Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

BUSINESS FINANCE

INTRODUCTION TO FINANCIAL MANAGEMENT


(The Definition of Finance, the
Activities of the Financial Manager, and
Financial Institutions and Markets)
Cash on hand is considered a liquid asset due
to its ability to be readily accessed.

Liquidity describes your ability to exchange an asset


for cash. The easier it is to convert an asset into cash,
the more liquid it is. And cash is generally considered
the most liquid asset. Cash in a bank account or credit
union account can be accessed quickly and easily, via
a bank transfer or an ATM withdrawal.
FINANCIAL INSTRUMENTS, INTERMEDIARIES,
MARKETS, AND INSTITUTIONS

Assets - property owned by a person or


company, regarded as having value and
available to meet debts, commitments,
or legacies.
STOCK MARKETS
An asset is any resource owned or controlled
by a business or an economic entity. It is Stock markets facilitate the sale and
anything (tangible or intangible) that can be purchase of stocks between individual
used to produce positive economic value. investors, institutional investors, and
Assets represent value of ownership that can companies.
be converted into cash (although cash itself is
also considered an asset).The balance sheet of
[2]
a firm records the monetary value of the • Stock markets are venues where buyers
assets owned by that firm. It covers money and and sellers meet to exchange equity
other valuables belonging to an individual or to shares of public corporations.
a business. • Stock markets are components of a free-
market economy because they enable
democratized access to investor trading
and exchange of capital.
• Stock markets create efficient price
discovery and efficient dealing.
• The U.S. stock market is regulated by
the Securities and Exchange
Commission (SEC) and local regulatory
bodies.
• In Philippines, we have the PSE (Phil.
Stocks Exchange)

Security is a catch-all term for stocks, bonds,


mutual funds, exchange-traded funds, or other
types of investments you can buy or sell.

The fluctuation of markets is driven by a wide range


of factors. A primary example is the economy. The
flow of money, the access to credit, and the stability
of employment play a major role in the state of
markets locally, nationally, and globally. Market
conditions can therefore refer to an overall state of
affairs or to the condition of a particular industry.

Market Conditions - conditions of


the market including the number of competitors,
competitiveness, and market’s growth during the
situation for a firm that enters the market or
introduces a new product.
THE FINANCIAL PLANNING PROCESS

Pro forma, Latin for “as a matter of form”


or “for the sake of form”, is a method of
calculating financial results using certain
projections or presumptions.
a) Annually

b) semi-annually
l
Media through a common system of symbols,
signs, or behavior resulting in
- are communication outlets or tools interpretations of meaning on both ends.
that are used to store and deliver
information? ……………………………….

Smartphone THINK (WISELY)

- used to deliver information and CREATE (SMARTLY)


messages to our friends and families. SHARE (RESPONSIBLY)

YouTube

- used to store video contents.

Facebook

- used to post and share information.

Radio and TV

- used to disseminate information to a


larger number of groups.
IDENTIFY THE SIMILARITIES AND
DIFFERENCES BETWEEN AND AMONG MEDIA
LITERACY, INFORMATION LITERACY, AND
TECHNOLOGY LITERACY

(WHAT ARE THE CHARACTERISTICS OF A


MEDIA, TECHNOLOGY, & INFORMATION
LITERATE INDIVIDUAL)

INFORMATION

- is defined as knowledge or facts


learned about a certain subject,
situation or event.

CYBER ADDICTION

- Internet addiction is
characterized by excessive or
poorly controlled preoccupations,
urges or behaviors regarding
computer use and internet access
that led to impairment or
distress.
- Internet addiction is defined
as an unhealthy behavior that
interferes with and causes stress
in one's personal, school, and/or
work life. Like other addictions,
compulsive Internet usage
completely dictates a person's
life.
IDENTITY THEFT
COMMUNICATION

- is a process by which information is - Identity theft and identity fraud


exchanged from sender to receiver are terms used to refer to all
types of crime in which someone
wrongfully obtains and uses 3. Online identity theft
another person's personal data in - A sharp increase in social media
some way that involves fraud or use means greater opportunities
deception, typically for economic than ever before to steal
gain. identities or perpetuate fraud
- The three most common types of online.
identity theft are:
- (a)Financial
- (b) Medical and
- (c) Online
1. Financial identity theft

Most people associate identity theft


with this type of crime, which
involves the use of personal
information to take over financial
accounts.

If you notice suspicious activity on


a credit card or bank statement

• Contact all financial institutions


where you hold accounts and place
a 90-day fraud alert on your
credit reports by contacting all
three credit reporting agencies
individually (see resources at end
of article). This prevents
identity thieves from opening new
accounts in your name, as most
lenders need to review your credit
report before approving an
account.

2. Medical identity theft

Did you know that your health


insurance information can be used
by someone else to see a doctor,
get prescription drugs or file
claims to your insurance provider?

How you can protect yourself


against medical identity theft
Be sure to read all medical and
insurance statements carefully,
and if something looks unfamiliar
CYBER BULLYING
to you, call your health insurance
customer service number to cross- - Cyberbullying includes sending,
reference your information with posting, or sharing negative,
theirs. harmful, false, or mean content
If it appears someone used your about someone else. It can include
information, alert your medical sharing personal or private
providers immediately. Be prepared information about someone else
to gather supporting documentation causing embarrassment or
to send to all parties involved. humiliation.
Finally, follow up with both - Cyberbullying or cyberharassment
insurance and medical providers to is a form of bullying or
make sure all errors have been harassment using electronic means.
amended. Cyberbullying and cyberharassment
are also known as online bullying.
It has become increasingly common,
especially among teenagers, as the
digital sphere has expanded and
technology has advanced.
The effects of cyberbullying also
includes:

• Mental health issues

• Increased stress and anxiety

• Depression
Criteria for a Reliable Source
• Acting out violently 1. Accuracy
• Low self-esteem - Refers to the verification of the
information you already know
Cyberbullying can also result in against the information found in
long-lasting emotional effects, even the source.
if the bullying has stopped. 2. Authority
- Refers to the trustworthiness of
the source, which could be an
DIFFERENTIATE MEDIA LITERACY, author or institution.
INFORMATION LITERACY & TECHNOLOGY 3. Coverage
LITERACY - Refers to the examination of the
content of the source, and how it
fits your information needs based
on its relevance to your topic.

MEDIA LITERACY
- Is the ability to access, analyze,
evaluate, and create media variety
of forms. It aims to empower you
by providing the knowledge and
skills necessary to engage with
both traditional and new
technologies

Access
- To access means being able to
recognize the media needed and its
availability for your use.

Analyze or Evaluate
- To analyze and evaluate means
having the ability to think
critically about the accuracy,
credibility, or evidence of bias
in the content presented in
various media.

Create
- To create means being able to use
media tools to produce media
content.
Skillful
- Means being able to use digital
tools.
Knowledgeable

- To be knowledgeable means knowing


the basic principles in computing
devices
Engaged

- To be engaged with technology


means having the ability to act
responsibly in online activities.
Why is it IMPORTANT that you BECOME A
MEDIA, INFORMATION and TECHNOLOGY
LITERATE INDIVIDUAL?

you become more RESPONSIBLE and more


CAREFUL…

2. Limit your screen time

3. Note the quality of your online


interactions

4. Beware of what you post and share


RESPONSIBLE USE OF MEDIA & INFORMATION online

5. Go for more offline interaction

How to Use Information Responsibly

- ALWAYS CHECK THE SOURCE AND AUTHOR


OF THE INFORMATION
- CHECK THE DATE OF PUBLICATION

- ALWAYS FACT CHECK


2 Major Issues in Information Used

1. Spreading of fake (news)


information
2. Plagiarism
- Is the act of using another
author’s language, thoughts,
ideas, or expressions as one
original work.
FAKE INFORMATION EVOLUTION OF MEDIA
- False information is news, stories - Pre-Industrial Age
or hoaxes created to deliberately - Industrial Age
misinform or deceive readers. - Electronic Age
Usually, these stories are created - New/ Information Age
to either influence people’s
views, push a political agenda or
cause confusion and can often be a
profitable business for online
publishers. False information can
deceive people by looking like
trusted websites or using similar
names and web addresses to
reputable news organizations.
- TYPES: MISINFORMATION,
DISINFORMATION

BE RESPONSIBLE:

- DO NOT JUST COPY AND PASTE


- REPHRASE AND COME UP WITH YOUR OWN
WORDS
- GIVE PROPER CREDITS TO THE OWNERS
AND SOURCES

THE EVOLUTION OF TRADITIONAL TO NEW


MEDIA

The Evolution of Media is a useful


supplement for foundational
courses in mass communication and
communication history, as well as
a primer for anyone interested in
understanding the big picture of
communication media.
- Michael A. Noll
- water sports, anything played
with water
Coronaviruses are large family of
viruses causing a range of
illnesses, from the common cold to
more serious infection such as those
caused by middle east respiratory
sundrome- related coronaviruses
(MERS- CoV) and Severe Acute Frontliners- health care worker,
Respiratory Sundrome related police force, military personnel,
coronaviruses (SARS- CoV) local government units (LGU)
Feb 12, 2020- WHO announced novel Few chained by the DOH, Inter-
disease is officially called Agency Task Force on Emerging
Coronavirus Disease 19 ( COVID 19) Infectious Disease (IATF-EID)
composed by the DFA, DILG, DOJ,
Dec 31, 2020- clustering of DOLE, DOT, DOTr, DTI, DA,and DBM
pneumonia causes of unknown
ethiology in Wuhan, China was Quarantine- restriction of the
reported to WHO movement of people, animals and good
which is needed to prevent the
Corona Virus Dusease ( COVID-19) spread of disease or post treats.
- Invisible enemy Recreation- activity done for the
- Do not know where it is coming enjoyment when one is not working.
from, when it will hit , who
its vector is and how it will - Relaxing the mixed and the body
end - Relieves a day-to-day tension.
Jan 21, 2020- confirm cases arrive Recreational Activities- often done
in the Philippines from Wuhan China for enjoyment, environment, or
via Hongkong pleasure and consider to be “FUN”.
Jan 25, 2020- the patient sought to
counsult and was admitted
asymptomatic

- Pateint experiencing
asymptomatic
Signs and symptoms of COVID- 19
Fever, tiredness, dry cough,
difficulty breathing, aches, pains,
nasal congestion, runny nose, sore
throat or diarrhea

You might also like