AIS Final
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | business process
🗑
|
||||
show | documents
🗑
|
||||
show | freight terms
🗑
|
||||
show | internal controls
🗑
|
||||
show | steps
🗑
|
||||
The seller pays the freight company up front, and the buyer takes responsibility for the goods when they arrive at the destination. | show 🗑
|
||||
show | FOB destination, freight collect
🗑
|
||||
show | FOB shipping point, freight prepaid
🗑
|
||||
The buyer takes responsibility for the goods at the shipping point and pays the freight company when the goods arrive. | show 🗑
|
||||
To summarize items ordered and prices Originator-Sales department Recipient-Warehouse | show 🗑
|
||||
show | Picking list
🗑
|
||||
show | Packing list
🗑
|
||||
To specify freight terms Originator-Shipping department Recipient-Common Carrier | show 🗑
|
||||
To bill client Originator-Billing department Recipient-Cash receipts department | show 🗑
|
||||
show | Remittance advice
🗑
|
||||
show | Deposit slip
🗑
|
||||
show | Electronic data interchange
🗑
|
||||
Also know as XBRL. A markup language that allows users to tag data so that they can be read by virtually any computer program on any hardware platform. | show 🗑
|
||||
To request that the purchasing department order goods or services from a vendor Originator-Operating department Recipient-Purchasing department | show 🗑
|
||||
To specify the items to be ordered, freight terms, shipping address, and other information for the vendor Originator-Purchasing department Recipient-Vendor | show 🗑
|
||||
show | Receiving report
🗑
|
||||
To request payment from a customer Originator-Vendor Recipient-Accounting department | show 🗑
|
||||
To pay the vendor Originator-Accounting department Recipient-Vendor | show 🗑
|
||||
show | Conversion process
🗑
|
||||
The process of acquiring external funding, most commonly through debt or equity. | show 🗑
|
||||
show | Financing process transactions
🗑
|
||||
Associated with personnel activities in an organization, from the time of hiring to the time discharge via retirement, termination, or quitting. | show 🗑
|
||||
A production operation typically associated with unique, customized, or made-to-order goods. Examples include consulting assignments and custom-built homes. | show 🗑
|
||||
show | Payroll forms
🗑
|
||||
A production operation typically associated with mass-produced, undifferentiated goods such as computer disks or black video tape. | show 🗑
|
||||
show | Materials requisition
🗑
|
||||
show | Job cost sheet
🗑
|
||||
show | Labor time ticket
🗑
|
||||
show | Production cost report
🗑
|
||||
show | Materials move ticket
🗑
|
||||
Establishes payroll withholding status. Data included: employee identification data, withholding status, number of withholding allowances. | show 🗑
|
||||
Reports year-end information for tax purposes. Data included: employee identification data, employer identification, gross pay and tax withholding's, 401(k) contributions. | show 🗑
|
||||
Computes payroll data for all employees for a given pay period. Data included: employee identification data, hours worked, pay rate, total gross pay, tax and benefit withholding's, net pay. | show 🗑
|
||||
show | Employee earnings record
🗑
|
||||
show | Form 1099
🗑
|
||||
show | Form 940
🗑
|
||||
show | Form 941
🗑
|
||||
show | Administrative security controls
🗑
|
||||
Confidentiality availability, and data integrity are the three basic principles of information security. They are often referred to as the C-I-A triad. | show 🗑
|
||||
The accountability framework shows the relationships between six groups of people as part of that process: stakeholders, board of directors, audit committee, IT and information security management, internal audit, and external audit. | show 🗑
|
||||
This(Control Objectives for Information and Related Technology) was developed by the IS Audit and Control Association (ISACA) to provide guidance for IS internal controls. | show 🗑
|
||||
The ideal characteristics for information. They include effectiveness, efficiency, confidentiality, integrity, availability, compliance, and reliability. | show 🗑
|
||||
People who commit crimes, specifically involving information systems. | show 🗑
|
||||
One of three internal control types necessary to protect data integrity in a computerized information systems. | show 🗑
|
||||
show | Risks and threats
🗑
|
||||
show | Taxonomy for computer crime
🗑
|
||||
show | Technical security controls
🗑
|
||||
Any illegal act for which knowledge of computer technology is used to commit the offense. | show 🗑
|
||||
show | Script kiddie
🗑
|
||||
Refers to someone who invades an information system for malicious purposes; for example, they might steal clients' Social Security numbers or change student information. | show 🗑
|
||||
show | Cyber-criminals
🗑
|
||||
show | Organized crime
🗑
|
||||
show | Corporate spies
🗑
|
||||
show | Terrorists
🗑
|
||||
The threat they present is generally due to employees finding themselves in positions of extraordinary privilege in relation to the key functions and assets of their organization | show 🗑
|
||||
Condition that exists when data are held in confidence and are protected from unauthorized disclosure. | show 🗑
|
||||
State that exists when data stored in an information system are the same as those in the source documents or have been correctly processed from source data and have not been exposed to accidental or malicious alteration or destruction. | show 🗑
|
||||
Achieved when the required data can be obtained within the required time frame. | show 🗑
|
||||
CoBIT. The information is relevant and pertinent to the business process and is delivered in a timely, correct, consistent and usable manner. | show 🗑
|
||||
CoBIT. The information is provided though the optimal (most productive and economical) use of resources. | show 🗑
|
||||
show | Confidentiality
🗑
|
||||
show | Integrity
🗑
|
||||
CoBIT. The information is available when required by the business process, now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities. | show 🗑
|
||||
CoBIT. The information complies with those laws, regulations and contractual arrangements to which the business process is subject, i.e. externally imposed business criteria. | show 🗑
|
||||
CoBIT. Appropriate information is provided for management to operate the entity and exercise its financial and compliance reporting responsibilities. | show 🗑
|
||||
show | Association of Certified Fraud Examiners
🗑
|
||||
show | Career plan
🗑
|
||||
show | Certified Fraud Examiner CFE
🗑
|
||||
show | Certified Internal Auditor CIA
🗑
|
||||
A professional certification demonstrating knowledge and competence in information systems auditing. | show 🗑
|
||||
show | Certified Management Accountant CMA
🗑
|
||||
show | Information Systems Audit and Control Association ISACA
🗑
|
||||
Professional organization that sponsors the CIA credential. | show 🗑
|
||||
show | Institute of Management Accountants IMA
🗑
|
||||
A systematic review of an organization's accounting information system, often for the purpose of expressing an opinion of the financial statements. | show 🗑
|
||||
The rules auditors use to promote integrity and consistency in the audit process. Often referred to collectively as GAAS (generally accepted auditing standards). | show 🗑
|
||||
show | Fiduciary duty
🗑
|
||||
A key element of the audit process and accounting information systems design and implementation. | show 🗑
|
||||
A document published by the Government Accountability Office (GAO) that explains the rules for conducting a compliance audit. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
AbbyP
Popular Accounting sets