Podcast
Questions and Answers
What is the process of shifting each letter in a cleartext message by a number of positions based on a key value called?
What is the process of shifting each letter in a cleartext message by a number of positions based on a key value called?
Algorithm
What is the purpose of an access control list?
What is the purpose of an access control list?
To define the access privileges for all valid users of a resource.
What are alphabetic codes?
What are alphabetic codes?
Codes that assign alphabetic characters sequentially.
What type of controls ensure that only authorized personnel have access to a firm's assets?
What type of controls ensure that only authorized personnel have access to a firm's assets?
Signup and view all the answers
What is an access method?
What is an access method?
Signup and view all the answers
What is an analytical review?
What is an analytical review?
Signup and view all the answers
What is the purpose of access tests?
What is the purpose of access tests?
Signup and view all the answers
What are anomalies in database management?
What are anomalies in database management?
Signup and view all the answers
What is the purpose of an AP subsidiary ledger?
What is the purpose of an AP subsidiary ledger?
Signup and view all the answers
What is an access token?
What is an access token?
Signup and view all the answers
What are application controls?
What are application controls?
Signup and view all the answers
What is an accounting information system (AIS)?
What is an accounting information system (AIS)?
Signup and view all the answers
What is an application-level firewall?
What is an application-level firewall?
Signup and view all the answers
What is an accounting record?
What is an accounting record?
Signup and view all the answers
What is an accounts payable pending file?
What is an accounts payable pending file?
Signup and view all the answers
What is an approved credit memo?
What is an approved credit memo?
Signup and view all the answers
What is an approved sales order?
What is an approved sales order?
Signup and view all the answers
What is the purpose of an accounts receivable (AR) subsidiary ledger?
What is the purpose of an accounts receivable (AR) subsidiary ledger?
Signup and view all the answers
What is an architecture description?
What is an architecture description?
Signup and view all the answers
What does accuracy mean in the context of information systems?
What does accuracy mean in the context of information systems?
Signup and view all the answers
What is an archive file?
What is an archive file?
Signup and view all the answers
What are accuracy tests?
What are accuracy tests?
Signup and view all the answers
What are activities in the context of a business?
What are activities in the context of a business?
Signup and view all the answers
What does asset acquisition refer to?
What does asset acquisition refer to?
Signup and view all the answers
What is an activity driver?
What is an activity driver?
Signup and view all the answers
What does asset disposal refer to?
What does asset disposal refer to?
Signup and view all the answers
What is activity-based costing (ABC)?
What is activity-based costing (ABC)?
Signup and view all the answers
What does asset maintenance refer to?
What does asset maintenance refer to?
Signup and view all the answers
What are ad hoc reports?
What are ad hoc reports?
Signup and view all the answers
What is an association in database management?
What is an association in database management?
Signup and view all the answers
What is the Advanced Encryption Standard (AES)?
What is the Advanced Encryption Standard (AES)?
Signup and view all the answers
What are assurance services?
What are assurance services?
Signup and view all the answers
What are agents in the context of business transactions?
What are agents in the context of business transactions?
Signup and view all the answers
What is an attendance file?
What is an attendance file?
Signup and view all the answers
What is the attest function?
What is the attest function?
Signup and view all the answers
What is a batch in the context of data processing?
What is a batch in the context of data processing?
Signup and view all the answers
What are attributes in database management?
What are attributes in database management?
Signup and view all the answers
What are batch control totals?
What are batch control totals?
Signup and view all the answers
What are audit objectives?
What are audit objectives?
Signup and view all the answers
What are batch controls?
What are batch controls?
Signup and view all the answers
What are audit procedures?
What are audit procedures?
Signup and view all the answers
What are batch systems?
What are batch systems?
Signup and view all the answers
What is audit risk?
What is audit risk?
Signup and view all the answers
What is a big bang implementation?
What is a big bang implementation?
Signup and view all the answers
What is an audit trail?
What is an audit trail?
Signup and view all the answers
What is a bill of lading?
What is a bill of lading?
Signup and view all the answers
What are audit trail controls?
What are audit trail controls?
Signup and view all the answers
What is a bill of materials?
What is a bill of materials?
Signup and view all the answers
What are billing schemes?
What are billing schemes?
Signup and view all the answers
Who is an auditor?
Who is an auditor?
Signup and view all the answers
What are biometric devices?
What are biometric devices?
Signup and view all the answers
What are authenticity tests?
What are authenticity tests?
Signup and view all the answers
What is a blind copy?
What is a blind copy?
Signup and view all the answers
What is authority in the context of business?
What is authority in the context of business?
Signup and view all the answers
What is bolt-on software?
What is bolt-on software?
Signup and view all the answers
What are automated storage and retrieval systems (AS/RS)?
What are automated storage and retrieval systems (AS/RS)?
Signup and view all the answers
What are botnets?
What are botnets?
Signup and view all the answers
What is bribery?
What is bribery?
Signup and view all the answers
What does automation mean?
What does automation mean?
Signup and view all the answers
What are backbone systems?
What are backbone systems?
Signup and view all the answers
What is a budget?
What is a budget?
Signup and view all the answers
What is a back-order?
What is a back-order?
Signup and view all the answers
What is the purpose of a budget master file?
What is the purpose of a budget master file?
Signup and view all the answers
What are business ethics?
What are business ethics?
Signup and view all the answers
What is a balanced scorecard (BSC)?
What is a balanced scorecard (BSC)?
Signup and view all the answers
What is the Caesar cipher?
What is the Caesar cipher?
Signup and view all the answers
What is a base case system evaluation (BCSE)?
What is a base case system evaluation (BCSE)?
Signup and view all the answers
What is a closed sales order file?
What is a closed sales order file?
Signup and view all the answers
What is a call-back device?
What is a call-back device?
Signup and view all the answers
What is a closed voucher file?
What is a closed voucher file?
Signup and view all the answers
What is cardinality in database management?
What is cardinality in database management?
Signup and view all the answers
What does cohesion mean in software development?
What does cohesion mean in software development?
Signup and view all the answers
What are cash disbursement vouchers?
What are cash disbursement vouchers?
Signup and view all the answers
What is a cold turkey cutover?
What is a cold turkey cutover?
Signup and view all the answers
What is a cash disbursements journal?
What is a cash disbursements journal?
Signup and view all the answers
What are commodity IT assets?
What are commodity IT assets?
Signup and view all the answers
What is cash larceny?
What is cash larceny?
Signup and view all the answers
What is competency analysis?
What is competency analysis?
Signup and view all the answers
What is a cash receipts journal?
What is a cash receipts journal?
Signup and view all the answers
What are compilers?
What are compilers?
Signup and view all the answers
What does completeness mean in the context of reports?
What does completeness mean in the context of reports?
Signup and view all the answers
What is centralized data processing?
What is centralized data processing?
Signup and view all the answers
What are completeness tests?
What are completeness tests?
Signup and view all the answers
What is a centralized database?
What is a centralized database?
Signup and view all the answers
What is a composite key?
What is a composite key?
Signup and view all the answers
What are certification authorities (CAs)?
What are certification authorities (CAs)?
Signup and view all the answers
What is changed data capture?
What is changed data capture?
Signup and view all the answers
What is computer ethics?
What is computer ethics?
Signup and view all the answers
What is a chart of accounts?
What is a chart of accounts?
Signup and view all the answers
What is a check digit?
What is a check digit?
Signup and view all the answers
What is check tampering?
What is check tampering?
Signup and view all the answers
What does computer numerical control (CNC) refer to?
What does computer numerical control (CNC) refer to?
Signup and view all the answers
Study Notes
Key Terms in Information Systems
- Algorithm: A procedure for shifting each letter in a message by a number of positions, specified by a key.
- Access control list (ACL): Lists defining access privileges for users, controlling access to resources like files and directories.
- Alphabetic codes: Sequentially assigned alphabetic characters.
- Access controls: Controls securing firm assets, ensuring only authorized personnel access.
- Alphanumeric codes: Codes incorporating both alphabetic and numeric characters.
- Access method: Techniques for locating and navigating records in a database.
- Analytical review: Process of examining account balances for relationships or risks.
- Access tests: Tests ensuring authorized users avoid unauthorized data access.
- Anomalies: Negative operational symptoms from incorrectly normalized tables.
- AP subsidiary ledger: Record of cash disbursements exposures.
- Access token: Contains user ID, password, group, and granted privileges.
- Application controls: Controls ensuring the integrity of specific systems.
- Accounting information systems (AIS): Subset of systems processing financial transactions.
- Application-level firewall: Provides high-level network security.
- Accounting record: Transaction cycle document, journal, or ledger.
- Accounts payable pending file: Copy of the purchase requisition.
- Approved credit memo: Document where credit managers evaluate and approve customer returns.
- Approved sales order: Document reviewed by sales managers following sales order approval.
- Accounts receivable (AR) subsidiary ledger: Detailed account record for customers, including balance, credit, transaction history, and invoice details.
- Architecture description: Formal description of system structure.
- Accuracy: State of being free from material errors.
- Archive file: File containing past transactions for future reference.
- Accuracy tests: Tests ensuring system processing of data within specified tolerances.
- Activities: Work performed within a firm.
- Asset acquisition: Process of obtaining or replacing existing assets.
- Activity driver: Factor measuring activity consumption by a cost object.
- Asset disposal: Report documenting final disposition of assets.
- Activity-based costing (ABC): Technique providing information about activities and cost objects.
- Asset maintenance: Adjusting fixed asset balances due to depreciation.
- Ad hoc reports: Technology enabling direct inquiries and report generation.
- Association: Relationship between record types.
- Advanced encryption standard (AES): Symmetric key encryption technique.
- Assurance services: Professional services improving information quality.
- Agents: Individuals and departments involved in economic events.
- Attendance file: File generated by timekeeping department for approved time cards.
- Attest function: Auditor's opinion on financial statement fairness.
- Batch: Group of similar transactions processed together.
- Attributes: Descriptors of objects.
- Batch control totals: Records accompanying sales order files.
- Audit objectives: Process of creating test data.
- Batch controls: Management method for high transaction volumes.
- Audit procedures: Tests of application controls and transaction/balance details.
- Batch systems: Systems assembling transactions for processing.
- Audit risk: Probability of rendering unqualified opinions on misstated financial statements.
- Big bang: Single event conversion from legacy to a new system.
- Audit trail: Accounting records tracing transactions.
- Bill of lading: Contract between seller and shipper.
- Audit trail controls: Ensures transaction tracing to financial statements.
- Bill of materials: Document detailing raw materials and subassemblies in production.
- Audit trail test: Verification of adequate audit trail creation.
- Auditing: Independent attestation of financial statement fairness.
- Billing schemes: Employee-initiated schemes involving fraudulent invoices or payments.
- Auditor: Expert expressing opinions on financial statements.
- Biometric devices: Devices measuring personal characteristics (fingerprints, voice).
- Authenticity tests: Tests ensuring legitimate access attempts.
- Blind copy: Purchase order copy without price or quantity details.
- Authority: Right to make decisions in areas of responsibility.
- Block code: Coding ranges for attributes like account classifications.
- Bolt-on software: Third-party software integration with ERP software.
- Automated storage and retrieval systems (AS/RS): Computer-controlled conveyor systems for materials and products.
- Botnets: Collections of compromised computers.
- Bribery: Influencing officials with things of value.
- Automation: Utilizing technology to improve task efficiency.
- Backbone systems: Basic system structure for growth.
- Budget: Setting financial objectives with measurable goals.
- Back-order: Records of out-of-stock items awaiting inventory.
- Budget master file: Budgeted amounts for responsibility centers.
- Back-order file: Records of customer orders for out-of-stock items.
- Business ethics: Principles for decision-making in ethical dilemmas.
- Backup controls: Recovery of data loss through various methods.
- Balanced scorecard (BSC): Management system for strategy and action.
- Caesar cipher: Earliest encryption method.
- Base case system evaluation (BCSE): Comprehensive test data.
- Closed sales order file: Sales order records upon shipment.
- Call-back device: Security component that checks callers.
- Closed voucher file: File containing paid accounts payable items.
- Cardinality: Numerical mapping between entity instances.
- Cohesion: Amount of tasks within a module.
- Cash disbursement vouchers: Improved control over cash payments.
- Cold turkey cutover: Full system conversion on a specific date.
- Cash disbursements journal: Record of authorizing checks.
- Commodity IT assets: Easily acquired, non-unique assets.
- Cash larceny: Stealing recorded cash receipts.
- Competency analysis: Organizational effectiveness assessment.
- Cash receipts journal: Record of cash receipts transactions.
- Compilers: Language translation modules.
- Completeness: Inclusion of necessary calculations and clear presentation.
- Centralized data processing: All processing in one central location.
- Completeness tests: Tests for missing or incomplete records.
- Centralized database: Database housed in one central location.
- Composite key: Combining multiple attributes for unique identification.
- Certification authorities (CAs): Trusted parties issuing digital certificates.
- Changed data capture: Technique capturing only changed data.
- Computer ethics: Analysis of computer impact and its ethical use.
- Chart of accounts: Organization's accounts with numbers and names.
- Check digit: Control digit for data integrity.
- Computer fraud: Theft via altering computer records or software.
- Check register: Record of cash disbursements.
- Check tampering: Forging or altering checks.
- Computer numerical control (CNC): Computer-controlled manufacturing machines.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on essential terms within Information Systems. This quiz covers crucial concepts such as algorithms, access control lists, and analysis techniques. Ideal for students and professionals wanting to strengthen their understanding of information systems terminology.