You are on page 1of 4

MA.

TERRESA TEJADA
BSA-3

1. ACCESS METHOD is the technique used to locate records and to navigate through the
database or file.

2. ORGANIZATION refers to the way records are physically arranged on the secondary storage
device.

3. The records in this type of file are spread over the entire disk without concern for their
physical proximity with other related records. POINTER STRUCTURE

4. This structure is used for very large files that require routine batch processing and a moderate
degree of individual record processing. VIRTUAL STORAGE ACCESS METHOD

5. This structure employs an algorithm that converts the primary key of a record directly into a
storage address. HASHING STRUCTURE

6. These are expressions that search for records that meet the filter criteria. FILTERS

7. This pointer contains the relative position of a record in a file. RELATIVE ADDRESS POINTER

8. It is the degree of association between two entities. CARDINALITY

9. These are the data elements that define an entity. ATTRIBUTES

10. This is anything about which the organization wishes to capture data. ENTITY

11. This results from data redundancy in an unnormalized table. UPDATE ANOMALY

12. Also called continuous auditing. EMBEDDED AUDIT MODULE

13. If the file is heavily skewed with large value items, the auditor may select this sampling
method. MONETARY UNIT SAMPLING

14. The auditor will choose this method when the auditor wants an unbiased sample of a
population which is fairly distributed. RECORD SAMPLING

15. A feature of ACL that allows the auditor to view the distribution of records that fall into
specified strata. STRATIFICATION FEATURE

16. A feature of ACL that allows the auditor to use logical operators to define and test conditions
of any complexity and to process only those records that match specific conditions.
EXPRESSION BUILDER

17. This allows the auditor to define important characteristics of the source file.
DATA DEFINITION SCREEN

18. It is the industry leader among GAS. AUDIT COMMAND LANGUAGE

19. It is the most widely used CAATT for IS auditing. GENERALIZED AUDIT SOFTWARE
20. The six phases of database design are collectively known as VIEW MODELLING.

21. DELETION ANOMALLY involves the unintentional deletion of data from a table.

22. These are negative operational symptoms. ANOMALIES

23. A set of data that a particular user sees. USER VIEW

24. This term is used to describe the number of instances or records that pertain to a specific
entity. OCCURRENCE

25. This is a cross-reference created by using multiple indexes which allows even more flexible
access to data. INVERTED LIST

26. This contains the primary key of the related record. LOGICAL KEY POINTER

27. This contains the actual disk storage location needed by the disk controller.
PHYSICAL ADDRESS POINTER

28. All records in this file lie in contiguous storage spaces in a specified sequence arranged by
their primary key. SEQUENTIAL STRUCTURE

29. This is used to call an instance where two records are stored in the same place which
translates into the same address. COLLISION

30. Embedded audit module decrease OPERATIONAL PERFORMANCE.

You might also like