Presentation is loading. Please wait.

Presentation is loading. Please wait.

Essential Standard 2.00 Understand the nature of business. 1.

Similar presentations


Presentation on theme: "Essential Standard 2.00 Understand the nature of business. 1."— Presentation transcript:

1 Essential Standard 2.00 Understand the nature of business. 1

2 Objective 2.04 Understand applications and issues of technology Businesses use of technology Concerns of using technology 2 Essential Questions: How are the common applications of technology used by many businesses classified? How are the common concerns of businesses using technology classified?

3 Applications of Technology by Businesses What are computer networks? –computers linked in a school or business so users can share hardware, software, and data. Examples of computer networks: –Internet - Public network used most often for: Emailing Accessing the World Wide Web (WWW) –Intranet - Private network, primarily used to share information 3

4 Applications of Technology by Businesses continued What is artificial intelligence (AI)? –software that enables computers to reason learn and make decisions Example: voice recognition software Why is Computer-aided design (CAD) used? –to create product styles and designs Example: Design for a camera 4 How do expert systems help people? help people solve technical problems including medical services, financial planning, and legal matters. Example: Automotive parts electronic catalogue

5 Applications of Technology by Businesses continued What is involved in E-commerce? Most common activities of E-Commerce: –Providing product information –Promoting a company –Selling online –Conducting market research –Making payments –Obtaining parts and supplies –Tracking shipments 5

6 Applications of Technology by Businesses continued Four basic models for E-commerce: –B2C: Business-to-Consumer Example: Lands’ End.com selling swimwear to expecting mothers –B2B: Business-to-Business Example: Staples.com ships office supplies to local hospitals –C2B: Consumer-to-Business Example: Customers completing on-line surveys in order to provide feedback to Dunkin’ Donuts –C2C: Consumer-to-Consumer Example: Customer buying electronics from other customers through eBay.com 6

7 Applications of Technology by Businesses continued What is a Management Information System (MIS)? –MIS is an ordered system for processing and reporting information in an organization. Four main components of a MIS: –Gathering data –Analyzing data –Storing data –Reporting results 7

8 Applications of Technology by Businesses continued Categories of information obtained from MIS: –Financial: Information for budgets and financial reports and statements –Production and inventory: Information for production summaries and supplies –Marketing and sales: Information to determine customer needs, economic conditions, and competitors action –Human resources: Information about employees’ salaries, benefits and evaluations 8

9 Applications of Technology by Businesses continued What is involved in robotics activities? What activities happen during telecommuting? 9 It involves mechanical devices programmed to do routine tasks, such as those seen on an assembly line in factories. Workers use computers off-site to do a job, saving travel time and costs.

10 Concerns of Using Technology Employment Trends What are some employment trends in the workplace? What is computer literacy? The ability to use computers and related technology efficiently, with a range of skills covering levels from elementary use to programming and advanced problem solving. 10 Shift in duties and skills needed in the workplace. Retrain displaced workers. Computer literacy is vital. It is the ability to enter, store, process, and retrieve information.

11 Concerns of Using Technology continued Computer Crimes –What is a computer virus? –How many people have encountered a computer virus? –Will someone tell how they removed the virus? 11 program code hidden in a system that can later do damage to software or stored data

12 Concerns of Using Technology continued Computer Crimes continued –What is a white-collar crime? –How many people have access to software that has been copied to a CD by a personal contact? –Did that person commit an act of piracy? 12 - theft of vital information by employees

13 Concerns of Using Technology Health Concerns What are some possible health concerns for employees? 13 Eyestrain and vision problems Muscle tension and nerve damage Carpal tunnel syndrome

14 Privacy Concerns –What are some concerns with privacy? –What is identity theft? Concerns of Using Technology 14 -Dishonest people have access to customer records. -Companies have changed which employees, as well as other people, that may have access to customer and employee records. -the illegal use of someone else's personal information (as a Social Security number) especially in order to obtain money or credit.

15 Credit Cards vs Debit Cards 15

16 Europay, Mastercard, and Visa (EMV) standards What is significant about October 2015? Why did the US adopt this transmission protocol? 16

17 What is my liability? $50 before notification to creditors$0 after notificationCredit cards are now encrypted with unique personal identifiers/chipsMust give multiple identifiers in order to obtain information Name Birthdate SSN (commonly last 4 digits) Zip Code Mother’s maiden name Using credit cards online or over the phone Must have exact card number Must have expiration date Must have security code (on back of card) Credit card companies will notify cardholder of any suspicious activity


Download ppt "Essential Standard 2.00 Understand the nature of business. 1."

Similar presentations


Ads by Google