Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
182 Cards in this Set
- Front
- Back
system
|
(1) an entity consisting of two or more components or subsystems that interact to achieve a goal. (2) the equipment and programs that comprise a complete computer installation. (3) the programs and related procedures that perform a single task on a computer.
|
|
systems concept
|
changes in subsystems cannot be made without considering the effect on other subsystems and the system as a whole
|
|
goal conflict
|
occurs when a decision or action of a subsystem is inconsistent with another subsystem or the system as a whole
|
|
goal congruence
|
is achieved when a subsystem achieves its goals while contributing to the organization'a overall goal
|
|
integration
|
eliminating duplicate recording, storage, reporting, and other processing activities in an organization
|
|
data
|
facts that are collected, recorded, stored, and processed by an information system to produce information
|
|
information
|
data that have been organized and processed to provide meaning to a user; classified as mandatory, essential, or discretionary
|
|
information overload
|
the state in which additional information cannot be used efficiently and has no marginal value
|
|
value of information
|
the benefit produced by the information minus the cost of producing it
|
|
mandatory information
|
information required by a governmental entity
|
|
essential information
|
information required to conduct business with external parties
|
|
discretionary information
|
information that is available only to certain internal users
|
|
accounting information system (AIS)
|
a system that collects, records, stores, and processes data to produce information for decision makers
|
|
value chain
|
the linking together of all the primary and support activities in a business
|
|
primary activities
|
activities in the value chain that are preformed to create, market, and deliver products and services to customers and provide post-delivery service and support
|
|
support activities
|
activities in the value chain that enable the primary activities to be performed efficiently and effectively
|
|
supply chain
|
an extended system that includes an organization's value chain as well as its suppliers, distributors, and customers
|
|
structured decision
|
decisions that are repetitive, routine, and understood well enough that they can be delegated to the lower-level employees of an organization
|
|
semistructured decision
|
decisions that required subjective assessment and judgement to supplement formal data analysis
|
|
unstructured decision
|
nonrecurring and nonroutine decisions that require considerable judgement and intuition; no framework or model exists to solve such problems
|
|
operational control
|
decisions that are concerned with the efficient and effective performance of specific tasks in an organization
|
|
management control
|
activities by management designed to motivate, encourage, and assist officers and employees in achieving corporate goals and objectives as efficiently and effectively as possible
|
|
strategic planning
|
decisions that establish the organization's objectives and policies for accomplishing those objectives
|
|
product differentiation strategy
|
adding features or services not provided by competitors to a product to be able to charge customers a premium price
|
|
low-cost strategy
|
striving to be the most efficient producer of a product or service
|
|
variety-based strategic position
|
producing or providing a subset of the industry's products or services
|
|
needs-based strategic position
|
trying to serve most of all of the needs of a particular group of customers in a target market
|
|
access-based strategic position
|
a strategic position that serves a subset of customers who differ from other customers in terms of factors such as geographic location or size
|
|
synergy
|
when an entire system of organizational activities is greater than the sum of each individual part
|
|
predictive analysis
|
uses data warehouses and complex algorithms to forecast future events, based on historical trends and calculated probabilities; educated guess of what one may expect to see in the near future
|
|
transaction
|
an agreement between two entities to exchange goods or services; an exchange that can be measured in economic terms by an organization
|
|
transaction processing
|
a process that begins with capturing transaction data and ends with an informational output
|
|
give-get exchange
|
an event where two entities exchange items such as cash for goods or services
|
|
business or transaction cycle
|
a group of related business processes
|
|
transaction
|
an agreement between two entities to exchange goods or services; an exchange that can be measured in economic terms by an organization
|
|
revenue cycle
|
the recurring set of business activities and information-processing operations associated with providing goods and services to customers and collecting cash in payment for those sales
|
|
transaction processing
|
a process that begins with capturing transaction data and ends with an informational output
|
|
expenditure cycle
|
a recurring set of business activities and related data processing operations associated with the purchase of and payment for goods and services
|
|
give-get exchange
|
an event where two entities exchange items such as cash for goods or services
|
|
production cycle
|
the recurring set of business activities and related data processing operations associated with the manufacture of products
|
|
business or transaction cycle
|
a group of related business processes
|
|
human resource/payroll cycle
|
the recurring set of business activities and related data processing operations associated with effectively managing the employee workforce
|
|
revenue cycle
|
the recurring set of business activities and information-processing operations associated with providing goods and services to customers and collecting cash in payment for those sales
|
|
financing cycle
|
the business activities and related data processing operations associated with obtaining the necessary funds to run the operations, repay creditors, and distribute profits to investors
|
|
expenditure cycle
|
a recurring set of business activities and related data processing operations associated with the purchase of and payment for goods and services
|
|
production cycle
|
the recurring set of business activities and related data processing operations associated with the manufacture of products
|
|
general ledger and reporting system
|
the information-processing operations involved in updating the general ledger and preparing reports that summarize the results of the organization's activities
|
|
human resource/payroll cycle
|
the recurring set of business activities and related data processing operations associated with effectively managing the employee workforce
|
|
financing cycle
|
the business activities and related data processing operations associated with obtaining the necessary funds to run the operations, repay creditors, and distribute profits to investors
|
|
general ledger and reporting system
|
the information-processing operations involved in updating the general ledger and preparing reports that summarize the results of the organization's activities
|
|
data processing cycle
|
the operations performed on data in computer-based systems to generate meaningful and relevant information
|
|
source documents
|
contain the initial record of a transaction that takes place
|
|
turnaround documents
|
records of company data sent to an external party and then returned to the system as input
|
|
source data automation (SDA)
|
the collection of transaction data in machine-readable form at the time and place of origin
|
|
general ledger
|
contains summery-level data for every asset, liability, equity, revenue, and expense account of the organization
|
|
subsidiary ledger
|
used to record the detailed data for any general ledger account that has many individual subaccounts
|
|
control account
|
a general ledger account that summarizes the total amounts recorded in a subsidiary ledger
|
|
coding
|
(1) the systematic assignments or numbers or letters to items to classify and organize them. (2) writing program instructions that direct a computer to perform a specific data processing task
|
|
sequence code
|
documents are numbered consecutively to account for them, any gaps in the sequence indicate missing documents that should be investigated
|
|
block code
|
blocks of numbers within a numerical sequence reserved for categories having meaning to the user
|
|
group code
|
two or more subgroups of digits that are used to code an item
|
|
chart of accounts
|
a listing of all balance sheet and income statement account number codes for a particular company
|
|
general journal
|
used to record infrequent or nonroutine transactions,
|
|
specialized journal
|
journals where large numbers of repetitive transactions are recorded
|
|
audit trail
|
a traceable path of a transaction through a data processing system from point of origin (whether paper or electronic) to final output or backwards from final output to point of origin
|
|
entity
|
the item about which information is stored in a record
|
|
attribute
|
characteristics of interest in a file or database; the different individual properties of an entity
|
|
field
|
the part of a data record that contains the data value for a particular attribute
|
|
record
|
a set of logically related data items that describe specific attributes of an entity
|
|
data value
|
the actual value stored in a field
|
|
file
|
a set of logically related records
|
|
master file
|
a permanent file of records that stores cumulative information about an organization's resources and the agents with whom it interacts
|
|
transaction file
|
contain records of the individual business transactions that occur during a specific fiscal period
|
|
database
|
a set of interrelated, centrally controlled data files that are stored with as little data redundancy as possible
|
|
batch processing
|
accumulating transaction records into groups or batches for processing at some regular interval such as daily or weekly
|
|
online, real-time processing
|
the computer system processes data immediately after capture and provides updated information to the user on a timely basis
|
|
document
|
record of transaction or other company data
|
|
operational document
|
a document that is generated as an output of transaction processing activities
|
|
report
|
system output organized in a meaningful fashion
|
|
query
|
a request for specific information from a computer
|
|
budget
|
the formal expression of goals in financial terms
|
|
cash budget
|
a budget that shows projected cash inflows and outflows
|
|
performance reports
|
a report that compares standard, or expected, performances with actual performance and also shows the variance, or differences
|
|
enterprise resource planning (ERP) systems
|
a system that integrates all aspects of an organization's activities into one accounting information system
|
|
documentation
|
the narratives, flowcharts, diagrams, and other written materials that explain how a system works. It converts the who, what, when, where, why, and how of data entry, processing, storage, information output, and systems controls
|
|
narrative description
|
written, step-by-step explanation of system components and how the components interact
|
|
data flow diagram (DFD)
|
a diagram the graphically describes the flow of data within an organization. It is used to document existing systems and to plan and design new ones
|
|
data source
|
a component of a data flow diagram that represents the people and organizations that send data that the system being modeled uses or produces
|
|
data destination
|
a component of data flow diagrams that represents an entity outside of the system who receives data produced by the system
|
|
data flow
|
a component of a data flow diagram that represents data flowing into or out of a process
|
|
process
|
a set of actions, automated or manual, that transform data into other data or information
|
|
data store
|
a component of a data flow diagram that represents the storage of data within a system
|
|
context diagram
|
the highest level of a data flow diagram. It provides a summary-level view of a system. It shows the data processing system, the input(s) and output(s) of the system, and the external entities that are the sources and destinations of the system's input(s) and output(s)
|
|
flowchart
|
an analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner
|
|
flowcharting template
|
a piece of hard, flexible plastic on which the shapes of flowcharting systems have been die cut
|
|
document flowchart
|
trace a document from its cradle to its grave. They show where each document originates, its distribution, the purposes for which it is used, its ultimate disposition, and everything that happens as it flows through the system. They illustrate the flow of documents and information among areas of responsibility within an organization
|
|
internal control flowchart
|
describes and evaluates internal controls. Often used by auditors in the planning stage of an audit
|
|
system flowchart
|
a diagrammatical representation that shows the flow of data through a series of operations in an automated data processing system. It shows how data are captured and put into the system, the processes that operate on the data, and system outputs
|
|
program flowchart
|
a diagrammatical representation of the sequence of logical operations performed by a computer in executing a program. Describes the specific logic to perform a process shown on a system flowchart
|
|
database management system (DBMS)
|
the specialized computer program that manages and controls that data and interfaces between the data and the applications programs
|
|
database system
|
the combination of the database, the database management system, and the application programs that access the database through the database management system
|
|
database administrator (DBA)
|
the person responsible for coordinating, controlling, and managing the data in the database
|
|
data warehouse
|
very large databases that contain both detailed and summarized data for a number of years and that are used for analysis rather than transaction processing
|
|
data mining
|
accessing information stored in a data warehouse through statistical analysis or artificial intelligence techniques to "discover" unhypothesized relationships in the data
|
|
record layout
|
a document that illustrates the arrangement of items of data input, output, and file records
|
|
logical view
|
the manner in which a user or programmer conceptually organizes, views, and understands the relationships among data items
|
|
physical view
|
the way data are physically arranged and stored in the computer system
|
|
schema
|
a description of the types of data elements that are in the database, the relationships among the data elements, and the structure or overall logical model used to organize and describe the data
|
|
conceptual-level schema
|
the organization-wide view of the entire database. It lists all data elements in the database and the relationships between them
|
|
database management system (DBMS)
|
the specialized computer program that manages and controls that data and interfaces between the data and the applications programs
|
|
database system
|
the combination of the database, the database management system, and the application programs that access the database through the database management system
|
|
database administrator (DBA)
|
the person responsible for coordinating, controlling, and managing the data in the database
|
|
data warehouse
|
very large databases that contain both detailed and summarized data for a number of years and that are used for analysis rather than transaction processing
|
|
data mining
|
accessing information stored in a data warehouse through statistical analysis or artificial intelligence techniques to "discover" unhypothesized relationships in the data
|
|
record layout
|
a document that illustrates the arrangement of items of data input, output, and file records
|
|
logical view
|
the manner in which a user or programmer conceptually organizes, views, and understands the relationships among data items
|
|
physical view
|
the way data are physically arranged and stored in the computer system
|
|
schema
|
a description of the types of data elements that are in the database, the relationships among the data elements, and the structure or overall logical model used to organize and describe the data
|
|
conceptual-level schema
|
the organization-wide view of the entire database. It lists all data elements in the database and the relationships between them
|
|
external-level schema
|
an individual user's or application program's view of a subset of the organization's database
|
|
subschema
|
a subset of the schema that includes only those data items used in a particular application program or by a particular user; the way the user defines the data and the data relationships
|
|
internal-level schema
|
a low-level view of the entire database describing how the data are actually stored and accessed. It includes information about record layouts, definitions, addresses, indexes, and so forth
|
|
data dictionary
|
an ordered collection of data elements that contain information about the structure of the database
|
|
data definition language (DDL)
|
a database management system language that ties the logical and physical views of the data together
|
|
data manipulation language (DML)
|
a database management system language used for data maintenance, which includes such operations as updating, inserting, and deleting portions of the database
|
|
data query language (DQL)
|
a high-level, English-like command language that is used to interrogate a database
|
|
report writer
|
a language that simplifies report creation. Typically, users need only specify which data elements they want printed and how the report should be formatted.
|
|
data model
|
an abstract representation of the contents of a database
|
|
relational data model
|
a database model in which all data elements are logically viewed as being stored in the form of two-dimensional tables called "relations." In these tables each row represents a unique entity or record. Each column represents a field where the records attributes are stored. The tables serve as the building blocks from which data relationships can be created
|
|
relation
|
the tables used to store data in a relational database
|
|
tuple
|
a row in a relation
|
|
primary key
|
the attribute, or combination of attributes, that uniquely identifies a specific row in a database table
|
|
foreign key
|
an attribute appearing in one table that is itself the primary key of another table
|
|
update anomaly
|
a problem that can arise in a poorly designed relational database. If attributes that are not characteristics of the primary key of a relation are stored in that table, then that data item is stored in many different rows
|
|
insert anomaly
|
a problem that can arise in a poorly designed relational database when attributes that are not characteristics of the primary key of a relation are stored in that table. The problem arises because new information about those attributes cannot be entered in the database without violating integrity rules
|
|
delete anomaly
|
a problem that can arise in a poorly designed relational database when attributes that are not characteristics of the primary key of a relation are stored in that table. May result in a loss of all information about those attributes that are not characteristics of the primary key
|
|
relational database
|
a database management system that uses the relational data model
|
|
entity integrity rule
|
a design constraint in a relational database, requiring that the primary key have a non-null value
|
|
referential integrity rule
|
a constraint in relational database design requiring that any non-null value of a foreign key must correspond to a primary key in the referenced table
|
|
normalization
|
the process of following the guidelines for properly designing a relational database that is free form delete, insert, and update anomalies
|
|
sabotage
|
an intentional act where the intent is to destroy a system or some of its components
|
|
cookie
|
a text file created by a Web site and stored on a visitor's hard drive; store information about who the user is and what the user has done on the site
|
|
fraud
|
any and all means a person uses to gain an unfair advantage over another person
|
|
white-collar criminals
|
typically businesspeople who commit fraud; usually resort to trickery or cunning and their crimes usually involve a violation of trust or confidence
|
|
misappropriation of assets (employee fraud)
|
an internal fraud in which an employee or group of employees use or steal company resources for personal gain
|
|
fraudulent financial reporting
|
intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements
|
|
pressure
|
a person's incentive or motivation for committing fraud
|
|
opportunity
|
the condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to personal gain
|
|
lapping
|
concealing the theft of cash by means of a series of delays in posting collections to accounts
|
|
kiting
|
a fraud scheme where the perpetrator conceals a theft of cash by creating cash through the transfer of money between banks
|
|
rationalization
|
the excuse that fraud perpetrators use to justify their illegal behavior
|
|
computer fraud (computer crime)
|
any illegal act for which knowledge of a computer is essential for the crime's perpetration, investigation, or prosecution
|
|
cyber-extortion
|
requiring a company to pay a specified amount of money to keep the extortionist from harming the company electronically
|
|
data diddling
|
changing data before, during, or after they are entered into the system
|
|
data leakage
|
copying company data, such as computer files, without permission
|
|
denial-of-service attack
|
sending email bombs (hundreds of messages per second) from randomly generated false addresses; the recipient's Internet service provider e-mail server is overloaded and shuts down
|
|
eavesdropping
|
listening to private voice or data transmissions, often using a wiretap
|
|
economic espionage
|
the theft of information, trade secrets, and intellectual property
|
|
e-mail threats
|
sending a threatening message asking the recipient to do something that makes it possible to defraud them
|
|
evil twin
|
a wireless network with the same name as a local wireless access point
|
|
hacking
|
accessing and using computer systems without permission, usually by means of a personal computer and a telecommunications network
|
|
hijacking
|
gaining control of someone else's computer to carry out illicit activities without the owner's knowledge
|
|
identity theft
|
assuming someone's identity, usually for economic gain, by illegally obtaining confidential information such as SSN
|
|
logic and time bombs
|
software that sits idle until a specified circumstance or time triggers it, destroying programs, data, or both
|
|
malware
|
software that can be used to do harm
|
|
masquerading/impersonation
|
accessing a system by pretending to be an authorized user
|
|
password cracking
|
penetrating system defenses, stealing valid passwords, and decrypting that so they can be used to access system programs, files, and data
|
|
phishing
|
sending e-mails requesting recipients to visit a Web page and verify data or fill in missing data
|
|
piggybacking
|
1. the clandestine use of someone's Wi-Fi network 2. tapping into a telecommunications line, latching on to a legitimate user, and accompanying the perpetrator into the system 3. bypassing physical security controls by entering a secure door when an authorized person opens it
|
|
posing
|
creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold
|
|
round-down
|
truncating interest calculations at two decimal places
|
|
salami technique
|
stealing tiny slices of money over time
|
|
social engineering
|
techniques that trick a person into disclosing confidential information
|
|
software piracy
|
illegally copying computer software
|
|
spamming
|
e-mailing an unsolicited message to many people at the same time
|
|
spyware
|
using software to monitor computing habits and send that data to someone else, often without the computer user's permission
|
|
spoofing
|
making a e-mail message look as if someone else sent it
|
|
trap door
|
entering a system using a back door that bypasses normal system controls
|
|
trojan horse
|
unauthorized code in an authorized and properly functioning program
|
|
virus
|
a segment of executable code that attaches itself to software, replicates itself, and spreads to other systems or files
|
|
worm
|
similar to a virus, but a program rather than a code segment hidden in a host program
|
|
zero-day attack
|
an attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released
|