• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/134

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

134 Cards in this Set

  • Front
  • Back

Which of the following are advantages of the database approach to accounting over the traditional approach?

* Storage of Data in the Most Dis-aggregated form




* Support for Cross-Functional Data analysis

Advantages of the Database Approach include

Events Orientation, Support for real-time reporting, support for Ad-hoc queries and support for cross-functional data analysis

Drawbacks of the traditional approach to accounting

Transactions orientation rather than events orientation, Narrow focus on Financial Data, limited accessibility of information, periodic rather than real time reporting

In the hierarchy of data, A group of _____ makes up a _____

Fields, Record

In the hierarchy of data, group of related _____ forms a field

Bytes

_____ Represents raw facts, whereas _____ is data made meaningful

Data, Information

Every file must have one ____ and may have one or more _____

Primary Key, Non-Key attributes

If a file has two unique identifiers, each is called a _____ key

Candidate

When two or more fields together serve as the primary key in a file, the key is called

Concatenated Key

A file may have more than one _____ but can have only one _____

Unique Identifier, Primary Key

A ____ File is accessed during a file maintenance run but not updated

Reference File

_____Files are relatively temporary while ____ files are relatively permanent

Transaction, Master

Editing and sorting the data file are steps performed during the ____ stage in the data processing cycle

Data Preparation

In the data processing cycle, deleting the record for customer ABC would occur during the

File Maintenance stage

Internal Label Test, Sequence check, and control total verification are all type of

Processing controls in batch processing systems

Which of the Following controls CANNOT be used in batch processing systems

1.Closed loop verification


2.System Generated data


3.Validity Test


4. All of the above


1 and 2

Which of the following are components of a CPU

1. ALU


2. Control Unit


3. ROM


4. All of the above


1-2

Which of the following is the speediest type of memory

Asynchronous DRAM


Synchronous RAM


ECC RAM


Cache Memory (Static Ram)


Dodge Ram

Not Internal Bus Type

I/O bus

Fastest type of Ram

RDRAM

Cache Memory

an area of very high speed memory designed to store data and instructions that are likely to be needed by the processor

A Language translator is a type of systems software designed to

Convert source code to object code

ROM

Read ONLY memory

System Software

Allows application program to interact with hardware

Application software

Process user data and coverts it to information

The Internet uses ______ to transmit data around the global network

Packet Switching

Intranet

Like the internet, but for authorized users

In contrast to low-end and mid-range accounting software, only high end packages

Interface with a relational database

______ in a DFD map to ______ in a relational database

Processes, Forms

In a relational database system, entity integrity means that

The Primary key CANNOT be null and the primary key must be unique

In relational database systems, ______ effectively form an electronic audit trail

Foreign keys in related tables

Which of the following is NOT a relational database system

OBJECTSTORE

The Data in virtually all ERP systems is physically stored in a/an

Relational database system

Advantages of the database approach include all of the following except

1 Events orientation


2 Access to database only by accountants


3 support for real-time reporting


4 support adhoc queries


5 Support for cross-functional data analysis


2

Which is not an advantage of the database approach in contrast to the file oriented approach

data redundancy virtually eliminated


data independence


rapid application development due to sharing of data structure between applications


greater potential for data inconsistencies


reduction in data storage costs

A ______ key is a non-key attribute in a data set which is the primary key in another data set

Foreign Key

In database terminology, another term for a view is

Virtual table

The language used to create a database schema is the

Data Definition Language (DDL)

Which is true regarding referential integrity in the relational model

A foreign key can have a null value when it is a non-key attribute


If a foreign key has a value, it must match a value in the master table


a foreign key must always have a value, even when it is a nonkey attribute


All of the above

In the Database approach, the functions of data backup, control and security

are centralized

If a data set has only one unique identifier, that unique identifier becomes the

Primary key

SQL and QBE are examples of

DQL - Data query Language

DML

Data Manipulation language - used to change database

If a vendor can supply many items, and if an item can be supplied by only one vendor, then the relationshop going from VENDORS to ITEMS is

1:M ONE TO MANY

In the relational model, if two tables are related a ______ must exists in one of the tables

Foreign Key

Entity Intergrity in the relational model means

The primary key must no be null and has to be unique

in the ______ approach, each application created its own set of files regardless of existing files

File oriented approach

In a Table, a foreign key can be either

A nonkey attribute or part of a composite primary key

Which of the following are rules for relations in the relational model

Duplicate rows and columns are not allowed


relation names must be unique


the first column in every table must be the primary key


all of the above


1-2

In the database approach, Data structure definitions are handled by

the database managment system

The main tasks conducted during the systems design stage is/are

Integration of the data and process models


converting the physical model into data structures


converting logical models into physical models


all of the above


1-3

Which of the following is not a stage in the SDLC (systems development life cycle)

Systems analysis


system design


system development


systems operation and maintanence


none of the above (all SDLC stages)

The four stage process of creation, startup, maturity, and decline of systems is referred to as

systems life cycle

Logical modeling and model intergration are steps conducted during the ______ stage of the systems development life cycle

systems design

a Post-implementation review has which of the following objectives

to determine wether the system meets users needs


to determine whether the SDLC process can be improved


to switch from the old information system to the new one


all of the above


1 - 2

All of the following are stages in the Systems life cycle except

Creation


startup


change


maturity


decline

creating of data structures and detailed programming are steps undertaken during which of the stages of SDLC

Systems development

Interviews, questionares and observations are techniques used for ______ in the ______ stage of the SDLC

requirements analysis, system analysis

Creation of an entity-relationship diagram to represent data items of relevance to users will occur in which stage of the SLDC

system design

Analyzing user requirements and surveying existing systems are steps conducted in which stage of the SDLC

System analysis

first stage in the systems life cycle

creation

Another term for Logical data modeling is

Conceptual data modeling

Extended entity relationship diagrams are used to depict a ______ model of the system, while data flow diagrams are used to depict a ______ model of the system

Logical data, Logical process

In the physical modeling of Logical process models (data flow diagrams) database forms for maintaining information are created for which of the following table types

agent tables


resource tables


event tables


all of the above


1-2

A lvl 0 DFD

shows details about a high level process depicted in a context diagram

In an EER diagram, an O on the relationship line next to an entity is used to indicated that

the entities participation in the relationship is optional

in a DFD, a single headed arrow originating from a data store, and going to a process indicates that the data store is being

accessed by the process

At the highest lvl, a DFD is reffered to as a

Context Diagram

If a SUPERVISOR can have either none or many subordinates, the minimum----maximum cardinatlity for SUBORDINATES is

0 ---N

In an EER model, a vertical line indicates

mandatory participation in the relationship

DFD diagram, arrows are used to represent

data flows

Ovals in an EER indicate

Attributes

in a DFD, open ended rectangles are used to indicate

data stores

unlike an ER model, only an EER model shows

Cardinality of relationships


optionality of relationships


attributes of entities and relationships


ALL OF THE ABOVE

Extended entity relationship diagrams are used to depict a ____ model of the system, while DFD are used to depict a ______ model of the system

logical data, logical process

In an EER model, Crows feet indicate

Many side of a relationship

Which symbol is used in a LVL 0 DFD but not in a context diagram

Data store

A context diagram treat the entire information system as one process and shows

Inputs and outputs of the system

A table with only one NONkey attribute can never violate

Third Normal Form

Correct conversion rule for mandatory M:M relationship

Create composite key table, with the primary key of each entity being used as the composite primary key

____ in a DFD map to_____ in a relational database

Process, Forms

Consider two related tables, Table A and B, if the primary key of B appears as a foreign key in A, it means that

there is a 1:M relationship from Table B to Table A

For a table to be in first normal form, it must

not have any repeating groups

Correct conversion rule for mandatory 1:1 relationships

collapse both entities into one table with a single field chosen as the primary key

A table with a single field primary key can never

Violate second normal form

Correct conversion rule for mandatory 1:M relationship

Post the primary key of the table on the ONE side of the relationship to the table on the MANY side of the relationship

If Field A is functionally dependant on Field B,

For every Value of B there can only be one possible value of A

A table in third normal form

cannot have any repeating groups,


has no transitive dependencies,


has no non-keyfields depending on only a part of the composite primary key

A transitive dependency is a dependency between

Two non-key attributes

A third normal form violation can occur

A table with a single field primary key and two non-key attributes




and




A table with a composite key and two-nonkey attributes

For a table to be in 2NF

it must be in 1NF and every nonkey attribute must depend on the ENTIRE primary key

PROJECTS table is used to keep track of the quantity of each part required on each project.




PROJECTS(PROJECTNO.PART-NO, PART-DESCRIPTION, QTYREQUIRED)

has a partial dependency on a composite primary key and therefore violates second normal form

Only a table with _____

can potentially violate second normal form

According to conversion rules, "optional" relationships are treated as _____ for the purpose of conversion

"Mandatory many" relationships

Economic Duality relationship

The Dollar amount of loss that would occur if a ____ is realized is called ______

risk, exposure

Not a risk in computer based systems

Errors and irregularities in data


loss of data


natural disasters


computer crime


all of the above


NONE of the above

Controls designed to prevent or detect errors within each information system or subsystem are called

application controls

policies and guidelines established by management to provide reasonable assurance that specific entity objectives will be achived

control activities

parity check, dual read check are types of

hardware controls

most secure method of proctecting data during transmission

Public key encryption

indicates which users have access to which files or programs and the type of access allowed

access control matrix

Most important segregation of duties within AIS

programming and computer operations

Auditor manually reperforms computer processing steps for selected transactions inputs when she/he is

auditing around the computer

Not a capability of generalized audit software

generating test transactions

Auditor can rely on computerbased apps only if

general control procedures are found to be reliable

Not a problem caused by computerization of accounting systems

Greater likelihood of errors in calculations

Auditing WITH the computer can be performed using which of the following technicques

Utility programs


Genarilized audit software


Query processing in database environments


ALL of the above


1-2

When allowable detection risk is low

the auditor must perform extensive tests of detail

Not a component of Audit risk

Managment risk

every single transaction error that occured during an audit period can be captured using

Embedded Audit module

The_____ technique involves creating a dummy file

integrated test facility

Continous auditing techniques

Integrated test facility


embedded audit modules

Auditing AROUND the computer is an approach that

treats the computer like a BLACK box

NOT a capability of generalized audit software

Generating test transactions

All of the following are revenue business process except

Shipping merchandise to customers


Collecting cash from customers


Executing sales


Checking the validity of item numbers entered on sales orders


NONE OF THE ABOVE

Which table must be accessed to determine accounts receivable

Customers

Inputs to the sales, collections and sales returns include all of the following except

Shipping documents


customer payments


sales orders


return authorizations

nontraditional resource related to revenue business processes that would be captured in the even oriented approach

FEEDBACK

Outputs from the expenditure system include all of the following except

Purchase orders


vendor invoices


payment to vendors


debit memos



Before a purchase order can be created a

purchase requisition must exist

A control that ensures that the CONDITION field accepts only one of the following values --good, satisfactory, poor is called a

Validity Check

Which does not access the inventory table

Process returns

Which of the following is not an expenditure system process

Keeping track of prices of items available for sale from different vendors

processing purchase requisitions received from departments


issuing purchase orders to vendors


processing returns of items to vendors


ALL of the above are expenditures system processes


Inputs for the expenditure system include all excecpt

Departamental requisitions


vendor invoices


item prices


Debit memos


All of the above are expenditures system processes

Process in the expenditure system begin with the

creating of a purchase requisition by a department

Not an Advantage of ERP

Duplication of data, minimizing accidental data loss


online validation of data


ability to generate real time reports


ability to drill down to view details of summary reports


automated procedures spanning functional areas

_____processes increase cash and ____ processes decrease cash

Sales, Purchases

NOT a relational database system

OBJECTSTORE

programming language used to develop the applications within SAP

ABAP/4

In addition to purchasing related and sales related busines processes, the enterprise wide model also needs to represent

Human resources related process


fixed asset related processes


loan related process


ALL OF THE ABOVE


NONE of the above

Anthethisis of cross functioinal intergration is

Departmental stove pipes or silos

Not an advantage of ERP systems

Promotes STOVEPIPING of departments such that data in one department will never affect any other department


d