Hazimah - Hanafiah - CAS PRESENTATION SLIDE

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

DPA 20043

COMPUTERISED
ACCOUNTING SYSTEM
PRESENTATION
MINI PROJECT
LECTURER'S NAME:
1. MR. ABDULHASNAL BIN ABDULLAH
2.MR MOHMAD ZAKI BIN OTHMAN
Group's
Members

NORHAZIMAH BINTI SITI FARAH NAJWA SITI NABILA BINTI


HANAFIAH BINTI FHARIZAN ASMADI
18DAT20F1016 18DAT20F1018 18DAT20F1026
TABLE OF CONTENT
1. Database Management System
2. Enterprise Resource Planning System (ERP)
3. Electronic Commerce Systems
4. Operating System vs Application Control
5. Access and Backup Control
6. Electronic Data Interchange (EDI) Control
7. Mini Project - full set of account
Database Management
System.
Collection of information that is organised
So that it can be easily accessed, managed and
updated.
Computer databases typically contain
aggregations of data records or files, containing
information about sales transactions or
interactions with specific customers.

ELEMENTS OF DATABASE MANAGEMENT


SYSTEM
Database Administrator
Database Database
Enterprise Resource Planning
System (ERP)
Refers to a type of softare that organizations use to manage day-
to-day business activities such as accounting, procurement,
project management, risk management and compliance, and
supply chain operations.
RISK ASSOCIATED WITH
BENEFITS OF ERP
ERP
Saving money
Expensive cost
Productivity improvement
The requrement of time
Facilitating the management
depend on business size
of daily operations
Changes to business process
Electronic Commerce System
Buying and selling of goods and services,
The transmitting of funds or data, over an electronic network, primarily the
internet.
These business transactions occur either as business-to-business (B2B),
business-to-consumer (B2C), consumer-to-consumer or consumer-to-
business.

Risk Associated With The Electronic Commerce


Online Security
System Reliability
Privacy Issues
Customer Disputes
Credit Card Fraud
Intellectual Property Issues
Operating System
Application Control
System software that manages
computer hardware, software
A form of security that is designed to
resources
improve the quality of the data that is
provides common services for
input into a database.
computer programs.
Five of most common operating example of an application control:
systems the validity check

1. Microsoft Windows Reviews the data entered into a data


2. Apple macOS entry screen to ensure that it meets a set
3. Linux of predetermined range criteria
4. Android
5. Apple's iOS
Access And Backup Control
Access control Backup control

Security technique that regulated who The backup control center is a redundant
or what can view or use resources in a control system that mirrors the primary
computing environment. control center system.

Physical access control limits access to provides parallel or redundant


campuses, buildings, rooms and communications with the remote IO areas
physical IT assests.
allows a complete transfer of control from
Logical access control limits the primary control system to the backup
connections to computer networks, system
system files and data.
Challenge during preparing a mini project

Lack of source document


Lack of time to finish this group task
The correction of source document during do our Autocount
Time spent to correct the number of source document
THANK YOU

You might also like