AIS Final
Help!
|
|
||||
---|---|---|---|---|---|
show | business process
🗑
|
||||
Hard copy or electronic forms,often used as the basis for data entry in an AIS.For the sales/collection process,they may include remittance advices and customer invoices;in the acquisition/payment process,they include purchase orders and receiving reports | show 🗑
|
||||
show | freight terms
🗑
|
||||
show | internal controls
🗑
|
||||
show | steps
🗑
|
||||
show | FOB destination, freight prepaid
🗑
|
||||
show | FOB destination, freight collect
🗑
|
||||
The buyer takes responsibility for the goods as soon as they are loaded on the truck/train/plane. But the seller pays the freight company up front. | show 🗑
|
||||
show | FOB shipping point, freight point
🗑
|
||||
To summarize items ordered and prices Originator-Sales department Recipient-Warehouse | show 🗑
|
||||
To guide selection of items from warehouse Originator-Warehouse Recipient-Shipping department | show 🗑
|
||||
To specify contents of shipment Originator-Shipping department Recipient-Customer | show 🗑
|
||||
To specify freight terms Originator-Shipping department Recipient-Common Carrier | show 🗑
|
||||
show | Customer check
🗑
|
||||
show | Remittance advice
🗑
|
||||
To transmit cash receipts to bank Originator-Cash receipts department Recipient-Bank | show 🗑
|
||||
show | Electronic data interchange
🗑
|
||||
show | eXtensible Business Reporting Language
🗑
|
||||
show | Purchase requisition
🗑
|
||||
To specify the items to be ordered, freight terms, shipping address, and other information for the vendor Originator-Purchasing department Recipient-Vendor | show 🗑
|
||||
show | Receiving report
🗑
|
||||
To request payment from a customer Originator-Vendor Recipient-Accounting department | show 🗑
|
||||
show | Check
🗑
|
||||
show | Conversion process
🗑
|
||||
The process of acquiring external funding, most commonly through debt or equity. | show 🗑
|
||||
Issuance of capital stock, purchase of treasury shares, issuance and repayment of long-term debt, and dividend distributions. | show 🗑
|
||||
show | Human resource process
🗑
|
||||
show | Job costing
🗑
|
||||
show | Payroll forms
🗑
|
||||
A production operation typically associated with mass-produced, undifferentiated goods such as computer disks or black video tape. | show 🗑
|
||||
show | Materials requisition
🗑
|
||||
Summarizes the material, labor, and overhead costs in a job costing system. Originator-Production Recipient-Accounting | show 🗑
|
||||
Accumulates labor data (time, pay rate, total labor cost). Originator-Production Recipient-Accounting | show 🗑
|
||||
show | Production cost report
🗑
|
||||
Documents the movement of materials from the warehouse into production. Originator-Warehouse Recipient-Production | show 🗑
|
||||
Establishes payroll withholding status. Data included: employee identification data, withholding status, number of withholding allowances. | show 🗑
|
||||
Reports year-end information for tax purposes. Data included: employee identification data, employer identification, gross pay and tax withholding's, 401(k) contributions. | show 🗑
|
||||
Computes payroll data for all employees for a given pay period. Data included: employee identification data, hours worked, pay rate, total gross pay, tax and benefit withholding's, net pay. | show 🗑
|
||||
Summarizes payroll data for a single employee for multiple pay periods. Data includes: virtually the same as the payroll register. | show 🗑
|
||||
Reports amounts paid to an independent contractor (I.C.). Data included: I.C. identification data, payer's identification data, total amount paid. | show 🗑
|
||||
Reports employer's federal unemployment taxes. Data included: company name, amount paid. | show 🗑
|
||||
show | Form 941
🗑
|
||||
show | Administrative security controls
🗑
|
||||
Confidentiality availability, and data integrity are the three basic principles of information security. They are often referred to as the C-I-A triad. | show 🗑
|
||||
The accountability framework shows the relationships between six groups of people as part of that process: stakeholders, board of directors, audit committee, IT and information security management, internal audit, and external audit. | show 🗑
|
||||
This(Control Objectives for Information and Related Technology) was developed by the IS Audit and Control Association (ISACA) to provide guidance for IS internal controls. | show 🗑
|
||||
The ideal characteristics for information. They include effectiveness, efficiency, confidentiality, integrity, availability, compliance, and reliability. | show 🗑
|
||||
show | Perpetrators
🗑
|
||||
show | Physical security controls
🗑
|
||||
show | Risks and threats
🗑
|
||||
show | Taxonomy for computer crime
🗑
|
||||
One of three internal control types necessary to protect data integrity in a computerized information system. | show 🗑
|
||||
Any illegal act for which knowledge of computer technology is used to commit the offense. | show 🗑
|
||||
show | Script kiddie
🗑
|
||||
Refers to someone who invades an information system for malicious purposes; for example, they might steal clients' Social Security numbers or change student information. | show 🗑
|
||||
Hackers driven by financial gain. They possess advanced skills and have turned to hacking--not for the challenge, but for the money | show 🗑
|
||||
These criminal organizations have been getting into spamming, phishing, extortion, and all other profitable branches of computer crime. | show 🗑
|
||||
show | Corporate spies
🗑
|
||||
As critical infrastructures become reliant on computers and networks for their operations,they could seriously disrupt power grids,telecommunications,transportation,and others if they were to exploit vulnerabilities to disrupt/shut down critical funcation | show 🗑
|
||||
show | Insiders
🗑
|
||||
show | Confidentiality
🗑
|
||||
show | Data integrity
🗑
|
||||
show | Availability
🗑
|
||||
show | Effectiveness
🗑
|
||||
show | Efficiency
🗑
|
||||
show | Confidentiality
🗑
|
||||
show | Integrity
🗑
|
||||
show | Availability
🗑
|
||||
show | Compliance
🗑
|
||||
CoBIT. Appropriate information is provided for management to operate the entity and exercise its financial and compliance reporting responsibilities. | show 🗑
|
||||
The premiere professional organization for people with an interest in forensic accounting and fraud examination. | show 🗑
|
||||
show | Career plan
🗑
|
||||
show | Certified Fraud Examiner CFE
🗑
|
||||
A professional certification demonstrating knowledge and competence in management accounting. | show 🗑
|
||||
show | Certified Information Systems Auditor CISA
🗑
|
||||
show | Certified Management Accountant CMA
🗑
|
||||
Professional organization that sponsors the CISA credential. | show 🗑
|
||||
show | Institute of Internal Auditors IIA
🗑
|
||||
Professional organization that sponsors the CMA credential. | show 🗑
|
||||
A systematic review of an organization's accounting information system, often for the purpose of expressing an opinion of the financial statements. | show 🗑
|
||||
The rules auditors use to promote integrity and consistency in the audit process. Often referred to collectively as GAAS (generally accepted auditing standards). | show 🗑
|
||||
The responsibility of an accountant to act in the best interests of others, such as stockholders. | show 🗑
|
||||
A key element of the audit process and accounting information systems design and implementation. | show 🗑
|
||||
show | Yellow Book
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
AbbyP
Popular Accounting sets