OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 12, 2024

Question 21

Which description is associated with a data dictionary?

A) A record of all transactions for the audit trail
B) A collection of customer details
C) A description of every data element in the database
D) A list of vendors and their addresses

Answer: C) A description of every data element in the database

Explanation: A data dictionary describes each data element stored in a database and its characteristics.

Question 22

What type of file allows records to be accessed via an index?

A) Archive file
B) Sequential file
C) Indexed file
D) Transaction file

Answer: C) Indexed file

Explanation: Indexed files allow for fast access to records using an index rather than reading through all records sequentially.

Question 23

Which anomaly is caused by data redundancy in an unnormalized table?

A) Update anomaly
B) Sequence anomaly
C) Transaction anomaly
D) Trial balance anomaly

Answer: A) Update anomaly

Explanation: Update anomalies occur when changes to redundant data in an unnormalized table are not consistently applied across all records.

Question 24

What is an insertion anomaly?

A) An error in payroll records
B) The unintentional insertion of incorrect data into a table
C) An incorrect balance in the general ledger
D) A discrepancy in inventory counts

Answer: B) The unintentional insertion of incorrect data into a table

Explanation: Insertion anomalies occur when incorrect or incomplete data is unintentionally inserted into a database.

Question 25

What system is more than an elaborate transaction processing system and also functions as a decision support tool?

A) General ledger system
B) Payroll system
C) Enterprise resource planning (ERP) system
D) Accounts payable system

Answer: C) Enterprise resource planning (ERP) system

Explanation: ERP systems combine transactional processing with decision support, helping businesses manage multiple processes.

Question 26

What is a characteristic of an enterprise resource planning (ERP) system’s core applications?

A) They support payroll processing
B) They facilitate internal communications across departments
C) They allow unauthorized access to customer data
D) They generate vendor reports automatically

Answer: B) They facilitate internal communications across departments

Explanation: ERP core applications allow for communication and data sharing across various business departments.

Question 27

What does the TRUSTe seal indicate about an organization’s online practices?

A) The organization is certified to handle online payments
B) The organization agrees to TRUSTe privacy policies and responds to customer complaints
C) The organization ensures transaction security only
D) The organization is exempt from privacy audits

Answer: B) The organization agrees to TRUSTe privacy policies and responds to customer complaints

Explanation: TRUSTe-certified organizations follow specific privacy policies and address customer complaints regarding data privacy.

Question 28

What type of seal does Verisign, Inc. provide for online security?

A) Payment processing certification
B) ICSA security certification
C) TRUSTe privacy seal
D) Security assurance for transmitted data

Answer: D) Security assurance for transmitted data

Explanation: Verisign provides security assurance for the secure transmission of data online, particularly for websites.

Question 29

Which organization promotes ethical business practices through self-regulation and provides an online certification?

A) TRUSTe
B) Better Business Bureau (BBB)
C) ICSA
D) Verisign

Answer: B) Better Business Bureau (BBB)

Explanation: The Better Business Bureau (BBB) promotes ethical business practices and provides an online certification for businesses that comply with its standards.

Question 30

What control environment change affects procurement and cash disbursements by electronic commerce?

A) Transactions are no longer subject to audits
B) Transactions are performed automatically in real time
C) Employees are required to sign off on every transaction
D) Only vendors control transaction records

Answer: B) Transactions are performed automatically in real time

Explanation: The electronic commerce environment allows transactions to be conducted automatically and in real time, changing the control dynamics for procurement and disbursements.

Question 31

Why is effective communication between systems lacking in traditional, non-ERP models?

A) There is no need for systems integration
B) Systems are not designed to communicate with each other
C) Systems rely on manual processes
D) Systems are not connected to external vendors

Answer: B) Systems are not designed to communicate with each other

Explanation: In traditional, non-ERP models, systems are often designed independently, leading to fragmented communication between them.

Question 32

What kind of anomalies do improperly normalized tables create?

A) Database corruption
B) Sequence errors
C) Data redundancies
D) Reconciliation errors

Answer: C) Data redundancies

Explanation: Improperly normalized tables result in data redundancies, which can cause anomalies such as insertion, update, and deletion issues.

Question 33

Which access point is most commonly used to commit computer fraud?

A) Network server
B) Data collection point
C) Operating system
D) Database

Answer: B) Data collection point

Explanation: Fraud often occurs at the data collection point where data entry errors or unauthorized data modifications can be made.

Question 34

Which test verifies that credit checks and accounts payable three-way matches are performed by an application?

A) Completeness test
B) Accuracy test
C) Validity test
D) Redundancy test

Answer: C) Validity test

Explanation: Validity tests ensure that applications conform to set tolerances, such as performing credit checks and three-way matches for accounts payable.

Question 35

What is the function of a completeness test?

A) To check for redundant data
B) To ensure that all required data is present
C) To verify access credentials
D) To test the accuracy of payroll data

Answer: B) To ensure that all required data is present

Explanation: Completeness tests ensure that there are no missing data fields or records in a given process or batch.

Question 36

Which outcome can occur if systems development is not separated from the database administrator (DBA)?

A) More accurate reporting
B) Increased system efficiency
C) Deficient database access controls
D) Fewer compliance requirements

Answer: C) Deficient database access controls

Explanation: Failing to separate systems development from the database administrator can lead to weak access controls and potential security risks.

Question 37

What is the purpose of audit trail tests?

A) To test employee records
B) To ensure applications create an adequate audit trail
C) To update transaction files
D) To generate payroll reports

Answer: B) To ensure applications create an adequate audit trail

Explanation: Audit trail tests check that all transactions are properly recorded and traceable through the system.

Question 38

What does the black box approach in auditing involve?

A) Testing the internal logic of an application
B) Analyzing flowcharts and interviewing personnel without accessing internal application details
C) Creating test files for audit verification
D) Generating reports from transaction logs

Answer: B) Analyzing flowcharts and interviewing personnel without accessing internal application details

Explanation: The black box approach in auditing allows auditors to evaluate an application’s functionality without needing to understand its internal code.

Question 39

Why might an organization choose to implement preventive controls over detective controls?

A) Preventive controls are cheaper to maintain
B) Preventive controls reduce the likelihood of undesirable events
C) Detective controls offer limited protection
D) Preventive controls are easier to implement

Answer: B) Preventive controls reduce the likelihood of undesirable events

Explanation: Preventive controls are designed to stop undesirable events from occurring, making them more effective than detective controls.

Question 40

What is a characteristic of a group code?

A) It represents complex items involving multiple fields of related data
B) It is used to sequence transactions in a ledger
C) It tracks physical assets in a system
D) It is a code used only for customer identification

Answer: A) It represents complex items involving multiple fields of related data

Explanation: Group codes consist of multiple zones or fields, each representing different attributes of a complex item or event.

Complete the Captcha to view next question set.

Tags

Prev Post
WGU D217 Practice Exam Questions – Set 2 – Part 1
Next Post
WGU D217 Practice Exam Questions – Set 2 – Part 3