click below
click below
Normal Size Small Size show me how
ACC 340 - GVSU
| Question | Answer |
|---|---|
| What does XBRL stand for | eXtensible Business Reporting Language |
| Data about Data | Meta Data |
| This has the ability to tag Quantitative and Qualitative Data | XBRL |
| Who uses XBRL? | Stock Exchanges, Companies, preparers, Reviewers |
| Adds data tags after reports are created | Bolt-on Tagging |
| Tags data during information processing | Integrated Tagging |
| Dictionary that defines XBRL tags and standardizes the tags used | Taxonomy |
| Contains specific amounts for a taxonomy at one instance | Instance Reporting |
| This is used for digital reporting around the world | XBRL |
| This involves using risk in a proactive, constructive way to create additional value for the enterprise | Risk Intelligence |
| 4 Risk Responses | Avoidance, Reduction, Sharing, Acceptance |
| Ongoing Business Operations decisions | Routine Operational Decisions |
| Short-term impacting one year or less | Tactical Decisions |
| Long term and unstructured decisions with a high degree of ambiguity | Strategic Decisions |
| 4 Intelligent System Components | Data Storage, Data Extraction and Transfer, Data Analysis, Data visualization |
| Where should business intelligence be put? | Data Warehouse |
| Disadvantages of Shadow Data | No one knows where the data is, everyone does their own thing that they were taught |
| A ______ is considered intelligent when it uses tools and technology to create business intelligence | Enterprise system |
| Literally needs a physical connection and wire | Ethernet protocol |
| Ways to exchange business information for sales | Electronic Data Interchange (EDI) |
| point where someone can hack into | Network Access point (nap) |
| password that is used initially but must be changed | Dynamic password |
| password and username that would gain access to many different applications (comp, blackboard, banner, etc.) | Single Sign-On |
| Make sure that no one knows where accounting mainframe should be | physical security framework |
| Something to take account for when determining physical security framework | Natural Disasters |
| How fast can I make it so people pay me money again | Disaster Recovery |
| If I go out of business for 5 days, what type of affect will my business have? | Business Continuity |
| Controls that ensure that data is valid and entered correctly | Input controls |
| Systems used to prevent access control attacks | Intrusion prevention system (ips) |
| Backup services distributed among an organizations multiple locations | Internal sites |
| Controls that ensure reports and messages reach intended recipients | output controls |
| Backup services shared by two organizations | reciprocal Agreement |
| A backup technique that keeps multiple backups | Grandfather-father-son method |
| A commercial disaster recovery service that provides a site with air conditioning, wiring, and plumbing, but no IT equipment | Cold Site |
| A commercial disaster recovery service that provides a partially configured site that is operational within a few days | Warm Site |
| A hardware device that contains a password generator protocol | Token Device |
| A commercial disaster recovery service that provides a fully operational site within a few hours | Hot Sites |
| Located on a proxy server and used to intercept and inspect all incoming messages prior to delivering them to the intended recipient | proxy firewall |
| A network that provides a secure channel to access the enterprise network | virtual private network (vpn) |
| A point on the network that offers access to the network, such as an accountants computer | Network Access point (nap) |
| A software program permitting an employee to use the enterprise network through a secure channel | point-to-point tunneling protocol (pptp) |
| A network software program that connects one computer to another | point-to-point protocol |
| A device that connects to LAN's of the same type | Bridges |
| An electronic device that connects networks of different types | Routers |
| A network that allows an organization to share data with suppliers | Electronic Data Interchange |
| A software program that provides transportation services to messages sent over the internet | Transport control protocol |
| physical media connecting computers | Network wiring (transmission media) |
| A software program that allows the enterprise network to connect to the network of vendors through proprietary lines | Value-added Network |
| A computer that serves other computers with data and applications | Server Computers |
| A software program commonly used to connect computers on a LAN | Ethernet protocol |
| A group of the same type of LAN's connected to each other by bridges | LAN cluster |
| A network that allows computers to request data and other services from other specific computers on the network | Client/Server Network |
| A software program that provides routing services to messages transmitted over the Internet | Internet protocol (ip) |
| Specific purpose computers that monitor networks traffic and transfer messages from one network to another | routing devices |
| A device connecting an enterprise intranet to the internet | Gateways |
| Digital Financial Reporting that electronically tags financial information | XBRL |
| ODBC | Data Extraction and Storage |
| Digital Dashboard | Data Visualization |
| Spreadsheet financial functions | Data Analysis |
| Relational Database | Data Storage |
| Query | Data Extraction and Transfer |
| Star Data Warehouse Structure | Data Storage |
| ETL | Data Extraction and Transfer |
| predictive modeling | Data Analysis |
| OLAp Cube | Data Analysis |
| Data Mining | Data Analysis |
| Order of ETL | Choose Operational Database Extract operational relational database Transform operational database table into data warehouse table Load data warehouse dimensional table Use data warehouse dimensional table |
| Long ranged, unstructured decisions with a high degree of ambiguity are called? | Strategic decisions |
| Decisions typically related to ongoing business activities are considered? | Routine operating decisions |
| Semistructured decisions that are typically short term in nature and impact one year or less are considered | Tactical Decisions |
| A business intelligence technique that uses mathematical algorithms to predict future trends is | predictive modeling |
| A business intelligence technique used on relatively unstructured data such as emails is called | Text mining |
| A business Intelligence technique used to search social networking sites for customer preferences would be reffered to as | Web mining |
| A business intelligence technique used to search data stored in a data warehouse using mathematical algorithms to find patterns, trends, and relationships among data is referred to as | Data Mining |
| A step-by-step solution to a problem | Algorithm |
| Each spreadsheet is assigned a unique identifier | Spreadsheet Identifier |
| Identifying users by analyzing their personal attributes, such as face recognition | Biometrics |
| Software generally located on a routing device to monitor network traffic and prevent unauthorized access is | Firewall |
| An area between the enterprise's first firewall to the outside world and the next firewall is called | DMZ |
| A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be | Honeypot |
| The level of variation an enterprise is willing to accept in attaining objectives | Risk Tolerance |
| The amount of risk an enterprise is willing to accept pursuing value is | RIsk Appetite |
| When an enterprise evaluates the extent to which events would impact its ability to achieve objectives, it is conducting | Risk Assessment |
| Adding Impact and likelihood columns to a spreadhseet to evaluate risk associated with its use is: | Risk Assessment |
| A policy of reconciling a bank statement to within $5 of balancing is an example of | Risk Tolerance |
| The likelihood of an event occuring using qualitative measures, such as high, medium, or low | possibility |
| The possibility that an event will occur and negatively impact the entity's ability to achieve its stated objectives | Risk |
| The likelihood of an event occuring using quantitative measures, such as percentages | probability |
| A document that records changes | Change Log |
| The possibility or probability that a potential event will occur | Likelihood |
| A document that records user access | User Log |
| The process of determining events that effect an enterprise's ability to attain its objectives | Event Identification |
| the effect that an event will have on the enterprise's ability to achieve its objectives if the event occurs | Impact |