Question 3 : Choose the correct answer for the following items. (20 marks)Which of the following correctly describes the Referential Integrity Rule?The primary key of a table must have data values (cannot be null).Each attribute in a table must have a unique name.The data value for a foreign key could be null.Values of a specific attribute must be of the same type.Which of the following tasks cannot be performed through queries in access?Retrieve and display data.Calculations of data.Data sorting.Create and update relationships.In Microsoft Access, we use tables in a database for:Data entry.Data storage.Data retrieval.Two of these choices are correct.A company would like to implement a management information system that integrates all functional areas within an organization to allow information exchange and collaboration among all parties involved in business operations. Which of the following systems is most effective for this application?A decision support system.An executive support system.An office automation system.An enterprise resource planning system.Which of the following is the best approach to mitigate alignment risk?Assure top management supportConduct training and provide incentivesUse the balanced scorecard frameworkUse sensitivity analysisUnauthorized alteration of records in a database system can be prevented by employing:key verification.computer matching.database access controls.regular review of audit trails.The vice president of human resources has requested an audit to identify payroll overpayments for the previous year. Which would be the best audit technique to use in this situation?Test dataIntegrated test facilityGeneralized audit softwareEmbedded audit moduleA group of computers, printers, and other devices connected to the same network and covers a limited geographic range is called a:VAN.WAN.LAN.VPN.The most common security threats for wireless LANs include:social engineering.system malfunction.man-in-the-middle.virus.Assume an IT project is expected to cost $20,000 up front, and it will provide net benefits that average $16,000 per year for the next 3 years. Then, Payback Period social engineering.2.5 Years.One Year.3 Years.1.25 Years