It Application Tools in Business Bsa
It Application Tools in Business Bsa
BUSINESS BLOCK 4
Perdizo, Miljane P.
BSA-202
Module 1: INTRODUCTION
(Read articles and watch videos on the internet related to the topic listed below and write your reflections)
1. What are the Innovations and Effects of Technology in Business and Accountancy?
- Access to faster software that can perform more complex functions, as well as interconnected technology has
made accounting both easier and more efficient. Indeed, organizing financial information, analyzing data, and measuring
economic activity has never been simpler.
2. What is the Role of Information Technology in the field of Business and Accountancy?
- It has had a significant impact on accounting and has enabled businesses to develop and use computerized
systems to store and record financial transactions. With the advancements in technology and high demand
for accountants, Accounting Information Technology has become a highly marketable vocation.
2. Software applications- Application software is an end-user program typically divided into two classes;
applications software and systems software. Systems software provides an operating system and utilities that enable
applications software such as database programs, spreadsheets, web browsers, and more to run.
3. Storage Devices - A storage device is any computing hardware that is used for storing, porting and extracting data
files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to
a computer, server or any similar computing device.
2. Application Programs
(What is the importance of these tools to business and accountancy?)
1. Word-processing - A word processor is software or a device that allows users to create, edit, and print documents.
It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters
from the keyboard, and print it. Of all computer applications, word processing is the most common.
2. Spreadsheet - A spreadsheet is a file that exists of cells in rows and columns and can help arrange, calculate
and sort data. Data in a spreadsheet can be numeric values, as well as text, formulas, references and functions.
3. Presentation - It can share important information such as a business plan or educational lesson, or it can be useful
for entertainment purposes.
This guide explains how to recognise and prevent the different threats.
The most common cybercrimes are phishing and vishing scams. They rely on people being tricked into sharing secure
information. Law firms are a common target for a type of phishing attack known as “Friday afternoon fraud”.
Data breaches must be reported to the Information Commissioner's Office within 72 hours of being discovered. Everyone
in your firm should know how to do this.
Supply chain attacks target less secure parts of your supply network. You should know how to monitor your suppliers and
manage the risk.
- Malware - ‘Malicious software’, known as malware, is designed to cause damage to computer systems.
Spies - Cyber espionage is a form of cyber attack that steals classified, sensitive data or intellectual property to gain an
advantage over a competitive company or government entity.
Hackers - The hacker is someone who is mastermind in art of programming to point that he or she simply sit down
and hack in a program that works. But the intruders are basically who violate networks and information systems.
Thieves - Thieves are creating other types of Trojans that steal account information and key files of various program products and
resources from infected computers, for the benefit of the thief.
1: Human Errors
When people fail to follow the steps and instruction prepared, error tends to
Mechanical system can wear out or become damaged after a period of usage
They can sometimes be badly designed or constructed
Power surges and failures can damage the equipment
7: Computer Crimes
Computer crimes can be categorized into two which is illegal act perpetrated against computer
or telecommunications and use of computer and telecommunications to accomplish illegal acts by using the computer as
a tool
Other examples of computer crimes are theft of hardware, theft of software, theft of intellectual properties, theft
of time and services, theft of information and many more
Verify legitimate right of access by what you have, what you know, and who you are
What you have like keys, cards, signatures, badges
What you know like pin numbers and passwords
Who are you like bio metrics such as face scan and finger print
scan 3: Encryption
The process of altering and changing a data into unreadable form to prevent unauthorized access
Advantage is data is available over the internet
Disadvantage is law officer may not be able to read the data.
Method of retrieving important data and information after a disaster has happened
Data storage system must be kept separately and data have to be backed up
Back up all data and keep in mainframes in different positions
spies - Spying combines monitoring and surveillance with active intelligence gathering and data analysis to discover
what is occurring relative to government or corporate interests. Spying can be used in the interest of national security, by
unscrupulous corporations to discover trade secrets, or has the media discovered, to sway individual’s opinions about
political candidates, high-profile individuals, or national interests.
- cybercrime law
Computer Crime
Cyberbullying
Sexting
Identity Theft
10. Thou shalt always use a computer in ways that ensure consideration and respect for other humans
1. Describe the enrollment process of SPUS based on your experiences during enrollment. Identify
the advantages/ disadvantages and benefits of having a computerized enrollment system
- In what I’ve experienced during enrollment is that it is more easy for then to encode but it’s still
depends to the wifi connection. And it’s still need staff in the finance and registrar because even it is
computerised system still need enough staff to work on the computer. There are lots of students in Spus,
but the flow in the enrollment is so slow because lack of staff.
Advantage
Computerized systems allow for greater efficiency in performing specific tasks both more accurately and more rapidly than
doing the same task using, for example, a pencil and paper or a pencil and ledger book. Computerized systems also offer
storage capacity efficiency. For example, a computerized system's hard drive taking up a relatively small amount of space
can store a large collection of business or personal documents. A paper-based system, in contrast, would take up at least
one, and usually more, file cabinets for storage of the same document collection.
Disadvantages: Miscellaneous
Rapid changes in technology can cause a computer to become outdated relatively quickly, requiring upgrades or
replacements on a regular basis for computerized systems deployed in business use. Computerized systems can also
give some users a sense of false security that can result in catastrophic losses of massive amounts of present or past
work unless the user learns to use proper backup procedures. Computer work also has been implicated in a variety of
health-related issues, such as skeletal problems, eyestrain and a complex of conditions known as repetitive stress
injury with carpal tunnel syndrome illustrating the best-known repetitive-stress condition.
3. What is Database? - A database is a collection of information that is organized so that it can be easily
accessed, managed and updated. Computer databases typically contain aggregations of data records or
files, containing information about sales transactions or interactions with specific customers.
Database Management System?- It is a software package designed to define, manipulate, retrieve and manage data
in a database. A DBMS generally manipulates the data itself, the data format, field names, record structure and file
structure. It also defines rules to validate and manipulate this data.
Advantages of Database
1) Data Abstraction:
Data abstraction means, to hide the complexity of data from the basic users.
DBMS abstracts the data to the users, which is not useful for the users. It shows only those data which are
useful to the users.
Data inconsistency means that different files may contain different information of a particular object or person
If DBMS has reduced the data redundancy than the database system leads the better data consistency
In DBMS, Data can be manipulated easily, because data is centralized so once the data structure is defined,
we can easily change in the data like- insertion, modification or deletion.
Data can be shared easily by multiple applications in centralized DBMS. The applications can be
developed without having to create any new stored files.
6) Data Security:
Database provides data security means protecting your precious data from unauthorized access. Data can
be access only by authorized users of the organization.
A database can be accessed only by proper authentication usually by verifying login and password.
8) Concurrent Access:
Disadvantages of Database
To run the DBMS software, we need a high-speed processor and large memory size is required which cause expensive
hardware is needed.
When a computer file-based system is replaced with a database system, then the data stored in data files must be
converted into database files.
It is the difficult and time-consuming method to convert the data of data files into database
DBMS are often complex system, so the training is required for the users to use the DBMS.
The organization has to be paid plenty of amount for the training of workers to run the database management system.
For those who don’t have internet connection please feel free to text/call me and we will discuss how you can
comply with the requirements…
As to the deadline we will just agree on that matter some other time.
I believe this is an area where we may see some change in the not-so-distant
future. IT started by creating systems so that people could store data in disks rather
than on paper. Those applications were program-heavy while the data was in
electronic files. Systems now can store data in much more complex and efficient
ways. Relationships between data entities can exist, we can access data that is not
contained within our systems and businesses are demanding more intelligence out
of their data. Also, for some industries, current data entry methods which may
currently include a person entering data will be replaced by machines. This may
diminish the need for programming, and the sheer volume and variety of data being
collected may stimulate some IT professionals to pursue a career in data
management.