Vous êtes sur la page 1sur 28

IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

CHAPTER 1: INTRODUCTION TO PERSONAL IS: An information system


INFORMATION SYSTEM that improves the productivity of individual
users in performing stand-alone tasks.
DATA : Raw facts such as an employee
number or total hours worked in a week. GROUP IS: An information system that
improves communications and support
INFORMATION: A collection of data collaboration among members of a
organized and processed so that it has workgroup.
additional value beyond the value of the
individual facts. ENTERPRISE IS: An information system
that an organization uses to define structured
PROCESS: A set of logically related tasks interactions among its own employees
performed to achieve a defined outcome. and/or with external customers, suppliers,
government agencies, and other business
KNOWLEDGE: The awareness and partners.
understanding of a set of information and the
ways that information can be made useful to ORGANIZATIONAL COMPLEMENT: A
support a specific task or reach a decision. key component that must be in place to
ensure successful implementation and use of
INFORMATION SYSTEM (IS): A set of an information system.
interrelated components that collect,
process, store, and disseminate data and HARDWARE: Computer equipment used
information; an information system provides to perform input, processing, storage, and
a feedback mechanism to monitor and output activities.
control its operation to make sure it
continues to meet its goals and objectives. SOFTWARE: The computer programs that
govern the operation of a particular
COMPUTER-BASED INFORMATION computing device, be it desktop, laptop,
SYSTEM (CBIS): A single set of tablet, smartphone, or some other device.
hardware, software, databases, networks,
people, and procedures that are configured CONSUMERIZATION OF IT: The trend
to collect, manipulate, store, and process of consumer technology practices
data into information. influencing the way business software is
designed and delivered.
TECHNOLOGY INFRASTRUCTURE:
All the hardware, software, databases, DATABASE: An organized collection of
networks, people, and procedures that are facts and information, typically consisting of
configured to collect, manipulate, store, and two or more related data files.
process data into information
DATA WAREHOUSE: A database that
PROCEDURE: A set of steps that need to stores large amounts of historical data in a
be followed to achieve a specific end result, form that readily supports analysis and
such as enter a customer order, pay a management decision making.
supplier invoice, or request a current
inventory report. EXTRACT-TRANSFORM-LOAD (ETL):
The process by which raw data is extracted
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

from various sources, transformed into a access authorized resources of a company’s


format to support the analysis to be intranet.
performed, and loaded into the data
warehouse. INTERNET OF THINGS (IOT): A
network of physical objects or “things”
BIG DATA: A term used to describe data embedded with sensors, processors,
collections that are so enormous (think software, and network connectivity
petabytes or larger) and complex (from capability to enable them to exchange data
sensor data to social media data) that with the manufacturer of the device, device
traditional data management software, operators, and other connected devices.
hardware, and analysis processes are
incapable of dealing with them. INTERNET OF EVERYTHING: A
network that encompasses not only
machineto-machine but also people-to-
NETWORK: A group or system of
people and people-to-machine connections.
connected computers and equipment—in a
room, building, campus, city, across the E-COMMERCE: Involves the exchange of
country, or around the world—that enables money for goods and services over
electronic communication. electronic networks and encompasses many
of an organization’s outwardfacing
INTERNET: The world’s largest computer
processes—such as sales, marketing, order
network, consisting of thousands of
taking, delivery, procurement of goods and
interconnected networks, all freely
services, and customer service—that touch
exchanging information.
customers, suppliers, and other business
PUBLIC CLOUD COMPUTING: A partners
means of providing computing services
MOBILE COMMERCE (M-
wherein a service provider organization
COMMERCE): The buying and selling of
owns and manages the hardware, software,
goods and/or services using a mobile device,
networking, and storage devices, with cloud
such as a tablet, smartphone, or other
user organizations (called tenants) accessing
portable device.
slices of shared resources via the Internet.
ELECTRONIC BUSINESS (E-
WORLD WIDE WEB (WWW): A network
BUSINESS): The use of information
of links on the Internet to files containing
systems and networks to perform business-
text, graphics, video, and sound.
related tasks and functions beyond those
INTRANET: A network that enables performed for e-commerce.
communication, collaboration, search
TRANSACTION: Any business-related
functions, and information sharing between
exchange such as a payment to an employee,
the members of an organization’s team using
a sale to a customer, or a payment to a
a Web browser.
supplier.
EXTRANET: A network based on Web
TRANSACTION PROCESSING
technologies that allows selected outsiders,
SYSTEM (TPS): An organized collection
such as business partners and customers, to
of people, procedures, software, databases,
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

and devices used to process and record knowledge, or in some other way enhances
business transactions the knowledge management process.
MANAGEMENT INFORMATION PROJECT: A temporary endeavor
SYSTEM: An organized collection of undertaken to create a unique product,
people, procedures, software, databases, and service, or result.
devices that provides routine information to
SYSTEM ACQUISITION: The process
managers and decision makers
used to obtain the information system
INFORMATION SILO: An isolated resources needed to provide the services
information system not easily capable of necessary to meet a specific set of needs.
exchanging information with other
OPEN SOURCE SOFTWARE: Software
information systems.
that is distributed for free, with access
ENTERPRISE RESOURCE permitted to the source code so that it can be
PLANNING (ERP) SYSTEM: A system studied, changed, and improved by software
that supports an organization’s routine professionals at the various user
business processes, maintains records about organizations—with no maintenance
those processes, and provides extensive charges.
reporting and data analysis capabilities. wide
SYSTEM DEVELOPMENT: The activity
range of applications, practices, and
of building information systems to meet
technologies for the extraction,
users’ needs.
transformation, integration, visualization,
analysis, interpretation, and presentation of CYBERCRIMINAL: A computer hacker
data to support improved decision making. who is motivated by the potential for
monetary gain; cybercriminals hack into
BUSINESS ANALYTICS: The extensive
computer systems to steal, often by
use of data and quantitative analysis to
transferring money from one account to
support fact-based decision making within
another or by stealing and reselling credit
organizations.
card numbers, personal identities, and
DATA SCIENTIST: A person who financial account information.
understands the business and the business
CYBERTERRORISM: The intimidation of
analytics technology, while also recognizing
a government or a civilian population by
the limitations of their data, tools, and
using information technology to disable
techniques; a data scientist puts all of this
critical national infrastructure (e.g., energy,
together to deliver real improvements in
transportation, financial, law enforcement,
decision making with an organization.
emergency response) to achieve political,
KNOWLEDGE MANAGEMENT religious, or ideological goals.
SYSTEM (KMS): An organized collection
ETHICS: A set of beliefs about right and
of people, procedures, software, databases,
wrong behavior. Ethical behavior conforms
and devices that stores and retrieves
to generally accepted social norms—many
knowledge, improves collaboration, locates
of which are almost universally accepted.
knowledge sources, captures and uses
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

INTERNET CENSORSHIP: The control 3. Two quality characteristics that are


or suppression of the publishing or accessing critical for data used in accounting for
of information on the Internet. the management of company assets, such
as cash, inventory, and equipment are
DIGITAL DIVIDE: The gulf between those
who do and those who don’t have access to
a. flexibility and accuracy
modern information and communications
b. security and relevancy
technology such as smartphones, personal
c. accuracy and completeness
computers, and the Internet.
d. relevancy and economical
NET NEUTRALITY: The principle that
Information systems are composed of
Internet service providers (ISPs) should be
fundamental components that must be
required to treat all Internet traffic running
carefully assembled and integrated to work
over their wired and wireless broadband
well together.
networks the same— without favoring
content from some sources and/or blocking 4. Technology infrastructure includes all
or slowing (also known as throttling) content the hardware, software, DATABASES ,
from others. networks, people, and procedures that
are configured to collect, manipulate,
store, and process data into information.
SELF –ASSESMENT TEST CHAPTER 1

5. According to Jim Collins in his book


The value of information is directly linked to Good to Great, those who build great
how it helps decision makers achieve the companies understand that the ultimate
organization’s goals. throttle on growth for any great company
is not markets, or technology, or
1. ________ is a collection of raw facts competition, or products; rather, it is one
organized and processed so that it has thing above all others:
additional value beyond the value of the
individual facts. a. great customers
b. great systems
a. Data c. great leadership
b. Information d. great people
c. Knowledge
d. Expertise Managers have an essential role to play in
the successful implementation and use of
2. Turning data into information is a information systems—the role changes
PROCESS or a set of logically related depending on which type of IS system is
tasks performed to achieve a defined being implemented.
outcome.

6. When considering the role of business


managers in working with IS, it is useful
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

to divide information systems into these 10. CLOUD COMPUTING is a computing


three types: environment in which a service provider
a. enterprise IS, group IS, organization owns and manages the
and personal IS hardware, software, networking, and
b. small and simple, medium storage devices, with cloud user
and multifaceted, and large organizations (called tenants) accessing
and complex slices of shared resources via the
c. operational, tactical, and Internet.
strategic
Organizations employ a variety of
d. management support,
information systems to improve the way
operational, and enterprise
they conduct business and make fact-
systems
based decisions.

7. Which of the following is not a key


11. E-COMMERCE involves the exchange
organizational complement that must be
of money for goods and services over
in place to ensure successful
electronic networks, and it encompasses
implementation and use of the system?
many of an organization’s outward-
a. well-trained workers
facing processes—such as sales,
b. better teamwork
marketing, order taking, delivery,
c. the latest technology
procurement of goods and services, and
d. new decision rights
customer service—that touch customers,
suppliers, and other business partners.
An organization’s technology infrastructure
12. A is an organized collection of people,
forms the foundation upon which its systems
procedures, software, databases, and
and applications are built.
devices that provides routine information
8. ______ are the primary device type used to managers and decision makers.
by people around the world to
communicate, go online, and access and a. transaction processing
share information. system (TPS)
a. Personal computers b. management information
b. Laptops system (MIS)
c. Smartphones c. enterprise resource
d. Tablets planning (ERP) system
d. supply chain management
9. The trend of consumer technology system
practices influencing the way business 13. Over time, decision support systems,
software is designed and delivered is executive information systems, online
called the CONSUMERIZATION OF analytical processing, business
IT. intelligence, and business analytics have
gained in capabilities and expanded in
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

scope to add new functionality, but they c. build software in-house or


have all had the goal of contract for software
a. processing business transactions as d. buy off-the-shelf software or
rapidly and accurately as possible build a custom application
b. deriving the most value out of
the data available Information systems must be applied
thoughtfully and carefully so that society,
c. providing routine information to
organizations, and individuals around the
managers
globe can reap their enormous benefits.
d. enabling the sharing of
information across organizations 17. Which of the following statements about
units computer security is not true?
14. An organized collection of people,
procedures, software, databases, and a. Cyberterrorism is an increasing
devices that stores and retrieves concern for organizations and countries
knowledge, improves collaboration, around the globe.
locates knowledge sources, and captures b. Information systems provide a new
and uses knowledge is called a and highly profitable venue for
KNOWLEDGE MANAGEMENT cybercriminals.
c. The need for computer security must
SYSTEM
be balanced against other business
Strategic planning and project management needs.
are keys to ensuring that the organization is d. Educating end users about the risks
working effectively on the right projects. involved and the actions they must
take to prevent a security incident is a
15. An IT organization not aligned with the not key part of any security program.
key objectives of the business will ___.
18. DIGITAL DIVIDE is a term used to
a. be recognized as a technology leader describe the gulf between those who do
in its industry and those who don’t have access to
b. find it difficult to even gain modern information and
management support for its proposed communications technology such as
efforts smartphones, personal computers, and
c. be positioned to deliver a series of the Internet.
breakthrough projects
d. be viewed as a partner with the CHAPTER 2 : INFORMATION
business SYSTEMS IN ORGANIZATIONS

16. The two fundamental strategies for ORGANIZATION: A group of people that
system acquisition are: . is structured and managed to meet its
mission or set of group goals.
a. customize an existing package and
acquire open source software VALUE CHAIN: A series (chain) of
b. use a standard software package or activities that an organization performs to
customize software transform inputs into outputs in such a way
that the value of the input is increased
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

supply chain: A key value chain whose downsizing: Reducing the number of
primary activities include inbound logistics, employees to cut costs.
operations, outbound logistics, marketing
and sales, and service. culture: A set of major understandings and
assumptions shared by a group, such as
supply chain management (SCM): The within an ethnic group or a country.
management of all the activities required to
get the right product into the right organizational culture: The major
consumer’s hands in the right quantity at the understandings and assumptions for a
right time and at the right cost—from the business, corporation, or other organization.
identification of suppliers and the
acquisition of raw materials through organizational change: How forprofit and
manufacture and customer delivery. nonprofit organizations plan for, implement,
and handle change.
virtual team: A group of individuals whose
members are distributed geographically, but soft side of implementing change: The work
who collaborate and complete work through designed to help employees embrace a new
the use of information systems. information system and way of working.

innovation: The application of new ideas to change management model: A description of


the products, processes, and activities of a the phases an individual or organization
firm, leading to increased value. goes through in making a change and
principles for successful implementation of
reengineering (process redesign/business change.
process reengineering, BPR): The radical
redesign of business processes, Lewin’s change model: A threestage
organizational structures, information approach for implementing change that
systems, and values of the organization to involves unfreezing, moving, and refreezing.
achieve a breakthrough in business results.
force field analysis: An approach to
continuous improvement: Constantly identifying both the driving (positive) and
seeking ways to improve business processes restraining (negative) forces that influence
and add value to products and services. whether change can occur.

outsourcing: A long-term business driving forces: The beliefs, expectations, and


arrangement in which a company contracts cultural norms that tend to encourage a
for services with an outside organization that change and give it momentum.
has expertise in providing a specific
function. restraining forces: Forces that make it
difficult to accept a change or to work to
offshore outsourcing (offshoring): An implement a change.
outsourcing arrangement where the
organization providing the service is located Leavitt’s diamond: An organizational
in a country different from the firm change model that proposes that every
obtaining the services. organizational system is made up of four
main components—people, tasks, structure,
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

and technology—that all interact; any 2. The is a series of activities that an


change in one of these elements will organization performs to transform
necessitate a change in the other three inputs into outputs in such a way that the
elements. value of the input is increased.
a. supply chain
organizational learning: The adaptations and b. inbound logistics
adjustments made within an organization c. value chain
based on experience and ideas over time. d. manufacturing
3. SUPPLY CHAIN MANAGEMENT
technology acceptance model (TAM): A encompasses all the activities required to
model that specifies the factors that can lead get the right product into the right
to better attitudes about an information customer’s hands in the right quantity at
system, along with higher acceptance and the right time and at the right cost.
usage of it.
4. Which of the following is not a true
diffusion of innovation theory: A theory statement regarding the use of virtual
developed by E.M. Rogers to explain how a teams?
new idea or product gains acceptance and a. Virtual teams enable the
diffuses (or spreads) through a specific organization to enlist
population or subset of an organization. thebestpeopleindifferentgeographical
regions to solve important
shadow IT: The information systems and organizational problems.
solutions built and deployed by departments b. The use of virtual teams provides
other than the information systems the ability to staff a team with people
department. In many cases, the information who have a wide range of experience
systems department may not even be aware and knowledge that stems from a
of these efforts. variety of professional experiences
and cultural backgrounds.
certification: A process for testing skills and c. It is usually easy and convenient
knowledge; successful completion of a for all members of a virtual team
certification exam results in a statement by to meet at the same time and
the certifying authority that confirms an physical location.
individual is capable of performing d. Members of a virtual team may
particular tasks. feel that their work day never ends.

CHAPTER 2 SELF ASSESSMENT TEST 5. Continuous enhancement of an existing


product is an example of SUSTAINING
Organizations are open systems that affect innovation.
and are affected by their surrounding
environment. 6. A long-term business arrangement in
which a company contracts for services
1. Organizations are considered to be with an outside organization located in
OPEN systems, meaning that can affect another country to provide a specific
and are affected by their surrounding business function is called .
environment.
a. business process reengineering
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

b. outsourcing d. Lewin’s change model


c. downsizing
d. offshore outsourcing The information system worker functions at
the intersection of business and technology
and designs, builds, and implements
7. _____ of large information system solutions that allow organizations to
projects fail, at least in part, due to a effectively leverage information technology
failure to prepare business users for the systems.
actual change to come.
a. Less than 15 percent 10. The Bureau of Labor Statistics forecasts
b. Over 80 percent an increase of new computing jobs in the
c. About 48 percent time period 2012 to 2022.
d. Between 30 and 70 percent a. .12 million
b. .5 million
Information systems must be implemented c. 1.0 million
in such a manner that they are accepted and d. 1.2 million
work well within the context of an
organization and support its fundamental 11. The typical information systems
business goals and strategies. organization is typically divided into
three functions, including support,
8. The three stages of Lewin’s change development, and . OPERATION.
model include (1) ceasing old habits and
creating a climate that is receptive to 12. CERTIFICATION is a process for
change; (2) learning new work methods, testing skills and knowledge; successful
behaviors, and systems; and (3)___ . completion of a certification exam
results in an endorsement by the
a. reinforcing changes to make the certifying authority that an individual is
new process second nature, capable of performing particular tasks or
accepted, and part of the job. jobs.
b. fine-tuning existing work
processes and systems so they
become more streamlined and CHAPTER 3 HARDWARE AND
efficient MOBILE DEVICES
c. replacing existing users that refuse
to accept the change CENTRAL PROCESSING UNIT
d. rewarding those responsible for (CPU): The part of a computer that
the change sequences and executes instructions.

9. The _____ change model is helpful in MEMORY: A component of the


identifying and addressing negative computer that provides the processor
feelings that make it difficult for users to with a working storage area to hold
accept the move to a new information program instructions and data.
system.
INPUT/OUTPUT DEVICE: A
a. Leavitt’s diamond computer component that provides data
b. Lewin’s force field analysis and instructions to the computer and
c. Diffusion of innovation theory receives results from it.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

BUS: A set of electronic circuits used to that speeds processing by linking


route data and instructions to and from hundreds or thousands of processors to
the various components of a computer. operate at the same time, or in parallel,
with each processor having its own bus,
CLOCK SPEED: A series of electronic memory, disks, copy of the operating
pulses produced at a predetermined rate system, and applications.
that affects machine cycle time.
GRID COMPUTING: The use of a
GIGAHERTZ (GHZ): A unit of collection of computers, often owned by
frequency that is equal to one billion multiple individuals or organizations,
cycles per second; a measure of clock that work in a coordinated manner to
speed. solve a common problem.

INSTRUCTION SET INTEGRATED CIRCUIT (IC): A set


ARCHITECTURE (ISA): A basic set of electronic circuits on one small piece
of commands (opcodes) that the of semiconductor material, normally
processor can execute. silicon.

PROCESSOR FAMILY: A set of SEMICONDUCTOR FABRICATION


processors from the same manufacturer PLANT: A factory where integrated
that have similar features and circuits are manufactured; also called a
capabilities. fab or a foundry.

MULTIPROCESSING: The MAIN MEMORY: The component of a


simultaneous execution of two or more computer that provides the CPU with a
instructions at the same time. working storage area for program
instructions and data.
COPROCESSOR: The part of the
computer that speeds processing by BYTE (B): Eight bits that together
executing specific types of instructions represent a single character of data.
while the CPU works on another
processing activity. RANDOM ACCESS MEMORY
(RAM): A form of memory in which
MULTICORE PROCESSOR: A instructions or data can be temporarily
microprocessor that has two or more stored.
independent processing units, called
cores, which are capable of sequencing CACHE MEMORY: A type of
and executing instructions. highspeed memory that a processor can
access more rapidly than main memory.
PARALLEL COMPUTING: The
simultaneous execution of the same task SECONDARY STORAGE: A device
on multiple processors to obtain results that stores large amounts of data,
faster. instructions, and information more
permanently than allowed with main
MASSIVELY PARALLEL memory.
PROCESSING SYSTEM: A system
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

MAGNETIC TAPE: A type of


sequential secondary storage medium, network-attached storage (NAS): A hard
now used primarily for storing backups disk drive storage device that is set up
of critical organizational data in the with its own network address and
event of a disaster. provides file-based storage services to
other devices on the network.
HARD DISK DRIVE (HDD): A direct
access storage device used to store and storage area network (SAN): A high-
retrieve data from rapidly rotating disks speed, special-purpose network that
coated with magnetic material. integrates different types of data storage
devices (e.g., hard disk drives, magnetic
REDUNDANT ARRAY OF tape, solid state secondary storage
INDEPENDENT/INEXPENSIVE devices) into a single storage system and
DISKS (RAID): A method of storing connects that to computing resources
data that generates extra bits of data across an entire organization.
from existing data, allowing the system
to create a “reconstruction map” so that POLICY-BASED STORAGE
if a hard drive fails, the system can MANAGEMENT: The automation of
rebuild lost data. storage using previously defined
policies.
VIRTUAL TAPE: A storage device for
less frequently needed data. With virtual STORAGE AS A SERVICE: A data
tape systems, data appears to be stored storage model where a data storage
entirely on tape cartridges, although service provider rents space to
some parts of it might actually be located individuals and organizations.
on faster hard disks.
DATA ENTRY: Converting
OPTICAL STORAGE DEVICE: A humanreadable data into a machine-
form of data storage that uses lasers to readable form.
read and write data.
DATA INPUT: Transferring
COMPACT DISC READ-ONLY machinereadable data into the system.
MEMORY (CD-ROM): A common
form of optical disc on which data SOURCE DATA AUTOMATION:
cannot be modified once it has been Capturing and editing data where it is
recorded. initially created and in a form that can be
directly entered into a computer, thus
DIGITAL VIDEO DISC (DVD): A ensuring accuracy and timeliness.
form of optical disc storage that looks
like a CD but that can store more data SPEECH-RECOGNITION
and access it more quickly. TECHNOLOGY : Input devices that
recognize human speech.
SOLID STATE STORAGE DEVICE
(SSD): A storage device that stores data MAGNETIC STRIPE CARD: A type
in memory chips rather than on hard disk of card that stores a limited amount of
drives or optical media. data by modifying the magnetism of tiny
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

iron-based particles contained in a band MP3: A standard format for


on the card. compressing a sound sequence into a
small file.
SMART CARD: A credit card
embedded with a computer chip that E-BOOK: The digital media equivalent
contains key consumer and account data; of a conventional printed book.
smart card users must either enter their
PIN (chip-and-PIN) or sign (chip-and- PORTABLE COMPUTER: A
sign) for each transaction to be computer small enough to carry easily.
approved.
WEARABLE COMPUTER: An
CONTACTLESS PAYMENT CARD: electronic device capable of storing and
A card with an embedded chip that only processing data that is incorporated into
needs to be held close to a terminal to a person’s clothing or personal
transfer its data; no PIN number needs to accessories.
be entered.
LAPTOP: A personal computer
POINT-OF-SALE (POS) DEVICE: A designed for use by mobile users, being
device used to enter data into a computer small and light enough to sit comfortably
system. on a user’s lap.

RADIO FREQUENCY ANATOMY OF A SMART PHONE:


IDENTIFICATION (RFID): A Smart phones employ a combination
technology that employs a microchip chipset called a “system on a chip,”
with an antenna to broadcast its unique which includes processor cores, RAM
identifier and location to receivers. and ROM memory, interface controllers,
and voltage regulators.
COMPUTER GRAPHICS CARD: A
component of a computer that takes TABLET: A portable, lightweight
binary data from the CPU and translates computer with no keyboard that allows
it into an image you see on your display you to roam the office, home, or factory
device. floor carrying the device like a
clipboard.
GRAPHICS PROCESSING UNIT
(GPU): A powerful processing chip that Tablet The Samsung Galaxy Note 10.1
renders images on the screen display. Android tablet has a large touch screen
and a quad-core processor.
BIOPRINTING: The use of 3D printers
to build human parts and organs from THIN CLIENT: A low-cost, centrally
actual human cells. managed computer with no internal or
external attached drives for data storage.
DIGITAL AUDIO PLAYER: A device
that can store, organize, and play digital DESKTOP COMPUTER: A
music files. nonportable computer that fits on a
desktop and provides sufficient
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

computing power, memory, and storage logical servers, each acting as its own
for most business computing tasks. dedicated machine

NETTOP: A very small, inexpensive Virtual server Virtualization is an


desktop computer typically used for approach to improving hardware
Internet access, email, accessing Web- utilization by logically dividing the
based applications, document resources of a single physical server to
processing, and audio/video playback. create multiple logical servers

WORKSTATIONS: A more powerful CONTAINER: A way for software


personal computer used for developers and hardware managers to
mathematical computing, computer- package applications and software
assisted design, and other high-end components into a well-defined, compact
processing but still small enough to fit envelope that can be used to more easily
on a desktop. manage it, including moving it across
various hosts.
SERVER: A computer employed by
many users to perform a specific task, BLADE SERVER: A server that
such as running network or Internet houses many individual computer
applications. motherboards that include one or more
processors, computer memory, computer
SCALABILITY: The ability to increase storage, and computer network
the processing capability of a computer connections.
system so that it can handle more users,
more data, or more transactions in a DATA CENTER: A climateand-access-
given period controlled building or a set of buildings
that houses the computer hardware that
MAINFRAME COMPUTER: A large, delivers an organization’s data and
powerful computer often shared by information service
hundreds of concurrent users connected
to the machine over a network. Modular data center Microsoft employs
a state-of-the-art modular data center.
SUPERCOMPUTERS: The most
powerful computer systems with the GREEN COMPUTING: A program
fastest processing speeds. concerned with the efficient and
environmentally responsible design,
SERVER FARM: A facility that houses manufacture, operation, and disposal of
a large number of servers in the same IS-related products
room, where access to the machines can
be controlled and authorized support ELECTRONIC PRODUCT
personnel can more easily manage and ENVIRONMENTAL ASSESSMENT
maintain the servers. TOOL (EPEAT): A system that enables
purchasers to evaluate, compare, and
VIRTUAL SERVER: A method of select electronic products based on a set
logically dividing the resources of a of environmental criteria.
single physical server to create multiple
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

Chapter 3: Self-Assessment Test


7. The optical storage device capable of
1. The _____ is the part of the computer storing the most data is the .
that sequences and executes instructions. a. DVD
a. CPU b. Blu-ray disc
b. memory c. CD-ROM
c. bus d. double-sided DVD
d. input/output devices
8. A high-speed, special-purpose
2. Clock speed is measured in GHz or network that integrates different types of
_____ data storage devices into a single storage
a. millions of instructions per second system and connects them to computing
b. millions of cycles per second resources across an entire organization is
c. billions of cycles per second called a(n) _______.
d. millions of floating point instructions a. network-attached storage
per second b. storage area network
c. storage as a service
3. A key advantage of ARM processors d. enterprise data storage solution
over the traditional x86 complex
instruction set processors is that ______ 9. Source data automation involves
a. ARM processors do not generate as capturing and editing data where it is
much heat originally created and in a form that can
b. ARM processors are more powerful be directly entered into a computer to
c. ARM processors are larger ensure accuracy and timeliness.
d. ARM processors have a faster clock 10. After October 1, 2015, merchants
speed who accept payments made via a chip
card’s magnetic stripe can continue to do
4. The use of a collection of computers, so; however, they must accept
often owned by multiple individuals or responsibility for any fraudulent
organizations, to work in a coordinated purchases. True or False? True
manner to solve a common problem is
called _______ 11. Bioprinting is a process that uses 3D
a. parallel computing printers to build human body parts and
b. massively parallel processing organs from actual human cells.
c. multicore processing
d. grid computing 12 A combination chipset called a
system on a chip includes processor
5. Extreme ultraviolet lithography or cores, RAM and ROM memory,
EUVL is a highly complex process used interface controllers, and voltage
in manufacturing computer chips with regulators.
feature sizes that are extremely small.
13. A is a low-cost, centrally managed
6. L1 is the fastest type of cache memory computer with no internal or external
built into a computer, faster even than attached drives for data storage.
DDR4 SDRAM memory. True or False? a. tablet
True b. thin client
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

c. nettop computer
d. workstation APPLICATION SOFTWARE:
Programs that help users solve particular
14. Servers offer great scalability, the computing problems
ability to increase the processing
capability of a computer system so it can SPHERE OF INFLUENCE: The
handle more users, more data, or more scope of the problems and opportunities
transactions in a given period. that the software addresses.

15. ___________ is an approach to PERSONAL SPHERE OF


improving hardware utilization by INFLUENCE: The sphere of influence
logically dividing the resources of a that serves the needs of an individual
single physical server to create multiple user.
logical servers each with its own
dedicated machine. PERSONAL PRODUCTIVITY
a. Server farm SOFTWARE: Software that enables
b. Multiprocessing users to improve their personal
c. Virtual server effectiveness, increasing the amount of
d. Hypervisor work and quality of work they can do.

16. Which of the following is not a goal WORKGROUP: Two or more people
of green computing? who work together to achieve a common
a. Enable the safe disposal or recycling goal.
of computers and computer-related
equipment. WORKGROUP SPHERE OF
b. Allow companies to lower their INFLUENCE: The sphere of influence
power-related costs that helps workgroup members attain
c. Reduce the use of hazardous material. their common goals.
d. Reduce the cutting down of trees
and other foliage. ENTERPRISE SPHERE OF
INFLUENCE: The sphere of influence
17. Green computing is about saving the that serves the needs of an organization
environment; there are no real business in its interactions with its environment.
benefits associated with this program.
True or False? False OPERATING SYSTEM (OS): A set
of computer programs that controls the
computer hardware and acts as an
CHAPTER 4 Software and interface to application software
Mobile Applications
KERNEL: The heart of the operating
SYSTEM SOFTWARE: Software that system that controls the most critical
includes operating systems, utilities, and processes of the OS
middleware that coordinate the activities
and functions of the hardware and other USER INTERFACE: The element of
programs throughout the computer the operating system that allows people
system.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

to access and interact with the computer SERVICE-ORIENTED


system. ARCHITECTURE (SOA): A software
design approach based on the use of
COMMAND-BASED USER discrete pieces of software (modules) to
INTERFACE: A user interface that provide specific functions as services to
requires you to give text commands to other applications.
the computer to perform basic activities.
RICH INTERNET APPLICATION
GRAPHICAL USER INTERFACE (RIA): A Web-delivered application
(GUI): An interface that displays combines hardware resources of the Web
pictures (icons) and menus that people server and the PC to deliver valuable
use to send commands to the computer software services through a Web
system browser interface.

APPLICATION PROGRAMMING PROPRIETARY SOFTWARE:


INTERFACE (API): A set of Oneof-a-kind software designed for a
programming instructions and standards specific application and owned by the
that enables one software program to company, organization, or person that
access and use the services of another uses it.
software program.
OFF-THE-SHELF SOFTWARE:
HARDWARE INDEPENDENCE: The Software produced by software vendors
ability of a software program to run on to address needs that are common across
any platform, without concern for the businesses, organizations, or individuals.
specific underlying hardware.
SOFTWARE AS A SERVICE
eMBEDDED SYSTEM: A computer (SAAS): A service that allows
system (including some sort of businesses to subscribe to Web-delivered
processor) that is implanted in and application software
dedicated to the control of another
device. SOFTWARE SUITE: A collection of
programs packaged together and sold in
UTILITY PROGRAM: A program that a bundle.
helps to perform maintenance or correct workgroup application software:
problems with a computer system Software that supports teamwork,
whether team members are in the same
MIDDLEWARE: Software that allows location or dispersed around the world.
various systems to communicate and
exchange data. PROGRAMMING LANGUAGES:
Sets of keywords, commands, symbols,
ENTERPRISE APPLICATION and rules for constructing statements by
INTEGRATION (EAI): The systematic which humans can communicate
tying together of disparate applications instructions to a computer.
so that they can communicate.
SYNTAX: A set of rules associated with
a programming language.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

a.IBM z/os
COMPILER: A special software b.Windows 10
program that converts the programmer’s c.MAC iOS
source code into the machine-language d. Linux
instructions, which consist of binary
digits.
6. A(n) virtual server simulates a
SINGLE-USER LICENSE: A computer’s hardware architecture in
software license that permits you to software so that a single server can
install the software on one or more run operating systems and software
computers, used by one person designed for other architectures, or
run several operating systems
CHAPTER 4: SELF-ASSESSMENT simultaneously on one system.
TEST
7. Proprietary software is one-of-a-
1. The two main categories of software kind software designed for a specific
are . application and owned by the
a. enterprise and workgroup company, organization, or person
b. operating system and application that uses it.
c. application and system
d. utilities and operating system
8. Cloud computing refers to the use of
2. Application software that enables computing resources, including
users to develop a spreadsheet for software and data storage, on the
tracking their exercise and eating Internet, rather than on local
habits is software for the workgroup computers.
sphere of influence. True or False?
False
9. Software that enables users to
3. . The heart of the operating system improve their personal effectiveness,
that controls its most critical increasing the amount of work they
processes is called the kernel can do and its quality, is called
________ .
a.workgroup software
4. Software applications use the OS by b.enterprise software
requesting services through a(n) c.utilitysoftware
________ . d. personal application software
a. integrated development
environment
b. application program interface 10. Each programming language has its
c. utility program own set of rules, called the syntax of
d. software development kit the language.

5. __________ is an operating system 11. ________ is software that makes its


that can run in all three spheres of source code available so that others
influence. may modify it.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

a.Freeware HIERARCHY OF DATA: Bits, characters,


b.Off-the-shelf software fields, records, files, and databases.
c.Open-source software
d. Software in the public domain ENTITY: A person, place, or thing for
which data is collected, stored, and
maintained.
12. Software are an important source of
increased revenue for software ATTRIBUTE: A characteristic of an entity.
manufacturers and can provide
useful new functionality and DATA ITEM: The specific value of an
improved quality for software users. attribute.
a.bugs PRIMARY KEY: A field or set of fields that
b.upgrades uniquely identifies the record.
c. open source licenses
d. third-party distributors DATABASE APPROACH TO DATA
MANAGEMENT: An approach to data
management where multiple information
CHAPTER 5 Database systems share a pool of related data.
Systems and Big Data
DATA MODEL: A diagram of data entities
and their relationships.
DATABASE: A well-designed, organized,
and carefully managed collection of data ENTERPRISE DATA MODEL: A data
model that provides a roadmap for building
DATABASE MANAGEMENT SYSTEM database and information systems by
(DBMS): A group of programs used to creating a single definition and format for
access and manage a database as well as data that can ensure data compatibility and
provide an interface between the database the ability to exchange and integrate data
and its users and other application programs among systems.
BIT: A binary digit (i.e., 0 or 1) that ENTITY-RELATIONSHIP (ER)
represents a circuit that is either on or off. DIAGRAM: A data model that uses basic
CHARACTER: A basic building block of graphical symbols to show the organization
most information, consisting of uppercase of and relationships between data.
letters, lowercase letters, numeric digits, or RELATIONAL DATABASE MODEL: A
special symbols. simple but highly useful way to organize
FIELD: Typically a name, a number, or a data into collections of two-dimensional
combination of characters that describes an tables called relations.
aspect of a business object or activity. DOMAIN: The range of allowable values
RECORD: A collection of data fields all for a data attribute.
related to one object, activity, or individual. SELECTING: Manipulating data to
FILE: A collection of related records. eliminate rows according to certain criteria.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

PROJECTING: Manipulating data to DATA MANIPULATION LANGUAGE


eliminate columns in a table. (DML): A specific language, provided with
a DBMS, which allows users to access and
JOINING: Manipulating data to combine
modify the data, to make queries, and to
two or more tables.
generate reports.
LINKING: The ability to combine two or
DATABASE ADMINISTRATORS
more tables through common data attributes
(DBAS): Skilled and trained IS
to form a new table with only the unique
professionals who hold discussions with
data attributes.
business users to define their data needs;
DATA CLEANSING (DATA apply database programming languages to
CLEANING OR DATA SCRUBBING): craft a set of databases to meet those needs;
The process of detecting and then correcting test and evaluate databases; implement
or deleting incomplete, incorrect, inaccurate, changes to improve the performance of
or irrelevant records that reside in a databases; and assure that data is secure
database. from unauthorized access.

SQL: A special-purpose programming DATA ADMINISTRATOR: An individual


language for accessing and manipulating responsible for defining and implementing
data stored in a relational database. consistent principles for a variety of data
issues.
ACID PROPERTIES: Properties
(atomicity, consistency, isolation, durability) DATABASE AS A SERVICE (DAAS):
that guarantee relational database An arrangement where the database is stored
transactions are processed reliably and on a service provider’s servers and accessed
ensure the integrity of data in the database. by the service subscriber over a network,
typically the Internet, with the database
SCHEMA: A description that defines the administration handled by the service
logical and physical structure of the database provider.
by identifying the tables, the fields in each
table, and the relationships between fields DATA MANAGEMENT: An integrated set
and tables. of functions that defines the processes by
which data is obtained, certified fit for use,
DATA DEFINITION LANGUAGE stored, secured, and processed in such a way
(DDL): A collection of instructions and as to ensure that the accessibility, reliability,
commands used to define and describe data and timeliness of the datameet theneeds of
and relationships in a specific database. the data users within an organization.
DATA DICTIONARY: A detailed DATA GOVERNANCE: The core
description of all the data used in the component of data management; it defines
database. the roles, responsibilities, and processes for
CONCURRENCY CONTROL: A method ensuring that data can be trusted and used by
of dealing with a situation in which two or the entire organization, with people
more users or applications need to access the identified and in place who are responsible
same record at the same time. for fixing and preventing issues with data.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

DATA STEWARD: An individual Reduce method that performs a summary


responsible for the management of critical operation.
data elements, including identifying and
IN-MEMORY DATABASE (IMDB): A
acquiring new data sources; creating and
database management system that stores the
maintaining consistent reference data and
entire database in random access memory
master data definitions; and analyzing data
(RAM).
for quality and reconciling data issues.
DATA LIFECYCLE MANAGEMENT
(DLM): A policy-based approach to Chapter 5: Self-Assessment
managing the flow of an enterprise’s data, Test
from its initial acquisition or creation and
storage to the time when it becomes
outdated and is deleted. 1. A field or set of fields that uniquely
identifies a record in a database is called
DATA MART: A subset of a data
a(n) _______ .
warehouse that is used by small- and
medium-sized businesses and departments a. attribute
within large companies to support decision b. data item
making. c. record
d. primary key
DATA LAKE (ENTERPRISE DATA
HUB): A “store everything” approach to big
data that saves all the data in its raw and 2. The key concept of the database approach
unaltered form. to data management is that _______.
a. all records in the database are stored in a
NOSQL DATABASE: A way to store and
twodimensional table
retrieve data that is modeled using some
means other than the simple twodimensional b. multiple information systems
tabular relations used in relational databases. share access to a pool of related data
c. only authorized users can access
HADOOP: An open-source software
the data
framework including several software
d. a database administrator
modules that provide a means for storing
“owns” the data
and processing extremely large data sets.
HADOOP DISTRIBUTED FILE
SYSTEM (HDFS): A system used for data
3. A(n) _______ provides an organizational
storage that divides the data into subsets and
level roadmap for building databases and
distributes the subsets onto different servers
information systems by creating a single
for processing.
definition and format for data.
MAPREDUCE PROGRAM: A composite
a. database
program that consists of a Map procedure
b. enterprise data model
that performs filtering and sorting and a
c. entity relationship diagram
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

d. database management system 10. Data administrators are skilled and


trained IS professionals who hold
discussions with users to define their data
4. The relational database model is a
needs; apply database programming
simple but highly useful way to organize
languages to craft a set of databases to meet
data into collections of two-dimensional
those needs; and assure that data is secure
tables called relations.
from unauthorized access. True or False?
False
5. The ability to combine two or more tables 11. With database as a service (DaaS) the
through common data attributes to form a database is stored on a service provider’s
new table with only the unique data servers and accessed by the service
attributes is called linking. subscriber over the Internet, with the
database administration handled by the
service provider.
6. SQL databases conform to ACID
properties, which include atomicity, 12. Three characteristics associated with big
consistency, isolation, and durability. data include volume, velocity, and variety.

7. The process of detecting and then 13. The Data Management Association has
correcting or deleting incomplete, incorrect, defined 10 major functions of data
inaccurate, or irrelevant records that reside management, with the core component being
in a database is called data cleansing, data .
cleaning, or data scrubbing. a. data quality management
b. data security management
8. Because the DBMS is responsible for c. data governance
providing access to a database, one of the
first steps in installing and using a relational d. data architecture management
database involves “telling” the DBMS the
A number of available tools and
logical and physical structure of the data and
technologies allow organizations to take
relationships among the data in the database.
advantage of the opportunities offered by
This description of an entire database is
big data.
called a(n) schema.
14. A(n) NoSQL database provides a means
9. A(n) data steward is an individual
to store and retrieve data that is modeled
responsible for the management of critical
using some means other than simple two-
data elements, including identifying and
dimensional relations used in relational
acquiring new data sources; creating and
databases.
maintaining consistent reference data and
master data definitions; and analyzing data
for quality and reconciling data issues.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

15. Hadoop has two primary components—a MESH NETWORK: A network that uses
data processing component and a distributed multiple access points to link a series of
file system called . devices that speak to each other to form a
network connection across a large area.
a. MapReduce and HDFS
PERSONAL AREA NETWORK (PAN):
b. TaskTracker and JobTracker
A network that supports the interconnection
c. Key-value and graph of information technology devices close to
one person.
d. SQL and NoSQL
LOCAL AREA NETWORK (LAN): A
network that connects computer systems and
16. An in-memory database is a database devices within a small area, such as an
management system that stores the entire office, home, or several floors in a building.
database in random access memory to
METROPOLITAN AREA NETWORK
provide fast access.
(MAN): A network that connects users and
their computers in a geographical area that
spans a campus or city.
CHAPTER 6 NETWORKS AND CLOUD
COMPUTING WIDE AREA NETWORK (WAN): A
network that connects large geographic
COMPUTER NETWORK: The
regions.
communications media, devices, and
software connecting two or more computer CLIENT/SERVER ARCHITECTURE:
systems or devices. An approach to computing wherein multiple
computer platforms are dedicated to special
COMMUNICATIONS MEDIUM: Any functions, such as database management,
material substance that carries an electronic printing, communications, and program
signal to support communications between a execution.
sending and a receiving device.
CHANNEL BANDWIDTH: The rate at
NETWORK TOPOLOGY: The shape or
which data is exchanged, usually measured
structure of a network, including the in bits per second (bps)
arrangement of the communication links and
hardware devices on the network. BROADBAND COMMUNICATIONS:
High-speed Internet access that is always on
STAR NETWORK: A network in which all
and that is faster than traditional dial-up
network devices connect to one another access.
through a single central device called the
hub node. WIRELESS COMMUNICATION: The
transfer of information between two or more
BUS NETWORK: A network in which all points that are not connected by an electrical
network devices are connected to a common conductor.
backbone that serves as a shared
communications medium. NEAR FIELD COMMUNICATION
(NFC): A very short-range wireless
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

connectivity technology that enables two INTERNET PROTOCOL (IP): A


devices placed within a few inches of each communication standard that enables
other to exchange data. computers to route communications traffic
from one network to another as needed.
BLUETOOTH: A wireless communications
specification that describes how cell phones, INTERNET BACKBONE: One of the
computers, faxes, printers, and other Internet’s high-speed, long-distance
electronic devices can be interconnected communications links.
over distances of 10 to 30 feet at a rate of
IP ADDRESS: A 64-bit number that
about 2 Mbps.
identifies a computer on the Internet.
WI-FI: A medium-range wireless
UNIFORM RESOURCE LOCATOR
communications technology brand owned by
(URL): A Web address that specifies the
the Wi-Fi Alliance.
exact location of a Web page using letters
LONG TERM EVOLUTION (LTE): A and words that map to an IP address and a
standard for wireless communications for location on the host.
mobile phones based on packet switching.
INTERNET SERVICE PROVIDER
NETWORK OPERATING SYSTEM (ISP): Any organization that provides
(NOS): Systems software that controls the Internet access to people.
computer systems and devices on a network
HYPERLINK: Highlighted text or graphics
and allows them to comm.
in a Web document that, when clicked,
NETWORK-MANAGEMENT opens a new Web page containing related
SOFTWARE: Software that enables a content.
manager on a networked desktop to monitor
Web browser: Web client software— such
the use of individual computers and shared
as Chrome, Edge, Firefox, Internet Explorer,
hardware (such as printers), scan for viruses,
and Safari—used to view Web pages.
and ensure compliance with software
licenses. HYPERTEXT MARKUP LANGUAGE
(HTML): The standard page description
MOBILE DEVICE MANAGEMENT
language for Web pages.
(MDM) SOFTWARE: Software that
manages and troubleshoots mobile devices TAG: A code that tells the Web browser
remotely, pushing out applications, data, how to format text—as a heading, as a list,
patches, and settings while enforcing group or as body text—and whether images,
policies for security. sound, and other elements should be
inserted.
SOFTWARE-DEFINED NETWORKING
(SDN): An emerging approach to EXTENSIBLE MARKUP LANGUAGE
networking that allows network (XML): The markup language designed to
administrators to have programmable central transport and store data on the Web.
control of the network via a controller
without requiring physical ac
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

CASCADING STYLE SHEET (CSS): A processing operations, including servers,


markup language for defining the visual storage devices, and networking
design of a Web page or group of pages. components.
WEB 2.0: The Web as a computing PLATFORM AS A SERVICE (PAAS):
platform that supports software applications An approach that provides users with a
and the sharing of information among users. computing platform, typically including
operating system, programming language
SEARCH ENGINE: A valuable tool that
execution environment, database services,
enables you to find information on the Web
and Web server.
by specifying words that are key to a topic
of interest, known as keywords. PRIVATE CLOUD ENVIRONMENT: A
single tenant cloud.
SEARCH ENGINE OPTIMIZATION
(SEO): A process for driving traffic to a HYBRID CLOUD: A cloud computing
Web site by using techniques that improve environment is composed of both private
the site’s ranking in search results. and public clouds integrated through
networking.
INSTANT MESSAGING: The online,
real-time communication between two or AUTONOMIC COMPUTING: The ability
more people who are connected via the of IT systems to manage themselves and
Internet. adapt to changes in the computing
environment, business policies, and
WEB LOG (BLOG): A Web site that
operating objectives.
people and businesses use to share their
observations, experiences, and opinions on a
wide range of topics.
Chapter 6: Self-Assessment
PODCAST: An audio broadcast you can Test
listen to over the Internet.
A network has many fundamental
CONTENT STREAMING: A method for components— which, when carefully
transferring large media files over the selected and effectively integrated—enable
Internet so that the data stream of voice and people to meet personal and organizational
pictures plays more or less continuously as objectives.
the file is being downloaded.
1. Communications media can be divided
VIRTUAL PRIVATE NETWORK (VPN): into two broad categories .
A secure connection between two points on
a. infrared and microwave
the Internet; VPNs transfer information by
encapsulating traffic in IP packets and b. fiber optic and cable
sending the packets over the Internet.
c. packet switching and circuit switching
INFRASTRUCTURE AS A SERVICE
d. guided and wireless
(IAAS): An information systems strategy in
which an organization outsources the
equipment used to support its data
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

2. refers to the rate at which data can be communications conventions called the
exchanged and is measured in bits per Internet protocol or TCP/IP.
second.
7. Every computer on the Internet has an
a. Communications frequency assigned IP address for easy identification.
True/False
b. Channel bandwidth
8. A is a Web address that specifies the
c. Communications wavelength
exact location of a Web page using letters
d. Broadband and words that map to an IP address and the
location on the host.
3. indicates how the communications links
and hardware devices of the network are a. Universal Resource Locator
arranged.
b. Uniform Reference Locator
a. Communications protocol
c. Universal Web address
b. Transmission media
d. Uniform Resource Locator
c. Network topology
9. Many Web sites use CSS to define the
d. None of the above design and layout of Web pages, and XML
to define the content, and HTML to join the
4. Twisted-pair wire, cable, coaxial cable, content with the design. True/False
and fiber optic cable are all examples of
guided communications media. True/False 10. The use of social media in business is
called .
5. Systems software that controls the
computer systems and devices on a network a. social journalism
and allows them to communicate with one
b. blogging
another is called .
c. business wikis
a. network operating system
d. Enterprise 2.0
b. mobile device management software
11. A(n) intranet is an internal corporate
c. network-management software
network built using Internet and World
d. software-defined networking Wide Web standards and products.
Organizations are using the Internet of
Things (IoT) to capture and analyze streams
Together, the Internet and the World Wide of sensor data to detect patterns and
Web provide a highly effective anomalies—not after the fact, but while they
infrastructure for delivering and accessing are occurring—in order to have a
information and services. considerable impact on the event outcome.

6. The Internet transmits data in packets 12. There can be many issues with simply
from one computer to another using a set of receiving and recognizing usable sensor data
resulting in sensor data lacking time stamps
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

indicating when the reading occurred or in BUSINESS-TO-CONSUMER (B2C) E-


missing data. COMMERCE: A form of e-commerce in
which customers deal directly with an
13. One of the first things developers of IoT
organization and avoid intermediaries.
applications should focus on is building in
from the start. CONSUMER-TO-CONSUMER (C2C)
E-COMMERCE: A subset of e-commerce
a. redundancy and backup
that involves electronic transactions between
b. cost controls consumers using a third party to facilitate
the process.
c. security
E-GOVERNMENT: The use of
d. disaster recovery
information and communications technology
Cloud computing provides access to stateof- to simplify the sharing of information, speed
the-art technology at a fraction of the cost of formerly paper-based processes, and
ownership and without the lengthy delays improve the relationship between citizens
that can occur when an organization tries to and government.
acquire its own resources.
IDENTITY THEFT: The use of someone’s
14. Cloud computing is a computing personal identification information without
environment in which software and storage his or her permission, often to commit fraud
are provided as an Internet service and or other crimes.
accessed by users with their .
ELECTRONIC EXCHANGE: An
a. Web browser electronic forum where manufacturers,
suppliers, and competitors buy and sell
b. mobile computing device such as a goods, trade market information, and run
smartphone or tablet back-office operations.
c. search engine MARKET SEGMENTATION: The
d. Virtual Private Network (VPN) identification of specific markets to target
them with tailored advertising messages.
15. Autonomic computing is an enabling
technology for cloud computing that enables STOREFRONT BROKER: A company
systems to manage themselves and adapt to that acts as an intermediary between your
changes in the computing environment, Web site and online merchants who have the
business policies, and operating objectives. products and retail expertise.
META TAG: An HTML code, not visible
on the displayed Web page, that contains
CHAPTER 7: Electronic and keywords representing your site’s content,
Mobile Commerce
which search engines use to build indexes
BUSINESS-TO-BUSINESS (B2B) E- pointing to your Web site.
COMMERCE: A subset of e-commerce in
which all the participants are organizations.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

PERSONALIZATION: The process of 2. involves conducting business activities


tailoring Web pages to specifically target (e.g., distribution, buying, selling,
individual consumers. marketing, and servicing of products or
services) electronically over computer
DIGITAL CERTIFICATE: An attachment
networks.
to an email message or data embedded in a
Web site that verifies the identity of a sender a. B2B
or Web site.
b. C2C
CERTIFICATE AUTHORITY (CA): A
c. B2C
trusted third-party organization or company
that issues digital certificates. d. E-commerce
TRANSPORT LAYER SECURITY
(TLS): A communications protocol or
3. Popular B2C Web sites have helped raise
system of rules that ensures privacy between
expectations as to how e-commerce must
communicating applications and their users
operate, and many B2B companies are
on the Internet.
responding to those heightened expectations
ELECTRONIC CASH: An amount of by investing heavily in their B2B platforms.
money that is computerized, stored, and True or False?
used as cash for e-commerce transactions.
4. The largest B2C retailer in the United
P-CARD (PROCUREMENT CARD OR States is .
PURCHASING CARD): A credit card
a. Amazon
used to streamline the traditional purchase
order and invoice payment processes b. Staples
Chapter 7: Self-Assessment c. Apple
Test
d. Walmart
5. The elimination of intermediate
Electronic and mobile commerce are organizations between the producer and the
evolving, providing new ways of conducting consumer is called disintermediation.
business that present both potential benefits
and problems. E-commerce and m-commerce can be used
in many innovative ways to improve the
1. Buy-side e-commerce activities include operations of an organization.
identifying and comparing competitive
suppliers and products, negotiating and 6. B2B is smaller and growing more slowly
establishing prices and terms, ordering and than B2C. True or False?
tracking shipments, and steering 7. is not a key challenge for e-commerce.
organizational buyers to preferred suppliers
and products. a. Dealing with consumer privacy concerns
b. Training customers on how to access
and use e-commerce Web sites
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER

c. Overcoming consumers’ lack of trust effective strategy to be successful in e-


commerce and m-commerce.
d. Overcoming global issues
14. Market segmentation divides the pool
8. The Internet Corporation for Assigned
of potential customers into subgroups
Names and Numbers (ICANN) created a
usually defined in terms of demographic
domain called mobi to attract mobile users
characteristics, such as age, gender, marital
to the Web.
status, income level, and geographic
E-commerce and m-commerce offer many location.
advantages yet raise many challenges.
15. Mobile ad impressions are generally
9. The market for m-commerce is North bought at a cost per thousand (CPM), cost
America is maturing much sooner than in per action (CPA), or cost per click (CPC).
other countries. True or False?
E-commerce and m-commerce require the
10. Key components of a multistage model careful planning and integration of a number
for e-commerce includes search and of technology infrastructure components.
identification, selection and negotiation,
16. The amount of storage capacity and
purchasing, product and service delivery and
computing power required of a Web server
after-sales service.
depends primarily on .
11. Which of the following is NOT
a. the geographical location of the server and
considered to be a key challenge to e-
number of different products sold
commerce?
b. the software that must run on the
a. Dealing with consumer privacy concerns
server and the volume of e-commerce
b. Overcoming consumer’s lack of trust transactions
c. Overcoming global cultural challenges, c. the size of the business organization and
language, time and distance, infrastructure, the location of its customers
and currency challenges
d. the number of potential customers and
d. Low user interest in access to global average dollar value of each transaction
markets and competitive pricing
17. Key Web site performance measures
12. Some businesses are willing to include response time, transaction success
BARTER as a means to reduce excess rate. True
inventory, gain new customers, or avoid
paying cash for necessary raw materials or
services.
13. The Payment Card Industry or PCI
security standard spells out measures and
security procedures to safeguard the card
issuer, the cardholder, and the merchant.
Organizations must define and execute an

Vous aimerez peut-être aussi