Download Chapter 2

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Bus (computing) wikipedia , lookup

Transcript
Chapter
2-1
Chapter 2:
Information Technology and AISs
Introduction
The Importance of Information Technology
to Accountants
Input, Processing and Output Devices
Hardware
Secondary Storage Devices
Data Communications and Networks Networks
Computer Software
Software
Chapter
2-2
EVOLUTION OF COMPUTER
SYSTEMS
Chapter
2-3
The Importance of IT to
Accountants
1.
Must be compatible and support other
components of AIS
2.
Accountants often help clients make
software and hardware purchases
3.
Auditors must evaluate computerized
systems
Chapter
2-4
The Importance of IT to
Accountants
4. Often asked to evaluate the efficiency and
effectiveness of existing system
5. IT affects how they work now and in the
future
6. Understanding is vital to passing most
certification exams
Chapter
2-5
The AICPA’s Top 10 Information
Technologies for 2010
Information Security
Securing and Controlling Information
Distribution
Identify and Access Management
Backup, Disaster Planning and Business
Continuity
Secure Electronic Collaboration
2013 Update
http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLOGY/RESOURCES/TOPTECHNOL Chapter
OGYINITIATIVES/Pages/2013TTI.aspx
2-6
The AICPA’s Top 10 Information
Technologies for 2010
Paperless Technology
Laptop Security
Small Business Software
Mobile Computing
Tax Software and Electronic Filing
Server Vitalization and Consolidation
Chapter
2-7
BASIC COMPONENTS OF
COMPUTER SYSTEMS
All computers made up of
the same set of five
building blocks:
input, output, (I/O)
memory, files
arithmetic/logic unit
control unit (CPU)
Chapter
2-8
Input, Processing and
Output Devices
Chapter
2-9
Input Devices
Source documents and data transcription
Point-of-Sale (POS) devices

Bar Code Readers
 Universal Product Code (UPC)
Magnetic Ink Character Recognition
(MICR)
Chapter
2-10
MICR Symbols
Chapter
2-11
Input Devices
Optical Character Recognition (OCR)

Mark-sense media
 Turnaround documents
Plastic Cards with Magnetic Strips
Microcomputer Input Devices

PDA Devices
Chapter
2-12
Common Input Devices
Chapter
2-13
Input Devices
Digital Cameras
Biometric Scanners

Behavioral systems
 Physiological systems
 Enrollment
 Hamming distance
Chapter
2-14
Central Processing Units and
Primary Memory
Microprocessors
Computers, Processing Speeds and
AISs
Primary Memory
Chapter
2-15
Central Processing Units
Chapter
2-16
Output Devices
Printers
Video output
Multimedia
Chapter
2-17
Importance of Secondary
Storage Devices
Primary Memory
 Volatile
Memory
 Lost electrical power, lost memory
Secondary Storage
 Mass
Storage or Auxiliary Storage
 Maintain data in permanent files
Chapter
2-18
Secondary Storage Devices
Magnetic (hard) disks
 Redundant
Arrays of Inexpensive Disks
(RAIDS)
Chapter
2-19
Multiplatter Hard Disk
Chapter
2-20
Secondary Storage Devices
CD-ROMs
 Write-once,
read-many (WORM) media
DVDs
Blu-Ray Discs
Flash memory
Image processing
Record Management Systems
Chapter
2-21
Study Break #2
The acronyms POS, MIC, and OCR are most closely associated
with:
A. Input devices
B. Processing devices
C. Output devices
D. Communication devices
Chapter
2-22
Study Break #3
Which of these devices is capable of storing the most data?
A. CD-ROM disk
B. DVD disk
C. USB (flash memory) device
D. Magnetic (hard) disk
Chapter
2-23
Data Communications
and Networks
Communication Channels and Protocols
 Modem
 Integrated
Services Digital Network (ISDN)
 Digital Subscriber Line (DSL)
 Data Communications Protocol
Chapter
2-24
Data Communications
and Networks
Local Area Networks (LANs)
Chapter
2-25
Advantages of a LAN
Facilitating communications
Sharing computer equipment
Sharing computer files
Saving software costs
Enabling unlike computer equipment to
communicate
Chapter
2-26
Data Communications
and Networks
Wide Area Networks (WANs)
Chapter
2-27
Architectures
Network Infrastructure – Determined by
the physical layout and components of a
network

DNS, DHCP, Router, demilitarized zone, etc.
Application Architecture - Determined by
how functions of application programs are
spread among clients and servers
Chapter
2-28
Application Layer Functions
• Presentation logic - Presentation of info
to user and acceptance of user commands
• Application logic - Business logic such
as word processors, spreadsheets
• Data access logic - Processing required
to access stored data (e.g., SQL)
• Data storage - Storing of data generated
by programs (e.g., files, records)
Chapter
2-29
Data Communications
and Networks
Client / Server Computing
Chapter
2-30
Multi-tier (i.e., n-tier)
Architectures
Chapter
2-31
Data Communications
and Networks
Wireless Data Communications (Wi-Fi)
 Wireless
Application Protocol (WAP)
 Radio Frequency Identification (RFID)
 Near Field Communication (NFC)
Cloud Computing
Chapter
2-32
RFID Example
Chapter
2-33
NFC Example
Chapter
2-34
Computer Software
Operating Systems
Application Software
Programming Languages
Chapter
2-35
Operating Systems
Graphical User Interfaces (GUIs)
Utility Programs
Virtual Storage
Antivirus Software and Viruses
Chapter
2-36
What an application sees…
From http://www.karbosguide.com
Chapter
2-37
Application Software
Personal productivity software
Commercial productivity software
Accounting software
Communications software
Enterprise resource management
software (ERP)
Chapter
2-38
Creation of Application
Software
Chapter
2-39
Study Break #4
Purchasing backup services from an Internet vendor is an
example of:
A. OCR
B. Modem services
C. Virtual storage
D. Cloud computing
Chapter
2-40