Examlex
Presented below is a list of terms relating to accounting information systems,followed by definitions of those terms.
Required: Match the letter next to each definition with the appropriate term.Each answer will be used only once.
________ 1.Biometric hardware authentication
________ 2.Archive bit
________ 3.Trapdoor
________ 4.Consensus-based protocol
________ 5.Hacker
________ 6.Fault tolerance
________ 7.Locked files
________ 8.Service bureau
________ 9.System fault
A.The concept that if one part of the computer fails,a redundant part is available to take over
B.This generally cannot be prevented by appropriate wall shielding
C.Systems that automatically identify individuals based on their fingerprints,hand sizes,retina patterns,voice patterns,and other personal features
D.This type of system requires an odd number of processors
E.A program can be run but not looked at or altered
F.A company that provides data processing services to other companies for a fee
G.A type of intruder or attacker
H.A portion of the computer program that allows someone to access a system while bypassing normal security procedures
I.This would include hard disk crashes,power failures,or printer jams
J.Commonly used in backup systems to indicate whether a file has been altered
Positive Reinforcement
The process of encouraging or establishing a pattern of behavior by offering rewards or positive outcomes.
Feedback
The process of giving and receiving information regarding performance or behavior with the intent to improve or affirm.
Reward
A benefit or recognition given to someone as a recompense for their effort, achievement, or good behavior.
Financial Incentives
Monetary rewards used to motivate individuals or groups to achieve specific goals or improve performance.
Q4: The goal of work measurement is to
Q15: A sufficiently long key is a useful
Q33: Information security management systems (ISMS)have which of
Q35: An objective of managing accounts receivable is
Q77: The recorded receivable that exists prior to
Q94: The CEO and CFO must prepare a
Q97: The segregation of authorization from the recording
Q111: What are the benefits of program data
Q129: _ computing involves clusters of interlinked computers
Q152: Botnets are normally used for which of