INFORMATION SYSTEM. Introduction:

Size: px
Start display at page:

Download "INFORMATION SYSTEM. Introduction:"

Transcription

1 Page 1 INFORMATION SYSTEM Introduction: Information is the backbone in a business organization. In today s contribution, managing information is the most critical task for survival. Information Technology plays a crucial role in dissemination of information towards controlling business operation. The work of computer has been extended from data processing to on line Management Information System, Sales information to E commerce, Decision making to Expert system. Education and training Medical science Space research Entertainment The challenges ahead are the field like: Process Control in production management Flow of information through internet Integration of functional system with network E Commerce in business Knowledge based Expert System in decision making Information: Information is nothing but refined data. Data before processing is said to be raw data. Raw data screened and processed to make it organized for effective. Data after processing become linked with other data and carry meaning and, strictly speaking, to be termed as information. Information involves communication and reception of intelligence. Information consists of data, text, image, voice etc.

2 Page 2 The term in normal sense includes all these: Data Processing Information Experience Knowledge Skill Decision Tools Decision

3 Page 3 Characteristics of Useful Information: Timeliness Accuracy Comprehensive Relevance Understandability Information System: Information system is deigned by an user according to the business operation involved and need for his decision making. If an organization has to survive, it has to plan and develop its own Information System. The Information system is to feed the management for control purpose. This is way Information system is generally called Management Information System (MIS) or Computer Based Information System (CBIS). The activities in an Information System are: Collection, storing and processing data Generation of Information Reports Dissemination of Information to right users. An MIS provides timely information of right quality for better management decision making for developing business strategy. The advantages of CBIS are: Reducing in cost of records maintenance. Improvement in the efficiency of human resources. Regular flow of information at different levels for quality decision making. Easy use of scientific tools and models for quality decision making. Faster response to customers. Better control over resources. Faster access to records in case of dispute. Effective use of manpower. Characteristic of an information system: Specific objective Structured (Modules) Components (Sub Modules)

4 Page 4 Integrated (Correct linkage) Behaviors (Nicely with its user) Self regulatory Open and Closed System Open System: Open system is one which interacts with its environment and can change itself to accommodate the changes in factors like customer s preference, price, product design etc. It takes input from outside world and exports output to outside world. Closed System: A closed system which does not have any interaction with outside environment, closed systems are very limited. Some system in Military or Defense service may be closed system because their rules, procedure and factors are set to be right for the sake of strict code of discipline. Evolution of Information System (i) Manual System (ii) Mechanical System (iii) EDP (iv) MIS (v) DSS (vi) EIS (i) Manual System : It was old. Chance of errors was high. Time consuming. Delay in preparation of reports. Cost effective procedure. (ii) Mechanical System: Unit record machines came into existence. Improved computational accuracy. Comparative faster data processing. (iii) Electronic data processing (EDP) System: Volume oriented applications. Improved processing efficiency. Well defined processing rules. (iv) Management information system: It is an improved version of EDP system. It enables the management to have access to desired set of data only. It meets information requirement at different level with pre defined areas. It provides on line access to data and efficient reporting system. It supports decision making.

5 Page 5 (v) (vi) (vii) Decision support System: It is based on one or more corporate database. It has the ability to solve unstructured problems. Network facilities. Solution in a complex business situation. Executive Information System: It is an advanced model of DSS which can take care of unstructured problem situation. It aims at providing information to top executives of an organization who are involved in strategic decision making. Expert System: An expert system acts in a specific area only with the support of knowledge database on this specific area. Knowledge database means structured information stored on previous solution sets in unstructured problem situations. An expert system operates on previous experience which is stored in a database. GROWTH OF BUSINESS INFORMATION SYSTEM: 1. Change in computer technology. 2. Fast Transaction processing. 3. Customer Support. 4. Continuous Improvement effort. 5. Wide Area of applications in offices. STRATEGIC PLANNING FOR DEVELOPMENT OF AN INFORMATION SYSTEM: Major benefits for formal Information System Strategies: To achieve goal congruence between information system objectives and corporate objectives. Optimum benefit of the organization. 1. Linking Corporate Strategy with Information System Strategy: Identification of Sub system involved and their interactions. Level of Management. Decision making process.

6 Page 6 A standard decision making pattern: Lower level Transaction Processing Middle Level Management Information System. Top Level Executive System and Expert System. Corporate Strategy Information Need Information and Architecture Information System Strategy Application Architecture 2. Budgeting and planning the implementation details: Organizations growth plan, business strategy and support needed from IS Information System Budget. Quality of Human resources and possible approach to improve their skill. Application of Business process re engineering. Integration of information from different functional areas. 3. Planning the operation: Development of organizational structure in IT department. Fixation of new role and responsibilities. Security management (Password) Risk Management. 4. How to support the Decision making process: Current work volume. Current application software and their life cycles. Current technology environment and skill level. Current performance of Information System. Users satisfaction. Current business process and Information structure. INFORMATION SYSTEM INFRASTRUCTURE: Hardware Software Database Network People

7 Page 7 The following exercises are to be made for effective use of resources with the use of technology: 1. Arranging required hardware and software: Assessment of hardware configuration on the basis of volume of data and type of processing needs. Software requirement in compatible with hardware. Networking and communication technology requirement. Vendor selection. Procurement plan. 2. Human Resource Management: Recruitment Training Restructuring Retention of employees 3. Implementation: Information needs of an organization change constantly. The information system should be open and adaptive. The information system should focus on supportive role in the business process. INFORMATION SYSTEM ORGANIZATION A scientific organization structure for Information System means provision of the following: Proper Information technology environment with right kind of machine, manpower and work culture. Right resources balancing the hardware, software and skill. Adequate security system on data, processing and output. Adoption of scientific and modern software development methodology. For successful implementation and operation of an information system, organizational set up has to be built to take cares certain activities on a day to day basis. The activities involved in the Information System department. Activities involved in the Department are: (i) (ii) (iii) (iv) (v) (vi) System Development Data administration Programming Security Management Operation Management Quality assurance

8 Page 8 The following explain their activities: Information System Manager Planning the resources. Time frame of implementation Supervising the overall performance and implementation of system. Database Administration Database Management. Database library management Security of data. Business Analyst Development of new Information System. Acting as Coordinator between users and Information system developers. System Analyst Analysis of the requirements Designing the Information System. Programmer Development/modification of programs according to the systems specifications. Maintenance Engineer Maintenance of Hardware. Network Specialist Maintenance of network. Information System Personnel Management: Managing the human resources effectively is very critical issue. Success of an Information System depends on the quality of human resources and their support. The following important issue should taken: Growth prospect Motivational aspects Provision for management of gap in skill and expertise. Policies and Procedure for effective management of HR. Job description Job responsibility Recruitment policy

9 Page 9 Training programs Security checks Performance evaluation Quality of a Business Information System: Reliability of information (GIGO) Matching management requirements Technology Human Resources Security Ethical standard (Right kind of image of the organization) Business opportunities due to Development of Computers: Computer manufacturing Peripheral equipment manufacturing Computer leasing Software developers Network Par lour BPO services

10 Page 10 ENTERPRISE RESOURCE MANAGEMENT INTRODUCTION: It is a powerful tool in the hands of management for effective use of resources and to improve efficiency. It use for production management in manufacturing industries. This has led to development of ERP (Enterprise Resource Planning) package which were originally targeted at manufacturing industries and consisted mainly of functions like sales management, production management, Accounting and financial affairs. Management Functions like: Manufacturing Material Management Quality Management Sales and Distribution management Maintenance management Human resources Finance ERP (Enterprise Resource Planning) Package: It is a software with the help of Database Management System integrating information related to all functional areas. The ERP system is in great demand. The reason for accepting ERP systems replacing their old business systems are: Improved business performance through optimum resource utilization. Reduction in manufacturing cycle time by integrated planning process. Better support customers in fast changing in market conditions. Better cost control mechanism. Control through feedback information and online access to accurate information. Establishments of Decision Support System.

11 Page 11 Selection Process of an ERP package: Normally this evaluation process is done by a committee. What is required to be done in gap analysis between the requirement of the company and capability of the package? Presentation or demo from the selective vendors will provide some direction toward choosing the best. The cost of the package is also a key factor. The common criteria for selection for a package: How best the package fits the requirement of the company. Provision for accommodating the change in the system. Implementation and post implementation support from vendor. Reliability of vendor. Change in Hardware and skill requirement. Cost of the package and Budget. Cost of ERP Implementation: ERP package Cost Consultants Cost Cost of data conversion Cost of training Cost of testing Cost of post implementation support Business Process Re engineering and Implementation of ERP: Re engineering is new and it has to be done. BPR aims at performance improvement through dramatic change in organizational structure, skill development, change in technology and change in mindset of people. BPR is a process which explores the possibility of doing things in different ways to improve efficiency in the operation and it involve rethinking, renovation, redesigning, retooling. Implementation of ERP system involves great change in information flow and reporting system.

12 Page 12 BPR exercise may be divided into different phases as given below: PHASE I: Bring Organizational change: Understanding the current condition of organization. Assess the need for changes. To explain how to bring the changes. To make a documentation on new organizational structure. PHASE II: Bringing Re engineering process: Establish BPR Organizational structure. Selection of people to be involved in BPR. To fix the responsibilities of these people. PHASE III: Identification of BPR operations: To pinpoint the processes to be re engineered. To assess the potential changes. To fix the priorities and activities. To draw performance matrix. To establish business strategies. PHASE IV: Understanding the existing process: To develop the model of current process. To understand the technology currently in use. To assess the present flow of information. To identify the gaps in the flow of information. PHASE V: Newly designed model: To draw new work flow. To define new process steps. To describe the new information requirement. To access skill requirement. PHASE VI: Transformation: To devise action plan. To reallocate workforce. To develop training curriculum. To ensure smooth change over to new package.

13 Page 13 Business Modules in an ERP Package: Finance Module: Financial accounting Investment management Controlling Manufacturing Module: Material and capacity planning Cost Management Quality Management Human Resources Module: Personnel Management Payroll accounting Time Management Material Management Module: Material procurement Planning Purchasing Evaluation of vendor Inventory Management Material inspection Sales and Distribution Module: Order Management Warehouse Management Shipping Billing Sales support Transportation Foreign Trade ERP Implementation life cycle: Step 1: Pre evaluation screening Step 2: Package evaluation

14 Page 14 Step 3: Project planning phase Step 4: Gap Analysis Step 5: Re engineering Step 6: Configuration Step 7: Testing Step 8: End user training Step 9: Going Live Step 10: Post Implementation Implementation Methodology: Understanding the Problem Defining the solution Understanding technical work Going live Post Implementation maintenance

15 Page 15 HARDWARE HARDWARE: 1. CPU and MEMORY a) Central Unit b) ALU c) Main Memory 2. Peripheral Devices a) Input Devices b) Output Devices COMPUTER: 1. Digital Computer 2. Analog Computer 3. Hybrid Computer 1. Digital Computer: Digital computer operates directly on data which is represented in decimal digit form. This data may be number or characters which are fed through input devices like punched card, key board etc. Digital computers have the ability to handle large volume of data by way of storing them in the machine in the Binary form i.e. 0 or 1, process them and generating report. Digital computers are used in commercial processing or work like research. Example Any Business Computer. 2. Analog Computer: Takes input in the form of electrical pulse. The inputs are like voltage, pressure, current, water flow etc. The process of feeding data in an analog computer is predefined and operation with the data and the output follows a standard set of guidelines. Outputs are generally a graph or a picture or a table and give signal for control of operation. These computers are generally used in industrial field in controlling various physical parameters or stimulating them to find the optimum solution.

16 Page 16 DIGITAL ANALOG Operation on number Operation on physical quantities Process data Measures the physical parameter Generate reports Provide control information Discontinuous Continuous Mainly commercial and scientific work Mainly process control unit 3. Hybrid Computer: It is a combination of both computer Digital and Analog. Generally in this kind of computer system data are fed in analog form and output is generally in digital form. Objective of Different Generation of Computers: Bring Improvement Improvement in computing power More Versatility Reduction in cost High Speed Storage Reliability How a Computer Functions: (Page No. 338 and 339) To function properly, the computer needs both hardware and software. Hardware means the machine i.e. electronic and mechanical devices and software means programs. We can see the physical presence of hardware where software is stored in memory or in storage devices. Computer does the following four functions: (a) Receive the input data through input devices. (b) Process the data with the help of CPU. (c) Generate the output through output devices. (d) Stores the input/output in storage devices. The components are broadly divided into CPU, Memory and peripheral devices. Peripheral means inputs or outputs devices.

17 Page 17 CPU (Central Processing Units): (A) Control Units (B) Arithmetical and Logical Unit (C) Main Memory Registers: Registers are storage locations in control unit and ALU. They are used to hold data and instructions temporarily. The contents are handled very fast to make processing faster. Address: Each register is identified by its address. The contents of a register can be referenced in future use by its address. The addresses of the registers are stored in main memory in address register, simply called address. CONTROL UNIT: It control, supervises all activities of a computer and monitors the execution of programs. It coordinates various parts of computer system like ALU, main memory and peripheral devices. It controls transfer of data from input devices storage in memory, movement of data from memory, to working space and back and finally to output devices. Stores programs, data, and results in main memory in separate partition made for them. Permits the users to wants to have access to computer. Step 1: Control unit takes an instruction from the primary memory and stores it into instruction register and interpret the instruction with the help of instruction s operation code table. The time required to perform this is called instruction time. Step 2: CU actually performs the task as indicated by the instruction. The time required for this called execution time. The execution of job of CU may involve transferring data from one location to another for computation by ALU. Cycle time= Instruction time + Execution Time

18 Page 18 ALU (Arithmetic Logic Unit): Mathematical Gates: It performs the mathematical calculation. Logic Gates: Do the logical operations and register are used for temporary storage of data, logical operations are basically comparing, selecting, matching of data. Primary Memory or Main Memory: Primary memory is for storing program. Data and doing the processing. Five areas for storing different sets of programs: a) Operating system b) Program (software) storage are to store program for execution. c) Input storage area for holding data from input device. d) Working storage area for processing the data. e) Output storage area for temporary storage of result. System of Storage in Memory: In computer fundamental unit of storage is binary digit or bid. Binary numbers is represented by a combination of 0 and 1. In computer memory, 0 and 1 are represented by off and on in the electrical circuit. A computer can store data or instructions through electronic switches in the sequences of off and on position in the memory. The most common group of combination is eight bit group which is called a byte. The memory capacity of computer is measured by Kilobytes (KB), Megabytes (MB), and Gigabytes (GB). 1 Kilobyte = 1024 Bytes = 1000 Bytes (approx) 1 Megabyte= 1024 Kilobytes = 1 Million Bytes. DIFFERENT TYPES OF MEMORY: (1) RAM (Random Access Memory): The term RAM itself indicate that this kind of memory allows to reading and writing both possible random access this making it very fast. RAM is volatile in the sense that this type of space is used for temporary working area and contents are lost as soon as the power in the machine is switched off.

19 Page 19 RAM DRAM (Dynamic RAM) SRAM(Static RAM) (2) ROM(Read only Memory): The term itself indicates that this type of memory is used for permanent data storage and allows only reading. ROM s are normally used to store information which is used by the computer for its own operation. ROM is not volatile i.e. contents of ROM is not lost as soon as switch of the machine is made off. Computers used ROM chip to store permanent program for example program for booting the computer. (3) PROM(Programmable Read Only Memory): PROM chip is used to store program of permanent nature. At the time of manufacturing, ROM chip remains blank and program is written on it afterwards. (4) EPROM(Erasable Programmable Read Only Memory): This kind of ROM is used for storing programs. It is different of PROM in the sense that earlier program can be erased by lesser rays and new program can be stored there. (5) EEPROM(Electrically Erasable Programmable Read Only Memory): This is a special type of PROM which can be erased by electrical charge. (6) Flash Memory: It is a special type of EEPROM where programming is faster (in blocks). Flash memory chip is used only to keep provision of faster updation. (7) Cache Memory: This is a very fast RAM. The basic objective of using it is to do processing faster. It is placed between CPU and main memory.

20 Page 20 Secondary Storage Device: Virtual Memory: The main memory of a computer is limited in size and expensive also. Thus, main memory is never meant for the entire data storage. The data or programs whatever required during processing are loaded into the memory and after processing they are stored back in the storage media for subsequent use. This provision for additional storage space is called secondary storage. Virtual memory is a provision of secondary storage which acts as primary memory. When the size of main memory is less than required size for a program to run, the operating system enables it with the help of hard disk (made storage media). Classification of Digital Computers: Mainframe Computer: It is a very big computer with computing power. In a network environment, mainframe computer is the nodal point of network. Mini Computer: It is a smaller version of mainframe computer both in size and computing power. Micro Computer: Micro Computers are built with the help of micro processor chip, CPU, ROM, RAM are in different chips. Personal Computer: Personal Computer refers to stand alone mode computer which is fully equipped with own CPU, memory, storage device, operating system and utility software etc. Work Station: Workstation generally refers to an intelligent terminal in a networking environment. Workstation may be any computer linking under LAN also. Laptop Computer: A Laptop computer is small, little weight and portable. It has all features of a PC. Note book Computer: A Notebook computer is typically of size of a note book and can be fit in a brief case. It has CPU, memory, disk drive of same capacity of a PC and a display screen.

21 Page 21 INPUT/OUTPUT DEVICES: Input Devices are the machine used for feeding data into a computer. Example: Keyboard, floppy disk. Output Devices are the machine through which output of processing comes out from the computer. Example: Monitor, Printer. DIFFERENT TYPES OF INPUT DEVICES: Key Entry Device: It is a device like a type writer called key board for data entry. Punch Card System: Punching means making holes on the punch card, punch card is of 80 columns. The combinations of holes in different columns are used to indicate different numbers, characters and special characters. Track Ball: Its function is same as mouse. The difference is that, it is not required to move to control the movement of cursor. Joy Stick: This device is similar to mouse. The difference is the cursor continues to move in the direction joystick points. Magnetic Ink Character Recognition (MICR): The advantage of MICR code is that any document having MICR character can be read by a computer because both manual entry data and data through reading devices are checked to ensure correctness. Scanner: Scanner is a very useful device for reading text or documents. The scanner digitized the image of the document. SCANNER Optical Scanner Magnetic Ink Character Recognition (MICR) Scanner

22 Page 22 Criteria of Selection of a Computer System: a) Workload: Data processing requirements in terms of volume, frequency etc. b) Operating system capacity/capability. c) Type of application system to be processed. d) Processing requirements. e) Network requirements. f) File/data base design support. g) Software performance. h) Cost of machine, delivery, installation. i) Maintenance cost. Installation of a Computer System: Site preparation Good height of the room Proper electrification Fire protection arrangements Air Conditioning Provision for controlling dust

23 Page 23 INFORMATION SYSTEM CONTROL Risk in Information System: Risk is the probability of happening something adverse. Risk Management Process: Understanding the sources and causes of risk. Collection of data related to risk. Evaluation of magnitude of risk. Develop policy to minimize the risk. Develop the methodology to prevent their occurrence. Implementation of the methodology. Different Categories of Risk Factors: HARDWARE: Damage by lightening, fire, earthquake etc. Failure of communication and network system. Power Failure. Breakdown of Computer System. SOFTWARE: Error in programs. Error in operations Weakness in control. Damage by Computer Virus. INPUT DATA: Incorrect data. Damage of data file. Fraud. OPERATIONAL RISK: Failure of machine. Failure of software. Wrong operation.

24 Page 24 OTHERS: Fraud Damage by employees Unauthorized access by hackers Damage by natural disaster Leakage of sensitive information. Developing Methodology to Minimize Risk: To create proper environment, to establish proper control mechanism and regular vigilance on the proper functioning of the established norms in the information system are essential to reduce the risk. Provisions are developed to check the occurrence of risk factors are: i) Documentation: Documentation on policy, procedure and system administration. ii) Creation of congenial environment: Care environment free from hazards to minimize chance of damage of system. iii) Preventive maintenance: Regular and timely preventive maintenance iv) Quality management: Ensuring the quality of software at the development, testing and operational efficiency. v) Security Management. vi) Recovery System vii) System Administration (Strict Code) viii) Set of Routine Procedure. ix) Training (Improve) Information System and Management Control: In an organization it becomes the management responsibility to develop its information system to attain its objectives. The basic objective of IS is to provide the required smooth flow of information planning and control activities. Standard Auditing Practices (SAP 1) suggest the following steps: i) Framing policies and procedure for effective control. ii) Establishment of sound organization structure. iii) Clearly defining responsibilities and authority for access to information supervision and control on information system. iv) Ensuring smooth flow of information for effective control.

25 Page 25 v) Regular monitoring the internal control system. vi) Periodic review of control system. Policies and Procedure for effective control: Level of authority System of cross check Procedure of monitoring System of review of control system. Creation of proper processing environment: Data Security Preventive maintenance Proper resource management Timely data processing Cross checking Cost of data processing. Smooth Flow of Information: Documentation Well defined responsibility Clearly spelt out duties of individual in IS Dept. Preventive resources against failures Proper user manual Good Training Regular check procedure. Monitoring: Supervisor Preventive measures Smooth functioning Regular supervision of machine Proper report of input or output Build system in data processing environment. Statistical records.

26 Page 26 Periodic Review: Efficiency of the existing control system. Change needed to match the change the environment and technological development. Review report should be submitted to senior management. Justification of the suggestion under the review. Control in Information System: Database Management System has brought the idea of data integration to reduce data redundancy and effective combination of information in reports to derive better decision making process. Control of both input and output has become more than necessary to ensure correct reports, avoid misuse, to enhance effectiveness of computer based application system. Control in information system means the policy, procedure and system followed to ensure the desired objectives. Organization Structure Control Task System development Computer operation Database Administration Hardware Maintenance Data Security Staff Responsible System Analyst, Programmer Computer Operator Database Administrator Network Specialist Input/output Control Staff. Control in Operation Environment: Proper earthing of electrical line Provision of UPS to protect the system Maintenance of proper register for users. Regular electrical maintenance Diagram of electrical/network cabling to be documented.

27 Page 27 Allowing use of only licensed version of software. Provision of annual maintenance of system. Preventive Measures against Damage: Proper security measures against theft and damage of hardware. Arrangement from disaster recovery. Proper backup system to prevent from accidental data loss. Routine check on unauthorized access to system. Control in Processing Environment: a) Input Control Ensure correctness of data. Completeness and authorization Incorrect data out of clerical mistake. Wrong codification Willful mistake for doing fraud. Mistake at the time of data entry. b) Access Control Permission to level of access to system depending on category of user. Periodic change of password should be made mandatory. Password of system administrator should be kept in safe custody under sealed cover. Access permitted to only users presently working in the dept./branch. Use of standard Anti Virus software in all PCs. c) Processing Control To check the validity of data size and data type in terms of alphabetic and numeric data. To ensure correctness of figure by a check of logical limit of value of single transaction To indentify the input data which are logically invalid. d) Output Control Checking the output report with batch control total. Checking of correctness of output report. Distribution of output to the authorized user only. Backup of output files at regular intervals.

28 Page 28 e) Documentation control Logbook must be maintained for processing records and generation of report with signature of authorized person. Records of usage, downtime, maintenance calls and maintenance service must be maintained. COMPUTER FRAUD: Computer fraud is an illegal action with the help of computer technology to make financial gain to have unauthorized access to provide information of others, to damage software/data etc. Hacking: Cracker: Unauthorized access to software and information. Unauthorized access to machine with intention of damage to data, software. Password Cracking: Software Piracy: To access to system resources by password. Copying software for illegal use without paying due price. Virus: Use of software to damage set of software/data files in machine. Measures for detection and prevention: Proper audit at regular intervals on control measures. Use of expert software to provide advance alert signal. Proper security measures. Proper audit at regular intervals. Disk imaging. Keeping regular backup. Train employees in measures against fraud. Punishment to unethical activities. Use of only licensed version of software. Security of Information System: The damage are of following types: Leakage of sensitive information by unauthorized user. Misuse of system. Theft or physical damage of computer, Software.

29 Page 29 Objective of Information Security: Assignment of responsibility for maintenance of data. Standardization of system of access to prevent damage by unauthorized access. Safeguard against threat of loss or damage of hardware, data and software. Role of Security Administrator: Framing information system security policy. Measures to ensure safeguard from possible threats. Train the staff for effective action. Implementation of security system. Monitor the security measures. Safeguard Computer Equipment and Database: Arrangement of physical security. Access Control Insurance against damage. Physical Security: Door Machine lock Guard Access Lock. Access Security with Check in Computer System: a) Password Security: Password is a confidential key to a person and in normal situation no person is in a position to have the password. b) Biometric Security: Biometrics is a mechanism of defining user profile based on physical parameters and behavior. Some of the biometric characteristics are signature, voice, facial scan etc. c) Firewall: It is a system of security in the network with the help of hardware and software. A software check s all incoming and incoming internet traffics. d) Database Security: Users are categorized on the basis of permission to be given far access to different level of data on the basis of sensitivity and control is made by the database administrator. e) Network Security: Access to network is controlled by password, firewall security measures. Network protocol also takes care of security for access to network.

30 Page 30 DISASTER RECOVERY Natural Flood, Earthquake DISASTER Technological Failure of Computer DISASTER RECOVER PLAN Emergency Action Sounding alarm bell Use of fire extinguisher Saving the back up of software, data etc. Recovery Action Backup of database at a regular interval Mirror imaging of disk Selection of alternative computer system

31 Page 31 MANAGEMENT INFORMATION SYSTEM MIS is a systematic process of providing relevant information in right time in right format to all level of users in the organization for effective decision making. MIS is also defined to be system of collection, processing, retrieving and transmission of data to meet the information requirement of different level of managers in an organization. MIS is a set of procedures designed to provide managers at different levels in the organization with information for decision making, and for control of those parts of the business for which they are responsible. OBJECTIVE OF MIS: To provide the managers at all levels with timely and accurate information for control of business activities. To develop a systematic and regular process of communication within the organization on performance in different functional areas. To use the tools and techniques available under the system for programmed decision making. To gain competitive advantage. To provide information support for business planning for future. To provide best service to customers. Basic Features of an MIS: Management Oriented Timeliness Integrated Simplicity Reliability Relevance Flexibility Implementation of MIS: Analytical study on information requirement. Determine the source of information. Establishment of right kind of data processing environment. (Software and skilled man power)

32 Page 32 Selection of Software Compatibility of hardware. Capable of taking load of data volume. Have the support of software for required database Capable of supporting the communication network Database design Support of top management Manpower Evaluation, Maintenance and control Different Approaches for Developing Management Information System: 1) Top Down Approach: It starts from the identification of information requirements of different activities of the organization by the top management in order to have information support in strategic and tactical decision making and designing the IS accordingly. Top management provides the guidelines for basic objectives, policies and plan for developing these subsystems. 2) Bottom up Approach: In the bottom up approach, each sub system for different functional areas like payroll, sales management, production management, Inventory Control System are developed according to the specification for each sub system on the basis types of input documents, flow of information and output requirements. The next step in the approach is to integrate the information of these sub systems for a comprehensive MIS for the organization. 3) Integrative Approach: This approach in a more scientific approach for easy integration of sub systems and take care of the limitation in the other two approaches described above by way of better planning. The top management identifies the information requirements from different subsystems specifies other guidelines for integration of these information for effective support to decision making. Problem in Operating MIS: Non availability of experts who can diagnose the requirement of organization and give desired direction. Technical knowledge gap between management expert and computer expert. Non availability of right kind of cooperation of the employees. Heavy investment requirement for establishment of an MIS.

33 Page 33 Frequent changes in the information requirement by the users. Information Requirement of Management: MIS is developed to provide the right kind of information for decision making. IS, to be truly efficient, has to have interlink with different functional management. Information Requirement depends on the following factors: Operational function: The information generated in different functions is different and control requirements vary widely. For example, the requirement of information for decision making in production function will be same as in case of financial function. Type of Decision Making: a) Programmed Decision: Programmed decision making refers to those decisions making process which are based on some standard set of procedure established by the management and according to scientific principle of management. b) Non Programmed Decision: Non Programmed Decision making refers to those decisions making process which does not go by any predetermined set of guidelines. Normally this type of decision making takes place to handle special business situations with the help of experience, judgment and vision of the decision maker. Level of Management: a) Top Management: Top management is concerned with strategic decisions like diversification, technology acquisition, new market exploration, strategic business alliance, takeover, merger etc. b) Middle Management: Middle level management is generally involved decision making with the help of performance analysis, budget variance analysis, devising better productivity mechanism and control etc. c) Operational Management: Operational Management staffs are mainly involved in scheduling the activities, keeping track of progress of day to day operations and decisions of well structured problem etc. INFORMATION NEED FOR STRATEGIC MAKING: Strategic Information system is to provide best information flow to feed the management in the decision making process to sustain organization s competitive advantage. IS with the power of information technology which ensures high speed communication can provide the best support to build decision making models.

34 Page 34 The IS will help the organization in the following ways: Re engineering the business process with fast review the results. Building competitive intelligence through monitoring competitor s performance. Capturing market information on new technology and products. Market Trend analysis. Designing products with the help of CAD tools. Types of Information are given below: a) Critical success factors: Cost structure Product quality Customers profile Customers services Customers satisfaction level Management development programmers b) External Information set: Economic Technological Market measure Profit measure Competitors performance Different types of Reports: 1) Personnel management: a) Top level (Strategic information): Skill information Long term human resources requirement Policies on human resources development b) Middle level (Tactical information): Deployment pattern in different department Personnel deployment policy Performance appraisal c) Operational level (operational information): Performance Leave/absenteeism Punctuality

35 Page 35 2) Production Management: a) Top level (Strategic Information) Policy on production priority of different products. Information on new technology. b) Middle level (Tactical information) Actual performance with target Variance and their causes Breakdown and maintenance information c) Operational level (operational information) Performance details Preventive maintenance schedule Machine performance 3) Sales Management: a) Top level (Strategic information): Information on new product or new market Information on market strategy b) Middle level (Tactical Information): Actual sales product or new market Sales variance and their causes Performance of different sales offices c) Operational level (Operational information): Sales details branch wise and product wise Individuals sales personnel performance Sales expenses details Management Decision Making: The decision making process must be accurate and at right time. For this, information base for decision making plays a great role. Developments in Information Technology have created a new area in management decision making process. The decision making has become increasingly difficult due to following change in the business environment: Increase in the number of alternatives to be evaluated. Increase in risk in business. Complex decision making environment Time pressure High cost of making wrong decisions

36 Page 36 Components of Business Information System: Business Information System comprises of: i) Transaction processing system: It refers to the processing of information relating to monetary transactions in the business activities like purchase, sale, payment, receipts etc. It is a computer based processing for different functional area to generate all required reports for day today use in the organization. Example of transaction processing in an organization: Payroll Accounts receivable Bank Reconciliation Purchase order processing Sales order processing Inventory control Job costing ii) On line transaction processing (OLTP): OLTP is carried in a client/server system. In today s competitive environment, information at right time plays a great role in controlling costs of various resources and providing best possible services to the customers. In case of sales and distribution system in an organization where transactions take place at different locations on line transaction processing is following to carry out the following basic function: Inquiry handling Quotation preparation Receiving order from customers Checking availability of materials/products Scheduling delivery Monitoring sales transactions Invoicing Managing bills receivables iii) On line analytical processing(olap): Through OLAP software are found in widely divergent (different) functional areas, they have three common key features which are: Multidimensional views of data High analytical ability

37 Page 37 Just in time information delivery Need for integration of Information Enterprise Wide: The conventional information system aim at providing information related to different business functional areas to the respective managers for decision making. The evolution in information system suggest for integration of information of various functional area enterprise wide for comprehensive information set for more effective decision making. This is possible only by way of taking care of all transactions related data from different functional areas online and integrating them. Today, many organization world wide have clearly perceived the advantages of information integration. A good number of large and medium size organizations have implemented ERP system to derive the greater benefits of linking all the functional systems for effective use of information. The following are the needs of integration of information: Information for various inter related parameters provides clear picture. Comprehensive review of business situation is possible. Redundancy of information is avoided by scientific linking. INFORMATION SYSTEM Manufacturing Department Material Management Financial Accounting & Costing Selling & Distribution Customer Relation Market Intelligence Models used for representing the Information: Iconic scale Model: It is physical replica (Copy in 3D) of the system based on different scale from original. Iconic models may appear to scale in three dimensions such as model of a production process, building, car or an aircraft.

38 Page 38 Analytical Model: It may be a model for a physical system but the model differs from actual system. Example: Map showing water, mountain etc. Mathematical Model: It represents a data set in the form of graph, picture or functional diagram. It uses highly mathematical or statistical algorithm to interpret data of huge volume. The algorithm varies depending on the complexity of analysis of data sets and the type of analysis. Analysis of Information: a) Environment analysis: Customers Suppliers Competition Trade association Government Market b) Product position analysis: Market share and growth Product performance Range of products and level of competition Market trend Technology and possibility of change. c) Cost Benefit Analysis: Payback period Net present value Internal rate of return d) Business planning: Profitability analysis Market research Product mix selection Budgeting

39 Page 39 Executive Information System: An executive IS is special type of MIS meant for top management of an organization. An EIS is a set of procedure designed to allow senior managers to gather and evaluate information relating to the organization and its environment. The EIS take cares the requirement of information depending upon the type of decisions taken at different levels of manager in an organization. The EIS is not only limited to internal data source rather facilities to easy access to common sources of external data is also arranged. It provides the facilities to connect to internet.

40 Page 40 INFORMATION SYSTEM AUDIT Audit Charter: An audit charter covers role of the internal audit function inclusive of information system audit function: a) Place of audit function within the organization and its role in contributing towards fulfillment of organizational goals. b) Authority of the audit functions to gain access to records, facilities and personnel including Board of Director s audit committee or to the BOARD itself. c) Responsibility of the audit function to advice the management about the quality of attainment of the four objectives: Safeguarding of asset Data integrity System effectiveness System efficiency The rights and responsibilities of both the internal audit function and the information system audit function within an organization should be clearly defined to prevent disputes over the issue and ensure effectiveness and efficiency of the audit function. Auditing in computer based data processing system: Introduction Understanding basic features of the computer based system Review of application documentation Evaluation of control Designing test procedures Application of selection audit procedure Analysis of audit results and reporting Step in auditing computer application system: 1) Familiarization with the application system: Basic features of the system Codification system Error handling and control system

41 Page 41 2) Scrutiny of application documentation: Input output formats Data contents Procedures Internal Control System Flow Charts 3) Evaluation of System Controls: Checklists Preventive control Detective control Corrective control Security control 4) Designing test procedures: Selecting the testing techniques Auditing around the computer Auditing through the computer 5) Analysis of audit results and reporting: Identification of the application under audit Identification of weakness in the internal control system Recommendation for improvement Actions needed for implementation Auditing around the computer and auditing through the computer: Auditing around the computer: a) Selection of one or more critical output from the computer system. b) Verification of the results exhibited by the output to ascertain correctness and completeness of the transactions processed. c) Locate the original source of input for verification. Auditing through Computer implies verification of the computerized system it self and its efficiency to produce the correct and required output.

42 Page 42 Audit Trail: It refers to a system of designing of an information system in a manner that the historic data and information at any processing stage may be traced to verify the origin, correctness, authenticity, flow and destination including the stage of security procedures for establishment of integrity of data and information. Guidelines to Conduct audit of Computerized accounting system: 1) Understanding basis features of the computer based system. 2) Review of application documentation 3) Evaluation of controls 4) Designing the procedures 5) Preparation of audit program 6) Evaluation of audit result 7) Reporting to management The reasons for Information System Audit: There may be adverse result of losing the data resources. Misallocation of resources because of incorrect decision based on incorrect data. The need to maintain the privacy of individual s persons. High costs of computer error. The high value of computer hardware and software. Information System Audit: The Information System audit is the process of collecting and evaluating evidence to determine whether a computer system safeguards assets, maintains data integrity, allows organizational goals to be achieved effectively and uses resources efficiently. Objective of Information System Audit: Safeguarding of assets which include hardware, software, people i.e. knowledge, data files, system documentation etc. Data integrity i.e., completeness, soundness and purity. System effectiveness i.e. it has knowledge of users needs and facilitates decision making process in the organization. System efficiency i.e. use of minimum resources to fulfill the desired objectives.

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System? Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers

More information

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers.

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers. Chapter 1 CD-ROM stands for: a. Compact Disk Random Only Memory b. Compact Disk Read Only Memory c. Computer Device Read Only Memory d. Computer Disk Random Online Memory Control Unit (CU) is the a. Main

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

1 PERSONAL COMPUTERS

1 PERSONAL COMPUTERS PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers

More information

lesson 1 An Overview of the Computer System

lesson 1 An Overview of the Computer System essential concepts lesson 1 An Overview of the Computer System This lesson includes the following sections: The Computer System Defined Hardware: The Nuts and Bolts of the Machine Software: Bringing the

More information

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS Workpaper Reference Date(s) Completed Organization and Staffing procedures used to define the organization of the IT Department. 2. Review the organization

More information

COMPUTER BASICS. Seema Sirpal Delhi University Computer Centre

COMPUTER BASICS. Seema Sirpal Delhi University Computer Centre COMPUTER BASICS Seema Sirpal Delhi University Computer Centre What is a Computer? An electronic device that stores, retrieves, and processes data, and can be programmed with instructions. A computer is

More information

Introduction to Information System Layers and Hardware. Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA

Introduction to Information System Layers and Hardware. Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA Introduction to Information System Layers and Hardware Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA 1 Information System Layers Learning Objectives Task Statements

More information

CHAPTER 12: INFORMATION SYSTEMS IN BUSINESS

CHAPTER 12: INFORMATION SYSTEMS IN BUSINESS CHAPTER 12: INFORMATION SYSTEMS IN BUSINESS Multiple Choice: 1. A computer system performs all of the following basic functions EXCEPT: A. output. B. input. C. acquisition. D. processing. Answer: C Reference:

More information

COMPUTER AND COMPUTERISED ACCOUNTING SYSTEM

COMPUTER AND COMPUTERISED ACCOUNTING SYSTEM MODULE - 2 Computer and Computerised Accounting System 12 COMPUTER AND COMPUTERISED ACCOUNTING SYSTEM With the expansion of business the number of transactions increased. The manual method of keeping and

More information

Chapter 7 Information System Security and Control

Chapter 7 Information System Security and Control Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect

More information

B.Sc (Computer Science) Database Management Systems UNIT-V

B.Sc (Computer Science) Database Management Systems UNIT-V 1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE DATA PROCESSING OPERATOR 11425 4-16-89 DATA PROCESSING ASSISTANT

More information

Chapter 6. Inside the System Unit. What You Will Learn... Computers Are Your Future. What You Will Learn... Describing Hardware Performance

Chapter 6. Inside the System Unit. What You Will Learn... Computers Are Your Future. What You Will Learn... Describing Hardware Performance What You Will Learn... Computers Are Your Future Chapter 6 Understand how computers represent data Understand the measurements used to describe data transfer rates and data storage capacity List the components

More information

Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer

Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.

More information

Chapter 8 Memory Units

Chapter 8 Memory Units Chapter 8 Memory Units Contents: I. Introduction Basic units of Measurement II. RAM,ROM,PROM,EPROM Storage versus Memory III. Auxiliary Storage Devices-Magnetic Tape, Hard Disk, Floppy Disk IV.Optical

More information

Logical Operations. Control Unit. Contents. Arithmetic Operations. Objectives. The Central Processing Unit: Arithmetic / Logic Unit.

Logical Operations. Control Unit. Contents. Arithmetic Operations. Objectives. The Central Processing Unit: Arithmetic / Logic Unit. Objectives The Central Processing Unit: What Goes on Inside the Computer Chapter 4 Identify the components of the central processing unit and how they work together and interact with memory Describe how

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Overview of MIS Professor Merrill Warkentin

Overview of MIS Professor Merrill Warkentin Management Systems (MIS) Mississippi State University Data raw numbers - not processed facts, lists, numbers, tables of value to an organization 1 2 Data Processing (DP) the restructuring of data to improve

More information

Chapter 3: Computer Hardware Components: CPU, Memory, and I/O

Chapter 3: Computer Hardware Components: CPU, Memory, and I/O Chapter 3: Computer Hardware Components: CPU, Memory, and I/O What is the typical configuration of a computer sold today? The Computer Continuum 1-1 Computer Hardware Components In this chapter: How did

More information

INFORMATION SYSTEMS. Written examination. Friday 12 November 2004

INFORMATION SYSTEMS. Written examination. Friday 12 November 2004 Victorian Certificate of Education 2004 SUPERVISOR TO ATTACH PROCESSING LABEL HERE INFORMATION SYSTEMS Written examination Friday 12 November 2004 Reading time: 11.45 am to 12.00 noon (15 minutes) Writing

More information

Chapter 4 System Unit Components. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 4 System Unit Components. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 4 System Unit Components Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Differentiate among various styles of system units on desktop computers, notebook

More information

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER

ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:

More information

Chap-02, Hardware and Software. Hardware Model

Chap-02, Hardware and Software. Hardware Model Philadelphia University School of Business Administration INFO-101 Information Systems Prof London Chap-02, Hardware and Software Hardware Components Central processing unit (CPU) Arithmetic/logic unit

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming

More information

THE BUSINESS VALUE OF AN ERP SYSTEM

THE BUSINESS VALUE OF AN ERP SYSTEM THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG ii Copyright c 2010 by Ajmal Beg. All rights reserved. This technology described in this publication is based

More information

CHAPTER 2: HARDWARE BASICS: INSIDE THE BOX

CHAPTER 2: HARDWARE BASICS: INSIDE THE BOX CHAPTER 2: HARDWARE BASICS: INSIDE THE BOX Multiple Choice: 1. Processing information involves: A. accepting information from the outside world. B. communication with another computer. C. performing arithmetic

More information

MULTIPLE CHOICE FREE RESPONSE QUESTIONS

MULTIPLE CHOICE FREE RESPONSE QUESTIONS MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union I n p u t d e v i c e s Where would you find the letters QUERTY? A. Mouse B. Keyboard C.Numeric Keypad How did the computer mouse get its name? A.

More information

Discovering Computers 2011. Living in a Digital World

Discovering Computers 2011. Living in a Digital World Discovering Computers 2011 Living in a Digital World Objectives Overview Differentiate among various styles of system units on desktop computers, notebook computers, and mobile devices Identify chips,

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Primary Memory. Input Units CPU (Central Processing Unit)

Primary Memory. Input Units CPU (Central Processing Unit) Basic Concepts of Computer Hardware Primary Memory Input Units CPU (Central Processing Unit) Output Units This model of the typical digital computer is often called the von Neuman compute Programs and

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals

THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?

More information

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu. Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali mzali@just.edu.jo 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Computer Systems Structure Main Memory Organization

Computer Systems Structure Main Memory Organization Computer Systems Structure Main Memory Organization Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Storage/Memory

More information

Definition of Computers. INTRODUCTION to COMPUTERS. Historical Development ENIAC

Definition of Computers. INTRODUCTION to COMPUTERS. Historical Development ENIAC Definition of Computers INTRODUCTION to COMPUTERS Bülent Ecevit University Department of Environmental Engineering A general-purpose machine that processes data according to a set of instructions that

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards

More information

Chapter 8: Security Measures Test your knowledge

Chapter 8: Security Measures Test your knowledge Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists

INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician NOC CODE: 2281 STANDARD HOURS: 35 hours/week (non-management)

More information

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

ELECTRONIC DOCUMENT IMAGING

ELECTRONIC DOCUMENT IMAGING AIIM: Association for Information and Image Management. Trade association and professional society for the micrographics, optical disk and electronic image management markets. Algorithm: Prescribed set

More information

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

A Computer Glossary. For the New York Farm Viability Institute Computer Training Courses

A Computer Glossary. For the New York Farm Viability Institute Computer Training Courses A Computer Glossary For the New York Farm Viability Institute Computer Training Courses 2006 GLOSSARY This Glossary is primarily applicable to DOS- and Windows-based machines and applications. Address:

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives

Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives Introduction to Programming and Algorithms Module 1 CS 146 Sam Houston State University Dr. Tim McGuire Module Objectives To understand: the necessity of programming, differences between hardware and software,

More information

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia

INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia INFRASTRUCTURE AS A SERVICE (IAAS) SERVICE SCHEDULE Australia 1 DEFINITIONS Capitalised terms in this Service Schedule not otherwise defined here have the meaning given in the Standard Terms and Conditions:

More information

PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI

PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT APPENDIX E PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 This page is intentionally left blank.

More information

Data Security 2. Implement Network Controls

Data Security 2. Implement Network Controls UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which

More information

ADMINISTRATIVE SUPPORT AND CLERICAL OCCUPATIONS SIN 736 1

ADMINISTRATIVE SUPPORT AND CLERICAL OCCUPATIONS SIN 736 1 Following are the Contractor Site and Government Site Labor Categories for SIN 736-1, SIN 736-1, and SIN 736-5. Please do not hesitate to contact us at gsataps@amdexcorp.com if you have any questions ADMINISTRATIVE

More information

MINNESOTA. Downloaded January 2011

MINNESOTA. Downloaded January 2011 4658.00 (GENERAL) MINNESOTA Downloaded January 2011 4658.0015 COMPLIANCE WITH REGULATIONS AND STANDARDS. A nursing home must operate and provide services in compliance with all applicable federal, state,

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

Remote Deposit Terms of Use and Procedures

Remote Deposit Terms of Use and Procedures Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

MANAGEMENT INFORMATION. Prepared By: Hardeep Singh

MANAGEMENT INFORMATION. Prepared By: Hardeep Singh MANAGEMENT INFORMATION SYSTEM Definition A Management Information System is an integrated user-machine system, for providing information, to support the operations, management, analysis & decision-making

More information

Main Memory & Backing Store. Main memory backing storage devices

Main Memory & Backing Store. Main memory backing storage devices Main Memory & Backing Store Main memory backing storage devices 1 Introduction computers store programs & data in two different ways: nmain memory ntemporarily stores programs & data that are being processed

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Solutions and IT services for Oil-Gas & Energy markets

Solutions and IT services for Oil-Gas & Energy markets Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance

More information

1.1 Electronic Computers Then and Now

1.1 Electronic Computers Then and Now 1.1 Electronic Computers Then and Now The first electronic computer was built in the late 1930s by Dr.John Atanasoff and Clifford Berry at Iowa State University in USA. They designed their computer to

More information

SECTION 15 INFORMATION TECHNOLOGY

SECTION 15 INFORMATION TECHNOLOGY SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

Introduction to Information System

Introduction to Information System Introduction to Information System Information Systems The Role of Information Systems in a Business Data versus Information Information Systems Definition Computer-Based Information System Business Information

More information

Hardware: Input, Processing, and Output Devices. A PC in Every Home. Assembling a Computer System

Hardware: Input, Processing, and Output Devices. A PC in Every Home. Assembling a Computer System C H A P T E R 3 Hardware: Input, Processing, and Output Devices A PC in Every Home February 3, 2000 Ford will make available to all 330,000 employees hourly and salaried an HP Pavilion PC, an HP DeskJet

More information

Machine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory.

Machine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory. 1 Topics Machine Architecture and Number Systems Major Computer Components Bits, Bytes, and Words The Decimal Number System The Binary Number System Converting from Decimal to Binary Major Computer Components

More information

E-Booking at London International Airport

E-Booking at London International Airport Standard Grade Computing Studies Commercial Data Processing Frank Frame Acknowledgement Thanks to Dorothy Tedman for her contribution to the review of the content. First published 2004 2004 This publication

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

RISK ASSESSMENT GUIDELINES

RISK ASSESSMENT GUIDELINES RISK ASSESSMENT GUIDELINES A Risk Assessment is a business tool used to gauge risks to the business and to assist in safeguarding against that risk by developing countermeasures and mitigation strategies.

More information

Kentucky Department for Libraries and Archives Public Records Division

Kentucky Department for Libraries and Archives Public Records Division Introduction Kentucky Department for Libraries and Archives Public Records Division Ensuring Long-term Accessibility and Usability of Textual Records Stored as Digital Images: Guidelines for State and

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Save from: www.uotiq.org/dep-cs. University of Technology Computer Science Department. 4 th Class Management Information Systems (MIS)

Save from: www.uotiq.org/dep-cs. University of Technology Computer Science Department. 4 th Class Management Information Systems (MIS) Save from: www.uotiq.org/dep-cs University of Technology Computer Science Department 4 th Class Management Information Systems (MIS) استاذ المادة: د.علياء عبداالله Reference book: "Management Information

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

The Open University of Tanzania Faculty of Business Management Master of Business Administration (MBA) OLG 612 ICT in Business Management

The Open University of Tanzania Faculty of Business Management Master of Business Administration (MBA) OLG 612 ICT in Business Management The Open University of Tanzania Faculty of Business Management Master of Business Administration (MBA) Course Outline OLG 612 ICT in Business Management Introduction In the current world, information is

More information

Module 2 IS Assurance Services

Module 2 IS Assurance Services Module 2 IS Assurance Services Chapter 2: IS Audit In Phases Phase 2: Part: 2 of 3 CA A.Rafeq 1 Chapter 2: Agenda Chapter 2: IS Audit in Phases Phase1: Plan Phase 2: Execute Phase 3: Report 2 Phase 2:

More information

Chapter 7 Securing Information Systems

Chapter 7 Securing Information Systems 1 Chapter 7 Securing Information Systems LEARNING TRACK 4: GENERAL AND APPLICATION CONTROLS FOR INFORMATION SYSTEMS To minimize errors, disaster, computer crime, and breaches of security, special policies

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

SAMPLE ELECTRONIC DISCOVERY INTERROGATORIES AND REQUESTS FOR PRODUCTION

SAMPLE ELECTRONIC DISCOVERY INTERROGATORIES AND REQUESTS FOR PRODUCTION Below are SAMPLE interrogatories and requests for production that are meant to be complementary (i.e., any devices or electronic files that are identified in answer to an interrogatory or interrogatories

More information

Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup

Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup www.cloudsecure.co.uk/cloudsecure 1 Accountants and Solicitors Firms Professional organisations such as accountancy and solicitors firms have an ever increasing

More information

The Central Processing Unit:

The Central Processing Unit: The Central Processing Unit: What Goes on Inside the Computer Chapter 4 Objectives Identify the components of the central processing unit and how they work together and interact with memory Describe how

More information

DETAIL AUDIT PROGRAM Information Systems General Controls Review

DETAIL AUDIT PROGRAM Information Systems General Controls Review Contributed 4/23/99 by Steve_Parker/TBE/Teledyne@teledyne.com DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,

More information

Multiple Choice Questions(Computer)

Multiple Choice Questions(Computer) Multiple Choice Questions(Computer) 1. Which of the following is the product of data processing a. information b. data c. software program d. system 2. The process of putting data into a location is called

More information

Testing Automated Manufacturing Processes

Testing Automated Manufacturing Processes Testing Automated Manufacturing Processes (PLC based architecture) 1 ❶ Introduction. ❷ Regulations. ❸ CSV Automated Manufacturing Systems. ❹ PLCs Validation Methodology / Approach. ❺ Testing. ❻ Controls

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN INTRODUCTION The need for a contingency plan for business interruptions is vital to the operations of the BNA Federal Credit Union. Without such a plan,

More information