CHAPTER 8 Flashcards

(65 cards)

1
Q

Most audit testing occurs in the ______________ phase of the audit.

A

Substantive-testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Uses of Substantive Tests [DDCS]

A
  1. Determining the correct value of inventory
  2. Determining the accuracay of prepayments and accurals.
  3. Confirming accounts receivable with customers.
  4. Searching for unrecorded liabilities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 General Categories of CAATTS [OA]

A
  1. Organization
  2. Access Method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to the way the records are PHYSICALLY ARRANGED on the secondary storage device. This may be either sequential or random.

A

Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is the technique used to LOCATE records and to NAVIGATE through the database or file

A

Access Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

describes an environment in which individual data files are NOT INTEGRATED with other files.

A

Flat-file Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

typically called the SEQUENTIAL access method. All records i the file lie in contiquous storage spaces in a specified sequence (ascending or descending) arranged by their primary key.

A

Sequential Structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is so named because, in addition to the actual data file, there exists a separate INDEX that is itself a file or record addresses.

A

Indexed Structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual Storage Access Method (VSAM)

A

• is used for very large files that require routine batch
processing and a moderate degree of individual
record processing.

• is used for files that often occupy several cylinders
of contiguous storage on a disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VSAM File - 3 Physical Components [IPO]

A
  1. Indexes
  2. Prime Data Storage
  3. Overflow Area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

employs an ALGORITHM that converts the primary key of a record directly into a storage address.

A

Hashing Structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Principal advantage of hashing is

A

access speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Two significant disadvantages of hashing

A

(1) Does not use storage space efficiently

(2) Different record keys may generate the
same (or similar) residual, which translates
into the same address. This is called a
collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Different record keys may generate the
same (or similar) residual, which translates
into the same address.

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is used to create a LINKED LIST file. This approach stores in a field of one record the address (pointer) of a related record.

A

Pointer Structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

may also be used to LINK records between files.

A

Pointers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

3 Types of Pointers [PRL]

A
  1. Physical Address Pointer
  2. Relative Address Pointer
  3. Logical Key Pointer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

contains the ACTUAL disk storage location recorded by the disk controller. It bear no logical relationship to the records they identify

A

Physical Address Pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

contains the RELATIVE position of a record in the file

A

Relative Address Pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

contains the PRIMARY KEY of the related record

A

Logical Key Pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

are BASED on the INDEXED SEQUENTIAL file structure

A

Relational Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MULTIPLE indexes can be used to create a cross-reference which allows even more FLEXIBLE access to data

A

Inverted List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

E. F. Codd originally proposed the principles of the relational model in the late 1960s

A

Relational Database Theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A System is Relational if it:

A
  1. Represents data in the form of two-dimensional
    tables.
  2. Supports the relational algebra functions of
    restrict, project, and join.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
3 Algebra Functions [RPJ]
1. Restrict 2. Project 3. Join
26
extracts specified ROWS from a specified table
Restrict
27
extracts specified ATTRIBUTES (COLUMNS) from a table to create a virtual table
Project
28
Builds a NEW physical TABLE from two tables consisting of all concentrated pairs of rows, from each table
Join
29
is anything about which the organization wishes to CAPTURE DATA. It may physical, such as inventories, customers, or employees.
Entity
30
is the BLUEPRINT for ultimately creating the physical database
Data Model
31
The GRAPHICAL representation used to DEPICT the model
Entity Relationship Diagram
32
used to describe the number of INSTANCES or records that pertain to a specific entity
Occurrence
33
are the data elements that DEFINE an entity
Attributes
34
The labeled line CONNECTING TWO ENTITIES in a data model describes the nature of association
Associations
35
is the DEGREE of association between two entities. It describes the number of possible occurrences in one table that are associated witha single occurrence in a related table
Cardinalities
36
4 Basic Forms of Cardinalites [ZOZO]
1. Zero or One (0,1) 2. One and Only One (1,1) 3. Zero or Many (0,M) 4. One or Many (1,M)
37
are constructed from the data model with each entity in the model being transformed into a SEPARATE PHYSICAL table.
Physical Database tables
38
set of data that a particular USER SEES.
User view
39
Such tables that exhibit NEGATIVE operational symptoms
Anomalies
40
3 Kinds of Anomalies [UID]
1. Update Anomaly 2. Insertion Anomaly 3. Deletion Anomaly
41
results from data REDUNDANCY in an unnormalized table
Update Anomaly
42
data CANNOT be ADDED to the table
Insertion Anomaly
43
involves the unintentional DELETION of data from a table
Deletion Anomaly
44
3 Structural Problems within Tables called Dependencies [RPT]
1. Repeating Groups 2. Partial Dependencies 3. Transitive Dependencies
45
involves identifying and REMOVING structural dependencies from the table(s) under review
Normalization Process
46
is a TECHNICAL MATTER that is usually the responsibility of systems professionals
Database Normalization
47
6 Phases of Database Design / View Modeling : [ ICANCP]
1. Identify entities 2. Construct a data model showing entity associations 3. Add primary keys and attributes to the model 4. Normalize the data model and add foreign keys 5. Construct the physical database 6. Prepare he user views
48
begins by IDENTIFYING the primmary entities of the business function in question
Identify entities
49
Determine the associations between entities and document them with an ER diagram
Construct a data model showing entity associations
50
is a user view derived from the INVENTORY and supplier entities
Inventory Status Report
51
a user program where SQL commands will be saved
Query
52
combining the data needs of all users into a single SCHEMA or enterprise-wide view
View Integration
53
also known as continuous auditing. It is to identify important transactions while they are being processed and extract copies of them in real time
Embedded Audit Module (EAM)
54
2 Diadvantages of EAMs (OV)
1. Operational Efficiency 2. Verifying EAM Integrity
55
The presence of an audit module within the host application may create significant overhead
Operational Efficiency
56
The EAM approach may not be a viable audit technique in environments with a high level of program maintenance
Verifying EAm Integrity
57
is the MOST WIDELY USED CAATT for IS auditing. It allows auditors to access electronically coded data files and perform various operations on their cotents
Generalized Audit Software (GAS)
58
was designed as a META-LANGUAGE for auditors to access data stored in various digital formats and to test them comprehensively.
Audit Command Language (ACL)
59
ACL's feature that has the ability to READ DATA stores in most forms
Data definition
60
allows the auditor to DEFINE important characteristics of the source file
Data Definition Screen
61
is simply a way of LOOKING at data in a file. Auditors seldom need to use all the data contained in a file
View
62
are EXPRESSIONS that search for records that meet the filter criteria
Filters
63
allows the auditor to use logical operators such as AND, OR, <, >, NOT and others to define and test codnitions of any complexity and to process only those records that match specific conditions.
Expression Builder
64
allows the auditor to view the distribution of records that fall into specified strata.
ACL's Stratification Feature
65
2 Sampling Methods for Stratical Analysis : (RM)
1. Record Sampling 2. Monetary Unit Sampling (MUS)