ACC 340 - GVSU
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
What does XBRL stand for | eXtensible Business Reporting Language
🗑
|
||||
Data about Data | Meta Data
🗑
|
||||
This has the ability to tag Quantitative and Qualitative Data | XBRL
🗑
|
||||
Who uses XBRL? | Stock Exchanges, Companies, preparers, Reviewers
🗑
|
||||
Adds data tags after reports are created | Bolt-on Tagging
🗑
|
||||
Tags data during information processing | Integrated Tagging
🗑
|
||||
Dictionary that defines XBRL tags and standardizes the tags used | Taxonomy
🗑
|
||||
Contains specific amounts for a taxonomy at one instance | Instance Reporting
🗑
|
||||
This is used for digital reporting around the world | XBRL
🗑
|
||||
This involves using risk in a proactive, constructive way to create additional value for the enterprise | Risk Intelligence
🗑
|
||||
4 Risk Responses | Avoidance, Reduction, Sharing, Acceptance
🗑
|
||||
Ongoing Business Operations decisions | Routine Operational Decisions
🗑
|
||||
Short-term impacting one year or less | Tactical Decisions
🗑
|
||||
Long term and unstructured decisions with a high degree of ambiguity | Strategic Decisions
🗑
|
||||
4 Intelligent System Components | Data Storage, Data Extraction and Transfer, Data Analysis, Data visualization
🗑
|
||||
Where should business intelligence be put? | Data Warehouse
🗑
|
||||
Disadvantages of Shadow Data | No one knows where the data is, everyone does their own thing that they were taught
🗑
|
||||
A ______ is considered intelligent when it uses tools and technology to create business intelligence | Enterprise system
🗑
|
||||
Literally needs a physical connection and wire | Ethernet protocol
🗑
|
||||
Ways to exchange business information for sales | Electronic Data Interchange (EDI)
🗑
|
||||
point where someone can hack into | Network Access point (nap)
🗑
|
||||
password that is used initially but must be changed | Dynamic password
🗑
|
||||
password and username that would gain access to many different applications (comp, blackboard, banner, etc.) | Single Sign-On
🗑
|
||||
Make sure that no one knows where accounting mainframe should be | physical security framework
🗑
|
||||
Something to take account for when determining physical security framework | Natural Disasters
🗑
|
||||
How fast can I make it so people pay me money again | Disaster Recovery
🗑
|
||||
If I go out of business for 5 days, what type of affect will my business have? | Business Continuity
🗑
|
||||
Controls that ensure that data is valid and entered correctly | Input controls
🗑
|
||||
Systems used to prevent access control attacks | Intrusion prevention system (ips)
🗑
|
||||
Backup services distributed among an organizations multiple locations | Internal sites
🗑
|
||||
Controls that ensure reports and messages reach intended recipients | output controls
🗑
|
||||
Backup services shared by two organizations | reciprocal Agreement
🗑
|
||||
A backup technique that keeps multiple backups | Grandfather-father-son method
🗑
|
||||
A commercial disaster recovery service that provides a site with air conditioning, wiring, and plumbing, but no IT equipment | Cold Site
🗑
|
||||
A commercial disaster recovery service that provides a partially configured site that is operational within a few days | Warm Site
🗑
|
||||
A hardware device that contains a password generator protocol | Token Device
🗑
|
||||
A commercial disaster recovery service that provides a fully operational site within a few hours | Hot Sites
🗑
|
||||
Located on a proxy server and used to intercept and inspect all incoming messages prior to delivering them to the intended recipient | proxy firewall
🗑
|
||||
A network that provides a secure channel to access the enterprise network | virtual private network (vpn)
🗑
|
||||
A point on the network that offers access to the network, such as an accountants computer | Network Access point (nap)
🗑
|
||||
A software program permitting an employee to use the enterprise network through a secure channel | point-to-point tunneling protocol (pptp)
🗑
|
||||
A network software program that connects one computer to another | point-to-point protocol
🗑
|
||||
A device that connects to LAN's of the same type | Bridges
🗑
|
||||
An electronic device that connects networks of different types | Routers
🗑
|
||||
A network that allows an organization to share data with suppliers | Electronic Data Interchange
🗑
|
||||
A software program that provides transportation services to messages sent over the internet | Transport control protocol
🗑
|
||||
physical media connecting computers | Network wiring (transmission media)
🗑
|
||||
A software program that allows the enterprise network to connect to the network of vendors through proprietary lines | Value-added Network
🗑
|
||||
A computer that serves other computers with data and applications | Server Computers
🗑
|
||||
A software program commonly used to connect computers on a LAN | Ethernet protocol
🗑
|
||||
A group of the same type of LAN's connected to each other by bridges | LAN cluster
🗑
|
||||
A network that allows computers to request data and other services from other specific computers on the network | Client/Server Network
🗑
|
||||
A software program that provides routing services to messages transmitted over the Internet | Internet protocol (ip)
🗑
|
||||
Specific purpose computers that monitor networks traffic and transfer messages from one network to another | routing devices
🗑
|
||||
A device connecting an enterprise intranet to the internet | Gateways
🗑
|
||||
Digital Financial Reporting that electronically tags financial information | XBRL
🗑
|
||||
ODBC | Data Extraction and Storage
🗑
|
||||
Digital Dashboard | Data Visualization
🗑
|
||||
Spreadsheet financial functions | Data Analysis
🗑
|
||||
Relational Database | Data Storage
🗑
|
||||
Query | Data Extraction and Transfer
🗑
|
||||
Star Data Warehouse Structure | Data Storage
🗑
|
||||
ETL | Data Extraction and Transfer
🗑
|
||||
predictive modeling | Data Analysis
🗑
|
||||
OLAp Cube | Data Analysis
🗑
|
||||
Data Mining | Data Analysis
🗑
|
||||
Order of ETL | Choose Operational Database
Extract operational relational database
Transform operational database table into data warehouse table
Load data warehouse dimensional table
Use data warehouse dimensional table
🗑
|
||||
Long ranged, unstructured decisions with a high degree of ambiguity are called? | Strategic decisions
🗑
|
||||
Decisions typically related to ongoing business activities are considered? | Routine operating decisions
🗑
|
||||
Semistructured decisions that are typically short term in nature and impact one year or less are considered | Tactical Decisions
🗑
|
||||
A business intelligence technique that uses mathematical algorithms to predict future trends is | predictive modeling
🗑
|
||||
A business intelligence technique used on relatively unstructured data such as emails is called | Text mining
🗑
|
||||
A business Intelligence technique used to search social networking sites for customer preferences would be reffered to as | Web mining
🗑
|
||||
A business intelligence technique used to search data stored in a data warehouse using mathematical algorithms to find patterns, trends, and relationships among data is referred to as | Data Mining
🗑
|
||||
A step-by-step solution to a problem | Algorithm
🗑
|
||||
Each spreadsheet is assigned a unique identifier | Spreadsheet Identifier
🗑
|
||||
Identifying users by analyzing their personal attributes, such as face recognition | Biometrics
🗑
|
||||
Software generally located on a routing device to monitor network traffic and prevent unauthorized access is | Firewall
🗑
|
||||
An area between the enterprise's first firewall to the outside world and the next firewall is called | DMZ
🗑
|
||||
A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be | Honeypot
🗑
|
||||
The level of variation an enterprise is willing to accept in attaining objectives | Risk Tolerance
🗑
|
||||
The amount of risk an enterprise is willing to accept pursuing value is | RIsk Appetite
🗑
|
||||
When an enterprise evaluates the extent to which events would impact its ability to achieve objectives, it is conducting | Risk Assessment
🗑
|
||||
Adding Impact and likelihood columns to a spreadhseet to evaluate risk associated with its use is: | Risk Assessment
🗑
|
||||
A policy of reconciling a bank statement to within $5 of balancing is an example of | Risk Tolerance
🗑
|
||||
The likelihood of an event occuring using qualitative measures, such as high, medium, or low | possibility
🗑
|
||||
The possibility that an event will occur and negatively impact the entity's ability to achieve its stated objectives | Risk
🗑
|
||||
The likelihood of an event occuring using quantitative measures, such as percentages | probability
🗑
|
||||
A document that records changes | Change Log
🗑
|
||||
The possibility or probability that a potential event will occur | Likelihood
🗑
|
||||
A document that records user access | User Log
🗑
|
||||
The process of determining events that effect an enterprise's ability to attain its objectives | Event Identification
🗑
|
||||
the effect that an event will have on the enterprise's ability to achieve its objectives if the event occurs | Impact
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
504223368
Popular Accounting sets