It New File
It New File
It New File
Authentication The ability to know that a person is who he or she claims to be. Stablished
through passwords
Passwords Known only to authorize users. uses specific word to long on to a computer
system and for accessing specific systems and files
Smart Card A device about the size of a credit card that contains a chip formatted with
access permission and other data.
Biometric Uses systems that read and interpret individual human traits, such as
authentication fingerprints, irises, and voices to grant or deny access
Q. What are the prerequisites for effective IS Planning? [CMA Sam June-2019,2021 ,
September-2022]
There are some of the points crucial for the effective implementation of plans such as:
1) Well-Defined Objectives
2) Flexible Planning
3) Management Information *tern
4) Cautious Prefacing
5) Topmost-level Initiative
6) Unaffected to Changes
7) Incorporation of Short and Long-Term Rans 8) Proper Assessment of Resources
IS Economics
Information economics is the branch of microeconomics that studies how information and
information systems affect an economy and economic decisions.
&onomics and Information systems are already integrated! Information systems are just the
backbone of any economic system. Governments collect huge amounts of data/ information in order
to better form the economic policies and improve the delivery of services. We key data available,
governments can target the weak areas of economy and address the challenges.
IS HR Planning
A Human Resource Information *tern, frequently abbreviated as HR'S, is a software that is capable
of gathering, storing and managing data about the employees in an organization. In general, its
features allow people to have a detailed and precise management of the Human Resources area.
In other words, these systems gather and monitor all the information of workers. This proves to be
key because having a good management of that information can deeply affect the correct operation
of a business.
It is also important to know that this system can receive many names. For example, some refer to
them as Human Resource Management ¥ems. Some others even call them Human Capital
Management *tems. Despite all those little variations, all these usually refer to the same concept.
Developing an IS plan
An information technology (IT) strategic plan is a document that details the comprehensive
technology-enabled business management processes an organization uses to guide operations. It
serves as a guide to IT-related decision making, with IT tasks prioritized and implemented using the
plan as a framework.
Key Insights
The information technology architecture that is created by the businesY IT planning process is a
conceptual design, or blueprint, that includes the following major components:
• Technology Platform: The Internet, intranets, extranets, and other networks, computer
systems, system software, and integrated enterprise application software provide a computing
and communications infrastructure, or platform that supports the strategic use of information
technology for e-business, e-commerce, and other business/ IT applications.
• Data Resources: Many types of operational and specialized databases, including data
warehouses and Internet/intranet databases store and provide data and information for business
processes and decision support.
• Applications Business applications of information technology are designed as
an integrated architecture of enterprise systems that support strategic business initiatives, as well
as cross-functional business processes.
• IT Organization: The organizational structure of the IS function within a company and the
distribution of IS specialists are designed to meet the changing strategies of a business.
Q. Difference between Application Software and ¥em Software. [CMA Sem Dec-2019,
June-2020]
*tem software is meant to manage the system resources. It serves as the platform to run application
software. Application software helps perform a specific set of functions for which they have been
designed.
Q. What is development life cycle? [CMA Exam April-2019, M ay-2022, Dec-18, 20]
A system development life cycle or SDI-C is essentially a project management model. It defines
different stages that are necessary to bring a project from its initial idea or conception all the way to
deployment and later maintenance.
Phases of SDLC
Q. Scplain Seven Phases of the ¥em-Development Life Cycle.ll What are the core activities
in the development process?
1. ¥ems Analysis: At this point, the end-user requirements have been clearly formulated.
Feasibility studies may be carried out to analyze the economic and technical impacts of the project.
2. ¥ems Planning: It identifies whether or not there is the need for a new system to achieve a
business's strategic objectives. This is a preliminary plan for a company's business initiative to
acquire the resources to build on an infrastructure to modify or improve a service.
3. Design: The third phase describes, in detail, the necessary specifications, features and
operations that will satisfy the functional requirements of the proposed system which will be in
place.
4. ¥ems Development: The fourth phase is when the real work begins—in particular, when a
programmer, network engineer and/or database developer are brought on to do the major work
on the project.
5. Integration and The fifth phase involves systems integration and system—normally carried
out by a Quality Assurance (QA) professional—to determine if the proposed design meets the
initial set of business goals.
6. Deployment: The logic of the system is completed and ready to be deployed with any
accompanying hardware.
7. Operations and M aintenance: The seventh and final phase involves maintenance and regular
required updates. This step is when end users can fine-tune the system, if they wish, to boost
performance, add new capabilities or meet additional user requirements.
SDLC M odels
Software Development life (SDLC) is a spiritual model used in project management that defines the
stages include in an information system development project, from an initial feasibility study to the
maintenance of the completed application.
There are different software development life cycle models specify and design, which are followed
during the software development phase. These models are also called "Software Development
Process Models.
Q. Scplain the Phases of the SDI-C M odels.
1) Waterfall Models: The waterfall isa universally accepted SDI-C model. In this
method, the whole process of software development is divided into various phases.
2) RAD Model: RAD or Application Development process is an adoption of the
waterfall model; it targets developing software in a short period.
3) Spiral Model: The spiral model is a risk-driven
SDLC (Models)
process model. This SDI-C model helps the group to
adopt elements of one or more process models like a
waterfall, incremental, waterfall, etc.
4) V-Model: In this type of SDI-C model testing and
the development, the step is planned in parallel. So,
there are verification phases on the side and the
validation phase on the other side.
5) Incremental Model: The incremental model is not a separate model. It is necessarily a
series of waterfall cycles.
6) Agile Model: Agile methodology is a practice which promotes continues interaction
of development and testing during the SDI-C process of any project.
7) Iterative M odel: It isa particular implementation of a software development life cycle
that focuses on an initial, simplified implementation.
8) Big bang Model: Big bang model is focusing on all types of resources in software
development and coding, with no or very little planning.
Lack Of top management support Identify the senior manager who has most ta gain from the Of the
project, and recruit this ihdividuel Champjon the project,
Q. What are new approaches for development in the digital firm era?
Companies are turning to rapid application design, joint application design (JAD), agile
development, and reusable software components to accelerate the systems development process.
application development (RAD) uses object-oriented software, visual programming,
prototyping, and fourth-generation tools for very rapid creation of systems. Agile development
breaks a large project into a series of small subprojects that are completed in short periods using
iteration and continuous feedback.
Use of Management. CASE OOSD
Upper-CASE tools - CASE packages that focus on activities associated with the early stages of
systems development.
Lower-CAE tools- focus on the later stages of systems development and are capable of
automatically generating structured program code.
Integrated-CASE tools- provide links between upper- and lower-CASE packages.
Systems Development (OOSD)
Object-oriented systems development typically involves:
Identifying potential problems and opportunities within the organization that would
be appropriate for the 00 approach
Defining the kind of system users require
Designing the system
Programming or modifying modules
E../aluation by users
Periodic review and modification
Systems Investigation
The Investigation
Identifies potential
Team
problenms & opportunities
Of & considers thenl in light personnel stakeholders
the
connpany's goals
SI report results of systerns
• Undertakes feasibility analysis
investigation & the
process Of feasibility • Establishes system development
goals
• Selects system development
methodology
• Prepares system investigation report
analysis &
a course Of action
Q. Define analysis & its purpose, process?[CMA Exam April-2019, May-2023]
*tems analysis is the process by which an individual (s) studies a system such that an information
system can be analyzed, modeled, and a logical alternative can be chosen. *terns analysis projects
are initiated for three reasons: problems, opportunities, and directives.
Purpose: *tem analysis is conducted for the purpose of studying a system or its parts in order to
identify its objectives. It is a problem solving technique that improves the system and ensures that all
the components of the system work efficiently to accomplish their purpose.
Process: *tem analysis refers to the process of gathering data, interpreting information, identifying
issues and using the results to recommend or develop possible system improvements.
Q. What the
are different of $em
System investigation includes the following two stages:
1. Problem definition: The first responsibility of a system analyst is to prepare a written
statement of the objectives of the problem. Based on interviews with the user, the analyst
writes a brief description of his/her understanding of the problem and reviews it with both the
groups. People respond to written statements. Following are some possible definitions of
problems:
Analyss
It is a process of collecting and interpreting facts, identifying the problems, and decomposition of
a system into its components.
*tern analysis is conducted for the purpose of studying a system or its parts in order to identify
its objectives. It is a problem solving technique that improves the system and ensures that all the
components of the system work efficiently to accomplish their purpose.
Design
It is a process of planning a new business system or replacing an existing system by defining its
components or modules to satisfy the specific requirements. Before planning, you need to
understand the old system thoroughly and determine how computers can best be used in order to
operate efficiently.
are principal methodologies for modeling and designing *erns?
Q. What the
The two principal methodologies for modelling and designing information systems are structured
methodologies and object-oriented development. Sructured methodologies focus on modelling
processes and data separately. The data flow diagram is the principal tool for structured analysis,
and the structure chart is the principal tool for representing structured software design.
Objectoriented development models a system as a collection of objects that combine processes
and data. Object-oriented modelling is based on the concepts of class and inheritance.
Implementation
The term Implementation may be defined as "Implementation is the process of converting the
manual or old computerized system with the newly developed system & making it operational,
without disturbing the functioning of the organization."
Operations & maintenance involves planning for, and executing, activities, such as operating the
system, monitoring systern performance, making repairs, hiring and training operators, testing
the system after any changes are made, and tuning the system. All systems require regular
maintenance.
completion of the Operations and Maintenance Phase should comprise:
The purpose of the Operations and Maintenance Phase is to ensure the information system is
fully functional and performs optimally until the system reaches its end of life.
Review
A systemic enquiry (also known as a systems review) involves performing a brief screen for
symptoms in other body systems which may or may not be relevant to the primary presenting
complaint. A systemic enquiry may also identify symptoms that the patient has forgotten to
mention in the presenting complaint.
1. Enterprise Resource Planning Usually, large companies often use reliable RP management
information systems. However, this system can also be used on a small scale.
2. S-lpply Chain Management (SCM): This system is beneficial for management because it can
help to integrate material supply management from suppliers, manufacturers, and retailers to final
consumers.
4. Office Automation System (OAS): This application helps facilitate communication between
departments within a company by integrating computer servers for each company user.
5. Knowledge Work ¥em (MS): This system integrates new knowledge into an entity or
organization/unit.
6. Informatics Management ¥em ('MS): IMS helps support various tasks within the organization
and analyses decision-making.
7. Deci§on Support ¥em (DSS): This system helps executives make decisions by observing the
business environment.
8. Scpert ¥em (S) and Artificial Intelligent (Al): Both systems use artificial intelligence, which
helps analyze a problem using expert energy knowledge.
Q. What are the components of a decision support Exam June, 2021]
A decision support systems consists of three main components, namely
database, software system and user interface.
1. DSS Database: It contains data from various sources, including
internal data from the organization, the data generated by different
applications, and the external data mined form the Internet, etc.
2. DSS Software It consists of various mathematical and analytical models that are used to
analyze the complex data, thereby producing the required information.
User Interface 3. DSS User Interface: It is an interactive graphical interface which makes the interaction
easier between the DSS and its users.
Q. How will MIS ease your corporate life? [CMA S(am M ay, 2022]
There are some key advantages of effective use of management information systems:
i. The MIS satisfies the diverse needs through variety of systems such as query system, analysis
system, modeling system and decision support system.
ii. The MIS helps in strategic planning, management control, operational control and transaction
processing.
iii. The MIS helps the junior management personnel by providing the operational data for
planning, scheduling and control.
iv. The MIS helps the middle management in short term planning, target setting and controlling
the business functions.
v. The MIS helps the top level management in goal setting, strategic planning and evolving the
business plans and their implementation.
vi. The MIS plays the role of information generation, communication, problem identification and
helps in the process of decision-making.
The impact of MIS on the functions is in its management with a good MIS supports the
management of marketing, finance, production and personnel becomes more efficient. The
tracking and monitoring of the functional targets becomes easy. The functional managers are
informed about the progress, achievements and shortfalls in the activity and the targets.
Q. How does the Management Information SFem (MIS) help better business
[CMA Sem ulne-2021, September-2022]
MIS reports can help identify an enterprise's strengths and weaknesses, which can lead to
strategically reproducing strengths and successes, as well as exercising weaknesses and failures.
M IS can help improve operational efficiency, product development, and business-critical
decisionmaking.
Management information systems provide the owner and other decision-makers at a business
with the data needed to make informed decisions for the company. A MIS provides background,
current data and trend analysis so you have ready information on all areas of the business.
Planning for an overall growth for the company. Thorough market research to understand the
market dynamics involving demand-supply. Various policies that will dominate the course and
movement of business. S(pansion and diversification to conquer new markets.
Q. Brief Scpert and when to use S«pert systems in business. [CM A June-2019, April,
Dec-2020]
An S(pert Sister-n is a computer program (software) that uses artificial intelligence (Al) to
reproduce the judgment of a human with expert knowledge in a particular field. A good S(pert
*tem solves a problem accurately, quickly and is easy to use. It doesn't necessarily require
technical wizardry. Al jargon can mask a bad S(pert $tem.
Typically, expert systems function best with specific activities or problems and a discrete
database of digitized facts, rules, cases, and models. S(pert systems are used widely in
commercial and industrial settings, including medicine, finance, manufacturing, and sales.
S(pert *tems are often used to help non-experts when a human expert is too expensive, the results
too slow if use a human(s), error rate too high with a human(s), unintentional human bias, or it is
difficult for a person to reach the location.
Q.What is Virtual Reality? State the effective to use VR and the impact of VR
as well. Scam Dec-2018, 2019, 2020]
Virtual Reality, or VR is the use of computer technology to create a simulated environment which
can be explored in 360 degrees.
Virtual reality is a simulated experience that can be similar to or completely different from the real
world. Applications of virtual reality include entertainment, education and business.
The main purpose of the MIS is to give managers feedback about their own performance; top
management can monitor the company as a whole. Information displayed by the MIS typically
shows "actual" data over against "planned" results and results from a year before; thus it
measures progress against goals. The MIS receives data from company units and functions. Some
of the data are collected automatically from computer-linked check-out counters; others are
keyed in at periodic intervals.
Q. Transaction proces§ng $ems (TPS) facilitate the immediate processing of data. [CMA
Dec-2020]
Direct data entry is commonly employed through source data automation. Increasingly,
transaction processing systems rely on electronic data interchange (ÐI). By replacing paper
documents with formatted transaction data sent over telecommunications networks, these
systems provide for computer-to-computer communication without repeated data entry. Although
used internally by some firms, ÐI primarily serves the needs of intercompany communication.
Q. What isa DSS?How does a DSS differ from a MIS? [CMA Exam April-2020]
A decision support system is an information system that supports business or organizational
decision-making activities.
MISis used to in control process. DSS is used in planning, staffing and decision making. MIS is
used by middle level, low level users and senior executives in some cases. DSS is used by
analysts, professionals and managers.
Q. What are the objectiveYfeaturesof Group DSS? How do they differ from an
Individual DSS? [CMA Scam April-2020]
A group decision support system (GDS) is an interactive computer-based system that facilitates a
number of decision-makers (working together in a group) in finding solutions to problems that
are unstructured in nature.
Features of Group Decision Sy<em (GDS):
of Use
Better Decision Making
Enphasis on Semi-strudured and Unstructured Decisions
$ecific and General &lpport
S-lpports all Phases of the Decision Making
&lpports Positive Group Behavior
GDS focuses on group decisions while DSS focuses on individual decisions. DSS relies to a
knowledge base to some degree while a GDS does not. GDS requires a working connection
between users while DSS does not. GDS is applicable to every situation while DSS is not.
Q. Define Decision Support ¥em?What are the components of Decision Support ¥em? [CMA
S(am April-2019]
A decision support system (DSS) is an information system that aids a business in decision-making
activities that require judgment, determination, and a sequence of actions.
1. M Odel M anagement The model management system stores models that managers can
use in their decision-making. The models are used in decision-making regarding the financial
health of the organization and forecasting demand for a good or service.
2. User Interface: The user interface includes tools that help the end-user of a DSS to
navigate through the system.
3. Knowledge Base: The knowledge base includes information from internal sources
(information collected in a transaction process system) and external sources (newspapers and
online databases).
resource planning refers to a type of software that organizations use to manage day-to-day
business activities such as accounting, procurement, project management, risk management and
compliance, and supply chain operations.
systems typically cover all aspects of business operations and commonly provide:
An integrated system
Common database
Real-time operation
S]pport for all applications/components
Common user interface across application/components
On-premise, cloud or SaaS deployment
tvlanagernent
Inventory tvlanagerner•t
Order
Managernent
Finance. A finance module, the foundation of just about every RP system, manages the general
ledger and all financial data. It tracks every transaction, including accounts payable (AP) and
accounts receivable (AR), and handles reconciliations and financial reporting.
Procurement. The procurement module manages purchasing, whether raw materials or finished
goods.
M anufacturing. Manufacturing can be complicated, and this module helps companies coordinate all
the steps that go into making products.
Inventory management. An inventory management module shows current inventory levels down to
the SKU level and updates those numbers in real time.
Order management. This application monitors and prioritizes customer orders from all channels as
they come in and tracks their progress through delivery.
Human resources management (HRM). A human resources management (HRM) or human capital
management (HCM) module is similar to a workforce management module.
Ecommerce. An ecommerce module allows retailers and brands to manage the back- and frontends
of their online stores.
M arketing automation. This module manages marketing efforts across all digital channels — email,
web, social — and enables organizations to optimize and personalize their messaging.
04 Core
Purchasing
Role of & Management Accountants in implementing practical real-life manufacturing ERP
Q. What are the role of & Management Accountants (CM A's) in implementing practical
real-life[CMA Exam May-2023]
The role of CMAs in the enterprise today has become much more significant since packages tend
to lower the cost of the product or services. There are several tools that can be very helpful for
the management accountants while making decisions. CMAs play the following role:
1) Selection of Appropriate Package: There are so many software having the almost
same features available in the market to cater to requirement of the organization. But
selection is to be made for RP software which may provide the organization an ability to
measure the performance, efficiency, quality, customer and product profitability &
analysis, and can eliminate non- value added work.
2) Decision which Departments need Depending upon the
size and resources available with the Organization, a decision by a company management
is to be taken whether it needs full RP integration or needs to cover only selected areas/
processes.
3) a Committee for Implementation of A Committee is to be constituted
by the management drawing the experienced officials from the Departments/ processes
where RPsystem is to be implemented.
4) Identify Value-added and Non Value added Activities: CMA(s) should analyze
the activities segregating them in value added and non-value added services since some
of the activities add value to a product or service while some do not.
5) Identify resource and activities The next step for CMAs is to assist the
management to identify the resource costs and analyze the activities.
2. Tenacity and Commitment from Top M anagement: Senior managers are the key
decisionmakers for any organization while implementing Their involvement is essential for the
success of a project. So any form of ignorance and laxity may cause ineffective decisions and
delayed operations.
3. Proper & Adequate Training: Once the system is implemented, resentment from
employees is an ordinary happening and may result in downgrading productivity. So you can't let
unskilled or semiskilled staff go onboard.
5. Proper Planning & Management: Forecasting and estimation are the keys to a successful
RP implementation.
6. Incurred on Implementation: When you're implementing RP, the cost incurred is higher
than the initial costs. it all depends on the customization cost. When the customization cost is
more, the higher will be the implementation cost.
7. Enployee Retention: Despite the training provided, employees leave the organization
after the implementation of RP, as it can be a major dent in a company's growth.
8. Sufficient Testing an system doesn't mean whether it's working smoothly or not, but to be
delighted by its performance and see if it is up to the business needs.
9. Maintenance If you're an entrepreneur, Implementing RPis not the final frontier. It has
maintenance attached, which takes a toll on overall expenses and eventually pulverize your
plans.
Project management is the use of specific knowledge, skills, tools and techniques to
deliver something of value to people. The development of software for an improved
business process, the construction of a building, the relief effort after a natural disaster,
the expansion of sales into a new geographic market—these are all examples of projects.
Project management mainly deals with these ten areas-
Integration
Cost
Human resources
Sakeholder management
Scope
Quality
Communications
Time
Procurement
Rsk Management
5. Quality Control: Project management is important because it ensures the quality of whatever
is being delivered, consistently hits the mark.
Q. What are the of project management, and why is it so essential in developing information
[CM A Scam M ay, 2022]
Good project management is essential for ensuring that systems are delivered on time and within
the budget and provide genuine business benefits. Project management activities include
planning the work, assessing the risk, estimating and acquiring resources required to accomplish
the work, organizing the work, directing execution, and analyzing the results. Roject
management must deal with five major variables: scope, time, cost, quality, and risk.
Following are the main Software Project M anagement Objectives:
Q.What factors should be considered for selecting and evaluating information *ems projects?
[CMA Sem May-2023]
Numerous factors must be considered when selecting a project. These factors include:
The Internet is a vast network of computers that connects millions of people all over the world.
The Internet uses the client/server model of computing and the TCP/ IP network reference
model. Every computer on the Internet is assigned a unique numeric IP address. No one owns the
Internet, and it has no formal management organization. However, worldwide Internet policies
are established by organizations and government bodies, such as the Internet Architecture Board
and the World Wide Web Consortium. The Internet must also conform to the laws of the
sovereign nation-states in which it operates & the technical infrastructure that exist within the
nation-state.
The Internet enables employees to gain remote access to the company's internal systems through
its Web site. They are able to better service customers and suppliers, improve operational
efficiency, increase productivity, lower operational costs, have a broader market base, and reach
more individual customers on a global scale by establishing a Web presence. The cost of e-mail
and other Internet services tend to be far lower than equivalent voice, postal, or overnight
delivery costs, making the Internet a very inexpensive communication medium. It is also a very
fast method of communication, with messages arriving anywhere in the world in a matter of
seconds or minutes.
Risk fadors in IS projects
Q.What are the principal risk in information projects? [CMA S(am January, 2022]
The level of risk in a systems development projed is determined by (1) project size, (2) project
structure, and (3) experience with technology. Information systems (IS) projects are more likely
to fail when there is insufficient or improper user participation in the systems development
process, lack of management support, and poor management of the implementation process.
There is a very high failure rate among projects involving business process reengineering,
enterprise applications, and mergers and acquisitions because they require extensive
organizational change.
Q.Scplain fators that increase the risk to Information Technology project failure. [CMA
June-2020]
1) Lack of Interest from Management.
2) Cost-cutting Approaches.
3) Lack of Proper Planning.
4) Selection of Technologies.
5) Failure to Manage Scope Creep.
6) Overly-optimistic Project Shedule.
7) Overstaffing of Projects.
8) Poor Communication.
E Disruptive Technology [20 0/01
• to Blockchain. [CMA Sem May, 2022]
Blockchain is the backbone Technology of Digital CryptoCurrency BitCoin. The blockchain is a
distributed database of records of all transactions or digital event that have been executed and
shared among participating parties.
Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and
tracking assets in a business network. An aset can be tangible (a house, car, cash, land) or
intangible (intellectual property, patents, copyrights, branding). Virtually anything of value can
be tracked and traded on a blockchain network, reducing risk and cutting costs for all involved.
A
broadcast to
party
Approved Transaction
1. Public Blockchain: These blockchains are completely open to following the idea of
decentralization. They don't have any restrictions, anyone having a computer and internet can
participate in the network.
As the name is public this blockchain is open to the public, which means it is not owned by
anyone.
Anyone having internet and a computer with good hardware can participate in this
public blockchain.
All the computer in the network hold the copy of other nodes or block present in the
network
In this public blockchain, we can also perform verification of transactions or records
S(ample: Bitcoin, Rhereum, Litecoin
2. Private Blockchain: These blockchains are not as decentralized as the public blockchain only
selected nodes can participate in the process, making it more secure than the others.
3. Hybrid Blockchain: It is the mixed content of the private and public blockchain, where
some part is controlled by some organization and other makes are made visible as a public
blockchain.
It is a combination of both public and private blockchain.
Permission-based and permissionless systems are used.
User access information via smart contracts
Even a primary entity owns a hybrid blockchain it cannot alter the transaction
Semple of a hybrid blockchain is Dragonchain.
Bockchain applications go far beyond cryptocurrency and bitcoin. With its ability to create more
transparency and fairness while also saving businesses time and money, the technology is
impacting a variety of sectors in ways that range from how contracts are enforced to making
government work more efficiently.
Examples of
Fintech
SALE
Budgeting apps
Current Trends in Financial Technology (Fintech)
1) RegTech: Reg Tech is a platform that helps organizations to comply with complex
industry regulations.
2) Biometric authentification: Bometric authentication is considered to be more secure
than regular passwords and PINs.
3) Artificial intelligence: Smart algorithms improve many processes of banks, credit and
insurance companies.
4) Blockchain: In the financial sector, banks are more actively implementing blockchain
than insurance and credit organisations.
5) Cloud computing: With the cloud, financial companies get scalable storage and large
computing power at competitive prices.
6) Virtual cards: Virtual cards are becoming a guarantee of safe payment for goods and
services on the Internet.
7) Voice payments: finTech companies want to expand the use of digital assistants by
introducing them in financial management.
The future of Fintech and the Banking
Over the decade, the finTech industry has experienced significant growth. The global market was valued at
around $7.3 trillion in 2020, and is projected to grow at a compound annual growth rate (CAGR) of 26.87
percent up to 2026. A variety of factors have contributed to the advancement of finTech over the decade.
Technological advancements have changed how we do nearly everything in our day-to-day lives. Some
technologies such as the IOT, artificial intelligence (Al), blockchain and cloud computing, have been major
drivers of finTech innovation.
financial technology in banking is not new. It has been used to facilitate electronic markets since the
1980's. Already, many banks are partnering with fin Tech firms to enhance their service offerings. Rs are
realising that consumers' brand loyalty is decreasing, while demand for speed, accuracy, transparency and
more technology is rising.
Banks perform payment and transfer functions for an economy. The Internet can now facilitate and even
perform these functions. The digital transformation that financial technology brings reduces this advantage,
as this information can be digitally analyzed. Even the nature of deposits is being transformed. Banks in the
future will have to accept deposits and process transactions made in digital form, either Central Bank
Digital Currencies (CBDC) or cryptocurrencies. This presents a number of issues:
(1) it changes the way financial services will be delivered,
(2) it requires a discussion on resilience, security and competition in payments,
(3) it provides a building block for better cross border money transfers and
(4) it raises the question of private and public issuance of money.
Fintech Applications
Q. S(plain the applications of Fintech?[CMA Sam January,2022]
There are various software applications of Fntech that exists:
1) Mobile Banking: The only financial securities and wellness a consumer looks for due
to which several financial institutions or bodies are continuously adopting mobile banking
capabilities at a huge-expending level along with the increasing necessity of digital banking
among consumers.
2) Mobile Payments: Mobile payment applications and gateways are some of the most
prevalent uses of fintech and act as wallets for both normal currency and cryptocurrency.
3) Crowdfunding Platforms: Crowdfunding platforms like Kckstarter, GoFundMe, and
Patreon are the result of developments in fintech.
4) Robo-advisors: Robo-advisors, such as Betterment, are online investment-
management services, deploying algorithms to automate investment advice in terms of
lowering costs and escalating accessibilities.
5) Cryptocurrency and blockchain: Fntech includes the development and deployment of
digital currencies such as cryptocurrency (bitcoin) and is likely to have positive impacts by
further growth in cryptocurrencies availability and adoption.
6) Insurtech: Fntech companies are engaging with traditional insurance companies to
automate the processes at its entirety and enabling them to expand claim-coverages.
7) Regtech: Regtech, regulatory technology as it has known, focuses on the automation
compliance rules/processes for financial institutions, especially those firms that include Anti-
Money Laundering and Know Your Customer (KYC) guidelines which cope up against
fraud.
8) Trading: With all involved benefits, trading and investing have been upgraded with
the adoption of Fntech.
Digital
Banking
Digital
Payments
Digital
Lending
Types of
Consumer Finance
Digital Fintech
Apps Investment
• to the Fourth
revolution (41R)
The Fourth Industrial Revolution is a way of describing the blurring of boundaries between the
physical, digital, and biological worlds. It's a fusion of advances in artificial intelligence (Al),
robotics, the Internet of Things (10T), 3D printing, genetic engineering, quantum computing, and
other technologies.
»ecific technologies of the Fourth Industrial Revolution include, but are not limited to:
INDUSTRIAL 4.0
Automation Big Data Cloud Computing Autonomous 10T Data Management
The Fourth Industrial Revolution improves an accountants' work experience by reducing the
number of repetitive tasks they need to do each day so they can focus on more meaningful work
and creating greater value for their client base.
The Fourth Industrial Revolution is impacting all areas of business, and for accounting, that's a
good thing. It improves how we access, manage, and protect client data. It leads to better growth
opportunities based on solid client experiences. And it improves the overall accountant-client
relationship.
In the future, technological innovation will also lead to a supply-side miracle, with long-term
gains in efficiency and productivity. Transportation and communication costs will drop, logistics
and global supply chains will become more effective, and the cost of trade will diminish, all of
which will open new markets and drive economic growth.
In addition to being a key economic concern, inequality represents the greatest societal concern
associated with the Fourth Industrial Revolution.
Big Data.
Q. Define Big Data and describe the technologies for managing and analyzing it. [CMA
May, sept -2022]
Big Data is a collection of data that is huge in volume, yet growing exponentially with time. It is
a data with so large size and complexity that none of traditional data management tools can store
it or process it efficiently. Big data is also a data but with huge size.
There are some technologies for managing and analyzing Big Data which are given
below1. Artificial Intelligence: [CMA S(am June 2017, April-2019, Dec-2020, May-
2023]
A broad bandwidth of computer science that deals in designing smart machines capable of
accomplishing various tasks that typically demand human intelligence is known as Artificial
Intelligence.
For example, Al can be used for drug treatment, healing patients, and conducting surgery in OT.
2. NoSQL Database: NoSQL incorporates a broad range of separate database
technologies that are developing to design modern applications.
For example, companies like Facebook, Google and Twitter store terabytes of user data every
single day.
4. Data Lakes: Data Lakes refers to a consolidated repository to stockpile all formats
of data in terms of structured and data at any scale.
6. Apache Spark: With in-built features for streaming, SQL, machine learning and
graph processing support, Apache »ark earns the cite as the speedest and common
generator for big data transformation.
1. Structured: Any data that can be stored, accessed and processed in the form
of fixed format is termed as a 'structured' data.
2. Any data with unknown form or the strudure is classified as
unstructured data.
3. Semi-structured data can contain both the forms of data.
Volume
Variety
Velocity
Variability
Q. What do you think about production management using Internet of Things (IOT)
technology? [CMA Sam June-2021, Sept-2022]
There are benefits applying IOT in production management which include (not exhaustive list):
1. Rapid replenishment of raw materials - when IOT sensors are deployed in various
locations in the production systems, any raw material reaching lower threshold will trigger
alert to the sources to automatically dispatch & supply the new raw materials. This can
ensure continuous production & minimize down time of the production systems.
2. Elsure quality of products- IOT sensors can be embedded within the production system to
measure the quality of the products so that any measurement goes beyond the variance will
be alerted & reported so that corredive actions can be triggered via other systems or via the
actuators next to the sensors etc. This can improve / guarantee high quality of the products
manufactured.
3. maintenance - IOT sensors can be deployed to all the critical production
systems / assets or components so that any performance degradation detected on the
components or Sid of Life of the components is near or reached, alerts will be triggered to
component supplier so that they can come to perform proactive maintenance etc. This can
increase high availability of the components within the production system.
M achine Learning
Q.What is machine learning? [CMA Sam May-2023]
Machine learning (ML) isa type of artificial intelligence (Al) that allows software applications to
become more accurate at predicting outcomes without being explicitly programmed to do so.
Machine learning algorithms use historical data as input to predict new output values.
Introductionto
Lear
ns
Q.What are the 4 basics of machine learning?
Machine Learning techniques are divided mainly into the following 4 categories:
S-lpervised Learning. &lpervised learning is applicable when a machine has sample data,
i.e., input as well as output data with correct labels.
Unsupervised Learning.
Reinforcement Learning.
Semi-supervised Learning.
Q. What is network protocol? Identify at three wireless telecommunication protocols
[CMA S(am &n-2022, June-2019,2021]
A network protocol is an established set of rules that determine how data is transmitted between
different devices in the same network.
Types of Wireless Communication Protocols in IOT
1) Wi-fi.
2) Bluetooth.
3) Zigbee.
4) Z-Wave.
5) 6LoWPAN. 6) FID. 7) Cellular.
8) NB-IOT
Q. What is the impact of usng ICT in taxation by Government? What are the experiences
of various countries?[CMA Exam June, 2021]
ICT has affected almost each and every area of business world. It has also assisted Govt. to curb
tax evasion to a large extent. In manual records, it was not very easy to track the records, it is not
so that manual record keeping was not efficient, but when we compare it with digital record
keeping, then really manual record keeping seems to be less efficient,as far as retrieval of data is
concerned. Moreover, various modes like eTDS eTCSe Filing of Income Tax Returns have really
made tax payment by assessees, and in that way,Govt has also been able to expand its tax base
by creating a large pool of satisfied tax payers.
Collecting taxes and fees is a fundamental way for countries to generate public revenues that
make it possible to finance investments in human capital, infrastructure, and the provision of
services for citizens and businesses.
Q. Write short notes on.• [CMA Exam June, 2021]
Digital M arketing: Digital marketing, also called online marketing, is the promotion of brands to
connect with potential customers using the internet and other forms of digital communication.
This includes not only email, social media, and web-based advertising, but also text and
multimedia messages as a marketing channel.
Robotic Process Automation (RPA): Robotic process automation is a form of business process
automation technology based on metaphorical software robots or on artificial intelligence [digital
workers. It is sometimes referred to as software robotics.
Sccel VBA Macro: BA Macros use the Visual Basic Application in Scel to create custom
usergenerated functions and speed up manual tasks by creating automated processes.
Additionally, VBA can be used to access the Windows Application Programming Interface
(API).
Pivot Report: [CMA Bern April-2019] Pivotal Report means a report on 'Professional,
Vocation- al, Technical and Academic Learning' programmes that meet the critical needs for
economic growth and social develop- ment, generally combining course work at universities,
uni- versities of technology and colleges with structured learning at work.
Q. What is the role of ICTs in enhancing economic growth, generating new business and
employment opportunities? [CMA Sem Dec, 2020]
1.2 The Fundamental Role of ICTs in Modern Economic Growth and Development
Unbound from the strictures of the PTT days, ICT has become the foundation of every sector of every economy,
everywhere. The reasons for this are, by now, fairly well-known, but demand brief repetition here. Information
and communications technologies:
reduce transaction costs and thereby improve productivity
offer immediate connectivity — voice, data, visual — improving efficiency, transparency, and
accuracy
substitute for other, more expensive means of communicating and transacting, such as physical
travel
increase choice in the marketplace and provide access to otherwise unavailable goods and
services
widen the geographic scope of potential markets, and channel knowledge and information of
all kinds
Foreign Key: A foreign key is a column or group of columns in a relational database table that
provides a link between data in two tables. It is a column (or columns) that references a column
(most often the primary key) of another table.
(b) Biometric Security: Biometric security is a security mechanism used to authenticate and
provide access to a facility or system based on the automatic and instant verification of an
individual's physical characteristics.
(c) Service Level Agreement (SLA): A service-level agreement (S-A) defines the level of
service you expect from a vendor, laying out the metrics by which service is measured, as well
as remedies or penalties should agreed-on service levels not be achieved. It is a critical
component of any technology vendor contract.
(d) Pivotal Report of Scel: A PivotTable is a powerful tool to calculate, summarize, and
analyze data that lets you see comparisons, patterns, and trends in your data. RvotTables work a
little bit differently depending on what platform you are using to run Excel.
(e) Data Centre: A data center or data centre is a building, a dedicated space within a
building or a group of buildings used to house computer systems and associated components,
such as telecommunications and storage systems.
(f) Data Data redundancy occurs when the same piece of data exists in
multiple places, whereas data inconsistency is when the same data exists in different formats in
multiple tables.
Q. What does Pivot mean? How do you create a pivot report? [CMA Sam Dec-
2020]
A PivotTable is an interactive way to quickly summarize large amounts of data. You can use a
PivotTable to analyze numerical data in detail, and answer unanticipated questions about your
data.
How to Create a Pivot Table:
1) Biter your data into a range of rows and columns.
2) Sort your data by a specific attribute.
3) Highlight your cells to create your pivot table.
4) Drag and drop a field into the "Row Labels" area. 5) Drag and drop a field into the
"Values" area. 6) fine-tune your calculations.
Q. You have a buSness process that your business requires but your current does not have
those capabilities what can you do? [CM A S(am Dec-2020]
Manufacturers must ensure that the RPthat they select for their business includes
technologyenabled automation of the business processes that are most important to them.
Factors can help ensure a successful implementation1)
Project Strategy and Sart Up.
2) Management Commitment.
3) Project Sope.
4) Project Team.
5) Change Management, Communication and Training.
6) Customizations/ Modifications.
7) Budget.
8) Project Closure.
Q. Why is the Blockchain considered to be a 'disruptive' technologyo. [CMA S(am Jan-
2023]
Blockchain is a distributed ledger technology that records, and tracks data based on a
decentralised and transparent system.
Bockchain has been considered a disruptive technology compared to the Internet, promising
innovation in the financial and commercial area comparable to the impact that the Web had on
communication. It stands to revolutionise the way we interact with each other based on three
main concepts:
Q. What role do the bridge, router, brouter, gateway and switch play in a network.
June-2019, April-2020]
Bridge: Bridge is used to divide a large network into smaller segments. Basic functions of the
Bridge are the following: —
Breaking a large network into smaller segments.
Connecting different media types. &JCh as connects UTP with the fiber optic.
Connecting different network architectures. &JCh as connects Rhernet with the
Token ring.
There are three types of Bridge:- Local Ùidge, Remote &idge and Wireless Bridge.
Router: A router is a networking device that forwards data packets between computer networks.
perform the traffic directing functions on the Internet.
Thank you. If
you face any
problem, Plz feel
free to chat with
me.
Whatsapp +
8801710500610
Bridge router/ Brouter: A bridge router or brouter is a network mizaŒuucroßel
device that works as a bridge and as a router. The brouter routes
packets for known protocols and simply forwards all other
packets as a bridge would.
Gateways: Gateway is a network device used to connect two or
more networks having different protocols. A gateway usually is
a computer with multiple NICs connected to different networks.
A gateway can also be configured completely using software.
A switch is a layer-2 network connecting device, i.e., it works on the physical and
data-link layer of the OSI model.