BEC 7 - Information & Technology Flashcards
What are the 5 types of Management Reporting Systems?
(Mgmt Info,Decision Support,Expert,Executive Supp,Analytical Processing)
-
Management Information System (MIS)
- An organized assembly of resources & procedures required to collect, process, & distribute data for use in decision making
-
Decision Support System (DSS)
- An interactive system that provides decision models & data to help the decision making
-
Expert System
- Software system with AI, once input is provided, system provides recommendations to the problem
-
Executive Support Information System
- Systems designed specifically to support executive work (helps answers questions regarding competitors & new aquisitions)
-
Analytical Processing System
- Software that enables user to ask questions & retrieve data
Systems Development Life Cycle Approach (SDLC)
(7 Steps)
(Feasibility,Req,Software Selection,Config,Final Testing,Post Implementation,Maint)
SDLC - An approach for analyzing whether or not to develop & implement new information & control system, consisting of 7 steps:
-
Feasibility Study
- whether it makes economic or practical sense to develop & implement a new system
-
Requirement Definition
- identifying & defining the problem/inefficiency that is expected to be improved
-
Software Selection
- purchases systems or systems developed inhouse
-
Configuration & Development
- confuguration of purchased system, or development of inhouse internal system created
- Final Testing & Implementation
-
Post Implementation
- evaluation of performance, such as ROI
- Maintenance
Transactional Processing
What are the two types?
Transactional Processing - The electronic processing of tranactions , which can be accomplished using either:
-
Online Transaction Processing (OLTP)
- Immediately
- Real time, records are up to date
-
Batch Processing
- Involves gathering information & then entering transactions in a group
- Greater control of input process
- more verifiability
- Associated with DELAY
Networks
Centralized Processing
vs.
Distributed Processing
Network - where computers are connected to one another to enable sharing of peripherial devices, sharing data, & programs stored on a file server. Networks allow various user departments to share information files maintained in databases.
- Centralized Processing - All activities take place on one computer.
- Distributed Processing - Use of multiple computers with in some cases, each computer is designated with a different task or, in other cases, all working on similar tasks distributing the volume.
Network Configurations
WAN, LAN, VAN
The linking of computers may be done in different ways using different Network Configurations:
- Local Area Networks (LAN) - Communication networks that serve several users within a specified geographical area.
- Wide Area Networks (WAN) - A network connecting users that are located in different remote locations
- Value-Added Network (VAN) - A network connecting users from different companies together. As a result, it is necessary to have extensive security measures. (Whenever a network allows one computer to initiate an action that will have an affect on another, it is know as VAN)
Computer Network Topology
What are the 5 types of computer Topography?
Topology refers to the shape of a network or a network’s layout. Examples are:
- Bus - linear
- Star - attached to a central network
- Ring - configured sequentially
- Tree - group of stars
- Mesh - many redundant connections
Network Group/Size
Intranet
Extranet
Internet
Intranet is a network that is limited to the computers of a single company.
Extranet (like intranet) is primarily for users within a single company, but select customers & vendors are able to participate.
Internet is a world wide network that allows virtually any computer system to link to it by a way of electronic gateway.
Enterprise Resource Planning (ERP)
Enterprise Resource Planning (ERP) - A packaged business computer software that allows an entity to automate & integrate a majority of its business processes. Examples are:
- SAP
- Oracle Financials
- JD Edwards
World Wide Web - Languages
Hypertext Transfer Protocol (HTTP)
Transmission Control Protocol or Internet Protocol (TCP/IP)
Hyper Text Markup Language (HTML)
Extensible Business Reporting Language (XBRL)
HTTP - the language commonly understood by diferrent computers to communicate via internet.
TCP/IP - an IP is a unique computer address.
HTML - specialized programming languages used to create websites.
Extensible Business Reporting Language (XBRL) is a global standard language specifically designed for the electronic communication of business information & FINANCIAL DATA.
Electronic Data Interchange (EDI)
What are the 3 special considerations?
Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper.
There are special considerations relating to EDI:
- Strict Standards are needed for the form of data.
- Translation Software by each computer so data can be converted on both ends of the customer/supplier.
- Unauthorized Access to company transmissions arise requiring encryptions & firewalls.
Challenges for Auditors regarding EDI
What are the 4 challenges?
EDI adds to the complexity of Auditing as EDI enables:
- Communication w/o the use of paper (no audit trail)
- EFTs & sales over the internet
- Simplication of recording process using scanning devices
- Sending info to trading partners as transactions occur
EDI also creates special challenges for the audit as the reduction of paper trail is associated with EDI.
- detection risk may not be sufficiently reduced through substantive testing
- control risk must be reduced to adequately acieve an acceptable level of audit risk
- controls must be built into systems to insure validity of information captured
Computer/Internet Risks
Virus
Trojan Horse
Worm
Hoax Virus
Killer Application
Phishing
Virus - a program with the ability to reproduce by modifying other programs to include a copy of itself.
Trojan Horse - is a purposefully hidden malicious or damaging code within an authorized computer program.
Worm - a program that duplicates itself over a network so as to infect many computers with viruses.
Hoax Virus - a widely distributed e-mail message warning of a virus that doesn’t exist.
Killer Application - simply refers to a program that is extremely useful, & is not anything dangerous.
Phishing - is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private info that will be used for identity theft.
Size & Power of Computers
Supercomputers
Minicomputers
Microcomputers
Personal Digital Assistants
- Supercomputers - common for massive scale needs by science & math departments of universities & governmental operations
- Minicomputers - the only computer a large organization might have, with several terminals having the ability to connect to it simultaneously
- Microcomputers - personal computers, laptops or desktops
- Personal Digital Assistants - handheld computers, cell phone, ipad
Programming Language
Source Program
Object Program
Compiler
Protocol
Query Program
- Source Program - language written by the programmer, resembles the english language
- Object Program - language in a form the machine understands
- Compiler - a program that converts source programs into machine language
- Protocol - rules determining the required format & methods for transmissions of data
- Query Program - an application that counts, sums, & retrieves items from a database based on user criteria
- Fourth Generation Program Language (4GL) - are commonly used in the development of business applications, and are distinguised by ther use of “natural language” commands making them self-documenting.
- 2 Popular Programming Language
- C++
- JAVA
Data Structure
Bit>Byte>Character>Field>Record>File>Database
TESTED
Data Structure refers to the relationships among files in the database & among data items within each file.
- Bit - A single switch is either 1 or 0
- Byte - A group of 8 bits representing a character
- Character - A letter, number, punctuation mark
- Field - a group of related characters representing a unit of information (column)
- Record - a collection of related info, many fields (rows)
- File - a group of related records
- Database - a collection of files
Database Management Systems (DBMS)
What is Data Mining?
DBMS is a software system that controls the organization, storage, & retrieval of data in a database.
- Correct! The primary function of a database management system (DBMS) is its ability to access, summarize, create and modify information contained in an electronic database.
Data Mining - program/tool that looks for trends or anomalies.