You are on page 1of 3

MODULE #2: I.T.

APPLICATIONS
MODULE 2 • information system (IS) that supports knowledge workers by providing
SUBJECT: I.T. APPLICATIONS resources to create, store, use, and transmit new knowledge for useful
applications
INFORMATION SYSTEMS: HARNESSING THE COMPETITIVE POWER OF IT
Computer-Aided Design (CAD)
Information System (IS) • IS with software that helps knowledge workers design products by
• system that uses IT resources to convert data into information and to simulating them and displaying them in three-dimensional graphics
collect, process, and transmit that information for use in decision making
Computer-Aided Manufacturing (CAM)
Data • IS that uses computers to design and control equipment in a
• raw facts and figures that, by themselves, may not have much meaning manufacturing process

Information
• meaningful, useful interpretation of data INFORMATION SYSTEMS FOR MANAGERS

Management Information System (MIS)


LEVERAGING INFORMATION RESOURCES: DATA WAREHOUSING AND DATA • computer system that supports managers by providing information—
MINING reports, schedules, plans, and budgets—that can be used for making
decisions
Information Systems Managers
• managers who are responsible for the systems used for gathering, Decision Support System (DSS)
organizing, and distributing information • interactive system that creates virtual business models for a
particular kind of decision and tests them with different data to see
Data Warehousing how they respond
• the collection, storage, and retrieval of data in electronic files

Data Mining IT RISKS AND THREATS


• the application of electronic technologies for searching, sifting, and
reorganizing pools of data to uncover useful information Hacker
• cybercriminal who gains unauthorized access to a computer or network,
either to steal information, money, or property or to tamper with data
INFORMATION SYSTEMS FOR KNOWLEDGE WORKERS • DoS attacks, wireless mooching

Knowledge Information System


Identity Theft

SOUTHERN PHILIPPINES INSTITUTE OF SCIENCE & TECHNOLOGY # my second home www.facebook.com/spist official 046-4712930 0949 927 15 32 Page 1
MODULE #2: I.T. APPLICATIONS
• unauthorized use of personal information (such as Social Security number NOTE:
and address) to get loans, credit cards, or other monetary benefits by
impersonating the victim ➢ For modular(e-copy) students, send your activities to your instructor’s e-mail
• phishing, pharming address with the following format:
TO: dennisgsantos.ds@gmail.com
Intellectual Property SUBJECT: Module#: Name of your subject
• something produced by the intellect or mind that has commercial value ACTIVITY FILENAME: ACTIVITY #_SURNAME, NAME

➢ For modular (Hardcopy) students, you may return your activities based on the given
Spyware
instructions by the school’s module administrator. You may use separate pages for
• program unknowingly downloaded by users that monitors their computer your answers.
activities, gathering e-mail addresses, credit card numbers, and other
information that it transmits to someone outside the host system

Spam
• junk e-mail sent to a mailing list or a newsgroup

IT PROTECTION MEASURES

Firewall
• security system with special software or hardware devices designed
to keep computers safe from hackers

Anti-Virus Software
• product that protects systems by searching incoming e-mails and data
files for “signatures” of known viruses and virus-like characteristics

Encryption System
• software that assigns an e-mail message to a unique code number (digital
fingerprint) for each computer so only that computer, not others, can
open and read the message

SOUTHERN PHILIPPINES INSTITUTE OF SCIENCE & TECHNOLOGY # my second home www.facebook.com/spist official 046-4712930 0949 927 15 32 Page 2
MODULE #2: I.T. APPLICATIONS
Name: _________________________

Year/Section: _____________________

Do the following:

1. Discuss the impacts information technology is having on the business world

2. Identify the IT resources businesses have at their disposal and how these
resources are used

3. Describe the role of information systems, the different types of information


systems, and how businesses use such systems

4. Identify the threats and risks information technology poses on businesses

5. Describe the ways in which businesses protect themselves from the threats
and risks information technology poses

6. Describe how computing financial ratios can help users get more information
from financial statements to determine the financial strengths of a business

7. Discuss the role of ethics in accounting

8. Describe the purpose of the International Accounting Standards Board and


explain why it exists

Activity #4

Differentiate the following:

A. Data and Information


B. MIS and DSS

SOUTHERN PHILIPPINES INSTITUTE OF SCIENCE & TECHNOLOGY # my second home www.facebook.com/spist official 046-4712930 0949 927 15 32 Page 3

You might also like