Examlex
Presented below is a list of terms relating to accounting information systems,followed by definitions of those terms.
Required: Match the letter next to each definition with the appropriate term.Each answer will be used only once.
________ 1.Database shadowing
________ 2.Logic bomb
________ 3.Information security system
________ 4.Risk management
________ 5.File-access controls
________ 6.Site-access controls
________ 7.Piracy
________ 8.Incremental backup
________ 9.Piggybacking
________ 10.Risk-seeking perpetrator
A.Prevents unauthorized access to both data and program controls
B.A duplicate of all transactions is automatically recorded
C.All files whose archive bit is set to 1 are backed up
D.One who will take risks "just because," without significant monetary gain
E.A dormant piece of code placed in a computer program for later activation by a later event
F.The copying and distributing of copyrighted software or files without permission
G.The process of assessing and controlling computer system risks
H.The interception of legitimate information and substitution of fraudulent information in its place
I.The subsystem of the organization that controls these risks
J.These separate unauthorized individuals from computer resources
Analytical Intelligence
The skill to scrutinize, appraise, discern, and juxtapose information.
Practical Intelligence
The ability to solve everyday problems by utilizing knowledge gained from experience in order to effectively deal with challenges and adapt to one's environment.
Creative Intelligence
The ability to produce new products, ideas, or innovative solutions to problems within a cultural setting.
Emotional Intelligence
The capacity to be aware of, control, and express one's emotions, and to handle interpersonal relationships judiciously and empathetically.
Q8: In an analytic flowchart,the symbol which could
Q35: Data modeling is a database design process
Q36: What is corporate culture? Why might someone
Q70: It is common for fraud investigators to
Q84: Using the qualitative approach to risk assessment,each
Q99: Loss recovery options include accepting the loss,collecting
Q115: The Act which recognizes transactions as legally
Q115: _ _ typically involves using a stolen
Q125: The external auditor is a good candidate
Q138: Some believe that every corporation has its