CMA Part 1 Section F

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/198

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

199 Terms

1
New cards

Examples of how accounting information system interacts with value chain

- JIT manufacturing and raw materials account management

- Sales information can be used to optimize inventory levels

- Online merchant can use sales data to send promotional emails based on items they purchase

- Reduces cost of interacting with customers and increase customer satisfaction

- Variance report can display variances and reasoning behind variance

-

2
New cards

Elements of automated accounting information systems

- Journal entries - record accounting transactions

- Ledgers - store accounting transactions, general ledger is the foundation of the accounting system

- Chart of accounts

- Master files - store information such as account info, customer info, and customer historical data

- Transaction files - Detailed information on things such as sales transactions or purchase of inventory

- Block codes - the way the general ledger account numbers are coded to assets, liabilities, equity, income, and expenses

- Modules - Specific application within the computerized system where journals are processed (EX: VIM in SAP)

- Transaction code - A specific code that identifies transactions as what they are (ex sales transactions, inventory transactions)

- Sequence codes - Codes assigned by the accounting system to identify customer sales invoices created in order entry module

3
New cards

Input devices to an automated accounting information system

- Keyboards and mice

- Barcode scanners

- Point-of-sale systems

- Tablet computers, microphones, web cameras

- Source documents that should be maintained as backup for all transactions recorded in the accounting system

4
New cards

Output of an automated accounting system

- Audio output devices like headphones and speakers

- Video output devices like monitors and projectors

- Physical reproductions of data like paper copies

5
New cards

Different transaction cycles

- Revenue to cash

- Purchase and expenditures

- Production

- HR and Payroll

- Financing

- Fixed asset

- General Ledger and Reporting

6
New cards

Revenue to cash

Involves activity and transactions related to sale of goods and services and collecting cash from customers

- Tracking sales to customers

- Recording fulfilling of customers needs

- Maintaining customer records

- Billing for goods and services

- Recording payments collected for goods provided

- Forecasting sales and cash collected using the outputs

7
New cards

Activities and inputs to the revenue to cash cycle

- Receipt of customer orders resulting in creation of sales orders

- Inventory is checked to see if we have the goods

- Order confirmation may go to the customer

- If the order is a credit order, the customer's credit is checked

- Input is created in the AIS for the order and the packing slip

- Notice is sent to warehouse to print packing slip, pick the order, and prepare it for shipping

- Shipping information is processed, package is shipped or service is provided, if sale is a credit sale, the credit card charge is released

- AR module, Inventory module, General ledger are updated

- If a return is necessary, should make sure item is received physically, deliver it back to the warehouse and add to inventory, credit the customer's account and correct GL

- When payment is received from a credit sale, should update the AIS on AR module to recognize the payment and increase cash

8
New cards

Outputs of the revenue to cash cycle

- Internal management reports such as sales and inventory

- Customer statements summarizing invoices by customer, payments, and balance

- Customer AR aging reports

- Collection reports for overdue balances

- Information from above reports is used as input for a forecast of cash collections

9
New cards

Purchase and Expenditures cycle

Involves obtaining purchases in a timely manner for the lowest cost possible. Purchasing department is responsible for locating and approving vendors who offer good products at affordable prices, maintaining relationships with suppliers and other partners in the supply chain.

10
New cards

Purchases and Expenditures AIS uses

- Tracking purchases of goods or services

- Tracking amounts owed and making timely payments

- Maintaining vendor records and list of vendors

- Managing inventory

- Forecasting purchasing needs and cash flows

11
New cards

Activities and inputs to purchase and expenditures cycle

- Initial purchase requisition is made

- Request is transmitted to the purchasing department

- Purchasing department selects the vendor, creates the purchase order, sends purchase order to vendor, also transmits the order to the receiving department

- When items are received, receiving departments creates a report showing the items received. Receiving department should not be able to see quantity ordered. Receiving department records receipt of goods in AIS module

- Invoice received from vendor is compared to PO and receiving report. If there any differences we need to correct those

- Invoice information is put into AP module, invoice should be matched the goods receipt from the receiving team.

- If the item was a service, approval should be received from a manager before payment

- If everything was received on the PO correctly, the payment can be made via paper check or EFT

- AP module and GL are updated

- Should have controls along limiting potential for duplicate invoices

12
New cards

Outputs to the purchase and expenditure cycle

- Paper check or payment remittance

- Forecast of cash requirements

- Discrepancy report that notes any difference in quantity shipped, prices between the PO and receiving report

13
New cards

Production cycle

Involves converting raw materials into finished goods. AIS system is used for:

- Tracking purchases of raw materials

- Monitoring and controlling manufacturing costs

- Managing inventories

- Controlling the production process

- Providing input for budgets

- Collecting cost accounting data for decision making

- Variance analysis for job costing, process costing, or ABC systems

14
New cards

Activities and inputs of production cycle

- Production managers issue materials requisition

- Physical inventory count is compared to inventory records periodically

- If the level of raw materials falls below a certain level, a purchase requisition is issued to purchasing department

- Bill of materials for each product is created to show components and quantities needed to produce FG

- Master production schedule shows quantity of goods needed to be made to meet anticipated demand

- Labor time is tracked for costing purposes

- ERP systems are used at larger companies to collect, store, manage, and interpret data across an organization.

Data entry is accomplished with technology such as barcode scanners, RFID, GPS technologies

15
New cards

Outputs of production cycle

- Materials price lists

- Usage reports of raw materials by various production departments

- Inventory reconciliations comparing actual with records

- Inventory status reports for purchasing managers

- Production costs reports, used to calculate variances

- Manufacturing status reports for certain jobs

- These reports are used to develop financial statements

16
New cards

HR and Payroll Cycle

Involves hiring, training, paying, and terminating employees. AIS system is used for:

- Recording hiring and training of employees

- Processes associated with employee terminations

- Maintaining employee earnings records

- Complying with regulatory requirements

- Reporting on payroll benefit deductions such as healthcare

- Making timely and accurate payroll payments to employees, payment for benefits, and tax payments to authorities

17
New cards

Inputs to HR and Payroll Cycle

- Personnel forms documenting hiring of employees and changes

- Timesheets showing hours worked

- Payroll deduction authorization forms

- Tax withholding forms

18
New cards

Outputs of HR and Payroll cycle

- Information about employees

- Payroll payment registers used to make entries to the GL

- Preparing paychecks for direct deposit

- Deduction reports for employee deductions

- Payroll summaries used by managers to analyze payroll expense

- Tax reports used for remitting payroll taxes to taxing authorities

- Reporting to employees the information on their income and taxes paid

19
New cards

Financing cycle

Activities associated with raising money for operations. Financial planning models are used to determine the best strategies of obtaining capital. AIS is used for:

- Provide information on customer payments and show trends in cash collection

- Can be used to make payments via EFT

- Estimates of interest and dividend payments are used to develop cash flow forecasts

20
New cards

Activities and inputs of financing cycle

- Cash flows from customer payments

- Deposit receipts issued from the bank

- Bank statements are used to reconcile actual cash balance with cash balance on books in GL

- Economic and market data, interest rate data and forecasts

21
New cards

Outputs of the financing cycle

- Interest revenue and expense

- Dividend revenue and dividends paid

- Summaries of cash collections and disbursements

- Balances in debt and equity investment accounts

- Cash budget showing projected cash flows

Reports produced by AIS for financing cycle include changes in investment, dividends paid, interest earned, net new debt and retired debt, significant ratios such as ROI for the organization and individual departments

22
New cards

Fixed Asset Cycle

Manages the purchase, valuation, maintenance, and disposal of PP&E. AIS is used for:

- Recording purchased assets in fixed asset module and GL

- Maintaining and recording depreciation to calculate book value

- Maintaining deferred tax records

- Maintaining records of physical locations of fixed assets

- Tracking repair costs and distinguishing between repair costs that are expensed and capitalized

- Recording impairment of fixed assets

- Tracking disposal and calculating amount of gain or loss

23
New cards

Activities and inputs to fixed asset cycle

- Request for fixed asset purchase. Usually requires approval by one or more higher level managers

- Purchasing department will submit a PO to the vendor for the asset

- If the company builds the asset rather than buying it, a work order is used that details costs of construction

- Repair and maintenance records need to be maintained

- When an asset is moved, should be a fixed asset change form completed

- This change form should be used to record the sale, trade, or retirement of fixed assets

24
New cards

Outputs of fixed asset management system

- List of all fixed assets acquired during a period

- Fixed asset register listing the assigned ID numbers of each asset and the location of the asset

- Depreciation register showing depreciation expense and accumulated depreciation for each asset

- Repair and maintenance reports showing current period's cost and historical information

- Report on retired assets showing sale of any assets during current period

25
New cards

General ledger and reporting system

Contains accounts for all assets, liabilities, equity, revenues, expenses, gains, and losses. Most day to day transactions are initially recorded in individual modules such as AR or AP modules. This automatically creates transactions to the general ledger.

26
New cards

Financial reporting systems

Primary purpose is to produce external financial statements for stakeholders and analysts. Reports include balance sheet, income statement, cash flow statement, comprehensive income statement, and changes in equity statement. Reports used internally include

- Trial balance which shows account balances at a specific time. Used to check preliminary balances before adjusting entries are made

- General ledger report shows all or individual GL account balances and transactions within them. Used to analyze specific transactions posted to an account

27
New cards

Management reporting systems

- Cost accounting systems collect labor, material, and overhead costs used in calculation of inventory costs of manufactured goods. This is used to determine value of inventory and report variances

- Profitability and responsibility reporting systems involve comparisons between actual and planned amounts and variances. This is used to look at and explain variances.

28
New cards

Relational Database

Collection of data organized with different tables with predefined relationships. The data in the tables can be linked to one another based on common data. You can pull the data using a single query

29
New cards

Data hierarchy

the structure and organization of data, which involves fields, records, and files. Data is scheduled in levels.

- First level is a data field - Describes one attribute of the data such as an employee's last name

- Second level is a record - Contains all information about one item of data such as employees first name, last name, address, DOB, etc

- Third level is a file or table - Set of common records such as records for all employees

- Highest level is a database - This is made up of several related files or tables.

30
New cards

Primary and foreign keys

Primary key - Every record has a primary key, something that distinguishes the record from the others in a table

Foreign keys - These connect information in a record between other records in other files or tables

31
New cards

Entity-relationship modeling

The process of designing a database by organizing data entities to be used and identifying the relationships among them

32
New cards

Entity relationships

One to one, one to many, and many to many. Show the nature of relationship between entities in different files or tables within the database. EX: relationship between 1 employee and their many paychecks would be a one to many relationship

33
New cards

Database management system

Creates, reads, updates, and deletes data in a database while controlling access and security. Perform 4 primary functions

- Database development - Develop databases and create records

- Database maintenance - record deletion, changes, and reorganization

- Database interrogation - Querying data from database

- Application development - Creating custom applications for users to query data and make reports

34
New cards

Database development

The work around structuring data records and fields within a database. For example, we want to record certain data in certain columns like column A is the employee's first name column B is last name. Includes database's schema, subschema, and record structure. We would use a data definition language to achieve this

35
New cards

Database schema

a "map" of data tables and their relationships to one another

36
New cards

Database subschema

Also called a "view" this is a way to limit access to a certain part of information contained in the database. For example, we can provide read only access to people who shouldnt be updating the data

37
New cards

Database record structure

How the individual fields are layed out for each record. Also defines the format of the input Can use an input mask so users know how to enter the data into a table. For example, date field may use __/__/____

38
New cards

Database interrogation

Can use a query language like SQL to pull data from a database. Business programs usually provide graphical user interface that creates SQL commands without the user having to know specific format of commands

39
New cards

ERP System components

Production planning, inbound and outbound logistics, accounting and finance, HR, sales, distribution, and order management

40
New cards

Integration of ERP software

ERP integrates accounting, customer relations, business services, HR, and supply chain management so the data needed by other areas of the organization will be available in one centralized location

41
New cards

Centralized database component of ERP

All data from all areas of organization flows into one system rather than multiple systems in different locations. All users have access to the same data

42
New cards

ERP usually requires...

Usually requires business process reengineering. Customization is either impossible or prohibitively expensive, also takes a while to set up.

43
New cards

Extended ERP Systems

Sometimes called ERP II and ERP III bring in customers, suppliers and other business partners into one interface. ERP II systems interface with suppliers and vendors to supply information on inventory levels and sales orders. ERP III can interface companies with their customers.

44
New cards

Advantages of ERP System

- Integrated systems

- Centralized computer resources reduces IT costs and staff

- Centralization of data

- Day to day operations are facilitated so business can adapt more easily

- Business processes can be monitored in different ways

- Communication across departments is improved

- Data duplication is reduced

- Expenses can be better managed and controlled

- Inventory management is facilitated

- Trends can be more easily identified

- Efficiency of financial reporting can be increased

- Resource planning as part of strategic planning is easier

45
New cards

Disadvantages of ERP System

- Business reengineering

- Converting data can be time-consuming and costly

- Have to train employees on new system

- Unsuccessful ERP rollouts can cause disruption in production, inventory management, and sales

- Ongoing costs after implementation

46
New cards

Data warehouse

One place for a copy of all historical data. Separate from ERP system as data warehouse is not used for everyday transaction processing. Managers can use business intelligence tools (power bi) to extract information from the data warehouse.

47
New cards

Data in a data warehouse should

- Be free of errors

- Be uniformly defined

- Cover a longer time span than the company's transaction systems

- Allow users to write queries to pull information

48
New cards

Process of making data available in data warehouse

- Periodically, data is uploaded from various data sources

- Datasets are transformed to be compatible with one another. This transformation is called schema-on-write as schema is applied before data is loaded into data warehouse

- We can now use the data in the data warehouse to look at trends, query, run analysis

49
New cards

Data mart

contains a subset of data warehouse information

50
New cards

3 different types of data marts

- Dependent - draws on existing data warehouse, constructed using top down approach

- Independent - created without the use of a data warehouse, constructed using a bottom up approach, this is usually not optimal

- Hybrid - combines data from dependent and independent data marts. Only a hybrid data mart allows analysis of data from a data warehouse with data from other sources

51
New cards

Data lake

a storage repository that holds a vast amount of raw data in its original format until the business needs it. Data lake uses NoSQL language to analyze and query data

52
New cards

Enterprise performance management

Software to monitor and manage the performance of an organization in reaching its performance goals. Aids in the process of linking strategies to plans and execution. It is designed to gather data from multiple sources and consolidate it to support performance measurement

53
New cards

Examples of EPM capabilities

- Reports comparing actual performance to goals

- Reports on attainment of KPIs

- Balanced scorecards, strategy maps

- Creating and revising forecasts

- Generating dashboard for business needs at the time

54
New cards

Data governance

Refers to the overall management of the availability, usability, integrity, and security of company data

55
New cards

Data management

Part of data governance. Involves creating data, collecting, storing, maintaining, securing, archiving, destroying, and using it to add value to a business.

56
New cards

Main components of data management

- Data availability

- Data usability

- Data integrity

- Data security

- Data privacy

- Data integration

- System availability

- Compliance with regulations

- Determination of roles and responsibilities

57
New cards

Benefits of IT Frameworks

- Identify specific roles and responsibilities

- Provide a benchmark for assessing risks and controls

- Following a framework provides a higher likelihood of implementing effective governance and controls

- Frameworks break down objectives and activities into groups

- regulatory compliance may be easier to achieve

58
New cards

Committee of Sponsoring Organizations

Consists of 5 professional organizations that created one of the first internal control frameworks in 1992.

59
New cards

Principles of Control Environment for COSO for data governance

- Standards for integrity, ethical behavior, competence, and accountability for the organization including data governance

- Oversight of data governance may be carried out by an IT committee of the board of directors

- Governance over data would include establishment of access privileges to data appropriate to individuals' need for information

60
New cards

Principles of Risk Assessment for COSO for risk governance

- Risks to data should be identified and analyzed, because data breaches, loss of data, and corruption of data can bring down an entire organization

- Fraud related to data should be investigated including fraudulent changes made to data and preventive controls are needed

61
New cards

Control activities related to data governance

Policies, procedures, and rules that provide reasonable assurance that control objectives are met and risk responses are carried out. This is applied to data governance as management should establish appropriate controls over technology infrastructure to help ensure the completeness and accuracy of the data.

62
New cards

Information and communication and data governance

Data should be captured internally as well as from external sources and information should be able to be transformed by the IT systems. Information should be protected and retained

63
New cards

Monitoring activities and data governance

- Internal controls over data need to be evaluated on an ongoing basis

- Any deficiencies need to be evaluated and communicated in a timely manner for corrective action.

64
New cards

Data life cycle

The sequence of stages that data experiences, which include plan, capture, manage, analyze, archive, and destroy

65
New cards

What are the phases of the data life cycle related to data capture?

Data capture includes acquisition, data entry, and signal reception.

66
New cards

What is involved in the data qualifying phase of the data life cycle?

Data qualifying includes assessing captured data for quality and completeness.

67
New cards

What is the focus of the data maintenance phase in the data life cycle?

Data maintenance involves processing data before deriving value from it, with a governance issue related to data supply.

68
New cards

What does the data transformation phase of the data life cycle entail?

Data transformation involves creating new data values using other data as input, with governance concerns about data ownership and citation.

69
New cards

What is the purpose of the data usage phase in the data life cycle?

Data usage involves applying data to tasks, with a governance challenge related to legal use of data.

70
New cards

What does the data analytics phase of the data life cycle focus on?

Data analytics involves analyzing data internally to produce meaningful results, with governance challenges related to data accuracy and reporting.

71
New cards

What is meant by data publication or reporting in the data life cycle?

Data publication or reporting refers to sending data outside the organization, with a governance issue of irreversibility once data is sent out.

72
New cards

What is the purpose of data archival in the data life cycle?

Data archival involves removing data from active environments, with data governance defining archiving procedures.

73
New cards

What is the significance of data purging in the data life cycle?

Data purging occurs at the end of the data's life cycle, with data governance establishing purging schedules.

74
New cards

Records management

Establishes how records are to be maintained, identified, retrieved, preserved, and when and how they will be destroyed

75
New cards

Factors to be considered in developing records management policy

- Federal, state, and local document retention requirements

- Requirements of Sarbanes-Oxley Act of 2002

- Statute of limitations information

- Accessibility

- Record of records

76
New cards

Benefits of a documented records management policy

- Locating documents is easier

- In the event of a lawsuit, having a records management system that is consistently followed demonstrates a reasonable purpose for destroying records

- Having a good policy increases chances of organization's compliance

- Records will be adequately protected

- Records that are no longer needed will be destroyed

77
New cards

Sources of cyberattacks

- Hackers - Looking to cause harm or have fun, not necessarily financially motivated

- Hacktivists - Have a specific motivation that may not be money

- Cybercriminals - Usually seeking some sort of payoff from company they are targeting

- Employees - Could be disgruntled employees

- Competitors - Would fall under corporate espionage

- Foreign states - rarely happens

78
New cards

Denial of Service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources. Hackers gain access of internet of things devices and use malware tools to create a botnet

79
New cards

Buffer overflow attacks

Designed to send lots of data to a computer causing the system to crash, permitting the attacker to run malicious code

80
New cards

Man-in-the-middle attack

Is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

81
New cards

Password attacks

Password attacks are attempts to gain unauthorized access to a system by guessing or cracking passwords

82
New cards

Malware

Broadly refers to malicious software. Some examples include:

- Spyware - can secretly gather data off your PC

- Other types can turn a PC into a "bot" or "zombie" giving hackers full access

- Rootkits - Allow for remote access to a computer

83
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it. there is usually a key to unlock this data only the attacker knows

84
New cards

Zero-day exploit

A vulnerability that is exploited before the software creator/vendor is even aware of its existence.

85
New cards

pay per click abuse

Fraudulent clicks on paid online search ads. Usually run by one company against another

86
New cards

Logic bomb

A computer program or part of a program that lies dormant until it is triggered by a specific logical event. Once triggered they execute a malicious task

87
New cards

Tampering

Making unauthorized changes to a system, usually illegally

88
New cards

Copyright infringement

Theft and replication of copyrighted material

89
New cards

Phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail

90
New cards

Defenses against cyberattacks

- Encyrption

- Ethical hackers

- Advanced firewalls

- Access controls

- 2FA

- Physical access controls

91
New cards

Encryption

Encrypts data so if hacker gains access to data it is unreadable. Encryption protects both stored data and data that could be intercepted during transmission

92
New cards

Ethical hackers

Users who attempt to break into a computer system or network with the owner's permission. Ethical hacking methods include:

- Vulnerability testing: Scanning networks, systems, and applications to find vulnerabilities

- Penetration testing: If an ethical hacker finds a vulnerability, it will attempt to exploit those weaknesses

93
New cards

Advanced firewalls

Called Next Generation Firewalls. Can filter packets based on applications and distinguish between safe and unsafe applications. This means they can block malware from entering network

94
New cards

Access controls

Logical access controls - focus on who can use which computer equipment and who can access data. To restrict data only to authorized users, one or more of the following strategies can be used:

- Something you know

- Something you are

- Something you have

Physical access controls - Focus on physical security

- Walls and fences

- Locked gates and doors

- Manned security posts, security cameras

- Guard dogs, alarm systems

95
New cards

Something you know strategy

- Most common is user id and passwords.

96
New cards

Something you are strategy

- Biometrics is the most common form. Can recognize physical characteristics such as eyes, fingerprints, faces, voices.

97
New cards

Something you have

Requires the presence of a physical object to verify a user's identity

98
New cards

2FA examples

- Security questions

- Passwords linked to biometrics

- Verification codes

- Biometric scan combined with a code from a dob

99
New cards

User access considerations to prevent fraud

- Automatic locking or logoff policies

- Logs of all login attempts

- Accounts that automatically expire

100
New cards

System development life cycle

Formal set of activities used to develop and implement a new or modified information system