Presentation is loading. Please wait.

Presentation is loading. Please wait.

Essential Standard 2.00 Understand the nature of business. 1.

Similar presentations


Presentation on theme: "Essential Standard 2.00 Understand the nature of business. 1."— Presentation transcript:

1 Essential Standard 2.00 Understand the nature of business. 1

2 Objective 2.04 Understand applications and issues of technology. 2

3  Businesses use of technology  Concerns of using technology 3 Topics

4 Businesses use of technology 4

5 5 Applications of Technology by Businesses  What are computer networks?  Computer networks are computers linked in a school or business so users can share hardware, software, and data.  Computer networks consists of computers linked so users can share hardware, software, and data.  Examples of computer networks:  Internet Public network used most often for:  Emailing  Accessing the World Wide Web (WWW)  Intranet Private network, primarily used to share information

6 Applications of Technology by Businesses continued 6 What is artificial intelligence (AI)? It is software that enables computers to reason learn and make decisions. Ex. Voice recognition software  How do expert systems help people? Expert systems are computer programs that help people solve technical problems including medical services, financial planning, and legal matters. Ex. Automotive parts electronic catalogue  Why is Computer-aided design (CAD) used? It is used to create product styles and designs  Example: Design for a camera

7  What is involved in E-commerce? E-commerce is conducting business transactions using the Internet or other technology  Most common activities of E-Commerce:  Providing product information  Promoting a company  Selling online  Conducting market research  Making payments  Obtaining parts and supplies  Tracking shipments 7 Applications of Technology by Businesses continued

8 Four basic models for E-commerce:  B2C: Business-to-Consumer  Example: Lands’ End.com selling swimwear to expecting mothers  B2B: Business-to-Business  Example: Staples.com ships office supplies to local hospitals  C2B: Consumer-to-Business  Example: Customers completing on-line surveys in order to provide feedback to Dunkin’ Donuts  C2C: Consumer-to-Consumer  Example: Customer buying electronics from other customers through eBay.com 8 Applications of Technology by Businesses continued

9 9  What is a Management Information System (MIS)? MIS is an ordered system for processing and reporting information in an organization.  Four main components of a MIS:  Gathering data  Analyzing data  Storing data  Reporting results

10  Categories of information obtain from MIS:  Financial  Information for budgets and financial reports and statements  Production and inventory  Information for production summaries and supplies  Marketing and sales  Information to determine customer needs, economic conditions, and competitors action  Human resources  Information about employees’ salaries, benefits and evaluations 10 Applications of Technology by Businesses continued

11 11  What is involved in robotics activities?  It involves mechanical devices programmed to do routine tasks, such as those seen on an assembly line in factories. What happened during telecommuting activities? Workers use computers off-site to do a job, saving travel time and costs.

12 Concerns of using technology 12

13 13 Concerns of Using Technology Employment Trends  Shift in duties and skills needed in the workplace.  Companies have to retrain displaced workers.  Computer literacy is vital. It is the ability to enter, store, process, and retrieve information.

14 14 Concerns of Using Technology continued Computer Crimes  A computer virus is a hidden program code in a system that can do damage to software or stored data.  How many people have encountered a computer virus?  Will someone tell how they removed the virus?

15 15 Concerns of Using Technology continued  How many people have access to software that has been copied to a CD by a personal contact?  Did that person commit an act of piracy? Piracy is stealing or illegally copying software packages or information.  White-collar crime is an illegal act carried out by office or professional workers while at work including stealing money, information, or computer time through improper use of computer systems.

16 16 Concerns of Using Technology continued Health Concerns  Eyestrain and vision problems  Muscle tension and nerve damage  Carpal tunnel syndrome

17 Privacy Concerns  Dishonest people have access to customer records.  Companies have changed which employees as well as other people that may have access to customer records. 17 Concerns of Using Technology continued


Download ppt "Essential Standard 2.00 Understand the nature of business. 1."

Similar presentations


Ads by Google