Term
| Transaction Cycle that Includes Interactions between an organization and its suppliers |
|
Definition
|
|
Term
| 3 Ways Information Improves Decision Making |
|
Definition
| reduces uncertainity, provides feedback on the effectiveness of prior decisions, and identifies the situation requiring management actions |
|
|
Term
| Information about a student (name, GPa, exc) stored where? |
|
Definition
|
|
Term
| Documents used in Expenditure Cycle |
|
Definition
| purchase requisition, purchase order, receiving report |
|
|
Term
|
Definition
| records of company data sent to an external party and then returned to the system as input |
|
|
Term
| 3 ways to update a database |
|
Definition
| Batch (paper), Online Batch ( updated online periodically), Online (updates instantly) |
|
|
Term
|
Definition
| Opportunity, Rationalization, Pressure |
|
|
Term
|
Definition
|
|
Term
| How can we reduce fraud losses? |
|
Definition
|
|
Term
| These types of controls make sure that an organization's control environment is stable and well-managed |
|
Definition
|
|
Term
| These types of controls discover problems that are not prevented. |
|
Definition
|
|
Term
|
Definition
| Accept, Share, Reduce, Avoid |
|
|
Term
| Establishment of policies for employees to follow and then empower them |
|
Definition
|
|
Term
| Connects the organization's information system to the internet |
|
Definition
|
|
Term
| Screening individual IP packets based soley on the contents in the source and destination fields in the IP packet header |
|
Definition
|
|
Term
| Modifying a system to eliminate unnecessary services and features |
|
Definition
|
|
Term
| 3 best practices for protecting the privacy of customer's personal information |
|
Definition
| notice, choice and consent, and quality |
|
|
Term
| This type of encryption uses public and private key |
|
Definition
|
|
Term
| Created by hashing a document and then encrypting the hash with the signer's private key |
|
Definition
|
|
Term
| Represents the length of time that the organization is willing to attempt to function without its information system |
|
Definition
|
|
Term
| Type of control that would prevent entry of a nonexistent customer number in a sales transaction |
|
Definition
|
|
Term
|
Definition
| CERT, CISO, patch management |
|
|
Term
|
Definition
| Training, physical access, remote access, hardening, and encryption |
|
|
Term
| This type of Audit involves a review of general and application controls with a focus on determining if there is compliance with policies and adequate safeguarding of assets |
|
Definition
| Information Systems Audit |
|
|
Term
| This document identifies the person making the request, the item numbers, item description and also possibly the suggested supplier |
|
Definition
|
|
Term
| Document used to establish a contract for the purchase of goods or services from a supplier |
|
Definition
|
|
Term
| Evaluated Receipt Settlement |
|
Definition
| creates a two way matching process |
|
|
Term
| 3 Data processing integrity controls |
|
Definition
| running totals, batch totals, cross footing of the payroll register |
|
|
Term
| Control to detect the failure to prepare a paycheck for a new employee before paychecks are distributed |
|
Definition
| record counts of time cards submitted and time cards process |
|
|
Term
| Document lists the current amount and year to date totals of gross pay, deductions, and net pay for one employee |
|
Definition
|
|
Term
| Important Supporting Document to authorize the transfer of funds to the payroll bank accounts |
|
Definition
|
|
Term
| customers typically pay according to each invoice and billed for every transaction. Works well with infrequent orders and can give discounts to get money quicker |
|
Definition
|
|
Term
| Pay one big some at the end of the month. |
|
Definition
|
|
Term
| 3 Steps in Expenditure Cycle |
|
Definition
|
|
Term
|
Definition
| Order cost + carrying cost + holding cost, isn't very accurate bc demand isn't considered |
|
|
Term
| Materials Resource Planning |
|
Definition
| model uses forecasting to gauge demand. good for commodity goods. hard to forecast services. pwc ex. |
|
|
Term
|
Definition
| no holding inventory, uses actual demand to order supplies. |
|
|
Term
|
Definition
| decide whether to accept delivery |
|
|
Term
|
Definition
| compares PO# on the packing slip with the open PO File to verify goods were received |
|
|
Term
|
Definition
| bribes, conflict of interest, extortion, and illegal gratuities |
|
|
Term
| Professional Employer Organization (PEO) |
|
Definition
| HR and Payroll activiites |
|
|
Term
|
Definition
|
|
Term
|
Definition
| goal is getting employees to stay longer, delaying bonuses to the future |
|
|
Term
| 3 threats to human resource cycle |
|
Definition
| bad hires, notion of youthful indiscretion, and employment laws |
|
|
Term
| 4 components of balance scorecard |
|
Definition
| financial, customer, internal operations, and innovation and learning |
|
|
Term
|
Definition
| an event that has occurred for which the related cash flow has not yet taken place |
|
|
Term
|
Definition
| cash is received prior to event |
|
|
Term
|
Definition
| depreciation expense and bad debt expense, can't be directly attributed to a related revenue |
|
|
Term
|
Definition
| due to actual and recorded amounts |
|
|
Term
|
Definition
| lazy way of budgeting because missing opportunities |
|
|
Term
|
Definition
| derive number based on past and future, takes a long time |
|
|
Term
| 4 responsibility accounting methods |
|
Definition
| cost center, profit center, investment center, and revenue center |
|
|
Term
|
Definition
| tigger, peak, trough of disillusion, slope of enlightenment, and plateau |
|
|
Term
|
Definition
| Log analysis, intrusion detection systems, managerial reports, security testing |
|
|
Term
|
Definition
| training, user access controls, physical access, network access, device and software hardening controls |
|
|
Term
| Transmission Control Protocol |
|
Definition
| specifies procedures for dividing files an documents into packets to be sent over the internet and the methods for reassembly of the original document at the destination |
|
|
Term
|
Definition
| specifies the structure of those packets and how to route them to the proper destination |
|
|
Term
| connection to internet steps |
|
Definition
| o Internet → border router→main firewall (to the side is DMZ) → internal router→ then payroll department, sales, and inside those departments are department servers |
|
|
Term
|
Definition
| separate network that includes the wireless access point, web server, mail server, and remote access server |
|
|
Term
|
Definition
| test a numerical amount against a fixed value. Regular hours in workweek 40 hours so payroll should be less than or equal to |
|
|
Term
|
Definition
| sums a nonfinancial numeric field, such as the total of the quantity ordered filed in a batch of sales transactions |
|
|
Term
|
Definition
| -compares the ID code or account number in transaction data with similar data in the master file to verify account exists. 24 entered as sales order, computer verifies that there is that product in inventory database |
|
|
Term
| Check Digit Verification- |
|
Definition
| using the first 9 digits to calculate the 10th digit each time an ID number is entered. |
|
|
Term
| Closed Loop Verification- |
|
Definition
| checks the accuracy of input data by using it to retrieve and display other related information. |
|
|
Term
|
Definition
| -sums a field that contains monetary values, such as the total dollar amount of all sales for a batch of sales transactions |
|
|
Term
|
Definition
| risk that exists before management takes any steps to implement controls |
|
|
Term
|
Definition
| risk that exists after the controls have been applied |
|
|
Term
| How to avoid fraud- granny's tattoo parlor |
|
Definition
Training Segregation of Duties Enforcement of Internal Controls Mandatory Vacations Background Checks |
|
|
Term
|
Definition
• CEO/CFO have to sign off on financial statements to prevent fraud • Audit Committee has to be independent • Enhanced penalties- penalize fraud once caught more fines and more prison time • Establishment of PCAOB-accountants oversee other accountants • Whistleblower protection because fraud is usually caught by the employees • Enhanced disclosures |
|
|
Term
| 7 internal environment components |
|
Definition
1. Management’s Philosophy- risk appetite and it affects the organization for strategy purposes 2. Board of Directors- need to keep mgmt in check 3. Commitment to integrity and ethics 4. Organizational Structure-clear lines of authority 5. Human Resource Standards 6. Methods of assigning authority and responsibility 7. External Influences- least because can’t be controlled |
|
|
Term
|
Definition
| verify identity of the person |
|
|
Term
|
Definition
| what person is allowed to do |
|
|
Term
| 3 types of authentication |
|
Definition
1. Something you know –password. Pro easy to create. Con-could forget it or write it down so it has higher chance of being stolen 2. Something you have- security cards Pro hard to duplication Con: Stolen 3. Biometric-finger print, eye Pro: only one person has it Con: expensive |
|
|
Term
| what cycle does a company ship goods to customers? |
|
Definition
|
|
Term
| Where is total value of all inventory owned by an organization stored? |
|
Definition
| general ledger and control account is account receivable e |
|
|
Term
|
Definition
| sales journal, cash receipts, and cash disbursements |
|
|
Term
| 4 threats to accounting information systems |
|
Definition
| natural disasters, software errors, unintentional acts, intentional acts |
|
|
Term
| 3 c's of opportunity triangle |
|
Definition
| commit, conceal, and convert |
|
|
Term
|
Definition
| attitude, justification, lack of integrity |
|
|
Term
| Pressure that lead to employee fraud |
|
Definition
| financial, emotional, and lifestyle |
|
|
Term
| pressure that lead to financial statement fraud |
|
Definition
| management characteristics, industry conditions, and financial pressure |
|
|
Term
| COSO ERM 4 objectives that mgmt must meet to achieve company goals |
|
Definition
| strategic, compliance, reporting, and operations objectives |
|
|
Term
| A firewall that implements perimeter defense by examining only information in the packet header of a single IP packet in isolation is? |
|
Definition
|
|
Term
|
Definition
| text files that only store information , can't perform any actions |
|
|
Term
|
Definition
| created by basing a document and then encrypting the hash with the signer's private key |
|
|
Term
|
Definition
| measures the amount of data that might be potentially lost as a result of a systems failure |
|
|
Term
| Detect and prevent entry of alphabetic characters as the price of an inventory item |
|
Definition
|
|
Term
|
Definition
| determines whether a numeric field is positive or negative |
|
|
Term
| type of audit involves a review of gneral and application controls with a focus on determining if there is compliance with policies and adequate safeguarding of assets |
|
Definition
| information systems audit |
|
|
Term
| Concurrent audit technique that monitors all transactions and collects data on those that meet certain characteristics specified by the auditor |
|
Definition
|
|
Term
|
Definition
| postal address to which customers send their remittances, helps improve the efficiency of processing customer payments and also enhances control over payments |
|
|
Term
| Financial Electronic Data Interchange (FEDI) |
|
Definition
| solves problems by integrating the exchange of funds (EFT) with the exchange of the remittance data (EDI) |
|
|
Term
| Which revenue cycle activity can potentially be eliminated by technology |
|
Definition
|
|
Term
| For a good internal control who should approve credit memos? |
|
Definition
|
|
Term
| For a good internal control over customer remittances, the mailroom clerk should separate the checks from the remittance advices and send the customer payments to which department? |
|
Definition
|
|
Term
| Which of the following is performed in evaluated receipt settlement? |
|
Definition
| purchase order with the receiving report |
|
|
Term
| Which of the following expenditure cycle activities can be eliminated through the use of IT or reengineering |
|
Definition
| Approving Vendor Invoices |
|
|
Term
| Which document is used to record adjustments to accounts payable based on the return of unacceptable inventory to the supplier? |
|
Definition
|
|
Term
|
Definition
| lists each employee's gross pay, payroll deductions, and net pay |
|
|
Term
|
Definition
| lists the miscellaneous voluntary deductions for each employee |
|
|
Term
|
Definition
| lists the amount of gross pay, deductions, and net pay for the current period and year to date totals for each category |
|
|
Term
| Where do adjusting entries usually come from? |
|
Definition
|
|
Term
| Responsibility Accounting |
|
Definition
| preparing performance reports that contain data only about items that a specific organizational unit controls |
|
|
Term
|
Definition
| contains specific values for financial statement elements |
|
|
Term
|
Definition
| provide information concerning the source of changes to the general ledger accounts |
|
|