Chapter 2: Information Technology and AISs

Slides:



Advertisements
Similar presentations
The Future of COBOL A Focus on Interactive Programming Appendix C Stern & Stern.
Advertisements

Chapter 15 Creating Database Forms and Reports Introduction Forms Reports.
Chapter 5: Database Forms and Reports
© Copyright 2011 John Wiley & Sons, Inc.
ACCOUNTING INFORMATION SYSTEMS
Slide 3.1 Curtis/Cobham © Pearson Education Limited 2008 Chapter 3 Business Information Technology Lecture 1 Computer Hardware.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 14 Organizing and Manipulating the Data in Databases
Chapter 41 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 12: Intelligent Systems in Business
Lesson 19: Configuring Windows Firewall
Computing ESSENTIALS     Copyright 2003 The McGraw-Hill Companies, Inc CHAPTER Information Technology, the Internet, and You computing ESSENTIALS.
Chapter 3: Data Modeling
CHAPTER 2: Introduction to Systems Concepts and Systems Architecture
Accounting Information Systems, 1st Edition
TECHNOLOGY GUIDE 1: Hardware
ACCOUNTING INFORMATION SYSTEMS
TECHNOLOGY GUIDE 2: Software 1. 2 TG2.1 Introduction to Software TG2.2 Software Issues TG2.3 Systems Software TG2.4 Application Software TECHNOLOGY GUIDE.
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 6-1 Introduction to Information Technology.
Chapter 4 Local Area Networks. Layer 2: The Datalink Layer The datalink layer provides point-to- point connectivity between devices over the physical.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Chapter 2: Information Technology and AISs
Slide 1 Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition Chapter 13: Physical Architecture Layer Design Alan Dennis,
ACCOUNTING INFORMATION SYSTEMS
Chapter 2 Information Technology and AISs
Chapter 4: Organizing and Manipulating the Data in Databases
Chapter 1 Introduction to CBIS. Information Technology Trends “free” hardware easy-to-use software pre-packaged software small computers data availability.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Chapter Chapter 13-2 Accounting Information Systems, 1 st Edition Data and Databases.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Chapter 111 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 1-1 Chapter 1 Terms Information Systems Overview Introduction to Information Systems Judith C. Simon.
14-1 Systems Development Concept of Systems Development Life Cycle (SDLC) Definition of SDLC Stages of SDLC Traditional versus modern SDLCs.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
Chapter 4-1. Chapter 4-2 Chapter 4: Data Modeling Introduction An Overview of Databases Steps in Creating a Database Using REA Creating Database Tables.
Chapter 2 Fundamentals of Information Technology Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie.
Slide 1-1 Chapter 1 Information Systems Overview Introduction to Information Systems Judith C. Simon.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Lesson 3: Migrating and Configuring User Data
Slide 4-1 Chapter 4 Terms Data Communications and Networking Considerations Introduction to Information Systems Judith C. Simon.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Chapter 31 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 6-1 Chapter 6 System Software Considerations Introduction to Information Systems Judith C. Simon.
Slide 8-1 Chapter 8 Terms Programming Languages Introduction to Information Systems Judith C. Simon.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc 2-1 Introduction to Information Technology 2.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
I-1. I-2 I ACCOUNTING FOR SOLE PROPRIETORSHIPS Accounting, Fifth Edition.
Slide 6-1 Chapter 6 Terms System Software Considerations Introduction to Information Systems Judith C. Simon.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 3-1 Introduction to Information Technology.
Section 2.1 Section 2.2 Identify hardware
Using Technology to Manage Information
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved
Dinesh Mirchandani University of Missouri – St. Louis
Systems Analysis and Design With UML 2
Networking: Discovery, Communication, Collaboration
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
ACCOUNTING INFORMATION SYSTEMS
ACCOUNTING INFORMATION SYSTEMS
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Information Technology and AISs
Presentation transcript:

Chapter 2: Information Technology and AISs Introduction The Importance of Information Technology to Accountants Input, Processing and Output Devices Secondary Storage Devices Data Communications and Networks Computer Software

The Importance of IT to Accountants Must be compatible and support other components of AIS 2. Accountants often help clients make software and hardware purchases 3. Auditors must evaluate computerized systems

The Importance of IT to Accountants Often asked to evaluate the efficiency and effectiveness of existing system IT affects how they work now and in the future Understanding is vital to passing most certification exams

The AICPA’s Top 10 Information Technologies for 2008 Information Security Identity and Access Management Conforming to Assurance and Compliance Standards Privacy Management Disaster Planning and Recovery

The AICPA’s Top 10 Information Technologies for 2008 IT Governance Securing and Controlling Information Distribution Digital Identity and Authentication Technologies Wireless Technology Mobile and Remote Computing

Study Break #1 All of the following are reasons why IT is important to accountants except: Accountants often help clients make IT decisions Auditors must evaluate computerized systems IT questions often appear on professional certifications examinations The costs of IT are skyrocketing

Study Break #1 - Answer All of the following are reasons why IT is important to accountants except: Accountants often help clients make IT decisions Auditors must evaluate computerized systems IT questions often appear on professional certifications examinations The costs of IT are skyrocketing

Input, Processing and Output Devices

Input Devices Source documents and data transcription Point-of-Sale (POS) devices Bar Code Readers Universal Product Code (UPC) Magnetic Ink Character Recognition (MICR)

MICR Symbols

Input Devices Optical Character Recognition (OCR) Mark-sense media Turnaround documents Plastic Cards with Magnetic Strips Microcomputer Input Devices PDA Devices

Optical Character Reader

Input Devices Digital Cameras Biometric Scanners Behavioral systems Physiological systems Enrollment Hamming distance

Biometric Scanners

Central Processing Units Primary Memory Microprocessors Computers, Processing Speeds and AISs

Central Processing Units

Output Devices Printers Video output Multimedia

Importance of Secondary Storage Devices Primary Memory Volatile Memory Lost electrical power, lost memory Secondary Storage Mass Storage or Auxiliary Storage Maintain data in permanent files

Format of a Computer Record

Secondary Storage Devices Magnetic (hard) disks Redundant Arrays of Inexpensive Disks (RAIDS)

Multiplatter Hard Disk

Secondary Storage Devices CD-ROMs Write-once, read-many (WORM) media DVDs Flash memory Image processing Record Management Systems

Study Break #2 The acronyms POS, MIC, and OCR are most closely associated with: Input devices Processing devices Output devices Communication devices

Study Break #2 - Answer The acronyms POS, MIC, and OCR are most closely associated with: Input devices Processing devices Output devices Communication devices

Study Break #3 Which of these devices is capable of storing the most data? CD-ROM disk DVD disk USB (flash memory) device Magnetic (hard) disk

Study Break #3 - Answer Which of these devices is capable of storing the most data? CD-ROM disk DVD disk USB (flash memory) device Magnetic (hard) disk

Data Communications and Networks Communication Channels and Protocols Modem Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) Data Communications Protocol

Data Communications and Networks Local Area Networks (LANs)

Advantages of a LAN Facilitating communications Sharing computer equipment Sharing computer files Saving software costs Enabling unlike computer equipment to communicate with one another

Data Communications and Networks Wide Area Networks (WANs)

Data Communications and Networks Client / Server Computing

Data Communications and Networks Wireless Data Communications (Wi-Fi) Wireless Application Protocol (WAP) Radio Frequency Identification (RFID) Near Field Communication (NFC) Cloud Computing

RFID Example

NFC Example

Cloud Computing Example

Computer Software Operating Systems Application Software Programming Languages

Operating Systems Graphical User Interfaces (GUIs) Utility Programs Virtual Storage Antivirus Software and Viruses

Application Software Personal productivity software Commercial productivity software Accounting software Communications software Enterprise resource management software (ERP)

Creation of Application Software

Study Break #4 Purchasing backup services from an Internet vendor is an example of: OCR Modem services Virtual storage Cloud computing

Study Break #4 - Answer Purchasing backup services from an Internet vendor is an example of: OCR Modem services Virtual storage Cloud computing

Study Break #5 All of these are terms associated with programming languages except: Object-oriented Event-driven Compiler Server

Study Break #5 - Answer All of these are terms associated with programming languages except: Object-oriented Event-driven Compiler Server

Copyright Copyright 2010 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter 2