1. Trang chủ
  2. » Giáo án - Bài giảng

Accounting information systems 12th SIMKIN and norman chapter 02

44 318 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 44
Dung lượng 0,95 MB

Nội dung

Chapter 2: Information Technology and AISs Introduction The Importance of Information Technology to Accountants Input, Processing and Output Devices Secondary Storage Devices Data Communications and Networks Computer Software Chapter 2-1 The Importance of IT to Accountants Must be compatible and support other components of AIS Accountants often help clients make software and hardware purchases Auditors must evaluate computerized systems Chapter 2-2 The Importance of IT to Accountants Often asked to evaluate the efficiency and effectiveness of existing system IT affects how they work now and in the future Understanding is vital to passing most certification exams Chapter 2-3 The AICPA’s Top 10 Information Technologies for 2010 Information Security Securing and Controlling Information Distribution Identify and Access Management Backup, Disaster Planning and Business Continuity Secure Electronic Collaboration Chapter 2-4 The AICPA’s Top 10 Information Technologies for 2010 Paperless Technology Laptop Security Small Business Software Mobile Computing Tax Software and Electronic Filing Server Vitalization and Consolidation Chapter 2-5 Study Break #1 All of the following are reasons why IT is important to accountants except: A Accountants often help clients make IT decisions B Auditors must evaluate computerized systems C IT questions often appear on professional certifications examinations D The costs of IT are skyrocketing Chapter 2-6 Study Break #1 - Answer All of the following are reasons why IT is important to accountants except: A Accountants often help clients make IT decisions B Auditors must evaluate computerized systems C IT questions often appear on professional certifications examinations D The costs of IT are skyrocketing Chapter 2-7 Input, Processing and Output Devices Chapter 2-8 Input Devices Source documents and data transcription Point-of-Sale (POS) devices  Bar Code Readers  Universal Product Code (UPC) Magnetic Ink Character Recognition (MICR) Chapter 2-9 MICR Symbols Chapter 2-10 Data Communications and Networks Wide Area Networks (WANs) Chapter 2-30 Data Communications and Networks Client / Server Computing Chapter 2-31 Data Communications and Networks Wireless Data Communications (Wi-Fi)  Wireless Application Protocol (WAP)  Radio Frequency Identification (RFID)  Near Field Communication (NFC) Cloud Computing Chapter 2-32 RFID Example Chapter 2-33 NFC Example Chapter 2-34 Computer Software Operating Systems Application Software Programming Languages Chapter 2-35 Operating Systems Graphical User Interfaces (GUIs) Utility Programs Virtual Storage Antivirus Software and Viruses Chapter 2-36 Application Software Personal productivity software Commercial productivity software Accounting software Communications software Enterprise resource management software (ERP) Chapter 2-37 Creation of Application Software Chapter 2-38 Study Break #4 Purchasing backup services from an Internet vendor is an example of: A OCR B Modem services C Virtual storage D Cloud computing Chapter 2-39 Study Break #4 - Answer Purchasing backup services from an Internet vendor is an example of: A OCR B Modem services C Virtual storage D Cloud computing Chapter 2-40 Study Break #5 All of these are terms associated with programming languages except: A Object-oriented B Event-driven C Compiler D Server Chapter 2-41 Study Break #5 - Answer All of these are terms associated with programming languages except: A Object-oriented B Event-driven C Compiler D Server Chapter 2-42 Copyright Copyright 2012 John Wiley & Sons, Inc All rights reserved Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc The purchaser may make backup copies for his/her own use only and not for distribution or resale The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein Chapter 2-43 Chapter Chapter 2-44 ... 2010 Information Security Securing and Controlling Information Distribution Identify and Access Management Backup, Disaster Planning and Business Continuity Secure Electronic Collaboration Chapter. .. efficiency and effectiveness of existing system IT affects how they work now and in the future Understanding is vital to passing most certification exams Chapter 2-3 The AICPA’s Top 10 Information. .. PDA Devices Chapter 2-11 Common Input Devices Chapter 2-12 Input Devices Digital Cameras Biometric Scanners  Behavioral systems  Physiological systems  Enrollment  Hamming distance Chapter 2-13

Ngày đăng: 13/05/2017, 09:01

TỪ KHÓA LIÊN QUAN