BUAW Flashcards

1
Q

FUNDAMENTAL PRINCIPLES OF PROFESSIONAL ETHICS

A

Professional behaviour
Professional competence and due care
Confidentiality
Integrity
Objectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT IS INTEGRITY?

A

The quality of being honest and having strong moral principles that you refuse to compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT IS OBJECTIVITY?

A

A person who is objective is someone who bases their opinions and decisions on real facts and is not influenced by personal beliefs or feeling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT IS PROFESSIONAL COMPETENCE AND DUE CARE?

A

Refers to maintaining professional knowledge and skill at the level required to ensure that a client or employer receives competent professional service based on current developments in practice, legislation and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT IS CONFIDENTIALITY?

A

An obligation to respect the confidentiality of information about a client or employer’s affairs which has been gained during their employment or during the course of their professional work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT IS PROFESSIONAL BEHAVIOUR?

A

Refers to complying with relevant laws and regulations and avoid any action that brings our profession into disrepute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

POTENTIAL THREATS TO THE FUNDAMENTAL ETHICAL PRINCIPLES

A

Self-interest threats
Self-review threats
Familiarity threats
Intimidation threats
Advocacy threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SELF-INTEREST THREATS

A

These may occur where a financial or other interest will inappropriately influence the account’s judgment or behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SELF-REVIEW THREATS

A

These may occur when an accountant has to re-evaluate a judgement or data that they have previously made or produced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FAMILIARITY THREATS

A

These may occur when, because of a close or personal relationship, an accountant becomes too sympathetic to the interests of others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

INTIMIDATION THREATS

A

These may occur when an accountant may be deterred from acting objectively because of real or perceived threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ADVOCACY THREATS

A

These may occur when an accountant promotes a position or opinion (normally of a client) to the point that their objectivity may be compromised in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT IS BIG DATA?

A

The term referred to large volumes of data collected by organisations and used to improve operations, provide better customer service, create personalised marketing campaigns and take other actions that ultimately increase profits and revenue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CHARACTERISTICS OF BIG DATA

A

Volume
Velocity
Variety
Veracity
Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT IS VOLUME (BIG DATA)?

A

Refers to the sheer amount of data that organisations now process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT IS VELOCITY (BIG DATA)?

A

Refers to the speed at which data can be generated, gathered and analysed.

17
Q

WHAT IS VARIETY (BIG DATA)?

A

Refers to the types of data: structured, semistructured, unstructured.

18
Q

WHAT IS VERACITY (BIG DATA)?

A

Refers to how accurate, or truthful the data is. The variety and volume of the data, together with the speed at which it is being generated means that there is an increased risk of inaccuracies, or bias.

19
Q

WHAT IS VALUE ( BIG DATA)?

A

There is no point in a business collecting huge amounts of data unless it can be processed and transformed into useful and valuable information that can then be used to add value to the business.

20
Q

WHAT IS THE BLOCKCHAIN?

A

Blockchain is a digital ledger or transactions that is shared across the entire network of computers in the particular blockchain.

21
Q

PESTLE

A

Political
Environmental
Social
Technological
Legal
Economical

22
Q

ORGANISATIONAL STRUCTURES

A

Functional
Divisional
Matrix
Entrepreneurial

23
Q

FUNCTIONAL STRUCTURE

A

Divides the business into specialised functions or skills such as production, sales and marketing and IT. It is one of the most common organisational structures as it groups individuals with similar knowledge and expertise together.

24
Q

DIVISIONAL STRUCTURE

A

Where employees are grouped into particular segments with regard to the product or services they produce and not according to their job descriptions.

25
Q

MATRIX STRUCTURE

A

In this structure, you share resources and staff across teams and projects, as well as within departments or functions.

26
Q

ENTREPRENEURIAL STRUCTURE

A

This is when the major decisions are made by one or two key personnel. Usually in small businesses this will be the owner or entrepreneur.

27
Q

WHAT IS UNLIMITED LIABILITY?

A

Unlimited liability means that the owner of a business is personally responsible for all debts and liabilities of the business. It means that if the business cannot pay its debts, the owner’s personal assets can be used to satisfy those debts. It’s an important consideration when choosing a business structure.

28
Q

WHAT IS LIMITED LIABILITY?

A

Limited liability is a legal concept that protects the personal assets of business owners. It means that the owners are not personally responsible for the debts and liabilities of the business. Their liability is limited to the amount of their investment in the business. This is a common feature of corporations and limited liability companies (LLCs). It provides a level of financial protection for business owners.

29
Q

DDoS

A

DDoS, short for Distributed Denial of Service, is a type of cyber attack where multiple compromised computers are used to flood a target website or network with a massive amount of traffic. The goal is to overwhelm the target’s resources and make it inaccessible to legitimate users. It’s a serious security concern, and organizations take measures to protect against DDoS attacks. Let me know if you’d like more information or have any other questions!