Download presentation
Presentation is loading. Please wait.
Published byFrancine George Modified over 9 years ago
1
Understand the nature of business. 1
2
Understand applications and issues of technology. 2
3
Topics Businesses use of technology Concerns of using technology 3
4
Businesses use of technology 4
5
5 Applications of Technology by Businesses What are computer networks? Computer networks are computers linked in a school or business so users can share hardware, software, and data. Computer networks consists of computers linked so users can share hardware, software, and data. Examples of computer networks: Internet - Public network used most often for: Emailing Accessing the World Wide Web (WWW) Intranet - Private network, primarily used to share information
6
Applications of Technology by Businesses continued What is artificial intelligence (AI)? It is software that enables computers to reason learn and make decisions Example: voice recognition software How do expert systems help people? Expert systems are computer programs that help people solve technical problems including medical services, financial planning, and legal matters Example: Automotive parts electronic catalogue Why is Computer-aided design (CAD) used? It is used to create product styles and designs Example: Design for a camera 6
7
Applications of Technology by Businesses continued What is involved in E-commerce? E-commerce is conducting business transactions using the Internet or other technology Most common activities of E-Commerce: Providing product information Promoting a company Selling online Conducting market research Making payments Obtaining parts and supplies Tracking shipments 7
8
Applications of Technology by Businesses continued Four basic models for E-commerce: B2C: Business-to-Consumer Example: Lands’ End.com selling swimwear to expecting mothers B2B: Business-to-Business Example: Staples.com ships office supplies to local hospitals C2B: Consumer-to-Business Example: Customers completing on-line surveys in order to provide feedback to Dunkin’ Donuts C2C: Consumer-to-Consumer Example: Customer buying electronics from other customers through eBay.com 8
9
9 Applications of Technology by Businesses continued What is a Management Information System (MIS)? MIS is an ordered system for processing and reporting information in an organization Four main components of a MIS: Gathering data Analyzing data Storing data Reporting results
10
Applications of Technology by Businesses continued Categories of information obtained from MIS: Financial Information for budgets and financial reports and statements Production and inventory Information for production summaries and supplies Marketing and sales Information to determine customer needs, economic conditions, and competitors action Human resources Information about employees’ salaries, benefits and evaluations 10
11
Applications of Technology by Businesses continued What is involved in robotics activities? It involves mechanical devices programmed to do routine tasks, such as those seen on an assembly line in factories. What happens during telecommuting activities? Workers use computers off-site to do a job, saving travel time and costs. 11
12
Concerns of using technology 12
13
13 Concerns of Using Technology Employment Trends What are some employment trends in the workplace? Shift in duties and skills needed in the workplace. Companies have to retrain displaced workers. What is computer literacy? It is the ability to enter, store, process, and retrieve information
14
14 Concerns of Using Technology continued Computer Crimes What is a computer virus? is a hidden program code in a system that can do damage to software or stored data. How many people have encountered a computer virus? Will someone tell how they removed the virus?
15
15 Concerns of Using Technology continued Computer Crimes continued What is a white-collar crime? is an illegal act carried out by office or professional workers while at work including stealing money, information, or computer time through improper use of computer systems How many people have access to software that has been copied to a CD by a personal contact? Did that person commit an act of piracy? is stealing or illegally copying software packages or information
16
16 Concerns of Using Technology continued Health Concerns What are some possible health concerns for employees? Eyestrain and vision problems Muscle tension and nerve damage Carpal tunnel syndrome
17
Concerns of Using Technology continued Privacy Concerns What are some concerns with privacy? Dishonest people have access to customer records. Companies have changed which employees, as well as other people, that may have access to customer and employee records. What is identity theft? Identity theft is thieves obtaining information online about a person 17
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.