Developments In Technology Flashcards

1
Q

Cloud computing can either be

A

Private or public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Public cloud system

A

Sold to anyone on internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Private cloud system

A

Proprietary closed system for limited set of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital asset

A

Any text or data file
that is formatted into a binary source
which included the right to use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 common types of digital asset

A

Media assets
E.g. images and multimedia

Textual content
E.g. documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ways businesses protect digital assets

A

Encoding
Encryption
Watermarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distributed ledger technology allows

A

People who don’t know eachother to trust a shared record of events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key features of distributed ledger technology

A

No central storage
Shares by all parties who require access
Each has an identical copy of ledger

Parties add to shared record
Procedures (e.g. blockchain) ensure info is valid before accepted

Lack of central administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How security is provided in distributed ledger technology

A

Cryptographic keys

Clear signatures of all transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blockchain

A

Type of database
Sores information in blocks that are chained together

Used to ensure only valid info is recorded in distributed ledger systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blockchain process

A
  1. Net transaction entered
  2. Transaction is transmitted to network of peer to peer computers (across the world)
  3. Network solves equations to confirm validity of transaction
  4. Once confirmed, transactions clustered together into blocks
  5. Blocks chained together forming a permanent history of all transactions
  6. Transaction complete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fintech

A

Software and other technologies that provide automated and improved financial services

E.g. challenger banks, banking apps, crowdfunding, peer to peer lending (Zopa), online currency conversion, digital wallets (Apple Pay)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptocurrencies

A

Digital tokens allowing online trading

No 3P (bank) involvement
So similar to paying with cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptocurrency features

A

Distributed ledgers
Blockchain

Currency in a digital wallet

Volatile price of currency

Risk of online wallet being hacked

Opportunity for money laundering
Due to privacy levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cognitive technologies

A

Computer based systems
Represent, reason about and interpret data
Learn about structure of the data
Analyse it to extract patterns and meaning
Then derive new information
Identify strategies and behaviours from the results of their analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AI

A

Thought to require human intelligence

17
Q

Robotic Process Automation (RPA)

A

Creation of tech and applications
To control and monitor activities
Without human interference

Facilitated by:
Intelligent systems
Artificial intelligence

18
Q

Impacts of technological development on accountancy profession

A

Tech performing routine work
E.g. transaction processing, assurance, auditing

19
Q

Management information sysetms (MIS)

A

Systems to produce information allowing managers to make effective decisions

20
Q

Some types of MISs

A

Executive information systems (EIS)
/executive support systems (ESS)

Decision support systems (DSS)

Expert systems (ES)

Knowledge work systems (KWS)

Office automation systems (OAS)

21
Q

EISs/ESSs

A

Database that pools data
from internal and external sources
providing easy to use information to senior managers

22
Q

DSS

A

Combines
Data models
Analytical models/data analysis tools
To support decision making

23
Q

ES

A

Expert knowledge and information
Database holding specialised data and rules about
What to do in/how to interpret
A given set of circumstances

24
Q

KWS

A

Facilitate creation and integration of new knowledge into an organisation.

25
Q

OAS

A

Systems that improve the productivity of data and information workers

26
Q

Risks of technology

A
  1. Obsolescence
  2. Inexplicability
  3. Data protection
  4. Automation
  5. Ethical
27
Q

Data protection risk

A

Legislation

28
Q

Automation risk

A

Training of staff to be able to work in and automated environment

29
Q

Ethical technology risks

A

Who is at fault if a computer makes a mistake?
Can machines ‘think’ ethically?

30
Q

Cyber risk definition

A

Risk of financial loss
Business disruption
Reputation damage

Consequence of accident and poor systems integrity

31
Q

Cyber risks examples

A
  1. Hacking
  2. Phishing
  3. Malicious software
  4. Distributed denial of service attacks
32
Q

Hacking

A

Using specialist software
To gain unauthorised access to systems

33
Q

Phishing

A

Bogus emails
That ask for personal/security info

34
Q

Malicious software

A

E.g file hijacker/ransomeware

User’s files are hijacker’s and held to random

35
Q

DDoS

A

Distributed denial of service attacks

Websites and online services overwhelmed with large amounts of internet traffic that is designed to crash the system

36
Q

Cyber resilience

A

Ability of organisation
To ensure its data and information is
Reliable
Available
Has integrity
Adequately protected

37
Q

Cyber security measures

A

Back-ups

Information security plans

38
Q

Back ups

A

Ensure:
1. Business can continue
2. Critical data is recovered

39
Q

Information security plan key areas

A

Securing systems and device configurations

Network security

User privileges

Home and mobile working

Removable media controls

User education and awareness

Web services

Legal requirements

Compliance

Incidental management

Monitoring