SlideShare a Scribd company logo
1
Final Exam Questions and Answers
Chapter 9
1. Which of the following is the best definition of the term big data?
A. Databases measured in terms of zettabytes.
B. Datasets that are too large and complex for businesses’ existing systems utilizing
traditional
capabilities.
C. Databases for businesses that generate more than one million electronic transactions per
month.
D. Datasets generated by social media applications such as Facebook, Twitter, Tencent QQ,
and Instagram.
2. The three Vs are considered a defining feature of big data. Which of the following is the best
definition of the term big data?
A. Volition, veracity, & velocity.
B. Variety, visibility, & valuation.
C. Volume, velocity, & variety.
D. Volume, variability, & veracity.
3. As described in the text, which of the following best defines the term data analytics?
A. The ability to analyze data and draw conclusions.
B. The science of reducing extremely large datasets down to more manageable databases
that
can be processed using traditional tools.
C. The process of creating meaningful visualizations from extremely large datasets.
D. The science of examining raw data, removing excess noise, and organizing it in order to
draw conclusions for decision making.
4. At its core, data analytics fits into the information value chain in which of the following ways?
A. The process of data analytics aims at transforming raw data into valuable information.
B. Data analytics aims to make an organization’s conversion process more efficient.
C. Data analytics requires organizations to share synced data with upstream and
downstream
business partners.
D. The process of data analytics is geared toward providing additional insight into customer
activities and preferences.
5. Which of the following best summarizes the two key limiting factors for business systems
when dealing with Big Data?
A. Data storage capacity and processing power.
B. Data availability and software tools.
C. Database organization and transaction volume.
D. Analytic skills and software tools.
6. The insight provided through data analytics can help companies in all of the following ways
except:
A. Dictate the policies of external business partners.
B. Create more directed marketing campaigns.
C. Identify future opportunities and risks.
2
D. Affect internal business processes in order to improve productivity, utilization and
growth.
7. Which of the following best describes how external auditors’ interactions with their clients is
likely to change due to the use of data analytics in the audit process?
A. External auditors will spend less time on audits and will not need to spend time with
clients outside the audit.
B. External auditors will spend more time on detailed audit tasks, resulting in longer audit
engagements.
C. External auditors will only interact with their clients virtually.
D. External auditors will stay engaged with clients beyond the audit.
8. Which of the following would not by itself be considered personally identifying information?
A. Date of birth.
B. Social Security Number.
C. Passport number.
D. Driver’s Licence ID.
9. Which of the following best describes what is meant by a breach of security?
A. Breaking into a locked room.
B. An unencrypted data transmission.
C. The unauthorized access to or acquisition of data in an electronic format that contains
personal information.
D. Access of personal information on a corporate server.
10. Which of the following is not one of the Excel tools described as useful for data analytics?
A. Calculated Field.
B. Tableau.
C. Slicers.
D. Power Pivot.
Chapter 10
11. Data mining is considered a technique of
A. Data Warehousing
B. Project Management
C. Data Martian
D. Business Intelligence
12. A data warehouse may include:
a. An XBRL style sheet
b. General Economic Information
c. A digital Dashboard
d. An iPad Mini
3
13. A collection of information gathered from an assortment of external and operational (i.e.,
internal) databases to facilitate reporting for decision making and business analysis is called:
a. Business intelligence
b. Data Warehouse
c. Digital Dashboard
d. XBRL
14. Digital Dashboards track which of the following in a user-friendly way:
a. Airplane speed
b. Critical business failures
c. Critical business processes
d. Critical business projects
15. XBRL stands for
a. eXtensible Business Reporting Language
b. eXtensible Behavioral Reporting Language
c. eXtensible Book Reporting Language
d. eXtensible Basic Reporting Language
16. The process of using sophisticated statistical techniques to extract and analyze data from large
databases to discern patterns and trends that were not previously known is called:
a. Data Mart
b. Data Mining
c. Data Warehouse
d. Business Intelligence
17. Before data from multiple sources can be loaded into the data warehouse, which of the
following activities must be performed?
A. The company must obtain explicit permission from all public and private data sources
before their data can be used in the data warehouse.
B. Operational system reports must be run, as the extraction process that loads the data
warehouse
usually deletes the data from the operational system.
C. Data inconsistencies must be removed so that the warehouse has homogeneous data for
analysis and reporting purposes.
D. The operational system must create and file the appropriate XBRL instance document
with the SEC.
18. Data Mining uses which of the following approaches to analyze data and find new patterns
and trends?
A. Data normalization.
4
B. Data scrubbing.
C. Decision Support Systems.
D. Sophisticated statistical techniques.
19. Which of the following metrics would be least likely to show up on a Digital Dashboard?
A. Accumulated depreciation for the previous year.
B. Month-to-date sales.
C. Budget variances.
D. Number of accident-free days.
20. Which of the following best describes the use of XBRL style sheets?
A. Style sheets determine which elements may be used when companies submit their XBRL
filing.
B. Style sheets are another name for XBRL instance documents.
C. Style sheets allow for presentation of selected data from XBRL documents in a way that
humans can read.
D. Style sheets determine the formatting of numbers and text in the XBRL taxonomy.
Chapter 11
21. Which of the following statement is correct regarding internal control?
A. A well-designed internal control environment ensures the achievement of an entity’s
control objectives.
B. An inherent limitation to internal control is the fact that controls can be circumvented by
management override.
C. A well-designed and operated internal control environment should detect collusion
perpetrated by two people.
D. Internal control in a necessary business function and should be designed and operated to
detect errors and fraud.
22. Controls in the information technology area are classified into preventive, detective,
and corrective categories. Which of the following is preventive control?
A. Contingency planning.
B. Hash total.
C. Echo check.
D. Access control software.
23. When considering internal control, an auditor should be aware of reasonable assurance,
which recognizes that
5
A. Internal control may be ineffective due to mistakes in judgment and personal
carelessness.
B. Adequate safeguards over access to assets and records should permit an entity to
maintain proper accountability.
C. Establishing and maintaining internal control is an important responsibility of
management.
D. The cost of an entity’s internal control should not exceed the benefits expected to be
derived.
24. According to AS 5, control risk should be assessed in terms of
A. Specific controls.
B. Types of potential fraud.
C. Financial statement assertions.
D. Control environment factors.
25. An auditor assesses control risk because it
A. is relevant to the auditor’s understanding of the control environment.
B. provides assurance that the auditor’s materiality levels are appropriate.
C. indicates to the auditor where inherent risk may be the greatest.
D. affects the level of detection risk that the auditor may accept.
26. Reconciliation of cash accounts may be referred to as what type of control?
A. Detective.
B. Preventive.
C. Adjustive.
D. Non-routine.
27. Sound internal control dictates that immediately upon receiving checks from
customers by mail, a responsible employee should
A. Add the checks to the daily cash summary.
B. Verify that each check is supported by a pre-numbered sales invoice.
C. Prepare a summary listing of checks received.
D. Record the checks in the cash receipts journal.
28. Tracing shipping documents to pre-numbered sales invoices provides evidence that
A. No duplicate shipments or billings occurred.
B. Shipments to customers were properly invoiced.
C. All goods ordered by customers were shipped.
D. All pre-numbered sales invoices were accounted for.
29. A customer intended to order 100 units of a product A, but incorrectly ordered nonexistent
product B. Which of the following controls most likely would detect this error?
A. Validity check
B. Record count
C. Hash total
D. Parity check
30. Which of the following best describes what is meant by corporate governance?
A. The organizational structure and responsibilities of the executive team and board of
directors of a corporation.
6
B. Regulatory bodies, such as the SEC and PCAOB, that govern the behavior of corporations.
C. The ability of a corporation’s management team to meet earnings forecasts over an
extended period of time..
D. Management’s processes, policies, and ethical approach to safeguarding stakeholder
interests.
Chapter 12
31. Which of the following statements is incorrect about digital signatures?
A. A digital signature can ensure data integrity.
B. A digital signature also authenticates the document creator.
C. A digital signature is an encrypted message digest.
D. A digital signature is a message digest encrypted using the document creator’s public key.
32. When client’s accounts payable computer system was relocated, the administrator provided
support through a dial-up connection to server. Subsequently, the administrator left the
company. No changes were made to the accounts payable system at that time. Which of the
following situations represents the greatest security risk?
A. User passwords are not required to the in alpha-numeric format.
B. Management procedures for user accounts are not documented.
C. User accounts are not removed upon termination of employees.
D. Security logs are not periodically reviewed for violations.
33. Bacchus, Inc. is a large multinational corporation with various business units around the
world. After a fire destroyed the corporation headquarters and largest manufacturing site,
plans for which of the following would help Bacchus ensure a timely recovery?
A. Daily backup.
B. Network security.
C. Business continuity.
D. Backup power.
34. Which of the following statements about asymmetric-key encryption is correct?
A. When using asymmetric-key encryption method, a total of two keys are necessary in
electronic communication between two parties.
B. Employees in the same company share the same public key.
C. Most companies would like to manage the private keys for their employees.
D. Most companies would like to use a Certificate Authority to manage the public keys of
their employees.
E. Two of the above are correct.
35. Why do Certificate Authority (CA) play an important role in a company’s information security
management?
A. Using a CA is required by SOX in managing information security.
B. Most companies use CA to manage their employees’ public keys.
C. CA creates and maintains both the public and private keys for a company’s employees.
D. None of the above is correct.
7
36. Why would companies want to use digital signatures when conducting e-business?
A. They are cheap.
B. They are always the same so it can be verified easily.
C. They are more convenient than requiring a real signature.
D. They can authenticate the document sender and maintain data integrity.
37. Asymmetric-key encryption uses which of the following techniques to allow
users to communicate securely?
A. A message digest.
B. A 16-bit encryption key.
C. A public key and a private key.
D. A digital signature.
38. A Public Key Infrastructure (PKI) provides the ability to do which of the
following?
A. Encrypt messages using a private key.
B. Enable debit and credit card transactions.
C. Read plaintext.
D. Issue, maintain, and revoke digital certificates.
39. Which of the following groups is responsible for conducting fraud risk
assessment for an organization?
A. The External Auditor.
B. The Audit Committee.
C. The Internal Audit group.
D. Management.
40. Which of the following statements is most accurate with regard to business
continuity management (BCM) and disaster recovery planning (DRP)?
A. DRP is an important component of BCM.
B. BCM and DRP should be considered independently of each other.
C. BCM is an important component of DRP.
D. DRP should be considered as optional, while BCM should be considered
as necessary.

More Related Content

Similar to Chapter_9-12_solution_-_Copy.docx

Acc 340 final exam guide
Acc 340 final exam guideAcc 340 final exam guide
Acc 340 final exam guide
firstcome01
 
ACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.comACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.com
beautifuljasmine
 
Acc 340 final exam guide new
Acc 340 final exam guide newAcc 340 final exam guide new
Acc 340 final exam guide new
patienceisno2
 
1.According to The IIA Glossary appended to the Standards, which.docx
1.According to The IIA Glossary appended to the Standards, which.docx1.According to The IIA Glossary appended to the Standards, which.docx
1.According to The IIA Glossary appended to the Standards, which.docx
paynetawnya
 
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docxFinal Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
mydrynan
 
Acc 460 final exam
Acc 460 final examAcc 460 final exam
Acc 460 final examgiquickly
 
Acc 460 final exam
Acc 460 final examAcc 460 final exam
Acc 460 final exambubyslyke
 
Acc 460 final exam
Acc 460 final examAcc 460 final exam
Acc 460 final examginistays
 
Acc 460 final exam questions and correct answers 100% guaranteed#
Acc 460 final exam questions and correct answers 100% guaranteed#Acc 460 final exam questions and correct answers 100% guaranteed#
Acc 460 final exam questions and correct answers 100% guaranteed#siliverseyr
 
Chap005 tb-sample
Chap005 tb-sampleChap005 tb-sample
Chap005 tb-sampleYing Sun
 
Bis 219 final exam view 369
Bis 219 final exam view 369Bis 219 final exam view 369
Bis 219 final exam view 369forrest44
 
Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Austing_3
 
(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%quikly11
 
Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%liamSali
 
(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%liamSali
 
(New) final exam for bis 220 bis 220 all correct answers 100%
(New) final exam for bis 220 bis 220 all correct answers 100%(New) final exam for bis 220 bis 220 all correct answers 100%
(New) final exam for bis 220 bis 220 all correct answers 100%ri0908O0o
 
Sample
SampleSample
Test
TestTest
ACC 460 ACC460 Final EXAM MCQ`s Correct Answers 100%
ACC 460 ACC460 Final EXAM MCQ`s Correct Answers 100%ACC 460 ACC460 Final EXAM MCQ`s Correct Answers 100%
ACC 460 ACC460 Final EXAM MCQ`s Correct Answers 100%
johnMilit
 

Similar to Chapter_9-12_solution_-_Copy.docx (20)

Acc 340 final exam guide
Acc 340 final exam guideAcc 340 final exam guide
Acc 340 final exam guide
 
ACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.comACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.com
 
Acc 340 final exam guide new
Acc 340 final exam guide newAcc 340 final exam guide new
Acc 340 final exam guide new
 
1.According to The IIA Glossary appended to the Standards, which.docx
1.According to The IIA Glossary appended to the Standards, which.docx1.According to The IIA Glossary appended to the Standards, which.docx
1.According to The IIA Glossary appended to the Standards, which.docx
 
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docxFinal Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
 
Acc 460 final exam
Acc 460 final examAcc 460 final exam
Acc 460 final exam
 
Acc 460 final exam
Acc 460 final examAcc 460 final exam
Acc 460 final exam
 
Acc 460 final exam
Acc 460 final examAcc 460 final exam
Acc 460 final exam
 
Acc 460 final exam questions and correct answers 100% guaranteed#
Acc 460 final exam questions and correct answers 100% guaranteed#Acc 460 final exam questions and correct answers 100% guaranteed#
Acc 460 final exam questions and correct answers 100% guaranteed#
 
Sad quiz
Sad quizSad quiz
Sad quiz
 
Chap005 tb-sample
Chap005 tb-sampleChap005 tb-sample
Chap005 tb-sample
 
Bis 219 final exam view 369
Bis 219 final exam view 369Bis 219 final exam view 369
Bis 219 final exam view 369
 
Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%
 
(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%
 
Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%Bis 220 final exam mcq`s correct answers 100%
Bis 220 final exam mcq`s correct answers 100%
 
(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%(New) final exam for bis 220 all correct answers 100%
(New) final exam for bis 220 all correct answers 100%
 
(New) final exam for bis 220 bis 220 all correct answers 100%
(New) final exam for bis 220 bis 220 all correct answers 100%(New) final exam for bis 220 bis 220 all correct answers 100%
(New) final exam for bis 220 bis 220 all correct answers 100%
 
Sample
SampleSample
Sample
 
Test
TestTest
Test
 
ACC 460 ACC460 Final EXAM MCQ`s Correct Answers 100%
ACC 460 ACC460 Final EXAM MCQ`s Correct Answers 100%ACC 460 ACC460 Final EXAM MCQ`s Correct Answers 100%
ACC 460 ACC460 Final EXAM MCQ`s Correct Answers 100%
 

More from SamNguyn21

Final-test.docx
Final-test.docxFinal-test.docx
Final-test.docx
SamNguyn21
 
he-thong-tai-khoan-ke-toan-hanh-chinh-su-nghiep_(1)_(4).doc
he-thong-tai-khoan-ke-toan-hanh-chinh-su-nghiep_(1)_(4).doche-thong-tai-khoan-ke-toan-hanh-chinh-su-nghiep_(1)_(4).doc
he-thong-tai-khoan-ke-toan-hanh-chinh-su-nghiep_(1)_(4).doc
SamNguyn21
 
advanced-accounting-notes-summary-notes-for-advanced-accounting-cpa-board-exa...
advanced-accounting-notes-summary-notes-for-advanced-accounting-cpa-board-exa...advanced-accounting-notes-summary-notes-for-advanced-accounting-cpa-board-exa...
advanced-accounting-notes-summary-notes-for-advanced-accounting-cpa-board-exa...
SamNguyn21
 
OB_PPT.pptx
OB_PPT.pptxOB_PPT.pptx
OB_PPT.pptx
SamNguyn21
 
midterm.docx
midterm.docxmidterm.docx
midterm.docx
SamNguyn21
 
Thailand.docx
Thailand.docxThailand.docx
Thailand.docx
SamNguyn21
 
script_real.docx
script_real.docxscript_real.docx
script_real.docx
SamNguyn21
 
VTD-final-IA.doc
VTD-final-IA.docVTD-final-IA.doc
VTD-final-IA.doc
SamNguyn21
 

More from SamNguyn21 (8)

Final-test.docx
Final-test.docxFinal-test.docx
Final-test.docx
 
he-thong-tai-khoan-ke-toan-hanh-chinh-su-nghiep_(1)_(4).doc
he-thong-tai-khoan-ke-toan-hanh-chinh-su-nghiep_(1)_(4).doche-thong-tai-khoan-ke-toan-hanh-chinh-su-nghiep_(1)_(4).doc
he-thong-tai-khoan-ke-toan-hanh-chinh-su-nghiep_(1)_(4).doc
 
advanced-accounting-notes-summary-notes-for-advanced-accounting-cpa-board-exa...
advanced-accounting-notes-summary-notes-for-advanced-accounting-cpa-board-exa...advanced-accounting-notes-summary-notes-for-advanced-accounting-cpa-board-exa...
advanced-accounting-notes-summary-notes-for-advanced-accounting-cpa-board-exa...
 
OB_PPT.pptx
OB_PPT.pptxOB_PPT.pptx
OB_PPT.pptx
 
midterm.docx
midterm.docxmidterm.docx
midterm.docx
 
Thailand.docx
Thailand.docxThailand.docx
Thailand.docx
 
script_real.docx
script_real.docxscript_real.docx
script_real.docx
 
VTD-final-IA.doc
VTD-final-IA.docVTD-final-IA.doc
VTD-final-IA.doc
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Chapter_9-12_solution_-_Copy.docx

  • 1. 1 Final Exam Questions and Answers Chapter 9 1. Which of the following is the best definition of the term big data? A. Databases measured in terms of zettabytes. B. Datasets that are too large and complex for businesses’ existing systems utilizing traditional capabilities. C. Databases for businesses that generate more than one million electronic transactions per month. D. Datasets generated by social media applications such as Facebook, Twitter, Tencent QQ, and Instagram. 2. The three Vs are considered a defining feature of big data. Which of the following is the best definition of the term big data? A. Volition, veracity, & velocity. B. Variety, visibility, & valuation. C. Volume, velocity, & variety. D. Volume, variability, & veracity. 3. As described in the text, which of the following best defines the term data analytics? A. The ability to analyze data and draw conclusions. B. The science of reducing extremely large datasets down to more manageable databases that can be processed using traditional tools. C. The process of creating meaningful visualizations from extremely large datasets. D. The science of examining raw data, removing excess noise, and organizing it in order to draw conclusions for decision making. 4. At its core, data analytics fits into the information value chain in which of the following ways? A. The process of data analytics aims at transforming raw data into valuable information. B. Data analytics aims to make an organization’s conversion process more efficient. C. Data analytics requires organizations to share synced data with upstream and downstream business partners. D. The process of data analytics is geared toward providing additional insight into customer activities and preferences. 5. Which of the following best summarizes the two key limiting factors for business systems when dealing with Big Data? A. Data storage capacity and processing power. B. Data availability and software tools. C. Database organization and transaction volume. D. Analytic skills and software tools. 6. The insight provided through data analytics can help companies in all of the following ways except: A. Dictate the policies of external business partners. B. Create more directed marketing campaigns. C. Identify future opportunities and risks.
  • 2. 2 D. Affect internal business processes in order to improve productivity, utilization and growth. 7. Which of the following best describes how external auditors’ interactions with their clients is likely to change due to the use of data analytics in the audit process? A. External auditors will spend less time on audits and will not need to spend time with clients outside the audit. B. External auditors will spend more time on detailed audit tasks, resulting in longer audit engagements. C. External auditors will only interact with their clients virtually. D. External auditors will stay engaged with clients beyond the audit. 8. Which of the following would not by itself be considered personally identifying information? A. Date of birth. B. Social Security Number. C. Passport number. D. Driver’s Licence ID. 9. Which of the following best describes what is meant by a breach of security? A. Breaking into a locked room. B. An unencrypted data transmission. C. The unauthorized access to or acquisition of data in an electronic format that contains personal information. D. Access of personal information on a corporate server. 10. Which of the following is not one of the Excel tools described as useful for data analytics? A. Calculated Field. B. Tableau. C. Slicers. D. Power Pivot. Chapter 10 11. Data mining is considered a technique of A. Data Warehousing B. Project Management C. Data Martian D. Business Intelligence 12. A data warehouse may include: a. An XBRL style sheet b. General Economic Information c. A digital Dashboard d. An iPad Mini
  • 3. 3 13. A collection of information gathered from an assortment of external and operational (i.e., internal) databases to facilitate reporting for decision making and business analysis is called: a. Business intelligence b. Data Warehouse c. Digital Dashboard d. XBRL 14. Digital Dashboards track which of the following in a user-friendly way: a. Airplane speed b. Critical business failures c. Critical business processes d. Critical business projects 15. XBRL stands for a. eXtensible Business Reporting Language b. eXtensible Behavioral Reporting Language c. eXtensible Book Reporting Language d. eXtensible Basic Reporting Language 16. The process of using sophisticated statistical techniques to extract and analyze data from large databases to discern patterns and trends that were not previously known is called: a. Data Mart b. Data Mining c. Data Warehouse d. Business Intelligence 17. Before data from multiple sources can be loaded into the data warehouse, which of the following activities must be performed? A. The company must obtain explicit permission from all public and private data sources before their data can be used in the data warehouse. B. Operational system reports must be run, as the extraction process that loads the data warehouse usually deletes the data from the operational system. C. Data inconsistencies must be removed so that the warehouse has homogeneous data for analysis and reporting purposes. D. The operational system must create and file the appropriate XBRL instance document with the SEC. 18. Data Mining uses which of the following approaches to analyze data and find new patterns and trends? A. Data normalization.
  • 4. 4 B. Data scrubbing. C. Decision Support Systems. D. Sophisticated statistical techniques. 19. Which of the following metrics would be least likely to show up on a Digital Dashboard? A. Accumulated depreciation for the previous year. B. Month-to-date sales. C. Budget variances. D. Number of accident-free days. 20. Which of the following best describes the use of XBRL style sheets? A. Style sheets determine which elements may be used when companies submit their XBRL filing. B. Style sheets are another name for XBRL instance documents. C. Style sheets allow for presentation of selected data from XBRL documents in a way that humans can read. D. Style sheets determine the formatting of numbers and text in the XBRL taxonomy. Chapter 11 21. Which of the following statement is correct regarding internal control? A. A well-designed internal control environment ensures the achievement of an entity’s control objectives. B. An inherent limitation to internal control is the fact that controls can be circumvented by management override. C. A well-designed and operated internal control environment should detect collusion perpetrated by two people. D. Internal control in a necessary business function and should be designed and operated to detect errors and fraud. 22. Controls in the information technology area are classified into preventive, detective, and corrective categories. Which of the following is preventive control? A. Contingency planning. B. Hash total. C. Echo check. D. Access control software. 23. When considering internal control, an auditor should be aware of reasonable assurance, which recognizes that
  • 5. 5 A. Internal control may be ineffective due to mistakes in judgment and personal carelessness. B. Adequate safeguards over access to assets and records should permit an entity to maintain proper accountability. C. Establishing and maintaining internal control is an important responsibility of management. D. The cost of an entity’s internal control should not exceed the benefits expected to be derived. 24. According to AS 5, control risk should be assessed in terms of A. Specific controls. B. Types of potential fraud. C. Financial statement assertions. D. Control environment factors. 25. An auditor assesses control risk because it A. is relevant to the auditor’s understanding of the control environment. B. provides assurance that the auditor’s materiality levels are appropriate. C. indicates to the auditor where inherent risk may be the greatest. D. affects the level of detection risk that the auditor may accept. 26. Reconciliation of cash accounts may be referred to as what type of control? A. Detective. B. Preventive. C. Adjustive. D. Non-routine. 27. Sound internal control dictates that immediately upon receiving checks from customers by mail, a responsible employee should A. Add the checks to the daily cash summary. B. Verify that each check is supported by a pre-numbered sales invoice. C. Prepare a summary listing of checks received. D. Record the checks in the cash receipts journal. 28. Tracing shipping documents to pre-numbered sales invoices provides evidence that A. No duplicate shipments or billings occurred. B. Shipments to customers were properly invoiced. C. All goods ordered by customers were shipped. D. All pre-numbered sales invoices were accounted for. 29. A customer intended to order 100 units of a product A, but incorrectly ordered nonexistent product B. Which of the following controls most likely would detect this error? A. Validity check B. Record count C. Hash total D. Parity check 30. Which of the following best describes what is meant by corporate governance? A. The organizational structure and responsibilities of the executive team and board of directors of a corporation.
  • 6. 6 B. Regulatory bodies, such as the SEC and PCAOB, that govern the behavior of corporations. C. The ability of a corporation’s management team to meet earnings forecasts over an extended period of time.. D. Management’s processes, policies, and ethical approach to safeguarding stakeholder interests. Chapter 12 31. Which of the following statements is incorrect about digital signatures? A. A digital signature can ensure data integrity. B. A digital signature also authenticates the document creator. C. A digital signature is an encrypted message digest. D. A digital signature is a message digest encrypted using the document creator’s public key. 32. When client’s accounts payable computer system was relocated, the administrator provided support through a dial-up connection to server. Subsequently, the administrator left the company. No changes were made to the accounts payable system at that time. Which of the following situations represents the greatest security risk? A. User passwords are not required to the in alpha-numeric format. B. Management procedures for user accounts are not documented. C. User accounts are not removed upon termination of employees. D. Security logs are not periodically reviewed for violations. 33. Bacchus, Inc. is a large multinational corporation with various business units around the world. After a fire destroyed the corporation headquarters and largest manufacturing site, plans for which of the following would help Bacchus ensure a timely recovery? A. Daily backup. B. Network security. C. Business continuity. D. Backup power. 34. Which of the following statements about asymmetric-key encryption is correct? A. When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. B. Employees in the same company share the same public key. C. Most companies would like to manage the private keys for their employees. D. Most companies would like to use a Certificate Authority to manage the public keys of their employees. E. Two of the above are correct. 35. Why do Certificate Authority (CA) play an important role in a company’s information security management? A. Using a CA is required by SOX in managing information security. B. Most companies use CA to manage their employees’ public keys. C. CA creates and maintains both the public and private keys for a company’s employees. D. None of the above is correct.
  • 7. 7 36. Why would companies want to use digital signatures when conducting e-business? A. They are cheap. B. They are always the same so it can be verified easily. C. They are more convenient than requiring a real signature. D. They can authenticate the document sender and maintain data integrity. 37. Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely? A. A message digest. B. A 16-bit encryption key. C. A public key and a private key. D. A digital signature. 38. A Public Key Infrastructure (PKI) provides the ability to do which of the following? A. Encrypt messages using a private key. B. Enable debit and credit card transactions. C. Read plaintext. D. Issue, maintain, and revoke digital certificates. 39. Which of the following groups is responsible for conducting fraud risk assessment for an organization? A. The External Auditor. B. The Audit Committee. C. The Internal Audit group. D. Management. 40. Which of the following statements is most accurate with regard to business continuity management (BCM) and disaster recovery planning (DRP)? A. DRP is an important component of BCM. B. BCM and DRP should be considered independently of each other. C. BCM is an important component of DRP. D. DRP should be considered as optional, while BCM should be considered as necessary.