• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

ACCOUNTING ON THE INTERNET

Testbanks Dec 31, 2025 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Core Concepts of Accounting Information Systems, 13 th Edition, by Simkin, Rose, and Norman

TB 2.1

Chapter 2

ACCOUNTING ON THE INTERNET

True-False Questions

  • The domain address of a web page is the equivalent of its universal resource locator

(URL).

  • The Internet Protocol address is a numerical translation of the text-based domain address.
  • Another name for a URL is the term “domain address.”
  • Most accountants believe that auditors do not need to concern themselves with IP
  • addresses.

  • ICANN is an acronym that stands for Internet Control and Network Numbers.
  • An example of an Internet domain address is www.Wiley.com.
  • The new standard is IPv6 that uses 128 bits for Internet protocol addresses.
  • Intranets do not use the same software as the Internet.
  • An extranet is a network that a business might establish with its trading partners.
  • The World Wide Web is the text portion of the Internet.
  • The term “blog” is an acronym that stands for “binary login.”
  • Social media is important to marketers, but only of passing interest to accountants.
  • Surveys suggest that less than half of all companies use social media for business
  • purposes.

  • Groupware is the technology that enables knowledge sharing and knowledge management
  • among employees.

  • XBRL is not related to XML.
  • XBRL allows users to extract and compare financial data from many different companies.
  • HTML tags describe how data and graphics should be presented by a web browser.

Core Concepts of Accounting Information Systems 13th Edition Simkin Test Bank Visit TestBankDeal.com to get complete for all chapters

Core Concepts of Accounting Information Systems, 13 th Edition, by Simkin, Rose, and Norman

TB 2.2

  • The SEC will not accept XBRL formatted data in electronically filed financial reports.
  • All electronic commerce takes place over the Internet.
  • XBRL is an acronym for “extensive business reports and liabilities.”
  • XBRL is a type of XML.
  • A set of XBRL tags identifies the data it contains as well as indicates how to display that
  • data.

  • An advantage of XBRL is its ability to express semantic meaning—i.e., to express such
  • relationships as “assets = liabilities + equity.”

  • IDEA is a computer system used by the Securities and Exchange Commission (SEC).
  • IDEA uses XBRL-coded data of corporate financial statements.
  • An advantage of XBRL is that the tags have been completely standardized by the XBRL
  • International Consortium and these standards are now fixed.

  • An advantage of XBRL is that it can save companies the cost of rekeying financial data
  • from one computer application to another.

  • An important disadvantage of XBRL is that most accounting packages cannot read or
  • write documents in XBRL format.

  • E-wallets store customer data to facilitate online purchases. They do not store dollars.
  • Use of electronic procurement systems typically raises purchasing costs.
  • To date, e-commerce has had less impact on accounts payable and accounts receivable
  • than on procurement and inventory tracking.

  • EDI automates the exchange of business information, particularly with respect to source
  • documents.

  • EDI can only be used by private, for-profit businesses.
  • A major issue impacting e-business is the trade-off between accessibility and
  • vulnerability.

  • Firewalls are virtually unbreachable and offer assurance against any viruses.

Core Concepts of Accounting Information Systems, 13 th Edition, by Simkin, Rose, and Norman

TB 2.3

  • Proxy servers can act as firewalls and can also limit employee Internet access to approved
  • web addresses only.

  • Data encryption renders a text message unreadable during data transmission, even if
  • intercepted.

  • Public key encryption requires the use of a pair of public/private encryption keys.
  • Digital signatures can never be as secure as written signatures.
  • Digital time stamping authenticates the time and sometimes the place a transmission or
  • transaction occurred.

  • For all its exposure in the popular press media, identity theft affects a relatively small
  • number of people and, in total, involves a small amount of losses per year.

  • Three types of access security are (1) what you have, (2) what you know, and (3) who you
  • are.

  • Spam is annoying, but not a particularly costly or bothersome, to most businesses or
  • government agencies.

  • The term “phishing” refers to the use of web pages or other means to trick viewers into
  • revealing their passwords or other personal information.

  • Worldwide, the total annual financial losses resulting from all phishing activities was less
  • than $1 billion in 2010.

  • Two types of firewall policies are protection by (1) inclusion, and (2) exclusion.
  • An advantage of a proxy server is the ability to store commonly-requested web pages in
  • memory, thereby enabling it to respond quickly to internal user requests for them.

  • The term “B2B” is Internet slang for “back to basics.”
  • BASF is one of the world’s largest telephone companies.
  • EDI is an acronym standing for “electronic delayed interface.”
  • The term “SaaS” is an acronym standing for “software as a service.”
  • When a cloud service company hosts a client’s website, this is an example of “platform as
  • a service.”

  • For most businesses, cloud computing is an example of outsourcing.

Core Concepts of Accounting Information Systems, 13 th Edition, by Simkin, Rose, and Norman

TB 2.4

  • The heaviest demands on book publishing websites come in the weeks just prior to the
  • start of a fall or spring semester.

  • MozyHome is a cloud provider of backup services.
  • One important personal category of cloud computing for accountants is educational
  • services.

  • The Department of Justice prosecutes identity theft under the ITADA Act of 1998.
  • An example of a social networking site is eBay.
  • An example of a social networking site is FaceBook.
  • Businesses can use social networking sites to better understand the reactions to new
  • products or services.

  • Social networks do not pose privacy concerns.
  • The most common reason businesses outsource is to increase control over their data and
  • data processing tasks.

Multiple-Choice Questions

63. An example of an Internet service provider is:

a) General Electric

b) AOL

c) PeachTree

d) ISP

  • none of these

64. Another name for an Internet domain address is its:

a) URL

b) ISP

  • email address

d) IETF

65. An example of a URL is:

  • .gov
  • 100.100.100.100
  • www.wiley.com
  • Title

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured comprehensive coverage that was incredibly useful for my research. Such an remarkable resource!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Testbanks
Added: Dec 31, 2025
Description:

Core Concepts of Accounting Information Systems, 13 th Edition, by Simkin, Rose, and Norman TB 2.1 Chapter 2 ACCOUNTING ON THE INTERNET True-False Questions 1. The domain address of a web page is t...

Unlock Now
$ 1.00