Send a link to your students to track their progress
115 Terms
1
New cards
a subset of a data warehouse is called a
data mart
2
New cards
a data warehouse may include
competitor information
3
New cards
american airlines may use business intelligence to
track cost of snacks
\ monitor the cost of its pilots and flight attendants
\ track the cost of its airplane fuel
\ monitor prices on competitive routes
4
New cards
the computer-based technique to accumulate and analyze data is called
business intelligence
5
New cards
the steps in business intelligence iclude
gather info, analyze data for patterns, make decisions
6
New cards
a digital dashboard tracks, in a user-friendly way
critical business processes
7
New cards
XBRL facilitates business reporting of
financial and non-financial info
8
New cards
the first person to propose using XML as a means to electronically deliver financial information was
charles hoffman
9
New cards
XBRL GL, or XBRL Global Ledger Taxonomy, is different from XBRL U.S. GAAP because it facilitiates
efficient communication within a firm
10
New cards
the stated advantage of XBRL GL do not include
scalability
11
New cards
what is the mechanism called that firms may use to track their marketing efforts
digital dashboard
12
New cards
XBRL assurance might include all but which of the following
the XBRL tagging is accurate and complete
13
New cards
the XBRL style sheet is made in conformance with which standardized language
XSL
14
New cards
Which body mandated that operating firms in its jurisdiction submit their financial reports using XBRL
SEC
15
New cards
which technique or tool is used to analyze data for business intelligence purposes
data mining
16
New cards
big data is often described by the 4 V’s, or
volume, velocity, veracity, and variety
17
New cards
according to estimates considered in the chapter, up to what percentage of a data analyst’s time is spent cleaning (or scrubbing) the data to be ready for analysis
90 percent
18
New cards
the acronym ETL, in the process of readying data for use in data analysis refers to what three words
extract, transform, load
19
New cards
which term is used to describe the science of examining raw data, removing excess noise from the dataset, and organizing the data with the purpose of drawing conclusions for decision making
data analytics
20
New cards
ADS is a standard format for data files and fields typically needed to support an external audit in a given financial business process area that was developed by the AICPA. the acronym ADS stands for what three words
Audit Data Standards
21
New cards
which type of question does prescriptive analysis address
what should we do based on what we expect to happen
22
New cards
which type of question does descriptive analysis address
what happened
23
New cards
which type of analysis addresses questions of ‘why did it happen’
diagnostic analysis
24
New cards
what type of analysis would address the question of whether a customer will ultimately pay if credit is granted?
predictive analysis
25
New cards
if we wanted to know what grade we needed to get on a final in this class based on our expected performance before the final, we would call that
prescriptive analysis
26
New cards
which of the following best describes a data visualization
a graphical representation that presents information to decision makers
27
New cards
which of the following is not a basic activity for data visualization
documenting the business processes that generate data
28
New cards
which of the following is an important consideration in designing a data visualization
choosing the right chart
\ using explanatory titles
\ using color and size to draw attention to key insights
\ defining chart elements clearly
29
New cards
which of the following charts is used to show trend over time
line charts
30
New cards
which of the following is not part of common steps in using a data analysis tool
deliver the visualization to the decision maker
31
New cards
which of the following is not a characteristic of an excel table
includes charts
32
New cards
which of the following is true about excel tables
they are created from rectangular data ranges
\ the user can add a totals row
\ the header includes filter buttons
\ the table is automatically formatted
33
New cards
which of the following is a characteristic of a pivot table
it summarizes data in a range, table, or external data source
\ it can include multidimensional summaries by designating row and column categories
\ users can format the numbers in the values field
\ users can choose subtotals and grand totals
34
New cards
which of the following is not true about a pivot table
users must sum the values in the pivot table
35
New cards
tableau can connect all these file types except which of the following
microsoft power BI
36
New cards
which of the following is least likely to be a dimension field in tableau
total cost
37
New cards
which of the following is least likely to be a measure field in tableau
segment
38
New cards
which of the following best describes the purpose of the show me feature in tableau
helps the user select the best chart to display the selected measures and dimensions
39
New cards
which of these least describes the features of a tableau dashboard
presents a story of points in the analysis
40
New cards
which of these is not a power BI view
visualization view
41
New cards
ben goes to his bank to wire transfer $1,000 to his sister jennifer. the role of the bank in this transaction is best described as
middlemen
42
New cards
which of the following statements is true
smart contract was introduced in ethereum
43
New cards
which feature cannot be found in Bitcoin
double spend
44
New cards
in the Ethereum network
mining of Ether occurs at a constant rate
45
New cards
a selected set of organizations may run a blockchain node separately for keeping the transaction records. administrators from the organizations establish the access rights and permissions for each participant. this type of blockchain is often called
consortium blockchain
46
New cards
which of the following statements is false
because a distributed ledger exists in a blockchain network, a computer consisting of all transaction records may crash and cause the syncing issues in the block chain network
47
New cards
which of the following statements is false
hyperledger is a public blockchain
48
New cards
which of the following statements is false
bitcoin uses smart contract to specify the business rules
49
New cards
when we refer to smart contract in blockchain, we mean
a piece of software code that can be executed or triggered by business activities
50
New cards
which of the following is created mainly for cryptocurrency application
bitcoin
51
New cards
what information does a block in the bitcoin network contain
the sender
\ the receiver
\ the quantity of bitcoins to transfer
52
New cards
what is a requirement of the proof of authority algorithm
a few members have known identities
53
New cards
which of the following is not true with respect to artificial intelligence
AI began in the 1990s
54
New cards
which of the following best describes the difference between artificial intelligence and machine learning
machine learning is a subset of AI
55
New cards
which of the following best describes machine learning
machine learning is a technique where a software model is trained using data
56
New cards
which of the following is not part of the virtuous cycle of machine learning
model
57
New cards
which of the following best describes artificial neural networks
neural networks consist of inputs, neurons or nodes, and outputs
58
New cards
which of the following best describes deep learning
deep learning involves complex, multilayer neural networks
59
New cards
which of the following is not directly related to one of the five questions that machine learning/AI is best suited to answer
which business strategy will be most successful
60
New cards
which of the following best describes supervised learning
the training data contain input-output pairs
61
New cards
which of the following best describes semi-supervised learning
the training data contain some missing labels or incomplete data.
62
New cards
which of the following best describes reinforcement learning
the model learns by trial-and-error
63
New cards
which of the following best describes unsupervised learning
the training data only include input value
64
New cards
which of the following best describes a confusion matrix
it is a table summarizing the prediction results
65
New cards
if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the precision ratio
0\.92
66
New cards
if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the recall ratio
0\.88
67
New cards
if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the accuracy ratio
0\.98
68
New cards
if a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5 FP, what is the precision ratio
0\.83
69
New cards
if a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5 FP, what is the recall ratio
0\.83
70
New cards
if a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5 FP, what is the accuracy ratio
0\.99
71
New cards
based on SOX, which of the following sections is about internal controls
404
72
New cards
SOX requires companies to use COSO or COSO ERM as the framework in evaluating internal controls
false
73
New cards
controls that are designed to prevent, detect, or correct errors in transactions as they are processed through a specific subsystem are referred to as
application controls
74
New cards
which of the following is not a component in the COSO 2013 internal control framework
risk assessment
75
New cards
prenumbering of source documents helps to verify that
all transactions have been recorded because the numerical sequence serves as a control
76
New cards
a field check is a(n)
preventive control
77
New cards
which is not an example of a batch total
exception total
78
New cards
backup is a preventive control
false
79
New cards
the computer sums the first four digits of a customer number to calculate the value of the fifth digit and then compares that calculation to the number typed during data entry. this is an example of a
check digit verification
80
New cards
which of the following statements is correct
regarding IT control and governance, the COBIT framework is most commonly adopted by companies in the United States
81
New cards
based on SOX, which of the following section is about corporate responsibility for financial reports
302
82
New cards
based on COSO 2013, which of the following statements is not correct
the responsibility of monitoring the effectiveness of internal controls belongs to the internal audit group
83
New cards
which of the following is not one of the five essential components in the COSO 2013 framework
control assessment
84
New cards
access control to ensure only authorized personnel have access to a firm’s network is a
general control
85
New cards
the ISO 27000 series are a framework for
information security managment
86
New cards
segregation of duty is a
preventive control
87
New cards
the responsibility of enterprise risk management belongs to
management
88
New cards
most input controls are designed to assess one field only. which of the following input controls will need to examine a record to determine the control is effective or not
completeness check
89
New cards
which of the following is a correct statement about COBIT 2019 framework
it is designed for information and technology governance and management
90
New cards
which of the following is a correct statement about COSO ERM 2017 framework
it enhances alignment among strategy setting, decision making, and performance through enterprise risk management
91
New cards
authentication is the process by which the
system verifies the identity of the user
92
New cards
data processing activities may be classified in term of three stages or processes: input, processing, output. an activity that is not normally associated with the input stage is
reporting
93
New cards
to ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required decrypt the receive message
only private
94
New cards
to authenticate the message sender in an asymmetric-key encryption system, which of the following keys is required to decrypt the received message
sender’s public key
95
New cards
to ensure the data sent over the internet are protected, which of the following keys is required to encrypt the data (before transmission) using an asymmetric-key encryption method
receiver’s public key
96
New cards
which of the following groups/laws was the earliest to encourage auditors to incorporate fraud examination into audit programs
SAS no 99
97
New cards
incentive to commit fraud usually include all the following, except
inadequate segregation of duties
98
New cards
an information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. what is the director most likely preparing
disaster recovery plan
99
New cards
a message digest is the result of hashing. which of the following statements about the hashing process is true
hashing is the best approach to make sure that two files are identical
100
New cards
which of the following vulnerabilities would create the most serious risk to a firm