Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

AC 304 Exam review

QuestionAnswer
Comprehensive process of ID'ing, categorizing, prioritizing and responsing to an organization's risks enterprise risk management
Used by upper level mgmt to model data, perform simulations and sensitivity analyses decision support systems
Batch processing is most appropriate when accounts and transactions need to be recorded/updated immediately true or false false
Order the activities in batch processing from first to last business event occurs transaction file created and updated transactions are scheduled to be processed account balances/databases are updated
Software for analyzing, configuring, optimizing or maintaining a computer utility
Which of the following is NOT a category of internal risk physical
Order the four steps in enterprise risk management from first to last Risk Identification Risk Categorization Risk Prioritization Risk Response
Classification of controls based on location include all except general automated physical application automated
Significant control that ensures no single employee has end-to-end custody/control of a transaction segregation of duties
Inherent limitations of a system of internal controls cost vs benefit management override collusion human judgment human error
Objectives stipulated in COSO's Internal Control Framework compliance reporting operations
Subsytem of IS that collects, processes, and reports information related to the financial aspects of business events. Accounting Information System
The two fundamental characteristics of useful information relevance faithful representation
Relevant information has materiality confirmatory value predictive value
Faithfully represented information is error free complete neutral
Enhancing characteristics of useful information include understandability verifiability timeliness comparability
type of risk matrix that uses colors to highligt areas if concern; provides holistic view of risk heat map
An organization decides to increase insurance coverage on its sales delivery truck fleet transfer
Information represents the measurements of observations of objects and events. false
Functional components of an information system: Pick all that apply input storage output processing
Three primary types of business processes Acquisition and Payments conversion Marketing, Sales & Collections
Type of risk that is native to a business process or activity if nothing is done inherent
Segregation of duties separate which of the following incompatible functions? recording authoriszing custody
Controls can be classified based on which of the following: function/intention implmentation location
Data is facts or figures in their raw form. Represents the measurements of observations of objects and events. Lacks the context
Information is data presented in a form that it useful in decision making ( gives context to Data)
Information system consist of interrelated parts (hardware, software, databases, and networks)
Accounting information system is very similar to an Information system except for the fact that it primarily fcoues on the accounting and financial side
Relevance Predicitive value Confirmatory value materiality
Faithful representation Complete Neutral Error free
Designer: application of accounting principles, auditing principles, IS techniques, and systems development methods to design an AIS
User: accounts perform various functions within organizations that use the AIS.
Objective elavualtor: provide audit and assurance services
Consultant: advise clients on business processes. IT security and controls, acquisition / design/ implementation/ maintenance of AIS
Provider of Accounting and tax service: compilation and tax service provider
Enterprise risk management is the comprehensive process of identifying, categorizing, prioritizing , and respond to a company's risks
Different ways of responding to risk: Accept Mitigate Transfer Avoid
Accept - when the company decides to assume the risk (assumption)
Mitigate- reduced is another way to describe this and is when a company tries to compress a problem
Transfer- also known as sharing when the risk is shared among multiple parties
Avoid- when a company choose to not deal with the risk
Internal control is a process that specially mitigates risks to the company’s financial information
What are the three control characteristics Function Location Implementation
Function: Preventive- prohibits or deters a risk outcome from occurring Detective- identifies a risk outcome during or after it has occured Corrective- remidies the outcome after a risk outcome has occurred
Location: Physical- governs human activities IT General-governs entire IT environment IT application- governs a specific application
Implementation: Manual- it is done by a human Automated- it is done by a computer
What are the three categories of segregation of duties Authoriszing Recording Custody
Authorzising- busienss trancations and decisions
Recording- data about business activitie
Custody- oversee assets
Created by: user-1924923
Popular Accounting sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards