match the terms with their definition
Chapter 10-P3 1. inherent risk a. Outside party hired to manage systems development effort 2. general authorization b. Probability that a threat will come to pass 3. control c. Risk that remains after management implements internal controls or environment some other response to risk 4. corrective controls d. Cooperation between two or more people to thwart internal controls 5. risk appetite e Special approval needed to handle a transaction. 6. application f. Company culture that is the foundation for all other internal control controls components 7. systems integrator g. Person who ensures an organization's networks operate properly 8. utilization h. Ensures source data is approved, monitors work flow, and handles input errors 9. security i. Susceptibility of accounts or transactions to control problems in management absence of internal control 10. strategic j. Path used to trace a transaction from origin to output or from output master plan to origin 11 specific authorization k Amount of work performed during a given time period 12. collusion 1. Electronically signing a document with data that cannot be forged m. Controls that prevent, detect, and correct transaction errors and 13 throughput fraud in transaction processing programs 14 systems n. Given to employees to handle routine transactions without special administrator approval o Controls that identify and correct problems and recover from 15 residual risk resulting errors 16 data control p Responsible for making sure a system operates smoothly and efficiently 17. likelihood 9. Document that shows how a project will be completed 18 analytical I Amount of risk company is willing to accept to achieve its goals and objectives 19. exposure Makes sure systems are secure and protected from internal and external threats review 20. systems analysts 21. audit trail 22. audit committee 23. digital signature t. Percentage of time a system is used u Examining relationships between different sets of data v. Potential dollar loss if a threat becomes a reality w. Outside, independent directors responsible for financial reporting, regulatory compliance, and internal control x. Controls designed to discover control problems not prevented Multiple year plan of projects company must complete to achieve long-range goals z Help users determine their information needs and design systems to meet those needs Chapter 10-P3 1. inherent risk 2. general authorization 3. control environment 4. corrective controls 5. risk appetite 6. application controls 7. systems integrator 8. utilization 9. security management 10. strategic master plan 11. specific authorization 12. collusion a. Outside party hired to manage systems development effort b. Probability that a threat will come to pass c. Risk that remains after management implements internal controls or some other response to risk d. Cooperation between two or more people to thwart internal controls e. Special approval needed to handle a transaction. f. Company culture that is the foundation for all other internal control components g. Person who ensures an organization's networks operate properly h. Ensures source data is approved, monitors work flow, and handles input errors i. Susceptibility of accounts or transactions to control problems in absence of internal control J. Path used to trace a transaction from origin to output or from output to origin k. Amount of work performed during a given time period 1. Electronically signing a document with data that cannot be forged m. Controls that prevent, detect, and correct transaction errors and . 13. throughput m. Controls that prevent, detect, and correct transaction errors and fraud in transaction processing programs 14. systems n. Given to employees to handle routine transactions without special administrator approval 15. residual risk o. Controls that identify and correct problems and recover from resulting errors 16. data control p. Responsible for making sure a system operates smoothly and efficiently 17. likelihood q. Document that shows how a project will be completed 18. analytical r. Amount of risk company is willing to accept to achieve its goals and review objectives s. Makes sure systems are secure and protected from internal and external threats 20. systems t. Percentage of time a system is used analysts 21. audit trail u. Examining relationships between different sets of data 22. audit v. Potential dollar loss if a threat becomes a reality committee 23. digital w. Outside, independent directors responsible for financial reporting, signature regulatory compliance, and internal control x. Controls designed to discover control problems not prevented 19. exposure y. Multiple year plan of projects company must complete to achieve long-range goals z. Help users determine their information needs and design systems to meet those needs