Accounting Systems, Transaction Processing, and Internal Control

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to accounting systems, transaction processing, controls for availability and integrity, and principles of confidentiality and privacy as highlighted in the lecture.

Last updated 4:04 AM on 3/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

Availability

A key objective that aims to minimize the risk of system downtime and ensure quick recovery and resumption of operations.

2
New cards

Preventive Maintenance

The practice of performing routine maintenance tasks like cleaning and proper storage to minimize risks.

3
New cards

Fault Tolerance

The ability of a system to continue functioning properly in the event of a failure of some of its components.

4
New cards

Business Continuity Plan (BCP)

A strategy to ensure that an organization can continue its operations during and after a disaster.

5
New cards

Disaster Recovery Plan (DRP)

Procedures to restore an organization’s IT function after data center destruction.

6
New cards

Cold Site

An empty building prewired for necessary telecommunications that can be equipped as needed.

7
New cards

Hot Site

A fully equipped facility ready for business activities with necessary computing resources.

8
New cards

Digital Signature

An electronic signature created by using a hashing algorithm and the creator's private key.

9
New cards

Encryption

The process of converting plaintext into an unreadable format to protect it from unauthorized access.

10
New cards

Symmetric Encryption

A type of encryption that uses the same key for both encrypting and decrypting data.

11
New cards

Asymmetric Encryption

An encryption method that uses a pair of keys, one public and one private.

12
New cards

Hashing

The process of converting data into a fixed-length code that cannot be reversed.

13
New cards

User Review

A control process where users verify the reasonableness and completeness of output data.

14
New cards

Access Controls

Mechanisms put in place to restrict access to information and systems to authorized users only.

15
New cards

Privacy Regulatory Acts

Legislation such as the Spam Act 2003 and Cybercrime Act 2001 aimed at protecting personal information.

16
New cards

Data Entry Controls

Checks implemented during data input to ensure accuracy and completeness.

17
New cards

Batch Processing

The method of inputting multiple source documents at once to increase processing efficiency.

Explore top notes

note
Mission Statements
Updated 348d ago
0.0(0)
note
Mixtures and Chromatography
Updated 1236d ago
0.0(0)
note
Golfer’s Elbow
Updated 1130d ago
0.0(0)
note
Supply and Demand
Updated 1265d ago
0.0(0)
note
Chapter 7: Business Management
Updated 1330d ago
0.0(0)
note
Film Music
Updated 616d ago
0.0(0)
note
Mission Statements
Updated 348d ago
0.0(0)
note
Mixtures and Chromatography
Updated 1236d ago
0.0(0)
note
Golfer’s Elbow
Updated 1130d ago
0.0(0)
note
Supply and Demand
Updated 1265d ago
0.0(0)
note
Chapter 7: Business Management
Updated 1330d ago
0.0(0)
note
Film Music
Updated 616d ago
0.0(0)

Explore top flashcards

flashcards
lecture 3 pelvic limb part 1
110
Updated 42d ago
0.0(0)
flashcards
science ch. 13
20
Updated 684d ago
0.0(0)
flashcards
Med quiz 2/10
57
Updated 1130d ago
0.0(0)
flashcards
Physiology ospe
72
Updated 152d ago
0.0(0)
flashcards
1-1 Forms of Gusta
22
Updated 124d ago
0.0(0)
flashcards
lecture 3 pelvic limb part 1
110
Updated 42d ago
0.0(0)
flashcards
science ch. 13
20
Updated 684d ago
0.0(0)
flashcards
Med quiz 2/10
57
Updated 1130d ago
0.0(0)
flashcards
Physiology ospe
72
Updated 152d ago
0.0(0)
flashcards
1-1 Forms of Gusta
22
Updated 124d ago
0.0(0)