Welcome to StudyStack, where users create FlashCards and share them with others. Click on the large flashcard to flip it over. Then click the green, red, or yellow box to move the current card to that box. Below the flashcards are blue buttons for other activities that you can try to study the same information.
Test Android StudyStack App
Please help StudyStack get a grant! Vote here.
or...
Reset Password Free Sign Up

Free flashcards for serious fun studying. Create your own or use sets shared by other students and teachers.


incorrect cards (0)
correct cards (0)
remaining cards (0)
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the Correct box, the DOWN ARROW key to move the card to the Incorrect box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

Correct box contains:
Time elapsed:
Retries:
restart all cards


Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

AIS Final

QuestionAnswer
The set of steps associated with an activity; one way an organization creates value. The processes discussed in the text include sales/collection, acquisition/payment, conversion, financing, and human resources. business process
Hard copy or electronic forms,often used as the basis for data entry in an AIS.For the sales/collection process,they may include remittance advices and customer invoices;in the acquisition/payment process,they include purchase orders and receiving reports documents
Terms that govern when title to merchandise passes from the seller to the buyer (destination or shipping point) and who is responsible for the cost of freight (collect or prepaid) freight terms
One element of an AIS. Policies and procedures designed to achieve four objectives: safeguarding assets, ensuring financial statement reliability, promoting operational efficiency, and encouraging compliance w/management's directives. internal controls
The common activities associated with a business process. Although the steps may vary slightly for some processes between organizations, certain common elements are nearly always present. steps
The seller pays the freight company up front, and the buyer takes responsibility for the goods when they arrive at the destination. FOB destination, freight prepaid
The buyer takes responsibility for the goods when they arrive and pays the freight bill at the same time. FOB destination, freight collect
The buyer takes responsibility for the goods as soon as they are loaded on the truck/train/plane. But the seller pays the freight company up front. FOB shipping point, freight prepaid
The buyer takes responsibility for the goods at the shipping point and pays the freight company when the goods arrive. FOB shipping point, freight point
To summarize items ordered and prices Originator-Sales department Recipient-Warehouse Customer order
To guide selection of items from warehouse Originator-Warehouse Recipient-Shipping department Picking list
To specify contents of shipment Originator-Shipping department Recipient-Customer Packing list
To specify freight terms Originator-Shipping department Recipient-Common Carrier Bill of lading
To bill client Originator-Billing department Recipient-Cash receipts department Customer check
To provide a source document for AIS Originator-Customer Recipient-Accounting department Remittance advice
To transmit cash receipts to bank Originator-Cash receipts department Recipient-Bank Deposit slip
A protocol used to transmit data electronically between a vendor and a customer Electronic data interchange
Also know as XBRL. A markup language that allows users to tag data so that they can be read by virtually any computer program on any hardware platform. eXtensible Business Reporting Language
To request that the purchasing department order goods or services from a vendor Originator-Operating department Recipient-Purchasing department Purchase requisition
To specify the items to be ordered, freight terms, shipping address, and other information for the vendor Originator-Purchasing department Recipient-Vendor Purchase order
To ensure that goods have been ordered and received in good condition Originator-Receiving department Recipient-Various departments Receiving report
To request payment from a customer Originator-Vendor Recipient-Accounting department Vendor invoice
To pay the vendor Originator-Accounting department Recipient-Vendor Check
The process of combining raw material, labor, and overhead in the production of finished goods. Conversion process
The process of acquiring external funding, most commonly through debt or equity. Financing process
Issuance of capital stock, purchase of treasury shares, issuance and repayment of long-term debt, and dividend distributions. Financing process transactions
Associated with personnel activities in an organization, from the time of hiring to the time discharge via retirement, termination, or quitting. Human resource process
A production operation typically associated with unique, customized, or made-to-order goods. Examples include consulting assignments and custom-built homes. Job costing
The forms commonly used to process payroll transactions. Examples include Form W-4, Form W-2, payroll register, employee earnings record, Form 1099, Form 940, and Form 941. Payroll forms
A production operation typically associated with mass-produced, undifferentiated goods such as computer disks or black video tape. Process costing
Requests raw material from the warehouse for production. Originator-Production Recipient-Warehouse Materials requisition
Summarizes the material, labor, and overhead costs in a job costing system. Originator-Production Recipient-Accounting Job cost sheet
Accumulates labor data (time, pay rate, total labor cost). Originator-Production Recipient-Accounting Labor time ticket
Summarizes cost and quantity information in a process costing system. Originator-Production Recipient-Accounting Production cost report
Documents the movement of materials from the warehouse into production. Originator-Warehouse Recipient-Production Materials move ticket
Establishes payroll withholding status. Data included: employee identification data, withholding status, number of withholding allowances. Form W-4
Reports year-end information for tax purposes. Data included: employee identification data, employer identification, gross pay and tax withholding's, 401(k) contributions. Form W-2
Computes payroll data for all employees for a given pay period. Data included: employee identification data, hours worked, pay rate, total gross pay, tax and benefit withholding's, net pay. Payroll register
Summarizes payroll data for a single employee for multiple pay periods. Data includes: virtually the same as the payroll register. Employee earnings record
Reports amounts paid to an independent contractor (I.C.). Data included: I.C. identification data, payer's identification data, total amount paid. Form 1099
Reports employer's federal unemployment taxes. Data included: company name, amount paid. Form 940
Reports amounts withheld by employer to IRS. Data included: company name, employee identification data, amounts withheld. Form 941
One of three internal control types necessary to protect data integrity in a computerized information system. Administrative security controls
Confidentiality availability, and data integrity are the three basic principles of information security. They are often referred to as the C-I-A triad. Basic principles of information security
The accountability framework shows the relationships between six groups of people as part of that process: stakeholders, board of directors, audit committee, IT and information security management, internal audit, and external audit. CoBIT accountability framework
This(Control Objectives for Information and Related Technology) was developed by the IS Audit and Control Association (ISACA) to provide guidance for IS internal controls. CoBIT framework
The ideal characteristics for information. They include effectiveness, efficiency, confidentiality, integrity, availability, compliance, and reliability. CoBIT information criteria
People who commit crimes, specifically involving information systems. Perpetrators
One of three internal control types necessary to protect data integrity in a computerized information systems. Physical security controls
Potential hazards for information systems. The development of internal controls often begins by identifying this. Risks and threats
A classification system for computer crime. Carter's taxonomy has 4 parts: target, instrumentality, incidental, and associated. Taxonomy for computer crime
One of three internal control types necessary to protect data integrity in a computerized information system. Technical security controls
Any illegal act for which knowledge of computer technology is used to commit the offense. Fraud
A young, inexperienced hacker who uses tools and scripts written by others for the purpose of attacking systems. Script kiddie
Refers to someone who invades an information system for malicious purposes; for example, they might steal clients' Social Security numbers or change student information. Hackers
Hackers driven by financial gain. They possess advanced skills and have turned to hacking--not for the challenge, but for the money Cyber-criminals
These criminal organizations have been getting into spamming, phishing, extortion, and all other profitable branches of computer crime. Organized crime
Take advantage of information stored on network systems with physical access no longer required to access it by turning to computer intrusion techniques to gather the info they desire. Corporate spies
As critical infrastructures become reliant on computers and networks for their operations,they could seriously disrupt power grids,telecommunications,transportation,and others if they were to exploit vulnerabilities to disrupt/shut down critical funcation Terrorists
The threat they present is generally due to employees finding themselves in positions of extraordinary privilege in relation to the key functions and assets of their organization Insiders
Condition that exists when data are held in confidence and are protected from unauthorized disclosure. Confidentiality
State that exists when data stored in an information system are the same as those in the source documents or have been correctly processed from source data and have not been exposed to accidental or malicious alteration or destruction. Data integrity
Achieved when the required data can be obtained within the required time frame. Availability
CoBIT. The information is relevant and pertinent to the business process and is delivered in a timely, correct, consistent and usable manner. Effectiveness
CoBIT. The information is provided though the optimal (most productive and economical) use of resources. Efficiency
CoBIT. Sensitive information is protected from unauthorized (sic) disclosure. Confidentiality
CoBIT. The information is accurate and complete and is in accordance with business values and expectations. Integrity
CoBIT. The information is available when required by the business process, now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities. Availability
CoBIT. The information complies with those laws, regulations and contractual arrangements to which the business process is subject, i.e. externally imposed business criteria. Compliance
CoBIT. Appropriate information is provided for management to operate the entity and exercise its financial and compliance reporting responsibilities. Reliability of information
The premiere professional organization for people with an interest in forensic accounting and fraud examination. Association of Certified Fraud Examiners
The plans an accountant makes for his/her career in the profession. Career plan
A professional certification demonstrating knowledge and competence in fraud examination. Certified Fraud Examiner CFE
A professional certification demonstrating knowledge and competence in management accounting. Certified Internal Auditor CIA
A professional certification demonstrating knowledge and competence in information systems auditing. Certified Information Systems Auditor CISA
A professional certification demonstrating knowledge and competence in management accounting. Certified Management Accountant CMA
Professional organization that sponsors the CISA credential. Information Systems Audit and Control Association ISACA
Professional organization that sponsors the CIA credential. Institute of Internal Auditors IIA
Professional organization that sponsors the CMA credential. Institute of Management Accountants IMA
A systematic review of an organization's accounting information system, often for the purpose of expressing an opinion of the financial statements. Auditing
The rules auditors use to promote integrity and consistency in the audit process. Often referred to collectively as GAAS (generally accepted auditing standards). Auditing standards
The responsibility of an accountant to act in the best interests of others, such as stockholders. Fiduciary duty
A key element of the audit process and accounting information systems design and implementation. Professional judgment
A document published by the Government Accountability Office (GAO) that explains the rules for conducting a compliance audit. Yellow Book
Created by: Abagail Joy Phillips Abagail Joy Phillips on 2011-12-09



bad sites Copyright ©2001-2014  StudyStack LLC   All rights reserved.