Upload
alan-fleming
View
221
Download
0
Tags:
Embed Size (px)
Citation preview
STUDENTS WILL:UNDERSTAND THE NATURE OF BUSINESS.
UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY.
1
Essential Standard 2.00Objective 2.04
TOPICS:
BUSINESSES USE OF TECHNOLOGY
CONCERNS OF USING TECHNOLOGY
Parts of the Computer
Tower CPU
Speakers
Ergonomic Keyboard
Monitor
Mouse
Desktop CPU
Comparing Sizes of Computershttp://www.youtube.com/user/sonyelectronics?feature=chclk
Alternative Input Devices
Scanner
Mouse
Digital CameraBiometric Device
Digital Camcorder
Writing TabletScientific Probe
Webcam
Smart Phone
5
Business Technology Applications
What are computer networks? Computer networks are computers linked
in a school or business so users can share hardware, software, and data.
Hickory Ridge is part of the CCS LAN (Local Access Network) network. We have over 300 computers that are run through the common network.
Networking allows students to access previously saved information anywhere in the building or at other schools in the system.
6
Internet Public network used
most often for: Emailing Accessing the World
Wide Web (WWW)
Intranet Private network
primarily used to share:information WITHIN a business
Only members or employees can utilize
Effective tool for sharing information, saving time & money
Examples of Computer Networks
Applications of Technology by Businesses
7
What is artificial intelligence (AI)?
software that enables computers to reason learn and make decisions.
Example: voice recognition software
Why is Computer-aided design (CAD) used?
used to create product styles and designs.
Examples: Design for a camera Drawings for homes,
buildings, equipment Electronic prototypes
video link- robot
8
Computer Assisted Design Example
Computer Assisted Design Video Clip9
http://www.youtube.com/watch?v=3bgmPyr5Obc&safety_mode=true&persist_safety_mode=1
Designing a Diamond Ring
Business Technology Applications 10
Computer assisted Instruction Used in education Help people improve
skills at their own pace
Telemedicine Video conferencing
from remote areas so patients have access to diagnosis by doctor in another location
Public records Military records Social security Medical information Police records
Financial Activities
Bill paying online, checking credit report, selling stocks
11
Technology Applications by Businesses
What is E-commerce?
E-commerce is conducting business transactions using the Internet or other technology. *E=electronic
12
Providing product information
Promoting/marketing a company
Selling onlineConducting market
researchCollecting/making
payments on lineObtaining parts and
suppliesTracking shipments
Common E-Commerce Activities13
ExamplesExamples
Message on your cell phone screen from a business advertising their sale
Ebay - online auctionWebsite that asks
market survey questions and give prizes for participation
E-Commerce14
Four Basic E-commerce Models
15
B2C: Business-to-Consumer Example: Lands’ End.com selling swimwear to expecting
mothers, Ben & Jerry’s selling ice cream related goods
B2B: Business-to-Business Example: Staples.com ships office supplies to local
hospital
C2B: Consumer-to-Business Example: Customers completing on-line marketing
surveys in order to provide feedback to Dunkin’ Donuts
C2C: Consumer-to-Consumer Example: Customer buying electronics from other
customers through eBay.com
Expert Systems16
How do expert systems help people?
Expert systems are computer programs that help people solve technical problems including medical services, financial planning, and legal matters.
Examples: -Automotive parts
electronic catalogues-Quicken books-Peachtree Accounting
Management Information Systems (MIS)
17
An ordered system of processing and reporting information in an organization
Management uses information to make business decisions.
Four main components of a MIS: Gathering data Analyzing data Storing data Reporting results
http://www.youtube.com/watch?v=fJYFpwbvuDc&safety_mode=true&persist_safety_mode=1
MIS Categories of Information18
Financial Information for
budgets and financial reports and statements
Production and inventory Information for
production summaries and supplies
Marketing and sales Information to
determine customer needs, economic conditions, and competitors action
http://www.5min.com/Video/How-T-Mobile-Leveraged-Social-Media-for-Google-Phone-Sales-514899158
Human resources Information about
employees’ salaries, benefits and evaluations
Business Applications of Technology14
What is robotics ?mechanical devices
are programmed to do routine tasks, such as those seen on an assembly line in factories
Robots can: Work underground Work under water Work in outer space Work 24 hours/7days
a week Work in humanly
impossible situations
video link-Rosie the robot
Vacuum Cleaner
Telecommuting
What happens during telecommuting activities?Workers use computers off-site (at home) to do a
job, saving travel time and costs.Works well for occupations:
Writers Editors Accountants Computer Programmers Web designers
Workers send reports, documents, & ideas to employers via email, fax, videoconferencing
21
http://www.youtube.com/watch?v=TAJRgNu_O9U&safety_mode=true&persist_safety_mode=1
Business ApplicationsFinancial activities
Bill pay online Direct deposit Electronic Funds
Transfer Selling stocks Completing tax returns Checking credit
reports Public Records
Military records Social security Medical information Police records
Telemedicine Video conferencing
from remote locations so patients have access to diagnosis by doctor in another location
Using robotics for surgical procedures
22
Computer Assisted Instruction
Advantages Learner proceeds at
own ability level and pace
Learner has necessary tools to learn material
Company/trainer can deliver same training to every user
Offers flexibility in timing and outcomes
Disadvantages Lack of personal
contact with a teacher may be detrimental to the student
Learner must be self motivated
Learner must be technology savvy
Learner must have access to computer
Limited professional training given
23
24
Concerns of Using Technology
Ethicsmoral guidelines that govern the use of computers and information systems
Employment TrendsShift in duties and skills needed in the
workplace.Companies retrain displaced workers who are
unemployed because of changing job conditions.Computer literacy is vital.
Literacy the ability to enter, store, process, and retrieve information.
25
Concerns-Computer Crimes
A computer virus is a hidden program code in a system that can do damage to software or stored data. How many people have encountered a computer
virus? Will someone tell how they removed the virus?
Viruses may be programmed to become active : At a specific date When certain keystrokes are made When certain data is accessed
Types of Viruses
Bomb - Destructive computer code or virus designed to activate at a specific time
Hoax - A program intended to scare users into thinking they have a virus
Phage - A program that modifies other programs, operating systems, and databases on a Personal Digital Assistant
Trojan Horse - A virus disguised as a useful piece of software
Virus - A computer program designed to cause damage to computer files
Worm Destructive computer program that bores its way through a computer network
26
Copyright
Protection of intellectual property Gives owner/creator exclusive rights to reproduce or
distribute copies of his/her own work
From the US copyright website above: What are examples of protected property? Do I have to register with US Copyright office?
Go to “is my copyright good in other countries”. Name three countries that do not recognize US copyrights. Name three countries with WTO international agreements.
For works created after 1-1-78, : How many years does a copyright last? Can you renew the copyright?
27
http://www.copyright.gov/help/faq/
28
Theft ConcernsHow many people have access to software
that has been copied to a CD by a personal contact?
Did that person commit an act of piracy?
Piracy -stealing or illegally copying software packages or information
Copyright infringement - the illegal copying of proprietary (property of another) works
White Collar Crimes
An illegal act carried out by office or professional workers while at work including:
stealing money, information, or computer time through improper use of computer systems.
Would you be afraid of this person?
Check out this website and see what he did.
29
http://www.businessinsider.com/americas-most-wanted-white-collar-criminals-2009-11#james-t-hammes-2
30
Health Concerns of Using Technology
Eyestrain and vision problems
Muscle tension and nerve damage Ergonomically poor equipment
Carpal tunnel syndrome A repetitive stress syndrome
Lack of physical exercise & obesity
Privacy Concerns of Using Technology 31
Dishonest people have access to customer records.Companies have changed which employees as well
as other people that may have access to customer records.
To protect customers, some companies are: Increasing database security Changing access codes multiple times during day Becoming more strict about who has access Purchasing tighter security systems
Laws are changing but can’t keep up with technology.
Identity Theft
Thieves: Obtain information
online Apply for credit cards Access bank account
informationDo not give private
information out over the internet or phone unless you know the site is secure!
http://www.businessinsider.com/americas-most-wanted-white-collar-criminals-2009-11#leonard-weston-ramey-12
Check out the website and see how many identities this man has had.
32
Frank William Abagnale, Jr.
Known as a cheque forger, skilled impostor, and escape artist.
Notorious in the 1960s for successfully passing US$2.5 million worth of meticulously forged checks across 26 countries over the course of five years, beginning when he was 16 years old.
Assumed no fewer than eight separate identities, successfully impersonating an airline pilot, a doctor, a Bureau of Prisons agent, and a lawyer all before he was 21 years old.
33
Protecting Your Information
Antivirus program Detects viruses and
repairs filesEncryption
Converts readable data into unreadable characters to prevent unauthorized access
Hacker Person who secretly gains
access to computers and files without permission
Password (access code) Safeguard for access to a
computer program Should be unique Should be private Should be changed
34
Utilize antivirus programs, encryption; select passwords carefully and change often to reduce the risk of hackers
accessing your personal information.
Cutting Edge Technology Innovations
link: my-blackberry-is-not-working
link: hubble-ultra-deep-field-3d
link: revolving-house-architecture
link to car that runs on air
link to gps- how does it work?
link to gm-hy-wire-concept-car
video link: helicopter-
cable-inspector
35