Ch02-Accounting on the Internet Flashcards

1
Q

Internet

A

is a collection of local and wide-area networks that are connected together via the internet backbone i.e. the main electronic connections of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

domain address

A
  • The Internet begin with this.
  • also called a Uniform Resource Locator - URL
  • is a text address: “www.name.com.uk”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet Protocol (IP)

A
  • a numeric address of a text-based domain address, for transmission purposes.
  • 207.142.131.248
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet Corporation for Assigned Names and Numbers (ICANN)

A

ICANN, maintains the official registry of domain names, manages the domain name system (DNS) to ensure that all IP addresses are unique and make sure that each domain name maps to its correct IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transmission Control Protocol / Internet Protocol

A
  • TCP/IP, IP addresses enable Internet computers to deliver a specific message to a specific computer at a specific computer site, for example: when you send an email message to a friend at another university using this standard
  • IP address - useful to auditors b/c they identify the sender.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intranet

A
  • Based on same software as the Internet​
  • Internal to the organization​
  • Outsiders are unable to access information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

extranet

A
  • Enable selected external users to access intranets​
  • Utilize passwords or private data communications channels
  • a network that a business might establish with its trading partners.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

World Wide Web, or the Web

A
  • Multimedia portion of the Internet​

- web browser, web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTML (hypertext markup language)

A
  • Editing language​

- Used in design of web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP (hypertext transfer protocol)

A

Communications protocol used to transfer web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Groupware

A
  • Allow users to complete numerous tasks electronically​
  • Send and receive e-mail, collaborate on work tasks, schedule appointments, share files​
  • Software include Exchange, Groupwise, Lotus Notes, and Outlook
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Instant message software

A
  • Remote users communicate in real time​
  • Electronic Conferencing​
  • MSN message, yahoo Messenger, Skype
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Knowledge management

A

Programs utilized to distribute expertise within the organization
e.g. an employee with a client issue can access the knowledge database to learn how others handled similar issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Web logs or Blogs

A
  • Collaboration tool​ - allow users with Web browser and easy-to-use software to publish personal diaries, etc.
  • Create, share, and leverage knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social Networking​ and Its Value to Accountants​

A

Commercial Utilization​

  • Increase organization recognition​
  • Public reaction to launch of new product​
  • Developing an online presence​
  • Seeking new clients​
  • Communicate on projects​
  • Identify consumer anger​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XML (eXtensible Markup Language)

A
  • Similar to HTM:
  • users define their own tags
  • XML tags describe the data
  • Problem: lack of consistency, no standardized tags that describe financial information, hence difficult for comparison
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

XBRL (Extensible Business Reporting Language)

A
  • a specialized subset of XML

- Tags are standardized for business reporting purposes​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

XBRL International Consortium

A
  • create XBRL standards that anyone can use, license-free

- current status of XBRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

XBRL Instance Documents and Taxonomies​

A
  • Must understand the standard tags​

- Must understand the rules that govern the use of the tags​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Benefits of XBRL

A
  • Transmit financial data in standard format​
  • Data items are uniquely defined​
  • Searching for tags is easier (IDEA)​
  • Data is self-checking​
  • Automatic and reliable exchange of financial information​
  • Companies are not constrained to specific formats​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

interactive data and electronic applications (IDEA)

A

part of the SEC, contains XBRL information for over 10,000 companies, a valuable source of financial information and an important reason why standardized reporting is useful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Drawbacks of XBRL

A
  • Requires new users to learn, and conform to, the standards of the language​
  • Evolving standards require conformity to changing specifications​
  • No requirement for auditors to provide assurance​
  • Costs of transition​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

e-business

A
  • conducting business with computers and data communications
  • via Internet / virtual private networks (VPN), or data transmission lines.
  • eg. (1) e-accounting, (2) retail sales, (3) e-payment and e-wallets, (4) electronic data interchange, and (5) cloud computing services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Categories of E-business

A
  • eAccounting​
  • B2B, B2B, and C2C​
  • Retail sales​
  • E-payments and E-wallets​
  • Electronic data interchange (EDI)​
  • Cloud-computing services​
  • The Internet of Things (IoT)​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

E- accounting

A

Performing accounting functions on the Internet :

  • Preparing financial reports​
  • Completing income tax returns​
  • Preparing budgets​
  • Writing reports​
  • Publishing financial information​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Retail sales

A
  • Virtual stores to sell directly to customers​

- Automated AISs​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Problems with Internet Retail Sales

A
  • Legitimacy of web sites​
  • Reliance upon e-mails​
  • Reliance upon suppliers​
  • Click fraud​
  • Privacy concerns​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Click fraud

A
  • pay-per-click contract

- Overcharging companies for phantom clicks on an advertising link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Pay-Per-Click contract

A

Business pay fee every time a customer clicks on a link to its website from another site (search engine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Retail sales - privacy concern

A
  • Annoying e-mail​
  • Credit card information​
  • Sensitive information (example – Rx)​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

e-payments

A
  • Faster, easier, and safer way to handle online transactions​
  • E-payment service acts as intermediary​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

e-wallet

A
  • Store consumer’s personal information. Do not store dollars.​
  • Customers pay for purchases by providing their​ e-wallet account numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Virtual Currency

A

a medium of exchange that operates beyond restrictions of a particular country or its monetary policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Virtual Currency - risks

A
  • Potential devaluation of currency in response to market forces​
  • Transactions are not independently auditable​
  • Earlier virtual currencies have failed​
  • Unwillingness of others to accept it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Retailers accept virtual currency

A
  • Ability to do more business​
  • Ease of electronic transactions ​
  • No need for credit card middlemen or check clearing houses​
  • Near-instantaneous credit of transactions to corporate accounts​
  • Consumer wallets cannot be frozen​
  • No transaction fees​
  • Useful if required to pay ransomware quickly​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Virtual Currencies–Advantages​

A
  • No need to exchange one type of currency for another​
  • Escapes government scrutiny (e.g., frozen assets)​
  • Ability to conduct business electronically on the Internet​
  • Avoids middlemen such as check-clearing houses​
  • Transactions happen almost instantaneously​
  • Can be spent at a variety of places​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Virtual Currencies–Disadvantages

A
  • Increased risk because it operates without safety of a central bank or government​
  • Transactions are not auditable​
  • May not be universally accepted​
  • Currencies themselves have been volatile in the past​
  • Most past virtual currencies have ultimately failed.
38
Q

Three Models of E-Commerce

A

B2B, B2C, C2C

39
Q

B2C –Business to Consumer

A

Oldest and best known model​

Example: Dell Computers

40
Q

B2B – Business to Business

A

Businesses conduct business with each other​

Example: Purchases from suppliers ​

41
Q

C2C – Consumer to Consumer

A

Consumers buy goods or services from each other​

Example: Uber

42
Q

E-Commerce

A

Businesses buying and selling goods and services to each other over the Internet

43
Q

E-Commerce - Advantages

A
  • Shortens time from purchase to delivery​
  • Expanded variety of vendors​
  • Reduces processing costs​
  • Wider availability of real-time data​
  • Open for business 24/7​
44
Q

Electronic Data Interchange (EDI)

A
  • Transmit information over high-speed data communications channels​
  • EDI automates the exchange of business information, particularly with respect to source documents.
45
Q

EDI - Advantages

A
  • Ability to fax documents​
  • Can include handwritten signatures​
  • Ability to exchange graphic and photographic documents​
46
Q

Cloud computing

A
  • Refers to purchasing services from vendors over the -Internet.
  • eg, Web hosting, payroll processing, emailling, outsourcer business phone systems
47
Q

Processing services

A

Platform as a Service (PaaS)​

48
Q

the Internet of Things (IoT)

A

devices that use the Internet to communicate with their owners

49
Q

Storage and Backup Services

A

Maintain copies of critical data​

50
Q

Educational Services​

A
  • Research and using specialized web tutorials​

- One important personal category of cloud computing for accountants

51
Q

phishing

A
  • tricking users into providing information such as social security number, debit card PIN number, passwords or similar personal information
  • spear phishing - attempting to collect sensitive information / focus on specific individual or groups.
52
Q

spoofing

A

Posing as an authentic user to gain access to a computer system

53
Q

ransomware

A

malicious software that deny access to computer system resources until you pay $$$.

54
Q

firewall

A
  • reject unauthorized users from access​

- Stand-alone devices and/or software​

55
Q

firewall - Two Primary Methods

A
  • Inclusion – Access Control List (ACL)​

- Exclusion

56
Q

firewall - problems

A
  • Denial-of-Service Attacks​

- Spoofing​

57
Q

Intrusion Detection Systems (IDSs)

A
  • (1) to prevent unauthorized access to sensitive information and (2) to alert system admin to potential violations.
Passive IDSs​
- Create logs of potential intrusions​
- Alert network administrators​
​
Reactive IDSs​
- Detect potential intrusions dynamically​
- Log off potentially malicious users​
- Program firewalls to block messages from suspected source
58
Q

Value-added networks (VANs)

A
Definition​:
- Private, point-to-point communication channels​
- Usually created for security purposes​
​
Methods of Creation​
- Blank slate, create from scratch​
- Lease secure, dedicated transmission lines​
- Create a Virtual Private Network (VPN)
59
Q

Virtual private network (VPNs)

A
Definition​
- Similar to VAN	​
- Transmit messages over existing Internet connections​
​
Creating Secure Data Transmission​
- Use “tunneling” security protocols​
- Encrypt transmitted data​
- Authenticate remote computer​
60
Q

Proxy Server​

A

Definition​
- Network server that controls web access​

Advantages​
- Funnel internet requests through a single server​
- Examine and test requests for authenticity​
- Limit employee access to approved websites​
- Limit stored information​
- Store frequently-accessed web pages (Cache)​

61
Q

Data Encryption​

A

Definition​
- Transform plaintext messages into unintelligible cyphertext messages​

Encryption key​
- Mathematical function dependent upon a large prime number​
- Data Encryption Standard (DES)​

Secret Key Cryptography​
- Users must keep the key secret and not share the key with other parties​

Public Key Encryption​
- Each party uses a pair of public/private encryption keys​
SSL and S-HTTP​

62
Q

Digital Signature​

A
  • Encrypted portion of message​: a company can transmit a complete document in plaintext and then include a portion of the same message or some other standard text in an encrypted format
  • Digital Signature Standard (DSS)​
63
Q

Groupware is the technology that enables knowledge sharing and knowledge management among employees.

A

True

64
Q

XBRL allows users to extract and compare financial data from many different companies.

A

True

65
Q

EDI automates the exchange of business information, particularly with respect to source documents.

A

TRUE

66
Q

A major issue impacting e-business is the trade-off between accessibility and vulnerability.

A

TRUE

67
Q

Digital time stamping authenticates the time and sometimes the place a transmission or transaction occurred.

A

TRUE

68
Q

Three types of access security are:

A

(1) what you have; (2) what you know; and (3) who you are

69
Q

The term “phishing” refers to the use of web pages or other means to trick viewers into revealing their passwords or other personal information.

A

TRUE

70
Q

SaaS

A

stand for “software as a service”

71
Q

When a cloud service company hosts a client’s website, this is an example of :

A

“platform as a service” (PaaS)

72
Q

An example of an Internet service provider is:

a) General Electric
b) AOL
c) PeachTree
d) ISP
e) none of these

A

AOL

73
Q

An advantage of an extranet is that:

a) It can disseminate information corporate-wide
b) It can be accessed by selected trading partners
c) Users can employ common web browsers to access information in them
d) all of the above

A

D

74
Q

The letter “p” in the acronym http stands for:

a) Page
b) Provider
c) Protocol
d) Parity

A

c. protocol

http = hypertext transfer protocol

75
Q

This language allows its users to create web pages on the Internet:

a) HTTP
b) HTML
c) URL
d) COBOL

A

b. HTML - hypertext markup language

76
Q

Which of the following is true about XBRL?

a) It is a business application of XML
b) It uses tags such as <b> like HTML
c) It is used by the SEC to collect and store financial information about companies
d) all of the above are true about XBRL</b>

A

D

77
Q

One advantage of XBRL tags is that:

a) They always contain links to other web pages
b) Optional entries allow users to specify units of currency, such as Euros
c) They are now fixed standards
d) They cannot be used by hackers

A

B

78
Q

IDEA is used by the Securities and Exchange Commission (SEC) to:

a) Store the financial data of public companies
b) Collect lists of bankrupt companies
c) Store the URL’s of member firms
d) Collect data on individuals victimized by identity theft hackers

A

IDEA - interactive data and electronics application

A.

79
Q

All of the following are examples of EDI “documents” except:

a) Purchase orders
b) Sales invoices
c) Customs documents
d) Bar codes

A

D

80
Q

What is the main reason why companies prefer VANs to the Internet for implementing EDI?

a) Cost - VANs are cheaper than the Internet
b) Speed - VANs are faster than the Internet
c) Security - VANs are thought to be more secure
d) Convenience - VANs are everywhere

A

C.

VANs - value-added network

81
Q

Tricking users into providing personal information such as a social security number on a web site is an example of:

A

Phishing

82
Q

The term “spoofing” refers to:

a) Computer hijacking
b) Kidding
c) Posing as a legitimate computer user
d) Distributing junk mail

A

C.

83
Q

The purpose of a company firewall is to:

a) Guard against spoofing
b) Assist the IETF
c) Deny computer hackers access to sensitive data
d) all of the above

A

C.

84
Q

A secure method of transmitting messages cheaply over existing Internet connenctions.

A

VPN (virtual private network)

85
Q

A local area network file server typically devoted to providing Internet service

A

Proxy

86
Q

A transmission protocol enabling users to send voice-grade messages over the Internet

A

VoiP

87
Q

A transmission protocol used to send email messages sent over the Internet

A

TCP/IP

88
Q

An encryption standard used by the U.S. government.

A

DES (data encryption standard)

89
Q

Inflating the number of uses of a link to an alternate website.

A

click fraud

90
Q

The exchange of electronic documents such as contracts

A

EDI (electronic data interchange)

91
Q

The markup language typically used to display web pages in a web browser

A

HTMP

92
Q

What does “html” stand for and what is it used for?

A

HTML stands for “hypertext markup language.” HTML is the editing language used to display text, graphics, hyperlinks and similar information in web pages. HTML is nearly universal in that it works no matter which browser you use. The language mostly uses pairs of tags such as <b> and </b> to perform such tasks as bolding text.