Professional Documents
Culture Documents
IT Applications Tools in Business Lab - Lec
IT Applications Tools in Business Lab - Lec
Prepared and Submitted by: Date Submitted: Reviewed by: Date Reviewed:
________________
KING CHRISTIAN D. ANTONIO,MIT, LPT _ MARITES B. ALEJANDRO, CPA, MBM _________________
Instructor Program Coordinator
________________
_ RUPERTO JOSE H. MATEO, CPA, MAIT _________________
Instructional Coordinator Dean, College of Information Technology
Approved by:
1
VISION
In keeping with its Philosophy, Vision and Mission, La Salette professes the following
The University of La Salette, Inc., a Catholic institution founded by the Missionaries of institutional objectives:
Our Lady of La Salette, forms RECONCILERS “so that they may have life, and have 1. To foster a reconciled and reconciling community through spiritual upliftment
it to the full.” (John 10:10) programs and liturgical activities.
2. To sustain the quality assured education of the university through institutional
MISSION and program accreditations, professional certification, and compliance with
international standards for curricular programs and university management.
The University of La Salette, Inc. is a premier institution of choice, providing 3. To provide accessible education through various modalities of learning.
accessible, quality, and transformative education for integral human development 4. To lead the academic community with strategic and transformative competencies
particularly the poor. in realizing the Vision, Mission and La Salette Philosophy of Education.
5. To develop and implement transformative teaching and learning experience
CORE VALUES through critical approach and values-based integration.
6. To undertake research on various disciplines and generate new knowledge
1. FAITH-The total submission to God’s call to Holiness to His will needed for the advancement of the university as well as for the national
2. RECONCILIATION-Constantly renewing our relationship with God, others and all development.
creation through a life of prayer, penance and zeal 7. To realize ICT oriented learning by establishing the monitoring system to collect
3. INTEGRITY-The courage and determination to live and to die for Salettinian and review information needed to manage an organization or on-going activities
ideals of the university.
4. EXCELLENCE – Upholding the highest standard of quality education and 8. To provide industry experience through on-the-job-trainings, exposures,
professionalism in the areas of instruction, research and extension internship, immersion programs and linkages.
5. SOLIDARITY – Commitment to building a community anchored on mutual trust, 9. To provide a holistic curriculum that integrates instruction, extension, research,
confidence, teamwork, unity and respect for the dignity of the human person and ICT, industry experience for both students and faculty.
creation 10. To adopt an interdisciplinary approach by enhancing the institution’s interest in
the understanding of the cultural reproduction and social integration and in
CORE COMPETENCIES spiritual and moral formation
INSTITUTIONAL OUTCOMES
INSTITUTIONAL OBJECTIVES
2
Having finished their academic degree at the University of La Salette, the graduates
are expected to become:
Industry Competent. Demonstrate their readiness in the arena of and qualification for
employment through the established link between theoretical aspect of the curriculum
and its practical dimension as a result of their on-the-job trainings, exposures,
internship, immersion programs and linkages with relevant industries or workplaces.
PROGRAM OUTCOMES
An IT graduate must acquire skill set that enables him or her to successfully perform
integrative task including:
3
CODE BSIT PROGRAM OUTCOMES
BSAIS1 Resolve business issues and problems, with a global and strategic
perspective using knowledge and technical proficiency in the areas of
financial accounting and reporting, cost accounting and management,
accounting and control, taxation and accounting information systems.
BSAIS2 Conduct Accounting Information System research through independent
studies of relevant literature and appropriate use of accounting theory and
methodologies.
BSAIS3 Employ technology as a business tool in capturing financial and non-
financial information, generating reports and making decisions.
BSAIS4 Apply knowledge and skills that will successfully respond to various types
of assessments (including professional licensure and certifications).
BSAIS5 Confidently maintain a commitment to good corporate citizenship, social
responsibility and ethical practice in performing functions as an
accountant.
BSAIS6 Uphold the La Salette vision and core values of Faith, Reconciliation,
Integrity, Excellence, and Solidarity in performing functions as an
accountant.
4
PROGRAM OUTCOMES AND THEIR RELATIONSHIP TO THE INSTITUTIONAL OUTCOMES
COURSE INFORMATION
5
COURSE OUTCOMES
1. Cognitive- System analyst and design were used to teach me about information technology ideas.
2. Affective- knowledgeable about system development, including planning, analysis, design, and implementation
3. Psychomotor- Understanding the path to take in developing a corporate organization by examining the present system and searching for areas for improvement
COGNITIVE: System analyst and design were used to teach me about information technology ideas. x x
AFFECTIVE: knowledgeable about system development, including planning, analysis, design, and implementation x x x
PSYCHOMOTOR: Understanding the path to take in developing a corporate organization by examining the present x x x
system and searching for areas for improvement
6
COURSE OUTLINE
TIME
Learning Outcomes Topic Outline Methodology Assessment Learning Resources
FRAME
At the end of the week, Course Orientation Synchronous: Recitation on the university’s Student Handbook
students should have the University’s vision, Virtual discussion vision, mission, core values,
ability to: mission, core values, through video core competencies, CHED CMO 25, series 2015 “PSG for IT
Explain the University of La core competencies, conferencing platform institutional objectives and Education”
(GMeet)
Salette vision, mission, institutional institutional outcomes
core values, core objectives and Short quiz about the Curriculum Guidelines for Baccalaureate
Asynchronous:
competencies, institutional institutional Learning resources and university’s policies Degree Programs in Information
objectives and outcomes; ` outcomes activities will be uploaded Writing a reflective essay on Technology (IT2017)
Relate BSIT program Course information in the ULS CLMS site the purpose of institutional of ACM and IEEE-CS
educational outcomes to (https://ulsclms.online) outcomes in helping
the institutional outcomes; students become what they ULS Official Website
Week 1
7
At the end of the week, INTRODUCTION TO Synchronous: Create MS word file: Books/e-Books
students should have the WORD Virtual discussion 1. Flayers Stewart, K., Nordell, R., Easton, A.,
ability to: o Introduction to through video 2. Invitation Card Interactive, I. T., & Graves, P. R. (2022).
conferencing platform Loose Leaf for Microsoft Office 365: In
Word Processing
(GMeet) Practice, 2021 Edition. McGraw-Hill
Apply the MS word text o Document
Companies.
basics, formatting text, page Organization Asynchronous: Internet
layout, indents and tabs. o Finalize a Learning resources and Admin. (2022b). What is MS PowerPoint? -
Demonstrate how to add, Document activities will be uploaded Introduction, Features & Uses. BYJUS.
delete, move, cut, copy, and in the ULS CLMS site
Week 2
https://byjus.com/govt-exams/microsoft-
paste text. DOCUMENT (https://ulsclms.online) powerpoint/#:~:text=It%20is%20a
Demonstrate how to change PRESENTATION %20presentation%2Dbased,is%20also
font size, color, and text o Text Formatting Face to face %20known%20as%20PPT
alignment. Lecture/ Discussion Journal Articles
Features
Demonstrate how to modify Demonstration Jiang, Y., & Song, X. (2021). Discussion on
o Paragraph
page orientation, margins, Illustration Advanced Microsoft Office. Learning &
Formatting Problem Solving
and size. Education, 10(1), 167-168.
Features Hands-on Activities
Demonstrate how to use the o Styles
tab selector and horizontal o Graphical Objects
ruler to set tabs and indents.
At the end of the week, Industry in the Synchronous: Forum Discussion about the Books/e-Books
students should have the Profession / Virtual discussion Information Technology in real Englander, I., & Wong, W. (2021). The
ability to: Appreciation of through video life: Title “Your Future Now” architecture of computer hardware, systems
Computing in conferencing platform software, and networking: An information
(GMeet) Create a diagram of the technology approach. John Wiley & Sons.
Explain the information Different Fields
technology. o The World of advantages and Internet
Asynchronous: GeeksforGeeks. (2021). Computer
Evaluate the computer Computers Learning resources and
disadvantages of using the
Hardware. GeeksforGeeks.
language. o tInformation computer.
Week 3
8
At the end of the week, Evolution of Synchronous: Fill out an advance organizer Books/e-Books
students should have the Computing Virtual discussion about the different Evolution of Englander, I., & Wong, W. (2021). The
ability to: o “All Purpose through video Computing architecture of computer hardware, systems
conferencing platform software, and networking: An information
Machine”: The
(GMeet) technology approach. John Wiley & Sons.
Discuss the history of Varieties of
computer. Internet
Computers Asynchronous: GeeksforGeeks. (2021). Computer
Classify types of computers. o Types of Learning resources and Hardware. GeeksforGeeks.
Computers
Week 4
9
At the end of the week, Key Components of a Synchronous: Student will have a quiz about Books/e-Books
students should have the Computer Systems, Virtual discussion the different key Components Englander, I., & Wong, W. (2021). The
ability to: Operating System through video of a Computer Systems, architecture of computer hardware, systems
o Components of conferencing platform Operating System software, and networking: An information
(GMeet) technology approach. John Wiley & Sons.
Discuss the components of Computer System:
computer system, the Internet
Hardware and Asynchronous: GeeksforGeeks. (2021). Computer
hardware and software. Software Learning resources and Hardware. GeeksforGeeks.
Identify input and output o Input and Output activities will be uploaded https://www.geeksforgeeks.org/computer-
Week 7
At the end of the week, MICROSOFT EXCEL Synchronous: Create a video teaching Excel Books/e-Books
students should have the 2010 Virtual discussion to ages 16–17, 18–40, and Stewart, K., Nordell, R., Easton, A.,
ability to: INTRODUCTION TO through video 40+. Interactive, I. T., & Graves, P. R. (2022).
EXCEL conferencing platform Loose Leaf for Microsoft Office 365: In
o Introduction to (GMeet) 16–17: easy topics Practice, 2021 Edition. McGraw-Hill
Create a simple and
Spreadsheets Companies.
complex formula in Excel. 18–40+: Average difficulty
o Mathematics and Asynchronous: Internet
Apply absolute and relative Formulas Learning resources and Admin. (2022). What is MS Word? - Basics,
cell references. o Workbook and activities will be uploaded Uses, Features & Questions. BYJUS.
Week 8
10
At the end of the week, SUBTOTALS, Synchronous: Create accounting report with Books/e-Books
students should have the PIVOTTABLES, AND Virtual discussion data analysis using subtotals, Stewart, K., Nordell, R., Easton, A.,
ability to: PIVOTCHARTS through video pivottables, and pivotcharts. Interactive, I. T., & Graves, P. R. (2022).
o Outlines and conferencing platform Loose Leaf for Microsoft Office 365: In
Subtotals (GMeet) Practice, 2021 Edition. McGraw-Hill
Apply data analysis.
o PivotTable Basics Companies.
Use the subtotals, Asynchronous:
o PivotTable Options Internet
pivottables, and pivotcharts o PivotTable Design Learning resources and Admin. (2022). What is MS Word? - Basics,
Week 9
and PivotCharts activities will be uploaded Uses, Features & Questions. BYJUS.
in the ULS CLMS site https://byjus.com/govt-exams/microsoft-
(https://ulsclms.online) word/#:~:text=Used%20to%20make
%20professional%2Dquality,in%20the
Face to face %20best%20possible%20way
Lecture/ Discussion Journal Articles
Demonstration Jiang, Y., & Song, X. (2021). Discussion on
Illustration Advanced Microsoft Office. Learning &
Problem Solving Education, 10(1), 167-168.
Hands-on Activities
At the end of the week, SPECIALIZED Synchronous: Create excel file using Books/e-Books
students should have the FUNCTIONS Virtual discussion specialized functions. Stewart, K., Nordell, R., Easton, A.,
ability to: o Math and Statistical through video Interactive, I. T., & Graves, P. R. (2022).
Functions conferencing platform Create excel file with multiple- Loose Leaf for Microsoft Office 365: In
o Logical and Lookup (GMeet) sheet workbook management; Practice, 2021 Edition. McGraw-Hill
Use the specialized
functions. Functions imports, web queries, and xml. Companies.
o Database Filtering and Asynchronous: Internet
Apply the multiple-sheet Functions Learning resources and Admin. (2022). What is MS Word? - Basics,
workbook management; o Financial Functions activities will be uploaded Uses, Features & Questions. BYJUS.
imports, web queries, and MULTIPLE-SHEET in the ULS CLMS site https://byjus.com/govt-exams/microsoft-
Week 10
11
At the end of the week, Malware Synchronous: Fill out an advance organizer Books/e-Books
students should have the o Cyber-Attacks and Virtual discussion about the difference between Blokdyk, G. (2019). Technology Risk And
ability to: Malwares through video Cyber Intruders: Trolls, Spies, Cybersecurity A Complete Guide - 2019
conferencing platform Hackers and Thieves Edition. 5starcooks.
o Distinguish Different
(GMeet) Internet
Identify cyber-attacks and Cyber Intruders:
malwares Simplilearn. (2023). What is Cybersecurity?
Trolls, Spies, Asynchronous: Everything You Need to Know [Updated].
Distinguish different cyber o Hackers and Learning resources and Simplilearn.com.
intruders: trolls, spies, Thieves activities will be uploaded
Week 11
https://www.simplilearn.com/introduction-to-
hackers and thieves. in the ULS CLMS site cyber-security-article#:~:text=Enroll
(https://ulsclms.online) %20now!-,What%20is%20Cyber%20Security
%3F,confidence%20in%20products%20and
Face to face %20services.
Lecture/ Discussion Journal Articles
Demonstration Kaur, J., & Ramkumar, K. R. (2022). The
Illustration recent trends in cyber security: A review.
Problem Solving Journal of King Saud University-Computer
Hands-on Activities and Information Sciences, 34(8), 5766-5781.
At the end of the week, ICT Security Synchronous: Forum discussion about the Books/e-Books
students should have the o Communication Virtual discussion about the different ICT Blokdyk, G. (2019). Technology Risk And
ability to: Systems through video Security threads. Cybersecurity A Complete Guide - 2019
conferencing platform Edition. 5starcooks.
o Computer and
(GMeet) Internet
Discuss security issues: Communications
threats to computers and Simplilearn. (2023). What is Cybersecurity?
o Explain Privacy Asynchronous:
communication systems Everything You Need to Know [Updated].
Surveillance: Data Learning resources and Simplilearn.com.
Distinguish security Collectors and activities will be uploaded
Week 12
https://www.simplilearn.com/introduction-to-
safeguards: protecting o Spies in the ULS CLMS site cyber-security-article#:~:text=Enroll
computer and (https://ulsclms.online) %20now!-,What%20is%20Cyber%20Security
communications %3F,confidence%20in%20products%20and
Face to face %20services.
Lecture/ Discussion Journal Articles
Demonstration Kaur, J., & Ramkumar, K. R. (2022). The
Illustration recent trends in cyber security: A review.
Problem Solving Journal of King Saud University-Computer
Hands-on Activities and Information Sciences, 34(8), 5766-5781.
MIDTERM EXAMINATION
12
At the end of the week, Digital Laws and Synchronous: Student will have a quiz about Books/e-Books
students should have the Ethics in Business Virtual discussion the computer and internet Blokdyk, G. (2019). Technology Risk And
ability to: o Computer and through video crimes and the cybercrime Cybersecurity A Complete Guide - 2019
conferencing platform law. Edition. 5starcooks.
Internet Crimes and
(GMeet) Internet
Discuss the computer and the Cybercrime
internet crimes and the o Law Simplilearn. (2023). What is Cybersecurity?
Asynchronous: Everything You Need to Know [Updated].
cybercrime law. Learning resources and Simplilearn.com.
Week 13 - 14
https://www.simplilearn.com/introduction-to-
o Social Networking in the ULS CLMS site cyber-security-article#:~:text=Enroll
(https://ulsclms.online) %20now!-,What%20is%20Cyber
%20Security%3F,confidence%20in
Face to face %20products%20and%20services.
Lecture/ Discussion Journal Articles
Demonstration Kaur, J., & Ramkumar, K. R. (2022). The
Illustration recent trends in cyber security: A review.
Problem Solving Journal of King Saud University-Computer
Hands-on Activities and Information Sciences, 34(8), 5766-
5781.
13
At the end of the week, HTML Synchronous: Create webpage using the Books/e-Books
students should have the o Coding Basics: Virtual discussion attributes, headings, Casabona, J. (2020). HTML and CSS: Visual
ability to: Intro to HTML through video paragraphs and styles. QuickStart Guide. Visual QuickStart Guides.
conferencing platform Internet
Syntax
(GMeet) Introduction to HTML. (n.d.).
Apply the attributes, o The HTML, head,
headings, paragraphs and https://www.w3schools.com/html/html_intro.
title, & body tags Asynchronous:
styles on webpages. asp
o Headings, Learning resources and Journal Articles
Week 16
14
At the end of the week, o Coding Links: Synchronous: Create visualizations in Books/e-Books
students should have the Absolute & Relative Virtual discussion accordance with UI/UX Casabona, J. (2020). HTML and CSS: Visual
ability to: URLs through video theories. QuickStart Guide. Visual QuickStart Guides.
o Anchor tags & hrefs conferencing platform Internet
Develop a fully functioning
(GMeet) Introduction to HTML. (n.d.).
Structure and implement o Linking to other website and deploy on a
HTML/CSS. web server. https://www.w3schools.com/html/html_intro.
websites Asynchronous: asp
Apply intermediate and o Linking to pages Learning resources and Journal Articles
Week 18
15
COURSE REQUIREMENTS
GRADING SYSTEM
16
PERFORMANCE ASSESSMENT RUBRICS
Effective Answers to questions are correct, Answers to questions are Answers to questions are Correct understanding of the Failure to explain and justify
communication/ reasonable, and reflective of the correct, but some justifications correct, but cannot justify problem, but was unable to workings of the code submitted
Concept Under- code. The justifications provided provided are weak. solution (e.g., solution via trial explain workings of code will automatically merit for this
standing are sound. and error, rather than proper provided. course output
understanding and application
of concepts.)
Readability The program conforms to a Minor code formatting does not Not all functions/ program Minimal internal No internal documentation and
coding standard that promotes exhibit consistency in coding features have proper internal documentation and code code is not readable.
code readability. Internal standard documentation readability
documentation is comprehensive
17
SPECIFIC COURSE POLICIES
Other course policies are stated in The Student Handbook under Policy on Class Attendance……
1. Per College policy, excused/unexcused absences should not exceed 20% of the assigned number of hours. More than 20% absences incurred during the semester would
mean being dropped from the class roll.
2. Class attendance is important. Class participation is expected and will form a part of the final grade. Students are expected to come to all classes and be on time. Roll will be
checked each class meeting. Classes missed for legitimate reasons, such as illness, temporary duty, are excusable; however, the student must make up for the missed work by
completing class exercise sheets and attending alternate activities.
3. Students are required to read all assigned materials prior to class and be prepared to discuss them and apply them to problem solving situations presented in class.
4. In this course, students are encouraged to discuss problems with their peers and to seek help from others in understanding the topic. Material submitted for grading should be
the synthesis of the students’ ideas and the input (lectures) they have received. Instances discovered of UNFAIR ADVANTAGE being taken of any other individual or group will
result in a loss of grade substance.
5. Plagiarism: All academic work submitted by students, written or otherwise, is expected to be the result of their own independent thought and research. In cases where students
submit work professing to be their own, but uses the ideas, organization, wording or anything else from another source without the appropriate acknowledgment, then the
student(s) is/are guilty of plagiarism.
a. Students may discuss assignments among themselves or with a professor or tutor, but the actual work/report/result to be submitted should be done completely and solely by
the student. In cases where a student's report or assignment involves research in outside sources or information, the student must carefully acknowledge exactly what, where
and how he/she has utilized the sources or information.
6. Cheating during examinations is never condoned and allowed! Students caught cheating in any form will have their papers confiscated and will be sent out of the examination
room and will not be allowed to retake the exam anymore.
7. Make up policy: Students who are unavoidably absent from an examination (long exams or major exams) or recitation must submit an excuse letter duly signed by any of
his/her parents before he/she can take the missed examination. If the cause of the absence is illness, then the student must present a medical certificate. Quizzes and
exercises missed because of valid absences will be prorated.
8. Quizzes are unannounced while long exams are announced. Strictly no make-up exams on quizzes, long exams and term exams unless an excuse slip or
certification is shown.
9. Students are required to submit course requirements on time to avoid deductions of points.
18
CONSULTATION HOURS
REFERENCES
BOOKS
Blokdyk, G. (2019). Technology Risk And Cybersecurity A Complete Guide - 2019 Edition. 5starcooks.
Shekokar, N. M., Vasudevan, H., Durbha, S. S., Michalas, A., Nagarhalli, T. P., Mangrulkar, R., & Mangla, M. (2023). Cyber Security Threats and Challenges
Facing Human Life.
Stewart, K., Nordell, R., Easton, A., Interactive, I. T., & Graves, P. R. (2022). Loose Leaf for Microsoft Office 365: In Practice, 2021 Edition. McGraw-Hill
Companies.
Lemahieu, W., Vanden Broucke, S., & Baesens, B. (2018). Principles of Database Management: The Practical Guide to Storing, Managing and Analyzing Big
and Small Data. Cambridge University Press.
Casabona, J. (2020). HTML and CSS: Visual QuickStart Guide. Visual QuickStart Guides.
Englander, I., & Wong, W. (2021). The architecture of computer hardware, systems software, and networking: An information technology approach. John
Wiley & Sons.
ONLINE
Admin. (2022). What is MS Word? - Basics, Uses, Features & Questions. BYJUS. https://byjus.com/govt-exams/microsoft-word/#:~:text=Used%20to%20make
%20professional%2Dquality,in%20the%20best%20possible%20way.
Admin. (2022b). What is MS PowerPoint? - Introduction, Features & Uses. BYJUS. https://byjus.com/govt-exams/microsoft-powerpoint/#:~:text=It%20is%20a
%20presentation%2Dbased,is%20also%20known%20as%20PPT.
GeeksforGeeks. (2021). Computer Hardware. GeeksforGeeks. https://www.geeksforgeeks.org/computer-hardware/
Simplilearn. (2023). What is Cybersecurity? Everything You Need to Know [Updated]. Simplilearn.com. https://www.simplilearn.com/introduction-to-cyber-security-
article#:~:text=Enroll%20now!-,What%20is%20Cyber%20Security%3F,confidence%20in%20products%20and%20services
Introduction to HTML. (n.d.). https://www.w3schools.com/html/html_intro.asp
JOURNALS
Kaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences, 34(8), 5766-5781.
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
Jiang, Y., & Song, X. (2021). Discussion on Advanced Microsoft Office. Learning & Education, 10(1), 167-168.
Wahyuni, P., & Kusumawati, M. (2021, February). The Use of Microsoft Office 365 In Mathematics Learning During The COVID-19 Pandemic. In Proceeding International
Conference on Science and Engineering (Vol. 4, pp. 162-165).
Ganapathy, A., Vadlamudi, S., Ahmed, A. A. A., Hossain, M. S., & Islam, M. A. (2021). HTML Content and Cascading Tree Sheets: Overview of Improving Web Content
Visualization. Turkish Online Journal of Qualitative Inquiry, 12(3), 2428-2438.
Pavlo, A., Angulo, G., Arulraj, J., Lin, H., Lin, J., Ma, L., ... & Zhang, T. (2017, January). Self-Driving Database Management Systems. In CIDR (Vol. 4, p. 1).
19
Ugah, J. O., Agu, S. C., & Elugwu, F. (2018). Relationship between Operating System, Computer Hardware, Application Software and Other Software. International Journal
of Computer Trends and Technology, 64, 12-16.
20
21
Revised as of August 2020