Chapter 2 Information Technology and AISs

Slides:



Advertisements
Similar presentations
Chapter 15 Creating Database Forms and Reports Introduction Forms Reports.
Advertisements

Chapter 5: Database Forms and Reports
© Copyright 2011 John Wiley & Sons, Inc.
ACCOUNTING INFORMATION SYSTEMS
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Chapter 41 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 101 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 3: Data Modeling
2-1 Information Technologies Concepts and Management.
Accounting Information Systems, 1st Edition
TECHNOLOGY GUIDE 1: Hardware
ACCOUNTING INFORMATION SYSTEMS
TECHNOLOGY GUIDE 2: Software 1. 2 TG2.1 Introduction to Software TG2.2 Software Issues TG2.3 Systems Software TG2.4 Application Software TECHNOLOGY GUIDE.
Chapter 2: Information Technology and AISs
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 6-1 Introduction to Information Technology.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Chapter 2: Information Technology and AISs
Slide 1 Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition Chapter 13: Physical Architecture Layer Design Alan Dennis,
ACCOUNTING INFORMATION SYSTEMS
Accounting Principles, Ninth Edition
MODERN AUDITING 7th Edition Developed by: Gregory K. Lowry, MBA, CPA Saint Paul’s College John Wiley & Sons, Inc. William C. Boynton California Polytechnic.
Chapter 101 The Design Process Chapter 10 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
Chapter 111 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 8-1 Introduction to Information Technology Chapter.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 1-1 Chapter 1 Terms Information Systems Overview Introduction to Information Systems Judith C. Simon.
Slide 1-1 Chapter 1 Information Systems Overview Introduction to Information Systems Judith C. Simon.
© 2007 John Wiley & Sons Chapter 15 - Organizational Issues PPT 15-1 Organizational Issues Chapter Fifteen Copyright © 2007 John Wiley & Sons, Inc. All.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 2-1 Chapter 2 Information Systems in Organizations Introduction to Information Systems Judith C. Simon.
Slide 4-1 Chapter 4 Terms Data Communications and Networking Considerations Introduction to Information Systems Judith C. Simon.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Chapter 31 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 14 – Information Systems, First Edition John Wiley & Sons, Inc by France Belanger and Craig Van Slyke Contributor: Brian West, University of Louisiana.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Copyright 2006 John Wiley & Sons, Inc. Beni Asllani University of Tennessee at Chattanooga Operations Management - 5 th Edition Chapter 10 Supplement Roberta.
Slide 6-1 Chapter 6 System Software Considerations Introduction to Information Systems Judith C. Simon.
Slide 8-1 Chapter 8 Terms Programming Languages Introduction to Information Systems Judith C. Simon.
Lesson 6: Controlling Access to Local Hardware and Applications
I- 1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc 2-1 Introduction to Information Technology 2.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
I-1. I-2 I ACCOUNTING FOR SOLE PROPRIETORSHIPS Accounting, Fifth Edition.
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
H-1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
Slide 6-1 Chapter 6 Terms System Software Considerations Introduction to Information Systems Judith C. Simon.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 3-1 Introduction to Information Technology.
Chapter 41 People and Quality Chapter 4 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
Lesson 22: Configuring System Recovery
Using Technology to Manage Information
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved
Dinesh Mirchandani University of Missouri – St. Louis
Appendix Sample Innovation Plan
Networking: Discovery, Communication, Collaboration
liquidation of a partnership.
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Module 1: Decision Making,
Data Management: Data, Databases and Warehousing
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Data Management: Data, Databases and Warehousing
ACCOUNTING INFORMATION SYSTEMS
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Information Technology and AISs
Presentation transcript:

Chapter 2 Information Technology and AISs Introduction The Importance of Information Technology to Accountants Input, Processing and Output Devices Secondary Storage Devices Data Communications and Networks Computer Software

REASONS FOR IMPORTANCE OF IT TO ACCOUNTANTS Must be compatible and support other components of AIS Accountants often help clients make software and hardware decisions Auditors must evaluate computerized systems

REASONS FOR IMPORTANCE OF IT TO ACCOUNTANTS Often asked to evaluate effectiveness and efficiency of existing system IT will effect how they work in the future Understanding how IT affects accounting systems is vital to passing most certification exams

The Importance of Information Technology to Accountants The AICPA’s Top 10 Information Technologies for 2006 Information Security SOX Assurance and Compliance Applications Disaster Planning and Recovery IT Governance Privacy Management Digital Identity and Authentication Technologies Wireless Technology Application and Data Integration Peerless Digital Technologies and Knowledge Management Spyware Detection and Removal

Importance of IT to Accountants All of the following are reasons why IT is important to accountants except: Accountants often help clients make IT decisions Auditors must evaluate computerized systems IT questions appear on certification exams The costs of IT are skyrocketing

Input, Processing and Output Devices Input Devices Source documents and data transcription POS devices MICR OCR Plastic cards with magnetic strips Microcomputer input devices Personal Data Assistant Biometric scanners

Input, Processing and Output Devices Central Processing Units Primary memory Microprocessors Computers, processing speeds and AISs

Input, Processing and Output Devices Printers Video output Multimedia

Input, Processing and Output Devices The acronyms POS, MIC, and OCR are most closely associated with: Input devices Processing devices Output devices Communication devices

NEED FOR SECONDARY STORAGE DEVICES Primary memory is volatile memory-lose electrical power memory loses its contents Secondary storage stores data on permanent media that maintain their accuracy and integrity, yet permit access

Secondary Storage Devices Magnetic (hard) disks Floppy disks CD-ROMs and DVDs Flash memory Image processing

Secondary Storage Devices Which of these devices is capable of storing the most data? CD-ROM disk DVD disk USB (flash memory) drive Magnetic (hard) drive

Data Communications and Networks Communication Channels and Protocols LANs WANs Client/Server Computing Wireless Data Communications RFID

Computer Software Operating Systems Application Software Programming Languages

Copyright Copyright 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter 2