ACT430 Mid 2 Fall 2020
ACT430 Mid 2 Fall 2020
2/2
meta data
indexes
reports
user data
2. Amazon uses what kind of database
0/2
single
multiple
data mining
ecommerce
Correct answer
ecommerce
3. The true relational database `
2/2
r:base
oracle dbms
IDBMS
Python
4. SQL stands for what
2/2
Correct answer
creating forms
processing forms
creating databse
processing data
6. ERP is what kind of database
0/2
Single
multiple
ecommerce
data mining
Correct answer
multiple
7. Which of the following is not considered to be a enterprise-class database
system?
2/2
users
database applications
dbms
cobol
8. The most difficult database in the world is
2/2
Oracle
DB2
Access
Sql server
9 A databse is called self-describing
2/2
yes
no
neutal
10. Database applications are seldom intended to use by single user
2/2
True
False
Option 3
11. A study found ___% of inspected computers were infected with spyware.
each machine containing on average 93 spyware or adware components.
2/2
70
50
60
80
12. Clandestine use of someone's W-Fi network is
2/2
Piggybacking
Podlsurping
Phreaking
Superzapping
13. Zombies on a __________ used an automated SQL injection attack to
compromise over ____________ websites last year, stealing sensitive
information and injecting malware into the site.
4/4
botnet, 200000
podslurping, 500,000
botnet, 500000
superzap, 500,000
14. Taking control of a phone to make calls, or read text messages is
____________
2/2
Bluebugging
Superzapping
Phising
Bluesnarfing
15. __________ is stealing contact lists, images, and other data using
Bluetooth.
2/2
Bluebugging
Bluesnarfing
Bluebugging
Bluezapping
16. Stealing tiny slices of money over time is _____________>
2/2
Scavenging
Salami
Spoofing
Skimming
17. Watching or listening to people disclose confidential data is called
_________________.
2/2
Sexting
Shoulder surfing
Shoulder skimming
Shoulder bot
18. Hacker create __________________ with links to websites they own to
increase their Google Pagerank.
0/5
Blogs
Spam
Splogs
Blogs and Spams
Correct answer
Splogs
Blogs and Spams
19. ______________________ is a vulnerability in dynamic web pages that
allows an attacker to bypass a browser's security mechanisms and instruct
the victim's browser to execute the code, thinking it came from the desired
website.
2/2
XSSS
BSS
XSS
XNS
20. ___________________ is using the Internet to pump up the price of a
stock and then selling it.
3/4
Pump-and-Dump
Correct answer
21. Which of the following audit data analytic techniques would most likely be
used to compare information from different sources, such as invoices,
purchase orders, and shipping documents, to detect errors or other
unanticipated variances?
2/2
Sorting.
Matching.
Trend analysis.
Ratio analysis.
22. Which of the following is a computer-assisted audit technique that
permits an auditor to insert the auditor's version of a client's program to
process data and compare the output with the client's output?
2/2
The test need consist of only those valid and invalid conditions which interest the auditor.
Only one transaction of each type need be tested.
The test data must consist of all possible valid and invalid conditions.
Test data are processed by the client’s computer programs under the auditor’s control.
25. Which of the following procedures would an entity most likely include in
its disaster recovery plan?
2/2
Correct answer
Parallel simulation.
27. An auditor is performing an audit data analytic as a risk assessment
procedure for all active sales divisions. The auditor determined that the
results of the analysis were significantly different from the expected results
because the data included a discontinued division for which other risk
assessment procedures had already been planned. The auditor should
0/2
Correct answer
Exclude the discontinued operation and reperform the analytic procedures.
28. Which of the following is a professional engagement that a CPA may
perform to provide assurance on a system's reliability?
2/2
MAS AssurAbility.
CPA WebMaster.
MAS AttestSure.
CPA SysTrust
29. Which of the following outcomes is a likely benefit of information
technology used for internal control?
2/2
30. Which of the following constitutes a potential risk associated with the use
of information technology in an entity's internal control structure?
2/2
Control risk.
Control activities.
Monitoring.
Control environment
32. Which of the following factors would most likely be considered an
inherent limitation to an entity's internal control?
2/2
34. Risk assessment and segregation is a component of internal contro.
2/2
True
False
35. Which of the following represents an inherent limitation in a system of
internal controls?
2/2
36. Which of the following components of internal control would be
considered the foundation for the other components?
2/2
37. The ______________ provides pictorial representation of given problem.
(one word)
2/2
Flowchart
38. The ___________ symbol is used at the beginning of a flow chart.
3/3
Circle
Correct answer
circle
39. The ______________ symbol is used to represent decision in a
flowchart.
4/4
Diamond
Correct answer
diamond
40. The _________________ is used to represent process in a flow chart.
4/4
Rectangle
Correct answer
rectangle
41. The _________________ is used to represent input and output in a flow
chart.
4/4
Parallelogram
42. The ____________ is a symbol used connects two symbols of flowchart.
4/4
Arrow
Correct answer
arrow