BEC CPA INFO TECH 1

Card Set Information

Author:
Anonymous
ID:
13249
Filename:
BEC CPA INFO TECH 1
Updated:
2010-04-06 01:26:40
Tags:
BEC CPA INFO TECH 1
Folders:

Description:
BEC CPA INFO TECH 1
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. Batch Processing
    Accumulating transaction records into groups or batches for processing at some regular interval such as daily or weekly
  2. Audit Hooks
    Concurrent audit techniques that embed audit routines into application software to flag certain kinds of transaction that might be indicative of fraud
  3. Asynchronous Transmission
    Data transmission in which each character is transmitted separately
  4. Asymmetric Encryption
    Using two keys to encrypt and decrypt a message, either public or private
  5. ASCII
    American Standard Code for Information Interchange, provides a standard representation for English characters, which each letter assigned a number for 0 to 127.
  6. Application Service Provider (ASP)
    A company that provides access to and use of application programs via the Internet. The ASP owns and hosts the software, the contracting organization accesses the software remotely via the Internet.
  7. Administrative documentation
    A description of the overall standards and procedures for the data processing facility, including policies relating to justification and authorization of new systems or systems changes
  8. Adapter
    An expansion board that provides specialized processing and control for the microprocessor
  9. Ad Hoc Queries
    Nonrepetitive requests for reports or answers to specific questions about the contents of the system's data files.
  10. Accounting Business Cycle
    The five major accounting cycles: acquisition and cash disbursement, payroll and personnel, sales and collection, capital acquisition and repayment, and inventory and warehousing
  11. Access Control Matrix
    An internally maintained list that the computer uses to verify that the person attempting to access system resources is authorized to do so.
  12. Acceptance Tests
    Tests of new systems using specifically developed transactions and acceptance criteria. The test results are evaluated to determine if the system is acceptable.

What would you like to do?

Home > Flashcards > Print Preview