Info
Warning
Danger

Study Resources (Accounting)

61) A(n) ________ is a formal description of a system's response to use and misuse scenarios. A) test plan B) as-is model C) digital certificate D) code injection 62) The term system conversion refers to the phase in which an organization ________. A) designs the software for a new system B) installs a new system C) tests a.
5 Views
View Answer
21) To obtain a deep understanding of the underlying business of an enterprise system servers, you need to ask key questions. What are those questions? 22) How does an enterprise system support people in the same company to perform different but related business activities? Please provide an example. 23) You are an.
7 Views
View Answer
116) Differentiate between symmetric encryption and asymmetric encryption. 117) Briefly describe a virus, a Trojan horse, and a worm. 118) Explain the importance of position definitions in information security. 119) Differentiate between a hot site and a cold site. .
5 Views
View Answer
41) A bot is a computer program that is surreptitiously installed and takes actions unknown and uncontrolled by the computer's owner or administrator. 42) The practice of keeping a copy of an encryption key with a trusted party is referred to as key escrow. 43) Documenting position sensitivity enables security personnel to.
5 Views
View Answer
51) During the ________ activity of BPM, managers evaluate process measures against their objectives and respond to changes in the business climate. A) component creation B) monitoring C) modeling D) process implementation 52) During the modeling activity of BPM, teams build an as-is model which ________. A) simulates the ideal situation B) designs new business processes C) documents.
5 Views
View Answer
71) An OLAP measure is a(n) ________. A) characteristic of an OLAP report B) data item to be processed in an OLAP report C) attribute of an OLAP report D) detailed report on a data structure 72) An OLAP ________ is a characteristic or attribute of a measure. A) cube B) dimension C) dashboard D) cluster 73) An OLAP.
4 Views
View Answer
11) Web sites such as Facebook, Twitter, and LinkedIn are examples of social media. 12) Sharing social media sites allow users to collaborate with each other. 13) Sharing social media sites emphasize user contributions in the form of messages and videos. 14) Facebook and LinkedIn are examples of networking media. 15) Wikipedia and Digg.
9 Views
View Answer
Objective 3 1) The Vendors Module of a baseline accounting system relates to the sales cycle. 2) The Customer Module of a baseline accounting system includes creating purchase orders. 3) The Banking Module of a baseline accounting system includes bill paying transactions. 4) Accounting software often includes a navigation screen that represents the major.
5 Views
View Answer
11) A digital dashboard is an electronic medium used to output data in the reporting process. 12) Noninteractive analyses use a predetermined structure for their output. 13) RFM analysis produces interactive reports to analyze purchasing patterns. 14) An RFM analysis analyzes and ranks customers based on demographic characteristics. 15) An RFM analysis considers how.
9 Views
View Answer
61) Why is social media considered a type of Web 2.0 application? A) Social media does not alter the point of interaction between the user and the computer. B) Social media promotes one-way communication. C) Social media is driven by user-generated content. D) Social media uses proprietary technologies to create and manage content. 62) ________.
5 Views
View Answer
1) BPM is a recurring process for systematically monitoring, modeling, creating, and implementing business processes. 2) Managers evaluate process measures against their objectives and respond to changes in the business climate during the modeling activity of BPM. 3) New process modeling is not necessary if a process change involves only alterations in.
20 Views
View Answer
106) What difficulties do Web sites face in terms of finding advertisers? What role does Google AdSense play in this process? 107) Explain how B2C businesses can benefit from using Web 2.0 applications such as Google Analytics. 108) Explain how social media helps organizations' promotion processes. 109) Explain how networking social media can.
6 Views
View Answer
21) IP spoofing is a situation in which a computer registers on a network without using an IP address. 22) Sniffing is a technique for intercepting computer communications. 23) Hacking occurs when a person gains unauthorized access to a computer system. 24) Denial-of-service attacks involve the sending of anonymous e-mails to users. 25) Natural.
8 Views
View Answer
101) Briefly describe the informing process. 102) List the major activities in the informing process. 103) Briefly describe the features of the reporting process. 104) Briefly describe the data mining process. 105) List the five basic operations that a reporting process uses to analyze data. .
4 Views
View Answer
1) A business intelligence system is an information system that supports business processes by consolidating and analyzing data in a large database to help users create information. 2) Analyzing patterns in databases is a function of business intelligence. 3) Business intelligence refers to an information system that supports a process called informing. 4).
18 Views
View Answer
91) An individual uses a company's Facebook page to promote a political party that he supports. He also publishes his views about unrelated topics on the page. This user is called a ________. A) spambot B) hacker C) crackpot D) phisher 92) A company discovers that its Facebook page contains numerous complaints from customers about.
10 Views
View Answer
21) Which transactions are usually performed in the Customers module of the Baseline Accounting System? A) Receive inventory B) Create invoice C) Create purchase order D) Pay bills 22) The sales cycle corresponds to which module in the Baseline Accounting System? A) Banking B) Vendors C) Customers D) Employees 23) Which event is part of the Purchasing Cycle? A) Pay bill B).
5 Views
View Answer
110) What is the difference between traditional capital and human capital? 111) What is social capital? 112) What are the benefits of building social capital? 113) What are the three objectives of building social capital? 114) What is meant by "the strength of a relationship" in the context of social capital? How can an.
13 Views
View Answer
Objective 1 1) An IT auditor must understand the terms and definitions used by accounting and IT professionals. 2) Which of the following are NOT part of the basic functions of an enterprise system? A) Hiring B) Output C) Input D) Processing Objective 2 1) A Supply Chain Management (SCM) system is a subsystem of an Accounting System. 2).
15 Views
View Answer
31) Which accounting software is designed for a large-scale company? A) Oracle's PeopleSoft Enterprise B) SAP Business All-In-One C) Oracle's JD Edwards EnterpriseOne D) SAP Business One 32) When designing a database, which field would NOT belong in a table storing customer information? A) First Name B) Order Number C) Zip Code D) Street Address 33) When designing a database,.
2 Views
View Answer
51) A credit card provider uses a software to determine the likelihood of customers defaulting on their payments. The software assigns a credit score to each customer based on their past transactional records. This software is an example of a(n) ________ system. A) project management B) business intelligence C) collaboration D) budgeting 52) Which of.
4 Views
View Answer
111) What is spoofing? What are the two types of spoofing? 112) What is hacking? 113) In the context of information systems, what is meant by safeguards? 114) Briefly describe management's role in information systems security. 115) What is biometric authentication? What are its advantages and disadvantages? .
5 Views
View Answer
101) What is social media? Explain with the help of examples. 102) Compare and contrast sharing social media and networking media with the help of examples. 103) What is collaborating media? 104) What types of processes are typically supported by Web 2.0 applications? 105) Explain the functioning of Google AdWords. .
7 Views
View Answer
61) A digital dashboard is a(n) ________. A) electronic input device used in business intelligence systems B) information system that is used to enter data into databases C) electronic display that is customized for a particular user D) digital device in the central processing unit of a BI system 62) Noninteractive analyses ________. A) use advanced.
5 Views
View Answer
71) As a source of security vulnerabilities, malicious human activity includes ________. A) poorly designed procedures B) intentional destruction of data C) physical accidents D) poorly written applications 72) ________ refers to social engineering in which someone deceives by pretending to be someone else. A) Pretexting B) Spyware C) Sniffing D) Denial-of-service 73) ________ is a social engineering technique in.
5 Views
View Answer
91) A ________ is a computing device or a program that prevents unauthorized network access. A) firewall B) payload C) bot D) hot site 92) A virus is a computer program that ________. A) observes the user's actions and keystrokes B) replicates itself C) encrypts data D) prevents unauthorized network access 93) ________ are viruses that masquerade as useful programs.
4 Views
View Answer
81) Which of the following is NOT an element of computer security? A) System owners should not have computer security responsibilities outside their own organizations. B) Computer security responsibilities and accountability should be made explicit. C) Computer security is constrained by societal factors. D) Computer security should be periodically reassessed. 82) Which of the following.
5 Views
View Answer
31) Biometric authentication uses personal physical characteristics to authenticate users. 32) A key is a number used to encrypt data. 33) Two different keys are used for coding and decoding in symmetric encryption. 34) A public key is used for decoding messages in asymmetric encryption. 35) Most secure communication over the Internet uses a.
5 Views
View Answer
11) Business Intelligence tools use queries to extract data directly from the relational database, bypassing the OLAP cube and any accompanying delay. 12) Data cubes allow you to view data in two dimensions. 13) Structured Query Language is used to query a relational database. Match the following cycles with their corresponding accounting system.
7 Views
View Answer
101) What is BPM? What are the basic activities in BPM? 102) Briefly explain the modeling activity of BPM. 103) List the activities in the SDLC process. 104) Briefly describe the requirements determination stage of the SDLC process. 105) Briefly describe the tasks in the implementation activity of the SDLC process. .
3 Views
View Answer
11) A test plan is an informal description of how an information system's components should be tested. 12) The term system conversion refers to the process of testing software. 13) With pilot installation, an organization implements a limited portion of a new business process on the entire organization. 14) With parallel installation, a.
10 Views
View Answer
71) The processes supported by Web 2.0 and social media are typically ________. A) dynamic processes B) procedural activities C) day-to-day activities D) operational processes 72) Which of the following is Google's pay-per-click advertising product? A) AdWords B) AdCenter C) Foursquare D) Live Ads 73) With AdWords, Google charges advertisers when ________. A) customers use a search word that the advertiser.
4 Views
View Answer
51) The Web 2.0 business model relies on ________. A) software licensing B) subscription fees C) advertising D) content syndication 52) Which of the following is an example of traditional licensed software? A) MS Office B) Twitter C) eBay D) Google Docs 53) Which of the following is an example of a Web 2.0 application? A) Facebook B) MS Office C) TurboTax D) Encyclopedia.
4 Views
View Answer
91) Granularity refers to the ________. A) problems that persist within data B) level of detail of the data C) inconsistencies within data D) patterns derived from operational data 92) ________ data include everything a customer does at a Web site. A) Real-time B) Clickstream C) Keystroke D) Digital 93) Which of the following BI-related problems is commonly associated with.
4 Views
View Answer
21) AdSense searches an organization's Web site and inserts ads that match content on that site. 22) Google Analytics is an application specifically designed for B2B businesses. 23) On Google Analytics, the conversion rate is the ratio of the number of customers who visited the site divided by the number who eventually.
6 Views
View Answer
1) Web 2.0 generally refers to a loose grouping of capabilities, technologies, business models, and philosophies. 2) Web 2.0 began to emerge early in the 2000s as network technologies rapidly matured. 3) The interfaces of Web 2.0 applications do not change frequently. 4) Traditional applications are designed to support interaction and communication. 5) New.
20 Views
View Answer
41) The labor requirements of Web 2.0 applications can be easily estimated. 42) Web 2.0 applications are most suited for processes that involve financial assets. 43) Crackpots are users who spread positive information about companies. 44) Organizations run the risk of unfavorable customer reviews when using Web 2.0 technology. 45) Mutinous movements are positive.
4 Views
View Answer
106) What is the difference between pilot installation and phased installation? 107) What is the difference between parallel installation and plunge installation? 108) Discuss the approach of designing business processes before building information systems. 109) What are the major sources of security vulnerabilities? 110) What is meant by pretexting and phishing? .
4 Views
View Answer
81) ________ is the most popular professional networking social media site. A) LinkedIn B) Facebook C) HR.com D) Google+ 82) ________ is the outsourcing of a task that traditionally was done by an employee to a large, undefined group of people. A) Insourcing B) Crowdsourcing C) Co-sourcing D) Homesourcing 83) ________ refers to the investment in social relations with the.
6 Views
View Answer
21) With an OLAP report, it is possible to drill down into data. 22) The primary objective of a reporting process is predicting patterns and relationships in data. 23) Data mining analyses are noninteractive. 24) The data mining process uses advanced statistical techniques to find patterns and relationships among data for classification and.
5 Views
View Answer
31) With unsupervised data mining, analysts create a model or hypothesis before running the analysis . 32) Regression analysis is an example of unsupervised data mining. 33) Postelection analysis is an example of supervised data mining. 34) Supervised data analysis is also known as data-driven analysis. 35) A BI server is used by an.
6 Views
View Answer
31) Unlike other forms of capital, the benefits of social capital do not spill over to other processes. 32) Traditional capital refers to investments into resources such as factories, machines, manufacturing equipment, and the like. 33) Human capital is the investment in social relations with the expectation of benefits in the marketplace. 34).
5 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

d
Let us boost your grade together!

Get 24/7 homework help from Experts

Let our knowledge be your backup

1

Submit your homework question or assignment

2

Receive a quote & Make the Payment

3

Sit Back & Relax to Earn Better Grades!

Drag files here or Browse your Device

Maximum file size 10MB
17,475 Accounting Questions Answered! Get Answer

We are The Best Because

  • On Time Delivery
  • Plagiarism ReportFree
  • Unlimited RevisionsFree
  • 100% Privacy & Confidential
  • 24/7 Live Chat Support
4.9 (16192 Ratings)
You can communicate directly with your expert until the solution quality is delivered to your complete satisfaction.
Looking for writing help?
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!