309 OTHER II

Is this your test? Login to manage it. If not, you can make an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following is not a primary objective of coding systems today?
2.
1 point
The Year 2000 problem is a prime example of:
3.
1 point
Which of the following is not usually a design consideration in coding systems?
4.
1 point
To forecast cash receipts, information must be collected from:
5.
1 point
Which of the following is not an objective of the purchasing process?
6.
1 point
Which source document is used to request goods?
7.
1 point
The bill of lading:
8.
1 point
Inputs to transaction processing systems:
9.
1 point
Forecasting cash flows:
10.
1 point
Which of the following is not an objective of the sales process?
11.
1 point
Which of the following outputs (reports) are common to both the sales process and the purchasing process?
12.
1 point
Which of the following statements best describes business process outsourcing?
13.
1 point
Networked enterprises and globalization have enabled a new business model called “business-without-boundaries.” Which of the following statements describes this business model?
14.
1 point
An example of an Internet service provider is:
15.
1 point
Another name for an Internet domain address is its:
16.
1 point
In the Internet addess www.Name.com.X, the term X usually stands for:
17.
1 point
Which of these is not a component of an IP address?
18.
1 point
An advantage of an extranet is that:
19.
1 point
Which of the following is true about XBRL?
20.
1 point
One advantage of XBRL tags is that:
21.
1 point
IDEA is used by the Securities and Exchange Commission (SEC) to:
22.
1 point
All of the following are true about XBRL tags except:
23.
1 point
All of the following are benefits of XBRL except:
24.
1 point
Which of these is not an advantage of XBRL?
25.
1 point
Which of these is the official website of the XBRL International Consortium?
26.
1 point
Which of these best describes the current state of XBRL?
27.
1 point
Retail sales on the Internet:
28.
1 point
An important characteristic of E-wallets is:

29.
1 point
An advantage of E-wallets is that:
30.
1 point
As used in the textbook, the acronym PBX stands for:
31.
1 point
According to the chapter, a virtual PBX is a type of:
32.
1 point
In recent years, the most common complaint related to identify theft is:
33.
1 point
One form of access security is determining authentic users by “what they have.” Which of the following would be an example of such authentication?
34.
1 point
What is the main reason why companies prefer VANs to the Internet for implementing EDI?
35.
1 point
One way to create a VAN is to use a VPN. The letter “N” in VPN stands for:
36.
1 point
The term “spoofing” refers to:
37.
1 point
The purpose of a company firewall is to:
38.
1 point
A proxy server is:
39.
1 point
The term data encryption refers to:
40.
1 point
All of the following are associated with data encryption except:
41.
1 point
The term key in the context of data encryption refers to:
42.
1 point
An interesting dimension of public key encryption is that:
43.
1 point
A digital signature:
44.
1 point
Third party assurance:
45.
1 point
Which of the following is not true regarding user authentication?
46.
1 point
Because Internet software is so convenient to use, many companies also create their own __________________ for internal communications purposes.
47.
1 point
Which of the following is a group collaboration tool that allows anyone with a Web browser and some easy-to-use software to publish a personalized diary online?