Term
Transaction Cycle that Includes Interactions between an organization and its suppliers |
|
Definition
|
|
Term
3 Ways Information Improves Decision Making |
|
Definition
reduces uncertainity, provides feedback on the effectiveness of prior decisions, and identifies the situation requiring management actions |
|
|
Term
Information about a student (name, GPa, exc) stored where? |
|
Definition
|
|
Term
Documents used in Expenditure Cycle |
|
Definition
purchase requisition, purchase order, receiving report |
|
|
Term
|
Definition
records of company data sent to an external party and then returned to the system as input |
|
|
Term
3 ways to update a database |
|
Definition
Batch (paper), Online Batch ( updated online periodically), Online (updates instantly) |
|
|
Term
|
Definition
Opportunity, Rationalization, Pressure |
|
|
Term
|
Definition
|
|
Term
How can we reduce fraud losses? |
|
Definition
|
|
Term
These types of controls make sure that an organization's control environment is stable and well-managed |
|
Definition
|
|
Term
These types of controls discover problems that are not prevented. |
|
Definition
|
|
Term
|
Definition
Accept, Share, Reduce, Avoid |
|
|
Term
Establishment of policies for employees to follow and then empower them |
|
Definition
|
|
Term
Connects the organization's information system to the internet |
|
Definition
|
|
Term
Screening individual IP packets based soley on the contents in the source and destination fields in the IP packet header |
|
Definition
|
|
Term
Modifying a system to eliminate unnecessary services and features |
|
Definition
|
|
Term
3 best practices for protecting the privacy of customer's personal information |
|
Definition
notice, choice and consent, and quality |
|
|
Term
This type of encryption uses public and private key |
|
Definition
|
|
Term
Created by hashing a document and then encrypting the hash with the signer's private key |
|
Definition
|
|
Term
Represents the length of time that the organization is willing to attempt to function without its information system |
|
Definition
|
|
Term
Type of control that would prevent entry of a nonexistent customer number in a sales transaction |
|
Definition
|
|
Term
|
Definition
CERT, CISO, patch management |
|
|
Term
|
Definition
Training, physical access, remote access, hardening, and encryption |
|
|
Term
This type of Audit involves a review of general and application controls with a focus on determining if there is compliance with policies and adequate safeguarding of assets |
|
Definition
Information Systems Audit |
|
|
Term
This document identifies the person making the request, the item numbers, item description and also possibly the suggested supplier |
|
Definition
|
|
Term
Document used to establish a contract for the purchase of goods or services from a supplier |
|
Definition
|
|
Term
Evaluated Receipt Settlement |
|
Definition
creates a two way matching process |
|
|
Term
3 Data processing integrity controls |
|
Definition
running totals, batch totals, cross footing of the payroll register |
|
|
Term
Control to detect the failure to prepare a paycheck for a new employee before paychecks are distributed |
|
Definition
record counts of time cards submitted and time cards process |
|
|
Term
Document lists the current amount and year to date totals of gross pay, deductions, and net pay for one employee |
|
Definition
|
|
Term
Important Supporting Document to authorize the transfer of funds to the payroll bank accounts |
|
Definition
|
|
Term
customers typically pay according to each invoice and billed for every transaction. Works well with infrequent orders and can give discounts to get money quicker |
|
Definition
|
|
Term
Pay one big some at the end of the month. |
|
Definition
|
|
Term
3 Steps in Expenditure Cycle |
|
Definition
|
|
Term
|
Definition
Order cost + carrying cost + holding cost, isn't very accurate bc demand isn't considered |
|
|
Term
Materials Resource Planning |
|
Definition
model uses forecasting to gauge demand. good for commodity goods. hard to forecast services. pwc ex. |
|
|
Term
|
Definition
no holding inventory, uses actual demand to order supplies. |
|
|
Term
|
Definition
decide whether to accept delivery |
|
|
Term
|
Definition
compares PO# on the packing slip with the open PO File to verify goods were received |
|
|
Term
|
Definition
bribes, conflict of interest, extortion, and illegal gratuities |
|
|
Term
Professional Employer Organization (PEO) |
|
Definition
HR and Payroll activiites |
|
|
Term
|
Definition
|
|
Term
|
Definition
goal is getting employees to stay longer, delaying bonuses to the future |
|
|
Term
3 threats to human resource cycle |
|
Definition
bad hires, notion of youthful indiscretion, and employment laws |
|
|
Term
4 components of balance scorecard |
|
Definition
financial, customer, internal operations, and innovation and learning |
|
|
Term
|
Definition
an event that has occurred for which the related cash flow has not yet taken place |
|
|
Term
|
Definition
cash is received prior to event |
|
|
Term
|
Definition
depreciation expense and bad debt expense, can't be directly attributed to a related revenue |
|
|
Term
|
Definition
due to actual and recorded amounts |
|
|
Term
|
Definition
lazy way of budgeting because missing opportunities |
|
|
Term
|
Definition
derive number based on past and future, takes a long time |
|
|
Term
4 responsibility accounting methods |
|
Definition
cost center, profit center, investment center, and revenue center |
|
|
Term
|
Definition
tigger, peak, trough of disillusion, slope of enlightenment, and plateau |
|
|
Term
|
Definition
Log analysis, intrusion detection systems, managerial reports, security testing |
|
|
Term
|
Definition
training, user access controls, physical access, network access, device and software hardening controls |
|
|
Term
Transmission Control Protocol |
|
Definition
specifies procedures for dividing files an documents into packets to be sent over the internet and the methods for reassembly of the original document at the destination |
|
|
Term
|
Definition
specifies the structure of those packets and how to route them to the proper destination |
|
|
Term
connection to internet steps |
|
Definition
o Internet → border router→main firewall (to the side is DMZ) → internal router→ then payroll department, sales, and inside those departments are department servers |
|
|
Term
|
Definition
separate network that includes the wireless access point, web server, mail server, and remote access server |
|
|
Term
|
Definition
test a numerical amount against a fixed value. Regular hours in workweek 40 hours so payroll should be less than or equal to |
|
|
Term
|
Definition
sums a nonfinancial numeric field, such as the total of the quantity ordered filed in a batch of sales transactions |
|
|
Term
|
Definition
-compares the ID code or account number in transaction data with similar data in the master file to verify account exists. 24 entered as sales order, computer verifies that there is that product in inventory database |
|
|
Term
Check Digit Verification- |
|
Definition
using the first 9 digits to calculate the 10th digit each time an ID number is entered. |
|
|
Term
Closed Loop Verification- |
|
Definition
checks the accuracy of input data by using it to retrieve and display other related information. |
|
|
Term
|
Definition
-sums a field that contains monetary values, such as the total dollar amount of all sales for a batch of sales transactions |
|
|
Term
|
Definition
risk that exists before management takes any steps to implement controls |
|
|
Term
|
Definition
risk that exists after the controls have been applied |
|
|
Term
How to avoid fraud- granny's tattoo parlor |
|
Definition
Training Segregation of Duties Enforcement of Internal Controls Mandatory Vacations Background Checks |
|
|
Term
|
Definition
• CEO/CFO have to sign off on financial statements to prevent fraud • Audit Committee has to be independent • Enhanced penalties- penalize fraud once caught more fines and more prison time • Establishment of PCAOB-accountants oversee other accountants • Whistleblower protection because fraud is usually caught by the employees • Enhanced disclosures |
|
|
Term
7 internal environment components |
|
Definition
1. Management’s Philosophy- risk appetite and it affects the organization for strategy purposes 2. Board of Directors- need to keep mgmt in check 3. Commitment to integrity and ethics 4. Organizational Structure-clear lines of authority 5. Human Resource Standards 6. Methods of assigning authority and responsibility 7. External Influences- least because can’t be controlled |
|
|
Term
|
Definition
verify identity of the person |
|
|
Term
|
Definition
what person is allowed to do |
|
|
Term
3 types of authentication |
|
Definition
1. Something you know –password. Pro easy to create. Con-could forget it or write it down so it has higher chance of being stolen 2. Something you have- security cards Pro hard to duplication Con: Stolen 3. Biometric-finger print, eye Pro: only one person has it Con: expensive |
|
|
Term
what cycle does a company ship goods to customers? |
|
Definition
|
|
Term
Where is total value of all inventory owned by an organization stored? |
|
Definition
general ledger and control account is account receivable e |
|
|
Term
|
Definition
sales journal, cash receipts, and cash disbursements |
|
|
Term
4 threats to accounting information systems |
|
Definition
natural disasters, software errors, unintentional acts, intentional acts |
|
|
Term
3 c's of opportunity triangle |
|
Definition
commit, conceal, and convert |
|
|
Term
|
Definition
attitude, justification, lack of integrity |
|
|
Term
Pressure that lead to employee fraud |
|
Definition
financial, emotional, and lifestyle |
|
|
Term
pressure that lead to financial statement fraud |
|
Definition
management characteristics, industry conditions, and financial pressure |
|
|
Term
COSO ERM 4 objectives that mgmt must meet to achieve company goals |
|
Definition
strategic, compliance, reporting, and operations objectives |
|
|
Term
A firewall that implements perimeter defense by examining only information in the packet header of a single IP packet in isolation is? |
|
Definition
|
|
Term
|
Definition
text files that only store information , can't perform any actions |
|
|
Term
|
Definition
created by basing a document and then encrypting the hash with the signer's private key |
|
|
Term
|
Definition
measures the amount of data that might be potentially lost as a result of a systems failure |
|
|
Term
Detect and prevent entry of alphabetic characters as the price of an inventory item |
|
Definition
|
|
Term
|
Definition
determines whether a numeric field is positive or negative |
|
|
Term
type of audit involves a review of gneral and application controls with a focus on determining if there is compliance with policies and adequate safeguarding of assets |
|
Definition
information systems audit |
|
|
Term
Concurrent audit technique that monitors all transactions and collects data on those that meet certain characteristics specified by the auditor |
|
Definition
|
|
Term
|
Definition
postal address to which customers send their remittances, helps improve the efficiency of processing customer payments and also enhances control over payments |
|
|
Term
Financial Electronic Data Interchange (FEDI) |
|
Definition
solves problems by integrating the exchange of funds (EFT) with the exchange of the remittance data (EDI) |
|
|
Term
Which revenue cycle activity can potentially be eliminated by technology |
|
Definition
|
|
Term
For a good internal control who should approve credit memos? |
|
Definition
|
|
Term
For a good internal control over customer remittances, the mailroom clerk should separate the checks from the remittance advices and send the customer payments to which department? |
|
Definition
|
|
Term
Which of the following is performed in evaluated receipt settlement? |
|
Definition
purchase order with the receiving report |
|
|
Term
Which of the following expenditure cycle activities can be eliminated through the use of IT or reengineering |
|
Definition
Approving Vendor Invoices |
|
|
Term
Which document is used to record adjustments to accounts payable based on the return of unacceptable inventory to the supplier? |
|
Definition
|
|
Term
|
Definition
lists each employee's gross pay, payroll deductions, and net pay |
|
|
Term
|
Definition
lists the miscellaneous voluntary deductions for each employee |
|
|
Term
|
Definition
lists the amount of gross pay, deductions, and net pay for the current period and year to date totals for each category |
|
|
Term
Where do adjusting entries usually come from? |
|
Definition
|
|
Term
Responsibility Accounting |
|
Definition
preparing performance reports that contain data only about items that a specific organizational unit controls |
|
|
Term
|
Definition
contains specific values for financial statement elements |
|
|
Term
|
Definition
provide information concerning the source of changes to the general ledger accounts |
|
|