40
Chapter 2-1

Chapter 2: Information Technology and AISs

Embed Size (px)

DESCRIPTION

Chapter 2: Information Technology and AISs. Introduction The Importance of Information Technology to Accountants Input, Processing and Output Devices Secondary Storage Devices Data Communications and Networks Computer Software. Hardware. Networks. Software. EVOLUTION OF COMPUTER SYSTEMS. - PowerPoint PPT Presentation

Citation preview

Page 1: Chapter 2: Information Technology and AISs

Chapter 2-1

Page 2: Chapter 2: Information Technology and AISs

Chapter 2-2

Chapter 2:Information Technology and

AISs

Introduction

The Importance of Information Technologyto Accountants

Input, Processing and Output Devices

Secondary Storage Devices

Data Communications and Networks

Computer Software

Hardware

Software

Networks

Page 3: Chapter 2: Information Technology and AISs

Chapter 2-3

EVOLUTION OF COMPUTER SYSTEMS

Page 4: Chapter 2: Information Technology and AISs

Chapter 2-4

The Importance of IT to Accountants

1. Must be compatible and support other components of AIS

2. Accountants often help clients make software and hardware purchases

3. Auditors must evaluate computerized systems

Page 5: Chapter 2: Information Technology and AISs

Chapter 2-5

The Importance of IT to Accountants

4. Often asked to evaluate the efficiency and effectiveness of existing system

5. IT affects how they work now and in the future

6. Understanding is vital to passing most certification exams

Page 6: Chapter 2: Information Technology and AISs

Chapter 2-6

The AICPA’s Top 10 Information Technologies for

2010

Information Security

Securing and Controlling Information Distribution

Identify and Access Management

Backup, Disaster Planning and Business Continuity

Secure Electronic Collaboration

2013 Updatehttp://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLOGY/RESOURCES/TOPTECHNOLOGYINITIATIVES/Pages/2013TTI.aspx

Page 7: Chapter 2: Information Technology and AISs

Chapter 2-7

The AICPA’s Top 10 Information Technologies for

2010

Paperless Technology

Laptop Security

Small Business Software

Mobile Computing

Tax Software and Electronic Filing

Server Vitalization and Consolidation

Page 8: Chapter 2: Information Technology and AISs

Chapter 2-8

BASIC COMPONENTS OF COMPUTER SYSTEMS

All computers made up of

the same set of five

building blocks:

input, output, (I/O)

memory, files

arithmetic/logic unit

control unit (CPU)

Page 9: Chapter 2: Information Technology and AISs

Chapter 2-9

Input, Processing andOutput Devices

Page 10: Chapter 2: Information Technology and AISs

Chapter 2-10

Input Devices

Source documents and data transcription

Point-of-Sale (POS) devices Bar Code Readers Universal Product Code (UPC)

Magnetic Ink Character Recognition (MICR)

Page 11: Chapter 2: Information Technology and AISs

Chapter 2-11

MICR Symbols

Page 12: Chapter 2: Information Technology and AISs

Chapter 2-12

Input Devices

Optical Character Recognition (OCR) Mark-sense media Turnaround documents

Plastic Cards with Magnetic Strips

Microcomputer Input Devices PDA Devices

Page 13: Chapter 2: Information Technology and AISs

Chapter 2-13

Common Input Devices

Page 14: Chapter 2: Information Technology and AISs

Chapter 2-14

Input Devices

Digital Cameras

Biometric Scanners Behavioral systems Physiological systems Enrollment Hamming distance

Page 15: Chapter 2: Information Technology and AISs

Chapter 2-15

Microprocessors

Computers, Processing Speeds and AISs

Primary Memory

Central Processing Units and

Primary Memory

Page 16: Chapter 2: Information Technology and AISs

Chapter 2-16

Central Processing Units

Page 17: Chapter 2: Information Technology and AISs

Chapter 2-17

Printers

Video output

Multimedia

Output Devices

Page 18: Chapter 2: Information Technology and AISs

Chapter 2-18

Importance of Secondary Storage Devices

Primary Memory Volatile Memory Lost electrical power, lost memory

Secondary Storage Mass Storage or Auxiliary Storage Maintain data in permanent files

Page 19: Chapter 2: Information Technology and AISs

Chapter 2-19

Secondary Storage Devices

Magnetic (hard) disks Redundant Arrays of Inexpensive Disks

(RAIDS)

Page 20: Chapter 2: Information Technology and AISs

Chapter 2-20

Multiplatter Hard Disk

Page 21: Chapter 2: Information Technology and AISs

Chapter 2-21

Secondary Storage Devices

CD-ROMs Write-once, read-many (WORM) media

DVDs

Blu-Ray Discs

Flash memory

Image processing

Record Management Systems

Page 22: Chapter 2: Information Technology and AISs

Chapter 2-22

The acronyms POS, MIC, and OCR are most closely associated with:

A. Input devices

B. Processing devices

C. Output devices

D. Communication devices

Study Break #2

Page 23: Chapter 2: Information Technology and AISs

Chapter 2-23

Which of these devices is capable of storing the most data?

A. CD-ROM disk

B. DVD disk

C. USB (flash memory) device

D. Magnetic (hard) disk

Study Break #3

Page 24: Chapter 2: Information Technology and AISs

Chapter 2-24

Data Communicationsand Networks

Communication Channels and Protocols Modem Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) Data Communications Protocol

Page 25: Chapter 2: Information Technology and AISs

Chapter 2-25

Data Communicationsand Networks

Local Area Networks (LANs)

Page 26: Chapter 2: Information Technology and AISs

Chapter 2-26

Advantages of a LAN

Facilitating communications

Sharing computer equipment

Sharing computer files

Saving software costs

Enabling unlike computer equipment to communicate

Page 27: Chapter 2: Information Technology and AISs

Chapter 2-27

Data Communicationsand Networks

Wide Area Networks (WANs)

Page 28: Chapter 2: Information Technology and AISs

Chapter 2-28

Architectures

Network Infrastructure – Determined by the physical layout and components of a network

DNS, DHCP, Router, demilitarized zone, etc.

Application Architecture - Determined by how functions of application programs are spread among clients and servers

Page 29: Chapter 2: Information Technology and AISs

Chapter 2-29

Application Layer Functions

• Presentation logic - Presentation of info to user and acceptance of user commands

• Application logic - Business logic such as word processors, spreadsheets

• Data access logic - Processing required to access stored data (e.g., SQL)

• Data storage - Storing of data generated by programs (e.g., files, records)

Page 30: Chapter 2: Information Technology and AISs

Chapter 2-30

Data Communicationsand Networks

Client / Server Computing

Page 31: Chapter 2: Information Technology and AISs

Chapter 2-31

Multi-tier (i.e., n-tier) Architectures

Page 32: Chapter 2: Information Technology and AISs

Chapter 2-32

Data Communicationsand Networks

Wireless Data Communications (Wi-Fi) Wireless Application Protocol (WAP) Radio Frequency Identification (RFID) Near Field Communication (NFC)

Cloud Computing

Page 33: Chapter 2: Information Technology and AISs

Chapter 2-33

RFID Example

Page 34: Chapter 2: Information Technology and AISs

Chapter 2-34

NFC Example

Page 35: Chapter 2: Information Technology and AISs

Chapter 2-35

Computer Software

Operating Systems

Application Software

Programming Languages

Page 36: Chapter 2: Information Technology and AISs

Chapter 2-36

Operating Systems

Graphical User Interfaces (GUIs)

Utility Programs

Virtual Storage

Antivirus Software and Viruses

Page 37: Chapter 2: Information Technology and AISs

Chapter 2-37

From http://www.karbosguide.com

What an application sees…

Page 38: Chapter 2: Information Technology and AISs

Chapter 2-38

Application Software

Personal productivity software

Commercial productivity software

Accounting software

Communications software

Enterprise resource management software (ERP)

Page 39: Chapter 2: Information Technology and AISs

Chapter 2-39

Creation of Application Software

Page 40: Chapter 2: Information Technology and AISs

Chapter 2-40

Purchasing backup services from an Internet vendor is an example of:

A. OCR

B. Modem services

C. Virtual storage

D. Cloud computing

Study Break #4