- Characteristics of information
- decomposition/subsystem principles
- Components of TPS
- Direct Processing
- Features of a computer based MIS
- Programmed & Non programmed decisions
- Pre-requisites of MIS
- Limitations of MIS
- MRP
- Model and its advantages
- systems approach to problem solving
- Characteristics of Information used by executives
- DSS software tools
- DSS examples
- Traditional computing models
- Client/Server model
- Server centric model
- Characteristics of C/S
- Systems development approaches
- data dictionary
- Fact finding techniques
- Costs/Benefits of CBIS
- Designing systems output
- systems manual
- Data communications design
- printed output/visual display output
- Bench marking problem testing
- program design tools
- advantages of pre-written software
- PDLC
- Personal training
- Conversion activities
- systems evaluation
- Evaluation of ERP
- Business engineering
- characteristics of ERP
- ERP benefits
- OS-Security components
- SPLMS
- Firewalls
- DBMS controls
- Field level interrogation
- source document controls
- error handling techniques
- Making fraud difficult to perpetrate
- Disk imaging and analysis technique
- Frauds at input
- Powers of controller
- duties of certifying authorities
- Powers of central government
- Concurrent audit techniques
- Audit framework program development and acquisition
- Program analysis
- IS audit objectives
- Core principles of information security
- example of information security policy statement
- types of information protection
- Programming work bench
- levels of integration
- Meta –CASE workbench