Data at your fingertips
Article Abstract:
On-line databases are computerized information retrieval systems that are accessed over telephone lines. There are over 3,000 on-line databases available in the UK, most of which are bibliographic and offer references and abstracts. Database searches are conducted using keywords in a search strategy, and users communicate with on-line databases via a computer terminal linked to a database through a telecommunications network. To access databases, users must contact a host organization offering advice, passwords, and the requisite equipment. Viewdata systems are two-way communication systems allowing users to communicating with a database through a keyboard. The services may be public or private, and include the Prestel and Topic systems. Also, users can join closed user groups which allows electronic communication amongst group members and access to Prestel.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1990
User Contributions:
Comment about this article or add new information about this topic:
Computer systems: the hidden costs
Article Abstract:
Computer systems involve many unanticipated costs which are not directly related to the computer itself. As much as 80% of the total cost of a computer system is accounted for by software, management, installation, technical support, maintenance, warranty, training, security, insurance and consumables. For instance, managers need to examine its business systems, establish its priorities and check for millenium compliance before purchasing a system, which often requires the services of a computer consultant. Maintenance contracts, which are more economical than paying for repairs when necessary, can cost from 10% to 20% of the cost of a computer system. A technical support person who is on hand to work on technical problems should be hired, while items that are consumed during the system's use must be provided, including toner cartridges, paper and disks.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1998
User Contributions:
Comment about this article or add new information about this topic:
Encryption is the key
Article Abstract:
Encryption allows the protection of sensitive datafiles from unauthorized users. An encryption system scrambles datafiles to make sure that they cannot be read by individuals who do not have the key that will perform the decryption of the files. Most access control programs have an encryption function although those who do not want to use these programs can simply avail of an encryption software. The most effective encryption algorithms being offered are Data Encryption Standard (DES) and RSA. The former uses a private key while the latter relies on both a private and a public key. Those who wish to protect highly sensitive information can encrypt their datafiles more than once or utilize two different encryption programs.
Publication Name: Accountancy
Subject: Business
ISSN: 0001-4664
Year: 1998
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Let's see your job description. Let's increase the bottom line. Who's in charge of PCF?
- Abstracts: Structuring cooperative relationships between organizations. Profit center manager compensation: an examination of market, political and human capital factors
- Abstracts: Electronic filing eases burdens but restrictions still apply. Template helps you value a closely held business
- Abstracts: Auditor's liabilities - a new chapter begins. Success on the menu. The auditors' dilemma
- Abstracts: The Japanese are coming. Offshore investment: the pace is hotting up. Capital expansion: finding the finance for growth