Podcast
Questions and Answers
The primary purpose of an information system is to gather and process data for decision-making.
The primary purpose of an information system is to gather and process data for decision-making.
True (A)
Which of the following is NOT a characteristic of information used for decision-making purposes?
Which of the following is NOT a characteristic of information used for decision-making purposes?
- Relevant
- Subjective (correct)
- Accessible
- Accurate
What does the term 'data' refer to in the context of information systems?
What does the term 'data' refer to in the context of information systems?
Raw material available for processing into information. It consists of numbers, letters, audio, and video data that relate to facts, events, and transactions.
Which of the following is an example of an internal user of information in an organization?
Which of the following is an example of an internal user of information in an organization?
What is a system?
What is a system?
A closed system is one that interacts with its environment.
A closed system is one that interacts with its environment.
What is a system performance measurement?
What is a system performance measurement?
What is the role of information systems in organizations?
What is the role of information systems in organizations?
Which of the following is NOT a benefit of having a well-defined information strategy in an organization?
Which of the following is NOT a benefit of having a well-defined information strategy in an organization?
What is the role of the information system (IS) department within an organization?
What is the role of the information system (IS) department within an organization?
Centralization of an IS department refers to having IS staff and functions distributed throughout the organization.
Centralization of an IS department refers to having IS staff and functions distributed throughout the organization.
Which of the following is a disadvantage of centralizing an IS department?
Which of the following is a disadvantage of centralizing an IS department?
What is outsourcing of an IS department?
What is outsourcing of an IS department?
The evaluation of an IS department focuses solely on its cost versus benefit impact.
The evaluation of an IS department focuses solely on its cost versus benefit impact.
Which of the following is NOT a hardware component of a computer system?
Which of the following is NOT a hardware component of a computer system?
What is the primary function of the central processing unit (CPU)?
What is the primary function of the central processing unit (CPU)?
Which type of memory is known as 'read-only memory' (ROM)?
Which type of memory is known as 'read-only memory' (ROM)?
What is the purpose of a mouse in a computer system?
What is the purpose of a mouse in a computer system?
What are the main types of secondary storage media used in a computer system?
What are the main types of secondary storage media used in a computer system?
What is tertiary storage?
What is tertiary storage?
What is software?
What is software?
Which type of software is responsible for managing the computer system's hardware and providing a platform for running application programs?
Which type of software is responsible for managing the computer system's hardware and providing a platform for running application programs?
An embedded operating system is typically used in complex computer systems such as servers and workstations.
An embedded operating system is typically used in complex computer systems such as servers and workstations.
What are the key factors to consider when choosing a computer operating system?
What are the key factors to consider when choosing a computer operating system?
What is the purpose of utility software?
What is the purpose of utility software?
Which of the following is NOT a function of a database management system (DBMS)?
Which of the following is NOT a function of a database management system (DBMS)?
What is the purpose of a network operating system (NOS)?
What is the purpose of a network operating system (NOS)?
Application software is designed to perform specific tasks that are unrelated to the core functioning of the computer system.
Application software is designed to perform specific tasks that are unrelated to the core functioning of the computer system.
What are the key factors to consider when choosing application software?
What are the key factors to consider when choosing application software?
What are some common software trends and issues?
What are some common software trends and issues?
What is a computer network?
What is a computer network?
Which of the following is NOT a purpose of a computer network?
Which of the following is NOT a purpose of a computer network?
What are the components of a communication network?
What are the components of a communication network?
A network interface card (NIC) is a software component that enables computers to connect to a network.
A network interface card (NIC) is a software component that enables computers to connect to a network.
What is the primary function of a modem in a network?
What is the primary function of a modem in a network?
Which type of network topology is considered the simplest and the most common?
Which type of network topology is considered the simplest and the most common?
Which of the following is a significant characteristic of a wide area network (WAN)?
Which of the following is a significant characteristic of a wide area network (WAN)?
Distributed processing refers to a scenario where multiple computers are connected to a network and each computer performs the same task.
Distributed processing refers to a scenario where multiple computers are connected to a network and each computer performs the same task.
What is a client/server system?
What is a client/server system?
What is cloud computing?
What is cloud computing?
What are some common threats to a computerised information system?
What are some common threats to a computerised information system?
A vulnerability is an opportunity for a threat to exploit a weakness in an information system.
A vulnerability is an opportunity for a threat to exploit a weakness in an information system.
What are the primary types of computer-related waste?
What are the primary types of computer-related waste?
What type of computer crime involves using social engineering tactics to deceive individuals into divulging sensitive personal information, such as passwords or financial details?
What type of computer crime involves using social engineering tactics to deceive individuals into divulging sensitive personal information, such as passwords or financial details?
What is a denial-of-service (DoS) attack?
What is a denial-of-service (DoS) attack?
Which of the following is NOT a type of malware?
Which of the following is NOT a type of malware?
Controls in a computerised information system are designed to prevent the occurrence of all threats.
Controls in a computerised information system are designed to prevent the occurrence of all threats.
What are general controls in a computerised information system?
What are general controls in a computerised information system?
What are application controls in a computerised information system?
What are application controls in a computerised information system?
Which control type focuses on preventing adverse events from occurring?
Which control type focuses on preventing adverse events from occurring?
Why is backup of data and documentation important?
Why is backup of data and documentation important?
What are corrective controls in a computerised information system?
What are corrective controls in a computerised information system?
Disaster planning aims to prevent disasters from happening in the first place.
Disaster planning aims to prevent disasters from happening in the first place.
What are the essential elements of an information system security policy?
What are the essential elements of an information system security policy?
Which of the following is a common framework used to guide information system security governance?
Which of the following is a common framework used to guide information system security governance?
The King III report focuses exclusively on information technology governance.
The King III report focuses exclusively on information technology governance.
What is the primary purpose of the Information Security Forum (ISF)?
What is the primary purpose of the Information Security Forum (ISF)?
What is the purpose of segregation of duties?
What is the purpose of segregation of duties?
What is a transaction processing system (TPS)?
What is a transaction processing system (TPS)?
An enterprise resource planning (ERP) system integrates all the functions of an organization and can be used throughout the organization.
An enterprise resource planning (ERP) system integrates all the functions of an organization and can be used throughout the organization.
What is the main purpose of a knowledge management system (KMS)?
What is the main purpose of a knowledge management system (KMS)?
What is a customer relationship management (CRM) system?
What is a customer relationship management (CRM) system?
What is an expert system (ES)?
What is an expert system (ES)?
What is a group support system (GSS)?
What is a group support system (GSS)?
What is an executive support system (ESS)?
What is an executive support system (ESS)?
E-business encompasses all business processes, including financial, marketing, and operational activities.
E-business encompasses all business processes, including financial, marketing, and operational activities.
What is e-marketing?
What is e-marketing?
What is m-commerce?
What is m-commerce?
What is the main purpose of e-commerce?
What is the main purpose of e-commerce?
A business-to-business (B2B) e-commerce transaction involves the exchange of goods or services between businesses.
A business-to-business (B2B) e-commerce transaction involves the exchange of goods or services between businesses.
What are some key advantages of e-commerce?
What are some key advantages of e-commerce?
What are some specific threats faced by organizations in the e-commerce environment?
What are some specific threats faced by organizations in the e-commerce environment?
Firewalls are an effective control measure to protect computer networks from external threats.
Firewalls are an effective control measure to protect computer networks from external threats.
What is the purpose of digital certificates in e-commerce?
What is the purpose of digital certificates in e-commerce?
When submitting sensitive information, such as credit card details, it is wise to always look for the 'locked padlock' icon next to the URL address bar to ensure that the website is secure.
When submitting sensitive information, such as credit card details, it is wise to always look for the 'locked padlock' icon next to the URL address bar to ensure that the website is secure.
Which of the following is NOT a common method for mitigating e-commerce threats?
Which of the following is NOT a common method for mitigating e-commerce threats?
What is a management information system (MIS)?
What is a management information system (MIS)?
What is a decision support system (DSS)?
What is a decision support system (DSS)?
A DSS typically provides structured reports, while an MIS presents information in a more flexible, interactive format.
A DSS typically provides structured reports, while an MIS presents information in a more flexible, interactive format.
What are the vital objectives of both MIS and DSS?
What are the vital objectives of both MIS and DSS?
One of the primary benefits of a DSS is that it automates decision-making.
One of the primary benefits of a DSS is that it automates decision-making.
An ES is more commonly used for addressing complex problems that require a high level of specialized knowledge.
An ES is more commonly used for addressing complex problems that require a high level of specialized knowledge.
What is the main purpose of a CRM system?
What is the main purpose of a CRM system?
What are some key differences between a DSS and an MIS?
What are some key differences between a DSS and an MIS?
Flashcards
What is a system?
What is a system?
A collection of interrelated components that work together to achieve a common goal.
What is an open system?
What is an open system?
Systems that interact with their environment by receiving input and providing output.
What is a closed system?
What is a closed system?
Systems that are self-contained and do not interact with their environment.
What is an information system?
What is an information system?
Signup and view all the flashcards
What is system performance measurement?
What is system performance measurement?
Signup and view all the flashcards
What is the role of information systems in organizations?
What is the role of information systems in organizations?
Signup and view all the flashcards
What is a computerized information system?
What is a computerized information system?
Signup and view all the flashcards
What is an accounting information system?
What is an accounting information system?
Signup and view all the flashcards
Why is it important to study accounting information systems?
Why is it important to study accounting information systems?
Signup and view all the flashcards
What is an information strategy?
What is an information strategy?
Signup and view all the flashcards
What are the benefits of an information strategy?
What are the benefits of an information strategy?
Signup and view all the flashcards
What is the information system department?
What is the information system department?
Signup and view all the flashcards
What are the objectives of the IS department?
What are the objectives of the IS department?
Signup and view all the flashcards
Who are the members of the IS department?
Who are the members of the IS department?
Signup and view all the flashcards
Why is it important to hire and terminate IS staff strategically?
Why is it important to hire and terminate IS staff strategically?
Signup and view all the flashcards
How is the IS department organized?
How is the IS department organized?
Signup and view all the flashcards
What is centralization in an IS department?
What is centralization in an IS department?
Signup and view all the flashcards
What is decentralization in an IS department?
What is decentralization in an IS department?
Signup and view all the flashcards
What is outsourcing the IS department?
What is outsourcing the IS department?
Signup and view all the flashcards
How is the IS department evaluated?
How is the IS department evaluated?
Signup and view all the flashcards
What is data?
What is data?
Signup and view all the flashcards
What is information?
What is information?
Signup and view all the flashcards
What is accuracy in information?
What is accuracy in information?
Signup and view all the flashcards
What is accessibility in information?
What is accessibility in information?
Signup and view all the flashcards
What is up-to-date information?
What is up-to-date information?
Signup and view all the flashcards
What is detailed information?
What is detailed information?
Signup and view all the flashcards
What is flexible information?
What is flexible information?
Signup and view all the flashcards
What is relevant information?
What is relevant information?
Signup and view all the flashcards
What is cost-effectiveness in information?
What is cost-effectiveness in information?
Signup and view all the flashcards
What is reliable information?
What is reliable information?
Signup and view all the flashcards
What is timely information?
What is timely information?
Signup and view all the flashcards
What is the format of information?
What is the format of information?
Signup and view all the flashcards
What is the information creating process?
What is the information creating process?
Signup and view all the flashcards
What are the uses of information?
What are the uses of information?
Signup and view all the flashcards
Who are the users of information?
Who are the users of information?
Signup and view all the flashcards
Who are internal users of information?
Who are internal users of information?
Signup and view all the flashcards
Who are external users of information?
Who are external users of information?
Signup and view all the flashcards
What are examples of internal users?
What are examples of internal users?
Signup and view all the flashcards
What are examples of external users?
What are examples of external users?
Signup and view all the flashcards
Study Notes
Accounting Information Systems in a Computer Environment - AIN1501
- This is a study guide for the University of South Africa.
- It covers accounting information systems in a computer environment.
- Authors include Mr NJ Booyse, Ms C Leonard, Mr DPJ Scott, and Ms GM Viviers.
- The Study guide was printed and published in 2018-2020.
Part 1: Introduction to Information Systems
-
Topic 1: Nature of information and information systems
- Study unit 1: Information:
- Defines information and its characteristics (accurate, accessible, up-to-date, detailed, flexible, relevant, cost-effective, reliable, timely, and format).
- Describes the uses and users of information (internal and external, internal sources, external sources).
- Study unit 2: Information systems:
- Defines a system and its components (input, processing, output).
- Explains open and closed systems.
- Defines an information system (AIS) and its role in organizations.
- Defines computerised information systems (hardware, software, data communication, people, and procedures).
- Study unit 3: Information Strategy:
- Defines an information strategy and its importance.
- Explanations of the relationship between information, information systems, and information strategy.
- Study unit 1: Information:
Part 2: Information Technology Infrastructure
-
Topic 2: Information Technology Components
- Study unit 5: Hardware:
- Introduction, role, and components of hardware in a computer system (input devices, Processing devices, etc).
- Describes various types of computer systems.
- Study unit 6: Software:
- Introduction to system software (operating systems, utility software, database management software).
- Explains types of operating systems (single-user, multi-tasking, multi-user, embedded) and explains software trends/issues (software bugs, updates, upgrades, licensing, types of software (e.g., shareware, freeware).
- Discusses software development.
- Study unit 7: Components of Communication Networks:
- Explains purposes of computer networks (sharing resources, data, and information, sharing software, information preservation).
- Explains communication media (wired and wireless) and associated hardware.
- Study unit 8: Network Configurations:
- Introduction to network topologies (bus, ring, star, tree, mesh).
- Geographical scope of networks (PAN, LAN, MAN, WAN, VPN).
- Study unit 9: The internet, Intranets and Extranets:
- Explains how the internet works (TCP/IP, protocols, URL, Domain Name System).
- Study unit 5: Hardware:
Part 3: Threats, Controls, Privacy and Ethics
- Topic 4: Threats in a computerized environment
- Study unit 10: Threats to computerised Information Systems:
- Explains vulnerability, threats, exposure, risk.
- Lists common threats (natural, environmental, human, errors, and waste).
- Study unit 10: Threats to computerised Information Systems:
- Topic 5: Controls in a computerized environment
- Study unit 11: Computer and Accounting Information-System Controls:
- Defines information system security policies and guidelines.
- Describes general and application controls (preventative, detective, corrective) and disaster planning.
- Study unit 11: Computer and Accounting Information-System Controls:
- Topic 6: Privacy and Ethics Matters in a Computerised Environment
- Study unit 12: Privacy and Ethical Concerns:
- Discusses privacy and ethical concerns for individuals and organizations in a computerised environment, including measures to address these concerns.
- Study unit 12: Privacy and Ethical Concerns:
Part 4: System Development
-
Topic 7: The System development process
- Study unit 13: System development lifecycles:
- Introduction to system development concepts.
- Traditional system development lifecycle (SDLC) Advantages & Disadvantages.
- Rapid Application Development (RAD).
- Prototyping.
- End-user development lifecycle.
- Study unit 14: System Investigation and System Analysis:
- Explaining System investigation and analysis.
- Feasibility analysis (economic, technical, operational, legal, schedule).
- System investigation report.
- Study unit 15: System Design:
- System design concepts and purpose.
- Logical & physical system design.
- Interface design.
- System security & controls.
- Generating design alternatives.
- Evaluating and selecting a design.
- Study unit 16: System Implementation:
- System implementation process.
- Hardware & software acquisition, preparation of users, hiring/training staff, site prep, data prep, installation, testing, start-up, and user acceptance.
- Study unit 17: Systems Review and Maintenance:
- System review and maintenance concepts and approaches (time-driven and event-driven).
- The system review team and its responsibilities.
- System maintenance documentation and reporting.
- Study unit 13: System development lifecycles:
Part 5: Business Applications
-
Topic 8: Application of Information Systems
- Study unit 18: Overview of Information Systems:
- Transaction processing systems (TPS).
- Enterprise resource planning (ERP).
- Study unit 19: Management Information Systems and Decision Support Systems:
- Problem-solving and decision-making process.
- Management Information Systems (MIS).
- Decision Support Systems (DSS).
- Study unit 20: Knowledge Management and Other Specialised Information Systems:
- Knowledge Management Systems (KMS).
- Customer Relationship Management (CRM).
- Expert Systems (ES).
- Group Support Systems (GSS).
- Executive Support Systems (ESS).
- Study unit 18: Overview of Information Systems:
-
Topic 9: Electronic Commerce
- Study unit 21: Electronic Commerce:
- E-business, E-marketing, M-commerce and e-commerce concepts.
- Main e-commerce categories (B2B, B2C, C2C, C2B, E-Government).
- Advantages and Disadvantages of systems.
- Study unit 22: Electronic Commerce Related Threats and Controls:
- E-commerce specific threats (information threats, technology threats, and business threats).
- Controls to mitigate e-commerce threats.
- Study unit 21: Electronic Commerce:
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.