Info
Warning
Danger

Study Resources (Accounting)

11.Explain the relationship between Cardinality and Association. ) and at the other end it is (1, M) then the association between them is one-to-many (1:M). PTS:1 12.Explain how events, resources and agents are linked in a REA diagram. 13.What are the minimum number and type of event entities that an REA diagram must include? 14.Why.
5 Views
View Answer
21.In a hierarchical topology, network nodes communicate with each other via a central host computer. 22.Polling is one technique used to control data collisions. 23.The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to an intruder.  To overcome this problem, private key.
6 Views
View Answer
21.Which of the following statements is correct? TCP/IP a.is the basic protocol that permits communication between Internet sites. b.controls Web browsers that access the WWW. c.is the file format used to produce Web pages. d.is a low-level encryption scheme used to secure transmissions in HTTP format. 22.FTP a.is the document format used to produce Web pages. b.controls.
5 Views
View Answer
21.The big-bang approach involves converting from old legacy systems to the new ERP in one implementation step. 22.In a two-tier architecture approach is used primarily for wide area network (WAN) applications. 23.Data cleansing is a step performed by external auditors to identify and repairing invalid data prior to the audit. .
7 Views
View Answer
MULTIPLE CHOICE 1.Which statement is NOT true?  REA resources are:  a.assets b.affected by support events c.scarce d.under the control of agents 2.The concept of duality means that a REA diagram must consist of: a.two events, one of them economic the other support b.two agents, one of them internal and the other external c.two resources, one increased and the.
5 Views
View Answer
MULTIPLE CHOICE 1.What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area? a.LAN b.decentralized network c.multidrop network d.Intranet 2.Network protocols fulfill all of the following objectives except a.facilitate physical connection between network devices b.provide a basis for error checking and measuring network performance c.promote compatibility.
6 Views
View Answer
10.What services are provided by a database management system? 11.Discuss the key factors to consider in determining how to partition a corporate database. 12.Distinguish between a database lockout and a deadlock. 13.Replicated databases create considerable data redundancy, which is in conflict with the database concept. Explain the justification of this approach. .
5 Views
View Answer
21.Closed database architecture is a.a control technique intended to prevent unauthorized access from trading partners. b.a limitation inherent in traditional information systems that prevents data sharing. c.a data warehouse control that prevents unclean data from entering the warehouse. d.a technique used to restrict access to data marts. e.a database structure that many of the leading.
4 Views
View Answer
11.Which types of entities are included in REA diagrams? a.support events b.economic events c.internal agents d.all of the above 12.Which of the following associations would most likely describe the relationship between an internal agent and an economic event: a.1:M b.1:1 c.0:M d.none of the above 13.Which of the following statement is correct? a.The REA model requires that phenomena be characterized in.
5 Views
View Answer
5.Since REA databases do not employ journals and ledgers, how can they support financial statement reporting? 6.Explain how a sales invoice table can be used to replace traditional accounting records. 7.Explain how a Disbursement Voucher table can be used to replace traditional accounting records. 8.Discuss the limitations of transaction based systems .
5 Views
View Answer
SHORT ANSWER Use the following words to complete the sentences. Database AdministratorData Dictionary data redundancyIndex Sequential Access Method query languageschema sequential structuresubschema 1._________________________ occurs when a specific file is reproduced for each user who needs access to the file. 2.The conceptual view of the database is often called ____________________. 3.The ____________________ allows users to retrieve and modify data.
7 Views
View Answer
21.The most serious problem with unnormalized databases is the a.update anomaly b.insertion anomaly c.deletion anomaly d.none of the above 22.The deletion anomaly in unnormalized databases a.is easily detected by users b.may result in the loss of important data c.complicates adding records to the database d.requires the user to perform excessive updates 23.Which statement is correct? a.in a normalized database, data about.
8 Views
View Answer
4.Explain the three views of a database. 5.Explain a database lockout and the deadlock phenomenon. Contrast that to concurrency control and the timestamping technique. Describe the importance of these items in relation to database integrity. 6.What are the key control implications of the absence of database normalization? .
7 Views
View Answer
11.Sniffer software is a.software used by malicious Web sites to sniff data from cookies stored on the user’s hard drive b.used by network administrators to analyze network traffic c.used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions d.illegal programs downloaded from the Net to sniff.
8 Views
View Answer
16.Describe the three-tier client server model. 17.Why must a data warehouse include both detail and summary data? 18.How does a data warehouse help the external auditor perform the audit? 19.What is the closed database architecture? 20.What is meant by the OLAP term - consolidation .
6 Views
View Answer
11.Core applications are also called OLAP. 12.The client/server model is a form of network technology in which user computers, called clients, access ERP programs and data via a host computer called a server. 13.A data warehouse is a relational or multi-dimensional database that may require hundreds of gigabytes of storage. 14.Drill-down capability is.
12 Views
View Answer
7.In a distributed data processing system, a database can be centralized or distributed. What are the options? Explain. 8.What are the characteristics of a properly designed relational database table? 9.Ownership of data in traditional legacy systems often leads to data redundancy. This in turn leads to several data management problems. What are.
5 Views
View Answer
11.Auditors of ERP systems a.need not worry about segregation of duties. b.may feel that the data warehouse is too clean and free from errors. c.find independent verification easy. d.need not worry about system access since the ERP determines it. 12.Legacy systems are a.old manual systems that are still in place. b.flat file mainframe systems developed before client-server.
4 Views
View Answer
11.Explain the purpose of an ER diagram in database design. 12.What are two types of distributed databases? 13.Describe an environment when a firm should use a partitioned database. 14.Explain how to link tables in (1:1) association. Why may this be different in a (1:0,1) association? 15.Why are the hierarchical and network models called navigational.
6 Views
View Answer
6.Describe a specific data element, entity, and record type in the expenditure cycle. 7.What is the relationship between a database table and a user view? 8.How does the database approach solve the problem of data redundancy? 9.Explain how linkages between relational tables are accomplished. 10.Explain the basic results that come from the restrict, project,.
7 Views
View Answer
Chapter 10—The REA Approach to Business Process Modeling TRUE/FALSE 1.According to the REA philosophy, information systems should support only the needs of accounting professionals. 2.Many believe that the accounting profession should shift away from financial statement reporting toward providing information that assists decision-making. 3.Modern managers need both financial and nonfinancial information that traditional GAAP-based.
16 Views
View Answer
ESSAY 1.How are OLTP and OLAP different? Give examples of their use. 2.Why does the data warehouse need to be separate from the operational databases? 3.If an auditor suspected an “unusual” relationship between a purchasing agent and certain suppliers, how could “drill-down” be used to collect data? 4.Why must an organization expect the implementation.
4 Views
View Answer
9.Discuss why adherence by the accounting profession to a single, GAAP-based view is inappropriate. 10.Discuss how adopting a value chain perspective reveals advantages of adopting an REA approach to information system development. 11.Discuss the concept of duality as it relates modeling an economic transaction. .
7 Views
View Answer
11.The duality association in an REA diagrams signifies that each economic transaction involves two agents. 12.A difference between ER and REA diagrams is that ER diagrams present a static picture of the underlying business phenomena. 13.ER diagrams always label entity names in the singular noun form. 14.When modeling M:M associations, it is conventional.
8 Views
View Answer
Chapter 11—Enterprise Resource Planning Systems TRUE/FALSE 1.The primary goal of installing an ERP system is reducing system maintenance costs. 2.The recommended data architecture for an ERP includes separate operational and data warehouse databases. 3.A closed database architecture shares data easily. 4.ERP systems support a smooth and seamless flow of information across organizations. 5.OLAP stands for on-line.
10 Views
View Answer
31.Which procedure will prevent two end users from accessing the same data element at the same time? a.data redundancy b.data replication c.data lockout d.none of the above 32.The advantages of a partitioned database include all of the following except a.user control is enhanced b.data transmission volume is increased c.response time is improved d.risk of destruction of entire database is.
7 Views
View Answer
11.The phrase “.com” has become an Internet buzz word. It refers to a top-level domain name for communications organizations. 12.The client-server model can only be applied to ring and star topologies. 13. Only two types motivation drive Dos attacks:  1) to punish an organization with which the perpetrator had a grievance; and.
6 Views
View Answer
ESSAY 1.Give three examples that illustrate how cardinality reflects an organization’s underlying business rules. 2.Explain the three types of anomalies associated with database tables that have not been normalized. 3.What are the four elements of the database approach? Explain the role of each. .
5 Views
View Answer
MULTIPLE CHOICE 1.Goals of ERP include all of the following except a.improved customer service b.improvements of legacy systems c.reduced production time d.increased production 2.Core applications are a.sales and distribution b.business planning c.shop floor control and logistics d.all of the above 3.Data warehousing processes does not include a.modeling data b.condensing data c.extracting data d.transforming data 4.Which of the following is usually not part of an ERP’s core.
5 Views
View Answer
11.The Data Definition Language a.identifies, for the Database Management System, the names and relationships of all data elements, records, and files that comprise the database b.inserts database commands into application programs to enable standard programs to interact with and manipulate the database c.permits users to process data in the database without the need.
6 Views
View Answer
21.What is meant by the OLAP term - Drill-down? 22.What is meant by the OLAP term - Slicing and dicing? 23.What should management do to assess the potential benefits from implementing an ERP 24.Internal efficiency is cited as one reasone for separating the data warehouse from the operational database. Explain. 25.Why are data in.
6 Views
View Answer
6.Distinguish between the two-tier and three-tier client server model. Describe when each would be used? 7.Data in a data warehouse are in a stable state. Explain how this can hamper data mining analysis? What can an organization do to alleviate this problem? 8.This chapter stressed the importance of data normalization when constructing.
3 Views
View Answer
Chapter 12—Electronic Commerce Systems TRUE/FALSE 1.Electronic commerce refers only to direct consumer marketing on the Internet. 2.The standard format for an e-mail address is DOMAIN NAME@USER NAME. 3.The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access. 4.Business risk is.
12 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

Let us boost your grade together!