All of the above are true statements.
all of the above are true statements
Auditors of ERP systems a. are concerned that managers fail to exercise adequate care in assigning permissions b. need not review access levels granted to users because these are determined when the system is configured and never change c. need not be concerned about segregation of duties because these systems possess strong computer controls d. focus on output controls such as independent verification to reconcile batch totals
are concerned that managers fail to exercise adequate care in assigning permissions
The big bang method a. is more ambitious than the phased-in method b. has been associated with many failures c. both a. and b. d. neither a. nor b.
both a and b
Users access the database a. by constantly interacting with systems programmers b. all of the above c. by developing operating software d. by direct query
by direct query
All of the following are examples of economic events except a. shipping product to a customer b. checking a customer's credit prior to processing a sales order c. receiving raw materials from a supplier d. disbursing cash for inventories received
checking a customer's credit prior to processing a sales order
Most ERPs are based on which network model? a. peer to peer b. client-server c. ring topology d. bus topology
client-server
Which term is not associated with the relational database model? a. tuple b. attribute c. collision d. relation
collision
What control maintains complete, current, and consistent data at all information processing units? a. gateway control b. concurrency control c. replication control d. deadlock control
concurrency control
Data warehousing processes do not include a. transforming data b. extracting data c. modeling data d. condensing data
condensing data
Which procedure will prevent two end users from accessing the same data element at the same time? a. data redundancy b. none of the above c. data replication d. data lockout
data lockout
All of the following are elements of the DBMS which facilitate user access to the database except a. data definition language b. data access language c. data manipulation language d. query language
data access language
In the relational database model a. data is represented as a tree structure b. the user perceives that files are linked using pointers c. relationships are explicit d. data is represented on two-dimensional tables
data is represented on two-dimensional tables
The task of searching the database to locate a stored record for processing is called a. data attribution b. data deletion c. data retrieval d. data storage
data retrieval
The advantages of a partitioned database include all of the following except a. user control is enhanced b. response time is improved c. data transmission volume is increased d. risk of destruction of entire database is reduced
data transmission volume is increased
All of the following are advantages of a partitioned database except a. increased user control by having the data stored locally b. deadlocks are eliminated c. partitioning can reduce losses in case of disaster d. transaction processing response time is improved
deadlocks are eliminated
A user view a. is the logical abstract structure of the database b. specifies the relationship of data elements in the database c. defines how a particular user sees the database d. presents the physical arrangement of records in a database for a particular user
defines how a particular user sees the database
A digital signature is a. derived from the digest of a document that has been encrypted with the sender's private key b. the encrypted mathematical value of the message sender's name c. a tool that allows digital messages to be sent over analog telephone lines d. the computed digest of the sender's digital certificate
derived from the digest of a document that has been encrypted with the sender's private key
The data manipulation language a. transfers data to the buffer area for manipulation b. enables application programs to interact with and manipulate the database c. defines the database to the database management system d. describes every data element in the database
enables application programs to interact with and manipulate the database
The 'E' in REA stands for
events
When developing an REA model: a. link tables are explicitly depicted b. the same resource is both increased and decreased by the duality association c. events are organized in sequence of occurrence d. accounting artifacts are represented as support events
events are organized in sequence of occurrence
The events depicted on an REA diagram are transformed into computer processes while the resources and agents become relational database tables
false
Legacy systems are a. old manual systems that are still in place b. advanced systems without a data warehouse c. stable database systems after debugging d. flat file mainframe systems developed before client-server computing became standard
flat file mainframe systems developed before client-server computing became standard
A star topology is appropriate a. for centralized databases only b. for environments where network nodes routinely communicate with each other c. when the central database does not have to be concurrent with the nodes d. for a wide area network with a mainframe for a central computer
for a wide area network with a mainframe for a central computer
A table is in second normal form when it is a. free of insert anomalies b. free of partial dependencies c. free of repeating group data d. free of transitive dependencies
free of partial dependencies
A table is in first normal form when it is a. free of update anomalies b. free of repeating group data c. free of partial dependencies d. free of transitive dependencies
free of repeating group data
A table is in third normal form when it is a. free of partial dependencies b. free of deletion anomalies c. free of transitive dependencies d. free of repeating group data
free of transitive dependencies
Online transaction processing programs a. are available in two models—two-tier and three-tier b. allow users to analyze complex data relationships c. are bolt-on programs used with commercially available ERPs d. handle large numbers of relatively simple transactions
handle large numbers of relatively simple transactions
Goals of ERP include all of the following except a. reduced production time b. increased production c. improved customer service d. improvements of legacy systems
improvements of legacy systems
In a star topology, when the central site fails a. individual workstations can communicate with each other b. individual workstations cannot function locally and cannot communicate with other workstations c. the functions of the central site are taken over by a designated workstation d. individual workstations can function locally but cannot communicate with other workstations
individual workstations can function locally but cannot communicate with other workstations
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area? a. multidrop network b. LAN c. intranet d. decentralized network
intranet
Which of the following tables would most likely have a composite key? a. Cash b. Ship Product c. Take Order d. Inventory Ship Link
inventory ship link
IP spoofing a. is a temporary phenomenon that disrupts transaction processing and resolves itself when the primary computer completes processing its transaction and releases the IP address needed by other users b. combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributed randomly among the targeted users c. is a form of masquerading to gain unauthorized access to a web server d. is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session
is a form of masquerading to gain unauthorized access to a web server
A virtual private network a. defines the path to a facility or file on the web b. is a private network within a public network c. is an Internet facility that links user sites locally and around the world
is a private network within a public network
The big bang approach
is more ambitious and risky than the phased-in approach
Which of the following statements is correct about TCP/IP? a. It controls web browsers that access the Internet. b. It is the basic protocol that permits communication between Internet sites. c. It is a low-level encryption scheme used to secure transmissions in HTTP format. d. It is the file format used to produce web pages.
is the basic protocol that permits communication between Internet sites
An IP address a. is represented by a 64-bit data packet b. is the address of the protocol rules and standards that govern the design of Internet hardware and software c. is the unique address that every computer node and host attached to the Internet must have d. defines the path to a facility or file on the web
is the unique address that every computer node and host attached to the Internet must have
NNTP a. is the document format used to produce web pages b. is used to connect to Usenet groups on the Internet c. controls web browsers that access the web d. is used to transfer text files, programs, spreadsheets, and databases across the Internet
is used to connect to Usenet groups on the Internet
Packet switching a. is used to establish temporary connections between network devices for the duration of a communication session. b. combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users. c. is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a garbled message. d. is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
is used to establish temporary connections between network devices for the duration of a communication session
Each of the following is a relational algebra function except a. restrict b. join c. link d. project
link
In a REA diagram each economic event is always
linked to another economic event
Supply chain management software a. is typically under the control of external partners in the chain b. links all of the partners in the chain, including vendors, carriers, third-party firms, and information systems providers c. cannot be integrated into an overall ERP d. none of the above
links all of the partners in the chain, including vendors, carriers, third-party firms, and information systems providers
The deletion anomaly in unnormalized databases a. may result in the loss of important data b. is easily detected by users c. requires the user to perform excessive updates d. complicates adding records to the database
may result in the loss of important data
A distributed denial of service (DDoS) attack a. may take the form of either a SYN flood or smurf attack b. is more intensive that a DoS attack because it emanates from single source c. is so named because it effects many victims simultaneously, which are distributed across the Internet d. turns the target victims' computers into zombies that are unable to access the Internet
may take the form of either a SYN flood or smurf attack
To physically connect a workstation to a LAN requires a a. bridge b. multiplexer c. file server d. network interface card
network interface card
The concept of duality means that a REA diagram must consist of: a. two events, one of them economic and the other support b. two agents, one of them internal and the other external c. two resources, one increased and the other decreased by the same event d. none of the above
none of the above
Entities are a. data that describe the characteristics of properties of resources b. nouns that are depicted by rectangles on an entity relationship diagram c. sets of data needed to make a decision d. associations among elements
nouns that are depicted by rectangles on an entity relationship diagram
The update anomaly in unnormalized databases a. may result in the loss of important data b. often results in excessive record insertions c. complicates adding records to the database d. occurs because of data redundancy
occurs because of data redundancy
In the relational database model all of the following are true except a. data can be extracted from specified rows from specified tables b. only one-to-many relationships can be supported c. a new table can be built by joining two tables d. data is presented to users as tables
only one-to-many relationships can be supported
An example of a distributed database is a. partitioned database b. centralized database c. networked database d. all are examples of distributed databases
partitioned database
This class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor. a. infrastructure-as-a-service b. platform-as-a-service c. computing-as-a-service d. software-as-a-service
platform-as-a-service
Which of the following events would be least likely to be modeled in a REA diagram? a. customer inquiries b. receiving cash c. sales to a customer d. posting accounts payable
posting accounts payable
Which of the following is not an example of an economic event? a. Prepare cash disbursements voucher b. Receive goods c. Ship goods d. Get employee time
prepare cash disbursement voucher
The client-server topology a. functions only with a ring and bus topology b. reduces the number of records that must be locked by having the file server perform record searches c. increases the amount of data that is transmitted between the central file and the network node d. eliminates the need for nodes to communicate with each other
reduces the number of records that must be locked by having the file server perform record searches
Extracting data for a data warehouse a. cannot be done from flat files b. should only involve active files c. requires that the files be out of service d. all of the above
requires that the files be out of service
Which statement is not correct? A query language like SQL a. requires user familiarity with COBOL b. is written in a fourth-generation language c. reduces reliance on programmers d. allows users to retrieve and modify data
requires user familiarity with COBOL
The 'R' in REA stands for
resources
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology, the central computer manages and controls data communications among the network nodes. a. ring topology b. bus topology c. client/server topology d. star topology
star topology
Data cleansing involves all of the following except a. filtering out or repairing invalid data b. transforming data into standard business terms c. summarizing data for ease of extraction d. formatting data from legacy systems
summarizing data for ease of extraction
Which statement is false? a. The DBMS is special software that is programmed to know which data elements each user is authorized to access. b. The DBMS does not control access to the database. c. During processing, the DBMS periodically makes backup copies of the physical database. d. User programs send requests for data to the DBMS.
the DBMS does not control access to the database
In an REA model, events are described from the perspective of a. the user b. the organization c. the designer d. the customer
the organization
The primary difference between a LAN and a WAN is a. the type of workstation used b. the geographical area covered by the network c. the transmission technology used d. the size of the company
the geographical area covered by the network
Which characteristic is not associated with the database approach to data management? a. the ability to control access to the data b. constant production of backups c. the inability to determine what data is available d. the ability to process data without the help of a programmer
the inability to determine what data is available
A description of the physical arrangement of records in the database is a. the subschema b. the external view c. the conceptual view d. the internal view
the internal view
When assigning foreign keys in a 1:1 association, a. the primary key of each table should be embedded as a foreign key in the related table b. the primary key on the (0,1) side of the relation should be embedded as the foreign key on the (1,1) side c. the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,1) side d. none of the above is true
the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,1) side
When assigning foreign keys in a 1:M association, a. the primary key of each table should be embedded as a foreign key in the related table b. the primary key on the (0,M) side of the relation should be embedded as the foreign key on the (1,1) side c. the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,M) side d. none of the above is true
the primary key on the (1,1) side of the relation should be embedded as the foreign key on the (0,M) side
Which of the following may provide many distinct views of the database? a. the schema b. the internal view c. the user view d. the conceptual view
the user view
In a hierarchical model a. the way to access data is by following a predefined data path b. links between related records are implicit c. a member (child) record may have more than one owner (parent) d. an owner (parent) record may own just one member (child) record
the way to access data is by following a predefined data path
A replicated database is appropriate when a. there is no risk of the deadlock phenomenon b. there is minimal data sharing among information processing units c. most data sharing consists of read-write transactions d. there exists a high degree of data sharing and no primary user
there exists a high degree of data sharing and no primary user
Which duty is not the responsibility of the database administrator? a. to implement security controls b. to design application programs c. to develop and maintain the data dictionary d. to design the subschema
to design application programs
Modern managers need both financial and nonfinancial information that traditional GAAP-based accounting systems are incapable of providing.
true
The formal name for a row in the physical database table is
tuple
Task-data dependency is a. another term for data redundancy b. user's inability to obtain additional information as needs change c. none of the above d. failure to update the files of all users affected by a change
user's inability to obtain additional information as needs change
REA diagrams include all of the following entities except a. economic events b. users c. support events d. internal agents
users