Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Harvard University AUDIT 111 Chapter 8-Data Structures and CAATTs for Data Extraction TRUE/FALSE 1)The database approach to data management is sometimes called the flat file approach

Harvard University AUDIT 111 Chapter 8-Data Structures and CAATTs for Data Extraction TRUE/FALSE 1)The database approach to data management is sometimes called the flat file approach

Business

Harvard University

AUDIT 111

Chapter 8-Data Structures and CAATTs for Data Extraction

TRUE/FALSE

1)The database approach to data management is sometimes called the flat file approach.

 

                                           

 

  1. The two fundamental components of data structures are organization and access method.

 

                                           

 

3. When a large portion of the file is to be processed in one operation such as payroll, sequential data structures are an inefficient method of organizing a file.

 

                                           

 

  1. An advantage of using an indexed random file structure is that records are easily added and deleted.

 

                                           

 

  1. The hierarchical database model forces users to navigate between data elements using predefined structured paths.

 

                                           

 

  1. A network model does not allow children files to have multiple parent files.

 

                                           

 

    1. The physical database is an abstract representation of the database.

 

                                           

 

    1. A customer name and an unpaid balance is an example of a one-to-many relationship.

 

                                           

 

    1. In the relational model, a data element is called a relation.

 

                                           

 

    1. Data normalization groups data attributes into tables in accordance with specific design objectives.

 

                                           

 

 

    1. Under the database approach, data is viewed as proprietary or owned by users.

 

                                           

 

    1. VSAM file structures are most effective where rapid access to individual records is a priority need.

 

                                           

 

    1. A join builds a new table by creating links.

 

                                           

 

    1. The deletion anomaly is the least important of the problems affecting unnormalized databases.

 

                                           

 

    1. EAM’s allow auditors to identify significant transactions for substantive testing.               
    2. Generalized audit software packages are used to assist the auditor in performing substantive tests.

 

                                           

 

    1. GAS can be used with simple data structures but not complex structures

 

                                           

 

    1. Logical database design is the foundation of the conceptual design.

 

                                           

 

    1. An entity is any physical thing about which the organization wishes to capture data.

 

                                           

 

    1. An ER diagram is a graphical representation of a data model.

 

                                           

 

    1. The term occurrence is used to describe the number of attributes or fields pertaining to a specific entity.

 

                                           

 

    1. Cardinality describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.

 

                                           

 

    1. A table in third normal form is free of partial dependencies, multiple dependencies, and transitive dependencies.

 

                                           

 

    1. Improperly normalized databases are associated with three types of anomalies: the update anomaly, the insertion anomaly, and the deletion anomaly.

 

                                           

 

MULTIPLE CHOICE

 

  1. An inventory record contains part number, part name, part color, and part weight. These individual items are called

a.

b.

c.

d.

fields. stored files. bytes. occurrences.

 

 

  1. It is appropriate to use a sequential file structure when
    1. records are routinely inserted.
    2. single records need to be retrieved.
    3. records need to be scanned using secondary keys.
    4. a large portion of the file will be processed in one operation.

 

  1. Which of the following statements is not true?
  1. Indexed random files are dispersed throughout the storage device without regard for physical proximity with related records.
  2. Indexed random files use disk storage space efficiently.
  3. Indexed random files are efficient when processing a large portion of a file at one time.
  4. Indexed random files are easy to maintain in terms of adding records.

 

  1. Which characteristic is associated with the database approach to data management?

a.

data sharing

b.

multiple storage procedures

c.

data redundancy

d.

excessive storage costs

                                           

 

 

 

  1. Which statement is not correct? The VSAM structure
    1. is used for very large files that need both direct access and batch processing.
    2. may use an overflow area for records.
    3. provides an exact physical address for each record.
    4. is appropriate for files that require few insertions or deletions.                

 

  1. Which statement is true about a hashing structure?
  1. The same address could be calculated for two records.
  2. Storage space is used efficiently.
  3. Records cannot be accessed rapidly.
  4. A separate index is required.

 

  1. In a hashing structure,
    1. two records can be stored at the same address.
    2. pointers are used to indicate the location of all records.
    3. pointers are used to indicate the location of a record with the same address as another record.
    4. all locations on the disk are used for record storage.      
  2. Pointers can be used for all of the following except
    1. to locate the subschema address of the record.
    2. to locate the physical address of the record.
    3. to locate the relative address of the record.
    4. to locate the logical key of the record.  

 

  1. Pointers are used
    1. to link records within a file.
    2. to link records between files.
    3. to identify records stored in overflow.
    4. all of the above.

 

 

 

  1. In a hierarchical model

a.

links between related records are implicit

b.

the way to access data is by following a predefined data path

c.

an owner (parent) record may own just one member (child) record

d.

a member (child) record may have more than one owner (parent)

                                           

 

 

  1. Which term is not associated with the relational database model?

a.

tuple

b.

attribute

c.

collision

d.

relation

                                            PTS:     1

 

  1. In the relational database model

a.

relationships are explicit

b.

the user perceives that files are linked using pointers

 

c.

data is represented on two-dimensional tables

d.

data is represented as a tree structure

                                           

 

  1. In the relational database model all of the following are true except

a.

data is presented to users as tables

b.

data can be extracted from specified rows from specified tables

c.

a new table can be built by joining two tables

d.

only one-to-many relationships can be supported

 

 

  1. In a relational database

a.

the user’s view of the physical database is the same as the physical database

b.

users perceive that they are manipulating a single table

c.

a virtual table exists in the form of rows and columns of a table stored on the disk

d.

a programming language (COBOL) is used to create a user’s view of the database

                                           

 

  1. The update anomaly in unnormalized databases

a.

occurs because of data redundancy

b.

complicates adding records to the database

c.

may result in the loss of important data

d.

often results in excessive record insertions

                                           

 

  1. The most serious problem with unnormalized databases is the

a.

update anomaly

b.

insertion anomaly

c.

deletion anomaly

d.

none of the above

                                           

 

  1. The deletion anomaly in unnormalized databases

a.

is easily detected by users

b.

may result in the loss of important data

c.

complicates adding records to the database

d.

requires the user to perform excessive updates

                                           

 

  1. Which statement is correct?

a.

in a normalized database, data about vendors occur in several locations

b.

the accountant is responsible for database normalization

c.

in a normalized database, deletion of a key record could result in the destruction of the audit trail

d.

connections between M:M tables are provided by a link table

 

 

  1. Which of the following is not a common form of conceptual database model?

a.

hierarchical

b.

network

c.

sequential

d.

relational

                                           

 

  1. Which of the following is a relational algebra function?

a.

restrict

b.

project

c.

join

d.

all are relational algebra functions

 

 

  1. Entities are

a.

nouns that are depicted by rectangles on an entity relationship diagram

b.

data that describe the characteristics of properties of resources

c.

associations among elements

d.

sets of data needed to make a decision

                                           

 

  1. A user view

a.

presents the physical arrangement of records in a database for a particular user

b.

is the logical abstract structure of the database

c.

specifies the relationship of data elements in the database

d.

defines how a particular user sees the database

 

 

  1. All of the following are advantages of a partitioned database except

a.

increased user control by having the data stored locally

b.

deadlocks are eliminated

c.

transaction processing response time is improved

d.

partitioning can reduce losses in case of disaster

                                           

 

  1. Each of the following is a relational algebra function except

a.

join

b.

project

c.

link

d.

restrict

                                           

 

  1. A table is in first normal form when it is

a.

free of repeating group data

b.

free of transitive dependencies

c.

free of partial dependencies

d.

free of update anomalies

e.

none of the above

                                           

 

  1. A table is in second normal form when it is

a.

free of repeating group data

b.

free of transitive dependencies

c.

free of partial dependencies

d.

free of insert anomalies

e.

none of the above

                                           

 

  1. A table is in third normal form when it is

a.

free of repeating group data

b.

free of transitive dependencies

c.

free of partial dependencies

d.

free of deletion anomalies

e.

none of the above

                                           

 

  1. Which statement is not true? Embedded audit modules

a.

can be turned on and off by the auditor.

b.

reduce operating efficiency.

c.

may lose their viability in an environment where programs are modified frequently.

d.

identify transactions to be analyzed using white box tests.

 

 

  1. Generalized audit software packages perform all of the following tasks except

a.

recalculate data fields

b.

compare files and identify differences

c.

stratify statistical samples

d.

analyze results and form opinions

 

 

 

  1. A transitive dependency
    1. is a database condition that is resolved through special monitoring software.

 

    1. is a name given to one of the three anomalies that result from unnormalized database tables.
    2. can exist only in a table with a composite primary key.
    3. cannot exist in tables that are normalized at the 2NF level.
    4. is none of the above.

 

 

SHORT ANSWER

 

 

  1. What are the two fundamental components of data structures?

 

 

 

 

  1. Give an advantage and a disadvantage of the sequential data structure

 

 

 

  1. What are the three physical components of a VSAM file?

 

 

 

 

  1. Give two limitations of the hierarchical database model?

 

 

 

 

 

  1. Comment on the following statement: “Legacy systems use flat file structures.”

 

 

 

  1. What is a pointer in a data file?

 

 

 

  1. Explain how a separate linking file works in a network model.

 

 

  1. Describe a specific data element, entity, and record type in the expenditure cycle.

 

 

 

 

  1. What is the relationship between a database table and a user view?

 

 

 

 

  1. How does the database approach solve the problem of data redundancy?

 

 

 

 

  1. Explain how linkages between relational tables are accomplished.

 

 

 

 

 

 

  1. Explain the basic results that come from the restrict, project, and join functions.

 

 

 

 

  1. Explain the purpose of an ER diagram in database design.

 

 

 

 

  1. Explain how to link tables in (1:1) association. Why may this be different in a (1:0,1) association?

 

 

 

 

  1. Why are the hierarchical and network models called navigational databases?

 

 

 

 

 

  1. What is view integration?

 

 

 

 

 

  1. How does the embedded audit module support the auditor?

 

 

 

  1. Outline some of the key advantages of GAS.

 

GAS allows auditors to access electronically coded data files of their clients, both simple and complex structures, and to perform various operations on their contents. GAS is popular for the following reasons:

 

 

 

 

 

 

  1. How can a poorly designed database result in unintentional loss of critical records?

 

 

 

 

  1. What is repeating group data?

 

  1. What is a partial dependency?

 

 

 

 

  1. What is a transitive dependency?

 

 

 

 

  1. What is the update anomaly?

 

 

 

 

 

  1. What is the insertion anomaly?

 

  1. When is a table in third normal form (3NF)?

 

 

 

 

 

 

 

ESSAY

 

  1. Contrast procedures for preparing backups in a sequential file environment and direct access file environment.

 

 

 

 

  1. Explain how a hashing structure works and why it is quicker than using an index. Give an example. If it so much faster, why isn't it used exclusively?

 

 

 

  1. Explain the following three types of pointers: physical address pointer, relative address pointer, and logical key pointer.

 

 

 

  1. Give three examples that illustrate how cardinality reflects an organization’s underlying business rules.

 

 

 

  1. Explain the three types of anomalies associated with database tables that have not been normalized.

 

 

 

 

  1. What are the key control implications of the absence of database normalization?

 

 

 

 

 

 

  1. What are the characteristics of a properly designed relational database table?

 

 

 

 

  1. What is an embedded audit module?

 

 

 

 

  1. Contrast embedded audit modules with generalized audit software.

 

 

 

 

  1. Contrast the navigational databases with relational databases. What is the primary advantage of the relational model?

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

15.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions