Professional Documents
Culture Documents
APPLICATIONS
MODULE 2 • information system (IS) that supports knowledge workers by providing
SUBJECT: I.T. APPLICATIONS resources to create, store, use, and transmit new knowledge for useful
applications
INFORMATION SYSTEMS: HARNESSING THE COMPETITIVE POWER OF IT
Computer-Aided Design (CAD)
Information System (IS) • IS with software that helps knowledge workers design products by
• system that uses IT resources to convert data into information and to simulating them and displaying them in three-dimensional graphics
collect, process, and transmit that information for use in decision making
Computer-Aided Manufacturing (CAM)
Data • IS that uses computers to design and control equipment in a
• raw facts and figures that, by themselves, may not have much meaning manufacturing process
Information
• meaningful, useful interpretation of data INFORMATION SYSTEMS FOR MANAGERS
SOUTHERN PHILIPPINES INSTITUTE OF SCIENCE & TECHNOLOGY # my second home www.facebook.com/spist official 046-4712930 0949 927 15 32 Page 1
MODULE #2: I.T. APPLICATIONS
• unauthorized use of personal information (such as Social Security number NOTE:
and address) to get loans, credit cards, or other monetary benefits by
impersonating the victim ➢ For modular(e-copy) students, send your activities to your instructor’s e-mail
• phishing, pharming address with the following format:
TO: dennisgsantos.ds@gmail.com
Intellectual Property SUBJECT: Module#: Name of your subject
• something produced by the intellect or mind that has commercial value ACTIVITY FILENAME: ACTIVITY #_SURNAME, NAME
➢ For modular (Hardcopy) students, you may return your activities based on the given
Spyware
instructions by the school’s module administrator. You may use separate pages for
• program unknowingly downloaded by users that monitors their computer your answers.
activities, gathering e-mail addresses, credit card numbers, and other
information that it transmits to someone outside the host system
Spam
• junk e-mail sent to a mailing list or a newsgroup
IT PROTECTION MEASURES
Firewall
• security system with special software or hardware devices designed
to keep computers safe from hackers
Anti-Virus Software
• product that protects systems by searching incoming e-mails and data
files for “signatures” of known viruses and virus-like characteristics
Encryption System
• software that assigns an e-mail message to a unique code number (digital
fingerprint) for each computer so only that computer, not others, can
open and read the message
SOUTHERN PHILIPPINES INSTITUTE OF SCIENCE & TECHNOLOGY # my second home www.facebook.com/spist official 046-4712930 0949 927 15 32 Page 2
MODULE #2: I.T. APPLICATIONS
Name: _________________________
Year/Section: _____________________
Do the following:
2. Identify the IT resources businesses have at their disposal and how these
resources are used
5. Describe the ways in which businesses protect themselves from the threats
and risks information technology poses
6. Describe how computing financial ratios can help users get more information
from financial statements to determine the financial strengths of a business
Activity #4
SOUTHERN PHILIPPINES INSTITUTE OF SCIENCE & TECHNOLOGY # my second home www.facebook.com/spist official 046-4712930 0949 927 15 32 Page 3