Recommended textbook solutionsMyers' Psychology for AP2nd EditionDavid G Myers 900 solutions HDEV56th EditionSpencer A. Rathus 380 solutions Social Psychology10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson 525 solutions Myers' Psychology for the AP Course3rd EditionC. Nathan DeWall, David G Myers 955 solutions In the event identification component of the COSO ERM framework, management must classify events into which of the following? Weaknesses and vulnerabilities. Risks and opportunities. What is the primary objective of data security controls? - To establish a framework for controlling the design,
security, and use of computer programs throughout an organization. To ensure that data storage media are subject to authorization prior to access, change, or destruction. What type of tables does Excel use to create data visualization? Relational tables. Pivot tables. Which of the following is the least likely example of how a specialized digital dashboard might be used? To track construction projects. To track fixed asset depreciation. If a Chief Technology Officer wanted to ensure a new system had appropriate processing controls which of the following would he/she require? A record count. Select a correct statement regarding encryption methods? To use symmetric-key encryption, each user needs two different keys. When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods. Which type of analysis assists with defining how to optimize performance based on a potential constraint? Descriptive. Prescriptive. Which of the following controls would most likely assure that a company can reconstruct its financial records? Security controls such as firewalls. Backup data are tested and stored safely. Which of the following is a key difference between Bitcoin and Ethereum? Only Bitcoin uses blockchain technology. Ethereum employs smart contracts. Which of the following statement is correct regarding internal control? An inherent limitation to internal control is the fact that controls can be circumvented by management override. Which of the following is not an example of
vulnerability within the process of IT operations? Software not patched. Which of the following best describes the AICPA's Audit Data Standards (ADS)? The base level of testing procedures that should be performed on AIS data. A set of standards for data files and fields designed to support external audits. Which of the following is often used as the main repository of a company's historical data (i.e., its corporate memory)? The UML Class
Diagram. The data warehouse. A manufacturing firm identified that it would have difficulty sourcing raw materials locally, so it decided to relocate its production facilities. According to COSO, this decision represents which of the following response to the risk? Risk reduction. Risk reduction. Which of the following metrics would be most likely to show up on a Digital Dashboard for a retail organization? Abandoned Shopping Carts for retailer's website. Abandoned Shopping Carts for retailer's website. As described in the text, which of the following best defines the term data analytics? The ability extra and load large datasets. The science of examining raw data, removing excess noise, and organizing it in order to draw conclusions for decision making. Which statement below describes the relationship between artificial intelligence and machine learning? Artificial intelligence is like a city and machine learning is like the state. Artificial intelligence is like a database and machine learning is like a table in the database. Which of the following is a component of COSO ERM 2017? Governance and culture. All of the choices are correct. Which statement best describes data visualization? Data visualization was created to help accessibility issues. Data visualization is one way we share the story. Ethical principals are derived from all of the following except: Personal attitudes on issues of right and wrong. Cost benefit analysis Which type of blockchain offers economic reward for the computational proof of work in mining? Private. Public Which of the following best describes what is meant by corporate governance? The organizational structure and responsibilities of the executive team and board of directors of a corporation. Regulatory bodies, such as the SEC and PCAOB, that govern the behavior of corporations. The ability of a corporation's management team to meet earnings forecasts over an extended period of time. Management's processes, policies, and ethical approach to safeguarding stakeholder interests. Management's processes, policies, and ethical approach to safeguarding stakeholder interests. In a computerized environment, internal controls can be categorized into which of the following? General controls and application controls. General controls and application controls. When using an analytical mindset which of the following is the first task? Master the data. Ask the right question. Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and the Labor Operations classes? Each employee that creates a Material Issue must record at least one Labor Operation. At least one production worker and one supervisor must perform labor operations for each production run. The association between Labor Operations and Employees will be implemented in the database with a Type Image class. An employee may not perform any labor operations. An employee may not perform any labor operations. Which of the following is not a common element of performing and sharing data analysis amongst visualization tools? Get data. Create data All of the following are examples of internal control procedures except Using pre-numbered documents Processing customer satisfaction surveys Data mining may uncover relationships in which no causality should be implied. In these cases, which of the following phases would be most appropriate? "A improves
B." "A is associated with B." Which of the following represents an inherent risk for a financial institution? Bank reconciliations are not performed on a timely basis. The economy goes into a recession. What Microsoft tool would most likely be used to create a pivot table? Word. Excel The tool that defines and describes each key data element (e.g., total assets, accounts, payable, net income, etc.) in XBRL is called _____: XBRL specification. XBRL taxonomy. Which of the following IT controls would best prevent a currency trader from concealing his/her trading errors? End user access to source code. End user access to source code. Reconciliation of cash accounts may be referred to as what type of control? Detective. Detective. Review of the audit log is an example of which of the following types of security control? Governance. Detective. An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing? Data restoration plan. Disaster recovery plan. In addition to finding statistical correlations, proper application of Data Mining techniques should include which of the following? Good use of the REA framework. Professional judgment Why do Certificate Authority (CA) play an important role in a company's information security management? Using a CA is required by SOX in managing information security. Most companies use CA to manage their employees' public keys. Which of the following is the best reason that a collaboration model would not be used to diagram the conversion process? All conversion activities are internal to
the organization. All conversion activities are internal to the organization. Which of the following describes the recommended prerequisites for managing vulnerabilities? Implement the COSO ERM framework,
and identify key vulnerabilities. Determine the main objective of vulnerability management, and assign roles and responsibilities.
Which of the following general ledger accounts would likely not be impacted in a conversion process? Sales Revenue. Sales Revenue. All of the following are the primary functions of internal controls except: Prevention. Reflection The internal control provisions of SOX apply to which companies in the United States? All companies. SEC registrants. The Sarbanes-Oxley Act (SOX) was passed as a response to which of the following events? The
savings & loan scandals of the 1980s. Corporate reporting scandals by companies such as WorldCom, Enron, and Tyco. A customer intended to order 100 units of a product A, but incorrectly ordered nonexistent product B. Which of the following controls most likely would detect this error? Validity check Validity check Which type of chart is best for categorical data? Vertical bar Which of the following statements is incorrect? A fraud prevention program starts with a
fraud risk assessment across the entire firm A fraud prevention program should include an evaluation on the efficiency of business processes. A disaster recovery approach should include which of the following elements? Encryption. Regular backups Ford may use business intelligence for all of the following except: Compare competitor vehicle sales to Ford vehicle sales. Prepare activity models using BPM. Which visualization tool creates dashboards and stories? Power Point. Tableau. How often is a block added to Ethereum? Every 10 minutes. Every 12-15 seconds. How do data analysts use confusion matrices? To understand a model's prediction results. What is the first step to prepare Excel data? Select Insert>Table. Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely? A public key and a private key. Which type of chart would best show each division's relative profit within a corporation? Pie Chart Which of the following is an example of a validity check? The computer ensures that a numerical amount in a record does not exceed some predetermined amount. As the computer corrects errors and data are successfully resubmitted to the system, the causes of the errors are printed out. The computer flags any transmission for which the control field value did not match that of an existing file record. After data for a transaction are entered, the computer sends certain data back to the terminal for comparison with data originally sent. The computer flags any transmission for which the control field value did not match that of an existing file record. Which of the following is a password security weakness? Users are assigned passwords when accounts are created, but do not change them. Users are assigned passwords when accounts are created, but do not change them. Review the conversion process BPMN activity diagram presented below. In the diagram, the symbol (lighting bolt) indicates which of the following? Exception event. XBRL stands for eXtensible Business Reporting Language
Which type of company does the Securities and Exchange Commission (SEC) require to format their financial statements using XBRL? Large accelerated filers Which of the following metrics would be least likely to show up on a Digital Dashboard? Accumulated depreciation for the previous year. Accumulated depreciation for the previous year. What must first be added to the page when creating a visualization in Power BI? Table Which type of chart is best to describe exam results for a class? Histogram. Which of the following is not an example of a vulnerability within an Information System? Outdated intrusion detection/prevention system. Lack of a disaster recovery plan. A document containing XBRL elements is called a(n): XBRL Instance Document. Which of the following best describes the use of XBRL style sheets? Style sheets determine which elements may be used when companies submit their XBRL filing. Style sheets are another name for XBRL instance documents. Style sheets allow for presentation of selected data from XBRL documents in a way that humans can read. Style sheets determine the formatting of numbers and text in the XBRL taxonomy. Style sheets allow for presentation of selected data from XBRL documents in a way that humans can read. Which of the following is not an example of a physical security vulnerability? Unescorted visitors on the premises. Poor choice of passwords. When client's accounts payable computer system was relocated, the administrator provided support through a dial-up connection to server. Subsequently, the administrator left the company. No changes were made to the accounts payable system at that time. Which of the following situations represents the greatest security risk? User passwords are not required to the in alpha-numeric format. User accounts are not removed upon termination of employees. All of the following are challenges for auditors when auditing records residing in a blockchain network except: Programming skills may be needed. Smart contracts cannot be used as evidence. Review the following BPMN activity diagram. In this conversion process, the quantities of raw materials to be released is calculated based on which information? The Bills of Materials. According to COSO which of the following is not a component of internal control? Control risk. Control risk. Which of the following best describes the skill sets used in data analytics? Building data warehouses; Populating data structures; Mining the data. Acquiring/cleansing data; Creating data structures/models; Mining/analyzing data. Which of the following is the least likely use case for implementing blockchain? A grocery store would like to modernize their payroll systems. Consider the following BPMN diagram of a subprocess. Which of the following is required to correct an error in the diagram? Add a sequence flow to an end event after the discard errors activity. Which of the following control activities should be taken to reduce the risk of incorrect processing in a newly installed computerized accounting system? Segregation
of duties. Independently verify the transactions. A data warehouse may include: General Economic Information When an accounting team automates account reconciliations this is an example of: Robotic process automation. Which of the following is not considered a data visualization tool? Excel. Chart Maker An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except: Batch processing. Which of the following best describes why firms choose to create codes of ethics? Because most people will not behave ethically without a written set of guidelines. Codes of ethics protect firms against lawsuits that may be filed due to corporate fraud. They allow firms to create a formal set of expectations for employees who may have different sets of personal values. Companies must have a written code of ethics in order to conduct interstate commerce in the U.S. They allow firms to create a formal set of expectations for employees who may have different sets of personal values. Smart contracts do all of the following except: Define miners. Which of the following best describes how external auditors' interactions with their clients is likely to change due to the use of data analytics in the audit process? External auditors will spend less time on audits and will not need to spend time with clients outside the audit. External auditors will spend more time on detailed audit tasks, resulting in longer audit engagements. External auditors will only interact with their clients virtually. External auditors will stay engaged with clients beyond the audit. External auditors will stay engaged with clients beyond the audit. Which of the following best describes the purpose of a bill of material class? Links each raw material item to one or more finished good items. Links each raw material item to one or more finished good items. Data mining is considered a technique of: Business Intelligence The framework to be used by management in its internal control assessment under requirements of SOX is the: COSO internal control framework. All of the choices are correct Select a correct statement regarding a hashing process. It is reversible. The outcome is a message digest. What Microsoft tool would most likely be used to create a complex visualization using a large amount of data? Power BI. When an accounting team automates account reconciliations this is an example of Robotic process automation. Which of the following is the most likely foreign key for the Production_Authorizations table? Special_handling Product_Number Which of the following is an example of natural language processing? A product that creates a language based confusion matrix. A product which reads contracts and helps accountants with revenue recognition. A well controlled conversion process would likely have which of the following roles seperated into swimlanes? Accounts Payable Manager and Receiving Employee. Which of the following is not an example of a measure in Tableau? Quantity. All of these are examples of measures. To prevent invalid data input, a bank added an extra number at the end of each account number and subjected the new number to an algorithm. This technique is known as: check digit verification. The COSO ERM framework encourages a review of risks as they apply to achieving firms' objectives. Which of the following is not one of the listed categories of objectives to be considered? Environment. Environment. At its core, data analytics fits into the information value chain in which of the following ways? The process of data analytics aims at transforming raw data into valuable information. Which of the following is not one of the main components of vulnerability management and assessment? Identification. Internalization. Which of the following is not a good example of how accountants might use data analytics to help evaluate estimates used to value financial statement accounts? Assess
the likelihood and level of expected warranty claims. Automate the order entry process for online customers. Which of the following is an activity performed as part of data visualization? Selecting the
data visualization tool. Selecting the data visualization tool. Which of the following best summarizes the two key limiting factors for business systems when dealing with Big Data? Data storage capacity and processing power. Data storage capacity and processing power. Which of the following is not one of the responses to risk presented in COSO ERM? Share the risk. Eliminate the risk. Which of the following best illustrates the use of multifactor authentication? Requiring password changes every 30, 60, or 90 days. Requiring the use of a smart card and a password. Which of the following statements regarding authentication in conducting e-business is incorrect? It is a process that establishes the origin of information or determines the identity of a user, process, or device. Only one key is used for encryption and decryption purposes in the authentication process. Which of the following is not a component of COSO ERM 2017? Information communication and reporting. Control activities. Which of the following is not a component of internal control as defined by COSO? Control
environment. Inherent risk. Which of the following is least likely to appear in a Digital Dashboard: Website clicks Expected Fed Fund rate changes Which of the following is not a common step in preparing data and developing visualizations? Assess the data cost versus its value. Assess the data cost versus its value. Raw data often must be scrubbed to remove extraneous data and other noise in order to become useful. This technique is known as: Extract, Transform, and Load. Which of the following areas of financial reporting is most suitable for applying data analytics techniques? Evaluation of estimates and valuations. Evaluation of estimates and valuations. In the conversion process, indirect labor is first recorded to which of the following accounts? Finished Goods. Manufacturing Overhead. When computer programs or files can be accessed from terminals, users should be required to enter a(n): Password as a personal identification code Which of the following is not an example of data questions which arise during the second step of the AMPS model, mastering the data? Data reliability. Data serviceability. If a machine is attempting to reduce the dimensions in a dataset it is using: Unsupervised Learning. Which of the following roles is least likely to use data in XBRL format: Financial analysts. Marketing officers. Tableau can source data from all of the following except? Microsoft Excel. Microsoft Power Point The four Vs are considered a defining feature of big data. Volume, veracity, velocity, & variety. Which of the following best describes the purpose of an intermediate error event? Interupts the normal flow of the process Interupts the normal flow of the process Review the following diagram. Which answer provides the best interpretation Bill of Materials class and its associations? Bills of Materials act as a type image class that specifies the details of the implied association between products and materials. Which of the following is not a good example of how accountants might use data analytics to help evaluate estimates used to value financial statement accounts? Assess the likelihood and level of expected warranty claims. Estimate the collectibility of accounts receivable balances. Automate the order entry process for online customers. Assess property, plant & equipment values based on current comparable prices. Automate the order entry process for online customers. COBIT framework takes the view that all IT processes should provide clear links between all of the following except: IT components. Which of the following is considered an application input control? Run control total. Edit check. Which of the following is not one of the common techniques for information security risks and attacks? Botnet TraceRT Which of the following may be the result of data mining? Digital Dashboards. Items frequently bought in combination. To be considered blockchain a technology must have all of the following except: Decentralization Rewardability Which of the following ... Bacchus, Inc., is a large multinational corporation with various business units around the world. After a fire destroyed the corporate headquarters and largest manufacturing site, plans for which of the following would help Bacchus ensure a timely recovery? Business continuity When a bank has an input file of FICO scores and uses machine learning to help predict credit loses for each customer, they are likely using which type of learning? Supervised learning. Which of the following statements is most accurate with regard to business continuity management (BCM) and disaster recovery planning (DRP)? DRP is an important component of BCM Which of the following does not represent a viable data backup method? Disaster recovery plan. Disaster recovery plan. An analyst may use which two features to explain the results of a complex analysis in the most robust manner possible using Tableau? Dashboard or Story. Which of the following is not a consensus algorithm? Proof of miner. Proof of miner. What type of chart is best to describe the economic conditions of each country? Map. For businesses considering a cloud computing solution, which of the following should they ask the cloud vendor to provide before entering into a contract for critical business operations? SOC 2 Report. Which type of question would accountants most likely use data analytics to answer? Collectibility of Loans Receivable. Each of the following types of controls is considered to be an entity-level control except those: Regarding the company's annual stockholder meeting. Which of the following best describes how external auditors' interactions with their clients is likely to change due to the use or data analytics in the audit process? External auditors will stay engaged with clients beyond the audit. Which of the following is not a part of the AMPS model? Parse the data Which of the following not one of the reasons that the conversion process is typically considered more complicated than the sales and collections and the purchases and payments processes? Many companies do not have a conversion process. Tracing shipping documents to pre-numbered sales invoices provides evidence that: Shipments to customers were properly invoiced. The use of data analytics will likely result in significant changes to clients' expectations of their auditors. Which of the following is most likely not one of those expected changes? More time spent gathering and testing data. The Public Company Accounting Oversight Board (PCAOB) is not responsible for standards related to: Accounting practice. Data analytics can help in accurately identifying organizational risks. All of the following are examples of such risk except: "What-if" business forecasting. The stated advantages of XBRL GL include: Flexibility What is the first step to get data when using Tableau? Select Connect>To a file.
Which of the following is the best description of neural networks? Mathematical models that convert inputs to outputs/predictions. Mathematical models that convert inputs to outputs/predictions.
Which of the following is the most likely primary key for the Materials table? Product_ID Materials_number Which of the following best describes the Get Data step in preparing data and developing a visualization? Modify data to .csv format. Understand and clean the data for use. Which of the following is not an example of a dimension in Tableau? Property location. Quantity sold. Which one of the following is not an example of machine learning assisting in an audit? Reviewing
journal entries. Reviewing organization charts. Which of the following is the best definition of the term big data? Datasets that are too large and complex for businesses' existing systems utilizing traditional capabilities. One of the largest challenges across the accounting industry for auditing firms which use blockchain is: A gap in skillset. Which of the following is not included in the remediation phase for vulnerability management? Risk Response Plan. Vulnerability Prioritization. Which type of analysis assists with understanding why something happened during the third step of the AMPS model, performing the analysis? Diagnostic Business Intelligence is a technique that frequently makes use of all of the following except: Spear Phishing. Spear Phishing What is not a general function of blockchain technology? Generation of bitcoin. The IT Infrastructure Libarary (ITIL) is considered a de facto standard in which of the following regions? Europe In addition to focusing on controls, COBIT 5 expands the scope by incorporating which of the following perspectives? How IT brings value to the firm. Which of the following in Tableau allows modification of the visualization by changing color? pages marks Which of the following is not a basic activity in the conversion process? authorize production ship products to stores Which type of chart would best show outbreaks of the flu by region? Map Which of the following is an example of a appropriate question to begin analyzing a business problem? Why is out newest product not selling as expected in Kentucky? Which type of chart would best compare hours studied and test scores? Scatter Plot According to AS 5, control risk should be assessed in terms of Financial statement assertions Which of the following types of business is least likely to employ a conversion process? Retail Store Both ISACA and the GTAG define vulnerability. Which of the following does not represent one of those definitions? An organizations' exposure to disaster Data mining uses which of the following approaches to analyze data and find new patterns and trends? Sophisticated statistical techniques The process of using sophisticated statistical techniques to extract and analyze data from large databases to discern patterns and trends that were not previously known is called Data Mining In a basic UML diagram of the conversion process, which of the following best describes the purpose of a duality association? A. Shows the participation of employees in the process. B. Links work in process events to the original production authorization. C. Indicates issue of raw material into the process. D. Tracks completion of work in process and increase to finished goods inventory. b. Links work in process events to the original production authorization. Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and the Production Authorizations classes? One employee can authorize production multiple times. Which of the following is the primary overall objective of the conversion process? Ensure that enough finished products are available to meet anticipated demand Which of the following business rules illustrates a proper implementation of internal control? The employee that authorizes production can't be the same employee that issues raw materials. When creating a UML class diagram to support the conversion process, which of the following approaches a way to meet both accounting and general management information requirements. The REA framework Using a generic conversion UML class diagram as a starting point, which of the following best describes how to find work-in-process inventory? It is calculated based on accumulated materials issued, labor, and overhead The duality associations between the events in the generic conversion UML class diagram illustrate which of the following The capture of actual material and labor costs for comparison with the original plan Which of the following is most likely foreign key for the bill of materials table? Product_ID Which of the following is the recommended data type for the Product_number field in the conversion database? Text Which of the following is the most likely to order of a basis conversion activity model? Authorize production> Issue Raw Materials > perform work > complete production Each of the following types of controls is considered to be an entity-level control, except those: Regarding the company's annual stockholder meeting. Which type of chart is best to show a persons' weight over time? line chart Which type of blockchain would a corporation and their key supplier set up to facilitate transactions? Consortium. (hybrid) Before data from multiple sources can be loaded into the data warehouse, which of the following activities must be performed? Data inconsistencies must be removed so that the warehouse has homogeneous data for analysis and reporting purposes. What can users do with Tableau? Create calculated fields. All of the other answers are correct. Which of the following is the most likely foreign key for the Bill of Materials table? Product_ID Which of the following is a set of standards created by the AICPA for data files and fields in order to support external audits? Audit Data Standards (ADS). Which of the following IT controls would best prevent a developer from inappropriately accessing the system? Secondary code review. Which of the following is not accurate regarding blockchain? Only the administrator keeps a copy of the entire database. In a BPMN activity diagram, what does the following symbol represent? (reverse arrow & plus sign) A looping collapsed subprocess. Both ISACA and the GTAG define vulnerability. Which of the following does not represent one of these definitions? An organizations' exposure to disaster. Which of the following represents an application control for a customer sale? The customer name must be populated. Blockchain was built to minimize the use of: Intermediaries. When using a Data Mining approach for business analysis, it is important to remember which of the following Relationships between data items do not necessarily mean that one causes the other. Which type of chart is best to describe the economic conditions of each country? Map What could result from the failure to audit and terminate unused accounts in a timely manner? A disgruntled employee may tamper with company applications. Which type of chart would best show enrollment between 2005-2020? Line chart Which type of analysis assists with understanding what is happening right now? Descriptive. Which of the following would not help create a appropriate question in the AMPS model? Ensuring the data has integrity. How does data analytics play a vital role in today's business world? By examining data to generate models for predictions of patterns and trends. Which of the following items is one of the eight components of COSO's enterprise risk management 2004 framework? Monitoring Which of the following is not a good example of how accountants might use data analytics to help evaluate estimates used to value financial statement accounts? Automate the order entry process for online customers. Which of the following is an example of an appropriate question to begin analyzing a business problem? Why is our newest product not selling as expected in Kentucky? A Public Key Infrastructure (PKI) provides the ability to do which of the following? Issue, maintain, and revoke digital certificates. In general, the goal of information security management is to protect all of the following except: Redundancy. Which of the following should an analyst not do when on the second step of the AMPS model, mastering the data? Analyze the data. The SEC's rule titled "Interactive Data to Improve Financial Reporting" resulted in which of the following? Large accelerated filers must now format their financial statements using XBRL. Why would companies want to use digital signatures when conducting e-business? They can authenticate the document sender and maintain data integrity. Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Products and Production Authorization classes? Each production authorization is related to one product. In which of the following situations would blockchain add value? Multiple parties that do not trust each other want to collaborate. Which type of blockchain would an accounting department of a large international firm set up to track control testing? Private Which of the following is not a type of analyses performed during the third step of the AMPS model, performing the analysis? Reductive. When using a Data Mining approach for business analysis, it is important to remember which of the following? Relationships between data items do not necessarily mean that one causes the other. Which of the following IT controls would best prevent a currency trader from concealing his/her trading errors? End user access to source code. Satoshi Nakamoto used all of the following when creating a distributed ledger system except: Confusion Matrix. The ISO 27000 Series of standards are designed to address which of the following? Information security issues. The duality associations between the events in the generic conversion UML class diagram illustrate which of the following? The capture of actual material and labor costs for comparison with the original plan. Which of the following is the best way to compensate for the lack of adequate segregation of duties in a small organization? Providing greater management oversight of incompatible activities Artificial Intelligence can include all of the following except: Database programming. Power BI can source data from all of the following except? Miscrosoft Excel. All of the following are sources. Which of the following best describes why firms choose to create codes of ethics? They allow firms to create a formal set of expectations for employees who may have different sets of personal values. XBRL assurance is generally expected to include all of the following except: Assurance that reports include all relevant financial and nonfinancial information. Which of the following does not facilitate business decision-making activities? UML Class Diagram. XBRL GL, or XBRL Global Ledger Taxonomy, is different from XBRL US GAAP because it facilitates: Efficient communication within a firm. Which of the following least reflects the purpose of a business rule in the conversion process? Return defective items to suppliers promptly. Which of the following is not benefit of blockchain? Past information is easily edited. If a machine learns by trial and error, it is using: Reinforcement Learning. Which of the following provides the advantage of incorporating other widely accepted standards and frameworks? COBIT 2019. Encryption is a control that changes plain text into which of the following? Cyphertext. Which of the following does not desribe characteristics of the AMPS model? Binary. Data analytics professionals estimate that they spend how much of their time cleaning data in order to perform analysis on it? 50-90%. If a Chief Technology Officer wanted to ensure a new system had appropriate input controls which of the following would he/she require? Access control. |