Key Terms in Information Systems
92 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the process of shifting each letter in a cleartext message by a number of positions based on a key value called?

Algorithm

What is the purpose of an access control list?

To define the access privileges for all valid users of a resource.

What are alphabetic codes?

Codes that assign alphabetic characters sequentially.

What type of controls ensure that only authorized personnel have access to a firm's assets?

<p>Access controls</p> Signup and view all the answers

What is an access method?

<p>A technique used to locate records and navigate through a database.</p> Signup and view all the answers

What is an analytical review?

<p>A process of examining financial statements to identify relationships between accounts and potential risks.</p> Signup and view all the answers

What is the purpose of access tests?

<p>To ensure that the application prevents unauthorized users from accessing data.</p> Signup and view all the answers

What are anomalies in database management?

<p>Negative operational symptoms caused by improperly normalized tables.</p> Signup and view all the answers

What is the purpose of an AP subsidiary ledger?

<p>To record the exposure in the cash disbursements subsystems.</p> Signup and view all the answers

What is an access token?

<p>A digital credential that stores key user information and access permissions.</p> Signup and view all the answers

What are application controls?

<p>Controls that ensure the integrity of specific systems.</p> Signup and view all the answers

What is an accounting information system (AIS)?

<p>A specialized information system designed to process financial transactions.</p> Signup and view all the answers

What is an application-level firewall?

<p>A security tool that provides high-level network security.</p> Signup and view all the answers

What is an accounting record?

<p>A document, journal, or ledger used in transaction cycles.</p> Signup and view all the answers

What is an accounts payable pending file?

<p>A file containing a copy of the purchase requisition.</p> Signup and view all the answers

What is an approved credit memo?

<p>A document that authorizes a credit to a customer's account.</p> Signup and view all the answers

What is an approved sales order?

<p>A document that authorizes the sale of goods or services.</p> Signup and view all the answers

What is the purpose of an accounts receivable (AR) subsidiary ledger?

<p>To track the balance owed by each customer.</p> Signup and view all the answers

What is an architecture description?

<p>Formal description of an information system that defines its structural components and properties.</p> Signup and view all the answers

What does accuracy mean in the context of information systems?

<p>The state of being free from material error.</p> Signup and view all the answers

What is an archive file?

<p>A file containing records of past transactions that are retained for future reference.</p> Signup and view all the answers

What are accuracy tests?

<p>Tests that ensure that the system processes only data values that conform to specified tolerances.</p> Signup and view all the answers

What are activities in the context of a business?

<p>Work performed in a firm.</p> Signup and view all the answers

What does asset acquisition refer to?

<p>Obtaining a new asset or replacing an existing one.</p> Signup and view all the answers

What is an activity driver?

<p>A factor that measures the consumption of an activity by a cost object.</p> Signup and view all the answers

What does asset disposal refer to?

<p>The process of removing an asset from the organization's records.</p> Signup and view all the answers

What is activity-based costing (ABC)?

<p>An accounting method that provides managers with information about activities and cost objects.</p> Signup and view all the answers

What does asset maintenance refer to?

<p>Adjusting the fixed asset subsidiary account balances based on depreciation.</p> Signup and view all the answers

What are ad hoc reports?

<p>Reports that are generated on demand and are not part of a regular reporting cycle.</p> Signup and view all the answers

What is an association in database management?

<p>A relationship among record types.</p> Signup and view all the answers

What is the Advanced Encryption Standard (AES)?

<p>A symmetric key encryption technique known as Rijndael.</p> Signup and view all the answers

What are assurance services?

<p>Professional services designed to improve the quality of information for decision makers.</p> Signup and view all the answers

What are agents in the context of business transactions?

<p>Individuals or departments involved in an economic event.</p> Signup and view all the answers

What is an attendance file?

<p>A file containing information about employee attendance.</p> Signup and view all the answers

What is the attest function?

<p>The auditor's responsibility to express an opinion on the fairness of a company's financial statements.</p> Signup and view all the answers

What is a batch in the context of data processing?

<p>A group of similar transactions processed together.</p> Signup and view all the answers

What are attributes in database management?

<p>Characteristics or properties that describe objects.</p> Signup and view all the answers

What are batch control totals?

<p>Records that accompany a batch of transactions to ensure data integrity.</p> Signup and view all the answers

What are audit objectives?

<p>Goals that the auditor seeks to achieve during an audit.</p> Signup and view all the answers

What are batch controls?

<p>Procedures that manage high volumes of transaction data through a system.</p> Signup and view all the answers

What are audit procedures?

<p>Specific actions or steps that the auditor performs to gather evidence and test controls.</p> Signup and view all the answers

What are batch systems?

<p>Systems that process transactions in groups or batches.</p> Signup and view all the answers

What is audit risk?

<p>The probability of the auditor failing to detect a material misstatement in the financial statements.</p> Signup and view all the answers

What is a big bang implementation?

<p>A simultaneous rollout of a new system across the entire organization.</p> Signup and view all the answers

What is an audit trail?

<p>A record that traces transactions from source documents to the financial statements.</p> Signup and view all the answers

What is a bill of lading?

<p>A formal contract between a seller and a shipping company for transporting goods.</p> Signup and view all the answers

What are audit trail controls?

<p>Controls that ensure that every transaction can be traced through the processing stages.</p> Signup and view all the answers

What is a bill of materials?

<p>A document that specifies the raw materials and subassemblies needed for production.</p> Signup and view all the answers

What are billing schemes?

<p>Fraudulent activities involving manipulating invoices for personal gain.</p> Signup and view all the answers

Who is an auditor?

<p>An expert who provides an independent opinion on financial statement fairness.</p> Signup and view all the answers

What are biometric devices?

<p>Devices that use unique personal characteristics for identification.</p> Signup and view all the answers

What are authenticity tests?

<p>Tests that verify the genuine identity of users or messages.</p> Signup and view all the answers

What is a blind copy?

<p>A copy of a purchase order that omits pricing and quantity information.</p> Signup and view all the answers

What is authority in the context of business?

<p>The right to make decisions within specific areas of responsibility.</p> Signup and view all the answers

What is bolt-on software?

<p>Software from third-party vendors used with existing ERP systems.</p> Signup and view all the answers

What are automated storage and retrieval systems (AS/RS)?

<p>Computer-controlled conveyor systems for handling materials.</p> Signup and view all the answers

What are botnets?

<p>Networks of compromised computers controlled by a malicious actor.</p> Signup and view all the answers

What is bribery?

<p>Offering or accepting something of value to influence a decision.</p> Signup and view all the answers

What does automation mean?

<p>Using technology to improve task efficiency and effectiveness.</p> Signup and view all the answers

What are backbone systems?

<p>Fundamental system structures that provide a foundation for building upon.</p> Signup and view all the answers

What is a budget?

<p>A plan that outlines financial goals and resource allocation.</p> Signup and view all the answers

What is a back-order?

<p>A record of an order for an out-of-stock item.</p> Signup and view all the answers

What is the purpose of a budget master file?

<p>To store budgeted amounts for revenues, expenditures, and other resources.</p> Signup and view all the answers

What are business ethics?

<p>Principles of conduct that guide decision-making in situations involving right and wrong.</p> Signup and view all the answers

What is a balanced scorecard (BSC)?

<p>A management system that aligns strategy with action.</p> Signup and view all the answers

What is the Caesar cipher?

<p>An early encryption method that shifts letters by a specific number of positions.</p> Signup and view all the answers

What is a base case system evaluation (BCSE)?

<p>A comprehensive test data technique used to evaluate system functionality.</p> Signup and view all the answers

What is a closed sales order file?

<p>A file containing records of completed sales orders.</p> Signup and view all the answers

What is a call-back device?

<p>A security tool that verifies a caller's identity through a password.</p> Signup and view all the answers

What is a closed voucher file?

<p>A file containing records of paid accounts payable items.</p> Signup and view all the answers

What is cardinality in database management?

<p>The number of relationships between entities.</p> Signup and view all the answers

What does cohesion mean in software development?

<p>The degree to which a module performs a specific task.</p> Signup and view all the answers

What are cash disbursement vouchers?

<p>Documents that authorize payment to suppliers.</p> Signup and view all the answers

What is a cold turkey cutover?

<p>A complete switch to a new system on a specific date.</p> Signup and view all the answers

What is a cash disbursements journal?

<p>A record of all cash payments made by an organization.</p> Signup and view all the answers

What are commodity IT assets?

<p>IT assets that are readily available in the market.</p> Signup and view all the answers

What is cash larceny?

<p>Theft of cash receipts before they are recorded in the organization's books.</p> Signup and view all the answers

What is competency analysis?

<p>An evaluation of an organization's strengths and weaknesses across various aspects.</p> Signup and view all the answers

What is a cash receipts journal?

<p>A record of all cash received by an organization.</p> Signup and view all the answers

What are compilers?

<p>Software that translates programming code into machine-readable instructions.</p> Signup and view all the answers

What does completeness mean in the context of reports?

<p>The state of a report containing all necessary information and calculations.</p> Signup and view all the answers

What is centralized data processing?

<p>A model where all data processing is done at a central location.</p> Signup and view all the answers

What are completeness tests?

<p>Tests that verify the presence of all required data in a record or batch.</p> Signup and view all the answers

What is a centralized database?

<p>A database stored in a single location.</p> Signup and view all the answers

What is a composite key?

<p>A key composed of multiple attributes.</p> Signup and view all the answers

What are certification authorities (CAs)?

<p>Trusted third parties that issue digital certificates.</p> Signup and view all the answers

What is changed data capture?

<p>A technique that captures only modified data for faster processing.</p> Signup and view all the answers

What is computer ethics?

<p>The ethical considerations surrounding the use of computer technology.</p> Signup and view all the answers

What is a chart of accounts?

<p>A list of an organization's accounts with their corresponding numbers and names.</p> Signup and view all the answers

What is a check digit?

<p>A control digit added to a code to detect errors.</p> Signup and view all the answers

What is check tampering?

<p>Altering a check to defraud the payee.</p> Signup and view all the answers

What does computer numerical control (CNC) refer to?

<p>Computer-controlled machines used for automated manufacturing.</p> Signup and view all the answers

Study Notes

Key Terms in Information Systems

  • Algorithm: A procedure for shifting each letter in a message by a number of positions, specified by a key.
  • Access control list (ACL): Lists defining access privileges for users, controlling access to resources like files and directories.
  • Alphabetic codes: Sequentially assigned alphabetic characters.
  • Access controls: Controls securing firm assets, ensuring only authorized personnel access.
  • Alphanumeric codes: Codes incorporating both alphabetic and numeric characters.
  • Access method: Techniques for locating and navigating records in a database.
  • Analytical review: Process of examining account balances for relationships or risks.
  • Access tests: Tests ensuring authorized users avoid unauthorized data access.
  • Anomalies: Negative operational symptoms from incorrectly normalized tables.
  • AP subsidiary ledger: Record of cash disbursements exposures.
  • Access token: Contains user ID, password, group, and granted privileges.
  • Application controls: Controls ensuring the integrity of specific systems.
  • Accounting information systems (AIS): Subset of systems processing financial transactions.
  • Application-level firewall: Provides high-level network security.
  • Accounting record: Transaction cycle document, journal, or ledger.
  • Accounts payable pending file: Copy of the purchase requisition.
  • Approved credit memo: Document where credit managers evaluate and approve customer returns.
  • Approved sales order: Document reviewed by sales managers following sales order approval.
  • Accounts receivable (AR) subsidiary ledger: Detailed account record for customers, including balance, credit, transaction history, and invoice details.
  • Architecture description: Formal description of system structure.
  • Accuracy: State of being free from material errors.
  • Archive file: File containing past transactions for future reference.
  • Accuracy tests: Tests ensuring system processing of data within specified tolerances.
  • Activities: Work performed within a firm.
  • Asset acquisition: Process of obtaining or replacing existing assets.
  • Activity driver: Factor measuring activity consumption by a cost object.
  • Asset disposal: Report documenting final disposition of assets.
  • Activity-based costing (ABC): Technique providing information about activities and cost objects.
  • Asset maintenance: Adjusting fixed asset balances due to depreciation.
  • Ad hoc reports: Technology enabling direct inquiries and report generation.
  • Association: Relationship between record types.
  • Advanced encryption standard (AES): Symmetric key encryption technique.
  • Assurance services: Professional services improving information quality.
  • Agents: Individuals and departments involved in economic events.
  • Attendance file: File generated by timekeeping department for approved time cards.
  • Attest function: Auditor's opinion on financial statement fairness.
  • Batch: Group of similar transactions processed together.
  • Attributes: Descriptors of objects.
  • Batch control totals: Records accompanying sales order files.
  • Audit objectives: Process of creating test data.
  • Batch controls: Management method for high transaction volumes.
  • Audit procedures: Tests of application controls and transaction/balance details.
  • Batch systems: Systems assembling transactions for processing.
  • Audit risk: Probability of rendering unqualified opinions on misstated financial statements.
  • Big bang: Single event conversion from legacy to a new system.
  • Audit trail: Accounting records tracing transactions.
  • Bill of lading: Contract between seller and shipper.
  • Audit trail controls: Ensures transaction tracing to financial statements.
  • Bill of materials: Document detailing raw materials and subassemblies in production.
  • Audit trail test: Verification of adequate audit trail creation.
  • Auditing: Independent attestation of financial statement fairness.
  • Billing schemes: Employee-initiated schemes involving fraudulent invoices or payments.
  • Auditor: Expert expressing opinions on financial statements.
  • Biometric devices: Devices measuring personal characteristics (fingerprints, voice).
  • Authenticity tests: Tests ensuring legitimate access attempts.
  • Blind copy: Purchase order copy without price or quantity details.
  • Authority: Right to make decisions in areas of responsibility.
  • Block code: Coding ranges for attributes like account classifications.
  • Bolt-on software: Third-party software integration with ERP software.
  • Automated storage and retrieval systems (AS/RS): Computer-controlled conveyor systems for materials and products.
  • Botnets: Collections of compromised computers.
  • Bribery: Influencing officials with things of value.
  • Automation: Utilizing technology to improve task efficiency.
  • Backbone systems: Basic system structure for growth.
  • Budget: Setting financial objectives with measurable goals.
  • Back-order: Records of out-of-stock items awaiting inventory.
  • Budget master file: Budgeted amounts for responsibility centers.
  • Back-order file: Records of customer orders for out-of-stock items.
  • Business ethics: Principles for decision-making in ethical dilemmas.
  • Backup controls: Recovery of data loss through various methods.
  • Balanced scorecard (BSC): Management system for strategy and action.
  • Caesar cipher: Earliest encryption method.
  • Base case system evaluation (BCSE): Comprehensive test data.
  • Closed sales order file: Sales order records upon shipment.
  • Call-back device: Security component that checks callers.
  • Closed voucher file: File containing paid accounts payable items.
  • Cardinality: Numerical mapping between entity instances.
  • Cohesion: Amount of tasks within a module.
  • Cash disbursement vouchers: Improved control over cash payments.
  • Cold turkey cutover: Full system conversion on a specific date.
  • Cash disbursements journal: Record of authorizing checks.
  • Commodity IT assets: Easily acquired, non-unique assets.
  • Cash larceny: Stealing recorded cash receipts.
  • Competency analysis: Organizational effectiveness assessment.
  • Cash receipts journal: Record of cash receipts transactions.
  • Compilers: Language translation modules.
  • Completeness: Inclusion of necessary calculations and clear presentation.
  • Centralized data processing: All processing in one central location.
  • Completeness tests: Tests for missing or incomplete records.
  • Centralized database: Database housed in one central location.
  • Composite key: Combining multiple attributes for unique identification.
  • Certification authorities (CAs): Trusted parties issuing digital certificates.
  • Changed data capture: Technique capturing only changed data.
  • Computer ethics: Analysis of computer impact and its ethical use.
  • Chart of accounts: Organization's accounts with numbers and names.
  • Check digit: Control digit for data integrity.
  • Computer fraud: Theft via altering computer records or software.
  • Check register: Record of cash disbursements.
  • Check tampering: Forging or altering checks.
  • Computer numerical control (CNC): Computer-controlled manufacturing machines.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on essential terms within Information Systems. This quiz covers crucial concepts such as algorithms, access control lists, and analysis techniques. Ideal for students and professionals wanting to strengthen their understanding of information systems terminology.

More Like This

IT Security and Access Control
10 questions

IT Security and Access Control

TemptingEnlightenment4085 avatar
TemptingEnlightenment4085
Access Control Definition Quiz
12 questions
Access Control Mechanisms Quiz
104 questions
Use Quizgecko on...
Browser
Browser