AIS Ch 11 ACC 463

Closed database architecture is?

a. a control technique intended to prevent unauthorized access by trading partners.
b. a limitation inherent in traditional information systems that prevents data sharing.
c. a data warehouse control that prevents unclean data from entering the warehouse.
d. a technique used to restrict access to data marts.
e. a database structure that many of the leading ERPs use to support OLTP applications.
Click the card to flip 👆
1 / 10
Terms in this set (10)
Closed database architecture is?

a. a control technique intended to prevent unauthorized access by trading partners.
b. a limitation inherent in traditional information systems that prevents data sharing.
c. a data warehouse control that prevents unclean data from entering the warehouse.
d. a technique used to restrict access to data marts.
e. a database structure that many of the leading ERPs use to support OLTP applications.
There are a number of risks that may be associated with ERP implementation. Which of the following was NOT stated as a risk in the chapter?

a. A drop in a firm's performance after implementation because the firm looks and works differently than it did while using a legacy system.
b. Implementing companies have found that staff members, employed by ERP consulting firms, do not have sufficient experience in implementing new systems.
c. Implementing firms fail to select systems that properly support their business activities.
d. The selected system does not adequately meet the adopting firm's economic growth.
e. ERPsaretoolarge, complex, and generic for them to be well integrated into most company cultures.
Which statement is NOT true?

Inatypicaltwo-tier,client-serverarchitecture, the server handles both application and data- base duties.
b. Client computers are responsible for present- ing data to the user and passing user input back to the server.
c. Two-tierarchitectureisforlocalareanetwork applications where the demand on the server is restricted to a relatively small population of users.
d. The database and application functions are separated in the three-tier model.
e. In three-tier client-server architectures, one tier is for user presentation, one is for database and applications access, and the third is for Internet access.
Which statement is NOT true?

a. Drill-down capability is an OLAP feature of
data mining tools available to the user.
b. The data warehouse should be separate from operational systems.
c. Denormalization of data involves dividing the data into very small tables that support detailed analysis.
d. Somedecisionssupportedbyadatawarehouse are not fundamentally different from those that are supported by traditional databases.
e. Data cleansing involves transforming data into standard business terms with standard data values.
Which statement is LEAST accurate?

a. Implementing an ERP system has more to do with changing the way an organization does business than it does with technology.
b. The phased-in approach to ERP implementa- tion is particularly suited to diversified organi- zations whose units do not share common processes and data.
c. Because the primary reason for implement- ing an ERP is to standardize and integrate operations, diversified organizations whose units do not share common processes and data do not benefit and tend not to imple- ment ERPs.
d. To take full advantage of the ERP process, reengineering will need to occur.
e. A common reason for ERP failure is that the ERP does not support one or more important business processes of the organization.
Auditors of ERP systems
a. need not be concerned about segregation of duties because these systems possess strong computer controls.
b. focus on output controls such as independent verification to reconcile batch totals.
c. are concerned that managers fail to exercise adequate care in assigning permissions.
d. do not see the data warehouse as an audit or control issue at all because financial records are not stored there.
e. need not review access levels granted to users because these are determined when the system is configured and never change.
Which of the following statement is correct?

a. Only one individual can be assigned to a role.
b. A role is a formal technique for grouping together users according to the system resources they need to perform their assigned tasks.
c. RBAC assigns specific access privileges to individuals.
d. Because of the use of roles, access security concerns are essentially eliminated in ERP environments.
e. None of the above is correct.