Chapter 8: Data Structures and CAATTs for Data Extraction Flashcards

1
Q

Data structures have two fundamental components:

A

organization and access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______________ refers to the way records are physically arranged on the secondary storage device. This may be either sequential or random.

A

Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The _______________ is the technique used to locate records and to navigate through the database or
file.

A

access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Under this arrangement, for example, the record with key value 1875 is placed in the physical storage space immediately following the record with key value 1874. Thus, all records in the file lie in contiguous storage spaces in a specified sequence (ascending or descending) arranged by their primary key.

A

sequential structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An ________________ is so named because, in addition to the actual data file, there exists a separate index that is itself a file of record addresses. This index contains the numeric
value of the physical disk storage location (cylinder, surface, and record block) for each record in the associated data file.

A

indexed structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Records in an _________________ are dispersed throughout a disk without regard for their physical proximity to other related records

A

indexed random file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ___________________________structure is used for very large files that require routine batch processing and a moderate degree of individual record processing. For instance, the customer file of a public utility company will be processed in batch mode for billing purposes and directly accessed in response to individual customer
queries

A

Virtual Storage access method (VSAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A VSAM file has three physical components:

A

the indexes
the prime data storage area
the overflow area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ______________ employs an algorithm that converts the primary key of a record directly into a storage address.

A

hashing structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The principal advantage of hashing is _____________________.

A

access speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________________ is used to create a linked-list file.

A

pointer structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A ___________________ contains the actual disk
storage location (cylinder, surface, and record number) needed by the disk controller. This physical address allows the system to access the record directly without obtaining
further information. This method has the advantage of speed, since it does not need to be manipulated further to determine a record’s location.

A

physical address pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _____________ contains the relative position of a record in the file. For
example, the pointer could specify the 135th record in the file. This must be further manipulated to convert it to the actual physical address. The conversion software calculates this by using the physical address of the beginning of the file, the length of each record
in the file, and the relative address of the record being sought.

A

relative address pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _________________ contains the primary key of the related record. This key value is then converted into the record’s physical address by a hashing algorithm.

A

logical key pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This structure uses an index in conjunction with a sequential file organization. It facilitates both direct access to individual records and batch processing of the entire file. Multiple indexes can be used to create a cross-reference, called an inverted list, which allows even more flexible access to data.

A

indexed sequential file structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An _______ is anything about which the organization wishes to capture data. These may be physical, such as inventories, customers, or employees. They may also be conceptual, such as sales (to a customer), accounts receivable (AR), or accounts payable (AP).

A

entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The term _____________ is used to describe the number of instances or records that pertain to a specific entity.

A

occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

______________ are the data elements that define an entity.

A

Attributes

19
Q

The labeled line connecting two entities in a data model describes the nature of the
___________ between them.

A

association

20
Q

_____________ is the degree of association between two entities

A

Cardinality

21
Q

__________ describes the number of possible occurrences in one table that are associated with a single occurrence in a related table.

A

cardinality

22
Q

Four basic forms of cardinality are
possible:

A

zero or one (0,1)
one and only one (1,1)
zero or many (0,M)
one or many (1,M).

23
Q

The value of at least one attribute in each occurrence (row) must be unique. This attribute is the ______________________.

A

primary key

24
Q

Logically related tables need to be physically connected to achieve the associations described in the data model using _________________.

A

foreign keys

25
Q

A ____________ is the set of data that a particular user sees. Examples of this are computer screens for entering or viewing data, management reports, or source documents such as an invoice.

A

user view

26
Q

Improperly normalized tables can cause DBMS processing problems that restrict, or even deny, users access to the information they
need. Such tables exhibit negative operational symptoms called _________________.

A

anomalies

27
Q

To be free of anomalies, tables must be normalized to the _______________________.

A

third normal form (3NF) level.

28
Q

The _____________ results from data redundancy in an unnormalized table.

A

update anomaly

29
Q

The _______________ involves the unintentional deletion of data
from a table.

A

deletion anomaly

30
Q

_________________ is a component of a much larger systems development process that involves extensive analysis of user needs.

A

Database design

31
Q

Combining the data needs of all users into a single schema or enterprise-wide view is called _____________________.

A

view integration

32
Q

The objective of the ____________________, also known as continuous auditing, is to identify important transactions while they are being processed and extract copies of them in real time.

A

embedded audit module (EAM),

33
Q

An ____________ is a specially programmed module embedded in a host application to capture predetermined transaction types for subsequent analysis.

A

embedded audit module (EAM)

34
Q

Disadvantages of EAMs

A
  1. Operational Efficiency - EAMs decrease operational performance
  2. Verifying EAM Integrity - EAM may not be a viable audit technique in environments with a high level of program maintenance
35
Q

___________________ is the most widely used CAATT for IS auditing. It allows auditors to access electronically coded data files and perform various operations
on their contents.

A

Generalized audit software (GAS)

36
Q

The widespread popularity of GAS is due to four factors:

A

(1) GAS languages are easy to use and require little computer background on the part of the auditor;
(2) many GAS products can be used on both mainframe and PC systems;
(3) auditors can perform their tests independent of the client’s computer service staff; and
(4) GAS can be used to audit the data stored in most file structures and formats.

37
Q

_______________________ was designed as a meta-language for auditors to access data stored in various digital formats and to test them comprehensively.

A

ACL (audit command language)

38
Q

One of ACL’s strengths is the ability to read data stored in most formats.
ACL uses the __________________ for this purpose

A

data definition feature

39
Q

______________ are expressions that search for records that meet the filter criteria.

A

Filters

40
Q

________________________ allows the auditor to use logical operators such as AND, OR, , , NOT and others to define and test conditions of any complexity and to process only those records that match specific conditions

A

ACL’s expression builder

41
Q

_____________________________ feature allows the auditor to view the distribution of records that fall into specified strata.

A

ACL’s stratification

42
Q

Data can be stratified on any numeric field such as sales price, unitcost, quantity sold, and so on. The data are summarized and classified by strata, which can be equal in size (called ___________) or vary in size (called ___________).

A

intervals, free

43
Q

ACL offers many sampling methods for statistical analysis. Two of the most frequently used are ________________________.

A

record sampling and monetary unit sampling (MUS).