Info
Warning
Danger

Accounting Expert Answers, Study Resources & Learning Aids

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
106) What difficulties do Web sites face in terms of finding advertisers? What role does Google AdSense play in this process? 107) Explain how B2C businesses can benefit from using Web 2.0 applications such as Google Analytics. 108) Explain how social media helps organizations' promotion processes. 109) Explain how networking social media can.
8 Views
View Answer
31) With unsupervised data mining, analysts create a model or hypothesis before running the analysis . 32) Regression analysis is an example of unsupervised data mining. 33) Postelection analysis is an example of supervised data mining. 34) Supervised data analysis is also known as data-driven analysis. 35) A BI server is used by an.
8 Views
View Answer
11) A digital dashboard is an electronic medium used to output data in the reporting process. 12) Noninteractive analyses use a predetermined structure for their output. 13) RFM analysis produces interactive reports to analyze purchasing patterns. 14) An RFM analysis analyzes and ranks customers based on demographic characteristics. 15) An RFM analysis considers how.
13 Views
View Answer
71) As a source of security vulnerabilities, malicious human activity includes ________. A) poorly designed procedures B) intentional destruction of data C) physical accidents D) poorly written applications 72) ________ refers to social engineering in which someone deceives by pretending to be someone else. A) Pretexting B) Spyware C) Sniffing D) Denial-of-service 73) ________ is a social engineering technique in.
6 Views
View Answer
1) Web 2.0 generally refers to a loose grouping of capabilities, technologies, business models, and philosophies. 2) Web 2.0 began to emerge early in the 2000s as network technologies rapidly matured. 3) The interfaces of Web 2.0 applications do not change frequently. 4) Traditional applications are designed to support interaction and communication. 5) New.
26 Views
View Answer
41) The labor requirements of Web 2.0 applications can be easily estimated. 42) Web 2.0 applications are most suited for processes that involve financial assets. 43) Crackpots are users who spread positive information about companies. 44) Organizations run the risk of unfavorable customer reviews when using Web 2.0 technology. 45) Mutinous movements are positive.
5 Views
View Answer
21) AdSense searches an organization's Web site and inserts ads that match content on that site. 22) Google Analytics is an application specifically designed for B2B businesses. 23) On Google Analytics, the conversion rate is the ratio of the number of customers who visited the site divided by the number who eventually.
7 Views
View Answer
81) ________ is the most popular professional networking social media site. A) LinkedIn B) Facebook C) HR.com D) Google+ 82) ________ is the outsourcing of a task that traditionally was done by an employee to a large, undefined group of people. A) Insourcing B) Crowdsourcing C) Co-sourcing D) Homesourcing 83) ________ refers to the investment in social relations with the.
8 Views
View Answer
101) What is BPM? What are the basic activities in BPM? 102) Briefly explain the modeling activity of BPM. 103) List the activities in the SDLC process. 104) Briefly describe the requirements determination stage of the SDLC process. 105) Briefly describe the tasks in the implementation activity of the SDLC process. .
6 Views
View Answer
71) The processes supported by Web 2.0 and social media are typically ________. A) dynamic processes B) procedural activities C) day-to-day activities D) operational processes 72) Which of the following is Google's pay-per-click advertising product? A) AdWords B) AdCenter C) Foursquare D) Live Ads 73) With AdWords, Google charges advertisers when ________. A) customers use a search word that the advertiser.
7 Views
View Answer
105) Briefly describe the four basic activities of a project's lifetime. 106) What is the difference between synchronous communication and asynchronous communication? 107) What are some of the tools that facilitate synchronous communication? 108) Describe the problems associated with sharing content using e-mails and shared servers. 109) What is version management? Name.
7 Views
View Answer
51) A credit card provider uses a software to determine the likelihood of customers defaulting on their payments. The software assigns a credit score to each customer based on their past transactional records. This software is an example of a(n) ________ system. A) project management B) business intelligence C) collaboration D) budgeting 52) Which of.
5 Views
View Answer
91) A ________ is a computing device or a program that prevents unauthorized network access. A) firewall B) payload C) bot D) hot site 92) A virus is a computer program that ________. A) observes the user's actions and keystrokes B) replicates itself C) encrypts data D) prevents unauthorized network access 93) ________ are viruses that masquerade as useful programs.
5 Views
View Answer
61) A digital dashboard is a(n) ________. A) electronic input device used in business intelligence systems B) information system that is used to enter data into databases C) electronic display that is customized for a particular user D) digital device in the central processing unit of a BI system 62) Noninteractive analyses ________. A) use advanced.
6 Views
View Answer
71) An OLAP measure is a(n) ________. A) characteristic of an OLAP report B) data item to be processed in an OLAP report C) attribute of an OLAP report D) detailed report on a data structure 72) An OLAP ________ is a characteristic or attribute of a measure. A) cube B) dimension C) dashboard D) cluster 73) An OLAP.
5 Views
View Answer
21) IP spoofing is a situation in which a computer registers on a network without using an IP address. 22) Sniffing is a technique for intercepting computer communications. 23) Hacking occurs when a person gains unauthorized access to a computer system. 24) Denial-of-service attacks involve the sending of anonymous e-mails to users. 25) Natural.
9 Views
View Answer
51) The Web 2.0 business model relies on ________. A) software licensing B) subscription fees C) advertising D) content syndication 52) Which of the following is an example of traditional licensed software? A) MS Office B) Twitter C) eBay D) Google Docs 53) Which of the following is an example of a Web 2.0 application? A) Facebook B) MS Office C) TurboTax D) Encyclopedia.
6 Views
View Answer
11) Web sites such as Facebook, Twitter, and LinkedIn are examples of social media. 12) Sharing social media sites allow users to collaborate with each other. 13) Sharing social media sites emphasize user contributions in the form of messages and videos. 14) Facebook and LinkedIn are examples of networking media. 15) Wikipedia and Digg.
12 Views
View Answer
110) What is the difference between traditional capital and human capital? 111) What is social capital? 112) What are the benefits of building social capital? 113) What are the three objectives of building social capital? 114) What is meant by "the strength of a relationship" in the context of social capital? How can an.
17 Views
View Answer
91) An individual uses a company's Facebook page to promote a political party that he supports. He also publishes his views about unrelated topics on the page. This user is called a ________. A) spambot B) hacker C) crackpot D) phisher 92) A company discovers that its Facebook page contains numerous complaints from customers about.
14 Views
View Answer
Objective 3 1) The Vendors Module of a baseline accounting system relates to the sales cycle. 2) The Customer Module of a baseline accounting system includes creating purchase orders. 3) The Banking Module of a baseline accounting system includes bill paying transactions. 4) Accounting software often includes a navigation screen that represents the major.
8 Views
View Answer
101) Briefly describe the informing process. 102) List the major activities in the informing process. 103) Briefly describe the features of the reporting process. 104) Briefly describe the data mining process. 105) List the five basic operations that a reporting process uses to analyze data. .
5 Views
View Answer
61) Why is social media considered a type of Web 2.0 application? A) Social media does not alter the point of interaction between the user and the computer. B) Social media promotes one-way communication. C) Social media is driven by user-generated content. D) Social media uses proprietary technologies to create and manage content. 62) ________.
6 Views
View Answer
1) BPM is a recurring process for systematically monitoring, modeling, creating, and implementing business processes. 2) Managers evaluate process measures against their objectives and respond to changes in the business climate during the modeling activity of BPM. 3) New process modeling is not necessary if a process change involves only alterations in.
29 Views
View Answer
11) Business Intelligence tools use queries to extract data directly from the relational database, bypassing the OLAP cube and any accompanying delay. 12) Data cubes allow you to view data in two dimensions. 13) Structured Query Language is used to query a relational database. Match the following cycles with their corresponding accounting system.
8 Views
View Answer
110) What are Office Web Apps? 111) Compare version-management systems with version-control systems. 112) What is Microsoft SharePoint? 113) What is a SharePoint site? 114) Explain how document libraries are used in SharePoint. 115) What is workflow control? Explain how it is performed in SharePoint. 116) What is difference between a sequential workflow and.
15 Views
View Answer
1) A business intelligence system is an information system that supports business processes by consolidating and analyzing data in a large database to help users create information. 2) Analyzing patterns in databases is a function of business intelligence. 3) Business intelligence refers to an information system that supports a process called informing. 4).
25 Views
View Answer
31) Unlike other forms of capital, the benefits of social capital do not spill over to other processes. 32) Traditional capital refers to investments into resources such as factories, machines, manufacturing equipment, and the like. 33) Human capital is the investment in social relations with the expectation of benefits in the marketplace. 34).
8 Views
View Answer
111) What is spoofing? What are the two types of spoofing? 112) What is hacking? 113) In the context of information systems, what is meant by safeguards? 114) Briefly describe management's role in information systems security. 115) What is biometric authentication? What are its advantages and disadvantages? .
11 Views
View Answer
106) What is the difference between pilot installation and phased installation? 107) What is the difference between parallel installation and plunge installation? 108) Discuss the approach of designing business processes before building information systems. 109) What are the major sources of security vulnerabilities? 110) What is meant by pretexting and phishing? .
5 Views
View Answer
51) During the ________ activity of BPM, managers evaluate process measures against their objectives and respond to changes in the business climate. A) component creation B) monitoring C) modeling D) process implementation 52) During the modeling activity of BPM, teams build an as-is model which ________. A) simulates the ideal situation B) designs new business processes C) documents.
6 Views
View Answer
116) Differentiate between symmetric encryption and asymmetric encryption. 117) Briefly describe a virus, a Trojan horse, and a worm. 118) Explain the importance of position definitions in information security. 119) Differentiate between a hot site and a cold site. .
9 Views
View Answer
101) What is social media? Explain with the help of examples. 102) Compare and contrast sharing social media and networking media with the help of examples. 103) What is collaborating media? 104) What types of processes are typically supported by Web 2.0 applications? 105) Explain the functioning of Google AdWords. .
9 Views
View Answer
41) A bot is a computer program that is surreptitiously installed and takes actions unknown and uncontrolled by the computer's owner or administrator. 42) The practice of keeping a copy of an encryption key with a trusted party is referred to as key escrow. 43) Documenting position sensitivity enables security personnel to.
6 Views
View Answer
91) Granularity refers to the ________. A) problems that persist within data B) level of detail of the data C) inconsistencies within data D) patterns derived from operational data 92) ________ data include everything a customer does at a Web site. A) Real-time B) Clickstream C) Keystroke D) Digital 93) Which of the following BI-related problems is commonly associated with.
6 Views
View Answer
31) Biometric authentication uses personal physical characteristics to authenticate users. 32) A key is a number used to encrypt data. 33) Two different keys are used for coding and decoding in symmetric encryption. 34) A public key is used for decoding messages in asymmetric encryption. 35) Most secure communication over the Internet uses a.
9 Views
View Answer
Objective 1 1) An IT auditor must understand the terms and definitions used by accounting and IT professionals. 2) Which of the following are NOT part of the basic functions of an enterprise system? A) Hiring B) Output C) Input D) Processing Objective 2 1) A Supply Chain Management (SCM) system is a subsystem of an Accounting System. 2).
20 Views
View Answer
21) With an OLAP report, it is possible to drill down into data. 22) The primary objective of a reporting process is predicting patterns and relationships in data. 23) Data mining analyses are noninteractive. 24) The data mining process uses advanced statistical techniques to find patterns and relationships among data for classification and.
7 Views
View Answer
21) To obtain a deep understanding of the underlying business of an enterprise system servers, you need to ask key questions. What are those questions? 22) How does an enterprise system support people in the same company to perform different but related business activities? Please provide an example. 23) You are an.
10 Views
View Answer
99) Explain the importance of critical feedback in collaboration. 100) List the three primary purposes for which businesses use collaborative teams. 101) What are operational decisions? Provide an example. 102) Compare and contrast managerial decisions with strategic decisions. 103) How does the need for collaboration vary with the types of decisions? 104) What is.
9 Views
View Answer
11) A test plan is an informal description of how an information system's components should be tested. 12) The term system conversion refers to the process of testing software. 13) With pilot installation, an organization implements a limited portion of a new business process on the entire organization. 14) With parallel installation, a.
15 Views
View Answer
61) A(n) ________ is a formal description of a system's response to use and misuse scenarios. A) test plan B) as-is model C) digital certificate D) code injection 62) The term system conversion refers to the phase in which an organization ________. A) designs the software for a new system B) installs a new system C) tests a.
6 Views
View Answer
81) Which of the following is NOT an element of computer security? A) System owners should not have computer security responsibilities outside their own organizations. B) Computer security responsibilities and accountability should be made explicit. C) Computer security is constrained by societal factors. D) Computer security should be periodically reassessed. 82) Which of the following.
6 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*