Chapter 2 Accounting on the Internet- True/False
All electronic commerce takes place over the Internet.
False
An advantage of XBRL is that the tags have been completely standardized by the XBRL International Consortium and these standards are now fixed
False
An example of a social networking site is eBay
False
An important disadvantage of XBRL is that most accounting packages cannot read or write documents in XBRL format
False
BASF is one of the world's largest telephone companies
False
Digital signatures can never be as secure as written signatures
False
EDI can only be used by private, for-profit businesses
False
EDI is an acronym standing for "electronic delayed interface."
False
Firewalls are virtually unbreachable and offer assurance against any viruses
False
For all its exposure in the popular press media, identity theft affects a relatively small number of people and, in total, involves a small amount of losses per year
False
ICANN is an acronym that stands for Internet Control and Network Numbers
False
Intranets do not use the same software as the Internet.
False
Most accountants believe that auditors do not need to concern themselves with IP addresses
False
Social media is important to marketers, but only of passing interest to accountants.
False
Social networks do not pose privacy concerns.
False
Spam is annoying, but not a particularly costly or bothersome, to most businesses or government agencies
False
Surveys suggest that less than half of all companies use social media for business purposes.
False
The SEC will not accept XBRL formatted data in electronically filed financial reports
False
The World Wide Web is the text portion of the Internet
False
The heaviest demands on book publishing websites come in the weeks just prior to the start of a fall or spring semester.
False
The most common reason businesses outsource is to increase control over their data and data processing tasks
False
The term "B2B" is Internet slang for "back to basics."
False
The term "blog" is an acronym that stands for "binary login."
False
Use of electronic procurement systems typically raises purchasing costs.
False
Worldwide, the total annual financial losses resulting from all phishing activities was less than $1 billion in 2010.
False
XBRL is an acronym for "extensive business reports and liabilities."
False
XBRL is not related to XML
False
An advantage of XBRL is that it can save companies the cost of rekeying financial data from one computer application to another
True
An advantage of a proxy server is the ability to store commonly-requested web pages in memory, thereby enabling it to respond quickly to internal user requests for them.
True
An example of a social networking site is FaceBook
True
An example of an Internet domain address is www.Wiley.com
True
An extranet is a network that a business might establish with its trading partners.
True
Another name for a URL is the term "domain address."
True
Businesses can use social networking sites to better understand the reactions to new products or services.
True
Data encryption renders a text message unreadable during data transmission, even if intercepted
True
Digital time stamping authenticates the time and sometimes the place a transmission or transaction occurred.
True
E-wallets store customer data to facilitate online purchases. They do not store dollars
True
EDI automates the exchange of business information, particularly with respect to source documents
True
For most businesses, cloud computing is an example of outsourcing.
True
Groupware is the technology that enables knowledge sharing and knowledge management among employees
True
HTML tags describe how data and graphics should be presented by a web browser
True
IDEA is a computer system used by the Securities and Exchange Commission (SEC).
True
IDEA uses XBRL-coded data of corporate financial statements.
True
MozyHome is a cloud provider of backup services
True
One important personal category of cloud computing for accountants is educational services
True
Proxy servers can act as firewalls and can also limit employee Internet access to approved web addresses only
True
Public key encryption requires the use of a pair of public/private encryption keys
True
The Department of Justice prosecutes identity theft under the ITADA Act of 1998
True
The Internet Protocol address is a numerical translation of the text-based domain address.
True
The domain address of a web page is the equivalent of its universal resource locator (URL).
True
The new standard is IPv6 that uses 128 bits for Internet protocol addresses.
True
The term "SaaS" is an acronym standing for "software as a service."
True
The term "phishing" refers to the use of web pages or other means to trick viewers into revealing their passwords or other personal information
True
Three types of access security are (1) what you have, (2) what you know, and (3) who you are
True
To date, e-commerce has had less impact on accounts payable and accounts receivable than on procurement and inventory tracking
True
Two types of firewall policies are protection by (1) inclusion, and (2) exclusion.
True
When a cloud service company hosts a client's website, this is an example of "platform as a service."
True
XBRL allows users to extract and compare financial data from many different companies
True
XBRL is a type of XML
True
A major issue impacting e-business is the trade-off between accessibility and vulnerability
True
A set of XBRL tags identifies the data it contains as well as indicates how to display that data.
True
An advantage of XBRL is its ability to express semantic meaning—i.e., to express such relationships as "assets = liabilities + equity."
True