It App Tools
Payroll and report generated are automated saving time nad reducing manual works.
Automation of Process
Minimize human errors in calculations, reconcilations and financial reporting.
Improved Accuracy
Real time data from IT system allows managers and accountant.
Faster Decision Making
Organized large volumes of financial data making it easier to access store and analyze.
Better Data Management
Reduces the needs for excersive manpower in repetitive tasks.
Cost Efficiency
ERP and accounting system connected accouting with sales, inventory, Hr procurement for smooth business operation
Integration Across Departments
Helps business comply with government regulations.
Compliance and Reporting
Cloud base tools allows accountant and vusiness owners to acess data anytime anywhere.
Remote Accesibility
Protect sensitive financial data through encryption and access control.
Enhanced Security
Modern IT tools provide insights, trend analysis and forecasting to support strategic planning in business
Data Analysis and Fore Casting
Excel
Ms Word
Power point
Google Workspace
Productivity Tools
Quickbooks
Sap
Xero
MYOB (Mind you're own business)
Accounting Systems
ERP (Enterprise Resource Planning)
CRM
Enterprise Systems
Slack
Microsoft Teams
Zoom
Collaboration and Tools
MS Access
SQL
Power BI
Data Tools
Used beads or rods to represent numbers and perform basic arithmetic.
Abacus and Slide Rule
Invented by John Napier, rods inscribed with number to assit multiplication and division
Napier's Bones
Invented by Blaise Pascal it couls add and subtract using gears and wheels
Pascaline
Created by Gollfried Wilhelm Leibniz, capable of multiplication and division.
Steeped Reckoner
Designed by Charles Babbage, a mechanical calculator for polynomical functions
Difference Engine
Also by Babbage, considered the first design for a general purpose computer
Analytical Engine
Invented by Joseph Jacquard use punched cards to control weaving patterns an early example of programmable machine.
Jacquard Loom
First device to send coded messages electronically
Telegraph
By Alexander Graham Bell, carried human voice signals.
Telephone
Vacuum tubes, large and slow
First Generation
Transistors, smaller snd faster
Second Generation
Integrated circuits; cheaper and mlre powerful
Third Generation
Microprocessors, personal computers, smartphone
Fourth Generation
AI, robotics quantum computing
Fifth Generation
An electronic device that controls the flow of electricity in Circuit.
Vacuum Tubes
Tge Vacuum Tubes you may think of it as a kind of electronic, what is the electronic it is?
Valve or Amplifier
ENIAC stands for?
Electronic Numerical Integrated and Computer
A spreadsheet program used to organized, analyze and calculate data
Excel
A word processing program used to create, edit and format text.
MS Word
A presentation software used to create slideshows with text, images, animations and videos for meetings, lectures and reports.
Power Point
A collection of cloyd-based productivity and collaboration tooms by GOOGLE, which includes Gmail (email).
Google Workspace
Helps small and medium sized business manage bookkeping, invoicing, payroll and financial reporting.
Quickbooks
A powerful enterprise resource planning ERP software widely used by large companies
SAP
A cloud based accounting software designed for small businesses, offering tools for invoicing bank reconcilation, expense tracking ans financial report.
Xero
An accounting and business management software popular in Australia and New Zeland.
MYOB
Integrates core business processes like accounting, inventory, HR, and supply chain into one system.
Enterprise Resource Planning ERP
Software that managers customer data, sales, marketing and support to improve relationships and satisfaction.
CRM
A team communication Platform that allows messaging, file sharing and collaborating through organized channels.
Slack
A collaboration platform that combines chat, video meetings, file sharing and integration with microsoft 365 apps.
Microsoft Teams
A video conferencing tools used for online meetings, webinars and virtual classes with features like screen sharing and recording.
Zoom
A microsoft database management tool used to store, organize and manage data with tables.
MS Access
A programming language used to communicate with manage databases by creating, reading, updating and deleting data.
SQL
Microsoft data visualizatiib and business intelligence tool used to analyze data and create interactive reports and dashboards.
Power BI
Is an intentional attempt by hackers or unauthorized users to steal, damage or destroy data in system or network
Cyber Attack
A single machine that can store, process and display information
Computer
A group of two or more computers connected together to share information
Network
Types of Cyber Attack
Phishing Attack, Denial of Service Attack, Man in the Middle Attack, SQL Injection Attack, Ransomware Attack
When users clicked the link, it took them to a fake Google login page that stole their account credentials. The Google Docs Scam 2017
Phishing Attack
The popular developer platfirm GitHub was hit by one of the longest DDos.
Denial Of Service Attack
Hackers have set uo fake WI-FI networks with hakers like "FREE Airport WI-FI"
Man in the Middle Attack
Inserted a malicious code into tge sites database system stealing personak and financial data fir around 400,000 customers.
SQL Injection Attack
Once infected, computers display a message demanding ransom on Bitcoin to unlock their files. Wanna Cry 2017
Ransomware Attack
Stands for malicious software, it refers to any software designed to harm or exploit computers.
Malware
Common Types of Malware
Virus, Worm, Trojan Horse, Adware, Ransomware
Attached to files and spread when shares
Virus
Self-replicates through networks without human act
Worm
Distiguised as a legitimate program.
Trojan Horse
Locks data until payment is made
Ransomware
Display unwanted ads, sometimes slowing your computer
Adware
Different Tyoes of cyber intruders
Trolls, Spies, Hackers, Thieves
Post offensive or controversial comments
Trolls
Often for government or corporate gain
Spies
Skilled comouter users who exploit system weakness
Hackers
Cybercriminal whos steal digital assets like money, identity or data.
Thieves
Computer Security Threats
Data Theft, System Damage, Unauthorized Access, Malware Infections
Stealing sensitive or personal information
Data Theft
Deleting or Corrupting files
System Damage
Logging in without permission
Unathorized Access
Viruses or Spyware slowing down system
Malware Infections
Communivation System Threats
Eavesdropping, Spoofing, Network Breach, Spam and Phishing Messages
Private conversation or data transmissions
Eavesdropping
User or website to deceive people
Spoofing
Breaking into WI-FI or network system
Network Breach
Fake links to malicious sites
Spam and Phishing Message
Effects of Security Threats
Financial loss, Loss of Privacy, System Downtime, Damage to reputation, Legal Consequences