Final Flashcards

1
Q

Data Analysis Cycle

A

 Data capture
 Extraction
 Data preparation
 Data analysis
 Communicating insights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

big data Four V’s

A

 Volume = mass of data
 Velocity = real time speeds
 Variety = unstructured or unprocessed data
 Veracity = quality of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SMART questions

A

o Specific
o Measurable
o achievable
o Relevant
o Timely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data structure types

A

o Structured, unstructured, and semi-structured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Structured query language

A

o Common way to extract data from a relational database (SELECT, FROM, WHERE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Prep Steps

A

 Understand data
 Standardize, structure, clean
 Validate data quality and verify data meets requirements
 Document transformation process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

aggregate

A

presentation of data in summarized form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data joining

A

process of combining different data sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

data pivoting

A

rotating data from rows to columns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

parsing

A

separating data from a single field to multiple fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

concatenation

A

combining from multiple fields to single field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cryptic data values

A

data items with no meaning without understanding a coding scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

misfielded data values

A

data values that are correctly formatted but not listed in correct field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

consistency

A

every value in a field should be stored in the same way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

imputation

A

process of replacing null or missing value with substituted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

contradiction errors

A

errors exist when the same entity is described in 2 conflicting ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

threshold violation

A

errors that occur when a data value falls outside an allowable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

violated attribute dependencies

A

errors occur when a secondary attribute in row of data does not match the primary attribute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

predictive analytics

A

will it happen in the future?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Descriptive Analytics

A

what happened?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

diagnostic analytics

A

why did it happen?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Prescriptive analytics

A

what should we do based on what we expect to happen?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

common analytics problems

A

o Data overfitting = model is designed to fit training data very well but does not predict well when applying it to other datasets
o extrapolating being the range = process of estimating a value that is beyond the data used to create the model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

benefits of visualization

A

 Visualized data is processed faster than written, easier to use, and supports the dominant learning style of the population (most people are visual learners)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

misleading visualization

A

 Range/timeline of graphs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Enterprise Resource Planning

A

o Integrates activities from the entire organization
 * Production
 * Payroll
 * Sales
 * Purchasing
 * Financial Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Advantages of ERP

A

 better flow of the information as it’s
 stored in a centralized database and can be accessed by various departments
 improves customer service.
 * Data captured once
 * Improve access of control of the data through security settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Disadvantages of ERP

A

Costly
 * Significant amount of time to implement
 * Complex
 * User resistance (learning new things is sometimes hard for employees)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

3 approaches to acquiring software

A

o Canned
o * Custom
o * Modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

system conversion types

A

o Direct changeover
o * Parallel
o * Phased
o * Pilot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

principles of COBIT

A

o 1. Meeting stakeholder needs
o 2. Covering the enterprise end-to-end
o 3. Applying a single, integrated framework
o 4. Enabling a holistic approach
o 5. Separating governance from management

32
Q

types of audit risks

A

o Inherent = exists before plans are made
o Residual = left over after you control

33
Q

four audit risks responses

A

o Reduce = implement effective internal control
o Accept = do nothing
o Share = buy insurance, outsource, or hedge
o Avoid = do not engage in the activity

34
Q

cost benefit analysis equation

A

o Expected Loss = impact x likelihood

35
Q

fraud triangle

A

opportunity, pressure, rationalization

36
Q

segregation of accounting duties

A

o No one individual should do two or more of these function
 * Approval function
 * Recordkeeping function
 * Custody function

37
Q

functions of internal controls

A

 * Deter problems from occurring
 * Discover problems that are not prevented
 * Identify and correct problems; correct and recover from the problems

38
Q

Levers of control

A

o 1. Belief system
o 2. Boundary system
o 3. Diagnostic control system
o 4. Interactive control system

39
Q

GAPP

A

o 1. Management
o 2. Notice
o 3. Choice and consent
o 4. Collection
o 5. Use, retention, and disposal
o 6. Access
o 7. Disclosure to third parties
o 8. Security
o 9. Quality
o 10.Monitoring and enforcement

40
Q

input controls

A

make sure that data entered into the system is accurate, valid, & complete

41
Q

processing controls

A

makes sure that all legitimate transactions are
processed accurately

42
Q

output controls

A

makes sure that all reports or other output are not lost or
seen by unauthorized individuals

43
Q

Encryption main factors

A

key length, key management, and encryption algorithm.

44
Q

2 algorithmic schemes

A
  1. Symmetric-key encryption methods. (fast, suitable for large data)
  2. Asymmetric-key encryption methods (slow, suitable for small data)
45
Q

authentication vs authorization

A

o Authentication
 Verifies the person
o Authorization
 Determines what a person can access

46
Q

cold vs hot site

47
Q

delimiters and text qualifiers

48
Q

o Trojan horse

A

replicates program to act like “trojan horse”

49
Q

Functions of the Expenditure Cycle (steps)

A

o * Requisitioning – ensure that needed goods are requested given available resources
o * Purchasing – ensure that goods are ordered for a low
o * Receiving – ensure that goods are only received for what is ordered and is of good quality; to ensure that the goods are secure
o * Accounts payable – know who to pay, when to pay, and how much to pay
o * Cash disbursements – pay the supplier the correct amount on time; ensure that cash is safe

50
Q

related source documents for the expenditure cycle

A

 1. Order materials, supplies, and services
 2. Receive materials, supplies, and services
 3. invoice
 4. Cash disbursement

51
Q

threats to the expenditure cycle

A

 1. Inaccurate or invalid master data
2. Unauthorized disclosure of
sensitive information
3. Loss or destruction of data
4. Poor performance

52
Q

controls for expenditure cycle

A

 b. Restriction of access to master
 data
 c. Review of all changes to master
 data
Encryption

53
Q

functions of the revenue cycle

A

o * Credit and Collection – ensures collectability of customer accounts
o * Shipping –ensures that customers get what they ordered, when they want it, and where they want it
o * Billing and Accounts receivable – who owes the company, how much is owed, and when is it due
o * Cash Receipts – accurately know what is received by the customer and safeguard cash
o * Sales Returns – ensures that returns are properly authorized and tracked

54
Q

related source documents for revenue cycle

A

 1. Sales order entry
2. Shipping
3. Billing
4. Cash Collections

55
Q

threats to revenue cycle

A

 1. Inaccurate or invalid master data
2. Unauthorized disclosure of
sensitive information
3. Loss or destruction of data
4. Poor performance

56
Q

controls to the revenue cycle

A

 b. Restrict access to master data
 c. Review of all changes to master
 data
 b. Encryption
 c. Tokenization of customer personal information
 3 a. Backup and disaster recovery
 procedures

57
Q

functions of the conversion cycle

A

o * Product Design
o * Production schedule development
o * Work order, materials requisition, and move ticket creation
o * Raw material issuance to production
o * Convert raw material to finished goods
o * Product cost accumulation for the work-in process
o * Transfer finished product to finished goods inventory

58
Q

related source documents of fixed assets

A

 * Asset Acquisition
 * Depreciation
 * Repairs & Maintenance
 * Asset Disposition

59
Q

threats to fixed assets

A

 Theft
 Improper accounting
 Lack of authorization

60
Q

controls to fixed assets

A

 Good policies
 Proper authorization
 Annual review

61
Q

financing source documents

A

 Issuing stock
 Dividends
 Stock options
 Require stock
 New debt
 Interest expenses

62
Q

threat to financing

A

improper accounting

63
Q

controls to financing

A

 Verify through minutes
 Proper authorization

64
Q

source documents to payroll cycles

A

 Timecards
 Payroll documents

65
Q

threats to payroll cycle

A

 Theft/fraud
 Unauthorized changes to payroll
 Inaccurate wage/tax calculations

66
Q

controls to payroll cycle

A

 Proper authorization
 Verify hours w/ manager
 Management review

67
Q

Functions of the Financial Reporting Cycle

A

 * Prepare a preliminary trial balance,
 * Prepare and post correcting and adjusting entries,
 * Prepare financial statements, and
 * Create other managerial reports

68
Q

threats to financial reporting cycle

A

 1. Inaccurate or invalid general ledger
 data
 2. Unauthorized disclosure of
 financial statement
 3. Loss or destruction of data

69
Q

controls of financial reporting

A

 Restriction of access to G/L
 Review of all changes to G/L data
 Encryption

70
Q

o Botnet

A

robots that overrun computers

71
Q

o Denial of service

A

slows computer down

72
Q

o Spyware

A

secrete install

73
Q

o Spoofing

A

seems real but fake source

74
Q

o Social engineering

A

manipulating someone to get info

75
Q

reorder point equation

A

ROP = Daily demand × Lead time