Mid-Term Test Flashcards

1
Q

System

A

A set of two or more interrelated components interacting to achieve a goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Goal Conflict

A

When components acting in their own interest contribute do not toward the overall goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Goal Congruence

A

When components acting in their own interest contribute toward the overall goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business transactions

A

An agreement between two entities to exchange goods/services or other event, that can be measured in economic terms by an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accounting Information System (AIS)

A

A system that collects, records, stores and processes data to produce information for decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Components of an Accounting Information System (6)

A
  • Users
  • Procedures and instructions used
  • Data about organisation and its activities
  • Software used to process data
  • Information technology infrastructure
  • Internal controls and security measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The six components of an Accounting Information System enable three business functions to be fulfilled…(3)

A

1) Collect and store data about organisational activities, resources and personnel.
2) Transform data into information, for management to plan, execute, control and evaluate activities, resources and personnel.
3) Provide controls to safeguard assets and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can an AIS add value to an organisation? (6)

A

1) Improving the quality and reducing the costs of products or services
2) Improve efficiency
3) Sharing knowledge
4) Improve efficiency and effectiveness of supply chain
5) Improve internal control structure
6) Improve decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Value chain

A

The set of primary and secondary activities a product/service moves along before output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Value chain: primary activities

A

Value chain activities that produce, market and deliver products/services to customers and provide post-delivery support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Supply chain

A

An extended system that includes an organisation’s value chain, as well as its suppliers, distributors and customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Support activities

A

Value chain activities such as infrastructure, technology, purchasing and human resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data processing cycle

A

The four operations (data input, data storage, data processing, and information output) performed on data to generate meaningful and relevant information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data input: Capture

Data must be collected about 3 facets of each business activity as it occurs.

A

1) Each activity of interest
2) Resource(s) affected by each activity
3) People who participate in each activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Source documents

A

Documents used to capture transaction data as its source - when the transaction occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Turnaround documents

A

Records of company data sent to an external party and then returned to the system as input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Coding

A

The systematic assignment of numbers/letters to items to classify and organise them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Coding types (4)

A
  • sequence codes: items are numbered consecutively
  • group codes: two/more subgroups of digits used to code items
  • mnemonic codes: letters & numbers (description) used to identify an item
  • chart of accounts: listing of numbers assigned to balance sheet and income statement accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data processing activities (4)

A

1) Create new data records
2) Read, retrieve or view existing data records
3) Update existing stored data records
4) Delete data or records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Enterprise resource planning (ERP)

A

A system that integrates all aspects of an organisations activities (Financial, Human resources, Marketing, ect.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ERP Advantages (7)

A
  • integration of organisation data and financial information
  • data is captured once
  • greater management visibility, increased monitoring
  • better access control
  • standardises business operating procedures
  • improved customer service
  • more efficient manufacturing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ERP Disadvantages (5)

A
  • cost
  • time consuming to implement
  • complex
  • resistance to change
  • changes to an organisations existing business processes can be disruptive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data flow diagram (DFD)

  • data sources
  • data flows
  • data destination
  • transformation processes
  • data store
A

A graphical description of the flow of data within an organisation. This includes:

  • data sources/destinations: square
  • data flows: curved/straight arrow
  • internal control: red square
  • transformation processes: circle
  • data store: two horizontal lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data flow diagram levels (3)

A

1) Context
2) Level-0
3) Level-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DFD: Context diagram

A

Highest level DFD, which show inputs and outputs into a system and their destinations and sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DFD:
Level-0
Level-1

A

Level-0: Show all major activity steps of a system. (labeled 1.0, 2.0)
Level-1: Show one major activity, divided into sub activities. (labeled 1.1, 2.1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Flow charts

A

Use symbols to logically depict transaction processing and the flow of data through a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Types of flow charts (3)

  • Document
  • System
  • Program
A

Document: illustrates flow of document through an organisation, useful to analyse internal controls.
System: representation of system inputs, procedures and outputs, useful to analyse systems and design.
Program: represent logical sequence or program logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Common threats to AIS (3)

A
  • natural disasters
  • software errors and/or equipment malfunction
  • unintentional and intentional (sabotage) acts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Fraud

A

Any and all means a person uses to gain an unfair advantage over another person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Legally for an act to be fraudulent there must be: (5)

A
  • a false statement/representation/disclosure
  • a material fact that induces a person to act
  • an intent to deceive
  • justifiable reliance
  • an injury/loss suffered by the victim
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Forms of fraud

  • misappropriation of assets
  • fraudulent financial reporting
A

Misappropriation of assets - theft of company assets by employees.
Fraudulent financial reporting - intentional/reckless conduct resulting in materially misleading financial statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Tread-way commission actions to reduce fraud (4)

A

1) establish environment which supports integrity of financial reporting
2) identification of factors that lead to fraud
3) asses risk of fraud within company
4) design and implement internal controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Pressure

A

Motivation or incentive to commit fraud.

Either by employee or financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Opportunity

A

Condition/situation that allows a person or organisation:

  • commit fraud
  • conceal fraud: lapping
  • convert theft to personal gain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Rationalisation

A

Justification of illegal behaviour

  • justification
  • attitude
  • lack of personal integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Computer fraud

A

Any illegal act in which computer technology knowledge is necessary to perpetrate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Why computer fraud is on the rise? (7)

A

1) definition is not agreed on
2) often undetected
3) high percentage not reported
4) lack of network security
5) step by step guides are easily available
6) law enforcement is overburdened
7) difficulty calculating loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Hacking

A

Unauthorised access, modification or use of a computer system/electronic device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Social Engineering

A

Techniques, usually psychological tricks to gain access to sensitive data/information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Malware

A

Any software used to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Types of computer attacks (4)

A
  • Botnet - Robot Network
  • Denial-of-service (DOS) attack
  • Spamming
  • Spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Hacking embezzlement schemes

  • salami technique
  • economic espionage
  • cyberbullying
  • internet terrorism
A
  • salami technique: small amounts from many different accounts
  • economic espionage: theft of information, trade secrets and intellectual property
  • cyberbullying: harassment online
  • internet terrorism: disrupting electronic commerce and harming computer communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Virus

A

A segment of self-replicating, executable code that attaches itself to a file/program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Worm

A

A standalone malware computer program that replicates itself in order to spread to other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Internal controls

A

The processes and procedures implemented to provide reasonable assurance that control objectives are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Internal controls perform 3 important functions:

A
  • Preventive controls
  • Detective controls
  • Corrective controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

COBIT - Control objectives for information and related technology

A

Allows management to benchmark security and control practices, users to be assured adequate information system security and control exist, and auditors to substantiate their internal controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The COBIT 5 framework

A

1) Meeting stakeholder needs
2) Covering enterprise end-to-end
3) Applying a single, integrated framework
4) Enabling a holistic approach
5) Separating governance from management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Enterprise risk management model (ERM)

A

A COSO framework that improves the risk management process by expanding COSO’s internal control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

ERM - Internal Environment

A

The company culture that is the foundation for all other ERM components, as it influences how organisations establish strategies and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

ERM - Objective Setting

A

Management sets objectives at the corporate level then subdivides them into more specific objectives;

  • strategic
  • operational
  • reporting
  • compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

ERM - Event Identification

A

A positive or negative, incident from internal or external sources, that affects the implementation of strategy or achievement of objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

ERM - Risk Assessment

A
  • Identify risk: likelihood and whether impact positive or negative
  • Type of risk:
    inherent: exists before plans to control it
    residual: remaining risk after controls in place to reduce
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

ERM - Risk Response (4)

A
  • reduce
  • accept
  • share
  • avoid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Why is it important to seperate accounting duties?

A

To ensure no employee has too much responsibility, and therefore minimise risk of fraud.
need to separate: authorisation, recording & custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Trust services framework (TSF)

A

TSF provides the means to consolidate COBIT

  • Security
  • Confidentiality
  • Privacy
  • Processing integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Time-based model

A

Combination of detective/corrective controls.
P = time takes for attacker to break through
D = time takes to detect attack in process
C = time takes to respond to attack
P must be greater than D + C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Authentification

A

Verifies who a person is: passwords, ID cards, biometric characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Authorisation

A

Determines what a person can access: files and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Intellectual property (IP)

A

What to protect?

  • strategic plans
  • trade secrets
  • cost information
  • legal documents
  • process improvements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Steps to secure intellectual property (4)

A

1) Identification and classification - data inventory
2) Encryption - making info unreadable without special knowledge
3) Controlling access
4) Training employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Privacy concerns (2)

A
  • spam

- identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Encryption strength

  • key length
  • algorithm
  • policies concerning keys
A
  • key length: number of bits used to convert text into blocks
  • algorithm: manner in which key and text is combined
  • policies concerning keys: stored securely with strong codes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Symmetric encryption

A

one key used to both encrypt and decrypt

  • pro: fast
  • con: vulnerable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Asymmetric encryption

A

different key used to encrypt than decrypt

  • pro: very secure
  • con: very slow
67
Q

Hybrid solution encryption

A

use symmetric for encrypting information and use asymmetric for encrypting symmetric key for decryption.

68
Q

Hashing

A

Transforming plaintext of any length into a short code called hash.

69
Q

Creating a digital signature - 2 steps

A

1) document creator uses a hashing algorithm to generate hash of the original document
2) document creator uses his/her private key to encrypt the hash created in step 1
RESULT - encrypted hash is legally binding signature

70
Q

Input controls: Form design (3)

A
  • all forms should be sequentially numbered
  • use of turnaround documents and eliminates input error
  • cancellation and storage of source documents
71
Q

Batch processing

A

input multiple source documents at once in a group

72
Q

How to promote a fast recovery?

  • Back-up
  • Business continuity plan
A

Back-up:
incremental - copy only data that changed from last period back-up
differential - copy only data that changed from last full back-up
Business continuity plan - How to resume all operations including IT.

73
Q

Disaster Recovery Plan (DRP)

A

Procedures to restore an organisation’s IT function in the event that it’s data centre is destroyed.

74
Q

DRP Types of sites

  • Cold site
  • Hot site
  • Site data centre
A

Cold site - an empty building that is prewired for necessary telephone and internet access.
Hot site - a facility prewired for necessary telephone and internet access, along with all the computing and office equipment organisation needs to perform its essential business activities.
Site data centre: used for back-up and site monitoring.

75
Q

Auditing

A

Systematic process of obtaining and evaluating evidence regarding assertions about economic actions/events to determine how well they correspond with established criteria.

76
Q

Internal auditing

A

An independent, objective consulting activity designed to add value and prove organisational effectiveness and efficiency. (including assisting in design of AIS)

77
Q

Types of internal audits (5)

A
  • financial (integrity of accounting records)
  • information system (assess AIS controls with internal policies)
  • operational (efficient use of resources for goals)
  • compliance (entities comply with laws)
  • investigative (incidents of possible fraud)
78
Q

External auditing

+ 4 elements

A

Responsible to corporate shareholders.

  • gathers evidence to share opinion on financial statements
  • indirectly concerned with AIS effectiveness
  • assess how auditing strategy affected by AIS
  • evaluate IT controls through tests
79
Q

Audit process steps (4)

A
  • planning
  • collecting evidence
  • evaluating evidence
  • communicating audit results
80
Q

1) planning the audit

A

Audit scope and objectives: why, when, how, whom?

  • inherent risk ( error or omission as a result of factors)
  • control risk (absence or failure in the operation of relevant controls)
  • detection risk (fail to detect a material misstatement in the financial statements)
81
Q

2) collecting evidence (5)

A

Samples collected and observes activities to be audited.

  • review documentation
  • test balances 3rd parties
  • recalculate test values
  • examine supporting materials
  • examine relationships & trends
82
Q

3) evaluating evidence

A

Does the evidence support favourable/unfavourable conclusion? How significant is evidence (errors)?

83
Q

4) communication of audit

A

A written report summarising audit findings and recommendations to management, the audit committee, the board of directors and other appropriate parties.

84
Q

Information systems audit purpose

A

To review and evaluate internal controls that protect a system.

85
Q

Information systems audit objectives (6)

A

1) overall information security (threats)
2) program development and acquisition
3) program modification (source code comparison)
4) computer processing (concurrent audits)
5) source data (input control and data control)
6) data files (accuracy, integrity, security of data, and auditing by objectives)

86
Q

Sales order processing

A

Take customer order, approve customer credit, check stock availability and respond to customer.

87
Q

Shipping process

A

Pick and pack order, then ship order.

88
Q

Cash collection process

A

Process customer payment and update their account balance, then deposit payments to bank.

89
Q

Order goods/services processing

A

Identify what, when and how much to purchase, then choose a supplier.

90
Q

Receiving process

A

Goods arrive

91
Q

Approve supplier invoice and cash disbursements

A

Match supplier invoice to purchase order and receiving order, approve supplier for payment and then pay vendor.

92
Q

Planning SDLC (2)

A
  • project development plan

- master plan

93
Q

Project development plan (SDLC)

A
  • cost/benefit analysis
  • developmental and operational requirements
  • schedule of activities required to develop and operate a new application
94
Q

Master plan (SDLC)

A

What will system consist of? How will it be developed? Who will develop it? How will needed resources be acquired? Where the AIS is headed?

95
Q

Planning technique

A
  • PERT chart

- GANTT chart

96
Q

Program evaluation and review technique (PERT)

A

Network of arrows and nodes representing project activities that require an expenditure of time and resources and completion and initiation of activities.

97
Q

GANNT chart

A

A bar chart with project activities on the left-hand side and units of time across the top. it graphically shows entire schedule for a large, complex project.

98
Q

Feasibility analysis

A

Does it make sense to proceed with new system? Consider economic, technical, legal, scheduling and operational factors.

99
Q

Economic feasibility: Cost-benefit analysis

A

Benefits and costs estimated and compared to determine whether system is cost beneficial.

100
Q

Why do people resist change to computer systems? (4)

A
  • lack of management support
  • lack of communication
  • disruptive change
  • biasness and emotions
101
Q

How can management prevent resistance? (4)

A
  • offer support and communication lines
  • meet user needs and involve users
  • provide user training
  • stress new opportunities are created
102
Q

System survey (Extensive study of AIS)

A

System study provides understanding of company objectives, data and information flow, AIS strengths and weaknesses and available hardware, software and personnel.

103
Q

System documentation

A

Once data gathered, document findings and model exisiting system.

104
Q

Systems analysis report

A

Report outlines and documents analysis activities and provides recommendations that result from the system analysis.

105
Q

System analysis process steps (5)

A

1) initial investigation (go-no occurs)
2) system survey - determine needs
3) feasibility analysis (go-no at end)
4) identify needs and capture requirements
5) system documentation: systems analysis report
(go no occurs at end)

106
Q

Conceptual design

A

Developer creates general framework for user requirements and solving problems identified in analysis phase. Evaluate design alternatives, prepare design specifications and prepare conceptual design report.

107
Q

Physical design

A

Conceptual designs are translated into detailed specifications that are used to code and test computer programs.

108
Q

Output design

A

Determine nature, format, content and timing of reports, documents and screen displays.

109
Q

Program design process steps (8)

A

1) determine user needs
2) create and document development plan
3) write program instructions
4) test program
5) document program
6) train users
7) intall system
8) use and modify system

110
Q

Implementation and conversion of system

A

Process of installing hardware and software and getting AIS up and running.

111
Q

Implementation and conversion of system steps (7)

A

1) planning
2) prepare site
3) test hardware
4) train personnel
5) complete
6) test system
7) conversion

112
Q

Types of documentation (3)

A
  • development documentation
  • operations documentation
  • user documentation
113
Q

Development documentation

A

A system description of copies of output, input and file, and database layouts, program flowcharts, test results and acceptance forms.

114
Q

Operations documentation

A

Documentation includes operating schedules, files and databases accessed, and equipment, security and file-retention requirements.

115
Q

User documentation

A

Teaches users how to operate AIS, and includes procedures manual and training materials.

116
Q

Types of conversions (4)

A

Direct - terminates old AIS and introduces new one
Parallel - operates old and new system simultaneously
Phase-in - replaces elements with new one
Pilot - implements system in one part of organisation

117
Q

Post-implementation review

A

Determines whether system meets its planned objectives.

118
Q

How can you develop an AIS? (3)

A
  • purchase software
  • develop software in-house
  • hire and extend company to develop and maintain new software
119
Q

Purchasing software - Off the shelf canned

A
  • System capabilities for user with similar requirements
  • Hardware and software sold as a package
  • Driven by ‘pay-per-use’ model
  • Software is provided to user via the internet
120
Q

In-house system development

A

System developed in-house provides a significant competitive advantage.

121
Q

Risks of in-house development (6)

A
  • time consuming
  • complex system
  • poor requirements
  • insufficient planning
  • inadequate communication
  • lack of qualified staff
122
Q

End-user computing (EUC)

A

Hands-on development, control, use of CBIS by users.

123
Q

End-user computing advantages (5)

A
  • user creation, control and implementation
  • system meets user needs
  • timeliness
  • free up system resources
  • versatility and ease of use
124
Q

End-user computing disadvantages (5)

A
  • logic and development errors
  • poorly controlled and documented
  • incompatible systems
  • redundant data
  • increased costs
125
Q

Outsourcing advantages (5)

A
  • business solution: concentrates on core competencies
  • access to greater expertise and technology
  • facilitates downsizing
  • less development time
  • asset utilisation
126
Q

Outsourcing disadvantages (5)

A
  • inflexibility
  • loss of control
  • reduced competitive advantage
  • locked-in system by contract
  • unfulfilled goals
127
Q

Methods to develop AIS (3)

A
  • business process management (bpm)
  • prototyping
  • computer-aided software engineering (CASE) tools
128
Q

Business process management

A

Systematic approach to continually improve and optimise an organisations business process.

129
Q

Business process management systems (BPMS)

+ 4 components

A

Automate and facilitate business process improvements.

1) process engine
2) business analytics
3) collaboration tools
4) content manager

130
Q

Internal control in BPMS

A

BPMS uses business process rules to determine correct person to perform task and authorise them.

  • improved segregation
  • strengthened application controls
  • built-in audit trial
131
Q

Prototyping advantages (6)

A
  • better definition of user needs
  • higher user involvement
  • faster development time
  • few errors
  • more opportunity for changes
  • less costly
132
Q

Prototyping disadvantages (5)

A
  • significant user time
  • less efficient use of system
  • inadequate testing
  • negative behavioural reactions
  • never-ending development
133
Q

Computer-aided software engineering (CASE)

A

Software to help plan, analyse, design, program and maintain an information system.

134
Q

Computer-aided software engineering advantages (5)

A
  • improved productivity
  • -improved program quality
  • cost savings
  • improved control procedures
  • simplified documentation
135
Q

Computer-aided software engineering disadvantages (3)

A
  • incompatibility
  • cost
  • unmet expectations
136
Q

Computer-based storage concepts

  • attributes
  • fields
  • records
  • files
A

Attributes - facts about the entity
Fields - where attributes are stored
Records - group of related attributes about an entity
File - group of related records

137
Q

Difference between ERP and BPMS

A

ERP systems are data-centred and BPMS are process-centred. Manufacturers of ERP systems are integrating BPM into their systems.

138
Q

Database systems advantages (5)

A
  • data integration
  • data sharing
  • minimising data redundancy
  • data independence
  • cross-functional analysis
139
Q

Relational database

A

Relational data model represents the conceptual and external level schemas as if data are stored in tables.
Each row = record and Each column = field

140
Q

Attributes

  • primary key
  • foreign key
A

Primary key - attributes to uniquely identify a specific record
Foreign key - attribute in one table that is a primary key in another table

141
Q

Database design errors

A
  • update anomaly (data changes not recorded correctly)
  • insert anomaly (unable to add record)
  • delete anomaly (removing record removes unintended data)
142
Q

Design requirements for relational database (4)

A

1) every column must be single value
2) entity integrity rule: primary keys must contain data
3) referential integrity rule: foreign keys must contain same data as primary key in another table
4) non-key attributes must identify characteristics of table identified by primary key

143
Q

Database design process (5)

A

1) system analysis
2) conceptual design
3) physical design
4) implementation and conversion
5) operation and maintenance

144
Q

Data modelling

A

Process of defining an information system so it represents an organisations requirements, and it occurs at the systems analysis stage and conceptual design stage.

145
Q

Data models include (3)

A
  • flowcharts
  • data flow diagrams
  • entity relationship diagrams
146
Q

Entity-relationship diagrams

A

Used to graphically represent a database schema. It depicts entities and the relationships between entities.

147
Q

Resource-Events-Agents Diagram rules

A

1) each event linked to at least one resource
2) each event linked to at least one other event (get, give and participation events)
3) each event is linked to at least two other agents

148
Q

Cardinalities

A

Describes the nature of relationship between entities.

149
Q

Relationship types in REA diagram

A
  • one to one
  • one to many
  • many to many
150
Q

Rules for creating integrated REA diagram

A

1) event linked to at least one resource
2) event linked to two agents
3) disposition event must be linked to acquisition event
4) increment event must be linked to decrement event
5) if event linked to more than one event, but cannot be linked to all other events, then REA must show event is linked to a minimum of 0 of each of those other events

151
Q

REA to database steps (3)

A

1) create table for entity and many-to-many relationship
2) assign attributes to appropriate tables
3) use foreign keys to implement one-to-one and one-to-many relationships

152
Q

XBRL

A

Extensible business reporting language is a standard for the electronic communication of business and financial data.

153
Q

XBRL uses tags to data to:

A
  • specify what piece of data is
  • specify how it is used
  • make data searchable
  • represent a standard for the business environment
154
Q

XBRL taxonomies

A

Taxonomies are the dictionaries that define each accounting item that can be tagged in XBRL.

155
Q

Instance document

A

XBRL tagging is applied to a file containing data.

156
Q

Users of XBRL

A
External Users
- lenders 
- regulators 
- government departments 
- investors 
Internal users 
- quick and efficient production of reports, and consolidation of acquisitions
157
Q

Ways to code financial accounts: apply tags

A

1) attach XBRL to accounting system

2) attach XBRL tags after financial accounts have been prepared

158
Q

Sales order processing controls

A

1a) data entry edit controls
b) restrict access to mater data
2) signature to authorise sales
3) credit limits checked and if sale exceeds limit, special authorisation needed
4a) perpetual inventory system
b) RFID or bar code technology
c) physical inventory counts

159
Q

Shipping process controls

A

1a) reconcile invoices with sales orders and shipping documents
b) seperate shipping and billing functions
2a) data entry edit controls
b) configure system for automatically enter price data
3) reconcile subsidiary accounts receivable balance to the amount for accounts
4) segregate authorisation and recording function for credit memos

160
Q

Cash collection controls

A

1a) segregation of cash handling and posting to customer accounts, authorise credit memos or reconcile bank account.
b) use lockbox
c) deposit all cash receipts daily
2a) lockbox
b) discounts for early payment
c) cash flow budgeting

161
Q

Ordering goods/services controls

A

1a) perpetual inventory system
b) bar-coding, RFID
2) review and approval of purchase requisitions
3a) price lists
b) competitive bids
4) use approved suppliers
5a) monitor supplier performance
b) require quality certification
6) purchase from approved supplier
7a) supplier audits
b) prohibit gifts

162
Q

Receiving goods controls

A

1) authorised purchase orders needed before receiving goods
2) bar codes or RFID
3) budget controls and audits
4a) restrict physical access to inventory
b) document all inventory transfers
c) segregate receiving inventory

163
Q

Approve supplier controls

A

1) verify invoice accuracy
2a) data entry audit controls
b) reconcile detailed accounts payable records to the general ledger accounts payable accounts

164
Q

Cash disbursement controls

A

1) file invoices by due date to get discount
2) match supplier invoice to documents
3a) pay original invoices
b) cancel supporting document when payment made
4a) physical security of checks
b) separation of duties
c) reconcile bank accounts
5) check protection machines
6) cash flow budgets