How can we help?

You can also find more resources in our Help Center.

Study sets matching "accounting information chapter 8"

Study sets
Classes
Users

Study sets matching "accounting information chapter 8"

49 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
chapter 8 accounting information
Denial of service attack
Program change controls
Distributed denial-of-service attack
segregation of duties
a web-site is overwhelmed by an intentional onslaught of thou…
Provide assurance that all modifications to programs are auth…
uses many computers (zombies)
consists of separating the four basic functions of event proc…
Denial of service attack
a web-site is overwhelmed by an intentional onslaught of thou…
Program change controls
Provide assurance that all modifications to programs are auth…
34 terms
Accounting Information Systems Chapter 8
Defense-in-Depth
Time-Base Models of Security
Social Engineering
Authentication
Employing multiple layers of controls to avoid a single point…
Implementing a combination of preventive, detective and corre…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-Depth
Employing multiple layers of controls to avoid a single point…
Time-Base Models of Security
Implementing a combination of preventive, detective and corre…
39 terms
Accounting Information Systems-Chapter 8
Defense-in-depth
Time based model of security
Social engineering
Authentication
Employs multiple layers of controls in order to avoid having…
Employs a combination of detective and corrective controls th…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-depth
Employs multiple layers of controls in order to avoid having…
Time based model of security
Employs a combination of detective and corrective controls th…
49 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
34 terms
Accounting Information Systems (Chapter 8)
Defense-in-Depth
Time-Based Model of Security
Social Engineering
Authentication
employing multiple layers of controls to avoid a single point…
implementing a combination of preventive, detective and corre…
using deception to obtain unauthorized access to information…
verifying the identity of the person or device attempting to…
Defense-in-Depth
employing multiple layers of controls to avoid a single point…
Time-Based Model of Security
implementing a combination of preventive, detective and corre…
Accounting information CHapter 8 match
Situation 1: Mary and Mollie have been…
Situation 2: At Cornerstone Company, m…
Situation 3: The customer service repr…
Situation 4: The data entry clerk in t…
Biometric identification systems
Program change controls
Service level agreements
User manuals
Situation 1: Mary and Mollie have been…
Biometric identification systems
Situation 2: At Cornerstone Company, m…
Program change controls
20 terms
Accounting Information Systems: Chapter 8
aged trial balance
balance-forward processing
bill of lading
blanket order
a report that classifies outstanding customer account balance…
customer's remittances are applied against a customer's outst…
invoice received from a carrier for shipments
single order that calls for several shipments to the same cus…
aged trial balance
a report that classifies outstanding customer account balance…
balance-forward processing
customer's remittances are applied against a customer's outst…
40 terms
Accounting Information Systems Chapter 8
database
database management system (DBMS)
database system
database administrator
A set of interrelated, centrally coordinated data files that…
The program that manages and controls the data and the interf…
The database, the DBMS, and the application programs that acc…
The person responsible for coordinating, controlling, and man…
database
A set of interrelated, centrally coordinated data files that…
database management system (DBMS)
The program that manages and controls the data and the interf…
37 terms
Accounting Information Systems Chapter 8 Key Terms
Data Structure
Data Manipulation
Data Integrity
Relation
What is the first component of the relational data model?
What is the second component of the relational data model?
What is the third component of the relational data model?
A named two-dimensional table of data.
Data Structure
What is the first component of the relational data model?
Data Manipulation
What is the second component of the relational data model?
34 terms
Accounting Information Systems (Chapter 8)
Defense-in-Depth
Time-Base Models of Security
Social Engineering
Authentication
Employing multiple layers of controls to avoid a single point…
Implementing a combination of preventive, detective and corre…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-Depth
Employing multiple layers of controls to avoid a single point…
Time-Base Models of Security
Implementing a combination of preventive, detective and corre…
50 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
39 terms
Accounting Information Systems-Chapter 8
Defense-in-depth
Time based model of security
Social engineering
Authentication
Employs multiple layers of controls in order to avoid having…
Employs a combination of detective and corrective controls th…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-depth
Employs multiple layers of controls in order to avoid having…
Time based model of security
Employs a combination of detective and corrective controls th…
39 terms
Accounting Information Systems-Chapter 8
Defense-in-depth
Time based model of security
Social engineering
Authentication
Employs multiple layers of controls in order to avoid having…
Employs a combination of detective and corrective controls th…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-depth
Employs multiple layers of controls in order to avoid having…
Time based model of security
Employs a combination of detective and corrective controls th…
49 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
101 terms
Accounting Information Systems (Chapter 8)
What 5 principles does the Trust Servi…
Access (both physical and logical) to…
Sensitive organizational information i…
Personal information about customers,…
-Security... -Confidentiality... -Privacy... -Processing Integrity... -Av…
Security
Confidentiality
Privacy
What 5 principles does the Trust Servi…
-Security... -Confidentiality... -Privacy... -Processing Integrity... -Av…
Access (both physical and logical) to…
Security
80 terms
Accounting Information Systems Chapter 8
Transaction processing systems (TPS)
What are the groups that sales process…
Purchase order
Sales order
Records, summarizes and report sales transactions.
Sales processes (ordering, delivery and billing)... Sales retur…
The customer or buyer's document that records an order placed…
The seller's document when a customer or buyer places an order.
Transaction processing systems (TPS)
Records, summarizes and report sales transactions.
What are the groups that sales process…
Sales processes (ordering, delivery and billing)... Sales retur…
40 terms
Accounting Information Systems - Chapter 8
1. Security... 2. Confidentiality... 3. Priv…
1. Assess threats and select risk resp…
Defense in Depth
Time Based Model of Security
5 Principles of the Trust Services Framework
Security Life Cycle
employing multiple layers of controls to avoid a single point…
implementing a combination of preventive, detective, and corr…
1. Security... 2. Confidentiality... 3. Priv…
5 Principles of the Trust Services Framework
1. Assess threats and select risk resp…
Security Life Cycle
46 terms
Accounting Information Systems II; Chapter 8
Defense-in-depth
Time-based model of security
Social engineering
Authentication
Employing multiple layers of controls to avoid a single point…
Implementing a combination of preventive, detective, and corr…
Using deception to obtain unauthorized access to information…
Verifying the identity of the person or device attempting to…
Defense-in-depth
Employing multiple layers of controls to avoid a single point…
Time-based model of security
Implementing a combination of preventive, detective, and corr…
41 terms
Accounting Information Systems chapter 8 Definitions
Trust Services Framework IT related co…
Defense in Depth
Time based model of security
P=
1. Security... 2. Confidentiality... 3. Privacy... 4. Processing Integ…
employing multiple layers of controls to avoid a single point…
implementing a combinations of preventative detective and cor…
time it takes an attacker to break through the organizations…
Trust Services Framework IT related co…
1. Security... 2. Confidentiality... 3. Privacy... 4. Processing Integ…
Defense in Depth
employing multiple layers of controls to avoid a single point…
33 terms
Core Concepts of Accounting Information Systems Chapter 8
human resource management
payroll processing information systems
fixed asset management
enterprise asset management systems
includes the personnel function, which is responsible for hir…
although their main purpose is to pay employees for their wor…
manages the purchase, maintenance, valuation, and disposal of…
automate the management of a broad spectrum of assets
human resource management
includes the personnel function, which is responsible for hir…
payroll processing information systems
although their main purpose is to pay employees for their wor…
47 terms
Accounting Information Systems Chapter 8 - Revenue Cycle
Revenue Cycle
Accounts receivable verification
Sales order Entry
Sales Order
set of recurring business activities and related information…
Which of the following is not a basic revenue cycle activity?…
What does the revenue cycle begin with?
Usually an electronic document, created during the sale order…
Revenue Cycle
set of recurring business activities and related information…
Accounts receivable verification
Which of the following is not a basic revenue cycle activity?…
11 terms
Accounting Information Systems, Thirteenth Edition: Chapter 8: Controls for Information Security
defense-in-depth
time-base model of security
social engineering
access control matrix
Employing multiple layers of controls to avoid a single point…
Implementing a combination of preventive, detective and corre…
Using deception to obtain unauthorized access to information…
A table used to implement authorization controls
defense-in-depth
Employing multiple layers of controls to avoid a single point…
time-base model of security
Implementing a combination of preventive, detective and corre…
33 terms
Core Concepts of Accounting Information Systems Chapter 8
human resource management
payroll processing information systems
fixed asset management
enterprise asset management systems
includes the personnel function, which is responsible for hir…
although their main purpose is to pay employees for their wor…
manages the purchase, maintenance, valuation, and disposal of…
automate the management of a broad spectrum of assets
human resource management
includes the personnel function, which is responsible for hir…
payroll processing information systems
although their main purpose is to pay employees for their wor…
Chapter 8 Understanding Accounting and Financial Information
accounting
managerial accounting
certified management accountant (CMA)
financial accounting
the recording, classifying, summarizing, and interpreting of…
accounting used to provide information and analyses
a professional accountant who has met certain educational and…
accounting information and analyses prepared for people outsi…
accounting
the recording, classifying, summarizing, and interpreting of…
managerial accounting
accounting used to provide information and analyses
14 terms
Accounting Information Systems Midterm chapter 8
Feedback Value or Predictive Value
Comparability
Accuracy
Completeness
_________ improves the decision makers capacities to predict,…
The information quality that enables users to identify simila…
The correspondence or agreement between the information and t…
The degree to which information includes data about every rel…
Feedback Value or Predictive Value
_________ improves the decision makers capacities to predict,…
Comparability
The information quality that enables users to identify simila…
37 terms
Accounting Information Systems Chapter 8 Lecture
What duties need to be segregated in t…
What are the key controls in the cash…
What is proper authorization in the ca…
What is the main documents in the cash…
Mail Room from treasury department from the collections/AR de…
Segregation of Duties... Proper Authorization... Adequate documents…
Manager needs to reconcile cash receipts to deposit slips to…
Remittance Advice
What duties need to be segregated in t…
Mail Room from treasury department from the collections/AR de…
What are the key controls in the cash…
Segregation of Duties... Proper Authorization... Adequate documents…
13 terms
Accounting Chapter 8
Balance sheet section
capital
heading
Trial balance section
The ____ of the work sheet includes all permanent general led…
A net income or loss will increase or decrease the ___ account.
The _____ explains the who, what, and when of the work sheet.
The ____ of the work sheet includes all the general ledger ac…
Balance sheet section
The ____ of the work sheet includes all permanent general led…
capital
A net income or loss will increase or decrease the ___ account.
83 terms
Financial Accounting Chapter 8
Acid-test ratio
Commercial paper
Contingencies
Contingent gain
Cash, current investments, and accounts receivable divided by…
Borrowing from another company rather than from a bank
Uncertain situations that can result in a gain or a loss for…
An existing uncertain situation that might result in a gain
Acid-test ratio
Cash, current investments, and accounts receivable divided by…
Commercial paper
Borrowing from another company rather than from a bank
6 terms
Accounting Chapter 8
Accounting Cycle
Adjusting Entries
Closing Entries
Permanent Accounts
The series of accounting activities included in recording fin…
Journal entries recorded to update general ledger accounts at…
Journal entries used to prepare temporary accounts for a new…
Accounts used to accumulate information from one fiscal perio…
Accounting Cycle
The series of accounting activities included in recording fin…
Adjusting Entries
Journal entries recorded to update general ledger accounts at…
6 terms
Accounting Chapter 8
Accounting Cycle
Adjusting Entries
Closing Entries
Permanent Accounts
The series of accounting activities included in recording fin…
Journal entries recorded to update general ledger accounts at…
Journal entries used to prepare temporary accounts for a new…
Accounts used to accumulate information from one fiscal perio…
Accounting Cycle
The series of accounting activities included in recording fin…
Adjusting Entries
Journal entries recorded to update general ledger accounts at…
65 terms
Accounting Chapter 8
Capital Expenditure or Revenue Expendi…
Capital Expenditure or Revenue Expendi…
Capital Expenditure or Revenue Expendi…
Capital Expenditure or Revenue Expendi…
Capital Expenditure
Capital Expenditure
Revenue Expenditure
Capital Expenditure
Capital Expenditure or Revenue Expendi…
Capital Expenditure
Capital Expenditure or Revenue Expendi…
Capital Expenditure
21 terms
Accounting Chapter 8
Accounting Cycle
Adjusting Entries
Closing Entries
Permanent Accounts
The series of accounting activities included in recording fin…
Journal entries recorded to update general ledger accounts at…
Journal entries used to prepare temporary accounts for a new…
Accounts used to accumulate information from one fiscal perio…
Accounting Cycle
The series of accounting activities included in recording fin…
Adjusting Entries
Journal entries recorded to update general ledger accounts at…
6 terms
Accounting I - Chapter 8
accounting cycle
adjusting entries
closing entries
permanent accounts
the series of accounting activities included in recording fin…
journal entries recorded to update general ledger accounts at…
journal entries used to prepare temporary accounts for a new…
accounts used to accumulate information from one fiscal perio…
accounting cycle
the series of accounting activities included in recording fin…
adjusting entries
journal entries recorded to update general ledger accounts at…
21 terms
Accounting II- Chapter 8
Accounts receivable
Accounts receivable turnover ratio
Acid test ratio
Aging of receivables method
The right to receive cash in the future from customers for go…
A ratio that measures the number of times the company collect…
The ratio of the sum of cash plus short term investments plus…
A method of estimating uncollectible receivables by determini…
Accounts receivable
The right to receive cash in the future from customers for go…
Accounts receivable turnover ratio
A ratio that measures the number of times the company collect…
6 terms
Accounting Chapter 8
adjusting entries
permanent accounts
temporary accounts
closing entries
Journal entries recorded to update general ledger accounts at…
Accounts used to accumulate information from one fiscal perio…
Accounts used to accumulate information until it ... is transfer…
Journal entries used to prepare temporary accounts for ... a new…
adjusting entries
Journal entries recorded to update general ledger accounts at…
permanent accounts
Accounts used to accumulate information from one fiscal perio…
605 terms
Health Information Chapter 8
What do HIM functions usually involve?
What are the HIM department's most imp…
What will be used to store patient inf…
Regardless of the type of storage syst…
•HIM functions usually involve ensuring the quality, security…
•Among the HIM department's most important functions is that…
•As healthcare organizations make the transition to an electr…
Regardless of the type of storage system used, patient inform…
What do HIM functions usually involve?
•HIM functions usually involve ensuring the quality, security…
What are the HIM department's most imp…
•Among the HIM department's most important functions is that…
27 terms
Accounting Information Systems Chapter 9
Four Components of Protecting Confiden…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Software that offers the capability not only to limited acces…
Software which works likes antivirus programs in reverse, blo…
Code embedded in documents that enables an organization to id…
Four Components of Protecting Confiden…
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Information Rights Management (IRM)
Software that offers the capability not only to limited acces…
13 terms
Accounting Chapter 8 Terms
worksheet
ruling
matching principle
net income
a working paper used to collect information from the ledger a…
means "drawing a line"
principle stating that expenses are compared to revenues for…
the amount of revenue that remains after expenses for the per…
worksheet
a working paper used to collect information from the ledger a…
ruling
means "drawing a line"
10 terms
Accounting Chapter 8 Vocabulary
Accounting cycle
Audit
Audit trail
Auditor
The series of accounting activities included in recording fin…
An examination of financial records, accounts, and supporting…
A paper or electronic path that provides a documented history…
The accountant who conducts the audit.
Accounting cycle
The series of accounting activities included in recording fin…
Audit
An examination of financial records, accounts, and supporting…
106 terms
Accounting Information Systems Chapter 7
Threat/Event
Exposure/Impact
Likelihood
Internal Controls
Any potential adverse occurrence or unwanted event that could…
The potential dollar loss should a particular threat become a…
The probability that a threat will come to pass
The processes & procedures implemented to provide reasonable…
Threat/Event
Any potential adverse occurrence or unwanted event that could…
Exposure/Impact
The potential dollar loss should a particular threat become a…
83 terms
Accounting Information Systems Chapter 6
Hacking
Hijacking
Botnet
Zombie
Unauthorized access, modification, or use of an electronic de…
Gaining control of someone else's computer to carry out illic…
A network of powerful & dangerous hijacked computers that are…
A hijacked computer, typically part of a botnet, that is used…
Hacking
Unauthorized access, modification, or use of an electronic de…
Hijacking
Gaining control of someone else's computer to carry out illic…
5 terms
Accounting Chapter 8
work sheet
ruling
matching principle
net income
A working paper used to collect information from the ledger a…
Drawing a line, either single or double.
The comparison of expenses incurred and revenue earned during…
The amount of revenue that remains after expenses for the per…
work sheet
A working paper used to collect information from the ledger a…
ruling
Drawing a line, either single or double.
24 terms
Accounting Information Systems Chapter 1
System
Goal conflict
Goal congruence
Data
1. two or more interrealted components that interact to achie…
occures when a subsystem is inconsistent with the goals of an…
achieved when a subsystem achieves its goals while contributi…
facts that are collected, recorded, stored, and processed by…
System
1. two or more interrealted components that interact to achie…
Goal conflict
occures when a subsystem is inconsistent with the goals of an…
9 terms
Accounting Chapter 8
Adequate Disclosure
Total Expenses Component Percentage
Net Income Component Percentage
Current Capital (income)
When financial statements contain all necessary information t…
Total Expenses / Total Sales
Net Income / Total Sales
Beginning Capital + Net Income - Drawing
Adequate Disclosure
When financial statements contain all necessary information t…
Total Expenses Component Percentage
Total Expenses / Total Sales
Principles of Accounting Chapter 8
Bank reconciliation
Bank service charge
Bank statement
Bonding
The process of comparing the bank's balance of an account wit…
A fee charged by a bank for the use of its services.
A monthly statement from the bank that shows the depositor's…
Obtaining insurance protection against theft by employees.
Bank reconciliation
The process of comparing the bank's balance of an account wit…
Bank service charge
A fee charged by a bank for the use of its services.
35 terms
Chapter 8 Accounting
a subsidiary ledger that contains a se…
a discount offered by suppliers for pa…
the actual cost to the business of the…
an account showing transportation char…
Accounts payable ledger
Cash discount
Cost of goods sold
Freight in account
a subsidiary ledger that contains a se…
Accounts payable ledger
a discount offered by suppliers for pa…
Cash discount
20 terms
Accounting chapter 8 budgeting
master budget
budget
planning
control
an essential management tool that communicates management's p…
a detailed plan for the future that is usually expressed in f…
involves developing goals and preparing various budgets to ac…
involves gathering feedback to ensure that the plan is being…
master budget
an essential management tool that communicates management's p…
budget
a detailed plan for the future that is usually expressed in f…
5 terms
Accounting I ~ Chapter 8
matching principle
net income
net loss
ruling
Principle requiring that the expenses incurred in an accounti…
The amount by which total revenue exceeds total expenses for…
The amount by which total expenses exceed total revenue for t…
Drawing a line; a single rule (line) drawn under a column of…
matching principle
Principle requiring that the expenses incurred in an accounti…
net income
The amount by which total revenue exceeds total expenses for…
30 terms
Accounting--Chapter 8
If Revenue (Sales) is greater than Exp…
If Expenses are greater than Revenue (…
What is the purpose of the Post-Closin…
What is the entry to close Income Summ…
Net Income
Net Loss
To verify equality of debits and credits in the General Ledger
Debit: Capital... Credit: Income Summary
If Revenue (Sales) is greater than Exp…
Net Income
If Expenses are greater than Revenue (…
Net Loss
1 of 10