Learning Objectives 13.1 Explain how businesses benefit from the use of information technology (IT) Describe the components that enable IT– networks,

Slides:



Advertisements
Similar presentations
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Advertisements

C OMPUTING E SSENTIALS Timothy J. O’Leary Linda I. O’Leary Presentations by: Fred Bounds.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Business Technology Applications Computer Basics.
Computer Components.
Security, Privacy, and Ethics Online Computer Crimes.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
PYP002 Intro.to Computer Science Introduction to Networks1 Networks Chapter 17.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter Nine Information Technology and E-Commerce © 2007 The McGraw-Hill Companies, Inc., All Rights Reserved. McGraw-Hill/Irwin Introduction to Business.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE Computer Systems Business Applications.
Information Technology, the Internet, and You
Computing ESSENTIALS     Copyright 2003 The McGraw-Hill Companies, Inc CHAPTER Information Technology, the Internet, and You computing ESSENTIALS.
Information Technology, the Internet, and You © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Lecture # 1 M.Sc / BS(CS)/ BS(I.T) DPT www. Shahid Rasul.com.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Introduction to Computers
The Office Procedures and Technology
Essential Computer Concepts
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
BUSINESS B1 Information Security.
SESSION IV. M I S MIS refers broadly to a computer-based system that provides managers with the tools for organizing, evaluating and efficiently running.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
What Is a Computer? How is a computer defined?
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
Chapter 2: Information Technology and AISs
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
Exploring the Network.
Using Technology to Manage Information Chapter 14.
Microsoft Office 2007 Essential Introduction to Computers.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 16:Managing Information and Technology. Basic element of computer technology  Hardware: input, store, and organize data  System software: performs.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Understand the nature of business. 1. Understand applications and issues of technology. 2.
Using Technology to Manage Information
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
ACM 511 Introduction to Computer Networks. Computer Networks.
Exam 1 Terminology Review MIS Question 1 Information that describes a specific operational aspect of an organization: A. External B. Internal C.
Introduction to Business © Thomson South-Western ChapterChapter Business and Technology Computer Systems Business Applications of Technology.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Basics & Keyboarding. What Is A Computer? An electronic device operating under the control of instructions stored in its own memory unit An electronic.
IT in Business Issues in Information Technology Lecture – 13.
Essential Standard 2.00 Understand the nature of business. 1.
EXAM PREP WORKSHOP MANAGEMENT INFORMATION SYSTEMS.
PARTS OF A COMPUTER 2 Hardware Computer Hardware is any of the physical parts of the computer you can touch. There are 4 categories: 1. Input Devices.
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
© 2012 Cengage Learning. All Rights Reserved. Objective 2.04 Understand applications and issues of technology SLIDE 1 Objective 2.00 Understand the nature.
1.Why it is important to study and understand information systems. 2.Distinguish data from information. 3.Name the components of an information system.
IC 3 BASICS, Internet and Computing Core Certification Computing Fundamentals Lesson 1 What Is a Computer?
Year 12: Unit 2, living in the digital world. 1. What is ICT? ICT is the use of technology to convert data to information. It covers many areas, especially.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
What Is Enterprise Computing?
Securing Information Systems
Section II Terms Emily Stepp.
Discovering Computers 2010: Living in a Digital World Chapter 14
Using Technology to Manage Information
Copyright 2005 Prentice- Hall, Inc.
Presentation transcript:

Learning Objectives 13.1 Explain how businesses benefit from the use of information technology (IT). 13.2 Describe the components that enable IT– networks, hardware, and software. 13.3 Understand how MIS systems are used by managers. 13.4 Identify appropriate uses of business software applications. 13.5 Describe how e-commerce can create a competitive advantage. 13.6 Discuss the challenges IT systems pose to managers.

Information Technology? What is Information Technology?

Information Technology is the set of methods or techniques for acquiring, organizing, storing, manipulating, and transmitting information. Information technology creates efficiencies, reduces costs, and enhances customer responsiveness. Information technology breaks down barriers of time and place by facilitating business over the Internet. Organizations that fail to take advantage of IT find it difficult to compete against increasing levels of productivity in the workplace. Effective IT systems must support organization- or enterprise-wide initiatives and strategies that integrate operations of all functional departments.

Management Information System? What is a Management Information System?

Management Information System (MIS) is a specific form of IT that managers utilize to generate the specific, detailed information they need to perform their roles effectively. Examples of MIS systems include: Supply Chain Management System – a MIS that provides information to all different entities in the supply chain to help them work together more effectively. Operations Management System – a MIS that provides information to help transform resources into goods and services. Customer Relationship Management System (CRM) – a MIS that provides information on customer interactions which is used to develop ongoing relationships with customers to maximize their value.

Data, Information, and Data Mining Data – Unprocessed facts and figures that are input for a MIS. Information – Processed data that are output for MIS. Information must possess four characteristics to be useful to managers: Quality (accurate and reliable) Completeness (sufficient to make a decision) Timeliness (accessible when needed) Relevance (addresses the right questions) Data Mining – The ability to discover beneficial relationships among data.

MIS Classifications There are four classifications of a MIS which include: Transaction-processing Systems – A system designed to handle large volume of routine, recurring transactions. Banks use these systems to record deposits and withdraws from accounts. Operations Information Systems – A system that gathers, organizes, and summarizes data in a form that is of value to managers. Managers use these systems to obtain sales, inventory, accounting and other performance related information. Decision Support Systems – An interactive system that provides models that aid managers in making nonprogrammed or atypical decisions. Expert Systems – An advanced system that employs artificial intelligence to solve problems that ordinarily require human expertise.

What is a Network?

Network – a system for data exchange and resource sharing by linking computers to a central database. Networks provide two key benefits: The ability to communicate and the ability to share data. A small network can be made up of two computers linked together, while the largest network is the Internet. The biggest limitations of networks is speed.

Types of Networks Intranet – A company-wide network, closed to public access, that uses Internet-type technology. They are one of the most secure forms of networks. Extranet – A semiprivate network that uses Internet technology and allows more than one company to access the same information or allows people on different servers to collaborate. Virtual Private Network (VPN) – A private data network that creates secure connections, or “tunnels,” over regular Internet lines. Internet – A global public network of thousands of smaller computer networks. It is the largest public network and can be accessed by anyone with a computer and a data connection.

Types of Networks - continued Cloud Computing Network – A form of virtualization in which a company’s data and applications are stored at offsite data centers that are accessed over the Internet (the cloud). Wireless Fidelity or WiFi – The technology used to obtain an internet connection without having to connect to a phone or cable line. Voice Over Internet Protocol (VoIP) – The Internet infrastructure that is used to route voice calls over the Internet. Radio Frequency Identification (RFID) – Electronic chips placed on goods to relay information, such as location, to electronic readers.

What is Hardware?

Hardware – the physical devices associated with computing that include computers, printers, laptops, smart phones, tablets, iPods, and more. Computer hardware components include: Central Processing Unit (CPU) Primary Storage Secondary Storage Input Devices Output Devices Communication Devices

Computer Hardware Central Processing Unit (CPU) – The hardware that interprets and executes software instructions and coordinates how all the other hardware devices work together. Primary Storage – The computer’s main memory in which program instructions and data are stored for direct access by the CPU. Secondary Storage – Removable hardware used to store data for long-term storage or portability. Secondary storage devices include compact disk, CD-ROMs, DVDs and thumb drives. Input Devices – Hardware used to capture information and commands. A keyboard, mouse, scanner, digital camera, and webcam are input devices. Output Devices – Hardware used to see, hear, or accept the results of information processing requests. Printers, monitors and speakers are output devices. Communication Devices – Hardware used to send information from one location and receive it at another. These devices include modems, cable, broadband, DSL lines, etc.

What is Software?

Software – a set of programs and procedures used to operate a computer and perform specific tasks. Software can be classified into two types: System software Application software

System Software The software that controls how technology tools work together, along with application software. System software includes: Operating System Software (OSS) – controls application software and manages how hardware devices work together. Common operating systems include Unix, Linux, Microsoft Windows and Mac OS X. Utility Software – provides additional functionality to the operating system for a specific purpose. Some examples of utility software include antivirus, spyware, data recovery, and disk optimization.

Application Software The software that is a set of instruction that tell a computer how to process information for a specific purpose. Common types of software applications used in business include word processing, spreadsheets, databases, presentation, email, and more. Most business software is distributed commercially through suppliers, retail stores or directly by the manufacturer. Free software is available in two formats: Freeware – free to use without any restrictions Shareware – copyrighted but distributed free of charge to potential customers. Users that find the software meets their needs are asked to pay a fee to the developer.

What is E-Business?

A type of e-business is ecommerce. E-Business – refers to a company that conducts business over the Internet. E-business may consist of providing information, such as online bank balance, servicing customers, or collaborating with business partners or suppliers. A type of e-business is ecommerce. E-commerce – the buying and selling of goods over the Internet. There are four type of e-commerce transactions: Buinsess-to-business (B2B) – A business that produces products to sell to other businesses electronically. Business-to-consumer (B2C) – A business that produces products to sell directly to consumers electronically. Consumer-to-business (C2B) – Applies to any consumer that sells a product or service to a business over the Internet. Consumer-to-consumer (C2C) – Applies to consumers buying and selling for other consumers.

Web 2.0 and Social Networking Web 2.0 – The second generation of the world wide web with interactive and collaborative functionality that includes blogs, wikis, video sharing, social networking and more. Social Network – An Internet site that facilitates relationships among people and businesses. Many businesses ban employees from using social networks as they believe they decrease productivity or employees may post negative remarks.

Information Technology Challenges in Information Technology

Information Technology, has many benefits, but also many challenges Information Technology, has many benefits, but also many challenges. Some of those challenges include: Information security Viruses Cybercrime Privacy Phishing Network instability Data reliability Computer Ethics

Information Technology Challenges Information Security Secure information is susceptible to risk from hackers, viruses, and lax internal computing policies. Hackers are individuals who unlawfully break into systems and breach security by stealing private data. Several tools to combat hackers include strong authentication, encryption, and firewalls. Authentication – The process of determining whether someone is who they declare to be, normally through the use of passwords to gain access to a network. Encryption – Scrambles information into a form that requires a key or password to decrypt it. Firewall – Analyzes information entering and leaving a network and prevents transmission of information without proper markings.

Information Technology Challenges – continued Viruses A piece of programming code inserted into other programming to cause an unexpected and usually undesirable event. Viruses are spread by software, files, and hyperlinks from an unknown source and may be able to get past firewalls. The best way to minimize against virus threats is to: Use a high quality antivirus program and keep it up-to-date to detect new viruses. Scan software using an antivirus program before using it. Scan shared file storage devices, such as CDs, USB flash drives, external drives and memory cards. Download files only from known sources and scan Internet downloads and email attachments with an antivirus program.

Information Technology Challenges – continued Backup and Recovery Every day businesses lose time and money because of system crashes and failures. One way to minimize the damage is to have a backup and recovery strategy in place: Backup – an exact copy of a system’s information and can be accomplished by a manager making a CD backup on a daily basis or the IT department performing a whole system backup. Recovery – the ability to get a system up and running in the event of a crash or failure. Responsibility for recovery should be assigned before a system failure occurs. Cyberterrorism And extreme form of hacking where terrorist hackers can shut down entire systems bringing communications, transportation, and utility services to a complete halt.

Information Technology Challenges – continued Privacy The increasing use of technology create major concerns about privacy for many organizations customers, as nearly all website collect some form of personal information. Ethical organizations maintain a privacy policy that discloses what private information they can collect, how it can be used, and whether it can be distributed to others. Any use of private information other than originally intended or agreed to by the user, is a considered a breach of privacy and grounds for legal action. Phishing An online security threat that requests personal information be returned to the sender, with the outcome often being identity theft. Phishing attempts use a branded email message that looks authentic to fool the recipient into giving private information.

Information Technology Challenges – continued Network Instability Is the threat of a network being inaccessible and affecting business operations. IT staff typically handle the detection and resolution of instability, but it is the managers concern to ensure that current data is available from regularly scheduled backups that save data to storage. Data Reliability Input data must be accurate in order to obtain reliable output. Information must pass the “reasonableness” test, and not be assumed accurate because it was computer generated. Computer Ethics Companies should establish an ethical computer policy to establish guidelines for acceptable use for company computers. A written policy ensures users are informed of the rules and consent to abide by them.