Ais 2 Reviewer
Ais 2 Reviewer
Supplier Warehouse performance graphs can show details per customer group, customer region, or customer name
Potential customer Inbound performance will show how many deliveries from vendors are received early, on-time, and late
A piece of information that might help solve a problem Put-away time is the time it takes to dispose spoiled goods
Your answer to question 16 is wrong. Correct answers: Potential customer
Shipping performance will show how many deliveries to customers are shipped early, on-time, and late
Your answer to question 22 is wrong. Correct answers: Put-away time is the time it takes to dispose spoiled goods 2929,
2323, The process/cycle commencing on the time the customer places an order to the entity and ending on the the
The Transportation Management module of Microsoft Dynamics has all the following functions except: collection of the customer's payment.
"Loads" for Load assignment per delivery vehicle Order to deposit process
It can run independently from other applications Payment of bills via G-Cash
It needs internet connection to transmit data on another application All are online transactions entry
Your answer to question 39 is wrong. Correct answers: All are online transactions entry
It can be integrated to another application 4040,
Your answer to question 34 is wrong. Correct answers: It needs internet connection to transmit data on another A system for gathering, creating, storing, processing, and disseminating information.
application
3535, Information system
Which of the following is not a depiction of extranet?
Subsystem
Electronic Date Interchange
Accounting information system
Local Area Network
Enterprise system
Customer Relationship Management System Correct answers: Information system
4141,
Customer Portals All of the following are examples of real-time processing except:
Correct answers: Local Area Network (0/1 Point)
3636,
Which of the following is not an example of local area network? Personal data sheet preparation by employees
Intranet network in main office Processing of customers payment for his monthly grocery in the cashier
Student's network connection to university portal Generation of monthly water statement of account
3737,
All of the following are vendors of ERP system except:
PhilDys
Sage
SAP
Oracle
Correct answers: PhilDys
3838,
This system is used to record payments of customers for goods and services acquired.
1.A customer purchase order needs to be uploaded before creating a sales order. This is to ensure that sales 1.Use of biometrics on entrance doors to ensure that only authorized users are allowed to enter on certain
orders are actually orders of customers. company premises.
Input validity
Corrective Control
Input accuracy
Detective Control
Input completeness
Your answer to question 1 is wrong. Correct answers: Input validity Preventive Control
2.Before recording a credit to accounts receivable for customers who are paying through bank transfer, a Correct answers: Preventive Control
screenshot of the transaction receipt is required to be sent through e-mail. The amount and any reference number 2.Use of bank checks instead of paying by cash because cash transactions are generally prone to fraud and errors
will then be matched to the bank statement. This is to ensure that a bank was actually made by the concern
customer. Corrective Control
Input validity
Input accuracy
Examples of Decision Support System:
Chapter 1 and 2 • Financial Planning Systems – enables senior executives to ask what if questions such as adjusting the
values of total sales and cost of sales to see the effect of a decision on net income in the most optimal
What is Information System? way.
Information system is an integrated set of components for collecting, storing, and processing data and for • Bank Loan Management Systems – predict the likelihood of a loan being recovered.
providing information, knowledge, and digital products.
➢ What would be the impact of employees' performance if we double the production lot at the factory?
Collects sales information Stores information in server database Generate reports
➢ What would happen to our sales if a new competitor entered the market?
Information system is the combination of people, information technology (IT), and business processes to
accomplish a business objective. Accounting Information System (AIS)
People (employees, customers, suppliers, etc.) • Involves the collection, storage, and processing of financial and accounting data used by internal users to
Information Technology (hardware and software) report information to investors, creditors, and tax authorities
Business Processes (sales, purchases, etc.)
• It is generally a computer-based method for tracking accounting activity in conjunction with information
Used by executives and senior managers technology resources.
Used by managers for operation efficiency • Integrates different applications, protocols and formats
• Integrates business processes, such as sales, deliveries and accounts receivable, by sharing information
across business functions and employee hierarchies.
Used by staff level workers for daily
Software A + Software B + Software C = Enterprise System
transactions and basic reporting
Types of Enterprise System:
• Includes all processes that transform raw materials into final products. Data Hierarchy
• Involves the active streamlining of a business's supply-side activities to maximize customer value and
gain a competitive advantage in the marketplace.
• Integrates all processes needed to run the company with a single system.
Third-Party Applications
API, a type of middleware, is a set of protocols, tools and definitions for building applications, which allow a
secondary application or service to communicate with a primary application or service, without having to know
how the primary application or service is being implemented.
CHAPTER 3
Internet Browsers
Input & Output Symbols
• It identifies steps that do not add value and are causing delays, needless storage and transportation, and Indicates where the data your flowchart references is
work duplication being stored
Example
Basic Symbols
Swimlane
CHAPTER 5 • Any request made by client doesn’t require a network connection to perform the action on the database.
Database Management System (DBMS) • The database system is present at the server machine
• Database is a collection of data • The DBMS application is present at the client machine
• DBMS is a collection of inter-related data and set of programs to store & access those data in an easy • These two machines are connected with each other through a reliable network as shown in the diagram.
and effective manner.
Three-tier Architecture
File Processing System
• Another layer is present between the client machine and server machine.
• Files are used to store various documents.
• The client application doesn’t communicate directly with the database systems present at the server
• All files are grouped based on their categories. machine
• The file names are very related to each other and arranged properly to easily access the files. • The client application communicates with server application and the server application internally
communicates with the database system present at the server.
• If one needs to insert, delete, modify, store or update data, one must know the entire hierarchy of the
files. Database Schema
DBMS vs File Processing System • The skeleton structure that represents the logical view of the entire database.
• No redundant data: Redundancy removed by data normalization. No data duplication saves storage and • It defines how the data is organized and how the relations among them are associated.
improves access time.
• It formulates all the constraints that are to be applied on the data.
• Data Consistency and Integrity: The root cause of data inconsistency is data redundancy. Since data
normalization takes care of the data redundancy, data inconsistency also been taken care of as part of it Database Models
• Data Security: It is easier to apply access constraints in database systems so that only authorized user A database model shows the logical structure of a database, including the relationships and constraints that
is able to access the data. Each user has a different set of access thus data is secured from the issues determine how data can be stored and accessed.
such as identity theft, data leaks and misuse of data.
• Relational databases
DBMS over File Processing System
• Hierarchical databases
• Privacy: Limited access means privacy of data.
• Network databases
• Easy access to data – Database systems manages data in such a way so that the data is easily
• Object-oriented databases
accessible with fast response times.
Relational Database Model
• Easy recovery: Since database systems keeps the backup of data, it is easier to do a full recovery of data
in case of a failure. • Sorts data into tables (also called relations) consisting of columns and
rows
• Flexible: Database systems are more flexible than file processing systems.
• Each column lists an attribute of the entity in question, such as price,
Types of DBMS Architecture
zip code, or birth date.
There are three types of DBMS architecture:
• The attributes in a relation are called a domain.
• 1. Single tier architecture
• A particular attribute or combination of attributes is chosen as a primary key
2. Two tier architecture
3. Three tier architecture • Each row, also called a tuple, includes data about a specific instance of the entity in question, such as a
particular employee.
Single-tier Architecture
• The model also accounts for the types of relationships between those tables, including one-to-one, one-to-
• Database is readily available on the client machine
many, and many-to-many relationships.
Hierarchical Database Model Data Definition Language (DDL)
• Resembles an upside-down tree DDL is used for defining the structure or schema of the database. It is also used for creating tables,
indexes, applying constraints, etc. in the database.
• Files are related in a parent-child manner
• Create - create a new table or a new database.
• Each parent capable of relating to more than
one child • Alter - alter or change the structure of the database table.
• But each child only being related to one parent. • Drop - delete a table, index, or views from the database.
• Truncate - delete the records or data from the table, but its structure remains as it is.
DML is a language used to access or manipulate the data in the database. In simple words, this language is used
to retrieve the data from the database, insert new data into the database, and delete the existing data from the
database.
DCL is used to access the stored or saved data. It is mainly used for revoking and granting user access on a
database.
TCL is a language which manages transactions within the database. It is used to execute the changes made by the
data manipulation language (DML) statements.
DBMS Languages-
• Commit - save the transactions in the database.
User can access, update, delete, and store data or information in the database using database languages. The
following are the databases languages in the database management system: • Rollback - restore the database to that state which was last committed.
• Data Manipulation Language • SQL is a programming language that is typically used in relational database or data stream management
systems.
• Data Control Language
• It is both a data definition and a data manipulation language
• Transaction Control Language
• Language used in SAP Business One
Chapter 6 – Relational Databases and SQL
REA helps database designers define a complete set of entities and attributes.
An instance of an entity is one specific thing of the type defined by the entity.
- The agent entity EMPLOYEE in a company with three employees might have instances of Marge Evans,
Roberto Garcia, and Arte Singh.
- In a relational database, the entity is represented as a table and the three instances of the entity are
represented as rows in the table.
- Sometimes, attributes are a combination of parts that have unique meanings of their own.
- Attributes that consist of multiple sub-attributes are referred to as composite attributes.
Key Attributes
In implementing the database, the key attribute becomes the primary key.
Symbols used in E-R and REA Diagrams The WORK_COMPLETED entity is an event.
The CLIENT and EMPLOYEE entities are agents.
• CLIENT is an entity but not an attribute of WORK_ COMPLETED.
CLIENT improves the description of an attribute for the work completed—the client for whom the work was
performed.
This descriptive value suggests that a relationship exists between the CLIENT entity and the entity capturing the
completed work
The need for defining relationships can be identified by examining the prescribed entities as pairs to identify
logical linkages that would improve the description of an entity’s attributes.
Recursive Relationship
• One event and two agents have been identified for the business process of billing for professional
services.
Relationship Constraints in the Client Billing Business Process Steps in Mapping an REA Model to a Relational DBMS
Generating Reports
Ad-hoc Reports
– Users can easily manipulate the base level tables to generate information on an ad hoc (as needed) basis.
– The most effective way to provide data availability to users when information needs constantly change.
Regular Reports
Developing an REA Model
– Users can create alternative ways to view the data that already exists in the database.
• Objective is to integrate the data in a way that allows managers and other users access to the information
they need to perform effectively. – Data are not copied to a second physical location in the database.
• Figure below presents the integrated REA data model for the client billing and human resources business
– A view creates the appearance of a different set of tables in the format a user want
processes.
Chapter 7
Controlling Information Systems: Internal Control and Enterprise Risk Management
Organizational Governance
Process by which organizations select objectives, establish processes to achieve objectives, and monitor
performance.
• Internal controls are the mechanisms, rules, and procedures implemented by a company to ensure the
integrity of financial and accounting information, promote accountability, and prevent fraud.
• To avoid harm, danger, or loss caused by intentional (fraud) and unintentional acts
Information Processes
• To be in compliance with legal and obligatory obligations
• Computer Crime / Cyber Crime includes crime in which the computer is the target of the crime or the
means used to commit the crime.
Control Goals
Sample Control Matrix
• Operations Processes
• Information Processes
• Ex. Review and compare totals to determine if processing was carried out correctly.
• Ex. Erroneous data is entered in the system and reported on an error and summary report; a
clerk re-enters the data.
• Enterprise risk management (ERM) is a plan-based business strategy that aims to identify, assess, and
prepare for any dangers, hazards, and other potentials for disaster—both physical and figurative—that
may interfere with an organization's operations and objectives.
1. The Internal Environment - The overall attitude and tone of an organization towards internal control,
integrity, ethics, and risks
2. Objective Setting - Objectives should support and align with the entity’s mission and are consistent
with its risk appetite
3. Event Identification - Identify risks and opportunities that would affect achievement of its objectives.
Example: risk and opportunities
4. Risk Assessment- Determines the effect of risks on the organization’s objectives.
- Example: 75% probability that a 50,000 loss will be incurred
- Expected loss is 75% x 50,000 = 37,500
5. ControlActivities
- Policies and procedures that ensures that risk responses are carried out
- The control may be the risk response itself
- Includes approvals, authorizations, verifications, reconciliations, reviews of operating
performance, security procedures, and segregation of duties
6. Information and Communication
- Pertinent information must be identified, captured, and communicated in a form and timeframe
that enable people to carry out their responsibilities
7. Monitoring
- Enterprise Risk Management process and components are evaluated to determine its
effectiveness and make necessary modifications.
8.