FINAL-MICS Important Topics
Lesson 1
- Decomposition with example
- Expert systems
- Characteristics of Information
Lesson 2
- Business Cycles
- Batch Processing & Direct Processing
Lesson 3
- Limitations of MIS
- Factors to design MIS
- Pre-requisites of MIS
Lesson 4
- What is a model? Benefits of a computerized model
- Personnel information system
- MRP
- Systems approach to problem solving
Lesson 5
- Tools for DSS
- Purpose of EIS
- Components of DSS
Lesson 6
- Benefits of C/S
- Risk & Control Techniques
- Traditional computing models
Lesson 7
- Cost/Benefits of analysis
- Fact finding techniques
- Analysis of present system
- Prototyping approach
- Reasons why organizations fail to achieve systems development objectives
Lesson 8
- Systems manual
- Coding system
- Designing data entry
- Forms design
Lesson 9
- PDLC
- Factors for evaluation vendors proposals
- Vendor evaluation methods
Lesson 10
- Conversion strategies
- Systems maintenance
- System evaluation
Lesson 12
- BPR & BE
- Evaluation of ERP
- Post implementation scenario
Lesson 13
- O/S Security controls
- DRP
- Steps against virus
- DBMS controls
- System development controls
Lesson 14
- Data coding errors & Controls
- Input Controls
Lesson 15
- Categories of computer frauds based on the data processing model
- Risk to business from computer frauds
- Disk Imaging and analysis technique
- Steps to detect computer fraud
Lesson 17
- Concurrent audit techniques
- Computer security framework
- Detecting unauthorized program changes
- IS auditor concern areas
Lesson 18
- Core principles of information security
- Security policy contents
- security administrator
- Restorative information protection
Lesson 19
- Categories of CASE tools
- Programming work-bench