Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

AIS Final

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show business process  
🗑
show documents  
🗑
show freight terms  
🗑
show internal controls  
🗑
show steps  
🗑
The seller pays the freight company up front, and the buyer takes responsibility for the goods when they arrive at the destination.   show
🗑
show FOB destination, freight collect  
🗑
show FOB shipping point, freight prepaid  
🗑
The buyer takes responsibility for the goods at the shipping point and pays the freight company when the goods arrive.   show
🗑
To summarize items ordered and prices Originator-Sales department Recipient-Warehouse   show
🗑
show Picking list  
🗑
show Packing list  
🗑
To specify freight terms Originator-Shipping department Recipient-Common Carrier   show
🗑
To bill client Originator-Billing department Recipient-Cash receipts department   show
🗑
show Remittance advice  
🗑
show Deposit slip  
🗑
show Electronic data interchange  
🗑
Also know as XBRL. A markup language that allows users to tag data so that they can be read by virtually any computer program on any hardware platform.   show
🗑
To request that the purchasing department order goods or services from a vendor Originator-Operating department Recipient-Purchasing department   show
🗑
To specify the items to be ordered, freight terms, shipping address, and other information for the vendor Originator-Purchasing department Recipient-Vendor   show
🗑
show Receiving report  
🗑
To request payment from a customer Originator-Vendor Recipient-Accounting department   show
🗑
To pay the vendor Originator-Accounting department Recipient-Vendor   show
🗑
show Conversion process  
🗑
The process of acquiring external funding, most commonly through debt or equity.   show
🗑
show Financing process transactions  
🗑
Associated with personnel activities in an organization, from the time of hiring to the time discharge via retirement, termination, or quitting.   show
🗑
A production operation typically associated with unique, customized, or made-to-order goods. Examples include consulting assignments and custom-built homes.   show
🗑
show Payroll forms  
🗑
A production operation typically associated with mass-produced, undifferentiated goods such as computer disks or black video tape.   show
🗑
show Materials requisition  
🗑
show Job cost sheet  
🗑
show Labor time ticket  
🗑
show Production cost report  
🗑
show Materials move ticket  
🗑
Establishes payroll withholding status. Data included: employee identification data, withholding status, number of withholding allowances.   show
🗑
Reports year-end information for tax purposes. Data included: employee identification data, employer identification, gross pay and tax withholding's, 401(k) contributions.   show
🗑
Computes payroll data for all employees for a given pay period. Data included: employee identification data, hours worked, pay rate, total gross pay, tax and benefit withholding's, net pay.   show
🗑
show Employee earnings record  
🗑
show Form 1099  
🗑
show Form 940  
🗑
show Form 941  
🗑
show Administrative security controls  
🗑
Confidentiality availability, and data integrity are the three basic principles of information security. They are often referred to as the C-I-A triad.   show
🗑
The accountability framework shows the relationships between six groups of people as part of that process: stakeholders, board of directors, audit committee, IT and information security management, internal audit, and external audit.   show
🗑
This(Control Objectives for Information and Related Technology) was developed by the IS Audit and Control Association (ISACA) to provide guidance for IS internal controls.   show
🗑
The ideal characteristics for information. They include effectiveness, efficiency, confidentiality, integrity, availability, compliance, and reliability.   show
🗑
People who commit crimes, specifically involving information systems.   show
🗑
One of three internal control types necessary to protect data integrity in a computerized information systems.   show
🗑
show Risks and threats  
🗑
show Taxonomy for computer crime  
🗑
show Technical security controls  
🗑
Any illegal act for which knowledge of computer technology is used to commit the offense.   show
🗑
show Script kiddie  
🗑
Refers to someone who invades an information system for malicious purposes; for example, they might steal clients' Social Security numbers or change student information.   show
🗑
show Cyber-criminals  
🗑
show Organized crime  
🗑
show Corporate spies  
🗑
show Terrorists  
🗑
The threat they present is generally due to employees finding themselves in positions of extraordinary privilege in relation to the key functions and assets of their organization   show
🗑
Condition that exists when data are held in confidence and are protected from unauthorized disclosure.   show
🗑
State that exists when data stored in an information system are the same as those in the source documents or have been correctly processed from source data and have not been exposed to accidental or malicious alteration or destruction.   show
🗑
Achieved when the required data can be obtained within the required time frame.   show
🗑
CoBIT. The information is relevant and pertinent to the business process and is delivered in a timely, correct, consistent and usable manner.   show
🗑
CoBIT. The information is provided though the optimal (most productive and economical) use of resources.   show
🗑
show Confidentiality  
🗑
show Integrity  
🗑
CoBIT. The information is available when required by the business process, now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities.   show
🗑
CoBIT. The information complies with those laws, regulations and contractual arrangements to which the business process is subject, i.e. externally imposed business criteria.   show
🗑
CoBIT. Appropriate information is provided for management to operate the entity and exercise its financial and compliance reporting responsibilities.   show
🗑
show Association of Certified Fraud Examiners  
🗑
show Career plan  
🗑
show Certified Fraud Examiner CFE  
🗑
show Certified Internal Auditor CIA  
🗑
A professional certification demonstrating knowledge and competence in information systems auditing.   show
🗑
show Certified Management Accountant CMA  
🗑
show Information Systems Audit and Control Association ISACA  
🗑
Professional organization that sponsors the CIA credential.   show
🗑
show Institute of Management Accountants IMA  
🗑
A systematic review of an organization's accounting information system, often for the purpose of expressing an opinion of the financial statements.   show
🗑
The rules auditors use to promote integrity and consistency in the audit process. Often referred to collectively as GAAS (generally accepted auditing standards).   show
🗑
show Fiduciary duty  
🗑
A key element of the audit process and accounting information systems design and implementation.   show
🗑
A document published by the Government Accountability Office (GAO) that explains the rules for conducting a compliance audit.   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: AbbyP
Popular Accounting sets