BEC 7 Flashcards
Types of Computer Systems
- Transaction Processing System (TPS) - older 2. Management Reporting Systems – more recent
Management Information System (MIS)
- form of management reporting system - organized assembly of resources & procedures required to collect, process, & distribute data for use in decision-making process
Decision Support System (DSS)
- form of management reporting system - INTERACTIVE system that provides the user with easy access to decision models & data, to support semi-structures decision-making tasks
Expert System
- form of management reporting system - A.I. Development - has built in hierarchy of rules which are acquired from human experts in the field - with a provided input, the ES should be able to define the nature of the problem and provide recommendations to solve the problem
Executive Support Information System
- form of management reporting system - supports executive work: non-routine decisions, helps answer questions regarding competitors, ID new acquisitions
Analytical Processing System
- form of management reporting system - enables user to ask (query) the system, retrieve data, & conduct analysis
Systems Development Life Cycle Approach (SDLC) Steps
- Feasibility Study 2. Requirements Definition 3. Software Selection & Acquisition (purchased) / Software Design (in-house) 4. Configuration (purchased) / Development (in-house) 5. Final Testing & Implementation 6. Post-Implementation 7. Maintenance Phase
Feasibility Study
- 1st Step of SDLC - determine strategic benefits of the system (gains or cost avoidance) - Estimate Payback schedule - Readiness of the organization’s users - maturity of the organization’s processes
Requirements Definition
- 2nd step of SDLC - define the problem/need that requires resolution - define the functional/qualitative requirements of the selection - use in house or purchase but must entail a defined & documented acquisition process - user needs to be actively involved
Software Selection & Acquisition Or Software Designs
- 3rd step of SDLC - Purchased: request for proposal, consider operational, support, tech requirements, & financial viability (escrow) - In-house: baseline, specifications, implementation with hardware software, program/database specs, security considerations, formal control process
Configuration Or Development
- 4th step of SDLC - Purchased: tailor system to requirements (via settings NOT coding), may beed to build interface for implementation with existing system - In-House: program & develop supporting operation processes, testing to verify/validate, iterations of user acceptance testing
Final Testing & Implementation
- 5th step of SDLC - establish actual operation of the new system - final iteration of user acceptance & user sign-off - may go through certification or accreditation process to assess effectiveness of business application in mitigating risk to appropriate level - providing management accountability over effectiveness of the system in meeting it goals - establish appropriate level of internal control
Post Implementation
- 6th step of SDLC - formal process that assess the adequacy of the system & projected cost-benefit or ROI measurements in relation to feasibility stage (step 1) - provide lessons learned and/or plans for addressing system deficiencies - recommendations for future projects regarding systems development & project management processes followed
Maintenance Phase
- 7th step of SDLC (not included in other interpretations) - monitor & support of the new system - training, help desk resources, & permissions system for changes (authorizations & tested) to system
Transaction Processing System (TPS) 2 ways
- Online Transaction Processing (OLTP), Real-Time (OLRT) 2. Batch Processing
Online Transaction Processing
- database updated as soon as transaction is received (immediate) - up to date at being keyed/transmitted - Issue: computers continually running & accessible at all points of transaction - Good for retail businesses
Batch Processing
- gathering information & entering transaction or groups periodically - greater control over input process (verify, authorize before input) - Problem: delay between transaction & input (accounting records may not always accurately reflect current)
Centralized vs Distributed Processing
- Centralized is 1 computer for whole firm that could be addressed by multiple people through remote terminals - Distributed is virtually 1 computer per employee at different locations (network used to connect)
LANs
- within specific georgraphical area - each computer does its own processing & manages some of its data - file server acts like a remote disk drive - good management control: access code and passwords
WANs
- different remote locations
VANs
- links computer files of different companies together - increased security (prevent access to inappropriate data information)
Problem with WLAN’s
- unauthorized access (both ENCRYPTION of data and PASSWORDS to connect are critical)
Bus (topology)
- common path in a communications network
Star (topology)
- there is one computer (central hub) to which all computers connect - all data is first received by the hub and then sent by the hub (email systems)
Ring (topology)
- each computer is connected to 2 closest neighbors in a closed loop (relay info) - 2 directions because 1 interruptions won’t bring down the network
Tree (topology)
- groups of star-configured networks are organized in branches with 1 computer at the base - if within a branch, don’t have to to go the root computer - if in a different branch, may have to go through the root computer
Mesh (topology)
- connected to many redundant interconnections between network nodes
Intranet
network limited to the computers of 1 company
Extranet
similar to intranet but select customers and vendors are able to participate as well
Client/Server Computing
networks for operating another computer - users of the client computer will be bale to access a server computer or even operating programs running on the server
Enterprise Resource Planning (ERP)
- packaged business software that allows an organization to automate & integrate the majority of its business practices, processes, and share common data across the entire organization - produce & access information in a real-time environment
Transmission Control Protocol and Internet Protocol
TCP/IP: communication protocol designed to network dissimilar systems
Electronic Data Interchange (EDI)
extranets set up as VANs to enable process of communication between suppliers & customers
EDI Special Considerations
- Strict Standards (completeness & accuracy) 2. Translation Software (mapping) 3. Unauthorized Access (encryption, firewall, EFT concern)
Encryption
application control that make stole data unreadable to someone without knowing the coding method
Advantages of EDI
- eliminates need for human intervention - can be more efficient that other systems - when inventory is ordered @ reorder point, EDI eliminates gaps & shortens the cycle - payments are made & received automatically (reduces AR float)
Risks of E-Commerce
- Confidentiality 2. Integrity 3. Availability (system failures) 4. Authentication & Non-repudation 5. Power shift to customers
Controls for E Commerce
- Security mechanism & procedures 2. firewalls 3. process where participants are identified positively and uniquely 4. Routing Verification procedures 5. Message acknowledgement procedures
Network Firewall
for company computers - easier & cheaper to set up - huge risk if penetrated
Application Firewall
- for individual program protection - also allows user authentication
List Computers (most to least in size)
- Supercomputers 2. Mainframe Computers 3. Minicomputers 4. Microcomputers (PCs) 5. Personal Digital Assistants
Magnetic tape vs Magnetic discks
- Tape is used mainly for back up & only sequential access to data is possible - Disks: random access to data and used inside computers
System Software
run system and direct operations (OS & Utility applications)