22.05.2017 Views

ACCT 571 DeVry Week 2 Quiz

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 2 <strong>Quiz</strong><br />

Downloading is very simple, you can download this Course here:<br />

http://mindsblow.us/question_des/<strong>ACCT</strong><strong>571</strong><strong>DeVry</strong><strong>Week</strong>2<strong>Quiz</strong>/4303<br />

Or<br />

Contact us at:<br />

help@mindblows.us<br />

<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 2 <strong>Quiz</strong><br />

<strong>ACCT</strong><strong>571</strong><br />

<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 2 <strong>Quiz</strong><br />

(TCO G) Redundancy can be a major problem in the design and operation of relational databases. If a database uses<br />

only one relation to store data, several problems may subsequently occur. The problem of changes (or updates) to data<br />

values being incorrectly recorded is known as<br />

o<br />

o<br />

o<br />

o<br />

an update anomaly.<br />

an insert anomaly.<br />

a delete anomaly.<br />

a memory anomaly.<br />

Question 2. Question : (TCO B) Many fraud cases go unreported and unprosecuted for several reasons. Why<br />

is this the case?<br />

o<br />

o<br />

o<br />

o<br />

Companies are reluctant to report computer crimes because a highly visible computer fraud is a public<br />

relations nightmare.<br />

Such crimes are difficult, costly, and time-consuming to investigate and prosecute.<br />

Law enforcement and the courts are often too busy with violent crimes that little time is left for fraud cases.<br />

all of the above<br />

Question 3. Question : (TCO G) Chelsana Washington is a medical equipment sales representative. Her<br />

company has provided her with a laptop computer that uses wireless connectivity to access the accounting information<br />

system from virtually anywhere in the country. She, and the other sales reps, have read access to customer and product<br />

information. They have write access that allows them to enter and cancel customer orders. These permissions define<br />

a(an) ______ in the company's database management system.<br />

o<br />

o<br />

o<br />

o<br />

schema<br />

subschema<br />

data dictionary<br />

physical view<br />

Question 4. Question : (TCO B) This control framework addresses the issue of control from three vantage points:<br />

business objectives, information technology resources, and information technology processes.


o<br />

o<br />

o<br />

o<br />

ISACA's control objectives for information and related technology<br />

COSO's internal control framework<br />

COSO's enterprise risk management framework<br />

None of the above<br />

Question 5. Question : (TCO G) Identify the aspect of a normalized database that is incorrect:<br />

o<br />

o<br />

o<br />

o<br />

Data is consistent.<br />

Redundancy is minimized and controlled.<br />

All data is stored in one table or relation.<br />

The primary key of any row in a relation cannot be null.<br />

Question 6. Question : (TCO B) Why is computer fraud on the rise?<br />

Question 7. Question : (TCO B) What is a weakness of the internal control concept of the separation of duties?<br />

Points Received: 0 of 5 Comments:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!