Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

ACC 340 - GVSU

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
What does XBRL stand for   eXtensible Business Reporting Language  
🗑
Data about Data   Meta Data  
🗑
This has the ability to tag Quantitative and Qualitative Data   XBRL  
🗑
Who uses XBRL?   Stock Exchanges, Companies, preparers, Reviewers  
🗑
Adds data tags after reports are created   Bolt-on Tagging  
🗑
Tags data during information processing   Integrated Tagging  
🗑
Dictionary that defines XBRL tags and standardizes the tags used   Taxonomy  
🗑
Contains specific amounts for a taxonomy at one instance   Instance Reporting  
🗑
This is used for digital reporting around the world   XBRL  
🗑
This involves using risk in a proactive, constructive way to create additional value for the enterprise   Risk Intelligence  
🗑
4 Risk Responses   Avoidance, Reduction, Sharing, Acceptance  
🗑
Ongoing Business Operations decisions   Routine Operational Decisions  
🗑
Short-term impacting one year or less   Tactical Decisions  
🗑
Long term and unstructured decisions with a high degree of ambiguity   Strategic Decisions  
🗑
4 Intelligent System Components   Data Storage, Data Extraction and Transfer, Data Analysis, Data visualization  
🗑
Where should business intelligence be put?   Data Warehouse  
🗑
Disadvantages of Shadow Data   No one knows where the data is, everyone does their own thing that they were taught  
🗑
A ______ is considered intelligent when it uses tools and technology to create business intelligence   Enterprise system  
🗑
Literally needs a physical connection and wire   Ethernet protocol  
🗑
Ways to exchange business information for sales   Electronic Data Interchange (EDI)  
🗑
point where someone can hack into   Network Access point (nap)  
🗑
password that is used initially but must be changed   Dynamic password  
🗑
password and username that would gain access to many different applications (comp, blackboard, banner, etc.)   Single Sign-On  
🗑
Make sure that no one knows where accounting mainframe should be   physical security framework  
🗑
Something to take account for when determining physical security framework   Natural Disasters  
🗑
How fast can I make it so people pay me money again   Disaster Recovery  
🗑
If I go out of business for 5 days, what type of affect will my business have?   Business Continuity  
🗑
Controls that ensure that data is valid and entered correctly   Input controls  
🗑
Systems used to prevent access control attacks   Intrusion prevention system (ips)  
🗑
Backup services distributed among an organizations multiple locations   Internal sites  
🗑
Controls that ensure reports and messages reach intended recipients   output controls  
🗑
Backup services shared by two organizations   reciprocal Agreement  
🗑
A backup technique that keeps multiple backups   Grandfather-father-son method  
🗑
A commercial disaster recovery service that provides a site with air conditioning, wiring, and plumbing, but no IT equipment   Cold Site  
🗑
A commercial disaster recovery service that provides a partially configured site that is operational within a few days   Warm Site  
🗑
A hardware device that contains a password generator protocol   Token Device  
🗑
A commercial disaster recovery service that provides a fully operational site within a few hours   Hot Sites  
🗑
Located on a proxy server and used to intercept and inspect all incoming messages prior to delivering them to the intended recipient   proxy firewall  
🗑
A network that provides a secure channel to access the enterprise network   virtual private network (vpn)  
🗑
A point on the network that offers access to the network, such as an accountants computer   Network Access point (nap)  
🗑
A software program permitting an employee to use the enterprise network through a secure channel   point-to-point tunneling protocol (pptp)  
🗑
A network software program that connects one computer to another   point-to-point protocol  
🗑
A device that connects to LAN's of the same type   Bridges  
🗑
An electronic device that connects networks of different types   Routers  
🗑
A network that allows an organization to share data with suppliers   Electronic Data Interchange  
🗑
A software program that provides transportation services to messages sent over the internet   Transport control protocol  
🗑
physical media connecting computers   Network wiring (transmission media)  
🗑
A software program that allows the enterprise network to connect to the network of vendors through proprietary lines   Value-added Network  
🗑
A computer that serves other computers with data and applications   Server Computers  
🗑
A software program commonly used to connect computers on a LAN   Ethernet protocol  
🗑
A group of the same type of LAN's connected to each other by bridges   LAN cluster  
🗑
A network that allows computers to request data and other services from other specific computers on the network   Client/Server Network  
🗑
A software program that provides routing services to messages transmitted over the Internet   Internet protocol (ip)  
🗑
Specific purpose computers that monitor networks traffic and transfer messages from one network to another   routing devices  
🗑
A device connecting an enterprise intranet to the internet   Gateways  
🗑
Digital Financial Reporting that electronically tags financial information   XBRL  
🗑
ODBC   Data Extraction and Storage  
🗑
Digital Dashboard   Data Visualization  
🗑
Spreadsheet financial functions   Data Analysis  
🗑
Relational Database   Data Storage  
🗑
Query   Data Extraction and Transfer  
🗑
Star Data Warehouse Structure   Data Storage  
🗑
ETL   Data Extraction and Transfer  
🗑
predictive modeling   Data Analysis  
🗑
OLAp Cube   Data Analysis  
🗑
Data Mining   Data Analysis  
🗑
Order of ETL   Choose Operational Database Extract operational relational database Transform operational database table into data warehouse table Load data warehouse dimensional table Use data warehouse dimensional table  
🗑
Long ranged, unstructured decisions with a high degree of ambiguity are called?   Strategic decisions  
🗑
Decisions typically related to ongoing business activities are considered?   Routine operating decisions  
🗑
Semistructured decisions that are typically short term in nature and impact one year or less are considered   Tactical Decisions  
🗑
A business intelligence technique that uses mathematical algorithms to predict future trends is   predictive modeling  
🗑
A business intelligence technique used on relatively unstructured data such as emails is called   Text mining  
🗑
A business Intelligence technique used to search social networking sites for customer preferences would be reffered to as   Web mining  
🗑
A business intelligence technique used to search data stored in a data warehouse using mathematical algorithms to find patterns, trends, and relationships among data is referred to as   Data Mining  
🗑
A step-by-step solution to a problem   Algorithm  
🗑
Each spreadsheet is assigned a unique identifier   Spreadsheet Identifier  
🗑
Identifying users by analyzing their personal attributes, such as face recognition   Biometrics  
🗑
Software generally located on a routing device to monitor network traffic and prevent unauthorized access is   Firewall  
🗑
An area between the enterprise's first firewall to the outside world and the next firewall is called   DMZ  
🗑
A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be   Honeypot  
🗑
The level of variation an enterprise is willing to accept in attaining objectives   Risk Tolerance  
🗑
The amount of risk an enterprise is willing to accept pursuing value is   RIsk Appetite  
🗑
When an enterprise evaluates the extent to which events would impact its ability to achieve objectives, it is conducting   Risk Assessment  
🗑
Adding Impact and likelihood columns to a spreadhseet to evaluate risk associated with its use is:   Risk Assessment  
🗑
A policy of reconciling a bank statement to within $5 of balancing is an example of   Risk Tolerance  
🗑
The likelihood of an event occuring using qualitative measures, such as high, medium, or low   possibility  
🗑
The possibility that an event will occur and negatively impact the entity's ability to achieve its stated objectives   Risk  
🗑
The likelihood of an event occuring using quantitative measures, such as percentages   probability  
🗑
A document that records changes   Change Log  
🗑
The possibility or probability that a potential event will occur   Likelihood  
🗑
A document that records user access   User Log  
🗑
The process of determining events that effect an enterprise's ability to attain its objectives   Event Identification  
🗑
the effect that an event will have on the enterprise's ability to achieve its objectives if the event occurs   Impact  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: 504223368
Popular Accounting sets