Professional Documents
Culture Documents
Eis 1
Eis 1
– EIS (IT)
Examples of configuration
- User activation & deactivation
- User access & privileges
- Password management
2) Masters
- Refers to the way various parameters are setup for all modules of software.
- Masters are setup first time during installation.
Examples of masters
- Vendor master, customer’s master, inventory master.
3) Transactions
- Refer to the actual transactions entered in the application software.
Example
- Sales, purchase, payment transactions
4. Invoice is
created and sent
to customer;
5. Customer
sends payment
/Collection; and
6. Payment is
recorded in
general ledger.
Process ensures that all the fixed assets of Steps in general leader process flow are as
the enterprise are tracked for various follows :
purposes
Steps of Fixed Assets process are as (1) Entering financial transactions into the
follows :- system
(1) Procuring an asset (2) Reviewing transaction
(2) Registering / Adding an asset (3) Approving transaction
(3) Adjusting the assets (4) Posting of transaction
(4) Transferring the Assets (5) Generating financial report
(5) Depreciating the Assets
(6) Disposing the Assets
Transactions
Humans
Voucher Entry
Posting
Balancing
Software
Trial Balance
Last five steps performed by software with high speed and accuracy
:8: REVISION NOTES – MAY ‘19
J. K. SHAH CLASSES INTER C.A. – EIS (IT)
5) Types of ledgers
Ledgers
Balance Sheet
(A) Working of any software thought front end & Back end module
There are two ways of using a software including Financial & Accounting Software
(i) Installed Applications are programs installed on the hard disc of the user’s
computer.
(ii) Web applications (Cloud based) are not installed on the hard disc of the user’s
computer. It is installed on a web server & it is accessed using a browser & internet
connection.
(i) Does the system process according to GAAP (Generally Accepted Accounting Principles)
& GAAS (Generally Accepted Auditing Standards)?
(ii) Does it meet needs for reporting?
(iii) Does the system protect confidentiality & Integrity of information?
(iv) Does it have controls to process only authentic, valid & accurate transactions?
(v) System protected from unauthorized access?
(vi) Are user privileges based in Role based access?
(vii) Is there on ERP system administrator?
(viii) Are users trained?
- Source Document
- Journal
- Ledger
- Trial Balance
- Adjustments
- Adjusted trial balance
- Closing entries
- Financial statements
Important points for integration of modules with financial Important points for integration
& Accounting System with other modules
Importance of Business
Reporting
• provide stakeholders
with high- quality
reports.
• allows organizations to
present detailed
explanation of their
business
• helps stakeholders to
assess organizational
performance
• better internal decision-
making
• successful management
of the business
Benefits of E – commerce
To customer, individual, user To business, Seller To Government
• Convenience • Creation of new • Instrument to fight
• Time saving markets corruption
• Various Options • Easier entry into • Reduction in use of
• Easy to find reviews new markets ecologically
• Coupon and Deals • Increased Customer damaging materials
• Anytime Access Base
• Reduction in costs • Reduction in costs
overhead costs
Advertising costs
• Efficiency
improvement
Types of Network Architecture E – commerce Architecture vide internet E – commerce Architecture vide M –
commerce
Two-tier Three-tier Layer Includes Purpose Layer Includes Purpose
Presentation Presentation Client/ User Web Server, This layer Client/ User Mobile Web This layer
Tier (Client Tier: Interface Web helps the Interface Browser and helps the
Application/Cli Displays Browser and ecommerce Internet. For ecommerc
ent Tier): information Internet. For customer example: In e
related to example: connect to example customer
This is the services where user ecommerce discussed connect to
interface that available on a buys a merchant. above where ecommerc
allows user to website. mobile user buys a e
interact with the phone from mobile phone merchant.
e-commerce / m Application an from
commerce Tier: ecommerce ecommerce
vendor. It controls merchant merchant it
application includes, -
Database Tier functionality by Mobile APP
(Data Tier): performing (Application)
detailed Application Application This layer - User
The product processing. Layer Server and
allows
data / price data Back End’ Application Application This layer
/ customer data Database Server. For customer to Layer Server and
check the allows
and other Tier: example - it Back End’
related data are This tier includes - E- products Server. For customer
kept here. houses the merchant - available on example - it to check
database Reseller - merchant’s includes - E- the
servers where Logistics website merchant - products
information is partner Reseller - available
stored and Logistics on
This layer is
retrieved. Database The partner
Layer accessible to merchant’
information
store house, user through s website
where all application
data relating layer Database The This layer
to products, Layer information is
price it kept store house, accessible
where all to user
data relating through
to products,
applicatio
price it kept
n layer
Advantages Advantages
• more users • more clients
could can have
interact with access to a
system wide variety
• performance of server
is higher applications
because .
business • Dynamic
logic and load
database are balancing
physically • Change
close manageme
• easy to nt
setup and
maintain
Disadvantages Disadvantage
• Performance s
deteriorates • requires
if number of complex
users’ and costly
increases. tools
• There is • Current
restricted tools are
flexibility relatively
Digital Payments
• Digital Payment is a way of payment which is made through digital
modes.
• In digital payments, payer and payee both use digital modes to send and
receive money.
• It is also called electronic payment.
• No hard cash is involved in the digital payments.
• All the transactions in digital payments are completed online.
• It is an instant and convenient way to make payments
I. Virtualization
Virtualization means to create a virtual version Application Areas
of a device or resource, such as a server, • Server Consolidation
storage device, network or even an operating • Disaster Recovery
system where the framework divides the • Testing and Training
resource into one or more execution • Portable Applications
environments. • Portable Workspaces
This refers to technologies designed to provide
a layer of abstraction between computer
hardware systems and the software running on
them.
Types of Virtualization
Hardware Virtualization Network Virtualization Storage Virtualization
This refers to the creation of a virtual It is a method of combining the It is the apparent pooling of data
machine that acts like a real available resources in a from multiple storage devices,
computer with an operating system. network by splitting up the even different types of storage
The basic idea of Hardware available bandwidth into devices, into what appears to
virtualization is to consolidate channels, each of which is be a single device that is
many small physical servers into independent from the others, managed from a central console.
one large physical server so that and each of which can be
the processor can be used more assigned (or reassigned) to a It helps the storage administrator
effectively. particular server or device in perform the tasks of backup,
For example, a computer that is real time. It is intended to archiving, and recovery more
running Microsoft Windows may host optimize network speed, easily and in less time.
a virtual machine that looks like a reliability flexibility, scalability,
computer with the Linux operating and security.
system; based software that can be
run on the virtual machine.
II. Grid Computing: It is a computer network in which each computer’s resources are shared with
every other computer in the system. It is a distributed architecture of large numbers of computers
connected to solve a complex problem. In the grid computing model, servers or personal computers run
independent tasks and are loosely linked by the Internet or low-speed networks.
Benefits Types of Resources Security
Access to additional resources. Computation (CPU) Single Sign-on.
Making use of Underutilized Storage (HDD) Protection of Credentials.
Resources. Communications (Network) Support for secure group
Resource Balancing. Software and Licenses communication.
Parallel CPU Capacity Special equipment, Support for multiple
Reliability. capacities, architectures, implementations
Virtual resources and virtual and policies (Other Interoperability with local
organizations for collaboration. Hardware, Operating security solutions.
Management. system)
III. Cloud Computing: Cloud Computing is both, a combination of software and hardware based
computing resources delivered as a networked service. This model of IT enabled services enables
anytime access to a shared pool of applications and resources. These applications and resources can
be accessed using a simple front-end interface such as a Web browser, and thus enabling users to
access the resources from any client device including notebooks, desktops and mobile devices.
Characteristics Advantages
Elasticity & Scalability Pervasive accessibility
Pay-Per-Use Globalize the workforce
On-demand Reduce capital costs
Resiliency Minimize maintenance & licensing software
Multi-Tenancy / Sharing Improved flexibility
Achieve economies of scale
Reduce spending on technology infrastructure
Streamline business processes
Monitor projects more effectively
IV. Green Computing: Green Computing or Green IT refers to the study and practice of
environmentally sustainable computing or IT. In other words, it is the study and practice of
establishing / using computers and IT resources in a more efficient and environmentally friendly
and responsible way.
Best Practices Develop a sustainable Green Computing plan
Recycle
Make environmentally sound purchase decisions
Reduce Paper Consumption
Conserve Energy
V. BYOD (Bring Your Own Device): This refers to business policy that allows employees to use
their preferred computing devices, like smart phones and laptops for business purposes. It means
employees are welcome to use personal devices (laptops, smart phones, tablets etc.) to connect
to the corporate network to access information and application.
Advantages Emerging BYOD Threats
Happy Employees Network Risks: As BYOD permits employees to carry their own
Increased devices (smart phones, laptops for business use), the IT practice team
employee is unaware about the number of devices being connected to the
efficiency network. As network visibility is of high importance, this lack of visibility
Lower IT budgets can be hazardous.
Reduces IT Device Risks: It is normally exemplified and hidden in ‘Loss of
support Devices’. A lost or stolen device can result in an enormous financial
requirement and reputational embarrassment to an organization as the device may
Early adoption of hold sensitive corporate information.
new Technologies Application Risks: It is normally exemplified and hidden in ‘Application
Viruses and Malware’. Organizations are not clear in deciding that ‘who
is responsible for device security – the organization or the user’.
Implementation Risks: It is normally exemplified and hidden in ‘Weak
BYOD Policy’. The effective implementation of the BYOD program
should not only cover technical issues mentioned above but also
mandate the development of a robust implementation policy.
VI. Web 3.0 Technology
Known as the Semantic Web, this describes sites wherein the computers will generate raw
data on their own without direct user interaction.
Web 3.0 standard uses semantic web technology, drag and drop mash-ups, widgets, user
: 21 : REVISION NOTES – MAY ‘19
J. K. SHAH CLASSES INTER C.A. – EIS (IT)
behaviour, user engagement, and consolidation of dynamic web contents depending on the
interest of the individual users.
Web 3.0 Technology uses the “Data Web” Technology, which features the data records that
are publishable and reusable on the web through query-able formats.
Web 3.0 Components
VIII. Artificial Intelligence may be defined as the ability to use memory, knowledge,
experience, understanding, reasoning, imagination and judgement to solve problems and
adapt to new situations. Applications Areas include Medical diagnosis; in cancer
research; Predicting the chances of an individual getting ill by a disease; Creating art
such as poetry; Proving mathematical theorems; Playing games (such as Chess or Go)
and predicting the outcomes etc.
IX. Machine Learning is a type of Artificial Intelligence (AI) that provides computers with
the ability to learn without being explicitly programmed. Machine learning focuses on
the development of computer programs that can change when exposed to new data.
The process of machine learning is similar to that of data mining. For example. Machine
learning has been used for image, video, and text recognition, as well as serving as the
power behind recommendation engines.