• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
Accounting Information Systmes
Collection of data and processing procedures that creates needed information for users
Data
Raw facts that have little organization or meaning
Information
Data is processed into information
Audit Trail
Path data follows as it flows through an AIS
Information Overload
too much trivial information, overwhelm users, possibly causing relevant information to be overlooked.
Enterprise Resource Planning
Software packages to integrate their information subsystems into one application
Predictive Analytics
A technique that takes advantage of data stored in data warehouses, to create systems that allow them to use their data to improve performance
Information Age
produce, analyze, manipulate, and distribute information about business activities
Knowledge Workers
Information age workers
E-business
internet business
E-commerce
subset of E-business, refers to the buying and selling transactions
Certified Information Technology Professional
CITP
designation given by the AICPA for CPAs who meet specified additional requirements related to information technologies
Systems Consultants
provide help with issues concerning information systems
value added resellers
sell specific software products and provide consulting service, software installation, training, and customization.
Certified Information Systems Auditors
CISA
a professional information systems auditor who meets certification requirements of the ISACA
Information Systems Audit and Control Association
ISACA
Certifies CISA
Penetration Testing
Best way to assess risks associated with computer systems is to try to penetrate the system