Examlex
Presented below is a list of terms relating to accounting information systems,followed by definitions of those terms.
Required: Match the letter next to each definition with the appropriate term.Each answer will be used only once.
________ 1.Database shadowing
________ 2.Logic bomb
________ 3.Information security system
________ 4.Risk management
________ 5.File-access controls
________ 6.Site-access controls
________ 7.Piracy
________ 8.Incremental backup
________ 9.Piggybacking
________ 10.Risk-seeking perpetrator
A.Prevents unauthorized access to both data and program controls
B.A duplicate of all transactions is automatically recorded
C.All files whose archive bit is set to 1 are backed up
D.One who will take risks "just because," without significant monetary gain
E.A dormant piece of code placed in a computer program for later activation by a later event
F.The copying and distributing of copyrighted software or files without permission
G.The process of assessing and controlling computer system risks
H.The interception of legitimate information and substitution of fraudulent information in its place
I.The subsystem of the organization that controls these risks
J.These separate unauthorized individuals from computer resources
Base Compensation
A salary or hourly wage paid to an individual.
Praise And Recognition
Acknowledgment and appreciation of an individual's contributions and achievements, often used as a motivational tool in management.
Social Level
Refers to the stratification and hierarchy within a society where individuals or groups are ranked according to various criteria like wealth, power, or prestige.
Maslow's Hierarchy
A psychological wellness theory based on meeting fundamental human needs in order of importance, leading to self-actualization.
Q11: Information security is an international problem.Which countries
Q24: A(n)_ _ _ model is a set
Q28: Which one of the following identifies the
Q30: Selecting the best opportunities and managing uncertainties
Q99: Collusion occurs when a white-collar individual attempts
Q106: A subpoena is an order from a
Q112: _ store relatively current transaction data for
Q117: Section 102 of the Federal Foreign Corrupt
Q123: Risk assessment should evaluate whether controls sufficiently
Q125: The external auditor is a good candidate