IT Summary
IT Summary
IT Summary
INFORMATION TECHNOLOGY
Professional Stage Knowledge Level
Summary
Page | 1
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
TABLE OF CONTENTS
Page | 2
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
CHAPTER 1
INFORMATION WITHIN ORGANIZATION
1. Data: (Page 20) Data is the raw materials of information. A data processing system processes
data into information.
2. Information: (Page 20) Information is the data that has been processed into a form that is
meaningful to the recipient and is of real or perceived value in current or progressive decision.
4. Usefulness of data:
Companies that sell product may mail order need to keep up to date lists of name and
addresses of customers who may be interested in making a purchase. This data is very
valuable and can be sold to other “like” companies. What would make this list become of
little value?
What could be added to the data so that it can be kempt up to date?
Is the cost of keeping data up to date, accurate and complete worthwhile to the
company?
5. Difference between data and information: (Page 23) Data can be in the form of numbers,
characters, symbols or even pictures. A collection of these data which conveys some meaningful
idea is information.
SL Data Information
1 Raw, unanalyzed facts, figures and events Useful knowledge derived from the data.
2 Data is unprocessed instructions. If data is processed will become information.
3 Data is material Information is gathering all material to be it.
4 Data is raw material for data processing. Information is data that has been processed
Data relates to fact, event and in such a way as to be meaningful to the
transactions. person who receives it. It is anything that is
communicated.
5 Data is raw material which is unprocessed Information is data that has been processed,
for data processing. It is normally entered it can be useful for the person receiving
by input devices into computer and it can since it brings meaning. It can be understood
be in any form, useable or not. It does by human and normally convey by output
not bring meaning, some of them is even devices to people.
in computer language.
Page | 3
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Information must be –
Accurate
Complete
Up-to-date
7. Impact of information systems on organization and business firms: (Page 25) From the
point of view of economics, IT changes both the relative costs of capital and the costs of
information. Information systems technology can be viewed as a factor of production that can be
substituted for traditional capital and labor. IT also obviously affects the cost and quality of
information and changes the economics of information. Information technology helps firms
contract in size because it can reduce transaction costs – the costs incurred when a firm buys on
the market pace what it cannon make itself. Information technology, especially the use of
networks, can help firms lower the cost of market participation (transaction costs), making it
worthwhile for firms to contract with external suppliers instead of using internal sources.
11. Decision Support System: (Page 39) DSS can be defined as a system that provides tools to
managers to assist them in solving semi structured and unstructured problems in their own
somewhat personalized way. A DSS is not intended to make decisions for managers, but rather to
Page | 4
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
provide managers with a set of capabilities that enables them to generate the information
required by them in making decisions. Examples of DSS in Accounting are:
Cost Accounting System
Capital Budgeting System
Budget Variance Analysis System
General Decision Support System
15. Transaction Processing System: (Page 45) TPS at the lowest level of management is an
information system that manipulates data from business transactions. A TPS involves the
following activities:
Capturing date to organize in files or databases
Processing of files/databases using application software
Generating information in the form of reports
Processing of queries from various quarters of the organization
16. Management Information Systems (MIS): (Page 46 & 49) It is an integrated user-machine
system designed for providing information to support operational control, management control
and decision making functions in an organization. A good MIS provides managers with
Page | 5
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
appropriate information at the right time. It also presents information in the right amount of
detail according to the level of management.
18. Executive Information Systems (EIS): (Page 46) It is sometimes referred to as an executive
support system (ESS) is a DSS that is designed to meet the special needs of top-level managers.
Any distinction between the two usually is because executive support systems are likely to
incorporate additional capabilities such as electronic mail.
22. Knowledge-based system: (Page 52) A knowledge-based system (KBS) is a system where all
the expert human knowledge covering particular topic is brought together and made available to
the user through a computer system which uses the facts in its knowledge base by applying rules
that may sensibly be applied to the knowledge. (Page 52)
Page | 6
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
amount of data in the knowledge base is reduced until there is only a small amount of
relevant data which must provide the answer to the query.
Advice Giving: An advice giving system is one that follows some process being done and
then offers advice on how to proceed if something needs to be done or goes wrong.
Decision Making: A decision making knowledge based system is a system which
understands what is happening in a system and has been given enough rules to be able to
make and carry out decisions without further intervention.
Page | 7
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
CHAPTER 2
INFORMATION TECHNOLOGY ARCHITECTURE
1. Information System: (Page 76) Information system is a mechanism that helps people to
collect, store, organize and use information. Information system can be defined technically as a
set of interrelated components that process, store and distribute information to support decision
making and control in an organization. In addition to support decision making, coordination and
control, information system may also help managers and workers analyze problems, visualize
complex subjects and create new problems.
Finance and accounting system: The finance system is responsible for managing the
firm’s assets and accounting system is responsible for maintaining and managing the
firm’s financial records. This system deals with:
o Accounts receivable
o Budgeting
o Profit planning
Human resource system: the human resource is responsible for attracting, developing
and maintaining the firm’s workforce. This system deals with:
o Training and development
o Compensation analysis
o Human resources planning
Page | 8
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
4. System: (Page 82) System is a collection of some integrated components that works to
accomplish a specific task. A system must satisfy the following properties:
Each system consists of several components
There must be a logical relation between the components
The components of a system should be controlled in a way such that the specific task can
be accomplished.
Page | 9
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
From commercial perspective software can be classified into three major classes:
A. Commercial software: Commercial software requires payment before it can be used
and includes all the program’s features, with no restrictions or time limits.
B. Freeware/ Open source: Freeware is free to use and does not require any payment
from the user. Open-source software (OSS) is computer software that is available in
source code form for which the source code and certain other rights normally reserved
for copyright holders are provided under a software license that permits users to study,
change and improve the software.
C. Shareware: Shareware is software that is distributed free on a trial basis with the
understanding that the user may need or want to pay for it later.
Page | 10
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
11. Data structure: Data structure is the structure how data is organized in logical or mathematical
model or a particular organization of data.
Array: A[1], A[2], A[3],……., A[N],
Record: A record is a collection of related data items, each of which is called a filed or
attribute.
12. Data Analysis: (Page 96) Data analysis is a process in which raw data is ordered and organized
so that useful information can be extracted from it. Over the course of the data analysis process,
the raw data is ordered in a way which will be useful. Charts, graphs and textual write-ups of
data are all forms of data analysis. These methods are designed to refine and distill the data so
that one can glean interesting information without needing to sort through all of the data on their
own.
13. Data Validation: (Page 96) Data validation is the process of ensuring that a program operates
on clean, correct and useful data. It uses routines, often called “validation rules” or “check
routines”, that check for correctness, meaningfulness and security of data that are input to the
system.
15. Database Management System: (Page 99) A database management system (DBMS) is
designed to manage a large body of information. It aids in the storage, manipulation, reporting,
management, and control of data.
Page | 11
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Automated Optimization
Advantages:
Reduced data redundancy
Reduced updating errors and increased consistency
Greater data integrity and independence from applications/programs
Improved data access to users through use of host and query languages
Improved data security
Reduced data entry, storage and retrieval costs
Facilitated development of new applications/programs
Disadvantages:
Database systems are complex, difficult and time-consuming to design
Substantial hardware and software start-up costs
Damage to database affects virtually all applications programs
Extensive conversion costs in moving from a file-based system to a database system
Initial training required for all programmers and users.
19. Batch Processing: (Page 102) In a batch processing group of transactions is collected over a
period of time, entered, processed and then the batch results are produced. Batch processing
requires separate programs for input, process and output. It is an efficient way of processing high
volume of data. Example - End of day reporting; printing etc.
Advantages:
It allows sharing of computer resources among many users and programs
It shifts the time of job processing to when the computing resources are less busy
It avoids idling the computing resources with minute-by-minute manual intervention and
supervision
By keeping high overall rate of utilization, it better amortizes the cost of a computer,
especially an expensive one.
20. Distributed Processing: (Page 103) A distributed system consists of multiple autonomous
computers that communicate through a computer network. Distributed processing implies that
processing will occur on more than one processor in order for a transaction to be completed. In
other words, processing is distributed across two or more machines and processes are most likely
not running at the same time i.e. each process performs part of an application in a sequence.
Advantages:
Each computer can be used to process data like a decentralized system.
Page | 12
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
It allows greater flexibility in placing true computer power at the location where it is
needed;
It facilitates quick and better access to data and information especially where distance is
a major factor;
Better computer resources are easily available to the end users;
The availability of multiple processors in the network permits peak load sharing and
provides backup facilities in the event of equipment failure.
Disadvantages:
There is lack of proper security controls for protecting the confidentiality and integrity of
the user programs and data that are stored online and transmitted over network
channels.
It is not possible to link different equipments produced by different vendors into a
smoothly functioning network;
Due to decentralization of resources at remote sites, management from a cental point
becomes very difficult.
21. Real time processing: (Page 104) In a real time processing, there is a continual input, process
and output of data. Data has to be processed in a small stipulated time period (real time),
otherwise it will create problems for the system.
22. Timesharing: (Page 105) A processing system with a number of independent, relatively low
speeds, online, simultaneously usable stations. Each station provides direct access to the CPU.
Advantages:
Reduces CPU idle time
Offers computing facility to small users
Provides advantages to quick response
Reduces the output of paper
Avoids duplication of software
Disadvantages:
Question of security
Problem of reliability
Problem of data communication
Question of overhead involved
23. Multiprogramming: (Page 107) It means that there are a number of programs available to the
CPU (store in main memory) and that a portion of one is executed, then a segment of another
and so on.
Requirements:
Large Memory
Memory protection
Program status preservation
Proper job mix
Advantages:
Increased throughput
Page | 13
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
24. Multiprocessing: (Page 107) The term multiprocessing is used to describe interconnected
computer configurations or computers with two or more independent CPUs that have the ability
to simultaneously execute several programs.
Advantages:
It improves the performance of computer system by allowing parallel processing of
segments of programs.
It facilitates more efficient utilization of all the other devices of the computer system.
It provides a built-in backup.
Disadvantages:
A very sophisticated operating system is required to schedule, balance and coordinate the
input, output and processing activities of multiple CPUs.
A large main memory is required for accommodating the sophisticated operating system
along with several users programs.
Such systems are very expensive.
26. Security: (Page 109) Security refers to the policies, procedures and technical measures used to
prevent unauthorized access, alteration, theft or physical damage to information systems.
27. Control: (Page 109) Control consists of all the methods, policies and organizational procedures
that ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.
28. Malicious Software: (Page 109) Malicious software programs are referred to as malware and
include a variety of threats such as computer viruses, worms and Trojan horses.
Page | 14
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
32. E-commerce: (Page 116) Electronic Commerce is the process used to distribute, buy, sell or
market goods and services, and the transfer of funds online, through electronic communications
or networks. Example: Amazon.com
Page | 15
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
B. Non-technical Limitations
Customer fear of personal information being used wrongly
Customer expectations unmet
Vulnerability to fraud and other crimes
Lack of trust and user resistance
Limitations to support services
Non-accessibility outside of urban/suburban areas
Higher employee training required
People’s resistance to change
People not used to faceless/paperless/non-physical transactions.
Page | 16
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
CHAPTER 3
MANAGEMENT OF IT
4. Information System: (Page 133) An information system collects, processes, stores, analyzes
and disseminates information for a specific purpose. It processes the inputs by using technology
such as PCs and produces outputs that are sent to users or to other systems via electronic
networks.
Page | 17
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
6. Computer Based Information System (CBIS): (Page 133) A computer based information
system (CBIS) is an information system that uses computer technology to perform some or all of
its intended tasks.
8. Fundamental Roles of Information Systems In Business: (Page 135) There are three
major roles of the business applications of information systems:
Support of its business processes and operations
Support of decision making by its employees and managers
Support of its strategies for competitive advantage
9. Information System Infrastructure: (Page 137) There are five major components of the
infrastructure:
Computer hardware
Software
Networks and communication facilities (including the internets and intranets)
Databases
Information management personnel
10. Information System Architecture: (Page 137) Information technology architecture is a high-
level map or plan of the information assets in an organization including the physical design of the
building that holds the hardware. It is a guide for current operations and blueprint for future
directions. It assures managers that the organization’s IT structure will meet its strategic business
needs.
Fixed Asset:
Tangible: Large CPU Server
Intangible: Software with long term purchase contract
Current Asset:
Tangible: Monitor
Intangible: Shareware
Page | 18
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
13. IT Asset Management: (Page 142) ITAM is a process to control the day to day operation and
utilization of IT assets, ensuring that an organization realizes maximum efficiency from these
assets and the employees using them.
14. Optimization of ITAM Program: (Page 143) To optimize an ITAM program, the following
considerations should be addressed:
Link IT to business objectives
Incorporate lifecycle processes and governance
Avoid common mistakes
15. How Does ITAM Work: (Page 144) ITAM can help an organization:
Control IT purchases and deployment
Compare its actual needs with contract terms and purchase history
Avoid non-compliance and its associated legal risks
Eliminate unnecessary purchases
Determine optimum retirement dates for equipment nearing the end of its lifecycle
17. Evaluation of an IT Asset Management Solution: (page 147) When considering an ITAM
solution, look for the following:
Efficient and accurate discovery of all IT assets, including routers, printers, servers,
laptops, PDAs and workstations
A structured approach to software discovery across the company, with application, suite
and version recognition for both workstations and servers
A centralized asset repository that houses the physical, contractual, and financial
information for each asset, along with information about software throughout the
organization, including version, users and number of copies.
19. Software: (Page 149) The programs, routines and symbolic languages that control the
functioning of the hardware and direct its operation.
Page | 19
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
22. Problem Management: (Page 157) Problem management is a business function comprised of
people, processes, and tools organized and chartered to resolve customer problems.
24. Problem Management System: (Page 162) Problem management systems, or help desk
systems, have four primary functions:
To capture request information
To store that information in a common location
To route and escalate the request as necessary, and
To store and report metrics on the entire process
25. What is IT? (Page 167) Information technology is an umbrella term which covers a vast array of
computer disciplines that permit organizations to manage their information resources. Data
processing and management information systems (MIS) are integral parts of existing IT services.
26. Components of Traditional Data Processing: (Page 167) Three main components -
Data Entry: Day-to-day production data entry
Operations: day-to-day maintenance, routine report generation, backup etc.
Applications: Software development, maintenance and support.
27. Information Security: (Page 177) Information security is the security that data or information
is protected against harm from threats that will lead to its loss, inaccessibility, alteration, or
wrongful disclosure. The protection is achieved through a layered series of technological and non-
Page | 20
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
technological safeguards such as physical security measures, user identifiers, passwords, smart
cards, biometrics, firewalls etc.
28. Why is Information System Security Important? (Page 177) Information System security is
important for the protection of the interests of those relying on information, and the information
systems and communications that deliver the information, from harm resulting from failures of
availability, confidentiality, and integrity.
30. Establishing Better information Protection: (Page 180) These points may be considered –
Not all data has the same value
Know where the critical data resides
31. Information security objective: (Page 181) The following steps must be taken to ensure that
the organization’s information security objectives include:
Implementing the plan
Monitoring logs to verify compliance and identify problems
Measuring the results
Identifying potential improvements
Refining processes and procedures
32. Components of Information Security: (Page 181) Information security comprises of three
component parts:
Data Security
IT Security
Compute Security
Page | 21
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
35. Threat management: (Page 183) A threat management included virus protection, spam
control, intrusion detection, and security event management.
36. Trust management: (Page 184) Trust management includes encryption and access controls. To
ensure cryptography is applied in conformance with sound disciplines, there has to be a formal
policy on the use of cryptography that applies across the organization.
37. Identity management: (Page 185) Identity management is the process used to determine who
has access to what in an organization. It is also one of the most difficult areas to manage due to
the number of functions that must work together to implement proper controls. Identity
management should be a collaborative effort between information security, applications
development, operations, human resources, contracts/procurement, and business groups to
implement.
38. Information technology control and audit: (Page 185) Integrating all these systems with a
common identity management program can be costly and time consuming. Gartner Group
recommends implementing identity management over time by first proving success with a single
function or application.
39. Security monitoring: (Page 185) Computer systems handling sensitive, valuable or critical
information must securely log all significant computer security relevant events. Examples of
computer security relevant events include password guessing attempts, attempts to use privileges
that have not been authorized, modifications to production application software, and
modifications to system software.
40. Incident management: (Page 186) To deal with security incidents that affect the installation in
a disciplined manner, security incidents (e.g. malfunctions, loss of power or communications
services, overloads, and mistakes by users or personnel running the installation, access
violations) have to dealt with in accordance with a formal process. Such process has to apply to
all forms of security incident.
41. Accounting software: (Page 187) Accounting software is application software that records and
processes accounting transactions within functional modules such as accounts payables, accounts
receivables, payroll and trial balance. It functions as an accounting information system.
42. Composition of accounting software: (Page 187) Accounting software is typically composed
of various modules, different sections dealing with particular areas of accounting. Among the
most common are:
Core Modules
Accounts receivable
Accounts payable
General Ledger
Billing
Stock/inventory
Purchase order
Sales order
Cash book
Page | 22
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Vertical Market: Some business accounting software is designed for specific business
types e.g. banking, construction, medical, non-profit etc. It will include features that are
specific to that industry.
44. Checklist for selecting accounting software: (Page 190) Checklist of questions and key
features need to be addressed:
Page | 23
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Ability to drill down from summary general ledger data to individual transactions?
Ability to import and export data to and from spreadsheets and work processing
programs?
Ability to generate custom reports?
Fast posting of large batches of transactions?
Strong security?
Adequate technical support?
Retention of historical data and ability to compare current results to past results?
Ability to match direct expenses with specific clients and projects?
Ability to allocate indirect costs to individual projects?
Ability to integrate customer management and ecommerce functions?
Ability to flow data from the program into your tax software?
Ability to add more users at a later data with minimal cost increases?
Page | 24
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
CHAPTER 4
COMMUNICATION AND IT
2. What are the basic elements of a Communication system? (Page 197) There are three (3)
elements of Communication system i.e. sender, medium and receiver.
A Sender (source) which creates the message to be transmitted.
A medium which carries the message
A receiver (Destination) which receives the message
3. What are the ways/modes of data transmission modes? (Page 197) There are three ways
or modes for transmitting data from one point to another. These are simplex, half-duplex and
full-duplex.
Simplex: If transmission is simplex, communication can take place in only one direction.
Sender Receiver
Half-duplex: This system can transmit data in both directions but only in one direction
at a time. This is the most common type of transmission for voice communications
because only one person is supposed to speak at a time.
Sender or Receiver or
(Receiver) (Sender)
Or
4. What are the methods for delivering information? Or, How information is delivered?
(Page 198) There are three basic methods of delivering information. These are Unicast, Broadcast
and Multicast.
Unicast: This is a type of transmission in which information is sent from only one sender
to only one receiver. This is between one-to-one nodes. For e.g. Unicast transmission are
HTTP, SMTP, Telnet, SSH, POP3.
Page | 25
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Broadcast: This is type of transmission in which information is sent from just one
computer but is received by all the computers connected to the network. For Ex. DHCP
server and ARP ( address resolution protocol)
5. What are the differences among unicast, broadcast and multicast? (Page 200)
Unicast: One-to-one, from one source to one destination.
Broadcast: One-to-all, from one source to all possible destinations.
Multicast: One-to-many, from one source to multiple destinations expressing an interest
in receiving the traffic.
7. Classify the different types of Network? (Page 201) According to geographical area there
are three types of computer networks i.e. Local area network, Metropolitan area network and
Wide area network.
Page | 26
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
All computers/ workstations connected on the LAN can communicate with one another.
This allows users to share data, share expensive resources like printers and scanners,
and communicate via email and instant messaging.
Most current LANs run on Ethernet and use the IEEE 802.3 protocol for communication.
C. Wide area network (WAN): A WAN is a telecommunications network, usually used for
connecting computers that spans a wide geographical area. WAN can be used to connect
cities, states or even countries. It is used by large organizations.
Advantages:
1. Workstations can share peripheral devices like printers. This is cheaper than buying a
printer for every work stations.
2. Workstations do not necessarily need their own hard disk or CD-ROM drives.
3. User can save their work centrally on the networks file server.
4. Users can communicate with each other and transfer data between workstations very
easily.
5. One copy of each application package such as a word processor, spreadsheet etc. can be
loaded onto the file and shared by all users.
Disadvantages:
1. Special security measures are needed to stop users from using programs and data that
they should not have access to.
2. Networks are difficult to set up and need to be maintained by skilled technicians.
3. If the file server develops a serious fault, all the users are affected.
Page | 27
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
transmit negligible since the transmission high because the transmission medium
medium is owned by the user used is leased lines or public systems
organization such as telephone lines, microwave and
satellite links.
Connections The computers, terminals and There may not be a direct physical
peripheral devise are usually connection between various computers.
physically connected with wires.
Speed Data transmission is much higher in The data transmission speed is normally
LAN than WAN. Typically of the order of 1800 to 9600 bits per
transmission speeds in LANs are 0.1 second.
to 100 mega bits per second.
Data error Fewer data transmission errors Higher data transmission errors.
11. What are the different types of computer network as per STRUCTURE? (Page 205)
There are 3 different types of computer network.
Centralized network
Distributed network
Hybrid network
12. What are the uses/ benefits of computer network? (Page 205) Computer network provides
many benefits
Simultaneous access to program and data
Sharing peripheral devices like printers, scanners etc.
Personal communication using e-mail
Making backup of information
Aiding communication by teleconferencing and video-conferencing
13. Which devices are used in the network? (Page 205) The using devices are -
Router,
Switch,
Repeater,
Bridge and
Hub.
14. Router: A router is a device that forwards data packets along networks. It is connected to at
least two networks, commonly two LANs and WANs or a LAN and its ISP’s network. When data is
sent between locations on one network or from one network to another network the data is
always seen and directed to the correct location by router. It has a back side of router. The wide
router would look similar but lack of antenna. A router may have
The port to internet connects to a modem
Each of the ports to LAN can be used to connect to a computers adapter.
The plug to power transformer always connects to the power transformer that shipped
with the product.
The reset button is used to undo all the settings you made to the router.
15. Switch: A switch is a small hardware device that joins multiple computers together within one
local area network (LAN). Network switches are capable of inspecting data packets as they are
received, determining the source and destination device of each packet and forwarding them
Page | 28
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
appropriately. A network switch can support 10/100 MBPS or 10/100/1000 MBPS port transfer
rates.
16. Repeater: A repeater is a device that receives a digital signal on an electromagnetic or optical
transmission medium and regenerates the signal along the next leg of the medium. A series of
repeaters make possible the extension of a signal over a distance. Repeater removes the
unwanted noise in an incoming signal. Even if weak or distorted, it can be clearly perceived and
restored. Because digital signals depend on the presence or absence of voltage, they tend to
dissipate more quickly than analog signals and need more frequent repeating.
17. Bridge: A bridge device filters data traffic at a network boundary. Bridges reduce the amount of
traffic on LAN by dividing it into two segments. Bridges inspect incoming traffic and decide
whether to forward or discard it.
18. Hub: A hub is a device where the entire connecting mediums come together. A hub is a medium
used to collect signals from the input line(s) and redistribute them in various available writings
around a topology. Hub basically acts as signal splitter, it accepts signal through its input port and
output it to the output ports.
19. Classification of Hubs: (Page 209) Three different types of HUBs exist i.e. passive, active and
intelligent.
Passive hubs do not amplify the electrical signal of incoming packets before
broadcasting them out to the network.
Active hubs do perform this amplification
Intelligent hubs add extra features to active hub that are of particular importance of
business.
20. What is network topology? (Page 210) A network topology is how computers and other
devices are connected over a network. It describes the layout of wires, devices and routing paths.
21. Discuss the different type physical topologies? (Page 210) There are 6 different common
topologies used in networks and other related topics.
B. Ring topology:
The ring topology is very a very interesting topology indeed. It is a lot more complex that
it may seem. It looks like just a bounch of computers connected in a circle. Beyond the
scenes it is providing a collision free and redundant networking environment.
It is noted that since there is no end on a ring topology, no terminators are necessary. A
frame travels along the circle, stopping at each node.
Page | 29
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
C. Star topology :
One of the most popular topologies for Ethernet LANs is the star and extended star
topology. It is easy to set up and relatively cheap and it creates more redundancy than
bus topology.
It works by connecting each node to a central device. This central connection allows us to
have a fully functioning network even when other devices fail.
A star topology is designed with each node (file server, workstations, and peripherals)
connected directly to a central network hub, switch or connector.
D. Tree (Expanded Star) topology: A tree topology combines characteristics of linear bus
and star topologies. It consists of group of star-configured workstations connected to a linear
butch backbone cable. Tree topologies allow for the expansion of an existing network and
enable schools to configure a network to meet their needs.
E. Hierarchical topology: This topology is much like the star topology, except that it doesn’t
use a central node. Although Cisco prefers to call this Hierarchical. This type topology suffers
from the same centralization flaw as the star topology. If the device that is on top of the
chain fails, consider the entire network down.
F. Mesh topology: There are two types of mesh topology one is full mesh topology and
another is partial mesh topology.
The full-mess topology connects every single node together. This will create the most
redundant and reliable network around especially for large networks. If any link fails, we
should always have another link to send data through.
The Partial-Mesh topology is much like the full mesh. Only we don’t connect each
device to every other device on the network. Instead we only implement a few alternate
routes.
17. Mention the advantages and disadvantages of linear Bus, Ring, Star and Tree
topology? (Page 210)
Advantages Disadvantages
Bus 1. Easy to connect a computer or 1. Entire network shuts down if there is a
Topology peripheral to a linear bus break in the main cable
2. Requires less cable length than a 2. Terminator are required at both ends
star topology of the backbone cable
3. Difficult to identify the problem if he
entire network shuts down
4. Not meant to be used as a stand –
alone solution in a large building.
Page | 30
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
18. What factors should consider when choosing a topology for installing a Computer
Network? (Page 216) The following factors should consider when we are choosing a topology
for installing a computer network.
Reliability of the entire system
Expandability of the system
Cost involved
Availability of communication lines
Delays involved in routing information from one node to another
Indeed, an organization usually use some sort of hybrid network, which is simply a combination
network. The exact shape or configuration of the network depends on the needs and overall
organizational structure of the computer involved.
19. What is network software? (Page 217) Network software is the data communication software
that is responsible for holding all data communications system together. It instructs computer
system and devices as to exactly how the data is to be transferred from one place to another.
20. What does network software do? (Page 217) Software controls the operations of computer
networks. The software that manages the resources of the network is often called the network
operating system; servers in LANs rely on network operating systems such as Novell Network,
IBM OS/2 warp server, Microsoft Windows NT server.
Page | 31
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
21. What is the communication software? (Page 217) A variety of communication software
packages are available for micro-computers, especially for internet web browsing like Microsoft
explorer, Mozilla Firefox, Microsoft access etc.
22. What are the functions of communication software? (Page 217) Several functions of
communication software packages are for ex. Access control, Transmission Control, Network
Management, Error Control, Security Management etc.
1. Access control: it is responsible for establishing the connection between terminals and
computers in a network. This control activity include connecting links through modems,
establishing communication parameters i.e. speed, mode and direction, automatic
telephone dialing and redialing, logging on and off with appropriate account numbers.
2. Transmission Control: This function allows computer and terminals to send and
receive commands, messages, data and programs. Data and programs are usually
transmitted in the form of files and thus, this activity is also called the transfer.
3. Error control: This function involves detection and correction of errors. Communication
software and processes detect errors in transmission by different methods, including
parity checking and cyclic redundancy check (CRC).
4. Network Management: This function manages communication in computer network. It
also monitors network activity and the use of network resources by end users. Security
management is required to protect a computer from unauthorized access.
23. What is communication protocol? (Page 219) In data communication process, “a protocol is
a set of rules and procedures established to control transmission between two points so that the
receiver a properly interpret the bit stream transmitted by the sender”. It provides a method and
efficient exchange of data by establishing rules for the proper interpretation of controls and data
transmitted as raw bits and bytes.
24. What are the elements of Protocol? (Page 219) In computer network, communication occurs
between entities in different systems. An entity is anything capable of sending or receiving
information. However, two entities can not simply send bit entities to each other and expect to be
understood. To occur the communication, the entities must agree on a protocol. A protocol
defines what is communicated, how is communicated and when it is communicated.
25. Key elements of protocol: (Page 219) 3 (three) Key elements of protocol:
Syntax: The term syntax refers to the structure and format of the data, meaning the
order in which they are presented.
Semantics: This refers to the meaning of each station of bits.
Timing: This refers to two characteristics; when data should be sent and how fast they
can be sent.
26. What are the roles of protocol? (Page 220) In a computer network, Data Communication
software normally performs the following functions for the efficient and error free transmission of
data:
Data sequencing: It refers to a long transmission into smaller blocks and maintaining
control.
Data Routing: This is designed to find the most efficient paths between sources and
destinations.
Page | 32
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Flow Control: A communication protocol also prevents a fast sender from overwhelming
a slow receiver. It also ensures resources sharing and protection against congestion by
regulating the flow of data on the communication line.
Error Control: Error detecting and recovering routines are also an important elements
of communication protocols. The most common method for correcting errors is to
retransmit a block.
Precedence and order of Transmission: This is ensured that all stations get a chance
to use the communication lines and other resources of the network depending upon the
priorities assigned to them.
Connection establishment: when two stations of a network want to communicate with
each other, the communication protocol establishes and verifies a connection between
the two.
Data Security: Providing data security and privacy is also built into most
communications software packages. It prevents access of data by unauthorized users
because it is relatively easy to trap a data communication line.
Log Information: Data communications software can also develop log information
which consists of all jobs and data communications tasks that have taken place.
27. What do you mean by OSI Model? Or What is OSI model? (Page 221) Open System
Interconnections (OSI) model is a reference model developed by ISO (International Organization
for Standardization) in 1984 as a conceptual framework of standards for communication in the
network across different equipment and applications by different vendors.
It is considered the primary architectural model for inter-computing and networking
communications.
Most of the Communication protocols used today have a structure based on the OSI
model.
This model defines the communication process in to 7 layers which divides the tasks
involved with moving information between networked computers in to seven smaller,
more manageable task groups.
Page | 33
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Page | 34
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
CHAPTER 5
INTERNAL CONTROL IN COMPUTER BASED BUSINESS SYSTEM
1. What is the definition of internal control? (Page 228) Internal controls are the processes
that auditor develop to administer unit effectively. They generally include rules and procedures.
The collective result should be a dynamic process which is designed to provide reasonable, but
not absolute assurance regarding the achievement of objectives with regard to the following:
Effectiveness and efficiency of operations
Reliability with applicable laws and regulations
Compliance with applicable laws and regulations.
3. What are the purposes of IC? (Page 228-229) While the overall purpose of IC is to help an
organization achieves its mission, it also helps an organization to -
Promote orderly, economical, efficient and effective operations and produce quality
products and services consistent with the organization’s mission
Safeguard resources against loss due to waste, abuse, mismanagement directives
Develop and maintain reliable financial and management data, and accurately present
that data in timely reports.
4. How do you evaluate IC? (Page 229) The first place to start is to establish a framework that
allows companies to assess existing internal controls. The framework has 5 key phases.
Define IC
Organize project team and plan
Evaluate controls at the entity level
Evaluate controls at the process, transaction or application level
Evaluate, improve and monitor
5. What are the components of IC? Or, what are the standards of IC? (Page 229)
Control environment
Risk assessment
Control activities
Information and communication
Monitoring
Page | 35
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
There is a synergy and integration among control components that helps form an integrated
system that reacts dynamically to changing conditions.
6. What control activities are taken for IT? (Page 231) While some of the control activities
relating to information technology (IT) are the responsibility of specialized IT personnel, other IT
control activities are the responsibility of all employees who use computers in their work. The
control activities are
Encryption tools, protocols or similar features of software applications that protect
confidential or sensitive information from unauthorized individuals
Back-up and restore features of software applications that reduce the risk of lost data
Virus protection software and
Passwords that restrict user access to networks, data and applications
7. What are the components of the control activity? (Page 232) ICs rely on the principle of
checks and balances in the workplace. The following components focus on the control activity -
Personnel
Authorization procedures
Segregation duties
Physical restrictions
Documentation and record retention
Monitoring operations
8. What are the limitations of IC? (Page 233) There is no such thing as a perfect control
system. Limitations which may hinder the effectiveness of an otherwise adequate system of
controls include
Resource constraints
Inadequate skill, knowledge or ability
Degree of motivation by management and employees
Faulty judgments
Unintentional errors
9. What are the elements of a good Internal Control system? (Page 234) There are 4 (four)
elements in a good internal control system
A. Separation of duties
B. Authorization
C. Documentation
D. Reconciliation
A. Separation of duties: No person should have control a transaction from beginning to end.
Ideally, no person should be able to record, authorize and reconcile a transaction.
Why?
To protect employees
To prevent and detect intentional and unintentional errors and
To encourage better job performance
Page | 36
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Why?
To prevent invalid transactions
Why?
Documents provide a record of each event or activity
Appropriate documentation helps to ensure assets are properly controlled
Documents provide evidence the accuracy and completeness of transactions
Key points for non payroll and payroll (from manual, page 236)
10. What are the objectives of IT control? (Page 240) The objectives of IT control relate to the
confidentiality, integrity and availability of data and overall management of the IT function of the
business enterprises.
11. Describe the categories of IT control? (Page 240) IT controls are often described in two
categories -
A. IT general control (ITGC): ITGC represent the foundation of the IT control
structure. ITGC include controls over the information technology (IT) environment,
computer operations, access to programs and data, program development and program
changes.
12. Discuss the COBIT and COSO in Internal Control Framework. (Page 242)
COBIT: COBIT is a widely-used framework containing best practices for both ITGC and
application controls. It consists of domains and processes. The basic structure indicates
Page | 37
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
13. What are the effects or impact of IT on Internal Audit? (Page 243-248) The effects of IT
on Internal Audit are summarized under four main headings
A. Changes in the audit trail and audit evidences
B. Changes in the internal controls environments
C. New opportunities and mechanisms for fraud and error and
D. New audit procedures
A. Changes in the audit trail and audit evidences: The existence of audit trail is a key
financial audit requirement, since without an audit trail, the financial auditor have extreme
difficulty in gathering sufficient, appropriate audit evidence to validate the figures in the
client’s accounts. The stages of Changes in the audit trail and audit evidences are -
Data retention and storage
Absence of input documents
Lack of a visible audit trail
Lack of visible output
Audit evidence
Legal issues
B. Changes in the internal controls environments: The internal controls within a client’s
financial systems, both manual and computerized, can be divided into several categories
Personnel
Segregation of duties
Authorization procedures
Record keeping
Access to assets and records
Management supervision and review
a. Segregation of duties
b. Concentration of programs and data
D. New audit procedures: Within a computerized environment the auditor may be required
to adopt a different audit approach to gain sufficient audit evidence to provide an opinion on
the financial statements.
Page | 38
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
IT Management Audits
IT Process Audits
Change Management Audits
Information security & Control Audits
IT Legal Compliance Audits
Certification and Other Compliance Audits
Disaster contingency, Business continuity, Planning and IT Disaster Recovery Audits
IT strategy Audits
Special Investigations
15. What is CAAT? (Page 250-251) CAATs are tools or utilities to help auditors select, gather,
analyze and report audit findings. Here are the sorts of questions that an IT auditor might want
to ask -
What were the top 10% of transactions by value last march?
How many changes were made to the customer details file during the previous year?
Are there any out-of-range or unusual data values in column 4 or any suspicious data
patterns?
Are any of our suppliers also employees?
Who will win the winter Olympics?
16. What are the responsibilities of Control Managers? (Page 253) Management is
responsible for establishing and maintaining control to achieve the objectives of effective and
efficient operations and reliable information systems. Management should consistently apply
internal control standards to meet each of the internal control objectives and to assess internal
control effectiveness.
17. What measures the Information Managers must take? (Page 253)
Develop and Implement appropriate, cost effective internal control for results oriented
management.
Assess the adequacy of internal control in programs and operations
Separately assesses and document internal control over information systems consistent
with the information security policy of the organization
Identify needed improvements
Take corresponding corrective action
And report annually on internal control through management assurance statements.
18. What is COBIT and COBIT Framework? (Page 254) The Information Systems Audit &
control Foundation (ISACF) developed the Control Objectives for Information and related
Technology (COBIT). COBIT is a framework of generally applicable information systems security
and control practices for IT Control. The framework allows -
Management to benchmark the security and control practices of IT environments
Users of IT services to be assured the adequate security and control exist and
Auditors to substantiate their opinions on internal control and to advice on IT security
and control matters.
19. What are the advantages/ Dimension of COBIT Framework? (Page 255) The framework
addresses the issue of control from the vantage points or dimensions.
1. Business Objectives: To satisfy business objectives, information must conform to
certain criteria that COBIT refers to as business requirements for information. The criteria
Page | 39
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
are divided into seven distinct overlapping categories that map into the COSO objectives:
Effectiveness (relevant, pertinent and timely), efficiency, confidentiality, integrity,
availability, compliance with legal requirements and reliability.
2. IT resources, while include people, application system, technology, facilities and data.
3. IT processes, which are broken into four domains: Planning and organization,
acquisition and implementation, delivery and support and monitoring.
20. What is COBIT structure? (Page 258) COBIT covers four domains:
Plan and Organize
Acquire and Implement
Deliver and Support
Monitor and Evaluate
21. Information Systems Control Techniques: (Page 259) The basic purpose of information
system controls in an organization is to ensure that the business objectives are achieved and
undesired risk events are prevented or detected and corrected. When reviewing a client’s control
systems the auditor will be able to identify three components of internal control. The information
system auditor will be most familiar with:
1. Accounting Control: Those controls which are intended to safeguard the client’s assets
and ensure the reliability of the financial records.
2. Operational Control: These deals with the day to day operations, functions and
activities are contributing to business objectives.
3. Administrative Controls: These are concerned with ensuring efficiency and compliance
with management policies, including the operational controls.
22. Auditor’s Categorization of Controls: (Page 259) We categorize the controls into following 4
groups:
1. Preventive Controls: Preventive Controls are those inputs, which are designed to
prevent an error, omission or malicious act occurring. One of the examples is to use of
password to gain access to a financial system.
2. Detective Control: These controls are designed to detect errors, omissions or malicious
acts that occur and report the occurrence.
3. Corrective Controls: Corrective Controls are designed to reduce the impact or5 correct
an error once it has been detected. Corrective controls may include the use of default
dates on invoices where an operator has tried to enter the incorrect date.
4. Compensatory Controls: Controls are basically designed to reduce the probability of
threats, which can exploit the vulnerabilities of an asset and cause a loss to that asset.
23. Audit Trails: (Page 262) Audit Trails are logs that can be designed to record activity at the
system, Application and user level.
Page | 40
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Audit logs also provide valuable evidence or assessing both the adequacies of controls in
place and the need for additional controls.
25. User Controls: (Page 264) Validity of computer application systems output lies ultimately with
the users is responsible for data submission and for correction of errors that are the result
inaccurately submitted data.
27. Acceptance Testing: (Page 268) Acceptance Testing is a complete end-to end test of the
operational system including all manual procedures.
28. The post Implementation Review: (Page 269) The full scope of a Post Implementation
Review (“PIR”) will depend largely on the scale and complexity of the project.
29. Change Management Controls: (Page 273) To properly control information system changes
companies need formal change management control policies.
30. Authorization Controls: (Page 274) Authorization controls ensure all information and data
entered or used in processing is:
Authorize management
Representative of events that actually occurred.
31. Documentation controls: (Page 274) The documentation contains descriptions of the
hardware, software, policies, and standards, procedures and approvals related to the system
and formalize the system security controls. Assessing documentation involves evaluating OJP’s
efforts to complete the following critical procedures:
There is sufficient documentation that explains how software/hardware is to be used.
There are documented formal security and operational procedures.
32. Testing and Quality Controls: (Page 275) Testing commences during the design phase,
during which designs and specifications should be subject to quality reviews(non-computer
testing) and continues during the system development and acceptance testing phases of the
SDLC (System Development life cycle).
33. Quality Reviews: (Page 276) Quality review covers various non-computer testing activities.
34. Data Integrity: (Page 278) The primary objective of data integrity control techniques is to
prevent, detect and correct errors in transaction as they flow though they flow through the
various stages of a specific data processing program. Assessing data integrity involves evaluating
the following critical procedures:
Virus detection and elimination software is installed and activated
Page | 41
Bhaskar Chakraborty
Md. Sazedul Kabir
ACNABIN
Data integrity and validation controls are used to provide assurance that the information
has not been altered and the system functions as intended.
36. The Risk Management Cycle: (Page 288) It is a process involving the following steps:
Identifying assets
Vulnerabilities and threats
Assessing the risks
Developing a risk management plan
Implementing risk management actions
Reevaluating the risks.
The End
Page | 42