Podcast
Questions and Answers
The primary purpose of an information system is to gather and process data for decision-making.
The primary purpose of an information system is to gather and process data for decision-making.
True
Which of the following is NOT a characteristic of information used for decision-making purposes?
Which of the following is NOT a characteristic of information used for decision-making purposes?
What does the term 'data' refer to in the context of information systems?
What does the term 'data' refer to in the context of information systems?
Raw material available for processing into information. It consists of numbers, letters, audio, and video data that relate to facts, events, and transactions.
Which of the following is an example of an internal user of information in an organization?
Which of the following is an example of an internal user of information in an organization?
Signup and view all the answers
What is a system?
What is a system?
Signup and view all the answers
A closed system is one that interacts with its environment.
A closed system is one that interacts with its environment.
Signup and view all the answers
What is a system performance measurement?
What is a system performance measurement?
Signup and view all the answers
What is the role of information systems in organizations?
What is the role of information systems in organizations?
Signup and view all the answers
Which of the following is NOT a benefit of having a well-defined information strategy in an organization?
Which of the following is NOT a benefit of having a well-defined information strategy in an organization?
Signup and view all the answers
What is the role of the information system (IS) department within an organization?
What is the role of the information system (IS) department within an organization?
Signup and view all the answers
Centralization of an IS department refers to having IS staff and functions distributed throughout the organization.
Centralization of an IS department refers to having IS staff and functions distributed throughout the organization.
Signup and view all the answers
Which of the following is a disadvantage of centralizing an IS department?
Which of the following is a disadvantage of centralizing an IS department?
Signup and view all the answers
What is outsourcing of an IS department?
What is outsourcing of an IS department?
Signup and view all the answers
The evaluation of an IS department focuses solely on its cost versus benefit impact.
The evaluation of an IS department focuses solely on its cost versus benefit impact.
Signup and view all the answers
Which of the following is NOT a hardware component of a computer system?
Which of the following is NOT a hardware component of a computer system?
Signup and view all the answers
What is the primary function of the central processing unit (CPU)?
What is the primary function of the central processing unit (CPU)?
Signup and view all the answers
Which type of memory is known as 'read-only memory' (ROM)?
Which type of memory is known as 'read-only memory' (ROM)?
Signup and view all the answers
What is the purpose of a mouse in a computer system?
What is the purpose of a mouse in a computer system?
Signup and view all the answers
What are the main types of secondary storage media used in a computer system?
What are the main types of secondary storage media used in a computer system?
Signup and view all the answers
What is tertiary storage?
What is tertiary storage?
Signup and view all the answers
What is software?
What is software?
Signup and view all the answers
Which type of software is responsible for managing the computer system's hardware and providing a platform for running application programs?
Which type of software is responsible for managing the computer system's hardware and providing a platform for running application programs?
Signup and view all the answers
An embedded operating system is typically used in complex computer systems such as servers and workstations.
An embedded operating system is typically used in complex computer systems such as servers and workstations.
Signup and view all the answers
What are the key factors to consider when choosing a computer operating system?
What are the key factors to consider when choosing a computer operating system?
Signup and view all the answers
What is the purpose of utility software?
What is the purpose of utility software?
Signup and view all the answers
Which of the following is NOT a function of a database management system (DBMS)?
Which of the following is NOT a function of a database management system (DBMS)?
Signup and view all the answers
What is the purpose of a network operating system (NOS)?
What is the purpose of a network operating system (NOS)?
Signup and view all the answers
Application software is designed to perform specific tasks that are unrelated to the core functioning of the computer system.
Application software is designed to perform specific tasks that are unrelated to the core functioning of the computer system.
Signup and view all the answers
What are the key factors to consider when choosing application software?
What are the key factors to consider when choosing application software?
Signup and view all the answers
What are some common software trends and issues?
What are some common software trends and issues?
Signup and view all the answers
What is a computer network?
What is a computer network?
Signup and view all the answers
Which of the following is NOT a purpose of a computer network?
Which of the following is NOT a purpose of a computer network?
Signup and view all the answers
What are the components of a communication network?
What are the components of a communication network?
Signup and view all the answers
A network interface card (NIC) is a software component that enables computers to connect to a network.
A network interface card (NIC) is a software component that enables computers to connect to a network.
Signup and view all the answers
What is the primary function of a modem in a network?
What is the primary function of a modem in a network?
Signup and view all the answers
Which type of network topology is considered the simplest and the most common?
Which type of network topology is considered the simplest and the most common?
Signup and view all the answers
Which of the following is a significant characteristic of a wide area network (WAN)?
Which of the following is a significant characteristic of a wide area network (WAN)?
Signup and view all the answers
Distributed processing refers to a scenario where multiple computers are connected to a network and each computer performs the same task.
Distributed processing refers to a scenario where multiple computers are connected to a network and each computer performs the same task.
Signup and view all the answers
What is a client/server system?
What is a client/server system?
Signup and view all the answers
What is cloud computing?
What is cloud computing?
Signup and view all the answers
What are some common threats to a computerised information system?
What are some common threats to a computerised information system?
Signup and view all the answers
A vulnerability is an opportunity for a threat to exploit a weakness in an information system.
A vulnerability is an opportunity for a threat to exploit a weakness in an information system.
Signup and view all the answers
What are the primary types of computer-related waste?
What are the primary types of computer-related waste?
Signup and view all the answers
What type of computer crime involves using social engineering tactics to deceive individuals into divulging sensitive personal information, such as passwords or financial details?
What type of computer crime involves using social engineering tactics to deceive individuals into divulging sensitive personal information, such as passwords or financial details?
Signup and view all the answers
What is a denial-of-service (DoS) attack?
What is a denial-of-service (DoS) attack?
Signup and view all the answers
Which of the following is NOT a type of malware?
Which of the following is NOT a type of malware?
Signup and view all the answers
Controls in a computerised information system are designed to prevent the occurrence of all threats.
Controls in a computerised information system are designed to prevent the occurrence of all threats.
Signup and view all the answers
What are general controls in a computerised information system?
What are general controls in a computerised information system?
Signup and view all the answers
What are application controls in a computerised information system?
What are application controls in a computerised information system?
Signup and view all the answers
Which control type focuses on preventing adverse events from occurring?
Which control type focuses on preventing adverse events from occurring?
Signup and view all the answers
Why is backup of data and documentation important?
Why is backup of data and documentation important?
Signup and view all the answers
What are corrective controls in a computerised information system?
What are corrective controls in a computerised information system?
Signup and view all the answers
Disaster planning aims to prevent disasters from happening in the first place.
Disaster planning aims to prevent disasters from happening in the first place.
Signup and view all the answers
What are the essential elements of an information system security policy?
What are the essential elements of an information system security policy?
Signup and view all the answers
Which of the following is a common framework used to guide information system security governance?
Which of the following is a common framework used to guide information system security governance?
Signup and view all the answers
The King III report focuses exclusively on information technology governance.
The King III report focuses exclusively on information technology governance.
Signup and view all the answers
What is the primary purpose of the Information Security Forum (ISF)?
What is the primary purpose of the Information Security Forum (ISF)?
Signup and view all the answers
What is the purpose of segregation of duties?
What is the purpose of segregation of duties?
Signup and view all the answers
What is a transaction processing system (TPS)?
What is a transaction processing system (TPS)?
Signup and view all the answers
An enterprise resource planning (ERP) system integrates all the functions of an organization and can be used throughout the organization.
An enterprise resource planning (ERP) system integrates all the functions of an organization and can be used throughout the organization.
Signup and view all the answers
What is the main purpose of a knowledge management system (KMS)?
What is the main purpose of a knowledge management system (KMS)?
Signup and view all the answers
What is a customer relationship management (CRM) system?
What is a customer relationship management (CRM) system?
Signup and view all the answers
What is an expert system (ES)?
What is an expert system (ES)?
Signup and view all the answers
What is a group support system (GSS)?
What is a group support system (GSS)?
Signup and view all the answers
What is an executive support system (ESS)?
What is an executive support system (ESS)?
Signup and view all the answers
E-business encompasses all business processes, including financial, marketing, and operational activities.
E-business encompasses all business processes, including financial, marketing, and operational activities.
Signup and view all the answers
What is e-marketing?
What is e-marketing?
Signup and view all the answers
What is m-commerce?
What is m-commerce?
Signup and view all the answers
What is the main purpose of e-commerce?
What is the main purpose of e-commerce?
Signup and view all the answers
A business-to-business (B2B) e-commerce transaction involves the exchange of goods or services between businesses.
A business-to-business (B2B) e-commerce transaction involves the exchange of goods or services between businesses.
Signup and view all the answers
What are some key advantages of e-commerce?
What are some key advantages of e-commerce?
Signup and view all the answers
What are some specific threats faced by organizations in the e-commerce environment?
What are some specific threats faced by organizations in the e-commerce environment?
Signup and view all the answers
Firewalls are an effective control measure to protect computer networks from external threats.
Firewalls are an effective control measure to protect computer networks from external threats.
Signup and view all the answers
What is the purpose of digital certificates in e-commerce?
What is the purpose of digital certificates in e-commerce?
Signup and view all the answers
When submitting sensitive information, such as credit card details, it is wise to always look for the 'locked padlock' icon next to the URL address bar to ensure that the website is secure.
When submitting sensitive information, such as credit card details, it is wise to always look for the 'locked padlock' icon next to the URL address bar to ensure that the website is secure.
Signup and view all the answers
Which of the following is NOT a common method for mitigating e-commerce threats?
Which of the following is NOT a common method for mitigating e-commerce threats?
Signup and view all the answers
What is a management information system (MIS)?
What is a management information system (MIS)?
Signup and view all the answers
What is a decision support system (DSS)?
What is a decision support system (DSS)?
Signup and view all the answers
A DSS typically provides structured reports, while an MIS presents information in a more flexible, interactive format.
A DSS typically provides structured reports, while an MIS presents information in a more flexible, interactive format.
Signup and view all the answers
What are the vital objectives of both MIS and DSS?
What are the vital objectives of both MIS and DSS?
Signup and view all the answers
One of the primary benefits of a DSS is that it automates decision-making.
One of the primary benefits of a DSS is that it automates decision-making.
Signup and view all the answers
An ES is more commonly used for addressing complex problems that require a high level of specialized knowledge.
An ES is more commonly used for addressing complex problems that require a high level of specialized knowledge.
Signup and view all the answers
What is the main purpose of a CRM system?
What is the main purpose of a CRM system?
Signup and view all the answers
What are some key differences between a DSS and an MIS?
What are some key differences between a DSS and an MIS?
Signup and view all the answers
Study Notes
Accounting Information Systems in a Computer Environment - AIN1501
- This is a study guide for the University of South Africa.
- It covers accounting information systems in a computer environment.
- Authors include Mr NJ Booyse, Ms C Leonard, Mr DPJ Scott, and Ms GM Viviers.
- The Study guide was printed and published in 2018-2020.
Part 1: Introduction to Information Systems
-
Topic 1: Nature of information and information systems
-
Study unit 1: Information:
- Defines information and its characteristics (accurate, accessible, up-to-date, detailed, flexible, relevant, cost-effective, reliable, timely, and format).
- Describes the uses and users of information (internal and external, internal sources, external sources).
-
Study unit 2: Information systems:
- Defines a system and its components (input, processing, output).
- Explains open and closed systems.
- Defines an information system (AIS) and its role in organizations.
- Defines computerised information systems (hardware, software, data communication, people, and procedures).
-
Study unit 3: Information Strategy:
- Defines an information strategy and its importance.
- Explanations of the relationship between information, information systems, and information strategy.
-
Study unit 1: Information:
Part 2: Information Technology Infrastructure
-
Topic 2: Information Technology Components
-
Study unit 5: Hardware:
- Introduction, role, and components of hardware in a computer system (input devices, Processing devices, etc).
- Describes various types of computer systems.
-
Study unit 6: Software:
- Introduction to system software (operating systems, utility software, database management software).
- Explains types of operating systems (single-user, multi-tasking, multi-user, embedded) and explains software trends/issues (software bugs, updates, upgrades, licensing, types of software (e.g., shareware, freeware).
- Discusses software development.
-
Study unit 7: Components of Communication Networks:
- Explains purposes of computer networks (sharing resources, data, and information, sharing software, information preservation).
- Explains communication media (wired and wireless) and associated hardware.
-
Study unit 8: Network Configurations:
- Introduction to network topologies (bus, ring, star, tree, mesh).
- Geographical scope of networks (PAN, LAN, MAN, WAN, VPN).
-
Study unit 9: The internet, Intranets and Extranets:
- Explains how the internet works (TCP/IP, protocols, URL, Domain Name System).
-
Study unit 5: Hardware:
Part 3: Threats, Controls, Privacy and Ethics
-
Topic 4: Threats in a computerized environment
-
Study unit 10: Threats to computerised Information Systems:
- Explains vulnerability, threats, exposure, risk.
- Lists common threats (natural, environmental, human, errors, and waste).
-
Study unit 10: Threats to computerised Information Systems:
-
Topic 5: Controls in a computerized environment
-
Study unit 11: Computer and Accounting Information-System Controls:
- Defines information system security policies and guidelines.
- Describes general and application controls (preventative, detective, corrective) and disaster planning.
-
Study unit 11: Computer and Accounting Information-System Controls:
-
Topic 6: Privacy and Ethics Matters in a Computerised Environment
-
Study unit 12: Privacy and Ethical Concerns:
- Discusses privacy and ethical concerns for individuals and organizations in a computerised environment, including measures to address these concerns.
-
Study unit 12: Privacy and Ethical Concerns:
Part 4: System Development
-
Topic 7: The System development process
-
Study unit 13: System development lifecycles:
- Introduction to system development concepts.
- Traditional system development lifecycle (SDLC) Advantages & Disadvantages.
- Rapid Application Development (RAD).
- Prototyping.
- End-user development lifecycle.
-
Study unit 14: System Investigation and System Analysis:
- Explaining System investigation and analysis.
- Feasibility analysis (economic, technical, operational, legal, schedule).
- System investigation report.
-
Study unit 15: System Design:
- System design concepts and purpose.
- Logical & physical system design.
- Interface design.
- System security & controls.
- Generating design alternatives.
- Evaluating and selecting a design.
-
Study unit 16: System Implementation:
- System implementation process.
- Hardware & software acquisition, preparation of users, hiring/training staff, site prep, data prep, installation, testing, start-up, and user acceptance.
-
Study unit 17: Systems Review and Maintenance:
- System review and maintenance concepts and approaches (time-driven and event-driven).
- The system review team and its responsibilities.
- System maintenance documentation and reporting.
-
Study unit 13: System development lifecycles:
Part 5: Business Applications
-
Topic 8: Application of Information Systems
-
Study unit 18: Overview of Information Systems:
- Transaction processing systems (TPS).
- Enterprise resource planning (ERP).
-
Study unit 19: Management Information Systems and Decision Support Systems:
- Problem-solving and decision-making process.
- Management Information Systems (MIS).
- Decision Support Systems (DSS).
-
Study unit 20: Knowledge Management and Other Specialised Information Systems:
- Knowledge Management Systems (KMS).
- Customer Relationship Management (CRM).
- Expert Systems (ES).
- Group Support Systems (GSS).
- Executive Support Systems (ESS).
-
Study unit 18: Overview of Information Systems:
-
Topic 9: Electronic Commerce
-
Study unit 21: Electronic Commerce:
- E-business, E-marketing, M-commerce and e-commerce concepts.
- Main e-commerce categories (B2B, B2C, C2C, C2B, E-Government).
- Advantages and Disadvantages of systems.
-
Study unit 22: Electronic Commerce Related Threats and Controls:
- E-commerce specific threats (information threats, technology threats, and business threats).
- Controls to mitigate e-commerce threats.
-
Study unit 21: Electronic Commerce:
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz focuses on the study of accounting information systems within a computer environment, specifically tailored for the University of South Africa course AIN1501. It covers essential concepts such as the nature of information, components of information systems, and the definition of an Accounting Information System (AIS).