Acc-123 Sas 2324 150-Pages Merged

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 150

PHINMA Education

College of Management & Accountancy

COURSE SYLLABUS
I. Course Code ACC 123
II. Descriptive Title Information Technology Application Tools in Business
III. Credit Unit 3
IV. Time Allocation 54 hours
V. Pre-requisite BAM 199- Operations Management & TQM

VI. Course Description:


The goal of this course is to present an overview of IT Fundamentals and Tools used in
business environments. This includes computer terminology, hardware, software, operating systems
and information and application systems. This course will also explore business applications of
software, including spreadsheets, databases, presentation graphics, word processing and business-
oriented utilization of the internet.

VII. Course Outcomes:


At the end of the course, the student will be able to:
1. Define concepts and principles in Information and Communication Technology
2. Develop a sense of IT culture and an appreciate the convergence of telecommunications, the
Internet and wireless technology for use in personal and business purposes
3. Develop an awareness of how computers work and how they are used in the society, I.T.
infrastructure, global e-business and I.T. collaboration
4. Acquire skills in using common IT tools and computer software to accomplish tasks and achieve
corporate objectives
5. Utilize different computer and mobile applications
6. Understand the ethical and social issues in Information and Communication Technology

Duration
Unit Topic Title Day/Session Remarks
(hour/s)
Orientation Flexible Learning 1 Day 1 In
Introduction to Information Technology: Digital
1 Out
World
1.1 The Digital World
2 Day 2
1.2 Computer: Modern Day companion Out

1.3 Advantages and Disadvantage of Computers

2 All-purpose Machine: Computers


2 Day 3 Out
2.1 Types of Computers

3 The Computer System


Discuss components of Computer System: Hardware
3.1 2.2 Day 4 Out
and software
3.2 Identify Input and Output device
3.3 Functions of Operating System

4 End User Tool: Microsoft Word

4.1 Creating Documents 2 Day 5 In

4.2 Editing Documents


Formatting Documents with the help of Templates &
4.3 2 Day 6 In
Wizards
5 End-User Tool: Microsoft Excel
Output Options: Printing, Faxing or Emailing
5.1
Documents 2 Day 7 Out
How spreadsheets Work
5.2 Worksheet Templates
Multidimensional Spreadsheet
5.3 Analytical Graphics: Creating Charts
2.2 Day 8 Out
5.4 Formulas, Functions, Recalculation, What-If Analysis

1st Periodical Exam 2 Day 9 In

6 End User Tool: Microsoft PowerPoint


2 Day 10 Out
6.1 Creating a PowerPoint Presentation

6.2 Editing Presentation


2 Day 11 Out
6.3 Crafting a professional presentation

7 Digital Security
2 Day 12 In
Security Safeguards: Protecting computer and
7.1
communication
7.2 Explain Privacy Surveillance: Data Collector and Spies 2 Day 13 In

8 Digital Laws and Ethics in Business


Computer and Internet Crimes and the Cybercrime
8.1 2.2 Day 14 Out
Law
8.2 The Ten Commandments of Computer Ethics

8.3 Applicable Philippine Laws that Penalize Cybercrime


2.2 Day 15 Out
8.4 Intellectual Property Law

8.5 Social Networking 2 Day 16 In

2nd Periodical Examination 2 Day 17 In

9 Malware 2.2 Day 18 Out


9.1 Cyber Attack

9.2 Cyber Intruders: Trolls, Spies, Hackers and Thieves 2.2 Day 19 Out

10 Database Software
2.4 Day 20 In
10.1 The benefits of Database Software

10.2 The Basics: How Databases Work 2.4 Day 21 In

10.3 Database Software


2.5 Day 22 Out
10.4 Querying & Displaying Records

10.5 Sorting & Analyzing Records & Applying Formulas


2.5 Day 23 Out
Putting Search Results to Use: Saving, Formatting,
10.6
Printing, Copying, Or Transmitting
11 Introduction to Enterprise Resource Planning System

11.1 Understanding ERP 2 Day 24


In

11.2 Leading ERP Products : SAP , Oracle , Microsoft


2 Day 25

3rd Periodical Examination 2 Day 26 In


Course Performance Activities, Reflective Essay
Requirements
Grading The Final Grade is computed as follows: Quizzes 25%
System 1st Period Grade 33% Portfolio 30%
2nd Period Grade 33 Class Participation 10%
3rd Period Grade 34 Period examination 35%
FINAL GRADE 100% Total 100%

Grading Scale:
5.00 - 0 to 49.9; 3.00 - 50 to 55.5; 2.75 – 55.6 to 61.1; 2.50 – 61.2 to 66.7; 2.25 – 66.8 to 72.3;
2.00 – 72.4 to 77.9; 1.75 - 78.0 to 83.5; 1.50 – 83.6 to 89.1; 1.25 - 89.2 to 94.7; 1.00 – 94.8 to 100
Course Policy and 1. Students are required to attend all class sessions as listed on the school calendar.
Standards Students will be dropped if he/she exceeds allowable number of absences. Allowable absences
20% of IN sessions.
2. Students are expected to attend class sessions on time.
3. Students must take all schedule and unscheduled examinations. No special examinations
will be given except for Periodical Examinations.
4. Assignments, plates, and project designs must be submitted on or before the deadline/due
date
5. Cheating will not be tolerated and will result to Failure grade.
6. Students are expected to consistently demonstrate professional behavior.
7. Students are required to follow the proper grooming standard and will be marked absent
for non-compliance.

Textbooks/ 1. Using Information Technology by Williams and Sawyer, McGrawHill Education (proposal
References
only)
2. www.alison.com
3. Information Technology Auditing and Assurance by James Hall

Effectivity Date Prepared by: Consultation Schedule:


Revised
May 2021 Feb 2021

DAVE NICOLE A. UGHOC, CPA


davenicoleughoc@gmail.com
09056276975
Checked by: Approved by:

KEVIN ROY P. CORPUZ, CPA EMERITA J. MODESTO, CPA, CIA, MBA


Program Head, Accountancy Department Dean, College of Management & Accountancy
ACC 123: IT Application Tools in Business
Student Activity Sheet #1

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Orientation Flexible Learning Materials:


Lesson Objectives: FLM Student Activity Sheets
1. Be familiar with the Flexible Learning Set-up.
2. Learn the house rules. References:
https://learningcenter.unc.edu/tips-
and-tools/studying-101-study-
smarter-not-harder/

“The secret of getting ahead is getting started.” –Mark Twain

A. LESSON PREVIEW/REVIEW
1) Introduction
Hey there? How’s your day going? Let me welcome you to your ACC 123 class! A lot is in store
for you this semester. So, let’s make learning fun and easy.

Please read the learning targets before you proceed to the succeeding activities. The learning
targets are your goals. Remember, you need to achieve your learning targets at the end of the
lesson.

2) Activity 1: What I Know Chart


What do you know about Flexible Learning? Try answering the questions below by writing your
ideas under the What I Know column. You may use keywords or phrases that you think are related
to the questions.

What I Know Questions: What I Learned (Activity 4)

What is Flexible Learning?

B. MAIN LESSON
1) Activity 2: Content Notes
Below are the notes about Flexible Learning. You may underline or highlight words or phrases
that you think are the focus of the lesson.

When you enrolled this semester, what are your expectations? Will it be online or modular?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #1

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Our learning framework remains to be Active Learning. In response to the needs of this new
normal, we will be adopting a Flexible Learning Approach. It is a combination of face-to-face
classes and home-based learning.

What schedule will be followed in a flexible learning setup?

For school year 2021, we will follow the 4-10 schedule, which means:
Students will attend face-to-face classes for 4 days in a week;
Study at home for the next ten (10) days

What learning materials are needed in a flexible learning setup?

The primary instructional material for the flexible learning set-up is the Flexible Learning
Module.
The learning experiences in the modules are designed for full self-study in the event that students
will need or will be required to stay at home.

If the modules are designed for complete self-study, what would be the teacher’s role now?

Teacher’s Role in the 4-10 Schedule

In class, face-to-face, (4 days)


Mentor
Collect Flexible Learning Module Student Activity Sheets
Give summative assessments (quizzes, examinations)
Facilitate supplementary group activities
Provide supplementary content via videos, etc.

At home, self-study, (10 days)


Check and grade collected output.
Monitor work through phone calls and chats, provide guidance, answer
questions, and check understanding.

2) Activity 3: Activities
1. Read the course outline for ACC 123, Information Technology Application Tools in
Business.
2. Fill out the student directory.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #1

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

3. Take note of house rules.

3) Activity 4: What I Know Chart


Now let’s check your final understanding of Flexible Learning. I hope that everything about the
topic is clear to you. This time you must fill out the What I Learned column.

4) Activity 5: How to Control your Schedule?


Since we will follow the 4-10 schedule, controlling your schedule and your distractions, especially
when you are at home, will help you to accomplish your goals. If you are in control of your
calendar, you will be able to complete your tasks. The following are steps to getting control of
your calendar:

1. On the same day each week (perhaps Sunday nights or Saturday mornings), plan out your
schedule for the week.
2. Go through each class and write down what you’d like to get completed for each class that
week.
3. Look at your calendar and determine how many hours you have to complete your work.
4. Determine whether your list can be completed in the amount of time that you have available.
(You may want to put the amount of time expected to complete each assignment.) Adjust as
needed. For example, if you find that it will take more hours to complete your work than
available, you will likely need to triage your readings. Completing all of the lessons is a
luxury. You will need to make decisions about your studies based on what is covered in
class. You should read and take notes on all the assignments from the favored class source
(the one used a lot in the study). This may be the textbook or reading that directly addresses
the topic for the day. You can likely skim supplemental readings.
5. Pencil into your calendar when you plan to get assignments completed.
6. Before going to bed each night, make your plan for the next day. Waking up with a plan will
make you more productive.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning
A. Work Tracker
You are done with this session! Let’s track your progress. Shade the session number you just
completed.

B. Think about your Learning


1. Please read the learning targets for the day again. Were you able to achieve those learning
targets? If yes, what helped you achieve them? If no, what is the reason for not achieving them?

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #1

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2. What question(s) do you have as we end this lesson?


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #2

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Introduction to Information Technology: Digital Materials:


World FLM Student Activity Sheets
Lesson Objectives:
1.To know the Digital World References:
2. To describe at least four areas of society in which computers are en.wikibooks.org
used
3. To give examples of the advantage and disadvantage of using
computers

"The secret of change is to focus all of your energy, not on fighting the old, but on building
the new." –Socrates

A. LESSON PREVIEW/REVIEW
1) Introduction
Have you ever heard of the "Always On" generation or the "Millennials on steroids"? If not, then
maybe you are not aware that you are part of this generation. So, let's start and explore this
generation where you belong!

Please read the learning targets before you proceed to the succeeding activities.

Activity 1: What I Know Chart (5 min)


What do you know about the Digital World or the World of Computers? Try answering the
questions below by writing your ideas under the What I Know column. You may use keywords or
phrases that you think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What is a Digital World?

B. MAIN LESSON
Activity 2: Content Notes (15 min)

The Digital World


Today's world runs on computers. Nearly every aspect of modern life involves computers in some
form or fashion. As technology is advancing, the scale of computer use is increasing. Computer

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #2

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

users include both corporate companies and individuals. Computers are efficient and reliable;
they ease people's jobs through software and applications specific to their needs offering
convenience. Moreover, computers allow users to generate correct information quickly and hold
the information, so it is available. Computers and technology affect how we live, work and
entertain ourselves.

What Is a Computer?
A computer is a device that accepts information (in the form of digitalized data) and manipulates
it for some result based on a program or sequence of instructions on how the data is to be
processed. A programmer is a person who inputs the data into the computer to get the desired
final result.

Computer Modern Day companion.


Computers are used in every field of life. They are used in homes, businesses, educational
institutions, research organizations, and government offices. They are used for a variety of
purposes. They are used as typewriters, calculators, accounting systems, record keepers, data
processors, and telecommunication systems. Following are some examples of uses of
computers:

❖ Education
Computers are used in online classes and online examinations. They are also used in teaching
and research. The students can solve so many problems through a computer. They are also
used to collect, store, and evaluate data from experiments. Nowadays, computers are also being
used in distance learning programs and computer-based training.

❖ Medical Field
Computers are used in a hospital management system, patient history, medical tests, monitoring,
and diagnosis purpose.

❖ Homes
Our homes also contain many devices that use computer systems. For example, a computer
system is used in the microwave to control its processes. The TV uses a computer to tune to the
broadcasting stations.

❖ Business
Businesses use computers for keeping payroll records, printing paychecks, billing customers,
preparing tax returns. Computers are also used to maintain employees' information and
inventories. Nowadays, many businesses use websites to sell their products and contact their
customers. With today's increasing competition life and global market environment, it is almost
impossible for a firm or organization to stay and remain in the market without the widespread use
of computer technology.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #2

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

❖ Industry
Computers are used to perform several industrial tasks. They are used to design products, control
manufacturing processes, control inventory, manage projects, etc. These machines are also
used to control and manage different manufacturing systems and continuous running of the
industry.

❖ Government
Computers are extensively used for word processing, data processing in government offices.
They are also used to a network government office for data communication and give us a
paperless environment.

❖ Entertainment
Computers are playing an essential role in the entertainment of human beings. People can watch
TV programs, shows, movies on the internet. People can play games online, listen to music, and
much more entertainment is available on the internet

ADVANTAGES DISADVANTAGES
USING
COMPUTER

Violation of Privacy
Speed Risk of Public Safety
Reliability Labor Force replaced by
Consistency computers
Store huge amounts of data Health risks
Connectivity Depleting natural resources
and polluting the environment

Activity 3: Skill Building (10 min)


Direction: List TWO advantages and TWO disadvantages of using a computer considering
your personal experience

ADVANTAGES
1.

2.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #2

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

DISADVANTAGES
1.

2.

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (10 min)

Direction: Listed below are examples of computers' uses; determine which of the following
fields is concerning the model. Write the letter that corresponds to the area.

A. Education D. Business
B. Medical Field E. Government
C. Homes F. Entertainment

1. Law enforcement activities


2. Special effects in movies, videos, and commercials
3. Internet banking
4. Improved quality of academic research
5. Listening to music, downloading, sharing and, creating music
6. Advertisements displayed on different websites
7. Assistance to medical surgeons during critical surgery operations
8. Searching for criminals using fingerprint matching
9. Conducting online academic examinations
10. Microprocessors in household utilities

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #2

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:
Activity 5:
1.E - Law enforcement is a government activity
2.F - Movies are considered entertainment activity
3.D - Banking is a business activity
4.A - Academic research is an educational activity.
5.F - Music is a form of entertainment; hence it is considered an entertainment activity.
6.D - Advertisement is, by its nature, a business activity.
8.E - Criminal prosecution using advanced technology is an activity done by the government.
9.A - Academic examinations, by their very nature, are educational activities.
10.C – Household utilities are related to the home activity.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #3

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: All-purpose Machine: Computers Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To explain the "All-Purpose Machine": The Varieties of Computers
2. To learn the types of computers References:
Using Information Technology by
Williams and Sawyer, McGraw-Hill
Education

"There are no boundaries or borders in the digital age." - Karim Rashid

A. LESSON PREVIEW/REVIEW
1) Introduction
When the alarm clock blasts you awake, you get out of bed and head for the kitchen, where you
check the electric kettle to heat some water. After using your electronic toothbrush and showering
and dressing, you stick bread in the oven toaster and then pick up the TV remote and click on
the TV to catch the weather forecast. Later, after putting dishes in the dishwasher, you go out
and wait for a jeepney or a bus and head towards campus. Pausing on the road at a traffic light,
you turn on your phone to listen to some music.

You haven't yet touched a computer, but you've already dealt with at least eight computers—as
you probably guessed from the italicized words. So, what are the various types of computers?
Let's take a look!

Activity 1: What I Know Chart (10 min)


What do you know about the Types of Computers? Try answering the questions below by writing
your ideas under the What I Know column. You may use keywords or phrases that you think are
related to the questions.

What I Know Questions: What I Learned (Activity 4)

What are the various types of


computers?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #3

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (40 min)

The "All-Purpose Machine"


As you have already read from the Lesson Preview, all those familiar appliances mentioned rely on tiny
"computers on chips" called microprocessors. Maybe, then, the name "computer" is inadequate. As
computer pioneer John von Neumann has said, the device should not be called the computer but rather
the "all-purpose machine." It is not, after all, just a machine for doing calculations. The most striking
thing about it is that it can be put to any number of uses.

What are the five sizes of computers?


Computers come in various shapes and sizes, classified according to their processing power:
supercomputers, mainframe computers, workstations, microcomputers, and microcontrollers.

Supercomputers
These are the most expensive and fastest computers available.
"Supers," as they are called, have been used for tasks requiring
the processing of enormous volumes of data, such as doing the
U.S. census count, forecasting weather, designing aircraft,
modeling molecules, and breaking encryption codes. These are
arguably the most powerful in terms of speed and accuracy.
They are types of computers used in solving complicated
mathematical computations. They are capable of executing
trillions of instructions per second.

Mainframe computers
Mainframe computers are sizeable-sized computer types. They are equally powerful
but fall short in terms of the computation ability in supercomputers. They are like big
file servers, enabling multiple users from nearby and remote locations to access
resources simultaneously. Also known as big iron, these systems can handle
massive amounts of data going in and out simultaneously. This makes them popular
with businesses. They are also resilient as they are capable of operating for over ten
years without failing. Users can access the mainframe using terminals or personal
computers. This can happen within the same building or via a vast area network
(WAN). Mainframes process billions of instructions per second.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #3

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Workstations
In the early 1980s, workstations are expensive, powerful personal computers
usually used for complex scientific, mathematical, and engineering calculations
and computer-aided design and computer-aided manufacturing. By providing
many capabilities comparable to midsize mainframes, workstations are used to
develop prescription drugs and create movie special effects. Workstations have
caught the public's eye mainly for their graphics capabilities, which are used to breathe three-dimensional
life into movies such as WALL•E, Harry Potter, and X-Men Origins: Wolverine. The powers of low-end
workstations overlap those of high-end desktop microcomputers.

Microcomputers/Personal Computers (PCs)


Microcomputers are the smallest, least expensive, and the most used types of computers. They have a
short memory, less processing power, and are more commonly known as personal computers or merely
PCs. They are either stand-alone machines or connected to a computer network, such as a local area
network. A local area network (LAN) connects, usually by special cable, a group of desktop PCs and
other devices, such as printers, in an office or a building.

Microcomputers are of several types: desktop PCs, tower PCs, notebooks (laptops), netbooks, mobile
internet devices (MIDs), and personal digital assistants—handheld computers or palmtops.

Desktop PCs are older Tower PCs are microcomputers


microcomputers whose case or whose case sits as a "tower," often
main housing sits on a desk, on the floor beside a desk, thus
with a keyboard in front and freeing up desk surface space.
monitor (screen) often on top. Some desktop computers no longer
have a boxy housing; most of the
Notebook computers, also computer components are built into
called laptop computers, are the back of the flat-panel display
lightweight, portable computers screen.
A built-in monitor, keyboard, A reasonably recent category,
hard-disk drive, CD/DVD drive, netbooks are low-cost,
battery, and AC adapter can lightweight computers with tiny
be plugged into an electrical dimensions and functions
outlet. designed for basic tasks, such
as web searching, email, and
word processing.
MOBILE INTERNET DEVICES (MIDs) Smaller PERSONAL DIGITAL ASSISTANTS Personal
than notebook computers but more extensive digital assistants (PDAs), also called handheld
and more potent than PDAs, mobile internet computers or palmtops, combine personal
devices (MIDs) are for consumers and business organization tools—schedule planners, address
professionals. Fully internet integrated, they are books, to-do lists, ability cases send an email,
highly compatible with desktop microcomputers and faxes. Some PDAs have touch-sensitive

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #3

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

and laptops. The initial screens. Some also


models focus on data connect to desktop
communication, not voice computers for sending or
communication. receiving information.

Microcontrollers
Microcontrollers, also called embedded computers, are the
tiny, specialized microprocessors installed in "smart"
appliances and automobiles. These microcontrollers enable
microwave ovens, for example, to store data about how long
to cook your potatoes and at what power setting.
Microcontrollers have been used to develop a new universe
of experimental electronic appliances. For example, they are
behind single-function products such as digital cameras,
MP3 and MP4 players, and organizers, which have been
developed into hybrid forms such as gadgets that store
photos and videos as well as music. They also help run
remote web servers embedded in clothing, jewelry, and
household appliances such as refrigerators. Also,
microcontrollers are used in blood pressure monitors, airbag sensors, gas and chemical sensors for water
and air, and vibration sensors.

What are servers? How do servers work, and what do they do?

The word server describes not the size of a


computer but rather the particular way a
computer is used. Nevertheless, because
servers have become crucial to
telecommunications, especially with the rise of
the internet and the web, they deserve mention
here.

A server, or network server, is a central


computer that holds data collections
(databases) and programs for connecting or
supplying services to PCs, workstations, and
other devices called clients. A wired or
wireless network links these clients. The entire
network is called a client/server network. In small organizations, servers can store files, provide printing
stations, and transmit email. In large organizations, servers may also house enormous libraries of
financial, sales, and product information.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #3

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Activity 3: Skill Building (20 min)


Direction: Complete the crossword puzzle below using the clues provided.

DOWN
1 these are handheld computers that will fit in your palm of your hand
3 "embedded" inside some other device (often a consumer product) so that they can control the
features or actions of the product
4 is a personal computer that foregoes some functionality to remain lightweight and small
ACROSS
2 they are larger and have more processing power than some other classes of computers:
minicomputers, servers, workstations, and personal computers
5 A personal computer designed for regular use at a single location on or near a desk or table due
to its size and power requirements
6 is a computer or device on a network that manages network resources
7 a small, relatively inexpensive computer with a microprocessor as its central processing unit (CPU)

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #3

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

8 is a device that can perform the majority of the functions of a desktop or laptop but is too mobile
9 a high-performance computer system that is designed for a single user and has advanced
graphics capabilities, large storage capacity, and a powerful microprocessor
10 is a computer with a high level of performance as compared to a general-purpose computer

Activity 4: What I know Chart, Part 2. (10 min)


Direction: Go back to activity one and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (20 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Mainframe computers process faster than microcomputers.


2. A microcomputer is used to view tiny objects.
3. Supercomputers are exceptionally inexpensive.
4. In small organizations, servers can store files, provide printing stations, and transmit
email.
5. In large organizations, servers may also house enormous libraries of financial, sales,
and product information.
6. Microcomputers are the smallest, least inexpensive, and the most used types of
computers.
7. Supercomputers are capable of executing trillions of instructions per second.
8. Mainframes process billions of instructions per second.
9. Servers store information.
10. Computers are becoming more prominent, slower, and more expensive.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #3

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:
Activity 3:
DOWN ACROSS
1 palmtops 2 mainframe
3 microcontroller 5 desktop
4 notebooks 6 server
7 microcomputer
8 netbooks
9 workstations
10 supercomputer

Activity 5:
1.TRUE
2.FALSE - Microcomputers are the smallest, least expensive, and the most used types of computers.
3.FALSE - Super Computers are expensive.
4.TRUE
5.TRUE
6.TRUE
7.TRUE
8.TRUE
9.TRUE
10.FALSE – Computers are becoming smaller and portable.

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: The Computer System Materials:


Lesson Objectives: FLM Student Activity Sheets
1.To discuss the components of a computer system: Hardware and
Software References:
2. To identify input and output device PCs for Dummies, 10th Edition by
3. To introduce the Functions of the Operating System Dan Gookin
informationq.com

"Knowledge is the new rich. Arm yourselves with it." - Toni Payne

A. LESSON PREVIEW/REVIEW
1) Introduction
When we are in grade school, we are taught that the human brain functions through a network
of neurons — or nerve cells — that interact with each other to communicate and process
information based on which we see, hear, move, think, make decisions, and generally function.
The central nervous system and its network of neurons are at the heart of all the activity that
happens in the body. If we break it down, the human body functions very similarly to modern-day
computers — or rather, computers are very closely aligned to the most complex processing unit
there has ever been, namely the human brain. So how similar are our body's nervous system
and the computer system? Let's take a look!

Activity 1: What I Know Chart (10 min)


What do you know about the Components of a Computer System? Try answering the questions
below by writing your ideas under the What I Know column. You may use keywords or phrases
that you think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What are the components of a


computer system?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (50 min)

The World of Hardware and Software


A computer system is a blend of two different things: hardware and software. Like other famous pairs —
sweet and sour, ham and cheese — hardware and software must go well together to create the entire
computer system.

Hardware is the physical part of a computer — anything you can touch and anything you can see. The
computer console, the monitor, the keyboard, the mouse — that physical stuff is hardware.

Software is the brain of the computer. It tells the hardware what to do.

In a way, it helps to think of hardware and software like a symphony orchestra. For hardware, you have
the musicians and their instruments. The software is the music. As with a computer, the music (software)
tells the musicians and their instruments (hardware) what to do. Without software, hardware sits around
and looks pretty. It can't do anything because it has no instructions and nothing telling it what to do next.
And, like a symphony orchestra without music, that can be an expensive waste of time.

No, you must have software to make the computer go and complete the computer system. It's software
that determines your computer's personality.

The Computer's Operating System

One of the most critical pieces of the software inside a computer is the operating system. It has several
duties:
❖ Control the computer's hardware.
❖ Manage all the computer software.
❖ Organize the files and stuff you create on the computer.
❖ Interface with you, the human.

Doing all these things is a significant task. Be thankful that computer designers
have seen to it that only one program does all these things! The operating system
is a diligent worker.

On PCs, the most common operating system is Windows. Other operating


systems are available, all of which do the things just listed and can handily control
the PC's hardware, but Windows dominates the marketplace.

Note!

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

✔ The hardware is not in charge! The software must rule the computer's roost. And the big bully among
all the software programs is the operating system.
✔ The computer's most important piece of software is its operating system. It's the computer's number-
one program —Mr. In Charge, Fearless Leader.
✔ The computer hardware surrenders itself to the operating system mere moments after you turn the
computer on.
✔ The operating system typically comes with the computer when you buy it. You never need to add a
second operating system, although operating systems do get updated and improved from time to
time.

Other software

The operating system isn't the only software you use on your computer. If you're a typical computer user,
you'll most likely obtain dozens, if not hundreds, of other programs, or computer software, to help
customize your computer and get it to do those things you want it to do. Several different names a
computer is known. In addition to software, you will find:

Applications: This category of software is used for productivity or to create things. Applications are the
software that does the work.

Anything that is a "computer program" is also software. Still, this category includes software that may or
may not be used for productivity or to produce output, such as a computer game or CD-playing program.

Utilities or tools: These programs are designed to help you run the computer or work with the hardware.
For example, you may use a tool to optimize the performance of your computer's disk drives.

What does a computer do at its most superficial level?


The computer is a simple beast. It does one thing: It takes input and then modifies that input to create
some form of output. However, the enormous potential of that simple activity makes the computer seem
like such a complicated device.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

To help you grasp the notion of what a computer does, you should understand three basic computer
concepts:
❖ I/O
❖ Processing
❖ Storage

I/O
IO is commonly written as I/O, and it stands for Input and Output, which are the two things a computer
does best. I/O is pretty much the only thing a computer does. You get this whole I/O concept down, and
you've tackled the essence of what a computer is and what it can do.

Note!
✔ The devices connected to your computer are divided into input and output camps. There are input
devices and output devices.
✔ Input devices are things used to send information to the computer. The keyboard and mouse are
two input devices.
✔ Output devices are things the computer uses to show its output, such as the screen and printer.
✔ Some devices can do both input and output. The computer can use those devices to supply input as
well as send output to those devices.

Processing
If a computer did no processing, it would essentially be like plumbing: Water would come into the system,
churn around in a few pipes, and then go out of the system. The water would be the same before, during,
and after the journey. But with a computer, you have the added element of processing, which means
doing something to the input so that you get something else as output.

Note!
✔ Processing is handled by a widget inside the computer called (logically enough) a processor.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

✔ The processor doesn't know what to do with all that input. Telling the computer what to do is the job
of software.
✔ It's impressive when you think of it: Computer input is all digital. The output can be anything from a
poem to a graphical image to a symphony with the proper processing. That's all thanks to the power
of processing.

Storage
The final part of the computer equation is storage, referred to as memory in a computer. The warehouse
is necessary on the most basic level because the processor needs a place to perform its magic.

On a modern computer, storage comes in two forms: temporary and long-term.

RAM is the temporary storage, where the processor does its work, where programs run, and where
information is stored while it's being finished. RAM is the microprocessor's playground.

Disk drives provide long-term storage. The disks also allow information to be saved and recalled for later
use — like a closet or storage unit. Disk storage is where things go when the microprocessor isn't directly
working on them — but from where stuff can be retrieved later if need be.

Note!
✔ All computers need storage.
✔ RAM is an acronym for Random Access Memory. It's often just called memory.
✔ RAM is also known as temporary storage.
✔ Disk drives come in various types: removable and non-removable, and with multiple names and
numbers attached. Because of their variety, disk drives are generally referred to as long-term
storage.
✔ Another term for the disk drive is disk memory. Though disk memory is not used generally, it's easy
to confuse it with RAM.

Input Devices

The devices which are used to give data and instructions to the computer are called Input Devices.
Various input devices can be used with the computer depending upon the type of data you want to enter
into the computer.

Keyboard
It is the most commonly used input device. It is used to enter data and
instructions directly into the computer. There are 104 buttons on the
keyboard which are called keys.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Mouse
A mouse is another input device that is commonly found connected with
computers. It is a pointing device that works on the principle of Point and
Click. When the mouse is moved on the mouse pad, a light beam
underneath reflects the pointer's giving motion on the screen.

Joystick and Gamepad


Joystick and gamepad are also input devices that are also input devices
used to control objects' movement. Just like a mouse, these are also
pointing devices. Primarily they are used for playing games on the
computer.
Light Pen
A light pen is another pointing type input device. It is a pen-shaped device
that can be used by directly pointing the objects on the screen. It can also
be used for making drawings now on the monitor screen.

Scanner
We can store pictures, photographs, diagrams on the computer with the
help of a scanner. The scanner reads the image and saves it on the
computer as a file.

Touchscreen
The touchscreen is a unique computer screen that takes the input by
sensing the touch of a human finger, gloved hand, stylus, pen, or any
other pointing device. The user gives instructions to the computer just by
touching the screen.

Microphone
This is an input device that is used to record sound or voice into the
computer system. You can store voice data on the computer by speaking
in front of this device.
Trackball
A trackball is similar to a mouse but is mounted in a fixed position. The
user spins the ball with fingers to move the pointer on the screen.
A Trackball technology was used in an earlier laptop computer which is
now replaced with a track-pad.

Output Devices

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

The devices which are used to display the results or information are called Output Devices. You can view
the monitor's output or print it on paper using a printer. Monitor and the printer are the commonly used
output devices.

Monitor
The monitor is the most common output device connected with the
computer to display the processed information. It looks like a TV and is
also known as VDU(Visual Display Unit). Pictures are displayed by using
a large number of tiny dots on a screen called pixels. The number of
pixels that a monitor can show on its screen is referred to as the screen's
resolution.
Printer
This is a critical output device of the computer system. It gives a printed
output of the results that appears on the monitor screen. The printed
output is also called Hard Copy output because, unlike a monitor, this
output can be preserved even if the computer is switched off.

Speakers
Speakers are categorized as output devices. These are used to listen to
the music and sounds played by the computer. They usually come in a
pair and have different shapes and sizes.

Let's summarize!

✔ Input devices are used to give data and instructions to the computer.
✔ The keyboard and mouse are the most commonly used input devices.
✔ The microphone gives sound or voice input to the computer.
✔ Output devices are used to display the result of information on the computer.
✔ Monitor and the printer are the commonly used output devices.
✔ The output seen on the VDU is called soft copy.
✔ The printed copy of the output is called a hard copy.

Activity 3: Skill Building (20 min)


Direction: Imagine a business you could start or run at home. What type of business is it?
What type(s) INPUT or OUTPUT device(s) do you think you'll need? Elaborate the purpose of
the device you'll need based on the facts discussed so far.

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Activity 4: What I know Chart, Part 2. (10 min)


Direction: Go back to activity one and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (20 min)

Direction: Select the letter of the correct answer.

1. The most widely used input device is the ____


A) Mouse B) Keyboard
C) Modem D) Monitor

2. The most common method of entering text and numerical data into a computer system is through the
use of a ____

A) Plotter B) Scanner
C) Printer D) Keyboard

3. Which of the following is not an output device?


A) Plotter B) Printer
C) Scanner D) Monitor

This document is the property of PHINMA EDUCATION 8


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

4. Devices that let the computer communicate with you.


A) Input B) Output
C) Type D) Print

5. Devices that allow you to put information into the computer.


A) Input B) Output
C) Type D) Print

6. Which of the following is not an example of hardware?


A) Scanner B) Printer
C) Monitor D) Interpreter

7. Using output devices, one can ____


A) Input data B) Store data
C) Scan data D) View or print data

8. The wheel located between the two standard buttons on a mouse is used to ____
A) Click on web pages B) Shutdown
C) Click and select items D) Scroll

9. The term used to define all input and output devices in a computer system is ____
A) Monitor B) Software
C) Shared resources D) Hardware

10. Information that comes from an external source and is fed into computer software is called ____
A) Input B) Output
C) Throughput D) Reports

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A. Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B. Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?

This document is the property of PHINMA EDUCATION 9


ACC 123: IT Application Tools in Business
Student Activity Sheet #4

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1. B – See input devices, keyboard.
2. D - It is used to enter data and instructions directly into the computer.
3. C – Scanner is an input device.
4. B – The devices which are used to display the results or information are called Output
Devices.
5. A – Input devices allow you to communicate and put information into the computer.
6. D – Interpreter is a computer program (Software).
7. D – Output device allows you to print and view data (Scanner and Printer).
8. D – This is used for scrolling on the computer.
9. D – This is a set of components that make up the computer's physical part.
10. A – Is a device that allows a user to input commands to be executed by the computer.

This document is the property of PHINMA EDUCATION 10


ACC 123: IT Application Tools in Business
Student Activity Sheet #5

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: End User Tool Microsoft Word Materials:


Lesson Objectives: FLM Student Activity Sheets
1.To learn how to create documents
2.To learn how to edit documents References:
Using Information Technology by
Williams and Sawyer, McGraw-Hill
Education
tipsandarticles.com

"An investment in knowledge pays the best interest." -Benjamin Franklin

A. LESSON PREVIEW/REVIEW
1) Introduction
What can I do with word processing software that I can't do with pencil and paper?

After a long and productive life, the typewriter has gone to its reward. Indeed, it isn't easy today
to get a manual typewriter repaired. Word processing software offers a much-improved way of
dealing with documents.

Activity 1: What I Know Chart (5 min)


What do you know about the Word Processor? Try answering the questions below by writing your
ideas under the What I Know column. You may use keywords or phrases that you think are related
to the questions.

What I Know Questions: What I Learned (Activity 4)

What is a word processor?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #5

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (20 min)

What is a word processor?


At its core, a word processor is computer software —a program — that lets you create documents. That's
the keyword — documents. A document includes formatted text, margins, maybe even a bit of artwork.
The word processor contains all the tools to make that happen; this book explains how those tools work.

Word processing software allows you to use computers to create, edit, format, print, and store text
material, among other things. Word processing is the most common software application. The best-
known word processing program is Microsoft Word, but others, such as Corel WordPerfect, Apple Pages,
Google Apps, and Zoho Writer. Even a full-fledged word processor, known as Quickoffice, can be used
on the Apple iPhone. Word processing software allows users to work through a document and delete,
insert, and replace text, the principal edit/correction activities. It also offers such additional features as
creating, formatting, printing, and saving.

What was used before word processing?


Before computers, people used typewriters to write reports or other documents, which nowhere near
today's word processors' capabilities. With a word processor, you can easily edit and make changes to
a document, move text around in a document, add images, change fonts, check for spelling errors, and
much more.

Creating Documents

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #5

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

To create a document, you must either have a word processor or a computer capable of creating a
document on an online service.

Note!
When we refer to a "document," we're talking about a rich text document with text formatting (e.g.,
bold), images, different fonts, font sizes, and not a plain text file.

Creating a document means entering text using the keyboard or the dictation function associated with
speech-recognition software. Word processing software has three features that affect this process—the
cursor, scrolling, and word wrap.

Digitizing Information
Using a word processor to type documents electronically, it becomes quick and easy to transfer, copy
and preserve information. Word processor offers excellent utility and functionality to most companies and
compares favorably to paper filing systems. Filing, retrieving, and copying all require a significant amount
of time in a paper filing system, and the storage requirements are substantial. Paper files are also subject
to decay, damage, and misplacement so that digital file systems are not.

Editing Documents
What are various kinds of editing I can do in a word processing document?

Editing is the act of making alterations to the content of your document. Some editing features are inserted
and delete, undelete, find and replace, cut/copy and paste, spelling checker, grammar checker, and
thesaurus. Some of these commands are in the Edit pull-down menu and icons on the toolbar.

Improving Efficiency and Accuracy


Besides only saving time, word processing offers ways to improve workers' efficiency and accuracy. Word
processors contain software to automatically correct common errors, identify misspellings, improve
overall speed, and reduce errors. They also make it easier to create and organize new files and retrieve
and manipulate existing ones. These kinds of improvements offer a clear appeal to business, explaining
the widespread transition to computers and word processing in office environments.

Activity 3: Skill Building (10 min)


Direction: Word processing saves time, making it an obvious asset in the workplace. Most
people can type much faster than they can write by hand. Relay an incident from your own
experience where you realized that word processing saves time.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #5

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Word processing software allows you to use computers to create, edit, format, print,
and store text material, among other things.
2. Word processing is the least common software application.
3. To create a document, you must neither have a word processor nor a computer
capable of producing a document on an online service.
4. Using a word processor to type documents electronically makes the task quicker and
easier to transfer, copy and preserve information.
5. Editing is the act of making alterations to the content of your document.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (30 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #5

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1.TRUE
2.FALSE – Word processing is one of the most common software applications.
3.FALSE – You must have both a computer and a word processor or any online service platform.
4.TRUE
5.TRUE

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #6

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: End User Tool Microsoft Word Materials:


Lesson Objectives: FLM Student Activity Sheets
1.To learn how to format documents with the help of templates and
wizards. References:
Using Information Technology by
Williams and Sawyer, McGraw-Hill
Education

"Knowing is not enough; We must apply. Willing is not enough; We must do." – Johanne
Goethe

A. LESSON PREVIEW/REVIEW
1) Introduction

Word processors are a lifesaver. You can quickly and easily make mass changes without writing
the whole document for every instance of something you need to change. That's the beauty of
doing your work in word processors, compared to a paper crafted with a typewriter or through
handwriting. Aside from that, there are other features that you can use. Let's take a look!

Activity 1: What I Know Chart (5 min)


What do you know about the Templates and Wizards in Word Processors? Try answering the
questions below by writing your ideas under the What I Know column. You may use keywords or
phrases that you think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What are Templates and Wizards


in Word Processors?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #6

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (20 min)

Formatting Documents with the Help of Templates & Wizards

What are some types of formatting I can do?

In the context of word processing, formatting means determining the appearance of a document. You
can always format your documents manually, but word processing programs provide a helpful device to
speed the process up and make it more sophisticated. A wizard template in older Office versions is a
preformatted document that provides essential tools for shaping a final document—the text, layout, and
style for a letter, for example.

Simply put, it is a style guide for documents. Because most documents are relatively standard in format,
every word processing program comes with at least a few standard templates. When you use a template,
you're opening a copy of the template. In this way, you'll always have a fresh copy of the original template
when you need it. After you open a copy of the template and add your text, you save this version of the
template under your choice's filename. In this way, for example, in a letterhead template, your project's
name, address, phone number, and web address are included every time you open your letterhead
template file.

Among the many aspects of formatting are these:

FONT. You can decide what font—typeface and type size—you wish to use. For instance, you can specify
whether it should be Arial, Courier, or Freestyle Script. You can indicate whether the text should be 10
points or 12 points in size, and the headings should be 14 points or 16 points. (There are 72 points in an
inch.) You can specify what parts should be underlined, italic, or boldface.

SPACING & COLUMNS. You can choose whether you want the lines to be single-spaced or double-
spaced (or something else). You can specify whether you want the text to be one column (like this page),
two columns (like many magazines and books), or several columns (like newspapers).

MARGINS & JUSTIFICATION. You can indicate the dimensions of the margins— left, right, top, and
bottom—around the text. You can specify the text justification—how the letters and words are spaced in
each line. To justify means to align text evenly between left and right margins, as in most newspaper
columns and this text. To left-justify means to align text evenly on the left. (Left-justified text has a
"ragged-right" margin, as do many business letters.)

HEADERS, FOOTERS, & PAGE NUMBERS. You can indicate headers or footers and include page
numbers. A header is a standard text (such as a date or document name) printed at every page's top. A

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #6

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

footer is the same thing printed at the bottom of every page. If you want page numbers, you can determine
what number to start with, among other things.

OTHER FORMATTING. You can specify borders or other decorative lines, shading, tables, and
footnotes. You can import graphics or drawings from files in other software programs, including clip art—
collections of ready-made pictures and illustrations available online or on CDs/DVDs.

DEFAULT SETTINGS. Word processing programs (and indeed most application software) come from
the manufacturer with default settings. A program automatically uses default settings unless the user
specifies otherwise, thereby overriding them. Thus, for example, a word processing program may
automatically prepare a document single-spaced, left-justified, with 1-inch right and left margins, unless
you alter these default settings.

Activity 3: Skill Building (10 min)


Direction: Suppose you are a business owner and you are about to communicate with a
prospective client by sending a business letter. In what way can Templates and Wizards help
you in this matter?

_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Formatting means determining the appearance of a document.


2. A program automatically uses default settings unless the user specifies otherwise,
thereby overriding them.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #6

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

3. You can specify borders or other decorative lines, shading, tables, and footnotes
when formatting.
4. A header is a common text printed at the bottom of every page.
5. A footer is a common text printed at the top of every page.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1.TRUE 2.TRUE 3.TRUE 4.TRUE

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #7

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: End User Tool Microsoft Excel Materials:


Lesson Objectives: FLM Student Activity Sheets
1.To know about output options: Printing, Faxing or Emailing
Documents References:
2.To know the how Spreadsheets Work Using Information Technology by
3.To know worksheet templates Williams and Sawyer, McGraw-Hill
4. To know multidimensional spreadsheets Education

"The possession of knowledge does not kill the sense of wonder and mystery. There is
always more mystery." ― Anais Nin

A. LESSON PREVIEW/REVIEW
1) Introduction

Many students claim that what they learn during school and university is not relevant once they
start the workforce. Understanding these lessons are beneficial to get your study done, but it is
also applicable to the workforce. Word processing and spreadsheets will help you a lot with your
work. So let's learn and appreciate these topics!

Activity 1: What I Know Chart (10 min)


What do you know about the Output Options in Word Processing and the Basics of Spreadsheet?
Try answering the questions below by writing your ideas under the What I Know column. You may
use keywords or phrases that you think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What are the Output Options in


Word Processing?

What are Spreadsheets?

1
This document is the property of PHINMA EDUCATION 1
ACC 123: IT Application Tools in Business
Student Activity Sheet #7

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (60 min)

Output Options: Printing, Faxing, or Emailing Documents

What are some of my output options?

Most word processing software gives you several options for printing. For example, you can print several
copies of a document. You can print individual pages or a range of pages. You can even preview a
document before printing it out. Previewing (print previewing) means viewing a document on-screen to
see what it will look like in printed form before it's printed. Whole pages are displayed in reduced size.
You can also send your document to someone else by fax or email attachment if your computer has the
appropriate communications link.

Saving Documents
How can I save a document?

Saving means storing, or preserving, a document as an electronic file permanently—on your hard
disk or a CD, for example. Saving is a feature of nearly all application software. Having the document
stored in electronic form spares you the tiresome chore of retyping it from scratch whenever you want to
make changes. You need only retrieve it from the storage medium and make the changes you want.
Then you can print it out again. (Always save your documents often while you are working; don't wait!)

Web Document Creation


How do I format a document to put it on the web?

Most word processing programs allow you to automatically format your documents into HTML so that
they can be used on the web. In Microsoft Word, open File, Save As, Save As Type: Web page (*.htm,
*.html).

Tracking Changes & Inserting Comments


How do I and any co-writers make changes visible in a document?

What if you have written an important document and have asked other people to edit it? Word processing
software allows editing changes to be tracked by highlighting them, underlining additions, and crossing
out deletions. Each person working on the document can choose a different color so that you can tell
who's done what and when. And anyone can insert hidden questions or comments that become visible
when you pass the mouse pointer over yellow-highlighted words or punctuations. An edited document

2
This document is the property of PHINMA EDUCATION 2
ACC 123: IT Application Tools in Business
Student Activity Sheet #7

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

can be printed out showing all the changes and a list of comments keyed to the text by numbers. Or it
can be printed out "clean," showing the edited text in its new form, without the changes.

SPREADSHEETS
What can I do with an electronic spreadsheet that I can't do with pencil and paper and a standard
calculator?

What is a spreadsheet? Traditionally, it was merely a grid of rows and columns, printed on special light-
green paper, to produce financial projections and reports. A person making up a spreadsheet spent long
days and weekends at the office penciling tiny numbers into countless small rectangles. When one figure
changed, all other numbers on the spreadsheet had to be erased and recomputed. Ultimately, there might
be wastebaskets full of jettisoned worksheets.

In 1978, Daniel Bricklin was a student at the Harvard Business School. One day he was staring at
columns of numbers on a blackboard when he got the idea for computerizing the spreadsheet. He created
the first electronic spreadsheet, now called simply a spreadsheet. The spreadsheet allows users to create
tables and financial schedules by entering data and formulas into rows and columns arranged as a grid
on a display screen. Before long, the electronic spreadsheet was the most popular small business
program. Unfortunately for Bricklin, his version (called VisiCalc) was quickly surpassed by others.

Today the principal spreadsheets are Microsoft Excel, Corel Quattro Pro, and IBM's Lotus 1-2-3.
Spreadsheets are used to maintain student grade books, track investments, create and track budgets,
calculate loan payments, estimate project costs, and make other types of financial reports.

The Basics: How Spreadsheets Work


What are the basic principles involved with manipulating a spreadsheet?

A spreadsheet is arranged as follows (See illustration on the next page ).

HOW A SPREADSHEET IS ORGANIZED - A spreadsheet's arrangement of columns, rows, and labels


is called a worksheet.

● Column headings: In the worksheet's frame area (work area), lettered column headings appear
across the top ("A" is the name of the first column, "B" the second, and so on).
● Row headings: Numbered row headings appear down the left side ("1" is the name of the first row,
"2" the second, and so forth).
● Labels: Labels are any descriptive text that identifies categories, such as APRIL, RENT, or GROSS
SALES.

CELLS: WHERE COLUMNS & ROWS MEET- Each worksheet has more than 17 million cells.

3
This document is the property of PHINMA EDUCATION 3
ACC 123: IT Application Tools in Business
Student Activity Sheet #7

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

● Cells & cell addresses: A cell is a place where a row and a column intersect; its position is called a
cell address. For example, "A1" is the cell address for the top-left cell, where column A and row 1
intersect.

● Ranges: A range is a group of adjacent cells —for example, A1 to A5.


● Values: A number or date entered in a cell is called a deal. The values are the actual numbers used
in the spreadsheet—dollars, percentages, grade points, temperatures, or whatever. Headings,
labels, and formulas also go into cells.
● Cell pointer: A cell pointer, or spreadsheet cursor, indicates where data is to be entered. The cell
pointer can be moved around like a cursor in a word processing program.

FORMULAS, FUNCTIONS, RECALCULATION, & WHAT-IF ANALYSIS - Why has the spreadsheet
become so popular? The reasons lie in the features known as formulas, functions, recalculation, and
what-if analysis.

4
This document is the property of PHINMA EDUCATION 4
ACC 123: IT Application Tools in Business
Student Activity Sheet #7

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

● Formulas: Formulas are instructions for calculations; they define how one cell relates to other cells.
For example, a formula might be SUM (A5:A15) or @SUM (A5:A15), meaning "Sum (that is, add) all
the numbers in the cells with cell addresses A5 through A15.".
● Functions: Functions are built-in formulas that perform common calculations. For instance, a
function might average a range of numbers or round off a number to two decimal places.
● Recalculation: After the values have been entered into the worksheet, the formulas and functions
can be used to calculate outcomes. However, what was revolutionary about the electronic
spreadsheet was its ability to do recalculation easily. Recalculation is the process of recomputing
value. With this simple feature, the hours of mind-numbing work required to rework paper
spreadsheets manually have become a thing of the past.
● What-if analysis: The recalculation feature has opened up whole new possibilities for decision
making. In particular, what-if analysis allows the user to see how changing one or more numbers
changes the calculation outcome. That is, you can create a worksheet, putting in formulas and
numbers, and then ask, "What would happen if we change that detail?"—and immediately see the
effect on the bottom line.

WORKSHEET TEMPLATES You may find that your spreadsheet software makes worksheet templates
available for specific tasks. Worksheet templates are forms containing formats and formulas custom-
designed for particular kinds of work. Examples are templates for calculating loan payments, tracking
travel expenses, monitoring personal budgets, and keeping track of time worked on projects. Templates
are also available for various business needs—providing sales quotations, invoicing customers, creating
purchase orders, and writing a business plan.

EXISTING TEMPLATES
To create a workbook based on an existing template, execute the following steps.

1. On the File tab, click New.


Use the search box to search for online templates or click a template from one of the Office templates

5
This document is the property of PHINMA EDUCATION 5
ACC 123: IT Application Tools in Business
Student Activity Sheet #7

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

2. Use the search box to search for online templates or click a template from one of the Office

templates.

3. Click create to download the template.

6
This document is the property of PHINMA EDUCATION 6
ACC 123: IT Application Tools in Business
Student Activity Sheet #7

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Excel creates the workbook Home inventory1.xlsx based on this template.

Activity 3: Skill Building (20 min)


Direction: Of course, the core purpose of a spreadsheet all boils down to numbers. If you need
to sort, retrieve, and analyze a large (or even small!) amount of data, a spreadsheet makes it
a breeze. Imagine a business you could start or run at home. What type of business is it? How
can you use a spreadsheet as a valuable tool in your business?

_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (10 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Saving means storing, or preserving, a document as an electronic file permanently.


2. A spreadsheet is a computer application for the organization, analysis, and data
storage in tabular form.
3. A spreadsheet or worksheet is a file made of rows and columns that help sort data,
arrange data quickly, and calculate qualitative data.
4. What makes a spreadsheet software program unique is its ability to calculate values
using mathematical formulas and cells' data.
5. The spreadsheet is the least used in business accounting and data analysis.
6. A spreadsheet is a grid divided into columns and rows.
7. The cells are where information will be entered in the form of a label, number, or
calculation formula.
8. Labels are made up of text that describes the numbers in the columns and rows.

7
This document is the property of PHINMA EDUCATION 7
ACC 123: IT Application Tools in Business
Student Activity Sheet #7

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

9. Formulas are mathematical expressions built into individual cells that instruct the
computer to carry out calculations on specified sets of numbers in the rows and columns.
10. Most spreadsheet applications are multidimensional, meaning that you can link one
spreadsheet to another.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1. True
2. True
3.False – Spreadsheet includes columns, rows, and labels.
4.True
5.False –The spreadsheet is greatly used in business accounting and data analysis.
6. True
7. True
8. True
9. True
10.True

8
This document is the property of PHINMA EDUCATION 8
ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: End User Tool Microsoft Excel Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To learn the analytical graphics in creating charts
2. To learn the formulas, functions, recalculation, & what-if analysis. References:
smartsheet.com
corporatefinanceinstitute.com

"Learning is not attained by chance; it must be sought for with ardor and attended to with
diligence." ― Abigail Adams

A. LESSON PREVIEW/REVIEW
1) Introduction

Charts and graphs are often used to summarize data. They make it easy to see trends and the
amount of variation in the information being studied. That's why it's essential to understand the
ways charts and graphs display information. Be sure to check the charts and graphs in
spreadsheets to know how to make one when the need arises!

Activity 1: What I Know Chart (10 min)


What do you know about the Charts and Graphs? Try answering the questions below by writing
your ideas under the What I Know column. You may use keywords or phrases that you think are
related to the questions.

What I Know Questions: What I Learned (Activity 4)

What graphs and charts do you


know?

What is the purpose of using charts


and graphs?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (50 min)

What Are Graphs and Charts in Excel?

Charts and graphs elevate your data by providing an easy-to-understand visualization of numeric values.
While the terms are often used interchangeably, they are slightly different. Graphs are the most basic
way to visually represent data and typically display data point values over time. Charts are a bit more
complicated, as they allow you to compare pieces of a data set relative to the other data in that set.
Charts are also considered more visual than graphs since they often take a different shape than a generic
x- and y-axis.

People often use charts and graphs in presentations to give management, client, or team members a
quick snapshot into progress or results. You can create a chart or graph to represent nearly any kind of
quantitative data — doing so will save you the time and frustration of poring through spreadsheets to find
relationships and trends.

It's easy to create charts and graphs in Excel, especially since you can store your data directly in an
Excel Workbook, rather than importing data from another program. Excel also has a variety of preset

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

chart and graph types, so you can select one that best represents the data relationship(s) you want to
highlight.

When to Use Each Chart and Graph Type in Excel

Excel offers an extensive library of chart and graph


types to help visually present your data. While multiple
chart types might "work" for a given data set, it's
essential to select a chart type that best fits with the
story you want the data to tell. Of course, you can also
add graphical elements to enhance and customize a
chart or graph. In Excel 2016, there are five main
categories of charts or graphs:

Column Charts: Some of the most commonly used


charts, column charts, are best used to compare
information or if you have multiple categories of one
variable (for example, numerous products or genres).
Excel offers seven different column chart types:
clustered, stacked, 100% stacked, 3-D clustered, 3-D
stacked, 3-D 100% stacked, and 3-D, pictured below.
Pick the visualization that will best tell your data's
story.

Bar Charts: The main difference between bar charts and


column charts is that the bars are horizontal instead of
vertical. You can often use bar charts interchangeably with
column charts. However, some prefer column charts when
working with negative values because it is easier to
visualize negatives vertically, on a y-axis.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Pie Charts: Use pie charts to compare percentages of a


whole ("whole" is the total values in your data). Each value
is represented as a piece of the pie so you can identify the
proportions. There are five pie chart types: pie, pie of pie
(this breaks out one part of the pie into another pie to show
its sub-category proportions), a bar of pie, 3-D pie, and a
doughnut.

Line Charts: A line chart is most helpful in showing trends over time
rather than fixed data points. The lines connect each data point so that
you can see how the value(s) increased or decreased over some time.
The seven-line chart options are line, stacked line, 100% stacked line,
line with markers, stacked line with markers, 100% stacked line with
markers, and 3-D line.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Scatter Charts: Like line graphs, because they help show the change
in variables over time, scatter charts are explicitly used to show how
one variable affects another. (This is called correlation.) Note that
bubble charts, a popular chart type, are categorized under scatter.
There are seven scatter chart options: scatter, scatter with smooth lines
and markers, scatter with smooth lines, scatter with straight lines and
markers, scatter with straight lines, bubble, and 3-D bubble.

There are also four minor categories. These charts are more use case-specific:

Area: Like line charts, area charts show changes in values


over time. However, because the area beneath each line is
solid, area charts are helpful to call attention to the differences
in change among multiple variables. There are six area charts:
area, stacked area, 100% stacked area, 3-D area, 3-D stacked
area, and 3-D 100% stacked area.

Stock: Traditionally used to display the high, low, and closing


price of a stock, this type of chart is used in financial analysis
and by investors. However, you can use them for any scenario
if you want to display the range of a value (or the range of its
predicted value) and its exact value. Choose from high-low-
close, open-high-low-close, volume-high-low-close, and
volume-open-high-low-close stock chart options.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Surface: Use a surface chart to represent data across a 3-


D landscape. This additional plane makes them ideal for
large data sets, those with more than two variables, or those
with categories within a single variable. However, surface
charts can be challenging to read, so make sure your
audience is familiar with them. You can choose from the 3-
D surface, wireframe 3-D surface, contour, and wireframe
contour.

Radar: When you want to display data from multiple variables


about each other, use a radar chart. All variables begin from
the central point. The key with radar charts is that you are
comparing all individual variables about each other — they are
often used for comparing the strengths and weaknesses of
different products or employees. There are three radar chart
types: radar, radar with markers, and filled radar.

Basic Terms in Excel


There are two basic ways to perform calculations in Excel: Formulas and Functions.

1. Formulas
In Excel, a formula is an expression that operates on values in a range of cells or a cell. For example,
=A1+A2+A3, which finds the sum of the content of values from cell A1 to cell A3.

2. Functions
Functions are predefined formulas in Excel. They eliminate laborious manual entry of formulas while
giving them human-friendly names. For example: =SUM(A1:A3). The function sums all the values from
A1 to A3.

Five Time-saving Ways to Insert Data into Excel


When analyzing data, there are five common ways of inserting basic Excel formulas. Each strategy
comes with its advantages. Therefore, before diving further into the leading formulas, we'll clarify those
methods so that you can create your preferred workflow earlier on.

1. Simple insertion: Typing a formula inside the cell


Typing a formula in a cell or the formula bar is the most straightforward method of inserting basic Excel
formulas. The process usually starts by typing an equal sign, followed by the name of an Excel function.

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Excel is quite intelligent in that when you start typing the name of the function, a pop-up function hint will
show. It's from this list you'll select your preference. However, don't press the Enter key. Instead, press
the Tab key so that you can continue to insert other options. Otherwise, you may find yourself with an
invalid name error, often as '#NAME?'. To fix it, re-select the cell, and go to the formula bar to complete
your function.

2. Using Insert Function Option from Formulas Tab


If you want complete control of your function's insertion, using the Excel Insert Function dialogue box is
all you ever need. To achieve this, go to the Formulas tab and select the first menu labeled Insert
Function. The dialogue box will contain all the functions you need to complete your financial analysis.

3. Selecting a Formula from One of the Groups in Formula Tab

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

This option is for those who want to delve into their favorite functions quickly. To find this menu, navigate
to the Formulas tab and select your preferred group. Click to show a sub-menu filled with a list of parts.
From there, you can choose your preference. However, if you find your preferred group is not on the tab,
click on the More Functions option – it's probably just hidden there.

4. Using AutoSum Option


For quick and everyday tasks, the AutoSum function is your go-to option. So, navigate to the Home tab
in the far-right corner, and click the AutoSum option. Then click the caret to show other hidden formulas.
This option is also available in the Formulas tab first option after the Insert Function option.

5. Quick Insert: Use Recently Used Tabs

This document is the property of PHINMA EDUCATION 8


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

If you find re-typing your most recent formula a monotonous task, then use the Recently Used menu. It's
on the Formulas tab, a third menu option just next to AutoSum.

What-If Analysis

What-If Analysis in Excel allows you to try out different values (scenarios) for formulas. The following
example helps you master what-if analysis quickly and easily.

Assume you own a book store and have 100 books in storage. You sell a certain % for the highest price
of $50 and a certain % for the lower price of $20.

If you sell 60% for the highest price, cell D10 calculates a total profit of 60 * $50 + 40 * $20 = $3800.

This document is the property of PHINMA EDUCATION 9


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Create Different Scenarios


But what if you sell 70% for the highest price? And what if you sell 80% for the highest price? Or 90%, or
even 100%? Each different percentage is a different scenario. You can use the Scenario Manager to
create these scenarios.

Note: You can type in a different percentage into cell C4 to see the corresponding result of a scenario in
cell D10. However, what-if analysis enables you to compare the effects of other techniques quickly. Read
on.

1. On the Data tab, in the Forecast group, click What-If Analysis.

2. Click Scenario Manager.

The Scenario Manager dialog box appears.

3. Add a scenario by clicking on Add.

4. Type a name (60% highest), select cell C4 (% sold for the highest price) for the Changing cells,
and click on OK.

This document is the property of PHINMA EDUCATION 10


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

5. Enter the corresponding value 0.6 and click on OK again.

6. Next, add 4 other scenarios (70%, 80%, 90% and 100%).


Finally, your Scenario Manager should be consistent with the picture below:

Note: To see the result of a scenario, select the scenario and click on the Show button. Excel will change
the value of cell C4 accordingly for you to see the corresponding result on the sheet.

Scenario Summary
To easily compare the results of these scenarios, execute the following steps.

This document is the property of PHINMA EDUCATION 11


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

1. Click the Summary button in the Scenario Manager.


2. Next, select cell D10 (total profit) for the result cell and click on OK.

Result:

Conclusion: If you sell 70% for the highest price, you will obtain a total profit of $4100. If you sell 80%
for the highest price, you will receive a total profit of $4400. That's how easy what-if analysis in Excel
can be.

Activity 3: Skill Building (20 min)


Direction: For each chart or graph listed below, give a set of data summarized using such a
chart or graph. The first one is done for you.

Chart or Graph Set of Data


❖ Pie Chart Percentage of social media users by age in
Cabanatuan in 2018.
❖ Column Chart

❖ Bar Chart

❖ Line Chart

This document is the property of PHINMA EDUCATION 12


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

❖ Scatter Chart

❖ Area

❖ Stock

❖ Surface

❖ Radar

Activity 4: What I know Chart, Part 2 (5 min)


Direction: Go back to activity one and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (10 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. The chart represents data from a worksheet that can better understand the data than
just looking at the numbers.
2. A chart is a powerful tool that visually displays data in various chart formats such as
Bar, Column, Pie, Line, Area, Scatter, Surface, or Radar charts.
3. The Line Chart is the least effective in displaying trends.
4. Area Charts are like Line Charts, except that the area above the plotline is solid.
5. A Scatter Chart aims to observe how two series' values compare over time or in other
categories.
6. A pie chart represents the distribution or proportion of each data item over a total
value.
7. Area charts are ideal for clearly illustrating the magnitude of change between two or
more data points.

This document is the property of PHINMA EDUCATION 13


ACC 123: IT Application Tools in Business
Student Activity Sheet #8

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

8. Radar charts compare the aggregate values of several data series.


9. A formula in Excel is an expression that returns a specific result.
10. A function is a formula with a unique name and purpose.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:

1. True
2. True
3. False – The Line Chart is the most effective in displaying trends.
4. False – The area beneath each line is a solid area.
5. True
6. True
7. True
8. True
9. True
10. True

This document is the property of PHINMA EDUCATION 14


ACC 123: IT Application Tools in Business
Student Activity Sheet #10

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: End User Tool Microsoft PowerPoint Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To learn how to create a PowerPoint presentation
2. To learn to edit a PowerPoint presentation References:
https://khyberacademy.com

"Every addition to true knowledge is an addition to human power." - Horace Mann

A. LESSON PREVIEW/REVIEW
1) Introduction
What can I do with a PowerPoint?

Have you ever thought about what life could be if the PowerPoint presentation were not invented?
How would we be able to create a deck of presentation with just a few clicks? PowerPoint
Presentation is a potent tool that makes our life easier. Learning how to use this tool will
significantly improve our digital life.

Activity 1: What I Know Chart (5 min)


What do you know about the PowerPoint Presentation? Try answering the questions below by
writing your ideas under the What I Know column. You may use keywords or phrases that you
think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What is a PowerPoint?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #10

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (20 min)

What is a PowerPoint?
PowerPoint is a computer software program that lets you create a visual presentation. The PowerPoint
contains tools to add a picture, choose a background, add charts & graphs, and other visual objects to
present an idea. PowerPoint presentation has various uses. It can be used for training or educational
context, it can be used to make a digital portfolio, and it can also be used to present a slide show.

What was used before PowerPoint?


Before the time presentation slides were designed on computers, slides were made by hand. It took
several days to create a slide deck, and each slide was expensive. In those days, presentations were
visualized with tools like paper flip charts and slide projectors, and these were used in classrooms and
meeting rooms all around the world.

Parts of the PowerPoint

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #10

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Creating a presentation
To create a document, you must have a PowerPoint presentation tool. When you open the PowerPoint,
you'll see some built-in themes and templates. A theme is a slide design that contains matching colors,
fonts, and special effects like shadows, reflection, and more

Editing Presentation
What are various kinds of editing I can do in a PowerPoint presentation?

Editing is the act of making alterations to the content of your presentation. Some editing features are
inserted and deleted, undeleted, find and replace, cut/copy and paste, change the background picture,
modify transition, etc. Some of these commands are in the Edit pull-down menu and icons on the toolbar.

Tips for creating an effective presentation


● Maintain a clear message to keep your audience attentive. Keep the number of slides in your
presentation to a minimum.
● The audience must be able to read your slides from a distance. Generally speaking, a font size
smaller than 30 might be too difficult for the audience to see.
● Use bullets or short sentences, and try to keep each item to one line.
● Make a label for charts and graphs understandable.
● Apply subtle, consistent slide backgrounds.

Activity 3: Skill Building (10 min)


Direction: PowerPoint saves time, making it an obvious asset in the workplace. Relay an
incident from your own experience where you realized that PowerPoint saves time.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #10

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Before the time presentation slides were designed on computers, slides were made
by hand.
2. PowerPoint is a computer software program that lets you create a visual presentation.
3. Editing is the act of making alterations to the content of your document.
4. The PowerPoint contains tools to add a picture, choose a background, add charts &
graphs, and other visual objects to present an idea.
5. Creating an effective presentation is essential to maintain a clear message and keep
the slides at maximum number.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A. Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B. Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #10

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1.TRUE
2.TRUE
3.TRUE
4.TRUE
5. FALSE - Slides should be kept at a minimum.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #11

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: End User Tool Microsoft PowerPoint Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To learn how to craft a professional PowerPoint presentation
References:
https://kb.nmsu.edu/page.php?id=7
9385

"The way to get started is to quit talking and begin doing" – Walt Disney

A. LESSON PREVIEW/REVIEW
1) Introduction
Do you have an upcoming PowerPoint (PPT) presentation?

Writing a presentation can be a demanding process. How are you supposed to present everything
you know about a particular topic into a small, to-the-point presentation and articulate the whole
subject? It'll take some work, but the first step in figuring out how to make a business presentation
is to start now.

Activity 1: What I Know Chart (5 min)


What do you know about crafting a professional PowerPoint Presentation? Try answering the
questions below by writing your ideas under the What I Know column. You may use keywords or
phrases that you think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

How to craft a professional


PowerPoint presentation?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #11

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (20 min)

Crafting the PowerPoint presentation


The crafting process for PPT is not formed in isolation. One of the many contributing factors that need
to be planned to craft an effective presentation is the design. It is not pleasing to the audience if the
exhibition is designed poorly. Even if you have prepared for the presentation, it won't move the
audience without a clear design strategy that visually pulls your presentation together. The following are
critical steps to take:

1. Choose an appealing PPT template design – The slides need to be up-to-date and
relevant. Have you ever seen a presentation that used a template that looks like it's
outdated or overused? You can avoid this by downloading the latest template design for
free on the Microsoft website. You can also check on other sites such as Envato
Elements or Envato Market. You can choose from a variety of professional options.
2. Use presentation-relevant Presentation Graphic- Photos and graphics are a great
way to make a presentation more engaging. If they're chosen well, graphs allow your
audience to focus on the screen instead of what you're saying. If you decide to use a
graph or infographic to illustrate a point, choose one that's simple to read. Photos and
illustrations can be distracting. Use them when it adds to the understanding of your
point. When you use graphics assets, make sure they're relevant, in a current style, and
high-quality.
3. Keep it consistent- One big problem with PPT presentation occurs when you add
content. If you are not careful, you may end up with a PPT format that looks nothing like
the original template and more like a patchwork quilt. This is especially true if you add a
slide from other presentations. Color schemes from other documents, misaligned text,
varying fonts, and more are some of the problems that can afflict your presentation,
especially when built collaboratively. It would be best if you used the Master Slide
effectively to keep formatting consistent. Keep an eye on the presentation's overall look
and formatting details to create a consistent presentation that feels like a cohesive
whole.
4. Format Slide for readability- Your text formatting should be purposeful and visually
consistent. Your main points should act as headlines to a slide and should be a different
size from your body text. The fonts and sizes for each should remain the same
throughout all your slides. Remember that less is always more when it comes to what's
included on your PPT presentation slides. If you add too much, it can quickly clutter your
slide and confuse your points. You want your presentation slides to read clearly. The
beauty of PPT is that it offers you all the tools you need to format your slide quickly and
consistently. A presentation is about you and what you've got to say.
5. Keep it Simple- We often have so much we want to share in a presentation that you are
tempted to keep adding more text. But one of the most important things to remember

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #11

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

when designing your slides is to keep things simple. This is the case where less is more
effective. A cluttered slide is distracting and hard for the audience to digest. They spend
more time figuring out what to focus on: reading the slide or paying attention to the
presenter? Conversely, simple, visually appealing slides engage your audience while
keeping them on each of your main points.

Activity 3: Skill Building (10 min)


Direction: PPT is a helpful tool, making it an obvious asset in the workplace. Relay an
experience or any scenario where you were able to craft a PPT Presentation.

_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. It is better to have a single slide cluttered than using multiple slides in a PPT
presentation.
2. The beauty of PPT is that it offers you all of the tools you need to format your slide
quickly and consistently.
3. In crafting a PPT, less is always more. If you add too much, it can quickly clutter your
slide.
4. Photos and graphics are a great way to make a presentation more engaging.
5. Graphs allow your audience to focus on the screen.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #11

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (30 min)
A. Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B. Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1.FALSE – It is better to have multiple slides than a single cluttered slide.
2.TRUE
3.TRUE
4.TRUE
5. TRUE

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #12

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Digital Security Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To learn security safeguards: Protecting Computer and
Communications References:
study.com

“Try to learn something about everything and everything about something.”-Thomas


Huxley

A. LESSON PREVIEW/REVIEW
1) Introduction

How do you take care of your school supplies? Do you have a container for this? Like our tools,
computer systems must also be well configured. Let’s learn how we can keep it safe!

Activity 1: What I Know Chart (5 min)


What do you know about Protecting Computer and Communications? Try answering the
questions below by writing your ideas under the What I Know column. You may use keywords or
phrases that you think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What are Security Safeguards?

B. MAIN LESSON
Activity 2: Content Notes (20 min)

System Security
System security aims to protect information and property from theft, corruption, and other types of
damage while allowing the information and property to remain accessible and productive. System security
includes the development and implementation of security countermeasures. There are several different

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #12

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

approaches to computer system security, including the use of a firewall, data encryption, passwords, and
biometrics.

Firewall
One widely used strategy to improve system security is to use a firewall. A firewall consists of software
and hardware set up between an internal computer network and the Internet. A computer network
manager sets up the rules for the firewall to filter out unwanted intrusions. These rules are set up in such
a way that unauthorized access is much more difficult.

A system administrator can decide, for example, that only users within the firewall can access particular
files or that those outside the firewall have limited capabilities to modify the files. You can also set up a
firewall for your computer, and on many computer systems, this is built into the operating system.

Encryption
One way to keep files and data safe is to use encryption. Encryption is often used when data is transferred
over the Internet, potentially seen by others. Encryption is the process of encoding messages so that
authorized individuals can view them. An encryption key is used to make the message unreadable, and
a secret decryption key is used to decipher the message.

Encryption is widely used in systems like e-commerce and Internet banking, where the databases contain
sensitive information. If you have made purchases online using a credit card, you’ve likely used
encryption to do this.

Passwords
The most widely used method of preventing unauthorized access is through the use of passwords. A
password is a string of characters used to authenticate a user to access a system. The password needs
to be kept secret and is only intended for the specific user. In computer systems, each password is
associated with a particular username since many individuals may be accessing the same network.

Good passwords are essential to keeping computer systems secure. Unfortunately, many computer
users don’t use very secure passwords, such as the name of a family member or important dates - things
that would be relatively easy to guess by a hacker. One of the most widely used passwords - you thought
it - ‘password.’ Definitely not the correct password to use.

So what makes for a strong password?

● Longer is better - A long password is much harder to break. The minimum length should be eight
characters, but many security experts have started recommending 12 characters or more.
● Avoid the obvious - A string like ‘0123456789’ is too easy for a hacker, and so is ‘LaDyGaGa.’ You
should also avoid all words from the dictionary.
● Mix it up - Use a combination of upper and lowercase and add special characters to make a password
much more robust. A password like ‘hybq4’ is not very strong, but ‘Hy%Bq&4$’ is very strong.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #12

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Remembering strong passwords can be challenging. One tip from security experts is to come up with a
sentence that is easy to remember and to turn that into a password by using abbreviations and
substitutions. For example, ‘My favorite hobby is to play tennis could become something like
Mf#Hi$2Pt%.

Regular users of computer systems have numerous user accounts. Just consider how many stores you
regularly use: email, social networking sites, financial institutions, online shopping sites, and so on. A
regular user of various computer systems and websites will have dozens of different accounts, each with
a username and password. To make things a little bit easier on computer users, several different
approaches have been developed.

Biometric Security
Biometric security devices play a crucial role in verifying a person’s identity by enforcing access control
methods through their unique biological traits. This lesson will cover optical, fingerprint, and voice
recognition, which are used to identify and authenticate a person and protect the pros and cons of
using these devices.

Activity 3: Skill Building (10 min)


Direction: Below are statements that you can Consider in Creating A Secure Password. Shade
the thumbs up icon if the statement is a desirable one. Otherwise, shade the thumbs down
icon.

1. When creating a password, think of something with at least eight characters,


and mix it up a bit using numbers, symbols, and capitalization.
2. You might consider having a similar password for your online accounts.

3. Do not store your password in an email program as your stored password can
be retrieved by many of the computer’s spyware and viruses.
4. For security, use “auto-save” to save your password.

5. Avoid personal information like names in any form, birthdays, anniversaries,


simple passwords, words from the dictionary, common misspellings of
dictionary words, and social security numbers.

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity one and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #12

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

1. The secret to creating a hard-to-crack password that’s unique and easy to remember
focuses on making it memorable and making it hard to guess.
2. A strong password is your first line of defense against intruders and imposters.
3. Longer passwords are more challenging for thieves to crack.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let’s track your progress. Shade the session number you just completed.

B. Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 3:
Thumbs down: No. 2- Use different password for different accounts
No. 4 – Do not auto-save your password as others might be able to access it.

Activity 5:
1.TRUE 2.TRUE 3.TRUE

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #13

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Privacy Surveillance Data collector and Spies Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To learn about Privacy Surveillance: Data Collectors and Spies
References:
dataversity.net

"Try to learn something about everything and everything about something."-Thomas


Huxley

A. LESSON PREVIEW/REVIEW
1) Introduction

You arrive at your favorite restaurant, and you notice a guy in a blue jacket standing behind you.
You give him a friendly nod and go back to looking at the menu. While you're taking a sip from
your coffee during your office break, you notice that same guy in the blue jacket at a table outside
of the coffee shop. "Huh. Small world. What a coincidence," you think to yourself. Work is over,
and you went to a mall. While you're walking to the entrance, you glance around and see Mr.
Blue Jacket in a car in the parking lot. You get the sinking feeling that this third spotting isn't a
coincidence and that maybe this guy is following you.

What do you do?

Activity 1: What I Know Chart (5 min)


What do you know about the Data Collectors and Spies? Try answering the questions below by
writing your ideas under the What I Know column. You may use keywords or phrases that you
think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What are Data Collectors and


Spies?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #13

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (20 min)

Data Collectors and Spies

Americans have long been divided in their views about the trade-off between security needs and personal
privacy, including data privacy. Much of the attention has been on how the government collects data or
uses surveillance, though there are also significant concerns about how businesses use data. When a
terrorist attack happens, people tend to favor more surveillance by the government. Still, at the same
time, some people are becoming increasingly concerned about their privacy and protecting their civil
liberties.

New information about the extent that digital technologies have captured and sold a wide array of data
about individual's habits, preferences, prejudices, and personalities has alerted people to the amount of
data they have provided, either willingly or unwittingly, to data brokers.

People may ask, what is the difference between someone monitoring, surveying, or spying on me?" A
simplified explanation is that monitoring refers to the active or passive observation of people for
commercial reasons or to perform activities authorized by law. Most monitoring is not secret and can be
observed. Surveillance is a targeted form of monitoring, usually conducted to obtain specific data or
evidence and usually occurs without the person knowing they are being watched, such as data being
collected from apps without a person's knowledge.

Spying combines monitoring and surveillance with active intelligence gathering and data analysis to
discover what is occurring relative to the government or corporate interests. Espionage can be used in
the interest of national security by unscrupulous corporations to learn trade secrets or have the media
sway individuals' opinions about political candidates, high-profile individuals, or national interests.

Data Modelers and Data Governance Experts

As privacy and data security issues increasingly permeate companies' activities, we data people need to
think about how the data we handle and manage affects our companies and our customers. Data is
being closely studied as something organizations can monetize, but with these opportunities comes risk.

Are we positive that the ways our corporations want to sell personal data meet current privacy laws and
regulations? Are there security practices in place to guard against unauthorized use of the data? As
data is sold, companies must consider their customer's desire for data privacy and what it would mean
to a company's stock value if there was a loss of goodwill.

As companies sell their customer's data, breach litigation will become a necessary cost of doing business.
Any loss of data could result in an expansion of what is considered injury in those cases. A relatively
modest litigation cost can become a considerable expenditure for companies with a breach where
"stolen" data was used to obtain false mortgages, open bank accounts, or file fraudulent tax returns.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #13

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Data Modelers and Data Governance experts need to work with the company's security experts to create
policies and procedures designed to handle confidential data within the organization and decide which
data can be safely exposed to vendors and others outside the firm.

Activity 3: Skill Building (10 min)


Direction: Way back in 1997, an engineer working for Gillette faxed and emailed confidential
documents to its competitors. He was sentenced to 27 months in prison for the theft of trade
secrets and, at his trial, explained his motivation for stealing the documents was anger at his
supervisor. It may seem like a silly reason to steal a company's information, but corporate
espionage by an upset employee happens more often than you think. As a business owner, think
of at least 3 ways to defend yourself against corporate data collectors and spies.

1.

2.

3.

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Spying combines monitoring and surveillance with active intelligence gathering and
data analysis to discover what is occurring relative to the government or corporate interests.
2. The goal for all data collection is to capture quality evidence that allows analysis to
lead to the formulation of convincing and credible answers to the questions that have been
posted.
3. Data collection is the process of gathering and measuring information on targeted
variables in an established system, which then enables one to answer relevant questions
and evaluate outcomes.
4. Data collection is a component of research in all fields of study but not including
physical and social sciences, humanities, and business.
5. A formal data collection process is unnecessary as it ensures that the data gathered
are both defined and accurate.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #13

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A. Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B. Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1.TRUE 2.TRUE 3.TRUE
4. FALSE - Data collection encompasses all fields of study.
5.FALSE - A formal data collection process is necessary

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #14

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Digital Laws and Ethics in Business Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To know the computer and internet crimes and the cybercrime law
2. To know the ten commandments of computer ethics References:
chadwestlaw.com
english4it.com

"Tell me, and I forget. Teach me, and I remember. Involve me, and I learn." -Benjamin
Franklin

A. LESSON PREVIEW/REVIEW
1) Introduction

When it comes to Internet crime, only a few offenses make headlines. We all know the
downloading of music, images, and movies without consent is illegal, but what else is going down
on the world wide web that's landing people behind bars? A lot. People worldwide use the Internet
to commit a host of crimes, some of which the public doesn't even know can be done
electronically.

Activity 1: What I Know Chart (10 min)


What do you know about Computer and Internet Crimes? Try answering the questions below by
writing your ideas under the What I Know column. You may use keywords or phrases that you
think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What are computer crimes?

What are internet crimes?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #14

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (50 min)

Online Impersonation

This crime is by far one of the most commonly committed cybercrimes in existence. It is a criminal
act to use another person's name, domain address, phone number or any other identifying information
without consent to make a recipient believe that a message is indeed coming from the impersonated
individual. However, it is common to hear about pretending to be someone else on the Internet if a
person uses someone else's name or other identifying information on the Internet without consent.
To cause harm or commit fraud is a crime.

Social Network Fraud

It is also a crime to create fake profiles or send fake messages to other social media users. If a social
media user creates a fake profile to impersonate another person without the other person's consent,
that action could be criminal. But a crime has only truly been committed if the fake user has the
purpose of causing harm, committing fraud, or intimidating or threatening someone with the fake
profile or fake messages. It remains to be seen if merely "catfishing" someone rises to a crime level
under this statute.

Cyberbullying

Cyberbullying occurs when people use social media or the Internet to intimidate, harass, threaten or
belittle others. In general, if a person or student uses the Internet or any other form of electronic
communication to threaten, harass or scare another person or student, this conduct may be a crime.
Furthermore, such actions carry the possibility of civil liability as well.

Trafficking Passwords

Password trafficking, a criminal offense under most jurisdictions, is the act of sharing, selling, or
buying stolen passwords. While some hackers or scammers may use the passwords they have stolen
for direct personal gain, others may, instead, try to sell them to third parties. Once they have bought
a password from a hacker, criminals can then use it to, for example, gain access to the victim's bank
account or his records.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #14

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Cyber Extortion

Cyber extortion, known by the relatively less exciting name of "threatening to damage a computer,"
is just the high-tech variation of old-fashioned extortion. It is a crime to threaten to damage someone's
computer to extort money, information, or anything else of value from a person. This crime applies to
cybercriminals who threaten to delete, shut down, or damage computers or systems unless their
demands are met. Extortionists frequently use computer viruses, malware, or distributed denial of
service (DDoS) attacks to force their victims to comply.

Creating or Possessing Child Pornography

Creating, possessing, or distributing pornographic images of a minor child is illegal, but this crime is
still unfortunately committed far too often. Almost every state has outlawed the possession, creation,
and distribution of child pornography. Child sexual abuse material (legally known as child
pornography) refers to any content that depicts sexually explicit activities involving a child. Visual
depictions include photographs, videos, digital or computer-generated images indistinguishable from
an actual minor. These images and videos that involve the documentation of an actual crime scene
are then circulated for personal consumption.

Identity Theft

The problem of identity theft existed well before developing the Internet, but technology has allowed
identity theft to flourish these days. Identity thieves often use computers to steal and sell social
security numbers, bank account information, or credit card information. Though it is illegal to steal
and use other people's sensitive personal information, identity theft continues to grow in popularity,
and it is rapidly becoming one of the most frequently perpetrated computer crimes.

Unauthorized System Access

It is illegal to access a computer, computer network, or computer system without the owner's consent.
In layman's terms, "hacking" into another person's computer or structure is a crime. Though hacking
is usually only committed to perpetrating one of the other crimes on this list, the mere act of hacking
is itself a criminal act.

Internet Piracy

Though this crime is much less common than it used to be in the early 90s, internet piracy still occurs
in some Internet regions. Internet piracy involves the unlawful dissemination of copyrighted material
without the permission of the owner. This can include the illegal sharing of movies, video games, e-

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #14

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

books, and other software on the Internet. Since internet piracy is regulated under copyright laws,
piracy is a federal crime.

The 10 Commandments of Computer Ethics

Ethics is a branch of philosophy that deals with determining what is right and wrong. Listed below are ten
commandments to help you understand computer ethics. Anyone working in the field of IT is going to
encounter a lot of ethical problems. Why? Because computers are potent and IT professionals are like
wizards controlling this technology. We all know from watching Harry Potter movies that wizards can be
good or bad, and so can IT professionals. Non-technical people are increasingly dependent on and
trusting of information technology. If the next 20 years is anything like the last 20 years, the future is very
bright for IT workers. This is why IT professionals need to study and practice computer ethics.

People rely on computers to handle the more tedious details of their social, business, and financial lives.
Imagine what would happen if an enemy or a business competitor got access to your email account, bank
account, Facebook profile, and company website? They could destroy your reputation in a matter of
hours. This is why we need to study Computer Ethics.

The idea of Computer Ethics was invented in 1950 by MIT professor Norbert Wiener. Norbert predicted
that the world would undergo "a second industrial revolution" — an "automatic age" with "enormous
potential for good and evil." Today we live in that world! Why did he say this? Airplane drones can bomb
a target while the pilot is safe in a computer room thousands of miles away. Criminals can use phishing
and other social engineering techniques to steal your financial information while sitting safely in another
country. Companies can create confusing privacy policies to gather and use information about you
without your knowledge or consent. Governments can block access to information using firewalls. These
are all grave ethical violations that happen every day.

The main concerns of computer ethics are Internet privacy, cracking, copyright infringement, and Internet
control. The Computer Ethics Institute (CEI) has laid these ten commandments down for people to follow.
Below each of the 10 Commandments. The following are explanations to further expound the topic. I
have put some comments to explain what the commandment means to me.

Rule #1: Thou shalt not use a computer to harm other people.
You should not program a computer to do dangerous things to people. For example, to program a robot
to kill people, make viruses, or mass destruction weapons. What this means is that computers are not an
excuse to do bad things to people. The programmer is responsible for the actions of his programs.

Rule #2: Thou shalt not interfere with other people's computer work.
Everyone has the right to use computers. Likewise, creating a computer virus is wrong because it wastes
people's time and money and destroys potentially valuable property. As the hippies used to say: "Live
and let live!"

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #14

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Rule #3: Thou shalt not snoop around in other people's computer files:
It is illegal to open and read someone's real physical mail, and it is also unlawful to spy on network
connections and read someone's email, passwords, files, databases, etc.

Rule #4: Thou shalt not use a computer to steal.


This one is obvious. Stealing is just as bad with a computer or without one. Use your IT powers for good!

Rule #5: Thou shalt not use a computer to bear false witness.
This commandment means that you shouldn't use a computer to create false facts. For instance, you are
photoshopping a picture to make an innocent man look guilty. Perhaps another equally important
commandment should be, "Don't believe everything you see on the Internet." Like in traditional media, it
is common to spread half-truths, exaggerations, lies, and rumors on the Internet.

Rule #6: Thou shalt not copy or use proprietary software for which you have not paid.
Think about how hard it is to write good software. Think about all the people and costs involved. You
have two choices: 1) buy a license or 2) find an open-source alternative. Using pirated software is
unethical, and it may also be dangerous due to hidden malware.

Rule #7: Thou shalt not use other people's computer resources. Without authorization or
proper compensation.
Is it ethical to use a neighbor's lawnmower or mixer without telling them? How about their Internet
connection? No, it isn't! Is it legal or ethical to do bad things on a computer while logged in as someone
else? No, it isn't! Don't do it!

Rule #8: Thou shalt not appropriate other people's intellectual output.
If you copy text or images from a website and post them on your website, it is a crime in most countries
and not ethical. Why? You are causing irreparable damage to the creator of the content. Why not get a
life and create your own unique and original content? You will be much happier in the long run, making
new things rather than stealing from other people.

Rule #9: Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
Do you write software that helps people steal, kill, spy, gamble, or spread pornography? Please ask
yourself why. Is there a way you can use your IT talents for good purposes? Wouldn't the world be a
better place if everyone was engaged in positive behavior instead of hostile action? Think about it!

Rule #10: Thou shalt always use a computer in ways that ensure consideration and respect for
your fellow humans.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #14

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Things that you do 'online' can have real effects on your 'offline life as well. Perhaps Mark Zuckerberg,
the founder of Facebook, said it best, "Having two identities for yourself is an example of a lack of
integrity."

Activity 3: Skill Building (20 min)


Direction: In April 2018, Cynthia Lockwood, who worked as a security officer in the Buffalo,
NY Public Schools, was arrested as part of an eight-member child identity theft ring.
Lockwood was accused of using a 12-year-old victim's Personally Identifiable Information (PII)
to gain access to more than $25,000 in credit. Law enforcement and Social Security officials
discovered over a 16-month investigation that she was a member of an eight-member ring that
stole Social Security numbers (SSNs) belonging to children — one as young as 11 — across
the country. The ring would use the SSNs to open credit cards and ultimately run up $420,000
in bogus purchases. Several identity theft ring members were subsequently arrested and
charged with first-degree identity theft and a first-degree scheme to defraud. Other charges
included third-degree robbery, second-degree possession of a forged instrument, and
second-degree identity theft. Based on the case cited, explain why identity thieves target
children and ways to avoid the financial impact of identity theft.

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #14

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (10 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Privacy is one of the minor issues that has emerged since the Internet has become part
of many aspects of daily life.
2. Internet users hand over personal information to sign up or register for services without
realizing that they are potentially setting themselves up for privacy invasions.
3. Obtaining other people's non-public files should be judged the same way as breaking
into their rooms and stealing their documents.
4. Using a computer to break into a company's accounts or a bank and transferring money
should be judged the same way as robbery.
5. The Internet can spread untruth as fast as it can extend the truth.
6. Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted
book.
7. Hacking a system to break and bypass the authorization is unethical.
8. Copying somebody else's program with proper authorization is software piracy and is
unethical.
9. Like public buses or banks, people using computer communications systems may find
themselves in situations where there is some form of queuing. You have to wait for your
turn and generally be nice to other people in the environment.
10. The fact that you cannot see the people you are interacting with does mean that you can
be rude.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #14

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:
Activity 5:
1.FALSE 2.TRUE 3.TRUE 4.TRUE 5.TRUE
6.TRUE 7.TRUE 8.FALSE 9.TRUE 10.FALSE

1.) FALSE – Privacy is a significant Issue.


8.) FALSE – copying someone else's program with proper authorization is not unethical.
10.) FALSE – The fact that you cannot see the people you are interacting with, the more reason you
should be kind to them because you don't know who you are talking to.

This document is the property of PHINMA EDUCATION 8


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Digital Laws and Ethics in Business Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To know the applicable Philippine laws that penalize cybercrime
2. To know the Intellectual Property Law References:
technology.inquirer.net
freibrunlaw.com

"Today, knowledge has power. It controls access to opportunity and advancement." –


Peter Drucker

A. LESSON PREVIEW/REVIEW
1) Introduction

People talk a lot in the information technology business about "intellectual property rights." But
what are they? How do they apply to information technology? Why should you protect them?
How do you protect them?

Activity 1: What I Know Chart (10 min)


What do you know about Applicable Philippine Laws that Penalize Cybercrime and Intellectual
Property Law? Try answering the questions below by writing your ideas under the What I Know
column. You may use keywords or phrases that you think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What Applicable Philippine Laws


that Penalize Cybercrime?

What is Intellectual Property Law in


Information Technology?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (50 min)

Applicable Philippine Laws that Penalize Cybercrime

Republic Act No. 10175, or the Cybercrime Prevention Act of 2012, was signed into law by President
Aquino on Sept. 12, 2012. Its original goal was to penalize acts like cybersex, child pornography, identity
theft, and unsolicited electronic communication in the country. However, a provision expanding the scope
of libel law to cover Internet posts was opposed by various groups, which asked the Supreme Court to
issue a temporary restraining order (TRO) and a status quo ante order.

The cybercrime law could see Internet users sentenced to up to 12 years in prison for posting defamatory
comments on Facebook or Twitter. The online libel was not part of the original bill proposed by the
Department of Justice (DOJ) but was one of the Senate's amendments submitted by Sen. Vicente Sotto
III.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

On Oct. 9, 2012, six days after the law took effect, the Supreme Court issued a four-month injunction
while scrutinizing the law for possible violations of constitutional provisions on freedom of expression. On
Feb. 6 last year, the high court extended the TRO indefinitely. RA 10175 punishes content-related
offenses such as cybersex, child pornography, and libel which may be committed through a computer
system. It also penalizes unsolicited commercial communication or content that advertises or sells
products or services.

But there are exemptions relating to the sending of unsolicited material: It is not a crime if there is prior
consent from the recipient, the communication is an announcement from the sender to users, and if there
is an easy, reliable way for the recipient to reject it, among others. Individuals found guilty of cybersex
face a jail term of prison mayor (6 years and one day to 12 years) or a fine of at least P200,000 but not
exceeding P1 million.

Child pornography via computer carries a penalty one degree higher than that provided by RA 9775, or
the Anti-Child Pornography Act of 2009. Under RA 9775, those who produce, disseminate, or publish
child pornography will be fined from P50,000 to P5 million and slapped a maximum jail term of reclusion
Perpetua or 20 to 40 years. Persons found guilty of unsolicited communication face arrest mayor

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

(imprisonment for one month and one day to 6 months) or a fine of at least P50,000 but not more than
P250,000, or both.

The law also penalizes offenses against the confidentiality, integrity, and availability of computer data
and systems, such as illegal access, illegal interference, data interference, system interference, misuse
of devices, and cybersquatting. It defines cybersquatting as acquiring a domain name on the Internet in
bad faith or with the intent to profit, mislead, destroy one's reputation or deprive others of registering the
same domain name. Also covered by the law are computer-related forgery, fraud, and identity theft.

As many as 87 percent of Filipino Internet users were identified as victims of crimes and malicious
activities committed online, according to a November 2012 primer released by the DOJ, which quoted a
2010 report of the security software firm Symantec. These included being victimized in malware (virus
and Trojan) invasion, online or phishing scams, and sexual predation.

From 2003 to 2012, the Anti-Transnational Crime Division of the Criminal Investigation and Detection
Group of the Philippine National Police looked into 2,778 referred cases of computer crimes from
government agencies and private individuals nationwide

Intellectual Property Rights – What They Are and How to Protect Them

Intellectual property rights are at the foundation of the software industry. The term refers to a range of
intangible rights of ownership in an asset, such as a software program. Each intellectual property "right"
is itself an asset, a slice of the overall ownership pie. The law provides different methods for protecting
these rights of ownership based on their type.

There are essentially four types of intellectual property rights relevant to software: patents, copyrights,
trade secrets, and trademarks. Each affords a different kind of legal protection. Patents, copyrights, and
trade secrets can be used to protect the technology itself. Trademarks do not protect technology, but the
names or symbols used to distinguish a product in the marketplace.

Patents

A patent is a twenty-year exclusive monopoly on the right to make, use and sell a qualifying invention.
This legal monopoly is considered a reward for the time and effort expended in creating the design. In
return, the design must be described in detail to the Patent Office, which publishes the information, thus
increasing the amount of technical knowledge available to the public.

To obtain a patent, an inventor must apply to the Patent Office and demonstrate that the invention is new
(compared to prior technology), practical, and "nonobvious." A design is nonobvious if it is more than a
trivial, obvious next step in advancing the technology.

Software patents can be practical economic tools. They can protect features of a program that cannot be
covered under copyright or trade secret law. For example, patents can be obtained for ideas, systems,

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

methods, algorithms, and functions embodied in a software product: editing functions, user-interface
features, compiling techniques, operating system techniques, program algorithms, menu arrangements,
display presentations, or arrangements, and program language translation methods.

Since patent rights are exclusive, anyone making, using, or selling the patented invention without the
patent owner's authorization is guilty of infringement. Penalties are stiff and include triple damages. Once
a patent for an invention is granted, subsequent "independent" (i.e., without access to the patented
technology) development of the design by another inventor is still considered infringement.

Copyrights

While a patent can protect the novel ideas embodied in a software program, a copyright cannot. Copyright
protection extends to the particular form in which an idea is expressed. In software, copyright law would
protect the source and object code and certain unique original user interface elements.

The owner of a copyrighted software program has certain exclusive rights (with some exceptions): the
right to copy the software, create derivative or modified versions of it, and distribute copies to the public
by license, sale, or otherwise. Anyone exercising any of these exclusive rights without the copyright
owner's permission is an infringer and subject to liability for damages or statutory fines.

As with patents, the exclusive rights afforded under copyright law are intended to reward the creative and
inventive efforts of the "author" of the copyrighted work. The exclusive right to control duplication protects
the owner of copyrighted software against the competition that would result from verbatim copying of the
program's code. Copyright law also defends against indirect copying, such as unauthorized translation
of the code into a different programming language.

Copyright protection arises automatically upon the creation of an original work of authorship. There is no
need to "apply" for copyright or register the copyrighted work for protection to exist. Generally, the
duration of a copyright is the author's life plus fifty years. In the case of software created by an employee
in his or her employment, the resulting "work made for hire" would be protected by copyright law for
seventy-five years from publication.

In contrast with patents, independent development of a copyrighted work is a defense to an allegation of


copyright infringement. Imagine, though, how unlikely it would be for the same thousands of code lines
to be created independently by one not engaged in unauthorized copying.

Trade Secrets

A trade secret is any formula, pattern, compound, device, process, tool, or mechanism that is not
generally known or discoverable by others. The trade secret is maintained in secrecy by its owner and
gives its owner a competitive advantage because it is kept secret. The classic example of a trade secret
is the formula to Coca-Cola.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

A trade secret can theoretically last forever — for as long as its owner uses reasonable efforts to keep it
secret and someone else doesn't independently create or "discover" it.

Many software features, such as code and the ideas and concepts reflected in it, can be protected as
trade secrets. This protection lasts as long as the protected element retains its privileged trade status.
Unlike patents, trade secret protection will not extend to software elements that are readily ascertainable
by lawful means, such as reverse engineering or independent development.

Trade secrets are not subject to being "infringed," as with patents and copyrights, but are subject to theft.
Their legal status as a protectable intellectual property right will be upheld if the owner can prove the
trade secret was not generally known and reasonable steps were taken to preserve its secrecy.

Maximizing a software asset's economic value critically depends on understanding the nature of the
intellectual property rights involved and how best to use the available legal protection forms to protect
those rights.

Activity 3: Skill Building (20 min)


Direction: Using the table presented on the next page- Cybercrime on the rise over the last 6
years, give at least five conclusions that you can derive from the information shown.

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (10 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Cybersquatting is the acquisition of a domain name on the Internet in good faith or with
the intent to profit, mislead, destroy one's reputation or deprive others of registering the
same domain name.
2. Each intellectual property "right" is itself an asset, a slice of the overall ownership pie.
3. Since patent rights are exclusive, anyone making, using, or selling the patented
invention without the patent owner's authorization is not guilty of infringement.
4. Once a patent for an invention is granted, subsequent "independent" (i.e., without
access to the patented technology) development of the invention by another inventor is
not considered infringement.
5. Maximizing a software asset's economic value critically depends on understanding the
nature of the intellectual property rights involved and how best to use the available legal
protection forms to protect those rights.
6. Trade secrets are not subject to being "infringed," as with patents and copyrights, but
are subject to theft.

This document is the property of PHINMA EDUCATION 8


ACC 123: IT Application Tools in Business
Student Activity Sheet #15

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

7. A trade secret is any formula, pattern, compound, device, process, tool, or mechanism
that is not generally known or discoverable by others. The trade secret is maintained in
secrecy by its owner and gives its owner a competitive advantage because it is kept
secret.
8. In contrast with patents, independent development of a copyrighted work is a defense
to an allegation of copyright infringement.
9. Unlike patents, copyright law affords no protection to the ideas underlying the program.
10. Ideas and concepts are fair game for competitors because they are not protected by
patents or trade secrets.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?

2.What question(s) do you have as we end this lesson?

KEY TO CORRECTIONS:
Activity 5:
1.FALSE 2.TRUE 3.FALSE 4.FALSE 5.TRUE
6.TRUE 7.TRUE 8.TRUE 9.TRUE 10.TRUE

1.) FALSE - Acquisition of a domain name in bad faith.


3.) FALSE - Using or selling a patented invention without authorization is guilty of patent infringement.
4.) FALSE - This is also considered patent infringement.

This document is the property of PHINMA EDUCATION 9


ACC 123: IT Application Tools in Business
Student Activity Sheet #16

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Digital Laws and Ethics in Business Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To learn about Social Networking.
References:
brand24.com
whatis.techtarget.com

"Those people who develop the ability to continuously acquire new and better forms of
knowledge that they can apply to their work and their lives will be the movers and shakers
in our society for the indefinite future." – Brain Tracy

A. LESSON PREVIEW/REVIEW
1) Introduction

The Internet and particularly social media have opened the world of global interactions. It is not
a problem anymore to keep in touch with friends and relatives from other parts of the world.
Social networking sites have grown to global societies of billions of virtual inhabitants. Facebook
has 2.4 billion users, making it one of the most significant communities globally (bigger than
China's population!).

Activity 1: What I Know Chart (5 min)


What do you know about Social Networking? Try answering the questions below by writing your
ideas under the What I Know column. You may use keywords or phrases that you think are related
to the questions.

What I Know Questions: What I Learned (Activity 4)

What is Social Networking?

B. MAIN LESSON
Activity 2: Content Notes (20 min)

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #16

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

What is Social Networking?

Social networking is expanding the number of businesses and social contacts by making connections
through individuals, often through social media sites such as Facebook, Twitter, LinkedIn, and Google+.

Depending on the social media platform, members may be able to contact any other member. In other
cases, members can contact anyone they have a connection to, and subsequently anyone that contact
has a link to, and so on. Some services require members to have a preexisting relationship to contact
other members.

While social networking has gone on almost as long as societies themselves have existed, the Web's
unparalleled potential to facilitate such connections has led to an exponential and ongoing expansion of
that phenomenon. In addition to social media platforms, the capacity for social interaction and
collaboration is increasingly built into business applications.

How can you leverage these platforms in your business? And what is good about social
networking?

1. Social networking makes relationships more personal


Social media is a two-way channel where you have an opportunity to build a rapport with your clients and
prospects. These platforms are not about the fantastic sales pitch you deliver to the audience.

Social networking is all about interactions and open dialogue with users. Social media helps you
humanize a brand and build genuine relationships with your community. It shortens the distance from
your audience, primarily when you address them from personal accounts.

PlayStation effectively leverages social media to amplify relationships with players. They engage in
discussions with immediate and adequate responses that resonate with the community. They show the
human face of the brand and win the hearts of clients.

2. You can promote your business more effectively


According to a study, 78 percent of small businesses attract new customers through social media.

The most common way to promote a business on social networking sites is advertising.

Thanks to the advanced options of targeting and remarketing, you can address the message to the
audience that would more likely be interested in your products and services. Facebook and Twitter paid
to advertise are relatively cheap, and with a well-knitted social media strategy, your efforts will pay off.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #16

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

However, paid to advertise is not the only way to reach out to target customers. A more time-consuming
but effective method to get a new customer is reaching out to consumers who report a specific need that
your company can fulfill.

3. You get valuable insights about the audience and your business
Users ask, recommend, but they also share reviews.

They are the best source of information for product development. They are the ones who use your service
so they know best what can be improved to fit their needs.

If something does not work well, they will likely report it on social media, exposing it to many other
consumers. Their feedback is gold for getting answers about your customers' preferences and behavior.
Use it to find inspiration and ideas for new variants of your products and improvements in a current offer.

4. Social networking induces loyalty


According to a report published by Texas Tech University, brands that regularly engage in social media
conversations tend to observe an increased brand loyalty.

When your company is present on social networking sites, you are more approachable and reliable in
customer's and prospects' eyes.

This is directly connected to the first point of this article. If you can build more personal and genuine
relationships with a community, customers will be less likely to switch between brands. Showing them a
human face will make you a sort of their friend rather than just another company that sells good products
and is replaceable. Remember that it is much easier to swap a service provider, but it can be harder to
dump a close mate.

5. Social media increases website traffic


Finally, social networking presence is essential in attracting traffic to your website. Not only it directly
drives traffic to a page, but it also improves search ranking. As you probably know, SEO (Search Engine
Optimization) is an enduring and laborious process that helps you get to the top of Google's search
results. External links, number of visits, selected keywords, and website content impact how well you turn
out against your competitors in search engines. Social media can help you improve these factors, both
thanks to direct traffic and shared links through social media users' profiles.

Activity 3: Skill Building (10 min)


Direction: Imagine a business you could start or run at home. What type of business is it? Which
of the five stated advantages will you consider in using social networking in your business?
Explain how this advantage can help in the growth of your business.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #16

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Marketers use social networking to increase brand recognition and encourage


brand loyalty.
2. A company cannot use social networking to demonstrate its customer service level
and enrich its relationships with consumers.
3. The constantly evolving nature of social networking makes it challenging to keep up
with changes and not influence its marketing success rate.
4. The most common way to promote a business on social networking sites is
advertising.
5. Social media is a two-way channel where you have an opportunity to build a rapport
with your clients and prospects.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A. Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B. Think about your Learning

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #16

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1.TRUE 2. FALSE 3. FALSE 4.TRUE 5.TRUE

2.) FALSE- A company can use social networking to increase brand recognition.
3.) FALSE- Social networking will influence a company's marketing success rate.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Malware Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To identify Cyber-Attacks and Types of Malwares
References:
stanfieldit.com
enterprise.comodo.com
searchsecurity.techtarget.com
kaspersky.com

"Developing a desire to learn is the kindling point of all classroom achievement." -Robert
John Meehan

A. LESSON PREVIEW/REVIEW
1) Introduction

Have you ever had an illness like a cold or a cough? How did you get it? Are you just infected?
How did you feel when you had it? How did you recover from your illness? How can you prevent
getting a cold or cough? The computer also gets sick like humans. Just as a person gets sick
because of a virus, so does a computer. Let's find out how!

Activity 1: What I Know Chart (10 min)


What do you know about Cyber Attacks and Malware? Try answering the questions below by
writing your ideas under the What I Know column. You may use keywords or phrases that you
think are related to the questions.

What I Know Questions: What I Learned (Activity 4)

What are cyber-attacks?

What is malware?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (50 min)

What is a Cyber Attack?


In short, a cyber attack is the deliberate exploitation of a computer system or network. For example, a
hacker may use malicious code to exploit a vulnerability in the system. This code is designed to execute
a command that leads to a disruption in the natural sequence of events. As a result, the target ends up
with compromised or stolen data. This can then be used for various cybercrimes.

To sum up, a cyber attack could leave you with several results that affect you negatively. That is to say;
you could be subject to anything from identity theft or fraud to ransomware, stolen data, malware attacks,
IP theft, website defacement, and more.

Who Is At Risk Of A Cyber Attack And Why?


At first glance, it may seem counter-intuitive. But more than anyone else, small businesses need to be
wary of cyberattacks. Small businesses present a tempting target for attackers for a few reasons.

Small-to-medium businesses (SMBs) are less likely to have stringent security measures and appropriate
incident response plans in place. Therefore, attackers find SMBs far easier to infiltrate and exploit.
Additionally, they often don't have the means to defend or recover from an attack quickly, so they'll cough
up the dough in a ransomware attack to get their data back.

The cost of a data breach is significantly more than most realize, and the financial hit is a huge one that
many small businesses may not recover. So, as they say, prevention is better than cure.

Above all, attackers are looking for two factors in a victim. Firstly, ease of access. Secondly, the potential
reward. Small businesses often check that first box with minimal cybersecurity measures. Furthermore,
depending on the type of business, the data onboard may be ultra juicy and worth quite a bit financially.
So, they may sell the information to other malicious parties or hold the data hostage for a significant
ransom. Don't make it easy for them!

Nine Cyber Attacks To Watch Out For

1. My Email Account Was Hacked

What Signs Do I Look For?


Here are some signs that your email account has been hacked. Look for the following:
● Your password has changed
● There's unusual inbox activity (check sent mail, read messages, no incoming emails)

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

● You've received password reset emails from other sites


● Account access from unexpected IP address/s (your email provider usually records this information)
has occurred
● Your email contacts (whether within or outside of your business) let you know that they have received
strange emails from you

2. System Account Details Are Compromised

What Signs Do I Look For?


● Your computer speed has slowed down significantly
● Your security software has been disabled or compromised
● Software or browser add-ons appear that you don't recognize
● Random shutdowns and restarts are happening
● You've lost access to your account

3. My Online Storage Account Was Hacked

What Signs Do I Look For?


Some examples of online storage accounts include DropBox, Google Drive, OneDrive, and iCloud.
● Your site suddenly has content that shouldn't be there
● You cannot access your account
● Files are missing/altered
● There's an unusual outbound network traffic
● You're being notified of unexpected access locations and logins
● A large number of requests for the same object/file have been received
● Suspicious admin activity (see the previous attack)
● Excessive read operations (someone is trying to gather data)
● Contacts receive emails with files/links to open (make sure they don't open them!)

4. I Received a Blackmail Email Demand

What Signs Do I Look For?


● An email stating that they have incriminating evidence on you (this may or may not be a bluff)
● An email may claim they have accessed your password through a keylogger
● They threaten to expose you to your contacts
● They make a demand for payment (most likely in BitCoin)

5. My Social Media Has Been Hacked

What Signs Do I Look For?


● Changes to your follower count
● Friend or contact requests you didn't make
● Duplicate accounts requesting your friends/contacts

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

● Posts that you did not make


● Old posts suddenly deleted
● Password has been changed
● Notification that your account was accessed from a new location/device

6. Our Network Has Been Attacked

What Signs Do I Look For?


● Your files and server have been encrypted
● The network becomes very sluggish/slow
● Your data usage is unusually high
● Programs are continually crashing
● You received a ransomware message
● Computers are functioning without local input

7. There's Been a Fraudulent Financial Transaction

What Signs Do I Look For?


● Money has been transferred to the wrong account
● Account deductions that you didn't authorize
● Suspiciously large orders that don't match usual order activity
● Unexpected invoices that have not been verified
● Large payments not arriving despite remuneration advice
● Advice to change address or bank details without the appropriate cross-checks

8. We Got Infected With A Malware Cyber Attack

What Signs Do I Look For?


● Prolonged computer processing
● Programs opening and closing automatically
● Lack of storage space
● New programs/add-ons that you did not install
● Security software disabled
● Excessive pop-ups
● Browser keeps redirecting sites

9. I Received a Suspicious Phone Call

What Signs Do I Look For?


● You're being offered money or a free product that you didn't enter to win (reminder: if it seems too
good to be true, it usually is!)
● Any call that claims to have detected viruses or infections on your computer
● Calls that claim you owe taxes or other government payments

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

● If the caller deflects or refuses to answer your questions


● The caller is pushing you to make an immediate financial decision
● The caller is threatening deportation or arrest

Malware

Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware
can include computer viruses, worms, Trojan horses, and spyware. These malicious programs can perform
various functions such as stealing, encrypting, deleting sensitive data, altering or hijacking core computing
functions, and monitoring users' computer activity without their permission.

Different types of malware contain unique traits and characteristics. Types of malware include:

● A virus is the most common type of malware which can execute itself and spread by infecting other
programs or files.
● A worm can self-replicate without a host program and typically spreads without any human
interaction or directives from the malware authors.
● A Trojan horse is designed to appear as a legitimate program to gain access to a system. Once
activated following installation, Trojans can execute their malicious functions.
● Spyware is made to collect information and data on the device user and observe their activity without
their knowledge.
● Ransomware is designed to infect a user's system and encrypt the data. Cybercriminals then
demand a ransom payment from the victim in exchange for decrypting the system's data.
● A rootkit is created to obtain administrator-level access to the victim's system. Once installed, the
program gives threat actors root or privileged access to the system.
● A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected
system that allows threat actors to remotely access it without alerting the user or the system's security
programs.
● Adware is used to track a user's browser and download history to display pop-up or banner
advertisements that lure the user into purchasing. For example, an advertiser might use cookies to
track user visits better target advertising.
● Keyloggers also called system monitors, are used to see nearly everything users do on their
computer. This includes emails, opened web pages, programs, and keystrokes.

How To Identify Malware Attack in Computer

Many people have no idea that a malware attack has targeted their computer until it is too late. Primary
reasons for falling victim to malware attacks are having no antivirus software installed on the computer,
having out-of-date antivirus software, or having poor browsing habits like visiting suspicious websites and
clicking links from unknown senders.

Malware variants are evolving at an incredible pace and are socially engineered to trick users into
downloading them. Malware attacks can wipe out your favorite music files, pictures, videos, and documents

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

- almost instantly! They can lock down your computer, make it inoperable, record your browsing activities,
and steal private banking details.

Here are some tips for identifying malware attacks on your computer: Your computer will show specific
symptoms when it gets infected with malware. It is essential to know most of these symptoms because they
will help ensure that you detect malware in time. This will help you eliminate the malicious program before it
has enough time to damage your computer and your data.

Malware Symptoms:

1. Annoying Pop-up Messages On Your Computer Screen

If you notice strange pop-up messages on your computer screen, it may be a malware attack. Adware is a
group of malware that generates these pop-ups. The main intention of adware is to gain permission that will
then allow it to install additional malicious software.

If you download that additional software, it may then delete or steal your data. Some of these pop-up
messages can also be used to bombard your computer with unwanted information such as advertisements.
The best way to get rid of malware such as adware is to use good antivirus software.

2. Your Computer Becomes Sluggish And Inoperable At Times

Since malware programs your computer resources to operate, it can overwhelm your computer by taking up
many CPU and memory resources. This can slow down your computer and sometimes make it unusable.

Some malware uses your internet connection to give access to the remote hacker. This may slow down your
internet connection to a large extent, making it difficult for you to browse the internet.

If your computer has suddenly slowed down, you should install a good antivirus program. An antivirus
program will prevent the malware from running background resources. It can also isolate the malware,
keeping it from using your computer's memory.

3. Your Files Are Missing or Deleted Without Your Knowledge

When malware infects your computer system, it can change the name of its files. It can also execute
applications that will transfer your files from one folder to another. Some malware can even completely wipe
your data stored on the computer.

If this is happening to your computer, it is time to have it armed with a good antivirus program to help fight
malware attacks.

4. For Businesses

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

In recent times, malware attacks on corporate networks and devices are on the rise globally. Hackers are
spreading new variants of powerful malware to infect endpoints. Not only have we seen an increase in
malware attacks, but the level of sophistication in malware has also increased, as well.

Activity 3: Skill Building (20 min)


Direction: Below are statements that can either help prevent cyberattacks and malware or not.
Shade the thumbs up icon if the idea is a desirable one, otherwise shade the thumbs down
icon.

1. Scan your computer regularly

2. Placing a reliable antivirus

3. Watching pornographic shows on the internet

4. Registration on suspicious websites

5. Opening an attachment from an email or message whose source is unknown or


the sender is unknown
6. Avoiding opening emails or messages that are suspicious

7. Preventing the download of illegal copies of songs, movies, and more from the
internet
8. Opening an email attachment containing malware

9. Keeping computer and software updated

10. Installing free browser programs or toolbars

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Independent Practice (10 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Malware is any software intentionally designed to cause damage to a computer,


server, client, or computer network.
2. Malware is sometimes used broadly against the government or corporate websites
to gather guarded information or to disrupt their operation in general.
3. Malware cannot be used against individuals to gain information such as personal
identification numbers or details, bank or credit card numbers, and passwords.
4. Programs designed to monitor users' web browsing, display unsolicited
advertisements or redirect affiliate marketing revenues are called Trojan Horses.
5. Spyware programs spread like viruses; they are generally installed by exploiting
security holes.
6. Spyware can also be hidden and packaged together with unrelated user-installed
software.
7. Ransomware affects an infected computer system somehow but does not demand
payment to bring it back to its normal state.
8. A computer virus embeds itself in some other executable software on the target
system without the user's knowledge and consent. When it is run, the virus is spread to other
executables.
9. A worm is stand-alone malware software that actively transmits itself over a network
to infect other computers.
10. A virus requires the user to run an infected software or operating system to spread,
whereas a worm spreads itself.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

This document is the property of PHINMA EDUCATION 8


ACC 123: IT Application Tools in Business
Student Activity Sheet #18

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 3:
1. UP 2. UP 3. DOWN 4. DOWN 5. DOWN
6. UP 7. UP 8. DOWN 9. UP 10. DOWN

Activity 5:
1.TRUE 2.TRUE 3.FALSE 4.FALSE 5.FALSE
6.TRUE 7.FALSE 8.TRUE 9.TRUE 10.TRUE

3.) FALSE – Malwares can be used against the government or corporate information.
4.) FALES – The statement relates to adware.
5.) FALSE – Spyware is made to collect information and data on the device user and observe their
activity without their knowledge.
7.) FALSE – Ransomware culprits ask for a ransom.

This document is the property of PHINMA EDUCATION 9


ACC 123: IT Application Tools in Business
Student Activity Sheet #19

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Cyber Intruders: Trolls, Spies, Hackers, and Thieves Materials:
Lesson Objectives: FLM Student Activity Sheets
1.To distinguish different Cyber Intruders: Trolls, Spies, Hackers, and
Thieves References:
howtogeek.com; wikipedia.org
webroot.com; savethestudent.org
guru99.com

"Live as if you were to die tomorrow. Learn as if you were to live forever." ― Mahatma
Gandhi

A. LESSON PREVIEW/REVIEW
1) Introduction

Most of us like to think we're pretty tech-savvy, but research has shown that 59% of people use
the same password for most websites. A Facebook hacker could also gain access to your
smartphone, online file storage, email, Amazon account, smart TV, Google Maps history, social
networks... your life. Unfortunately, there's only one dead cert way to avoid ever getting hacked:
never go online. But if you don't fancy living under a rock for the rest of your life, we've got the
essential tips for staying one step ahead of cybercriminals right here. Before we get into the nitty-
gritty stuff, let's quickly go over the basics!

Activity 1: What I Know Chart (10 min)


What do you know about Cyber Intruders? Try answering the questions below by writing your
ideas under the What I Know column. You may use keywords or phrases that you think are related
to the questions.

What I Know Questions: What I Learned (Activity 4)

What are trolls?

What are hackers?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #19

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (50 min)

What Are Internet Trolls?


An internet troll makes intentionally inflammatory, rude, or upsetting statements online to elicit strong
emotional responses in people or steer the conversation off-topic. They can come in many forms. Most trolls
do this for their amusement, but other trolling forms are done to push a specific agenda.

Trolls have existed in folklore and fantasy literature for centuries. Online trolling has been around for as long
as the Internet has existed. The term's earliest known usage can be traced back to the 1990s on early online
message boards. Back then, it was a way for users to confuse new members by repeatedly posting an inside
joke. It's since turned into a much more malicious activity.

You'll find trolls anywhere online, including on Facebook and online dating sites. They're unfortunately pretty
common.

Signs Someone Is Trolling


It can sometimes become difficult to tell the difference between a troll and someone who genuinely wants to
argue about a topic. However, here are a few tell-tale signs that someone is actively trolling.

● Off-topic remarks: Completely going off-topic from the subject at hand. This is done to annoy and
disrupt other posters.
● Refusal to acknowledge evidence: Even when presented with hard, cold facts, they ignore this
and pretend they never saw it.
● Dismissive, condescending tone: An early indicator of a troll was that they would ask an angry
respondent, "Why you mad, bro?" This is a method done to provoke someone even more, as a way
of dismissing their argument altogether.
● Use of unrelated images or memes: They reply to others with memes, photos, and gifs. This is
especially true if done in response to a very long text post.
● Seeming obliviousness: They seem oblivious that most people are in disagreement with them.
Also, trolls rarely get mad or provoked.

The list above is by no means definitive. There are a lot of other ways to identify that someone is trolling.
Generally, if someone seems disingenuous, uninterested in an honest discussion, and provocative on
purpose, they're likely an internet troll.

What is Cyber spying?

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #19

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets, and information without the
permission and knowledge of the holder of the information from individuals, competitors, rivals, groups,
governments, and enemies for personal, economic, political, or military advantage using methods on the
Internet, networks or individual computers through the use of proxy servers, cracking techniques and
malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer
desks of professionals on bases in faraway countries. It may involve infiltration at home by computer-trained
conventional spies and moles or, in other cases, maybe the criminal handiwork of amateur malicious hackers
and software programmers.

Cyber spying typically involves using such access to secrets and classified information or control of individual
computers or whole networks for strategic advantage and psychological, political, and physical subversion
activities and sabotage. More recently, cyber spying involves analyzing public activity on social networking
sites like Facebook and Twitter.

Such operations, like non-cyber espionage, are typically illegal in the victim country while fully supported by
the highest level of government in the aggressor country. The ethical situation likewise depends on one's
viewpoint, particularly one's opinion of the governments involved.

What is hacking?
Computer hackers are unauthorized users who break into computer systems to steal, change or destroy
information, often installing dangerous malware without your knowledge or consent. Their clever tactics and
detailed technical understanding help them access the information you don't want them to have.

How can hackers find me?


Anyone who uses a computer connected to the Internet is susceptible to the threats that computer hackers
and online predators pose. These online villains typically use phishing scams, spam email or instant
messages, and bogus websites to deliver dangerous malware to your computer and compromise your
computer security.

Computer hackers can also access your computer and private information directly if a firewall does not
protect you. They can monitor your conversations or peruse the back-end of your website. Usually disguised
with a bogus identity, predators can lure you into revealing sensitive personal and financial information, or
much worse.

Types of Hackers
Hackers are classified according to the intent of their actions. The following list ranks hackers according to
their goal.

Ethical Hacker (White hat): A hacker who gains access to systems to fix the
identified weaknesses. They may also perform Penetration Testing and
vulnerability assessments.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #19

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Cracker (Black hat): A hacker who gains unauthorized access to computer


systems for personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts, etc.
Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks
into computer systems without authority to identify weaknesses and reveal them to
the system owner.
Script kiddies: A non-skilled person who gains access to computer systems using
already made tools.

Hacktivist: A hacker who uses hacking to send social, religious, political, etc.,
messages. This is usually done by hijacking websites and leaving a message on
the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in telephones instead
of computers.

What are things that a hacker can do to me?


While your computer is connected to the Internet, a hacker has installed malware on your PC quietly transmits
your personal and financial information without your knowledge or consent. Or, a computer predator may
pounce on the private information you unwittingly revealed. In either case, they will be able to:
● Hijack your usernames and passwords
● Steal your money and open credit card and bank accounts in your name
● Ruin your credit
● Request new account Personal Identification Numbers (PINs) or additional credit cards
● Make purchases
● Add themselves or an alias that they control as an authorized user, so it's easier to use your credit
● Obtain cash advances
● Use and abuse your Social Security number
● Sell your information to other parties who will use it for illicit or illegal purposes
Predators who stalk people while online can pose a serious physical threat. Using extreme caution when
agreeing to meet an online "friend" or acquaintance in person is always the best way to keep safe.

How will I know if I've been hacked?


Check the accuracy of your accounts, credit cards, and documents. Are there unexplained transactions?
Questionable or unauthorized changes? If so, dangerous malware installed by predators or hackers may
already be lurking.

What Is online identity theft?


Identity theft affects millions of Americans every year and occurs when a fraudster steals your identity—by
gaining access to your personally identifiable information (PII)—to commit fraud. While ID theft can happen

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #19

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

in several ways, online ID theft occurs when someone steals your digital PII using scams like planting
malicious software on your computer instead of the old, simple technique of, say, stealing your purse.

Your digital PII can include your driver's license and bank account numbers, as well as any sensitive personal
information that can be used to distinguish your identity—and could allow fraudsters to present themselves
as you. If a thief gains access to unique personal information like your Social Security number, they can fill
out employment forms and even file for a tax refund—all in your name.

How online ID theft happens, and what can you do?


As we share our personal information online via social media and other digital formats, we may be putting
that info at risk of falling into the wrong hands.

Fraudsters use high-tech and other ways to steal digital PII. Knowing what these tactics are may help you
protect yourself:
● Phishing occurs when cybercriminals send emails purporting to be from a financial institution or
other trusted organization, trying to trick you into opening attachments or clicking on links and
providing your PII. Ignore unsolicited emails and online requests for information. If you want to visit,
say, your bank's website to provide information, type in the URL rather than clicking on an emailed
link.
● Pharming occurs when your browser, compromised by a virus, is hijacked without your knowledge.
You type a legitimate website URL into the address bar, but you're redirected to a fake site that looks
legitimate. There, cybercriminals can collect any PII you may type into the website.
● Malicious software. Fraudsters may try to trick you into downloading "malware" that can attack your
computer and, possibly, reveal your PII. Consider purchasing online security software for your
computer, keeping it and your computer operating system software—up to date.
● Unsecure websites. Avoid online shopping and other activities on websites that aren't secure, and
be cautious about the apps you use. Make sure you use only official, secure websites with the
"HTTPS:" prefix—not "HTTP."
● Weak passwords used for both social and financial accounts can leave you vulnerable. Strive to
use unique, long, and strong passwords for each of your accounts. And when possible, activate multi-
factor authentication, which requires you to enter both your login credentials and a secret code sent
to your smartphone or another device before giving you access to your account.
● Discarded computers and mobile devices that haven't been wiped of your PII can be another
point of access for a thief.
● They were targeting children online. Kids can give away personal information online without
realizing it. Help protect your children online; be vigilant in monitoring the information they share
when using any Internet-connected device.
● We've all received emails saying we've won a too-good-to-be-true prize—redeemed by providing
our personal information. As with anything in life, when something online seems too good to be true,
it probably is. Don't respond to emails from someone you don't know. Don't click on unknown links
or attachments.

The bottom line? You can never be too careful when sharing your personal information online.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #19

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Activity 3: Skill Building (20 min)


Direction: Below are statements that can either help prevent cyber intruders or not. Shade the
thumbs up icon if the idea is a desirable one, otherwise shade the thumbs down icon.

1. Be picky about which companies you share your info with – your data's only as
secure as they are.
2. Only log in to accounts from your gadgets. If you do have to use a public or
shared device, make sure you log out afterward.
3. Change passwords at least a couple of times a year: get fresh ones, you can
swap around the ones you already use.
4. Use two-step verification if it's available for logins: if someone signs in from a
new or unauthorized device, they'll have to provide a code that's only sent to
your phone or email address.
5. Check your privacy settings: don't broadcast every update to the whole world.
Log out now and again to view your profile the way strangers see it.
6. Don't accept friend requests from folk you don't know.

7. Be careful what you share on social, especially your date of birth or any info
banks use to verify accounts or lost passwords.
8. Read app permissions to see precisely the data you're allowing them to access
before you install them.
9. Only use well-known or reputable WiFi hotspots – setting up fake accessible
networks is a typical sting.
10. Always lock your phone using either fingerprint recognition, a secure PIN (it may
be your birthday), or a unique gesture.

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent practice (10 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Hacking is an attempt to exploit a computer system or a private network inside a


computer.
2. Hacking is the authorized access to or control over computer network security
systems for some illicit purpose.

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #19

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

3. Hacking is identifying weaknesses in computer systems or networks to exploit its


weaknesses to gain access.
4. A Hacker is a person who looks to alter security systems to achieve their goal, which
is similar to the actual purpose of the system.
5. Hackers are usually skilled computer programmers with knowledge of computer
security.
6. A white-hat hacker is an individual who attempts to gain unauthorized entry into a
system or network to exploit them for malicious reasons.
7. Black-hat hackers are deemed good guys, working with organizations to strengthen
a system's security.
8. White-hat hackers are often referred to as ethical hackers.
9. White-hat hackers always disclose every vulnerability they find in the company's
security system to be fixed before malicious actors are exploiting them.
10. Unlike black-hat hackers, ethical hackers exploit security networks and look for
backdoors when they are legally permitted to do so.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A. Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B. Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 3:
1. UP 2. UP 3. DOWN 4. UP 5. UP
6. UP 7. UP 8. UP 9. UP 10. DOWN

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #19

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Activity 5:
1.TRUE 2.FALSE 3.TRUE 4.FALSE 5.TRUE
6.FALSE 7.FALSE 8.TRUE 9.TRUE 10.TRUE

2.) FALSE- Hacking is the unauthorized access to control over a computer.


4.) FALSE- The goal of the hacker is not similar to the actual purpose of the system.
6.) FALSE- A white-hat hacker attempts to fix the vulnerabilities found in the system.
7.) FALSE- The white-hat hacker is being described in the sentence.

This document is the property of PHINMA EDUCATION 8


ACC 123: IT Application Tools in Business
Student Activity Sheet #20

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Database Software Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To know the benefits of database software
References:
https://en.wikipedia.org/wiki/Databa
se

"The beginning of knowledge is the discovery of something we do not understand." -Frank


Herbert

A. LESSON PREVIEW/REVIEW
1) Introduction

If your business is growing and you have staff to help you run it, keeping track of the increasing
amount of data can be tricky. Sound database systems can help you manage all your business-
critical data centrally, safely, and securely - whenever you need it - to boost your chances of
success. Let's find out how!

Activity 1: What I Know Chart (10 min)


What do you know about Databases? Try answering the questions below by writing your ideas
under the What I Know column. You may use keywords or phrases that you think are related to
the questions.

What I Know Questions: What I Learned (Activity 4)

What is a database?

What are the benefits of a


database?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #20

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (50 min)

What is database software?

Database, also called electronic database, includes collecting data or information organized for rapid
search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval,
modification, and deletion of data in conjunction with various data-processing operations. A database
management system (DBMS) extracts information from the database in response to queries.

A database is stored as a file or a set of files. The information in these files may be broken down into
records, consisting of one or more fields. Fields are the primary data storage units, and each field typically
contains information about one aspect or attribute of the entity described by the database. Records are
also organized into tables that include information about relationships between its various fields. Although
a database is applied loosely to any data collection in computer files, a strict sense database provides
cross-referencing capabilities. Using keywords and various sorting commands, users can rapidly search,
rearrange, group, and select the fields in many records to retrieve or create reports on data aggregates.

Database records and files must be organized to allow retrieval of the information. Queries are the
primary way users retrieve database information. Typically, a DBMS's power comes from its ability to
define new relationships from the tables' basic ones and to use them to get responses to queries. The
user provides a string of characters, and the computer searches the database for a corresponding
sequence and provides the source materials in which those characters appear; a user can request, for
example, all records in which the contents of the field for a person's last name is the word, Smith.

The many users of an extensive database must be able to manipulate the information within it quickly at
any given time. Moreover, large businesses and other organizations tend to build up many independent
files containing related and even overlapping data. Their data-processing activities often require the
linking of data from several files. Different DBMS types have been developed to support these
requirements: flat, hierarchical, network, relational, and object-oriented.

Early systems were arranged sequentially (i.e., alphabetically, numerically, or chronologically). The
development of direct-access storage devices made possible random access to data via indexes. In flat
databases, records are organized according to a simple list of entities; many simple databases for
personal computers are flat in structure. The records in hierarchical databases are arranged in a treelike
format, with each level of records branching off into a set of smaller categories. Unlike hierarchical
databases, which provide single links between groups of records at different levels, network databases

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #20

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

create multiple linkages between sets by placing links, or pointers, to one collection of records in another.
The speed and versatility of network databases have led to their wide use within businesses and in e-
commerce. Relational databases are used where links cannot express associations between files or
records; a simple flat list becomes one row of a table, or "relation," and multiple relations can be
mathematically associated to yield the desired information. Various iterations of SQL (Structured Query
Language) are widely employed in DBMS for relational databases. Object-oriented databases store and
manipulate more complex data structures, called "objects," organized into hierarchical classes that may
inherit properties from classes higher in the chain; this database structure is the most flexible and
adaptable.

Many databases consist of natural-language texts of documents; number-oriented databases primarily


contain statistics, tables, financial data, and raw scientific and technical data. Small databases can be
maintained on personal-computer systems and used by individuals at home. These and larger databases
have become increasingly important in business life, in part because they are now commonly designed
to be integrated with other office software, including spreadsheet programs.

Typical commercial database applications include airline reservations, production management


functions, medical records in hospitals, and legal records. The extensive databases are usually
maintained by governmental agencies, business organizations, and universities. These databases may
contain such materials as abstracts, reports, legal statutes, wire services, newspapers and journals,
encyclopedias, and catalogs of various kinds. Reference databases contain bibliographies or indexes
that serve as guides to the location of information in books, periodicals, and other published literature.
Thousands of these publicly accessible databases now exist, covering topics ranging from law, medicine,
and engineering to news and current events, games, classified advertisements, and instructional courses.

Increasingly, formerly separate databases are being combined electronically into more extensive
collections known as data warehouses. Businesses and government agencies then employ "data mining"
software to analyze multiple data aspects for various patterns. For example, a government agency might
flag an investigation for a company or individual that purchased a suspicious quantity of specific
equipment or materials, even though the purchases were spread around the country or through various
subsidiaries.

Characteristics and Benefits of a Database

Some characteristics distinguish the database approach from the file-based system or method. This
chapter describes the benefits (and features) of the database system.

Self-describing nature of a database system


A database system is referred to as self-describing because it contains the database itself and metadata,
defining and describing the data and relationships between the database tables. This information is used
by the DBMS software or database users if needed. This separation of data and information about the
data makes a database system different from the traditional file-based system. The data definition is part
of the application programs.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #20

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Insulation between program and data


In the file-based system, the structure of the data files is defined in the application programs. If a user
wants to change the form of a file, all the programs that access it might need to be changed.

On the other hand, the data structure is stored in the database approach's system catalog and not in the
programs. Therefore, one change is all that is needed to change the form of a file. This insulation between
the programs and data is also called program-data independence.

Support for multiple views of data


A database supports multiple views of data. A view is a subset of the database, which is defined and
dedicated for particular users of the system. Various users in the system might have different views of
the system. Each view might contain only the data of interest to a user or group of users.

Sharing of data and multiuser system


Current database systems are designed for multiple users. That is, they allow many users to access the
same database at the same time. This access is achieved through features called concurrency control
strategies. These strategies ensure that the data accessed are always correct and that data integrity is
maintained.

The design of modern multiuser database systems is a remarkable improvement from those in the past,
which restricted usage to one person at a time.

Control of data redundancy


Ideally, in the database approach, each data item is stored in only one database. In some cases, data
redundancy still exists to improve system performance. Still, such redundancy is controlled by application
programming and kept to a minimum by introducing as little redundancy as possible when designing the
database.

Data sharing
The integration of all the data, for an organization, within a database system has many advantages. First,
it allows for data sharing among employees and others who have access to the system. Second, it gives
users the ability to generate more information from a given amount of data than possible without
integration.

Enforcement of integrity constraints


Database management systems must provide the ability to define and enforce certain constraints to
ensure that users enter valid information and maintain data integrity. A database constraint is a restriction
or rule that dictates what can be entered or edited in a table, such as a postal code using a particular
format or adding a valid city in the City field.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #20

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

There are many types of database constraints. Data type, for example, determines the sort of data
permitted in a field, for example, numbers only. Data uniqueness, such as the primary key, ensures that
no duplicates are entered. Constraints can be simple (field-based) or complex (programming).

Restriction of unauthorized access


Not all users of a database system will have the same accessing privileges. For example, one user might
have read-only access (i.e., the ability to read a file but not make changes). In contrast, another might
have read and write privileges, which can read and modify a file. For this reason, a database management
system should provide a security subsystem to create and control different types of user accounts and
restrict unauthorized access.

Data independence
Another advantage of a database management system is how it allows for data independence. In other
words, the system data descriptions or data describing data (metadata) are separated from the
application programs. Data independence is possible because changes to the data structure are handled
by the database management system and are not embedded in the program itself.

Transaction processing
A database management system must include concurrency control subsystems. This feature ensures
that data remains consistent and valid during transaction processing, even if several users update the
same information.

Provision for multiple views of data


By its very nature, a DBMS permits many users to access its database either individually or
simultaneously. Users don't have to be aware of how and where the data they access is stored.

Backup and recovery facilities


Backup and recovery are methods that allow you to protect your data from loss. The database system
provides a separate process from a network backup for backing up and recovering data. If a hard drive
fails and the database stored on the hard drive is not accessible, the only way to recover the database is
from a backup.
If a computer system fails in the middle of a complex update process, the recovery subsystem is
responsible for ensuring that the database is restored to its original state. These are two more benefits
of a database management system.

Activity 3: Skill Building (20 min)


Direction: Below are statements that are related to database software. Shade the thumbs up
icon if the statement is an advantage. Shade the thumbs down icon if it is a disadvantage.

1. Substantial hardware and software start-up costs

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #20

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

2. Reduced data entry, storage, and retrieval costs

3. Improved data security

4. Database systems are complex, challenging, and time-consuming to design

5. Damage to database affects virtually all applications programs

6. Improved data access to users through the use of host and query languages

7. Greater data integrity and independence from applications programs

8. Reduced updating errors and increased consistency

9. Initial training required for all programmers and users

10. Reduced data redundancy

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity one and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (10 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. All users of a database system have the same accessing privileges.


2. A database is a logically organized collection of related data designed and built for a
specific purpose, a technology for pulling together facts that allows the slicing and dicing
and mixing, and matching data in all kinds of ways.
3. A random assortment of data can correctly be called a database
4. A database can be of any size and any degree of complexity, and it can be maintained
manually or by software on computers.
5. A database supports multiple views of data.
6. Each view might contain only the data of interest to a user but not to a group of users.
7. Current database systems are designed for multiple users.
8. Ideally, in the database approach, each data item is stored in only one database.
9. The database allows for data sharing among employees and others who have access
to the system.

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #20

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

10. The database gives users the ability to generate more information from a given amount
of data than possible without integration.

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B. Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 3:
1. DOWN 2. UP 3. UP 4. DOWN 5. DOWN
6. UP 7. UP 8. UP 9. DOWN 10. UP

Activity 5:
1.FALSE 2.TRUE 3.FALSE 4.TRUE 5.TRUE
6. TRUE 7.TRUE 8.TRUE 9.TRUE 10.TRUE

1. FALSE- Not all users of a database system have the same access privileges.
3. FALSE- A random assortment of data cannot be called a database.

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Database Software Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To be able to explain how the database works.
References:
bizfluent.com
tutorialspoint.com

"Learn as if you were not reaching your goal and as though you were scared of missing it"
― Confucius

A. LESSON PREVIEW/REVIEW
1) Introduction

You might not realize it, but databases are everywhere. Whether or not you know very much about
them, their effect on our daily lives is extensive. From weather applications to the movies you
watch online, databases are responsible for many of the services we utilize daily.

Activity 1: What I Know Chart (10 min)


What do you know about Databases? Try answering the questions below by writing your ideas
under the What I Know column. You may use keywords or phrases that you think are related to
the questions.

What I Know Questions: What I Learned (Activity 4)

What is a database?

What are the benefits of a


database?

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B. MAIN LESSON
Activity 2: Content Notes (50 min)

How Do Databases Work?

What Is in A Database?
A database is a software-based container structured to collect and store information to be retrieved,
added to, updated, or removed automatically. Database programs are software applications designed to
make databases and create all the programming necessary to fill them or delete them as needed. The
structure of a database is the table, which consists of rows and columns of information. The columns
identify the data (attributes) in the table, and the rows are the records of data. Tables look just like a
spreadsheet, but tables can be manipulated and updated, which makes a database a valuable tool.

Database Models
Database model defines a database structure. The model used most is the relational database model.
The tables in this model must relate, or link, to each other, with each table holding specific information or
attributes (columns) about each record (row). For example, a veterinarian may have a table called
"Patients"--with columns titled "Patient's name," "Patient type" and "ID number"--and a second table
called "Patient's Owner"--with the columns titled "ID number," "Owner name," "Owner address" and
"Owner phone number." The first table links to the second table by the ID number. The ID number's
relationship is how a report or query request finds records that belong together and can return an accurate
response.

Designing A Database
Database design is an art based on business requirements. The business requirements must be
understood before an accurate and helpful database can be designed. Business requirements can also
be called business processes. The tables should hold no more than one set or module of information.
For instance, in the previous example, the "Patient" table should not contain information about the
patients' visits. Instead, a separate table would hold a visit ID number and the date and the time of the
visit, and the patient ID number linking it to the patient. A fourth table titled "Billing" would be created to
identify the payment amount, payment type, and the visit ID paid for with the patient ID. Billing and visits
are business processes.

Working With A Database


Entering records fills a database with data. Once the database is structured correctly, an interface is built.
This interface is placed between the tables and the user. It gives the user a different view of the database.
Based on our example above. An interface might provide the user a "New User" entry page. The user

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

can enter the pet's name, the owner's information, and the date and type of the first visit on this page. All
this information is contained in three different tables located behind the interface. Still, the user only needs
to interact with the entry page (a single form) while the data drops into the correct tables. This is achieved
by linking the tables via simple programming.

Types of databases

Depending upon the usage requirements, there are the following types of databases available in the
market −
● Centralized Database
● Distributed Database
● Personal Database
● End-user Database
● Commercial Database
● NoSQL database
● Operational Database
● Relational Database
● Cloud database
● Object-oriented Database
● Graph database

Let us explain all of them:

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

1. Centralised Database
The information(data) is stored at a centralized location, and the users from different locations can
access this data. This type of database contains application procedures that help users access the data
even from a remote location.

Various kinds of authentication procedures are applied for the verification and validation of end-users.
Likewise, the application procedures provide a registration number that keeps track of and records data
usage. The local area office handles this thing.

2.Distributed Database
Just opposite of the centralized database concept, the distributed database has contributions from the
shared database and the information captured by local computers. The data is not in one place and is
distributed at various sites of an organization. These sites are connected with the help of communication
links, which quickly access the broadcast data.

You can imagine a distributed database in which various portions of a database are stored in multiple
locations(physical). The application procedures are replicated and distributed among multiple points in a
network.

There are two kinds of distributed Databases, namely homogenous and heterogeneous. The databases
with the same underlying hardware and run over the same operating systems and application procedures
are known as homogeneous DDB, e.g., all physical locations in a DDB. In comparison, the operating
systems, underlying hardware, and application procedures can be different at various sites of a DDB,
known as heterogeneous DDB.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

3.Personal Database
Data is collected and stored on personal computers, which is small and easily manageable. The same
department uses the data, and a small group of people can access it.

4.End User Database


The end-user is usually not concerned about the transaction or operations done at various levels and is
only aware of the product, which may be software or an application. Therefore, this is a shared database
designed for the end-user, just like different levels' managers. A summary of complete information is
collected in this database.

5.Commercial Database
These are the paid versions of the vast databases designed uniquely for the users who want to access
the information for help. These databases are subject-specific, and one cannot afford to maintain such
huge information. Access to such databases is provided through commercial links.

6.NoSQL Database
These are used for large sets of distributed data. There are some significant data performance issues
which are effectively handled by relational databases, such kind of issues are easily managed by NoSQL
databases. They are very efficient in analyzing large-size unstructured data stored at multiple virtual
servers of the cloud.

7.Operational Database
Information related to the operations of an enterprise is stored inside this database. Functional lines like
marketing, employee relations, customer service, etc., require such kinds of databases.

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

8.Relational Databases
These databases are categorized by a set of tables where data gets fit into a pre-defined category. The
table consists of rows and columns where the column has an entry for data for a specific type, and rows
contain instances for that data defined according to the category. The Structured Query Language (SQL)
is the standard user and application program interface for a relational database.

Various simple operations can be applied over the table, making these databases easier to extend, join
two databases with a common relation, and modify all existing applications.

9.Cloud Databases
Data has been explicitly stored over clouds, also known as a virtual environment, either in a hybrid cloud
or a public or private cloud. A cloud database is a database that has been optimized or built for such a
virtualized environment. There are various benefits of a cloud database, some of which can pay for

This document is the property of PHINMA EDUCATION 6


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

storage capacity and bandwidth on a per-user basis. They provide scalability on demand and high
availability.

A cloud database also allows enterprises to support business applications in a software-as-a-service


deployment.

10.Object-Oriented Databases
An object-oriented database is a collection of object-oriented programming and relational databases.
Various items are created using object-oriented programming languages like C++, Java which can be
stored in relational databases. Still, object-oriented databases are well-suited for those items.

An object-oriented database is organized around objects rather than actions and data rather than logic.
For example, a multimedia record in a relational database can be a definable data object instead of an
alphanumeric value.

11.Graph Databases

This document is the property of PHINMA EDUCATION 7


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

The graph is a collection of nodes and edges where each node is used to represent an entity, and each
bite describes the relationship between entities. A graph-oriented database, or graph database, is a
NoSQL database that uses graph theory to store, map, and query relationships.

Graph databases are used for analyzing interconnections. For example, companies might use a graph
database to mine data about customers from social media.

Activity 3: Skill Building (20 min)


Direction: Complete the crossword puzzle below using the clues provided.

This document is the property of PHINMA EDUCATION 8


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

DOWN
2.These databases are categorized by a set of tables where data gets fit into a pre-defined category.
3.This is usually not concerned about the transaction or operations done at various levels and is only
aware of the product, which may be software or an application.
4.There are very efficient in analyzing large-size unstructured data that may be stored at multiple cloud
servers.
7.Just opposite of the centralized database concept, this database has contributions from the shared
database and the information captured by local computers.
ACROSS
1.Is a NoSQL database that uses graph theory to store, map, and query relationships.
5. Data is generally used by the same department of an organization and is accessed by a small group
of people.
6.Is a database that has been optimized or built for such a virtualized environment.
8.This type of database contains application procedures that help users access the data even from a
remote location.
9.Information related to the operations of an enterprise is stored inside this database.

This document is the property of PHINMA EDUCATION 9


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

10.These are the paid versions of the vast databases designed uniquely for the users who want to access
the information for help.

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (10 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. A centralized Database comforts the users to access the stored data from different
locations through several applications.
2. Distributed databases are connected via communication links.
3. A relational database uses SQL for storing, manipulating, as well as maintaining the
data.
4. NoSQL Database is not a relational database as it stores data not only in tabular form
but in several different ways.
5. Cloud Database is a type of database where data is stored in a virtual environment and
executes over the cloud computing platform.
6. An operational database is designed for a single user.
7. A personal database is designed for executing and handling the daily data operations in
several businesses.
8. Its database model defines a database structure.
9. The model used most is the distributed database model.
10. The database model tables must relate, or link, to each other, with each table holding
specific information or attributes (columns) about each record (row).

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?

This document is the property of PHINMA EDUCATION 10


ACC 123: IT Application Tools in Business
Student Activity Sheet #21

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 3:
Down 2. relational 3.end-user 4. NoSQL 7. distributed
Across 1. graph 5. personal 6. cloud 8. centralized 9. operational 10. commercial

Activity 5:
1. TRUE 2.TRUE 3. TRUE 4.TRUE 5.TRUE
6. FALSE 7. FALSE 8.TRUE 9. FALSE 10.TRUE

6.) FALSE- Operational Database is for functional use and not for a single user.
7.) FALSE- Personal Database is designed for executing personal data.
9.) FALSE- Distributed database model is not the most commonly used model of the database.

This document is the property of PHINMA EDUCATION 11


ACC 123: IT Application Tools in Business
Student Activity Sheet #22

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Database Software Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To be able to link records, using a key
2. To be able to learn how to use the Query language and display References:
records. relationaldbdesign.com

"Learn as if you were not reaching your goal and as though you were scared of missing it"
― Confucius

A. LESSON PREVIEW/REVIEW
1) Introduction

The Internet and particularly social media have opened the world of global interactions. It is not
a problem anymore to keep in touch with friends and relatives from other parts of the world.
Social networking sites have grown to global societies of billions of virtual inhabitants. Facebook
has 2.4 billion users, making it one of the most significant communities globally (bigger than
China's population!).

Activity 1: What I Know Chart (5 min)


What do you know about Social Networking? Try answering the questions below by writing your
ideas under the What I Know column. You may use keywords or phrases that you think are related
to the questions.

What I Know Questions: What I Learned (Activity 4)


What is Social Networking?

B. MAIN LESSON
Activity 2: Content Notes (20 min)

Linking Relational Database Tables using Primary and Foreign Keys

The power of relational databases stems from the fact that tables can be linked, enabling users to
access data across tables.

Let us briefly examine how links are formed between tables.

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #22

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Linking tables
Two tables are linked when they have a matching field, a field in each table containing similar data. For
example, suppose you want to connect a Suppliers table with another table called Products.
Both tables must have at least one field in common.

If you insert the Suppliers table's primary key field (for example, SuppID) into the Products table, the two
tables will have a matching field: SuppID.
The tables are now linked, and you can access their data together.

Accessing Data for Query and Display


A user can now ask the database to retrieve data that spans both tables.
A typical supplier-product query might be:
What's the name of the company that supplies us with product X?

The graphic below illustrates the two linked tables in which the data that answers this question resides
and the query results.

What is the name of the company that supplies us with the Beta tool?
SuppID is the primary key in the Suppliers table and a foreign key in the Products table.
Data that is organized is called information.
The data returned from the supplier-product Query is an example of organized data (information).

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #22

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Activity 3: Skill Building (10 min)


Direction: Two tables are presented below. Determine the primary key that will be used in
accessing data. Think of a common query that the table can answer.

Product ID Description Brand


1 Beautiful Girls MKF Studios
2 Toy Story Wolf
3 Sense and Sensibility Parabuster Inc.
4 Holiday of the Year Wolf
5 Pulp Fiction MKF Studios
6 The Juror MKF Studios
7 From Dusk Till Dawn Parabuster Inc.
8 Hellraiser: Bloodline Big Studios

Store Key Product ID Sales Cost Profit


1 6 2.39 1.15 1.24
1 2 16.7 6.91 9.79
2 7 7.16 2.75 4.41
3 2 4.77 1.84 2.93
5 3 11.93 4.59 7.34
5 1 14.31 5.51 8.8

Primary Key:
Query:

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Each database table must have a field or a combination of fields that holds a value that
uniquely identifies each record.
2. The primary key is not used to establish table relationships and connect the data in related
records held in different tables.
3. Records are stored in order by the primary key.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #22

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 4:
1. The primary key is the Product ID. A sample query is as follows but not limited to a.) What is the total
profit for toy story b.)? What are the total sales for "The Juror."

Activity 5:
1.TRUE 2. FALSE 3. TRUE

2. FALSE- The primary key is used to establish the table relationships.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #23

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Database Software Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To learn how to sort and analyze records
2. To learn how to apply a formula References:
3. To learn how to save, format, print, copy or transmit displayr.com

"No thief, however skillful, can rob one of knowledge, and that is why knowledge is the
best and safest treasure to acquire." ―L. Frank Baum

A. LESSON PREVIEW/REVIEW
1) Introduction

The humble database affects almost every aspect of daily life -- from grocery store inventories
and cable-TV subscriber information to marketing mailing lists and issuing payroll checks to
employees. Databases aren't just for big business, though. You can create an accessible
database to keep track of just about anything, including your video game collection, recipes,
contacts, music CDs, and books.

Activity 1: What I Know Chart (5 min)


What do you know about Saving, Formatting, Printing, Copying, Or Transmitting Search Results
in a Database? Try answering the questions below by writing your ideas under the What I Know
column. You may use keywords or phrases that you think are related to the questions.

What I Know Questions: What I Learned (Activity 4)


How is Saving, Formatting,
Printing, Copying, Or Transmitting
Search Results done in a
Database?

B. MAIN LESSON
Activity 2: Content Notes (20 min)

Data sorting is any process that involves arranging the data into some meaningful order to make it easier
to understand, analyze or visualize. When working with research data, sorting is a standard method used

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #23

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

for visualizing data in a form that makes it easier to comprehend the story the data is telling. Sorting can
be done with raw data (across all records) or at an aggregated level (in a table, chart, or other aggregated
or summarized output).

Data is typically sorted based on actual values, counts, or percentages, either ascending or descending
order, but can also be sorted based on the variable value labels. Value labels are metadata found in
some programs which allow the researcher to store labels for each value option of a definite question.
Most software applications also allow sorting by multiple variables. This type of sorting will be executed
in a predetermined variable priority; for example, a data set containing region and country fields can first
be sorted by region as the primary sort and then by country. The county sort will be applied within each
sorted region.

A Simple Example
To illustrate an essential sorting operation, consider the table below, which has two columns, Country
and Population. The Country column is a text field (or label), whereas the Population column contains
numeric data. The table on the left shows the original data, which is not sorted in any particular order.
The table on the right has been sorted by Population in descending order. In other words, the country
with the highest Population is sorted to the first row, followed by the country with the second-highest
Population, and so forth.

This allows the reader to quickly understand the countries' order without comparing all of the table
numbers.

Saving, Formatting, Printing, Copying, Or Transmitting

While you can print data from a table, query, form, or report in your database, you can set print options
for reports that will produce an eye-catching and more readable printed copy of your data.

Printing data directly from tables or queries works when you want to print just a simple list. Forms are
better suited for viewing or printing data for a single record or a related set of records and not printing

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #23

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

larger sets of data or data summaries. By printing data from a report, you can compare, summarize, and
sum large data sets and then present that information in an attractive layout.

Activity 3: Skill Building (10 min)


Direction: The business world depends on databases 24 hours a day, seven days a week.
Inventory, order processing, payroll, accounting, shipping, and transportation routing are often
tracked within the main database that keeps the company functioning. Think of a business that
you want to establish and discuss how the database can help, specifically, in your daily
transactions.

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. Data is typically sorted based on actual values, counts, or percentages, either ascending
or descending order, but can also be sorted based on the variable value labels.
2. Value labels are metadata found in some programs, which does not allow the researcher
to store labels for each value option of a definite question.
3. Most software applications also allow sorting by multiple variables.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #23

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let's track your progress. Shade the session number you just completed.

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1.TRUE 2. FALSE 3. TRUE

2.FALSE- Value labels allow researchers to store labels for each value option of categorical question.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #24

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Enterprise Resource Planning (ERP) Materials:


Lesson Objectives: FLM Student Activity Sheets
1. To understand the general functionality and vital elements of
ERP systems. References:
2. To learn the leading ERP products. Information Technology Auditing
and Assurance by James Hall

“It always seems impossible until it’s done” ―Nelson Mandela

A. LESSON PREVIEW/REVIEW
1) Introduction

The trend for today’s digitalized era is the integration of information across the organization, in
line with enterprise-oriented systems integrated with the corporate setting. Various organizations
mix and match pre-coded software components to assemble an enterprise resource planning
(ERP) system that meets its specific needs. Now let’s start with the question of what ERP is?

Activity 1: What I Know Chart (5 min)


What do you know about ERP? Try answering the questions below by writing your ideas under
the What I Know column. You may use keywords or phrases that you think are related to the
questions.

What I Know Questions: What I Learned (Activity 4)

What is an ERP?

B. MAIN LESSON
Activity 2: Content Notes (20 min)

ERP System

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #24

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

These are multi-module software packages that evolved primarily from traditional manufacturing resource
planning (MRP II). ERP is an elaborate transaction processing system. It supplies management with real-
time information and permits timely decisions that are needed to improve performance and achieve a
competitive advantage for an organization. The objective of ERP is to integrate the critical process of the
organization, such as order entry, manufacturing, procurement and accounts payable, payroll, and
human resources. With the use of ERP, a single computer system can serve each functional area’s
unique needs. ERP combines all single, integrated systems that access a single database to facilitate
information sharing and improve communication across the organization.

ERP system supports a smooth and seamless flow of information across the organization by providing a
standardized environment for a firm’s business process and a common operational database that
supports the business’s day-to-day activities.

ERP Core Application


ERP functionality falls into two general groups of applications: core application and business analysis.
Core applications are those applications that operationally support the day-to-day activities of the
business. If these applications fail, so does the company. Typical core applications include but are not
limited to sales and distribution, business planning, production planning, shop floor control, and logistics.
Core applications are also called online transaction processing (OLTP) applications. The sales and
distribution function handle order entry and delivery schedule. This includes checking on product
availability to ensure timely delivery and verifying customer credit limits.

Business planning consists of forecasting demand, planning production, and detailed routing information
that describes the sequence and the stages of the actual production process. Capacity planning and
production planning can be very complex; therefore, some ERPs provide simulation tools to help
managers decide how to avoid shortages in materials, labor, or plant facilities. Once the master
production schedule is complete, the data are entered into the MRP (materials requirements planning)
module, which provides three key pieces of information: an exception report, materials requirements
listing, and inventory requisitions. The exception report identifies potential situations that will result in
rescheduling production, such as late delivery of materials. The materials requirements listing shows the
details of the vendor’s shipments and expected receipts of products and components needed to order
inventory requisitions to trigger material purchase orders for items not in the stock. Shop floor control
involves the detailed production scheduling, dispatching, and job costing activities associated with the
actual production process. Finally, the logistics application is responsible for ensuring timely delivery to
the customer—this consists of inventory and warehouse management, and shipping. Most ERPs also
include their procurement activities within the logistics function.

Leading ERP Products: SAP, Oracle, Microsoft


The ERP market constitutes products from dozens of vendors of all sizes. This part reviews the brief
history and distinguishing characteristics of the industry leaders, including SAP, Oracle, and Microsoft.
The purpose is to provide an overview and insight into the underlying philosophies of these vendors.
Specific system characteristics and functionality, however, change regularly—the following sample
leading ERP vendors.

This document is the property of PHINMA EDUCATION 2


ACC 123: IT Application Tools in Business
Student Activity Sheet #24

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

● SAP – Founded in 1972, SAP is the leader in providing collaborative business solutions.
It had an estimated 12 million users worldwide with more than 88,700 installations and
more than 1,500 partners. SAP ERP comes with four individual solutions that support
essential business processes: SAP ERP Financials, SAP ERP Operations, SAP ERP
Human Capital Management, and SAP ERP Corporate Service. SAP ERP financials
support both financial, accounting, and managerial accounting. Financial accounting
functions help users comply with international accounting standards, such as (GAAP) and
International Financial Reporting Standards (IFRS). SAP ERP operations provide
procurement and logistics execution solutions, product development and manufacturing,
and sales and service. The solution also provides powerful analytic tools for better
decision-making. SAP ERP Human Capital Management provides integrated, enterprise-
wide functionality in human resource management. SAP ERP Corporate Services
supports and optimizes both centralized and decentralized administrative processes.
● Oracle- Founded by Larry Ellison, Oracle was the first database management system to
incorporate the SQL language. Oracle is also the first software company to develop and
deploy 100% internet-enabled enterprise software across its entire product line: database,
business applications, application development, and decision support tools. Oracle is the
world`s leading software supplier for information management and the world’s second-
largest independent software company. Oracle has three main products: Oracle E-
Business Suite, PeopleSoft Enterprise Solutions, J.D. Edwards EnterpriseOne.
● Microsoft Dynamics – is a family of integrated business applications for small and midsize
organizations and large enterprises’ divisions. It provides applications and services for
retailers, manufacturers, wholesale distributors, and service companies. The Microsoft
Dynamics series includes Dynamic GP, Dynamic AX, Dynamics SL, and others. These
solutions are ready to work with widely-used productivity application, like Microsoft Office,
and technologies such as Microsoft Windows Server System and Microsoft.Net

Activity 3: Skill Building (10 min)


Direction: Large corporations depend on ERP. Inventory, order processing, payroll, accounting,
shipping, and transportation routing are often tracked within the ERP that keeps the company
functioning. Think of a business you want to establish and discuss how the ERP can help you,
specifically in your daily transactions.

This document is the property of PHINMA EDUCATION 3


ACC 123: IT Application Tools in Business
Student Activity Sheet #24

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

Activity 4: What I know Chart, Part 2. (5 min)


Direction: Go back to activity 1 and fill out the third box.

Activity 5: Check for Understanding and Keys to Correction


Independent Practice (5 min)

Direction: Write TRUE if the statement is correct, otherwise write FALSE.

1. ERP system supports a smooth and seamless flow of information across the
organization by providing a standardized environment for a firm’s business process and a
common operational database that supports the business’s day-to-day activities.
2. ERP functionality falls into two general groups of applications: core application and
business analysis
3. The objective of ERP is to integrate the critical process of the organization, such as
order entry, manufacturing, procurement and accounts payable, payroll, and human
resources.
4. SAP, Microsoft Dynamics, and Oracle are the leading ERP products.
5. Business analysis are those applications that operationally support the day-to-day
activities of the business
C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 min)
A.Work Tracker
You are done with this session! Let’s track your progress. Shade the session number you just completed.

This document is the property of PHINMA EDUCATION 4


ACC 123: IT Application Tools in Business
Student Activity Sheet #24

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

B.Think about your Learning


1.Please read the learning targets for the day again. Were you able to achieve those learning targets? If
yes, what helped you achieve them? If no, what is the reason for not achieving them?
__________________________________________________________________________________
__________________________________________________________________________________

2.What question(s) do you have as we end this lesson?


__________________________________________________________________________________
__________________________________________________________________________________

KEY TO CORRECTIONS:

Activity 5:
1. TRUE
2. TRUE
3. TRUE
4. TRUE
5.FALSE- Core Application are those applications that operationally support the day-to-day activities of
the business

This document is the property of PHINMA EDUCATION 5


ACC 123: IT Application Tools in Business
Student Activity Sheet #25

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

Lesson title: Quiz 6 Materials:


Lesson Objectives: FLM Students Activity Sheets
1. To test your knowledge with the previous lesson.
References:
Information Technology Auditing
and Assurance by James Hall

“Creativity Is Intelligence Having Fun.” – Albert Einstein

A. LESSON PREVIEW/REVIEW
Introduction

This is a quiz only module. Please use the spare time to prepare for the Period Examination in
the following session.

I. WRITE TRUE IF THE STATEMENT IS TRUE, WRITE FALSE IF THE STATEMENT IS


OTHERWISE.

1. Each database table must have a field or a combination of fields that holds a value that
uniquely identifies each record.
2. Records are stored in order by the Foreign key.
3. ERP system supports a smooth and seamless flow of information across the organization by
providing a standardized environment for a firm's business process and a common
operational database that supports the business's day-to-day activities.
4. SAP, Microsoft Dynamics, and Oracle are the leading ERP products.
5. The objective of ERP is to integrate the organization's critical processes, such as order
entry, manufacturing, procurement and accounts payable, payroll, and human resources.
6. A database can be of any size and any degree of complexity, and it can be maintained
manually or by software on computers.
7. NoSQL Database is not a relational database as it stores Data not only in tabular form but in
several different ways.
8. All users of a database system have the same accessing privileges.
9. A relational database does not use SQL to store, manipulate, and maintain the data.

This document is the property of PHINMA EDUCATION 1


ACC 123: IT Application Tools in Business
Student Activity Sheet #25

Name: _____________________________________________________________ Class number: _______


Section: ____________ Schedule: ______________________________________ Date: ______________

10. Cloud Database is a type of database where Data is stored in a virtual environment and
executes over the cloud computing platform.

TEACHER-LED ACTIVITIES
Specific activities for this day:
1.Discussion of the subject matter.
2.Collect SAS.

This document is the property of PHINMA EDUCATION 2

You might also like