ACC321 Exam 2 Flashcards

(86 cards)

1
Q

Expenditure cycle

A

A recurring set of business activites and related information processing operations associated with the purchase of and payment for goods and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Objectives of the expenditure cycle

A

Tracking purchases of goods and or services from vendors, tracking amounts owed, maintaining vendor records, controlling inventory, making timely and accurate vendor payments, forecasting purchases and cash outflows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Included in the expenditure cycle

A

Request goods, order goods, recieve goods, approve invoices, pay for goods, returns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purchase requisition

A

Documents the need to purchase goods for supplies. What how when to purchase, not whi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Request goods opportunites for using info tech

A

Electronic purchase requition, automatic reordering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Purchase order

A

Formally request a vendor to sell and deliver specified products at specified prices also a promise to pay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Order goods opportunites for using info tech

A

Electronic data interchage to reduce costs, linking edi to point of sales, vendor managed inventory, on line ordering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Order goods threats and controls

A

Stockouts/excess inventory, ordering unnecessary items, purchasing goods at inflated prices, purching bad quality, purchasing from unautorized suppliers, kickbacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Receiving report

A

Documents the details of each delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recieve goods IT

A

Bar coding, rfid, gps locating of shipments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Recieve goods threats/controls

A

Recieving unordered goods, errors in counting recieved foods, stealing inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disbursements voucher

A

Summarizes the info in a set of vendor invoices-authorized payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk and controls cash disbursement process

A

Authorization of transactions, segregation of duties, three way match, business process reengineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Three way match

A

Matching of a purchase order to the related recieving report and invoice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business process reengineering

A

Computer based matching and checking of purchasing documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Approve invoices IT

A

Edi invoicing, matching edi invoice to computer supporting documents, eliminating invoices entirely, procurment cards and company cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Pay for goods IT

A

Electronic funds transfer for paying vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Approve/pay threats and control

A

Failing to catch errors in invoice, paying for goods not recieved, failing to take available discounts, pauong the same invoice twice, recording and posting errors in ap, misappropriation of moneh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Outputs of the purchasing process

A

Financial statement info, vendor checks, check register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Continuous processing

A

Creates a homogeneous product through a continuous series of standard procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Batch processing

A

Produce descrete groups of products. Each item in the batch is similar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Make to order processing

A

Involves the fabrication of discrete products in accordance with customer specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The production cycle

A

A recurring set of business activites and related info processing operaions associatd with convering raw inputs to outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Production cycle includes

A

Product design, planning and scheduling, production operations, cost accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Product design
Determing how to make a product
26
Bill of materials
Specifies the materials needed to make the product. Contains part number, raw material number, quantity
27
Operations list
Specifies the machine and labor requirements needed to make the product also call routing sheet
28
Product design threats
Poor product design resulting in excess costs
29
Product design controls
Accountig analysis of cost arising from product design choices, analysis of warranty and repair costs
30
Push planning
Build to inventory and try to sell
31
Pull planning (lean)
Build based on customer order
32
Master production schedule
Uses info about orderrs forcast and inventory levels to schedule production
33
Production order
Authorizes the manufacture of a specific quantity of a specific product
34
Planning and scheduling threats
Over or underproduction
35
Planning and scheduling controls
Production planning systems, review and approval of production schedules and orders, restriction of access to prodiction orders and prodiction schedules
36
Production operations threats
Theft of inventory, theft of fixed assets, poor performance, loss of inventory/assets to disaster, disruption of operations
37
Cost accounting
Providing info for planning controling evauation of production operations provide accurate cost dats about products for use in pricing and product mix decisions
38
Cost accounting systems
Records the financial transactions of the events occuring in thr production process, initiated bu the production order, create a new cost record for the new batch and trigger wip, records are updated as material useds, receipt of last move ticket signals completions
39
Whats wrong with traditional accounting info
Inaccurate cost allocations, and promoted non lean behavior
40
Activity based costing
Provides managers with info about activities and cost objects. Assumes that products create a demand for activities and activites cause cost
41
Advantages abc
More accurate costing of products and services, identifying the most and least profitbale products, accuratly tracking cost, drive continuous imprivements, better market mix, itentify waste
42
Disadvantages to abc
Time consuming and conflict with lean thinking
43
4 Vs of analytics
Volume, velocity, variety, veracity
44
Volume
Data at rest. Existing data to process
45
Velocity
Data in motion. Streaming data, milliseconds to seconds to respond
46
Variety
Data in many forms. Structured, unstructured, text, multimedia
47
Veracity
Data in doubt. Uncertainty due to data inconsistency and incompleteness, ambiguities, latency, deception, model approximations
48
Types of internet of things
Rfid tags, gps location data, wearable tech, machine sensor data, situatiobal awareness sensor data
49
Revenue assurance analytics
To reduce leakage from order to cash process. Predicting credit risk, deductions and disputes on trade funds, pricing discounts and terms of trade
50
Analysis of expenses
To help reduce wastage. Payable analytics, spend analytics, contract compliance
51
Control analytics
To help enhance. Process and financial risk analytics, financial statement quality, ethical fraud, fraud evidence reviews
52
Working capital analytics
To help improve cashflow. Logistics inventory, days payables outstanding, days sales outstanding
53
Continuous monitoring
Payroll, SSN test, setting criteria for percent change from run to run, accounts payable, duplicate payments, unclaimed credits
54
Continuous auditing
Systems such as approva or those you build yourslef can identify unusual transactions that might avoid a fraudulent payment, look for a series of split transactions, avoiding the dollar cutoff for either no receipt or no approval required
55
Unsupervised learning
Can be used to model behavior and discover anomalies. When several occur they can be grounds for suspicion
56
Supervised learning
Can be used to label and classify known exceptions for certain fraud schemes and map these scheme models to new dafs and infer new exceptions
57
IT auditing objectives
Confidentiality, integrity, availablilitu
58
Confidentiality
Preserving authorized restrictions on information access and disclosure
59
Integrity
Gaurding against improper information modification or destruction
60
Availability
Ensuring timely and reliable access to and use of information
61
Short term audit planning
What do we need to audit this year
62
Long term audit planning
What should we plan to audit in the future
63
Auditing around the computer
The processing portion is ignored
64
Auditing through the computer
Verification of controls in a computer system. General controls and application controls
65
Substantive testing
Computer controls are weak or nonexistent. These are detailed tests of transactions and account balances
66
Compliance testing
Is performed to ensure that the controls are in place and working
67
Objective one
Overall security
68
Security errors and fraud include
Accidental or intentional damage to a system, unautorized access disclousure or modification of data and programs, theft, interruption of business activities
69
Control procedures to minimize security errors and fraud
Developing an info security plan, restricing physical and logical access, encryping, protect against viruses, firewalls
70
One way to test logical access controls is to
Try to break into a system
71
Objective 2
Program development and aquisition
72
Objective 3
Program modification
73
Objective 2,3 errors and fraud
Errors due to careless programming or misunderstood specifications, deliberate insertion of unauthorized instructions into programs
74
Objective 2,3 control procedures
Management and user authorization and approval, thorough testing, proper documentation
75
Source code comparision
Compare the current version of the program with the original source code
76
Reprocessing
Surprise the auditor uses a verified copy of the source code to reprocess dats and compare
77
Parallel simulation
Auditor writes own program and compares
78
Objective 4
Computer processing
79
Objective 4 errors and fraud
Fail to detect erroneous input, process erroneous input, improperlu distribute or disclose output
80
Objective 4 compensating controls
Processing of test data, analyzing program logic
81
Processig test data
Testing a program by procesing hypothetical valid and invalid transactions
82
Objective 5
Source data
83
Objective 5 erros and fraud
Inaccurate sorce data and unautorized source data
84
Input data validation checks
Sequence check, limit check, range check, validity check, completeness check, reasonableness check
85
Objective 6
Data files
86
Objectice 6 erros and fraud
Destruction of stored data and unautorized modification or disclousire of stored data