Examlex
Presented below is a list of terms relating to accounting information systems,followed by definitions of those terms.
Required: Match the letter next to each definition with the appropriate term.Each answer will be used only once.
________ 1.Key verification
________ 2.Real-time
________ 3.On-line,real time computing
________ 4.Input document control form
________ 5.Tagging
________ 6.Program data editing
________ 7.Valid code check
________ 8.Transaction processing system
________ 9.Table lookup
________ 10.POS system
A.A table-lookup procedure in which the table file consists of valid data codes
B.A system that processes input data immediately after they are input and can provide immediate output to users
C.Technology that enhances the traditional cash register to allow it to function as a source data-entry device for sales transactions
D.A computer environment where immediate or fast-response processing occurs
E.Audit-oriented information that is included with original transaction data when they are recorded.
F.A control procedure to ensure the accuracy of the key-transcribed input data
G.Documents batch control totals for batches of input data transmitted between user departments and the data processing department
H.A software technique used to screen data prior to computer processing
I.An edit program that compares the value of a field to the acceptable values contained in a table file
J.A system that collects and processes transactions and provides immediate output concerning processing
Market Share
The percentage of an industry's sales that a particular company controls, indicating its size relative to its competitors.
Peer Delinquent Subculture
An antisocial youth subculture.
Antisocial
Behaviors or attitudes that go against social norms, often harming others or lacking consideration for others' wellbeing.
Panhandling
The act of begging in public places, often seen on streets or near public transports.
Q9: The focal point of the materials requirements
Q15: The information security management system is an
Q18: If users are permitted to choose their
Q51: The concept of internal control is based
Q64: The following input is in an
Q64: The SAP ERP system database allows the
Q80: The fraud scheme that involves using a
Q81: The primary objectives of computer forensics include
Q86: In computer environments,_ control is especially important
Q111: Jennifer Nguyen is interested in archiving several