Accounting Information Systems Question Extravaganza!!
Watch this threadPage 1 of 1
kevey320
Badges:
4
Rep:
?
You'll earn badges for being active around the site. Rep gems come when your posts are rated by other community members.
#1
From AIS Book by Romney
Production Cycle is designed to ensure that
List applicable control for each threat
Examples of 'taxonomy' and 'schema'
Linkbases for: relevant accounting standards, how to summarise elements and hierarchal relationships
Tagging your data from excel using XBRL software ______
Advantages and disadvantages of Electronic data interchange
Two different ways of storing data
Examples of master transaction reference report backup and archive/history files
Examples of sequence block group and mneomic codes
In a database the data is ______ to ensure data integrity and maintain data quality, the data is ______ into an agreed schema, the data can be ______ by a shared community and the data can be ______
Database audience:
Programmer:______
Administrator: ______
End user: ______
Physical database
Storage Media: ______
Examples of physical and logical views
Database approach: advantages and disadvantages
Four key components of e-commerce
Five factors that have a direct influence on the business infrastructure of the company
Three terms commonly used to describe retail e-commerce
______ company
______ company
______ company
Examples of B2B2C, C2C, C2B2C
Two parts of a company e-commerce website
Retailing resource comprises of
______
______
______
Three methods that can be used to process/receive online payments
To use an internet merchant account a company must have what?
E-money can be
______
______
And either
______
______
Two types of m-commerce
8 legal issues for e-commerce managers
Data protection act 1998 appropiate measures include
______
______
______
______
3 Key features of consumer protection regulation 2000
4 principles of accesibility of web content
Risk is defined as _______
Precautioanry principle 3 levels
In order apply these levels you need to understand the following
______
______
______
Risk assessment 4 stages
Fraud can be defined as ______ (3 different examples)
Examples of computer assisted fraud
Company response to fraud
undertake a ______ and establish a fraud management strategy
develop a ______
Examples of cyber-terrorism
Three factors always present in computer case or fraud
Possible prevention strategies include
______
______
______
______
______
______
ICT and technologies include the use of
______
______
______
______
______
______
Effective internal control requires
an understanding of ______,______,______
an ______, an assessment of ______ channels
Control activites
______
______
______
______
______
______
General controls are generally classified into the following categories
______
______
______
______
______
______
Application controls generally classified into following categories
______
______
______
Examples of input controls include...
Examples of processing controls include...
Examples of output controls include...
Internal control, consequences of failure and:
______
______
______
______
3 forms of systems failure
DCRP consists of
______
______
4 stages of recovery protocol
Types of compliance audit
______
______
______
Audit evidence must be;
______,______,_____,______,______
Examples of generic audit software
generic audit software advantages and disadvantages
Embedded audit module advantage and disadvantages
Inputting test data advantages and disadvantages
Test data using integrated test faclilities Advantages and disadvantages
Parallel simulation advantages and disadvantages
Why are real time systems an issue for the auditor
The verification of ______, the authentication of ______, the confirmation of ______
4 key reasons for change management
who manages change
systems developing planning stage 4 interrelated phases
4 approaches to systems conversion
Production Cycle is designed to ensure that
- all transactions are properly______
- all recorded transactions are______(have actually occured)
- all valid, authorised transactions have been ______
- Assets are ______ from loss or theft
- Business activites are performed ______ and ______
List applicable control for each threat
- Poor product design
- over/under production
- suboptimal investment in fixed assets
- theft/destruction of inventory and fixed assets
- disruption of operations
- inaccurate cost data
- loss, altercation or unauthorised disclosure of data
- poor performance
Examples of 'taxonomy' and 'schema'
Linkbases for: relevant accounting standards, how to summarise elements and hierarchal relationships
Tagging your data from excel using XBRL software ______
Advantages and disadvantages of Electronic data interchange
Two different ways of storing data
Examples of master transaction reference report backup and archive/history files
Examples of sequence block group and mneomic codes
In a database the data is ______ to ensure data integrity and maintain data quality, the data is ______ into an agreed schema, the data can be ______ by a shared community and the data can be ______
Database audience:
Programmer:______
Administrator: ______
End user: ______
Physical database
Storage Media: ______
Examples of physical and logical views
Database approach: advantages and disadvantages
Four key components of e-commerce
Five factors that have a direct influence on the business infrastructure of the company
Three terms commonly used to describe retail e-commerce
______ company
______ company
______ company
Examples of B2B2C, C2C, C2B2C
Two parts of a company e-commerce website
Retailing resource comprises of
______
______
______
Three methods that can be used to process/receive online payments
To use an internet merchant account a company must have what?
E-money can be
______
______
And either
______
______
Two types of m-commerce
8 legal issues for e-commerce managers
Data protection act 1998 appropiate measures include
______
______
______
______
3 Key features of consumer protection regulation 2000
4 principles of accesibility of web content
Risk is defined as _______
Precautioanry principle 3 levels
In order apply these levels you need to understand the following
______
______
______
Risk assessment 4 stages
Fraud can be defined as ______ (3 different examples)
Examples of computer assisted fraud
Company response to fraud
undertake a ______ and establish a fraud management strategy
develop a ______
Examples of cyber-terrorism
Three factors always present in computer case or fraud
Possible prevention strategies include
______
______
______
______
______
______
ICT and technologies include the use of
______
______
______
______
______
______
Effective internal control requires
an understanding of ______,______,______
an ______, an assessment of ______ channels
Control activites
______
______
______
______
______
______
General controls are generally classified into the following categories
______
______
______
______
______
______
Application controls generally classified into following categories
______
______
______
Examples of input controls include...
Examples of processing controls include...
Examples of output controls include...
Internal control, consequences of failure and:
______
______
______
______
3 forms of systems failure
DCRP consists of
______
______
4 stages of recovery protocol
Types of compliance audit
______
______
______
Audit evidence must be;
______,______,_____,______,______
Examples of generic audit software
generic audit software advantages and disadvantages
Embedded audit module advantage and disadvantages
Inputting test data advantages and disadvantages
Test data using integrated test faclilities Advantages and disadvantages
Parallel simulation advantages and disadvantages
Why are real time systems an issue for the auditor
The verification of ______, the authentication of ______, the confirmation of ______
4 key reasons for change management
who manages change
systems developing planning stage 4 interrelated phases
4 approaches to systems conversion
0
reply
X
Page 1 of 1
Quick Reply
Back
to top
to top