In: Accounting
1.All the following documents can be used for payroll audit trail except:
Select one:
a. Job tickets
b. Imprest account
c. Personnel action forms
d. Timecards
2.All the following are examples of problems that may occur as a result of combining applications programming and maintenance tasks into one position, except:
Select one:
a. Job security issues
b. Increased potential for program fraud
c. Inadequate documentation
d. Maintenance irregularities
3.When processing records, the system sequences records according to the primary key and possibly the secondary key. What is this processing called?
Select one:
a. Edit run
b. Delete run
c. Sort run
d. Update run
4.In a database environment, individual users may be granted summary and statistical query access to confidential data to which they normally are denied direct access. Based on that, users may be able to determine the specific value of a data item. Which kind of database compromise is this?
Select one:
a. Approximate compromise
b. Positive compromise
c. Negative compromise
d. Statistical compromise
1) a. Job tickets
Explanations:-
Job tickets is the document that captures the total amount of time that individual workers spend on each production job and not the details about the payroll.
2) a. Job security issues
3) c. Sort run
Explanations:-
It is the technique of storing the records in ascending or descending order of one or more columns. It is useful because, some of the queries will ask us to return sorted records, or in operations like joins will be more efficient in sorted records. All the records are by default sorted based on the primary key column.
4) b. Positive compromise
Explanations:-
Statistical user is restricted to obtaining only aggregate, or statistical, data from the database and is prohibited access to individual records
• Inference problem: – user may infer confidential information about individual entities represented in the SDB – Such an inference is called a compromise
Positive compromise – determine an attribute has a particular value
Negative compromise – determine an attribute does not have a particular value