Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
Why would buyers prefer to use E-payments when making purchases over the web?Answer
This answer is hidden. It contains 503 characters.
Related questions
Q:
The theft of millions of credit card numbers from customers of Target stores using malware is an example of:a) Denial of serviceb) Misappropriation of assetsc) Penetration testingd) Hacking
Q:
Some firms and governmental organizations use ethical hackers to help find any vulnerabilities that could be exploited by a malicious hacker. Which of the following is also used to refer to ethical hacking?a) Denial of serviceb) Intrusion servicec) Penetration testingd) Executable testing
Q:
Acts such as dumpster diving, phishing, and smishing are all conducted to:a) Conduct a denial of service attackb) Disrupt computer servicesc) Get foodd) Perform identify theft
Q:
Which of the following is a primary reason why accountants should be concerned about cybercrime?
a) They might lose their job if they don't detect cybercrime in their organization
b) They might lose their professional credibility and license if cybercrime continues for a long time in their organization and they do not detect it
c) They are responsible for designing, implementing, and monitoring the control procedures for AISs
d) all of the above are equally important
Q:
Thwarting computer abuse can be enhanced by all of the following except:
a) Enlisting top-management support
b) Increasing employee awareness and education
c) Allowing only 10% of employees access to computers
d) Using strong passwords
Q:
The TRW Credit Data Case is an example of:
a) The round"‘off trick
b) An outsider ripping off a corporate computer
c) Valuable information computer crime
d) none of the above
Q:
According to the chapter, which of these statements is most accurate?
a) Almost all cybercrime is committed for personal gain
b) Very little cybercrime is committed for personal gain
c) Most cybercrime is just as easily described as "embezzlement"
d) We actually know very little about cybercrime
Q:
According to a KPMG survey, companies that stress the importance of business ethics tend to get about the same results as companies that do not stress its importance.
Q:
For the following terms find the correct definition below and place the letter of that response in the blank space next to the term. Each definition is used only once — there are five terms that are not used.
1) _____ click fraud
2) _____ DES
3) _____ EDI
4) _____ HTML
5) _____ phishing
6) _____ proxy server
7) _____ TCP/IP
8) _____ VPN
9) _____ VoIP
Definitions:
A. A secure method of transmitting messages cheaply over existing Internet connenctions
B. A digital time-stamping service
C. A local area network file server typically devoted to providing Internet service
D. A markup language designed specifically for businesses and financial reporting
E. A transmission protocol enabling users to send voice-grade messages over the Internet
F. A transmission protocol used to send email messages sent over the Internet
G. An activity designed to steal a person's financial identity
H. An authenticating document issued by a third party called a certificate authority
I. An encryption standard used by the U.S. government
J. An extension of HTML that allows users to create their own markup tags
K. Inflating the number of uses of a link to an alternate website
L. Software typically used for web conferencing
M. The exchange of electronic documents such as contracts
N. The markup language typically used to display web pages in a web browser
Q:
As a result of corporate bankruptcies in 2002, some of the largest public accounting firms are no longer engaged in any consulting work.
Q:
The term information overload refers to providing too much data to management, often resulting in managers ignoring it.
Q:
The starting point for an audit trail of a production department might be the purchase of raw materials.
Q:
The starting point for an audit trail of a payroll system might be an employee time card.
Q:
Which of the following is not a component of the balanced scorecard?
a) Customer knowledge
b) Internal business processes
c) Transaction processing
d) Financial performance
Q:
"Excessive data reporting" can result in:
a) Massive quantities of data printed out by a company's computer
b) The generation of unnecessary reports
c) Subsystem managers' belief that it is a status symbol to receive large numbers of internally generated reports
d) Inefficient subsystem manager decision making due to a lack of relevant information being available
e) all of the above
Q:
Which of these is a business reporting language often used in recording or transmitting accounting data?
a) XBRL
b) XFile
c) ABC
d) Accounting Live
Q:
Most AISs perform all of these functions except:
a) Collect raw accounting data
b) Store accounting data for future uses
c) Process data into useful information
d) AISs perform all of these functions
Q:
Which of the following captures the same idea as the term "GIGO?"
a) Computers cannot turn straw into gold
b) Too much information is the same as garbage
c) Great investments lead to great returns
d) Too many cooks spoil the broth
Q:
The "S" in the acronym "AIS" stands for:
a) Standard
b) System
c) Symbol
d) none of these
Q:
MozyHome is a cloud provider of backup services.
Q:
For most businesses, cloud computing is an example of outsourcing.
Q:
The term "SaaS" is an acronym standing for "software as a service."
Q:
The term "B2B" is Internet slang for "back to basics."
Q:
A major issue impacting e-business is the trade-off between accessibility and vulnerability.
Q:
An advantage of XBRL is that it can save companies the cost of rekeying financial data from one computer application to another.
Q:
The SEC will not accept XBRL formatted data in electronically filed financial reports.
Q:
Groupware is the technology that enables knowledge sharing and knowledge management among employees.
Q:
The new standard is IPv6 that uses 128 bits for Internet protocol addresses.
Q:
Which of these is not an Internet search engine?
a) Google
b) Bing
c) Yahoo
d) MySpace
Q:
Third party assurance:
a) Provides online purchasers with some assurance regarding the security and privacy of a web site
b) Is unlikely to concern auditors
c) Is a service offered only by the American Institute of Certified Public Accountants
d) Is a service offered only by the Better Business Bureau