Deck 14: Accounting on the Internet

Full screen (f)
exit full mode
Question
Intranets do not use the same software as the Internet.
Use Space or
up arrow
down arrow
to flip the card.
Question
An advantage of XBRL is that it can save companies the cost of rekeying financial data from one computer application to another.
Question
The Canadian Securities Administration will not accept XBRL formatted data in electronically filed financial reports.
Question
The World Wide Web is the text portion of the Internet.
Question
Most accountants believe that auditors do not need to concern themselves with IP addresses.
Question
XBRL is an acronym for "extensive business reports and liabilities."
Question
XBRL is not related to XML.
Question
IDEA uses XBRL-coded data of corporate financial statements.
Question
A set of XBRL tags identifies the data it contains as well as indicates how to display that data.
Question
An extranet is a network that a business might establish with its trading partners.
Question
HTML tags describe how data and graphics should be presented by a web browser.
Question
An advantage of XBRL is that the tags have been completely standardized by the XBRL International Consortium and these standards are now fixed.
Question
XBRL is a type of XML.
Question
The Internet Protocol address is a numerical translation of the text-based domain address.
Question
IDEA is a computer system used by the Securities and Exchange Commission SEC).
Question
XBRL allows users to extract and compare financial data from many different companies.
Question
All electronic commerce takes place over the Internet.
Question
The domain address of a web page is equivalent of its universal resource locator URL).
Question
An advantage of XBRL is its ability to express semantic meaning-i.e., to express such relationships as "assets = liabilities + equity."
Question
Groupware is the technology that enables knowledge sharing and knowledge management among employees.
Question
Proxy servers can act as firewalls and can also limit employee Internet access to approved web addresses only.
Question
An important disadvantage of XBRL is that most accounting packages cannot read or write documents in XBRL format.
Question
To date, e-commerce has had less impact on accounts payable and accounts receivable than on procurement and inventory tracking.
Question
For all its exposure in the popular press media, identity theft affects a relatively small number of people and, in total, involves a small amount of losses per year.
Question
Firewalls are virtually impossible to breach and offer assurance against any viruses.
Question
EDI automates the exchange of business information, particularly with respect to source documents.
Question
Two types of firewall policies are protection by 1)inclusion, and 2)exclusion.
Question
E-wallets store customer data to facilitate online purchases.They do not store dollars.
Question
Spam is annoying, but not a particularly costly or bothersome, to most businesses or government agencies.
Question
A major issue impacting e-business is the trade-off between accessibility and vulnerability.
Question
Worldwide, the total annual financial losses resulting from all phishing activities were less than $650 million in the first half of 2012.
Question
An advantage of a proxy server is the ability to store commonly-requested web pages in memory, thereby enabling it to respond quickly to internal user requests for them.
Question
EDI can only be used by private, for-profit businesses.
Question
Use of electronic procurement systems typically raises purchasing costs.
Question
Public key encryption requires the use of a pair of public/private encryption keys.
Question
Three types of access security are 1)what you have, 2)what you know, and 3)who you are.
Question
The term "phishing" refers to the use of web pages or other means to trick viewers into revealing their passwords or other personal information.
Question
Digital signatures can never be as secure as written signatures.
Question
Digital time stamping authenticates the time and sometimes the place a transmission or transaction occurred.
Question
Data encryption renders a text message unreadable during data transmission, even if intercepted.
Question
Senate Bill S-4 made it illegal to possess another's person identity for criminal purposes.
Question
For most businesses, cloud computing is an example of outsourcing.
Question
MozyHome is a cloud provider of backup services.
Question
EDI is an acronym standing for "electronic delayed interface."
Question
One important personal category of cloud computing for accountants is educational services.
Question
The letter "p" in the acronym http stands for:

A)Page
B)Provider
C)Protocol
D)Parity
Question
An example of a social networking site is Facebook.
Question
When a cloud service company hosts a client's website, this is an example of "platform as a service."
Question
BASF is one of the world's largest telephone companies.
Question
The heaviest demands on book publishing websites come in the weeks just prior to the start of a fall or spring semester.
Question
An example of a social networking site is eBay.
Question
Which of these is not a component of an IP address?

A)A geographic region
B)An organization number
C)A computer group
D)A specific computer number
E)A specific user number
Question
Another name for an Internet domain address is its:

A)URL
B)ISP
C)email address
D)IETF
Question
An advantage of an extranet is that:

A)It can disseminate information corporate-wide
B)It can be accessed by selected trading partners
C)Users can employ common web browsers to access information in them
D)all of the above
Question
The term "SaaS" is an acronym standing for "software as a service."
Question
Businesses can use social networking sites to better understand the reactions to new products or services.
Question
The term "B2B" is Internet slang for "back to basics."
Question
The most common reason businesses outsource is to increase control over their data and data processing tasks.
Question
Social networks do not pose privacy concerns.
Question
An example of an Internet service provider is:

A)General Electric
B)Bell
C)PeachTree
D)ISP
E)none of these
Question
The "A" in the term IDEA used by the SEC)stands for:

A)Accounting
B)Association
C)Addition
D)Applications
E)Access
Question
An advantage of e-wallets is that:

A)Users do not need to re-enter personal information each time they make an online purchase
B)Most e-wallet information is maintained on vendor file servers
C)They ensure the completion of a purchase transaction over the Internet
D)none of the above is an advantage of e-wallets
Question
All of the following are benefits of XBRL except:

A)Companies can file financial information in one format, avoiding the errors that may come from re-entering data multiple times
B)The SEC accepts XBRL-format for electronic filing of financial statement reports
C)XBRL permits the automatic and reliable exchange of financial information across many software formats and technologies, including the Internet
D)all of the above are benefits of XBRL
E)none of the above are benefits of XBRL
Question
Which of these is not an advantage of XBRL?

A)It often enables businesses to avoid rekeying data downloaded from corporate websites
B)It constrains companies to particular formats, thus ensuring consistency
C)It helps standardize the storage and therefore presentation of financial information
D)all of these are advantages of XBRL
Question
In recent years, the most common complaint related to identify theft is:

A)Alteration of personal information
B)Imbalances in financial statements
C)Credit card fraud
D)Deletions of the personal information maintained by banks and insurance companies
Question
All of the following are normally associated with the Internet except:

A)IP addresses
B)URL addresses
C)http
D)MICR coding
Question
The "X" in the term XBRL stands for:

A)Extra
B)Extensible
C)X-rated
D)Exante
Question
IDEA is used by the Securities and Exchange Commission SEC)to:

A)Store the financial data of public companies
B)Collect lists of bankrupt companies
C)Store the URL's of member firms
D)Collect data on individuals victimized by identity theft hackers
Question
All of the following are true about XBRL tags except:

A)Tags are "extensible"
B)Tags describe the data
C)Tags tell how to display data
D)Tags are now permanently standardized across industries
Question
Which of these best describes the current state of XBRL?

A)It now lacks standards, but the hope is that we will get some soon
B)The language is completely standardized
C)The language is dynamic and standards are still being developed
D)The language now awaits official sanction by the United Nations before being released for use
Question
According to the textbook, which of the following statements is true about identity theft?

A)Most personal identities are stolen by dumpster diving
B)There is little individuals can do to protect themselves from identify theft; this is a corporate problem
C)There is much that individuals can do to protect themselves
D)Accountants are more vulnerable to identity theft than non-accountants
Question
All of the following are examples of EDI "documents" except:

A)Purchase orders
B)Sales invoices
C)Customs documents
D)Bar codes
Question
An important characteristic of e-wallets is that:

A)It is exactly the same as regular cash
B)It is the same as EDI
C)It contains the identity of the user
D)Users must also supply a credit card number when using it
Question
One advantage of XBRL tags is that:

A)They always contain links to other web pages
B)Optional entries allow users to specify units of currency, such as Euros
C)They are now fixed standards
D)They cannot be used by hackers
Question
Which of these is correct about the terms "e-business" and "e-commerce"?

A)They are exact synonyms
B)They are exact opposites
C)e-business is a subset of e-commerce
D)e-commerce is a subset of e-business
Question
Retail sales on the Internet:

A)Are growing rapidly
B)Were growing at first, but are now declining
C)Are not possible on the Internet
D)Have only been achieved by major retailers such as Wal-Mart
Question
This language allows its users to create web pages on the Internet:

A)HTTP
B)HTML
C)URL
D)COBOL
Question
Which of the following is true about XBRL?

A)It is a business application of XML
B)It uses tags such as < b > like HTML
C)It is used by the SEC to collect and store financial information about companies
D)all of the above are true about XBRL
Question
The acronym B2B stands for:

A)Back to basics
B)Baltimore or bust
C)A non-existent public broadcasting system
D)Business to business
Question
________ is one of the largest "auction houses" on the web:

A)Wal-Mart
B)Sears, Roebuck
C)eBay
D)Forester
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/106
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Accounting on the Internet
1
Intranets do not use the same software as the Internet.
False
2
An advantage of XBRL is that it can save companies the cost of rekeying financial data from one computer application to another.
True
3
The Canadian Securities Administration will not accept XBRL formatted data in electronically filed financial reports.
False
4
The World Wide Web is the text portion of the Internet.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
5
Most accountants believe that auditors do not need to concern themselves with IP addresses.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
6
XBRL is an acronym for "extensive business reports and liabilities."
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
7
XBRL is not related to XML.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
8
IDEA uses XBRL-coded data of corporate financial statements.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
9
A set of XBRL tags identifies the data it contains as well as indicates how to display that data.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
10
An extranet is a network that a business might establish with its trading partners.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
11
HTML tags describe how data and graphics should be presented by a web browser.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
12
An advantage of XBRL is that the tags have been completely standardized by the XBRL International Consortium and these standards are now fixed.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
13
XBRL is a type of XML.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
14
The Internet Protocol address is a numerical translation of the text-based domain address.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
15
IDEA is a computer system used by the Securities and Exchange Commission SEC).
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
16
XBRL allows users to extract and compare financial data from many different companies.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
17
All electronic commerce takes place over the Internet.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
18
The domain address of a web page is equivalent of its universal resource locator URL).
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
19
An advantage of XBRL is its ability to express semantic meaning-i.e., to express such relationships as "assets = liabilities + equity."
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
20
Groupware is the technology that enables knowledge sharing and knowledge management among employees.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
21
Proxy servers can act as firewalls and can also limit employee Internet access to approved web addresses only.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
22
An important disadvantage of XBRL is that most accounting packages cannot read or write documents in XBRL format.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
23
To date, e-commerce has had less impact on accounts payable and accounts receivable than on procurement and inventory tracking.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
24
For all its exposure in the popular press media, identity theft affects a relatively small number of people and, in total, involves a small amount of losses per year.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
25
Firewalls are virtually impossible to breach and offer assurance against any viruses.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
26
EDI automates the exchange of business information, particularly with respect to source documents.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
27
Two types of firewall policies are protection by 1)inclusion, and 2)exclusion.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
28
E-wallets store customer data to facilitate online purchases.They do not store dollars.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
29
Spam is annoying, but not a particularly costly or bothersome, to most businesses or government agencies.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
30
A major issue impacting e-business is the trade-off between accessibility and vulnerability.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
31
Worldwide, the total annual financial losses resulting from all phishing activities were less than $650 million in the first half of 2012.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
32
An advantage of a proxy server is the ability to store commonly-requested web pages in memory, thereby enabling it to respond quickly to internal user requests for them.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
33
EDI can only be used by private, for-profit businesses.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
34
Use of electronic procurement systems typically raises purchasing costs.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
35
Public key encryption requires the use of a pair of public/private encryption keys.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
36
Three types of access security are 1)what you have, 2)what you know, and 3)who you are.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
37
The term "phishing" refers to the use of web pages or other means to trick viewers into revealing their passwords or other personal information.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
38
Digital signatures can never be as secure as written signatures.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
39
Digital time stamping authenticates the time and sometimes the place a transmission or transaction occurred.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
40
Data encryption renders a text message unreadable during data transmission, even if intercepted.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
41
Senate Bill S-4 made it illegal to possess another's person identity for criminal purposes.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
42
For most businesses, cloud computing is an example of outsourcing.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
43
MozyHome is a cloud provider of backup services.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
44
EDI is an acronym standing for "electronic delayed interface."
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
45
One important personal category of cloud computing for accountants is educational services.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
46
The letter "p" in the acronym http stands for:

A)Page
B)Provider
C)Protocol
D)Parity
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
47
An example of a social networking site is Facebook.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
48
When a cloud service company hosts a client's website, this is an example of "platform as a service."
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
49
BASF is one of the world's largest telephone companies.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
50
The heaviest demands on book publishing websites come in the weeks just prior to the start of a fall or spring semester.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
51
An example of a social networking site is eBay.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
52
Which of these is not a component of an IP address?

A)A geographic region
B)An organization number
C)A computer group
D)A specific computer number
E)A specific user number
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
53
Another name for an Internet domain address is its:

A)URL
B)ISP
C)email address
D)IETF
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
54
An advantage of an extranet is that:

A)It can disseminate information corporate-wide
B)It can be accessed by selected trading partners
C)Users can employ common web browsers to access information in them
D)all of the above
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
55
The term "SaaS" is an acronym standing for "software as a service."
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
56
Businesses can use social networking sites to better understand the reactions to new products or services.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
57
The term "B2B" is Internet slang for "back to basics."
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
58
The most common reason businesses outsource is to increase control over their data and data processing tasks.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
59
Social networks do not pose privacy concerns.
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
60
An example of an Internet service provider is:

A)General Electric
B)Bell
C)PeachTree
D)ISP
E)none of these
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
61
The "A" in the term IDEA used by the SEC)stands for:

A)Accounting
B)Association
C)Addition
D)Applications
E)Access
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
62
An advantage of e-wallets is that:

A)Users do not need to re-enter personal information each time they make an online purchase
B)Most e-wallet information is maintained on vendor file servers
C)They ensure the completion of a purchase transaction over the Internet
D)none of the above is an advantage of e-wallets
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
63
All of the following are benefits of XBRL except:

A)Companies can file financial information in one format, avoiding the errors that may come from re-entering data multiple times
B)The SEC accepts XBRL-format for electronic filing of financial statement reports
C)XBRL permits the automatic and reliable exchange of financial information across many software formats and technologies, including the Internet
D)all of the above are benefits of XBRL
E)none of the above are benefits of XBRL
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
64
Which of these is not an advantage of XBRL?

A)It often enables businesses to avoid rekeying data downloaded from corporate websites
B)It constrains companies to particular formats, thus ensuring consistency
C)It helps standardize the storage and therefore presentation of financial information
D)all of these are advantages of XBRL
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
65
In recent years, the most common complaint related to identify theft is:

A)Alteration of personal information
B)Imbalances in financial statements
C)Credit card fraud
D)Deletions of the personal information maintained by banks and insurance companies
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
66
All of the following are normally associated with the Internet except:

A)IP addresses
B)URL addresses
C)http
D)MICR coding
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
67
The "X" in the term XBRL stands for:

A)Extra
B)Extensible
C)X-rated
D)Exante
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
68
IDEA is used by the Securities and Exchange Commission SEC)to:

A)Store the financial data of public companies
B)Collect lists of bankrupt companies
C)Store the URL's of member firms
D)Collect data on individuals victimized by identity theft hackers
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
69
All of the following are true about XBRL tags except:

A)Tags are "extensible"
B)Tags describe the data
C)Tags tell how to display data
D)Tags are now permanently standardized across industries
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
70
Which of these best describes the current state of XBRL?

A)It now lacks standards, but the hope is that we will get some soon
B)The language is completely standardized
C)The language is dynamic and standards are still being developed
D)The language now awaits official sanction by the United Nations before being released for use
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
71
According to the textbook, which of the following statements is true about identity theft?

A)Most personal identities are stolen by dumpster diving
B)There is little individuals can do to protect themselves from identify theft; this is a corporate problem
C)There is much that individuals can do to protect themselves
D)Accountants are more vulnerable to identity theft than non-accountants
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
72
All of the following are examples of EDI "documents" except:

A)Purchase orders
B)Sales invoices
C)Customs documents
D)Bar codes
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
73
An important characteristic of e-wallets is that:

A)It is exactly the same as regular cash
B)It is the same as EDI
C)It contains the identity of the user
D)Users must also supply a credit card number when using it
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
74
One advantage of XBRL tags is that:

A)They always contain links to other web pages
B)Optional entries allow users to specify units of currency, such as Euros
C)They are now fixed standards
D)They cannot be used by hackers
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
75
Which of these is correct about the terms "e-business" and "e-commerce"?

A)They are exact synonyms
B)They are exact opposites
C)e-business is a subset of e-commerce
D)e-commerce is a subset of e-business
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
76
Retail sales on the Internet:

A)Are growing rapidly
B)Were growing at first, but are now declining
C)Are not possible on the Internet
D)Have only been achieved by major retailers such as Wal-Mart
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
77
This language allows its users to create web pages on the Internet:

A)HTTP
B)HTML
C)URL
D)COBOL
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following is true about XBRL?

A)It is a business application of XML
B)It uses tags such as < b > like HTML
C)It is used by the SEC to collect and store financial information about companies
D)all of the above are true about XBRL
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
79
The acronym B2B stands for:

A)Back to basics
B)Baltimore or bust
C)A non-existent public broadcasting system
D)Business to business
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
80
________ is one of the largest "auction houses" on the web:

A)Wal-Mart
B)Sears, Roebuck
C)eBay
D)Forester
Unlock Deck
Unlock for access to all 106 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 106 flashcards in this deck.