Ecommerce And Ebusiness Test Questions & Answers Ch14 - Accounting Info Systems Controls 3e Complete Test Bank by Leslie Turner. DOCX document preview.
ACCOUNTING INFORMATION SYSTEMS/3e
TURNER / WEICKGENANNT/COPELAND
Test Bank: CHAPTER 14: eCommerce and eBusiness
NOTE: All new or adjusted questions are in red. New questions are identified by the letter A as part of the question number; adjusted questions are identified by the letter X as part of the question number.
END OF CHAPTER QUESTIONS
- Which of the following statements is ?
- E-business is a subset of e-commerce.
- E-commerce is a subset of e-business.
- E-business and e-commerce are exactly the same thing.
- E-business and e-commerce are not related.
- An electronic hardware device that is located at the gateway between two or more networks is a(n):
- Packet switch.
- URL.
- Router.
- Protocol.
- The type of organization that serves as the main trunk line of the Internet is called a
- Local ISP.
- Regional ISP.
- Global ISP.
- Backbone provider.
- Which of the following is NOT a direct advantage for the consumer from e-commerce?
- Access to a broader market
- More shopping convenience
- Reduced order-processing cost
- Information sharing with the company
- Each of the following represents a characteristic of B2B commerce EXCEPT:
- Electronic data interchange.
- Electronic retailing.
- Data exchanges.
- Preexisting business relationships.
- Each of the following represents an application of B2C commerce EXCEPT:
- Software sales.
- Electronic retailing.
- Data exchanges.
- Stock trading.
- Before forwarding customer data, an organization should receive explicit or implicit consent of the customer. This describes which of the AICPA Trust Services Principles online privacy practices?
- Consent
- Use and retention
- Access
- Onward transfer and disclosure
- Which of the following process within a supply chain can benefit from IT enablement?
- All process throughout the supply chain
- Only internal process within the supply chain
- Only external process within the supply chain
- Exchange process between a company and its suppliers
- When a company has an e-business transaction with a supplier, it could be using
- The Internet.
- An intranet.
- An extranet.
- Either the Internet or an extranet.
- Intranets are used for each of the following EXCEPT
- Communication and collaboration.
- Business operations and managerial monitoring.
- Web publishing.
- Customer self-service.
- When there is no necessity for a preexisting relationship between buyer and seller, that transaction is more likely to be classified as
- B2B.
- B2C.
- B2E.
- Either B2B or B2C.
- Which of the following IT controls would NOT be important in an extranet?
- Encryption
- Password
- Antivirus software
- Penetration testing
- All of the above are important IT controls.
- A company’s computer network uses web servers, HTML, and XML to serve various user groups. Which type of network best serves each of the following users?
Employees Suppliers
- Intranet Extranet
- Intranet Internet
- Internet Extranet
- Internet Internet
- An extensible markup language designed specifically for financial reporting is:
- Internet DI
- XML
- XBRL
- XFRL
TEST BANK – CHAPTER 14 – MULTIPLE CHOICE
- E-commerce is:
- Business-to-business electronic trading and process integration.
- Electronically enabled transactions between a business and its vendors.
- Electronic recording and control of internal processes.
- Electronically enabled transactions between a business and its customers.
- E-business:
1. Is a narrower concept than e-commerce.
2. Services the customers and the vendors.
3. Is electronic recording and control of internal processes.
4. Uses electronic means to enhance business processes.
- 1 only.
- 2 and 3 only.
- 2, 3, and 4 only.
- 1, 2, 3, and 4.
- The internal processes of e-business do NOT include:
- Access to personnel records.
- Access to fringe benefit information.
- On-line sales to customers.
- Travel and expense reporting.
- E-commerce:
- Sales will usually be large dollar amounts with only a few items are sold.
- Is the sale of goods or services from a business to retailers.
- Is the sale of goods or services to an end-user consumer.
- Both A and B are correct answers.
- E-business
1. Includes the sale of raw materials between companies.
2. Includes using the Internet as an electronic network.
3. Sales will usually be smaller dollar amounts with many sales.
4. Is a broader concept than e-commerce.
- 1, 2, 3, and 4.
- 2, 3, and 4 only.
- 1, 3, 4 only.
- 1, 2, and 4 only.
- Which of the following is not an example of a software system that supports e-business and e-commerce?
- ERP
- CRM
- SCM
- AFB
- The original purpose of ARPANET was to share military research data among four universities. Which of the following was not one of the four universities?
- MIT
- UCLA
- UC Santa Barbara
- University of Utah
- Packet switching is a method of:
- Turning routers off and on to send messages between computers.
- Dividing large messages into bundles for transmission over a network.
- Isolating computers connected to the network by disconnecting them.
- Keeping all associated bundles of the message on one network path.
- The transmission of packets:
- Must be determined by the sender manually.
- Must be accomplished via the same network path.
- Allows great versatility in the transmission of data.
- Has diminished because of advances in connectivity.
- The transmission of packets:
- Are usually sent in sequential order.
- Must be received in sequential order.
- Must follow the same network path.
- Will bundle small messages into larger bundles for transmission.
- A router:
- Is a software application that creates path instructions for packets.
- Is hardware that connects two or more networks.
- Must receive its instructions from the user manually.
- Both B and C are correct.
- The proper actions and capabilities is:
- Packet switching bundles small messages into large messages for transmission while routers determine the best path through the network.
- Packet switching replaces the need for routers to determine the best path for the message through the network.
- Packet switching and routers both bundle small messages into large messages for transmission.
- Packet switching divides large messages into small bundles for transmission while routers determine the best path through the network.
- A protocol is required so that:
- Computers from the same manufacturer can communication with each other.
- Computers from different manufacturers can communicate with each other.
- So that communications within the network can be routed properly.
- Answers A, B, and C are all correct.
- Protocols can be considered:
- A proprietary language to a specific computer manufacturer.
- A language native to the network so all computers can translate it.
- Unnecessary if the computer is communicating on a LAN.
- Unnecessary if the computer is using packet switching and routers.
- TCP/IP is:
- Trunk controlling protocol/intranet protocol.
- Transmission control protocol/intranet protocol.
- Trunk controlling protocol/Internet protocol.
- Transmission control protocol/Internet protocol.
- During the 1970s and 1980s, the ARPANET was:
- Restricted to universities, libraries, research organizations, and commercial carrier access.
- Was designed in the 1990s to augment the growing Internet and intranet systems.
- Does not require the use of protocols such as TCP/IP because of the limited access.
- Restricted to universities, libraries, and research organizations.
- The Internet:
- Is a series of LANs connected together to increase their local capability.
- Is a series of networks connected to provide a global connectivity.
- Is generally restricted to universities, libraries, and research organizations.
- Comes from the concept of international networks.
- The Internet:
- Utilizes LANs as a backbone to increase connectivity.
- Is a system of unconnected networks.
- Utilizes the World Wide Web as a backbone.
- Is not compatible with graphic user interface tools.
- The proper sequence of Internet connectivity between users is:
- Regional ISP to national backbone provider to regional ISP.
- Local ISP to national backbone provider to network access point to national backbone provider to local ISP.
- Regional ISP to national network access points to regional ISP.
- Local ISP to regional ISP to national backbone provider to network access points to national backbone provider to regional ISP to local ISP.
- A backbone provider is an organization that provides:
- Direct Internet access to the end users.
- Regional ISPs direct access to the Internet.
- High-speed access to local ISP users.
- High-speed access to regional ISP users.
- The speed of the U.S. Internet backbone is _______ bytes per second.
- 1 billion
- 100 billion
- 1 trillion
- 100 trillion
- The Internet backbone is the network between:
- The local ISP and the regional ISP.
- The regional ISP and the local ISP.
- The local ISP and the national backbone provider.
- National backbone providers.
- Regional ISPs:
- Connect directly to the Internet backbone through network access points.
- Connect to the Internet backbone through local ISPs utilizing network access points.
- Provide the connection between local ISPs and national backbone providers.
- Provide end users direct connects to the Internet backbone through network access points.
- The network lines that are used to connect regional ISPs to the backbone are usually:
- T3 Lines
- T1 Lines
- LAN Lines
- NAPs
- Which of the following connects individual users to the Internet using dial-up modems, digital subscriber lines, or cable TV lines?
- Regional ISPs
- Local ISPs
- Internet backbone
- Internet browser
- A web server is:
- Always located at national backbone provider levels.
- Always located at regional ISP provider levels.
- A computer and hard drive space that stores web pages and data.
- Always the access between the national backbone provider and the backbone.
- HTML is:
- A language which allows computers to connect to the Internet and WWW.
- A protocol language allowing user level computers to connect to local ISPs.
- A language utilized to present website words, data, and pictures.
- Used for information sharing between the Internet and WWW.
- HTML allows:
- User level computers to connect to the Internet through an ISP.
- User level computers a way to display information the way it was intended to be displayed.
- Local and regional ISPs to interact with national backbone providers.
- National backbone providers to exchange information about trunk traffic.
- An example of a URL is:
- cjb@jhs-email.com.
- http://www.cjb.org.
- jhs-email.com.
- All of the above, A, B, and C, are examples of URLs.
- Select the statement from the following.
- URL stands for uniform real-time locator while http stands for hypertext transmission protocol.
- URL stands for uniform resource location while http stands for hypertext translation protocol.
- URL stands for uniform resource locator while http stands for hypertext transmission protocol.
- URL stands for uniform real-time location while http stands for hypertext transmission protocol.
- When a valid URL is entered into your web browser:
- Your computer will send a network access protocol (NAP) command to your network server.
- Your computer will send an http command to a web server, directing the server to find and transmit the web page requested.
- Your command will be translated into TCP/IP and sent directly to a national backbone provider.
- Your computer will directly access the Internet and WWW in its search for the information.
- The current standard HTML 5 has the following benefits over previous versions:
- Allows a much richer use of video and audio
- Improved connectivity
- Better security
- Both A and C
- HTTP stands for:
- Hypertext transmission protocol.
- Hypertransmission terminal protocol.
- Hypertext terminal protocol.
- Hypertext translation protocol.
- An example of a domain name is:
- jhs-email.com.
- cjb@jhs-email.com.
- http://www.cjb.org.
- All of the above, A, B, and C, are examples of domain names.
- The unique name that identifies the internet site is referred to as:
- URL
- HTTP
- Domain name
- HTML
- The suffix of the domain name will identify the type of organization that owns the rights to that domain. Which of the following is a correct example of the suffix and related organization type?
- .gov = governmental organization or unit
- .net = television network
- .com = community
- .org = organization
- What does IP stand for?
- Internet process
- Internal protocol
- Internet protocol
- Internal process
- A URL is converted to an IP by:
- TCP/IP capabilities of the user level computer.
- A DNS accessed when the browser sends the command.
- The local ISP provider.
- The national backbone provider.
- This type of address is the unique information that allows a specific website or server to be located.
- URL
- DNS
- IP
- HTML
- Which of the following function to store, index, and provide the IP address for each domain name?
- Domain name servers
- IP protocols
- Domain protocols
- Domain name databases
- SSL – secure sockets layering:
- Reduces the frequency of Internet connection disconnects.
- Ensures that TCP/IP is correctly configured for Internet browsing.
- Is an encryption system in which the web server and the user’s browser exchange data in encrypted form.
- Is an encryption system which eliminates the probably of improper use of transmitted data.
- The ways to determine a secure sockets layering connection is:
- The “s” at the end of “www”.
- The “s” at the end of “http.”
- The padlock on the lower bar of most web browsers.
- Both answers, B and C, are correct.
- Select the correct statement from the following.
- B2C and B2B are both considered e-commerce.
- B2C is considered e-commerce while B2B is considered e-business.
- B2B is considered e-commerce while B2C is considered e-business.
- B2C and B2B are both considered e-business.
- The common element in B2B and B2C is:
- Both require a physical selling point.
- A downloadable product.
- Both require access to the business’s website.
- Both require SSL (secure sockets layering) to complete the transaction.
- Which of the following is an example of a B2B transaction?
- A student buying a book on Amazon.com
- A person downloading a song purchased from the Apple Store
- McDonalds placing an order for more hamburger rolls through their company computer
- Buying a laptop at Dell.com and picking it up at the local retail store
- Advantages of e-commerce include all EXCEPT:
- A narrower market for goods and services.
- Increased access to information.
- The lack of geographic constraints.
- All of the answers, A, B, and C, are advantages of e-commerce.
- All of the following are statements about e-commerce EXCEPT:
- E-commerce sites normally conduct sales 24 hours a day, 7 days a week, 12 months a year.
- E-commerce sales reduce the opportunity for fraud, theft of assets, and theft of data.
- E-commerce consumers can search for better prices and more information easily.
- E-commerce consumers may incur shipping and handling charges not incurred by retail customers.
- E-commerce sites may:
1. Provide access to manufacturer information on the product.
2. May provide tax free sales of retail goods.
3. Require shipping and handling fees to be paid.
4. Provide links to live or video presentations of product information.
5. Not provide as quick order processing as the company’s retail locations.
- 1, 2, 3, 4, and 5 are correct.
- 1, 3, 4, and 5 are correct.
- 1, 2, 4, and 5 are correct.
- 1, 2, 3, and 4 are correct.
- Select the statements from the following.
1. Fraud, theft, or theft of data on the Internet and WWW are reduced by its regulated and controlled state.
2. A customer may feel isolated from the product because of the inability to touch or handle the product.
3. E-commerce customers may be targeted for solicitations based on their purchasing history.
4. E-commerce customers will often incur a shipping and handling charge with purchases.
5. E-commerce customers will always find the best product at the best price.
- 1, 2, 3, 4, and 5 are all statements.
- 2, 3, and 4 are all statements.
- 1, 3, 4, and 5 are all statements.
- 1, 4, and 5 are all statements.
- E-commerce business benefits include all EXCEPT:
- A lower cost of advertising per customer reached.
- More interaction with video and audio product comparisons.
- More rigid advertising and product presentation requirements.
- All of the above, A, B, and C, are benefits of e-commerce.
- E-commerce businesses:
- Are normally confined to more restrictive marketing due to the larger market.
- Experience dramatically reduced marketing costs as the result of the expanded market.
- Requires longer period for delivery of a product due to the processing time of e-commerce.
- Less flexible in pricing structures due to WWW and Internet distribution of information.
- All of the following are disadvantages of e-commerce EXCEPT:
- Faster order processing prevents good assurance of order correctness.
- Greater probability of fraud or compromised customer privacy.
- The inability to handle or try out the product.
- All of the above, A, B, and C, are disadvantages of e-commerce.
- With the advent of technology, the Internet, and the WWW:
- Commerce is moving only from physical to electronic positioning.
- Commerce has maintained its stance of physical and electronic.
- Commerce is moving both from electronic to physical and from physical to electronic.
- No notable trends have been identified.
- Select the correct statement from those below.
- Bricks and mortar refer to traditional stores while e-tailers are both brick and mortar and e-commerce businesses.
- Bricks and mortar refer to stores with both physical and electronic presences while e-tailers are e-commerce businesses only.
- Bricks and mortar refer to traditional stores while brick and click businesses are both brick and mortar and e-commerce businesses.
- Bricks and mortar refer to traditional stores while brick and click refers to e-commerce businesses.
- Businesses that are purely web-based are called:
- Clicks and mortar
- E-tailers
- E-commerce stores
- Bricks and mortars
- The AICPA’s Trust Services Principles state that online privacy focuses on:
1. Name
2. Address
3. Social Security number
4. Government ID numbers
5. Employment history
6. Personal health conditions
7. Personal financial information
8. History of purchases
9. Credit records
- 1, 2, 3, 4, 5, 6, 7, 8, and 9.
- 1, 2, 3, 4, 6, 7, 8, and 9 only.
- 1, 2, 3, 4, 5, 6, 7, and 9 only.
- 1, 2, 3, 4, 5, 6, 7, and 8 only.
- The AICPA’s Trust Services Principles practice that states a specific person or persons should be assigned the responsibility to insure that privacy practices are followed by employees is under the title of:
- Monitoring and enforcement.
- Security for privacy.
- Management.
- Choice and consent.
- The AICPA’s Trust Services Principles practice that states a company should have policies and practices to maintain the privacy of customer data is under the title of:
- Choice and consent.
- Collection.
- Use and retention.
- Notice.
- The AICPA’s Trust Services Principles practice that states the organization should provide the choice to its customers regarding the collection of data is under the title of:
- Choice and consent.
- Collection.
- Use and retention.
- Notice.
- The AICPA’s Trust Services Principles practice that states the organization should ask about the collection, retention, and of the use is under the title of:
- Use and retention.
- Access.
- Choice and consent.
- Disclosure to third parties.
- The AICPA’s Trust Services Principles practice that states that only the data that is necessary for the purpose of conducting the transaction should be collected is under the title of:
- Use and retention.
- Collection.
- Choice and consent.
- Security for privacy.
- The AICPA’s Trust Services Principles practice that states the organization should use customers’ personal data only in the manner described in “notice” is under the title of:
- Security for privacy.
- Monitoring and enforcement.
- Use and retention.
- Choice and consent.
- The AICPA’s Trust Services Principles practice that states that customers should have access to the data provided so that the customer can view, change, delete, or block further use of the data provided is under the title of:
- Access.
- Choice and consent.
- Security for privacy.
- Use and retention.
- The AICPA’s Trust Services Principles practice that states that organizations should receive explicit or implicit consent of the customer before providing information to third parties is under the title of:
- Choice and consent.
- Security for privacy.
- Monitoring and enforcement.
- Disclosure to third parties.
- The AICPA’s Trust Services Principles practice that states that the organization has the necessary protections to try to insure that customer data is not lost, destroyed, altered, or subject to unauthorized access is under the title of:
- Choice and consent.
- Security for privacy.
- Monitoring and enforcement.
- Disclosure to third parties.
- The AICPA’s Trust Services Principles practice that states that all customer data collected remains “accurate, complete, current, relevant, and reliable” is under the title of:
- Choice and consent.
- Quality.
- Monitoring and enforcement.
- Use and retention.
- The AICPA’s Trust Services Principles practice that states that the organization should have procedures to address privacy related inquiries or disputes is under the title of:
- Choice and consent.
- Quality.
- Monitoring and enforcement.
- Use and retention.
- Internal processes of the organization include all of the following EXCEPT:
- Transactions involving suppliers.
- Movement of raw materials.
- Timekeeping and labor management.
- Sharing of data files among workers.
- The supply chain:
- Is usually smaller at the customer end.
- Is usually more complex for service firms.
- Includes manufacturing facilities.
- Does not include any internal resources.
- The supply chain:
- Ends once the raw materials arrive at the manufacturing facility.
- Is an external process only.
- Is both an internal and external process.
- Ends once the product is manufactured and ready for sale.
- The correct sequence of the supply chain is:
- Secondary suppliers, suppliers, manufacturer, warehouses, distributors, retailers, and customers.
- Suppliers, secondary suppliers, manufacturer, warehouses, distributors, retailers, and customers.
- Suppliers, secondary suppliers, manufacturer, distributors, warehouses, customers, and retailers.
- Suppliers, secondary suppliers, manufacturer, distributors, warehouses, retailers, and customers.
- The correct statement regarding the supply chain and B2C is the supply chain extends from the secondary supplier and ends with the:
- Retailer while B2C is from the manufacturer to the final consumer.
- Retailer while B2C is from the customer to the manufacturer.
- Manufacturer while B2C is from the retailer to the final consumer.
- Final customer while B2C is from the retailer to the final consumer.
- Vertical integration of the supply chain occurs when:
- One organization owns all of the companies capable of accomplishing a specific task.
- All of the organizations that can accomplish a specific task are located in one geographic region.
- Several organizations agree to produce a single product under a common label.
- One organization owns the supply chain from raw materials through distribution and sales.
- Select the correct statement from the following:
- B2C is typically many line items per order while B2B is typically few line items per order.
- B2C is typically few line items per order while B2B is typically many line items per order.
- B2C uses purchase order forms while B2B utilizes credit card purchasing.
- B2C buyers usually have a relationship with the seller while B2B do not have a prior relationship.
- An intranet is a:
- Private network accessible only to the employees of a company.
- Public network accessible by the customers and vendors of a company.
- Public network accessible by the entire supply chain of a company.
- Private network accessible by the entire supply chain of a company.
- B2C e-commerce requires:
- Access to the intranet.
- Access to the extranet.
- Access to the Internet.
- All of the above, A, B, and C.
- An extranet is a:
- Private network accessible only to the employees of a company.
- Public network accessible by the customers and vendors of a company.
- Public network accessible by the entire supply chain of a company.
- Private network accessible by select members of the supply chain.
- Which of the following correctly orders the networks from the network that allows access to the least amount of people to the greatest amount of people?
- Intranet, Internet, Extranet
- Internet, Intranet, Extranet
- Extranet, Intranet, Internet
- Intranet, Extranet, Internet
- Select the correct statement from those provided below.
- Intranet access is generally open to select members of the supply chain.
- Internet access is generally open to select members of the supply chain.
- Extranet access is generally restricted to company employees.
- Extranet access is generally open to select members of the supply chain.
- When a company uses the:
- Intranet for exchanges such as B2C transactions, it must give access to potential customers.
- Internet for exchanges such as B2C transactions, it must give access to potential customers.
- Internet for exchanges such as B2C transactions, it must preclude potential customers default access.
- Extranet for exchanges such as B2C transactions, it must preclude potential customers default access.
- Firewalls:
- Prevent internal users from accessing unacceptable web sites through the intranet.
- Permit internal users direct access to the Internet to accomplish B2B transactions.
- Prevent vendors from viewing inventory levels via the intranet.
- Prevent external users from accessing the extranet or intranet.
- Select the correct statement from the following.
- XML is extensible markup language while XBRL is extensible business reporting language.
- XML is extensive markup language while XBRL is extensive business reporting language.
- XML is example markup language while XBRL is example business reporting language.
- XML is extensible manipulation language while XBRL is extensible business reporting language.
- XML:
- Allows dynamic financial statements to be published on websites.
- Provides standards for the automatic exchange of financial data.
- Facilitates the exchange of data between organizations via web pages.
- Is based on XBRL language for the construction of business web pages.
- EDI via ANSI X.12 implementation is hampered by:
- High costs.
- Usable only on small projects.
- Limited transfer of files and data formats.
- Both A and C above are correct answers.
- Internet EDI, or EDIINT, features all of the following EXCEPT:
- Low cost.
- Heavy infrastructure.
- Industry standard.
- Entire supply chain integration.
- Value added networks or VANs, features all of the following EXCEPT:
- Transaction fees.
- Complicated.
- Industry standard.
- Limited access.
- As a metalanguage, XML:
- Places a data tag that the beginning and end of each page identifying the contained data.
- Places a data tag that the beginning and end of each data item identifying the contained data.
- Places a data tag only at the beginning of the data identifying the following data item.
- Is usable on both EDI and EDIINT networks.
- XBRL:
- Is a language that allows data extraction from financial statements.
- Is the base or core language for XML, also a metalanguage.
- Requires that financial statements be submitted in printed format.
- Both answers B and C are correct.
- Companies that engage in e-commerce, B2C sales with consumers:
- Have the legal obligation of complying with the AICPA Trust Services Principles.
- Have the same kind of obligations to conduct their business ethically as companies transacting business any other way.
- Have legal obligations that suggest that customers should be so informed regarding customer privacy.
- Are required by law to have a local presence for the resolution of customer complaints.
TEST BANK – CHAPTER 14 – TRUE /
- E-business is the use of electronic means to enhance business processes.
- E-commerce is electronically enabled transactions between a business and its customers.
- E-commerce is the use of electronic means to enhance business processes.
- E-commerce only involves transactions between the business and its customers.
- Packet switching is the method used to send data over a computer network.
- A router is an electronic hardware device that is connected to each computer to connect it to a network.
- A protocol is a standard data communication format that allows computers to exchange data.
- TCP/IP is an abbreviation for terminal communications protocol/Internet protocol.
- The Internet (interconnected networks) serves as the backbone for the World Wide Web (WWW).
- A backbone provider is an organization such as the National Science Foundation (NSF) which funded the Internet and/or the WWW.
- Regional ISPs connect to the backbone through lines that have less speed and capacity than the backbone.
- Local ISPs connect to the backbone through lines that have less speed and capacity than the backbone.
- A web server is a computer and hard drive space that connects to the backbone through lines that have less speed and capacity than the backbone.
- A web server is a computer and hard drive space that stores web pages and data.
- HTML has evolved over the years to increase functionality and security.
- The standard form of encryption embedded in e-commerce sites and in web browser software is “Safe Sending Language” (SSL).
- Due to interstate trade events and taxation issues the U.S. Government has standardized the definition of e-commerce.
- The common term for business-to-consumer e-commerce is B2C. The common term for business-to-business electronic sales is B2B.
- E-commerce provides the potential for much richer marketing concepts that include video, audio, product comparisons, and product testimonials or product tests.
- Because of computer interaction and the capability of almost instant verification business across the World Wide Web has a lower probably of fraud, hackers, and compromised customer privacy.
- The AICPA Trust Services Principles do not protect the history of purchases since these are classified as “public knowledge events.”
- The AICPA Trust Services Principles state that the customer should be given the choice regarding the collection and retention of data.
- The AICPA Trust Services Principles state that the customer need not be contacted if a business is going to release non-sensitive information about the customer to a third party.
- The supply chain is the linked processes from the raw material vendor through the manufacturer ending at the stage of finished goods.
- The supply chain may be larger at either or both ends as more than one vendor may supply the same materials and more than one customer may purchase the finished products.
- A strength of the supply chain concept is that inconsistencies or poor quality within the supply chain will be compensated by other strengths resulting in an overall satisfactory product.
- An example of vertical integration is a manufacturer who mines the raw materials, produces the product, and then sells it in company owned stores.
- The differentiating factor between B2C and B2B is where B2C might purchase two books; a B2B purchase might involve ten thousand books.
- One advantage in the B2B e-business environment is that operations costs can be reduced through inventory reductions and efficiencies can be increased by location of nearby assets when needed.
- An intranet is a private network accessible only to the employees of a company.
- Because intranets do not transmit information through the Internet or WWW they do not use protocols such as TCP/IP.
- An extranet is similar to an internet except that it offers access to a greater number of sites than a standard Internet or WWW connection.
- One characteristic that the Internet, intranets, and extranets have in common is that they are all networks that are intended for the sharing of information and the conducting of transactions.
- The general public has general access to the intranet and extranet networks.
- XML is a rich language that facilitates the exchange of data between organizations via web pages.
- In XBRL complex financial statements are presented only in a static mode.
- Traditional EDI is a real-time processing system due to the 24 hour, 7 day a week operation of computers and servers.
- Management has an ethical obligation to create and enforce policies and practices which ensure that private customer data are not misused.
- Because of their sensitive nature, companies seldom sell or share customer lists or customer data.
- While there is no requirement to disclose a privacy policy on a website, it is an ethical obligation to disclose and follow the policy.
- SO1 E-Commerce
The text and readings in the course discuss the benefits of eCommerce . Outline five benefits of eCommerce for the customer.
- SO1 E-Commerce
The text and readings in the course discuss the benefits of eCommerce . Outline five benefits of eCommerce for a business.
- SO4 eBusiness B2B and B2C
Explain the term B2B and compare B2B to B2C commerce.
Document Information
Connected Book
Accounting Info Systems Controls 3e Complete Test Bank
By Leslie Turner