Podcast
Questions and Answers
What is the process of shifting each letter in a cleartext message by a number of positions based on a key value called?
What is the process of shifting each letter in a cleartext message by a number of positions based on a key value called?
Algorithm
What is the purpose of an access control list?
What is the purpose of an access control list?
To define the access privileges for all valid users of a resource.
What are alphabetic codes?
What are alphabetic codes?
Codes that assign alphabetic characters sequentially.
What type of controls ensure that only authorized personnel have access to a firm's assets?
What type of controls ensure that only authorized personnel have access to a firm's assets?
What is an access method?
What is an access method?
What is an analytical review?
What is an analytical review?
What is the purpose of access tests?
What is the purpose of access tests?
What are anomalies in database management?
What are anomalies in database management?
What is the purpose of an AP subsidiary ledger?
What is the purpose of an AP subsidiary ledger?
What is an access token?
What is an access token?
What are application controls?
What are application controls?
What is an accounting information system (AIS)?
What is an accounting information system (AIS)?
What is an application-level firewall?
What is an application-level firewall?
What is an accounting record?
What is an accounting record?
What is an accounts payable pending file?
What is an accounts payable pending file?
What is an approved credit memo?
What is an approved credit memo?
What is an approved sales order?
What is an approved sales order?
What is the purpose of an accounts receivable (AR) subsidiary ledger?
What is the purpose of an accounts receivable (AR) subsidiary ledger?
What is an architecture description?
What is an architecture description?
What does accuracy mean in the context of information systems?
What does accuracy mean in the context of information systems?
What is an archive file?
What is an archive file?
What are accuracy tests?
What are accuracy tests?
What are activities in the context of a business?
What are activities in the context of a business?
What does asset acquisition refer to?
What does asset acquisition refer to?
What is an activity driver?
What is an activity driver?
What does asset disposal refer to?
What does asset disposal refer to?
What is activity-based costing (ABC)?
What is activity-based costing (ABC)?
What does asset maintenance refer to?
What does asset maintenance refer to?
What are ad hoc reports?
What are ad hoc reports?
What is an association in database management?
What is an association in database management?
What is the Advanced Encryption Standard (AES)?
What is the Advanced Encryption Standard (AES)?
What are assurance services?
What are assurance services?
What are agents in the context of business transactions?
What are agents in the context of business transactions?
What is an attendance file?
What is an attendance file?
What is the attest function?
What is the attest function?
What is a batch in the context of data processing?
What is a batch in the context of data processing?
What are attributes in database management?
What are attributes in database management?
What are batch control totals?
What are batch control totals?
What are audit objectives?
What are audit objectives?
What are batch controls?
What are batch controls?
What are audit procedures?
What are audit procedures?
What are batch systems?
What are batch systems?
What is audit risk?
What is audit risk?
What is a big bang implementation?
What is a big bang implementation?
What is an audit trail?
What is an audit trail?
What is a bill of lading?
What is a bill of lading?
What are audit trail controls?
What are audit trail controls?
What is a bill of materials?
What is a bill of materials?
What are billing schemes?
What are billing schemes?
Who is an auditor?
Who is an auditor?
What are biometric devices?
What are biometric devices?
What are authenticity tests?
What are authenticity tests?
What is a blind copy?
What is a blind copy?
What is authority in the context of business?
What is authority in the context of business?
What is bolt-on software?
What is bolt-on software?
What are automated storage and retrieval systems (AS/RS)?
What are automated storage and retrieval systems (AS/RS)?
What are botnets?
What are botnets?
What is bribery?
What is bribery?
What does automation mean?
What does automation mean?
What are backbone systems?
What are backbone systems?
What is a budget?
What is a budget?
What is a back-order?
What is a back-order?
What is the purpose of a budget master file?
What is the purpose of a budget master file?
What are business ethics?
What are business ethics?
What is a balanced scorecard (BSC)?
What is a balanced scorecard (BSC)?
What is the Caesar cipher?
What is the Caesar cipher?
What is a base case system evaluation (BCSE)?
What is a base case system evaluation (BCSE)?
What is a closed sales order file?
What is a closed sales order file?
What is a call-back device?
What is a call-back device?
What is a closed voucher file?
What is a closed voucher file?
What is cardinality in database management?
What is cardinality in database management?
What does cohesion mean in software development?
What does cohesion mean in software development?
What are cash disbursement vouchers?
What are cash disbursement vouchers?
What is a cold turkey cutover?
What is a cold turkey cutover?
What is a cash disbursements journal?
What is a cash disbursements journal?
What are commodity IT assets?
What are commodity IT assets?
What is cash larceny?
What is cash larceny?
What is competency analysis?
What is competency analysis?
What is a cash receipts journal?
What is a cash receipts journal?
What are compilers?
What are compilers?
What does completeness mean in the context of reports?
What does completeness mean in the context of reports?
What is centralized data processing?
What is centralized data processing?
What are completeness tests?
What are completeness tests?
What is a centralized database?
What is a centralized database?
What is a composite key?
What is a composite key?
What are certification authorities (CAs)?
What are certification authorities (CAs)?
What is changed data capture?
What is changed data capture?
What is computer ethics?
What is computer ethics?
What is a chart of accounts?
What is a chart of accounts?
What is a check digit?
What is a check digit?
What is check tampering?
What is check tampering?
What does computer numerical control (CNC) refer to?
What does computer numerical control (CNC) refer to?
Flashcards
What is an Algorithm?
What is an Algorithm?
Procedure for shifting each letter in a message by a set number of positions based on a 'key' value.
What is an Access Control List?
What is an Access Control List?
Lists that define access privileges for users of a resource like files, programs, or printers.
What are Alphabetic Codes?
What are Alphabetic Codes?
Characters assigned sequentially to represent information.
What are Access Controls?
What are Access Controls?
Signup and view all the flashcards
What are Alphanumeric Codes?
What are Alphanumeric Codes?
Signup and view all the flashcards
What are Access Methods?
What are Access Methods?
Signup and view all the flashcards
What is an Analytical Review?
What is an Analytical Review?
Signup and view all the flashcards
What are Access Tests?
What are Access Tests?
Signup and view all the flashcards
What are Anomalies?
What are Anomalies?
Signup and view all the flashcards
AP Subsidiary Ledger?
AP Subsidiary Ledger?
Signup and view all the flashcards
What is an Access Token?
What is an Access Token?
Signup and view all the flashcards
What are Application Controls?
What are Application Controls?
Signup and view all the flashcards
What are Accounting Information Systems?
What are Accounting Information Systems?
Signup and view all the flashcards
What is an Application-Level Firewall?
What is an Application-Level Firewall?
Signup and view all the flashcards
What are Accounting Records?
What are Accounting Records?
Signup and view all the flashcards
What is an Accounts Payable Pending File?
What is an Accounts Payable Pending File?
Signup and view all the flashcards
What is an Approved Credit Memo?
What is an Approved Credit Memo?
Signup and view all the flashcards
What is an Approved Sales Order?
What is an Approved Sales Order?
Signup and view all the flashcards
What is an Accounts Receivable (AR) Subsidiary Ledger?
What is an Accounts Receivable (AR) Subsidiary Ledger?
Signup and view all the flashcards
What is an Architecture Description?
What is an Architecture Description?
Signup and view all the flashcards
What is Accuracy?
What is Accuracy?
Signup and view all the flashcards
What is an Archive File?
What is an Archive File?
Signup and view all the flashcards
What are Accuracy Tests?
What are Accuracy Tests?
Signup and view all the flashcards
What are Activities?
What are Activities?
Signup and view all the flashcards
What is Asset Acquisition?
What is Asset Acquisition?
Signup and view all the flashcards
What is an Activity Driver?
What is an Activity Driver?
Signup and view all the flashcards
What is Asset Disposal?
What is Asset Disposal?
Signup and view all the flashcards
What is Activity-Based Costing (ABC)?
What is Activity-Based Costing (ABC)?
Signup and view all the flashcards
What is Asset Maintenance?
What is Asset Maintenance?
Signup and view all the flashcards
Study Notes
Key Terms in Information Systems
- Algorithm: A procedure for shifting each letter in a message by a number of positions, specified by a key.
- Access control list (ACL): Lists defining access privileges for users, controlling access to resources like files and directories.
- Alphabetic codes: Sequentially assigned alphabetic characters.
- Access controls: Controls securing firm assets, ensuring only authorized personnel access.
- Alphanumeric codes: Codes incorporating both alphabetic and numeric characters.
- Access method: Techniques for locating and navigating records in a database.
- Analytical review: Process of examining account balances for relationships or risks.
- Access tests: Tests ensuring authorized users avoid unauthorized data access.
- Anomalies: Negative operational symptoms from incorrectly normalized tables.
- AP subsidiary ledger: Record of cash disbursements exposures.
- Access token: Contains user ID, password, group, and granted privileges.
- Application controls: Controls ensuring the integrity of specific systems.
- Accounting information systems (AIS): Subset of systems processing financial transactions.
- Application-level firewall: Provides high-level network security.
- Accounting record: Transaction cycle document, journal, or ledger.
- Accounts payable pending file: Copy of the purchase requisition.
- Approved credit memo: Document where credit managers evaluate and approve customer returns.
- Approved sales order: Document reviewed by sales managers following sales order approval.
- Accounts receivable (AR) subsidiary ledger: Detailed account record for customers, including balance, credit, transaction history, and invoice details.
- Architecture description: Formal description of system structure.
- Accuracy: State of being free from material errors.
- Archive file: File containing past transactions for future reference.
- Accuracy tests: Tests ensuring system processing of data within specified tolerances.
- Activities: Work performed within a firm.
- Asset acquisition: Process of obtaining or replacing existing assets.
- Activity driver: Factor measuring activity consumption by a cost object.
- Asset disposal: Report documenting final disposition of assets.
- Activity-based costing (ABC): Technique providing information about activities and cost objects.
- Asset maintenance: Adjusting fixed asset balances due to depreciation.
- Ad hoc reports: Technology enabling direct inquiries and report generation.
- Association: Relationship between record types.
- Advanced encryption standard (AES): Symmetric key encryption technique.
- Assurance services: Professional services improving information quality.
- Agents: Individuals and departments involved in economic events.
- Attendance file: File generated by timekeeping department for approved time cards.
- Attest function: Auditor's opinion on financial statement fairness.
- Batch: Group of similar transactions processed together.
- Attributes: Descriptors of objects.
- Batch control totals: Records accompanying sales order files.
- Audit objectives: Process of creating test data.
- Batch controls: Management method for high transaction volumes.
- Audit procedures: Tests of application controls and transaction/balance details.
- Batch systems: Systems assembling transactions for processing.
- Audit risk: Probability of rendering unqualified opinions on misstated financial statements.
- Big bang: Single event conversion from legacy to a new system.
- Audit trail: Accounting records tracing transactions.
- Bill of lading: Contract between seller and shipper.
- Audit trail controls: Ensures transaction tracing to financial statements.
- Bill of materials: Document detailing raw materials and subassemblies in production.
- Audit trail test: Verification of adequate audit trail creation.
- Auditing: Independent attestation of financial statement fairness.
- Billing schemes: Employee-initiated schemes involving fraudulent invoices or payments.
- Auditor: Expert expressing opinions on financial statements.
- Biometric devices: Devices measuring personal characteristics (fingerprints, voice).
- Authenticity tests: Tests ensuring legitimate access attempts.
- Blind copy: Purchase order copy without price or quantity details.
- Authority: Right to make decisions in areas of responsibility.
- Block code: Coding ranges for attributes like account classifications.
- Bolt-on software: Third-party software integration with ERP software.
- Automated storage and retrieval systems (AS/RS): Computer-controlled conveyor systems for materials and products.
- Botnets: Collections of compromised computers.
- Bribery: Influencing officials with things of value.
- Automation: Utilizing technology to improve task efficiency.
- Backbone systems: Basic system structure for growth.
- Budget: Setting financial objectives with measurable goals.
- Back-order: Records of out-of-stock items awaiting inventory.
- Budget master file: Budgeted amounts for responsibility centers.
- Back-order file: Records of customer orders for out-of-stock items.
- Business ethics: Principles for decision-making in ethical dilemmas.
- Backup controls: Recovery of data loss through various methods.
- Balanced scorecard (BSC): Management system for strategy and action.
- Caesar cipher: Earliest encryption method.
- Base case system evaluation (BCSE): Comprehensive test data.
- Closed sales order file: Sales order records upon shipment.
- Call-back device: Security component that checks callers.
- Closed voucher file: File containing paid accounts payable items.
- Cardinality: Numerical mapping between entity instances.
- Cohesion: Amount of tasks within a module.
- Cash disbursement vouchers: Improved control over cash payments.
- Cold turkey cutover: Full system conversion on a specific date.
- Cash disbursements journal: Record of authorizing checks.
- Commodity IT assets: Easily acquired, non-unique assets.
- Cash larceny: Stealing recorded cash receipts.
- Competency analysis: Organizational effectiveness assessment.
- Cash receipts journal: Record of cash receipts transactions.
- Compilers: Language translation modules.
- Completeness: Inclusion of necessary calculations and clear presentation.
- Centralized data processing: All processing in one central location.
- Completeness tests: Tests for missing or incomplete records.
- Centralized database: Database housed in one central location.
- Composite key: Combining multiple attributes for unique identification.
- Certification authorities (CAs): Trusted parties issuing digital certificates.
- Changed data capture: Technique capturing only changed data.
- Computer ethics: Analysis of computer impact and its ethical use.
- Chart of accounts: Organization's accounts with numbers and names.
- Check digit: Control digit for data integrity.
- Computer fraud: Theft via altering computer records or software.
- Check register: Record of cash disbursements.
- Check tampering: Forging or altering checks.
- Computer numerical control (CNC): Computer-controlled manufacturing machines.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.