Chapter 2 Accounting on the Internet- True/False

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

All electronic commerce takes place over the Internet.

False

An advantage of XBRL is that the tags have been completely standardized by the XBRL International Consortium and these standards are now fixed

False

An example of a social networking site is eBay

False

An important disadvantage of XBRL is that most accounting packages cannot read or write documents in XBRL format

False

BASF is one of the world's largest telephone companies

False

Digital signatures can never be as secure as written signatures

False

EDI can only be used by private, for-profit businesses

False

EDI is an acronym standing for "electronic delayed interface."

False

Firewalls are virtually unbreachable and offer assurance against any viruses

False

For all its exposure in the popular press media, identity theft affects a relatively small number of people and, in total, involves a small amount of losses per year

False

ICANN is an acronym that stands for Internet Control and Network Numbers

False

Intranets do not use the same software as the Internet.

False

Most accountants believe that auditors do not need to concern themselves with IP addresses

False

Social media is important to marketers, but only of passing interest to accountants.

False

Social networks do not pose privacy concerns.

False

Spam is annoying, but not a particularly costly or bothersome, to most businesses or government agencies

False

Surveys suggest that less than half of all companies use social media for business purposes.

False

The SEC will not accept XBRL formatted data in electronically filed financial reports

False

The World Wide Web is the text portion of the Internet

False

The heaviest demands on book publishing websites come in the weeks just prior to the start of a fall or spring semester.

False

The most common reason businesses outsource is to increase control over their data and data processing tasks

False

The term "B2B" is Internet slang for "back to basics."

False

The term "blog" is an acronym that stands for "binary login."

False

Use of electronic procurement systems typically raises purchasing costs.

False

Worldwide, the total annual financial losses resulting from all phishing activities was less than $1 billion in 2010.

False

XBRL is an acronym for "extensive business reports and liabilities."

False

XBRL is not related to XML

False

An advantage of XBRL is that it can save companies the cost of rekeying financial data from one computer application to another

True

An advantage of a proxy server is the ability to store commonly-requested web pages in memory, thereby enabling it to respond quickly to internal user requests for them.

True

An example of a social networking site is FaceBook

True

An example of an Internet domain address is www.Wiley.com

True

An extranet is a network that a business might establish with its trading partners.

True

Another name for a URL is the term "domain address."

True

Businesses can use social networking sites to better understand the reactions to new products or services.

True

Data encryption renders a text message unreadable during data transmission, even if intercepted

True

Digital time stamping authenticates the time and sometimes the place a transmission or transaction occurred.

True

E-wallets store customer data to facilitate online purchases. They do not store dollars

True

EDI automates the exchange of business information, particularly with respect to source documents

True

For most businesses, cloud computing is an example of outsourcing.

True

Groupware is the technology that enables knowledge sharing and knowledge management among employees

True

HTML tags describe how data and graphics should be presented by a web browser

True

IDEA is a computer system used by the Securities and Exchange Commission (SEC).

True

IDEA uses XBRL-coded data of corporate financial statements.

True

MozyHome is a cloud provider of backup services

True

One important personal category of cloud computing for accountants is educational services

True

Proxy servers can act as firewalls and can also limit employee Internet access to approved web addresses only

True

Public key encryption requires the use of a pair of public/private encryption keys

True

The Department of Justice prosecutes identity theft under the ITADA Act of 1998

True

The Internet Protocol address is a numerical translation of the text-based domain address.

True

The domain address of a web page is the equivalent of its universal resource locator (URL).

True

The new standard is IPv6 that uses 128 bits for Internet protocol addresses.

True

The term "SaaS" is an acronym standing for "software as a service."

True

The term "phishing" refers to the use of web pages or other means to trick viewers into revealing their passwords or other personal information

True

Three types of access security are (1) what you have, (2) what you know, and (3) who you are

True

To date, e-commerce has had less impact on accounts payable and accounts receivable than on procurement and inventory tracking

True

Two types of firewall policies are protection by (1) inclusion, and (2) exclusion.

True

When a cloud service company hosts a client's website, this is an example of "platform as a service."

True

XBRL allows users to extract and compare financial data from many different companies

True

XBRL is a type of XML

True

A major issue impacting e-business is the trade-off between accessibility and vulnerability

True

A set of XBRL tags identifies the data it contains as well as indicates how to display that data.

True

An advantage of XBRL is its ability to express semantic meaning—i.e., to express such relationships as "assets = liabilities + equity."

True


Ensembles d'études connexes

Famous People in Science and Mathematics

View Set

monopolistic competition and oligopoly

View Set

Resendez - HR Management Chapter 1

View Set