Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

AIS Final

        Help!  

Question
Answer
show business process  
🗑
Hard copy or electronic forms,often used as the basis for data entry in an AIS.For the sales/collection process,they may include remittance advices and customer invoices;in the acquisition/payment process,they include purchase orders and receiving reports   show
🗑
show freight terms  
🗑
show internal controls  
🗑
show steps  
🗑
show FOB destination, freight prepaid  
🗑
show FOB destination, freight collect  
🗑
The buyer takes responsibility for the goods as soon as they are loaded on the truck/train/plane. But the seller pays the freight company up front.   show
🗑
show FOB shipping point, freight point  
🗑
To summarize items ordered and prices Originator-Sales department Recipient-Warehouse   show
🗑
To guide selection of items from warehouse Originator-Warehouse Recipient-Shipping department   show
🗑
To specify contents of shipment Originator-Shipping department Recipient-Customer   show
🗑
To specify freight terms Originator-Shipping department Recipient-Common Carrier   show
🗑
show Customer check  
🗑
show Remittance advice  
🗑
To transmit cash receipts to bank Originator-Cash receipts department Recipient-Bank   show
🗑
show Electronic data interchange  
🗑
show eXtensible Business Reporting Language  
🗑
show Purchase requisition  
🗑
To specify the items to be ordered, freight terms, shipping address, and other information for the vendor Originator-Purchasing department Recipient-Vendor   show
🗑
show Receiving report  
🗑
To request payment from a customer Originator-Vendor Recipient-Accounting department   show
🗑
show Check  
🗑
show Conversion process  
🗑
The process of acquiring external funding, most commonly through debt or equity.   show
🗑
Issuance of capital stock, purchase of treasury shares, issuance and repayment of long-term debt, and dividend distributions.   show
🗑
show Human resource process  
🗑
show Job costing  
🗑
show Payroll forms  
🗑
A production operation typically associated with mass-produced, undifferentiated goods such as computer disks or black video tape.   show
🗑
show Materials requisition  
🗑
Summarizes the material, labor, and overhead costs in a job costing system. Originator-Production Recipient-Accounting   show
🗑
Accumulates labor data (time, pay rate, total labor cost). Originator-Production Recipient-Accounting   show
🗑
show Production cost report  
🗑
Documents the movement of materials from the warehouse into production. Originator-Warehouse Recipient-Production   show
🗑
Establishes payroll withholding status. Data included: employee identification data, withholding status, number of withholding allowances.   show
🗑
Reports year-end information for tax purposes. Data included: employee identification data, employer identification, gross pay and tax withholding's, 401(k) contributions.   show
🗑
Computes payroll data for all employees for a given pay period. Data included: employee identification data, hours worked, pay rate, total gross pay, tax and benefit withholding's, net pay.   show
🗑
Summarizes payroll data for a single employee for multiple pay periods. Data includes: virtually the same as the payroll register.   show
🗑
Reports amounts paid to an independent contractor (I.C.). Data included: I.C. identification data, payer's identification data, total amount paid.   show
🗑
Reports employer's federal unemployment taxes. Data included: company name, amount paid.   show
🗑
show Form 941  
🗑
show Administrative security controls  
🗑
Confidentiality availability, and data integrity are the three basic principles of information security. They are often referred to as the C-I-A triad.   show
🗑
The accountability framework shows the relationships between six groups of people as part of that process: stakeholders, board of directors, audit committee, IT and information security management, internal audit, and external audit.   show
🗑
This(Control Objectives for Information and Related Technology) was developed by the IS Audit and Control Association (ISACA) to provide guidance for IS internal controls.   show
🗑
The ideal characteristics for information. They include effectiveness, efficiency, confidentiality, integrity, availability, compliance, and reliability.   show
🗑
show Perpetrators  
🗑
show Physical security controls  
🗑
show Risks and threats  
🗑
show Taxonomy for computer crime  
🗑
One of three internal control types necessary to protect data integrity in a computerized information system.   show
🗑
Any illegal act for which knowledge of computer technology is used to commit the offense.   show
🗑
show Script kiddie  
🗑
Refers to someone who invades an information system for malicious purposes; for example, they might steal clients' Social Security numbers or change student information.   show
🗑
Hackers driven by financial gain. They possess advanced skills and have turned to hacking--not for the challenge, but for the money   show
🗑
These criminal organizations have been getting into spamming, phishing, extortion, and all other profitable branches of computer crime.   show
🗑
show Corporate spies  
🗑
As critical infrastructures become reliant on computers and networks for their operations,they could seriously disrupt power grids,telecommunications,transportation,and others if they were to exploit vulnerabilities to disrupt/shut down critical funcation   show
🗑
show Insiders  
🗑
show Confidentiality  
🗑
show Data integrity  
🗑
show Availability  
🗑
show Effectiveness  
🗑
show Efficiency  
🗑
show Confidentiality  
🗑
show Integrity  
🗑
show Availability  
🗑
show Compliance  
🗑
CoBIT. Appropriate information is provided for management to operate the entity and exercise its financial and compliance reporting responsibilities.   show
🗑
The premiere professional organization for people with an interest in forensic accounting and fraud examination.   show
🗑
show Career plan  
🗑
show Certified Fraud Examiner CFE  
🗑
A professional certification demonstrating knowledge and competence in management accounting.   show
🗑
show Certified Information Systems Auditor CISA  
🗑
show Certified Management Accountant CMA  
🗑
Professional organization that sponsors the CISA credential.   show
🗑
show Institute of Internal Auditors IIA  
🗑
Professional organization that sponsors the CMA credential.   show
🗑
A systematic review of an organization's accounting information system, often for the purpose of expressing an opinion of the financial statements.   show
🗑
The rules auditors use to promote integrity and consistency in the audit process. Often referred to collectively as GAAS (generally accepted auditing standards).   show
🗑
The responsibility of an accountant to act in the best interests of others, such as stockholders.   show
🗑
A key element of the audit process and accounting information systems design and implementation.   show
🗑
show Yellow Book  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: AbbyP
Popular Accounting sets