Professional Documents
Culture Documents
EIS Charts - For Nov 21
EIS Charts - For Nov 21
58)
Types of Data Voucher Types Voucher Number Accounting Flow Types of Ledgers Grouping of
It is a documentary evidence of a A Voucher No. or a Document Accounting flow from angle of Ledgers
A) Master Data transaction Number is a unique identity of software Ledgers At time of
It is relatively permanent Types of vouchers used in any voucher/ document creation of any
data that is not expected to accounting systems Peculiarities about voucher Transactions new ledger, it
Debit Balance Credit Balance
change again & again numbering must be placed
1) Contra 9) Debit Note Humans
under a particular
Types of master data 2) Payment 10) Sales Order 1) It must be unique Voucher Entry Asset Expense Income Liability group
1) Accounting Master Data 3) Receipt 11) Stock Journal 2) Separate numbering series
2) Inventory Master Data 4) Journal 12) Physical Stock 3) May have prefix or suffix Posting There are four
3) Payroll Master Data 5) Sales 13) Delivery Note or both Profit & Loss basic groups in
4) Statutory Master Data 6) Purchase 14) Receipt Note 4) All vouchers must be Balancing Software Account Accounting, i.e.
numbered serially Income
7) Credit Note 15) Memorandum
Expense
B) Non-Master Data 8) Purchade 16) Attendance 5) All vouchers are recorded in Trial Balance Balance Sheet Asset
It is a data which is Order 17) Payroll chronological order & hence Liability
expected to change voucher recorded earlier must Profit &
frequently, again & again & have an earlier number Loss Balance
not a permanent data Accoun Sheet
FINANCIAL AND ACCOUNTING SYSTEMS (Chart 2.60)
A. ERP Implementation, its B. Role Based Access Control i) Fundamental objectives of an audit of controls
C. Types of Access
Risks and related Controls (RBAC) do not change in an environment. When
evaluating controls over systems, decisions must
be made regarding relevance of operational
1. People Issues i) It is an approach to While assigning access to different
internal control procedures to IT controls
2. Process Risks restricting system access to users, following options are possible:-
3. Technological Risks authorized users. i) Create – Allows to create data
4. Other Implementation ii) It is a policy neutral access ii) Alter – Allows to alter data ii) ERP Systems should produce accurate,
Issues control mechanism defined iii) View – Allows only to view data complete, & authorized information that is
5. Post Implementation issues around roles & privileges iv) Print – Allows to print data supportable & timely.
Business Process Modules & Their Integration Financial & Accounting Systems Reporting System & Management Information
System
Different types of industries require different modules these are as follows:-
A) Reporting System
7) Project Systems 9) Supply Chain 10) Plant Maintenance 11) Customer Relationship i) It simply means presentation of information in proper
8) Production Planning (PP) Module
Module Module Module Management (CRM) & meaningful way.
i) It is an integrated i) It is another important module that It provides i) It is a functional module Benefits of a CRM module :- ii) a system of regular reporting on pre-decided aspects.
project management includes software designed specifically for extensive which handles maintaining
tool used for planning production planning & management functionality for of equipment & enables a) Improved customer B) Management Information System (MIS)
& managing projects logistics, efficient planning of relations
manufacturing, production & generation
ii) It also consists of master data, system planning, & schedules b) Increase customer I) What is an MIS Report?
ii) It has several tools configuration and transactions in order to analytics revenues It is a tool that managers use to evaluate business
that enable project accomplish plan procedure for production ii) PM application c) Maximize up-selling & processes & operations.
management process component provides you cross-selling
such as cost & with a comprehensive
• Master Data d) Better internal II) Who Uses MIS Reports?
planning budget, software solution for all
• SOP (Sales & Operations Planning) communication i) MIS systems automatically collect data from various
scheduling, maintenance activities
requisitioning of • DRP (Distribution Resource Planning) e) Optimize marketing areas within a business
that are performed within
materials and • Production Planning a company ii) These systems can produce daily reports that can be
services • MRP (Material Requirements planning) sent to key members throughout the organization
• Capacity Planning
• Product Cost Planning III) Type of Information in an MIS Report
i) Relevant iii) Accurate
ii) Timely iv) Structured
FINANCIAL AND ACCOUNTING SYSTEMS (Chart 2.63)
Business Process Modules & Their Integration Financial & Accounting Systems
Refer Refer
4.87 & 4.88 E- Commerce 4.89
Architecture
Risks &
of Networked
Controls
System
Refer
Master Refer
4.88 Chart of 4.89
Ch 4
Guidlines &
Laws Governing Digital
E-commerce Payment
Computing
Technologies
E-Commerce
E-Commerce
1) Privacy & Security E-business Ways to protect risk Cyber Security Risk Types Advantages
2) Quality issues environment, controls 1) Educating Considerations A) New Methods 1) Easy and convenient
3) Delay in goods & Hidden are necessary for all participant about There could be cyber 1) UPI Apps 2) Pay or send money from
Costs persons in chain, nature of risks security risks with 2) Immediate Payment Service anywhere
4) Needs Access to internet & including 2) Communication of Direct as well as (IMPS) 3) Discounts from taxes
lack of personal touch organizational policies Indirect impact.
1) Users 3) Mobile Apps 4) Written record
to its customers • A Direct Financial
5) Security & credit card issues 2) Sellers / Buyers / Impact could be if 4) Mobile Wallets 5) Less Risk
6) Infrastructure Merchants 3) Ensure Compliance Application at 5) Aadhar Enabled Payment 6) Competitive advantage to
7) Problem of anonymity 3) Government with Industry Body Company’s Retailers Service(AEPS) business
8) Repudiation of contract 4) Network Service Standards
4) Protect your e- which contains 6) Unstructure Supplementary 7) Environment Friendly
Providers Commerce business financial information Service Data(USSD)
9) Lack of authenticity of
from intrusion- has weak passwords
transactions 5) Technology Service 7) Mobile Banking Drawbacks
• Viruses at all OSI layers
10) Data Loss or theft or Providers resulting in harming 8) Cryptocurrency 1) Difficult for a Non-technical
• Hackers •
duplication 6) Logistics Service integrity of data. person
Passwords •
11) Attack from hackers Providers Regular software • An Indirect B) Traditional Methods 2) The risk of data theft
12) Denial of Service 7) Payment Gateways updates Operational Impact i) Cards 3) Overspending
• Sensitive data could be if sensitive
13) Non-recognition of • Credit Cards 4) Disputed transactions
customer
electronic transactions • Debits Cards 5) Increased business costs
information
14) Lack of audit trails • Smart Card 6) The necessity of internet
15) Problem of piracy ii) Internet Banking access
E-COMMERCE, M-COMMERCE AND EMERGING TECHNOLOGY (Chart 4.90)
Computing Technologies
Cloud Computing
Cloud computing, means use of computing resources as a service through networks, typically Internet. It provides facility to access shared resources &
common infrastructure offering services on demand over network to perform operations that meet changing business needs
Computing Technologies
Computing Technologies
It refers to the technology that allows transmission of data via It is study & practice of BYOD refers to business policy that also known as
a computer without having to be connected to a fixed physical establishing/ using computers allows employees to use their Semantic Web,
link. Mobile data communication has become a very important & IT resources in a more preferred computing devices, like describes sites
& rapidly evolving technology as it allows users to transmit efficient & environmentally smart phones & laptops for business wherein
data from remote locations to other remote or fixed locations friendly & responsible way. purposes computers will be
generated raw
data on their own
Components Green Computing Best Advantages without direct user
1) Mobile Communication 3) Mobile Software Practices 1) Happy Employees interaction
2) Mobile Hardware 1) Develop a sustainable 2) Lower IT budgets
Limitations Green Computing plan 3) IT reduces support requirement
1) Insufficient Bandwidth 4) Transmission interferences 2) Recycle 4) Early adoption of new
Technologies Components
2) Security Standards 5) Potential health hazards 3) Make environmentally
3) Power consumption 6) Human interface with device sound purchase decisions 5) Increased employee efficiency 1) Semantic Web
4) Reduce Paper 2) Web Services
Consumption
Benefits Emerging BYOD Threats
1) Remote access to work order details 5) Conserve Energy 1) Network Risks
2) Update work order status in real-time, facilitating excellent Challenges 2) Device Risks
communication a) Evaluate the actual security 3) Application Risks
3) Access to corporate services & information at any time, from mechanisms in order to 4) Implementation Risks
anywhere assess their energy
consumption
4) Improve management effectiveness by enhancing
information quality b) Building new security
mechanisms by considering
5) Remote access to corporate knowledge base job location the energy costs from the
design phase.