You are on page 1of 20

CA51013 - IT APPLICATION TOOLS IN BUSINESS

Module 1: Introduction to Information ➔ Each user group has unique information


requirements. The higher the level of the
Systems: Accountant’s Perspective
organization, the greater the need for
1. 1 Information Environment aggregation and less the need for detail

Information
What is an Information System?
A business resource that:
System
● Needs to be appropriately managed, and
● a group of interrelated multiple
● Is vital to the survival of contemporary
components or subsystems that serve a
businesses
common purpose

Fundamental objectives of information common to


Information System
all organizations ● set of formal procedures by which data
● Support the firm’s day-to-day operations are collected, processed the info and
● Support management decision making distribute to users
➢ The accounting information is very important
Information has two (2) subsystems:
for the management or the decision making 1. Management Information System (MIS)
body of the organization. The management a. System that processes the
cannot decide without reasonable information non-financial transactions, not
for backing it up. To make a decision, it has to normally processed by traditional
be based on genuine facts and figures. For accounting information systems.
deciding every level of management, b. Supports the four functional areas of
information is crucial. For making the right business accounting and finance,
decision, management depends on statistical sales, marketing, manufacturing,
data and information that accounting provides. distribution, and human resources.
● Support the stewardship function of
2. Accounting Information System (AIS)
management
a. Identifies, collects,
➢ The role of the management is very processes, communicate economic
important in the overall development of a information about a firm using a wide
business organization. The functions of variety of technologies
management are planning, organizing, - It captures and records the
collecting business elements, motivating, financial effects of the firm’s
coordinating, controlling and budgeting, transactions
etc. Successful completion of these b. Distribute transaction information to
functions of management depends on an operations personnel to coordinate
efficient accounting system. many key tasks

Internal & External Information Flows Framework/ Subsystems of Accounting


❖ Top Management Information System
- Stakeholders
❖ Middle Management a) General Ledger/ Financial Reporting
❖ Operations Management System (GL/FRS)
❖ Operations Personnel/Day-to-day Operations ● Non-discretionary reporting is a type of
- Customers reporting in which the organization has
- Suppliers few or no choices in the information it
provides.
● Much of this information consists of General Model for Accounting
traditional financial statements, tax Information Systems
returns and other legal documents.
b) Management Reporting System (MRS) AIS is a model that describes all of the
● Discretionary reporting is a type of information systems regardless of their
reporting in which the organization can technological architecture.
choose what information to report and
how to present it. 1. Transactions or Data Sources
● Data Sources are financial transactions
c) Transaction Processing System (TPS)
that enter the information system from
● Expenditure Cycle
internal and external sources.
➔ Purchase System
I. External Source of Data:
➔ Cash Disbursement System
- External financial
➔ Payroll Processing System
transactions are the most
➔ Fixed Asset System
common source of data for
● Conversion Cycle most organizations.
➔ Cost Accounting System - Examples include sale of
➔ Production and Planning Control goods or services, purchase of
System inventory, receive of cash, and
● Revenue Cycle disbursement of cash
➔ Sales Processing System including payroll.
➔ Cash Receipts System II. Internal Sources of Data:
- Internal financial transactions
Accounting Information System are involve the exchange or
specialized subset of information system that movement of resources
processes: within the organization.
● Financial transactions; e.g. sale of goods - Examples include the
● Non Financial transactions that directly movement of raw materials to
affect the processing of financial work in process (WIP),
transactions; e.g. addition of newly application of labor and
approved vendor overhead to WIP, transfer of
● Transaction > Information System > WIP to finished goods
Information > User Decision inventory, and depreciation of
equipment.
Transactions
● are events that affect the areas of interest 2. Transforming the Data into Information
to the organization and are processed by ● Data collection is the first operational
its information system as a unit of work. stage in the information system.

It can be categorized into two types: It involves:


1. Financial Transactions: economic I. Capturing transaction data
event that affects the assets and II. Recording data on to forms
equities of the organization. III. Editing and validating data
- It is measured in financial terms
3. Data Processing
and is reflected in the accounts of
● Data processing is a group that
the firm
manages the computer resources used
2. Non-financial Transactions: events to perform the day-to-day processing
that do not hit the narrow definition of of transactions.
financial transactions
● It involves classifying, transcribing, regulatory agencies, tax authorities,
sorting, batching, merging, calculating, suppliers, and customers
summarizing, and comparing collected B. Internal End Users: management at
data. all levels of the organization as well
as operations personnel
4. Database Management
● Once processed, data is stored in a 7. Feedback
repository or database. ● Feedback is a form of output that is
- The organization’s database is its sent back to the system as a source of
physical repository for financial and data.
non financial data. ● It is usually used as a basis for
- It could be a filing cabinet or a improvement of the accounting
computer disk. information system.
● Database Management includes
storing, retrieving or deleting processed Data Hierarchy
data.
- It can also refer to a special ★ Data Hierarchy refers to the systematic
software system that is organization of data. It is a basic concept in data
programmed to know which data and database theory that helps to show the
relationship between smaller and larger
elements each user is authorized to
components in a database or data file. It is used
access.
to give a better sense of understanding about the
5. Information Generation components of data and how they are related.

● The last step of transforming data into


information is information generation. 1) Data Attribute
- It is the process of compiling, ● The most elemental piece of
arranging and preparing data for potentially useful data in the database.
presentation to the end-user. ● It holds a single fact or attribute of an
entity.
● One must ensure that the information ● In a form you may refer to them as a
shared to the end-users is “useful data field.
information"(CARTS) - Example: Customer Account
I. Completeness: All essential Number, Customer Name,
information to complete a decision Customer Address, Customer
or task is present Balance of Account, Customer
II. Accuracy: Information is free from Credit Limit
material errors
● The collection of data attributes is
III. Relevance: Information must serve
known as the record.
the purpose of its generation
IV. Timeliness: The timeline of the
2) Record
information is aligned with its
● A record is a complete set of attributes
objectives.
for a single occurrence within an entity
V. Summarization: Information is
class or collection of related fields.
aggregated in accordance with the
- Example: Account Receivable
end-user’s needs
Records that includes the Customer
6. Information is presented to the end-users Account Number, Customer Name,
● End users are users for whom the Customer Address, Customer
system is built. Balance of Account, Customer
A. External End Users: creditors, Credit Limit
stockholders, potential investors,
3) File: A complete set of records of an - From these resources, the firm assigns a
identical class department or a group of people whose
- Example: multiple Account Receivable functions are focused on each aspect of the
Records mentioned resources

1. Materials
1.2 Organizational Structure
● Materials Management
● An organizational structure is a system ➔ Incharge of Purchasing
that outlines how certain activities are ➔ Receiving Materials as well as;
directed in order to achieve the goals of ➔ Managing the Stores
an organization ● Production
● These activities can include rules, roles ➔ Manufacturing
and responsibilities ➔ Support
The structure of an organization helps to - Production planning which
allocate: involves scheduling the flow of
➢ Responsibility materials, labor and machinery
➢ Authority to efficiently meet production
➢ Accountability needs
- Quality control which monitors
Physical AIS the manufacturing process at
● is composed of technologies of various various points to ensure that
types and configurations, as well as the finished products meet the
people and tasks from across the firm’s quality standards
organization, thus there is a need for - Maintenance which keeps the
segmentation. firm’s machinery and other
manufacturing facilities in
Segmentation running order
● to divide the organization into parts, or
● Marketing
segments, which are definable,
➔ Sales
accessible, actionable and profitable
➔ Promotion
● Segmenting by business function is a very
➔ Advertising
common method of organizing
➔ Market Research
➔ Example: a sales processing system,
- Generates revenue
which is a subsystem of the revenue
- Main tasks: to thoroughly
cycle, includes the following
understand their potential
organization functions:
customers and to determine
- Sales, Credit, Inventory control,
how they will reach them
Warehousing, Shipping, Billing,
➔ Major function: sales
Accounts Receivable, General
Ledger, Data Processing ● Distribution
Main functions are:
➔ Warehousing
Functional Segmentation
➔ Shipping
● Business Organization considers the - Ensures that a product or
resources that they need to manage within service is available for the
the business consumers or business users
who needs it
Four Resources that a business must
manage:
2. Labor ➢ Information reliability requires
● Managed by the Personnel Group accounting independence
➔ Recruiting - Accounting activities must be
➔ Training separate and independent of
➔ Benefits the functional areas maintaining
resources
➔ Counseling
- Accounting supports these
- Supplies the organization with
functions with information but
personnel and takes care of their does not actively participate
well-being - Decision makers in these
- Ensures that each one is fit for functions require that such vital
the role they are chosen for information be supplied by an
independent source to ensure
3. Financial Capital its integrity
● Finance ● Technology
➔ Portfolio Management ➢ Enhanced the accountant’s ability
➔ Treasury to interpret data efficiently and
➔ Credit: ensures the credit worthiness effectively because of the readily
of the clients ability of data and info needed
➔ Cash Disbursement ➢ Accountant’s now has the ability to
➔ Cash Receipts interpret the language of business
- Concentrates on forecasting and with such ease that the accountant
budgeting of business revenues has become a corporation’s most
- Most business plans trusted business advisor
concentrate on this area ➢ The main role of technology in
because they need loans for business is to drive growth and
investments improve operations
➢ Its most vital task is the data
4. Information processing for external and internal
● Accounting users
➔ Inventory Control – to safeguard the I. Data Processing
asset Distributed Data Processing
➔ Cost Accounting - Recognizing the computer servicer
➔ Payroll function into small information
➔ Accounts Payable processing units that are distribute to
➔ Accounts Receivable end users and placed under their
➔ Billing control
➔ Fixed Assets - Users process transactions locally with
➔ General Ledger each user segment and an IT needs to
➢ Manages the financial resource of support their operations. Users function
the firm by: independently and tend not to share
- capturing and recording
data and information
transaction
- Distributes transaction Possible Disadvantages:
information to operations ➢ Loss of Control
personnel ➢ Mismanagement of company resources
➢ Value of information is ➢ Hardware and software incompatibility
determined by its reliability; ➢ Redundant tasks and data problems
unreliable information has NO - Data Storage
VALUE - Data Updating
- Currency of Information
- Task-Data Dependency IV.Network Administration
- Data Integration - Responsible for effective functioning of
Centralized Data Processing hardware and software
- All data processing is performed by ➔ Network: a collection of computers
one or more large computers housed at and communication devices that allow
a central site that serves users users to communicate, access data,
throughout the organization and applications, and share information
- Most organization employ a resources
combination of both types ● Due to highly technical and dynamic
changing expense of IT, many
II. System Development and Maintenance executives look towards IT
System development Outsourcing, where the organization
- The process organizations use to sells IT resources and leases back IT
acquire information systems services
System maintenance Cloud computing data centers deliver
- May be trivial or significant hosted IT services over the Internet:
- Between 80%-90% of system’s total ❖ Software as a Service (SaaS)
cost may be incurred because of ❖ Infrastructure as a Service (IaaS)
maintenance activities ❖ Platform as a Service (PaaS)
Custom software
- Built to individual specifications 1.3 Role of an Accountant in an
- Systems development life cycle is the Information System
software development process
- Requires an in-house team of qualified Information System Users
individuals and cost more expensive ● Accountants eventually accesses the
than the other type data in the company’s AIS in order to
- Custom systems are more expensive perform their job functions
than commercial packages ● This includes preparing and analyzing
- *Enterprise resource planning (ERP) is a budgets and financial statements,
system assembled of prefabricated preparing tax returns and examining
software components records for accuracy
★ SUPREME USERS
Commercial software
- Pre-coded software that a user
Information System Designer
purchases from a software vendor
● Domain experts
- It is available for general accounting
● Accounting function – responsible for
and industry specific application
Conceptual System
- Sometime called turnkey systems
Conceptual system
because they often can be
- Determines the nature of the
implemented by the user with little or
information required, its sources, its
no modification
destination, and accounting rules that
III. Database Administration must be applied
- Centrally organized companies with ● Computer function – responsible for
shared data use database Physical System
administration to ensure security and Physical System
integrity - The medium and method for
capturing and presenting the
information
Systems Auditors SOX legislation
● An expert who expresses an opinion about ➔ Restricts non-audit services that auditors
the fairness of company’s financial may provide and prohibits them from
statements providing:
● Accountants perform audits which ● Other accounting services including
typically involve the AIS bookkeeping, financial information
➔ Internal Auditing systems design and implementation,
- An independent, objective assurance appraisal or valuation, actuarial, and
and consulting activity designed to add internal audit outsourcing

value and improve an organization’s ● Management or human resources,


operations broker or dealer, investment adviser,
➔ IT Auditing or investment banking services
- the review of the computer-based ● Legal services and expert services
components of an org. the audit is unrelated to the audit
often performed as part of a broader ● Any other service that the Board
financial audit determines, by regulation, is
➔ Fraud audits permissible
- a detailed examination of the financial
records of a business, with the intent 1.4 Technology for Success
of finding instances of fraud.
- It had increased in popularity as a Technology
corporate governance tool ★ Came from the Greek word “TECHNE”
which means art and craft.
➔ External audit
● It was first used to describe applied
- Independent attestation and opinion
arts, but now it is used to describe the
(audit report) regarding financial
advancement and changes around us
statement preparation
- Requires auditors (independent CPAs)
Computer
to test internal controls and perform
Can be classified into THREE Generations:
substantive tests of data
- Critical element is auditor 1. First Generation
independence ● could only perform single task
- Auditor is free from factors that might ● they had no operating system and
influence the audit report mainly used vacuum tubes
● Attest function a. 1937
➢ An independent auditor’s ➢ First electronic digital computer
responsibility to opine as to the was built by Dr. John V.
fair presentation of a client firm’s Atanasoff-Berry and Clifford
financial statement Berry
● Tests of controls ➢ It was called the
- Tests that establish whether Atanassof-Berry Computer
internal controls are functioning (ABC)
properly b. 1943
● Substantive Tests ➢ An Electronic computer name
- Tests that determine whether the Colossus was built for the
database contents fairly reflect the military
organization’s transactions c. 1946
➢ The first general purpose digital
computer—Electronic Numerical
Integrator and Computer will store, process, analyze, and share
(ENIAC) was built; 30 tons, this data in a cloud
18,000 vacuum tubes ● Compact, have limited hardware, and
usually has a single purpose of
2. Second Generation enhancing the capabilities of everyday
● Used transistors instead of vacuum devices
tubes which were more reliable
● Over 100 computer programming Artificial Intelligence
languages were developed, computers ● Technological use of logic and prior
had memory and operating systems experience to simulate human
a. 1951 intelligence
➢ Universal Automatic Computer Capabilities:
(UNIVAC 1) I. Speech recognition – Siri, Google
➢ First computer for commercial Assistant,
use was introduced to the public II. Alexa
b. 1953 III. Local reasoning
➢ International Business Machine IV. Creative responses
(IBM)-650 and 700 series V. Immersive technology
computers made their mark in - Attempts to emulate a physical world
the computer world through the means of a digital or
simulated world by creating a
3. Third Generation surrounding sensory feeling, thereby
● Integrated circuits were invented creating a sense of immersion’
● Computers became smaller; more 1. Virtual Reality (VR)
reliable and they are able to run many ➔ Use of computers to simulate a real
different programs at the same time or imagined environment that
a. 1980 – Microsoft Disk Operating appears as a three-dimensional (3D)
System (MS-Dos) space
b. 1981 – IBM introduced the personal 2. Augmented Reality (AR)
computer (PC) for home and office ➔ Type of VR that uses an image of an
c. 1984 – Apple gave us the Macintosh actual place/things, then add digital
computer with its icon driven interface info to it
d. 1990 – Windows Operating System
Impact of Technology
Internet of Things (IoT)
● The ability of devices to communicate 1. Personal
with each other without human ➔ Artificial Intelligence
interference I. Games & Apps
● Such functionality makes it possible to ● All “Apps” uses artificial intelligence to
continuously monitor, and measure process specific data on behalf of the
various elements through a data user
network connected to the internet ● Games incorporate virtual reality to
simulate a different environment for
Embedded Computers (sensors and the user to enjoy
microchips) II. Digital Assistants
● Installed in specific devices and from ● Uses natural language processing
there, the collected data are transmitted which interpret and digitize spoken
to an application, usually via internet, that words and commands
III. Accessibility Options ➔ Business-to-business (B2B) –
● Particularly useful for persons with consists of business providing goods
sensory disabilities and services to other businesses (e.g.
● It uses “AI” such as screen readers, BPO (Business Processing
captioning and speech recognition, to Outsourcing))
assist the user despite their disability ➔ Business-to-consumer (B2C) –
● Smartphones even allow special input involves the sale of goods and services
devices to be connected for such to the general public (e.g. online shops)
users
➔ Consumer-to-consumer (C2C) –
occurs when one consumer sells
2. Workplace
directly to another (e.g. Facebook
➔ Intelligent workplace
marketplace)
- Offers integrated cognitive
solutions that help companies ● eBooks
collaborate across borders - Students can read and access
content, such as videos, from
➔ Online collaborative productivity
devices
software
● Social Networking
- Allows employees to easily share
- Allows exchange of information
info with stakeholders without
and stories between individuals
consuming much of company’s
resources such as paper
5. Transportation
➔ Working Remotely/Telecommuting ➔ GPS (Global Positioning System)
- Allows employees to carry out ● Radio navigation system that
their task even they are away allows land, sea, and air users to
from the workplace determine to determine their exact
location, velocity and time 24
3. Education hours a day in all weather
➔ Intelligent Classroom conditions anywhere in the world
- Inevitable outcome of the
Primarily being used to:
available advanced computing,
1. navigate routes and estimate data
network & data communication
2. avoid unfavorable traffic
technology
conditions
➔ Learning Management System 3. tracking parcels for delivery
- Web-based training
- Allows students to: 6. Healthcare
a. Check progress on a course ➔ 3D printers – used to replicate body
b. Take practice tests parts used for medical studies or
c. Exchange messages with substitute for real stuff
involved parties ➔ Medical monitoring devices –
d. Take classes and earn provides accurate and timely results to
degrees online monitor patient’s vital signs and
research symptoms and diagnosis
4. Commerce
➔ mHealth – use of mobile and wireless
● E-Commerce - the buying and
technologies to support the
selling of goods and services or the
achievement and health objectives
transmitting of funds or data, over an
electronic network, primarily the
internet
7. Manufacturing ❖ RAM (Random Access Memory) -
➔ Robotics – useful in situations where main memory of a computing device, it
it is impractical, dangerous, or stores data for a short period of time or
inconvenient to use a human until the computing device is kept on
➔ Computer-aided manufacturing this type of memory is volatile
❖ ROM (Read Only Memory) –
(CAM) – streamlines production and
permanently stores data on a
allows for shipping products more
computing device
quickly
❖ Storage Solutions
➔ Internal Drive – Hard Disk Drive
8. Environment
(HDD), Solid State Drive (SSD)
● Green computing
➔ External Drive – External HDD,
- environmentally responsible and
Flash Drive, Optical Drive,
eco- friendly use of computers
➔ Cloud Storage – it can store
and their resources
electronic files on the Internet
- In broader terms, it is also
instead of a local computer e.g.
defined, as the study of google drive, MS OneDrive,
designing, Dropbox
manufacturing/engineering, using
and disposing of computing 3. Input Device
devices in a way that reduces ● Input certain instruction or command to
their environmental impact a computer
● Used for raw data input
Computer Hardware ● Joystick, mouse, keyboard,
● Refers to the physical, tangible computer microphone, scanner, digital cameras
equipment and devices, which provide
support for major functions such as input, 4. Output Device
processing (internal storage, computation ● Disseminate data and information to the
and control), output, secondary storage (for user
data and programs), and communication ● Printers and copiers, Monitors,
Headphones, Speakers, Projectors
1. Processing Device Micro-Computer
● Process raw data instruction into - Small, relatively inexpensive computer
information with a microprocessor as its central
● Central Processing Unit (CPU) processing unit (CPU)
- complex integrated circuit consisting of - In common usage, the word
millions of electronic parts and is “microcomputer” has been largely
primarily responsible for converting input supplanted by the term “personal
(data) into meaningful output computer” or “PC”, which specifies a
- Data travels in and out of the CPU computer that has been designed to be
through a Bus - communication system used by one individual at a time
that transfer data and components inside a. Desktop Computer
the computer or between computers - Consist of a system unit, monitor,
- Wire or optical fiber keyboard, and mouse
- More powerful, and has more storage
2. Storage Device capability
● Used for data and information retention - Hardware components can
● Computer Memory – responsible for be easily upgraded
holding data and programs as they are
being processed by the CPU
b. All-in-one Computer ● Depending on the activity for which it was
- Monitor and system unit are housed designed, an application can manipulate
together, thus take up less space text, numbers, audio, graphics and a
- Difficult to service or upgrade combination of these elements
- More expensive than desktops a. Device Management Apps – provide
c. Portable/Mobile Device tools for maintaining a computer or
- Highly portable, but usually less device
powerful in specifications b. Productivity Apps – allows creation of
- Difficult to service or upgrade documents, graphics and to interact with
digital media
Computer Software c. Communication Apps – allows the user
to share or receive communications or
Software
information
● Program that enables a computer to
perform a specific task, as opposed to the d. Personal Interests Apps – provides
physical components of the system or users with tools to pursue their personal
hardware interest
● It has to be “loaded” into the computer’s
storage before it can be executed Types of Software Classified by Task:
1. Spreadsheet Software
1. System Software - Let you interact with numbers, charts,
● A type of computer program that is graphics, text, and data
designed to run a computer’s hardware - It can perform calculation on data
and application programs, or provide a stored in a grid of cells and recalculate
platform for other software values automatically when the data
changes
a. Operating system – a software that
● Worksheets - laid out in a grid of rows
communicates with the hardware and
and columns; they use letters to identify
allows another program to run. E.g.
each column and consecutive numbers
Windows, Android, IOS
to identify row
b. Language Processor – a computer ● Cell - location formed by the intersection
program designed or used to perform of a column and a row
tasks, such as processing program code to Key Features:
machine code access the interpreter of - Formatting tools to change a worksheet’s
your computer device that interprets all appearance
computer language and relates them to - Ability to create a printed output of the
your machine created spreadsheet
c. Utility Software – a software designed to - Web capabilities to share workbooks
help analyze, configure, optimize or online, add hyperlinks, and save
maintain a computer or support its worksheets as web pages
infrastructure.; disk defragmenters, system - Developer tools to add customized
profilers, Network managers, application functions
launchers, antivirus software, backup - Tools to analyze data
software, disk repair, disk cleaners, registry
cleaners, disk space analyzer, file manager, 2. Database Software
file compression, and hardware drivers ● Phrase used to describe any software
that is designed for creating databases
2. Application Software and managing the information stored in
● A computer program designed to help them
people perform an activity
- Sometimes referred to as database ➢ To access or initiate a computer application,
management system (DBMS) one just need to double click on the
- Database software tools are application’s icon from the desktop window
primarily used for storing, modifying, ➢ If the application is not found on the initial
extracting, and searching for desktop windows, you may click on the
information within a database windows icon (for Windows OS) or the dock
- Each piece of data is entered and (for Mac OS)
stored in a field
How to Save a File
● Tables – collection of records for a single
● Name the file, you must give it a name that
subject
follows your operating system’s rules for
● Query – extracts data based on specified
file-naming conventions
criteria, or conditions, for one or more
● Save to the computer, flash drive, or cloud.
fields
If creating or editing a file, it should be
● Report – user-designed layout of
saved frequently. Files you work on using a
database content
web app save changes as you make them
● Form – a screen used to enter data into a
● Use the Save As or Save a Copy dialog
database
box to save a file with a new name or in a
Key Features: new location
- Ability to collect data, in a manner that ➢ Every file has properties, such as name, type,
allows access, retrieval, and reporting of location, and size
that data ➢ Dates: when the file was created, modified,
- Represent a query in Structured Query last accessed
Language (SQL) ➢ The operating system assigns some
- Execute database application, such as, properties to files, such as type or format,
track inventory, maintain customer lists, and updates other properties, such as date,
or manage employee records assize, and location

Basic Computer Navigation Manage Folder Names and Folder Placement


● You can create a new folder in a file manager
1. The computer receives power from the such as File Explorer or Finder
power supply or battery and sends it to the ● Within file manager, you can move, copy, and
circuitry delete folders the same as a file
2. The processor runs the bootstrap program Functions:
3. The bootstrap program executes a series of ➢ View frequently or recently opened files and
tests to check the components folders
4. The computer loads the operating system ➢ View main folders on your
files into RAM, including the kernel computer or device
5. The computer loads the system configuration ➢ Search by file name, content, date, and
information and loads startup programs more
● Window
● Menu Dialog Boxes Information Literacy
● File ● Ability to find, evaluate, organize, use, and
- Data file communicate information in all its various
- Executable File formats, most notably in situations
- File Format requiring decision making, problem solving,
- File Extension or the acquisition of knowledge
● Folder ● It allows users to:
- Library - Navigate many sources of information,
including the Internet, online libraries,
and popular media sites
- Select the right tool for finding the Things to do to prevent:
information you need - Give only necessary information when
- Recognize that not all information is completing an online form
created equal - Review the information that online sites
- Evaluate whether information is such as Google, Facebook, Microsoft,
misleading, biased, or out of date and others have stored about you
-
- Request to be removed from mailing lists
➔ Credibility – identify the author and check
- Create another email account to use
credentials
when a merchant or website requires an
➔ Accuracy – verify facts and claims, check
address
for bias
- Do not use your social media account
➔ Reasonableness – examine whether the
login information to log in to another site
claims are fair & sensible
- Shred paperwork that contains personal
➔ Support – look for reputable sources and
information before discarding
authorities
- Do not carry a Social Security number in
a wallet or write it on a check
Content from Online Sources
- Do not provide personal information
● Copying photos might violate intellectual
either over the phone or through an email
property rights
message
Copyright – gives authors and artists the - Keep personal information in a secure
legal right to sell, publish, or distribute and location in a home or apartment
original work - Be cautious about what information is
● Some online resources are protected by posted online and who can view your
digital rights management (DRM), which information
limit access to proprietary rights - Keep only the last 3 months of financial
● Some material is in the public domain and statements and shred older documents
can be used without permission - For paper documents that must be
retained, use a scanner to create a PDF
● The fair use doctrine allows one to use a
of the document and add a strong
sentence or paragraph of text without
password that must be entered before it
permission with citation to the original
can be read
source
- Be cautious with a website or app
Creative Commons (CC) – a nonprofit
request to collect data
organization that helps content creators
- Websites that request more personal
keep copyright to their materials while
information than would normally be
allowing others to use, copy, or distribute
expected should be avoided
their work
● Authentication
Safety and Security ➔ Use of passwords
- Use strong Passwords
Risk: the possibility something might occur that - strong password: a longer
results in an injury or a loss combination of letters, numbers,
symbols minimum of 15-20
1. Risk from Information characters in length
● Data and programs, comes from - A longer password is always more
attackers who want to steal information secure than a shorter password,
● Online Banking, E-commerce, social regardless of complexity
media, data mining, fake websites - Do not use passwords that consist
of dictionary words or phonetic
words
- Do not repeat characters or use Cyberbullying
sequences (abc,123) ➔ Bullying that takes place on technology
- Do not use birthdays, family devices using online social media
member names, pet names, platforms, public online forums, gaming
addresses, or any personal sites, text messaging, or email
information - Considered more harmful than general
- Use a password manager bullying

● Authenticating with Biometrics Cyberstalking


- Uses the unique characteristics of ➔ Pay close attention to information about
your face, hands, or eyes to new or updates security settings and fine-
authenticate you tune profile options accordingly
- Some of the different types of
biometrics that are used today for 2. Risk toward Environment
authentication include: ● Toxic electronic components of
➢ Retina/Iris computers and other digital devices
➢ Fingerprint that are exposed when devices are
➢ Voice discarded
➢ Face E-waste
● Two Factor Authentication - Contains harmful chemicals such as
- Uses two level of security: cathode rays, beryllium, barium,
passwords and codes nickel, arsenic, lead and mercury
- After correctly entering your - When these chemicals are broken
password, a 4-6 digits code is sent down in landfills, they tend to leak
to your cell phone these hazardous materials into both
- The code must then be entered as the air and soil creating an extremely
the second authentication method unhealthy environment

● Encryption Steps to Reduce:


- The process of “scrambling” 1. Buy Green
information so it cannot be read - When purchasing new electronic
unless the user possesses the “key” equipment buy only products that
to unlock it (Decryption) have been designed with
- Can apply to data-at-rest (hard environmentally preferable attributes
drive) or data-in-transit (Internet) 2. Donate
● Digital Certificate - Donate used but still functional
- A technology used to verify a user’s equipment to school, charity, or
identity and key that has been non- profit organization
“signed” by a trusted third party 3. Recycle
- Send equipment to a verified used
Identity Theft electronics recycling center
➔ Involves using someone’s personal
information to commit financial fraud 3. Risk on Health
➔ Script kitties, Hactivists, Cyberterrorists, ➔ Eye strain, poor posture when using
Nation state actors, Insiders devices, and muscle fatigue from
Protect your Online Profile keyboard typing
● Be cautious about what information you ➔ Physical health issues
post ● Repetitive activity
● Be cautious about who can view your ● Improper technique
information ● Uninterrupted intensity
Protect Computer Equipment Electrical Problems

Surge Protector
● Can defend computer equipment from spikes,
surges, and noise

Uninterruptible Power Supply (UPS)


● can be used to protect against blackouts and
brownouts

Protect Computers from Theft


● Use a cable lock
● Keep devices out of sight when in a high-risk area
● Avoid being distracted by the device and maintain
awareness of surroundings
● Hold devices with both hands
● Do not use the device on escalators or near train
doors
● Do not use white or red headphone cords
● Do not give chase if a device is stolen
● Enable device security features

Risks
● Reading wireless transmissions
● Viewing or stealing computer data
● Injecting malware
● Downloading harmful content
Precautions
● Only connect to an approved wireless network in
public
● Limit the type of activity you do on public
networks to simple web surfing or watching online
videos
● Configure routers for a high level of security

Data Backup
➔ creating data backup means copying files from a
computer’s hard drive that are then stored in a
remote location
➔ can protect against hardware malfunctions, user
error, software corruption, natural disasters, and
cyberattacks
➔ Options: online or to external hard drive
SHORT ASSESSMENT

1. Which statement describes a business resource?


a. It is not essential to the survival of the contemporary business organization.
b. It does not need to be appropriately managed.
c. Raw materials, capital and information are examples of a business resource.
d. None of the above.

2. The following are parts of the subsystem of the Accounting Information System, except?
a. Management Reporting System
b. Transaction Processing System
c. Enterprise Resource Planning System
d. General Ledger/Financial Reporting System

3. Which is an example of a nonfinancial transaction?


a. Payment of loans
b. Logging of customer calls
c. Purchase of raw materials
d. Sale of products

4. Which statement best describes the Management Information System?


a. Supports the four functional areas of business accounting and finance, sales,
marketing, manufacturing, distribution, and human resources.
b. Processes financial transactions, not normally processed by the traditional
accounting information system
c. Identifies, collects, processes, communicate economic information about a firm
d. Distributes transaction information to operations personnel to coordinate many key
tasks

5. All of the following cycles are included in the Transaction Processing System except?
a. Revenue Cycle
b. Expenditure Cycle
c. Administrative Cycle
d. Conversion Cycle

6. Portfolio management and Cash disbursement are part of which business function?
a. Distribution
b. Finance
c. Accounting
d. Materials Management
7. Which of the following is not part of the production function?
a. Capturing and recording transactions in the database.
b. Monitors the manufacturing process at various points to ensure that the finished products
meet the firm’s quality standards
c. Schedules the flow of materials, labor and machinery to efficiently meet production needs.
d. Keeps the maintenance of the firm’s machinery and other manufacturing facilities in running
order.

8. Which is not part of the Marketing Function?


a. Sales
b. Advertising
c. Market Research
d. Managing the Stores

9. Which is not true regarding accounting independence?


a. Separation of duties, such as record keeping and custody of physical resources.
b. Generation of timely and accurate information.
c. Accounting supports these functions with information but does not actively participate in
the physical activities.
d. All statements are correct.

10. Which audit function provides independent attestation and opinion regarding financial statement
preparation?
a. Fraud auditing
b. Internal Auditing
c. External Auditing
d. IT Auditing

11. It involves the sale of goods and services to the general public such as online shops.
a. Consumer-to-consumer
b. Business-to-consumer
c. Business-to-business
d. None of the above

12. The impact of technology on healthcare has led to the use of the following except?
a. mHealth
b. Robotics
c. 3D printers
d. Medical monitoring devices
13. It is a device that processes raw data instruction into information.
a. Output device
b. Storage device
c. Storage device
d. Processing Device

14. Roger wants to store his data where he could access it remotely, which storage solution should he
use?
a. External drive
b. Cloud storage
c. Internal drive
d. All of the above

15. Marian needs to upload her vaccination card to the ThOMedSS website to update her vaccination
records, what device could she use to efficiently perform the task?
a. Scanner
b. Digital camera
c. Webcamera
d. All can be used to perform the task

16. All data processing is performed by one or more large computers housed at a central site that
serves users throughout the organization.
a. Centralized Data Processing
b. Distributed Data Processing
c. Decentralized Data Processing
d. None of the above

17. The following are possible disadvantages of Distributed Data Processing except?
a. Redundant tasks and data problems
b. Loss of control
c. Hardware and software incompatibility
d. None of the above

18. A program that starts and runs the computer.


a. Application Software
b. System Software
c. Database Software
d. Spreadsheet Software
19. Bruno receives an email that someone attempted to log in to his account. He was advised to
change his password. In creating a new password, Bruno must avoid all of the following except?
a. Using personal information
b. Using dictionary words
c. Using sequences (abc, 123)
d. Using a long combination of letters, numbers and symbols

20. It uses two levels of security using passwords and codes.


a. Encryption
b. Authenticating with Biometrics
c. Two Factor Authentication
d. Digital Certificate
ANSWER KEY:

1. C 6. B 11. B 16. A

2. C 7. A 12. B 17. D

3. B 8. D 13. D 18. B

4. A 9. B 14. B 19. D

5. C 10. C 15. A 20. C

References:

Hall, J.A. (2010). Accounting Information Systems Seventh Edition. Cengage Learning.

You might also like