Uploaded by kayecaballero09

[AISSOC] - IT APPLICATION TOOLS IN BUSINESS

advertisement
CA51013 - IT APPLICATION TOOLS IN BUSINESS
Module 1: Introduction to Information
Systems: Accountant’s Perspective
➔ Each user group has unique information
requirements. The higher the level of the
organization, the greater the need for
aggregation and less the need for detail
1. 1 Information Environment
Information
A business resource that:
● Needs to be appropriately managed, and
● Is vital to the survival of contemporary
businesses
Fundamental objectives of information common to
all organizations
● Support the firm’s day-to-day operations
●
●
Support management decision making
➢ The accounting information is very important
for the management or the decision making
body of the organization. The management
cannot decide without reasonable information
for backing it up. To make a decision, it has to
be based on genuine facts and figures. For
deciding every level of management,
information is crucial. For making the right
decision, management depends on statistical
data and information that accounting provides.
Support
the
stewardship
function
management
➢ The role of the management is very
important in the overall development of a
business organization. The functions of
management are planning, organizing,
collecting business elements, motivating,
coordinating, controlling and budgeting,
etc. Successful completion of these
functions of management depends on an
efficient accounting system.
Internal & External Information Flows
❖ Top Management
- Stakeholders
❖ Middle Management
❖ Operations Management
❖ Operations Personnel/Day-to-day Operations
- Customers
- Suppliers
of
What is an Information System?
System
● a
group
of
interrelated multiple
components or subsystems that serve a
common purpose
Information System
● set of formal procedures by which data
are collected, processed the info and
distribute to users
Information has two (2) subsystems:
1. Management Information System (MIS)
a. System
that
processes
the
non-financial
transactions,
not
normally processed by traditional
accounting information systems.
b. Supports the four functional areas of
business accounting and finance,
sales, marketing,
manufacturing,
distribution, and human resources.
2. Accounting Information System (AIS)
a. Identifies,
collects,
processes, communicate economic
information about a firm using a wide
variety of technologies
- It captures and records the
financial effects of the firm’s
transactions
b. Distribute transaction information to
operations personnel to coordinate
many key tasks
Framework/ Subsystems of Accounting
Information System
a) General Ledger/ Financial Reporting
System (GL/FRS)
● Non-discretionary reporting is a type of
reporting in which the organization has
few or no choices in the information it
provides.
●
Much of this information consists of
traditional financial statements, tax
returns and other legal documents.
b) Management Reporting System (MRS)
● Discretionary reporting is a type of
reporting in which the organization can
choose what information to report and
how to present it.
c) Transaction Processing System (TPS)
● Expenditure Cycle
➔ Purchase System
➔ Cash Disbursement System
➔ Payroll Processing System
➔ Fixed Asset System
●
Conversion Cycle
➔ Cost Accounting System
➔ Production and Planning Control
System
●
Revenue Cycle
➔ Sales Processing System
➔ Cash Receipts System
Accounting
Information
System
are
specialized subset of information system that
processes:
● Financial transactions; e.g. sale of goods
● Non Financial transactions that directly
affect the processing of financial
transactions; e.g. addition of newly
approved vendor
● Transaction > Information System >
Information > User Decision
Transactions
● are events that affect the areas of interest
to the organization and are processed by
its information system as a unit of work.
It can be categorized into two types:
1. Financial Transactions: economic
event that affects the assets and
equities of the organization.
- It is measured in financial terms
and is reflected in the accounts of
the firm
2. Non-financial Transactions: events
that do not hit the narrow definition of
financial transactions
General Model for Accounting
Information Systems
AIS is a model that describes all of the
information systems regardless of their
technological architecture.
1. Transactions or Data Sources
● Data Sources are financial transactions
that enter the information system from
internal and external sources.
I. External Source of Data:
- External
financial
transactions are the most
common source of data for
most organizations.
- Examples include sale of
goods or services, purchase of
inventory, receive of cash, and
disbursement
of
cash
including payroll.
II.
Internal Sources of Data:
- Internal financial transactions
involve the exchange or
movement
of
resources
within the organization.
- Examples
include
the
movement of raw materials to
work in process (WIP),
application of labor and
overhead to WIP, transfer of
WIP
to
finished
goods
inventory, and depreciation of
equipment.
2. Transforming the Data into Information
● Data collection is the first operational
stage in the information system.
It involves:
I. Capturing transaction data
II. Recording data on to forms
III. Editing and validating data
3. Data Processing
● Data processing is a group that
manages the computer resources used
to perform the day-to-day processing
of transactions.
●
It involves classifying, transcribing,
sorting, batching, merging, calculating,
summarizing, and comparing collected
data.
4. Database Management
● Once processed, data is stored in a
repository or database.
- The organization’s database is its
physical repository for financial and
non financial data.
- It could be a filing cabinet or a
computer disk.
●
Database
Management
includes
storing, retrieving or deleting processed
data.
- It can also refer to a special
software
system
that
is
programmed to know which data
elements each user is authorized to
access.
5. Information Generation
● The last step of transforming data into
information is information generation.
It is the process of compiling,
arranging and preparing data for
presentation to the end-user.
●
One must ensure that the information
shared to the end-users is “useful
information"(CARTS)
I.
Completeness:
All
essential
information to complete a decision
or task is present
II.
Accuracy: Information is free from
material errors
III.
Relevance: Information must serve
the purpose of its generation
IV.
Timeliness: The timeline of the
information is aligned with its
objectives.
V.
Summarization:
Information is
aggregated in accordance with the
end-user’s needs
6. Information is presented to the end-users
● End users are users for whom the
system is built.
A. External End Users: creditors,
stockholders, potential investors,
regulatory agencies, tax authorities,
suppliers, and customers
B. Internal End Users: management at
all levels of the organization as well
as operations personnel
7. Feedback
● Feedback is a form of output that is
sent back to the system as a source of
data.
● It is usually used as a basis for
improvement
of
the
accounting
information system.
Data Hierarchy
Data Hierarchy refers to the systematic
organization of data. It is a basic concept in data
and database theory that helps to show the
relationship
between smaller and larger
components in a database or data file. It is used
to give a better sense of understanding about the
components of data and how they are related.
★
1) Data Attribute
● The most elemental piece of
potentially useful data in the database.
● It holds a single fact or attribute of an
entity.
● In a form you may refer to them as a
data field.
- Example:
Customer
Account
Number,
Customer
Name,
Customer
Address,
Customer
Balance of Account, Customer
Credit Limit
●
The collection of data attributes is
known as the record.
2) Record
● A record is a complete set of attributes
for a single occurrence within an entity
class or collection of related fields.
- Example:
Account
Receivable
Records that includes the Customer
Account Number, Customer Name,
Customer
Address,
Customer
Balance of Account, Customer
Credit Limit
3) File: A complete set of records of an
identical class
- Example: multiple Account Receivable
Records
1.2 Organizational Structure
An organizational structure is a system
that outlines how certain activities are
directed in order to achieve the goals of
an organization
● These activities can include rules, roles
and responsibilities
The structure of an organization helps to
allocate:
➢ Responsibility
➢ Authority
➢ Accountability
●
-
From these resources, the firm assigns a
department or a group of people whose
functions are focused on each aspect of the
mentioned resources
1. Materials
● Materials Management
➔ Incharge of Purchasing
➔ Receiving Materials as well as;
➔ Managing the Stores
●
Production
➔ Manufacturing
➔ Support
- Production planning which
involves scheduling the flow of
materials, labor and machinery
to efficiently meet production
needs
- Quality control which monitors
the manufacturing process at
various points to ensure that
the finished products meet the
firm’s quality standards
- Maintenance which keeps the
firm’s machinery and other
manufacturing
facilities
in
running order
●
Marketing
➔ Sales
➔ Promotion
➔ Advertising
➔ Market Research
- Generates revenue
- Main tasks: to thoroughly
understand
their
potential
customers and to determine
how they will reach them
➔ Major function: sales
●
Distribution
Main functions are:
➔ Warehousing
➔ Shipping
- Ensures that a product or
service is available for the
consumers or business users
who needs it
Physical AIS
● is composed of technologies of various
types and configurations, as well as
people and tasks from across the
organization, thus there is a need for
segmentation.
Segmentation
● to divide the organization into parts, or
segments,
which
are
definable,
accessible, actionable and profitable
● Segmenting by business function is a very
common method of organizing
➔ Example: a sales processing system,
which is a subsystem of the revenue
cycle,
includes
the
following
organization functions:
- Sales, Credit, Inventory control,
Warehousing, Shipping, Billing,
Accounts Receivable, General
Ledger, Data Processing
Functional Segmentation
●
Business Organization considers the
resources that they need to manage within
the business
Four Resources
manage:
that
a business must
2. Labor
● Managed by the Personnel Group
➔ Recruiting
➔ Training
➔ Benefits
➔ Counseling
- Supplies the organization with
personnel and takes care of their
well-being
- Ensures that each one is fit for
the role they are chosen for
3. Financial Capital
● Finance
➔ Portfolio Management
➔ Treasury
➔ Credit: ensures the credit worthiness
of the clients
➔ Cash Disbursement
➔ Cash Receipts
- Concentrates on forecasting and
budgeting of business revenues
- Most
business
plans
concentrate
on
this area
because they need loans for
investments
4. Information
● Accounting
➔ Inventory Control – to safeguard the
asset
➔ Cost Accounting
➔ Payroll
➔ Accounts Payable
➔ Accounts Receivable
➔ Billing
➔ Fixed Assets
➔ General Ledger
➢ Manages the financial resource of
the firm by:
-
capturing
transaction
Distributes
information
personnel
and
recording
transaction
to
operations
➢ Value
of
information
is
determined by its reliability;
unreliable information has NO
VALUE
➢ Information reliability requires
accounting independence
-
-
-
●
Accounting activities must be
separate and independent of
the functional areas maintaining
resources
Accounting supports these
functions with information but
does not actively participate
Decision makers in these
functions require that such vital
information be supplied by an
independent source to ensure
its integrity
Technology
➢ Enhanced the accountant’s ability
to interpret data efficiently and
effectively because of the readily
ability of data and info needed
➢ Accountant’s now has the ability to
interpret the language of business
with such ease that the accountant
has become a corporation’s most
trusted business advisor
➢ The main role of technology in
business is to drive growth and
improve operations
➢ Its most vital task is the data
processing for external and internal
users
I. Data Processing
Distributed Data Processing
- Recognizing the computer servicer
function
into
small
information
processing units that are distribute to
end users and placed under their
control
- Users process transactions locally with
each user segment and an IT needs to
support their operations. Users function
independently and tend not to share
data and information
Possible Disadvantages:
➢ Loss of Control
➢ Mismanagement of company resources
➢ Hardware and software incompatibility
➢ Redundant tasks and data problems
-
Data Storage
Data Updating
Currency of Information
-
Task-Data Dependency
Data Integration
Centralized Data Processing
- All data processing is performed by
one or more large computers housed at
a central site that serves users
throughout the organization
- Most
organization
employ
a
combination of both types
II. System Development and Maintenance
System development
- The process organizations use
acquire information systems
to
IV.Network Administration
- Responsible for effective functioning of
hardware and software
➔ Network: a collection of computers
and communication devices that allow
users to communicate, access data,
and applications, and share information
resources
● Due to highly technical and dynamic
changing expense of IT, many
executives
look
towards
IT
Outsourcing, where the organization
sells IT resources and leases back IT
services
System maintenance
- May be trivial or significant
- Between 80%-90% of system’s total
cost may be incurred because of
maintenance activities
Custom software
- Built to individual specifications
- Systems development life cycle is the
software development process
- Requires an in-house team of qualified
individuals and cost more expensive
than the other type
- Custom systems are more expensive
than commercial packages
- *Enterprise resource planning (ERP) is a
system assembled of prefabricated
software components
Commercial software
- Pre-coded software that a user
purchases from a software vendor
- It is available for general accounting
and industry specific application
- Sometime called turnkey systems
because
they
often
can
be
implemented by the user with little or
no modification
III. Database Administration
- Centrally organized companies with
shared
data
use
database
administration to ensure security and
integrity
Cloud computing data centers deliver
hosted IT services over the Internet:
❖ Software as a Service (SaaS)
❖ Infrastructure as a Service (IaaS)
❖ Platform as a Service (PaaS)
1.3 Role of an Accountant in an
Information System
Information System Users
● Accountants eventually accesses the
data in the company’s AIS in order to
perform their job functions
● This includes preparing and analyzing
budgets and financial statements,
preparing tax returns and examining
records for accuracy
★ SUPREME USERS
Information System Designer
● Domain experts
● Accounting function – responsible for
Conceptual System
Conceptual system
- Determines the nature of the
information required, its sources, its
destination, and accounting rules that
must be applied
●
Computer function – responsible for
Physical System
Physical System
- The medium and method for
capturing
and
presenting
the
information
Systems Auditors
● An expert who expresses an opinion about
the fairness of company’s financial
statements
● Accountants
perform
audits which
typically involve the AIS
➔ Internal Auditing
- An independent, objective assurance
and consulting activity designed to add
value and improve an organization’s
operations
➔ IT Auditing
- the review of the computer-based
components of an org. the audit is
often performed as part of a broader
financial audit
➔ Fraud audits
- a detailed examination of the financial
records of a business, with the intent
of finding instances of fraud.
- It had increased in popularity as a
corporate governance tool
➔ External audit
- Independent attestation and opinion
(audit report) regarding financial
statement preparation
- Requires auditors (independent CPAs)
to test internal controls and perform
substantive tests of data
- Critical
element
is
auditor
independence
- Auditor is free from factors that might
influence the audit report
●
Attest function
➢ An
independent
auditor’s
responsibility to opine as to the
fair presentation of a client firm’s
financial statement
●
Tests of controls
- Tests that establish whether
internal controls are functioning
properly
●
Substantive Tests
- Tests that determine whether
database contents fairly reflect the
organization’s transactions
SOX legislation
➔ Restricts non-audit services that auditors
may provide and prohibits them from
providing:
● Other accounting services including
bookkeeping, financial information
systems design and implementation,
appraisal or valuation, actuarial, and
internal audit outsourcing
●
●
Management or human resources,
broker or dealer, investment adviser,
or investment banking services
●
Legal services and expert services
unrelated to the audit
●
Any other service that the Board
determines,
by
regulation,
is
permissible
1.4 Technology for Success
Technology
★ Came from the Greek word “TECHNE”
which means art and craft.
● It was first used to describe applied
arts, but now it is used to describe the
advancement and changes around us
Computer
Can be classified into THREE Generations:
1. First Generation
● could only perform single task
● they had no operating system and
mainly used vacuum tubes
a. 1937
➢ First electronic digital computer
was built by Dr. John V.
Atanasoff-Berry and Clifford
Berry
➢ It
was
called
the
Atanassof-Berry
Computer
(ABC)
b. 1943
➢ An Electronic computer name
the Colossus was built for the
military
c. 1946
➢ The first general purpose digital
computer—Electronic Numerical
Integrator
and
Computer
(ENIAC) was built; 30 tons,
18,000 vacuum tubes
2. Second Generation
● Used transistors instead of vacuum
tubes which were more reliable
● Over 100 computer programming
languages were developed, computers
had memory and operating systems
a. 1951
➢ Universal Automatic Computer
(UNIVAC 1)
➢ First computer for commercial
use was introduced to the public
b. 1953
➢ International Business Machine
(IBM)-650
and
700
series
computers made their mark in
the computer world
3. Third Generation
● Integrated circuits were invented
● Computers became smaller; more
reliable and they are able to run many
different programs at the same time
a. 1980 – Microsoft Disk Operating
System (MS-Dos)
b. 1981 – IBM introduced the personal
computer (PC) for home and office
c. 1984 – Apple gave us the Macintosh
computer with its icon driven interface
d. 1990 – Windows Operating System
Internet of Things (IoT)
● The ability of devices to communicate
with each other without human
interference
● Such functionality makes it possible to
continuously monitor, and measure
various elements through a data
network connected to the internet
Embedded
Computers
(sensors
and
microchips)
● Installed in specific devices and from
there, the collected data are transmitted
to an application, usually via internet, that
●
will store, process, analyze, and share
this data in a cloud
Compact, have limited hardware, and
usually has a single purpose of
enhancing the capabilities of everyday
devices
Artificial Intelligence
● Technological use of logic and prior
experience
to
simulate
human
intelligence
Capabilities:
I. Speech recognition – Siri, Google
Assistant,
II. Alexa
III. Local reasoning
IV. Creative responses
V. Immersive technology
- Attempts to emulate a physical world
through the means of a digital or
simulated world by creating a
surrounding sensory feeling, thereby
creating a sense of immersion’
1. Virtual Reality (VR)
➔ Use of computers to simulate a real
or imagined environment that
appears as a three-dimensional (3D)
space
2. Augmented Reality (AR)
➔ Type of VR that uses an image of an
actual place/things, then add digital
info to it
Impact of Technology
1. Personal
➔ Artificial Intelligence
I. Games & Apps
● All “Apps” uses artificial intelligence to
process specific data on behalf of the
user
● Games incorporate virtual reality to
simulate a different environment for
the user to enjoy
II. Digital Assistants
● Uses natural language processing
which interpret and digitize spoken
words and commands
III. Accessibility Options
● Particularly useful for persons with
sensory disabilities
● It uses “AI” such as screen readers,
captioning and speech recognition, to
assist the user despite their disability
● Smartphones even allow special input
devices to be connected for such
users
2. Workplace
➔ Intelligent workplace
- Offers
integrated
cognitive
solutions that help companies
collaborate across borders
➔ Online collaborative productivity
software
- Allows employees to easily share
info with stakeholders without
consuming much of company’s
resources such as paper
➔ Working Remotely/Telecommuting
- Allows employees to carry out
their task even they are away
from the workplace
3. Education
➔ Intelligent Classroom
- Inevitable
outcome of the
available advanced computing,
network & data communication
technology
➔ Learning Management System
- Web-based training
- Allows students to:
a. Check progress on a course
b. Take practice tests
c. Exchange messages with
involved parties
d. Take classes and earn
degrees online
4. Commerce
● E-Commerce - the buying and
selling of goods and services or the
transmitting of funds or data, over an
electronic network, primarily the
internet
➔ Business-to-business
(B2B)
–
consists of business providing goods
and services to other businesses (e.g.
BPO
(Business
Processing
Outsourcing))
➔ Business-to-consumer (B2C) –
involves the sale of goods and services
to the general public (e.g. online shops)
➔ Consumer-to-consumer (C2C) –
occurs when one consumer sells
directly to another (e.g. Facebook
marketplace)
●
●
eBooks
- Students can read and access
content, such as videos, from
devices
Social Networking
- Allows exchange of information
and stories between individuals
5. Transportation
➔ GPS (Global Positioning System)
● Radio navigation system that
allows land, sea, and air users to
determine to determine their exact
location, velocity and time 24
hours a day in all weather
conditions anywhere in the world
Primarily being used to:
1. navigate routes and estimate data
2. avoid
unfavorable
traffic
conditions
3. tracking parcels for delivery
6. Healthcare
➔ 3D printers – used to replicate body
parts used for medical studies or
substitute for real stuff
➔ Medical monitoring devices –
provides accurate and timely results to
monitor patient’s vital signs and
research symptoms and diagnosis
➔ mHealth – use of mobile and wireless
technologies
to
support
the
achievement and health objectives
7. Manufacturing
➔ Robotics – useful in situations where
it is impractical, dangerous, or
inconvenient to use a human
➔ Computer-aided
manufacturing
(CAM) – streamlines production and
allows for shipping products more
quickly
8. Environment
● Green computing
- environmentally responsible and
eco- friendly use of computers
and their resources
- In broader terms, it is also
defined, as the study of
designing,
manufacturing/engineering, using
and disposing of computing
devices in a way that reduces
their environmental impact
Computer Hardware
●
Refers to the physical, tangible computer
equipment and devices, which provide
support for major functions such as input,
processing (internal storage, computation
and control), output, secondary storage (for
data and programs), and communication
1. Processing Device
● Process raw data instruction into
information
● Central Processing Unit (CPU)
- complex integrated circuit consisting of
millions of electronic parts and is
primarily responsible for converting input
(data) into meaningful output
- Data travels in and out of the CPU
through a Bus - communication system
that transfer data and components inside
the computer or between computers
- Wire or optical fiber
2. Storage Device
● Used for data and information retention
● Computer Memory – responsible for
holding data and programs as they are
being processed by the CPU
❖ RAM (Random Access Memory) main memory of a computing device, it
stores data for a short period of time or
until the computing device is kept on
this type of memory is volatile
❖ ROM (Read Only Memory) –
permanently stores data on a
computing device
❖ Storage Solutions
➔ Internal Drive – Hard Disk Drive
(HDD), Solid State Drive (SSD)
➔ External Drive – External HDD,
Flash Drive, Optical Drive,
➔ Cloud Storage – it can store
electronic files on the Internet
instead of a local computer e.g.
google
drive, MS OneDrive,
Dropbox
3. Input Device
● Input certain instruction or command to
a computer
● Used for raw data input
● Joystick,
mouse, keyboard,
microphone, scanner, digital cameras
4. Output Device
● Disseminate data and information to the
user
● Printers
and
copiers,
Monitors,
Headphones, Speakers, Projectors
Micro-Computer
- Small, relatively inexpensive computer
with a microprocessor as its central
processing unit (CPU)
- In
common
usage,
the
word
“microcomputer” has been largely
supplanted by the term “personal
computer” or “PC”, which specifies a
computer that has been designed to be
used by one individual at a time
a. Desktop Computer
- Consist of a system unit, monitor,
keyboard, and mouse
- More powerful, and has more storage
capability
- Hardware components
can
be easily upgraded
b. All-in-one Computer
- Monitor and system unit are housed
together, thus take up less space
- Difficult to service or upgrade
- More expensive than desktops
c. Portable/Mobile Device
- Highly portable, but usually
powerful in specifications
- Difficult to service or upgrade
less
Computer Software
Software
● Program that enables a computer to
perform a specific task, as opposed to the
physical components of the system or
hardware
● It has to be “loaded” into the computer’s
storage before it can be executed
1. System Software
● A type of computer program that is
designed to run a computer’s hardware
and application programs, or provide a
platform for other software
a. Operating system – a software that
communicates with the hardware and
allows another program to run. E.g.
Windows, Android, IOS
b. Language Processor – a computer
program designed or used to perform
tasks, such as processing program code to
machine code access the interpreter of
your computer device that interprets all
computer language and relates them to
your machine
c. Utility Software – a software designed to
help analyze, configure, optimize or
maintain a computer or support its
infrastructure.; disk defragmenters, system
profilers, Network managers, application
launchers, antivirus software, backup
software, disk repair, disk cleaners, registry
cleaners, disk space analyzer, file manager,
file compression, and hardware drivers
2. Application Software
● A computer program designed to help
people perform an activity
●
Depending on the activity for which it was
designed, an application can manipulate
text, numbers, audio, graphics and a
combination of these elements
a. Device Management Apps – provide
tools for maintaining a computer or
device
b. Productivity Apps – allows creation of
documents, graphics and to interact with
digital media
c. Communication Apps – allows the user
to share or receive communications or
information
d. Personal Interests Apps – provides
users with tools to pursue their personal
interest
Types of Software Classified by Task:
1. Spreadsheet Software
- Let you interact with numbers, charts,
graphics, text, and data
- It can perform calculation on data
stored in a grid of cells and recalculate
values automatically when the data
changes
● Worksheets - laid out in a grid of rows
and columns; they use letters to identify
each column and consecutive numbers
to identify row
● Cell - location formed by the intersection
of a column and a row
Key Features:
- Formatting tools to change a worksheet’s
appearance
- Ability to create a printed output of the
created spreadsheet
- Web capabilities to share workbooks
online, add hyperlinks, and save
worksheets as web pages
- Developer tools to add customized
functions
- Tools to analyze data
2. Database Software
● Phrase used to describe any software
that is designed for creating databases
and managing the information stored in
them
-
●
●
●
●
Sometimes referred to as database
management system (DBMS)
Database
software
tools
are
primarily used for storing, modifying,
extracting,
and searching for
information within a database
Each piece of data is entered and
stored in a field
Tables – collection of records for a single
subject
Query – extracts data based on specified
criteria, or conditions, for one or more
fields
Report – user-designed layout of
database content
Form – a screen used to enter data into a
database
Key Features:
- Ability to collect data, in a manner that
allows access, retrieval, and reporting of
that data
- Represent a query in Structured Query
Language (SQL)
- Execute database application, such as,
track inventory, maintain customer lists,
or manage employee records
Basic Computer Navigation
1. The computer receives power from the
power supply or battery and sends it to the
circuitry
2. The processor runs the bootstrap program
3. The bootstrap program executes a series of
tests to check the components
4. The computer loads the operating system
files into RAM, including the kernel
5. The computer loads the system configuration
information and loads startup programs
● Window
● Menu Dialog Boxes
● File
- Data file
- Executable File
- File Format
- File Extension
●
Folder
- Library
➢ To access or initiate a computer application,
one just need to double click on the
application’s icon from the desktop window
➢ If the application is not found on the initial
desktop windows, you may click on the
windows icon (for Windows OS) or the dock
(for Mac OS)
How to Save a File
● Name the file, you must give it a name that
follows your operating system’s rules for
file-naming conventions
● Save to the computer, flash drive, or cloud.
If creating or editing a file, it should be
saved frequently. Files you work on using a
web app save changes as you make them
● Use the Save As or Save a Copy dialog
box to save a file with a new name or in a
new location
➢ Every file has properties, such as name, type,
location, and size
➢ Dates: when the file was created, modified,
last accessed
➢ The operating system assigns some
properties to files, such as type or format,
and updates other properties, such as date,
assize, and location
Manage Folder Names and Folder Placement
● You can create a new folder in a file manager
such as File Explorer or Finder
● Within file manager, you can move, copy, and
delete folders the same as a file
Functions:
➢ View frequently or recently opened files and
folders
➢ View
main
folders on
your
computer or device
➢ Search by file name, content, date, and
more
Information Literacy
● Ability to find, evaluate, organize, use, and
communicate information in all its various
formats, most notably in situations
requiring decision making, problem solving,
or the acquisition of knowledge
●
It allows users to:
- Navigate many sources of information,
including the Internet, online libraries,
and popular media sites
-
Select the right tool for finding the
information you need
Recognize that not all information is
created equal
Evaluate
whether
information
is
misleading, biased, or out of date
-
➔ Credibility – identify the author and check
credentials
➔ Accuracy – verify facts and claims, check
for bias
➔ Reasonableness – examine whether the
claims are fair & sensible
➔ Support – look for reputable sources and
authorities
Content from Online Sources
● Copying photos might violate intellectual
property rights
Copyright – gives authors and artists the
legal right to sell, publish, or distribute and
original work
●
Some online resources are protected by
digital rights management (DRM), which
limit access to proprietary rights
●
Some material is in the public domain and
can be used without permission
●
The fair use doctrine allows one to use a
sentence or paragraph of text without
permission with citation to the original
source
Creative Commons (CC) – a nonprofit
organization that helps content creators
keep copyright to their materials while
allowing others to use, copy, or distribute
their work
Things to do to prevent:
- Give only necessary information when
completing an online form
- Review the information that online sites
such as Google, Facebook, Microsoft,
and others have stored about you
- Request to be removed from mailing lists
- Create another email account to use
when a merchant or website requires an
address
- Do not use your social media account
login information to log in to another site
- Shred paperwork that contains personal
information before discarding
- Do not carry a Social Security number in
a wallet or write it on a check
- Do not provide personal information
either over the phone or through an email
message
- Keep personal information in a secure
location in a home or apartment
- Be cautious about what information is
posted online and who can view your
information
- Keep only the last 3 months of financial
statements and shred older documents
- For paper documents that must be
retained, use a scanner to create a PDF
of the document and add a strong
password that must be entered before it
can be read
- Be cautious with a website or app
request to collect data
- Websites that request more personal
information than would normally be
expected should be avoided
●
Safety and Security
Risk: the possibility something might occur that
results in an injury or a loss
1. Risk from Information
● Data and programs, comes from
attackers who want to steal information
● Online Banking, E-commerce, social
media, data mining, fake websites
Authentication
➔ Use of passwords
- Use strong Passwords
- strong password:
a longer
combination of letters, numbers,
symbols minimum of 15-20
characters in length
- A longer password is always more
secure than a shorter password,
regardless of complexity
- Do not use passwords that consist
of dictionary words or phonetic
words
-
Do not repeat characters or use
sequences (abc,123)
Do not use birthdays, family
member names, pet names,
addresses, or any personal
information
Use a password manager
Cyberbullying
➔ Bullying that takes place on technology
devices using online social media
platforms, public online forums, gaming
sites, text messaging, or email
- Considered more harmful than general
bullying
Authenticating with Biometrics
- Uses the unique characteristics of
your face, hands, or eyes to
authenticate you
- Some of the different types of
biometrics that are used today for
authentication include:
➢ Retina/Iris
➢ Fingerprint
➢ Voice
➢ Face
Cyberstalking
➔ Pay close attention to information about
new or updates security settings and finetune profile options accordingly
-
●
●
Two Factor Authentication
- Uses two level of security:
passwords and codes
- After
correctly
entering
your
password, a 4-6 digits code is sent
to your cell phone
- The code must then be entered as
the second authentication method
●
Encryption
- The
process
of “scrambling”
information so it cannot be read
unless the user possesses the “key”
to unlock it (Decryption)
- Can apply to data-at-rest (hard
drive) or data-in-transit (Internet)
●
Digital Certificate
- A technology used to verify a user’s
identity and key that has been
“signed” by a trusted third party
Identity Theft
➔ Involves using someone’s
personal
information to commit financial fraud
➔ Script kitties, Hactivists, Cyberterrorists,
Nation state actors, Insiders
Protect your Online Profile
● Be cautious about what information you
post
● Be cautious about who can view your
information
2. Risk toward Environment
● Toxic
electronic
components of
computers and other digital devices
that are exposed when devices are
discarded
E-waste
- Contains harmful chemicals such as
cathode rays, beryllium, barium,
nickel, arsenic, lead and mercury
- When these chemicals are broken
down in landfills, they tend to leak
these hazardous materials into both
the air and soil creating an extremely
unhealthy environment
Steps to Reduce:
1. Buy Green
- When purchasing new electronic
equipment buy only products that
have
been
designed
with
environmentally preferable attributes
2. Donate
- Donate used but still functional
equipment to school, charity, or
non- profit organization
3. Recycle
- Send equipment to a verified used
electronics recycling center
3. Risk on Health
➔ Eye strain, poor posture when using
devices, and muscle fatigue from
keyboard typing
➔ Physical health issues
● Repetitive activity
● Improper technique
● Uninterrupted intensity
Protect Computer Equipment Electrical Problems
Surge Protector
● Can defend computer equipment from spikes,
surges, and noise
Uninterruptible Power Supply (UPS)
● can be used to protect against blackouts and
brownouts
Protect Computers from Theft
● Use a cable lock
● Keep devices out of sight when in a high-risk area
● Avoid being distracted by the device and maintain
awareness of surroundings
● Hold devices with both hands
● Do not use the device on escalators or near train
doors
● Do not use white or red headphone cords
● Do not give chase if a device is stolen
● Enable device security features
Risks
● Reading wireless transmissions
● Viewing or stealing computer data
● Injecting malware
● Downloading harmful content
Precautions
● Only connect to an approved wireless network in
public
● Limit the type of activity you do on public
networks to simple web surfing or watching online
videos
● Configure routers for a high level of security
Data Backup
➔ creating data backup means copying files from a
computer’s hard drive that are then stored in a
remote location
➔ can protect against hardware malfunctions, user
error, software corruption, natural disasters, and
cyberattacks
➔ Options: online or to external hard drive
SHORT ASSESSMENT
1. Which statement describes a business resource?
a. It is not essential to the survival of the contemporary business organization.
b. It does not need to be appropriately managed.
c. Raw materials, capital and information are examples of a business resource.
d. None of the above.
2. The following are parts of the subsystem of the Accounting Information System, except?
a. Management Reporting System
b. Transaction Processing System
c. Enterprise Resource Planning System
d. General Ledger/Financial Reporting System
3. Which is an example of a nonfinancial transaction?
a. Payment of loans
b. Logging of customer calls
c. Purchase of raw materials
d. Sale of products
4. Which statement best describes the Management Information System?
a. Supports the four functional areas of business accounting and finance, sales,
marketing, manufacturing, distribution, and human resources.
b. Processes financial transactions, not normally processed by the traditional
accounting information system
c. Identifies, collects, processes, communicate economic information about a firm
d. Distributes transaction information to operations personnel to coordinate many key
tasks
5. All of the following cycles are included in the Transaction Processing System except?
a. Revenue Cycle
b. Expenditure Cycle
c. Administrative Cycle
d. Conversion Cycle
6. Portfolio management and Cash disbursement are part of which business function?
a. Distribution
b. Finance
c. Accounting
d. Materials Management
7. Which of the following is not part of the production function?
a. Capturing and recording transactions in the database.
b. Monitors the manufacturing process at various points to ensure that the finished products
meet the firm’s quality standards
c. Schedules the flow of materials, labor and machinery to efficiently meet production needs.
d. Keeps the maintenance of the firm’s machinery and other manufacturing facilities in running
order.
8. Which is not part of the Marketing Function?
a. Sales
b. Advertising
c. Market Research
d. Managing the Stores
9. Which is not true regarding accounting independence?
a. Separation of duties, such as record keeping and custody of physical resources.
b. Generation of timely and accurate information.
c. Accounting supports these functions with information but does not actively participate in
the physical activities.
d. All statements are correct.
10. Which audit function provides independent attestation and opinion regarding financial statement
preparation?
a. Fraud auditing
b. Internal Auditing
c. External Auditing
d. IT Auditing
11. It involves the sale of goods and services to the general public such as online shops.
a. Consumer-to-consumer
b. Business-to-consumer
c. Business-to-business
d. None of the above
12. The impact of technology on healthcare has led to the use of the following except?
a. mHealth
b. Robotics
c. 3D printers
d. Medical monitoring devices
13. It is a device that processes raw data instruction into information.
a. Output device
b. Storage device
c. Storage device
d. Processing Device
14. Roger wants to store his data where he could access it remotely, which storage solution should he
use?
a. External drive
b. Cloud storage
c. Internal drive
d. All of the above
15. Marian needs to upload her vaccination card to the ThOMedSS website to update her vaccination
records, what device could she use to efficiently perform the task?
a. Scanner
b. Digital camera
c. Webcamera
d. All can be used to perform the task
16. All data processing is performed by one or more large computers housed at a central site that
serves users throughout the organization.
a. Centralized Data Processing
b. Distributed Data Processing
c. Decentralized Data Processing
d. None of the above
17. The following are possible disadvantages of Distributed Data Processing except?
a. Redundant tasks and data problems
b. Loss of control
c. Hardware and software incompatibility
d. None of the above
18. A program that starts and runs the computer.
a. Application Software
b. System Software
c. Database Software
d. Spreadsheet Software
19. Bruno receives an email that someone attempted to log in to his account. He was advised to
change his password. In creating a new password, Bruno must avoid all of the following except?
a. Using personal information
b. Using dictionary words
c. Using sequences (abc, 123)
d. Using a long combination of letters, numbers and symbols
20. It uses two levels of security using passwords and codes.
a. Encryption
b. Authenticating with Biometrics
c. Two Factor Authentication
d. Digital Certificate
ANSWER KEY:
1. C
6. B
11. B
16. A
2. C
7. A
12. B
17. D
3. B
8. D
13. D
18. B
4. A
9. B
14. B
19. D
5. C
10. C
15. A
20. C
References:
Hall, J.A. (2010). Accounting Information Systems Seventh Edition. Cengage Learning.
Download