Test Android StudyStack App
Please help StudyStack get a grant! Vote here.
or...
Reset Password Free Sign Up


incorrect cards (0)
correct cards (0)
remaining cards (0)
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the Correct box, the DOWN ARROW key to move the card to the Incorrect box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

Correct box contains:
Time elapsed:
Retries:
restart all cards



Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ACC 340 - GVSU

QuestionAnswer
What does XBRL stand for eXtensible Business Reporting Language
Data about Data Meta Data
This has the ability to tag Quantitative and Qualitative Data XBRL
Who uses XBRL? Stock Exchanges, Companies, preparers, Reviewers
Adds data tags after reports are created Bolt-on Tagging
Tags data during information processing Integrated Tagging
Dictionary that defines XBRL tags and standardizes the tags used Taxonomy
Contains specific amounts for a taxonomy at one instance Instance Reporting
This is used for digital reporting around the world XBRL
This involves using risk in a proactive, constructive way to create additional value for the enterprise Risk Intelligence
4 Risk Responses Avoidance, Reduction, Sharing, Acceptance
Ongoing Business Operations decisions Routine Operational Decisions
Short-term impacting one year or less Tactical Decisions
Long term and unstructured decisions with a high degree of ambiguity Strategic Decisions
4 Intelligent System Components Data Storage, Data Extraction and Transfer, Data Analysis, Data visualization
Where should business intelligence be put? Data Warehouse
Disadvantages of Shadow Data No one knows where the data is, everyone does their own thing that they were taught
A ______ is considered intelligent when it uses tools and technology to create business intelligence Enterprise system
Literally needs a physical connection and wire Ethernet protocol
Ways to exchange business information for sales Electronic Data Interchange (EDI)
point where someone can hack into Network Access point (nap)
password that is used initially but must be changed Dynamic password
password and username that would gain access to many different applications (comp, blackboard, banner, etc.) Single Sign-On
Make sure that no one knows where accounting mainframe should be physical security framework
Something to take account for when determining physical security framework Natural Disasters
How fast can I make it so people pay me money again Disaster Recovery
If I go out of business for 5 days, what type of affect will my business have? Business Continuity
Controls that ensure that data is valid and entered correctly Input controls
Systems used to prevent access control attacks Intrusion prevention system (ips)
Backup services distributed among an organizations multiple locations Internal sites
Controls that ensure reports and messages reach intended recipients output controls
Backup services shared by two organizations reciprocal Agreement
A backup technique that keeps multiple backups Grandfather-father-son method
A commercial disaster recovery service that provides a site with air conditioning, wiring, and plumbing, but no IT equipment Cold Site
A commercial disaster recovery service that provides a partially configured site that is operational within a few days Warm Site
A hardware device that contains a password generator protocol Token Device
A commercial disaster recovery service that provides a fully operational site within a few hours Hot Sites
Located on a proxy server and used to intercept and inspect all incoming messages prior to delivering them to the intended recipient proxy firewall
A network that provides a secure channel to access the enterprise network virtual private network (vpn)
A point on the network that offers access to the network, such as an accountants computer Network Access point (nap)
A software program permitting an employee to use the enterprise network through a secure channel point-to-point tunneling protocol (pptp)
A network software program that connects one computer to another point-to-point protocol
A device that connects to LAN's of the same type Bridges
An electronic device that connects networks of different types Routers
A network that allows an organization to share data with suppliers Electronic Data Interchange
A software program that provides transportation services to messages sent over the internet Transport control protocol
physical media connecting computers Network wiring (transmission media)
A software program that allows the enterprise network to connect to the network of vendors through proprietary lines Value-added Network
A computer that serves other computers with data and applications Server Computers
A software program commonly used to connect computers on a LAN Ethernet protocol
A group of the same type of LAN's connected to each other by bridges LAN cluster
A network that allows computers to request data and other services from other specific computers on the network Client/Server Network
A software program that provides routing services to messages transmitted over the Internet Internet protocol (ip)
Specific purpose computers that monitor networks traffic and transfer messages from one network to another routing devices
A device connecting an enterprise intranet to the internet Gateways
Digital Financial Reporting that electronically tags financial information XBRL
ODBC Data Extraction and Storage
Digital Dashboard Data Visualization
Spreadsheet financial functions Data Analysis
Relational Database Data Storage
Query Data Extraction and Transfer
Star Data Warehouse Structure Data Storage
ETL Data Extraction and Transfer
predictive modeling Data Analysis
OLAp Cube Data Analysis
Data Mining Data Analysis
Order of ETL Choose Operational Database Extract operational relational database Transform operational database table into data warehouse table Load data warehouse dimensional table Use data warehouse dimensional table
Long ranged, unstructured decisions with a high degree of ambiguity are called? Strategic decisions
Decisions typically related to ongoing business activities are considered? Routine operating decisions
Semistructured decisions that are typically short term in nature and impact one year or less are considered Tactical Decisions
A business intelligence technique that uses mathematical algorithms to predict future trends is predictive modeling
A business intelligence technique used on relatively unstructured data such as emails is called Text mining
A business Intelligence technique used to search social networking sites for customer preferences would be reffered to as Web mining
A business intelligence technique used to search data stored in a data warehouse using mathematical algorithms to find patterns, trends, and relationships among data is referred to as Data Mining
A step-by-step solution to a problem Algorithm
Each spreadsheet is assigned a unique identifier Spreadsheet Identifier
Identifying users by analyzing their personal attributes, such as face recognition Biometrics
Software generally located on a routing device to monitor network traffic and prevent unauthorized access is Firewall
An area between the enterprise's first firewall to the outside world and the next firewall is called DMZ
A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be Honeypot
The level of variation an enterprise is willing to accept in attaining objectives Risk Tolerance
The amount of risk an enterprise is willing to accept pursuing value is RIsk Appetite
When an enterprise evaluates the extent to which events would impact its ability to achieve objectives, it is conducting Risk Assessment
Adding Impact and likelihood columns to a spreadhseet to evaluate risk associated with its use is: Risk Assessment
A policy of reconciling a bank statement to within $5 of balancing is an example of Risk Tolerance
The likelihood of an event occuring using qualitative measures, such as high, medium, or low possibility
The possibility that an event will occur and negatively impact the entity's ability to achieve its stated objectives Risk
The likelihood of an event occuring using quantitative measures, such as percentages probability
A document that records changes Change Log
The possibility or probability that a potential event will occur Likelihood
A document that records user access User Log
The process of determining events that effect an enterprise's ability to attain its objectives Event Identification
the effect that an event will have on the enterprise's ability to achieve its objectives if the event occurs Impact
Created by: Carston Clark Carston Clark on 2013-04-24



Copyright ©2001-2014  StudyStack LLC   All rights reserved.