Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

AIS Worksheet

Part I. Multiple Choice

1. Many documentation tools are available to explain how a system works. Which tool provides a
graphical description of the sources and destinations of data as well as data flow within the
organization and the processes that transform and store that data?

A. Data flow diagram


B. Document flowchart
C. Program flowchart
D. System flowchart

2. A Data Flow Diagram (DFD) is composed of which elements?

A. Data sources and destinations


B. Data flows
C. Transformation processes
D. Data stores
E. All of the above

3. Which function does the rectangle symbol represent in a flowchart.

A. Online keying
B. Display
C. Computer processing
D. Manual operation

4. A document flowchart is particularly useful


A. in identifying the inputs that enter the system.
B. in analyzing the adequacy of control procedures
C. in identifying the sequence of logical operations performed by the computer
D. in system analysis.
5. What do the circles on a data flow diagram represent?

A. Data sources and destinations


B. Data flows
C. Transformation processes
D. Data stores

6. Why are documentation tools important?


A. They are needed to determine how a system works.
B. They are needed to evaluate internal control systems.
C. Both answers “A” and “B” are correct.
D. Neither answer “A” nor “B” is correct
7. The data flow diagram symbol which represents data flows is the

A. square.
B. arrow.
C. circle.
D. parallel lines
E. parallelogram

8. A flowchart is
A. an analytical technique used to describe the data flows and sources and destinations and data
stores of a system.
B. an analytical technique used to describe some aspect of an information system in a clear,
concise, and logical manner.
C. a piece of hard plastic used to draw symbols.
D. a graphical description of the flow of data within an organization and the processes
performed on that data, as well as the sources and destinations of data.
9. An example of a data input would be a(n)

A. payroll check.
B. tax payment.
C. tax report.
D. employee change form.

10. Which documentation technique illustrates the flow of documents and information among areas
of responsibility within an organization?

A. Data Flow Diagram


B. Document flowchart
C. Process flowchart
D. System flowchart

11. Which of the following is not a guideline for drawing a Data Flow Diagram (DFD)?

A. Develop a context diagram


B. Subdivide the DFD
C. Determine system boundaries
D. Display the physical location of data files

12. Which of the following is a guideline for preparing flowcharts?


A. Flowchart only the normal flow of operations.
B. Assume that the reader will know the direction of the flow.
C. Identify the entities to be flowcharted.
D. A manual process should have an input and an output.
E. Include data stores where appropriate.
F. Answers to “A”, “C”, and “D”
13. What are the benefits associated with database technology?

A. Data sharing
B. Data integration
C. Data independence
D. All of the above
E. None of the above
14. Which of the following provides the low-level view of the database?

A. Conceptual-level schema
B. External-level schema
C. The internal-level schema
D. All of the above
E. None of the above

15. Which of the following cannot be blank (null)?

A. Foreign key
B. Secondary key
C. Primary key
D. Connecting key
E. None of the above

16. When the same, non-key, data element is stored multiple times in table it creates an anomaly
known as the:

A. Delete Anomaly.
B. Update Anomaly.
C. Insert Anomaly.
D. All of the above
E. None of the above.
17. Which of the following are requirements of a relational database?
A. All nonkey (primary and foreign) attributes must describe a quality of the item identified by
the primary key.
B. Primary keys cannot be null or empty.
C. Foreign keys (if not empty) must be a primary key in another table.
D. All of the above
E. None of the above.
18. When a non-null value for the primary key indicates that a specific object exists and can be
identified by reference to its primary key value, it is referred to as
A. the referential integrity rule.
B. the relational database rule.
C. the entity integrity rule.
D. None of the above
19. What is (are) the component(s) of a data dictionary?
A. Field length
B. Field type
C. Authorized users
D. Data location
E. Except “D”
20. Data manipulation language is used to do which of the following?
A. Updating the database
B. Creating the database
C. Querying the database
D. All of the above.

You might also like