Business and Technology

Download Report

Transcript Business and Technology

Understand the nature of business.
1
Understand applications and issues of technology.
2
Topics
 Businesses use of technology
 Concerns of using technology
3
Businesses use of technology
4
Applications of Technology
by Businesses
 What are computer networks?
 Computer networks are computers linked in a school or business so users
can share hardware, software, and data.
 Computer networks consists of computers linked so users can share
hardware, software, and data.
 Examples of computer networks:
 Internet - Public network used most often for:


Emailing
Accessing the World Wide Web (WWW)
 Intranet - Private network, primarily used to share
information
5
Applications of Technology
by Businesses continued
 What is artificial intelligence (AI)?
 It is software that enables computers to reason learn and make decisions
 Example: voice recognition software
 How do expert systems help people?
 Expert systems are computer programs that help people solve
technical problems including medical services, financial planning,
and legal matters
 Example: Automotive parts electronic catalogue
 Why is Computer-aided design (CAD) used?
 It is used to create product styles and designs
 Example: Design for a camera
6
Applications of Technology
by Businesses continued
 What is involved in E-commerce?
 E-commerce is conducting business transactions using
the Internet or other technology
 Most common activities of E-Commerce:
 Providing product information
 Promoting a company
 Selling online
 Conducting market research
 Making payments
 Obtaining parts and supplies
 Tracking shipments
7
Applications of Technology
by Businesses continued
Four basic models for E-commerce:
 B2C: Business-to-Consumer
 Example: Lands’ End.com selling swimwear to expecting mothers
 B2B: Business-to-Business
 Example: Staples.com ships office supplies to local hospitals
 C2B: Consumer-to-Business
 Example: Customers completing on-line surveys in order to
provide feedback to Dunkin’ Donuts
 C2C: Consumer-to-Consumer
 Example: Customer buying electronics from other customers
through eBay.com
8
Applications of Technology
by Businesses continued
 What is a Management Information System (MIS)?
 MIS is an ordered system for processing and reporting
information in an organization
 Four main components of a MIS:
 Gathering data
 Analyzing data
 Storing data
 Reporting results
9
Applications of Technology
by Businesses continued
Categories of information obtained from MIS:
 Financial
 Information for budgets and financial reports and statements
 Production and inventory
 Information for production summaries and supplies
 Marketing and sales
 Information to determine customer needs, economic
conditions, and competitors action
 Human resources
 Information about employees’ salaries, benefits and
evaluations
10
Applications of Technology
by Businesses continued
 What is involved in robotics activities?
 It involves mechanical devices
programmed to do routine tasks, such as
those seen on an assembly line in
factories.
 What happens during telecommuting
activities?
 Workers use computers off-site to do a
job, saving travel time and costs.
11
Concerns of using technology
12
Concerns of Using Technology
Employment Trends
 What are some employment trends in the workplace?
 Shift in duties and skills needed in the workplace.
 Companies have to retrain displaced workers.
 What is computer literacy?
 It is the ability to enter, store, process, and retrieve
information
13
Concerns of Using Technology continued
Computer Crimes
 What is a computer virus?

is a hidden program code in a system that can do damage to
software or stored data.
 How many people have encountered a computer virus?
 Will someone tell how they removed the virus?
14
Concerns of Using Technology continued
Computer Crimes continued
 What is a white-collar crime?
 is an illegal act carried out by office or professional workers
while at work including stealing money, information, or
computer time through improper use of computer systems
 How many people have access to software that has been
copied to a CD by a personal contact?
 Did that person commit an act of piracy?
 is stealing or illegally copying software packages or
information
15
Concerns of Using Technology continued
Health Concerns
What are some possible health concerns for
employees?
 Eyestrain and vision problems
 Muscle tension and nerve damage
 Carpal tunnel syndrome
16
Concerns of Using Technology
continued
Privacy Concerns
 What are some concerns with privacy?


Dishonest people have access to customer records.
Companies have changed which employees, as well as other
people, that may have access to customer and employee
records.
 What is identity theft?

Identity theft is thieves obtaining information online about a
person
17