35
STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES USE OF TECHNOLOGY CONCERNS OF USING TECHNOLOGY

STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Embed Size (px)

Citation preview

Page 1: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

STUDENTS WILL:UNDERSTAND THE NATURE OF BUSINESS.

UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY.

1

Essential Standard 2.00Objective 2.04

TOPICS:

BUSINESSES USE OF TECHNOLOGY

CONCERNS OF USING TECHNOLOGY

Page 2: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Parts of the Computer

Tower CPU

Speakers

Ergonomic Keyboard

Monitor

Mouse

Desktop CPU

Page 3: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Comparing Sizes of Computershttp://www.youtube.com/user/sonyelectronics?feature=chclk

Page 4: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Alternative Input Devices

Scanner

Mouse

Digital CameraBiometric Device

Digital Camcorder

Writing TabletScientific Probe

Webcam

Smart Phone

Page 5: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

5

Business Technology Applications

What are computer networks? Computer networks are computers linked

in a school or business so users can share hardware, software, and data.

Hickory Ridge is part of the CCS LAN (Local Access Network) network. We have over 300 computers that are run through the common network.

Networking allows students to access previously saved information anywhere in the building or at other schools in the system.

Page 6: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

6

Internet Public network used

most often for: Emailing Accessing the World

Wide Web (WWW)

Intranet Private network

primarily used to share:information WITHIN a business

Only members or employees can utilize

Effective tool for sharing information, saving time & money

Examples of Computer Networks

Page 7: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Applications of Technology by Businesses

7

What is artificial intelligence (AI)?

software that enables computers to reason learn and make decisions.

Example: voice recognition software

Why is Computer-aided design (CAD) used?

used to create product styles and designs.

Examples: Design for a camera Drawings for homes,

buildings, equipment Electronic prototypes

video link- robot

Page 8: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

8

Computer Assisted Design Example

Page 9: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Computer Assisted Design Video Clip9

http://www.youtube.com/watch?v=3bgmPyr5Obc&safety_mode=true&persist_safety_mode=1

Designing a Diamond Ring

Page 10: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Business Technology Applications 10

Computer assisted Instruction Used in education Help people improve

skills at their own pace

Telemedicine Video conferencing

from remote areas so patients have access to diagnosis by doctor in another location

Public records Military records Social security Medical information Police records

Page 11: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Financial Activities

Bill paying online, checking credit report, selling stocks

11

Page 12: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Technology Applications by Businesses

What is E-commerce?

E-commerce is conducting business transactions using the Internet or other technology. *E=electronic

12

Page 13: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Providing product information

Promoting/marketing a company

Selling onlineConducting market

researchCollecting/making

payments on lineObtaining parts and

suppliesTracking shipments

Common E-Commerce Activities13

Page 14: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

ExamplesExamples

Message on your cell phone screen from a business advertising their sale

Ebay - online auctionWebsite that asks

market survey questions and give prizes for participation

E-Commerce14

Page 15: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Four Basic E-commerce Models

15

B2C: Business-to-Consumer Example: Lands’ End.com selling swimwear to expecting

mothers, Ben & Jerry’s selling ice cream related goods

B2B: Business-to-Business Example: Staples.com ships office supplies to local

hospital

C2B: Consumer-to-Business Example: Customers completing on-line marketing

surveys in order to provide feedback to Dunkin’ Donuts

C2C: Consumer-to-Consumer Example: Customer buying electronics from other

customers through eBay.com

Page 16: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Expert Systems16

How do expert systems help people?

Expert systems are computer programs that help people solve technical problems including medical services, financial planning, and legal matters.

Examples: -Automotive parts

electronic catalogues-Quicken books-Peachtree Accounting

Page 17: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Management Information Systems (MIS)

17

An ordered system of processing and reporting information in an organization

Management uses information to make business decisions.

Four main components of a MIS: Gathering data Analyzing data Storing data Reporting results

http://www.youtube.com/watch?v=fJYFpwbvuDc&safety_mode=true&persist_safety_mode=1

Page 18: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

MIS Categories of Information18

Financial Information for

budgets and financial reports and statements

Production and inventory Information for

production summaries and supplies

Marketing and sales Information to

determine customer needs, economic conditions, and competitors action

http://www.5min.com/Video/How-T-Mobile-Leveraged-Social-Media-for-Google-Phone-Sales-514899158

Human resources Information about

employees’ salaries, benefits and evaluations

Page 19: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Business Applications of Technology14

What is robotics ?mechanical devices

are programmed to do routine tasks, such as those seen on an assembly line in factories

Robots can: Work underground Work under water Work in outer space Work 24 hours/7days

a week Work in humanly

impossible situations

video link-Rosie the robot

Page 20: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Vacuum Cleaner

Page 21: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Telecommuting

What happens during telecommuting activities?Workers use computers off-site (at home) to do a

job, saving travel time and costs.Works well for occupations:

Writers Editors Accountants Computer Programmers Web designers

Workers send reports, documents, & ideas to employers via email, fax, videoconferencing

21

http://www.youtube.com/watch?v=TAJRgNu_O9U&safety_mode=true&persist_safety_mode=1

Page 22: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Business ApplicationsFinancial activities

Bill pay online Direct deposit Electronic Funds

Transfer Selling stocks Completing tax returns Checking credit

reports Public Records

Military records Social security Medical information Police records

Telemedicine Video conferencing

from remote locations so patients have access to diagnosis by doctor in another location

Using robotics for surgical procedures

22

Page 23: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Computer Assisted Instruction

Advantages Learner proceeds at

own ability level and pace

Learner has necessary tools to learn material

Company/trainer can deliver same training to every user

Offers flexibility in timing and outcomes

Disadvantages Lack of personal

contact with a teacher may be detrimental to the student

Learner must be self motivated

Learner must be technology savvy

Learner must have access to computer

Limited professional training given

23

Page 24: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

24

Concerns of Using Technology

Ethicsmoral guidelines that govern the use of computers and information systems

Employment TrendsShift in duties and skills needed in the

workplace.Companies retrain displaced workers who are

unemployed because of changing job conditions.Computer literacy is vital.

Literacy the ability to enter, store, process, and retrieve information.

Page 25: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

25

Concerns-Computer Crimes

A computer virus is a hidden program code in a system that can do damage to software or stored data. How many people have encountered a computer

virus? Will someone tell how they removed the virus?

Viruses may be programmed to become active : At a specific date When certain keystrokes are made When certain data is accessed

Page 26: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Types of Viruses

Bomb - Destructive computer code or virus designed to activate at a specific time

Hoax - A program intended to scare users into thinking they have a virus

Phage - A program that modifies other programs, operating systems, and databases on a Personal Digital Assistant

Trojan Horse - A virus disguised as a useful piece of software

Virus - A computer program designed to cause damage to computer files

Worm Destructive computer program that bores its way through a computer network

26

Page 27: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Copyright

Protection of intellectual property Gives owner/creator exclusive rights to reproduce or

distribute copies of his/her own work

From the US copyright website above: What are examples of protected property? Do I have to register with US Copyright office?

Go to “is my copyright good in other countries”. Name three countries that do not recognize US copyrights. Name three countries with WTO international agreements.

For works created after 1-1-78, : How many years does a copyright last? Can you renew the copyright?

27

http://www.copyright.gov/help/faq/

Page 28: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

28

Theft ConcernsHow many people have access to software

that has been copied to a CD by a personal contact?

Did that person commit an act of piracy?

Piracy -stealing or illegally copying software packages or information

Copyright infringement - the illegal copying of proprietary (property of another) works

Page 29: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

White Collar Crimes

An illegal act carried out by office or professional workers while at work including:

stealing money, information, or computer time through improper use of computer systems.

Would you be afraid of this person?

Check out this website and see what he did.

29

http://www.businessinsider.com/americas-most-wanted-white-collar-criminals-2009-11#james-t-hammes-2

Page 30: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

30

Health Concerns of Using Technology

Eyestrain and vision problems

Muscle tension and nerve damage Ergonomically poor equipment

Carpal tunnel syndrome A repetitive stress syndrome

Lack of physical exercise & obesity

Page 31: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Privacy Concerns of Using Technology 31

Dishonest people have access to customer records.Companies have changed which employees as well

as other people that may have access to customer records.

To protect customers, some companies are: Increasing database security Changing access codes multiple times during day Becoming more strict about who has access Purchasing tighter security systems

Laws are changing but can’t keep up with technology.

Page 32: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Identity Theft

Thieves: Obtain information

online Apply for credit cards Access bank account

informationDo not give private

information out over the internet or phone unless you know the site is secure!

http://www.businessinsider.com/americas-most-wanted-white-collar-criminals-2009-11#leonard-weston-ramey-12

Check out the website and see how many identities this man has had.

32

Page 33: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Frank William Abagnale, Jr.

Known as a cheque forger, skilled impostor, and escape artist.

Notorious in the 1960s for successfully passing US$2.5 million worth of meticulously forged checks across 26 countries over the course of five years, beginning when he was 16 years old.

Assumed no fewer than eight separate identities, successfully impersonating an airline pilot, a doctor, a Bureau of Prisons agent, and a lawyer all before he was 21 years old.

33

Page 34: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Protecting Your Information

Antivirus program Detects viruses and

repairs filesEncryption

Converts readable data into unreadable characters to prevent unauthorized access

Hacker Person who secretly gains

access to computers and files without permission

Password (access code) Safeguard for access to a

computer program Should be unique Should be private Should be changed

34

Utilize antivirus programs, encryption; select passwords carefully and change often to reduce the risk of hackers

accessing your personal information.

Page 35: STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 1 Essential Standard 2.00 Objective 2.04 TOPICS: BUSINESSES

Cutting Edge Technology Innovations

link: my-blackberry-is-not-working

link: hubble-ultra-deep-field-3d

link: revolving-house-architecture

link to car that runs on air

link to gps- how does it work?

link to gm-hy-wire-concept-car

video link: helicopter-

cable-inspector

35