You are on page 1of 3

NAME: _________________________________________________ DATE:________________________

Test I.
____________________1.Refers to the way records are physically arranged on the
secondary storage device
____________________2.Is the technique used to locate records and to navigate
through the database or file
____________________3.Is used for very large files that require routine batch
processing and a moderate degree of individual record processing.
____________________4.Employs an algorithm that converts the primary key of a record
directly into a storage address.
____________________5.This approach stores in a field of one record the address
(pointer) of a related record.
____________________6.Are the data elements that define an entity.
____________________7.It is the degree of association between two entities.
8-10. Enumerate the three types of pointer.
8.________________________________
9.________________________________
10._______________________________
Test II.
____________________1.Is the set of data that a particular user sees that may be
digital or physical (paper), but in all cases, they derive from underlying database
tables.
____________________2.The organization wants to add the future data to the current
database but should not be because it will or will not happen in the future
____________________3.Results from data redundancy in an unnormalized table.
____________________4.Association exists between tables, either (or both) primary
keys may be embedded as foreign keys in the related table
5-10 Enumerate the 6 Six phases of Database design.
5.
6.
7.
8.
9.
10.
Test III.
____________________1.Known as continuous auditing it is to identify important
transactions while they are being processed and extra copies of them in real time.
____________________2.Is the most widely used CAAT for auditing.
____________________3.Is the leader in the industry and was designed as a meta-
language for auditors to access data stored in various digital formats and to test
them comprehensively.
____________________4.This features allows the auditor to view the distribution of
records that fall into specified strata.
____________________5.Two of the most frequently used are record sampling and
monetary sampling.
____________________6.Filters are expressions that search for records that meet the
filter criteria.
____________________7.Auditors seldom need to use all the data contained in a file.
Presents a reorganized view that focuses on critical data elements.
____________________8.Allows the auditor to define important characteristics of the
source file, including overall record length, the name given to each field, the type
of data contained in each field and the starting point & length of each field in the
file.
____________________9.Approach that may not be a viable audit technique in
environments with a high level of program maintenance.
___________________10.Combining the data needs of all users into a single schema.
____________________9.Approach that may not be a viable audit technique in
environments with a high level of program maintenance.
___________________10.Combining the data needs of all users into a single schema.
ANSWER KEYS
Test I.
1. Organization
2. Access method
3. Virtual Storage access method (VSAM)
4. Hashing Structure
5. Pointer Structures
6. Attributes
7. Cardinality
8-10. Enumeration-types of pointer
1) physical address pointer
2)relative address pointer
3) key logical pointer
Test II.
1. User views
2. Insertion anomaly
3. Update anomaly
4. Key in 1:1 Association
5-10 Enumerate the 6 Six phases of Database design.
5. Identify entities
6. Contruct a data model showing entity associations
7. Add primary keys and attributes to the model
8. Normalize data model and add foreign keys
9. Constract the physical database
10.Prepare the user views
Test III.
1. Embedded audit model
2. Generalized audit software
3. Audit command language (acl) Software
4. Stratifying data
5. Statistical Analysis
6. Filtering data
7. Customizing a view
8. Data Definition
9. Verifying EAM integrity
10.Global view integration

You might also like