Thursday, January 8, 2015

IT Knowledge Hand Note



                                                             Chapter 1
                                             Information within Organization
Q.1) What is information?
Information is data that has been processed into a form that is meaningful to the recipient.
Data  ----> Data transformation ----> Information
Q.2) What are the difference between data and information?
SL. No.
Data
Information
1
Raw, unanalyzed fact figure and events
Useful knowledge derived from the data
2
Unprocessed instruction
If data is processed will become your information
3
Example: If you had a sum, 123+123(data)=246(information)

Q.3) How information system impact organization and business firm?
Information systems have become integral, online interactive tools deeply involved in the minute to minute operations and decision making of large organization.
Q.4) What is Organization?
A social arrangement for the controlled performance of collective goals, which has a boundary it from its environment.
Q.5) Write the quality of high value information?
Information only high value information if it is –
·         Relevant
·         Reliable
·         Clear
·         Complete
·         Timely
·         Right Quality.
Q.6) Why Information is key resource in organization?
Or, Discuss the importance of Information.
Information is key resource in an organization because information is fundamental to the success of any business.






Q.7) What is important attributes of useful and effective information?
The important attribute of useful and effective information are as follows:
·         Availability
·         Purpose
·         Decay
·         Frequency
·         Completeness
·         Reliability
·         Cost beneficial
·         Validity
·         Transparency
·         Value of information
Q.8) Why does organization exist?
Organization exist because they-
·         Overcome people’s individual limitations.
·         Enable people to specialize
·         Accumulate and share knowledge.
·         Enable people to poll their expertise.
Q.9) How does organization differ?
Organization differs in many ways, such as:
·         Ownership
·         Control
·         Activity
·         Size
·         Source of finance
Q.10) What is DSS (Decision Support System)?
A decision support system can be defined as a system that provides tools to managers to assist them in solving semi structured and un-structured.
Q.11) What is characteristics / properties of DSS?
The DSS are characteristics by at least three properties-
o        The support semi-structured and unstructured decision making
o        They are flexible enough
o        They are easy to use
Q.12) What is component of DSS?
A decision support system has four basic components. Namely-
·         The user
·         One of more database
·         A planning language
·         The model base
·          
Q.13) Give some example of DSS in Accounting.
Following are the examples of DSS in accounting:
·         Cost Accounting system
·         Capital Budgeting system
·         Budget variance analysis system
·         General decision support system

Q.14) What type of information systems are used at different levels of management in an organization?
Used of information systems at different levels of management in an organization is sited below:
Management level
Used information system
Top level management
EIS,MIS,DSS
Middle level management
MIS,DSS
Lower level management
TPS

Q.15) What activities are involved in TPS?
A TPS involves the following activities:
Ø      Computing data to organization in files or database
Ø      Processing of files/ database using application software
Ø      Generating information in the form of reporting
Ø      Processing of queries from various quarters of the organization.
Q.16) Discuss the type of information?
Information, broadly can be divided into two different types-
v      Internal information
v      External information
Q.17) What is the different between the passive IS & interactive IS?
Passive information systems
Interactive information systems
Passive information systems are systems that will answer queries based on the data that is held within them, but the data is not altered.
An interactive system is one that data can be entered for processing which may alter the contents of the database.

Q.18) What is management system?
A management information system is software that allows the managements with in a company to access and analyze data.
Q.19) What is knowledge based systems (KBS)?
A is knowledge based system is a system where all the expert human knowledge covering a particular topics is bought together and made available to the user through a computer.


Q.20) Discuss the types of is knowledge based system?
There are three types of is knowledge based system, namely-
·         Diagnostic
·         Advice giving
·         Decision making
Q.21) What is financial reporting system?
Financial reporting involves all the procedures necessary to ensure that the financial performance of a department is clearly and effectively reported on to the relevant authorities.
Q.22) Write the function of financial reporting?
The function performed by financial reporting specialists cover the following areas:
·         Undertaking the monthly closure of accounts
·         Compiling quarterly reports
·         Undertaking the annual closure of accounts
·         Compiling overall annual reports
Q.23) What is objective of any financial accounting system?
A primary objective of any financial accounting system is to provide accurate financial statements on a timely basis
Q.24) What is “Pivot Table”?
Pivot table is one of the most powerful analytical tools that are used in spreadsheets.
Q.25) Discuss the terms “Event Triggered”?
Many accounting software products have ability to alert users to predefined financial condition. With such a feature, a CFO can create simple calculation that the accounting software continuously compares against a present values.
Q.26) Write something about the International Financial Reporting Standards (IFRS).
IFRS’s are standards, interpretations and the framework adopted by the International Accounting Standards Board (IASB).
Q.27) Discuss the structure of IFRS?
ü      IFRS’s- issued after 1st April 2001
ü      IAS’a Issued before 1st April 2001
ü      Interpretation originated from the IFRIC (International Financial Reporting Interpretation Committee)- issued after 1st April 2001
ü      Standing Interpretation Committee (SIC) Issued before 1st April 2001
ü      Framework for the preparation and presentation of financial statements.
Q.28) Write the qualitative characteristics of financial statement?
A qualitative characteristic of financial statements includes:
Ø      Relevance
Ø      Reliability
Ø      Understandability
Ø      Comparability
Q.29) What is framework?
The framework for the preparation and presentation of financial statements state basic principles for IFRS’s
Q.30) Write the element of financial statement.
The elements of financial statement include:
1.       Assets
2.       Liability
3.       Equity
Q.31) Write the elements of income statement.
The element of income statements includes:
1.       Income
2.       Expenses
Q.32) What is the component of IFRS’s financial statement?
IFRS financial statements consists of:
*      A statement of financial position
*      A statement of comprehensive income
*      A statement of change in equity
*      A statement of cash flows
*      Note, including a summary of the significant accounting policies.
Q.33) Define the term ‘Business owner, System owner, Technical owner, System administrator & application administrator?
Business owner:
The business owner is the business executive or leader who is accountable for the primary business functions performance by the Critical Financial Reporting System (SFRS).
System owner:
The system owner is the functional unit leader who is responsible for the Critical Financial Reporting System (SFRS).
Technical owner:
Technical owner is the individual who is responsible for ensuring that the technical information technology components of the CFRS are properly implemented and manage effectively.
System administrator:
System administrator is the individual who is responsible for proper operational configuration management and functioning of one or more information technology components of the CFRS are properly implemented and mange effectively.
Application administrator:
Application administrator is the individual who is responsible for proper operational configuration management and functioning of one or more CFRS applications.

Chapter-2
Information Technology Architecture

Q. 1) What is information system? Classify information system.
Information systems:
Information systems is a mechanism that helps people to collect, store, organize & use information.
Types of information system:
Major type of information systems are:
1.System from a functional perspective:
  • Sales and marketing system
  • Manufacturing and production system
  • Finance and accounting system
  • Human resources system

2. Systems from a constituency perspective:
  • Executive Support System (ESS)
  • Decision Support System (DSS)
  • Management Information System (MIS)
  • Transaction Processing System (TPS)

Q. 2) What is Computer system?
Computer system is a collection of some integrated components that woks to accomplish a specific task.
Q. 3) What is Properties of computer system?
A computer system must satisfy the following properties:
  • Each system consists of several components.
  • There must be a logical relation between the components.
  • The components of a system should be controlled in a way such that specific task can be accomplished.

Q. 4) What are the components of computer system?
Following are the components of computer system:
  • Hardware
  • Software
  • Human ware
  • Date/ Information


Q. 5) What is software? Classify the software according to working principal.
Software:
Software is the collection of computer programs procedures and documentation that performs different tasks on a computer system.
Classification of Software:


According to the working principal, software can be classified into two classes:
  • System Software.
  • Application Software.

Q. 6) Classify the system software:
System software can be broadly classified into three classes

Ø      System management software
Ø      System support software
Ø      System development software
Q 7. Write the different type of application software
Some example of application software is sited below
Ø      Word processing software
Ø      Database Software
Ø      Multimedia software
Ø      Presentation Software
Ø      Enterprise Software. Etc

Q 8. Classify the software according to the commercial perspective.
From the commercial perspective software can be classified into three major classes:
Ø      Commercial software – refers to any software that is designed for sale to serve a commercial need .
Ø      Freeware/Open source software- freeware is free to use and dose not require any payment from the user
Ø      Shareware Software- Shareware is basically “try before you buy” software

Q 9. What is shareware?
Shareware is basically “try before you buy” software.
Shareware is software that is distributed free on a trail basis with the understanding the user may need or want to pay for it alters.


Q 10. Write down the different between shareware and freeware.
Shareware is basically “try before you buy” software. Shareware may just be offering free access for a limited period of time. On the other hand freeware is free to use and dose not repair and payment form the user.
Q 11. What is firmware?
In a computing firmware is software that is embedded in a hardware device. Firmware is defined as: “The computer program in a read only memory (ROM) integrated circuit”.
Q 12. Write the some example of firmware?
Some example of firmware is sited below:
Ø      The BIOS found in IBM- compatible personal computers.
Ø      RTAS (Run-Time Abstraction Services).
Ø      ARCS, used in computers from silicon graphics.

Q. 13 Define data structure?
Data may be organized in many different ways: the logical or mathematical model of a particular organization of data is called a data structure. Such as Array and Record.

Q.14 What do you mean by Data Analysis?
Data analysis is a process in which raw data is ordered and organized so that useful information can be extracted from it.

Q.15 What is data validation? Discuss the validation methods?
Data validation is the process of ensuring that a program operates on clean, correct and useful data.
Method of data  validation:
Following are data validation methods:
Ø      Allowed character cheek
Ø      Consistency cheek
Ø      Control totals
Ø      Data types cheek
Ø      Format or picture cheek
Ø      Limit cheek
Ø      Logic cheek
Ø      Missing data test
Ø      Rang cheek





Q.16 What is DBMS? Write down the features of DBMS?
Database Management System (DBMS):
DBMS is a special data processing system or part of a data processing system which aids in the storage, manipulation, reporting, management and control of data.
Features of DBMS:
Feature of DBMS are sited below:
Ø      Query ability.
Ø      Backup and replication.
Ø      Rule enforcement.
Ø      Security.
Ø      Computation.
Ø      Change and access logging.
Ø      Automated optimization.
Q.17 What are the different between multiprogramming and multiprocessing?
Multiprogramming:
Multiprogramming is the name given to the interleaved execution of two or more different and independent programs by the same computer.
Multiprocessing:
The term multiprocessing is used to describe interconnected computer configurations or computers with two or more independent CPU’s that have the ability to simultaneously execute several programs.
Q. 18 What is security control?
Security refers to the policies, procedures & technical measures used to prevent unauthorized  access, alteration, theft or physical damage to information system.

Q. 19 How  can we provide security?
Ø      We can provide security by –
Ø      Access control
Ø      Firewalls
Ø      Intrusion detection system (IDS).
Ø      Antivirus software
Q. 20 What is malicious software?
Malicious software programs are referred to as malware & include a variety of threats, such as computer viruses, worms, and Trojan horses.
Q.21 Discuss the term Hackers & Crackers.
A Hacker is an individual who intents to gain unauthorized access to a computer system. Within the hacking community, the term cracker is typically used to denote a hacker with criminal intent.



Q. 22 What is E-Commerce? Write down the characteristics of E-commerce.
E-commerce: E-commerce which is short for electronic commerce. E-commerce is the process used to distribute, buy, sell or market goods and services and the transfer of funds on online, through electronic communications or networks:
Characteristics of E-commerce:
Ø      Business oriented
Ø      Convenient service
Ø      System extendable
Ø      Online safety
Ø      Co-ordination
Q. 23 What is the benefit of E-commerce
Benefits of e-commerce are sited below;
Ø      Increase sale
Ø      Decrease cost
Ø      Provide price quotes
Ø      Increase profit

Q: 24 write the limitation of e-commerce
Following are the limitation of e-commerce
1. Technical limitation:
Ø      Cost of technical limitation
Ø      Insufficient telecommunication bandwidth

2. Non-technical limitation:
Ø      customer expectation unmet
Ø      Lack of trust and user resistance.
Q 25. Write the short Note on:
A) Batch processing: Batch processing is a system that takes a set (a batch) or commands jobs executes them and returns the result all without human intervention.
B) Distribute processing:  A distributed system consists of multiple autonomous computers that communicate through a computer network.
C) Real time processing: In a real time processing there is a continual input, process and output of data.  Data has to be processed in a small stimulated time period (real time), otherwise it will create problem for the system
D) Time sharing: Time sharing refers to the allocation of computer resources in a time dependent fashion to several programs simultaneously.
E) Virus: Virus is malicious software which is a piece of self-replicating code attached to some other code.
F) Backdoor or Trapdoor: Backdoor is a secret entry point into a program allows those who know access  bypassing usual security procedures.
G) Zombie: Zombie is a program which secretly takes over another networked computer.
H) D Dos attack: D Dos stand for distributed denial of service in a D Dos attack, hackers flood a network server or web server with many thousands of false communication or requests for services to crash network.
I) Worms:  A program that can replicate itself and send copies from computer to computer across network connections.
J) Trojan Horse: Trojan horse is a malicious program when invoked performs some unwanted or harmful functionality.


























Chapter - 3
Management of IT

Q 1. Describe the phases of policy evaluation Process.
The phases of policy evaluation process are given below;
Ø      Enterprise organizational structure and business process analysis
Ø      System requirement analysis
Ø      Policy analysis and translation
Ø      Policy distribution and enforcement
Ø      Policy monitoring and maintenance
Ø      Reverse engineering

Q 2. What are approaches of organizational management process?
Scholars have developed three major approaches to organizational process namely
Ø      Working process
Ø      Behavioral process and
Ø      change processes

Q 3. What is information system? Explain formal informal and CBIS System.
Information system: an information system collect, process, stores, analyze and disseminates information for specific purpose.
Formal information system: formal information system includes agreed- upon procedures standard input and output and fixed definition. For example. A company, accounting system
Informal Information system: Informal information system takes many shapes, ranging form an office gossip network to a group of friend exchanging letter electronically etc.
Q4. What is the basic components of information system
The basic components of information system are:
Hardware- a set of devices such as monitor, keyboard and printer
Software- a set of programs that instruct the hardware to process data
Database- a Collection of related files, tables, relation and so on
Network- A connecting system that permits the sharing of resources by different computers
Procedure- A set of instruction about how to combine the above components in order to process information and generate the desired output.
People-those individual who work with the system



Q5. what are the fundamental roles of information system in business;
There are three vital roles that information system can perform for a business enterprise
Ø      Support of its business processes and operations
Ø      Support of decision making by its employees and managers
Ø      Support of its strategies for competitive advantage
Q6. Discuss about role and efficient use of information technology
Information technology plays major role in re engineering most business technologies can substantially increase efficiency of business process.
Efficient use of information technology:
a)       Efficient IT assist with saving money, saving energy, save on cooling, reduces long term hardware spend, reduce carbon omissions, save space, and avoid infrastructure upgrades
b)      Save 60% of PC power consumption by having screen and disk power management , sleep and or hibernate enable and shutdown at the end of the day etc.

Q7. Describe about information system infrastructure and architecture.
Infrastructure: an information infrastructure consists of the physical facilities, service and management that support all shared computing resources in an organization.
IT architecture: Information technology architecture is a high level map or plan of the information assets in a organization including the physical design of the building that holds the hardware.

Q08.  What are components of IT infrastructure?
There are major four components of the IT infrastructure namely
Ø      Computer hardware
Ø      Network and communication facilities
Ø      Data based and
Ø      Information management personnel

Q09. What is asset? What are the characteristics and classification of asset?
A resource with economic value that an individual, corporation or country owns of controls with the expectation that it will provide future benefit.
Asset Characteristics;
Ø      The probable preset benefit involves a capacity, singly or combination with the other asset
Ø      The entity can control access to the benefit
Ø      The transaction or event giving rise to the entity’s right to or control of the benefit has already occurred.





Q10. What is ITAM? What are considerations that should be addressed to optimize an ITAM program?
ITAM (Information technology asset management) is a process to control the day to day to operation and utilization of IT asset, ensuring that an organization realizes maximum efficiency from these asset.
To optimize an ITAM program following consideration should be addressed:
Ø      Link IT to business objective
Ø      Incorporate life-cycle process and governance
Ø      Avoid common mistakes

Q11. How does ITAM work? What are the benefits of ITAM?
ITAM can help and organization in following ways;
Ø      Control IT purchases and development
Ø      Eliminate unnecessary purchase
Ø      Avoid noncompliance and its associate legal risk
Ø      Compare its actual with contract terms and purchase history
ITAM benefits:
Ø      reduce IT Cost
Ø      Ensure software compliance
Ø      Detect unauthorized and illegal software
Ø      Improve productivity
Ø      Align IT with business goal to support business decision
Q 12. How can you evaluate an IT management solution?
When considering an ITAM solution looks for following:
Ø      Efficient and accurate discovery of all IT assets
Ø      A structured approach to software discovery across the company with application, suite and version, recognition for both workstation and server

Q13. What is software? Wjat are  the types of software?
Software involves he collection of computer programs and related data that provide the instructions telling a computer what to do.
Types of software;
Ø      System software – helps run the computer hardware and computer system
Ø      Programming software- usually provide tools to assist a programmer in writing computer program
Ø      Application software- allows end user to accomplish one or more specific task.

Q14. What factor should consider for implementation regarding global ERP?
There are five tips or factor to address the organizational complexities of a global ERP implementation
Ø      Business process standardization
Ø      Understanding of local needs
Ø      Rely on your change agents
Ø      Leverage performance measures
Ø      Localized delivery of employee communication and training
Q. 15 What are the barriers for implementing global ERS?
The barriers of implementing global ERS are:
  • Culture differences
  • Inter office polities
  • Language barriers and
  • Organization complexities
Q. 16 Define code line, code line policy, environment and branching?
Code line: Source line required to produce software. It could be a specific product  or even a basic set of code that many of your interest application commonly use.
Code line Policy: A set of instruction, direction and standard for creation and application of code line. One code line require more stringent testing.
Environment : The environment is test (development), quality Assurance (QA) test or production. The test or development environment is used for developers to test their code.
Branching : The creation of a new code line based upon a current code line. Branching should only be done when absolutely necessary.
Q. 17 What are requirements to effective software control for changes?
There are several requirements to provide effectives software changes control:
  • A software version Control (SVC) system or Source Code Management (SVM)
  • Ability to return to earlier states.
  • Files should be locked to prevent overwriting of work
  • All developers should have home folder where they can place their own experimental code outside the main project.
  • Each software change request should be assigned a unique tracking number.
  • Stakeholder must be aware of production changes etc.














Chapter  4
Communication and IT
Q. What is data communication?
Data communication is the function of transporting from one point to another.
Q. What is elements/ components of communication systim.
There are three elements/ components of communication system are sited below. A sender (source ) which create the message to the transmitted.
A media which carries the massage.
A receiver ( destination) which receives the massage.
 Q.Classify data transmission mode.
 Or What is the different data transmission mode.
  There are three ways of  mode , for transmitting data one point to another. They are
  1.Simplex.
  2 Half duplex
  3.Full duplex
Q. Define the terms ‘Simplex’ Half duplex’. Full duplex’.
Simplex: Simplex transmission is one where communication can take place in only one direction.
Half duplex’ : A half duplex system can transmit data in both directions but only one direction at a time.
Full duplex: Full duplex system is used that allows information to flow simultaneously in both directions on the transmission path.
Q. How information is delivered over a network.
Information is delivered over a network by three basis methods.
Unicast .
Broadcast.
Multicast.
 Q Define Unicast  Broadcast .and Multicast.
 Unicast: Unicast is the type of transmission in which information is sent only one sender to one receiver.
Broadcast: Broadcast is a type of  transmission in which information is sent from just one computer but is received by all the computers  connected to the network.
Multicast: Multicast is the type of transmission system where there is only one sender and information sent multiple destinations.
Q. What is computer network ?
Ans: A group to computers and other devices connected together is called computer network.
Q. Write the classification of network under geographical area.
 Ans: According to geographical area there are three type of computer network-
 Local Area Network (LAN)
 Metropolitan Area Network (MAN)
 Wide Area Network (WAN)
 Q. Define the terms LAN, MAN, WAN.
LAN: LAN stands for Local Area Network. It provides high speed communication      in a limited area, typically with in a building, like college.
MAN: MAN stands for Metropolitan Area Network. Is covers a large city or metropolitan area. A MAN typically covers an area between 5 to 50 KM areas.
WAN: WAN stands for wide are network. It is type of communication network that covers a wide geographical area such as state or country.
Q. How computer network can be classified under structure?
According to the structure, computer network can be classified in to following three ways.
  1. Centralized network
  2. Distributed network.
  3. Hybrid network.  
 Q What are  the benefit of computer network?
Ans: Computer network provides us many benefits , namely
  1. Simultaneous access to programs and data.
  2. Sharing hardware and software .
  3. Personal communication using e-mail.
  4. Making back up of information.
  5. Keep information reliable up to data.
Q. Write down the various devices used in the network.
Router: A router is a device that forwards data packets along networks. A router is connected to at least two networks commonly LANs or WANs and IPS Network.
Switch: A switch is a hardware device that joins multiple computers together within one local area network.
Repeater: A  repeater is a device that receives a digital signal on an electromagnetic or local area network
Bridge:  A device that connects two LAN  or two  segments of the same LAN.
Hub: A hub is a device where all the entire connecting mediums come together.
Q. How many types of hub are there in?
Ans: There are three types of hub, namely
  1. Passive hub
  2. Active hub
  3. Intelligent hub.


Q .Write the difference between the Passive hub ,Active hub, Intelligent hub.
Difference between the Passive hub , Active hub, Intelligent hub are sited below.
 1. Passive hub do not amplify the electrical signal.
2. On the other hand, active hub can perform the amplification of  cicatricle.
3. Intelligent hubs add extra feature to an active hub  that  are  particular  importance to                 business.
Q .Define Network  topology.
Ans: A network topology is a method to connect various devices such a computer printer, over a network.
Q. Write down the main type of topology.
Ans: There are six different common topology, these are sited below-
1. Liner bus topology
2. Ring topology
3. Star topology
4. Tree topology
5. Hierarchical topology
6. Mesh topology
Q. Define various topologies with two advantage and disadvantage.
. Liner bus topology:  Liner bus topology consists of a main run of cable with a terminator at each end. All nodes are connected to all liner bus.
Advantage:
 1. Easy to setup
 2. Required less cable than another topology.
Disadvantage:
1. Entire network shuts down if there is a break in the main cable.
2. Different to identify the problem if the entire network shuts down.
Ring topology:
Ring topology is a topology where all devices are connected in a circle which has on terminator.
Advantage:
  • More reliable than star topology
  • No data collision
Disadvantage:
  • Hardly used now a days
  • Slow and need more cable
Star topology
Star topology is a topology where all devices are connected to a central hub.
Advantage:
  • Easy to setup/install.
  • One cable can’t crash network.
Disadvantage:
  • Need more cable.
  • if host computer fails, the entire network fails.
Tree topology
It consist of groups star configured workstations connected to a liner bus backbone cable.
Advantage:
  • Point to point wiring for individual segments.
  • Supporting by several hardware and software venders.
Disadvantage:
  • Overall length of each segment is limited by the type of cabling used.
  • If the backbone line breaks the entire segment goes down.
Hierarchical topology:
The hierarchical topology is much like the star topology, except that it doesn’t use a central node.
Mesh topology:
In a mesh topology cash device is connected to other device in the network by its own cable.
Advantage:
  • Data will always be delivered.
  • Much speedy
Disadvantage:
  • Very expensive
  • Very difficult to setup for small enterprise.

Q. Which matter to be considered for choosing topology?
The following  matter to be considered before selecting a topology:
  • Reliability of the entire system
  • Expendability of the system
  • Cost involved
  • Availability to communication line
Q. What is network software?
Network software is data communication software that is responsible for holding all data communication systems together.


Q. What are the functions of network software?
There are several functions of communication software, namely-
  • Access control
  • Transmission control
  • Network management
  • Error control
  • Security management

Q. What is communication protocol?
In a data communication, a protocol is set of rules & procedures established to control transmission between two points so that the receiver a properly interpret the bit stream transmitted by the sender.

Q. Make a checklist for selecting accounting software.
Checklist of questions and key features are:
  • Ability to drill down from summary general ledger data to individual transactions?
  • Ability to import & export data to and from spreadsheet and word processing programs?
  • Ability to generate custom report?
  • Fast posting of large batches of transactions?
  • Strong security?
  • Adequate technical support?
  • Retention of historical data and ability to compare current result to past result?
  • Ability to allocate indirect cost to individual project?
  • Ability to flow data forms the program into your tax software?

Write some example of different category of accounting sofware/ small business/ personal accounting software:
a)ePeachtree (Best software)
b)MYOB plus for windows (MYOB software)
c)Quickbooks online (Intuit)
d)Peachtree complete accounting (Beast software)
e)Small business Manager  (Microsoft)


Low end accounting software:
A)Business Vision 32 (Best software)
B)MAS 90 & MAS 200 (Best software)
C)Quick books pro 2003  (Intuit)
D)CCPAC pro series(ACCPAC international
E)Vision point 2000 (Best software)




Middle Market Software
a) ACCPAC Advantage serious Corporate Edition ( Best Software)
b) Great Plains (Microsoft) MAS90 & MAS 200 (Best Software)
c) Navision (Microsoft)
d) South Ware Excellence Serious (South Ware)
e) SYSPRO (Suspro USA)e)

High End Accounting  Software
a) Axapta ( Microsoft)
b) E-Business Suite (Oracle)
c) MAS 500 (Best Software)
d) Solomon (Microsoft)
e) ACCPAC Advantage Series Enterprise Edition (Best Software)


















Chapter -5
Internal control in computer based business system

Q. 1. What is internal control?
Internal control is the processes. It is developed by two auditors to administer unit effectively. They generally include rules and procedures.

Q. 2. What are the objectives of internal control regarding assurance?
The internal control objectives are:
Effectiveness and efficiency of operation.
Reliability with applicable laws & regulations.
Compliance with applicable laws & regulations.
Q.3. what are the processes of internal control?
The processes of internal control are:
a. Provide adherence to laws, regulations and controls
b. Develop and maintain reliable financial and management data.
c. Present data accounting in timely reports.
Q.4. How to evaluate internal control?
To evaluate internal control they need to establish a framework. This framework has five key phases required for Sarbanes – Oxley compliance. These are:
1. Define internal control.
2. Organize project team & plan.
3. Evaluate controls at the entity level.
4. Evaluate control at the processes, transaction and application level.
5. Evaluate, improve & monitor.
Q.5. What are the components of  internal control?
There are five components that are called standard of internal control.
1. Control environment.
2. Risk assessment.
3. Control
4. Information and communication.
5. Review and monitor.
Q.6. How IT control activities can be categorized?
IT control activities can be categorized as either general or application controls. General controls apply to all computerized information systems-mainframe, minicomputer, network and end user environments. Application controls apply it the processing of data within the application software.
Q.7. what are the components of control activity?
The components of control activity are:
·         Personnel.
·         Authorization procedures.
·         Segregation of duties.
·         Physical restrictions.
·         Documentation and record retention.
·         Monitoring operations.

Q.8. what are the limitations of infernal control?
The limitations of internal control are.
Ø      Resource constraint.
Ø      Inadequate skill, knowledge of ability
Ø      Faulty judgment.
Ø      Unintentional errors.
Ø      Degree of motivation by management and employees.

Q.9. what are the elements of internal control system?
The elements of internal control are:
Ø      Separation of duties.
Ø      Authorization.
Ø      Documentation.
Ø      Reconciliation.
Q.10. why organization needs for internal control?
An organization needs internal control to provide greater assurance that they will achieve, operating, financial reporting and compliance objectives.
Q.11. what is IT control?
IT controls are specific activities performed by persons of system designed to ensure that business objectives are met.
Q.12. Define the category of IT control.
IT General control: ITGC represent the foundation of the IT control structure. They help ensure the reliability of data generated by IT systems and support the assertion that systems operate as intended and that output is reliable.
IT Application control: IT application or program control are fully-automated (i.e. performed automatically by the system) designed to ensure the complete and accurate processing of data, from input though output.
Q.13. what is COBIT?
Control Objective for Information Technology (COBIT) is a widely-utilized framework containing best practices for both ITGC and application controls. IT consist of domains and processes. The four major domains are: plan and organize, acquire and implement, deliver and support, and monitor and evaluate. It also recommends best practices and methods of evaluation of an enterprise’s IT controls.
Q.14. what is COSO?
The Committee of Sponsoring Organizations of the Tread way Commission (COSO) identifies five components of internal control: control environment, risk assessment, control activities, information and communication and monitoring that need to be in place to achieve financial reporting and disclosure objective.
Q.15. what are the effects of IT on internal audit?
The effects of IT on internal control are:
*      Changes in the audit trail and audit evidence.
*      Changes in the internal controls environment
*      New opportunities and mechanism for fraud and error and
*      New audit procedures.
Q.16. what are the main types of IT audit?
The main types of IT audit are:
a) Operational computer system audits
b) IT installation audits
c) Developing system audits
d) IT management audits
e) IT process audits
f) Change management audits
g) Information security and control audit
h) IT legal compliance audits
i) Certification &other compliance audits
j) IT strategy audits
k) Special investigations
l) Disaster contingency, Business continuity planning and IT disaster recovery audits.

Q.17. what is Computer Aided Audit Techniques (CAATs)?
CAATs are tools/utilities to help auditors select, gather, analyze and report audit findings. Starting with the basics, many computer applications have useful built-in data analysis/audit facilities.
Q.18. what are the responsibility of management for developing and assessing effectiveness of internal control?
Management is responsible for establishing and maintaining control to achieve the objective of effective and efficient operations and reliable information systems. The information system managers must take systematic and proactive measures to
v      Develop and implement appropriate, cost-effective internal control for results-oriented management.
v      Assess the adequacy of internal control in programs and operations.
v      Identify needed improvements.
v      Take corresponding corrective action and
v      Report annually on internal control through management assurance statements.


Q.19. Explain the COBIT framework.
COBIT is a framework of generally applicable information systems security and control practices for IT control. The framework allows:
Ø      Management to benchmark the security and control practices of IT environments.
Ø      Users of IT services to be assured that adequate security and control exist, and
Ø      Auditors to substantiate their opinions on internal control and to advice on IT security and control maters.
Q20. What does complete COBIT package exists?
The complete COBIT package consists of:
a) Executive summary.
b) Governance and control framework.
c) Control objectives.
d) Management guidelines.
e) Implementation guide.
f) IT assurance guide.

Q. 21 What are the COBIT structures?
COBIT covers four domains:
Ø      Plan & Organize
Ø      Acquire & implement
Ø      Deliver & support
Ø      Monitor & evaluate
Q. 22 What are component of information system (IS) internal control?
Information system (IS) internal controls are most familiar with:
Ø      Accounting controls
Ø      Operational controls
Ø      Administrative controls
Q.23 What are the auditors categories of controls?
Auditors categorize the controls into following four groups:
Ø      Preventive controls
Ø      Detective controls
Ø      Corrective controls
Ø      Compensatory controls

Q. 24 What is audit trail?
Audit trails are logs that can be designed to record activity at the system, Application & user level. When properly implemented, audit trails provide & important detective control to help accomplish security policy objectives.
Q. 25 What are the objectives of audit trails?
Audit trails can be used to support security objectives in three ways:
Ø      Detecting unauthorized access to the system
Ø      Facilitating the reconstruction of event
Ø      Promoting personal accountability

Q. 26 What is the process of error correction?
            The process of error correction is
Identify all data processing errors that can be identified.
Ø      Determine the impact data.
Ø      Determine how errors are corrected.
Ø      Determine the timeliness of error correction.
Ø      Determine if the corrected transactions are authorized.
Q. 27 what are key elements of system development and acquisition controls?
System development and acquisition control include the following key element:
Ø      Strategic master plan.
Ø      Project controls.
Ø      Data processing schedule.
Ø      System performance measurements.
Ø      Post-implementation review.

Q.28 What is system acceptance testing? What its aims?
Acceptance testing is a complete end-to-end test of the operational system including all manual procedures. It aims to provide the system user with confirmation that:
Ø      The user requirement specification
Ø      End user and operational documentations is accurate, comprehensive and usable.
Ø      Supporting clerical procedures work effectively
Ø      Help desk and other ancillary support functions operate correctly and as expected.
Ø      Back up and recovery procedures work effectively.


Q. 29 What considerations should be considered when judging the effectiveness of PIR?
The following issues should be considered when judging the effectiveness either of post-implementation review or to from the basis for the auditor to undertake one.
Ø      Interview business users
Ø      Interview security, operations and maintenance staff.
Ø      User requirement specification determine
Ø      Confirm that the previous system has been de-commissioned.
Ø      Review system problem reports and changes proposals.
Ø      Confirm that adequate internal control have been built into the system.
Ø      Confirm that an adequate service level agreement has been drawn up and implemented.
Ø      Confirm that the system is being backed up in accordance with user requirements.
Ø      Review the business case and determinations.
                                                                                               
Q. 30 What are the controls over system and program changes?
The controls over system and program changes are following kinds:
Ø      Change management controls.
Ø      Authorization controls.
Ø      Documentation controls.
Ø      Testing and quality controls.
Q. 31 What may used for control activities for IT?
We may use for control activities for IT are following:
Ø      Encryption tools , protocols or similar features of software application
Ø      Virus protection software
Ø      Password that restrict user access to network, data & applications
Q. 32 Why segregation of duties is needed?
The segregation of duties is needed for following reasons:
Ø      To protect employees
Ø      To prevent & detect intentional & unintentional errors &
Ø      To encourage better job performance
Q. 33 What are the controls of ITGC?
Information technology general controls (ITGC) are:
Ø      Control activities
Ø      Change management procedure
Ø      Security polices, standard & processes
Ø      Hardware / Software configurations
Ø      Technical support policies & procedures.
Ø      Disaster/ Back-up recovery procedures.

Q. 34 What are the controls of IT Application?
Information Technology application controls are:
Ø      Completeness checks
Ø      Validity checks
Ø      Identification
Ø      Authentication
Ø      Authorization
Ø      Input Controls
Q.35 what are the characteristics of the corrective controls?
The characteristics of corrective controls are “
Ø      Minimize the impact of the threat
Ø      Identify the cause of problem
Ø      Correct error arising from a problem.
Q. 36 why documentation is needed?
Documentation is needed for following reasons:
Ø      It provides a record for each event or activity.
Ø      It ensures assets are properly controlled.
Ø      Documents provide evidence of event rally happened.
Ø      It ensures the accounting & completeness transactions.




Q. 37 what are the authorized documents for non-payment transactions?
The following documents are authorized non-payment transactions
Ø      Journal voucher
Ø      Spread sheet
Ø      Original entry requiring corrections
Ø      Request for comments (RFCs).
Q .38 what are authorized documents for leave and payroll?
The following documents for leave and payroll:
Ø      Timesheets
Ø      Leave requests.
Ø      Overtime authorization.
Ø      Personal action form (PAF).
Ø      Attendance calendar.
Q .39. How post implementation review will complete?
The post implementation review will be completed by checking following manner:
Ø      Business objective
Ø      User expectations
Ø      Technical requirements
Ø      Timing
Ø      The PIR team
Q .40 what are the controls over system and program changes?
The controls over system and program changes are:
Ø      Change management control
Ø      Authorization control
Ø      Documentation control
Ø      Testing and quality control (Quality control, Quality review)

Q .41 Explain the classification of information?
The classification of information is essential if one has to differentiate between that which is of little value and that which is highly sensitive and confidential. The classification of data and information are following:
Ø      Top secret- Security at this level is the highest possible.
Ø      Highly confidential- Security at this level is very high.
Ø      Proprietary- Security at this level is controlled but normal.
Ø      Public documents- Security at this level is minimal.
Q .42 what is data integrity control?
The primary objective of data integrity control techniques is to prevent, detect and correct errors in transactions as they flow through the various stages of a specific data processing program.
Q.43 Describe different data integrity controls.
There are six categories of data integrity controls which are summarized on following:
Control category
Threat/Risk
Controls
Source data control
Invalid, incomplete or inaccurate source data input
Form design and pre numbered, appropriate authorization, segregation of duties, visual scanning, check-digit verification etc.
Input validation routines
Invalid or inaccurate data in computer processed transaction files.
Check key data, sequence, field, sign, validity, limit, range, reasonableness, redundant data and capacity check etc.
On-line data entry controls
Invalid or inaccurate transaction input entered through on-line terminals.
Field, limit, range, reasonableness, sign, validity and redundant data checks; user IDs and password, capability test, automatic system data entry, pre formatting, completeness test etc.
Data processing and storage controls
Inaccurate or incomplete data in computer processed master files.
Policy and procedures, monitoring and expediting data entry, reconciliation database and account or reports, check data currency, default values, data marching, data security, use labels and write protection mechanism etc.
Output controls
Inaccurate or incomplete computer output.
Procedures to ensure that system outputs conform to the organization’s integrity objectives, polices, and standards, visual review of computer output, reconciliation of batch totals etc.
Data transmission on controls
Unauthorized access to data being transmitted or to the system itself; system failures; errors in data transmission
Monitor network to detect weak points, backup computers, design network to handle peak processing, multiple communication paths between network computers, preventive maintenance, data encryption, routing verification etc. 


Q.44 How assesses the data integrity controls?
Assessing data integrity control involves evaluating the following critical procedures:
Ø      Virus detection and elimination software is installed and activated.
Ø      Data integrity and validation controls are used to provide assurance that the information has not bee altered and the system functions as intended.
Q.45. what is risk? Write the causes of risk?
A risk is the likelihood that an organization would face a vulnerability being exploited or a threat becoming harmful. These risk lead to a gap between the need to protect systems and the degree of protection applied. The gap is caused by:
Ø      Widespread use of technology
Ø      Interconnectivity of systems
Ø      Elimination of distance, time and space as constraints
Ø      Unevenness of technological changes
Ø      Devolution of management and control
Ø      Attractiveness of conducting unconventional electronic attacks against organizations
Ø      External factors such as legislative, legal and regulatory requirement or technological developments.



Q.46. what is threat and vulnerability?
Threat: A threat is and action, event or condition where there is a compromise in the system, its quality and ability to inflict harm to the organization.
Vulnerability: Vulnerability is the weakness in the system safeguards that exposes the system to threats. It may be weakness in an information system, security system or other components that could be exploited by a threat.
Q.47. what kind of threat to the computerized environment may arise?
A few common treats to the computerized environment may be arises:
a) Power loss
b) Communication failure
c) Disgruntled employees
d)Errors
e) Malicious code
f) Abuse of access privileges by employee
g) Natural disasters
h) Theft or destruction of computing resources
i) Downtime due to technology failure
Fire, etc.

Q.48. what kind of threat may arise due to cyber crimes?
Following threat may be arise due to cyber crimes:
a) Embezzlement
b) Fraud
c) Theft of proprietary information
d) Denial of service
e) Vandalism or sabotage
f) Computer virus
g) Other


Q.49. what is risk assessment? Why it is necessary?
Risk is a critical step in disaster and business continuity planning. Risk assessment in necessary for developing a well tested contingency plan. Risk assessment is the analysis of threats to resources and the determination of the amount of protection necessary to adequately safeguard the resources.
Q.50. what are the areas to focus for risk assessment purpose?
The areas to be focused upon are:
Ø      Prioritization.
Ø      Identifying critical applications.
Ø      Assessing their impact on the organization.
Ø      Determination recovery time-frame.
Ø      Assess insurance coverage.
Q.51. Explain the risk management process.
The board process of risk management will be as follows:
1. Identify the technology related risks under the range of operational risks.
2. Assess the identified risks in terms of probability and exposure.
3. Classify the risks as systematic and unsystematic
4. Identify various managerial actions that can reduce exposure to systematic risks and the cost of implementing the same.
5. Look out for technological solutions available to mitigate unsystematic risks.
6. Identify the contribution of the technology in reducing the overall risk exposure.
7. Evaluate the technology risk premium on the available solutions and compare the same with the possible value of loss form the exposure.
8. Match the analysis with the management policy on risk appetite and decide on induction of the same.
Q.52. Explain the risk management cycle.
It is a process involving the following steps:
  • Identifying assets.
  • Vulnerabilities and threats.
  • Assessing the risks.
  • Developing a risk management plan.
  • Implementing risk management actions.
  • Re-evaluating the risks.
Q.53. what are primary functions of risk assessment?
  • Risk identification.
  • Risk assessment.
  • Risk mitigation.
Q.54. what is business continuity and disaster recovery planning?
Business continuity focuses on maintaining the operations of an organization, especially the IT infrastructure in face of a threat that has materialized.
Disaster recovery, on the other hand, arises mostly when business continuity plan fails to maintain operations and there is a service disruption. This plan focuses on restarting the operation using a prioritized list.
Q.55. what are the areas that business covers?
Business continuity covers the following areas:
  • Business resumption planning.
  • Disaster recovery planning.
  • Crisis management.
Q.56 Explain business continuity life cycle.
The business continuity life cycle is broken down onto four broad and sequential sections:
  • Risk assessment.
  • Determination of recovery alternatives.
  • Recovery plan implementation.
  • Recovery plan validation.





 Q.57. what are the objectives and goals of business continuity planning?
The key objective of the plan should be to:
Ø      Provide for the safety and well-being of people on the premises at the fime of disaster.
Ø      Continue critical business operations.
Ø      Minimize the duration of a serious disruption to operations and resources.
Ø      Minimize immediate damage and losses.
Ø      Establish management succession and emergency powers.
Ø      Facilitate effective co-ordination of recovery tasks.
Ø      Reduce the complexity of the recovery effort.
Ø      Identify critical lines of business and supporting functions.

Q.58. what are the phases for developing a business continuity plan?
The methodology for developing a business plan can be sub divided into eight different phases which are given bellow:
Ø      Pre-planning activities (Business continuity plan initiation)
Ø      Vulnerability assessment and general definition of requirements.
Ø      Business impact analysis.
Ø      Detailed definition of requirements.
Ø      Plan development.
Ø      Testing program.
Ø      Maintenance program.
Ø      Initial plan testing and plan implementation.
Q.59. what are different types of business plan?
There are various kinds of plan that need to be designed. They include the following:
Ø      Emergency plan.
Ø      Back-up plan.
Ø      Recovery plan.
Ø      Disaster recovery plan.
Ø      Insurance. 

Q.60. what are the IS audit standards?
Information system audit standards provide audit professionals a clear idea of the minimum level of acceptable performance essential to discharge their responsibilities effectively. Some standards are as follows:

Year
Standards
1994
COSO, coco
1996
HIPAA
1998
BS7799
2000
COBIT


Q.61 What are  the audit objectives of a computer information system environment?
Audit objectives in a computer system environment and elaborates on the following:
Ø      The auditor’s responsibility in gaining sufficient understanding and assurance on the adequacy of accounting internal controls.
Ø      The potential impact of auditing in a CIS on the assessment of control and audit risks.
Ø      The extent to which the CIS is used for recording, compiling and analyzing accounting information.
Ø      The system of internal controls relating it the authorized, complete, accurate and caked processing and reporting procedures.
Ø      The impact of CIS accounting system on the audit trail.  


Q.62 what is information security? Why information system security is important?
Security relates to the protection of valuable assets against loss, discloser or damage. Security is most important for information system. Adequate information security helps to ensure the smooth functioning of information systems and product the organization from loss or embarrassment caused by security failures.
Q.63 what are the objectives of information security?
Information security objective are following-
1. Confidentiality
2. Intergrity
3. Acailability
Q.64 what is information sensitive?
Following information is sensitive –
Ø      Information in relation with strategic plans.
Ø      Information in relation with business operation.
Ø      Information in relation with Finance.
Q.65 what subject should be considered to establish better information protection?
To establish better information protection considered followings:
Ø      Not all data has the same value.
Ø      Know where the critical data resides.
Ø      Develop an access control methodology
Ø      Protect information stored on media.
Ø      Review hardcopy output.
Q.66 what is ERP?
An Enterprise Resource Planning system is a fully integrated business management system covering functional areas of an enterprise like Logistics, Production, Finance,
Accounting and Human resource.
Q.67 what are the benefits of ERP?
ERP solution provide following benefits:
Ø      Integrated financial systems.
Ø      Standardized processes.
Ø      Real time information.
Q.68. what factor should consider implementing ERP system?
Ans: Where integration and implementation issues often pop up in these projects includes:
  • Corporate culture.
  • Process change.
  • Enterprise communication.
  • Management support.
  • Project methodology.
  • An ERP team.
  • Training.

Q.69. What is SAP?
Ans: SAP stands for “Systems and Application Products”. The SAP system is a collection of software performs standard business functions for corporations. The system has become very popular because it provides a complete solution to standard business.
Q. 70. What is SAP R/3 system? How many layer of the SAP R/3 system architecture?
Ans: The SAP R/3 code is written on an interpretive language called ABAP. ABAP is a German acronym that loosely translated means “Advance Business Application Programming”. ABAP is very similar to COBOL in its syntax.
The SAP R/3 system architecture has three layers:
  • Presentation layer.
  • Application layer.
  • Database layer.