AIS Exam 3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/69

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:44 PM on 4/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

70 Terms

1
New cards

What are the three categories of inventory?

  • raw materials

  • work in process

  • finished goods

2
New cards

bill of materials

a list of all raw materials needed for production

3
New cards

operations list

a list of required activities necessary to complete the production of the product

4
New cards

production order

authorization to product product in the manufacturing facility

5
New cards

production reports

reports that show the number of items manufactured on specific dates

6
New cards

quality control reports

a document that summarizes inspections, tests, and findings to ensure products or services meet quality standards

7
New cards

move ticket

follows product on the production floor

8
New cards

materials requisition

a formal, internal document used by employees or departments to request materials, tools, or inventory from a company’s storage area or purchasing department.

9
New cards

What is included in the cost of goods manufactured

beginning balance of work in process, raw materials, labor, overhead estimates

10
New cards

Predetermined Overhead Rate =

estimated overhead / total estimated labor hours

11
New cards

estimated overhead =

POR x Actual Work Hours

12
New cards

Overhead Costs

Costs that are related to manufacturing but unknown as to which product it pertains. i.e. indirect labor, property taxes, depreciation

13
New cards

Payroll Register

list of workers, each worker’s pay rate, tax withholding information, and benefits elections.

14
New cards

time cards

a card used to record an employee's starting and finishing times, usually stamped by a time clock.

15
New cards

employee earnings statement

a document detailing a workers gross pay, deductions, and net pay.

16
New cards

employee contribution summary

outlines the company’s share of payroll taxes, retirement plan contributions, and health insurance premiums, ensuring both employee and employer obligations are accurately recorded before issuing payments and updating the general ledger,

17
New cards

job time ticket

a document used to track the exact time an employee spends on a specific task

18
New cards

payroll services bureau

a company that manages all aspects of payroll processing for other businesses, including calculations, tax withholding, direct deposits, and compliance reporting

19
New cards

human resources management

the strategic approach to managing an organization’s employees to maximize productivity and achieve business goals

20
New cards

employee mastefile

a database containing information about each employee within an organization

21
New cards

soc report

service organization controls report

Attestation report over service company’s internal controls

22
New cards

soc 1 report

Focuses on a service organization's controls that are relevant to a client’s financial reporting. It is primarily used by auditors to ensure that financial data is being handled accurately and securely.

23
New cards

soc 2 report

Evaluates a company's systems based on five "Trust Services Criteria": security, availability, processing integrity, confidentiality, and privacy. It is a technical, deep-dive report often required for service providers who handle sensitive customer data.

24
New cards

soc 3 report

Provides a high-level, summarized version of the SOC 2 report without disclosing confidential or proprietary details. It is designed for public consumption and marketing, essentially acting as the "General Audience" version of a security audit.

25
New cards
term image

document - a physical or digital document. ex. purchase order, email, report, or invoice

26
New cards
term image

Database - data storage, data is input into the database and the data is retrieved for use in business processes.

27
New cards
term image

data input - the manual input of data into a system, such as a user keying in invoice details from an invoice received in hardcopy from the vendor.

28
New cards
term image

manual processing - when documents are prepared or used completely manually. ex. forklift driver writing a picking ticket.

29
New cards
term image

computer processing - when a computer is used to process a business function

30
New cards
term image

flowline - how shapes are connect to show the flow of transaction documents

31
New cards
term image

decision - when a decision is made by either a human or the computer system performing an automatic process

32
New cards
<p></p>

connector - this shape is used to connect processes between swimming lanes or pages

33
New cards
term image

terminal - shows an external party to the process ex. a vendor who is sending a document to the entity or a document is sent to the shipping group. also ends a flow chart.

34
New cards
term image

hardcopy file - when a hardcopy is required. A = Alphabetical, D = Date, N = Numerical

35
New cards

COBIT

Control Objectives for Information Technology

36
New cards

COBIT Elements

  1. access to applications and data

  2. computer operations

  3. program change control

  4. program development

37
New cards

Waterfall Approach

get sign off on one step before we can move to the next step

38
New cards

AICPA Trust Services Framework

  1. security

  2. confidentiality - company info

  3. security - external info

  4. availability - disaster recovery

  5. processing integrity

39
New cards

3 environments

  1. production

  2. test

  3. development

40
New cards

Layers of IT

  • process

  • application

  • database

  • network

  • operating system

  • physical server

41
New cards

encyrption

Encryption is the process of converting data (plaintext) into an unreadable, scrambled format (ciphertext) using algorithms and keys to ensure confidentiality, restricting access only to authorized users with the decryption key

42
New cards

field check

checks to ensure that correct characters are in the correct field

43
New cards

sign check

verifies that data in a field has the correct numeric sign

44
New cards

limit check

tests a numerical approach against a fixed value

45
New cards

range check

checks to ensure that data falls within a predetermined upper and lower limit

46
New cards

size check

ensures certain fields can only be a certain size

47
New cards

completeness check

all order information is entered

48
New cards

validity check

there is similar data in the master file

49
New cards

reasonableness test

two related fields correspond

50
New cards

check digit

ID numbers can contain a check digit computed from other digits in a number

51
New cards

sequence check

an edit check that determines if a bath of input data is in the proper sequence

52
New cards

financial total

sums a field that contains monetary values

53
New cards

hash total

sums a non-financial numeric field

54
New cards

record count

the number of records in a batch

55
New cards

closed loop verification

checks the accuracy of input data by using that data to retrieve and display other related information

56
New cards

cross footing

footed for mathematical accuracy across and down

57
New cards

It Governance

The process that ensures effective and efficient use of IT so a company can achieve goals and provide value

58
New cards

Security

the overarching principle - access to the system and its data is controlled and restricted to legitimate users

59
New cards

confidentiality

sensitive organizational information is protected from unauthorized disclosures

60
New cards

privacy

personal information about customers, employees, suppliers, or business partners is collected, used, and disclosed and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure.

61
New cards

processing integrity

data are processed accurately, completely, and in a timely manner, with proper authorization

62
New cards

availability

business continuity (operations) and disaster recovery (technology)

the systems and its information are available to meet obligations

63
New cards

Time based model of security

P > D+R

penetration > detection and response

does it take longer for someone to penetrate the system than it does to detect and respond.

64
New cards

Firewall

Controls inbound and outbound communications. hardware or software running on a general purpose computer.

65
New cards

Patch Management

Process of regularly applying patches and updates to software

66
New cards

Hardening

The process of modifying the default configuration of endpoints to eliminate unnecessary settings and services.

67
New cards

vulnerability assessment vs penetration study

  1. penetration study is having a company hired to try and hack into the system

  2. vulnerability assessment - a company is hired to assess a system for vulnerability and identify it.

68
New cards

log analysis

the process of examining logs to identify evidence of possible attacks. i.e. which user ID’s try to do what.

69
New cards

intrusion detection systems

systems that create logs of all network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions.

70
New cards

Processing Overarching Goals

  1. Ensure data is entered completely, accurately, and in a timely manner

  2. errored data is identified, corrected, and resubmitted in a timely manner

  3. master data is updated in a timely manner

  4. management reports identify unusual transactions