Accounts notes

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

flashcard set

Earn XP

Description and Tags

This set of vocabulary flashcards covers key concepts in database design, REA modelling, relational database management, systems development lifecycles, internal controls, fraud, and information security.

Last updated 3:49 AM on 4/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

47 Terms

1
New cards

REA model

A database design framework categorising entities into Resources, Events, and Agents.

2
New cards

Resources

Things that have economic value to an organisation in the REA model.

3
New cards

Events

Business activities that management wants to manage and control in the REA model.

4
New cards

Agents

People and organisations that participate in events within the REA model.

5
New cards

Primary Key

An attribute or combination of attributes that uniquely identifies each record/row in a table.

6
New cards

Foreign Key

An attribute of one entity that is itself the primary key of another entity, used to implement relationships.

7
New cards

Cardinality

Describes the nature of relationships between entities, including how many instances of one entity can be linked to another (Minimum: 0 or 1; Maximum: 1 or Many).

8
New cards

Tuple

A row in a relational database table that contains data about one instance of an entity, equivalent to a record.

9
New cards

Attribute

A column in a relational database table that contains data about a specific characteristic of an entity, equivalent to a field.

10
New cards

Update Anomaly

A problem in a database where changes to existing data are not correctly recorded due to multiple records with the same data attributes.

11
New cards

Insert Anomaly

A problem in a database where a user is unable to add a record because it is missing a required attribute.

12
New cards

Delete Anomaly

A problem where removing a record from the database also results in the unintended removal of other data.

13
New cards

Entity Integrity

A relational database rule stating that a primary key cannot be null (empty).

14
New cards

Referential Integrity

A rule stating that if a foreign key is not null, it must have a value corresponding to a primary key in another table.

15
New cards

DBMS (Database Management System)

The interface between software applications and the data stored in files.

16
New cards

Data Dictionary

Contains information about the structure of the database, including field names, descriptions, and uses.

17
New cards

Data Definition Language (DDL)

A DBMS language used to build the data dictionary, create the database, and describe the subschema.

18
New cards

Data Manipulation Language (DML)

A DBMS language used to change database content, including updates, insertions, and deletions.

19
New cards

Data Query Language (DQL)

A DBMS language that enables the retrieval, sorting, and display of data from the database.

20
New cards

Business Process Management (BPM)

A systematic approach to continuously improving and optimising an organisation's business processes.

21
New cards

Prototyping

The process of developing an initial model (prototype) to clarify user needs and gather feedback on functionality.

22
New cards

CASE (Computer-Aided Software Engineering) Tools

Software designed to help plan, analyse, design, program, and maintain an information system.

23
New cards

End-User Computing (EUC)

Allows end-users to create, control, and implement simple systems independently of technical specialists.

24
New cards

SaaS (Software-as-a-Service)

A cloud computing model where software is provided to users via the Internet (e.g., Gmail).

25
New cards

Parallel Conversion

A system implementation method where the old and new systems are operated simultaneously for a period.

26
New cards

Pilot Conversion

Implements a new system in only one part of the organisation (e.g., a branch) to localise problems.

27
New cards

Inherent Risk

The risk that exists before any plans are made to control it.

28
New cards

Residual Risk

The remaining risk after controls have been implemented to reduce it.

29
New cards

Separation of Duties

An internal control that separates Authorization, Custodial (handling assets), and Recording functions to prevent fraud.

30
New cards

Symmetric Encryption

An encryption method where one secret key is used both to encrypt and decrypt information.

31
New cards

Asymmetric Encryption

An encryption method involving two keys: a public key available to everyone and a private key kept secret.

32
New cards

Hashing

A one-way function that converts information into a fixed-length code that cannot be reversed or 'unhashed' to recover the original document.

33
New cards

Digital Signature

A legally binding electronic signature created by hashing a document and encrypting that hash with a private key.

34
New cards

Virtual Private Network (VPN)

A tool used to securely transmit encrypted data between a sender and receiver.

35
New cards

Defense-in-depth

An information security approach that employs multiple layers of overlapping, complementary, or redundant controls.

36
New cards

Time-Based Model of Information Security

A formula (P > D + C) where security is effective if the time to break preventive controls (P) is greater than the time to detect (D) and respond (C) to an attack.

37
New cards

Authentication

A user access control that verifies who a person is based on something they know, have, or a biometric characteristic.

38
New cards

Authorization

A user access control that determines what resources or files a verified person can access.

39
New cards

Phishing

An electronic social engineering technique of sending an e-mail asking a victim to click a link to a spoofed site to divulge sensitive data.

40
New cards

Lapping

A fraud technique where an employee conceals the theft of cash by applying subsequent payments from one customer to another customer's account.

41
New cards

Trojan Horse

Malicious computer instructions hidden within an authorised and properly functioning program.

42
New cards

Botnet

A 'Robot Network' of hijacked computers that carry out processes without the users' knowledge.

43
New cards

Denial-of-Service (DoS) Attack

An attack that overwhelms a web-server with a constant stream of requests to shut down the service.

44
New cards

Fraud Triangle

Compromised of three elements necessary for fraud: Pressure, Opportunity, and Rationalisation.

45
New cards

Data Flow Diagram (DFD)

A graphical description of the flow of data within a system using symbols for entity, process, data flow, and data store.

46
New cards

Value Chain

The set of activities (Primary and Support) a product or service moves along to gain value before being sold to a customer.

47
New cards

Enterprise Resource Planning (ERP)

A system that integrates all aspects of an organisation's information into one overall Accounting Information System (AIS).