OBL Module GIT Class Notes 2022 2023 (14march2023)

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 52

MODULE IN

Living in the IT Era

GIT

Computer Science & Computer Applications Department


SCHOOL OF ACCOUNTANCY, MANAGEMENT, COMPUTING
AND INFORMATION STUDIES
Table of Contents
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.

1
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
MODULE 1: Information Technology in Basics.........................................................................3

Unit 01: Information Technology Defined..................................................................................3

Unit 02: Components of a Computer System..............................................................................4

Unit 03: Computer Types and Varieties....................................................................................11

Unit 04: Information Systems....................................................................................................14

Unit 05: Information Technology and Emerging Trends..........................................................19

MODULE 2...............................................................................................................................31

Unit 06: Systems Development Life Cycle...............................................................................31

Unit 07: Computer and Internet Etiquette.................................................................................38

Unit 08: Computer and Cybersecurity......................................................................................41

Unit 09: Cybercrime Law.........................................................................................................45

Unit 10: Control.........................................................................................................................45

Final Requirement: User Interface (Prototyping)......................................................................49

Appendix....................................................................................................................................51

2
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
MODULE 1: Information Technology in Basics
Unit 01: Information Technology Defined
Technology has reshaped our lives at home, at work and in
education. Almost all businesses have an online presence and most
business processes require the use of computers in some way.

Information Technology is the use of any computer, storage, networking and other physical
device to create, process, store, secure and exchange all forms of electronic data. IT focuses on
the information processing from the collection, to the processing, and the sharing of information.
IT deals with the methods and tools used in the information processing.

Information is now a necessity in today’s society, sometimes even provided real-time and
reaches people in different parts of the world. This is an engagement in the 21 st century that is
lucrative in a business setting. IT, beyond communications, offers many personal career paths
and company growth leading to competitive advantage in each respective field. To become more
competent in each respective field, one must know basic computer skills and must build a
foundation using the fundamental technology concepts.

We go beyond learning the basic definition of information technology in the classroom, but also
in an online or digital presence. An individual’s ability to find, evaluate, and compose clear
information through writing and other media on various digital platforms is known as digital
literacy. Computer literacy is also known as digital literacy. An individual must keep up with the
changes in technology and become computer literate.

Now why do we need to study information technology? Simply because we use these
technologies in our everyday lives, and we need to further understand how these hardware and
software are working. Computer skills are needed regardless of setting and field, whether at
home, work, school or play. By understanding computers, you become self-sufficient whether
you use it for research, communications or time management. By mastering fundamentals,
you will develop a strong base to support furtherance of your knowledge in the years to come.

Some computer roles in our lives

1. Tiny embedded computers control alarm clocks, entertainment centers and home
appliances
2. Today’s automobiles cannot run efficiently without embedded computer systems
3. An estimated 10 mil people work from home instead of commuting to work
because of PCs and networking technologies

3
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
4. People use social media for communications nearly 10 times as often as snail mail
and 5 times more than a telephone.
5. Routine daily tasks such as banking, buying groceries are affected by computer
technologies

In a world that being defined by technology and digital trends, the demand for digital literacy has
increased exponentially. We need to expand our knowledge to avoid unfamiliar situations and
modernize our skills to stay relevant in a dynamic work environment. That is why it is important
for us to learn the fundamentals of information technology.

Unit 02: Components of a Computer System


A lot of people believe that computers are extremely complicated devices because of the tasks
they perform. Like any machine, there are components that are complicated from an outsider
perspective, but as soon as you learn about these components, the complexity unravels and
becomes understandable.

As previously discussed, a computer is a machine, a collection of parts that work together. The
collection of parts is categorized in many ways, in this case they are categorized according to
their function. In this unit, we learn the different components (parts) of a computer system. The
most important parts, how the different components work together to achieve success in terms of
using a computer will be shown.

Figure 03-A: The Computer System

A computer system is a collection of parts, a computer combined with hardware and software
used to perform desired tasks. No matter the size and capability of a computer system, it consists
of four (04) parts: hardware, software, data, and the user.

Hardware

4
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Refers to the tangible, physical computer equipment and devices which provide support for the
major functions of the computer system. Mainly the mechanical aspects of the computer. As seen
in Figure 03-A, the hardware controls the input of data into the computer system and the output
of information from the computer system. All these devices are interconnected with each other.
Below are some classifications of hardware based on their functions.

Example: mouse, keyboard, monitor

 Input Devices – Used to enter data or instructions into a computer system. Input devices
fall into two categories: manual input devices (needs to be operated by a human to input
data) and automatic input devices (can input data on their own. Each input device is
concerned with a specific type of data: Scanner – documents or images, Digital Camera –
still and moving images

Figure 03-B: Common Manual Input Devices Figure 03-C: Common


Automatic Input Devices

 Output Devices – Used to convey information from the computer system to one or more
people. When raw data has been processed it becomes usable information. Output devices
are pieces of hardware that send this usable information out of the computer. Output
devices send information out temporarily and some send information out permanently:
temporary output device (monitors) and permanent output devices (printers which output
information onto paper as hard copy).

5
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Figure 03-D: Common Output Devices

Almost all input and output devices are known as ‘Peripheral Devices’. These are non-
essential hardware components that usually connect to the system externally. Peripherals
are called non-essential because the system can operate without them.

Figure 03-E: Common Peripheral Devices


 System Unit – houses the electronic components to process data
o Motherboard – This is the main circuit board of the system unit. The motherboard
is central to any computer system. All components are plugged into the
motherboard either directly (straight into the circuit board) or indirectly (vis USB
ports)

Figure 03-F: Motherboard

6
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
o Processor – The Central Processing Unit (CPU) is the brain of the computer.
Electronic component that interprets and carries out basic instructions. The CPU
'controls' what the computer does and is responsible for performing calculations
and data processing.

Figure 03-G: Example of a processor

o Memory – Electronic component that store instructions waiting to be executed


and data needed by those instructions. There are two types of internal memory.
These two memories are used to store computer data and this can be directly
accessed by the CPU. RAM and ROM are sometimes referred to as ‘primary
storage’.
 ROM (Read Only Memory)
- ROM is used to permanently store instructions that tell the
computer how to boot (start-up). It also loads the operating system
(e.g. Windows).
- These instructions are known as the BIOS (Basic input/output
system) or the boot program.
- Information stored in ROM is known as READ ONLY. This
means that the contents of ROM cannot be altered or added to by
the user.
- ROM is fast memory. Data stored in ROM can be accessed and
read very quickly.
- ROM is Non-Volatile memory. This means that stored information
is not lost when the computer loses power.

Other examples of ROM include:

- DVD/CD ROMS bought in stores containing pre-recorded music


and movie files. These are played back at home but cannot be
altered.
- ROM in printers which is used to store different font types.

7
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Figure 03-H: Example of a Read-only Memory

 RAM (Random Access Memory)


- RAM is used to temporarily store information that is currently
in use by the computer. This can include anything from word
documents to videos.
- RAM can be read from and written to and so the information
stored in RAM can change all the time (it depends what tasks you
are using the computer for).
- RAM is a fast memory. Data can be written to and read from
RAM very quickly. RAM is generally measured in GB
(Gigabytes).
- RAM is Volatile Memory and stores date ‘non-permanently’. This
means that information stored in RAM is deleted as soon as the
computer is turned off.
- The more RAM you have installed in your computer -- the faster
it can perform. You can open and use more programs at the same
time without slowing the computer down.

Figure 03-I: Example of a Random-Access Memory

8
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Table 03-A: Differences between RAM and ROM
RAM ROM
Contents are lost when the computer is turned off. ✓
Contents are not lost when the computer is turned ✓
off.
Stores instructions that tell the computer how to start ✓
up.
Stores data and programs currently in use. ✓
Your computer will perform faster with more of this. ✓
This cannot be written to (altered) ... only read. ✓
Stands for Random Access Memory. ✓
Stands for Read Only Memory. ✓

 Storage Devices – Holds data, instructions and information permanently for future use. It
records (writes) and/or retrieves (reads) items to and from storage media. Secondary
storage devices are used to store data that is not instantly needed by the computer.
Secondary storage devices permanently store data and programs for as long as we
need. These devices are also used to back-up data in case original copies are lost or
damaged. There are two categories of storage devices: internal storage (internal hard disk
drives) and external storage (external hard disk drive, memory sticks, etc.)

Examples:
o Magnetic Storage Device – one of the most popular types of storage used.
- Hard drive – An internal hard drive is the main storage device in a computer.
An external hard drive is also known as removable hard drive. It is used to
store portable data and backups.
o Optical Storage Device – uses lasers and lights as its mode of saving and
retrieving data.
- Blu-ray disc – A digital optical storage device which was intended to replace
the DVD format.
- CD-ROM disc – An optical storage device that is read-only or cannot be
modified nor deleted.
- CD-R and CD-RW disc – CD-R is a recordable disc that can be written to
once, while CD-RW is a rewritable disc that can be written to multiple times.
- DVD-R, DVD+R, DVD-RW and DVD+RW disc – DVD-R and DVD+R are
recordable discs that can be written to once, while DVD-RW and DVD+RW
are rewritable discs that can be written to multiple times. The difference
between the + and – is in the formatting and compatibility.
o Flash Memory Device – is now replacing magnetic storage device as it is
economical, more functional and dependable.
- Memory card – An electronic flash memory device used to store digital
information and commonly used in mobile electronic devices.
- Memory stick – A memory card that is removable.

9
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
-
SSD – Solid State Drive – A flash memory device that uses integrated circuit
assemblies to save data steadily.
- USB flash drive, jump drive or thumb drive – A small, portable storage
device connected through the USB port.
o Online and Cloud – is now becoming widespread as people access data from
different devices.
- Cloud storage – Data is managed remotely and made available over a
network. Basic features are free to use but upgraded version is paid monthly
as a per consumption rate.
- Network media – Audio, Video, Images or Text that are used on a computer
network. A community of people create and use the content shared over the
internet.

 Communication Devices – Enables a computer to send and receive data, instructions, and
information to and from one or more computers. A hardware device capable of
transmitting an analog or digital signal over the telephone, other communication wire, or
wirelessly.

Examples: Bluetooth devices, Infrared devices, Modem (over phone line), Network card
(using Ethernet), Smartphone, Wi-Fi devices (using a Wi-Fi router)

Software

Software is known as the series of related instructions that make the computer perform tasks. In
other words, software tells the computer what to do. The term ‘program’ or ‘application’ refers
to any piece of software. Some software exists to help the computer perform tasks and manage
resources; some software performs tasks that are more specific. The types of software are
systems software and application software.

 Systems Software – Systems software includes the programs that are dedicated to
managing the computer itself, such as the operating system, file management utilities,
and disk operating system (or DOS). Without systems software installed in your
computers, no instructions would be executed for the tasks needed to be done.

Examples: Utility software (antivirus, disk tools), system servers, device drivers,
operating systems, windows/graphical user interface (GUI) systems

 Application Software – Simply referred to as ‘applications’, these are end-user programs


that execute specific tasks like report generation, spreadsheet management, running
games, sending emails, and online research among other functions. They can be as simple
as a calculator or as complex as a video editing software.

10
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Examples: MS Office Word, Adobe Photoshop, Microsoft Edge, Calculator,
Minesweeper, Steam

Data

Consists of individual facts or pieces of information that are used by the computer system to
produce information. Data by themselves may not make much sense to a person. The computer’s
primary job is to process data in various ways, making them useful. Without data, the computer
wouldn’t be able to function properly.

Example: The grades of fifty students in one class, all different pieces of data which doesn’t
make much sense yet, but when a chart is created from the data, and frequencies are developed.
This now makes sense at a glance.

Users

The operator of a computer is known as ‘peopleware’, other books call them liveware, or human
ware. The user commands the computer system to execute on instructions. Some computer
systems are complete without a person’s involvement, but not all computers are totally
autonomous. Basically, anyone who communicates with a computer system or uses the
information it generates.

Example: Programmer, Developer, Teacher using Excel, Student using Word

Knowing the parts of a computer system allows us, users, to understand better each function of
the computer system and our make the experience of using the computer system more efficient.

Unit 03: Computer Types and Varieties


Before we learn the types of computers still being used today, let us define what a computer is. A
computer is defined by Peter Norton as “An electronic device that processes data according to a
predetermined set of instructions that convert data info information useful to people. They
perform specific tasks based on the instructions provided by a software or hardware program”.

Also, according to Gary Shelly, a computer is defined as “An electronic device operating under
the control of instructions stored in its memory that can accept data, process the data, produce
and store results for future use”. Computers can also store data for future use with the
appropriate storage devices.

11
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
A computer is a programmable device that can automatically perform a sequence of
calculations or other operations on data once programmed for the task. It can store, retrieve, and
process data according to internal instructions. Computers can be categorized in many ways: by
size and capacity, by data handling and operating system capabilities, based on the number of
microprocessors, and based on the number of users. In this module, we’re going to classify
computers according to the size and capacity.

Before cloud computing and the use of digital systems,


large companies use (01) supercomputers because they
required a big amount of computing power. A
supercomputer has an incredibly high level of
performance. These are usually used on a large-scale
operation like industrial function, space exploration,
weather forecasting, and nuclear testing.

A supercomputer is a computer at the leading edge of data processing capability, with respect to
calculation speed. Supercomputers are used for scientific and engineering problems (high-
performance computing) which crunch numbers and data, while mainframes focus on transaction
processing.

(02) Mainframe computer are like big centralized


machines that contains the large memory, huge storage
space, multiple high-grade processors, so it has ultra-
processing power compare to standard computer systems.
The use of the primary memory and having multiple
processors are done by mainframe computers. These are used in moderate data processing,
banking, and insurance. It handles bulk data processing, statistics, and analysis them.

The term originally referred to the large cabinets called “main frames” that housed the central
processing unit and main memory of early computers. Later, the term was used to distinguish
high-end commercial machines from less powerful units. Most large-scale computer system
architectures were established in the 1960s, but continue to evolve. Mainframe computers are
often used as servers.

12
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
(03) Minicomputers were introduced in the mid-1960s. It
has the most of the features and capabilities of a large
computer but more compact in size. This is also called a
mid-range computer. Minicomputers were primarily used
for process control and performing financial and
administrative tasks, such as word processing and
accounting. Some machines were designed for medical
laboratory and teaching aids.

(04) A microcomputer has a central processing unit (CPU)


as a microprocessor. These are also known as personal
computers (PC). Microcomputers are primarily used for
word processing, managing databases or spreadsheets,
graphics and general office applications.

A microcomputer is a small and relatively inexpensive computer that has a microprocessor as its
central processing unit. It includes memory, a microprocessor, and minimal input/output circuitry
built on a single printed circuit board. Micro-computers are classified into workstations – Also
known as desktop machines, workstations are mostly used for intensive graphical applications,
personal computers – more affordable and easier to use than workstations and are self-
sufficient computers intended for one user, laptop computers and Mini PCs – Mini PCs are tiny
computers that can fit in the palm of your hand.

(05) An embedded computer, which is an integral


component of most embedded systems, is a combination of
hardware and software that is designated to perform a
highly specific function. For example, the type of
embedded computer in a washing machine will not be the
same as the embedded computer in a Nikon camera.
Because the software in embedded computers is designed
to only execute certain tasks, the computer’s software in one device can be totally distinct from
that of another.

13
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The hardware of an embedded computer is also specially designed to withstand stresses in its
intended environment. For instance, an embedded computer installed under the hood of a car is
designed to withstand high temperatures. Embedded computers are everywhere. They are in
phones, microwaves, airplanes, automobiles, and calculators.

Some computers handle small and big data and simultaneous number of users, some computers
are more powerful because of the data they are processing, which are most often used by
organizations, such as businesses or schools.

Unit 04: Information Systems

Going over the technologies in the past and how it has evolved to the technologies we
have in the present gave us an idea of what is possible in the future. It is with the creativity and
ingenuity of us, human beings, that we are able to make sense of technological developments
and turn them into productivity boosting tools.
But technologies are not developed to match exactly what every person needs. After all,
each person has something different to do and to work on. It is thus important for these
technologies to be transformed into something that is geared towards making every person
productive despite the difference in their needs. Technologies are being specialized. So how
exactly does these technologies work?

Companies use information as a weapon in the battle to increase productivity, deliver


quality products and services, maintain customer loyalty, and make sound decisions.
Information technology can mean the difference between success and failure. Information
technology (IT) is the application of a combination of hardware and software used to retrieve,
store, transmit and manipulate data, often in the context of a business or other enterprise.
Data are facts that are recorded and stored. Information is processed data used in

14
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
decision making. The value of information is the benefit produced by the information minus the
cost of producing it.

A System is a set of two or more interrelated components interacting to achieve a goal.

Information Systems

● Set of interrelated components


● Collect, process, store, and distribute information
● Support decision making, coordination, and control
● May also help analyze problems, visualize complex subjects and create new products

Information System Components

● Hardware – tangible aspect of a computer system


● Software – programs and other operating information used by a computer (systems,
application, enterprise, horizontal system, vertical systems, legacy systems)

15
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
● Data - is the raw material that an information system transforms into useful information
● Processes - describes the tasks and business functions that users, managers, and IT
staff members perform to achieve specific results. Processes are the building blocks of
an information system because they represent actual day-to-day business operations.
● People - those who have an interest in an information system are called stakeholders.
Stakeholders include the management group responsible for the system, the users
(sometimes called end users) inside and outside the company who will interact with the
system, and IT staff members, such as systems analysts, programmers, and network
administrators who develop and support the system.

Who develops Information Systems?


● Traditionally, a company either developed its own information systems, called in-house
applications, or purchased systems called software packages from outside vendors.
● Today, the choice is much more complex. Options include Internet-based application
services, outsourcing, custom solutions from IT consultants, and enterprise-wide
software strategies.

Systems Analysis and Design


Systems Analysis and Design is a step-by-step process for developing high-quality
information systems.

Systems Analyst plans, develops, and maintains information systems.

Business and Information Systems

With the different technological advancements, businesses have adopted newer


processes and have upgraded their business models
● Brick-and-mortar - refers to a traditional street-side business that offers products and
services to its customers face-to-face in an office or store that the business owns or
rents.
● Click-and-mortar - Click and mortar is a type of business model that has both online
and offline operations, which typically include a website and a physical store.
● Click - Click-only companies are those companies who have a website/online presence
without a physical store. They sell their products through their website only.

The Internet has drastically reduced the intermediaries within a transaction. Internet-
based commerce is called e-commerce (electronic commerce) or I-commerce (Internet
commerce). The E-commerce includes two main sectors: B2C (business-to-consumer) and
B2B (business-to-business).

B2C (Business-to-Consumer)
● Using the Internet, consumers can go online to purchase an enormous variety of
products and services. This new shopping environment allows customers to do
research, compare prices and features, check availability, arrange delivery, and choose
payment methods in a single convenient session.

16
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
B2B (Business-to-Business)
● Business-to-business (B2B), also called B-to-B, is a form of transaction between
businesses, such as one involving a manufacturer and wholesaler, or a wholesaler and a
retailer.

Business and Information Systems

In the past, IT managers divided systems into categories based on the user group the
system served. Categories and users included office systems (administrative staff), operational
systems (operational personnel), decision support systems (middle-managers and knowledge
workers), and executive information systems (top managers). Today, traditional labels no longer
apply. For example, all employees, including top managers, use office productivity systems.
Similarly, operational users often require decision support systems. As business changes,
information use also changes in most companies. Today, it makes more sense to identify a
system by its functions and features, rather than by its users.

17
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Examples of Information Systems according to support provided
● Inventory Control (TPS)
● Reservations (TPS, MIS)
● Customer Order Processing / Point-of-Sale (TPS)
● Warranty Claim Processing (TPS)
● Records Management (MIS)
● Enrollment System (TPS)
● Attendance Monitoring (MIS)
● Payroll (TPS)
● Queuing (TPS)

WHAT INFORMATION DO USERS NEED?

Corporate organizational structure has changed considerably in recent years. As part of


downsizing and business process reengineering, many companies reduced the number of
management levels and delegated responsibility to operational personnel. Although modern
organization charts tend to be flatter, an organizational hierarchy still exists in most companies.
A typical organizational model identifies business functions and organizational levels, as shown
in the figure below. Within the functional areas, operational personnel report to supervisors and
team leaders. The next level includes middle managers and knowledge workers, who, in turn,
report to top managers. In a corporate structure, the top managers report to a board of directors
elected by the company’s shareholders.

Top managers
● Strategic plans

Middle Managers and Knowledge Workers

18
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
● Middle managers provide direction, necessary resources, and performance feedback to
supervisors and team leaders
● Knowledge workers include professional staff members such as systems analysts,
programmers, accountants, researchers, etc.

Supervisors and Team Leaders


● Oversee operational employees and carry out day-to-day functions

Operational Employees
● Operational employees include users who rely on TP systems to enter and receive data
they need to perform their jobs.

Unit 05: Information Technology and Emerging Trends


Objectives: By the end of this lesson, the student will be able to
1. discuss and describe the different industrial revolutions,
2. describe what is the difference between innovation and invention,
3. compute for productivity as an effect of information technology on workers or on the
organization as a whole.

We are living in extraordinary times where extraordinary technologies are within reach from
anywhere, by anyone. We almost always take these technologies for granted because they
have become part of the everyday life of people.
To start with this module, see the presentation for IT Trends: Lesson04GITTechTrends

The rise of information and communication technologies (ICT) – that is, computers,
software, telecommunications and the internet – and the large impact that these new

19
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
technologies are having on the way that society functions, have prompted many to claim that we
have entered a new era.
Industrial Revolutions
A period of development in the latter half of the 18th century, where there is change from
one economy to another.

Generally, the term refers to eras when rapid and significant technological changes
fundamentally alter the way that production is carried out in society, affecting not only how
people work but also how they live their lives.
Industrial revolution involves technological, socioeconomic, and cultural aspects. It
occurs when technological change fundamentally transforms the way in which a society carries
out the production and distribution of goods.
The changes could be inventions, innovations, product innovations, or process
innovations. The term ‘invention’ refers to the discovery of new products or processes, while
‘innovation’ refers to the commercialization (bringing to the market) of new products or
processes.
Invention is the discovery of new products and processes.

20
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Machines Telephones Automobiles Television

Innovation is the commercialization and improvement of the existing products.

Assembly Lines CD’s Flat Screen TV’s Smartphones

Product innovations result in the production of a new product, such as the change from a
three-wheel car to a four-wheel car, or the change from LP (Long Play/Playing) records to CDs
(Compact Discs). Process innovations increase the efficiency of the methods of production of
existing products, for example the invention of the assembly-line technique.
Here are the different Industrial Revolutions with their products / services,
transportation, production system, and communication.

First Industrial Revolution - 1765


Started in England during the late 18th century, concentrated in Britain and initially
focused on textile manufacturing.
● Significant evolutions: Cort’s puddling; rolling process for making iron, Crompton’s mule
for spinning cotton, Watt steam engine
● Products / Services – Vegetables, Coal, Iron, Discovery of chemicals
● Transportation – Railroads, Basic farming
● Production System – Manual Labor to mechanical
● Communication - Printed materials

21
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Second Industrial Revolution - 1870
● Significant evolution: Development of electricity, Internal-combustion engine, Railway,
Chemical industry
● Products / Services – electricity, chemicals, petroleum, steel
● Transportation – automobiles, aircrafts
● Production System – machine-aided equipment
● Communication – telephone, telegraph

Third Industrial Revolution - 1969


● Started with the development of transistors and the rise of electronics and digital
technology.
● Products / Services – Internet, rise of electronics, source of energy: nuclear power
● Production System - Automation

22
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Fourth Industrial Revolution
See Lesson04Video1IndustrialRevolutions.mp4
Klaus Schwab described the fourth industrial revolution as marked by an era of technological
revolution that is blurring the lines between the physical, digital and biological spheres.
Watch Lesson04Video2FourthIndustrialRevolution.mp4

IT and PRODUCTIVITY
Economists interested in the pervasive effects of technological change in different
industrial revolutions have devised the concept of a General Purpose Technology (GPT). It is a

23
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
technology of wide application used in various industries and whose impact is strong on their
functioning.
Main Characteristics of a GPT
As you read the list, consider how a new technology such as electricity or information
technology fulfils each criterion.
● It must have a wide scope for improvement and elaboration - this means that the
technology does not appear as a complete and final solution, but as a technology that
can be improved through the different opportunities for technological change that
surround it.
● It must be applicable across a broad range of uses - this means that its use is not
restricted, for example, to only one industry but open to many different types of
industries and consumers.
● It must have a potential use in a wide variety of products and processes - this means
that the new technology should not result in the creation of only one set of products
(such as a computer), but a wide set of products (such as complex new air-traffic control
systems or new inventory controls).
● It must have strong complementarities with existing or potential new technologies - this
means that the technology does not only replace existing methods but also works with
them, ensuring an even broader impact on the systems of production and distribution.
Productivity
Productivity is the quality of producing something. It is a measure of the efficiency of a person,
machine, factory, system, etc., in converting inputs into useful outputs. It is an indication of the
efficiency of production or distribution.

The Effect of Technology on Productivity


Labor productivity can be measured as output produced per hour of labor. For example,
consider an automobile factory that is able to produce 10 cars per day using 100 hours of
labour. If a new invention permits those same workers to produce 20 cars in the same amount
of time, their productivity has been doubled.
Gross Domestic Product (GDP) - Total monetary or market value of all the finished goods and
services produced within a country's borders in a specific time period. Total output divided by
total labour hours in the year gives us a measure of labour productivity. A 5 per cent growth in
UK productivity over a year means that the UK economy has become 5 percent more productive
than it was in the previous year. This should mean that the economy can produce 5 per cent
more output (GDP) with the same amount of inputs.
Example Computation for Productivity
Question1: If a group of workers produces 10,000 units of output in one year, and 12,000 units
the next year. Calculate the percentage increase in productivity.
Answer:

24
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
You want to know the percentage increase represented by the second year's output, 12,000,
over the first year's output, 10,000. Subtracting 10,000 from 12,000 gives us the increase.
Divide the answer by 10,000 to calculate the increase relative to the first year. Then multiply
by 100 to turn the answer into a percentage.
2,000
12,000−10,000=2,000 ; ∗100=20 %
10,000
So, output increased by 20 percent. As the number of workers stayed the same, this is also
the increase in productivity.

Question2: Calculate the percentage increase in productivity if the output expands from 12,000
in year 2 to 15,000 in year 3.
Answer:

Division of Labor and Productivity


The division of labor refers to the degree to which the various tasks involved in the
production of a good or service are divided among different workers.
Productivity increases when the division of labor increases. Increases in productivity can
be transmitted throughout the economy for several reasons:
● Productivity – Income
Increases in productivity can lead to higher incomes for an economy's citizens. All output
must be transformed, through the process of production and sale, into someone's income (e.g.
the boss's profits and the workers’ wages). Hence, increases in productivity, which allow more
output to be produced by a given amount of inputs, also lead to more income per head, that is,
greater wealth for society. For example, if more cars can be produced due to increases in the
productivity of car production, more cars are sold, which means that the car manufacturers’
revenues increase.
● Productivity – Cost of Production
If increases in wages are linked to increases in productivity, then workers’ wages may
also rise (or, at least, their employment prospects may be more secure). Second, increases in
productivity diffused throughout the economy have an effect on prices. Increases in productivity
tend to lower the cost of production, precisely because more output can be produced with the
same amount of inputs. Since cost reductions tend to be translated into price reductions,
increases in productivity eventually tend to reduce prices. Indeed, the introduction of assembly
lines made a substantial contribution to the affordability of consumer durables such as the car.
The increase in income per head and the reduction in prices allow consumers to be better off.

Prices and Industrial Change


How can we look at price changes over time in industries in which the product
undergoes many changes, especially in early stages? We use the concept of the price index.
Indices are used a lot in economics. They are basically a simple way of measuring change.
Price index is a measure of the average level of prices for some specified set of goods
and services, relative to the prices of a specified base period. The most widely used method of
constructing an index is based on the notion of the percentage. An example is provided below.
Suppose that the price of a product is Php 500 in 2000 and Php 750 in 2001 and Php
1000 in 2002. In this simple example, our market basket consists of only one product. Selecting
25
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
year 2000 as the base year, we can express the prices in years 2001 and 2002 relative to the
price in year 2000 as follows:
The price in year 2000 (base year) is equal to 100 percent
Price index , year 2001= ( PP 750
500 )∗100=150 , year 2002=(
P500 )
P1000
∗100=200

Changes in Industry Structure

Industry structure refers mainly to the way in which power is distributed among firms.
This can be described by factors such as the number of firms in the industry and the distribution
of market shares.

Sustainability of Productivity

Objectives: By the end of this lesson, the student will be able to


1. discuss the impact of game changing technologies on work and employment,
2. summarize the concept of platform economy.

All economies fluctuate in a business cycle. For a few years, growth is quite rapid, output
and incomes rise, and unemployment falls. This is the ‘boom’. Then the cycle turns. Growth
slows, and in a true recession the total output of the economy falls. This is the down-turn of the
cycle. The industry life cycle focuses on those economic mechanisms that cause firms to be
born (to ‘enter’ an industry), to grow, and to die (to ‘exit’ an industry).

Industry Life Cycle


The industry structure refers to the characteristics of an industry, such as the number of
firms operating in it, the distribution of power between them (whether some are very large and
others very small, or whether they are all very large), and the degree to which new firms find it
easy to enter the industry).
Mechanisms affecting industry structure include the dynamics of entry/exit, technological
change and falling prices. The industry life cycle is characterized by the following phases:

(examples are set in the year 2018 for reference)


1. A pre-market or hobbyist phase, in which the product is produced more as a hobby or
luxury than for commercial purposes. (e.g. self-driving electric cars)
2. An introductory phase, in which the product begins to be produced more for commercial
purposes than for hobby reasons. (e.g. self-driving cars)
3. A growth phase, in which the industry grows rapidly due to the emergence of a
standardized product. (e.g. electric cars - Tesla Model S)
4. A mature phase, in which demand slackens and fewer technological opportunities are
available. (e.g. ford focus car)

Game Changing Technologies

See Work-in-the-Digital-Age-1.pdf pages 133-140


● Advanced Industrial Robotics - Involves machines which are designed to perform
industrial tasks automatically, with high programmability and the capacity to interact with
their environment thanks to the use of digital sensors, usually seen in manufacturing or
production lines.

26
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
● Additive Manufacturing - Involving digitally controlled devices to add layer on layer of
material(s) to create objects from 3D digital models. This is usually done in the industrial
sector such as architectural, medical, dental, aerospace, automotive, furniture and
jewelry.

● Industrial Internet of Things - the use of connected sensors attached to different objects
throughout the production process to feed live data to central computers, usually seen
on the factory floor.

● Electric Vehicles - vehicles whose main system of propulsion depends on (externally


generated) electricity rather than fuel. (e.g. Tesla)

27
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
● Industrial Biotech - the use of biological processes of living organisms for industrial
purposes, drawing on recent scientific insights such as systems genomics and
metabolomics. Uses enzymes and microorganisms to make bio-based products in
sectors such as chemicals, food ingredients, detergents, paper, textiles and biofuels.

Advanced Industrial Robotics, Additive Manufacturing and Industrial Internet of Things


involve innovations in the manufacturing production process, and have a very wide applicability
across most manufacturing sectors.

Electric Vehicles and Industrial Biotech concern innovations of specific products (and
related processes), and have a more narrow applicability to particular sectors

Effects of Game Changing Technologies

1. Increasing centrality of (digital) information – information as a key source value


2. Mass Customization – flexible production process with interconnecting objects
3. Servitization – technologies involve the gradual replacement of manufacturing as
traditionally understood by a type of economic activity that is closer to the traditional
concept of services
4. Increased Labor/Resource Efficiency – more efficient use of materials and energy in
production

Effects of Game Changing Technologies on Work and Employment

1. Upgrading of occupations
2. Higher level of ICT competence
3. Decline of repetitive and routine industrial work brought about by digital factories

28
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
While there are innumerable positives that can be drawn from these Game
Changing Technologies, it is imperative that we also take a look at the adverse
effects that these technologies cause.

Like many other things, there are always two sides of the story. On one end,
productivity numbers received a massive boost thanks to new technologies. On
the other end, there is a question of whether the same numbers are not telling
the whole story.

While new technologies, even new applications being downloaded, have made
an impact, some of them have caused other people to rely too much on
technology and not develop their own skills anymore. Technology, in some ways,
has become workers of our time instead of serving as a tool to help us.

Quite possibly, the worst effect of it is the accessibility of such technologies. With
only a fraction of the people in the world having the chance to know how to take
advantage of these new technologies, what happens to those who are not as
fortunate?

It matters that we look into all the effects of technology. It is only through looking
at the other side that we can actually discover how to improve what we currently
have and develop new technologies that would benefit everyone.

The Platform Economy

See Work-in-the-Digital-Age-1.pdf pages 163-174

A platform is a business that connects people through technology, making an ecosystem


that allows value to be created and exchanged. This works by matching users to each other in
order to make financial or social transactions that create value.
Platforms don’t own the resources that create value, they can grow much faster than
pipeline businesses. These businesses make up a platform-based economy. Some key features
of a platform will include:

● Using sophisticated logistics software for matching and payment


● Providers on the platforms are independent contractors
● Very low barriers to entry for providers on most platforms
● Trust is achieved via crowdsourcing of ratings and reputational data.

29
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Platform Model

The platform model shows three (03) components:

● platform - controller of the channel or platform and arbiter of the participants in the
platform
● consumers/customers - buyers or users of the outputs offered through the platform
● producers/providers - supplier of the outputs sold through the platform

References

● NEUFEIND, M., RANFT, F., AND O’REILLY, J. (2018) Work in the Digital Age:
Challenges of the Fourth Industrial Revolution. Rowman & Littlefield International Ltd
● The Open University (2016). Information Technology: a new era. Walton Hall, Milton
Keynes, MK7 6AA. https://www.open.edu/openlearn/people-politics-law/politics-policy-
people/ sociology/information-technology-new-era/content-section-1

GRADED Activity 1
Part 1: Unit 1(10 pts)
1. What do technologies look like when they are still being discovered?
30
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. How did the life of people change back then?
3. Are we going through a similar change right now?
4. What’s in store for the future?
5. Have we actually progressed as a result of the technologies that we have discovered
throughout time? Explain in 2-3 sentences.
Part 2: Unit 1(10 pts)
1. Which technology of the past do you think had the most impact in the way of life of
people today? Discuss in 3-5 sentences.
2. Did new technologies help in making humans more productive or have these caused a
decrease in the efficiency of work of people? Explain your answer in 3-5 sentences.
Part 3: Unit 2(15 pts)
What do you think is the way forward with the Game Changing Technologies that we
currently have? What are its flaws, and how can these be improved further? Explain your
answer in 8-10 sentences.
Part 4 (25 pts)

Take the Quiz on Lesson 02 Assessment

MODULE 2

Unit 06: Systems Development Life Cycle


The aim of an SDLC methodology is to give IT Project Managers the tools they need to assure
the effective deployment of systems that meet the University's strategic and business goals.

ROLE IN THE PROJECT PROPOSAL


System Analyst
❏ A systems analyst investigates, analyzes, designs, develops, installs, evaluates, and
maintains a company’s information systems.
❏ On large projects, the analyst works as a member of an IT department team
❏ Smaller companies often use consultants to perform the work

SYSTEM DEVELOPMENT
System development is the process of defining, designing, testing and implementing a
software application.
A system development project includes a number of different phases, such as feasibility
analysis, requirements analysis, software design, software coding, testing and debugging,
installation and maintenance.

System Development Methods


Systems Development Life Cycle
❏ Predictive Approach
❏ Use of Process Models
❏ Process-centered technique

31
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
System Development Life Cycle(SDLC)

Systems Planning – It is the initial stage in the systems development life cycle (SDLC). It is the
fundamental process of understanding why an information system should be built and determine
how the project team will go about building it. It describes how IT projects get started, how
systems analysts evaluate proposed projects, the feasibility of a project, and the reasoning
behind the proposed system development.

Systems Analysis – System analysts must do analysis activities when creating a new system
or improving an old system. If an information system is built properly, it will give the expected
benefits to the company. To achieve this goal, system analysts define what the information
system requires by performing the analysis activities.

Systems Analysis Activities

32
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The systems analysis phase consists of requirements modeling, and process modeling, object
modeling, and consideration of development strategies.

Watch the Lesson 07 Requirements.mp4 video.


Requirements Modeling

⮚ Describes requirements modeling, which involves fact-finding to describe the current


system and identification of the requirements for the new system. These requirements
are:
o Inputs refer to necessary data that enters the system, either manually or in an
automated manner.
o Processes refer to system characteristics such as speed, volume, capacity,
availability, and reliability.
o Outputs refer to electronic or printed information produced by the system.
o Performance refers to the logical rules that are applied to transform the data into
meaningful information.
o Security refers to hardware, software, and procedural controls that safeguard
and protect the system and its data from internal or external threats.
Watch the IPO video: Lesson 07 Video 02 IPO.mp4

Flowchart
 business flowchart shows the steps that make up a business process, along with
who's responsible for each step.
 They are useful for analyzing current processes, planning improvements, and
crystallizing communication between process participants

33
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Types of Flowchart:

● Document

• Illustrates the flow of documents and information between areas of


responsibility within an organization.
• A document flowchart is particularly useful in analyzing the
adequacy of control procedures.

● System

• System flowcharts depict the relationship among the input,


processing, and output of an AIS

● Program

• A program flowchart describes the specific logic to perform a


process shown on a systems flowchart
Check the following videos for further discussion on the Flowcharting process.
● Lesson 08 FlowCharting.mp4
● Flowchart Tutorial (with Symbols, Guide and Examples)

34
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Systems Design – Systems Design is the third of five phases in the systems
development life cycle (SDLC). Now you are ready to begin the physical design of the system
that will meet the specifications described in the system requirements document. Systems
design tasks include output and user interface design, data design, and system architecture.
A video by Johnny Khoury has explained how the Design Phase in SDLC (Lesson07
video01 Design Phase in SDLC) works. It is all about the design phase of creating a system.

System Design Guidelines:

The systems analyst must understand the logical design of the system before beginning
the physical design of any one component
• Data design
• User interface
• Architecture
• System design specification
System Design Objectives

• The goal of systems design is to build a system that is effective, reliable, and maintainable
• A system is reliable if it adequately handles errors
• A system is maintainable if it is well designed, flexible, and developed with future modifications
in mind
•User Considerations
❏ Carefully consider any point where users receive output from, or provide input to,
the system
❏ Anticipate future needs of the users, the system, and the organization – hard-
coded
❏ Provide flexibility
❏ Parameter, default
• Data Considerations
❏ Data should be entered into the system where and when it occurs because
delays cause data errors
❏ Data should be verified when it is entered, to catch errors immediately
❏ Automated methods of data entry should be used whenever possible
•Data Considerations
❏ Audit trail
❏ Every instance of entry and change to data should be logged
❏ Data should be entered into a system only once
❏ Data duplication should be avoided
•Design Trade-Offs
❏ Most design trade-off decisions that you will face come down to the basic conflict
of quality versus cost
❏ Avoid decisions that achieve short-term savings but might mean higher costs
later

Prototyping
The method by which a prototype is developed. It involves a repetitive sequence of
analysis, design, modeling, and testing. It is a common technique that can be used to design
anything from a new home to a computer network.

35
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Prototyping Methods

 System prototyping - produces a full-featured, working model of the information system.


Because the model is “on track” for implementation, it is especially important to obtain user
feedback, and to be sure that the prototype meets all requirements of users and
management.
 Design prototyping or Throwaway prototyping – method of development that employs
technical mechanisms for reducing risk in a project, when the project needs are vaguely and
poorly laid out. The end product of design prototyping is a user-approved model that
documents and benchmarks the features of the finished system.
 Prototyping offers many benefits
Users and systems developers can avoid misunderstandings
Managers can evaluate a working model more effectively than a paper specification
 Consider potential problems
The rapid pace of development can create quality problems
In very complex systems, the prototype becomes unwieldy and difficult to manage
Prototyping Tools – systems analysts can use powerful tools to develop prototypes
• CASE tools - Computer-aided systems engineering (CASE), also called computer-
aided software engineering, is a technique that uses powerful software, called CASE
tool, to help systems analysts develop and maintain information systems.
• Application generators -A tool that supports the rapid development of computer
programs by translating a logical model directly into code. Also called a code generator.
• Report generators - a computer program whose purpose is to take data from a source
such as a database, XML stream or a spreadsheet, and use it to produce a document in
a format which satisfies a particular human readership
• Screen generators - or form painter, is an interactive tool that helps you design a
custom interface, create screens forms, and handle data entry format and procedures.
Limitations of Prototypes
❏ A prototype is a functioning system, but it is less efficient than a fully developed system
❏ Systems developers can upgrade the prototype into the final information system by
adding the necessary capability. Otherwise, the prototype is discarded
Future Trends in Software Development
Many software development tools and technologies are in transition
• Web services
• Open source software
• Service-oriented architecture (SOA)
• Loose coupling
• Software quality is more important than ever

Here are some links on how to create prototypes:


Create interactive prototypes with MS PowerPoint
Pencil Project | Free UI Mockup Design Software
Prototyping Tool for Mobile and Websites
Build a WIX Website For FREE in 10 Minutes

User Interface

36
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Describes how users interact with a computer system, and consists of all the hardware,
software, screens, menus, functions, output, and features that affect two-way communications
between the user and the computer.
Graphical User Interface - uses visual objects and techniques that allow users to communicate
effectively with the system.
Usability – user satisfaction, support for business functions, and system effectiveness

❏ Process-control systems – allow users to send commands to the system


❏ User-centered systems – how users communicate with the information system, and how
the system supports the firm’s business operations
User interface requires the understanding of human-computer interactions and user-centered
design principles.
Human-Computer Interaction describes the relationship between computers and people who
use them to perform their jobs
•Electronic health records (EHRs)
Seven Habits of Successful Interface Designers:
1.Understand the Business
The interface designer must understand the underlying business functions and how the
system supports individual, departmental, and enterprise goals. The overall objective is to
design an interface that helps users to perform their jobs.
2.Maximize Graphical Effectiveness
Studies show that people learn better visually. The immense popularity of Apple’s iOS
and Microsoft Windows is largely the result of their GUIs that are easy to learn and use. A well-
designed interface can help users learn a new system rapidly and be more productive.
3.Think Like a User
The designer must learn to think like a user and see the system through a user’s eyes.
The interface should use terms and metaphors that are familiar to users. Users are likely to
have real-world experience with many other machines and devices that provide feedback, such
as automobiles, ATMs, and microwave ovens. Based on that experience, users will expect
useful, understandable feedback from a computer system.
4.Use Models and Prototypes
From a user’s viewpoint, the interface is the most critical part of the system design
because it is where he or she interacts with the system — perhaps for many hours each day. It
is essential to construct models and prototypes for user approval. An interface designer should
obtain as much feedback as possible, as early as possible.
5.Focus on Usability
The user interface should include all tasks, commands, and communications between
users and the information system. The opening screen should show the main option. Each
screen option leads to another screen, with more options.
6.Invite Feedback
Even after the system is operational, it is important to monitor system usage and solicit
user suggestions. The analyst can determine if system features are being used as intended by
observing and surveying users.
7.Document Everything

37
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
All screen designs should be documented for later use by programmers.
Systems Implementation – This phase begins once the client has tested and approved the
system. The system is installed at this phase to support the specified business functions. The
performance of the system is compared to the performance targets defined during the planning
phase.
Systems Maintenance – System maintenance is a continuous operation that includes
eliminating program and design flaws, updating documentation and test data, and updating user
support.

Unit 07: Computer and Internet Etiquette


As people continue to use technology in their everyday lives, from communications to making
transactions online, many have forgotten their proper etiquette when using their computer
systems and when interacting using the Internet. Internet etiquette, also known as
“Netiquette,” is essential in a civilized work environment or personal relationship. Even though
you aren't with others in person, you should remember that they're still there, on the other end
of your communication. With the age of technology, threats to a computer system is now more
rampant, there is cyberbullying, hacking, harassment, and other fraud techniques. There is no
official list of netiquette rules or guidelines, the idea is to respect other users and those online.

General Guidelines for Computer Etiquette

1. When communicating with people online, remember how you want to be treated, that’s
probably how others want to be treated too, with respect.
2. Always be aware that you are talking to a person, not a device. Be courteous.
3. Adhere to the same standards of behavior online that you follow in real life.
4. Know where you stand. Netiquette varies from domain to domain. What is acceptable in
a chat room may not be appropriate in a professional forum so “lurk before you leap”.
5. Respect other people’s time and bandwidth.
6. Spelling and grammar count! Always check, recheck your posts and keep your language
appropriate.
7. Keep under control the posts or content that invoke rage, sadness, humiliation, self-
doubt, and others.
8. Respect other people’s privacy. Ask consent for everything! From posts sharing, to
citations, to using of materials and more.
9. Help out those people who are new to the technology.
10. Read, and research before asking. Try not to waste other people’s time.
11. Some emotions and meanings do not transmit very well in an email or a post. However,
do not use all caps if you want to communicate strong emotion. All caps will make you
look like you’re shouting. Don’t overuse smileys and emoticons because they make you
look unprofessional. Constructing your sentences carefully and editing what you write
before hitting send is often enough.
12. Remember that your posts and account can be easily traced back to you even if you
write under an alias or a made-up handle. You leave data footprints whenever you’re
online. These are stored and can be retrieved. Even when using incognito. Always be a
decent and responsible netizen.

38
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Ten Commandments of Computer Ethics

1. Thou shalt not use a computer to harm other people – If it is unethical to harm people
by making a bomb, for example, it is equally bad to write a program that handles the
timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other
people’s books and notebooks, it is equally bad to access and destroy their files.
2. Thou shalt not interfere with other people’s computer work – Computer viruses are
small programs that disrupt other people’s computer work by destroying their files,
taking huge amounts of computer time or memory, or by simply displaying annoying
messages. Generating and consciously spreading computer viruses is unethical.
3. Thou shalt not snoop around in other people’s computer files – Reading other people’s
e-mail messages is as bad as opening and reading their letters: This is invading their
privacy. Obtaining other people’s non-public files should be judged the same way as
breaking into their rooms and stealing their documents.
4. Thou shalt not use a computer to steal – Using a computer to break into the accounts of
a company or a bank and transferring money should be judged the same way as
robbery. It is illegal and there are strict laws against it.
5. Thou shalt not use a computer to bear false witness – The Internet can spread untruth
as fast as it can spread truth. Putting out false "information" to the world is bad. For
instance, spreading false rumors about a person or false propaganda about historical
events is wrong.
6. Thou shalt not copy or use proprietary software for which you have not paid – Software
is an intellectual product. In that way, it is like a book: Obtaining illegal copies of
copyrighted software is as bad as photocopying a copyrighted book. There are laws
against both. Information about the copyright owner can be embedded by a process
called watermarking into pictures in the digital format.
7. Thou shalt not use other people’s computer resources without authorization or proper
compensation – Multiuser systems use user id’s and passwords to enforce their memory
and time allocations, and to safeguard information. You should not try to bypass this
authorization system. Hacking a system to break and bypass the authorization is
unethical.
8. Thou shalt not appropriate other people’s intellectual output – For example, the
programs you write for the projects assigned in this course are your own intellectual
output. Copying somebody else’s program without proper authorization is software
piracy and is unethical. Intellectual property is a form of ownership, and may be
protected by copyright laws.
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing – You have to think about computer issues in a more general
social framework: Can the program you write be used in a way that is harmful to
society? For example, if you are working for an animation house, and are producing
animated films for children, you are responsible for their contents. Do the animations
include scenes that can be harmful to children? In the United States, the
Communications Decency Act was an attempt by lawmakers to ban certain types of
content from Internet websites to protect young children from harmful material. That
law was struck down because it violated the free speech principles in that country's
constitution. The discussion, of course, is going on.

39
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
10. Thou shalt always use a computer in ways that ensure consideration and respect for
your fellow humans – Just like public buses or banks, people using computer
communications systems may find themselves in situations where there is some form of
queuing and you have to wait for your turn and generally be nice to other people in the
environment. The fact that you cannot see the people you are interacting with does not
mean that you can be rude to them.

References
 https://explorable.com/hawthorne-effect
 https://methods.sagepub.com/book/key-concepts-in-social-research/n22.xml
 https://online.visual-paradigm.com/diagrams/tutorials/use-case-diagram-tutorial/
 https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3
 https://www.investopedia.com/terms/c/click_and_mortar.asp
 https://www.mbaskool.com/business-concepts/marketing-and-strategy-terms/2587-click-
only-companies.html
 https://www.sciencedirect.com/topics/computer-science/sequence-diagram
 https://www.slideshare.net/fajarbaskoro/systems-request
 https://www.tutorialspoint.com/software_engineering/case_tools_overview.htm
 https://www.visual-paradigm.com/support/documents/vpuserguide/
2821/286/7114_drawingbusin.html
 https://www.youtube.com/watch?
v=DMPxxijmG7M&fbclid=IwAR0hx6Uo4PSlgqmMmAOeX4e_R6mq0s4nMw-
iwcXUOiixRkvkHeWxK8UTQj8
 https://www.youtube.com/watch?
v=rAR5sbaphwU&fbclid=IwAR3EXVa8Rag6iV8zFswXcFhRFOB_FaiEa7QD6QMukGoy
aiQ6cRLH30xiCtY
 McCombes, S. (2020, January 13). How to Do a Case Study: Examples and Methods.
Retrieved June 7, 2020, from https://www.scribbr.com/methodology/case-study/
 NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from https://newleaf-
llc.com/2012/08/roi-or-payback-period/
 Requirements Modeling. Part 1 https://www.youtube.com/watch?v=2t0ichoFHG8 Part
2 https://www.youtube.com/watch?v=1u5KQh_B1_U
 ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition. Shelly Cashman
Series. Cengage Learning
 Top five causes of scope creep ... and what to do about them. A Guide to the Project
Management Body of Knowledge (PMBOK® Guide)—Fourth edition
https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675
 Feronika, N. (2018, January 15). Systems Analysis Activities. School of Information
Systems. https://sis.binus.ac.id/2018/01/15/systems-analysis-activities/
 System Development Lifecycle (SDLC) | Michigan Tech Information Technology. (n.d.).
Michigan Technological University. https://www.mtu.edu/it/security/policies-procedures-
guidelines/information-security-program/system-development-lifecycle/
 Thakur, D. (2013, January 30). What is system maintenance? What are its different
types. Computer Notes. https://ecomputernotes.com/mis/implementation-and-
evaluation/what-is-system-maintenance-what-are-its-different-types

40
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Unit 08: Computer and Cybersecurity
The vulnerabilities of a computer system should not be left alone for perpetrators. We should
prevent perpetrators from gaining access to our computer systems. To ensure that information
presented by your computer system is reliable and not prone to computer fraud and malware.

Computers and the internet have transformed the lives of many people in many good ways.
Unfortunately, this vast network and its associated technologies also have a number of security
threats. It is our duty to protect ourselves from these threats and attacks. Scammers, hackers
and identity thieves are looking to steal your personal information - and your money.

Computer security, the protection of computer systems and information from harm, theft, and
unauthorized use. Computer hardware is typically protected by the same means used to
protect other valuable or sensitive equipment, namely, serial numbers, doors and locks, and
alarms. The protection of information and system access, on the other hand, is achieved
through other tactics, some of them quite complex. Computer security deals with the
protection of computer systems and information from harm, theft, and unauthorized use.

Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks. It's also known as information technology
security or electronic information security. The term applies in a variety of contexts, from
business to mobile computing, and can be divided into a few common categories.

 Network security is the practice of securing a computer network from intruders,


whether targeted attackers or opportunistic malware.
 Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.
 Information security protects the integrity and privacy of data, both in storage and in
transit.
 Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the procedures
that determine how and where data may be stored or shared all fall under this
umbrella.
 Disaster recovery and business continuity define how an organization responds to a
cyber-security incident or any other event that causes the loss of operations or data.
Disaster recovery policies dictate how the organization restores its operations and
information to return to the same operating capacity as before the event. Business
continuity is the plan the organization falls back on while trying to operate without
certain resources.

41
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
 End-user education addresses the most unpredictable cyber-security factor: people.
Anyone can accidentally introduce a virus to an otherwise secure system by failing to
follow good security practices. Teaching users to delete suspicious email attachments,
not plug in unidentified USB drives, and various other important lessons is vital for the
security of any organization.

Security is a constant worry when it comes to information technology. Data theft, hacking,
malware and a host of other threats are enough to keep any IT professional up at night. We’ll
look at the basic principles and best practices that allow users to keep their systems safe.
Individuals and companies must employ the best security measures suitable to their needs to
prevent fraudulent activities.

Figure 02-C: CIA Triad

The goal of information security follows three main principles:

1. Confidentiality is ensuring that information is available only to the intended audience –


An organization obtains or creates a piece of sensitive data that will be used in the
course of its business operations. Because the data is sensitive, that data should only be
able to be seen by the people in the organization that need to see it in order to do their
jobs. It should be protected from access by unauthorized individuals.
2. Integrity is protecting information from being modified by unauthorized parties –
Integrity involves maintaining the accuracy, consistency and trustworthiness of data.
Data must not be changed whilst at rest or in transit by unauthorized individuals (which
would demonstrate a breach of confidentiality). Integrity of data is commonly ensured
by implementing security measures such as file permissions and access control models.
Version controls can also be utilized to avoid changes to data made accidentally by
authorized individuals.
3. Availability is protecting information from being modified by unauthorized parties –
When the individual that needs that piece of data to perform a job duty is ready to
utilize it, it must be readily accessible (i.e. online) in a timely and reliable manner so the
42
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
job task can be completed on time and the company can continue its processing.
Availability means that authorized individuals are able to access their data whenever
they want.

Effectively executing all three principles of the Security Triad creates an ideal outcome from an
information security perspective.

Good Security Practices for Individuals

1. Install anti-virus and anti-malware software


Software may include bugs as discussed in the previous modules. To limit the vulnerabilities,
make sure that the instructions for install of a software is followed, the acquisition of the
software is legitimate. Anti-virus and anti-malware should also be installed and kept up to
date.
2. Use a strong password
Reusing passwords or having the same password for multiple accounts, websites, and other
systems will become more vulnerable. Do not save passwords on websites and devices that
are unsecure. Remember to change your passwords on a schedule to keep them fresh.
3. Log off public computers
Yes, the business centers and cybercafes that offer the use of a computer system is
convenient, but not secure. Since anyone can use them for anything, they have probably
been exposed to viruses, worms, trojans, keyloggers, and other nasty malware. Should you
use them at all? When using a public area computer, be sure to completely log off when you
are finished using it.
4. Save and Back up
Some events may be inevitable like hardware failure and virus infection, so be sure to save
every now and then. Also back up important information that is important to you. Make sure
to verify if the files you’ve saved can be easily restored.
5. Limit social network information
Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks have
become an integral part of our online lives. Social networks are a great way to stay
connected with others, but you should be wary about how much personal information you
post. Learn how to use the privacy and security settings to protect yourself, keep personal
information personal, know and manage your friends, know what to do if you encounter a
problem.
6. Download files legally
Avoid peer-to-peer (P2P) networks and remove any file-sharing clients already installed on
your system. Since most P2P applications have worldwide sharing turned on by default
during installation, you run the risk of downloading viruses or other malware to your
computer, and having your personal and/or confidential information inadvertently shared
across the Internet, which could lead to identity theft.
7. Keep personal information safe
Do not divulge personal information online if you’re not sure about the sender or the
website. A common fraud, called "phishing", sends messages that appear to be from a bank,

43
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
shop or auction, giving a link to a fake website and asking you to follow that link and confirm
your account details.
8. Lock your computer
Whenever you leave our devices unattended, make sure that your device/s are locked.
9. Do not click on suspicious links or pop-up notifications
Avoid visiting unknown websites or downloading software from untrusted sources. These
sites often host malware that will automatically install (often silently) and compromise your
computer. If attachments or links in the email are unexpected or suspicious for any reason,
don't click on it, just visit the actual sender website.
10. Keep applications up to date
Turn on automatic updating or make sure that all applications are also up to date.

Definition of terms

Firewall: A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set of security
rules.

Hackers: A hacker is a person who breaks into a computer system. The reasons for hacking can
be many: installing malware, stealing or destroying data, disrupting service, and more. Hacking
can also be done for ethical reasons, such as trying to find software vulnerabilities so they can
be fixed.

Threats: A threat is anything that can compromise the confidentiality, integrity, or availability of
an information system.

Vulnerability: A vulnerability is any weakness in the information technology (IT) infrastructure


that hackers can exploit to gain unauthorized access to data.

Some of the most common threats to cybersecurity include:

Malware: This refers to malicious software such as viruses, worms, and Trojan horses
that can infect computers and devices, steal sensitive information, or damage systems.

Phishing: This is the practice of sending fake emails or messages that appear to come
from a trustworthy source, such as a bank or a popular website, in order to trick people
into revealing sensitive information.

Ransomware: This is a type of malware that encrypts a victim's files and demands a
ransom payment in exchange for the decryption key.

Distributed Denial of Service (DDoS) attacks: These attacks overload a website or online
service with traffic, making it inaccessible to users.

Insider threats: Refers to current or former employees, business partners, contractors,


or anyone who has had access to any systems or networks in the past. can be
considered an insider threat if they abuse their access permissions.

44
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Man-in-the-middle attacks: Man-in-the-middle is an eavesdropping attack, where a
hacker/intruder intercepts and relays messages between two parties in order to steal
data.

Advanced persistent threats (APTs): In an APT, an intruder or group of intruders sneak


into a system and remain undetected for an extended period. The intruder leaves
networks and systems intact to avoid detection so that the intruder can spy on business
activity and steal sensitive data.

Information security, also known as InfoSec, refers to the processes and tools designed
and deployed to protect sensitive business information from modification, disruption,
destruction, and inspection.

Unit 09: Cybercrime Law


Study the presentation named GIT Lecture 9 - Cybercrime Laws in the Philippines.pptx
Cybercrime Prevention Act of 2012. The State recognizes the vital role of information and
communications industries such as content production, telecommunications, broadcasting
electronic commerce, and data processing, in the nation’s overall social and economic
development. The State also recognizes the importance of providing an environment conducive
to the development, acceleration, and rational application and exploitation of information and
communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or
delivery of information; and the need to protect and safeguard the integrity of computer,
computer and communications systems, networks, and databases, and the confidentiality,
integrity, and availability of information and data stored therein, from all forms of misuse,
abuse, and illegal access by making punishable under the law such conduct or conducts. In this
light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by
facilitating their detection, investigation, and prosecution at both the domestic and
international levels, and by providing arrangements for fast and reliable international
cooperation.

Unit 10: Control


Controls are a set of procedures and technological measures to ensure secure and efficient
operation of information within an organization, both general and application controls for
safeguarding information. These control activities are applied throughout an organization. The
most important general controls are the measures that control access to computer systems and
the information stored or transmitted over telecommunication networks. General controls
include administrative measures that restrict employee access to only those processes directly
relevant to their duties, thereby limiting the damage an employee can do.

IT security is about protecting things that are of value to an organization. Security controls exist
to reduce or mitigate the risk to those assets. They include any type of policy, procedure,

45
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
technique, method, solution, plan, action, or device designed to help accomplish that goal.
Recognizable examples include firewalls, surveillance systems, and antivirus software.

There are two (02) ways to classify controls in an organization: (01) by type – physical,
technical, or administrative – and (02) by function – preventive, detective, and corrective –.

Control Types

 Physical Controls – Describes anything tangible that’s used to prevent or detect


unauthorized access to physical areas, systems, or assets. This includes gates, access
cards, CCTVs, and motion sensors.
 Technical Controls – (also known as logical controls) Includes hardware or software
mechanisms used to protect assets. Common examples are authentication solutions,
firewalls, and antivirus software.
 Administrative Controls – Refers to policies, procedures, or guidelines that define
personnel or business practices in accordance with the organization's security goals.
These can apply to the hiring and termination of employees, equipment and Internet
usage, separation of duties, and auditing.

Control Functions

 Preventive Controls – These is any security measure that is designed to prevent or stop
any malicious activity from happening. These can be fences, alarms, and antivirus
software.
 Detective Controls – These is any security measure taken or implemented to detect and
alert to unwanted or unauthorized activity in progress or after it has occurred. It can be
alerting guards or notifications from a motion sensor.
 Corrective Controls – Any measures taken to repair damage or restore resources and
capabilities following an unauthorized or unwanted activity. This may include rebooting
the system, or terminating a process, or quarantining a virus.

46
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Table 02-A: Examples of Control Functions and Types

GRADED Activity 2
Part 1: Unit 3(10 pts)
1. What use does the internet have for you? Explain in 3-5 sentences.
2. If you have a phone, a laptop, or any similar kinds of technology, which 2 apps or
softwares do you use often to be more productive? Explain in no more than 3 sentences
each how you think these apps or softwares work and what makes them useful for you.
Part 2: Unit 3 (15 pts)
1. Information is commonly referred to as processed data, data being the raw material. The
key factor here is that data needs to undergo certain processes before it becomes
information. With this in mind, give 5 examples of data being transformed into
information. Present your work in a creative and concise output that organizes the data,
the process it will undergo, and the resulting information.
2. Think of any business around you (your bank, convenience store, etc.) and identify ways
on how you think they can be more productive. Explain in 3-5 sentences.

47
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Part 3: Unit 3 (5 pts)
1. Computers perform many jobs that previously were performed by people. Will computer-
based transactions and expanded e-commerce eventually replace person to-person
contact? From a customer’s point of view, is this better? Why or why not?
2. What types of information systems might a large company use?
Part 4: Unit 4 (10 pts)

Solve the following problem applying the method used in the video uploaded in your powerpoint
presentation. You may check: Lesson 07 Video 01 Payback period

Problem. Assume the following cash flow for 2 projects. Assuming that the cash flows are
occurring at the end of the year. Find the payback period for both these projects.

Year Project 1 Project 2

0 -1000 -1000
1 600 100
2 400 400
3 200 600
4 200 600
5 100 700
Solution:

Part 5: Unit 5 (15 pts)

48
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Content marketing can be a very hectic mess unless you organize it into clear business
processes. Consider the following process:
The content writer takes up & finishes the first draft of an article. Includes
descriptions of any custom images that are to be used in the article
The marketer gathers influencer contact information, to be used for advertising
and marketing once the article is done
The editor proof-reads the article, makes points on grammar, style, spelling, etc.
The designer creates custom images as asked, sending them over to the content
writer
The writer takes the comments into consideration, fixes any mistakes, and adds
the images to the article
The SEO expert makes sure that the article meets the right optimization best-
practices & publishes the article
The marketer uses a combination of advertising & email outreach to make sure
that the article is read.
Activity: Construct the business process diagram and apply the flowcharting process
discussed.
Note: This example is taken from: https://tallyfy.com/business-process/

Do the above activity using Word or write it in a short bond paper

Part 6: Unit 8 (10 pts)


Open and answer the Lesson-10-Assessment

GRADED Activity: Midterm Examination

References
 https://explorable.com/hawthorne-effect
 https://methods.sagepub.com/book/key-concepts-in-social-research/n22.xml
 https://online.visual-paradigm.com/diagrams/tutorials/use-case-diagram-tutorial/
 https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3
 https://www.investopedia.com/terms/c/click_and_mortar.asp
 https://www.mbaskool.com/business-concepts/marketing-and-strategy-terms/2587-click-
only-companies.html
 https://www.sciencedirect.com/topics/computer-science/sequence-diagram
 https://www.slideshare.net/fajarbaskoro/systems-request
 https://www.tutorialspoint.com/software_engineering/case_tools_overview.htm
 https://www.visual-paradigm.com/support/documents/vpuserguide/
2821/286/7114_drawingbusin.html
 https://www.youtube.com/watch?
v=DMPxxijmG7M&fbclid=IwAR0hx6Uo4PSlgqmMmAOeX4e_R6mq0s4nMw-
iwcXUOiixRkvkHeWxK8UTQj8
 https://www.youtube.com/watch?
v=rAR5sbaphwU&fbclid=IwAR3EXVa8Rag6iV8zFswXcFhRFOB_FaiEa7QD6QMukGoy
aiQ6cRLH30xiCtY
49
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
 McCombes, S. (2020, January 13). How to Do a Case Study: Examples and Methods.
Retrieved June 7, 2020, from https://www.scribbr.com/methodology/case-study/
 NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from https://newleaf-
llc.com/2012/08/roi-or-payback-period/
 Requirements Modeling. Part 1 https://www.youtube.com/watch?v=2t0ichoFHG8 Part
2 https://www.youtube.com/watch?v=1u5KQh_B1_U
 ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition. Shelly Cashman
Series. Cengage Learning
 Top five causes of scope creep ... and what to do about them. A Guide to the Project
Management Body of Knowledge (PMBOK® Guide)—Fourth edition
https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675

Final Requirement: User Interface (Prototyping)

With the internet being the center for acquiring information nowadays, and more and more
systems being developed to suit the needs of different businesses, all of which make use of the
internet as a medium for marketing and operations, there is a question of how the security of
everyone is maintained. Having a singular tool used as a platform by different business and
individuals alike has definitely made it easier for everyone to communicate and do transactions.
But it has also made it easier for others to exploit the vulnerability of persons who are not
knowledgeable about the risks of using the internet.
To start with this module, take some time to reflect on the following questions:
1. Have you ever felt that your security is compromised while using the internet?
2. Do you think you have done something that might have been illegal?
3. Have you ever searched anything in Google and used it as part of one of your outputs?
4. Have you created anything that was used by someone else without your consent

50
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Explore Activity

1. Search for an example of an apparent cybercrime. From this example, give your thoughts on
how you think that could have been prevented.

2. Downloading files through the internet is rampant, whether legal or not. An example of which
is downloading of movies, TV series, or animes via a torrent client. Currently, this is an illegal
act, but authorities have little resources to stop this completely. Do you think this kind of
activity must be stopped, or do you think this is something that must be accepted as legal?

51
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
References:
• Course notes - Atty Marco Polo E. Cunanan. Public Attorney II, PAO San Fernando (P)
District. Lecturer, Tarlac State University School of Law
• Federis & Associates Intellectual Property Firm. (2013). What is Copyright? Retrieved
from FEDERIS Intellectual Property Law:
http://www.federislaw.com.ph/faqs-resources/copyright/
• Lawphil.net and Chanrobles.com

• Republic Act No. 10173. (2012). Retrieved from Official Gazette:


https://www.officialgazette.gov.ph/2012/08/15/republic-act-no-10173/
• Republic Act No. 10175. (2012). Retrieved from Official Gazette:
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/

Appendix
Unit 01 Question2: Calculate the percentage increase in productivity if the output
expands from 12,000 in year 2 to 15,000 in year 3.
Answer:

Take the output in year 3 which is 15,000 and subtract it with the output in year 2 which is
12,000 to get the increase from year 2 to year 3.

15,000-12,000 = 3,000

Then divide it from the output from year 2 which is 12,000 then multiply it by 100 to get the
increase by percentage

3,000/12,000 (100) = 25%

The increase in productivity of output from year 2 to year 3 is 25%

52
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.

You might also like