1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
7

You are currently working in a mid-tier accounting firm. In an engagement meeting with a client, the management of your client i

s concerned that the audit tests that you perform will disrupt operations. Your client has recently implemented a data warehouse and the management suggests that you draw the data for analytical reviews and substantive testing from the data warehouse instead of the operational database. The management points out that operational data are copied weekly into the data warehouse and all data you need are contained there. Outline your response to the management’s proposal and mention any concerns you might have. (maximum 300 words)
Computers and Technology
1 answer:
Archy [21]3 years ago
4 0

Answer:

The answer "Only when an auditor is free to perform his responsibilities should the audit contract be accepted. There should be no stress on an investigator but no independence".

Explanation:

In the essence of the data store, huge storage of the information, that is used to collect from either a variety of sources within the same company. The DTC  is often used as an analytics capability (OLAP frameworks) because a transfer can be focussed on the data structure. It's also currently easier for organizations to end things or assessment and determine the best information with full of data from one destination.

Create a complete warehouse:  It is unlikely, however, that each one of your getting your information at that same single place seems to be the greatest flexibility for providing a database server.  

Below are various benefits of providing data storage:  

  • Saving time:  In the company's ease of accessing data from different sources at the data center, that ensures no time to obtain information from other sources is lost.
  • Higher trust: Its data is automatically moved into your data center in an ordered structure, rather than being replaced by human activity, as you'll be more sure that your information is nice and clean, complete and accurate.  
  • Growing knowledge: In the data, the warehouse designs the information so that it can be easily analyzed.  
  • Increasing quality: it would be far easier to manage individuals who reach your data whenever an association position is integrated. Data warehouse allows security fully flexible, allowing users to access all the systems and lock all of them.  

Following are its specific approach to creating a data center, which will you need to develop the core architecture in three sections:  

  • The stocking(storage) algorithm,  
  • Software and working  
  • HR.

Storage: it's the foundation of the structure and your warehouse lives there. The inner server is the client's office 's internal device as well as the cloud is an electronic storage solution that relies on external servers.

Software: It is a valuable method of private cloud architectural design. For two classes, centralization and visual imagery are commonly isolated.  

Human resources: It is the part of data warehouse operations which is extremely important for a workable example. To keep your warehouse running, you must use new circumstances in your company.

You might be interested in
The return value is a one-dimensional array that contains two elements. These two elements indicate the rows and column indices
erma4kov [3.2K]

Answer:

In Java:

import java.util.Scanner;  

import java.util.Arrays;  

public class Main  {  

public static void main(String args[])  {  

Scanner input = new Scanner(System.in);

int row, col;  

System.out.print("Rows: ");    row = input.nextInt();

System.out.print("Cols: ");     col = input.nextInt();  

int[][] Array2D = new int[row][col];

System.out.print("Enter array elements: ");

for(int i =0;i<row;i++){    

    for(int j =0;j<col;j++){

        Array2D[i][j] = input.nextInt();  

    }     }

 

int[] maxarray = findmax(Array2D,row,col);

System.out.println("Row: "+(maxarray[0]+1));

System.out.println("Column: "+(maxarray[1]+1));

}  

public static int[] findmax(int[][] Array2D,int row, int col)   {  

int max = Array2D[0][0];

int []maxitem = new int [2];

for(int i =0;i<row;i++){

    for(int j =0;j<col;j++){

        if(Array2D[i][j] > max){  

            maxitem[0] = i;

            maxitem[1] = j; } }    }

 

return maxitem;  

}  

}

Explanation:

The next two lines import the scanner and array libraries

<em>import java.util.Scanner;   </em>

<em>import java.util.Arrays;   </em>

The class of the program

<em>public class Main  {  </em>

The main method begins here

<em>public static void main(String args[])  {  </em>

The scanner function is called in the program

<em>Scanner input = new Scanner(System.in);</em>

This declares the array row and column

int row, col;

This next instructions prompt the user for rows and get the row input  

System.out.print("Rows: ");    row = input.nextInt();

This next instructions prompt the user for columns and get the column input  

System.out.print("Cols: ");     col = input.nextInt();  

This declares the 2D array

int[][] Array2D = new int[row][col];

This prompts the user for array elements

System.out.print("Enter array elements: ");

The following iteration populates the 2D array

<em> for(int i =0;i<row;i++){    </em>

<em>     for(int j =0;j<col;j++){ </em>

<em>         Array2D[i][j] = input.nextInt();   </em>

<em>     }     } </em>

This calls the findmax function. The returned array of the function is saved in maxarray  

int[] maxarray = findmax(Array2D,row,col);

This prints the row position

System.out.println("Row: "+(maxarray[0]+1));

This prints the column position

System.out.println("Column: "+(maxarray[1]+1));

The main method ends here

}  

The findmax function begins here

public static int[] findmax(int[][] Array2D,int row, int col)   {  

This initializes the maximum to the first element of the array

int max = Array2D[0][0];

This declares maxitem. The array gets the position of the maximum element

int []maxitem = new int [2];

The following iteration gets the position of the maximum element

<em>for(int i =0;i<row;i++){ </em>

<em>     for(int j =0;j<col;j++){ </em>

<em>         if(Array2D[i][j] > max){  </em>

<em>             maxitem[0] = i; </em><em>-- The row position is saved in index 0</em><em> </em>

<em>             maxitem[1] = j;  </em><em>-- The column position is saved in index 1</em><em>} }    } </em>

This returns the 1 d array

return maxitem;  

}  

7 0
3 years ago
Your browser has blocked your from your crucial secure intranet sites. What could be the problem?.
Alenkinab [10]

A browser is a program that allows and provides the user access to information and web pages on the internet. It blocks someone when their SSL certificate status has been voided.

<h3>What is an SSL certificate?</h3>

An SSL (Secure Sockets Layer) certificate is a digital code and certificate present on the web that authenticates and provides security for communication. It is a security protocol that allows encrypted transmission.

The firewall supervisor sets the rule to block or allow the users to connect to Crucial Secure Intranet Sites based on their SSL certificates. SSL certificate if gets revoked then does not allow users to reach the site and declares it to be a potential risk.

Therefore, the browser is not reachable when the SSL certificate gets expired.

Learn more about SSL certificates here:

brainly.com/question/24276018

#SPJ1

3 0
2 years ago
What are the most common MIS (management information systems) used in a business place.
Kryger [21]

Answer:

  MIS (management information systems) is a computer system consist of hardware and a software that together serves as the backbone of operations for an organisation. It is an important tool for any business irrespective of its scale of operation and its size and frequency and usage may be vary with business. As, MIS tools help in move data and manage the information.

The technologies and tools are used in MIS have evolved over the time such as minicomputers, mainframe and server networks.

3 0
4 years ago
What is 1 of the rules for naming variables?
vova2212 [387]

Answer:

<h3>Rules for Naming Variables</h3><h3>The first character must be a letter or an underscore (_). You can't use a number as the first character. The rest of the variable name can include any letter, any number, or the underscore. You can't use any other characters, including spaces, symbols, and punctuation marks.</h3>

<em><u>#</u></em><em><u>M</u></em><em><u>a</u></em><em><u>r</u></em><em><u>k</u></em><em><u>a</u></em><em><u>s</u></em><em><u>b</u></em><em><u>r</u></em><em><u>a</u></em><em><u>i</u></em><em><u>n</u></em><em><u>l</u></em><em><u>e</u></em><em><u>s</u></em><em><u>s</u></em><em><u>p</u></em><em><u>l</u></em><em><u>e</u></em><em><u>a</u></em><em><u>s</u></em><em><u>e</u></em><em><u>✅</u></em>

3 0
3 years ago
A question to determine your ability to use the reference materials effectively. Your boss has determined that you will be using
Ymorist [56]

Answer:

The answer is "implement on group 2 and group 3".

Explanation:

In the given scenario, When technology workers are using in the project teams. People like to be stable, and we can't allow wireless network transmission to maintain their security and privacy. When we considering category 1 being the only ones who have links to a higher authority, that's why Group 2 and Group 3 were needing to be implemented.

3 0
3 years ago
Other questions:
  • Does a soda vending machine Give reciepts?<br><br>need for computer science hw
    7·2 answers
  • What is the decimal equivalent of (11000 + 10000)/101?
    10·1 answer
  • Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
    5·1 answer
  • Why are advanced features helpful when businesses use spreadsheets
    5·1 answer
  • Which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
    10·1 answer
  • Discuss a situation in which you might want to use a floating-point number with a fractional part for a loop control variable. W
    5·1 answer
  • Which of the following defines a computer program?
    14·1 answer
  • What is the initial condition in this set of code?
    8·1 answer
  • To find information on a network use a ____
    14·1 answer
  • How do you put text in MS publisher?<br><br> When do you use text wrapping?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!