Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

AIS Final

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show business process  
🗑
Hard copy or electronic forms,often used as the basis for data entry in an AIS.For the sales/collection process,they may include remittance advices and customer invoices;in the acquisition/payment process,they include purchase orders and receiving reports   show
🗑
Terms that govern when title to merchandise passes from the seller to the buyer (destination or shipping point) and who is responsible for the cost of freight (collect or prepaid)   show
🗑
show internal controls  
🗑
The common activities associated with a business process. Although the steps may vary slightly for some processes between organizations, certain common elements are nearly always present.   show
🗑
show FOB destination, freight prepaid  
🗑
The buyer takes responsibility for the goods when they arrive and pays the freight bill at the same time.   show
🗑
show FOB shipping point, freight prepaid  
🗑
show FOB shipping point, freight point  
🗑
show Customer order  
🗑
show Picking list  
🗑
show Packing list  
🗑
show Bill of lading  
🗑
show Customer check  
🗑
show Remittance advice  
🗑
To transmit cash receipts to bank Originator-Cash receipts department Recipient-Bank   show
🗑
show Electronic data interchange  
🗑
Also know as XBRL. A markup language that allows users to tag data so that they can be read by virtually any computer program on any hardware platform.   show
🗑
To request that the purchasing department order goods or services from a vendor Originator-Operating department Recipient-Purchasing department   show
🗑
show Purchase order  
🗑
show Receiving report  
🗑
show Vendor invoice  
🗑
show Check  
🗑
The process of combining raw material, labor, and overhead in the production of finished goods.   show
🗑
show Financing process  
🗑
Issuance of capital stock, purchase of treasury shares, issuance and repayment of long-term debt, and dividend distributions.   show
🗑
show Human resource process  
🗑
A production operation typically associated with unique, customized, or made-to-order goods. Examples include consulting assignments and custom-built homes.   show
🗑
The forms commonly used to process payroll transactions. Examples include Form W-4, Form W-2, payroll register, employee earnings record, Form 1099, Form 940, and Form 941.   show
🗑
show Process costing  
🗑
show Materials requisition  
🗑
show Job cost sheet  
🗑
Accumulates labor data (time, pay rate, total labor cost). Originator-Production Recipient-Accounting   show
🗑
show Production cost report  
🗑
show Materials move ticket  
🗑
Establishes payroll withholding status. Data included: employee identification data, withholding status, number of withholding allowances.   show
🗑
show Form W-2  
🗑
show Payroll register  
🗑
show Employee earnings record  
🗑
show Form 1099  
🗑
Reports employer's federal unemployment taxes. Data included: company name, amount paid.   show
🗑
Reports amounts withheld by employer to IRS. Data included: company name, employee identification data, amounts withheld.   show
🗑
show Administrative security controls  
🗑
Confidentiality availability, and data integrity are the three basic principles of information security. They are often referred to as the C-I-A triad.   show
🗑
show CoBIT accountability framework  
🗑
This(Control Objectives for Information and Related Technology) was developed by the IS Audit and Control Association (ISACA) to provide guidance for IS internal controls.   show
🗑
show CoBIT information criteria  
🗑
People who commit crimes, specifically involving information systems.   show
🗑
One of three internal control types necessary to protect data integrity in a computerized information systems.   show
🗑
Potential hazards for information systems. The development of internal controls often begins by identifying this.   show
🗑
show Taxonomy for computer crime  
🗑
show Technical security controls  
🗑
Any illegal act for which knowledge of computer technology is used to commit the offense.   show
🗑
A young, inexperienced hacker who uses tools and scripts written by others for the purpose of attacking systems.   show
🗑
show Hackers  
🗑
Hackers driven by financial gain. They possess advanced skills and have turned to hacking--not for the challenge, but for the money   show
🗑
These criminal organizations have been getting into spamming, phishing, extortion, and all other profitable branches of computer crime.   show
🗑
show Corporate spies  
🗑
As critical infrastructures become reliant on computers and networks for their operations,they could seriously disrupt power grids,telecommunications,transportation,and others if they were to exploit vulnerabilities to disrupt/shut down critical funcation   show
🗑
The threat they present is generally due to employees finding themselves in positions of extraordinary privilege in relation to the key functions and assets of their organization   show
🗑
show Confidentiality  
🗑
State that exists when data stored in an information system are the same as those in the source documents or have been correctly processed from source data and have not been exposed to accidental or malicious alteration or destruction.   show
🗑
Achieved when the required data can be obtained within the required time frame.   show
🗑
show Effectiveness  
🗑
show Efficiency  
🗑
CoBIT. Sensitive information is protected from unauthorized (sic) disclosure.   show
🗑
CoBIT. The information is accurate and complete and is in accordance with business values and expectations.   show
🗑
CoBIT. The information is available when required by the business process, now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities.   show
🗑
show Compliance  
🗑
CoBIT. Appropriate information is provided for management to operate the entity and exercise its financial and compliance reporting responsibilities.   show
🗑
show Association of Certified Fraud Examiners  
🗑
The plans an accountant makes for his/her career in the profession.   show
🗑
A professional certification demonstrating knowledge and competence in fraud examination.   show
🗑
A professional certification demonstrating knowledge and competence in management accounting.   show
🗑
A professional certification demonstrating knowledge and competence in information systems auditing.   show
🗑
show Certified Management Accountant CMA  
🗑
Professional organization that sponsors the CISA credential.   show
🗑
Professional organization that sponsors the CIA credential.   show
🗑
Professional organization that sponsors the CMA credential.   show
🗑
show Auditing  
🗑
show Auditing standards  
🗑
The responsibility of an accountant to act in the best interests of others, such as stockholders.   show
🗑
show Professional judgment  
🗑
show Yellow Book  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: AbbyP
Popular Accounting sets