BPA 301 Week 4 DQ 3

BPA 301 Week 4 Discussion Question 3

What is transfer of training and how is it used, according to our course text and materials? How can managers ensure transfer of training? Explain your answer and provide an example. Demonstrate some connections and implications/applications of some of this to the material we’ve covered this week.

Click here for BPA 301 Week 4 DQ 3 solution.

Posted in Homework Help | Comments Off

BPA 301 Week 4 DQ 2

BPA 301 Week 4 Discussion Question 2

Read the article titled “Six Trends Transforming Government” in the Electronic Reserve Reading this week, and compare and contrast it with the information in our text. After reading the article (and the text information), briefly summarize their content, then, answer the following question:

What public policy trend do you consider most significant at the federal, state and local levels and why?

Click here for BPA 301 Week 4 DQ 2 solution.

Posted in Homework Help | Comments Off

ECON 545 Project 2 (Macroeconomic Analysis) – A+ Guaranteed

Each of the scenarios has a list of Macroeconomic areas you are to address, with sources, in your answer. Briefly you are to research and show how these apply to your scenario: GDP growth rate (20 points), the business cycle (30 points), fiscal policy and level of unemployment (50 points), monetary policy and interest rates (50 points), international trade (40 points), and demographics (20 points).

Here’s the SOLUTION

Posted in Homework Help | Comments Off

ACC 564 Week 9 Quiz 4 – Using a file-oriented approach to data and information

1) Using a file-oriented approach to data and information, data is maintained in

A) a centralized database.

B) many interconnected files.

C) many separate files.

D) a decentralized database.

 

2) In a well-structured relational database,

A) every table must be related to at least one other table.

B) every table must be related to all other tables.

C) one table must be related to at least one other table.

D) one table must be related to all other tables.

 

3) File-oriented approaches create problems for organizations because of

A) multiple transaction files.

B) a lack of sophisticated file maintenance software.

C) multiple users.

D) multiple master files.

 

4) Which statement is true regarding file systems?

A) Transaction files are similar to ledgers in a manual AIS.

B) Multiple master files create problems with data consistency.

C) Transaction files are permanent.

D) Individual records are never deleted in a master file.

 

5) The ________ acts as an interface between the database and the various application programs.

A) data warehouse

B) database administrator

C) database management system

D) database system

 

6) The combination of the database, the DBMS, and the application programs that access the database through the DBMS is referred to as the

A) data warehouse.

B) database administrator.

C) database system.

D) database manager.

 

7) The person responsible for the database is the

A) data coordinator.

B) database administrator.

C) database manager.

D) database master.

 

8) All of the following are benefits of the database approach except:

A) Data integration and sharing

B) Decentralized management of data

C) Minimal data redundancy

D) Cross-functional analysis and reporting

 

9) The physical view of a database system refers to

A) how a user or programmer conceptually organizes and understands the data.

B) how the DBMS accesses data for a certain application program.

C) how and where the data are physically arranged and stored.

D) how master files store data values used by more than one application program.

 

10) The ________ handles the link between the way data are physically stored and each user’s logical view of that data.

A) data warehouse

B) data dictionary

C) database management (DBMS) software

D) schema

 

11) The logical structure of a database is described by the

A) data dictionary.

B) schema.

C) database management system.

D) internal level.

 

12) The schema that provides an organization-wide view of the entire database is known as the

A) external-level schema.

B) internal-level schema.

C) conceptual-level schema.

D) logical view of the database.

 

13) A set of individual user views of the database is called the

A) conceptual-level schema.

B) internal-level schema.

C) external-level schema.

D) meta-schema.

 

14) A low-level view of the database that describes how the data are actually stored and accessed is the

A) conceptual-level schema.

B) subschema.

C) internal-level schema.

D) external-level schema.

 

15) Record layouts, definitions, addresses, and indexes will be stored at the ________ level schema.

A) external

B) conceptual

C) internal

D) meta

 

16) The ________ contains information about the structure of the database.

A) data definition language

B) data dictionary

C) data warehouse

D) database management system

 

17) Which of the following would not be found in a data dictionary entry for a data item?

A) records containing a specific data item

B) physical location of the data

C) source of the data item

D) field type

 

18) The data dictionary usually is maintained

A) automatically by the DBMS.

B) by the database administrator.

C) by the database programmers.

D) by top management.

 

19) Reports produced using the data dictionary could include all of the following except a list of

A) programs where a data item is used.

B) synonyms for the data items in a particular file.

C) outputs where a data element is used.

D) the schemas included in a database.

 

20) Which statement below concerning the database management system (DBMS) is false?

A) The DBMS automatically creates application software for users, based on data dictionary parameters.

B) The DBMS automatically maintains the data dictionary.

C) Users’ requests for information are transmitted to the DBMS through application software.

D) The DBMS uses special languages to perform specific functions.

 

21) Which would not generally be considered a data dictionary output report?

A) A list of cash balances in the organization’s bank accounts

B) A list of all programs in which a data element is used

C) A list of all synonyms for the data elements in a particular file

D) A list of all data elements used by a particular user

 

22) Creating an empty table in a relational database requires use of the ________, and populating that table requires the use of ________.

A) DDL; DML

B) DQL; SQL

C) DDL; DQL

D) DML; DDA

 

23) When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language?

A) Data Query Language

B) Data Manipulation Language

C) Data Report Language

D) Data Definition Language

 

24) If a national sales tax were implemented, which language would be used to add a new field in the sales table to track the sales tax due?

A) Data Definition Language

B) Data Manipulation Language

C) Data Query Language

D) Data Update Language

 

25) The feature in many database systems that simplifies the creation of reports by allowing users to specify the data elements desired and the format of the output. is named the

A) report writer.

B) report generator.

C) report creator.

D) report printer.

 

26) The abstract representation of the contents of a database is called the

A) logical data model.

B) data dictionary.

C) physical view.

D) schema.

 

27) The problem of changes (or updates) to data values in a database being incorrectly recorded is known as

A) an update anomaly.

B) an insert anomaly.

C) a delete anomaly.

D) a memory anomaly.

 

28) The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is called the

A) update anomaly.

B) insert anomaly.

C) inconsistency anomaly.

D) delete anomaly.

 

29) Inability to add new data to a database without violating the basic integrity of the database is referred to as the

A) update anomaly.

B) insert anomaly.

C) integrity anomaly.

D) delete anomaly.

30) A relational database in which customer data is not maintained independently of sales invoice data will mostlikely result in

A) an update anomaly.

B) an insert anomaly.

C) a delete anomaly.

D) an integrity anomaly.

Here’s the SOLUTION

Posted in Homework Help | Comments Off

ACC 564 Final Exam – The transaction cycle that includes the events of hiring employees

Question 1
The transaction cycle that includes the events of hiring employees and paying them is known as the

revenue cycle.
expenditure cycle.
human resources cycle.
financing cycle.


Question 2
Data must be converted into information to be considered useful and meaningful for decision-making. There are six characteristics that make information both useful and meaningful. If information is free from error or bias and accurately represents the events or activities of the organization, it is representative of the characteristic of

relevancy.
timeliness.
understandability.
reliability.


Question 3
The primary objective of accounting is to

implement strong internal controls.
provide useful information to decision makers.
prepare financial statements.
ensure the profitability of an organization


Question 4
The business owners obtain financing from outside investors, which results in an inflow of cash into the company. This transaction is considered to be part of which cycle?

the revenue cycle
the payroll cycle
the production cycle
the financing cycle


Question 5
Information that is free from error or bias and accurately represents the events or activities of the organization is

relevant.
reliable.
verifiable.
timely


Question 6
Hector Sanchez works in the accounting department of a multinational manufacturing company. His job includes updating accounts receivable based on sales orders and remittance advices. His responsibilities are part of the company’s

revenue cycle.
expenditure cycle.
financing cycle.
production cycle


Question 7
An audit trail

provides the means to check the accuracy and validity of ledger postings.
begins with the general journal.
is automatically created in every computer-based information system.
is a summary of recorded transactions


Question 8
What usually initiates data input into a system?

The transaction system automatically checks each hour to see if any new data is available for input and processing.
The performance of some business activity generally serves as the trigger for data input.
A general ledger program is queried to produce a trial balance at the end of an accounting period.
Data is only input when a source document is submitted to the accounting department


Question 9
The general ledger account that corresponds to a subsidiary ledger account is known as a

dependent account.
attribute account.
entity account.
control account.


Question 10
The efficiency of recording numerous business transactions can be best improved by the use of

prenumbered source documents.
specialized journals.
posting references.
subsidiary ledgers


Question 11
Chas Mulligan has been hired by Yardley Security as an assistant to the internal auditor. He has been asked to document the existing accounting information system, and focus on the activities and flow of data between activities. He decides to begin with a summary description of the sources and uses of data in the organization and how they are processed by the system. The documentation tool that he should employ for this purpose is a

data flow diagram.
document flowchart.
system flowchart.
program flowchart.


Question 12
In general, a data destination will be shown by

an arrow pointing away.
an arrow pointing in.
arrows pointing both ways.
no arrows, only two horizontal lines.


Question 13
A data flow diagram

is a graphical description of the source and destination of data that shows how data flow within an organization.
is a graphical description of the flow of documents and information between departments or areas of responsibility.
is a graphical description of the relationship among the input, processing, and output in an information system.
is a graphical description of the sequence of logical operations that a computer performs as it executes a program


Question 14
A flowchart that depicts the relationships among the input, processing, and output of an AIS is

an internal control flowchart.
a document flowchart.
a system flowchart.
a program flowchart.

Question 15

Chuck and Jill Scruggs travel in their motor home six months of the year and buy unique artifacts. Within hours after the Scruggs make a purchase, they have photographed it, written a description of it, and posted it for sale on eBay with a reservation price. Anything that does not sell within a week is shipped back to Austin, Texas, for display in The House of Curiosities, a retail business that the Scruggs operate during the balance of the year. Which symbol should be used to represent the transfer of data to eBay in a context diagram of this process?

A) rectangle
B) circle
C) arrow up and right
D) parallel horizontal lines


Question 16
The ________ handles the link between the way data are physically stored and each user’s logical view of that data.

data warehouse
data dictionary
database management (DBMS) software
schema


Question 17
The logical structure of a database is described by the

data dictionary.
schema.
database management system.
internal level.


Question 18
The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the

entity integrity rule.
referential integrity rule.
rule of keys.
foreign key rule


Question 19
A set of individual user views of the database is called the

conceptual-level schema.
internal-level schema.
external-level schema.
meta-schema.


Question 20
Inability to add new data to a database without violating the basic integrity of the database is referred to as the

update anomaly.
insert anomaly.
integrity anomaly.
delete anomaly.


Question 21
The US Justice Department defines computer fraud as

any crime in which a computer is used.
an illegal act in which knowledge of computer technology is essential.
any act in which cash is stolen using a computer.
an illegal act in which a computer is an integral part of the crime


Question 22
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?

human errors and omissions
physical threats such as natural disasters
dishonest employees
fraud and embezzlement


Question 23
The most efficient way to conceal asset misappropriation is to

write-off a customer receivable as bad debt.
alter monthly bank statements before reconciliation.
alter monthly physical inventory counts to reconcile to perpetual inventory records.
record phony payments to vendors.


Question 24
Most fraud perpetrators are insiders because

insiders are more dishonest than outsiders.
insiders know more about the system and its weaknesses than outsiders.
outsiders are more likely to get caught than insiders.
insiders have more need for money than outsiders

 

Question 25
The simplest and most common way to commit a computer fraud is to

alter computer input.
alter computer output.
modify the processing.
corrupt the database


Question 26
Telefarm Industries is a telemarketing firm that operates in the Midwest. The turnover rate among employees is quite high. Recently, the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm’s database and copy a list of customers from the past three years that included credit card information. Telefarm was a victim of

Bluesnarfing.
splogging.
vishing.
typosquatting.


Question 27
Illegally obtaining and using confidential information about a person for economic gain is known as

eavesdropping.
identity theft.
packet sniffing.
piggybacking.


Question 28
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.

Trojan horse
round down
salami
trap door


Question 29
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using

a Trojan horse.
a trap door.
the salami technique.
superzapping.


Question 30
Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?

dumpster diving
by use of a Trojan horse
using a telescope to peer at paper reports
electronic eavesdropping on computer monitors


Question 31
What is one reason why AIS threats are increasing?

LANs and client/server systems are easier to control than centralized, mainframe systems.
Many companies do not realize that data security is crucial to their survival.
Computer control problems are often overestimated and overly emphasized by management.
Many companies believe that protecting information is a strategic requirement.


Question 32
The SEC and FASB are best described as external influences that directly affect an organization’s

hiring practices.
philosophy and operating style.
internal environment.
methods of assigning authority


Question 33
According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports.

Compliance objectives
Operations objectives
Reporting objectives
Strategic objectives

 

Question 34
According to the ERM, these deal with the effectiveness and efficiency of company operations, such as performance and profitability goals.

Compliance objectives
Operations objectives
Reporting objectives
Strategic objectives


Question 35
When undertaking risk assessment, the expected loss is calculated like this.

Impact times expected loss
Impact times likelihood
Inherent risk times likelihood
Residual risk times likelihood


Question 36
Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate.

validity test
biometric matrix
logical control matrix
access control matrix


Question 37
In 2007, a major U.S. financial institution hired a security firm to attempt to compromise its computer network. A week later, the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found. This is an example of a

preventive control.
detective control.
corrective control.
standard control


Question 38
The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as

deep packet inspection.
stateful packet filtering.
static packet filtering.
an intrusion prevention system


Question 39
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

Access control list
Internet protocol
Packet switching protocol
Transmission control protocol


Question 40
A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization’s information system, is known as a(n)

demilitarized zone.
intrusion detection system.
intrusion prevention system.
firewall.


Question 41
Jeff Davis took a call from a client. “Jeff, I need to interact online and real time with our affiliate in India, and I want to make sure that our communications aren’t intercepted. What do you suggest?” Jeff responded “The best solution will be to implement

a virtual private network.”
a private cloud environment.”
an asymmetric encryption system with digital signatures.”
multifactor authentication


Question 42
On March 3, 2008, a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jan’s car while he was attending a conference in Cleveland, Ohio. After reporting the theft, Jiao considered the implications of the theft for the company’s network security and concluded there was nothing to worry about because

the computer was protected by a password.
the computer was insured against theft.
it was unlikely that the thief would know how to access the company data stored on the computer.
the data stored on the computer was encrypted


Question 43
One way to circumvent the counterfeiting of public keys is by using

a digital certificate.
digital authority.
encryption.
cryptography


Question 44
An electronic document that certifies the identity of the owner of a particular public key.

Asymmetric encryption
Digital certificate
Digital signature
Public key


Question 45
Which of the following descriptions is not associated with symmetric encryption?

A shared secret key
Faster encryption
Lack of authentication
Separate keys for each communication party


Question 46
This tests a numerical amount to ensure that it does not exceed a predetermined value.

Completeness check
Limit check
Range check
Sign check


Question 47
User reviews are an example of a(n)

data entry control.
data transmission control.
output control.
processing control


Question 48
A copy of a database, master file, or software that will be retained indefinitely as a historical record is known as a(n)

archive.
cloud computing.
differential backup.
incremental backup

Question 49
This determines the correctness of the logical relationship between two data items.

Range check
Reasonableness test
Sign check
Size check


Question 50
When I enter a correct customer number, the data entry screen displays the customer name and address. This is an example of

prompting.
preformatting.
closed-loop verification.
error checking.

 

Version 2

Question 1
Refer to the chart above. At what point, measured in terms of the net cost of information, does information overload begin?

0
5
10
12


Question 2
Which of the following statements below shows the contrast between data and information?

Data is the output of an AIS.
Information is the primary output of an AIS.
Data is more useful in decision-making than information.
Data and information are the same


Question 3
The primary objective of accounting is to

implement strong internal controls.
provide useful information to decision makers.
prepare financial statements.
ensure the profitability of an organization


Question 4
Transaction cycles can be summarized on a high level as “give-get” transactions. An example of “give-get” in the revenue cycle would be

give cash, get goods.
give goods, get cash.
give cash, get labor.
give cash, get cash.


Question 5
An example of inbound logistics would consist of

the activities that transform inputs into final products or services.
the activities that help customers to buy the organization’s products or services.
the activities that provide post-sale support to customers.
the activities that consist of receiving, storing, and distributing the materials used as inputs by the organization to create goods and/or services it sells


Question 6
Which of the following is an example of source data automation?

a utility bill
POS (point-of-sale) scanners in retail stores
a bill of lading
a subsidiary ledger


Question 7
A general journal

would be used to record monthly depreciation entries.
simplifies the process of recording large numbers of repetitive transactions.
records all detailed data for any general ledger account that has individual sub-accounts.
contains summary-level data for every account of the organization


Question 8
Hector Sanchez works in the accounting department of a multinational manufacturing company. His job includes updating accounts payable based on purchase orders and checks. His responsibilities are part of the company’s

revenue cycle.
expenditure cycle.
financing cycle.
production cycle


Question 9
The efficiency of recording numerous business transactions can be best improved by the use of

prenumbered source documents.
specialized journals.
posting references.
subsidiary ledgers.


Question 10
To be effective, the chart of accounts must

be as concise as possible.
begin with account 001.
utilize only one coding technique.
contain sufficient detail to meet the information needs of the organization.

 

Question 11
The Union Soup Kitchen is a non-profit organization that collects, stores, prepares and provides food to the homeless in Erie, Pennsylvania. Donations of food are recorded in a database and a receipt is provided to the donor. When food is used, the database is updated so that it always reflects the amounts and types of food that are available. In a data flow diagram, which type of symbol would be used to represent the flow of data from the donor into the system?

rectangle
circle
arrow up and right
parallel horizontal lines


Question 12
In a document flowchart of a manual payroll processing system, “update employee file” will be shown by a(n) ________ symbol, and “prepare payroll check” will be shown by a(n) ________ symbol.

input; output
input; manual operation
manual operation; output
manual operation; manual operation


Question 13
When preparing a document flowchart, the names of organizational departments or job functions should appear in the

column headings.
right-hand margin.
written narrative accompanying the flowchart.
title of the flowchart.


Question 14

Chas Mulligan has been hired by Yardley Security as an assistant to the internal auditor. He has been asked to thoroughly document the existing accounting information system in preparation for making recommendations for improvements to internal controls. He decides to begin with a description of the information stored in paper records, their sources, and their destinations. The documentation tool that he should employ for this purpose is a

data flow diagram.
document flowchart.
system flowchart.
program flowchart

Question 15
A DFD created at the highest-level or summary view is referred to as a

process diagram.
overview diagram.
content diagram.
context diagram

Question 16
The ________ acts as an interface between the database and the various application programs.

data warehouse
database administrator
database management system
database system

Question 17
The problem of changes (or updates) to data values in a database being incorrectly recorded is known as

an update anomaly.
an insert anomaly.
a delete anomaly.
a memory anomaly

Question 18
The update anomaly in file-based systems or unnormalized database tables

occurs because of data redundancy.
restricts addition of new fields or attributes.
results in records that cannot be updated.
is usually easily detected by users.

Question 19
When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language?

Data Query Language
Data Manipulation Language
Data Report Language
Data Definition Language

Question 20
In a well-structured database, the constraint that ensures the consistency of the data is known as the

entity integrity rule.
referential integrity rule.
logical view.
consistency integrity rule

Question 21
In a ________ scheme, customer receipts are stolen and then subsequent payments by other customers are misapplied to cover the theft of the original receipts.

kiting
laundering
bogus expense
lapping

Question 22
Opportunity to commit fraud is comprised of three stages. The stage that often takes most time and effort would include

stealing inventory from the warehouse.
selling stolen inventory to get cash.
lapping accounts receivable.
creating false journal entries to overstate revenue

Question 23
Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?

pressure
opportunity
rationalization
concealment

Question 24
Intentional or reckless conduct that results in materially misleading financial statements is called

financial fraud.
misstatement fraud.
fraudulent financial reporting.
audit failure fraud

Question 25
Why is computer fraud often more difficult to detect than other types of fraud?

Rarely is cash stolen in computer fraud.
The fraud may leave little or no evidence it ever happened.
Computers provide more opportunities for fraud.
Computer fraud perpetrators are just more clever than other types of criminals

Question 26
In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as

phreakers.
hackers.
hijackers.
superzappers

Question 27
The call to tech support was fairly routine. A first-time computer user had purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly than it had at first. Had he been accessing the Internet? Yes. Had he installed any “free” software? Yes. The problem is likely to be a(an)

virus.
zero-day attack.
denial of service attack.
dictionary attack.

Question 28
Developers of computer systems often include a user name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a

Trojan horse.
key logger.
spoof.
back door

Question 29
I work in the information technology department of a company I’ll call CMV. On Wednesday morning, I arrived at work, scanned in my identity card and punched in my code. This guy in a delivery uniform came up behind me carrying a bunch of boxes. I opened the door for him, he nodded and went on in. I didn’t think anything of it until later. Then I wondered if he might have been

pretexting.
piggybacking.
posing.
spoofing

Question 30
When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as

data diddling.
dumpster diving.
eavesdropping.
piggybacking

 

Question 31
Go-Go Corporation, a publicly traded company, has three brothers who serve as President, Vice President of Finance and CEO. This situatio
n

increases the risk associated with an audit.
must be changed before your audit firm could accept the audit engagement.
is a violation of the Sarbanes-Oxley Act.
violates the Securities and Exchange Act

 

Question 32
A(n) ________ helps top-level managers with high-level activities that demand frequent and regular attention.

boundary system
diagnostic control system
interactive control system
internal control system

 

Question 33
When undertaking risk assessment, the expected loss is calculated like this.

Impact times expected loss
Impact times likelihood
Inherent risk times likelihood
Residual risk times likelihood

 

Question 34
Generally in a risk assessment process, the first step is to

identify the threats that the company currently faces.
estimate the risk probability of negative events occurring.
estimate the exposure from negative events.
identify controls to reduce all risk to zero.

 

Question 35
The primary purpose of the Foreign Corrupt Practices Act of 1977 was

to require corporations to maintain a good system of internal control.
to prevent the bribery of foreign officials by American companies.
to require the reporting of any material fraud by a business.
All of the above are required by the act

 

Question 36
A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization’s information system, is known as a(n)

demilitarized zone.
intrusion detection system.
intrusion prevention system.
firewall.

 

Question 37
Multi-factor authentication

involves the use of two or more basic authentication methods.
is a table specifying which portions of the systems users are permitted to access.
provides weaker authentication than the use of effective passwords.
requires the use of more than one effective password.

 

Question 38
Which of the following is an example of a corrective control?

Physical access controls
Encryption
Intrusion detection
Incident response teams

 

Question 39
The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as

availability.
security.
maintainability.
integrity

 

Question 40
In 2007, a major U.S. financial institution hired a security firm to attempt to compromise its computer network. A week later, the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found. This is an example of a

preventive control.
detective control.
corrective control.
standard control

 

Question 41
Which of the following is not one of the three important factors determining the strength of any encryption system?

Key length
Key management policies
Encryption algorithm
Privacy

 

Question 42
Jeff Davis took a call from a client. “Jeff, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn’t intercepted. What do you suggest?” Jeff responded “The best solution will be to implement

a virtual private network.”
a private cloud environment.”
an encryption system with digital signatures.”
a data masking program

 

Question 43
These are used to create digital signatures.

Asymmetric encryption and hashing
Hashing and packet filtering
Packet filtering and encryption
Symmetric encryption and hashing

 

Question 44
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers’ personal information?

Providing free credit report monitoring for customers
Inform customers of the option to opt-out of data collection and use of their personal information
Allow customers’ browsers to decline to accept cookies
Utilize controls to prevent unauthorized access to, and disclosure of, customers’ information

 

Question 45
Jeff Davis took a call from a client. “Jeff, I need to interact online and real time with our affiliate in India, and I want to make sure that our communications aren’t intercepted. What do you suggest?” Jeff responded “The best solution will be to implement

a virtual private network.”
a private cloud environment.”
an asymmetric encryption system with digital signatures.”
multifactor authentication

 

Question 46
Sequentially prenumbered forms is an example of a(n)

data entry control.
data transmission control.
processing control.
input control.

 

Question 47
Error logs and review are an example of

data entry controls.
data transmission controls.
output controls.
processing controls

 

Question 48
This determines if all required data items have been entered.

Completeness check
Field check
Limit check
Range check

 

Question 49
A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn’t have equipment installed, is known as a

cold site.
hot site.
remote site.
subsidiary location

Question 50
User reviews are an example of a(n)

data entry control.
data transmission control.
output control.
processing control

Here’s the SOLUTION

Posted in Homework Help | Comments Off

MIS 535 Final Exam – (TCO A) Which of the following decisions require knowledge based

1. (TCO A) Which of the following decisions require knowledge based on collaboration and interaction? (Points : 4)
How long will it take to manufacture this product?
Should we work with outside vendors on new products and services?
In which geographical locations are our products garnering the most sales?
Which product design is the most efficient for the user in terms of energy use?

1. (TCO A) The costs for firms operating on a global scale have been drastically reduced by (Points : 4)
networking technology.
investments in organizational complementary assets.
cloud computing
the rise of digital content.

1.    (TCO A) Which of the following objectives best describes the business strategy behind the development of smart grid initiatives by power companies, as discussed in the chapter case?

2. (TCO B) Which of the following businesses use the market creator business model? (Points : 5)
an online auction house
an online newspaper
a video-sharing site
an online bookseller

2. (TCO B) ________ are visual tools for presenting performance data in a BI system. (Points : 5)
Dashboards and scorecards
Parameterized reports
Reports and the drill-down feature
Scenarios and models
2. (TCO B) Which of the following describes how the Simon framework of decision making works in high-velocity decision environments? (Points : 5)
all four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow
the first three steps of the process are handled by software algorithms and the final step is handled by experienced managers
the first two steps of Simon’s framework are eliminated and the final steps are handled by software algorithms
all four steps are performed by humans with the support of high-speed, high-volume DSS and ESS
3. (TCO C) The type of logical database model that treats data as if they were stored in two-dimensional tables is the (Points : 4)
OODBMS.
pre-digital DBMS.
relational DBMS.
hierarchical DBMS.

3. (TCO C) A field identified in a record as holding the unique identifier for that record is called the (Points : 4)
primary key.
key field.
primary field.
unique ID.

4. (TCO D) The telephone system is an example of a ________ network. (Points : 4)
peer-to-peer
wireless
packet-switched
circuit-switched

4. (TCO D) To use the analog telephone system for sending digital data, you must also use (Points : 4)
a modem.
a router.
DSL.
twisted wire.

5. (TCO E) Enterprise applications have become easier to install because: (Points : 5)
they have been reduced in function
vendors have modularized the applications so they can be rolled out a module at a time
vendors have changed their design to make the application more adaptable to diverse business processes
Users have become more familiar with how to use the applications

5. (TCO E) Which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades? (Points : 5)
network economics
law of mass digital storage and Moore’s law
declining communications costs, universal standards, and the Internet
all of the above

6. (TCO F) Agile Methodologies (Points : 4)
were developed because traditional methodologies did not work
because software development is unlike any other development activity
users seldom know what they want when the project starts
all of the above

7. (TCO G) A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor’s advertising costs up. This is an example of (Points : 4)
phishing.
pharming.
spoofing.
click fraud.

1.    (TCO A) You work for an auto manufacturer and distributor.  How could you use information systems to achieve greater customer intimacy?
2.    (TCO A) You have been hired to work with 10 salespeople from different branches of a national business in creating an online training site for new Sales employees.  Identify six collaboration tools that are available to help the team work together.  Which single tool would be the most helpful for the project, in your opinion, and why?
3.    (TCO A) Assess at least two benefits of using enterprise systems.  Append

4.    (TCO B) You are advising the owner of Small town Computer, a new, local computer repair store that also builds custom computers to order.  What competitive strategies could Small town Computer exert?  Which ones will it have difficulty exercising?
5.    (TCO B) Describe four types of application that are especially well-suited for mobile-commerce

6.    (TCO B)You are evaluating BI software from a variety of vendors.  Identify six elements in the BI environment.  Use your understanding of the importance of these elements to formulate six questions to ask the vendor in order to determine how their software will interplay with your needs.
7.    (TCO C) If you were to design the new contracts database for a publishing house what fields do you anticipate needing?  Which of these fields might be in use in other databases used by the company?
8.    (TCO C) What types of relationships are possible in a relational database?  Describe and give an example of each.

9.    (TCO C) Describe the ways in which database technologies could be used by an office stationery supply company to achieve low-cost leadership
10.    (TCO D) How are RFID systems used in inventory control and supply chain management?

11.    (TCO D) What is cloud computing and how do you think its developments could impact businesses?
12.    (TCO D) What are the business advantages of using voice over IP (VOIP) technology?
13.    (TCO E) Distinguish between grid computing, cloud computing, and utility computing.
14.    (TCO E) What additional complexities are faced in global supply chains?  How does the Internet help in managing global supply chains?
15.    (TCO E) Explain why standards are so important in information technology?  What standards have been important for the growth of Internet technologies?
16.    (TCO F) Differentiate between intangible and tangible benefits and list three examples of each.  In what types of systems are intangible benefits more predominant?

17.    (TCO F) You have been hired as a consultant for a nationwide real estate firm, Cross & Deptford, who are interested in achieving better organization between branches by updating their information systems, but are not sure what will suit their needs.  What will you recommend they do in order to determine the most effective IT projects?
18.    (TCO F) What qualities of object-oriented development make this method especially suitable for Internet applications?
19.    (TCO G) Define the basic concept of responsibility, accountability, and liability as applied to ethical decision.  How are these concepts related?

20.    (TCO G) How is the security of a firm’s information system and data affected by its people, organization, and technology?  In the contribution of one of these dimensions any more important than the other? Why?
21.    (TCO G) Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise.  List at least 5 Internet security challenges

Here’s the SOLUTION

Posted in Homework Help | Comments Off

MIS 535 Midterm Exam – (TCO A) Domino’s upgraded Pulse Evolution system incorporated a Pizza

(TCO A) Domino’s upgraded Pulse Evolution system incorporated a Pizza Tracker functionality that shows the progression of individual pizza orders. This is an example of using information systems to achieve which business objective? (Points : 10)
Customer and supplier intimacy
Survival
Improved decision making
Operational excellence


(TCO A) Cloud computing (Points : 10)
Is the same as e-commerce
Reduces the size of IT organizations
Increases special software, other than a browser, to be installed on each computer


(TCO A) Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization’s (Points : 10)
Data management environment
Networked environment
IT infrastructure
Information system

(TCO A) The hardware and software used to transfer data in an organization is called (Points : 10)
data management technology
networking and data management technology
data and telecommunications technology
networking and telecommunications technology

(TCO B) Internet technology (Points : 10)
makes it easy for rivals to compete on price alone.
imposes a significant cost of entry, due to infrastructure requirements.
Increases the difference between competitors because of the wide availability of information.
Makes it easy to sustain operational advantages

(TCO B) The value chain model (Points : 10)
Categorizes five related advantages for adding value to a firm’s products or services
Sees the supply chain as the primary activity for adding value
Categorizes four basic strategies a firm can use to enhance its value chain
Helps a firm identify points at which information technology can most effectively enhance its competitive position


(TCO B) For which of the following industries has the Internet as a whole been a disruptive technology? (Points : 10)
bill payments
travel agencies
books and printed media
real estate

(TCO C) The difference between competitors because of the wide availability of information. (Points : 10)
Data warehouses tend to serve an entire enterprise and a data mart a single department
A data warehouse is historical data only and a data mart is the most recent transactions
A data mart requires normalized data, whereas a data warehouse does not
They are different names for the same thing

(TCO C) Which common database challenge is illustrated by the text’s discussion of receiving multiple pieces of the same direct mail advertising with an identical address? (Points : 10)
Data normalization
Data accuracy
Data redundancy
Data quality

(TCO D) Which of the following is not an example of the emerging mobile computing platforms? (Points : 10)
eReaders
The iPad
Android phone
CRM

(TCO A) Define operational excellence. How can information systems help achieve it? (Points : 25)

TCO A) What is the difference between information technology and information systems? Describe some of the functions of information systems.

(TCO A) List and describe the four information systems serving each of the major functional areas of a business (Points : 20)

(TCO B) List three organizational factors that can prevent a firm from fully realizing the benefits of a new information system, and provide examples of each. (Points : 20)

(TCO B) How have mobile devices and social media changed the work environment? (Points : 25)

(TCO C) The small publishing company you work for wants to create a new database for storing information about all of its author contracts. What factors will influence how you design the database? (Points : 25)

(TCO C) What types of relationships are possible in a relational database? Describe and give an example of each (Points : 25)

(TCO D) What is Web 3.0, and how do you think Web 3.0 developments could impact businesses?

(TCO D) Describe and explain the idea of network neutrality. Are you in favor of network neutrality? Why or why not? (Points : 25)

(TCO D) Describe the effect of cloud computing on traditional IT infrastructure.

Here’s the SOLUTION

 

Posted in Homework Help | Comments Off

BPA 301 Week 4 DQ 1

BPA 301 Week 4 Discussion Question 1

If you could change only one limitation on a public administrator’s ability to respond to public policy issues, based on your reading and learning this week and thus far in the course, what would it be and why? Be specific and demonstrate your reading and learning from the text and materials in the course.

Click here for BPA 301 Week 4 DQ 1 solution.

Posted in Homework Help | Comments Off

BPA 301 Week 3 Learning Team Assignment Funding

BPA 301 Week 3 Learning Team Assignment Funding

Click here for BPA 301 Week 3 Learning Team Assignment Funding solution.

Posted in Homework Help | Comments Off

BPA 301 Week 3 Individual Assignment Role

BPA 301 Week 3 Individual Assignment Role

Click here for BPA 301 Week 3 Individual Assignment Role solution.

Posted in Homework Help | Comments Off