• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back
Digital Certificate
A digital certificate is an electronic document that verifies the identity of the owner of the key.
signed by an independent third party called a certificate authority (CA) and contains a party’s name and public key information (e.g. Thawte or Verisign)
Certificate authority
Makes digital certificates
HTML
HTML (HyperText Markup Language): uses a series of predefined tags to display the data on Web pages.
XML
XML (eXtensible Markup Language): similar to HTML, but allows users to define their own tags to describe the data.
XBRL
XBRL (eXtensible Business Reporting Language): a specialized subset of XML that standardizes the tags that describe financial information in documents.
XBRL instance documents
examples (“instances”) of a class of documents defined by a standard or specification
XBRL taxonomies
define the tags that represent accounting and financial terms used in XBRL instance documents.
XBRL Specification 2.1:
defines the rules and syntax for XBRL documents and taxonomies
IDEA (interactive data and electronic applications
SEC database that contains XBRL data for over 10,000 companies.
Benefits of XBRL
standard format for financial info
Easy search with standard tags
Self checking with semantic meaning in formulas
XBRL has its own software program that you can use cross platform
Audit Trail Controls
validating source docs to transaction and activity listings
Activity listing:
an account change report that contains complete and detailed information about all changes to master files
How do output controls regulate controls to minimize loss or misdirection of printed output
only enough copys of the report are printed.
Each user has to pick it up him.
Security officers
Paper shredders.
information system controls
General controls-Organiztional level
Application controls: Prevent detect and correct errors
examples of general controls
Personnel Controls (segregation of duties)
Fault-Tolerant Systems, Backup, and Contingency Planning
Computer Facility Controls
Access to Computer Files
Personnel controls ( 3 seperation of duties)
System Analysis function
Programming Function
Computer operations function
Data control
AIS Library Function
Systems Analysis Function:
design an information system/application program to meet user needs
Programming Function:
write computer programs to implement the design
Computer Operations Function:
run the software on the computer systems
Data Control Function:
ensure data input have been properly authorized, monitor data processing, and distribute system output
AIS Library Function
maintain custody of corporate databases, files, and program in a separate storage area called the AIS library.
Fault-Tolerant systems
tolerate computer errors and keep functioning.
Based on redundency
Disk Shadowing
Disk mirroring.
Makes disks fault tolerant
Writing all data in parallel into two disks
RAID
RAID Redundency arrays of independent disk
example of Disk Shadowing
Backup
files are retained in a remote site and availalbe incase of emergency
Grandfather-parent-child (GPC) procedure
Three generations of data files are retained during the updating process
If the current file is destroyed or corrupted, the data are reconstructed by reprocessing the transaction file against the prior backup copy .
Diaster recovery plan (3types)
when something happens and you need to start business over

Cold site
hot site
Flying start site
Cold site:
a location where power and space are available to install processing equipment on short notice
Hot site:
a location that includes a computer system configured similarly to the system used at the main data processing center
Flying-start site
Can be started in mins or secs
Computer facility controls
involves controlling the physical assets(computers)
located in a private safe place guarded by personel
Limit employee access.
Buy insurance
Access to company computer files
Combine a number of security technologies, including, but not limited to firewalls, proxy server, intrusion detection systems, encryption, and VPN.
Strong password protection
min length
required password change in intervals
UPper lower and numbers
no more than 3 invaled login attempts
Application controls
prevent detect errors and irregularities in transactions that are processed

Business process application
3 types
Input
processing
Output
Input controls
edit tests to make sure stuff gets put in right
Examples of edit tests (11)
Numeric field -only numbers
Alphabetic field -only letters
Alphanumeric field -leters numbers (no characters)
Range -upper lower limits of numbrs
Length- Cap on digits
Valid code- 1=cash sale 2=credit
Reasonablenesss- 25/hour not for janitor
signs.- hours worked cant be negative
Completeness all data has been entered
sequence-prescribed order
Check digit= appended to original number