Professional Documents
Culture Documents
a. table file are updated to a transaction file 222777... The correct purchase order number, 123456, was incorrectly
b. index file are updated to a master file recorded as shown in the solutions. All of the following are
c. transaction file are updated to a master file transcription errors except
d. master file are updated to a year-to-date file a. 1234567
e. current balance file are updated to an index file b. 12345
c. 124356
222000... The primary functions of a computerized information system d. 123457
include
a. input, processing, and output 222888... Which of the following is correct?
b. input, processing, output, and storage a. Check digits should be used for all data codes
c. input, processing, output, and control b. Check digits are always placed at the end of data codes
d. input, processing, output, storage, and control c. Check digits do not affect processing efficiency
e. collecting, sorting, summarizing, and reporting d. Check digits are designed to detect transcription errors
222999... Which statement is NOT correct? The goal of batch controls is 444000... A computer operator was in a hurry and accidentally used the
to ensure that during processing wrong master file to process a transaction file. As a result, the
a. transactions are not omitted accounts receivable master file was erased. Which control
b. transactions are not added would prevent this from happening?
c. transactions are processed more than once a. header label check
d. an audit trail is created b. expiration date check
c. version check
333000... The data control clerk performs all of the following duties except d. validity check
a. maintaining the batch control log
b. computing (or recomputing) batch control data 444111... Which of the following is NOT a component of the Generalized
c. reconciling the output results to the batch control log Data Input System?
d. destroying batch control logs when reconciled a. generalized validation module
b. validated data file
333111... An example of a hash total is c. updated master file
a. total payroll checks - $12,315 d. error file
b. total number of employees - 10
c. sum of the social security numbers - 12,555,437,251. 444222... Advantages of the Generalized Data Input System include all of
d. none of the above the following except
a. control over quality of data input
333222... Which statement is NOT true? A batch control log b. automatic calculation of run-to-run totals
a. is prepared by the user department c. company-wide standards for data validation
b. records the record count d. development of a reusable module for data validation
c. indicates any error codes
d. is maintained as a part of the audit trail 444333... Run-to-run control totals can be used for all the following except
a. to ensure that all data input is validated
333333... Which of the following is an example of a field interrogation? b. to ensure that only transactions of a similar type are being
a. reasonableness check processed
b. sign check c. to ensure the records are in sequence and are not missing
c. sequence check d. to ensure that no transaction is omitted
d. numeric/alphabetic check
444444... Methods used to maintain an audit trail in computerized
333444... Which of the following is an example of record interrogation? environment include all of the following except
a. sequence check a. transaction logs
b. zero value check b. unique transaction identifiers
c. limit check c. data encryption
d. range check d. log of automatic transactions
333555... Which input validation check would detect a payment made to a 444555... Risk exposures associated with creating an output file as an
nonexistent vendor? intermediate step in the printing process (spooling) include all of
a. missing data check the following actions by a computer criminal except
b. numeric/alphabetic check a. gaining access to the output file and changing critical data
c. range check values
d. validity check b. using a remote printer and incurring operating inefficiencies
c. making a copy of the output file and using the copy to
333666... The employee entered "40" in the "hours worked per day" field. produce illegal output reports
Which check would detect this unintentional error? d. printing an extra hard copy of the output file
a. numeric/alphabetic check
b. sign check 444666... Which statement is NOT correct?
c. limit check a. Only successful transactions are recorded a transaction log
d. missing data check b. Unsuccessful transactions are recorded in error file
c. A transaction log is a temporary file
333777... A specific inventory record indicates that there are 12 items on d. A hard copy transaction listing is provide users
hand and a customer purchased two of the items. When
recording the order, the data entry clerk mistakenly entered 20 444777... In an inventory system on a database management system, one
items sold. Which check would detect this error? stored record contains part number, part name, part color, and
a. numeric/alphabetic check part weight. These individual items are called
b. sign check
c. sequence check a. Fields
d. range check b. Stored files
c. Bytes
333888... Which check is not a file interrogation? d. occurrences
a. header label
b. expiration date check 444888... The use of pointers can save time when sequentially updating a
c. sequence check
d. version check a. master file
b. database management system
333999... Which statement is not correct? c. batch file
a. The purpose of file interrogation is to ensure that the d. random file
correct file is being processed by the system.
b. File interrogation checks are particularly important for 444999... It is appropriate to use a sequential file structure when
master files
c. Header labels are prepared manually and affixed to the a. records are routinely inserted
outside of the tape or disk b. a large portion of the file will be processed in one operation
d. An expiration date check prevents a file from being deleted c. records need to be scanned using secondary keys
before it expires d. single records need to be retrieved
555000... Which statement is not correct? 666000... Which term is not associated with the relational database
a. The sequential file structure is appropriate for payroll model?
records a. Tuple
b. An advantage of a sequential index is that it can be b. Attribute
searched rapidly c. Collision
c. The index sequential access method performs record d. Relation
insertion operations efficiently
d. The principal advantage of the hashing structure is speed 666111... In the relational database model,
of access a. relationships are explicit
b. the user perceives that files are linked using pointers
555111... Which of the following statements is not true?
c. data are represented on two-dimensional tables
a. Indexed random files are dispersed through-out the storage d. data are represented as a tree structure
device without regard for physical proximity with related
records 666222... In the relational database model, all of the following are true
b. Indexed random files use disk storage space efficiently except
c. Indexed random files are efficient when processing a large a. data are presented to users as tables
portion of a file at one time b. data can be extracted from specified rows from specified
d. Indexed random files are easy to maintain terms of adding tables
records c. a new table can be built by joining two tables
555222... Which statement is not correct? The indexed sequential access d. only one-to-many relationships can be supported
method 666333... In a relational database,
a. is used for very large files that need both direct access and
batch processing a. the user's view of the physical database is the same as the
b. may use an overflow area for records physical database
c. provides an exact physical address for ea record b. users perceive that they are manipulating a single table
d. is appropriate for files that require few insertions or c. a virtual table exists in the form of rows and columns of a
deletions table stored on the disk
d. a programming language (COBOL) is used to create a
555333... Which statement is true about a hashing structure user's view of the database
a. The same address could be calculated two records
666444... The update anomaly in unnormalized databases
b. Storage space is used efficiently
a. occurs because of data redundancy
c. Records cannot be accessed rapidly b. complicates adding records to the database
d. A separate index is required c. may result in the loss of important data
d. often results in excessive record insertions
555444... In a hashing structure,
a. two records can be stored at the same address 666555... The most serious problem with unnormalized databases is the
b. pointers are used to indicate the location all records a. update anomaly
c. pointers are used to indicate the location of a record with b. insertion anomaly
the same address as another record c. deletion anomaly
d. all locations on the disk are used for record storage d. none of the above
555555... Pointers can be used for all of the following except 666666... The deletion anomaly in unnormalized databases
a. to locate the subschema address of the record a. is easily detected by users
b. to locate the physical address of the record b. may result in the loss of important data
c. to locate the relative address of the record c. complicates adding records to the database
d. to locate the logical key of the record d. requires the user to perform excessive updates
555666... An advantage of a physical address pointer is that
666777... Automated technique that enables the auditor to test an
a. it points directly to. the actual disk storage location
b. it is easily recovered if it is inadvertently lost. application’s logic and controls during its normal operations
c. it remains unchanged when disks are reorganized
d. all of the above are advantages of the physical address a. Embedded audit module
pointer b. Integrated test facility
c. Internal control system
555777... Pointers are used d. Electronic data interchange
a. to link records within a file
b. to link records between files 666888... A branch of ERP that includes decision support, modeling,
c. to identify records stored in overflow information retrieval, ad hoc reporting/analysis, and what-if
d. all of the above analysis
a. Online transaction processing
555888... In a hierarchical model, b. Electronic data interchange
a. links between related records are implicit c. Embedded audit module
b. the way to access data is by following a predefined data d. Online analytical processing
path
c. an owner (parent) record may own just one member (child) 666999... Popular technique for establishing communication sessions in
record WANs
d. a member (child) record may have more than one owner a. Privacy c. Protocol
(parent) b. Peer-to-peer d. Polling
555999... In a network model 777000... Rules and standards governing the degree of hardware and
a. there is one predefined path to a particular record. software that permit users of networks manufactured by different
b. many-to-many relationships are supported in a simple vendors to communicate and share data
network a. Privacy
c. management can track and report information by one b. Parity check
criterion only c. Network protocols
d. link files are used to connect records in different files d. Network topology
ANSWER KEY: 36. C
37. B
1. A 38. C
2. E 39. C
3. B 40. A
4. A
5. B 41. C
6. D 42. B
7. D 43. A
8. D 44. C
9. E 45. B
10. C 46. C
47. A
11. C 48. D
12. A 49. B
13. C 50. C
14. B
15. B 51. C
16. B 52. C
17. D 53. A
18. C 54. C
19. C 55. A
20. D 56. A
57. D
21. B 58. B
22. C 59. D
23. D 60. C
24. D
25. C 61. C
26. C 62. D
27. C 63. B
28. D 64. A
29. C 65. C
30. D 66. B
67. B
31. C 68. D
32. A 69. D
33. D 70. C
34. A
35. D