Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The Computer
Environment
Data processing is simply the collecting, processing, and distributing
of information t achieve a desired result.
Input device - permits the computer to receive Output device - returns the information from
both data and instructions for processing. the computer to the user.
2. Computer Software
-the computer programs. Software is a series of routines that provide instructions for
operating the computer. The two broad categories of computer software are:
-sometimes referred to as user of problem -operate the computer system and perform
programs are designed to accomplish routine tasks for users. Important elements of
specific objectives for users, such as systems software are:
processing payroll or pricing the inventory. 1. Operating system
2. Utilities
COMPUTER INSTALLATIONS
Computer installations are the facilities where the computer hardware and
personnel are located. Computer installations are generally organized into one of
the following categories:
3. Time-sharing
Under this system, the organization acquires a keyboard device capable of transmitting and
receiving data and, by agreement, the right to use a central computer facility.
4. Facilities management
This is the latest type of computer service arrangement to be developed. It falls somewhere between
the captive computer and the service bureau computer categories.
UNIQUE CHARACTERISTICS OF SPECIFIC EDP SYSTEMS
1. Batch Processing
It is a common EDP system. If the question does not specify the EDP system, then it may be assumed
that batch processing is used.
5. Service Bureau/Center
Service bureaus are independent computer centers from which companies rent computer time. These
bureaus allow companies (users) to do away with most of their data processing departments and /or
computer hardware.
6. Distributed Systems
These represent a network of remote computer sites each having a small computer connected to the
main computer system.
BATCH PROCESSING
Three key points in a batch processing:
a. Transactions flow through the system in batches (groups of
like transactions). In any particular batch, transactions may
add, change, or delete information in the master file.
Trojan Horse
It is an unauthorized program placed within an authorized one. Trojan horses typically are designed to
wait until a specific time, when they act and then erase all evidence of their existence. For example, a
Trojan horse can be used to destroy important data and then destroy itself. Fired employees have used
Trojan horses to destroy their employees’ data.
Virus Programs
These are programs with unauthorized information or instructions. They can spread by the electronic
transfer of information between systems or the physical exchange of media, such as disks carried from
one system to another.
Trapdoors
These are unauthorized entry points into programs or databases. Through a trapdoor individuals can
change data or instructions without approval. For example, a programmer who has an unauthorized entry
point into the cash collections program is able to write-off accounts without proper approval.