click below
click below
Normal Size Small Size show me how
ACC 340 - GVSU
Question | Answer |
---|---|
What does XBRL stand for | eXtensible Business Reporting Language |
Data about Data | Meta Data |
This has the ability to tag Quantitative and Qualitative Data | XBRL |
Who uses XBRL? | Stock Exchanges, Companies, preparers, Reviewers |
Adds data tags after reports are created | Bolt-on Tagging |
Tags data during information processing | Integrated Tagging |
Dictionary that defines XBRL tags and standardizes the tags used | Taxonomy |
Contains specific amounts for a taxonomy at one instance | Instance Reporting |
This is used for digital reporting around the world | XBRL |
This involves using risk in a proactive, constructive way to create additional value for the enterprise | Risk Intelligence |
4 Risk Responses | Avoidance, Reduction, Sharing, Acceptance |
Ongoing Business Operations decisions | Routine Operational Decisions |
Short-term impacting one year or less | Tactical Decisions |
Long term and unstructured decisions with a high degree of ambiguity | Strategic Decisions |
4 Intelligent System Components | Data Storage, Data Extraction and Transfer, Data Analysis, Data visualization |
Where should business intelligence be put? | Data Warehouse |
Disadvantages of Shadow Data | No one knows where the data is, everyone does their own thing that they were taught |
A ______ is considered intelligent when it uses tools and technology to create business intelligence | Enterprise system |
Literally needs a physical connection and wire | Ethernet protocol |
Ways to exchange business information for sales | Electronic Data Interchange (EDI) |
point where someone can hack into | Network Access point (nap) |
password that is used initially but must be changed | Dynamic password |
password and username that would gain access to many different applications (comp, blackboard, banner, etc.) | Single Sign-On |
Make sure that no one knows where accounting mainframe should be | physical security framework |
Something to take account for when determining physical security framework | Natural Disasters |
How fast can I make it so people pay me money again | Disaster Recovery |
If I go out of business for 5 days, what type of affect will my business have? | Business Continuity |
Controls that ensure that data is valid and entered correctly | Input controls |
Systems used to prevent access control attacks | Intrusion prevention system (ips) |
Backup services distributed among an organizations multiple locations | Internal sites |
Controls that ensure reports and messages reach intended recipients | output controls |
Backup services shared by two organizations | reciprocal Agreement |
A backup technique that keeps multiple backups | Grandfather-father-son method |
A commercial disaster recovery service that provides a site with air conditioning, wiring, and plumbing, but no IT equipment | Cold Site |
A commercial disaster recovery service that provides a partially configured site that is operational within a few days | Warm Site |
A hardware device that contains a password generator protocol | Token Device |
A commercial disaster recovery service that provides a fully operational site within a few hours | Hot Sites |
Located on a proxy server and used to intercept and inspect all incoming messages prior to delivering them to the intended recipient | proxy firewall |
A network that provides a secure channel to access the enterprise network | virtual private network (vpn) |
A point on the network that offers access to the network, such as an accountants computer | Network Access point (nap) |
A software program permitting an employee to use the enterprise network through a secure channel | point-to-point tunneling protocol (pptp) |
A network software program that connects one computer to another | point-to-point protocol |
A device that connects to LAN's of the same type | Bridges |
An electronic device that connects networks of different types | Routers |
A network that allows an organization to share data with suppliers | Electronic Data Interchange |
A software program that provides transportation services to messages sent over the internet | Transport control protocol |
physical media connecting computers | Network wiring (transmission media) |
A software program that allows the enterprise network to connect to the network of vendors through proprietary lines | Value-added Network |
A computer that serves other computers with data and applications | Server Computers |
A software program commonly used to connect computers on a LAN | Ethernet protocol |
A group of the same type of LAN's connected to each other by bridges | LAN cluster |
A network that allows computers to request data and other services from other specific computers on the network | Client/Server Network |
A software program that provides routing services to messages transmitted over the Internet | Internet protocol (ip) |
Specific purpose computers that monitor networks traffic and transfer messages from one network to another | routing devices |
A device connecting an enterprise intranet to the internet | Gateways |
Digital Financial Reporting that electronically tags financial information | XBRL |
ODBC | Data Extraction and Storage |
Digital Dashboard | Data Visualization |
Spreadsheet financial functions | Data Analysis |
Relational Database | Data Storage |
Query | Data Extraction and Transfer |
Star Data Warehouse Structure | Data Storage |
ETL | Data Extraction and Transfer |
predictive modeling | Data Analysis |
OLAp Cube | Data Analysis |
Data Mining | Data Analysis |
Order of ETL | Choose Operational Database Extract operational relational database Transform operational database table into data warehouse table Load data warehouse dimensional table Use data warehouse dimensional table |
Long ranged, unstructured decisions with a high degree of ambiguity are called? | Strategic decisions |
Decisions typically related to ongoing business activities are considered? | Routine operating decisions |
Semistructured decisions that are typically short term in nature and impact one year or less are considered | Tactical Decisions |
A business intelligence technique that uses mathematical algorithms to predict future trends is | predictive modeling |
A business intelligence technique used on relatively unstructured data such as emails is called | Text mining |
A business Intelligence technique used to search social networking sites for customer preferences would be reffered to as | Web mining |
A business intelligence technique used to search data stored in a data warehouse using mathematical algorithms to find patterns, trends, and relationships among data is referred to as | Data Mining |
A step-by-step solution to a problem | Algorithm |
Each spreadsheet is assigned a unique identifier | Spreadsheet Identifier |
Identifying users by analyzing their personal attributes, such as face recognition | Biometrics |
Software generally located on a routing device to monitor network traffic and prevent unauthorized access is | Firewall |
An area between the enterprise's first firewall to the outside world and the next firewall is called | DMZ |
A computer located in the DMZ with attractive but irrelevant data to distract and catch hackers would be | Honeypot |
The level of variation an enterprise is willing to accept in attaining objectives | Risk Tolerance |
The amount of risk an enterprise is willing to accept pursuing value is | RIsk Appetite |
When an enterprise evaluates the extent to which events would impact its ability to achieve objectives, it is conducting | Risk Assessment |
Adding Impact and likelihood columns to a spreadhseet to evaluate risk associated with its use is: | Risk Assessment |
A policy of reconciling a bank statement to within $5 of balancing is an example of | Risk Tolerance |
The likelihood of an event occuring using qualitative measures, such as high, medium, or low | possibility |
The possibility that an event will occur and negatively impact the entity's ability to achieve its stated objectives | Risk |
The likelihood of an event occuring using quantitative measures, such as percentages | probability |
A document that records changes | Change Log |
The possibility or probability that a potential event will occur | Likelihood |
A document that records user access | User Log |
The process of determining events that effect an enterprise's ability to attain its objectives | Event Identification |
the effect that an event will have on the enterprise's ability to achieve its objectives if the event occurs | Impact |