as out of 5 points Question 1 [CLO-11 Your car insurance company asks you to install a tracking device in your vehicle to record your driving habits. Data from this device is used to adjust your premium. The source of this data is: Os out of spots Question 2 [CLO-1) Hadoop is: 0.5 out of Sports Question 3 [CLO-1 Data analysos performed by management accountants typically include all of the following except out of spot Question 4 ICLO-2] Which of the following is not true regarding selecting a new AlS? Our sp Questions [CLO-2] Which of the following is true regarding ERP costs? FOS Question 6 0.5 out of 5 points [CLO-2] ERPs often require BPR (Business Process Re-engineering) because: Question 7 0 out of 0.5 points [CLO-2) In conducting a feasibility study, operational feasibility refers to whether o out of 5 points Question 8 ICLO-2Which of the following is not a general objective when designing an AIS? Os out of points Question 9 [CLO-2] The most time consuming path in a PERT network is called the s out of 5 por Question 10 [CLO-2] Which type of survey instrument for system study and analysis best allows employees to answer in their own words: Question 11 0.5 out of 5 points (CLO-31 One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is the intent to illegally obtain information or tangible property through the use of computers. Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system? 05 out of 5 points Question 12 [CLO-3] Some firms and governmental organizations use ethical hackers to help find any vulnerabilities that could be exploited by a malicious hacker. Which of the following is also used to refer to ethical hacking? 0.5 out of 5 point Question 13 ICLO-3) it is important to be able to recognize the symptoms of employee fraud. In practice, which of the following might bo the best clue that fraud might be occurring? out of 0.5 points Question 14 CLO-3] The term "smishing" means Question 15 as out of 0.5 points CLO-3) From the standpoint of computer fraud, which type of controls would probably be of highest importance? Question 16 out of sports [CLO-3] An expense report was prepared by a company's cost center. One executive questioned one of the amounts and asked for the source documents which support the total. Data processing was not able to routinely do so. The best control procedure would be: touto pont Question 17 [CLO11 Business analyses typically answer three basic questions . What happened? . What might happen? What should we do? Required Explain the descriptive and prescriptive analytics in respect of answering the above relevant questions. Give an example of each Question 18 o [CLO-3] List down briefly any two techniques used to safeguard accounting information system to protect from computer viruses. What controls can be implemented in this regards? Question 19 ICLO-3] For the following terms find the correct definition below and match these with the relevant term Question 19 2 out of 2 points [CLO-31 For the following terms find the correct definition below and match these with the relevant term. Question Scalable mashups bolt-ons business application suites back-office enterprise application integration (EAI) PRM software ERP 2 out of ports Question 20 [CLO-3] For the following terms find the correct definition below and match these with the relevant term. Question ERP 2 out of 2 points Question 20 [CLO-3) For the following terms find the correct definition below and match these with the relevant term. Question disaster recovery cold site hot site eavesdropping control output controls input controls processing controls data encryption 4 out of 4 ports Question 21 as manual forn Rustions. Each choice data encryption Question 21 4 out of 4 points Fill in the blank from the choices provided. Note that there are total 15 choices provided for only 8 questions. Each choice option is used only once and 7 choice options are not used at all. Note: You can simply provided answers like 1-X or 2-Y or 3-Z etc. whece 1 indicates the question number and X indicates the choice option QUESTION NUMBER 1-Stealing personal information from trash cans is called as 2. Observing users as they enter passwords or other personal information to a computer is called as 3- The act of altering data that are entered into, or used by a computer is called as 4. A software program specifically designed for computer forensic investigations is called as is a scaled-down, experimental version of a nonexistent information system that a design team can develop cheaply and quickly for user-evaluation purposes 6- - is useful for both scheduling and tracking the activities of systems implementation projects because actual progress can be contrasted with the planned progress. 7. is the process of extracting data from similar or disparate data sources, harmonizing the data into a common format, and importing the data into a final target data store, 8. Extent to which data can be trusted for insights is called as 5- 65 bol u 7- - is the process of extracting data from similar or disparate data sources, harmonizing the data into a common format, and importing the data into a final target data store. 8- Extent to which data can be trusted for insights is called as CHOICE OPTIONS A-ETL B- PERT C-shoulder surfing D-prototype E-cookie F-Gantt chart G- Hadoop H. velocity I-data, diddling J- firewall K-dumpster diving L-veracity M-scope creep N salami technique O- EnCase