Key Concepts in Accounting and Information Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

flashcard set

Earn XP

Description and Tags

A series of flashcards covering key concepts related to accounting information systems, data processes, and related vulnerabilities.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Data Processing Cycle

The process that involves operations performed on data to generate meaningful and relevant information.

2
New cards

Source Document

A document that serves as the starting point for collecting accounting data at the time of a transaction.

3
New cards

Master File

A permanent file of records that stores cumulative data about an organization.

4
New cards

General Journal

A journal used to record infrequent or non-routine transactions.

5
New cards

Control Account

The title given to a general ledger account that summarizes total amounts recorded in a subsidiary ledger.

6
New cards

Batch Processing

The process of accumulating transaction records into groups for processing at a regular interval.

7
New cards

Enterprise Resource Planning (ERP) System

A system that integrates enterprise-wide activities such as production, sales, and payroll.

8
New cards

Transaction File

A type of file that contains the individual business transactions that occur during a specific period.

9
New cards

Audit Trail

The path that allows a transaction to be traced from its origin to its output.

10
New cards

Turnaround Document

A type of document sent to an external party and then returned to the system as input.

11
New cards

Unintentional Acts

The greatest risk to information systems, often caused by human carelessness.

12
New cards

Cookie

A text file created by a website that stores user information on a hard drive.

13
New cards

Fraudulent Financial Reporting

A type of fraud that involves misrepresenting financial statements to mislead stakeholders.

14
New cards

Bribery

The act of offering or accepting something of value to influence official actions.

15
New cards

Bid Rigging

A form of fraud where a contract is promised to one party while competitors raise prices.

16
New cards

Ponzi Scheme

A scam that promises high returns in a short time but is actually a fraud.

17
New cards

Misappropriation of Assets

The theft of company assets by employees, including physical and digital assets.

18
New cards

Computer Fraud

A type of fraud that requires computer technology for execution.

19
New cards

Input Fraud

The most common type of computer fraud that involves altering input data.

20
New cards

Processor Fraud

Fraud that involves unauthorized system use, such as stealing computer processing time.

21
New cards

Computer Instruction Fraud

Fraud that occurs when someone tampers with software to perform unauthorized activities.

22
New cards

Data Fraud

Fraud that occurs when company data is illegally used, copied, or modified.

23
New cards

Hacking

An attack that involves unauthorized access, modification, or use of computer systems.

24
New cards

Social Engineering

Psychological tricks used to gain unauthorized access to systems.

25
New cards

Malware

Software designed to harm computers or users.

26
New cards

Pharming

The technique of redirecting a user to a fake website to steal sensitive information.

27
New cards

Keylogger

The term for secretly recording a user's keystrokes to steal credentials.

28
New cards

Botnet/Zombie Attack

The act of hijacking a computer to perform illicit activities without the owner’s knowledge.

29
New cards

Spamming

A form of attack that involves sending mass unsolicited messages, often for advertisements.

30
New cards

Trojan Horse

Malware that disguises itself as legitimate software while performing malicious actions.

31
New cards

Virus

Malware that is self-replicating and requires a host program to spread.

32
New cards

Worm

Malware that can self-replicate without needing a host program.

33
New cards

Bluesnarfing

The practice of stealing data from a Bluetooth-enabled phone.

34
New cards

Spoofing

A hacking method that involves altering parts of electronic communication to appear legitimate.

35
New cards

Software Piracy

The unauthorized copying or distribution of copyrighted software.

36
New cards

System

A set of interrelated components that interact to achieve a goal.

37
New cards

Goal Conflict

What occurs when a subsystem’s goals are inconsistent with the goals of another subsystem or the whole system.

38
New cards

Data

Raw facts stored in a system, such as numbers and names.

39
New cards

Information

Processed data that is meaningful and useful for decision-making.

40
New cards

Revenue Cycle

The cycle that involves selling goods or services for cash or a promise to receive cash in the future.

41
New cards

Human Resources/Payroll Cycle

The cycle that includes hiring, training, and compensating employees.

42
New cards

Production or Conversion Cycle

The name of the cycle where raw materials are transformed into finished goods.

43
New cards

Accounting Information System (AIS)

The main role of an AIS in a business is providing information for decision-making.

44
New cards

Marketing and Sales

The type of activity in the value chain that includes advertising and selling products.

45
New cards

Transaction Processing

The process that involves capturing transaction data and generating output like financial statements.

46
New cards

Source data automation

Devices that capture transaction data in machine-readable form at the time and place of their origin.

47
New cards

General journal

Used to record infrequent or nonroutine transactions, such as loan payments and end-of-period adjusting and closing entries.

48
New cards

Fraud

Also known as a white-collar crime.

49
New cards

Corruption

Dishonest conduct by those in power, often involving actions that are illegitimate, immoral, or incompatible with ethical standards.

50
New cards

Computer Instruction Fraud

Includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity.

51
New cards

Reports

Used by employees to control operational activities and by managers to make decisions and formulate business strategies.

52
New cards

Database

A set of interrelated, centrally controlled data files that are stored.

53
New cards

File

A set of logically related records.

54
New cards

Field

The portion of a data record where the data value for a particular attribute is stored.

55
New cards

Chipping

Planting a small chip that records transaction data in a legitimate credit card reader.