How can we help?

You can also find more resources in our Help Center.

Study sets matching "accounting information systems chapter 5"

Study sets
Classes
Users

Study sets matching "accounting information systems chapter 5"

22 terms
Accounting Information Systems Chapter 5 (ACCT 371)
access controls
accounts receivable
agents
application controls
limit who can use and change records in the system
monies owed by customers for prior sales of goods or services
the people or organizations who participate in business event…
ensure data integrity and an audit trail
access controls
limit who can use and change records in the system
accounts receivable
monies owed by customers for prior sales of goods or services
18 terms
Accounting Information Systems Chapter 5
Sabotage
Cookie
Fraud
Five Aspects That Must be Present for…
An intentional act where the intent is to destroy a system or…
A text file created by a website & stored on a visitor's hard…
Any and all mean a person uses to gain an unfair advantage ov…
1. A false statement, representation, or disclosure ... 2. A mat…
Sabotage
An intentional act where the intent is to destroy a system or…
Cookie
A text file created by a website & stored on a visitor's hard…
19 terms
Accounting Information Systems - Chapter 5
Frequency of Reporting
Significance of the Data
Nature of the Activity
Type of Data Reported
Significance of the Data ... Nature of the Activity... Type of Data…
Only when data are important (1) to the detection of an out-o…
Affects the behavior of related data. Some data may be expect…
Physical measures of performance are often preferred to monet…
Frequency of Reporting
Significance of the Data ... Nature of the Activity... Type of Data…
Significance of the Data
Only when data are important (1) to the detection of an out-o…
14 terms
Accounting Information Systems Chapter 5
Sabotage
Cookie
Fraud
White colla criminals
An intentional act where the intent is to destroy a system or…
A text file created by a Web site and stored on a visitor's h…
Any and all means a person uses to gain an unfair advantage o…
Typically business people who commit fraud. White collar crim…
Sabotage
An intentional act where the intent is to destroy a system or…
Cookie
A text file created by a Web site and stored on a visitor's h…
87 terms
Accounting Information Systems: Chapter 5 - Control and Accounting Information Systems
Threat/Event
Exposure/Impact
Likelihood
Internal Controls
Any potential adverse occurrence or unwanted event that could…
The potential dollar loss should a particular threat become a…
The probability that a threat will come to pass
A process, effected by an entity's board of directors, manage…
Threat/Event
Any potential adverse occurrence or unwanted event that could…
Exposure/Impact
The potential dollar loss should a particular threat become a…
12 terms
Accounting Information Systems Beginning of Chapter 5 (ACCT 371)
accounts receivable
cash
choreography
collaboration
monies owed by customers for prior sales of goods or services…
the organization's monies in bank or related accounts; the in…
the interaction (message flows) between two participants (mod…
a BPMN model showing two participant pools and the interactio…
accounts receivable
monies owed by customers for prior sales of goods or services…
cash
the organization's monies in bank or related accounts; the in…
24 terms
Chapter 5 - Documenting Accounting Information Systems
Document Flowcharts
System Flowcharts
Documentation
Object-Oriented Software
These charts describe the physical flow of documents through…
These charts focus on the electronic flows of data in compute…
Includes flowcharts, narratives, and other written communicat…
Software that contains modular, reusable code. This helps pro…
Document Flowcharts
These charts describe the physical flow of documents through…
System Flowcharts
These charts focus on the electronic flows of data in compute…
14 terms
Accounting Information Systems (Chapter 5)
Sabotage
Cookie
Fraud
White colla criminals
An intentional act where the intent is to destroy a system or…
A text file created by a Web site and stored on a visitor's h…
Any and all means a person uses to gain an unfair advantage o…
Typically business people who commit fraud. White collar crim…
Sabotage
An intentional act where the intent is to destroy a system or…
Cookie
A text file created by a Web site and stored on a visitor's h…
14 terms
Accounting Information Systems Chapter 5
Sabotage
Cookie
Fraud
White-collar Criminals
An intentional act where the intent is to destroy a system or…
A text file created by a Web site and stored on a visitor's h…
Any and all means a person uses to gain an unfair advantage o…
Business people who commit fraud (Typically)
Sabotage
An intentional act where the intent is to destroy a system or…
Cookie
A text file created by a Web site and stored on a visitor's h…
21 terms
Chapter 5 Documenting Accounting Information Systems
5 Reasons Why Documentation Is Important
4 More Reasons Why Documentation Is Im…
What are Primary Documentation Methods
Data Flow Diagrams Use
1. Depicting how the system works... 2. Training users... 3. Design…
6. Auditing AISs... 7. Documenting business processes... 8. Complyi…
Data Flow Diagrams... Document Flowcharts... System Flowcharts... Proc…
Used in systems development process... Tool for analyzing an exi…
5 Reasons Why Documentation Is Important
1. Depicting how the system works... 2. Training users... 3. Design…
4 More Reasons Why Documentation Is Im…
6. Auditing AISs... 7. Documenting business processes... 8. Complyi…
18 terms
Accounting Information Systems Chapter 5
Sabotage
Cookie
Fraud
Five Aspects That Must be Present for…
An intentional act where the intent is to destroy a system or…
A text file created by a website & stored on a visitor's hard…
Any and all mean a person uses to gain an unfair advantage ov…
1. A false statement, representation, or disclosure ... 2. A mat…
Sabotage
An intentional act where the intent is to destroy a system or…
Cookie
A text file created by a website & stored on a visitor's hard…
14 terms
Accounting Information Systems: Chapter 5 Vocabulary
Sabotage
Cookie
Fraud
White-Collar Criminals
An intentional act where the intent is to destroy a system or…
A text file created by a Web site and stored on a visitor's h…
Any and all means a person uses to gain an unfair advantage o…
Typically, business people who commit fraud. White-Collar cri…
Sabotage
An intentional act where the intent is to destroy a system or…
Cookie
A text file created by a Web site and stored on a visitor's h…
22 terms
Accounting Information Systems Chapter 5 Key Terms
Production Cycle
Bill of Materials
Operations List
Manufacturing Resource Planning (MRP-II)
A recurring set of business activities and related informatio…
One of the two outputs of the Product Design activity, a docu…
One of the two outputs of the Product Design activity, a list…
One of the two common methods of production planning, this me…
Production Cycle
A recurring set of business activities and related informatio…
Bill of Materials
One of the two outputs of the Product Design activity, a docu…
19 terms
Accounting Information Systems: Chapter 5
Benford Analysis
calibration
check laundering
check washing
data anlysis technique based on the distribute pattern of the…
process of carefully observing a suspect's behavior during in…
using a stolen customer check to make a payment on account
using chemicals to remove a check's payment details and then…
Benford Analysis
data anlysis technique based on the distribute pattern of the…
calibration
process of carefully observing a suspect's behavior during in…
14 terms
Chapter 5 Accounting Information Systems
Sabotage
Cookie
Fraud
White-Collar Criminals
An intentional act where the intent is to destroy a system or…
A text file created by a web site and stored on your hard dri…
Any and all means a person uses to gain an unfair advantage o…
Business people who commit fraud
Sabotage
An intentional act where the intent is to destroy a system or…
Cookie
A text file created by a web site and stored on your hard dri…
18 terms
Accounting Information Systems - Chapter 5
4 Types of Threats a Company Faces
Fraud
For There to be Fraud, There Must Be:
White Collar Criminals
1. Natural and Political Disasters... 2. Software Errors and Equ…
Gaining an unfair advantage using any means necessary.
1. a false statement... 2. a material fact... 3. an intent to decei…
typically business people who commit fraud
4 Types of Threats a Company Faces
1. Natural and Political Disasters... 2. Software Errors and Equ…
Fraud
Gaining an unfair advantage using any means necessary.
25 terms
Chapter 5 Control and Accounting Information Systems
internal control
preventative control
detective control
corrective control
controls within a business organization that ensure informati…
Controls that deter problems before they arise. Effective pre…
controls designed to discover control problems when they arise
procedures that remedy problems that occur
internal control
controls within a business organization that ensure informati…
preventative control
Controls that deter problems before they arise. Effective pre…
47 terms
Accounting Information Systems (Chapter 5)
What are 4 types of AIS threats a comp…
Fires, floods, earthquakes, hurricanes…
Software errors, operating system cras…
Which AIS threat is the greatest risk…
1. Natural and political disasters... 2. Software errors and equ…
Natural and Political Disasters
Software Errors and Equipment Malfunctions
Unintentional Acts
What are 4 types of AIS threats a comp…
1. Natural and political disasters... 2. Software errors and equ…
Fires, floods, earthquakes, hurricanes…
Natural and Political Disasters
24 terms
Accounting Information Systems II; Chapter 5
Sabotage
Cookie
Fraud
White-collar criminals
An international act where the intent is to destroy a system…
A text file created by a Web site and stored on a visitor's h…
Any and all means a person uses to gain an unfair advantage o…
Typically, business people who commit fraud. White-collar cri…
Sabotage
An international act where the intent is to destroy a system…
Cookie
A text file created by a Web site and stored on a visitor's h…
25 terms
Core Concepts of Accounting Information Systems Chapter 5
Which of the following is not a part o…
Which of the following is not a possib…
When using the Form Wizard in Microsof…
Clicking the ▌◄ button on the navigati…
C) A design section
C) Adding control buttons to the Title Bar of the form
C) Designing data validation tests for the form to perform da…
D) The first record
Which of the following is not a part o…
C) A design section
Which of the following is not a possib…
C) Adding control buttons to the Title Bar of the form
62 terms
Accounting Information Systems Midterm chapter 5
Application approach to business event…
Data redundancy
Database approach to business event pr…
Database management (DBMS)
Under this approach each application collects and manages its…
Data stored in multiple locations within a system
In this approach, facts about the events are stored in relati…
A set of integrated programs designed to simplify the tasks o…
Application approach to business event…
Under this approach each application collects and manages its…
Data redundancy
Data stored in multiple locations within a system
22 terms
Accounting Information Systems Chapter 5 Definitions
Cookie
Fraud
Legally for an act to be fraudulent, t…
White collar criminals
a text file created by a web site and stored in a visitor's h…
any and all means a person uses to gain an unfair advantage o…
1. a false statement representation or disclosure... 2. a materi…
typically businesspeople who commit fraud. Usually resort to…
Cookie
a text file created by a web site and stored in a visitor's h…
Fraud
any and all means a person uses to gain an unfair advantage o…
20 terms
Chapter 5 - Documenting Accounting Information Systems
Documentation
10 Reasons Documentation is important
Data Flow Diagrams (DFDs)
DFD symbols
Includes flowcharts, narratives, and other written communicat…
1. Depicting how the system works - examining written descrip…
tool used for analyzing an existing system or planning aid fo…
Rectangle = external entity (input, output)... Circle = internal…
Documentation
Includes flowcharts, narratives, and other written communicat…
10 Reasons Documentation is important
1. Depicting how the system works - examining written descrip…
30 terms
Accounting Information Systems: Chapter 5 terms
Botnet
Click Fraud
Denial of Service (DoS)
Internet Terrorism
A network of hijacked computers
Inflating advertising revenue by clicking online ads numerous…
Overloading an Internet service provider's e-mail server by s…
Using the Internet to disrupt communications and e-commerce.
Botnet
A network of hijacked computers
Click Fraud
Inflating advertising revenue by clicking online ads numerous…
14 terms
Accounting Information Systems Ch 5
Sabotage
Cookie
Fraud
White-collar Criminals
An intentional act where the intent is to destroy a system or…
A text file created by a web site and stored on a visitor's h…
Any and all means a person uses to gain an unfair advantage o…
Typically, business people who commit fraud. White-collar cri…
Sabotage
An intentional act where the intent is to destroy a system or…
Cookie
A text file created by a web site and stored on a visitor's h…
24 terms
Accounting Information Systems Chapter 1
System
Goal conflict
Goal congruence
Data
1. two or more interrealted components that interact to achie…
occures when a subsystem is inconsistent with the goals of an…
achieved when a subsystem achieves its goals while contributi…
facts that are collected, recorded, stored, and processed by…
System
1. two or more interrealted components that interact to achie…
Goal conflict
occures when a subsystem is inconsistent with the goals of an…
93 terms
ACCTG 456 Chapter 5: Control and Accounting Information Systems
Congress passed this federal law for t…
A(n) ________ helps top-level managers…
Which of the following is not one of t…
The amount of risk a company is willin…
The Sarbanes-Oxley Act of 2002
interactive control system
improving organization efficiency
risk appetite.
Congress passed this federal law for t…
The Sarbanes-Oxley Act of 2002
A(n) ________ helps top-level managers…
interactive control system
35 terms
Information Systems Chapter 5
Spyware
Adware
Phishing
Pharming
A software that secretly gathers information about users whil…
A form of spyware that collects information about the user (w…
sending fraudulent emails that seem to come from legitimate s…
Directing internet users to fraudulent web sites with the int…
Spyware
A software that secretly gathers information about users whil…
Adware
A form of spyware that collects information about the user (w…
26 terms
Information Systems Chapter 5
batch processing system
business-to-business (B2B) e-commerce
business-to-consumer (B2C) e-commerce
certificate authority (CA)
A form of data processing where business transactions are acc…
A subset of e-commerce where all the participants are organiz…
A form of e-commerce in which customers deal directly with an…
A trusted third-party organization or company that issues dig…
batch processing system
A form of data processing where business transactions are acc…
business-to-business (B2B) e-commerce
A subset of e-commerce where all the participants are organiz…
26 terms
Information Systems Chapter 5
Electronic commerce
Business-to-business e-commerce
Business-to-consumer e-commerce
Consumer-to-consumer e-commerce
Conducting business activities (e.g., distribution, buying, s…
A subset of e-commerce in which all the participants are orga…
A form of e-commerce in which customers deal directly with an…
A subset of e-commerce that involves consumers selling direct…
Electronic commerce
Conducting business activities (e.g., distribution, buying, s…
Business-to-business e-commerce
A subset of e-commerce in which all the participants are orga…
15 terms
Information Systems Chapter 5
Moore's Law
Microprocessor
Random-Access-Memory (RAM)
Volatile Memory
The phenomenon of "faster, cheaper" computing.... Chip performa…
The part of the computer that executes the instructions of a…
The fast, chip-based volatile storage in a computing device.
Storage (such as RAM chips) that is *wiped clean when power i…
Moore's Law
The phenomenon of "faster, cheaper" computing.... Chip performa…
Microprocessor
The part of the computer that executes the instructions of a…
70 terms
Accounting Information Systems Chapter 7
Threat or Event
Exposure or Impact
Likelihood
Internal Controls
Any potential adverse occurrence or unwanted event that could…
The potential dollar loss should a particular threat become a…
The probability that a threat will come to pass.
The processes and procedures implemented to provide reasonabl…
Threat or Event
Any potential adverse occurrence or unwanted event that could…
Exposure or Impact
The potential dollar loss should a particular threat become a…
Accounting Information Systems Chp 5
The purpose of the purchase requisitio…
The reason that a blind copy of the pu…
In a merchandising firm, authorization…
In the expenditure cycle, general ledg…
authorize the purchasing department to order goods.
force a count of the items delivered
inventory control
post the journal voucher from the purchasing department
The purpose of the purchase requisitio…
authorize the purchasing department to order goods.
The reason that a blind copy of the pu…
force a count of the items delivered
18 terms
Information systems- chapter 5
Cloud
Content delivery network (CDN)
Elastic
Infrastructure as a service (IaaS)
The elastic leasing of pooled computer resources over the int…
An information system that stores user data in many different…
Computing resources leased can be increased or decreased dyna…
The cloud hosting of a bare server computer or data storage
Cloud
The elastic leasing of pooled computer resources over the int…
Content delivery network (CDN)
An information system that stores user data in many different…
26 terms
Accounting Information Systems Chapter 9
Four Components of Protecting Confiden…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Software that offers the capability not only to limited acces…
Software which works likes antivirus programs in reverse, blo…
Code embedded in documents that enables an organization to id…
Four Components of Protecting Confiden…
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Information Rights Management (IRM)
Software that offers the capability not only to limited acces…
70 terms
Accounting Information Systems Chapter 7
Threat or Event
Exposure or Impact
Likelihood
Internal Controls
Any potential adverse occurrence or unwanted event that could…
The potential dollar loss should a particular threat become a…
The probability that a threat will come to pass.
The processes and procedures implemented to provide reasonabl…
Threat or Event
Any potential adverse occurrence or unwanted event that could…
Exposure or Impact
The potential dollar loss should a particular threat become a…
42 terms
Accounting Information Systems Chapter 8
Five Principles that Jointly Contribut…
Security
Confidentiality
Privacy
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Access (both physical & logical) to the system & its data is…
Sensitive organizational information (e.g., marketing plans,…
Personal information about customers, employees, suppliers, o…
Five Principles that Jointly Contribut…
1. Security ... 2. Confidentiality ... 3. Privacy ... 4. Process Integ…
Security
Access (both physical & logical) to the system & its data is…
25 terms
Accounting Information Systems Chapter 10
Turnaround Document
Header Record
Trailer Record
Transposition Error
a record of company data sent to an external party and then r…
type of internal label that appears at the beginning of each…
type of internal label that appears at the end of a file; in…
an error that results when numbers in 2 adjacent columns are…
Turnaround Document
a record of company data sent to an external party and then r…
Header Record
type of internal label that appears at the beginning of each…
18 terms
Accounting Information Systems - Test 5
General Ledge Entry for:... Record Tax De…
General Ledge Entry for:... Establish Var…
General Ledge Entry for:... Distribute Pa…
General Ledge Entry for:... Accrue Employ…
D. Fit withholding Payable... D. Sit withholding Payable... D FITA…
D. Payroll Clearing... C. Accrued Payroll... C. Fit Withholding Pay…
D. Work In Process (direct labor)... D. Manufacturing Overhead (…
D. Manufacturing Overhead... D. General and Admin Expense... D. Sel…
General Ledge Entry for:... Record Tax De…
D. Fit withholding Payable... D. Sit withholding Payable... D FITA…
General Ledge Entry for:... Establish Var…
D. Payroll Clearing... C. Accrued Payroll... C. Fit Withholding Pay…
35 terms
Managing Information Systems Chapter 5
Access Controls
Adware
Asymmetric Encryption
Availability
designed to protect systems from unauthorized access in order…
a form of spyware that collects information about the user (w…
uses two keys: a public key known to everyone and a private o…
means that computers and networks are operating, and authoriz…
Access Controls
designed to protect systems from unauthorized access in order…
Adware
a form of spyware that collects information about the user (w…
27 terms
Accounting Information Systems Chapter 9
Four Components of Protecting Confiden…
Information Rights Management (IRM)
Data Loss Prevention (DLP)
Digital Watermark
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Software that offers the capability not only to limited acces…
Software which works likes antivirus programs in reverse, blo…
Code embedded in documents that enables an organization to id…
Four Components of Protecting Confiden…
1. Identify & Classify Information ... 2. Encryption ... 3. Access…
Information Rights Management (IRM)
Software that offers the capability not only to limited acces…
83 terms
Accounting Information Systems Chapter 6
Hacking
Hijacking
Botnet
Zombie
Unauthorized access, modification, or use of an electronic de…
Gaining control of someone else's computer to carry out illic…
A network of powerful & dangerous hijacked computers that are…
A hijacked computer, typically part of a botnet, that is used…
Hacking
Unauthorized access, modification, or use of an electronic de…
Hijacking
Gaining control of someone else's computer to carry out illic…
55 terms
Chapter 5 - Interpreting Accounting Information
Management of the reporting company
Board of directors
Independent audit
SEC
decides on the appropriate format of financial statements and…
monitors managers´ compliances with reporting standards and h…
increases the credibility of the information
reviews public financial reports for compliance with legal an…
Management of the reporting company
decides on the appropriate format of financial statements and…
Board of directors
monitors managers´ compliances with reporting standards and h…
16 terms
12e Financial Accounting - Chapter 5 - Accounting Systems
accounting system
accounts payable subsidiary ledger
accounts receivable subsidiary ledger
cash payments journal
The methods and procedures used by a business to collect, cla…
The subsidiary ledger containing the individual accounts with…
The subsidiary ledger containing the individual accounts with…
The special journal in which all cash payments are recorded.
accounting system
The methods and procedures used by a business to collect, cla…
accounts payable subsidiary ledger
The subsidiary ledger containing the individual accounts with…
106 terms
Accounting Information Systems Chapter 7
Threat/Event
Exposure/Impact
Likelihood
Internal Controls
Any potential adverse occurrence or unwanted event that could…
The potential dollar loss should a particular threat become a…
The probability that a threat will come to pass
The processes & procedures implemented to provide reasonable…
Threat/Event
Any potential adverse occurrence or unwanted event that could…
Exposure/Impact
The potential dollar loss should a particular threat become a…
26 terms
Accounting Information Systems - Chapter 2
Data Processing Cycle
Source Documents
Turnaround Documents
Source Data Automation
The operations performed on data to generate meaningful and r…
Contain the initial record of a transaction that takes place.…
records of company data sent to an external party and then re…
The collection of transaction data in machine readable form a…
Data Processing Cycle
The operations performed on data to generate meaningful and r…
Source Documents
Contain the initial record of a transaction that takes place.…
56 terms
Accounting Information Systems Chapter 10
Five Type of Input Controls
Eight Types of Data Entry Controls
Three Commonly Used Batch Tools
Two Types of Additional Online Data En…
1. Forms Design ... 2. Cancellation & Storage of Source Document…
1. Field Check ... 2. Sign Check ... 3. Limit Check ... 4. Range Check…
1. Financial Total ... 2. Hash Total ... 3. Record Count
1. Prompting ... 2. Closed-Loop Verification
Five Type of Input Controls
1. Forms Design ... 2. Cancellation & Storage of Source Document…
Eight Types of Data Entry Controls
1. Field Check ... 2. Sign Check ... 3. Limit Check ... 4. Range Check…
23 terms
Accounting Information Systems chapter 1 &
Enterprise Resource Planning Systems
E-business
Internal Control
information system (IS) or management…
integrates business process functionality and information fro…
use of networks (the internet) to undertake business processes.
a system of integrated elements that provide reasonable assur…
is a manmade system that consists of an integrated set of com…
Enterprise Resource Planning Systems
integrates business process functionality and information fro…
E-business
use of networks (the internet) to undertake business processes.
52 terms
Accounting Information Systems Chapter 13
Expenditure cycle
Primary objective of expenditure cycle
4 basic expenditure cycle activities
general threat for expenditure cycle
a recurring set of business activities and related informatio…
minimize the total cost of acquiring and maintaining inventor…
1. Ordering materials, supplies, and services 2. Receiving ma…
inaccurate or invalid master data
Expenditure cycle
a recurring set of business activities and related informatio…
Primary objective of expenditure cycle
minimize the total cost of acquiring and maintaining inventor…
12 terms
Information Systems Chapter 5
business intelligence (BI)
corporate performance management (CPM)
dashboard
data mining
A broad category of applications, technologies, and processes…
The area of business intelligence involved with monitoring an…
A BI application that provides rapid access to timely informa…
The process of searching for valuable business information in…
business intelligence (BI)
A broad category of applications, technologies, and processes…
corporate performance management (CPM)
The area of business intelligence involved with monitoring an…
1 of 10