• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/41

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

41 Cards in this Set

  • Front
  • Back

Flat file

Users use their own data files

Three types of data redundancy

Data storage


Data updating


Currency of information

Database approach

Pulling a data into a common database that is shared by all users

Database management system

Provide controlled access to the database



Special Software System that is programmed to know which data elements each user is authorized to access

Data definition language

Programming language used to define the physical database to the database management system

5 functions of the DBA

Database planning


Design


Implementation


Operation and maintenance


Change and growth

Indexed sequential file

Facilitates both direct access to individual records and batch processing of an entire file

Inverted list

Multiple indexes can be used to create cross-references which allows more flexible access

Entity relationship diagram

Documentation technique that shows relationship between entities in a system

Cardinality

Degree of association between two entities

Foreign keys

Related tables need to be physically connected to achieve data model Association



A foreign key is a primary key from one table that is embedded in another table

Three types of anomalies

Insertion anomaly


Deletion anomaly


Update anomaly

Insertion anomaly

A new item cannot be added to the table until at least one entity uses a particular attribute item

Deletion anomaly

If an attribute item used my only one and he is deleted all information about the attribute item is lost

Update anomaly

A modification on an attribute must be made in each of the rows in which the attribute of peers

Dbms provides what type of internal control

Provides controlled access


Special Software System Program to know which data elements each user is authorized to access

Closed database architecture

Numerous distinct an independent databases separate Information Systems within a firm

Enterprise resource planning system

Multi-module application software


Integrated


Smooth and seamless flow of information across organizational boundaries standardized environment with shared database

2 main ERP application

Online transaction processing


Online analytical processing

Data warehousing

Multidimensional database with terabytes of disk storage

Five stages of the data warehousing process

1. Modeling data for the data warehouse


2. Extracting data from operational databases


3. Cleansing extracted data


4. Transforming data into the warehouse model


5. Loading data into the data warehouse database

Client-server model

A user's computer access is Erp programs and data via a host computer

2 roles of accountants in Information Systems

Accountants our system designers and system auditors

External auditing

Is an independent attestation performed by an expert who expresses an opinion regarding financial statement presentation

Phases of an audit

1. Review of organizations policies practices and structure


2. Review General controls and application controls


3. Plan tests of controls and substantive testing procedures


4. Perform tests of controls


5. Evaluate test results


6. Determine degree of Reliance on controls


7. Perform substantive tests


8. Evaluate results an issue Auditor's report

Audit planning

Obtain sufficient information about The Firm to plan other phases

Test of controls

Determine is adequate internal controls are in place and functioning

Substantive test

Provide evidence pertaining to financial data based on detailed investigations of accounts and transactions

Three types of audit risk

1. Inherent risk


2. Control risk


3. Detection risk

Inherent risk

Associated with unique characteristics of clients business or industry

Control risk

Likelihood that control structure is flawed because controls are either absent or inadequate

Detection risk

Risk Auditors are willing to take that airs not detected or prevented by the control structure will also go undetected during the substantive testing


The stronger the internal control structure the lower the control risk

SOX section 302

In quarterly and annual financial statements managers must certify the internal controls, State responsibility for internal control, provide reasonable Assurance as to the reliability of the financial reporting process, disclose any recent material changes in internal controls

SOX section 404

Annual report on internal control effectiveness and managers must


1. State the responsibility for establishing and maintaining adequate financial reporting internal controls


2. Assess internal controls effectiveness


3. Reference the external Auditors attestation report on Management's internal controls assessment


4. Provide explicit conclusions on the effectiveness of financial reporting internal controls


5. Identify the framework management used to conduct their internal control assessment

Disaster Recovery plans

Identify actions before during and after the disaster


2. The disaster recovery team


3. Priorities for restoring critical applications


4. Second site backup


5. Testing the Disaster Recovery plan regularly

Four goals of internal controls

1. Safeguard assets


2. Ensure accuracy and reliability


3. Promote efficiency


4. Measure compliance

Big Data

Volume velocity variety

Data-driven discovery

The system computing what do you want to know before you want to know it

XBRL

Is a xml-based language for standardizing methods for preparing publishing and exchanging a financial information

Advantages of XBRL

Faster distribution


Faster analysis


Internal and external uses


International

Inline xbrl

Allows the use of tags in the HTML document which makes it infinitely easier