Accounting Information Systems - AIN1501

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

The primary purpose of an information system is to gather and process data for decision-making.

True (A)

Which of the following is NOT a characteristic of information used for decision-making purposes?

  • Relevant
  • Subjective (correct)
  • Accessible
  • Accurate

What does the term 'data' refer to in the context of information systems?

Raw material available for processing into information. It consists of numbers, letters, audio, and video data that relate to facts, events, and transactions.

Which of the following is an example of an internal user of information in an organization?

<p>Production Manager (B)</p> Signup and view all the answers

What is a system?

<p>A set of components that serve a common purpose and interact to achieve a goal.</p> Signup and view all the answers

A closed system is one that interacts with its environment.

<p>False (B)</p> Signup and view all the answers

What is a system performance measurement?

<p>Monitoring and evaluating the effectiveness of a system in achieving its intended outcomes.</p> Signup and view all the answers

What is the role of information systems in organizations?

<p>To provide a structured way of collecting, processing, managing, and reporting information for informed decision-making.</p> Signup and view all the answers

Which of the following is NOT a benefit of having a well-defined information strategy in an organization?

<p>Guaranteed profitability (D)</p> Signup and view all the answers

What is the role of the information system (IS) department within an organization?

<p>To support the functioning of the organization by providing information that aids in decision-making.</p> Signup and view all the answers

Centralization of an IS department refers to having IS staff and functions distributed throughout the organization.

<p>False (B)</p> Signup and view all the answers

Which of the following is a disadvantage of centralizing an IS department?

<p>Reduced flexibility in responding to changing business needs (A)</p> Signup and view all the answers

What is outsourcing of an IS department?

<p>When an organization contracts out the management of its IS functions to an external service provider.</p> Signup and view all the answers

The evaluation of an IS department focuses solely on its cost versus benefit impact.

<p>False (B)</p> Signup and view all the answers

Which of the following is NOT a hardware component of a computer system?

<p>Software (A)</p> Signup and view all the answers

What is the primary function of the central processing unit (CPU)?

<p>The CPU carries out the instructions of a computer program. It is essentially the brain of the computer system, executing instructions, performing arithmetic operations, and managing input/output operations.</p> Signup and view all the answers

Which type of memory is known as 'read-only memory' (ROM)?

<p>Flash Memory (A)</p> Signup and view all the answers

What is the purpose of a mouse in a computer system?

<p>It is a pointing device used to control the cursor position on the screen, navigate menus, select objects, and interact with the graphical user interface.</p> Signup and view all the answers

What are the main types of secondary storage media used in a computer system?

<p>Magnetic hard drives, optical disks, flash memory, and tertiary storage.</p> Signup and view all the answers

What is tertiary storage?

<p>A large-scale storage system that uses robotic mechanisms to manage data cartridges. It is often utilized for long-term archiving and backup purposes.</p> Signup and view all the answers

What is software?

<p>A collection of instructions or programs that tell the computer how to perform specific tasks.</p> Signup and view all the answers

Which type of software is responsible for managing the computer system's hardware and providing a platform for running application programs?

<p>Operating system (C)</p> Signup and view all the answers

An embedded operating system is typically used in complex computer systems such as servers and workstations.

<p>False (B)</p> Signup and view all the answers

What are the key factors to consider when choosing a computer operating system?

<p>Speed, ease of use, intended use, security, reliability, hardware compatibility, software compatibility, technical support, and cost.</p> Signup and view all the answers

What is the purpose of utility software?

<p>To help analyze, configure, maintain, and optimize the computer system. It includes programs that help manage hardware, operating systems, and application software.</p> Signup and view all the answers

Which of the following is NOT a function of a database management system (DBMS)?

<p>Develop application programs (C)</p> Signup and view all the answers

What is the purpose of a network operating system (NOS)?

<p>To manage the connections between different computer systems and devices, enabling them to communicate and share resources.</p> Signup and view all the answers

Application software is designed to perform specific tasks that are unrelated to the core functioning of the computer system.

<p>True (A)</p> Signup and view all the answers

What are the key factors to consider when choosing application software?

<p>The specific task to be undertaken, the compatibility with the operating system and hardware, the availability of technical support, and the cost of the software.</p> Signup and view all the answers

What are some common software trends and issues?

<p>Software bugs, updates, upgrades, copyright, shareware, freeware, and software development.</p> Signup and view all the answers

What is a computer network?

<p>A collection of two or more computers that are connected and can communicate with each other using communication media and protocols.</p> Signup and view all the answers

Which of the following is NOT a purpose of a computer network?

<p>Enhancing the security of individual computer systems (C)</p> Signup and view all the answers

What are the components of a communication network?

<p>Communication media, network hardware, data communication protocols, and software needed for communication.</p> Signup and view all the answers

A network interface card (NIC) is a software component that enables computers to connect to a network.

<p>False (B)</p> Signup and view all the answers

What is the primary function of a modem in a network?

<p>To convert data signals between digital and analog formats, enabling communication between computers over telephone lines or cable connections.</p> Signup and view all the answers

Which type of network topology is considered the simplest and the most common?

<p>Star (D)</p> Signup and view all the answers

Which of the following is a significant characteristic of a wide area network (WAN)?

<p>Spans a geographical area larger than a city (C)</p> Signup and view all the answers

Distributed processing refers to a scenario where multiple computers are connected to a network and each computer performs the same task.

<p>False (B)</p> Signup and view all the answers

What is a client/server system?

<p>A network architecture where powerful computers (servers) are dedicated to providing specific services to client computers.</p> Signup and view all the answers

What is cloud computing?

<p>A model where applications and services are delivered over the internet, enabling users to access resources without needing to own or maintain physical hardware.</p> Signup and view all the answers

What are some common threats to a computerised information system?

<p>Errors, waste, computer crime, natural threats, environmental threats, and human threats.</p> Signup and view all the answers

A vulnerability is an opportunity for a threat to exploit a weakness in an information system.

<p>True (A)</p> Signup and view all the answers

What are the primary types of computer-related waste?

<p>Computer waste includes excessive resource usage, such as printing unnecessary documents, sending spam emails, or using computers for non-work purposes.</p> Signup and view all the answers

What type of computer crime involves using social engineering tactics to deceive individuals into divulging sensitive personal information, such as passwords or financial details?

<p>Phishing (B)</p> Signup and view all the answers

What is a denial-of-service (DoS) attack?

<p>An attempt to overwhelm a target system with excessive traffic, making it unavailable to legitimate users.</p> Signup and view all the answers

Which of the following is NOT a type of malware?

<p>Firewall (C)</p> Signup and view all the answers

Controls in a computerised information system are designed to prevent the occurrence of all threats.

<p>False (B)</p> Signup and view all the answers

What are general controls in a computerised information system?

<p>General controls apply to the overall information system and its environment, affecting all transactions and processes. They are designed to ensure the integrity and security of the system as a whole.</p> Signup and view all the answers

What are application controls in a computerised information system?

<p>Application controls are specific to individual applications, focusing on the accuracy, completeness, and validity of data processed by those applications.</p> Signup and view all the answers

Which control type focuses on preventing adverse events from occurring?

<p>Preventive controls (A)</p> Signup and view all the answers

Why is backup of data and documentation important?

<p>To protect critical information and ensure its availability in case of system failure, data loss, or disaster events.</p> Signup and view all the answers

What are corrective controls in a computerised information system?

<p>Corrective controls are implemented after an adverse event has occurred. They aim to rectify the damage and restore the system to its normal operational state.</p> Signup and view all the answers

Disaster planning aims to prevent disasters from happening in the first place.

<p>False (B)</p> Signup and view all the answers

What are the essential elements of an information system security policy?

<p>A definition outlining the security measures to be taken to safeguard the information system and its data.</p> Signup and view all the answers

Which of the following is a common framework used to guide information system security governance?

<p>COBIT (D)</p> Signup and view all the answers

The King III report focuses exclusively on information technology governance.

<p>False (B)</p> Signup and view all the answers

What is the primary purpose of the Information Security Forum (ISF)?

<p>To provide guidance, resources, and support to organizations in managing information security risks.</p> Signup and view all the answers

What is the purpose of segregation of duties?

<p>To distribute responsibility across different individuals so that no single person has complete control over a critical task or process.</p> Signup and view all the answers

What is a transaction processing system (TPS)?

<p>A type of information system that efficiently processes and records daily business transactions, converting them into useful information for decision-making.</p> Signup and view all the answers

An enterprise resource planning (ERP) system integrates all the functions of an organization and can be used throughout the organization.

<p>True (A)</p> Signup and view all the answers

What is the main purpose of a knowledge management system (KMS)?

<p>To capture, store, share, and manage knowledge within an organization, improving decision-making and enhancing overall performance.</p> Signup and view all the answers

What is a customer relationship management (CRM) system?

<p>A type of KMS that focuses on gathering and managing information relevant to customer relationships, improving understanding of customer needs and behaviors.</p> Signup and view all the answers

What is an expert system (ES)?

<p>A type of software application that captures and applies expert knowledge in a specific domain, helping users to solve problems and make informed decisions.</p> Signup and view all the answers

What is a group support system (GSS)?

<p>A collaborative tool that allows users to work together on tasks, share documents, and conduct virtual meetings.</p> Signup and view all the answers

What is an executive support system (ESS)?

<p>A specialized decision support system designed for senior management, providing access to a wide range of data and analytical tools.</p> Signup and view all the answers

E-business encompasses all business processes, including financial, marketing, and operational activities.

<p>True (A)</p> Signup and view all the answers

What is e-marketing?

<p>The use of electronic technologies, such as social media, email, and online advertising, to reach potential customers and promote products or services.</p> Signup and view all the answers

What is m-commerce?

<p>The use of mobile devices, such as smartphones and tablets, to conduct electronic transactions, such as purchasing goods or services.</p> Signup and view all the answers

What is the main purpose of e-commerce?

<p>To conduct business processes, such as selling, buying, and delivering products or services over computer networks.</p> Signup and view all the answers

A business-to-business (B2B) e-commerce transaction involves the exchange of goods or services between businesses.

<p>True (A)</p> Signup and view all the answers

What are some key advantages of e-commerce?

<p>Direct customer relations, product expectations not met, access to global markets, reduced costs, increased competitiveness, data accuracy, more choices available, and always open for business.</p> Signup and view all the answers

What are some specific threats faced by organizations in the e-commerce environment?

<p>Information threats (data alteration, copyright infringement, incorrect website information), technology threats (denial-of-service attacks, technology bugs, insufficient hardware), business threats (customer threats, contractual relationships, use of outsourced service providers).</p> Signup and view all the answers

Firewalls are an effective control measure to protect computer networks from external threats.

<p>True (A)</p> Signup and view all the answers

What is the purpose of digital certificates in e-commerce?

<p>To verify the authenticity of websites and digital transactions, ensuring secure communication and data exchange.</p> Signup and view all the answers

When submitting sensitive information, such as credit card details, it is wise to always look for the 'locked padlock' icon next to the URL address bar to ensure that the website is secure.

<p>True (A)</p> Signup and view all the answers

Which of the following is NOT a common method for mitigating e-commerce threats?

<p>Employing a denial-of-service attack (C)</p> Signup and view all the answers

What is a management information system (MIS)?

<p>An integrated system designed to provide management with a wide variety of reports, supporting decision-making processes and monitoring the organization's performance. It generates regular reports based on historical data, such as sales figures or financial data.</p> Signup and view all the answers

What is a decision support system (DSS)?

<p>An interactive, computer-based system that provides tools and models to assist decision-makers in solving unstructured problems. It enables decision-makers to explore various scenarios, analyze data, and generate potential solutions.</p> Signup and view all the answers

A DSS typically provides structured reports, while an MIS presents information in a more flexible, interactive format.

<p>False (B)</p> Signup and view all the answers

What are the vital objectives of both MIS and DSS?

<p>To provide insights and support to managers in making better decisions, leading to improved efficiency, effectiveness, and profitability of the organization.</p> Signup and view all the answers

One of the primary benefits of a DSS is that it automates decision-making.

<p>False (B)</p> Signup and view all the answers

An ES is more commonly used for addressing complex problems that require a high level of specialized knowledge.

<p>True (A)</p> Signup and view all the answers

What is the main purpose of a CRM system?

<p>To manage a company's relationships with its customers, improving customer satisfaction, loyalty, and retention.</p> Signup and view all the answers

What are some key differences between a DSS and an MIS?

<p>A DSS handles unstructured problems, while an MIS focuses on structured problems. DSSs provide more interactive, flexible support, while MISs typically provide structured reports. DSSs are used at both strategic and technical levels, while MISs are primarily used for operational purposes.</p> Signup and view all the answers

Flashcards

What is a system?

A collection of interrelated components that work together to achieve a common goal.

What is an open system?

Systems that interact with their environment by receiving input and providing output.

What is a closed system?

Systems that are self-contained and do not interact with their environment.

What is an information system?

A collection of interrelated components that collect, process, store, and distribute information to support decision-making and problem-solving.

Signup and view all the flashcards

What is system performance measurement?

How well a system achieves its objectives. It can be measured in terms of accuracy, timeliness, and cost-effectiveness.

Signup and view all the flashcards

What is the role of information systems in organizations?

Information systems enhance efficiency, improve decision-making, and facilitate communication within organizations.

Signup and view all the flashcards

What is a computerized information system?

A system that uses computers and related technology to process information.

Signup and view all the flashcards

What is an accounting information system?

A system that collects, processes, stores, and distributes accounting information to support decision-making, planning, and control.

Signup and view all the flashcards

Why is it important to study accounting information systems?

To understand how accounting information is processed in a digital environment.

Signup and view all the flashcards

What is an information strategy?

A comprehensive plan that outlines how an organization will use information to achieve its strategic goals.

Signup and view all the flashcards

What are the benefits of an information strategy?

Improved decision-making, increased efficiency, and better communication.

Signup and view all the flashcards

What is the information system department?

The department responsible for managing an organization's information systems.

Signup and view all the flashcards

What are the objectives of the IS department?

To ensure the availability, security, and integrity of an organization's information systems.

Signup and view all the flashcards

Who are the members of the IS department?

It includes IT professionals such as system analysts, programmers, database administrators, and network administrators.

Signup and view all the flashcards

Why is it important to hire and terminate IS staff strategically?

Hiring qualified IT personnel ensures efficient system maintenance, while terminating underperforming staff helps maintain a productive team.

Signup and view all the flashcards

How is the IS department organized?

The way the IS department is organized, which can be centralized, decentralized, or a blend of both.

Signup and view all the flashcards

What is centralization in an IS department?

Having a single department that handles all IT functions across an organization.

Signup and view all the flashcards

What is decentralization in an IS department?

Dividing IT responsibilities among different departments within an organization.

Signup and view all the flashcards

What is outsourcing the IS department?

Hiring external companies to manage an organization's IT operations.

Signup and view all the flashcards

How is the IS department evaluated?

Evaluating the IS department's effectiveness, efficiency, and compliance with organizational goals.

Signup and view all the flashcards

What is data?

Raw facts and figures that are unprocessed and lack context.

Signup and view all the flashcards

What is information?

Data that has been processed and organized in a way that provides meaning and value to users.

Signup and view all the flashcards

What is accuracy in information?

Information is accurate when it is free from errors.

Signup and view all the flashcards

What is accessibility in information?

Information is accessible when it is easily available to users who need it.

Signup and view all the flashcards

What is up-to-date information?

Information is up to date when it reflects the latest available data.

Signup and view all the flashcards

What is detailed information?

Information should include all the necessary details, but no more than are required.

Signup and view all the flashcards

What is flexible information?

Information is flexible when it can be used for multiple purposes.

Signup and view all the flashcards

What is relevant information?

Information should be relevant to the needs of the users who will be using it.

Signup and view all the flashcards

What is cost-effectiveness in information?

The cost of producing information should be balanced against its value to the organization.

Signup and view all the flashcards

What is reliable information?

Information is reliable when it can be trusted and depended on.

Signup and view all the flashcards

What is timely information?

Information should be delivered when it is needed.

Signup and view all the flashcards

What is the format of information?

Information should be presented in a format that is clear and easy to understand.

Signup and view all the flashcards

What is the information creating process?

The process of creating information starts with raw data, which is then processed and organized to generate meaningful results.

Signup and view all the flashcards

What are the uses of information?

Information can be used for planning, forecasting, measuring performance, and controlling activities.

Signup and view all the flashcards

Who are the users of information?

Individuals or groups that use information to perform tasks, make decisions, or address specific concerns.

Signup and view all the flashcards

Who are internal users of information?

Individuals or groups within an organization who use information to carry out internal operations.

Signup and view all the flashcards

Who are external users of information?

Individuals or groups outside of an organization who use information to make decisions or assess the organization.

Signup and view all the flashcards

What are examples of internal users?

Internal users of information are those within the organization, such as managers, staff, and employees.

Signup and view all the flashcards

What are examples of external users?

External users of information are those outside the organization, such as investors, customers, and suppliers.

Signup and view all the flashcards

Study Notes

Accounting Information Systems in a Computer Environment - AIN1501

  • This is a study guide for the University of South Africa.
  • It covers accounting information systems in a computer environment.
  • Authors include Mr NJ Booyse, Ms C Leonard, Mr DPJ Scott, and Ms GM Viviers.
  • The Study guide was printed and published in 2018-2020.

Part 1: Introduction to Information Systems

  • Topic 1: Nature of information and information systems

    • Study unit 1: Information:
      • Defines information and its characteristics (accurate, accessible, up-to-date, detailed, flexible, relevant, cost-effective, reliable, timely, and format).
      • Describes the uses and users of information (internal and external, internal sources, external sources).
    • Study unit 2: Information systems:
      • Defines a system and its components (input, processing, output).
      • Explains open and closed systems.
      • Defines an information system (AIS) and its role in organizations.
      • Defines computerised information systems (hardware, software, data communication, people, and procedures).
    • Study unit 3: Information Strategy:
      • Defines an information strategy and its importance.
      • Explanations of the relationship between information, information systems, and information strategy.

Part 2: Information Technology Infrastructure

  • Topic 2: Information Technology Components

    • Study unit 5: Hardware:
      • Introduction, role, and components of hardware in a computer system (input devices, Processing devices, etc).
      • Describes various types of computer systems.
    • Study unit 6: Software:
      • Introduction to system software (operating systems, utility software, database management software).
      • Explains types of operating systems (single-user, multi-tasking, multi-user, embedded) and explains software trends/issues (software bugs, updates, upgrades, licensing, types of software (e.g., shareware, freeware).
      • Discusses software development.
    • Study unit 7: Components of Communication Networks:
      • Explains purposes of computer networks (sharing resources, data, and information, sharing software, information preservation).
      • Explains communication media (wired and wireless) and associated hardware.
    • Study unit 8: Network Configurations:
      • Introduction to network topologies (bus, ring, star, tree, mesh).
      • Geographical scope of networks (PAN, LAN, MAN, WAN, VPN).
    • Study unit 9: The internet, Intranets and Extranets:
      • Explains how the internet works (TCP/IP, protocols, URL, Domain Name System).

Part 3: Threats, Controls, Privacy and Ethics

  • Topic 4: Threats in a computerized environment
    • Study unit 10: Threats to computerised Information Systems:
      • Explains vulnerability, threats, exposure, risk.
      • Lists common threats (natural, environmental, human, errors, and waste).
  • Topic 5: Controls in a computerized environment
    • Study unit 11: Computer and Accounting Information-System Controls:
      • Defines information system security policies and guidelines.
      • Describes general and application controls (preventative, detective, corrective) and disaster planning.
  • Topic 6: Privacy and Ethics Matters in a Computerised Environment
    • Study unit 12: Privacy and Ethical Concerns:
      • Discusses privacy and ethical concerns for individuals and organizations in a computerised environment, including measures to address these concerns.

Part 4: System Development

  • Topic 7: The System development process

    • Study unit 13: System development lifecycles:
      • Introduction to system development concepts.
      • Traditional system development lifecycle (SDLC) Advantages & Disadvantages.
      • Rapid Application Development (RAD).
      • Prototyping.
      • End-user development lifecycle.
    • Study unit 14: System Investigation and System Analysis:
      • Explaining System investigation and analysis.
      • Feasibility analysis (economic, technical, operational, legal, schedule).
      • System investigation report.
    • Study unit 15: System Design:
      • System design concepts and purpose.
      • Logical & physical system design.
      • Interface design.
      • System security & controls.
      • Generating design alternatives.
      • Evaluating and selecting a design.
    • Study unit 16: System Implementation:
      • System implementation process.
      • Hardware & software acquisition, preparation of users, hiring/training staff, site prep, data prep, installation, testing, start-up, and user acceptance.
    • Study unit 17: Systems Review and Maintenance:
      • System review and maintenance concepts and approaches (time-driven and event-driven).
      • The system review team and its responsibilities.
      • System maintenance documentation and reporting.

Part 5: Business Applications

  • Topic 8: Application of Information Systems

    • Study unit 18: Overview of Information Systems:
      • Transaction processing systems (TPS).
      • Enterprise resource planning (ERP).
    • Study unit 19: Management Information Systems and Decision Support Systems:
      • Problem-solving and decision-making process.
      • Management Information Systems (MIS).
      • Decision Support Systems (DSS).
    • Study unit 20: Knowledge Management and Other Specialised Information Systems:
      • Knowledge Management Systems (KMS).
      • Customer Relationship Management (CRM).
      • Expert Systems (ES).
      • Group Support Systems (GSS).
      • Executive Support Systems (ESS).
  • Topic 9: Electronic Commerce

    • Study unit 21: Electronic Commerce:
      • E-business, E-marketing, M-commerce and e-commerce concepts.
      • Main e-commerce categories (B2B, B2C, C2C, C2B, E-Government).
      • Advantages and Disadvantages of systems.
    • Study unit 22: Electronic Commerce Related Threats and Controls:
      • E-commerce specific threats (information threats, technology threats, and business threats).
      • Controls to mitigate e-commerce threats.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser