Pregunta 1
Pregunta
Financial accounting- Provides information to [blank_start]external[blank_end] users, typically in the form of [blank_start]summarised financial reports[blank_end] such as the income statement and statement of financial position. The information is based on [blank_start]historical data[blank_end]; a highly regulated branch of accounting.
Pregunta 2
Pregunta
Management accounting- Concerned with the [blank_start]provision[blank_end] of [blank_start]information[blank_end] to [blank_start]managers[blank_end] to help them make [blank_start]business decisions[blank_end]; management accounting aims to provide more [blank_start]detailed[blank_end] and timely information to [blank_start]internal[blank_end] users of accounting information.
Respuesta
-
provision
-
information
-
managers
-
business decisions
-
detailed
-
internal
Pregunta 3
Pregunta
One typical user of accounting information is [blank_start]managers[blank_end]. They require accounting information to [blank_start]assist[blank_end] them in [blank_start]decision-making[blank_end]
Respuesta
-
managers
-
assist
-
decision-making
Pregunta 4
Pregunta
Another typical user of accounting information is [blank_start]investors (shareholders)[blank_end]. They require accounting information on the [blank_start]value[blank_end] of the [blank_start]investment[blank_end] they have made
Respuesta
-
investors (shareholders)
-
value
-
investment
Pregunta 5
Pregunta
Third typical user of accounting information is [blank_start]employees[blank_end]. They require accounting information on the [blank_start]ability[blank_end] of an [blank_start]organisation[blank_end] to meet their [blank_start]wage/salary[blank_end] expectations
Respuesta
-
employees
-
ability
-
organisation
-
wage/salary
Pregunta 6
Pregunta
Fourth typical user of accounting information is [blank_start]suppliers[blank_end]. They require accounting information to allow them to [blank_start]assess[blank_end] the [blank_start]likelihood[blank_end] of being [blank_start]repaid[blank_end]
Respuesta
-
suppliers
-
assess
-
likelihood
-
repaid
Pregunta 7
Pregunta
Fifth typical user of accounting information is [blank_start]customers[blank_end]. They require accounting information to [blank_start]assess[blank_end] the ability of an [blank_start]organisation[blank_end] to continue [blank_start]supplying products/services[blank_end]
Pregunta 8
Pregunta
Sixth typical user of accounting information is [blank_start]government & regulatory agencies[blank_end]. They require accounting information to help [blank_start]manage[blank_end] the [blank_start]economy[blank_end], collect taxes, etc
Pregunta 9
Pregunta
One feature of enterprise systems is that it is a [blank_start]standard software package[blank_end], offering a level of [blank_start]customisation[blank_end] to enable [blank_start]configuration[blank_end] for most business types
Pregunta 10
Pregunta
Another feature of enterprise systems is that it [blank_start]offers[blank_end] a [blank_start]high[blank_end] level of [blank_start]functionality[blank_end] following a [blank_start]process-oriented[blank_end] view of [blank_start]enterprises[blank_end]
Respuesta
-
offers
-
high
-
functionality
-
process-oriented
-
enterprises
Pregunta 11
Pregunta
Third feature of enterprise systems is that it [blank_start]provides[blank_end] a [blank_start]standardised[blank_end] graphical [blank_start]user interface[blank_end] across all [blank_start]application[blank_end] areas & modules, thereby allowing the user to easily work & [blank_start]learn[blank_end] across modules
Respuesta
-
provides
-
standardised
-
user interface
-
application
-
learn
Pregunta 12
Pregunta
One way how developments in accounting information [blank_start]systems[blank_end] has affected the roles of [blank_start]accountants[blank_end] in business is that [blank_start]less[blank_end] of the [blank_start]mundane bookkeeping[blank_end]/reporting type of work is done, as [blank_start]software[blank_end] can manage a lot of this work
Respuesta
-
systems
-
accountants
-
less
-
mundane bookkeeping
-
software
Pregunta 13
Pregunta
Information system- Collection of [blank_start]computer hardware[blank_end] & software that can provide [blank_start]decision-making[blank_end], control or other similar [blank_start]information[blank_end] based on underlying [blank_start]data[blank_end]. [blank_start]People/ humans[blank_end] too are an [blank_start]essential[blank_end] part of an information system
Respuesta
-
computer hardware
-
decision-making
-
information
-
data
-
People/ humans
-
essential
Pregunta 14
Pregunta
To understand information systems fully, need to be [blank_start]aware[blank_end] of [blank_start]broader organisation[blank_end], [blank_start]people[blank_end] & [blank_start]information technology[blank_end] dimensions & their role in providing [blank_start]solutions[blank_end] to solutions & [blank_start]challenges[blank_end] within business
Respuesta
-
aware
-
broader organisation
-
people
-
information technology
-
solutions
-
challenges
Pregunta 15
Pregunta
Logical security- Use of [blank_start]software[blank_end] to protect [blank_start]information[blank_end] & [blank_start]data[blank_end]. Basic form of logical security is having [blank_start]user level[blank_end] access controls ([blank_start]passwords[blank_end] & permissions)
Respuesta
-
software
-
information
-
data
-
user level
-
passwords
Pregunta 16
Pregunta
Organisations use certain [blank_start]technologies[blank_end] to reduce [blank_start]logical security[blank_end] risks such as [blank_start]firewalls[blank_end]. [blank_start]Firewalls[blank_end] are combination of [blank_start]hardware[blank_end] & [blank_start]software[blank_end] to prevent network [blank_start]access[blank_end]
Respuesta
-
technologies
-
logical security
-
firewalls
-
Firewalls
-
hardware
-
software
-
access
Pregunta 17
Pregunta
[blank_start]Data encryption[blank_end] is another logical security. It is use of [blank_start]crypto graphic techniques[blank_end] to [blank_start]encrypt[blank_end] data & transform human [blank_start]readable[blank_end] information into [blank_start]unreadable[blank_end] form
Pregunta 18
Pregunta
Physical security - [blank_start]Physical measures[blank_end] to prevent [blank_start]access[blank_end] to data & or information systems. Basic form is considering how people [blank_start]access buildings[blank_end], computers, [blank_start]database servers[blank_end] are being kept
Respuesta
-
Physical measures
-
access
-
access buildings
-
database servers
Pregunta 19
Pregunta
If organisation has sensitive data, they might use other approaches such as [blank_start]motion sensors[blank_end] or [blank_start]biometric[blank_end] type of authentication for [blank_start]accessing[blank_end] some of their [blank_start]facilities[blank_end]
Respuesta
-
motion sensors
-
biometric
-
accessing
-
facilities
Pregunta 20
Pregunta
Two common principles of data protection is an [blank_start]organisation[blank_end] must [blank_start]obtain[blank_end] & [blank_start]process[blank_end] data [blank_start]fairly[blank_end] & data must be [blank_start]obtained[blank_end] for one or more [blank_start]specified[blank_end] & [blank_start]lawful[blank_end] purposes
Respuesta
-
organisation
-
obtain
-
process
-
fairly
-
obtained
-
specified
-
lawful
Pregunta 21
Pregunta
Another two common principles of data protection is [blank_start]data[blank_end] must be processed in ways [blank_start]compatible[blank_end] with purposes for which it was [blank_start]obtained[blank_end] & [blank_start]data[blank_end] must be kept [blank_start]safe[blank_end], secure, [blank_start]accurate[blank_end] & up-to-date
Respuesta
-
data
-
compatible
-
obtained
-
data
-
safe
-
accurate
Pregunta 22
Pregunta
Final three common principles of data protection is any [blank_start]data[blank_end] obtained must be [blank_start]adequate[blank_end], relevant & not [blank_start]excessive[blank_end], [blank_start]data[blank_end] should not be retained for [blank_start]longer than[blank_end] necessary &
if any individual [blank_start]request[blank_end] information on data held on them, this [blank_start]information[blank_end] must be given
Respuesta
-
data
-
adequate
-
excessive
-
data
-
longer than
-
request
-
information
Pregunta 23
Pregunta
Business continuity planning (or disaster recovery planning)- [blank_start]Refers[blank_end] to [blank_start]policies[blank_end] & [blank_start]procedures[blank_end] to reinstate [blank_start]normal business[blank_end] in event of business [blank_start]disruption[blank_end]
Respuesta
-
Refers
-
policies
-
procedures
-
normal business
-
disruption
Pregunta 24
Pregunta
Level of business continuity planning for information systems depends on [blank_start]type of business[blank_end]
Pregunta 25
Pregunta
Purchased business continuity planning solution is [blank_start]typical[blank_end] & [blank_start]good[blank_end] practice for [blank_start]larger organisations[blank_end] & essential for [blank_start]online business[blank_end]
Respuesta
-
typical
-
good
-
larger organisations
-
online business
Pregunta 26
Pregunta
Key tasks of accounting are [blank_start]capturing information[blank_end], [blank_start]measuring[blank_end] it & [blank_start]communicating[blank_end] it
Respuesta
-
capturing information
-
measuring
-
communicating
Pregunta 27
Pregunta
Developments in [blank_start]software architecture[blank_end] have allowed [blank_start]accounting information systems[blank_end] to become more [blank_start]flexible[blank_end] over time
Pregunta 28
Pregunta
Three tier architecture includes [blank_start]presentation layer[blank_end] (what [blank_start]user[blank_end] sees in system & [blank_start]interact[blank_end] with it), [blank_start]business logic layer[blank_end] ([blank_start]encodes[blank_end] how business works) & [blank_start]data layer[blank_end] (how data is [blank_start]stored[blank_end], organised, processed & [blank_start]accessed[blank_end])
Respuesta
-
presentation layer
-
user
-
interact
-
business logic layer
-
encodes
-
data layer
-
stored
-
accessed
Pregunta 29
Pregunta
SAP R1(software architecture) had all [blank_start]three layers[blank_end] (presentation, business logic & data) contained in [blank_start]single system[blank_end] which made [blank_start]customisation[blank_end] difficult
Respuesta
-
three layers
-
single system
-
customisation
Pregunta 30
Pregunta
SAP R2 (software architecture) had [blank_start]presentation layer[blank_end] separated, as [blank_start]software[blank_end] (data & business logic layers) were designed to [blank_start]run[blank_end] on mainframe computer, with [blank_start]user[blank_end] interacting through [blank_start]dumb terminal[blank_end] (presentation) layer. Little [blank_start]customisation[blank_end] at [blank_start]presentation[blank_end] layer, but at least [blank_start]data[blank_end] & [blank_start]business logic layers[blank_end] could be worked on independently
Respuesta
-
presentation layer
-
software
-
run
-
user
-
dumb terminal
-
customisation
-
presentation
-
data
-
business logic layers
Pregunta 31
Pregunta
SAP R3 (software architecture) [blank_start]split[blank_end] SAP architecture into [blank_start]three[blank_end] distinct [blank_start]layers[blank_end] in client server
environment. [blank_start]Presentation[blank_end] layer was on personal computer & could be [blank_start]customised[blank_end] by users without any [blank_start]effect[blank_end] on underlying [blank_start]business logic[blank_end] or [blank_start]data layers[blank_end]. Business logic & data layers reside on separate servers
Respuesta
-
split
-
three
-
layers
-
Presentation
-
customised
-
effect
-
business logic
-
data layers
Pregunta 32
Pregunta
QuickBooks has [blank_start]one-tier[blank_end] architecture but it [blank_start]mimics two-tier[blank_end] architecture. User can [blank_start]customise[blank_end] what they do ([blank_start]presentation[blank_end] layer) without [blank_start]interfering[blank_end] with underlying [blank_start]business logic[blank_end] or [blank_start]data[blank_end] layer
Respuesta
-
one-tier
-
mimics two-tier
-
customise
-
presentation
-
interfering
-
business logic
-
data
Pregunta 33
Pregunta
Ways how developments in accounting information systems has affected roles of accountants in smaller businesses is practises of [blank_start]bookkeeping[blank_end] & [blank_start]tax returns[blank_end] have been [blank_start]automated[blank_end] using accounting software & use of [blank_start]cloud-based software[blank_end] has offered more [blank_start]flexibility[blank_end]
Respuesta
-
bookkeeping
-
tax returns
-
automated
-
cloud-based software
-
flexibility
Pregunta 34
Pregunta
Ways how developments in accounting information systems has affected roles of accountants in larger businesses is role of [blank_start]management[blank_end] accountants become more [blank_start]analytical[blank_end], [blank_start]devolved accounting[blank_end] responsibility & more [blank_start]standardised[blank_end] accounting processes
Respuesta
-
management
-
analytical
-
devolved accounting
-
standardised