Sunteți pe pagina 1din 61

MAS.O1320.Computer Information Systems.

RN

COMPUTER INFORMATION SYSTEMS FRANKLIN T. AGAMATA

1.0 Processing

1.1. Data and programs representations in the computer


1.1.1 Computers use the two-state, O/I binary system to represent data in the form
of machine language. Capacity of a computer is expressed in bits, kilobytes,
megabytes, gigabytes, and terabytes. Two common binary schemes are ASCII-
8 and EBCDIC. Parity-bit schemes are used to check the accuracy.
1.1.2 A binary system has only two digits, 0 and 1: where 0 means absence of (or low)
electricity and 1 is presence of (high) electricity.
1.1.3 Binary coding schemes
 EBCDIC (Extended Binary Coded Decimal Interchange Code) is commonly
used in mainframes.
 ASCII-8, or extended ASCII (American Standard Code for Information
Interchange), is the most widely used binary code with microcomputers,
uses an 8-bit system, and provides 256 combinations with which to form
letters, numbers, and other symbols and letters.
 Unicode, a subset of ASCII, uses bytes (16 bits) for each character, instead
of 1 byte, and can handle 65,536 character combinations rather just 256.
 Examples of Binary Coding Systems are:
CHARACTER ASCII-8 EBCDIC
A 0100 0001 1100 0001
B 0100 0010 1100 0010
C 0011 0000 1111 0000
etc.
1.1.4 The Parity Bit: Checking Errors
 A parity bit, also called a check bit, is an extra bit attached to the end of
the byte for purposes of checking for accuracy.
 For example, the ASCII letter H (01001000) consists of two 1s. Thus the
ninth bit, would be 0 in order to make the byte come out even. With the
letter O (01001111), which has five 1s, the ninth bit would be 1 to make
the byte come out even.
1.1.5 Machine Language: Your brand of computer’s very own language
 Machine language is a binary programming language that the computer
can run directly.
 Examples are Intel processors, used in most IBM-type PCs; Motorola
processors, used in Macintoshes and other Apple computers; S/370, used
in IBM mainframes, Unisys, used in Unisys mainframes.
1.1.6 How computer capacity is expressed: Bit by Bit
39
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 Bit – 0 or 1
 Byte – a group of 8 bits; it represents a character, digit or other values
 Kilobyte (KB) – is about 1,000 bytes (more precisely, 1024 bytes)
 Megabyte (MB) – is about 1 million bytes (more precisely, 1024 kb)
 Gigabyte (GB) – is about 1 billion bytes (more precisely, 1024 mb)
 Terabytes (TB) – is about 1 trillion bytes (actually, 1,009,511,.627,776
bytes)
1.2. The PROCESSOR, main memory, and registers
1.2.1 The processor, often called the central processing unit (CPU) – the “brain” of
the computer – consists of the control unit and the arithmetic/logic unit (ALU).
The processor works with the main memory (RAM) and registers to turn data
into information.
1.2.2 The Processor: In charge
 Control unit tells the rest of the computer system how to carry out a
program’s instructions. It directs the movement of electronic signals
between main memory and the ALU, and between main memory and the
input and output devices.
 ALU performs arithmetic operations and logical operations and controls
the speed of the operations.
 A chip, or microchip, is a tiny piece of silicon that contains thousands of
micro-miniature electronic circuit components, mainly transistors. A
transistor is an electronic “gate”, or switch, that opens and closes to
transmit or stop electrical current. It can alternate between “on” and “off”
million of times per second.
1.2.3 The chip is mounted on a carrier with metal leads, or pens, on the system
board.
 Examples of main processors are:
 CISC (Complex Instruction Set Computer) - found in conventional IBM-
type microcomputer
 RISC (Reduced Instruction Set Computer) - used by Macintosh and
many workstations.
 MPP (Massive Parallel Processing) - executes more than one
instructions at a time (parallel), used by supercomputers.
 RAM (Random Access Memory), a main memory, is a working storage. Its
contents are temporary and it varies for different computers.
 Main memory is contained on chips called RAM chips that use CMOS
(Complementary Metal-Oxide Semiconductor) technology.
 Memory chips are grouped on single-in-line memory modules (SIMMS) –
small circuit boards inserted into slots inside the computer and connected
to the processor by a bus.
40
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 Registers are high-speed circuitry areas that temporarily store data during
processing and provide working areas for computation. Examples are
instruction register, address register, and program register.
 The machine cycle comprises a series of operations performed to execute
a single program instruction. The machine cycle consists of two parts: and
instruction cycle, which fetches and decodes, and an execution cycle,
which executes and stores.

1.3. The MICROCOMPUTER: What’s inside?


1.3.1 The microcomputer system unit contains the following electrical components:
the power supply, the motherboard, the microprocessor, specialized processor
chips, RAM chips, ROM chips, other forms of memory (cache, VRAM, flash),
expansion slots and boards, ports, bus lines, and PC slots and cards.
1.3.2 The power supply is the device that converts power from AC to DC to run the
computer.
1.3.3 The motherboard, also called the system board, is the main circuit board in the
system unit.
1.3.4 The microprocessor – either Intel chip or Motorola chip
1.3.5 RAM (Random-Access Memory) chips – it writes, stores, and erases.
1.3.6 ROM (Read-Only Memory) chips – also known as firmware, cannot be written
or erased by the computer user. Firmware is a term used for software
permanently stored on a chip. Some ROM instructions are: ROM bootstrap,
ROM BIOS (basic input/output system). Fundamentally, ROM BIOS is an
interface, a connector, and a translator between the computer hardware and
the software programs that you run. Three variations of ROM are: PROM
(Programmable ROM), EPROM (Erasable Programmable ROM), and EEPROM
(Electronically Erasable Programmable ROM).
1.3.7 Other forms of memory are: Cache memory, Video RAM (VRAM), Flash RAM
Cards.
1.3.8 Port – socket on the outside of the system until that is connected by a bus to
an expansion board on the inside of the system unit or connected directly to
integrated circuitry on the motherboard. Ports are of several types, such
as:
 Parallel port – efficiently transmit 8 bits simultaneously only up to 15 feet.
 Serial Port – or RS 232 port, sends bits one after the other on a single line,
and is used principally for communication lines, modems, scanners and
mice.
 Video adapter port – used to connect the video display monitor outside
the computer to the video adapter card inside the system unit.

41
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 SCSI (Small Computer System Interface) port – provides an interface for


transferring data at high speed for up to 15 SCSI compatible devices, linked
together in what is called as daisy chain, along an extended cable.
 Game ports
 Infrared port – uses a certain frequency of radio waves to transmit data.
1.3.9 Expansion slots and boards
1.3.10 Buses – A bus line, or bus, is a hardware pathway through which bits are
transmitted within the processor and between the processor and other devices
in the system unit.
1.4. Coming Attractions!
1.4.1 Gallium arsenide
1.4.2 Superconductors
1.4.3 Opto-electronic processing
1.4.4 Nanotechnology
1.4.5 Biotechnology
1.4.6 Cloud computing !

2.0 The input/output system


2.1. The input hardware
2.1.1. Keyboard
2.1.2. Pointing devices – mice, trackballs, joysticks, touchpads, light pen, digitizing
tablets, and pen-based systems.
2.1.3. Source-data entry
 Scanning devices – bar code readers, mark-and character recognition
devices such as MICR (Magnetic-ink character recognition), OCR (Optical
Character Recognition), and OMR (Optical Mark Recognition), fax
machines, and imaging systems
 Voice-recognition devices
 Audio Input devices – audio board, MIDI (Musical Instrument Digital
Interference) board
 Video Input devices – frame-grabber video card, full-motion video card
 Electronic cameras
 Sensors
 Human-biology Input devices – biometric systems, line-of-sight systems,
cyber gloves and body suits, brain-wave devices.
2.1.4. Input Controls – include a combination of manual and computer-based control
procedures designed to ensure that all input data has been accurately put into
computer-usable form. System designers include input controls in the system.
For example, computer software (a data entry program) can include
instructions to identify incorrect, invalid, of improper input data. Also a
42
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

computer can be programmed to run “reasonableness check” to determine if


input data exceeds specified limits or is out of sequence.
2.2. The output hardware
2.2.1. Printers, plotters, and malfunction devices
2.2.2. Display screens – monitors (e.g., cathode ray tubes, flat-panel displays
2.2.3. Audio output devices
2.3. The I/O devices
2.3.1. Terminals – point-of-sale (POS) terminals, automated teller machine (ATM)
2.3.2. Smart cards and optical cards
2.3.3. Touch screens
2.4. Types of Files
2.4.1. Program files
2.4.2. Data files
2.4.3. ASCII files
2.4.4. Image files
2.4.5. Audio files
2.4.6. Video files
2.5. Data Access Methods
2.4.1. Sequential storage
2.4.2. Direct access storage
2.4.3. ISAM (Indexed-sequential access method)
2.6. Secondary Storage devices
2.4.1. Tapes – magnetic tapes, cartridge tape units
2.4.2. Diskette – or floppy disk
2.4.3. Hard disk
2.4.4. Optical disk – CD-ROM, CD-R disks, Erasable disks (CD-E), DVD/DVD-ROM

3.0 Software

3.1 Classes of software


3.1.1 System software
3.1.2 Applications software
3.2 System software
3.2.1 These programs start up the computer and function as the principal
coordinator of all hardware components and application programs.
3.2.2 The basic components of a system software are – operating system and BIOS,
language translators, and utility programs
3.2.3 Other components of system software are – data management, network
operating system, TP monitor, communications protocols, and drivers.
3.2.4 Operating system consists of the master programs, called the supervisor that
manages the basic operation of the computer. These programs reside in RAM
43
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

while the computer is on and provide resource management services of many


kinds, handling such matters as running and storing programs and storing and
processing data.
3.2.5 Utility programs are generally used to support, enhance, or expand existing
programs in computer systems. Examples of utility programs are:
 System diagnostics  Data compression
 Backup  Memory management
 Data recovery  Defragmentation
 Virus protection
3.2.6 Language translator is software that translates a program written by a
programmer in a language such as C++ into machine language, which the
computer can understand.
3.2.7 Other system software capabilities are:
 Multitasking – the execution of two or more programs by one user
concurrently on the same computer with central processor.
 Multiprogramming – a concurrent execution of different users’ programs
 Time-sharing – round-robin processing of programs for several users.
 Multi-processing – simultaneous processing of two or more programs by
multiple processors.
 System software interfaces – User interface controls the manner of
interaction between the user and the operating systems. First were
the command-driven interface, then the menu-driven interface, and
now the graphical user interface (GUI).
3.3 Common Operating Systems: Platforms
3.3.1 A platform is the type of computer architecture, or family such as the IBM PC
versus the Apple Macintosh.
3.3.2 The processing model and the operating system determine the platform. The
processor determines the machine language it used and the operating system
is created to work with that particular type of machine language.
3.3.3 Examples of operating systems are: DOS, Ms-DOC, PC-DOC, Windows 95 (98,
2000, NT, and Professional), OS/2, Unix, Macintosh Operating System,
Netware.
3.4 The WEB Based Operating Systems
3.4.1 The bloatware or network computer
3.4.2 Java
 The creation of HTML – courtesy of Tim Berners-Lee, allows you to create
graphical onscreen documents for the Internet that can easily be linked by
words and pictures to other documents
 The appearance of Web browser, developed by Marc Andreessen
 Java, written by ace programmer Ace Gosling, enables a Web page to
deliver, along with the visual content, tiny application programs called
44
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

applets (mini applications), that when downloaded, can make Web


page interactive. Java runs on all major computers and develops a whole
new style of computing that is built around the internet.
3.5 Applications Software
3.5.1 It consists of computer programs designed to satisfy a user’s specific needs.
3.5.2 The five basic categories of application software are:
 Productivity software – word processing, spreadsheets, personal finance,
presenting graphics, database managers, communications, groupware,
desktop accessories, suites, and browsers.
 Business specialty software – desktop publishing, project management,
CAD/CAM, drawing, painting, hypertext, multimedia authoring and
multimedia software components
 Educational/Reference software – encyclopedia, phone books, almanacs,
library searchers, etc.
  Home/Personal Software – cookbooks, medical guides, home
decoration, gardening, home repair, etc.
 Entertainment Software – games, etc.
3.5.3 Common features of applications software. Cursors, scrolling, windows,
menus, help screens and wizards, buttons, toolbars, dialog boxes, default
values, macros, OLE (object linking and embedding), clipboard, and tutorial and
documentation.
3.5.4 Wordprocessing software – text processing – creating documents, editing
documents, formatting documents, printing documents.
3.5.5 Spreadsheets software – number processing – columns, rows and labels; cells,
cell addresses, values, and spreadsheet cursor; formulas. Functions, and
recalculations; dynamic linking; analytical graphics
3.5.6 Personal finance software – tracking income and expenses, checkbook
management, reporting, income tax, others.
3.5.7 Presentation graphics – uses presentation software such as Microsoft
PowerPoint, Aldus Persuasion, Lotus Freelance Graphics, and SPC Harvard
Graphics.
3.5.8 Database Management System Software – uses database software program
that controls the structure of a database and access to the data. Some features
of DBMS are organization of a database, select and display, sort, calculate and
format, queries, and report generation.
3.5.9 Communications Software – data communications software manages the
transmission of data between computers. It gives the following capabilities:
 online connection remote access connections
 use of personal services file transfer
 automatic dialing services file support

45
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

3.5.10 Groupware – a software used on a network and serves a group of users working
together on the same project. The four types of groupware are: basic
groupware, workflow software, meeting software, and scheduling software.
3.5.11 Desktop accessories and PIMs (Personal Information Managers)
3.5.12 Integrated software and software suites - integrated software packages
combine the features of several applications programs into one software
package. Software suites, or suites, are applications that are bundled together
and sold for a fraction of what the programs would cost if brought individually.
 Web browsers – World Wide Web, or Web, consists of hundreds of
thousands of intricately interlinked sites called home pages set up for on-
screen viewing in the form of colorful magazine-style “pages” with text,
images, and sound.
 A Web browser is software that enables you to “browse through” and view
Web sites. You can move from page to page by clicking on or selecting a
hyperlink – either underlined text or a graphic – or by typing in the address
of the destination page. Browsers are offered by Internet access providers
such as American Online, CompuServe, and Prodigy. The recent battle
royal to find the “killer app” is between Netscape’s Navigator and
Communicator and Microsoft’s Microsoft Explorer.
3.5.13 Desktop-publishing software – mixing text and graphics to produce high quality
printed output for commercial printing. Examples are QuarkXpress,
PageMaker, Microsoft’s Publisher, and Adobe Illustrator, CorelDraw, and
Adobe PhotoShop.
3.5.14 Project management software – used to plan, schedule, and control resources
– people, costs, and equipment – required to complete project on time.
Examples are Harvard Project Manager, Microsoft’s Project for Windows,
Project Scheduler, Super Project, and Time Line.
3.5.15 Computer-Aided Design (CAD) – software programs for the design of products
and structures. Examples are Autosketch, CorelCAD, EasyCAD2, TurboCAD
program and Parametric.
3.5.16 CAD/CAM (Computer-Aided-Manufacturing) – allows CAD product design to be
an input into an automated manufacturing system that makes the product.
3.5.17 Drawing and Painting software – graphics software that allows users to design
and illustrate objects and products, and to simulate painting on screen.
3.5.18 Hypertext and web site management
3.5.19 Multimedia authoring software – combines not only text and graphics but
animation, video, voice, and sound effects as well.
3.6 Software Issues
3.6.1 Public domain software – software that is not protected by copyright and thus
may be duplicated by anyone at will.

46
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

3.6.2 Freeware – a software that is available free of charge, distributed through the
internet or users groups.
3.6.3 Shareware – Copyrighted software that is distributed free of charge but
requires users to make a contribution in order to receive technical help,
documentation, or upgrades.
3.6.4 Proprietary software – software whose rights are owned by individual or
business, usually a software developer.

4.0 Files and databases


4.1 The Data Storage Hierarchy
4.1.1 Bits – 1 and 0, on/off, present/absent, high-voltage/low-voltage
4.1.2 Bytes (characters) – single letter, number, or special character such as $ or %.
4.1.3 Fields – a unit of data consisting of one or more characters.
4.1.4 Records – a collection of related fields.
4.1.5 Files – a collection of related records
4.1.6 Databases – a collection of interrelated files.
4.2 The key field
4.2.1 Types of files: program files and data files
 Program files contain software instructions. Example, in word processing
program, SETUP.EXE. These files are part of the software package.
 Data files contain data such as DOCUMENT.1 or Sales Report
4.2.2 Types of data files: master files and transaction files
 The Mater file is a data file containing relatively permanent records that
are generally updated periodically. An example would be the address-label
file for all students currently enrolled in a college.
 The transaction file is a temporary holding file that holds all changes to be
made to the master file; additions, deletions, revisions. Examples would
be new names, addresses, etc. to be deleted, added or modified as
students come and go.
4.3 File Organization: 3 methods
4.3.1 Sequential file organization. It stores records in sequence, one after the other.
Records can be retrieved only in the sequence in which they were stored. This
is the only method that can be used with magnetic tape. This method can also
be used with disk.
4.3.2 Direct file organization. Direct access organization or random file organization
store records in no particular sequence, a record is retrieved according to its
key field, or unique element of data. Examples of its use are airline reservation
systems and computerized directory-assistance operations. A mathematical
formula called hashing algorithm is used to reduce a unique number that will
identify the record’s physical location on the disk.

47
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

4.3.3 Indexed-sequential file organization. It is compromised between the two


preceding methods. Also called indexed file organization. It stores records in
sequential order and retrieves files using the direct access method. This
method is slower than direct file organization because of the necessity of
having to do an index search.
4.4 File Management Systems
4.4.1 A file management system, or file manager, is software creating, retrieving, and
manipulating file, one file at a time.
4.4.2 Each file is used independently to produce its own separate reports. If a data
changes, someone has to change separately in each file.
4.4.3 Several disadvantages of file management system are.
 Data redundancy.
 Lack of data integrity – meaning data are less accurate and not updated
 Lack of program independence.
4.5 Database Management Systems (DBMS)
4.5.1 A database is a collection of related files. Files are integrated, meaning records
are logically related, or cross-referenced to one another.
4.5.2 DBMS software, or database manager, is a program that controls the structure
of a database and access to the data.
4.5.3 A change in data is automatically reflected in the different files.
4.5.4 Advantages of DBMS are:
 Reduced data redundancy.
 Improved data integrity.
 More program independence.
 Increased user productivity
 Increased security.
4.5.5 Disadvantages of DBMS are:
 Costs issues.
 Data vulnerability issue.
 Privacy issues.
4.5.6 Types of Dbase organization
 Hierarchal database – 1 child = 1 parent
 Network database – 1 child = 2 or more parents; 1 member = 2 or more
owners
 Relational database – relates, or connects, data in different files through
the use of a key field, or common data element. In this arrangement, there
are no access paths down through a hierarchy. Instead, data elements are
stored in different tables made up of rows and columns. In database
terminology, the tables are called relations (files), the rows are called
tuplets (records), and the columns are called attributes (fields).
48
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 Object-oriented database management system (OODBMS) – uses objects


as elements within database files. An object consists of data in the form of
(1) text, sound, video, and pictures, and (2) instructions (algorithm) on the
action to be taken on the data.
4.5.7 Features of a DBMS
 Data dictionary, in itself, a small database that stores the data definition –
description of the structure of the data used in the database (i.e., name,
type, source, etc.). This also monitors the data being entered to make sure
it conforms to the rules defined during data definition such as field names,
field size, type of data, etc. It also indicates which application programs
use that data so that when a change in data structure is planned, a list of
affected programs can be generated.
 DBMS Utilities are programs that allow you to maintain a database by
creating, editing, and deleting data, records, and files.
 QUERY language, or data manipulation language, is an easy-to-use
computer language for making queries to a database and for retrieving
selected records, based on the particular criteria and format indicated. A
popular example of query language is the structured query language (SQL),
a relational database search standard recognized by the American
National Standards Institute. It is a data access language used by many
commercial DBMS products, including ORACLE, SYBASE, Dbase, Paradox,
and Microsoft Access.
 Report Generator is a program users may employ to produce an on-screen
or printed-out document from all or part of a database. You can specify
the format of the report in advance-row heading, column headings, page
headers, and so on. With a report generator, even nonexperts can create
attractive, readable reports on a short notice.
 Access security, an example is isolation which prevents unauthorized
access or insulates the physical database from destruction of corruption.
 System recovery – examples are mirroring, reprocessing, rollforward and
rollback

4.6 New Approaches


4.6.1 Data mining, warehouses and siftware.
4.6.2 Data mining, called knowledge recovery, is the computer-assisted process of
sifting through and analyzing vast amounts of data in order to extract meaning
and discover new knowledge. The purpose of DM is to describe past, trends
and predict future trends.
4.6.3 Preparing data for data warehouse.
 Data sources.
 Data fusion and cleansing.
49
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 Data and meta-data. Meta data shows the origin of the data, the
transformation it has undergone, and summary of information about it,
which makes it more useful than the unintegrated, unsummarized data.
 The data warehouse, a special database of cleaned up data and meta-data.
Small data warehouses may hold 100 gigabytes of less. Once 500 gigabytes
are reached, massively parallel processing (MPP) computers are needed.
4.6.4 Siftware for finding and analyzing
 Software, or siftware tools, used to perform data mining are: query-and-
reporting tools, multidimensional analysis (MDA) tools and intelligent
agents.

5.0 Information management


5.1 Information is needed in all levels of management, such as:
5.1.1 Strategic level – composed of the Vice-Presidents and the CEO responsible for
strategic planning using unstructured decisions.
5.1.2 Tactical level – composed of the middle managers such as directors in each
specific task or field responsible for tactical planning using semi-structured
decisions.
5.1.3 Operational level – composed of the lower management such as managers of
departments responsible for operational planning using structure decisions.
5.2 Types of management Information system (MIS)
5.2.1 For lower managers – Transaction processing system (TPS)
5.2.2 For middle managers – Management Information System (MIS)
5.2.3 For top management – Decision Support System (DSS) and Executive
Information System (EIS)
5.2.4 For all levels including non-management – Expert Systems (ESs) and Office
Automation Systems (OAs)
5.3 Transaction Processing System
5.3.1 It follows the Input and output system. The inputs are transaction data such as
bills, orders, and inventory levels. The output consists of processed
transactions such as bills, paychecks, inventory analysis, and so on.
5.3.2 It is normally for lower manager’s use.
5.3.3 It produces detailed reports.
5.3.4 There is one (1) TPS for each department.
5.3.5 It is also a basis for MIS and DSS.
5.4 Management Information Systems
5.4.1 Input and output system.
5.4.2 It is normally used by middle managers.
5.4.3 It draws input from all departments.
5.4.4 It produces several kinds of reports – summary reports, exception reports,
periodic reports, on-demand reports.
50
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

5.5 Decision Support System


5.5.1 Input and Output System
5.5.2 Mainly for top managers
5.5.3 Produces analytic models – the key attribute of a DSS is that it uses models. A
model is a mathematical representation of a real system. The models use a DSS
database, which draws on the TPS and MIS files, as well as external data such
as stock reports, government reports, national and international news. This
model allows a manager to do a simulation - play a “what if” game – to reach
discussions
5.5.4 Components of a DSS
 hardware
 software
 data resources
 model resources
 people resources
5.5.5 Examples of DSS applications
 Airline DSS
 Real estate DSS
 Geographic DSS
5.6 Executive Information System (EIS)
5.6.1 EIS is an easy-to-use DSS made especially for top managers. It specifically
supports strategic decision making. EIS is also called executive support system
(ESS)
5.6.2 It draws from data not only from systems internal to the organization but also
from those outside.
5.6.3 An EIS might allow senior executives to call up predefined reports from their
PCs, whether desktops or laptops. They might, for instance, call up sales figures
in many forms – by region, by week, by fiscal year, by projected increases.
5.6.4 EIS includes capabilities for analyzing data and doing “what if” scenarios.
5.6.5 EISs also have the capability to browse through information on all aspects of
the organization and then zero-in on areas the manager believes would require
attention.
5.7 Expert Systems (ES)
5.7.1 Expert system or knowledge system, is a set of interactive computer programs
that helps users solve problems that would otherwise require the assistance of
a human expert.
5.7.2 ES simulates the reasoning process of experts in certain well-defined areas.
That is, professionals, called knowledge engineers, interview the experts or
experts and determine the rules and knowledge that must go into the systems.
5.7.3 Programs incorporate not only surface knowledge (“textbook knowledge”) but
also deep knowledge (“tricks of the trade”).
51
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

5.7.4 Examples of expert systems are:


 MYCIN – helps diagnose infectious diseases.
 PROSPECTOR – assess geological data to locate mineral deposits.
 DENDRAL – identifies chemical compounds.
 REBES – helps detectives investigate crime scenes.
 CARES – helps social workers assess families for risk of child abuse.
 CLUES – evaluates home-mortgage-loan applications.
 Muckraker – assists journalists with investigative reporting.
 Crush – takes a body of expert advice and combines it with worksheets
reflecting a user’s business situation to come up with a customized
strategy to beat out competitors.
5.8 Office Automation System (OAS)
5.8.1 OASs are those that combine various technologies to reduce the manual labor
required in operating an efficient office environment.
5.8.2 These technologies include voice mail, e-mail, scheduling software, desktop
publishing, word processing, fax and so on.
5.8.3 OASs are used throughout all levels of an organization.
5.8.4 The backbone of OAS is a network – perhaps, a LAN, an internet over a LAN, or
an extranet.
5.9 Knowledge management
5.9.1 It is technology driven, using computers to help analyze data, pinpoint trends,
flag the unusual, and sort the important from the mundane. Finally, it must
result in getting critical data to decision makers.
5.9.2 It spawned out of the need to unearth information and convert it into
knowledge and appropriate action.

6.0 Information systems analysis and design


6.1 Systems Development Life Cycle (SDLC) – also called as application development cycle,
systems development cycle, or structured development life cycle. The six phases of SDLC
are:
6.1.1 Preliminary investigation – management determines there is a problem with
the existing information system; systems analyst does initial study to determine
preliminary costs and constraints.
6.1.2 Systems analysis – analyst investigates the problems in the existing system and
the requirements for the new system.
6.1.3 Systems design – analyst creates detailed diagrams, charts, models, and
prototypes of components of the proposed new system.
6.1.4 Systems development – the programmers, monitored by the analyst, build the
system. Testers test the systems for quality.

52
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

6.1.5 Systems implementation – data, people, and procedures are converted from
the old system to the new; final documentation is compiled; users are trained;
the new system is out into operation.
6.1.6 Systems maintenance – the information system must be maintained, repaired,
and enhanced by analysts and maintenance programmers until it is suspected
to be obsolete. Then the SLDC begins again for a new system.
6.2 The First Phase: Preliminary investigation
6.2.1 A systems analyst conducts a preliminary analysis, determining the
organizations objectives and the nature and scope of the problems. The analyst
then proposes some possible solutions, comparing costs and benefits. Finally,
he or she submits a preliminary plan to top management.
6.2.2 This phase is often called a feasibility study.
6.2.3 Systems analyst may use JAD (joint application development) where systems
owners, users, analysts, and designers are brought together in highly organized
intensive workshops to jointly define and design systems (focus group
discussions). This is done to replace months of traditional interviews and
follow-up meetings.
6.2.4 The usual steps in preliminary investigation are:
 Conduct preliminary study
 Determine the organization’s objectives.
 Determine the nature and scope of the problems.
 Propose alternative solutions
 Leave the system as is.
 Improve the system
 Develop a new system.
 Describe costs and benefits
 Submit a preliminary plan.
6.3 The Second Phase: Systems analysis
6.3.1 Systems analysis describes WHAT a system should do to meet the needs of
users.
6.3.2 Its objective is to gather data, analyze the data, and write a report. In general,
it involves a detailed study of
 the information needs of the organization and all users.
 the activities, resources, and products of any present information
systems.
 the information systems capabilities required to meet the
 established information needs and the user needs.
6.3.3 The usual steps in systems analysis are:
 Gather data
 Written documents.

53
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 Interviews – structured and unstructured interviews; JAD sessions


may be use.
 Questionnaires.
 Observation
 Sampling
 Analyze the data
 Use the modeling tools to present graphical (pictorial)
representations of the system such as:
 CASE (computer-aided software engineering) tools
 Data flow diagram – also called process model
 Systems flowchart – or systems flow diagram shows the major input,
output and processes of a system.
 Connectivity diagrams – used to map network connections of people,
data, and activities of various locations.
 Grid chart – shows the relationship of data and input documents and
data on output documents.
 Decisions fables – shows the decision rules that apply when certain
conditions occur and what actions to take.
 Object-oriented analysis (OOA) – data and processes are combined,
or encapsulated, into things called objects – “building blocks” made
of software routines. The only way to create, delete, change, or use
the data in an object (called properties) is through one of its
encapsulated processes called (methods). The systems and software
developments strategy is changed to focus on the “assembly” of the
system from a library of reusable objects.
 Write a report
6.4 The Third Phase: Systems design
6.4.1 Systems design is the HOW to accomplish the information system objective.
6.4.2 The usual steps in systems design are:
 Do a preliminary design
 Use of CASE tools such as Excelerator, Iconix, System Architect, and
Powerbuilder
 Front-end CASE tools (or upper-CASE tools) are used in preliminary
investigation, systems analysis, and systems design; while, back-end
CASE tools (or lower-CASE tools) are used in systems development
and systems maintenance to help in coding and testing, for instance.
 Do a detail design
 Output requirements
 Input requirements
 Storage requirements
 Processing and networking requirements
54
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 Systems controls and backup


 Write a report
6.5 The Fourth Phase: Systems development
6.5.1 It consists of acquiring software and hardware and then testing the system.
6.5.2 Acquire software
 Make or buy a software; if make, hire own staff or hire outside contract
programmers
6.5.3 Acquire hardware
6.5.4 Test the system
 Unit testing – individual parts of the programs are tested using test (made-
up, or simple) data.
 System testing – the parts are linked together, and test data is used to see
if the parts work together.
6.6 The Fifth Phase: System implementation
6.6.1 It consists of converting the hardware, software, and files to the new system,
compiling final documentation, and training the users.
6.6.2 Convert to the new system
 Convert hardware, software and files.
 Stages of handling conversation:
 Direct approach – the user simply stops using the old system and
starts using the new one.
 Parallel approach – the old and the new system are operated side by
side until the new system has shown it is reliable, at which time the
old system is discontinued.
 Phase approach – parts of the new system are phased in separately –
either at different times (parallel) or all at once in groups (direct)
 Pilot approach – the entire system is triad out but only by some users.
6.6.3 Compile final documentation. It is an ongoing process during all phases of the
SLDC. Examples include manuals of operating procedures and sample data
entry display screen forms, and reports.
6.6.4 Train the users.
6.7 The Sixth Phase: System maintenance
6.7.1 It adjusts and improves the system through system audits and periodic
evaluations.
6.7.2 Auditing. An independent review of an organization’s information system to
see if all records and systems are as they should be. An audit trail helps
independent auditors trace the record of a transaction from its output back
through all processing and storage to its source.
6.7.3 Evaluation. It may be done by the head systems analyst or outside systems
analysts. Evaluation may also be done by a user or client who is able to
compare the working so the system against some present criteria.
55
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

7.0 Software programming and language

7.1 What is a program? Software engineering?


7.1.1 A program is a list of instructions that the computer must follow in order to
process data into information. The instructions consist of statements written
in a programming language (i.e., BASIC, COBOL, FORTRAN, etc.)
7.1.2 Programming, or software engineering, is a multi-step model for creating the
list of instructions. Only one of those steps (the step called coding consists of
sitting at the keyboard typing in code.)
7.2 Programming: A Five-Step Procedure
7.2.1 Traditionally, the program development cycle follows the following steps and
activities:

Steps Activities
Step 1 – Problem 1. Specify program objectives and program users.
2. Specify output requirements.
3. Specify input requirements.
4. Study feasibility of implementing program.
5. Document the analysis.

Step 2 – Program Design 1. Determine program logic through top-down approach


and modularization
2. Design details and pseudo code and/or using flowcharts,
preferably using control structures.
3. Test design with structured walkthrough.

Step 3 – Program coding 1. Select the appropriate programming language.


2. Code the program in that language, following the syntax
carefully.

Step 4 – Program testing 1. Desk-check the program to discover errors.


2. Run the program and debug (alpha testing)
3. Run re-world data (beta testing)

Step 5 – Program documentation 1. Write user documentation


and maintenance 2. Write operator documentation
3. Write programmer documentation
4. Maintain the program

7.3 Discussions on programming procedures. 56


www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

7.3.1 Step 1 - Problem clarification.


 Clarify objectives and users. What is the problem you are trying to solve?
Who the users of the program will be? What kind of skills will they bring?
 Clarify desired outputs. What the system designers want to get out of the
system? What kind of hardware is wanted? What information should the
output include. This step may require several meetings with system
designers and users to make sure they are creating what they want.
 Clarify desire inputs. What kind of input data is needed? What form
should it appear in? What is its source?
 Clarify the desired processing.
 Double-check the feasibility of implementing the program. Personnel
requirement. Time constraint. Can we buy an existing and modify it
rather than custom-write it from scratch?
 Document the analysis.
7.3.2 Step 2 - Design the program.
 Determine the Program Logic
 Use the top-down approach. Top-down program design proceeds by
identifying the top elements, or module, of the program and then
breaking it down in hierarchical fashion to the lowest detail. After the
program is designed, the actual designed, the actual coding proceeds
from the bottom up, using the modular approach. In modularization,
the program parts can be developed and tested separately.
 A module is a processing step of a program. Each module is made of
logically related program statements (called as subprogram or
subroutine).
 Top-down program design can be represented graphically in a
hierarchy chart. There must be three principal modules
corresponding to the three principal computing operations – input,
processing, and output.
 Design details.
 There are two ways to show details – write them (PSEUDOCODE) or
draw them (FLOWCHART).
 Pseudo code is a method of designing a program using normal human-
language statements to describe the logic and processing flow. If uses
such terms as IF, THEN, or ELSE to follow the rules of control
structures (see b4).
 A program flowchart graphically presents the detailed series of steps
(algorithms or logical flow) needed to solve a programming problem.
The flowchart uses standard symbols – called ANSI (American
National Standard Institute), which developed them.

57
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 A control structure or logic structure, controls the logical sequence in


which computer programs are executed. In structured program
design, the basic control structure used to form the program logic are
sequence, selection, and iteration (or loop).
 In sequence control structure, one program statement follows
another in logical order (i.e., one statement instructs “open file”
the other statement instructs “read a record”). There are no
yes or no choices.
 The selection control structure is also known as the IF-THEN-
ELSE structure. It offers two or more paths to follow (i.e., Yes or
No) when a decision must be made by a program.
Example:
IF a worker’s hours in a week exceed 40
THEN overtime hours equal the number of
hours exceeding 40
ELSE the worker has no overtime hours.
 The variation of the selection control structure is the case
control structure.
 The iteration, or loop, control structure may repeat a process as
long as a certain condition remain true. There are two types or
iteration structures. – DO UNTIL and DO WHILE
An example of DO UNTIL is:
DO read in employee records UNTIL there are no more
employee records.
An example of DO WHILE is:
DO read in employee records WHILE – that is, as long
as- there continue to be employee records.
 Do a structured walkthrough
 In the structured walkthrough, a programmer leads other people in
the development team through a segment of code. It consists of a
formal review process in which others – fellow programmers, systems
analysts, and perhaps users – scrutinize (“walk through”) the
programmer’s work. They review the parts of the program for errors,
omissions, and duplications in processing tasks.
7.3.3 Step 3 - Code the program
 Writing the program is called coding. It consists of translating the logic
requirements from pseudocode or flowcharts into a programming
language – the letters, numbers, and symbols arranged according to syntax
rules (language rules) that make up the program.
 Select the appropriate programming language.

58
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 A programming language is used to instruct for the computer.


Examples are COBOL, C, BASIC (i.e., high-level languages) and
ASSEMBLY (i.e., low-level-language).
 Follow the syntax.
 Syntax is the rules of a programming language that specify how words
and symbols are put together. Programming languages have their
own grammar just as human language do.
7.3.4 Step 4 - Program Testing
 Desk – checking is sort of like proofreading. It is simply reading through,
or checking, the program to make sure that it’s free of errors and that the
logic works.
 Debugging. To debug means to detect, locate, and remove all errors in a
computer program. Mistakes may be syntax errors or logic errors. Syntax
errors are caused by typographical errors and incorrect use of the
programming language. Logic errors are caused by incorrect use of control
structures. Debugging utility programs is sometimes called diagnostics.
 Run real data.
7.3.5 Step 5 - Document and maintain the program.
 Prepare user documentation
 Prepare operator documentation (people who run large computers are
called computer operators.)
 Prepare programmer documentation (natural programmer’s
employment-cycle is 5 years)
 Maintain the program.
7.4 Generators of Programming Languages
7.4.1 Programming languages are said to be lower level when they are closer to the
language of the computer, the 1s and 0s. They are called high level when they
are closer to the language people use, say English, etc.
7.4.2 Relevant data on the generations of programming languages may be presented
as follows:

59
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

Time line Generation Language (GL) Features


1940s First GL – machine language More technical
More flexible
1950s Second GL – assembly language Less user Friendly
faster
1960s Third GL – procedural languages Less technical
Less flexible
More user friendly

1970s Fourth GL – Report generators, query slower


language, application generators
1980s Fifth GL – natural language Current and future trends

7.4.3 Discussions on generation of programming languages


 First generation language. Machine language is the lowest language of the
computer, representing data as 1s and 0s. Machine language programs
vary from computer to computer, that is, they were machine dependent.
 Second generation language (assembly language)
 Assembly language is a low level language that allows a programmer
to use abbreviated or easily remembered words instead of numbers.
For example, MP is multiply, STO is store. Assembly language is also
called machine dependent.
 We need to know about language translator. A language translator
(or converter) is a type of software that translate a program written
in a second or higher – generation language into machine language.
Language translators are of three types:
 Assembler - translates the assembly language into a machine
language.
 Compiler – converts the entire program of a high – level language
into machine language (i.e., object code) before the computer
executes the program. Here, the object code can be saved and
be executed later, as many times are desired without
recompiling, rather than run right away. Examples of high-level
languages are C and COBOL.
 Interpreter – executes immediately. An interpreter is a language
translator that converts each high-level language statement into
machine language and executes it immediately, statement by
statement. No object code is saved, as with the compiler.
Slower, but codes can be tested line by line. An example of high-
level language using interpreter is BASIC.
 Third generation languages ( high-level languages )
60
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 These are called procedural languages. Examples of high-level languages


are COBOL, BASIC and C.
 A high-level language allows users to write in a familiar notation, rather
that numbers or abbreviations. Most of the high-level languages are not
machine dependent. They are used in more than one kind of computer.
 High-level languages need compilers or interpreters to communicate with
the computer.
 Procedural languages set forth precise procedures, or series of
instructions, meaning that the programmer has to follow a proper order
of actions to solve a problem. The programmer tells exactly what the
computer has to do.
 COBOL (for Common Business Oriented Language). This PL (i.e.,
programming language) contains four divisions – identification,
environment, data, and procedure). Divisions are divided into paragraphs
which are in turn divided into sections.
 C, developed at Bell Laboratories, is a general – purpose, compiled
language that works well for microcomputer and is portable among many
computers. It is widely used for writing operating systems and utilities,
and is most commonly used in commercial software development,
including games, robotics, and graphics. It is considered a necessary
language for programmers to know.
 BASIC (for Beginners’ All-purpose Symbolic Instruction Code). Developed
in 1965 to train students in Darthmouth College, is applicable to all kinds
of computer from mainframes to PCs. It has been the most popular
microcomputer language and is considered the easiest programming
language to learn. Although it is available in compiler form, the interpreter
form is more interactive, meaning that user and computer can
communicate with each other during the writing and running of the
program
 Ada is an extremely powerful structured programming language
designated by the U.S. Department of Defense to ensure portability of
program from one application to another. Its primary use is scientific,
including missile guidance systems. It has also been used in commercial
operations.
 Other third generation languages are LISP, Logo, APL, FORTH, and
PROLOG.
 Fourth generation languages (very- high – level languages)
 4GLs, for fourth generation languages, are much more user-oriented and
allow programmers to develop programs with fewer commands compared
with 3GL.

61
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 4GLs require more computing power and are called nonprocedural


languages because programmers and even users can write programs that
need only tell the computer what they want done, not all the procedures
for doing it. Programmers do not have to specify all the programming
logic. 4GLs are also called RAD (rapid application development) tools.
 Examples are report generators, query languages and application
generators:
 Report generator (RG), also called report writer, allows the end-users
to specify the format in advance-columns, headings, and so on – and
the report generator will then produce data in that format, either in
printout or screen display. RG is a precursor to today’s query
languages.
 A query language is an easy to use language for retrieving data from
a database management system. Examples of query language are
SQL (for structured query language) and Intellect.
 Application generators are programmer’s tool that generates
application programs from description of the problem rather that the
traditional programming. The benefit is that the use application
generators to help them create parts of other programs.
 4GLs may not entirely replace 3GLs because they are usually focused on
specific tasks and hence offer fewer options.
 Fifth generation : Natural languages
 Natural languages are of two types: ordinary human language and
programming languages.
 For example, with a natural language, you might able to state:
“I want the shipment of personal digital assistants for Laguna and Cavite
broken down by towns for January and February. Also I need January and
February shipments listed by towns for personal communicators shipped
to Batangas and Rizal.”
 Natural languages are part of the field of study known as artificial
intelligence.
7.5 Object-Oriented Programming
7.5.1 Object – oriented programming (OOP) is a programming method that combines
data and instructions for processing that data into a self-sufficient “object” that
can be used in other programs.
7.5.2 An object is a block of preassembled programming code that is a self-contained
module. The module contains, or encapsulates both (1) a chunk of data and (2)
the programming instructions that may be called on to be performed on that
data. The instructions about the operations to be performed on data within
the object are called “methods”.

62
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

7.5.3 Once the object becomes a part of a program, the processing instructions may
or may not be activated. This happens only when a “message is sent.” A
message is an alert sent to the object when operations involving that object
need to be performed.
7.5.4 A written program code (say, one that computes overtime pay) may be reused
in any number of programs. Thus, unlike with traditional programming, with
OOP you do not have to start from the scratch – that is, reinvent the wheel –
each time. This speed up programming time and lowering costs.
7.5.5 In procedural languages, a programmer develops all the programs. Under the
OOP model, we will have reusable objects that can be purchased and simply
plugged in or customized to fit virtually every need.
7.5.6 The three important concepts of OOP are:
 Encapsulation. It means an object contains (1) data and (2) the
instructions for processing it.
 Inheritance. It is the method of passing down traits of an object from one
program to another. Once an object is created, you can use it as the
foundation of similar objects that have the same behavior and
characteristics. A program could be mix with another program having the
same traits.
 Polymorphism. It means “many shapes” in OOP. Polymorphism means
that a message (generalized request) produces different results based on
the object that is sent to. Example, a screen cursor may change its shape
depending on the program.
 Some examples of OOP languages are Smalltalk, C++, and Hypertalk.
 Distributed Object, Technology (DOT). It happens when an object
communicates across network. Without distribution, objects are
reusable only within the context of a given PL. In distributed object
system, objects that support important parts of a business are
centralized on network application servers, making it relatively easy
to implement changes that will ripple across many applications. Also,
DOT would make every computer system in the world compatible
with every other computer. The internet is perfectly suited to this
vision.
7.6 Visual Programming
7.5.1 OOP - graphical or visual way (icon) = Visual programming.
7.5.2 It is a method of creating programs by using icons that represents common
programming routines.
7.5.3 The programmer makes connections between objects by drawing, pointing and
clicking on diagrams and icons and by interacting with flowcharts.

63
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

7.5.4 For example, Visual BASIC offers another visual environment for program
construction for Windows applications, allowing you to build various
components using buttons, scroll bars, and menus.
7.7 HTML, VRML, and Java
7.7.1 These PLs are used to build multimedia on the World Wide Web.
7.7.2 HTML (Hypertext Markup Language) is a type of code that embeds simple
commands within standard ASCII text documents to provide an integrated,
two-dimensional display of text and graphics. A document created in any word
processor and stored in ASCII format can become a Web page with the addition
of few HTML commands. HTML has the ability to insert hypertext links that
enables you to display another Web document on the current screen. Various
HTMLs offer menu options to create your own Web page such as Adobe’s
PageMill, Soft Quad’s Ho Metal Pro, Microsoft’s FrontPage Editor and Internet
Explores, and Netscape.
7.7.3 VRML (Virtual Reality Markup Language) is a type of programming language
used to create three-dimensional (3D) Web pages. VRML is an extension of
HTML; thus, HTML Web browsers cannot interpret it. You need to plug-in to
VRML browser (for example, Netscape’s Live3D) to receive VRML Web pages.
7.7.4 Java allows programming to build applications that run on any kind of operating
system. The use of Java transforms the Web from an information-delivering
medium into a completely interactive computing environment. You may now
treat the Web as a giant hard disk loaded with a never-ending supply of
software applications. Java is a major departure from the HTML coding that
makes up most Web page. It is an interpreted programming environment, and
language is object-oriented and comparable to C++.
7.8 With the new developments in PLs, programming stages overlap and repeatedly flow
through analysis, design, coding and testing stages. Users can now test out new parts of
programs and even entire programs as they go along. They need not wait until the end
of the process to find out if what they said they wanted is what they really wanted.

8.0 Communications technology


8.1 Technological basics
8.1.1 Communications or telecommunications, refers to the transfer of data
(communications) form a transmitter – also called a sender of a source – to a
receiver – also called a sink – across a distance ( tele, from ancient Greek,
meaning “for off”)
8.1.2 Some form of electromagnetic energy – electricity, radio waves, or light – is
used to wire, cable, or the atmosphere.
8.1.3 The data transmitted can be voice, text, video, images, sound, or a combination
of these (multimedia).
8.2 Transmission signals
64
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

8.2.1 Two types of signals are : analog signals and digital signals.
8.2.2 Analog signal ( continuous waves):
 Telephones, radio, and television were designed to work with an analog
signal.
 Analog signal is a continuous electrical signal in the form of a wave called
a carrier wave.
 Two carrier waves that can be altered are frequency and amplitude.
 Frequency is the number of times a wave repeats during a specific
time interval – that is, how many times it completes a cycle in a
second.
 Amplitude is the height of a wave within a given period of time.
Amplitude is actually the strength or volume – the loudness – of a
signal.
8.2.3 Digital signals (discrete bursts)
 Digital signal uses on/off or present/absent electrical pulses in
discontinuous, or discrete bursts, rather than a continuous waves.
 This two-state kind of signal represents the two-state binary language of
0s and 1s that computer use. That is, 1 represents the presence of
electrical impulse and 0 the absence of it.
 In 1880s, Samuel Morse developed the Morse code, which on paper
consisted of a series of dots and dashes. Thus, the letter V, for example,
consisted of three dots and a dash (…_). However, the actual transmission
of this character via telegraph wires and telegraphing equipment consisted
of three short signals (“taps”) and one long signal each signal being
separated by a pause.
 Digital signals are better, faster and more accurate at transmitting
computer data
8.2.4 The Modem: The Great Translator
 The present telecommunications backbone is analog. To use these
telecommunication infrastructure, we have to convert digital signals
(messages) to analog signals and back to digital signals again.
 Modem, short for module/demodulator, converts digital signals into
analog form (a process known as modulation) to send over phone lines. A
receiving modem at the other end of the phone line then converts the
analog signal back to a digital signal (demodulator)
 Modem does not change the wave form (analog or digital) rather it
changes the form of the wave. For example, the frequency might be
changed or the amplitude might be changed.
 Modems are either internal or external.
 Modem transmission speeds are expressed in bps (bits per second) or kbps
(kilobits per second).
65
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 Modem transmission speed are 1200, 2400, and 4800 bps (slow), 9600 and
14,400 bps (moderately fast), and 28,800, 33,600, and 56,000 bps (high-
speed, 56,000 bps equals 56kbps).
8.3 Communications software
8.3.1 Communication software manages the transmission of data between
computers.
8.3.2 Examples are: Smartcom, Crosstalk, Wincom, CommWorks, Telix, Procomm,
Plus, and HyperTerminal.
8.3.3 Some of the features of modem are:
 Error correction – errors in data transmission are called “noise”, which may
garble high-speed data transmission; some modem have error-correction
features.
 Data compression – it reduces the volume of data in a message, thereby
reducing the amount of time required to send data from one modem to
another.
 Remote control – allows you to control a microcomputer from another
micro in a different location. Useful for travelers and technicians.
Examples of remote-control software for microcomputers are Carbon
Copy, Commune, Norton PC Anywhere, and Timbuktu/Remote.
 Terminal evaluation – Mainframes and mini computers are designed to be
accessed by terminals, not by microcomputers which have a different
operating systems. Terminal emulation software allows you to use micros
to simulate a mainframe or minicomputer terminal. Windows 95 and its
latest versions include terminal emulation software.
 ISDN, Cable Modems, ADSL, and Dishes: Faster, faster….
 ISDN (Integrated Services Digital Network) lines are up to five times
faster than conventional phone modems. It is capable of transmitting
digital signal over traditional copper-wire telephone lines up to 128
kbps.
 Cable modems can carry more than 1000 times faster than plain old
telephone system (POTS) lines with speed of 30-43 Mbps. A cable modem
connects a personal computer to a cable-TV system that offers online
services.
 ADSL (Asymmetric Digital Subscriber Line) uses 1.5 Mbps using regular
phone lines. It can send 25% more data each second than one diskette can
hold.
 Dishes. Satellite dishes, such as Hughes Network Systems’ 36-inch satellite
dish called the Convergence Antenna, transmit 15 times faster than a
standard high-speed modem, where connection to the Internet is not
done through telephone lines but through Hughes’ satellite Internet
service, called Direct PC.
66
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

8.4 Communication channels


8.4.1 A channel is the path over which information travels. Various channels occupy
various radio-wave bands on the electromagnetic spectrum. The various types
of wired channels included twisted-pair wire, coaxial cable, and fiber-optic
cable. Two principal types of wireless channels are microwave and satellite
systems.
8.4.2 The electromagnetic spectrum
 It consists of fields of electrical energy and magnetic energy, which travel
in waves.
 Telephone signals, radar waves, radio signals, light rays, X-rays, and
radioactivity radiate an energy that looks like rippling waves.
 Waves vary according to two characteristics: frequency and wavelength.
 Frequency is the number of times a wave repeats (makes a cycle) in a
second. Frequency is measure in hertz (Hz), with 1 Hz equal to 1 cycle,
1,000 Hz=kHz, 1 million hertz = MHz, and 1 billion hertz = GHz.
 Ranges of frequency are called bands or bandwidths. The bandwidth
is the difference between the lowest and highest frequencies
transmitted. For example, cellular phones operate in the 800-900
megahertz bandwidth. The wider the bandwidth, the faster data can
be transmitted.
 Wavelength is the variation in waves according to length. At the low
end of the spectrum, the waves are of low frequency and of long
wavelength (such as domestic electricity). At the high end, the waves
are of high frequency and short wavelength (such as cosmic rays).
Examples of wavelength references are “shortwave radio” and
“microwave oven”.
8.4.3 Types of communication channels.
 Twisted-pair wire
 Coaxial cable
 Fiber-optic cable
 Microwave and satellite systems
 Other wireless communications – GPS, one-way communications (pagers),
two-way communications (analog cellular phones, packet radio, and
CDPD),
 The next generation of wireless communications – digital cellular phones,
personal communications services, specialized mobile radio, satellite-
based systems.
8.4.4 Twisted–pair wire (TPW) consists of two strands of insulated copper wire
twisted around each other. It is the backbone of the plain old telephone
systems (POTS) and will no doubt continue to be used for years, for voice
messages and for modem-transmitted computer data. TPW has relatively small
67
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

bandwidth, slow (16-100 Mbps), and does not protect well against electrical
interferences. It is still used to connect parts of a LAN over short distances.
8.4.5 Coaxial cable consists of insulated copper wire wrapped in a solid or braided
metal shield, then in an external cover. Co-ax is widely used in cable TV and to
connect LAN over longer distances. It has greater bandwidth and is faster (up
to 200 Mbps) than twisted-pair wire.
 Fiber–optic cable consists of hundreds or thousands of thin strands of glass
that transmit not electricity but rather pulsating beams of light. A fiber–
optic strands in a cable 0.12 inch thick can support a quarter to a half–
million voice conversations at the same time. Fiber–optic cables are
lighter, more durable, have lower error rates and not affected by random
electromagnetic interferences in the environment.
8.4.6 Microwave systems transmit voice and data through the atmosphere as high–
frequency radio waves. Microwaves are the electromagnetic waves that
vibrate at 1 gigahertz per second or higher. These frequencies are used not
only to operate ovens but also to transmit messages between ground-based
earth and satellite communications systems. A string of microwave relay
stations will each receive incoming messages, boost the signal strength, and
relay the signals to the next station.
8.4.7 Satellite systems, or communication satellites, are microwaving relay stations
in orbit around the earth, traditionally 22,300 miles above the earth, although
newer systems are much lower. The satellites travel at the same speed as the
earth. The orbiting satellite has solar – powered receivers and transmitters
(transponders) that receive the signals, amplify them, and retransmit them to
another earth station.
8.4.8 GPS (Global Positioning System) – a $10 billion infrastructure developed by the
military transmit timed radio signals than can be used to identify earth
locations.
8.4.9 One-way communications – pagers.
8.4.10 Two–way communication – analog cellular phones are designed primarily for
communicating at 824-894 MHz by voice through a system of ground–area
cells. Each cell is served by a transmitter – receiving tower. Cells are directed
between cells by a mobile telephone switching office (MTSO).
8.4.11 Two–way communications–packet–radio–based communications use a
nationwide system or radio towers that send data to handheld computers. The
wireless computer identifies itself to the local base station ,which can transmit
over as many as 16 separable radio channels.
8.4.12 Two–way communications–CDPD (Cellular Digital Packet Data) places
messages in packets, or digital electronic “envelopes”, and sends them through
underused radio channels or between passes in cellular phone conversations.

68
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

A packet is a fixed–length block of data for transmission. The packet also


contains instructions about the destination of the packet.
8.4.13 The next generation of wireless communications
 Digital cellular phone turns your voice messages into digital bits, which are
sent through the air waves, then decoded back into your voice by the
cellular handset.
 Personal communications services (PCS) are digital wireless services that
use a new band of frequencies (1850-1990 MHz) and transmitter–
receivers in thousands of micro cells.
 Specialized mobile radio – e.g., Nextel
 Satellite–based systems–examples of satellites systems are AT&T’s Telstar,
Spaceway, ICO Global Communications, Globalstar, Iradium, Orbscomm,
Teledasic, Astrolink, Odyssey, Voicespan.
8.5 Factors affecting communications (data transmission)
8.5.1 Transmission rate – frequency and bandwidth
8.5.2 Line configurations – point – to – point versus multipoint
8.5.3 Serial versus parallel transmissions
8.5.4 Direction of transmission – simplex, half-duplex, and full-duplex.
8.5.5 Transmission mode – asynchronous (e.g., continuous) versus synchronous.
8.5.6 Packet switching – a technique used in wide area networks (WAN) for dividing
electronic messages into packets for transmissions over a network to their
destination through the most expedient route.
8.5.7 Multiplexing – is transmission of multiple signals over a single communication
channel where several communication devices can share a line at the same
time. The following devices are used in multiplexing: multiplexers,
concentrators, and front-end processors.
8.5.8 Protocols – or communication protocol, is a set of conventions governing the
exchange of data between hardware and/or software components in a
communications network.
8.6 Communications Networks
8.6.1 Communications channels and hardware may use indifferent lay-outs or
networks, varying in size from large to small. Networks allow users to share
peripheral devices, programs, and data, to have better communications, to
have more secured information, and to have access to databases.
8.6.2 A network, or communication network, is a system of interconnected
computers, telephones, or other communications devices that can
communicate with one another and share applications and data.
8.6.3 A network requires a network operating system (NOS) to manage network
resources. Examples of NOS are Netware, LAN Manager, and LANtastic.
8.6.4 Types of Networks.

69
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 WAN (Wide Area Network) – a communications network that covers a


wide geographical area, such as a region or a country. Examples of
computer WANs are Tymnet, Telenet, Uninet, and Accunet. Most
telephone systems are WANs such as Infocom, Amacom, etc.
 MAN (Metropolitan Area Network) – a communications network covering
a geographic area the size of a city of suburb. Cellular phones are often
MANs, used to avoid long-distance telephone charges.
 Local Network – a privately owned communications network that serves
users within a confined geographical area. The range is usually within a
mile – perhaps one office, one building, or a group of building close
together, as a college campus.
 PBX (Private Branch Exchange) – a local network ,a private or leased
telephone switching system that connects telephone extensions in-house.
It also connects them to outside telephone system which is consist of
“public branch exchange” – thousands of switching stations that direct
calls to different branches of the network.
 LAN (Local Area Network) – also a local network, consists of
communications link, network operating system, microcomputers or
workstations, servers, and other shared hardware. Such shared hardware
might include printers, scanners, and storage devices. Unlike larger
networks, LANs do not use a host computer.
8.6.5 Types of LANs
 LANs may be of two types: client – server, and peer – to – peer.
 Client – server LAN consists of requesting microcomputers called clients, and
supplying devices that provide a service called servers. The server is a
computer that manages shared information or devices, such as laser printer.
The server is usually a powerful one, with a lot of RAM and secondary storage
capacity. The Novell’s NetWare operating system is the most commonly used
NOS.
 Examples of client – server hookup is the one offered by America Online
(AOL) where the user uses the GUI (graphical user interface) and browser
software on his or her client machine. When initiating an Internet
sessions, that software runs with software installed on AOL’s
communications server.
 There are different servers for managing different tasks such as file
servers, database servers, applications servers, print server, fax servers,
and mall servers.
 Peer–to–peer LAN is one all microcomputers on the network communicate
directly with one another without relying on a server – that is the NOS allows
each station to be both client and server.
8.6.6 Components of LAN
70
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

 Connection of cabling system.


 Microcomputers with interface cards.
 Network operating system – manages the activity of the network and
provides the network with multiuser and multitasking capabilities.
Examples of NOS are Novell’s Netware, Microsoft’s LAN Manager,
Windows for Workgroups, Window 98, and Windows NT, IBM’s PC LAN.
 Other shared devices – such as printers, fax machines, scanners, storage
devices, and other peripherals.
 Bridges, routers, and gateways
 A bridge is an interface used to connect the same types of networks.
Bridges pass traffic form one LAN segment to another based on the
address of the packet. They also have buffers that can store messages
to forward later in case of traffic congestion.
 A router is a highly intelligent device that supports connectivity
between both like and unlike LANs and between LANs and
WANs/MANs.
 A gateway performs all functions of bridges and routers, including
protocol conversions at all seven layers of the OSI model.
8.6.7 Topology of LANs
 Star network – one in which all microcomputers and other
communications devices are connected to a central hub, such as a file
server or host computer, via UTP (unshielded twisted pair) or STP (shielded
twisted pair).
 Ring network – one in which all microcomputers and other
communications devices are connected in a continuous loops. Electronic
messages are passed around the ring in one direction, with each node
serving as a repeater, until they reach the right destination.
 Bus network – all communications devices are connected to a common
channel using co-ax, STP, or UTP. There is no central computer or server,
and data transmission is bi-directional at a rate of about 1-10 Mbps. Each
communications devices transmit electronic messages to other devices. If
some of those messages collide, the device waits and tries to retransmit.
 Hybrid network – are combinations of star, ring, and bus networks. For
example, a small college might use a bus network to connect building and
star and ring networks within certain buildings.
 FDDI (Fiber Distributed Data Interface) network – uses fiber-optic cable
with a duplex token ring topology. The FDDI network is being used for such
high-tech purposes as imaging, high-resolution graphics, and digital
videos.


71
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN

72
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

MAS.O-1320 MULTIPLE CHOICE


COMPUTER INFORMATION SYSTEMS FRANKLIN T. AGAMATA

Accounting information systems


1. You are working with a task force which has been mandated to develop an integrated
information system. The objective is to be able to harness computer power to make
information available to the right person in the company at the right time at the most cost
effective manner. Your present assignments are to determine the proper grouping of the
applications. What applications are not appropriately grouped?
A. Sales, account receivable, salesman’s commission, cash receipts, marketing equipment
modules
B. Production planning and scheduling, raw materials inventory and container
management, purchasing, sales forecasting modules
C. Bank reconciliation, accounts payable, disbursements, fixed assets, general ledger,
payroll modules.
D. Personnel information system, finished goods inventory, general ledger, non trade
receivables modules (rpcpa)

2. In a manual system, records of current activity are posted from a journal to a ledger. In a
computer system, current records from a (n)
A. Transaction file are updated to a master file.
B. Index file are updated to a master file.
C. Master file are updated to a year-to-date file.
D. Current balance file are updated to an index file. (rpcpa)

3. How is an Accounting Information System (AIS) distinguished from a Management


Information System (MIS)?
A. An AIS may either be manual or computer-based, an MIS is computer based.
B. An AIS is a subsystem within an MIS.
C. An AIS is control oriented and MIS is used exclusively for planning.
D. An AIS deals with financial information and MIS handles all other information. (rpcpa)

4. In an integrated computerized system, the following modules are logically linked with the
purchasing module except
A. Personnel database and compensating administrative modules.
B. Accounts payable, cash disbursement and bank reconciliation modules.
C. General ledger and fixed assets and modules.
D. Inventory and production and planning modules. (rpcpa)

5. The general ledger system is considered the “hub” of all the systems because
A. All the other system capture their data through the general ledger system.

73
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

B. The general ledger system is the central system that provides all the vital reports to
management and other interested parties.
C. All the other system use the same documents and forms as the general ledger system.
D. All the other system produce output that become inputs to the general ledger system.
(rpcpa)

6. To control purchasing and accounts payable, an information system must include certain
source documents. For a manufacturing concern like Fruit Processors Inc. these documents
should include
A. Purchase requisitions, purchase orders, receiving reports, and suppliers invoices.
B. Purchase orders, receiving reports, and inventory reports of goods needed.
C. Purchase requisitions, purchase orders, inventory reports of goods needed, and
suppliers invoices.
D. Purchase orders, receiving reports, and suppliers invoices. (rpcpa)

Systems Life Cycle


7. The process of developing specifications for hardware, software, manpower, and data
resources, and information products required to develop a system is referred to as
A. System feasibility study.
B. System design.
C. System implementation.
D. System analysis. (rpcpa)

8. Which of the following shows a logical diagram of the flow of data through all parts of the
data processing system?
A. Document flow chart.
B. Program flow chart.
C. Systems flow chart.
D. Activity flow chart. (rpcpa)

9. Workbench Corporation operates in several regions, with each region performing its data
processing in a region data center. The corporate Management Information System (MIS)
staff has developed a database management system to handle customer service billing. The
director of MIS recommended that the new system be implemented in Region 4 to ascertain
if the system operates in satisfactory manner. This type of conversion is called a
A. Crash conversion.
B. Pilot conversion.
C. Parallel conversion.
D. Direct conversion. (rpcpa)

10. The process of developing specifications of hardware, software, manpower, data resources,
and information products required to develop a system is referred to as
A. Systems design . 74
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

B. System implementation.
C. System analysis.
D. System feasibility study. (rpcpa)

11. Systems analysts are fundamentally responsible for the development of an organization’s
information system. Which of the following is/are the least likely function to be performed
by the system analyst?
A. Examining user information requirements
B. Developing, coding and testing computer programs
C. Design of computer application
D. Developing systems flowchart (rpcpa)

12. All of the following are included in the systems implementing process EXCEPT
A. Training.
C. Testing.
B. Documentation.
D. Systems design. (rpcpa)

13. The three major activities of system design are


A. User interface design, data manipulation, and output analysis.
B. Process design, output design, and output analysis.
C. User interface design, data design, and process design.
D. Data design, input validation, and processing.

14. Ordinarily, the analysis tool for the systems analyst and steering committee to sue in selecting
the best system alternative is
A. Pilot testing.
B. User selection.
C. Decision tree analysis.
D. Cost-benefit analysis.

15. In determining the need for system changes, several types of feasibility studies can be made.
The most commonly recognized feasibility studies are
A. Legal, environmental, and economic.
B. Environmental, operational, and economic.
C. Technical, economic, legal, and practical.
D. Technical, operational, and economic.

16. Two phases of systems planning are project definition and project initiation. All of the
following are steps in project initiation phase except
A. Preparing the project proposal.
B. Informing managers and employees of the project.
C. Assembling the project team. 75
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

D. Training selected personnel.

17. In the systems development cycle, coding


A. A form of testing and debugging.
B. Part of the detailed design phase.
C. Part of the data flow diagram.
D. A form of program maintenance.

18. Systems analysts are the personnel within an organization who are responsible for the
development of the company’s information system. Which one of the following functions is
least likely to be performed by a system analyst?
A. Design of computer applications.
B. Preparation of specifications for computer-programming.
C. Developing, coding, and testing computer programs.
D. Examining user information requirements.

19. The least risky strategy for converting from a manual to a computerized accounts receivable
system would be a
A. Direct conversion.
B. Parallel conversion.
C. Pilot conversion.
D. Database conversion.

20. Workwell Company operates in several regions, with each region performing its data
processing in a regional data center. The corporate management information systems (MIS)
staff has developed a database management system to handle customer service and billing.
The director of MIS recommended that the new system be implemented in the Southwestern
Region to ascertain of the system operates in a satisfactory manner. This type of conversion
is called
A. Parallel conversion.
B. Direct conversion.
C. Prototype conversion.
D. Pilot conversion.

21. The graphic portrayal of the flow of data and the information processing of a system,
including computer hardware, is best displayed in a
A. Data-flow diagram.
B. System flowchart.
C. Gantt chart.
D. Decision tables.

22. Errors are most costly to correct during


A. Programming. 76
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

B. Conceptual design.
C. Analysis.
D. Implementation.

23. The process of monitoring, evaluating, and modifying a system as needed is referred to as
A. Systems analysis.
B. Systems feasibility study.
C. Systems maintenance.
D. Systems implementation.

24. The process of learning how the current system functions, determining the needs of users,
and developing the logical requirements of a proposed system is referred to as
A. Systems maintenance.
B. Systems analysis.
C. Systems feasibility study.
D. Systems design.
25. The process of developing specifications for hardware, software, manpower, data resources,
and information products required to develop a system is referred to as
A. Systems analysis.
B. Systems feasibility study.
C. Systems maintenance.
D. Systems design.

26. An information system (IS) project manager is currently in the process of adding a system
analyst to the IS staff. The new systems analyst will be involved with testing the new
computerized system. At which stage of the systems development life cycle will the analyst
be primarily used?
A. Cost-benefit analysis.
B. Requirements definition.
C. Flowcharting.
D. Implementation.

27. Which one of the following is not considered a typical risk associated with outsourcing the
practice of hiring an outside company to handle all or part of the data processing?
A. Inflexibility.
B. Loss of control.
C. Loss of confidentiality.
D. Less availability of expertise
28. The advent of computers has far reaching impact on the accountancy profession. Whenever
considered, computerized demands extreme care to avoid the “horror stories” that may have
experienced. Among the critical areas for careful study are systems designs. Which of the
following is not related to system design?
77
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

A. It considers unnecessary emphasis on accuracy of certain types of economic data where


the costs to generate exceed the benefits produced.
B. Is there is too much breaking down of job functions, there will be time-consuming
rereading of data that must be understood before it can be processed.
C. It is a symbolic presentation of the decision making process showing alternative solutions
to a problem and the possible consequences.
D. If identical information should be shown on different documents, it must be captured
only once simultaneously. (rpcpa)

Systems Coding and Data Structure


29. Bloc codes
A. Are generally used to identify missing items from a set of documents or records.
B. Allow a user to number items sequentially.
C. Allow a user to assign meaning to particular segments of a coding software.
D. Are randomly calculated groups of numbers used as a control check.

30. Block coding does


A. Allow a user to number item sequentially.
B. Are randomly calculated groups of number used as a control check.
C. Allow a user to assign meaning to particular segments of coding schemes.
D. Use solely numeric coding techniques. (rpcpa)

31. Coding in data processing assigns a unique identification number or key to each data record.
Which one of the following statements about coding is incorrect?
A. A primary key in the main code used to store and locate records within a file.
B. Records can be sorted, and temporary files created, using codes other than their
primary keys.
C. Secondary keys are used when the primary keys cannot be found.
D. Secondary keys are used for alternative purposes including inverted files.

32. The indexed-sequential access method (ISAM) is an approach to the organization


A. In which each data records has a pointed field containing the address of the next record
in the list.
B. In which an index of record pointers of some of the file attributes are maintained in a
list.
C. That uses an algorithm to convert a record key into a storage address to assist with later
retrieval.
D. In which records are stored sequentially in a direct access file and organized by a
primary key stored in an index record.

33. A commonly used measure of the relative frequency of adds, deletes, and changes to a master
file during a specified time period is
A. Volatility. 78
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

B. The index ratio.


C. The frequency ratio.
D. The volume ratio.

Systems Controls
34. Program documentation is a control designed primarily to ensure that
A. Programs are kept up to date and perform as intended.
B. Programs do not make mathematical errors.
C. Programmers have access to the tape library or information on disk files.
D. Data have been entered and processed.
(rpcpa)

35. The most critical aspect regarding separation of duties within information system is between
A. Programmers and systems analyst.
B. Project leaders and programmers.
C. Data control and file librarian.
D. Programmers and computer operators.
(rpcpa)

36. Preventive controls are an integral part of virtually all accounting processing systems, and
much of the information generated by the accounting system is used for preventive control
purposes. Which of the following is not an essential element of a sound preventive control
system?
A. Documentation of policies and procedures.
B. Sound personnel practices.
C. Separation of responsibilities for the recording, custodial and authorization functions.
D. Implementation of state-of-the-art software and hardware. (rpcpa)

37. Some of the more important controls that relate to automated accounting information
systems are validity checks, limit checks, and sign tests. these are classified as
A. Input validation routines.
B. Control total validation routines.
C. Data process validation routines.
D. Output controls. (rpcpa)

38. Feedback, feedforward, and preventive controls are important types of control systems and
procedures for accounting information systems. Which of the following is in the correct order
of feedback, feedforward, and preventive control systems?
A. Inventory control, capital budgeting, and cash budgeting.
B. Cost accounting, variances, separation of duties, and cash planning.
C. Cash budgeting, capital budgeting, hiring qualified employees.
D. Cost accounting variances, cash budgeting, and organizational independence.
(rpcpa) 79
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

39. Edit checks in a computerized accounting system


A. Must be installed for the system to be operational.
B. Should be performed immediately prior to output distribution.
C. Should be performed on transactions prior to updating a master file.
D. Are easier to install after a system is operational. (rpcpa)

40. Which of the following does not achieve systems control over source data?
A. Registration at point of entry.
B. Prevention of the nonprocessing of data.
C. Grouping with control totals.
D. Sequential numbering. (rpcpa)

41. Which of the following represents a lack of internal control in a computer based information
system?
A. Any and all changes in application programs have the authorization and approval of
management.
B. Provisions exist to protect data files from unauthorized access, modification, or
destruction
C. Both computer operators and programmers have unlimited access to the programs and
data files
D. Provisions exist to ensure the accuracy and integrity of computer processing of all files
and reports. (rpcpa)

42. An on-line access control that checks whether the user’s code number is authorized to initiate
a specific type of transactions or inquiry is called
A. Compatibility test.
B. Password.
C. Limit check.
D. Field check. (rpcpa)

43. An auditor used data to verify the existence of controls in a certain computer program. Even
though the program performed well on the test, the auditor may still have a concern that
A. Generalized audit software must have been a better tool to use.
B. Date entry procedures may change and render the test useless.
C. The text data will not be relevant in subsequent audit periods.
D. The program tested is the same one used in regular production runs. (rpcpa)

44. Which of the following is not an advantage of using computers during the audit process?
A. Auditor can work independently of the auditee.
B. Working papers can be reviewed from a off-site location, thus saving on travel costs.
C. Auditor has access to records of remote sites.
D. Auditors can alter client data, if desired. 80
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

45. Preventive controls are


A. Usually more costly to use than detective controls.
B. Found only in general accounting controls.
C. Found only in accounting transaction controls.
D. Usually more cost beneficial than detective controls.

46. In the organization of the information systems function, the most important separation of
duties is
A. Not allowing the data librarian to assist in data processing.
B. Assuming that those responsible for programming the system do not have access to
data processing operations.
C. Having a separate information officer at the top level of the organization outside of the
accounting function.
D. Using different programming personnel to maintain utility programs from those who
maintain the application programs.

47. A critical aspect of a disaster recovery program plan is to be able to regain operational
capability as soon as possible. In order to accomplish this, an organization can have an
arrangement with its computer hardware vendor to have a fully operational facility available
that is configured to the user’s specific needs. This is best known as a(n)
A. Uninterruptible power system.
B. Parallel system.
C. Cold site.
D. Hot site.

48. Most of today’s computer systems have hardware controls that are built in by the computer
manufacturer. Common hardware controls are
A. Duplicate circuitry, echo check, and internal header labels.
B. Data file protection, cryptographic protection and edit checks.
C. Duplicate circuitry, echo check, and dual reading.
D. Duplicate circuitry, echo check, tape file protection and internal header labels.

49. Online access controls are critical for the successful operation of today’s computer systems.
To assist in maintaining control over such access, many systems use tests that are maintained
through an internal access control matrix consisting of
A. Authorized user code numbers, passwords, lists of all files and programs, and a record
of the type of access each user is entitled to have to each file and program.
B. Authorized user code numbers and passwords.
C. A list of controls in the online system and list of those individuals authorized to change
and adjust those controls along with a complete list of files in the system.
D. A completeness test, closed loop verification, and a compatibility test.
81
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

50. To properly control access to accounting database files, the database administrator should
ensure that database system features are in place to permit
A. Read-only access to the database files.
B. Updating from privileged utilities.
C. Access only to authorized logical views.
D. User updates of their access profiles.

51. Data processed by a computer system are usually transferred to some form of output medium
for storage. However, the presence of computerized output does not, in and of itself, assure
the output’s accuracy, completeness, or authenticity. For the assurance, various controls are
needed. The major types of controls for this area include
A. Transaction controls, general controls, and printout controls.
B. Activity listings, echo checks, and prenumbered forms.
C. Tape of disk output controls and printed output controls.
D. Input controls, type and disk output controls on a printed output controls.

52. Data input validation routine include


A. Terminal logs.
B. Passwords.
C. Hashtotals.
D. Backup controls.

53. In order to prevent, detect, and correct errors and authorized tampering, a payroll system
should have adequate controls. The best set of controls for a payroll system includes
A. Batch and hash totals, record counts of each run, proper separation of duties,
passwords and user codes, and backup copies of activity and master files.
B. Employee supervision, batch totals, record counts of each run, and payments by check.
C. Passwords and user codes, batch totals, employee supervision, and record counts of
each run.
D. Batch totals, record counts, user codes, proper separation of duties, and online edit
checks.

54. An employee in the receiving department keyed in a shipment from a remote terminal and
inadvertently omitted the purchase order number. The best systems control to detect this
error would be
A. Batch total.
B. Completeness test
C. Sequence check.
D. Reasonableness test.

55. Edit checks in a computerized accounting system


A. Are preventive controls.
B. Should be performed on transactions prior to updating a master file. 82
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

C. Must be installed for the system to be operational.


D. Should be performed immediately prior to output distribution.

56. In auditing computer-based systems, the integrated test facility (ITF)


A. Allows the auditor to assemble test transactions and run them through the computer
system to test the integrity of controls on a sample data base.
B. Is a set of specialized software routines that are designed to perform specialized audit
tests and store audit evidence.
C. Is a concurrent audit technique that establishes a special set of dummy master files and
enters transactions to test the programs using the dummy files during regular
processing runs.
D. Uses an audit log to record transactions and data having special significance during
regular processing runs.

57. A company makes snapshot copies of some often-used data and makes them available in files
on the mainframes. Authorized users can then download data subsets into spreadsheet
programs. A risk associated with this means of providing data access is that
A. Data replicas may not be synchronized.
B. Data fragments may lack integrity.
C. Data transactions may be committed prematurely.
D. Data currency many be maintained.

Management information systems, etc.


58. There are different levels of business application systems in computerized operations. in
many cases, the applications involve the integration of the transaction level of processing
with such business functions as production, marketing, human relations and finance to
provide the different levels of people with required information for planning and control. This
is called
A. Transaction level.
B. Management information system level.
C. Decision support system level.
D. Office automation system level. (rpcpa)

59. A decision support system (DSS) is best characterized as


A. Interactive system.
B. Computer-integrated manufacturing system.
C. Transaction processing system.
D. Data base management system. (rpcpa)

60. Decision support systems in computerized environment have certain desirable characteristics
except
A. Flexible enough to accommodate a variety of management styles.
83
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

B. Supports decision-makers at all levels but is most effective at the tactical and strategic
levels.
C. Executed according to pre-established production schedule.
D. Is capable of interfacing with corporate database. (rpcpa)

61. This concept advocates that information is valuable resource and must therefore be managed
like other factors of production, manpower, materials and money. This is
A. Integrated information system.
B. Information resource management.
C. Systems audit.
D. Systems security management. (rpcpa)

62. A function-based information system is designed for the exclusive support of a specific
application area and its database and procedures are often independent of other systems.
Hence, certain data for an accounting system for instance, would be duplicated in an
inventory system. Data redundancy in such cases is expensive. The information system which
shares a common database, minimizes data redundancy and enhances interdepartmental
activity coordination is
A. Communication connectivity.
B. Wide area working.
C. Time-sharing system.
D. Integrated information system. (rpcpa)

63. An executive information system (EIS) focuses on long range objective and gives immediate
information about an organization’s critical success factors. It can be used on computers of
all sizes. It is normally used by executives at the highest organizations levels. All of the
following statements apply to EIS except
A. It is likely to be one of the most widely used and the large part of the information
subsystems in a business organization.
B. It provides top executives with immediate and easy access to information in a highly
interactive format.
C. It provides information in a highly aggregated form.
D. It helps executives monitor business combinations in general and assist in strategic
planning to control and operate the entity. (rpcpa)

64. Which of the following terms best describes a decision support system (DSS)?
A. Management reporting system.
B. Formalized system.
C. Interactive system.
D. Accounting information system.

65. Which group of characteristics best describes decision support systems?


84
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

A. Analytical models, specialized databases, and interactive computer-based modeling


processes.
B. Analytical models, specialized databases, interactive computer-based modeling
processes, and the decision maker’s own insights and judgments.
C. Analytical models, programming models, application models, and interactive computer-
based modeling processes.
D. Expert systems, model-based information electronic data interchange, and the decision
maker’s own insights and judgments.

66. Which one of the following statements about an executive information system (EIS) is
incorrect? The EIS
A. Provides top executives with immediate and easy access to information in a highly
interactive format.
B. Top executives monitor business conditions in general and assists in strategic planning
to control and operate the company.
C. Is designed to accept data from many different sources, to combine, integrate, and
summarize the data; and to display the data in a format that is easy to understand and
use.
D. Is likely to one of the most widely used and the largest of the information subsystems
in a business organization.

67. An executive information system (EIS) has all of the following characteristics except
A. Focusing on obtaining strategic objectives.
B. Giving immediate information about an organization’s critical success factors.
C. Providing information from nontraditional computer sources.
D. Providing advice and answers to top management from a knowledge-based system.

68. How is an accounting information system (AIS) distinguished from a management information
system (MIS)?
A. An AIS deals with financial information; MIS handles all other information.
B. An MIS may be either manual or computer based; an MIS is computer based.
C. An MIS is a subsystem within an MIS.
D. An AIS is control oriented; an MIS is used exclusively for planning.

69. An accounting information system (AIS) must include certain source documents in order to
control purchasing and accounts payable. For a manufacturing organization, the best set of
documents should include
A. Purchase requisitions, purchase orders, inventory record of goods needed, and vendor
invoices.
B. Purchase orders, receiving reports, and inventory reports of goods needed.
C. Purchase orders, receiving reports, and vendor invoices.
D. Purchase requisitions, purchase orders, receiving reports, and vendor invoices.
85
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

70. Which one of the following statements about an accounting information system (AIS) is
incorrect?
A. AIS supports day-to-day operations by collecting and sorting data about an
organization’s transactions.
B. The information produced by AIS is made available to all levels of management for use
in planning and controlling an organization’s activities.
C. AIS is best suited to solve problems where there is great uncertainty and ill-defined
reporting requirements.
D. AIS is often referred to as a transaction processing system.
71. Which one of the following features is least likely to apply to the transaction processing cycle
of an accounting information system?
A. Data records are chiefly historical in nature.
B. Most of the sources of data are an organization’s recurring transactions.
C. Data are usually financial in nature.
D. Data records are the basis of predictive systems.

72. Which one of the following technological elements of computer-based information systems
has the least effect in driving the changes that are currently occurring in the workplace?
A. Advances in microcomputer hardware and software.
B. Office automation and teleprocessing.
C. Decision support systems and artificial intelligence. (AI).
D. Advances in disaster recovery systems.

Networking
73. A network of computers located throughout an organization’s different facilities to fulfill
information processing needs is called:
A. Interactive processing.
B. On-line processing.
C. Local area network.
D. Distributed data processing. (rpcpa)

74. The technology that permits a computer in one company, an application examples of which
is computerized billings and payments among companies is
A. Transfer system method.
B. Electronic data interchange.
C. Integrated information systems.
D. Local area network. (rpcpa)

75. An example of this management information system is the airline reservation system where
all transactions are record as they occur to render the system continuously up-to-date
A. Network system. 86
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

B. Real time information system.


C. Online information system.
D. Batch system. (rpcpa)

76. The concept of timeliness of data availability is most relevant to


A. Computerized systems.
B. Online systems.
C. Packaged software.
D. Microsystems. (rpcpa)

77. What type of EDP system is characterized by data that are assembled from more than one
location and records that are updated immediately?
A. On-line real-time system.
B. Batch processing system.
C. Microcomputer system.
D. Minicomputer system. (rpcpa)

Computer Hardware
78. All of the following are computer input devices except a (an)
A. Plotter.
B. Magnetic ink character recognition device.
C. Mouse.
D. Light pen. (cma)

79. The input device used in a department store that allows a sales clerk to pass a light pen over
the price tag to record the purchase is a (an)
A. Mark-sense reader.
B. Touch-tone device.
C. Optical scanner.
D. Laser bar code scanner. (cma)

80. Banks are required to process many transactions from paper documents (e.g., checks, deposit
slips) during the course of an average business day. This requires a reliable, yet economical,
form of input. The most common source automation device used by banks is
A. A disk pack.
B. Bar coding.
C. Magnetic tape.
D. Magnetic ink character recognition. (cma)

81. Access time in relation to computer processing is the amount of time it takes to
A. Transmit data from a remote terminal to a central computer.
B. Complete a transaction from initial input to output.
C. Perform a computer instruction. 87
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

D. Retrieve data from memory.

Computer Software
82. All of the following are examples of computer software except a (n)
A. Database management system.
B. Language translator.
C. Telephone modem.
D. Word processing package.

83. Microcomputer systems have enhanced use with systems software and applications
software. Which one of the following statements concerning microcomputer systems is false?
A. Database management systems are available for microcomputers.
B. An operating system program is a critical software for microcomputers.
C. Electronic spreadsheet package for microcomputers.
D. Integrated packages are examples of operating systems for microcomputers.
E.
84. All of the following are characteristics of computer machine language except.
A. Internal binary code.
B. Hexadecimal code.
C. Assembly language.
D. On/Off electrical switches.

85. Mainframe computer systems include several advanced processing procedures. Two of the
most common processing procedures are multiprocessing and multiprogramming. Which one
of the following statements about there processing procedures is false?
A. Multiprocessing usually involves two or more computers functioning simultaneously.
B. Multiprogramming allows multiprogramming to be executed at exactly the same time.
C. Multiprogramming switches back and forth between programs during processing.
D. Multiprocessing allows the sharing of a central memory during processing.

86. A software tool infrequently used to select or access items in the database is most likely a(n)
A. Report generator.
B. Program generator.
C. Application generator.
D. Query utility program.

87. A software tool used for ad hoc, online access to items in a database would most likely the
a(n)
A. Query utility program.
B. Application generator.
C. Report generator.
D. Terminal emulation software.
88
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

88. Computer manufacturers are now installing software programs permanently inside the
computer as part of the main memory to provide protection from erasure or loss if there is
interrupted electrical power. This concept is known as
A. File integrity.
B. Software control.
C. Firmware.
D. Random-access memory (RAM).

89. Which one of the following statements most accurately represents the basic steps in
designing spreadsheet model?
A. Define the problem, identify inputs and outputs, develop assumptions and on criteria,
and document formulas.
B. Identify inputs and outputs, develop assumptions and decision criteria, document
formulas, and build macros.
C. Define the problem, develop assumptions and decision criteria, develop test cases, and
build macros.
D. Develop assumptions and decision criteria, document formulas, develop test cases, and
run test cases.
90. A characteristics of microcomputer system that displays more than one program on the
screen at the same time, places such program in its own area of the screen, but permits only
one program to be active is
A. Windowing.
B. Distributed processing.
C. Context switching.
D. File extension.

Processing Modes
91. The time interval between the instant at which as instruction control unit initiates a call for
data and the instant at which delivery of the data is completed is:
A. Access time.
B. Compliance time.
C. Idle time.
D. Throughput time. (rpcpa)

92. In computer operations, data are encoded before processing, can be done by the computer.
These statements refer to batch processing except:
A. The processing of data collected in advance so that each accumulation is processed in
the same run.
B. The technique of executing a set of computer programs such that each completed before
the next program of the set is started.
C. The processing of related transactions that have been grouped together.
D. The method of using the computer system that allows a number of users to execute
programs currently and to interact with the programs during execution. (rpcpa) 89
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

93. A system with several computers that are connected for communication and data
transmission purpose, but were each computer can also process its own data, is known as a
A. Hybrid system.
B. Distributed data processing network.
C. Multitask network.
D. Decentralized and computer operators. (rrpcpa)

94. It is both a technological and an organizational concept based on the premise that
information systems can be made more responsive to users by placing computer hardware
and personnel physically close to the people who use them
A. Distributed data processing.
B. Close-ties computing.
C. Customer–oriented processing.
D. Departmental computing. (rpcpa)

95. A system that permits suppliers and buyers to have direct access to portions of each other’s
databases, including date, to enhance service and deliveries is
A. Cooperative processing.
B. Electronic data interchange.
C. Interactive processing.
D. Electronic mail. (rpcpa)
96. Batch processing
A. Is not used by most businesses because it reduces the audit risk.
B. Processes individual transactions as they occur.
C. Allows users to inquire about groups of information contained in the system.
D. Accumulates transaction records into groups for processing against the master file.

97. Transaction processing systems frequently support the inquiry of online database users.
Inquiry processing includes all of the following characteristics except that
A. Either batch or real-time processing may be used.
B. It is dependent on the use of telecommunication networks and database management
query languages.
C. Responses are in a prespecified format displayed on the end user’s terminal.
D. End-users are allowed to make changes to the records retrieval.

98. The concept of timeliness of data availability is most relevant to


A. Payroll systems.
B. General ledger systems.
C. Manual systems.
D. Online systems.

99. An interactive system environment is best characterized by 90


www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

A. Data files with records arranged sequentially.


B. The processing of groups of data at regular intervals.
C. Sorting the transaction file before processing.
D. The processing of data immediately on input.

100. A system that has several minicomputers connected for communication and data
transmission purposes but also enables each computer to process its own data is known as
A. Distributed data processing network.
B. Centralized network.
C. Decentralized network.
D. Multidrop network.

101. In traditional information systems, computer operators are generally responsible for backing
u[p software and data files on a regular basis. In distributed or cooperative systems, ensuing
that adequate backups are taken is the responsibility of
A. User management.
B. Systems programmers.
C. Data entry clerks.
D. Tape libraries.

102. An insurance company is planning to implement new standard software in all its local offices.
The new software has a test response time, is very user friendly, and was developed with
extensive user environment. The new software captures, consolidates, edits, validates, and
finally transfers standardized transaction data to the headquarters mainframe. Local
managers, who were satisfied with existing locally written microcomputer applications,
opposed the new approach because they anticipated
A. Increased workloads.
B. Lengthy retraining.
C. More accountability.
D. Less computer equipment.

103. The system that permits the computers in a distributed processing network to share the use
of another and user’s application program is
A. Electronic data interchange.
B. Interactive processing.
C. Executive support system.
D. Cooperative processing.

104. Today organizations are using microcomputers for data presentation because microcomputer
use, compared with mainframe use, is more
A. Controllable.
B. Conductive to data integrity.
C. Reliable. 91
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

D. Cost effective.

Databases
105. All of the following are methods for distributing a relational database access multiple servers
except
A. Snapshot (making a copy of the database for distribution).
B. Replication (creating and maintaining replica copies at multiple locations).
C. Normalization (separating the database into logical tables for easier user processing).
D. Fragmentation (separating the database into parts and distributing where they are
needed).

106. In a database, there are often condition that constrain database records. For example, a sales
order cannot exist unless the corresponding customer exists. This kind of constraint is an
example of
A. Normalization.
B. Entity integrity.
C. Internal scheme.
D. Referential integrity.

107. In a database system, looking of data helps preserve data integrity by permitting transactions
to have control of all the data needed to complete the transactions. However, implementing
a looking procedure could lead to
A. Inconsistent processing.
B. Rollback failures.
C. Unrecoverable transactions.
D. Deadly embraces (retrieval contention).

108. One advantage of database management system (DBMS) is


A. The responsibility and control assumed by each organizational unit for its own data.
B. The decrease in the cost of the data processing department as users become
responsible for establishing their own data handling techniques.
C. A decreased vulnerability because the database management system has numerous
security controls to prevent disasters.
D. The independence of the data from the application programs, which allows the
programs to be developed for the user’s specific needs without concern for data
capture problems.

109. A flat file structure is used in database management systems (DBMS) when
A. A company network structure is employed.
B. A network based structure is used and a complex database scheme is developed.
C. A simple network structure is employed.
D. A relational database model is selected for use.
92
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

110. The database approach to systems and the resulting concept of database management
systems have several unique characteristics not found on traditional systems, specifically file-
oriented systems. Which one of the following statements does not apply to database
oriented-systems?
A. Database systems have data independence; that is, the data and the programs are
maintained separately except during processing.
B. Database systems obtain a data definition language that helps describe each schema
and subschema.
C. The database administrator is the part of the software package that instructs the
operating aspects of the program when data are retrieved.
D. A primary goal of database systems is to minimize data redundancy.

111. The financial accounting database has several critical relationships that must be properly
maintained if the system is to function in an orderly manner. Which one of the following
statements about the financial accounting database is incorrect?
A. The general ledger is a master file in which a record is maintained for each and every
account in the organization’s accounting system.
B. Subsidiary ledgers are master files containing accounting records by specific account
categories.
C. Cash disbursements journals are complete records of each transaction that reduces
cash.
D. Transaction records include cross-references between general ledger files, subsidiary
account numbers, and source documents numbers.

112. In an overall description of database, the names of data elements, their characteristics, and
their relationship to each other are defined by using a
A. Data definition language.
B. Data control language.
C. Data manipulation language.
D. Data command interpreter language.

113. The increase used of data processing systems makes managing data and information a major
information service function. Because the databases of an organization are used for many
different applications, they are coordinated and controlled by a database administrator. The
functions of database administrator are:
A. Data input preparation, database design, and database operations.
B. Database design, database operation, database security.
C. Database design, database operation, and equipment operations.
D. Database design, software support, and database security.

114. The function of data dictionary is to


A. Mark the boundary between two consecutive transactions.
B. Organize and share information about objects and resources. 93
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

C. Specify systems users.


D. Specify privileges and security rules for objects and resources.

Electronic Data Interchange (EDI), ERP, etc.


115. A system that permits suppliers and buyers to have direct access to portions of each others’
databases, including inventory data to enhance service and deliveries is
A. Electronic mail.
B. Interactive processing.
C. Electronic data interchange.
D. Distributed processing.

116. Which of the following is likely to be a benefit of electronic data interchange (EDI)?
A. Increased transmission speed of actual documents.
B. Improved business relationships with trading partners.
C. Decreased liability related to protection of proprietary business data.
D. Decreased requirements for backup and contingency planning.

117. The emergence of electronic data interchange (EDI) as standard operating practice increases
the risk of
A. Unauthorized third-party access to systems.
B. Systematic programming errors.
C. Inadequate knowledge bases.
D. Unsuccessful systems use.

118. A control a company could use to detect forged EDI messages is to


A. Acknowledge all messages initiated externally with confirming messages.
B. Permit only authorized employees to have access to transmission facilities.
C. Delay action on orders until a second order is received for the same goods.
D. Write all incoming messages to a write-once/read-only device for archiving.

119. Before sending or receiving EDI messages, a company should


A. Execute a trading partner agreement with each of its customers and suppliers.
B. Reduce inventory levels in anticipation of receiving shipments.
C. Demand that all of its suppliers implement EDI capabilities.
D. Evaluate the effectiveness of its use of EDI transmissions.
120. The best approach for minimizing the likelihood of software incompatibilities leading to
unintelligible messages is for a company and its customers to
A. Require their software from the same software vendor.
B. Agree to synchronize their updating of EDI-related software.
C. Agree to use the same software in the same ways indefinitely.
D. Each write their own version of the EDI-related software.

94
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

121. As organizations move to implement EDI, more of them are turning to the use of value-added
networks (VANs). Which of the following would not normally be performed by a VAN?
A. Store electronic purchase orders of one organization to be accessed by another
organization.
B. Provide common interfaces across organizations thereby eliminating the need for one
organization to establish direct computer communication with a trading partner.
C. Maintain a log of all transactions of an organization with its trading partner.
D. Provide transactions from client’s computer system.

122. In a review of an EDI application using a third-party service provided, the auditor should
i. Ensure encryption keys meet ISO standards.
ii. Determine whether an independent review of the service provider’s operation has
been conducted.
iii. Verify that only [public-switched data networks are used by the service provider.
iv. Verify that the service provider’s contracts include necessary clauses, such as the
right to audit.

A. I and II.
B. I and IV.
C. II and III.
D. II and IV.

123. After implementing EDI with suppliers, a company discovered a dramatic increase in prices it
paid the single suppler of some special materials for its primary product line. After consulting
with the supplier, the company determined that the supplier had assumed the risk of not
having inventory and raised its prices accordingly since the company was the only buyer for
the special materials. The best approach for managing inventory in this situation is for the
company to
A. Gave the supplier more information about expected use of the materials.
B. Demand that the supplier reduce the prices of the materials.
C. Hire another supplier to replace the one charging higher prices.
D. Change its product line so the special materials are no longer needed.

124. If the cycle time for manual purchase orders is 25 days, composed of 4 days of preparation, 3
days in the mail, 14 days in process at the supplier, and 4 days for delivery of raw materials,
the shortest possible cycle time if a company fully implemented EDI suppliers would be
A. 25 days.
B. 18 days.
C. 4 days.
D. 1 day.

125. Which of the following risks is not greater in an electronic fund transfer (EFT) environment
than in manual system using paper transactions? 95
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

A. Unauthorized access and activity.


B. Duplicate transaction processing.
C. Higher cost per transaction.
D. Inadequate backup and recovery capabilities.

126. Which of the following is a risk that is higher when an electronic funds transfer (EFT) system
is used?
A. Improper change control procedures.
B. Unauthorized access and activity.
C. Insufficient online edit checks.
D. Inadequate backups and disaster recovery procedures.

Artificial Intelligence
127. Expert systems consists of
A. Software packages with the ability to make judgment decisions.
B. A panel of outside consultants.
C. Hardware designed to make judgment decisions.
D. Hardware and software used to automate routine tasks.

128. Which one of the following incorporates making the best decisions possible, using a logical
approach in solving problems, using reasoning, having the capacity to learn, and allowing
subjective inputs and outputs?
A. Expert systems.
B. Decision support systems.
C. Multi-networking.
D. Neural networks.

129. Prudent managers will recognize the limits within which expert systems can be effectively
applied. An expert system would be most appropriate to
A. Compensate for the lack of certain technical knowledge within the organization.
B. Help make customer-service jobs easier to perform.
C. Automate daily managerial problem-solving.
D. Emulate human expertise for strategic planning.

130. The processing in knowledge-based systems is characterized by


A. Algorithms.
B. Deterministic procedures.
C. Heuristics.
D. Simulations.

131. A bank implemented an expert system to help account representatives consolidate the bank’s
relationships with each customer. The expert system has 96
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

A. A sequential control structure.


B. Distinct input/output variables.
C. A knowledge base.
D. Passive data elements.

132. For which of the following applications would the use of fuzzy logic system be the most
appropriate artificial intelligence (AI) choice?
A. Assigning airport gates to arriving airline flights.
B. Forecasting demand for spare auto parts.
C. Verifying expressway tunnels.
D. Diagnosing computer hardware problems.

Data Communication and Networks


133. The encryption technique that requires two keys, a public key that is available to anyone for
encrypting and private key that is known only to the recipient for decrypting messages is
A. Rivest, Shamir and Adelman (RSA)
B. Data encryption standard (DES).
C. Modulator-demodulator.
D. A cipher lock.

134. The use of message encryption software


A. Guarantees the secrecy of data.
B. Requires manual distribution of keys
C. Increased system overhead.
D. Reduces the need for periodic password changes.

135. An insurance firm uses a wide area network (WAN) to allow agents away from the home office
to obtain current rates and client information and to submit approved claims using notebook
computers and dial-in modems. In this situation, which of the following g methods provide
the best data?
A. Dedicated phone lines.
B. Call-back features.
C. Frequent changes of user Ids and passwords.
D. End-to-end data encryption.

136. An electronic meeting conducted between several parties of remote sites is referred to as.

A. Teleprocessing.
B. Interactive programming.
C. Telecommuting.
D. Teleconferencing.

97
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

137. Large organizations often have their own communication networks for transmitting and
receiving voice, data, and images. Very small organizations, however, are unlikely to be able
to make the investment required by their own networks and are more likely to use
A. Public switched lines.
B. Fast-packet switches.
C. Standard electronic mail systems.
D. The internet.

138. A local area network (LAN) is best describe as


A. Computer system that connects computers of all sizes, workstations, terminals, and
other devices within a limited proximity.
B. System to allow computer units to meet and share ideas and information.
C. Electronic library containing millions of items of data that can be reviewed, retrieved,
and analyzed.
D. Method to offer specialized software, hardware, and data handling technicians that
improve effectiveness and reduce costs.

139. Management of a financial services company is considering strategic decisions concerning the
expansion of its existing local area network (LAN) to enhance the firm’s customer service
function. Which of the following aspects of the expanded system is the least significant
strategic issue for management?
A. How the expanded system can contribute to the firm’s long-range business plan.
B. How the expanded system would support daily business operations.
C. How indicators can be developed to measure how well the expanded system achieves
its business objectives.
D. How the expanded system will contribute to the reduction of operating costs.

140. If a system does not have a mainframe computer or a file server but does processing within
a series of microcomputers, the network is a(n)
A. Offline processing system.
B. Expert system.
C. Direct access system.
D. Peer-to-peer program.

141. Which one of the following is considered to be a server in a local area network (LAN)
A. The cabling that physically interconnects the nodes of the LAN.
B. A device that stores program and data files for users of the LAN.
C. A device that connects the LAN to other network.
D. A workstation that is dedicated to a single user on the LAN.

142. When connecting with two or more electronic mail systems, which of the following is a major
security issue?
A. Inability to encrypt messages going between network gateways. 98
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC

B. Loss of critical text within messages.


C. Inability of receiving users to acknowledge receipts of messages.
D. Inability to keep backup consist of messages.

143. A company has a very large, widely dispensed internal audit program. Management wants
to implement a computerized system to facilitate communications among auditors. The
specifications require that auditors have the ability to place messages in a central electronic
repository where all auditors can access them. The system should facilitate information on a
particular topic. Which type of system would best meet these specifications?
A. Electronic data interchange (EDI).
B. Electronic bulleted board system,
C. Fax/modem software.
D. Private branch exchange (PEX).

144. In distributed data processing, a ring network


A. Has all computers linked to a host computer and each linked computer routes all data
through the host computer.
B. Links all communication channels to form a loop, and each link passes communications
through the neighbor to the appropriate location.
C. Attaches all channel messages along one common line with communication to the
appropriate location via direct access.
D. Organize itself along hierarchical lines of communication usually to a central host
computer.

 done 

99
www.certscollege.org uc cpa review www.reviewer-online.org

S-ar putea să vă placă și