Final Exam 2

studied byStudied by 12 people
5.0(1)
get a hint
hint

In addition to focusing on controls, COBIT 5 expands its scope by incorporating which of the following broad perspectives?

How IT brings value to the firm.

How IT can automate specific business processes.

IT networking requirements.

IT cost reductions.

1 / 247

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

248 Terms

1

In addition to focusing on controls, COBIT 5 expands its scope by incorporating which of the following broad perspectives?

How IT brings value to the firm.

How IT can automate specific business processes.

IT networking requirements.

IT cost reductions.

How IT brings value to the firm.

New cards
2

The Sarbanes-Oxley Act (SOX) was passed as a response to which of the following events?

The savings & loan scandals of the 1980s.

The bust of dot-com bubble companies such as pets.com and Webvan.

Corporate reporting scandals by companies such as WorldCom, Enron, and Tyco.

Securities manipulation and insider trading in the 1930s.

Corporate reporting scandals by companies such as WorldCom, Enron, and Tyco.

New cards
3

Which of the following best describes why firms choose to create codes of ethics?

Because most people will not behave ethically without a written set of guidelines.

Codes of ethics protect firms against lawsuits that may be filed due to corporate fraud.

They allow firms to create a formal set of expectations for employees who may have different sets of personal values.

Companies must have a written code of ethics in order to conduct interstate commerce in the U.S.

They allow firms to create a formal set of expectations for employees who may have different sets of personal values.

New cards
4

Internal controls guarantee the accuracy and reliability of accounting records.

true

false

false

New cards
5

According to COSO 2013, which of the following components of the enterprise risk management addresses an entity’s integrity and ethical values?

Information and communication.

Internal environment.

Risk assessment.

Control activities.

Internal environment.

New cards
6

Which of the following represents an inherent risk for a financial institution?

Bank reconciliations are not performed on a timely basis.

The economy goes into a recession.

Customer credit check not performed.

An error occurs in a loan loss calculation.

The economy goes into a recession.

New cards
7

Which of the following is the best way to compensate for the lack of adequate segregation of duties in a small organization?

Disclosing lack of segregation of duties to external auditors during the annual review.

Replacing personnel every three or four years.

Requiring accountants to pass a yearly background check.

Providing greater management oversight of incompatible activities.

Providing greater management oversight of incompatible activities.

New cards
8

Which of the following is not a component of internal control as defined by COSO?

Control environment.

Control activities.

Inherent risk.

Monitoring.

Inherent risk.

New cards
9

All of the following are the primary functions of internal controls except:

Prevention.

Reflection.

Detection.

Correction.

Reflection.

New cards
10

The framework to be used by management in its internal control assessment under requirements of SOX is the:

COSO internal control framework.

COSO enterprise risk management framework.

COBIT framework.

All of the choices are correct.

All of the choices are correct.

New cards
11

The internal control provisions of SOX apply to which companies in the United States?

All companies.

SEC registrants.

All issuer (public) companies and nonissuer (nonpublic) companies with more than $100,000,000 of net worth.

All nonissuer companies.

SEC registrants.

New cards
12

The ISO 27000 Series of standards are designed to address which of the following?

Corporate governance.

Internal controls.

Information security issues.

IT value.

Information security issues.

New cards
13

Blockchain was built to minimize the use of:

US Dollars.

Regulators.

Intermediaries.

Accountants.

Intermediaries.

New cards
14

What is not a general function of blockchain technology?

Transfer digital assets.

Authenticate identities.

Generation of bitcoin.

Ability to create value.

Generation of bitcoin.

New cards
15

Which of the following is not benefit of blockchain?

Past information is easily edited.

New transactions are propagated to all participants.

Consensus must be reached to propagate transactions.

Participating parties do not need to trust each other.

Past information is easily edited.

New cards
16

In which of the following situations would blockchain add value?

Multiple parties that do not trust each other want to collaborate.

Management would like to automate routine tasks.

A prediction on weather related losses is needed.

Contracts need to be reviewed for revenue recognition.

Multiple parties that do not trust each other want to collaborate.

New cards
17

To be considered blockchain a technology must have all of the following except:

Rewardability.

Consensus.

Immutability.

Decentralization.

Rewardability.

New cards
18

When an accounting team automates account reconciliations this is an example of:

Robotic process automation.

Spreadsheet automation.

Natural language automation.

Internet automation.

Robotic process automation.

New cards
19

When a bank has an input file of FICO scores and uses machine learning to help predict credit losses for each customer, they are likely using which type of learning?

Reinforcement Learning.

Unsupervised Learning.

Supervised Learning.

Matrix Learning.

Supervised Learning.

New cards
20

Which of the following is the best description of neural networks?

Mathematical models that convert inputs to outputs/predictions.

Intelligence exhibited by machines rather than humans.

A blockchain network where participants need permission to join the network.

A ledger where individual entries are separate in time and location.

Mathematical models that convert inputs to outputs/predictions.

New cards
21

Artificial Intelligence can include all of the following except:

Database programming.

Visual perception.

Logical thinking.

Language translation.

Database programming.

New cards
22

One of the largest challenges across the accounting industry for auditing firms which use blockchain is:

Understanding business activities.

Continuous monitoring.

Deciphering cryptocurrency.

A gap in skillset.

A gap in skillset.

New cards
23

When using an analytical mindset which of the following is the first task?

Master the data.

Share the story.

Ask the right question.

Request data.

Ask the right question.

New cards
24

Which type of analysis assists with understanding why something happened during the third step of the AMPS model, performing the analysis?

Descriptive.

Diagnostic.

Predictive.

Prescriptive.

Diagnostic.

New cards
25

Which type of analysis assists with defining how to optimize performance based on a potential constraint?

Descriptive.

Diagnostic.

Predictive.

Prescriptive.

Prescriptive.

New cards
26

Which type of analysis assists with understanding what is happening right now?

Descriptive.

Diagnostic.

Predictive.

Prescriptive.

Descriptive.

New cards
27

Which of the following best summarizes the two key limiting factors for business systems when dealing with Big Data?

Data storage capacity and processing power.

Data availability and software tools.

Database organization and transaction volume.

Analytic skills and software tools.

Data storage capacity and processing power.

New cards
28

As described in the text, which of the following best defines the term data analytics?

The ability extra and load large datasets.

The science of moving data from Access to Enterprise Reporting Tools to draw conclusions for decision making.

The process of organizing extremely large datasets to create more manageability.

The science of examining raw data, removing excess noise, and organizing it in order to draw conclusions for decision making.

The science of examining raw data, removing excess noise, and organizing it in order to draw conclusions for decision making.

New cards
29

The four Vs are considered a defining feature of big data. Which of the following is the best definition of the term big data?

Volition, veracity, velocity & variety.

Variety, visibility, velocity & valuation.

Volume, veracity, velocity, & variety.

Volume, variability, variety & veracity.

Volume, veracity, velocity, & variety.

New cards
30

How does data analytics play a vital role in today’s business world?

By allowing data to be organized into predefined tables and fields.

By defining three main categories of classes that help organize a company’s data structure models.

By examining data to generate models for predictions of patterns and trends.

By capturing the ever-increasing transaction activity of large companies.

By examining data to generate models for predictions of patterns and trends.

New cards
31

Which of the following is not a part of the AMPS model?

Ask the right questions.

Share the story.

Master the data.

Parse the data.

Parse the data.

New cards
32

Which of the following is the best definition of the term big data?

Databases measured in terms of zettabytes.

Datasets that are too large and complex for businesses’ existing systems utilizing traditional capabilities.

Databases for businesses that generate more than one million electronic transactions per month.

Datasets generated by social media applications such as Facebook, Twitter, Tencent QQ, and Instagram.

Datasets that are too large and complex for businesses’ existing systems utilizing traditional capabilities.

New cards
33

Select a correct statement regarding encryption methods?

To use symmetric-key encryption, each user needs two different keys

Most companies prefer using symmetric-key encryption than asymmetric-key encryption method

Both symmetric-key and asymmetric-key encryption methods require the involvement of a certificate authority

When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods

When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods

New cards
34

Which of the following describes the primary goals of the CIA approach to information security management

Controls, Innovation, Analysis

Confidentiality, Integrity, Availability

Convenience, Integrity, Awareness

Confidentiality, Innovation, Availability

Confidentiality, Integrity, Availability

New cards
35

Which of the following best illustrates the use of multifactor authentication?

Requiring password changes every 30, 60, 90 days

Requiring the use of a smart card and a password

Requiring the use of upper case, lower case, numeric, and special characters for a password

The use of fingerprint scanner for access to a device

Requiring the use of a smart card and a password

New cards
36

For businesses considering a cloud computing solution, which of the following should they ask the cloud vendor to provide before entering into a contract for critical business operations?

FASB 51

Report Audit Report

SAS 3 Report

SOC 2 Report

SOC 2 Report

New cards
37

In general, the goal of information security management is to protect all of the following except:

Confidentiality

Integrity

Availability

Redundancy

Redundancy

New cards
38

What is the primary objective of data security controls?

To establish a framework for controlling the design, security, and use of computer programs throughout the organization

To ensure that the data storage media are subject to authorization prior to access, change, or destruction

To formalize standard rules and procedures to ensure the organization’s control are properly executed

To monitor the use of system software to prevent unauthorized access to system software and computer programs

To ensure that the data storage media are subject to authorization prior to access, change, or destruction

New cards
39

An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:

Password management

Data encryption

Digital certificates

Batch processing

Batch processing

New cards
40

An information technology director collecting the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?

Data restoration plan

Disaster recovery plan

System security policy

System hardware policy

Disaster recovery plan

New cards
41

Which of the following is a password security weakness?

Users are assigned passwords when accounts are created, but do not change them

Users have accounts on several systems with different passwords

Users write down their passwords on a note paper and carry it with them

Users select passwords that are not part of an online password directory

Users are assigned passwords when accounts are created, but do not change them

New cards
42

To prevent invalid data input, a bank added an extra number at the end of each account number and subjected the new number to an algorithm. This technique is known as:

A validation check

Check digit verification

A dependency check

A format check

Check digit verification

New cards
43

Why would companies want to use digital signatures when conducting e-business?

They are cheap

They are always the same so it can be verified easily

They are more convenient that requiring a real signature

They can authenticate the document sender and maintain data integrity

They can authenticate the document sender and maintain data integrity

New cards
44

Ben goes to his bank to wire transfer $1,000 to his sister Jennifer. The role of the bank in this transaction is best described as:

miner.

blockchain.

middleman.

consensus.

middleman.

New cards
45

Which of the following statements is true?

Because blockchain transactions are stored in chronological order, you may trace a block from an earlier transaction block to the most recent block in the blockchain.

Both permissioned and public blockchains need miners to determine which transaction block should be added next.

Ethereum is a private blockchain.

Smart contract was introduced in Ethereum.

Smart contract was introduced in Ethereum.

New cards
46

Which feature cannot be found in bitcoin?

Double spend

Anyone can join and leave the bitcoin network at any time

Immutable history of transactions

A new block is added every 10 minutes

Double spend

New cards
47

In the Ethereum network:

mining of Ether occurs at a constant rate.

transaction fees are higher than Bitcoin.

miner uses SHA256 to determine if a block is a valid block.

because a smart contract describes business rules and is also flexible for different industries, it can be modified to fit the business after a block is inserted to the Ethereum network.

mining of Ether occurs at a constant rate.

New cards
48

A selected set of organizations may run a blockchain node separately for keeping the transaction records. Administrators from the organizations establish the access rights and permissions for each participant. This type of blockchain is often called:

public blockchain.

permissionless blockchain.

private blockchain.

consortium blockchain.

consortium blockchain.

New cards
49

Which of the following statement is false?

A distributed ledger contains many copies of the same ledger.

A distributed ledger stores the same set of transaction records.

Because a distributed ledger exists in a blockchain network, a computer consisting of all transaction records may crash and cause the syncing issue in the blockchain network.

A transaction record cannot be added to the blockchain unless there is network consensus.

Because a distributed ledger exists in a blockchain network, a computer consisting of all transaction records may crash and cause the syncing issue in the blockchain network.

New cards
50

Which of the following statement is false?

Hyperledger is an open source blockchain platform created by the Linux foundation.

Hyperledger is a permissioned blockchain with capabilities of handling smart contracts.

The main objective of Hyperledger is to achieve cross-industry collaboration with blockchain technology.

Hyperledger is a public blockchain.

Hyperledger is a public blockchain.

New cards
51

When we refer to smart contract in blockchain, we mean:

a contract that can be edited at any time for business rules.

a digital copy of paper contract such as a Word file.

a piece of software code that can be executed or triggered by business activities.

a digital contract that can be distributed all to the participants with all terms defined.

a piece of software code that can be executed or triggered by business activities.

New cards
52

What information does a block in the Bitcoin network not contain?

The sender

The receiver

The quantity of bitcoins to transfer

The sender and the receiver

None, a block contains all of this information.

None, a block contains all of this information.

New cards
53

Which of the following is not true with respect to artificial intelligence?

AI is a broad field in computer science.

AI is intelligence exhibited by machines rather than humans.

AI began in the 1990s.

AI is also called cognitive technologies.

None of these is true.

AI began in the 1990s.

New cards
54

Which of the following best describes the difference between artificial intelligence and machine learning?

Machine learning is a subset of AI.

Machine learning only applies to deep learning algorithms.

AI and machine learning are the same thing.

Machine learning requires less data than AI.

None of these choices are correct.

Machine learning is a subset of AI.

New cards
55

Which of the following best describes artificial neural networks?

Training a neural network involves the use of real-world data.

Deep learning is required for a neural network.

Neural networks consist of inputs, neurons or nodes, and outputs.

Neural networks only have two layers.

None of these choices are correct.

Neural networks consist of inputs, neurons or nodes, and outputs.

New cards
56

Which of the following best describes supervised learning?

The training data contain missing labels or incomplete data.

The training data match inputs to nodes in the network.

The training data contain input—output pairs.

The training data only include input values.

None of these choices are correct.

The training data contain input—output pairs.

New cards
57

Which of the following best describes a confusion matrix?

It is a table summarizing the prediction results.

It has as many rows and columns as classifications to predict.

It can be used to calculate other performance metrics.

All of these choices are correct.

All of these choices are correct.

New cards
58

If a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the precision ratio? (Round your answer to 2 decimal places.)

0.90

0.92

0.98

0.88

None of these choices are correct.

0.92 Precision: TP/(TP+FP)

New cards
59

If a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the recall ratio? (Round your answer to 2 decimal places.)

0.90

0.92

0.98

0.88

None of these choices are correct.

0.88 Recall: TP/(TP+FN)

New cards
60

If a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the accuracy ratio? (Round your answer to 2 decimal places.)

0.90

0.92

0.98

0.88

None of these choices are correct.

0.98 Accuracy: (TP+TN) / (all sum)

New cards
61

If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5 FP, what is the precision ratio? (Round your answer to 2 decimal places.)

0.90

0.92

0.99

0.83

None of these choices are correct.

0.83 Precision: TP/(TP+FP)

New cards
62

If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5 FP, what is the recall ratio? (Round your answer to 2 decimal places.)

0.90

0.92

0.99

0.83

None of these choices are correct.

0.83 Recall: TP/(TP+FN)

New cards
63

If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5 FP, what is the accuracy ratio? (Round your answer to 2 decimal places.)

0.90

0.92

0.99

0.83

None of these choices are correct.

0.99 Accuracy: (TP+TN) / (all sum)

New cards
64

Which of the following statements is false?

private blockchain requires permission to join the network

bitcoin uses smart contract to specify the business rules

in Ethereum, a new block is added evert 12 to 15 seconds

blockchain transactions are immutable

bitcoin uses smart contract to specify the business rules

New cards
65

Which of the following is created mainly for cryptocurrency application?

ethereum

hyperledger

corda

bitcoin

bitcoin

New cards
66

What is a requirement of the proof of authority algorithm?

a few members have known identities

a portion of the miner's blocks will be locked until it is validated

large quantities of computer power are requires to solve a complex mathematical problem

none of these are a requirement of the proof of authority algorithm

a few members have known identities

New cards
67

Which of the following best describes the difference between AI and machine learning?

machine learning is a subset of AI

machine learning only applies to deep learning algorithm

AI and machine learning are the same thing d. machine learning requires less data than AI

machine learning is a subset of AI

New cards
68

Which of the following best describes machine learning?

machine learning is driven by programming instructions.

machine learning is a different branch of computer science from AI

machine learning is a technique where a software model is trained using data

machine learning is the ability of a machine to think on its own.

e. none of these

machine learning is a technique where a software model is trained using data

New cards
69

which of the following is not part of the virtuous cycle of machine learning?

model

learn.

predict

data

none of these

model

New cards
70

which of the following best describes artificial neural networks?

training a neural network involves the use of real-world data

deep learning is required for a neural network

neural networks consist of inputs, neurons or nodes, and output

neural networks only have two layers e. none of these

neural networks consist of inputs, neurons or nodes, and outputs

New cards
71

Which of the following best describes deep learning?

deep learning is used to solve philosophical problems.

deep learning involves complex, multilayer neural networks

deep learning is different from machine learning in fundamental ways

deep learning provides more output values than machine learning

none of these

deep learning involves complex, multilayer neural networks

New cards
72

Which of the following is not directly related to one of the five questions that machine learning/AI is best suited to answer?

which business strategy will be most successful?

is the firm a good merger candidate?

what type of customer will like this new product

how much can we sell this product for?

none of these

which business strategy will be most successful?

New cards
73

Which of the following best describes unsupervised learning?

the training data contain missing labels or incomplete data

the training data match inputs to nodes in the network

the training data contain d. the training data only include values

none of these

the training data only include values

New cards
74

Which of the following best describes semi-supervised learning?

the training data contain missing labels or incomplete data

the training data match inputs to nodes in the network

the training data contain input-output pairs

the training data only include values

none of these

the training data contain missing labels or incomplete data

New cards
75

Which of the following best describes reinforcement learning?

the model determines how elements of the dataset are alike

the training data match inputs to nodes in the network

the training data contain input-output pairs

the model learns by trial and error

none of these

the model learns by trial and error

New cards
76

(CISA exam, adapted) Authentication is the process by which the:

system verifies that the user is entitled to enter the transaction requested. user identifies him- or herself to the system. system verifies the identity of the user. user indicates to the system that the transaction was processed correctly.

system verifies the identity of the user.

New cards
77

(CMA exam, adapted) Data processing activities may be classified in terms of three stages or processes: input, processing, and output. An activity that is not normally associated with the input stage is:

batching. verifying. recording. reporting.

reporting.

New cards
78

(CISA exam, adapted) To ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the receive message?

Private Public I II Both I and II Neither I nor II

Private

New cards
79

To authenticate the message sender in an asymmetric-key encryption system, which of the following keys is required to decrypt the received message?

Sender's private key Receiver's private key Sender's public key Receiver's public key

Sender's public key

New cards
80

To ensure the data sent over the Internet are protected, which of the following keys is required to encrypt the data (before transmission) using an asymmetric-key encryption method?

Sender's public key Sender's private key Receiver's public key Receiver's private key

Receiver's public key

New cards
81

Which of the following groups/laws was the earliest to encourage auditors to

PCAOB COBIT SAS No. 99 COSO Sarbanes-Oxley Act

SAS No. 99

New cards
82

Incentive to commit fraud usually will include all of the following, except:

inadequate segregation of duties. alcohol, drug, or gambling addiction. feelings of resentment. personal habits and lifestyle. financial pressure.

inadequate segregation of duties.

New cards
83

(CPA exam, adapted) An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?

System hardware policy Internal control policy Disaster recovery plan Supply chain management policy System security policy

Disaster recovery plan

New cards
84

A message digest is the result of hashing. Which of the following statements about the hashing process is true?

It is reversible. Comparing the hashing results can ensure confidentiality. Hashing is the best approach to make sure that two files are identical. None of the choices are true.

Hashing is the best approach to make sure that two files are identical.

New cards
85

Which one of the following vulnerabilities would create the most serious risk to a firm?

Employees writing instant messages with friends during office hours Unauthorized access to the firm's network Employees recording passwords in Excel files Using open source software (downloaded for free) on the firm's network

Unauthorized access to the firm's network

New cards
86

Which of the following statements is correct?

SOC 1 reports provide the evaluations on a broader set of controls implemented by the service provider. A spam will send a network packet that appears to come from a source other than its actual source. Multifactor authentication is less secure than requiring a user always entering a password to access a network. Fault tolerance uses redundant units to provide a system with the ability to continue functioning when part of the system fails.

Fault tolerance uses redundant units to provide a system with the ability to continue functioning when part of the system fails.

New cards
87

Which of the following can be considered as a good alternative to back up data and applications?

Continuous monitoring Business continuity management Cloud computing Disaster recover planning

Cloud computing

New cards
88

A digital certificate:

indicates that the subscriber identified has sole control and access to the private key. is used to certify public-key and private-key pairs. ensures that the symmetric-key encryption method functions well. is a trusted entity to certify and revoke Certificate Authorities (CA).

indicates that the subscriber identified has sole control and access to the private key.

New cards
89

The symmetric-key encryption method:

is slow. solves problems in key distribution and key management. uses the same key for both senders and receivers for encryption and decryption. is not appropriate for encrypting large data sets.

uses the same key for both senders and receivers for encryption and decryption.

New cards
90

The fraud triangle indicates which of the following condition(s) exist for a fraud to be perpetrated?

rationalization. pressure. legal environment. a and b are correct a, b, and c are correct

a, b, and c are correct

New cards
91

To prevent repudiation in conducting e-business, companies must be able to authenticate their trading partners. Which of the following encryption methods can be used for authentication purpose?

Symmetric-key encryption method Asymmetric-key encryption method Both symmetric-key and asymmetric-key encryption methods are good for authentication.

Asymmetric-key encryption method

New cards
92

Regarding GDPR, which of the following statements is/are correct?

It is a regulation enforced by EU. It is to protect EU citizens' personal data. It is not relevant to the companies in the U.S. a and b are correct a, b, and c are correct

a and b are correct

New cards
93

Which organization created the Reporting on an Entity's Cybersecurity Risk Management Program and Controls: Attestation Guide in 2017?

SEC AICPA US Congress Department of Homeland Security

AICPA

New cards
94

Business continuity management is a

preventive control. detective control. corrective control. Two of the choices are correct.

corrective control.

New cards
95

Encryption is a

preventive control. detective control. corrective control. Two of the choices are correct.

preventive control.

New cards
96

What is fault tolerance?

A policy allowing employees to make mistakes Using redundant units to continue functioning when a system is failing An application that can detect mistakes and correct mistakes automatically Two of the choices are correct.

Using redundant units to continue functioning when a system is failing

New cards
97

Comparing encryption with hashing, which one of the following is correct?

Hashing process is reversible. Encryption is used to ensure data integrity. Hashing results are large data. Encryption results are called cypher text.

Encryption results are called cypher text.

New cards
98

Disaster recovery plan is a

preventive control. detective control. corrective control. Two of the choices are correct.

corrective control.

New cards
99

Select a correct statement describing encryption or hashing process.

Encryption process is reversible. Hashing results are called message digests. Hashing process is used to obtain a digital signature. Encryption process is to maintain confidentiality. All of the choices are correct.

Encryption process is reversible.

New cards
100

Select a correct statement regarding encryption methods.

Most companies prefer using asymmetric-key encryption method for data transmission. Symmetric-key encryption method is used to authenticate trading partners. Only asymmetric-key encryption method can ensure confidentiality. Asymmetric-key encryption method is used to create digital signatures.

Asymmetric-key encryption method is used to create digital signatures.

New cards

Explore top notes

note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 30 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 22 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 72 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 154 people
Updated ... ago
4.3 Stars(3)
note Note
studied byStudied by 20 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17194 people
Updated ... ago
4.6 Stars(106)

Explore top flashcards

flashcards Flashcard57 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard33 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard41 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard64 terms
studied byStudied by 71 people
Updated ... ago
4.0 Stars(10)
flashcards Flashcard39 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard168 terms
studied byStudied by 106 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard45 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard122 terms
studied byStudied by 71 people
Updated ... ago
5.0 Stars(1)