kevey320
Badges: 4
Rep:
?
#1
Report Thread starter 6 years ago
#1
From AIS Book by Romney

Production Cycle is designed to ensure that

  • all transactions are properly______
  • all recorded transactions are______(have actually occured)
  • all valid, authorised transactions have been ______
  • Assets are ______ from loss or theft
  • Business activites are performed ______ and ______


List applicable control for each threat
  • Poor product design
  • over/under production
  • suboptimal investment in fixed assets
  • theft/destruction of inventory and fixed assets
  • disruption of operations
  • inaccurate cost data
  • loss, altercation or unauthorised disclosure of data
  • poor performance


Examples of 'taxonomy' and 'schema'

Linkbases for: relevant accounting standards, how to summarise elements and hierarchal relationships

Tagging your data from excel using XBRL software ______

Advantages and disadvantages of Electronic data interchange

Two different ways of storing data

Examples of master transaction reference report backup and archive/history files

Examples of sequence block group and mneomic codes

In a database the data is ______ to ensure data integrity and maintain data quality, the data is ______ into an agreed schema, the data can be ______ by a shared community and the data can be ______

Database audience:

Programmer:______
Administrator: ______
End user: ______

Physical database
Storage Media: ______

Examples of physical and logical views

Database approach: advantages and disadvantages

Four key components of e-commerce
Five factors that have a direct influence on the business infrastructure of the company

Three terms commonly used to describe retail e-commerce
______ company
______ company
______ company

Examples of B2B2C, C2C, C2B2C

Two parts of a company e-commerce website

Retailing resource comprises of
______
______
______

Three methods that can be used to process/receive online payments

To use an internet merchant account a company must have what?

E-money can be
______
______
And either
______
______

Two types of m-commerce

8 legal issues for e-commerce managers

Data protection act 1998 appropiate measures include
______
______
______
______

3 Key features of consumer protection regulation 2000
4 principles of accesibility of web content

Risk is defined as _______

Precautioanry principle 3 levels

In order apply these levels you need to understand the following
______
______
______

Risk assessment 4 stages

Fraud can be defined as ______ (3 different examples)

Examples of computer assisted fraud

Company response to fraud
undertake a ______ and establish a fraud management strategy
develop a ______
Examples of cyber-terrorism

Three factors always present in computer case or fraud

Possible prevention strategies include
______
______
______
______
______
______

ICT and technologies include the use of
______
______
______
______
______
______

Effective internal control requires
an understanding of ______,______,______
an ______, an assessment of ______ channels

Control activites
______
______
______
______
______
______

General controls are generally classified into the following categories
______
______
______
______
______
______

Application controls generally classified into following categories
______
______
______

Examples of input controls include...
Examples of processing controls include...
Examples of output controls include...

Internal control, consequences of failure and:
______
______
______
______

3 forms of systems failure

DCRP consists of
______
______

4 stages of recovery protocol

Types of compliance audit
______
______
______

Audit evidence must be;

______,______,_____,______,_____ _

Examples of generic audit software
generic audit software advantages and disadvantages
Embedded audit module advantage and disadvantages
Inputting test data advantages and disadvantages
Test data using integrated test faclilities Advantages and disadvantages
Parallel simulation advantages and disadvantages


Why are real time systems an issue for the auditor
The verification of ______, the authentication of ______, the confirmation of ______

4 key reasons for change management
who manages change

systems developing planning stage 4 interrelated phases
4 approaches to systems conversion
0
reply
X

Quick Reply

Attached files
Write a reply...
Reply
new posts
Back
to top
Latest
My Feed

See more of what you like on
The Student Room

You can personalise what you see on TSR. Tell us a little about yourself to get started.

Personalise

Have you experienced financial difficulties as a student due to Covid-19?

Yes, I have really struggled financially (21)
13.64%
I have experienced some financial difficulties (42)
27.27%
I haven't experienced any financial difficulties and things have stayed the same (64)
41.56%
I have had better financial opportunities as a result of the pandemic (23)
14.94%
I've had another experience (let us know in the thread!) (4)
2.6%

Watched Threads

View All