Ais Chapter 2
Ais Chapter 2
Ais Chapter 2
2-1
Chapter 2:
Information Technology and AISs
Introduction
The Importance of Information Technology
to Accountants
Input, Processing and Output Devices
Secondary Storage Devices Hardware
Chapter
2-3
The Importance of IT to
Accountants
Information Security
Securing and Controlling Information
Distribution
Identify and Access Management
Backup, Disaster Planning and Business
Continuity
Secure Electronic Collaboration
2013 Update
http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLOGY/RESOURCES/TOPTECHNOL Chapter
OGYINITIATIVES/Pages/2013TTI.aspx 2-6
The AICPA’s Top 10 Information
Technologies for 2010
Paperless Technology
Laptop Security
Mobile Computing
Chapter
2-9
Input Devices
Chapter
2-11
Input Devices
Chapter
2-12
Common Input Devices
Chapter
2-13
Input Devices
Digital Cameras
Biometric Scanners
Behavioral systems
Physiological systems
Enrollment
Hamming distance
Chapter
2-14
Central Processing Units and
Primary Memory
Microprocessors
Primary Memory
Chapter
2-15
Central Processing Units
Chapter
2-16
Output Devices
Printers
Video output
Multimedia
Chapter
2-17
Importance of Secondary
Storage Devices
Primary Memory
Volatile Memory
Lost electrical power, lost memory
Secondary Storage
Mass Storage or Auxiliary Storage
Maintain data in permanent files
Chapter
2-18
Secondary Storage Devices
Chapter
2-19
Multiplatter Hard Disk
Chapter
2-20
Secondary Storage Devices
CD-ROMs
Write-once, read-many (WORM) media
DVDs
Blu-Ray Discs
Flash memory
Image processing
Record Management Systems
Chapter
2-21
Study Break #2
The acronyms POS, MIC, and OCR are most closely associated
with:
A. Input devices
B. Processing devices
C. Output devices
D. Communication devices
Chapter
2-22
Study Break #3
A. CD-ROM disk
B. DVD disk
Chapter
2-23
Data Communications
and Networks
Chapter
2-24
Data Communications
and Networks
Chapter
2-25
Advantages of a LAN
Facilitating communications
Sharing computer equipment
Sharing computer files
Saving software costs
Enabling unlike computer equipment to
communicate
Chapter
2-26
Data Communications
and Networks
Chapter
2-27
Architectures
Chapter
2-30
Multi-tier (i.e., n-tier)
Architectures
Chapter
2-31
Data Communications
and Networks
Cloud Computing
Chapter
2-32
RFID Example
Chapter
2-33
NFC Example
Chapter
2-34
Computer Software
Operating Systems
Application Software
Programming Languages
Chapter
2-35
Operating Systems
Chapter
2-36
What an application sees…
From http://www.karbosguide.com
Chapter
2-37
Application Software
Chapter
2-39
Study Break #4
A. OCR
B. Modem services
C. Virtual storage
D. Cloud computing
Chapter
2-40