ACC 321 Exam 2 Flashcards

1
Q

Creating cash using the lag between the time a check is deposited and the time it clears the bank.

A

Check kiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Concealing the theft of cash by means of a series of delays in posting collections to accounts receivable.

A

Lapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A text file created by a website and stored on a visitor’s hard drive.

  • store information about who the user is and what the user has done on the site.
A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Examples include bribery and bid rigging.

A

Corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Misrepresenting or leaving out facts in order to promote an investment that promises fantastic profits with little or no risk. Examples include Ponzi schemes and securities fraud.

A

Investment fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any type of fraud that requires computer technology to perpetrate.

A

Computer fraud or cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any and all means a person uses to gain an unfair advantage over another person.

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements

A

Fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Theft of company assets by employees.

A

Misappropriation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to personal gain.

A

Opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person’s incentive or motivation for committing fraud.

A

Pressure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The excuse that fraud perpetrators use to justify their illegal behavior.

A

Rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An intentional act where the intent is to destroy a system or some of its components.

A

Sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Typically, businesspeople who commit fraud.

  • usually resort to trickery or cunning, and their crimes usually involve a violation of trust or confidence.
A

White-collar criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware that causes banner ads to pop up on a monitor, collects information about the user’s web-surfing and spending habits, and forwards it to the adware creator, often an advertising or media organization.

  • usually comes bundled with freeware and shareware downloaded from the Internet.
A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gaining control of someone else’s computer to carry out illicit activities, such as sending spam without the computer user’s knowledge.

A

Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hijacked computers, typically part of a botnet, that are used to launch a variety of Internet attacks.

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The person who creates a botnet by installing software on PCs that responds to the bot herder’s electronic instructions. This control over the PCs allows the ______ to mount a variety of Internet attacks.

A

bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Trial-and-error method that uses software to guess information, such as the user ID and the password, needed to gain access to a system.

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Recovering passwords by trying every possible combination of upperand lower-case letters, numbers, and special characters and comparing them to a cryptographic hash of the password.

A

Password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When the amount of data entered into a program is greater than the amount of the input buffer. The input overflow overwrites the next computer instruction, causing the system to crash. Hackers exploit this by crafting the input so that the overflow contains code that tells the computer what to do next. This code could open a back door into the system.

A

Buffer overflow attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

(insertion) Inserting a malicious SQL query in input such that it is passed to and executed by an application program. This allows a hacker to convince the application to run SQL code that it was not intended to execute.

A

SQL injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Taking control of someone else’s phone to make or listen to calls, send or read text messages, connect to the Internet, forward the victim’s calls, and call numbers that charge fees.

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Making a sender address and other parts of an e-mail header appear as though the e-mail originated from a different source.

A

E-mail spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Displaying an incorrect number on the recipient’s caller ID display to hide the caller’s identity.

A

Caller ID spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Activities performed on stolen credit cards, including making a small online purchase to determine whether the card is still valid and buying and selling stolen credit card numbers.

A

Carding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Planting a small chip that records transaction data in a legitimate credit card reader. The chip is later removed or electronically accessed to retrieve the data recorded on it.

A

Chipping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A fake EMV chip is inserted in a stolen card. When a purchase is declined, the perpetrator persuades the clerk to let the card be swiped, thereby bypassing the EMV verification.

A

EMV chip bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

(XSS) A vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanisms and instruct the victim’s browser to execute code, thinking it came from the desired website.

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Hacking into and hijacking computing resources to mine cryptocurrency, thereby avoiding costs that can outweighs the value of the crypto mined.

A

Crypto jacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hacking into a wallet or using social engineering tactics to trick a person into revealing the digital keys needed to access their blockchain account.

A

Crypto wallet attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Manipulating the number of times an ad is clicked on to inflate advertising bills. Companies advertising online pay from a few cents to over $10 for each click on their ads.

A

Click fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The unauthorized copying or distribution of copyrighted software.

A

Software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Threatening to harm a company or a person if a specified amount of money is not paid.

A

Cyberextortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Software that encrypts programs and data until a ransom is paid to remove it.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Using computer technology to support deliberate, repeated, and hostile behavior that torments, threatens, harasses, humiliates, embarrasses, or otherwise harms another person.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A computer attack in which the attacker sends so many e-mail bombs or web page requests, often from randomly generated false addresses, that the Internet service provider’s e-mail server or the web server is overloaded and shuts down.

A

Denial-of-service attack (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Software that generates user ID and password guesses using information about the targeted company and a dictionary of possible user IDs and passwords to reduce the number of guesses required.

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Listening to private communications or tapping into data transmissions intended for someone else. One way to intercept signals is by setting up a wiretap.

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Double-swiping a credit card in a legitimate terminal or covertly swiping a credit card in a small, hidden, handheld card reader that records credit card data for later use.

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Theft of information, trade secrets, and intellectual property.

A

Economic espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Threats sent to victims by e-mail. The threats usually require some follow-up action, often at great expense to the victim.

A

E-mail threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Using an Internet auction site to defraud another person.

A

Internet auction fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Techniques which use malware to infect online checkout pages and steal a customer’s personal and payment information.

A

E-skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A wireless network with the same name (Service Set Identifier) as a legitimate wireless access point.

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Setting up similarly named websites so that users making typographical errors when entering a website name are sent to an invalid site.

A

Typosquatting/URL hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Unauthorized access, modification, or use of an electronic device or some element of a computer system.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Making a sender address and other parts of an e-mail header appear as though the e-mail originated from a different source.

A

E-mail spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Assuming someone’s identity, usually for economic gain, by illegally obtaining confidential information such as a Social Security number or a bank account or credit card number.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Using the Internet to spread false or misleading information.

A

Internet misinformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Using the Internet to pump up the price of a stock and then sell it.

A

Internet pump-and-dump fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Software that records computer activity, such as a user’s keystrokes, e-mails sent and received, websites visited, and chat session participation.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Inserting a sleeve into an ATM that prevents it from ejecting the card. The perpetrator pretends to help the victim, tricking the person into entering the PIN again. Once the victim gives up, the thief removes the card and uses it and the PIN to withdraw money.

A

Lebanese looping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Any software that is used to do harm.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A hacker placing himself between a client and a host to intercept communications between them; also called session hijacking.

A

Man-in-the-middle attack (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Gaining access to a system by pretending to be an authorized user. This requires that the perpetrator know the legitimate user’s ID and passwords.

A

Masquerading/impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

(1) Tapping into a communications line and electronically latching onto a legitimate user who unknowingly carries the perpetrator into the system.

(2) The clandestine use of a neighbor’s Wi-Fi network.

(3) An unauthorized person following an authorized person through a secure door, bypassing physical security controls.

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Programs that capture data from information packets as they travel over the Internet or company networks. Captured data is sifted to find confidential or proprietary information.

A

Packet sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A program that can merge confidential information with a seemingly harmless file, password protect the file, and send it anywhere in the world, where the file is unlocked and the confidential information is reassembled.

The host file can still be heard or viewed because humans are not sensitive enough to pick up the slight decrease in image or sound quality.

A

Steganography program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Software program flaws that a hacker can exploit to either crash a system or take control of it.

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

An attack between the time a new software vulnerability is discovered and “released into the wild” and the time a software developer releases a patch to fix the problem.

A

Zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Code released by software developers that fixes a particular vulnerability.

A

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Attacking phone systems to obtain free phone line access; use phone lines to transmit malware; and to access, steal, and destroy data.

A

Phreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Sending an electronic message pretending to be a legitimate company, usually a financial institution, and requesting information or verification of information and often warning of a consequence if it is not provided. The request is bogus, and the information gathered is used to commit identity theft or to steal funds from the victim’s account.

66
Q

Redirecting website traffic to a spoofed website.

67
Q

Using an invented scenario (the pretext) that creates legitimacy in the target’s mind in order to increase the likelihood that a victim will divulge information or do something.

A

Pretexting

68
Q

Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the product.

69
Q

Using a small device with storage capacity (iPod, flash drive) to download unauthorized data from a computer.

A

Podslurping

70
Q

Stealing tiny slices of money from many different accounts.

A

Salami technique

71
Q

Instructing the computer to round down all interest calculations to two decimal places. The fraction of a cent rounded down on each calculation is put into the programmer’s account. Most frequently found in financial institutions that pay interest.

A

Round-down fraud

72
Q

Exchanging sexually explicit text messages and revealing pictures with other people, usually by means of a phone.

73
Q

A means of concealing system components and malware from the operating system and other programs; can also modify the operating system.

74
Q

A segment of executable code that attaches itself to a file, program, or some other executable system component. When the hidden program is triggered, it makes unauthorized alterations to the way a system operates.

75
Q

Malicious software of no benefit that is sold using scare tactics.

76
Q

Searching documents and records to gain access to confidential information.

  • methods include searching garbage cans, communal trash bins, and city dumps.
A

Scavenging/dumpster diving

77
Q

When perpetrators look over a person’s shoulders in a public place to get information such as ATM PIN numbers or user IDs and passwords.

A

Shoulder surfing

78
Q

The unauthorized copying or distribution of copyrighted software.

A

Software piracy

79
Q

The techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network. It is usually to get the information needed to obtain confidential data.

A

Social engineering

80
Q

Phishing except that texts are used to induce unsuspecting recipients to disclose personal information.

81
Q

Software that secretly monitors computer usage, collects personal information about users, and sends it to someone else, often without the computer user’s permission.

82
Q

Altering some part of an electronic communication to make it look as if someone else sent the communication in order to gain the trust of the recipient.

83
Q

Using short message service (SMS) to change the name or number a text message appears to come from.

A

SMS spoofing

84
Q

Sending an electronic message pretending to be a legitimate company, usually a financial institution, and requesting information or verification of information and often warning of a consequence if it is not provided. The request is bogus, and the information gathered is used to commit identity theft or to steal funds from the victim’s account.

A

Web-page spoofing

85
Q

Simultaneously sending the same unsolicited message to many people, often in an attempt to sell them something.

86
Q

A program that lies idle until some specified circumstance or a particular time triggers it. Once triggered, the program sabotages the system by destroying programs or data.

A

Time bomb/logic bomb

87
Q

A set of computer instructions that allows a user to bypass the system’s normal controls.

A

Trap door/back door

88
Q

A set of unauthorized computer instructions in an authorized and otherwise properly functioning program.

A

Trojan horse

89
Q

Software that destroys competing malware. This sometimes results in “malware warfare” between competing malware developers.

A

Torpedo software

90
Q

Voice phishing; it is like phishing except the victim enters confidential data by phone.

91
Q

Programming a computer to dial thousands of phone lines searching for dialup modem lines. Hackers hack into the PC attached to the modem and access the network to which it is connected.

A

War dialing

92
Q

Driving around looking for unprotected home or corporate wireless networks.

A

War driving

93
Q

Similar to a virus, except that it is a program rather than a code segment hidden in a host program.

  • also copies itself automatically and actively transmits itself directly to other systems.
94
Q

The examination of the relationships between different sets of data; abnormal or unusual relationships and trends should be further investigated.

A

Analytical review

95
Q
  • Controls that prevent, detect, and correct transaction errors and fraud in application programs.
  • They are concerned with the accuracy, completeness, validity, and authorization of the data captured, entered into the system, processed, stored, transmitted to other systems, and reported.
A

Application controls

96
Q

The outside, independent board of director members responsible for financial reporting, regulatory compliance, internal control, and hiring and overseeing internal and external auditors.

A

Audit committee

97
Q
  • A path that allows a transaction to be traced through a data processing system from point of origin to output or backwards from output to point of origin.
  • It is used to check the accuracy and validity of ledger postings and to trace changes in general ledger accounts from their beginning balance to their ending balance.
A

Audit trail

98
Q

The process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform.

A

Authorization

99
Q

An investigation of a prospective or current employee that involves verifying their educational and work experience, talking to references, checking for a criminal record or credit problems, and examining other publicly available information.

A

Background checks

100
Q

System that describes how a company creates value, helps employees understand management’s vision, communicates company core values, and inspires employees to live by those values.

A

Belief system

101
Q

System that helps employees act ethically by setting boundaries on employee behavior. Instead of telling employees exactly what to do, they are encouraged to creatively solve problems and meet customer needs while meeting minimum performance standards, shunning off-limit activities, and avoiding actions that might damage their reputation.

A

Boundary system

102
Q

Process of making sure changes are made smoothly and efficiently and do not negatively affect the system.

A

Change management

103
Q

(CCO) An employee responsible for all the compliance tasks associated with SOX and other laws and regulatory rulings.

A

Chief compliance officer

104
Q

Cooperation between two or more people in an effort to thwart internal controls.

105
Q

(COSO) A privatesector group consisting of the American Accounting Association, the AICPA, the Institute of Internal Auditors, the Institute of Management Accountants, and the Financial Executives Institute.

A

Committee of Sponsoring Organizations

106
Q

Computer experts who discover, extract, safeguard, and document computer evidence such that its authenticity, accuracy, and integrity will not succumb to legal challenges.

A

Computer forensics specialists

107
Q

People who operate the company’s computers. They ensure that data are input properly, processed correctly, and that needed output is produced

A

Computer operators

108
Q

(CSO) An employee independent of the information system function who monitors the system, disseminates information about improper system uses and their consequences, and reports to top management.

A

Computer security officer

109
Q

Policies, procedures, and rules that provide reasonable assurance that control objectives are met and risk responses are carried out.

A

Control activities

110
Q

The company culture that is the foundation for all other internal control components, as it influences how organizations establish strategies and objectives; structure business activities; and identify, assess, and respond to risk.

A

Control environment

111
Q

(COBIT) A security and control framework that allows
(1) management to benchmark the security and control practices of IT environments,

(2) users of IT services to be assured that adequate security and control exist, and

(3) auditors to substantiate their internal control opinions and advise on IT security and control matters.

A

Control Objectives for Information and Related Technology

112
Q

Controls that identify and correct problems as well as correct and recover from the resulting errors, such as maintaining backup copies of files, correcting data entry errors, and resubmitting transactions for subsequent processing.

A

Corrective controls

113
Q

Controls designed to discover control problems that were not prevented, such as duplicate checking of calculations and preparing bank reconciliations and monthly trial balances.

A

Detective controls

114
Q

Controls that deter problems before they arise, such as hiring qualified accounting personnel; appropriately segregating employee duties; and effectively controlling physical access to assets, facilities, and information.

A

Preventive controls

115
Q

People who ensure that source data is approved, monitor the flow of work, reconcile input and output, handle input errors, and distribute systems output.

A

Data control

116
Q

People responsible for making sure a system operates smoothly and efficiently.

A

Systems administrators

117
Q

People who ensure that the organization’s networks operate properly.

A

Network Managers

118
Q

People who make sure systems are secure and protected from internal and external threats.

A

Security Management

119
Q

Process of making sure changes are made smoothly and efficiently and do not negatively affect the system.

A

Change management

120
Q

An executive-level committee to plan and oversee the information systems function; it typically consists of management from systems and other areas affected by the information systems function

A

Steering committee

121
Q

A multiple-year plan of the projects the company must complete to achieve its long-range goals.

A

Strategic master plan

122
Q

Document showing project requirements (people, hardware, software, and financial), a cost–benefit analysis, and how a project will be completed (modules or tasks to be performed, who will perform them, and completion dates).

A

Project development plan

123
Q

Points where progress is reviewed and actual and estimated completion times are compared.

A

Project milestones

124
Q

A schedule that shows when each data processing task should be performed.

A

Data processing schedule

125
Q

Ways to evaluate and assess a system. Common measurements include throughput (output per unit of time), utilization (percentage of time the system is being productively used), and response time (how long it takes the system to respond).

A

System performance measurements

126
Q

(1) The total amount of useful work performed by a computer system during a given period of time.

(2) The number of “good” units produced in a given period of time.

A

Throughput

127
Q

The percentage of time a system is used.

A

Utilization

128
Q

How long it takes for a system to respond, such as the amount of time that elapses between making a query and receiving a response.

A

Response time

129
Q

An outside party hired to manage a company’s systems development effort.

A

Systems integrator

130
Q

System that measures, monitors, and compares actual company progress to budgets and performance goals; feedback helps management adjust and fine-tune inputs and processes so future outputs more closely match goals.

A

Diagnostic control system

131
Q

A hash encrypted with the hash creator’s private key.

A

Digital signature

132
Q

The mathematical product of the potential dollar loss that would occur should a threat become a reality (called impact or exposure) and the risk or probability that the threat will occur (called likelihood).

A

Expected loss

133
Q

Any potential adverse occurrence or unwanted event that could injure the AIS or the organization. Also referred to as an event.

134
Q

The potential dollar loss if a particular threat becomes a reality.

A

Exposure/impact

135
Q

The probability that a threat will come to pass.

A

Likelihood/risk

136
Q

(FCPA) Legislation passed to prevent companies from bribing foreign officials to obtain business; also requires all publicly owned corporations maintain a system of internal accounting controls.

A

Foreign Corrupt Practices Act

137
Q

Individuals who specialize in fraud, most of whom have specialized training with law enforcement agencies such as the FBI or IRS or have professional certifications such as Certified Fraud Examiner (CFE).

A

Forensic investigators

138
Q

A phone number employees can call to anonymously report fraud and abuse.

A

Fraud hotline

139
Q

The authorization given employees to handle routine transactions without special approval.

A

General authorization

140
Q

Controls designed to make sure an organization’s information system and control environment is stable and well managed, such as security; IT infrastructure; and software acquisition, development, and maintenance controls.

A

General controls

141
Q

The susceptibility of a set of accounts or transactions to significant control problems in the absence of internal control.

A

Inherent risk

142
Q

The risk that remains after management implements internal controls or some other response to risk.

A

Residual risk

143
Q

System that helps managers to focus subordinates’ attention on key strategic issues and to be more involved in their decisions; system data are interpreted and discussed in face-to-face meetings of superiors, subordinates, and peers.

A

Interactive control system

144
Q

The processes and procedures implemented to provide reasonable assurance that control objectives are met.

A

Internal controls

145
Q

(IC) A COSO framework that defines internal controls and provides guidance for evaluating and enhancing internal control systems; widely accepted authority on internal controls incorporated into policies, rules, and regulations used to control business activities.

A

Internal Control—Integrated Framework

146
Q

People who ensure that the organization’s networks operate properly.

A

Network managers

147
Q

Computing systems that imitate the brain’s learning process by using a network of interconnected processors that perform multiple operations simultaneously and interact dynamically.

A

Neural networks

148
Q

A document that explains proper business practices, describes needed knowledge and experience, explains document procedures, explains how to handle transactions, and lists the resources provided to carry out specific duties; it includes the chart of accounts, copies of forms and documents, and is a helpful on-the-job reference and training tool.

A

Policy and procedures manual

149
Q

Review made after a new system has been operating for a brief period to ensure that the new system is meeting its planned objectives, identify the adequacy of system standards, and review system controls.

A

Postimplementation review

150
Q

People who use the analysts’ design to create and test computer programs.

A

Programmers

151
Q

(PCAOB) A board created by SOX that regulates the auditing profession; created as part of SOX.

A

Public Company Accounting Oversight Board

152
Q

The amount of risk a company is willing to accept to achieve its goals and objectives. To avoid must be in alignment with company strategy.

A

Risk appetite

153
Q

(SOX) Legislation intended to prevent financial statement fraud, make financial reports more transparent, provide protection to investors, strengthen internal controls at public companies, and punish executives who perpetrate fraud.

A

Sarbanes–Oxley Act

154
Q

Separating the accounting functions of authorization, custody, and recording to minimize an employee’s ability to commit fraud.

A

Segregation of accounting duties

155
Q

Implementing control procedures to clearly divide authority and responsibility within the information system function.

A

Segregation of systems duties

156
Q

Special approval an employee needs in order to be allowed to handle a transaction.

A

Specific authorization

157
Q

An executive-level committee to plan and oversee the information systems function; it typically consists of management from systems and other areas affected by the information systems function.

A

Steering committee

158
Q

People who help users determine their information needs, study existing systems and design new ones, and prepare specifications used by computer programmers

A

Systems analysts

159
Q

An outside party hired to manage a company’s systems development effort.

A

Systems integrator

160
Q

People who record transactions, authorize data processing, and use system output.