Accounting Information Systems - AIN1501
84 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

The primary purpose of an information system is to gather and process data for decision-making.

True

Which of the following is NOT a characteristic of information used for decision-making purposes?

  • Relevant
  • Subjective (correct)
  • Accessible
  • Accurate
  • What does the term 'data' refer to in the context of information systems?

    Raw material available for processing into information. It consists of numbers, letters, audio, and video data that relate to facts, events, and transactions.

    Which of the following is an example of an internal user of information in an organization?

    <p>Production Manager</p> Signup and view all the answers

    What is a system?

    <p>A set of components that serve a common purpose and interact to achieve a goal.</p> Signup and view all the answers

    A closed system is one that interacts with its environment.

    <p>False</p> Signup and view all the answers

    What is a system performance measurement?

    <p>Monitoring and evaluating the effectiveness of a system in achieving its intended outcomes.</p> Signup and view all the answers

    What is the role of information systems in organizations?

    <p>To provide a structured way of collecting, processing, managing, and reporting information for informed decision-making.</p> Signup and view all the answers

    Which of the following is NOT a benefit of having a well-defined information strategy in an organization?

    <p>Guaranteed profitability</p> Signup and view all the answers

    What is the role of the information system (IS) department within an organization?

    <p>To support the functioning of the organization by providing information that aids in decision-making.</p> Signup and view all the answers

    Centralization of an IS department refers to having IS staff and functions distributed throughout the organization.

    <p>False</p> Signup and view all the answers

    Which of the following is a disadvantage of centralizing an IS department?

    <p>Reduced flexibility in responding to changing business needs</p> Signup and view all the answers

    What is outsourcing of an IS department?

    <p>When an organization contracts out the management of its IS functions to an external service provider.</p> Signup and view all the answers

    The evaluation of an IS department focuses solely on its cost versus benefit impact.

    <p>False</p> Signup and view all the answers

    Which of the following is NOT a hardware component of a computer system?

    <p>Software</p> Signup and view all the answers

    What is the primary function of the central processing unit (CPU)?

    <p>The CPU carries out the instructions of a computer program. It is essentially the brain of the computer system, executing instructions, performing arithmetic operations, and managing input/output operations.</p> Signup and view all the answers

    Which type of memory is known as 'read-only memory' (ROM)?

    <p>Flash Memory</p> Signup and view all the answers

    What is the purpose of a mouse in a computer system?

    <p>It is a pointing device used to control the cursor position on the screen, navigate menus, select objects, and interact with the graphical user interface.</p> Signup and view all the answers

    What are the main types of secondary storage media used in a computer system?

    <p>Magnetic hard drives, optical disks, flash memory, and tertiary storage.</p> Signup and view all the answers

    What is tertiary storage?

    <p>A large-scale storage system that uses robotic mechanisms to manage data cartridges. It is often utilized for long-term archiving and backup purposes.</p> Signup and view all the answers

    What is software?

    <p>A collection of instructions or programs that tell the computer how to perform specific tasks.</p> Signup and view all the answers

    Which type of software is responsible for managing the computer system's hardware and providing a platform for running application programs?

    <p>Operating system</p> Signup and view all the answers

    An embedded operating system is typically used in complex computer systems such as servers and workstations.

    <p>False</p> Signup and view all the answers

    What are the key factors to consider when choosing a computer operating system?

    <p>Speed, ease of use, intended use, security, reliability, hardware compatibility, software compatibility, technical support, and cost.</p> Signup and view all the answers

    What is the purpose of utility software?

    <p>To help analyze, configure, maintain, and optimize the computer system. It includes programs that help manage hardware, operating systems, and application software.</p> Signup and view all the answers

    Which of the following is NOT a function of a database management system (DBMS)?

    <p>Develop application programs</p> Signup and view all the answers

    What is the purpose of a network operating system (NOS)?

    <p>To manage the connections between different computer systems and devices, enabling them to communicate and share resources.</p> Signup and view all the answers

    Application software is designed to perform specific tasks that are unrelated to the core functioning of the computer system.

    <p>True</p> Signup and view all the answers

    What are the key factors to consider when choosing application software?

    <p>The specific task to be undertaken, the compatibility with the operating system and hardware, the availability of technical support, and the cost of the software.</p> Signup and view all the answers

    What are some common software trends and issues?

    <p>Software bugs, updates, upgrades, copyright, shareware, freeware, and software development.</p> Signup and view all the answers

    What is a computer network?

    <p>A collection of two or more computers that are connected and can communicate with each other using communication media and protocols.</p> Signup and view all the answers

    Which of the following is NOT a purpose of a computer network?

    <p>Enhancing the security of individual computer systems</p> Signup and view all the answers

    What are the components of a communication network?

    <p>Communication media, network hardware, data communication protocols, and software needed for communication.</p> Signup and view all the answers

    A network interface card (NIC) is a software component that enables computers to connect to a network.

    <p>False</p> Signup and view all the answers

    What is the primary function of a modem in a network?

    <p>To convert data signals between digital and analog formats, enabling communication between computers over telephone lines or cable connections.</p> Signup and view all the answers

    Which type of network topology is considered the simplest and the most common?

    <p>Star</p> Signup and view all the answers

    Which of the following is a significant characteristic of a wide area network (WAN)?

    <p>Spans a geographical area larger than a city</p> Signup and view all the answers

    Distributed processing refers to a scenario where multiple computers are connected to a network and each computer performs the same task.

    <p>False</p> Signup and view all the answers

    What is a client/server system?

    <p>A network architecture where powerful computers (servers) are dedicated to providing specific services to client computers.</p> Signup and view all the answers

    What is cloud computing?

    <p>A model where applications and services are delivered over the internet, enabling users to access resources without needing to own or maintain physical hardware.</p> Signup and view all the answers

    What are some common threats to a computerised information system?

    <p>Errors, waste, computer crime, natural threats, environmental threats, and human threats.</p> Signup and view all the answers

    A vulnerability is an opportunity for a threat to exploit a weakness in an information system.

    <p>True</p> Signup and view all the answers

    What are the primary types of computer-related waste?

    <p>Computer waste includes excessive resource usage, such as printing unnecessary documents, sending spam emails, or using computers for non-work purposes.</p> Signup and view all the answers

    What type of computer crime involves using social engineering tactics to deceive individuals into divulging sensitive personal information, such as passwords or financial details?

    <p>Phishing</p> Signup and view all the answers

    What is a denial-of-service (DoS) attack?

    <p>An attempt to overwhelm a target system with excessive traffic, making it unavailable to legitimate users.</p> Signup and view all the answers

    Which of the following is NOT a type of malware?

    <p>Firewall</p> Signup and view all the answers

    Controls in a computerised information system are designed to prevent the occurrence of all threats.

    <p>False</p> Signup and view all the answers

    What are general controls in a computerised information system?

    <p>General controls apply to the overall information system and its environment, affecting all transactions and processes. They are designed to ensure the integrity and security of the system as a whole.</p> Signup and view all the answers

    What are application controls in a computerised information system?

    <p>Application controls are specific to individual applications, focusing on the accuracy, completeness, and validity of data processed by those applications.</p> Signup and view all the answers

    Which control type focuses on preventing adverse events from occurring?

    <p>Preventive controls</p> Signup and view all the answers

    Why is backup of data and documentation important?

    <p>To protect critical information and ensure its availability in case of system failure, data loss, or disaster events.</p> Signup and view all the answers

    What are corrective controls in a computerised information system?

    <p>Corrective controls are implemented after an adverse event has occurred. They aim to rectify the damage and restore the system to its normal operational state.</p> Signup and view all the answers

    Disaster planning aims to prevent disasters from happening in the first place.

    <p>False</p> Signup and view all the answers

    What are the essential elements of an information system security policy?

    <p>A definition outlining the security measures to be taken to safeguard the information system and its data.</p> Signup and view all the answers

    Which of the following is a common framework used to guide information system security governance?

    <p>COBIT</p> Signup and view all the answers

    The King III report focuses exclusively on information technology governance.

    <p>False</p> Signup and view all the answers

    What is the primary purpose of the Information Security Forum (ISF)?

    <p>To provide guidance, resources, and support to organizations in managing information security risks.</p> Signup and view all the answers

    What is the purpose of segregation of duties?

    <p>To distribute responsibility across different individuals so that no single person has complete control over a critical task or process.</p> Signup and view all the answers

    What is a transaction processing system (TPS)?

    <p>A type of information system that efficiently processes and records daily business transactions, converting them into useful information for decision-making.</p> Signup and view all the answers

    An enterprise resource planning (ERP) system integrates all the functions of an organization and can be used throughout the organization.

    <p>True</p> Signup and view all the answers

    What is the main purpose of a knowledge management system (KMS)?

    <p>To capture, store, share, and manage knowledge within an organization, improving decision-making and enhancing overall performance.</p> Signup and view all the answers

    What is a customer relationship management (CRM) system?

    <p>A type of KMS that focuses on gathering and managing information relevant to customer relationships, improving understanding of customer needs and behaviors.</p> Signup and view all the answers

    What is an expert system (ES)?

    <p>A type of software application that captures and applies expert knowledge in a specific domain, helping users to solve problems and make informed decisions.</p> Signup and view all the answers

    What is a group support system (GSS)?

    <p>A collaborative tool that allows users to work together on tasks, share documents, and conduct virtual meetings.</p> Signup and view all the answers

    What is an executive support system (ESS)?

    <p>A specialized decision support system designed for senior management, providing access to a wide range of data and analytical tools.</p> Signup and view all the answers

    E-business encompasses all business processes, including financial, marketing, and operational activities.

    <p>True</p> Signup and view all the answers

    What is e-marketing?

    <p>The use of electronic technologies, such as social media, email, and online advertising, to reach potential customers and promote products or services.</p> Signup and view all the answers

    What is m-commerce?

    <p>The use of mobile devices, such as smartphones and tablets, to conduct electronic transactions, such as purchasing goods or services.</p> Signup and view all the answers

    What is the main purpose of e-commerce?

    <p>To conduct business processes, such as selling, buying, and delivering products or services over computer networks.</p> Signup and view all the answers

    A business-to-business (B2B) e-commerce transaction involves the exchange of goods or services between businesses.

    <p>True</p> Signup and view all the answers

    What are some key advantages of e-commerce?

    <p>Direct customer relations, product expectations not met, access to global markets, reduced costs, increased competitiveness, data accuracy, more choices available, and always open for business.</p> Signup and view all the answers

    What are some specific threats faced by organizations in the e-commerce environment?

    <p>Information threats (data alteration, copyright infringement, incorrect website information), technology threats (denial-of-service attacks, technology bugs, insufficient hardware), business threats (customer threats, contractual relationships, use of outsourced service providers).</p> Signup and view all the answers

    Firewalls are an effective control measure to protect computer networks from external threats.

    <p>True</p> Signup and view all the answers

    What is the purpose of digital certificates in e-commerce?

    <p>To verify the authenticity of websites and digital transactions, ensuring secure communication and data exchange.</p> Signup and view all the answers

    When submitting sensitive information, such as credit card details, it is wise to always look for the 'locked padlock' icon next to the URL address bar to ensure that the website is secure.

    <p>True</p> Signup and view all the answers

    Which of the following is NOT a common method for mitigating e-commerce threats?

    <p>Employing a denial-of-service attack</p> Signup and view all the answers

    What is a management information system (MIS)?

    <p>An integrated system designed to provide management with a wide variety of reports, supporting decision-making processes and monitoring the organization's performance. It generates regular reports based on historical data, such as sales figures or financial data.</p> Signup and view all the answers

    What is a decision support system (DSS)?

    <p>An interactive, computer-based system that provides tools and models to assist decision-makers in solving unstructured problems. It enables decision-makers to explore various scenarios, analyze data, and generate potential solutions.</p> Signup and view all the answers

    A DSS typically provides structured reports, while an MIS presents information in a more flexible, interactive format.

    <p>False</p> Signup and view all the answers

    What are the vital objectives of both MIS and DSS?

    <p>To provide insights and support to managers in making better decisions, leading to improved efficiency, effectiveness, and profitability of the organization.</p> Signup and view all the answers

    One of the primary benefits of a DSS is that it automates decision-making.

    <p>False</p> Signup and view all the answers

    An ES is more commonly used for addressing complex problems that require a high level of specialized knowledge.

    <p>True</p> Signup and view all the answers

    What is the main purpose of a CRM system?

    <p>To manage a company's relationships with its customers, improving customer satisfaction, loyalty, and retention.</p> Signup and view all the answers

    What are some key differences between a DSS and an MIS?

    <p>A DSS handles unstructured problems, while an MIS focuses on structured problems. DSSs provide more interactive, flexible support, while MISs typically provide structured reports. DSSs are used at both strategic and technical levels, while MISs are primarily used for operational purposes.</p> Signup and view all the answers

    Study Notes

    Accounting Information Systems in a Computer Environment - AIN1501

    • This is a study guide for the University of South Africa.
    • It covers accounting information systems in a computer environment.
    • Authors include Mr NJ Booyse, Ms C Leonard, Mr DPJ Scott, and Ms GM Viviers.
    • The Study guide was printed and published in 2018-2020.

    Part 1: Introduction to Information Systems

    • Topic 1: Nature of information and information systems

      • Study unit 1: Information:
        • Defines information and its characteristics (accurate, accessible, up-to-date, detailed, flexible, relevant, cost-effective, reliable, timely, and format).
        • Describes the uses and users of information (internal and external, internal sources, external sources).
      • Study unit 2: Information systems:
        • Defines a system and its components (input, processing, output).
        • Explains open and closed systems.
        • Defines an information system (AIS) and its role in organizations.
        • Defines computerised information systems (hardware, software, data communication, people, and procedures).
      • Study unit 3: Information Strategy:
        • Defines an information strategy and its importance.
        • Explanations of the relationship between information, information systems, and information strategy.

    Part 2: Information Technology Infrastructure

    • Topic 2: Information Technology Components

      • Study unit 5: Hardware:
        • Introduction, role, and components of hardware in a computer system (input devices, Processing devices, etc).
        • Describes various types of computer systems.
      • Study unit 6: Software:
        • Introduction to system software (operating systems, utility software, database management software).
        • Explains types of operating systems (single-user, multi-tasking, multi-user, embedded) and explains software trends/issues (software bugs, updates, upgrades, licensing, types of software (e.g., shareware, freeware).
        • Discusses software development.
      • Study unit 7: Components of Communication Networks:
        • Explains purposes of computer networks (sharing resources, data, and information, sharing software, information preservation).
        • Explains communication media (wired and wireless) and associated hardware.
      • Study unit 8: Network Configurations:
        • Introduction to network topologies (bus, ring, star, tree, mesh).
        • Geographical scope of networks (PAN, LAN, MAN, WAN, VPN).
      • Study unit 9: The internet, Intranets and Extranets:
        • Explains how the internet works (TCP/IP, protocols, URL, Domain Name System).

    Part 3: Threats, Controls, Privacy and Ethics

    • Topic 4: Threats in a computerized environment
      • Study unit 10: Threats to computerised Information Systems:
        • Explains vulnerability, threats, exposure, risk.
        • Lists common threats (natural, environmental, human, errors, and waste).
    • Topic 5: Controls in a computerized environment
      • Study unit 11: Computer and Accounting Information-System Controls:
        • Defines information system security policies and guidelines.
        • Describes general and application controls (preventative, detective, corrective) and disaster planning.
    • Topic 6: Privacy and Ethics Matters in a Computerised Environment
      • Study unit 12: Privacy and Ethical Concerns:
        • Discusses privacy and ethical concerns for individuals and organizations in a computerised environment, including measures to address these concerns.

    Part 4: System Development

    • Topic 7: The System development process

      • Study unit 13: System development lifecycles:
        • Introduction to system development concepts.
        • Traditional system development lifecycle (SDLC) Advantages & Disadvantages.
        • Rapid Application Development (RAD).
        • Prototyping.
        • End-user development lifecycle.
      • Study unit 14: System Investigation and System Analysis:
        • Explaining System investigation and analysis.
        • Feasibility analysis (economic, technical, operational, legal, schedule).
        • System investigation report.
      • Study unit 15: System Design:
        • System design concepts and purpose.
        • Logical & physical system design.
        • Interface design.
        • System security & controls.
        • Generating design alternatives.
        • Evaluating and selecting a design.
      • Study unit 16: System Implementation:
        • System implementation process.
        • Hardware & software acquisition, preparation of users, hiring/training staff, site prep, data prep, installation, testing, start-up, and user acceptance.
      • Study unit 17: Systems Review and Maintenance:
        • System review and maintenance concepts and approaches (time-driven and event-driven).
        • The system review team and its responsibilities.
        • System maintenance documentation and reporting.

    Part 5: Business Applications

    • Topic 8: Application of Information Systems

      • Study unit 18: Overview of Information Systems:
        • Transaction processing systems (TPS).
        • Enterprise resource planning (ERP).
      • Study unit 19: Management Information Systems and Decision Support Systems:
        • Problem-solving and decision-making process.
        • Management Information Systems (MIS).
        • Decision Support Systems (DSS).
      • Study unit 20: Knowledge Management and Other Specialised Information Systems:
        • Knowledge Management Systems (KMS).
        • Customer Relationship Management (CRM).
        • Expert Systems (ES).
        • Group Support Systems (GSS).
        • Executive Support Systems (ESS).
    • Topic 9: Electronic Commerce

      • Study unit 21: Electronic Commerce:
        • E-business, E-marketing, M-commerce and e-commerce concepts.
        • Main e-commerce categories (B2B, B2C, C2C, C2B, E-Government).
        • Advantages and Disadvantages of systems.
      • Study unit 22: Electronic Commerce Related Threats and Controls:
        • E-commerce specific threats (information threats, technology threats, and business threats).
        • Controls to mitigate e-commerce threats.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz focuses on the study of accounting information systems within a computer environment, specifically tailored for the University of South Africa course AIN1501. It covers essential concepts such as the nature of information, components of information systems, and the definition of an Accounting Information System (AIS).

    Use Quizgecko on...
    Browser
    Browser