IT Application Tools in Business - Module 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

IT APPLICATION TOOLS IN BUSINESS: BSA2

Components of a Computer System

a. Hardware Devices- Hardware devices are the physical components of the


computer. Items such as the monitor, keyboard, mouse, and printer are also known
as peripherals because they attach to the computer. The computer itself is known as
the system unit, and it contains many of the critical hardware and electrical
components.

b. Software applications- Application software is an end-user program typically


divided into two classes; applications software and systems software.
Systems software provides an operating system and utilities that enable applications
software such as database programs, spreadsheets, web browsers, and more to run.

c. Storage Devices - A storage device is any computing hardware that is used


for storing, porting and extracting data files and objects. It can hold and store
information both temporarily and permanently, and can be internal or external to a
computer, server or any similar computing device.

2. Application Programs

a. Word-processing - A word processor is software or a device that allows users to


create, edit, and print documents. It enables you to write text, store it electronically,
display it on a screen, modify it by entering commands and characters from the
keyboard, and print it. Of all computer applications, word processing is the most
common.

b. Spreadsheet - A spreadsheet is a file that exists of cells in rows and columns and
can help arrange, calculate and sort data. Data in a spreadsheet can be numeric
values, as well as text, formulas, references and functions.

c. Presentation - It can share important information such as a business plan or


educational lesson, or it can be useful for entertainment purposes.

Computer Security 1. Identify cyber-attacks and malware

1. Cyberattacks- If your firm is attacked, knowing what’s happened can help limit
damage and restore your systems quickly. This guide explains how to recognize and
prevent the different threats. The most common cybercrimes are phishing and
vishing scams. They rely on people being tricked into sharing secure information.
Law firms are a common target for a type of phishing attack known as “Friday
afternoon fraud”. Data breaches must be reported to the Information
Commissioner's Office within 72 hours of being discovered. Everyone in your firm
should know how to do this. Supply chain attacks target less secure parts of your
supply network. You should know how to monitor your suppliers and manage the
risk.

- Malware - ‘Malicious software’, known as malware, is designed to cause damage to


computer systems. Ransomware, spyware and viruses are examples of malware.

2. Distinguish differences between cyber intruders:

Trolls - It is someone who deliberately starts a fight and insults others in online
forums. They disrupt discussions to cause drama. They are practically omnipresent
on social media.

Spies - Cyber espionage is a form of cyber-attack that steals classified, sensitive data
or intellectual property to gain an advantage over a competitive company or
government entity.

Hackers - The hacker is someone who is mastermind in art of programming to point


that he or she simply sit down and hack in a program that works. But
the intruders are basically who violate networks and information systems.

Thieves - Thieves are creating other types of Trojans that steal account information
and key files of various program products and resources from infected computers,
for the benefit of the thief.

3. Discuss security issues and threats to computers and communication - There are
many threats to computer and the communication system which are error, accident
and natural hazards.

1: Human Errors • • • •

Humans often are not good at assessing their own information Humans emotions
effect their performance Humans perceptions are slower compared to the
equipment information overload to humans can sometimes be a problem

2: Procedural Errors •

When people fail to follow the steps and instruction prepared, error tends to occur

3: Software Errors •

Software malware or bug : causes a program or software to not run properly

4: Dirty Data problems •

incomplete, outdated or inaccurate source of data


5: Electromechanical problems • • •

Mechanical system can wear out or become damaged after a period of usage They
can sometimes be badly designed or constructed Power surges and failures can
damage the equipment connected

6: Natural hazards •

Unpredictable and often lead to disaster when occurs

7: Computer Crimes

• Computer crimes can be categorized into two which is illegal act


perpetrated against computer or telecommunications and use of computer
and telecommunications to accomplish illegal acts by using the computer as a tool •
Other examples of computer crimes are theft of hardware, theft of software, theft
of intellectual properties, theft of time and services, theft of information and many
more

4. Distinguish security safeguards protecting computers and communications -


Security is a system or software of safeguard for protecting information
technology against facing disaster, system failures, and unauthorized access that
can result in damage and lost. Computer security can be divided into five
components:

1: Deterrents to computer crime • • • • • • • •

Enforcing the law CERT to provide round the clock information on international
computer security threats Tools used to fight fraudulent and unauthorized online
uses Rule base detection software predictive statistical model software Employee
internet management Internet browsing filtering software Electronic surveillance

2: Identification and access • • • •

Verify legitimate right of access by what you have, what you know, and who you are
What you have like keys, cards, signatures, badges What you know like pin numbers
and passwords Who are you like bio metrics such as face scan and finger print scan

3: Encryption • • •

The process of altering and changing a data into unreadable form to prevent
unauthorized access Advantage is data is available over the internet Disadvantage is
law officer may not be able to read the data.
4: Protection of software and data: Restrict access to online files; use transaction
logs. Use audit controls to track who used what programs and servers, which files
were opened, and so on. Use people controls—screen applicants; do background
checks; monitor Internet, email, and computer usage; use shredders for discarded
documents and materials

5: Disaster Recovery Plan • • •


Method of retrieving important data and information after a disaster has happened.
The data storage system must be kept separately and data have to be backed up.
Back up all data and keep in mainframes in different positions

5. Explain privacy surveillance: data collectors - Data Modelers and Data Governance
experts need to work with the company’s security experts to create policies and
procedures designed to handle confidential data within the organization and to
decide which data can be safely exposed to vendors and others outside the firm.

Spies - Spying combines monitoring and surveillance with active intelligence


gathering and data analysis to discover what is occurring relative to government or
corporate interests. Spying can be used in the interest of national security, by
unscrupulous corporations to discover trade secrets, or has the media discovered, to
sway individual’s opinions about political candidates, high-profile individuals, or
national interests.

6. What are the computer crimes and cybercrime law

- Computer crime describes a very broad category of offenses. Some of them are the
same as non-computer offenses, such as larceny or fraud, except that a computer or
the Internet is used in the commission of the crime. Others, like hacking, are
uniquely related to computers. Read on to find out what kinds of activities are
considered computer crimes and how to protect yourself from them.

- Cybercrime law- Computer Crime Cyberbullying Sexting Identity Theft

7. The Ten Commandments of Computer Ethics


1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people's computer work.

3. Thou shalt not snoop around in other people's computer files.

4. Thou shalt not use a computer to steal.

5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not copy or use proprietary software for which you have not paid
(without permission).
7. Thou shalt not use other people's computer resources without authorization or
proper compensation.

8. Thou shalt not appropriate other people's intellectual output.

9. Thou shalt think about the social consequences of the program you are writing or
the system you are designing.

10. Thou shalt always use a computer in ways that ensure consideration and respect
for other humans

1. What is Database? - A database is a collection of information that is organized so


that it can be easily accessed, managed and updated. Computer databases typically
contain aggregations of data records or files, containing information about sales
transactions or interactions with specific customers.

Database Management System? - It is a software package designed to define,


manipulate, retrieve and manage data in a database. A DBMS generally manipulates
the data itself, the data format, field names, record structure and file structure. It also
defines rules to validate and manipulate this data.

2. What are the advantages and disadvantages of a database?

Advantages of Database

1) Data Abstraction:
Data abstraction means to hide the complexity of data from the basic users.
DBMS abstracts the data to the users, which is not useful for the users. It
shows only those data which are useful to the users.
2) Controlling Data Redundancy:
Data redundancy means having multiple copies of the same data. DBMS
controls the data redundancy and integrates all data into a single database
file.

3) Minimized Data inconsistency:


Data inconsistency means that different files may contain different
information of a particular object or person If DBMS has reduced the data
redundancy than the database system leads the better data consistency

4) Data Manipulation Easily:

In DBMS, Data can be manipulated easily, because data is centralized so once


the data structure is defined, we can easily change in the data like- insertion,
modification or deletion.

5) Data can be shared:


Data can be shared easily by multiple applications in centralized DBMS. The
applications can be developed without having to create any new stored files.

6) Data Security:

Database provides data security means protecting your precious data from
unauthorized access. Data can be accessed only by authorized users of the
organization. A database can be accessed only by proper authentication, usually
by verifying login and password.

7) Support Multi-users Views:


Multi-users can view the data at the same time.

8) Concurrent Access: •
Several users can access the database concurrently.

Disadvantages of Database

1) Cost of Hardware and Software: To run the DBMS software, we need a high-
speed processor and large memory size is required which cause expensive
hardware is needed.

2) Cost of Data Conversion: When a computer file-based system is replaced with


a database system, then the data stored in data files must be converted into
database files.

It is the difficult and time-consuming method to convert the data of data files
into database

3) Cost of Staff Training: DBMS are often complex system, so the training is
required for the users to use the DBMS. The organization has to be paid plenty of
amount for the training of workers to run the database management system.

5. Give examples of database management applications. - MySQL, PostgreSQL,


Microsoft Access, SQL Server, FileMaker, Oracle, RDBMS, dBASE, Clipper, and
FoxPro. Since there are so many database management systems available, it is
important for there to be a way for them to communicate with each other.

General REFLECTION

Information technology drives innovation and innovation is the path to business


success. Innovation in business has the same impact that steam had on the
industrial revolution. Nowadays the formula for business success is simple: drive
innovation with information technology. So, the first thing startups in any
industry try to figure out is how to make smart IT recruiting choices. Without the
backbone of information technology, a business is not going to go far. It relies on
creativity and problem-solving. This field provides you with the unique
opportunity to use your tech skills to come up with innovative solutions to
problems faced by your clients, company and the population. You can use your
skills to make major contributions. Using application tools in business helps me
become more engaged, it teaches the students not only me to enjoy and
embrace the learning process, even if they don’t realize it. As a student seeks out
new information and answers to questions, they develop a habit of exploratory
learning. This is the foundation of career learning. It continually seeks new
information and ways to better themselves, ultimately leading to skills they can
put to use in their personal and professional lives.

A database management system makes it possible for multiple authorized users


to access the same database from different places, in different ways, to fulfill
different intents. Databases give you lots of different ways to look at your data. A
request for a specific answer or list from your database called a "query" can take
just a minute or two to write, as opposed to hand-collating data records or
sorting and resorting to a spreadsheet. Plus, you can write standing queries to
answer the questions you ask frequently, so an up-to-the-minute answer is just
seconds away. The major advantages of a database system approach to
managing data include improving data sharing for users, improving data
security, improving data access and improving data integration while
minimizing data inconsistencies. This will lead to improved decision making
and productivity.

Microsoft access is a Database Management System offered by Microsoft. It uses


the Microsoft Jet Database Engine and comes as a part of the Microsoft Office
suite of applications. Microsoft Access offers the functionality of a database and
the programming capabilities to create easy to navigate screens (forms). It helps
you analyze large amounts of information and manage data efficiently. I believe
this is an area where we may see some change in the not-so-distant future. IT
started by creating systems so that people could store data on disks rather than
on paper. Those applications were program-heavy while the data was in
electronic files. Systems now can store data in much more complex and efficient
ways. Relationships between data entities can exist, we can access data that is
not contained within our systems and businesses are demanding more
intelligence out of their data. Also, for some industries, current data entry
methods which may currently include a person entering data will be replaced by
machines. This may diminish the need for programming, and the sheer volume
and variety of data being collected may stimulate some IT professionals to
pursue a career in data management.

END.

You might also like