Exam 4: IT Security Part II: Auditing Database Systems
Exam 1: Auditing and Internal Control103 Questions
Exam 2: Auditing IT Governance Controls99 Questions
Exam 3: Security Part I: Auditing Operating Systems and Networks143 Questions
Exam 4: IT Security Part II: Auditing Database Systems101 Questions
Exam 5: Systems Development and Program Change Activities108 Questions
Exam 6: Overview of Transaction Processing and Financial Reporting Systems143 Questions
Exam 7: Computer-Assisted Audit Tools and Techniques83 Questions
Exam 8: Data Structures and CAATTs for Data Extraction89 Questions
Exam 9: Auditing the Revenue Cycle105 Questions
Exam 10: Auditing the Expenditure Cycle144 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection85 Questions
Exam 11: Enterprise Resource Planning Systems92 Questions
Select questions type
Which of the following is not a basic database backup and recovery feature?
(Multiple Choice)
4.9/5
(30)
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.
(True/False)
4.9/5
(36)
The database management system provides a controlled environment for accessing the database.
(True/False)
4.9/5
(28)
Explain a database lockout and the deadlock phenomenon.Contrast that to concurrency control and the timestamping technique.Describe the importance of these items in relation to database integrity.
(Essay)
4.9/5
(33)
In the database method of data management,access authority is maintained by systems programming.
(True/False)
4.9/5
(49)
Which of the following is not a problem usually associated with the flat-file approach to data management?
(Multiple Choice)
4.7/5
(41)
Describe an environment in which a firm should use a partitioned database.
(Essay)
4.8/5
(35)
Use the following words to complete the sentences in questions 1 through 5.
-The __________________________ authorizes access to the database.

(Short Answer)
5.0/5
(37)
The database attributes that individual users have permission to access are defined in
(Multiple Choice)
4.9/5
(38)
All of the following are elements of the DBMS which facilitate user access to the database except
(Multiple Choice)
4.9/5
(27)
Discuss the key factors to consider in determining how to partition a corporate database.
(Essay)
4.8/5
(35)
Ownership of data in traditional legacy systems often leads to data redundancy.This in turn leads to several data management problems.What are they? How does the database approach solve them?
(Essay)
4.7/5
(43)
Use the following words to complete the sentences in questions 1 through 5.
-The __________________________ describes every data element in the database.

(Short Answer)
4.8/5
(37)
Which characteristic is associated with the database approach to data management?
(Multiple Choice)
4.9/5
(32)
Showing 61 - 80 of 101
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)