0% found this document useful (0 votes)
40 views9 pages

Assignment in IT

This document discusses how social media sites Facebook and Twitter can be used for both personal and business purposes. Facebook allows businesses to create pages to connect with customers, answer questions, and network with other businesses. Law enforcement uses social media to investigate criminals by monitoring public posts and profiles to gather evidence or identify criminal associates. The document then provides a two page report on how Facebook and Twitter are used for business and personal networking as well as how law enforcement utilizes these sites to investigate crimes.

Uploaded by

Elay Rosales
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views9 pages

Assignment in IT

This document discusses how social media sites Facebook and Twitter can be used for both personal and business purposes. Facebook allows businesses to create pages to connect with customers, answer questions, and network with other businesses. Law enforcement uses social media to investigate criminals by monitoring public posts and profiles to gather evidence or identify criminal associates. The document then provides a two page report on how Facebook and Twitter are used for business and personal networking as well as how law enforcement utilizes these sites to investigate crimes.

Uploaded by

Elay Rosales
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

ROSALES, Elayza H.

BSBA- FM 2-11s

1. What are the differences between computer literacy and information literacy ?
COMPUTER LITERACY INFORMATION LITERACY
 Having the knowledge to use technology in  The ability to access, organize, evaluate
order to manipulate computer software or and use information from various sources.
hardware
 One can have the knowledge but not  It is taking what has been read and learned
necessarily know how to use it or apply it and applying it
 One has the technology to manipulate the  One will take the knowledge to the next
computer, but they may not have the step by using the access to organize, use
information to continue on through the and evaluate what has been found.
process and derive a conclusion based on
evaluations and organization.
 It is the literacy before information literacy  It also requires one to have the awareness
in which the person is on their way to in how information system works and the
gaining the extra knowledge they need in link between the information need, sources
order to apply what is currently known. and channels.
 For example, you can know how to use
Google Search, but unless you take it a step
further such as knowing what you need, the
sources and the channel to gain what you
need will be stuck with unhelpful answers
 When you are computer literate, you have a  When you are information literate, you
general working knowledge of computers. understand and are able to gather, analyze
You understand what they can be used for. and use information gathered from the
various types of technological medians –
especially the internet.
 Most people know that they can type a  This person may access the internet, for
paper, create a power point and if you have instance on their cell phone, iPod, lab tops,
internet access, you may e-mail and search and a multitude of medians, some which
the World Wide Web for information. may have not yet been realized.
INFORMATION SYSTEM (DEFINITION) COMPONENTS OF INFORMATION
PROCESSING

 It refers to a collection of multiple pieces of  An information system is essentially made up


equipment involved in the dissemination of of five components hardware, software,
information. Hardware, software, computer database, network and people. These five
system connections and information, components integrate to perform input, process,
information system users, and the system’s output, feedback and control.
housing are all part of an Information  Hardware consists of input/output device,
System. processor, operating system and media devices.
 An information system commonly refers to a  Software consists of various programs and
basic computer system but may also describe procedures.
a telephone switching or environmental  Database consists of data organized in the
controlling system. The IS involves resources required structure.
for shared or processed information, as well  Network consists of hubs, communication
as the people who manage the system. People media and network devices.
are considered part of the system because  People consist of device operators, network
without them, systems would not operate administrators and system specialist.
correctly.  Information processing consists of input; data
process, data storage, output and control.
During input stage data instructions are fed to
the systems which during process stage are
worked upon by software programs and other
queries. During output stage, data is presented
in structured format and reports.

2. What are information systems, the component or activities of information processing?


3. What are the necessary qualities of information in an information system, and why are they
important?

QUALITIES OF INFORMATION IN AN INFORMATION SYSTEM AND ITS IMPORTANCE


 Information needs to be of high quality to be useful and accurate. The information that is input
into a data base is presumed to be perfect as well as accurate. The information that is accessed is
deemed reliable. Flaws do arise with database design but do not let something in your control,
accurate and reliable data, be one of them. A database design that is accurate and reliable will
help achieve the development of new business ideas as well as promoting the organizational
goals.
 Completeness is another attribute of high quality information. Partial information may as well
be incomplete information because it is only a small part of the picture. Completeness is as
necessary as accuracy when inputting data into a database.
 Consistency is key when entering information into a database. For example, with a column for a
phone number entry 10 digits is the expected length of the field. Once the fields have been set in
the database, a number more or less than 10 digits will not be accepted. The same applies for any
field, whether it is an entry that requires a number, a series of numbers, an address, or a name,
etc. If the fields are not set to a specific limit for information then consistency is even more
important.
 Uniqueness is the fourth component of high quality information. In order to add value to any
organization, information must be unique and distinctive. Information is a very essential part of
any organization and if used properly can make a company competitive or can keep a company
competitive.

 A fifth important aspect of information is timeliness. New and current data is more valuable to
organizations than old outdated information. Especially now, in this era of high technological
advances, out-of-date information can keep a company from achieving their goals or from
surviving in a competitive arena. The information does not necessarily need to be out of date to
have effect, it just needs to not be the most current. Real-time information is an element of
timeliness.
4. Research Facebook and Twitter, 2 popular social networking sites. Write a 2 page report on how
these sites are used for business and personal purposes. In addition, explain how law enforcement
personnel use these sites to crack down some criminals.
On the surface, it can seem like businesses do not have a place in the purely
social realm of Facebook. It's precisely that social aspect, however, that makes Facebook
a great place for businesses to establish a presence. Facebook business pages and, to a
lesser extent, Facebook groups are valuable business tools.

FACEBOOK USED FOR


BUSINESS
 Connecting with Customers A business cannot create a profile on Facebook;
instead, a business communicates with the public
through a business page, which is typically an
offshoot of the personal Timeline of the company's
owner or manager. Business pages work a bit
differently than profiles. When a customer "Likes" a
page, he receives page updates in his news feed,
which he can then share with his friends. He can also
post on the business page -- if the page administer
allows posts -- and send a private message to the
administrator. With a presence on Facebook,
organizations can connect directly with their
customers and answer questions they may have.
Facebook's social status may also potentially increase
the business's likability factor.
 Networking With Other Business pages cannot comment on or interact with
Businesses personal profiles. They can, however, interact with
other pages, which puts them in contact with other
businesses. Using this option, you can form mutually
beneficial relationships with related businesses all
over the country and the world. When you establish a
relationship, you can cross-promote one another's
services or products and share ideas.
 Communication Within an Depending on the social networking expertise of your
Organization employees and the size of your business, Facebook's
groups option may provide an effective interface for
communication and collaboration within the
company. Groups have a message board format
conducive to conversations among small groups of
people who share a common interest. To participate
in a Facebook group, each member must have a
personal Facebook profile. The privacy options for
groups are different from those for pages. In addition
to an open group, which everyone on the Internet can
see, you can choose closed and secret groups, which
keep conversations hidden and -- in the latter option
-- keeps the existence of the group secret.
.
TWITTER USED AS BUSINESS
Connecting with your customers Sending a potential customer a personal message after
they’ve followed you is a great way to increase the trust
and appreciation a customer has for your business. One
other benefit is that you are able to listen to what your
customers are saying. This feedback is extremely
valuable if you have plans to expand your business (or at
least, improve the quality of it).
Spying on the competition Connecting with your customers is just one part of the
equation. Twitter also allows you to listen to customer
feedback and complaints they may share publicly with
your competitors. Want to make Twitter marketing work
for you? Collect this information in an Excel sheet and
perform deep analysis with your team on a weekly or
monthly basis for future product implementation.
FREE marketing Simply take a minute and craft your 140 character pitch
and with the click of a button, it can reach all of your
followers who are online. Marketing cost is zero. You
don’t have to pay to use Twitter and you don’t have to
pay to tweet. Unless you are thinking of investing in
Twitter advertising or some advance tools to make your
life easier, cost of marketing on Twitter is zero.
Keeping customers updated - If you’re running a business, you definitely understand
the importance of keeping your customers updated.
Twitter is a great tool to keep them posted on the latest
information, promotion and sales your business is having.
When you use Twitter, you can share valuable
information with your customers at times that matter
most; weekend sales, black Friday deals etc.
A new medium of communication - Twitter is a social media platform and it’s an excellent
marketing tool as well. However, instead of using Twitter
solely for marketing, you could also use it to
communicate with your customers.
Marketing using Twitter Twitter marketing allows you to reach your followers
from around the world and alleviate the distance barrier.
Influencers such as Rebekah Radice and Kim Garst are
great examples when it comes to Twitter marketing done
right. They not only use Twitter to promote their
products and articles, they also use it to share valuable
content from around the web.
Building a community - Aside from marketing and customer retention, Twitter
can also be used to build a community. As a result of
these Twitter chats, the opportunity to connect with
customers increases dramatically while improving the
chances of getting retweets and favorites on Twitter.
These simple actions will easily increase the company’s
visibility and the chance to acquire more customers. At
the same time, the company would be able to understand
the current needs and thoughts of the participants to
further enhance their services or products.
Increase sales using Twitter According to a survey done by Constant Contact, 60% of
a brand’s followers are more likely to perform purchases
or recommend products after following the brand on
Twitter. To make things even juicier, 50% of the
followers are actually more likely to buy or sign up for
services from the brands they follow.
Being on Twitter isn’t just about being social, but it’s also
increasing the opportunity to make more sales and grow
your revenue. Statistics don’t lie and it’s been proven
over and over again that Twitter is a great way to
increase sales effectively

Being on Twitter isn’t just about being social, but it’s also increasing the opportunity to make
more sales and grow your revenue. Statistics don’t lie and it’s been proven over and over again that
Twitter is a great way to increase sales effectively.

As in any field, social media can be used in a multitude of ways for various benefits. Police
approach social media similarly. Each social network has its own purpose and is meant for one particular
goal. In some ways, today’s police departments are using social media for the purpose of public input,
while other strategies are confidential parts of an investigation. Together, these methods showcase how
important a tool social media is for law enforcement.

How law enforcement personnel


use these sites to crack down some
criminals.
Sting Operations- Police sting operations were used by “the first modern police
forces,” as mentioned in an article in the Missouri Law
Review. A sting operation is designed to catch a person in the
act of committing a crime. Stings usually include a law
enforcement officer playing the part as some kind of
accessory to a crime, perhaps as a drug dealer or a potential
customer of prostitution. After the crime is committed, the
suspect is quickly arrested. Police officers have begun
conducting sting operations on the Internet, often involving
social media. A common example is the use of Facebook or
other social networks to lure pedophiles with fake profiles.
During these investigations, an officer poses as a child or
teenager and makes contact via a Facebook group or other
public action. The goal is for the officer to arrange to meet the
suspect in person.
Subpoenas Much of the information on social media is visible to the
public, but law enforcement has been able to use subpoenas to
gather details on anonymous posts. Controversy surrounds
whether law enforcement should be able to subpoena social
media networks. Court rulings have been mixed on the issue
of subpoenas and social media, with decisions on both sides
of the issue.
Location Tracking As social media has evolved, location-based sharing has
become incredibly popular. This metadata that links text,
pictures and video to an exact geographical location is a great
tool for law enforcement to find suspects. Some police
departments are using a product called BlueJay to scan tweets
so they can pinpoint the actions of known criminals and
identify what is happening that would be of interest to law
enforcement. Thanks to location tagging, police can search
for particular hot spots of crime and even gain instant
photographic evidence from a crime. While only some
Twitter users leave the location tagging option enabled, on
photo-based social networks like Instagram it is far more
common. Small clues can be a potential gold mine of
information for police investigations.
Public Outreach Although social media networks can certainly be helpful in a
criminal investigation, they’re also beneficial to police
departments wanting to connect with the public. A social
media presence is essentially mandatory for today’s police
departments. It allows for police to communicate important
announcements to the community and solicit tips on criminal
investigations.

5. Research the capabilities of a Financial Management information system (FMIS) and write a 2
page report, explaining what kind of decisions an FMIS could improve and what types of data an
FMIS should collect

Capabilities of a Financial Management


Information System
Collect information The ideal FMIS is expected to collect information
in a manner that is accurate, timely, complete,
reliable, and consistent. The information that passes
through the system should ultimately lead to results
that can be trusted. Without sanitizing the
collection process, that won’t be possible.
Reports The ideal financial management information
system is expected to provide management
reporting to accurate levels. These reports can then
assist the management of the business to make
high-level decisions for the direction of the
business.
Support policy decisions The ideal financial management information
system is expected to support policy decisions in
the organization. When policies are made, they
should be backed up by accurate and reliable data,
which should ultimately come from the FMIS
Preparation and execution of budgets
The ideal financial management information
system should support the preparation and
execution of budgets within the business. The
preparation of budgets should be based on financial
reports emanating from the FMIS. Meanwhile, real-
time data from the FMIS should inform the
management about their execution of the budgets
so they know whether they are within limits or
exceeding them.

- Financial statements The ideal financial management information


system should facilitate the preparation of financial
statements. Financial statements are prepared for
both internal use and for external stakeholders.
They should be prepared using accurate and
reliable information, which can be obtained from
the financial management information system.
Information for budgeting, analysis and The ideal financial management information
reporting system should provide information for budgeting,
analysis and reporting. These are three important
high-level functions within any business and can
only be effectively carried out if the data produced
is accurate and reliable, as would be expected from
a properly functioning financial management
information system.
Audit trail The ideal financial management information
system should be able to provide an audit trail to
facilitate the audit process. One of the uses of a
financial information system is to record
transactions. By maintaining records of every
single transaction that occurs within a business, a
financial management information system makes it
possible to carry out an audit effectively.

FMIS solutions can significantly improve the efficiency and equity of government operations,
and offer a great potential for increasing participation, transparency and accountability. Whenever
FMIS and other PFM information systems (for example, e-procurement, payroll, debt management)
are linked with a central data warehouse (DW) to record and report all daily financial transactions,
offering reliable consolidated platforms can be referred to as integrated FMIS (or IFMIS).
An FMIS will consist of several elements with different functions. In the description that follows, the
term “module” will imply that the system is a sub-element in a FMIS. The core of an FMIS could be
expected to include the following modules and systems:
 General ledger  Accounts payable
 Budgetary accounting  Accounts receivable

The noncore or other modules are, inter alia:


 Payroll system
 Budget development
 Procurement
 Project ledger
 Asset module.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy