Suppose your company has built a database application that runs on a centralized database, but even with a high-end computer and appropriate indices created on the data, the system is not able to handle the transaction load, leading to slow processing of queries. What would be some of your options to allow the application to handle the transaction load?
Q: Its specifics have been extensively implemented in third- and fourth-generation database management…
A: This question tells about Third- and fourth-generation database management systems use it…
Q: For each of the changes, discuss the impact on the internal control system and the independent…
A: EDP is the electronic data processing system which is also known Management information system. It…
Q: Which distributed database method is best for company “A”. Explain your reasoning. Which distributed…
A: Distributed Database System: Distributed database system is the mechanism which allows users to…
Q: Which of the following statements about the client-server model is correct?a. It is best suited to…
A: Accounting Information system is a set of components used for gathering, making, storing, preparing,…
Q: What is meant by data mining, and why must technical analysts be careful not to engage in it?
A: Data mining: Data mining is considered as a process utilized by corporations to turn raw data in to…
Q: How could a computerized system’s transaction audit trail in an advancedsystem differ from one in a…
A: Audit Trail: The accounting records of an entity are provided in an audit trail. It is used to…
Q: How is a lockout different from a deadlock? Give an accounting example to illustrate why a database…
A: Database Deadlock: Database deadlock is a condition in which no data can be accessed as sites are…
Q: The computer processing portion of a sales order system is represented by the flowchart. Answer the…
A: Data Processing: This is a batch processing system so as to make use of direct access storage…
Q: The most significant control challenges in end-user computer settings are as follows:
A: Introduction: The following are the most significant control challenges that arise in end-user…
Q: When an optimistic approach to concurrency control is applied, it is common for transactions to take…
A: Introduction:- Concurrency control guarantees that accurate results are provided for concurrent…
Q: You are conducting substantive tests on the accounts receivable file to verify its accuracy. The…
A:
Q: How can a poorly designed database result in unintentional loss of critical records?
A:
Q: The ABC Company is a geographically distributed organization with several sites around the country.…
A: Distributed Database System: Distributed database system is the mechanism which allows users to…
Q: What does auditing around the computer mean versus auditing through the computer? Why is this so…
A: Auditing Around the Computer and Auditing Through the Computer: In auditing around the computer,…
Q: has hired you to review its sales order procedures for internal control compliance and to make…
A: Hey there since you have posted multiple questions, we can answer only first three questions for…
Q: A DDos attacka. is more intensive than a Dos attack because it emanates from single source.b. may…
A: DDoS Attack: Distributed denial of service (DDoS) attack is an attempt where the victims are…
Q: Even with a high-end machine and sufficient data indexes, your company's database application cannot…
A: This question deals with Your company's database application cannot handle the transaction load,…
Q: One way ERP vendors help to make the configuration process easier for their customers is to:…
A: One way ERP vendors helps to make the configuration process easier for their customers is to develop…
Q: Which of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b.…
A:
Q: The internal auditor of a small company has recommended to the CEO that it invest in a disaster…
A: Cloud computing: In Simple terms, cloud means by which global class, highly scalable and flexible…
Q: Why is human behavior considered one of the biggest potential threats to operating system…
A: “Since you have asked multiple questions, we will solve the first question for you. If you want a…
Q: Which of the following is least likely to be a general control over computer activities? a.…
A: Audit is conducted in order to verify whether the financial statements are accurately presented.…
Q: Replicated databases create considerable data redundancy, which is in conflict with the database…
A: Database Concept: Database concept refers to management of databases held within an organization.…
Q: Which statement is NOT true? Batch processinga. is subject to deadlocks when processing…
A: The cost accountant of the company will prepare the contribution margin income statement for…
Q: The increasing use of sophisticated EDP systems has produced significant changes in the accounting…
A: Computerized accounting includes using the computers and accounting software for recording, storing…
Q: Case Study. You are conducting substantive tests on the Accounts Receivable file to verify its…
A: Auditing:- An audit is considered as physical examination of books of accounts of a company by an…
Q: Auditors of ERP systemsa. need not be concerned about segregation of duties because these systems…
A: Auditors of Enterprise Resource Planning: The responsibility of an auditor is to gather knowledge…
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: An organization bought the main "off-the-rack" internet business programming for connecting its…
Q: Please answer all the requirements. Thank you 1. Increasing use of sophisticated EDP systems has…
A: “Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: The advantages to using a partitioned database approach include all of the following EXCEPT a. the…
A: Computerized accounting includes using the computers and accounting software for recording, storing…
Q: What are some advantages of using a software system versus recording transactions manually (by…
A: computerized accounting involves making use of computers and accounting software to record, and…
Q: What are the possible scenarios in the delivery creation process? Can a SAP user create a delivery…
A: ”As per the police of our company Bartleby, we are allowed to answer only the first question in case…
Q: Which of the following is a disadvantage of distributed data processing? a. End-user involvement in…
A: Distributed data processing is a method of computer networking. In this method, several computers in…
Q: The following are the problems that an Enterprise System is designed to overcome, except O data…
A: Solution: The following are the problems that an enterprise system is designed to overcome: 1. Data…
Q: The increasing use of sophisticated EDP systems has produced significant changes in the accounting…
A: Answer: The introduction of a computerized or electronic data processing (EDP) register has not…
Q: Match the term to its definition by choosing the appropriate number in the answer field. You will…
A: A partial set of all available data items in a database that are used by a specific application,…
Q: Databases maximize : this means independence; applications cannot access data associated with other…
A: Ans. Independence; applications and data are not linked to each other, so all application are able…
Q: Why is it risky to allow programmers to create user subschemas and assign access authority to users?…
A:
Q: Discuss any concerns you would have as an auditor and any actions you would take.
A: Substantive Test: The test that ensures the completeness and validity of the financial statements is…
Q: The capability for computers to communicate with physically remote terminals is an important feature…
A: Answer is A
Q: Explain with an example why any computer-based application control cannot function on its own and…
A: Controls are put in place in order to check, detect and control the given situation and to record…
Q: As users determine new computer application needs, requests must be sent to both the system…
A: Database Management: Database management refers to management of databases held within an…
Q: Discuss how rushing the system’s requirements stage may delay or even result in the failure of a…
A:
Q: A transitive dependencya. is a database condition that is resolved through special monitoring…
A: A transitive dependency is a functional dependency where dependency occurs in relation of two or…
Q: Describe the differences between auditing around the computer and auditing through the computer?…
A: Auditing is the process in which the professional called auditor, performs the audit on the client…
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Which of the following is a risk to the financial statement of a company when it places a purchase order with a supplier? The advantages of PDF files are: A. that they can be securely locked so that the figures cannot be changed.B. that they can be easily manipulated and changed by users.C. the software to produce them is very cheap.D. none of the options are correct. 2. What is information overload? A. The situation where a computer has more information than is needed or is able to be processed in a meaningful way when a computer program is executed.B. The situation where an individual has more information than is needed or is able to be processed in a meaningful way when working through a decision.C. The situation where a computer has more information than is needed or is able to be processed when data storage is taking place.D. The situation where the amount of information exceeds the storage capacity of the brain of a human being. 3. When all data are stored in a central place,…Even with a high-end machine and sufficient data indexes, your company's database application cannot manage the transaction load, resulting in delayed query execution. What choices do you have to let the program manage the load?Discuss the importance of the role of the database administrator. In the flat-file environment, why is such a role not necessary? What tasks does the DBA perform?
- Data in a data warehouse are in a stable state. Explain how this can hamper data mining analysis. What can an organization do to alleviate this problem?Which of the following is a disadvantage of distributed data processing? a. End-user involvement in systems operation is decreased. b. Disruptions due to mainframe failures are increased. c. The potential for hardware and software incompatibility across the organization isincreased. d. The time between project request and completion is increased. e. All of the above are disadvantages.Some people believe database technology may eliminate the need for double-entry accounting. This creates three possibilities: (1) the double-entry model will be abandoned; (2) the double-entry model will not be used directly, but an external-level schema based on the double-entry model will be defined for accountants’ use; or (3) the double-entry model will be retained in database systems. Which alternative do you think is most likely to occur? Why?
- How should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how?Which of the following statements is not correct? a.The database approach uses one common database to promote the concept of single user view. b.Database systems resolve task data dependency. c.The flat-file model encourages data redundancy. d.A primary goal of databasesystems is to minimize data redundancy. e.Database systems provide increased accessibility to data and data integration.Which of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.
- Which statement is NOT true?a. In a typical two-tier client-server architecture, the server handles both application and database duties.b. Client computers are responsible for presenting data to the user and passing user input back to the server.c. Two-tier architecture is for local area network applications where the demand on the server is restricted to a relatively small population of users.d. The database and application functions are separated in the three-tier model. e. In three-tier client-server architectures, one tier is for user presentation, one is for database and applications access, and the third is for Internet access.The database approach has several unique characteristics not found in traditional (flat-file) systems. Which of the following statements does not apply to the database model? a. Database systems have data independence; that is, the data and the programs are maintained separately except during processing. b. Database systems contain a data-definition language that helps describe each schema and subschema. c. The database administrator is the part of the software package that instructs the operating aspects of the program when data are retrieved. d. A primary goal of database systems is to minimize data redundancy. e. Database systems provide increased accessibility to data and flexibility in its usage.Which statement is NOT true? a. Drill-down capability is an OLAP feature of data mining tools available to the user. b. The data warehouse should be separate from operational systems. c. Denormalization of data involves dividing the data into very small tables that support detailed analysis. d. Some decisions supported by a data warehouse are not fundamentally different from those that are supported by traditional databases. e. Data cleansing involves transforming data into standard business terms with standard data values.