You are on page 1of 3

QUIZ #11: ENTERPRISE RESOURCE PLANNING SYSTEMS

1. Enterprise Research Planning integrates key processes of the organization such as order
entry, manufacturing, procurement and accounts payable, payroll, and human resources.
a. True
b. False
2. ERP Business Analysis Application operationally supports the day-to-day activities of the
business
a. True
b. False
3. An ERP system could exist without having a data warehouse.
a. True
b. False
4. Online Analytical Processing (OLAP) events is consist of large numbers of relatively
simple transactions, such as updating accounting records that are stored in several related
tables.
a. True
b. False
5. In ERP systems configuration, “two-tier model” is typically used for local area network
(LAN) applications for which the demand on the server is restricted to a relatively small
population to users.
a. True
b. False
6. It is a relational or multidimensional database that may consume hundreds of gigabytes or
even terabytes of disk storage.
a. Data Mart
b. Data Extraction
c. Data Warehousing
d. Data Mining
7. Administrators and line managers may create new roles, modify existing roles, and delete
roles that are no longer needed in RBAC. Creating a role involves defining the following
role attributes except:
a. A stated set of business responsibilities to be performed within the role.
b. The ethical behaviors taken into account in performing the duties of the role
c. The technical competencies needed to perform the role.
d. The specific transactions (permissions) required to carry out the stated responsibilities.
8. The following are the reasons data warehouses must be created and maintained separately
from the operational databases, except:
a. Consolidation of Global Data
b. Smooth and Economic Growth
c. Internal Efficiency
d. Integration of Legacy Systems
9. What is the difference between the traditional access control list approach and the role-
based access control (RBAC)?
a. RBAC assigns access permissions to the role an individual play in the organization rather
than directly to the individual, which is portrayed in the traditional approach
b. The traditional approach allows multiple access to a single user while RBAC only allows
one access per user.
c. The traditional approach conveniently handles many-to-many relationships between users
and permissions and facilitates dealing efficiently with vast numbers of employees better
than the RBAC.
d. The traditional approach model is very flexible when allowing for the assignment of specific
access privileges to individuals while the RBAC is quite inflexible.
10. Which of the following is false regarding data warehousing process?
a. Data contained in a data warehouse are in volatile, unstable status
b. Normalizing data in an operational database is necessary to reflect accurately the dynamic
interactions among entities.
c. To improve efficiency, data can be transformed into summary views before they are loaded
into the warehouse.
d. Relational theory does not apply to a data warehousing system because the Sales
Order/Product relation is stable.
11. The following should be done by the management before engaging an outside consultant,
except:
a. Conduct reference checks of the proposed staff members.
b. Align the consultants’ interests with those of the organization by negotiating a pay-for-
performance scheme based on achieving certain milestones in the project.
c. Set a firm termination date for the consultant to avoid consulting arrangements becoming
interminable, resulting in dependency and an endless stream of fees.
d. Interview the staffs proposed for the project and draft a provisional contract with the names
of the members of the consulting team and their respective tasks
12. Data mining involves:
a. Extracting, converting, and standardizing an organization’s operational data from ERP and
legacy systems and loading it into
b. Collecting data from operational databases, flat files, archives, and external data sources.
c. Sophisticate techniques that use database queries and artificial intelligence
d. Transforming data into standard business terms with standard data values.
13. Which of the following is not true regarding the risk of experiencing high cost and cost
overruns?
a. Integration and testing are done on a case-by case basis; thus, the cost is extremely
difficult to estimate in advance.
b. Training costs are invariably higher than estimated because management focuses primarily
on the cost of teaching employees the new software.
c. An increase in hardware capacity by a factor of x will decrease query response time by no
less than a factor of x in a scalable system
d. More often, the data in the legacy system are not reliable (sometimes called dirty).
14. This approach is particularly suited to diversified organizations whose units do not share
common processes and data.
a. Scalability
b. Phased-in
c. Big Bang
d. Traditional
15. Role-based governance systems allow managers to do the following, EXCEPT:
a. View the current and historical inventory of roles, permissions granted, and the individuals
assigned to roles.
b. Identify unnecessary or inappropriate access entitlements and segregation-of-duties
violations.
c. Verify that changes to roles and entitlements have been successfully implemented.
d. Monitor for risk periodically upon notice of the top management.

You might also like