Study sets matching "accounting information chapter 8"

Study sets
Classes
Users

Study sets matching "accounting information chapter 8"

Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
Accounting Information Systems Chapter 8
Defense-in-Depth
Time-Base Models of Security
Social Engineering
Authentication
Employing multiple layers of controls to avoid a single point…
Implementing a combination of preventive, detective and corre…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-Depth
Employing multiple layers of controls to avoid a single point…
Time-Base Models of Security
Implementing a combination of preventive, detective and corre…
chapter 8 accounting information
Denial of service attack
Program change controls
Distributed denial-of-service attack
segregation of duties
a web-site is overwhelmed by an intentional onslaught of thou…
Provide assurance that all modifications to programs are auth…
uses many computers (zombies)
consists of separating the four basic functions of event proc…
Denial of service attack
a web-site is overwhelmed by an intentional onslaught of thou…
Program change controls
Provide assurance that all modifications to programs are auth…
80 terms
Accounting Information Systems Chapter 8
Transaction processing systems (TPS)
What are the groups that sales process…
Purchase order
Sales order
Records, summarizes and report sales transactions.
Sales processes (ordering, delivery and billing)... Sales retur…
The customer or buyer's document that records an order placed…
The seller's document when a customer or buyer places an order.
Transaction processing systems (TPS)
Records, summarizes and report sales transactions.
What are the groups that sales process…
Sales processes (ordering, delivery and billing)... Sales retur…
39 terms
Accounting Information Systems-Chapter 8
Defense-in-depth
Time based model of security
Social engineering
Authentication
Employs multiple layers of controls in order to avoid having…
Employs a combination of detective and corrective controls th…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-depth
Employs multiple layers of controls in order to avoid having…
Time based model of security
Employs a combination of detective and corrective controls th…
49 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
34 terms
Accounting Information Systems (Chapter 8)
Defense-in-Depth
Time-Based Model of Security
Social Engineering
Authentication
employing multiple layers of controls to avoid a single point…
implementing a combination of preventive, detective and corre…
using deception to obtain unauthorized access to information…
verifying the identity of the person or device attempting to…
Defense-in-Depth
employing multiple layers of controls to avoid a single point…
Time-Based Model of Security
implementing a combination of preventive, detective and corre…
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
Accounting information CHapter 8 match
Situation 1: Mary and Mollie have been…
Situation 2: At Cornerstone Company, m…
Situation 3: The customer service repr…
Situation 4: The data entry clerk in t…
Biometric identification systems
Program change controls
Service level agreements
User manuals
Situation 1: Mary and Mollie have been…
Biometric identification systems
Situation 2: At Cornerstone Company, m…
Program change controls
37 terms
Accounting Information Systems Chapter 8 Key Terms
Data Structure
Data Manipulation
Data Integrity
Relation
What is the first component of the relational data model?
What is the second component of the relational data model?
What is the third component of the relational data model?
A named two-dimensional table of data.
Data Structure
What is the first component of the relational data model?
Data Manipulation
What is the second component of the relational data model?
Accounting Information Systems-Chapter 8
Defense-in-depth
Time based model of security
Social engineering
Authentication
Employs multiple layers of controls in order to avoid having…
Employs a combination of detective and corrective controls th…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-depth
Employs multiple layers of controls in order to avoid having…
Time based model of security
Employs a combination of detective and corrective controls th…
Accounting Information Systems - Chapter 8
Authentication
biometric identifier
multifactor authentication
multimodal authentication
verifying the identity of the person or device attempting to…
a physical or behavioral characteristic that is used as an au…
the use of two or more types of authentication credentials in…
the used of multiple authentication credentials of the same t…
Authentication
verifying the identity of the person or device attempting to…
biometric identifier
a physical or behavioral characteristic that is used as an au…
Accounting Information Systems Chapter 8
database
database management system (DBMS)
database system
database administrator
A set of interrelated, centrally coordinated data files that…
The program that manages and controls the data and the interf…
The database, the DBMS, and the application programs that acc…
The person responsible for coordinating, controlling, and man…
database
A set of interrelated, centrally coordinated data files that…
database management system (DBMS)
The program that manages and controls the data and the interf…
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
101 terms
Accounting Information Systems (Chapter 8)
What 5 principles does the Trust Servi…
Access (both physical and logical) to…
Sensitive organizational information i…
Personal information about customers,…
-Security... -Confidentiality... -Privacy... -Processing Integrity... -Av…
Security
Confidentiality
Privacy
What 5 principles does the Trust Servi…
-Security... -Confidentiality... -Privacy... -Processing Integrity... -Av…
Access (both physical and logical) to…
Security
Accounting Information Systems - Chapter 8
1. Security... 2. Confidentiality... 3. Priv…
1. Assess threats and select risk resp…
Defense in Depth
Time Based Model of Security
5 Principles of the Trust Services Framework
Security Life Cycle
employing multiple layers of controls to avoid a single point…
implementing a combination of preventive, detective, and corr…
1. Security... 2. Confidentiality... 3. Priv…
5 Principles of the Trust Services Framework
1. Assess threats and select risk resp…
Security Life Cycle
46 terms
Accounting Information Systems II; Chapter 8
Defense-in-depth
Time-based model of security
Social engineering
Authentication
Employing multiple layers of controls to avoid a single point…
Implementing a combination of preventive, detective, and corr…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-depth
Employing multiple layers of controls to avoid a single point…
Time-based model of security
Implementing a combination of preventive, detective, and corr…
34 terms
Accounting Information Systems (Chapter 8)
Defense-in-Depth
Time-Base Models of Security
Social Engineering
Authentication
Employing multiple layers of controls to avoid a single point…
Implementing a combination of preventive, detective and corre…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-Depth
Employing multiple layers of controls to avoid a single point…
Time-Base Models of Security
Implementing a combination of preventive, detective and corre…
20 terms
Accounting Information Systems: Chapter 8
aged trial balance
balance-forward processing
bill of lading
blanket order
a report that classifies outstanding customer account balance…
customer's remittances are applied against a customer's outst…
invoice received from a carrier for shipments
single order that calls for several shipments to the same cus…
aged trial balance
a report that classifies outstanding customer account balance…
balance-forward processing
customer's remittances are applied against a customer's outst…
Accounting Information Systems-Chapter 8
Defense-in-depth
Time based model of security
Social engineering
Authentication
Employs multiple layers of controls in order to avoid having…
Employs a combination of detective and corrective controls th…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-depth
Employs multiple layers of controls in order to avoid having…
Time based model of security
Employs a combination of detective and corrective controls th…
41 terms
Accounting Information Systems chapter 8 Definitions
Trust Services Framework IT related co…
Defense in Depth
Time based model of security
P=
1. Security... 2. Confidentiality... 3. Privacy... 4. Processing Integ…
employing multiple layers of controls to avoid a single point…
implementing a combinations of preventative detective and cor…
time it takes an attacker to break through the organizations…
Trust Services Framework IT related co…
1. Security... 2. Confidentiality... 3. Privacy... 4. Processing Integ…
Defense in Depth
employing multiple layers of controls to avoid a single point…
37 terms
Accounting Information Systems Chapter 8 Lecture
What duties need to be segregated in t…
What are the key controls in the cash…
What is proper authorization in the ca…
What is the main documents in the cash…
Mail Room from treasury department from the collections/AR de…
Segregation of Duties... Proper Authorization... Adequate documents…
Manager needs to reconcile cash receipts to deposit slips to…
Remittance Advice
What duties need to be segregated in t…
Mail Room from treasury department from the collections/AR de…
What are the key controls in the cash…
Segregation of Duties... Proper Authorization... Adequate documents…
73 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
33 terms
Core Concepts of Accounting Information Systems Chapter 8
human resource management
payroll processing information systems
fixed asset management
enterprise asset management systems
includes the personnel function, which is responsible for hir…
although their main purpose is to pay employees for their wor…
manages the purchase, maintenance, valuation, and disposal of…
automate the management of a broad spectrum of assets
human resource management
includes the personnel function, which is responsible for hir…
payroll processing information systems
although their main purpose is to pay employees for their wor…
11 terms
Accounting Information Systems, Thirteenth Edition: Chapter 8: Controls for Information Security
defense-in-depth
time-base model of security
social engineering
access control matrix
Employing multiple layers of controls to avoid a single point…
Implementing a combination of preventive, detective and corre…
Using deception to obtain unauthorized access to information…
A table used to implement authorization controls
defense-in-depth
Employing multiple layers of controls to avoid a single point…
time-base model of security
Implementing a combination of preventive, detective and corre…
47 terms
Accounting Information Systems Chapter 8 - Revenue Cycle
Revenue Cycle
Accounts receivable verification
Sales order Entry
Sales Order
set of recurring business activities and related information…
Which of the following is not a basic revenue cycle activity?…
What does the revenue cycle begin with?
Usually an electronic document, created during the sale order…
Revenue Cycle
set of recurring business activities and related information…
Accounts receivable verification
Which of the following is not a basic revenue cycle activity?…
33 terms
Core Concepts of Accounting Information Systems Chapter 8
human resource management
payroll processing information systems
fixed asset management
enterprise asset management systems
includes the personnel function, which is responsible for hir…
although their main purpose is to pay employees for their wor…
manages the purchase, maintenance, valuation, and disposal of…
automate the management of a broad spectrum of assets
human resource management
includes the personnel function, which is responsible for hir…
payroll processing information systems
although their main purpose is to pay employees for their wor…
Chapter 8 Understanding Accounting and Financial Information
accounting
managerial accounting
certified management accountant (CMA)
financial accounting
the recording, classifying, summarizing, and interpreting of…
accounting used to provide information and analyses
a professional accountant who has met certain educational and…
accounting information and analyses prepared for people outsi…
accounting
the recording, classifying, summarizing, and interpreting of…
managerial accounting
accounting used to provide information and analyses
Accounting Information Systems Midterm chapter 8
Feedback Value or Predictive Value
Comparability
Accuracy
Completeness
_________ improves the decision makers capacities to predict,…
The information quality that enables users to identify simila…
The correspondence or agreement between the information and t…
The degree to which information includes data about every rel…
Feedback Value or Predictive Value
_________ improves the decision makers capacities to predict,…
Comparability
The information quality that enables users to identify simila…
5 terms
Accounting Chapter 8
work sheet
ruling
matching principle
net income
a working paper used to collect information from ledger accou…
a single line drawn under a column of figures to signify that…
principle stating that expenses are compared to revenues for…
amount of revenue that remains after expenses for the period…
work sheet
a working paper used to collect information from ledger accou…
ruling
a single line drawn under a column of figures to signify that…
Accounting Chapter 8
Accounting Cycle
Adjusting Entries
Closing Entries
Permanent Accounts
The series of accounting activities included in recording fin…
Journal entries recorded to update general ledger accounts at…
Journal entries used to prepare temporary accounts for a new…
Accounts used to accumulate information from one fiscal perio…
Accounting Cycle
The series of accounting activities included in recording fin…
Adjusting Entries
Journal entries recorded to update general ledger accounts at…
6 terms
Accounting Chapter 8 Vocabulary
accounting cycle
adjusting entries
closing entries
permanent accounts
the series of accounting activities included in recording fin…
journal entries recorded to update general ledger accounts at…
journal entries used to prepare temporary accounts for a new…
accounts used to accumulate information from one fiscal perio…
accounting cycle
the series of accounting activities included in recording fin…
adjusting entries
journal entries recorded to update general ledger accounts at…
Accounting Information Systems Chapter 7
Threat/Event
Exposure/Impact
Likelihood
Internal Controls
Any potential adverse occurrence or unwanted event that could…
The potential dollar loss should a particular threat become a…
The probability that a threat will come to pass
The processes & procedures implemented to provide reasonable…
Threat/Event
Any potential adverse occurrence or unwanted event that could…
Exposure/Impact
The potential dollar loss should a particular threat become a…
6 terms
Accounting Chapter 8
Accounting Cycle
Adjusting Entries
Closing Entries
Permanent Accounts
The series of accounting activities included in recording fin…
Journal entries recorded to update general ledger accounts at…
Journal entries used to prepare temporary accounts for a new…
Accounts used to accumulate information from one fiscal perio…
Accounting Cycle
The series of accounting activities included in recording fin…
Adjusting Entries
Journal entries recorded to update general ledger accounts at…
Accounting Information Systems Chapter 6
Hacking
Hijacking
Botnet
Zombie
Unauthorized access, modification, or use of an electronic de…
Gaining control of someone else's computer to carry out illic…
A network of powerful & dangerous hijacked computers that are…
A hijacked computer, typically part of a botnet, that is used…
Hacking
Unauthorized access, modification, or use of an electronic de…
Hijacking
Gaining control of someone else's computer to carry out illic…
13 terms
Accounting Chapter 8
Balance sheet section
capital
heading
Trial balance section
The ____ of the work sheet includes all permanent general led…
A net income or loss will increase or decrease the ___ account.
The _____ explains the who, what, and when of the work sheet.
The ____ of the work sheet includes all the general ledger ac…
Balance sheet section
The ____ of the work sheet includes all permanent general led…
capital
A net income or loss will increase or decrease the ___ account.
6 terms
Accounting Chapter 8
Adjusting Entries
Permanent Accounts
Temporary Accounts
Closing Entries
Journal entries recorded to update general ledger accounts at…
Accounts used to accumulate information from one fiscal perio…
Accounts used to accumulate information until its transferred…
Journal entries used to prepare temporary accounts for a new…
Adjusting Entries
Journal entries recorded to update general ledger accounts at…
Permanent Accounts
Accounts used to accumulate information from one fiscal perio…
Accounting Information Systems Chapter 9
Four Components of Protecting Confiden…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Software that offers the capability not only to limited acces…
Software which works likes antivirus programs in reverse, blo…
Code embedded in documents that enables an organization to id…
Four Components of Protecting Confiden…
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Information Rights Management (IRM)
Software that offers the capability not only to limited acces…
83 terms
Financial Accounting Chapter 8
Acid-test ratio
Commercial paper
Contingencies
Contingent gain
Cash, current investments, and accounts receivable divided by…
Borrowing from another company rather than from a bank
Uncertain situations that can result in a gain or a loss for…
An existing uncertain situation that might result in a gain
Acid-test ratio
Cash, current investments, and accounts receivable divided by…
Commercial paper
Borrowing from another company rather than from a bank
Accounting Chapter 8
Accounting Cycle
Adjusting Entries
Closing Entries
Permanent Accounts
The series of accounting activities included in recording fin…
Journal entries recorded to update general ledger accounts at…
Journal entries used to prepare temporary accounts for a new…
Accounts used to accumulate information from one fiscal perio…
Accounting Cycle
The series of accounting activities included in recording fin…
Adjusting Entries
Journal entries recorded to update general ledger accounts at…
6 terms
Accounting I - Chapter 8
accounting cycle
adjusting entries
closing entries
permanent accounts
the series of accounting activities included in recording fin…
journal entries recorded to update general ledger accounts at…
journal entries used to prepare temporary accounts for a new…
accounts used to accumulate information from one fiscal perio…
accounting cycle
the series of accounting activities included in recording fin…
adjusting entries
journal entries recorded to update general ledger accounts at…
5 terms
Accounting Chapter 8
Permanent Accounts
Temporary Accounts
Closing Entries
Post-closing trial balance
Accounts used to accumulate information from one fiscal perio…
Accounts used to accumulate information until it is transferr…
Journal entries used to prepare temporary accounts for a new…
A trail balance prepared after the closing entries are posted.
Permanent Accounts
Accounts used to accumulate information from one fiscal perio…
Temporary Accounts
Accounts used to accumulate information until it is transferr…
Accounting Chapter 8
Permanent Accounts
Temporary Accounts
Closing Entries
Post-Closing Trial Balance
Accounts used to accumulate information from one fiscal perio…
Accounts used to accumulate information until it is transferr…
Journal entries used to prepare temporary accounts for a new…
A trial balance prepared after the closing entries are posted
Permanent Accounts
Accounts used to accumulate information from one fiscal perio…
Temporary Accounts
Accounts used to accumulate information until it is transferr…
Accounting Chapter 8
permanent accounts
temporary accounts
closing entries
post-closing trial balance
accounts used to accumulate information from one fiscal year…
accounts used to accumulate information until it is transferr…
journal entries used to prepare temporary accounts for a new…
a trial balance prepared after the closing entries are posted
permanent accounts
accounts used to accumulate information from one fiscal year…
temporary accounts
accounts used to accumulate information until it is transferr…
Accounting Chapter 8
Capital Expenditure or Revenue Expendi…
Capital Expenditure or Revenue Expendi…
Capital Expenditure or Revenue Expendi…
Capital Expenditure or Revenue Expendi…
Capital Expenditure
Capital Expenditure
Revenue Expenditure
Capital Expenditure
Capital Expenditure or Revenue Expendi…
Capital Expenditure
Capital Expenditure or Revenue Expendi…
Capital Expenditure
21 terms
Accounting II- Chapter 8
Accounts receivable
Accounts receivable turnover ratio
Acid test ratio
Aging of receivables method
The right to receive cash in the future from customers for go…
A ratio that measures the number of times the company collect…
The ratio of the sum of cash plus short term investments plus…
A method of estimating uncollectible receivables by determini…
Accounts receivable
The right to receive cash in the future from customers for go…
Accounts receivable turnover ratio
A ratio that measures the number of times the company collect…
Accounting Chapter 8 Vocabulary
Accounting cycle
Audit
Audit trail
Auditor
The series of accounting activities included in recording fin…
An examination of financial records, accounts, and supporting…
A paper or electronic path that provides a documented history…
The accountant who conducts the audit.
Accounting cycle
The series of accounting activities included in recording fin…
Audit
An examination of financial records, accounts, and supporting…
13 terms
Accounting Chapter 8 Terms
worksheet
ruling
matching principle
net income
a working paper used to collect information from the ledger a…
means "drawing a line"
principle stating that expenses are compared to revenues for…
the amount of revenue that remains after expenses for the per…
worksheet
a working paper used to collect information from the ledger a…
ruling
means "drawing a line"
Accounting Chapter 8 Vocabulary
accounting cycle
adjusting entries
closing entries
permanent accounts
the series of accounting activities included in recording fin…
journal entries recorded to update general ledger accounts at…
journal entries used to prepare temporary accounts for a new…
accounts used to accumulate information from one fiscal perio…
accounting cycle
the series of accounting activities included in recording fin…
adjusting entries
journal entries recorded to update general ledger accounts at…
6 terms
Accounting Chapter 8
adjusting entries
permanent accounts
temporary accounts
closing entries
Journal entries recorded to update general ledger accounts at…
Accounts used to accumulate information from one fiscal perio…
Accounts used to accumulate information until it ... is transfer…
Journal entries used to prepare temporary accounts for ... a new…
adjusting entries
Journal entries recorded to update general ledger accounts at…
permanent accounts
Accounts used to accumulate information from one fiscal perio…
1 of 10