• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/182

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

182 Cards in this Set

  • Front
  • Back
system
(1) an entity consisting of two or more components or subsystems that interact to achieve a goal. (2) the equipment and programs that comprise a complete computer installation. (3) the programs and related procedures that perform a single task on a computer.
systems concept
changes in subsystems cannot be made without considering the effect on other subsystems and the system as a whole
goal conflict
occurs when a decision or action of a subsystem is inconsistent with another subsystem or the system as a whole
goal congruence
is achieved when a subsystem achieves its goals while contributing to the organization'a overall goal
integration
eliminating duplicate recording, storage, reporting, and other processing activities in an organization
data
facts that are collected, recorded, stored, and processed by an information system to produce information
information
data that have been organized and processed to provide meaning to a user; classified as mandatory, essential, or discretionary
information overload
the state in which additional information cannot be used efficiently and has no marginal value
value of information
the benefit produced by the information minus the cost of producing it
mandatory information
information required by a governmental entity
essential information
information required to conduct business with external parties
discretionary information
information that is available only to certain internal users
accounting information system (AIS)
a system that collects, records, stores, and processes data to produce information for decision makers
value chain
the linking together of all the primary and support activities in a business
primary activities
activities in the value chain that are preformed to create, market, and deliver products and services to customers and provide post-delivery service and support
support activities
activities in the value chain that enable the primary activities to be performed efficiently and effectively
supply chain
an extended system that includes an organization's value chain as well as its suppliers, distributors, and customers
structured decision
decisions that are repetitive, routine, and understood well enough that they can be delegated to the lower-level employees of an organization
semistructured decision
decisions that required subjective assessment and judgement to supplement formal data analysis
unstructured decision
nonrecurring and nonroutine decisions that require considerable judgement and intuition; no framework or model exists to solve such problems
operational control
decisions that are concerned with the efficient and effective performance of specific tasks in an organization
management control
activities by management designed to motivate, encourage, and assist officers and employees in achieving corporate goals and objectives as efficiently and effectively as possible
strategic planning
decisions that establish the organization's objectives and policies for accomplishing those objectives
product differentiation strategy
adding features or services not provided by competitors to a product to be able to charge customers a premium price
low-cost strategy
striving to be the most efficient producer of a product or service
variety-based strategic position
producing or providing a subset of the industry's products or services
needs-based strategic position
trying to serve most of all of the needs of a particular group of customers in a target market
access-based strategic position
a strategic position that serves a subset of customers who differ from other customers in terms of factors such as geographic location or size
synergy
when an entire system of organizational activities is greater than the sum of each individual part
predictive analysis
uses data warehouses and complex algorithms to forecast future events, based on historical trends and calculated probabilities; educated guess of what one may expect to see in the near future
transaction
an agreement between two entities to exchange goods or services; an exchange that can be measured in economic terms by an organization
transaction processing
a process that begins with capturing transaction data and ends with an informational output
give-get exchange
an event where two entities exchange items such as cash for goods or services
business or transaction cycle
a group of related business processes
transaction
an agreement between two entities to exchange goods or services; an exchange that can be measured in economic terms by an organization
revenue cycle
the recurring set of business activities and information-processing operations associated with providing goods and services to customers and collecting cash in payment for those sales
transaction processing
a process that begins with capturing transaction data and ends with an informational output
expenditure cycle
a recurring set of business activities and related data processing operations associated with the purchase of and payment for goods and services
give-get exchange
an event where two entities exchange items such as cash for goods or services
production cycle
the recurring set of business activities and related data processing operations associated with the manufacture of products
business or transaction cycle
a group of related business processes
human resource/payroll cycle
the recurring set of business activities and related data processing operations associated with effectively managing the employee workforce
revenue cycle
the recurring set of business activities and information-processing operations associated with providing goods and services to customers and collecting cash in payment for those sales
financing cycle
the business activities and related data processing operations associated with obtaining the necessary funds to run the operations, repay creditors, and distribute profits to investors
expenditure cycle
a recurring set of business activities and related data processing operations associated with the purchase of and payment for goods and services
production cycle
the recurring set of business activities and related data processing operations associated with the manufacture of products
general ledger and reporting system
the information-processing operations involved in updating the general ledger and preparing reports that summarize the results of the organization's activities
human resource/payroll cycle
the recurring set of business activities and related data processing operations associated with effectively managing the employee workforce
financing cycle
the business activities and related data processing operations associated with obtaining the necessary funds to run the operations, repay creditors, and distribute profits to investors
general ledger and reporting system
the information-processing operations involved in updating the general ledger and preparing reports that summarize the results of the organization's activities
data processing cycle
the operations performed on data in computer-based systems to generate meaningful and relevant information
source documents
contain the initial record of a transaction that takes place
turnaround documents
records of company data sent to an external party and then returned to the system as input
source data automation (SDA)
the collection of transaction data in machine-readable form at the time and place of origin
general ledger
contains summery-level data for every asset, liability, equity, revenue, and expense account of the organization
subsidiary ledger
used to record the detailed data for any general ledger account that has many individual subaccounts
control account
a general ledger account that summarizes the total amounts recorded in a subsidiary ledger
coding
(1) the systematic assignments or numbers or letters to items to classify and organize them. (2) writing program instructions that direct a computer to perform a specific data processing task
sequence code
documents are numbered consecutively to account for them, any gaps in the sequence indicate missing documents that should be investigated
block code
blocks of numbers within a numerical sequence reserved for categories having meaning to the user
group code
two or more subgroups of digits that are used to code an item
chart of accounts
a listing of all balance sheet and income statement account number codes for a particular company
general journal
used to record infrequent or nonroutine transactions,
specialized journal
journals where large numbers of repetitive transactions are recorded
audit trail
a traceable path of a transaction through a data processing system from point of origin (whether paper or electronic) to final output or backwards from final output to point of origin
entity
the item about which information is stored in a record
attribute
characteristics of interest in a file or database; the different individual properties of an entity
field
the part of a data record that contains the data value for a particular attribute
record
a set of logically related data items that describe specific attributes of an entity
data value
the actual value stored in a field
file
a set of logically related records
master file
a permanent file of records that stores cumulative information about an organization's resources and the agents with whom it interacts
transaction file
contain records of the individual business transactions that occur during a specific fiscal period
database
a set of interrelated, centrally controlled data files that are stored with as little data redundancy as possible
batch processing
accumulating transaction records into groups or batches for processing at some regular interval such as daily or weekly
online, real-time processing
the computer system processes data immediately after capture and provides updated information to the user on a timely basis
document
record of transaction or other company data
operational document
a document that is generated as an output of transaction processing activities
report
system output organized in a meaningful fashion
query
a request for specific information from a computer
budget
the formal expression of goals in financial terms
cash budget
a budget that shows projected cash inflows and outflows
performance reports
a report that compares standard, or expected, performances with actual performance and also shows the variance, or differences
enterprise resource planning (ERP) systems
a system that integrates all aspects of an organization's activities into one accounting information system
documentation
the narratives, flowcharts, diagrams, and other written materials that explain how a system works. It converts the who, what, when, where, why, and how of data entry, processing, storage, information output, and systems controls
narrative description
written, step-by-step explanation of system components and how the components interact
data flow diagram (DFD)
a diagram the graphically describes the flow of data within an organization. It is used to document existing systems and to plan and design new ones
data source
a component of a data flow diagram that represents the people and organizations that send data that the system being modeled uses or produces
data destination
a component of data flow diagrams that represents an entity outside of the system who receives data produced by the system
data flow
a component of a data flow diagram that represents data flowing into or out of a process
process
a set of actions, automated or manual, that transform data into other data or information
data store
a component of a data flow diagram that represents the storage of data within a system
context diagram
the highest level of a data flow diagram. It provides a summary-level view of a system. It shows the data processing system, the input(s) and output(s) of the system, and the external entities that are the sources and destinations of the system's input(s) and output(s)
flowchart
an analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner
flowcharting template
a piece of hard, flexible plastic on which the shapes of flowcharting systems have been die cut
document flowchart
trace a document from its cradle to its grave. They show where each document originates, its distribution, the purposes for which it is used, its ultimate disposition, and everything that happens as it flows through the system. They illustrate the flow of documents and information among areas of responsibility within an organization
internal control flowchart
describes and evaluates internal controls. Often used by auditors in the planning stage of an audit
system flowchart
a diagrammatical representation that shows the flow of data through a series of operations in an automated data processing system. It shows how data are captured and put into the system, the processes that operate on the data, and system outputs
program flowchart
a diagrammatical representation of the sequence of logical operations performed by a computer in executing a program. Describes the specific logic to perform a process shown on a system flowchart
database management system (DBMS)
the specialized computer program that manages and controls that data and interfaces between the data and the applications programs
database system
the combination of the database, the database management system, and the application programs that access the database through the database management system
database administrator (DBA)
the person responsible for coordinating, controlling, and managing the data in the database
data warehouse
very large databases that contain both detailed and summarized data for a number of years and that are used for analysis rather than transaction processing
data mining
accessing information stored in a data warehouse through statistical analysis or artificial intelligence techniques to "discover" unhypothesized relationships in the data
record layout
a document that illustrates the arrangement of items of data input, output, and file records
logical view
the manner in which a user or programmer conceptually organizes, views, and understands the relationships among data items
physical view
the way data are physically arranged and stored in the computer system
schema
a description of the types of data elements that are in the database, the relationships among the data elements, and the structure or overall logical model used to organize and describe the data
conceptual-level schema
the organization-wide view of the entire database. It lists all data elements in the database and the relationships between them
database management system (DBMS)
the specialized computer program that manages and controls that data and interfaces between the data and the applications programs
database system
the combination of the database, the database management system, and the application programs that access the database through the database management system
database administrator (DBA)
the person responsible for coordinating, controlling, and managing the data in the database
data warehouse
very large databases that contain both detailed and summarized data for a number of years and that are used for analysis rather than transaction processing
data mining
accessing information stored in a data warehouse through statistical analysis or artificial intelligence techniques to "discover" unhypothesized relationships in the data
record layout
a document that illustrates the arrangement of items of data input, output, and file records
logical view
the manner in which a user or programmer conceptually organizes, views, and understands the relationships among data items
physical view
the way data are physically arranged and stored in the computer system
schema
a description of the types of data elements that are in the database, the relationships among the data elements, and the structure or overall logical model used to organize and describe the data
conceptual-level schema
the organization-wide view of the entire database. It lists all data elements in the database and the relationships between them
external-level schema
an individual user's or application program's view of a subset of the organization's database
subschema
a subset of the schema that includes only those data items used in a particular application program or by a particular user; the way the user defines the data and the data relationships
internal-level schema
a low-level view of the entire database describing how the data are actually stored and accessed. It includes information about record layouts, definitions, addresses, indexes, and so forth
data dictionary
an ordered collection of data elements that contain information about the structure of the database
data definition language (DDL)
a database management system language that ties the logical and physical views of the data together
data manipulation language (DML)
a database management system language used for data maintenance, which includes such operations as updating, inserting, and deleting portions of the database
data query language (DQL)
a high-level, English-like command language that is used to interrogate a database
report writer
a language that simplifies report creation. Typically, users need only specify which data elements they want printed and how the report should be formatted.
data model
an abstract representation of the contents of a database
relational data model
a database model in which all data elements are logically viewed as being stored in the form of two-dimensional tables called "relations." In these tables each row represents a unique entity or record. Each column represents a field where the records attributes are stored. The tables serve as the building blocks from which data relationships can be created
relation
the tables used to store data in a relational database
tuple
a row in a relation
primary key
the attribute, or combination of attributes, that uniquely identifies a specific row in a database table
foreign key
an attribute appearing in one table that is itself the primary key of another table
update anomaly
a problem that can arise in a poorly designed relational database. If attributes that are not characteristics of the primary key of a relation are stored in that table, then that data item is stored in many different rows
insert anomaly
a problem that can arise in a poorly designed relational database when attributes that are not characteristics of the primary key of a relation are stored in that table. The problem arises because new information about those attributes cannot be entered in the database without violating integrity rules
delete anomaly
a problem that can arise in a poorly designed relational database when attributes that are not characteristics of the primary key of a relation are stored in that table. May result in a loss of all information about those attributes that are not characteristics of the primary key
relational database
a database management system that uses the relational data model
entity integrity rule
a design constraint in a relational database, requiring that the primary key have a non-null value
referential integrity rule
a constraint in relational database design requiring that any non-null value of a foreign key must correspond to a primary key in the referenced table
normalization
the process of following the guidelines for properly designing a relational database that is free form delete, insert, and update anomalies
sabotage
an intentional act where the intent is to destroy a system or some of its components
cookie
a text file created by a Web site and stored on a visitor's hard drive; store information about who the user is and what the user has done on the site
fraud
any and all means a person uses to gain an unfair advantage over another person
white-collar criminals
typically businesspeople who commit fraud; usually resort to trickery or cunning and their crimes usually involve a violation of trust or confidence
misappropriation of assets (employee fraud)
an internal fraud in which an employee or group of employees use or steal company resources for personal gain
fraudulent financial reporting
intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements
pressure
a person's incentive or motivation for committing fraud
opportunity
the condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to personal gain
lapping
concealing the theft of cash by means of a series of delays in posting collections to accounts
kiting
a fraud scheme where the perpetrator conceals a theft of cash by creating cash through the transfer of money between banks
rationalization
the excuse that fraud perpetrators use to justify their illegal behavior
computer fraud (computer crime)
any illegal act for which knowledge of a computer is essential for the crime's perpetration, investigation, or prosecution
cyber-extortion
requiring a company to pay a specified amount of money to keep the extortionist from harming the company electronically
data diddling
changing data before, during, or after they are entered into the system
data leakage
copying company data, such as computer files, without permission
denial-of-service attack
sending email bombs (hundreds of messages per second) from randomly generated false addresses; the recipient's Internet service provider e-mail server is overloaded and shuts down
eavesdropping
listening to private voice or data transmissions, often using a wiretap
economic espionage
the theft of information, trade secrets, and intellectual property
e-mail threats
sending a threatening message asking the recipient to do something that makes it possible to defraud them
evil twin
a wireless network with the same name as a local wireless access point
hacking
accessing and using computer systems without permission, usually by means of a personal computer and a telecommunications network
hijacking
gaining control of someone else's computer to carry out illicit activities without the owner's knowledge
identity theft
assuming someone's identity, usually for economic gain, by illegally obtaining confidential information such as SSN
logic and time bombs
software that sits idle until a specified circumstance or time triggers it, destroying programs, data, or both
malware
software that can be used to do harm
masquerading/impersonation
accessing a system by pretending to be an authorized user
password cracking
penetrating system defenses, stealing valid passwords, and decrypting that so they can be used to access system programs, files, and data
phishing
sending e-mails requesting recipients to visit a Web page and verify data or fill in missing data
piggybacking
1. the clandestine use of someone's Wi-Fi network 2. tapping into a telecommunications line, latching on to a legitimate user, and accompanying the perpetrator into the system 3. bypassing physical security controls by entering a secure door when an authorized person opens it
posing
creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold
round-down
truncating interest calculations at two decimal places
salami technique
stealing tiny slices of money over time
social engineering
techniques that trick a person into disclosing confidential information
software piracy
illegally copying computer software
spamming
e-mailing an unsolicited message to many people at the same time
spyware
using software to monitor computing habits and send that data to someone else, often without the computer user's permission
spoofing
making a e-mail message look as if someone else sent it
trap door
entering a system using a back door that bypasses normal system controls
trojan horse
unauthorized code in an authorized and properly functioning program
virus
a segment of executable code that attaches itself to software, replicates itself, and spreads to other systems or files
worm
similar to a virus, but a program rather than a code segment hidden in a host program
zero-day attack
an attack between the time a new software vulnerability is discovered and a software patch that fixes the problem is released