Information Technology - CPA Business Environment and Concepts (BEC)
Card 0 of 96
Which of the following best describes a hot site?
Which of the following best describes a hot site?
A hot site will have hardware that can be configured to be used for the processing needs of the client.
A hot site will have hardware that can be configured to be used for the processing needs of the client.
Compare your answer with the correct one above
In which of the following locations should a copy of the accounting system data backup of year end information be stored?
In which of the following locations should a copy of the accounting system data backup of year end information be stored?
The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.
The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.
Compare your answer with the correct one above
The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:
The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:
A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.
A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.
Compare your answer with the correct one above
Which of the following is the step where the intended recipient converts the ciphertext into plain text?
Which of the following is the step where the intended recipient converts the ciphertext into plain text?
This step is where the intended recipient converts the ciphertext into plain text.
This step is where the intended recipient converts the ciphertext into plain text.
Compare your answer with the correct one above
A(n) _______ relates to copying data items that have been altered since the previous data backup.
A(n) _______ relates to copying data items that have been altered since the previous data backup.
An incremental backup saves time by not having to duplicate data. A full backup would duplicate all saved data. The other terms are distractors.
An incremental backup saves time by not having to duplicate data. A full backup would duplicate all saved data. The other terms are distractors.
Compare your answer with the correct one above
An enterprise resource planning system is designed to:
An enterprise resource planning system is designed to:
ERP systems work to integrate data from all aspects of an organization's activities.
ERP systems work to integrate data from all aspects of an organization's activities.
Compare your answer with the correct one above
Which of the following factors has the greatest impact on the design of an effective management reporting system?
Which of the following factors has the greatest impact on the design of an effective management reporting system?
The types of decisions to be made have the greatest impact on the design of an effective management reporting system.
The types of decisions to be made have the greatest impact on the design of an effective management reporting system.
Compare your answer with the correct one above
Which of the following terms best describes a Decision Support System (DSS)?
Which of the following terms best describes a Decision Support System (DSS)?
A DSS is an interactive system in order to facilitate with the decision-making process.
A DSS is an interactive system in order to facilitate with the decision-making process.
Compare your answer with the correct one above
Which of the following types of control plans is particular to a specific process or subsystem rather than related to the timing of its occurrence?
Which of the following types of control plans is particular to a specific process or subsystem rather than related to the timing of its occurrence?
Application controls are written into the application and are specific to the particular process or subsystem.
Application controls are written into the application and are specific to the particular process or subsystem.
Compare your answer with the correct one above
A digital signature is used primarily to determine that a message is:
A digital signature is used primarily to determine that a message is:
A digital signature is a means of ensuring that the sender of a message is authentic.
A digital signature is a means of ensuring that the sender of a message is authentic.
Compare your answer with the correct one above
A(n) _______ requires a full backup of all available data, regardless of whether or not it was saved before.
A(n) _______ requires a full backup of all available data, regardless of whether or not it was saved before.
An incremental backup saves time by not having to duplicate data. A full backup would duplicate all saved data. The other terms are distractors.
An incremental backup saves time by not having to duplicate data. A full backup would duplicate all saved data. The other terms are distractors.
Compare your answer with the correct one above
Which organization created the COBIT framework?
Which organization created the COBIT framework?
The ISACA is the organization which created the COBIT framework.
The ISACA is the organization which created the COBIT framework.
Compare your answer with the correct one above
Per ISACA, beneficiaries of an implemented COBIT framework would include all of the following except:
Per ISACA, beneficiaries of an implemented COBIT framework would include all of the following except:
The beneficiaries of an implemented COBIT framework should be those with more of a stake in the operations of the company.
The beneficiaries of an implemented COBIT framework should be those with more of a stake in the operations of the company.
Compare your answer with the correct one above
According to the ISACA when creating the COBIT framework, which of the following is not an attribute of the framework?
According to the ISACA when creating the COBIT framework, which of the following is not an attribute of the framework?
For any implemented process, a guarantee is never an attribute as nothing can guarantee ethical compliance.
For any implemented process, a guarantee is never an attribute as nothing can guarantee ethical compliance.
Compare your answer with the correct one above
Which of the following is a person who enters data or uses the information processed by a system?
Which of the following is a person who enters data or uses the information processed by a system?
Users are any workers who enter data into a system or who use the information processed by the system. Users could be secretaries, administrators, accountants, auditors, CEOs, and so on.
Users are any workers who enter data into a system or who use the information processed by the system. Users could be secretaries, administrators, accountants, auditors, CEOs, and so on.
Compare your answer with the correct one above
Which of the following is a person who designs and/or writes programs to collect, process, store, transform and distribute the data and information that are entered by the end users?
Which of the following is a person who designs and/or writes programs to collect, process, store, transform and distribute the data and information that are entered by the end users?
A software developer designs and/or writes the systems and/or programs to collect, process, store, transform and distribute the data and info that are entered by the end users.
A software developer designs and/or writes the systems and/or programs to collect, process, store, transform and distribute the data and info that are entered by the end users.
Compare your answer with the correct one above
A service that allows customers to rent virtual servers and related services that can be used to develop and test new software applications is ____.
A service that allows customers to rent virtual servers and related services that can be used to develop and test new software applications is ____.
IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.
IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.
Compare your answer with the correct one above
What type of data processing system would be most appropriate for a company that is opening a new retail location?
What type of data processing system would be most appropriate for a company that is opening a new retail location?
A new retail location would be significantly improved with real time processing in inventory.
A new retail location would be significantly improved with real time processing in inventory.
Compare your answer with the correct one above
Which of the following can be discovered using a data mining process?
Which of the following can be discovered using a data mining process?
Data mining can be used to sort through data in order to discover previously unknown information.
Data mining can be used to sort through data in order to discover previously unknown information.
Compare your answer with the correct one above
Analysis of large and diverse amounts of data included in data warehouses is often referred to as:
Analysis of large and diverse amounts of data included in data warehouses is often referred to as:
This is the definition of the process of data mining.
This is the definition of the process of data mining.
Compare your answer with the correct one above