Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Document Design
|
a control plan in which a source document is designed to make it easier to prepare the document initially and later to input data from the document into a computer or other input device
|
|
Written Approvals
|
signature or initial on a document that says that somenone has authorized the event
|
|
Preformatted Screens
|
control the entry of data by defining the acceptable format of each data feild.
|
|
Online Prompting
|
request user input or ask questions that the user must answer; also context-sensitive help.
|
|
Populate the Input Screens with Master Data
|
clerk enters identification code for an entity and system retrieves data bout that entity from the master data.
|
|
Comparing Input Data with Master Data
|
comparisons performed manually or by the computer to determine the accuracy and validity of input data
|
|
Procedures for Rejected Inputs
|
ensures that erroneous data are corrected and resubmitted for processing
|
|
Programmed Edit Checks
|
automatically performed by data entry programs upon entry of the input data to highlight actual or portential input errors and allow them to be corrected quickly and efficiently (limit checks, reasonableness checks, document/record hash totals, mathematical accuracy checks, check digit)
|
|
What are the types of Programmed Edit Checks
|
Limit checks, reasonableness checks, document/record hash totals, mathematical accuracy checks, check digit
|
|
Confirm Input Acceptance
|
data entry program informs the user that the input has been accepted for processing. (confermation codes)
|
|
Automated Data Entry
|
strategy for the capture and entry of event-related data using techn ology such as OCR (Optical characteristic recognision, scantrons), bar codes, RFID (chips), and EDI
|
|
Enter Data Clsoe to the Originating Source
|
strategy fro the capture nad entry of event-related data close to the place and time that an event occurs
|
|
Digital Signatures
|
validates the identity of the sender and the integrity of an electronic message to reduce the risk that a communication was sent by an unauthorized system or user or was intercepted or modified in transit
|
|
Turnaround Documents
|
document output by the computer used to captrue and input a subsequent event
|
|
Key Verification
|
input documents are keyed by one individual ande then rekeyed by a second individual to detect keying errors.
|
|
Sequence Checks
|
applied to sequentially numbered and prenumbered documents to determine that all documents have been processed (completeness) and that no extra documents have been processed (completeness, if a duplicated document, or validity, if a bogus document)
|
|
Batch Sequence Checks
|
?
|
|
Cumulative Sequence Checks
|
proovides input control in hthose situations in which the serial numbers are assigned within the organization but are not entered in perfect serial number sequence.
|
|
Agree run to run totals
|
reconciling totals prepared before a computer process has begun to ttoals prepared at the completion of the computer process.
|
|
Tickler File
|
manual file of documents, or a computer file, that contains business event data that is pending further action
|
|
One-for-one checking
|
detailed comparison of the individual elements of two or more data sources to determine that they agree.
|
|
COSO's deffinition of internal controls
|
?
|
|
Valid
|
an information system captures only ligitimate data
|
|
Complete
|
an information system captures data once and only onece
|
|
Accurate
|
an information system captures data correctly
|