SlideShare a Scribd company logo
1 of 15
USING SOFTWARE OF CAS
TWO ACTIVITIES ARE INVOLVED
• One time activities and
• Recurring activities
One time activities
• It include creation of organisation details,
accounting year, type of ledger etc.
Recurring activities
It include entry of
transactions and
generation of
reports.
SECURITY FEATURES OF CAS
SOFTWARE
• Password security
• Data Audit
• Data Vault
PASSWORD SECURITY
Password is a key to allow access
to the mechanism. A person in
an organisation may be given
access to a particular set of data
while he may be denied access
to another set of data
DATA AUDIT
This feature enables one to know as to
who and what changes have been
made in the original data. This helps in
fixing the responsibility of the person
who has manipulated the data
DATA VAULT
Software provides additional security through
data encryption. Encryption scrambles the
information so as to make its interpretation
extremely difficult. Encryption ensures
security of data even if it lands in wrong
hands.
•Timely generation of reports and information in
desired format
•Efficient record keeping
•Ensures effective control over the system
•Economy in the processing of accounting data
•Confidentiality of data is maintained
ADVANTAGES OF CAS
LIMITATIONS OF CAS
• Faster obsolescence of technology
necessitates investment in shorter
period of time
• Data may be lost or corrupted due to
power interruptions
• Data are prone to hacking
• Un-programmed and un-specified
reports cannot be generated
ACCOUNTING INFORMATION SYSTEM (AIS)
Management
information system
Sales &
receivables sub
system
Cash sub
suystem
Purchase
accounts payable
sub system
as
Wave Template
Your name
Examples of default styles
• Text and lines are like this
• Hyperlinks like this
• Visited hyperlinks like this
Table
Text box
Text box
With shadow
Sample Graph (3 colours)
Example Bullet Point Slide
• Bullet point
• Bullet point
– Sub Bullet

More Related Content

What's hot

Disaster recovery
Disaster recoveryDisaster recovery
Disaster recoverySameeu Imad
 
2016 mindthesec Format-Preserving Encryption
2016 mindthesec Format-Preserving Encryption2016 mindthesec Format-Preserving Encryption
2016 mindthesec Format-Preserving EncryptionBruno Motta Rego
 
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTUNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTMicro Focus
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security ChecklistDruva
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016 Scott Carlson
 
How to develop HIPAA Compliant Applications
How to develop HIPAA Compliant Applications How to develop HIPAA Compliant Applications
How to develop HIPAA Compliant Applications Joel Garcia
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
Single Realm Multi-Cloud Security Management with Palo Alto Networks
Single Realm Multi-Cloud Security Management with Palo Alto NetworksSingle Realm Multi-Cloud Security Management with Palo Alto Networks
Single Realm Multi-Cloud Security Management with Palo Alto Networks2nd Watch
 
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...IDERA Software
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge Pereira
 
dataEstate® - Reimagining data governance for the Legal industry
dataEstate® - Reimagining data governance for the Legal industrydataEstate® - Reimagining data governance for the Legal industry
dataEstate® - Reimagining data governance for the Legal industryMorane Decriem
 
Cng 125 – chapter 12 network policies
Cng 125 – chapter 12   network policiesCng 125 – chapter 12   network policies
Cng 125 – chapter 12 network policiesFrank Victory
 

What's hot (18)

Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
2016 mindthesec Format-Preserving Encryption
2016 mindthesec Format-Preserving Encryption2016 mindthesec Format-Preserving Encryption
2016 mindthesec Format-Preserving Encryption
 
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTUNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
 
How to develop HIPAA Compliant Applications
How to develop HIPAA Compliant Applications How to develop HIPAA Compliant Applications
How to develop HIPAA Compliant Applications
 
BOSSDesk_overview
BOSSDesk_overviewBOSSDesk_overview
BOSSDesk_overview
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Single Realm Multi-Cloud Security Management with Palo Alto Networks
Single Realm Multi-Cloud Security Management with Palo Alto NetworksSingle Realm Multi-Cloud Security Management with Palo Alto Networks
Single Realm Multi-Cloud Security Management with Palo Alto Networks
 
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Data Security
Data SecurityData Security
Data Security
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
 
dataEstate® - Reimagining data governance for the Legal industry
dataEstate® - Reimagining data governance for the Legal industrydataEstate® - Reimagining data governance for the Legal industry
dataEstate® - Reimagining data governance for the Legal industry
 
Slides for CC & IAAS
Slides for CC & IAASSlides for CC & IAAS
Slides for CC & IAAS
 
Cng 125 – chapter 12 network policies
Cng 125 – chapter 12   network policiesCng 125 – chapter 12   network policies
Cng 125 – chapter 12 network policies
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 

Similar to Cas 4

Data integrity 03.pptx
Data integrity 03.pptxData integrity 03.pptx
Data integrity 03.pptxAyeCS11
 
Gdpr ccpa automated compliance - spark java application features and functi...
Gdpr   ccpa automated compliance - spark java application features and functi...Gdpr   ccpa automated compliance - spark java application features and functi...
Gdpr ccpa automated compliance - spark java application features and functi...Steven Meister
 
Understanding Security Features of Tally on Cloud
Understanding Security Features of Tally on CloudUnderstanding Security Features of Tally on Cloud
Understanding Security Features of Tally on CloudAntraweb Technologies
 
201504 securing cassandraanddse
201504 securing cassandraanddse201504 securing cassandraanddse
201504 securing cassandraanddseJohnny Miller
 
ALTR Company Overview 2023
ALTR Company Overview 2023ALTR Company Overview 2023
ALTR Company Overview 2023Kim Cook
 
Information management
Information managementInformation management
Information managementDeepak John
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscapeDharma Atluri
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Secure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersSecure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersCloudera, Inc.
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlAlgoSec
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax EnterpriseCassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax EnterpriseDataStax Academy
 
Staying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierStaying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierTriNimbus
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsFederal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsSolarWinds
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 

Similar to Cas 4 (20)

Data integrity 03.pptx
Data integrity 03.pptxData integrity 03.pptx
Data integrity 03.pptx
 
Gdpr ccpa automated compliance - spark java application features and functi...
Gdpr   ccpa automated compliance - spark java application features and functi...Gdpr   ccpa automated compliance - spark java application features and functi...
Gdpr ccpa automated compliance - spark java application features and functi...
 
Understanding Security Features of Tally on Cloud
Understanding Security Features of Tally on CloudUnderstanding Security Features of Tally on Cloud
Understanding Security Features of Tally on Cloud
 
201504 securing cassandraanddse
201504 securing cassandraanddse201504 securing cassandraanddse
201504 securing cassandraanddse
 
ALTR Company Overview 2023
ALTR Company Overview 2023ALTR Company Overview 2023
ALTR Company Overview 2023
 
Information management
Information managementInformation management
Information management
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Secure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersSecure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game Changers
 
Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Microsoft SQL Family and GDPR
Microsoft SQL Family and GDPRMicrosoft SQL Family and GDPR
Microsoft SQL Family and GDPR
 
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax EnterpriseCassandra Day London 2015: Securing Cassandra and DataStax Enterprise
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
 
Staying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave MillierStaying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave Millier
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsFederal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal Standards
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 

More from Byju Antony

courses for commerce students
courses for commerce studentscourses for commerce students
courses for commerce studentsByju Antony
 
Xii acc chapter 1 Income and Expenditure Account
Xii acc chapter 1  Income and Expenditure AccountXii acc chapter 1  Income and Expenditure Account
Xii acc chapter 1 Income and Expenditure AccountByju Antony
 
XII ACCOUNTING CHAPTER 1
XII ACCOUNTING CHAPTER 1XII ACCOUNTING CHAPTER 1
XII ACCOUNTING CHAPTER 1Byju Antony
 
Hgiher secondary course combinations
Hgiher secondary course combinationsHgiher secondary course combinations
Hgiher secondary course combinationsByju Antony
 
XII ACCOUNTING CHAPTER 1
XII ACCOUNTING CHAPTER 1XII ACCOUNTING CHAPTER 1
XII ACCOUNTING CHAPTER 1Byju Antony
 
Career guidance 2
Career guidance  2Career guidance  2
Career guidance 2Byju Antony
 
Agri,forestry and vetrinary(6)
Agri,forestry and vetrinary(6)Agri,forestry and vetrinary(6)
Agri,forestry and vetrinary(6)Byju Antony
 
After +2 bio maths(1)
After +2 bio maths(1)After +2 bio maths(1)
After +2 bio maths(1)Byju Antony
 
Universities in kerala commerceand humanities
Universities in kerala commerceand humanitiesUniversities in kerala commerceand humanities
Universities in kerala commerceand humanitiesByju Antony
 
Central universities commerce and humanities
Central universities commerce and humanitiesCentral universities commerce and humanities
Central universities commerce and humanitiesByju Antony
 
Career commerce 2
Career commerce  2Career commerce  2
Career commerce 2Byju Antony
 
Career questions commerce
Career questions commerceCareer questions commerce
Career questions commerceByju Antony
 
Career part 1 commerce
Career part 1 commerceCareer part 1 commerce
Career part 1 commerceByju Antony
 
Private,public and global enterprises.pptx 2
Private,public and global enterprises.pptx 2Private,public and global enterprises.pptx 2
Private,public and global enterprises.pptx 2Byju Antony
 
Financial management
Financial managementFinancial management
Financial managementByju Antony
 
Financial planning
Financial planningFinancial planning
Financial planningByju Antony
 

More from Byju Antony (20)

courses for commerce students
courses for commerce studentscourses for commerce students
courses for commerce students
 
Xii acc chapter 1 Income and Expenditure Account
Xii acc chapter 1  Income and Expenditure AccountXii acc chapter 1  Income and Expenditure Account
Xii acc chapter 1 Income and Expenditure Account
 
XII ACCOUNTING CHAPTER 1
XII ACCOUNTING CHAPTER 1XII ACCOUNTING CHAPTER 1
XII ACCOUNTING CHAPTER 1
 
Hgiher secondary course combinations
Hgiher secondary course combinationsHgiher secondary course combinations
Hgiher secondary course combinations
 
XII ACCOUNTING CHAPTER 1
XII ACCOUNTING CHAPTER 1XII ACCOUNTING CHAPTER 1
XII ACCOUNTING CHAPTER 1
 
Career guidance 2
Career guidance  2Career guidance  2
Career guidance 2
 
Ca
CaCa
Ca
 
Agri,forestry and vetrinary(6)
Agri,forestry and vetrinary(6)Agri,forestry and vetrinary(6)
Agri,forestry and vetrinary(6)
 
After +2 bio maths(1)
After +2 bio maths(1)After +2 bio maths(1)
After +2 bio maths(1)
 
Universities in kerala commerceand humanities
Universities in kerala commerceand humanitiesUniversities in kerala commerceand humanities
Universities in kerala commerceand humanities
 
Central universities commerce and humanities
Central universities commerce and humanitiesCentral universities commerce and humanities
Central universities commerce and humanities
 
Career commerce 2
Career commerce  2Career commerce  2
Career commerce 2
 
Career questions commerce
Career questions commerceCareer questions commerce
Career questions commerce
 
Career part 1 commerce
Career part 1 commerceCareer part 1 commerce
Career part 1 commerce
 
byju antony
byju antonybyju antony
byju antony
 
byju
byjubyju
byju
 
Private,public and global enterprises.pptx 2
Private,public and global enterprises.pptx 2Private,public and global enterprises.pptx 2
Private,public and global enterprises.pptx 2
 
Management
ManagementManagement
Management
 
Financial management
Financial managementFinancial management
Financial management
 
Financial planning
Financial planningFinancial planning
Financial planning
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Cas 4

  • 1. USING SOFTWARE OF CAS TWO ACTIVITIES ARE INVOLVED • One time activities and • Recurring activities
  • 2. One time activities • It include creation of organisation details, accounting year, type of ledger etc.
  • 3. Recurring activities It include entry of transactions and generation of reports.
  • 4. SECURITY FEATURES OF CAS SOFTWARE • Password security • Data Audit • Data Vault
  • 5. PASSWORD SECURITY Password is a key to allow access to the mechanism. A person in an organisation may be given access to a particular set of data while he may be denied access to another set of data
  • 6. DATA AUDIT This feature enables one to know as to who and what changes have been made in the original data. This helps in fixing the responsibility of the person who has manipulated the data
  • 7. DATA VAULT Software provides additional security through data encryption. Encryption scrambles the information so as to make its interpretation extremely difficult. Encryption ensures security of data even if it lands in wrong hands.
  • 8. •Timely generation of reports and information in desired format •Efficient record keeping •Ensures effective control over the system •Economy in the processing of accounting data •Confidentiality of data is maintained ADVANTAGES OF CAS
  • 9. LIMITATIONS OF CAS • Faster obsolescence of technology necessitates investment in shorter period of time • Data may be lost or corrupted due to power interruptions • Data are prone to hacking • Un-programmed and un-specified reports cannot be generated
  • 10. ACCOUNTING INFORMATION SYSTEM (AIS) Management information system Sales & receivables sub system Cash sub suystem Purchase accounts payable sub system as
  • 12.
  • 13. Examples of default styles • Text and lines are like this • Hyperlinks like this • Visited hyperlinks like this Table Text box Text box With shadow
  • 14. Sample Graph (3 colours)
  • 15. Example Bullet Point Slide • Bullet point • Bullet point – Sub Bullet