Answered step by step
Verified Expert Solution
Question
1 Approved Answer
13) 13) Data transformation occurs when data is A) stored. C) analyzed. B) gathered. D) All of the above. 14) 14) Which type of chart
13) 13) Data transformation occurs when data is A) stored. C) analyzed. B) gathered. D) All of the above. 14) 14) Which type of chart would be best for representing the distribution of a data item? A) Bullet chart. B) Heatmap. C) Boxplot. D) Area chart. 15) 15) Which type of chart would be best for representing the correlation between two items? A) Bullet chart B) Heatmap. C) Boxplot. D) Area chart. 16) 16) The controller of a company performs an analysis to examine the hypothesis that if customers purchase a greater variety of items, they are less likely to default on their payments. The controller likely computed what type of analytic? A) Descriptive. B) Diagnostic C) Predictive. D) Prescriptive. 17) 17) A company visualizes the purchasing behavior of all of its different customer segments. What is the purpose of this type of viz? A) Comparison B) Correlation C) Distribution D) Trend Evaluation 18) 18) What type of data analytic addresses the question "what is likely to happen in the future?" A) Descriptive. B) Diagnostic. C) Predictive. D) Prescriptive. 19) 19) Terrorists are an example of a(n)- threat A) unintentional acts B) natural and political disasters C) software errors and equipment malfunctions D) intentional acts (computer crimes) 20) 20) Fraud perpetrators are often referred to as A) white-collar criminals. C) blue-collar criminals. B) outlaws. D) bad actors. 21) 21) "Cooking the books" is typically accomplished by all the following except A) accelerating recognition of revenue. B) inflating accounts payable. C) overstating inventory. D) delaying recording of expenses. 22) 22) Which of the following is the greatest risk to information systems and causes the greatest dollar losses? A) Dishonest employees B) Computer crime C) Human errors and omissions D) Physical threats such as natural disasters because it is an effective way to transmit information and receive 23) 23) Terrorists often use orders. A) packet sniffers B) time bombs C) trap doors D) steganography 24) 24) A fraud technique that uses a back door into a system that bypasses normal system controls is called the technique. A) Trojan horse B) man-in-the-middle C) salami D) trap door 25) 25) What is a denial of service attack? A) It is an attacked when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider's e-mail server. B) It is an attack when the perpetrator is inserting malicious query in input such that it is passed to and executed by an application program. C) It is an attack when the perpetrator is inputting so much data that the input buffer overflows. The overflow contains code that takes control of the company's computer. D) It is an attack when the perpetrator uses software to guess company's addresses, send employees blank e-mails, and add unreturned messages to spammer e-mail list. 26) 26) Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by A) Internet auction fraud. B) skimming. C) cyber extortion. D) scavenging 27) 27) Which of the following duties could be performed by the same individual without violating segregation of duties controls? A) Approving accounting software change requests and testing production scheduling software changes. B) Approving software changes and implementing the upgraded software. C) Managing accounts payable function and revising code for accounting software to more efficiently process discount due dates on vendor invoices. D) Programming new code for accounting software and testing accounting software upgrades. 28) 28) Which type of control is associated with making sure an organization's control environment is stable? A) application B) preventive C) general D) detective 29) 29) A(n) helps employees understand management's vision. It communicates company core values and inspires employees to live by those values. A) boundary system B) diagnostic control system C) interactive control system D) belief system 30) 30) The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as A) availability. B) security. C) privacy D) integrity. 31) 31) In recent years, many of the attacks carried out by hackers have relied on this type of vulnerability in computer software. A) URL injection. B) Code mastication. C) Buffer overflow. D) Boot sector corruption. 32) 32) Residents in Berryhill received an e-mail stating that there is an armed robber on the loose. The e-mail claimed to be from the Berryhill police department, but it wasn't. Computer forensic experts later determined that the e-mail was sent from a computer lab in the Berryhill's public library. The police were then able to uniquely identify the computer that was used by means of its network interface card's address. Security cameras later help the police to reveal the identity of the individual responsible for the hoax. A) MAC B) IDS C) DMZ D) TCP/IP
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started