Name and briefly describe the 5 major components that make up the info technology of an organization.
What are the 5 functions performed on data in a business information system?
Describe the normal series of events in an accounting information system (AIS).
Name and briefly describe six different types of MIS reports
What are the primary roles of business information systems?
Describe the two types of processing used in a computerized environment
Batch processing - periodic processing
Online, real-time (OLRT) processing (often referred to as “online processing”) - immediate processing
What is a batch control total and how does it differ from a hash total?
Batch control total (or batch total) is a manually calculated total that is compared to a computer-generated total as a means of testing the accuracy and completeness of the input and processing.
Batch totals are used for numbers that are normally added, such as dollar amounts.
Hash totals are used for numbers that are not normally added, such as account numbers.
What is the distinction between centralized and decentralized (distributed) processing?
Centralized processing maintains data and performs data processing at one or more central locations.
Decentralized processing occurs when computer power and processing are spread over many locations
What are the advantages and disadvantages of centralized processing?
Advantages:
1. Data is secured better, once received
2. Processing is consistent
Disadvantages:
1. Cost of transmitting large numbers of detailed transactions can be high
2. Increased processing power and data storage needs at the central location
3. Reduction in local accountability
4. Input/output bottlenecks may occur at high traffic times
5. Lack of ability to respond in a timely manner to information requests from remote locations
6. Entire organization may be vulnerable to problems incurred at a single location
List and explain the steps in batch processing
Accomplished in 2 steps:
1. Create a transaction file: by manually (usually) keying the data (data entry), editing the data for completeness and accuracy, and making any necessary corrections
What is the major distinction between batch processing and online processing?
Transaction in batch processing system are processed in batches and not necessarily at the time those transactions are submitted.
In online processing, transactions are processed as the transactions are entered.
What are the various categories of business information systems?
Identify functions that should be segregated in an IT department
Duties of systems analysts, computer programmers, and computer operators should be segregated (although many companies combine systems analysts and computer programmers)
What are 3 types of programmed controls?
What are the 6 steps of the system development life cycle (SDLC)?
What is the objective of executive information systems (EIS)?
Provide senior executives with immediate and easy access to internal and external information to assist executives in monitoring business conditions.
EIS assist in strategic, not daily, decision making
What is the decision support system (DSS)?
Computer-based information system that provides interactive support for managers during the decision-making process.
DSS is useful for developing information directed toward making particular decisions
What are transaction processing systems?
Systems that process and record the routine, daily transactions necessary to conduct business
What is the objective of management information system (MIS)?
Provide managerial and other end users with reports. These predefined management reports provide managers with the information they need to assist them in the business decision-making process
What are the 5 focus areas of the COBIT framework?
What are information criteria described by COBIT?
(Remember the ICE RACE)
Identify the four domains and related process of the COBIT framework
Why is it important to have segregation of duties between computer operators and computer programmers?
Because a person performing both functions would have the opportunity to make unauthorized and undetected program changes
Why is it important to safeguard files and records?
Inadequate protection may result in loss or damage that might drive an organization out of business; hardware can always be replaced, but data often cannot be