Chapter 14 - Development in technology Flashcards

1
Q

What is cloud computing?

A

Provides a business with computing resources such as software and storage using a network of remote servers hosted on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are common features of cloud computing systems?

A
  1. Cloud systems can be either private or public
    - Public systems sell services to anyone on the internet
    - A private system is a proprietary closed system for a limited set of users
  2. They are elastic so users can use as little or as much as they need
  3. The service will be fully managed by the provider in the case of public system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cloud accounting?

A

One application of cloud computing. Accounting software is provided in the cloud by a service provider rather than running the software on a local server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What examples of the internet of things?

A
  • Home automation: Lighting, heating, security systems enabled through smart technology and home assistant
  • Vehicles and transport: Connected cars and live traffic monitoring, allow improved fleet management and planning. Self-driving vehicles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are digital assets

A

Any text or data file that is formatted into a binary source which includes the right to use it; digital files that do not carry the right are not considered digital assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two examples of digital assets

A
  • Media assets
  • Textual contents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is distributed ledger technology

A

Allow people or organisations that do not know each other to trust a shared record of events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key features of distributed ledger technology

A
  • Distributed ledger has no central storage and is shared by all parties who require access, each having an identical copy of the ledger
  • Different parties add to the shared record and procedures e.g. blockchain to ensure information is valid before it’s accepted
  • What is a lack of a central administration is the main advantage of the technology as it prevents any one party from dominating or corrupting the process
  • Security is provided through cryptographic keys and clear signatures of all transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is blockchain

A

Type of database that stores information together in blocks that are chained together. It is a process used to ensure only valid information is recorded in distributed ledger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the blockchain process?

A
  1. New transactions
  2. New transactions is then transmitted to a network to peer-peer computers scattered across the world
  3. The network of computers then solves equations to confirm the validity of the transactions
  4. Once confirmed to be legitimate transactions, they are clustered together into blocks
  5. These blocks are then chained together creating a long history of all transactions that are permanent
  6. Transaction is complete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are fintechs?

A

Software and other technologies that provide automated and improved financial servicesW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the examples of fintechs

A
  • Crowd funding
  • Peer to peer lending e.g. zopa
  • Online currency conversion
  • Digital wallets e.g. Apple Pay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a crypto currency

A

Digital tokens that allow online trading. There is no third party (bank) so it is similar to paying with cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are features of crypto currencies?

A
  • Use distributed ledgers and blockchain to record the transfers
  • Keep currency in a digital wallet
  • Price of currency in volatile
  • Risks of hacking the online wallet
  • Opportunities for money laundering due to privacy levels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are cognitive technologies?

A

Computer based systems that represent, reason about and interpret data. e.g. AI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is artificial intelligence?

A

Use of computers to perform tasks thought to require intelligence such as learning and reasoning including

  • Medical diagnosis through interpretation of medical images
  • Home assistants learn our language and habits to better predict and understand our requirements

E.g. live chat functionsW

16
Q

What is machine learning?

A
  • Rather than follow explicit programming instructions, machine learning algorithms detect patterns, learn how to make their own decisions
  • Machine learning uses both predictive analytics (what will happen) and prescriptive analytics
17
Q

What is robotic process automation RPA

A
  • Creation of technology and its application to control and monitor activities without human interference. Intelligent systems and artificial intelligence facilitate the process of automation
  • RPA will be used for routine processes
18
Q

What are the impacts on the accountancy profession

A
  • Automation - Maintenance of ledgers and preparation of reconciliation is now largely automated
  • Systems advice: Advisory work for clients evaluating the merits of potential new systems and technology
  • Transparency in recording: Distributed ledger technology is transforming the way transactions are recorded, increasing transparency

Smart contracts - Can be audited when created as they are secure once established and automatically execute

  • Data analytics: Analytics can target risk and improve the relevance and efficiency of audit work
  • Software controls: Validating the adequacy of internal controls is a fundamental part of audit assignment
  • New types of goods and services: Accounting must be able on things like the treatment of new revenue streams and digital assets
  • Regulations: Understanding and advising on complex regulation relating to data and technology as well as being aware of the risk of breaches
19
Q

What is a management information systems (MIS)

A
  • Systems to produce information allowing managers to make effective decision
20
Q

What are examples of MIS

A
  • Executive information systems (EIS) or Executive support systems (ESS): A database that pools data from internal and external sources providing easy to use information to senior managers to help make strategic decisions
  • Decision support systems (DBS): Combines data and analytical model or data analysis tools to support decision making
  • Expert systems (ES): Expert systems allow users to benefit from expert knowledge and information. The systems will consist of a database holding specialised data and rules about what to do in, how to interpret and given a set of a structure
  • Knowledge work systems (KWS): Facilitate the creation and integration of new knowledge into an organisation
  • Office automated systems (OAS): Systems that increase the productivity of data and information workers
21
Q

What is obsolescence risk?

A

Technology that goes out of date very quickly so the perceived competitive advantage may be short lived

22
Q

What is inexplicability risk

A

Technology becomes too complex for humans to understand

23
Q

What is data protection?

A

legislation states how long personal data can be held and stipulates the reasons why it can be held

24
Q

What is automation risks?

A

Training of staff to be able to work in an automated envrionment

25
Q

What are ethical risks?

A

Who is at fault if a computer makes a mistake? Can machines think ethically

26
Q

What is a cyber risk

A

Cyber risks is the risk of financial loss, business disruption, reputation damage that are a consequences of accidents and poor systems integrity

27
Q

What is hacking

A

Use of specialist software to gain unauthorised access to systems

28
Q

What is phishing?

A

Bogus emails that ask for personal or security information

29
Q

What is malicious information

A

Where the user’s files are hijacked and held to ransom

30
Q

What is distributed denial of service? DDoS

A

Websites and online services being overwhelmed with large amounts of internet traffic that is designed to crash the system

31
Q

What is cyber resilience?

A

ability of an organisation to ensure its data and information is reliable, available, has integrity and is adequately protected from unauthorised access

32
Q

What do back up plans mean in terms of cyber resilience?

A

Plans put in place to ensure businesses can continue and all critical data can be recovered should an unexpected outrage occur?

33
Q

What areas of technology should include the information security plan

A
  • Security systems and device configuration
  • Network security
  • User privileges
  • Home and mobile working
  • Removable media controls
  • User education and awareness
  • Web services
  • Legal