Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
41 Cards in this Set
- Front
- Back
Flat file |
Users use their own data files |
|
Three types of data redundancy |
Data storage Data updating Currency of information |
|
Database approach |
Pulling a data into a common database that is shared by all users |
|
Database management system |
Provide controlled access to the database Special Software System that is programmed to know which data elements each user is authorized to access |
|
Data definition language |
Programming language used to define the physical database to the database management system |
|
5 functions of the DBA |
Database planning Design Implementation Operation and maintenance Change and growth |
|
Indexed sequential file |
Facilitates both direct access to individual records and batch processing of an entire file |
|
Inverted list |
Multiple indexes can be used to create cross-references which allows more flexible access |
|
Entity relationship diagram |
Documentation technique that shows relationship between entities in a system |
|
Cardinality |
Degree of association between two entities |
|
Foreign keys |
Related tables need to be physically connected to achieve data model Association A foreign key is a primary key from one table that is embedded in another table |
|
Three types of anomalies |
Insertion anomaly Deletion anomaly Update anomaly |
|
Insertion anomaly |
A new item cannot be added to the table until at least one entity uses a particular attribute item |
|
Deletion anomaly |
If an attribute item used my only one and he is deleted all information about the attribute item is lost |
|
Update anomaly |
A modification on an attribute must be made in each of the rows in which the attribute of peers |
|
Dbms provides what type of internal control |
Provides controlled access Special Software System Program to know which data elements each user is authorized to access |
|
Closed database architecture |
Numerous distinct an independent databases separate Information Systems within a firm |
|
Enterprise resource planning system |
Multi-module application software Integrated Smooth and seamless flow of information across organizational boundaries standardized environment with shared database |
|
2 main ERP application |
Online transaction processing Online analytical processing |
|
Data warehousing |
Multidimensional database with terabytes of disk storage |
|
Five stages of the data warehousing process |
1. Modeling data for the data warehouse 2. Extracting data from operational databases 3. Cleansing extracted data 4. Transforming data into the warehouse model 5. Loading data into the data warehouse database |
|
Client-server model |
A user's computer access is Erp programs and data via a host computer |
|
2 roles of accountants in Information Systems |
Accountants our system designers and system auditors |
|
External auditing |
Is an independent attestation performed by an expert who expresses an opinion regarding financial statement presentation |
|
Phases of an audit |
1. Review of organizations policies practices and structure 2. Review General controls and application controls 3. Plan tests of controls and substantive testing procedures 4. Perform tests of controls 5. Evaluate test results 6. Determine degree of Reliance on controls 7. Perform substantive tests 8. Evaluate results an issue Auditor's report |
|
Audit planning |
Obtain sufficient information about The Firm to plan other phases |
|
Test of controls |
Determine is adequate internal controls are in place and functioning |
|
Substantive test |
Provide evidence pertaining to financial data based on detailed investigations of accounts and transactions |
|
Three types of audit risk |
1. Inherent risk 2. Control risk 3. Detection risk |
|
Inherent risk |
Associated with unique characteristics of clients business or industry |
|
Control risk |
Likelihood that control structure is flawed because controls are either absent or inadequate |
|
Detection risk |
Risk Auditors are willing to take that airs not detected or prevented by the control structure will also go undetected during the substantive testing The stronger the internal control structure the lower the control risk |
|
SOX section 302 |
In quarterly and annual financial statements managers must certify the internal controls, State responsibility for internal control, provide reasonable Assurance as to the reliability of the financial reporting process, disclose any recent material changes in internal controls |
|
SOX section 404 |
Annual report on internal control effectiveness and managers must 1. State the responsibility for establishing and maintaining adequate financial reporting internal controls 2. Assess internal controls effectiveness 3. Reference the external Auditors attestation report on Management's internal controls assessment 4. Provide explicit conclusions on the effectiveness of financial reporting internal controls 5. Identify the framework management used to conduct their internal control assessment |
|
Disaster Recovery plans |
Identify actions before during and after the disaster 2. The disaster recovery team 3. Priorities for restoring critical applications 4. Second site backup 5. Testing the Disaster Recovery plan regularly |
|
Four goals of internal controls |
1. Safeguard assets 2. Ensure accuracy and reliability 3. Promote efficiency 4. Measure compliance |
|
Big Data |
Volume velocity variety |
|
Data-driven discovery |
The system computing what do you want to know before you want to know it |
|
XBRL |
Is a xml-based language for standardizing methods for preparing publishing and exchanging a financial information |
|
Advantages of XBRL |
Faster distribution Faster analysis Internal and external uses International |
|
Inline xbrl |
Allows the use of tags in the HTML document which makes it infinitely easier |