Question: Study Unit 7 IT Framework and Data Analytics Questions 1. Which of the following types of controls is not described in the IT Governance Institute's
Study Unit 7 IT Framework and Data Analytics Questions 1. Which of the following types of controls is not described in the IT Governance Institute's Control 5. Which of the following statements is not true regarding ISO 9000 standards? (COBIT)? Objectives for Information and Related Technology Compliance with the standards is voluntary. A. General controls. thouit to compa B. The ISO 9000 standards are revised every B. Exchange controls. 5 years to account for technical and market developments. C. Business controls. C. The objective of ISO 9000 standards is to D. Process controls. ensure high quality products and services. D. ISO 9000 is a set of standards for establishing 2. Control objectives regarding effectiveness and and maintaining a quality system within an efficiency, reliability, and compliance are the basis of entity. which control framework? 6. Which of the following statements accurately A. ITGI. describes the impact that automation has on the controls normally present in a manual system? B. eSAC. C. COBIT. A. Transaction trails are more extensive in a computer-based system than in a manual D. COSO. system because there is always a one-for- one correspondence between data entry and output. 3. Why have many European Union countries not B. Responsibility for custody of information assets adopted ISO 14000 environmental standards? is more concentrated in user departments in a computer-based system than it is in a manual A. Following ISO 14000 standards will not reduce system. monitoring and inspection by regulatory C. Controls must be more explicit in a computer- agencies. based system because many processing B. Individual European Union countries' points that present opportunities for human standards are typically more strict than judgment in a manual system are eliminated. ISO 14000 standards. D. The quality of documentation becomes less C. Regulators are permitted to use voluntary critical in a computer-based system than it is audits as a basis for punitive action. n a manual system because data records are stored in machine-readable files. D. ISO 14000 standards will not make it easier to do business across borders. which of 7. A small client recently put its cash disbursements system on a server. About which of the following 4. According to eSAC, accountability is Forcein the Internal control features would an auditor most likely be concerned? A. Usually an issue with regard to trade secrets and other intellectual property. A. Programming of the applications are in Visual B. The control attribute that identifies the source Basic rather than Java. of a transaction. B. The server is operated by employees who C. The restriction of access to processing and have cash custody responsibilities. storage devices. C. Only one employee has the password to gain D. Most often applicable to personal information access to the cash disbursement system. about employees and customers. D. There are restrictions on the amount of data that can be stored and on the length of time that data can be stored. 608. Which of the following statements most likely represents a disadvantage for an entity that keeps data files on a server rather than on a manual 12. If a control total were to be computed on each system? of the following data items, which would best be identified as a hash total for a payroll computer application? A. Attention is focused on the accuracy of the programming process rather than errors in A. Hours worked. individual transactions. B. Total debits and total credits. B. It is usually easier for unauthorized persons to access and alter the files. C. Net pay. D. Department numbers. C. Random error associated with processing similar transactions in different ways is usually greater. 13. A catalog company has been experiencing an increasing incidence of problems in which the wrong D. It is usually more difficult to compare recorded products have been shipped to the customer. Most accountability with the physical count of assets. of the customer orders come in over the telephone, and an operator enters the data into the order system immediately. Which of the following control procedures, if properly implemented, would address 9. A small company has changed from a system the problem? of recording time worked on clock cards to a computerized payroll system in which employees 1. Have the computer automatically assign a record time in and out with magnetic cards. The sequential order number to each customer order. computer system automatically updates all payroll 2. Implement a self-checking digit algorithm for each records. Because of this change, product number and request entries by product number. A. A generalized computer audit program must be 3. Request entries by product number, have the used. computer program identify the product and B. Part of the audit trail is altered. price, and require the operator to orally verify the product description with the customer. C. The potential for payroll-related fraud is diminished. D. Transactions must be processed in batches. A. 2 only. B. 1, 2, and 3. C. 2 and 3 only 10. Batch processing D. 1 and 2 only. A. Is not used by most businesses because it reduces the audit trail. 14. The two broad groupings of information systems control activities are general controls and application B. Allows users to inquire about groups of controls. General controls include controls information contained in the system. C. Accumulates transaction records into groups A. Relating to the correction and resubmission of for processing against the master file on a delayed basis. faulty data D. Can only be performed on a centralized basis. B. For developing, modifying, and maintaining computer programs. C. Designed to ensure that only authorized users 11. When assessing application controls, which one receive output from processing. of the following input controls or edit checks is most likely to be used to detect a data input error in the D. Designed to ensure that all data submitted for customer account number field? processing have been properly authorized. A. Limit check. 15. An accounts payable program posted a payable to B. Validity check. a vendor not included in the online vendor master file. A control that would prevent this error is a C. Control total. D. Hash total. A. Validity check. B. Range check. C. Reasonableness test. D. Parity check. 6116. The purpose of check digit verification of an account number on an update transaction is to 20. All of the following are correct statements regarding businesses deciding to utilize cloud computing for big data projects except A. Verify that the account number corresponds to an existing account in the master file. A. Businesses are hesitant to invest in an B. Detect a transposition of an account number extensive server and storage infrastructure that entered into the system. might only be used occasionally to complete big data tasks. C. Ensure that supporting documentation exists for the update transaction. 3. Businesses only pay for the storage and Require the account number to have the computing time actually used. correct logical relationship with other fields. C. A public cloud provider can store petabytes of data and scale up thousands of servers just long enough to accomplish the big data 17. All of the following are correct statements project. regarding big data except D. Analysts are not required to have a detailed understanding of the available data and A. Big data is an evolving term that describes possess some sense of what answer(s) they're any voluminous amount of structured, semi- ooking for. structured, and unstructured data that has the potential to be mined for information. B. Big data includes information collected from social media, data from Internet-enabled devices, machine data, video, and voice recordings. The information collected is converted from high-density data into low- density data. C. Big data is often characterized by the "4 Vs" - volume, variety, velocity, and veracity. D. Big data processes data with analytic and algorithmic tools to reveal meaningful information. 18. Which of the following best describes unstructured data? A. Data with a high level of organization. B. Data systematically stored with markers to enforce hierarchies of records and fields within the data. C. Information that is not organized in a pre- defined manner (e.g., text-heavy facts, dates, numbers, and images). D. Conforms with the organization of data models associated with relational databases. 19. Which of the following is a correct statement regarding Hadoop? A. It is open source software framework that stores large amounts of data and runs applications on clusters of commodity hardware. B. It analyzes data from system memory instead of hard drives. C. It is a technology that uses data, statistical algorithms, and machine-learning techniques to identify the likelihood of future outcomes based on historical data D. It analyzes text data from the web, comment fields, books, and other text-based sources through the use of machine learning or natural language processing technology. 62
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
Students Have Also Explored These Related Accounting Questions!