BEC VI BLAKE CPA Flashcards

1
Q

Advantages of Cloud Computing

A

1) Enhanced access as long as internet exists
2) Lower maintenance Costs
3) Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk of Cloud Computing

A

1) Risk of Data Loss
2) Risk of data breached
3) Risk of relying on a service provider instead of housing data internally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Primary purpose of a digital signature

A

Means of ensuring that the sender of a message is authentic

Uses encryption so that the recipient of a message can be assured that it is from the sender that is shown

Tells who signed it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Enterprise Resource Planning systems (ERPs)

A

integrates, allows to exchange information, and manages the business process across the entire enterprise.

Essentially integrates all teh data maintained by the organization into ONE database.

Increases efficiency in evaluating data when making critical business decisions since all info is in one place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Decision Support System (DDS)

A

Help with routine decisions.

Important subset of MIS as it is designed to assist in decision making processes.

Serves management, oeprations, & planning of all levels of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XBRL

A

Uses tagging to define financial statement Data

Specifically designed to exchange financial information over the world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Electric Funds Transfer

A

Reduction of the frequency of data entry errors

Moving $ from one bank accout to antoher and removes the need for a physical check

ex: Direct Deposit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

electronic data interchange (EDI)

A

Business to business transactions

Improves efficieny of communication

ex: Just-in-time inventory system

Increased inventory turn over & Lower year-end receivables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Four supply chain mangement assumptions

1

A

1) The goods received should match goods ordered
2) The goods should be delivered on or before the date promised
3) The goods should be delivered to the location that is required
4) The COGS should be as low as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is unique to Software-as-a-Service offering compared to a traditional in-house application?

A

DAta is stored in the cloud and managed by the Saas provider.

However, that means that the SaaS provider processes and POTENTIALLY owns your data.

***Ownership of processed data and costs of data migrations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Management information system (MIS) has two subsystems:

A

Pulls information that has already been defined in the system to help awnser normal business decisions.
1) Decision support system (DSS)
2) Executive inforamtion system (EIS)
3) Additional subsystems: Accounting inforamtion system (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Effective IT System

A

Better organization improves decision making.

Provides relevant & reliable data that reduces uncertainty when making a decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Time-Based Security Model

A

Formula P > D+C
P = Penetration (by hacker)
D = Detection (by company)
C = Correction (by company)
always measured in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operator’s Role in the IT Department

A

Oversees the running of a company’s computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Analyst’s Role in the IT Department

A

Analyzing, designing & implementing a company’s IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Librarian Role in the IT Department

A

Custody: Responsible for maintaining the data
Make sure data can be accessed as necessary by the rest of the company

17
Q

Programmers Role in the IT Department

A

Develops computer programs & software

18
Q

Executive Support Systems

A

Help awnser “non-routine questions” or scenarios that don’t occur on normal basis.

19
Q

DAta Structure

A

This describes the relationship of data across an organization and how it is stored.

20
Q

Standard query reporting

A

This is a request for data that is stored in a system.

For example, if the CFO wanted sales transactions for the prior year, a query could be run in the system to create a report with the sales transactions from last year.

21
Q

Artificial intelligence

A

when machines make decisions and perform tasks similar to how humans would.

AI uses various data inputs and information to make these decisions based on code or instructions written by the developer.

22
Q

Cost of Equity & Inlfation

A

As inflation increases Cost of equity increases

As Inflation decreases cost of Equity decreases

23
Q

Example of Decision Support system in use

A

evaluates geophysical & historical data as part of a decision to invest in drilling operations

Provides interactive support for managers during a decision making process

24
Q

Executive information system

A

Dashboard systems that provide macro level info to executive leadership

25
Q

Best Cost strategy

A

seeks to combine cost leadership & differentiation to provide customers with high value

26
Q

gateways

A

intermediary devices on a computer network that transform data into different protocols so that data can flow between networks.

27
Q

Servers

A

machines or software that provide services or share data with other machines on a network known as “clients”

28
Q

Six Sigma

A

quality improvement program that used both to improve current products or processes & to develop new products or processes

29
Q

Cold Site

A

off-site location that has all the electrical connections & other physical requirements for data processing, but it does not have the actual equipment

1-3 days to be made operational

30
Q

FormJacking Attack

A

Malicious code (malware) inserted into the checkout of a valid website.

MAlware can read CC info of custoemr and send info back to hacker

Hacker tries to obtain credit card info by slipping code into valid online checkouts