BEC - 4 Technology Flashcards
Access to a blockchain requires a _______ key.
public and private
Data Analytics
rapidly examines large amounts of data to identify hidden patterns correlations, and other insights.
Electronic data interchange
use of computerized communication to exchange data electronically in order to process transactions between and within computers and computer networks of various organizations.
At what phase in the systems development process is a report generated that describes the content, processing flows, resource requirements, and procedures of a preliminary system design?
Conceptual systems design
- the company identifies and evaluates appropriate design alternatives:
THEN in the physical design phase, the company uses the conceptual design requirements to design and input and output documents, write computer programs…
Role of information systems in the business process:
- processes performed by humans
- processes performed by machines
- processes that have one or more outcomes
Executive support system
helps answer questions regarding what a company’s competitors are doing
- as well as identifies new acquisitions that would protect the company from cyclical business swings.
Customer relationship management
- a cloud-based system that stores customer and prospect contact information, accounts, leads and sales opportunities in ONE CENTRAL DATABASE, available to all departments in a business, such as sales, customer service, accounting, marketing, and business development
Fail-soft Protection
The capability to continue processing at all sites except a nonfunctioning one, an advantage of distributed systems.
Strategic Information System
A computer system that converts the inputs into data that allows management to make unstructured decisions concerning the company’s future
Knowledge bases
Taught by human experts - represent the facts and inferences it knows, which were “taught” to it by human experts.
Which of the following is likely to be a benefit of electronic data interchange (EDI)?
Increased transmission speed of actual documents
Improved business relationships with trading partners
Improved business relationships with trading partners
Improved business relationships with trading partners are a benefit of EDI.
- EDI transmits document data, not the actual document
- liability issues related to protection of proprietary business data are a major legal implication of EDI
- EDI backup and contingency planning requirements are not diminished.
Blackchain Technology uses what is know as:
Distributed ledger technology
Value Added Network (VAN)
Telecommunication networks providing communication facilities enhancing basic telecommunication services by passing, storing, and converting messages using enhanced security techniques.
Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment?
A compressed business cycle with lower year-end receivables balances
A reduced need to test computer controls related to sales and collections transactions
An increased opportunity to apply statistical sampling techniques to account balances
No need to rely on third-party service providers to ensure security
A compressed business cycle with lower year-end receivables balances
The EDI system can facilitate just-in-time inventory systems and also speed payment via electronic funds transfer after the transaction, resulting in lower year-end receivables balances.
As part of the Sales Order Entry function within the revenue cycle, threats and controls to inventory availability must be assessed. Which of the following is not a control to inventory availability?
Making periodic physical inventory counts to verify record accuracy
Monitoring supplier performance
Examining excess inventory
Creating accurate systems for sales forecasting and inventory control
Examining excess inventory
Excess inventory is a THREAT, not a control, to inventory availability.
In an automated payroll processing environment, a department manager substituted the time card for a terminated employee with a time card for a fictitious employee. The fictitious employee had the same pay rate and hours worked as the terminated employee. The best control technique to detect this action using employee identification numbers would be a:
Hash Total
A type of batch control total.
Primary advantage of a Value-added network
It proved increase security for data transmissions.
The revenue cycle includes which 3:
the expenditure cycle
the production/ conversion cycle
the payroll cycle
The financing/ treasury cycle
the expenditure cycle
the production conversion cycle
the payroll cycle
The revenue cycle is a recurring set of business and data processing activities associated with selling goods and services to customers in exchange for cash. The revenue cycle produces information that is used by other accounting cycles, including the expenditure, production/conversion, and payroll cycles, as well as the financial reporting cycle.
Benefits of EDI Electronic Data Interchange
improved business relationships with trading partners
- EDI transmits document data, not the actual document
- liability issues related to protection of proprietary business data are a major legal implication of EDI.
- EDI backup and contingency planning requirements are not diminished.
Corporate intranets are typically characterized by ____________ as compared to local and wide area networks.
Higher security risk and lower cost
Intranets are private networks that behave in much the same manner as the internet. They are subject to higher security risks but are less costly to operate than local or wide area networks.
The concept of a management information system (MIS) continues to evolve over time. Which of the following is generally understood to be a central element of an MIS?
Processing of data items is based on decision models
The 5 principles developed by the AICPA
- security
- availability
- processing integrity
- confidentiality
- privacy