Business and Technology - Public Schools of Robeson County

advertisement
Essential Standard 2.00
Objective 2.04
1
STUDENTS WILL:
UNDERSTAND THE NATURE OF BUSINESS.
UNDERSTAND APPLICATIONS AND ISSUES OF
TECHNOLOGY.
TOPICS:
BUSINESSES USE OF TECHNOLOGY
CONCERNS OF USING TECHNOLOGY
Parts of the Computer
Monitor
Speakers
Tower CPU
Desktop CPU
Ergonomic Keyboard
Mouse
Comparing Sizes of Computers
http://www.youtube.com/user/sonyelectronics?feature=chclk
Alternative Input Devices
Digital Camcorder
Writing Tablet
Scientific Probe
Biometric Device
Digital Camera
Scanner
Webcam
Mouse
Smart Phone
Business Technology
Applications
 What are computer networks?
 Computer networks are computers linked in a
school or business so users can share hardware,
software, and data.
Hickory Ridge is part of the CCS
LAN (Local Access Network)
network. We have over 300
computers that are run through the
common network.
Networking allows students to
access previously saved information
anywhere in the building or at other
5 schools in the system.
Examples of Computer Networks
6
 Internet
Public network used most
often for:
Emailing
 Accessing the World Wide
Web (WWW)

 Intranet
Private network primarily
used to share:information
WITHIN a business
 Only members or
employees can utilize
 Effective tool for sharing
information, saving time
& money
Applications of Technology by Businesses
7
 Why is Computer-
 What is artificial
intelligence (AI)?
 software that enables
computers to reason
learn and make
decisions.
 Example: voice
recognition software
aided design (CAD)
used?
 used to create product
styles and designs.
 Examples:



Design for a camera
Drawings for homes,
buildings, equipment
Electronic prototypes
video link- robot
Computer Assisted Design Example
8
Computer Assisted Design Video Clip
9
http://www.youtube.com/watch?v=3bgmP
yr5Obc&safety_mode=true&persist_safet
y_mode=1
Designing a Diamond Ring
Business Technology Applications
10
 Computer assisted
Instruction


Used in education
Help people improve skills
at their own pace
 Telemedicine

Video conferencing from
remote areas so patients
have access to diagnosis
by doctor in another
location
 Public records




Military records
Social security
Medical information
Police records
Financial Activities
11
 Bill paying online,
checking credit report,
selling stocks
Technology Applications by Businesses
12
 What is E-commerce?
 E-commerce is
conducting business
transactions using the
Internet or other
technology.

*E=electronic
Common E-Commerce Activities
13
 Providing product






information
Promoting/marketing
a company
Selling online
Conducting market
research
Collecting/making
payments on line
Obtaining parts and
supplies
Tracking shipments
E-Commerce
14
Examples
 Message on your cell
phone screen from a
business advertising
their sale
 Ebay - online auction
 Website that asks
market survey
questions and give
prizes for participation
Four Basic E-commerce Models
15
 B2C: Business-to-Consumer

Example: Lands’ End.com selling swimwear to expecting
mothers, Ben & Jerry’s selling ice cream related goods
 B2B: Business-to-Business

Example: Staples.com ships office supplies to local
hospital
 C2B: Consumer-to-Business

Example: Customers completing on-line marketing surveys
in order to provide feedback to Dunkin’ Donuts
 C2C: Consumer-to-Consumer

Example: Customer buying electronics from other customers
through eBay.com
Expert Systems
16
 How do expert
systems help people?
 Expert systems are
computer programs that
help people solve
technical problems
including medical
services, financial
planning, and legal
matters.
Examples:
-Automotive parts electronic
catalogues
-Quicken books
-Peachtree Accounting
Management Information Systems (MIS)
17
 An ordered system of
processing and reporting
information in an
organization
 Management uses
information to make
business decisions.
 Four main components of
a MIS:




Gathering data
Analyzing data
Storing data
Reporting results
http://www.youtube.com/watch?v=fJYFpwbvuDc&safety_mode=true&persist_safety_mode=1
MIS Categories of Information
18
 Financial

Information for budgets
and financial reports and
statements
 Production and
inventory

Information for
production summaries
and supplies
 Marketing and sales


Information to determine
customer needs, economic
conditions, and
competitors action
http://www.5min.com/Video/HowT-Mobile-Leveraged-Social-Mediafor-Google-Phone-Sales-514899158
 Human resources

Information about
employees’ salaries,
benefits and evaluations
Business Applications of Technology
14
 What is robotics ?
 mechanical devices are
programmed to do
routine tasks, such as
those seen on an
assembly line in factories
 Robots can:





Work underground
Work under water
Work in outer space
Work 24 hours/7days
a week
Work in humanly
impossible situations
video link-Rosie the robot
Vacuum Cleaner
Telecommuting
http://www.youtube.com/watch?v=TAJRgNu_O9U&safety_mode=true
&persist_safety_mode=1
21
 What happens during telecommuting activities?
 Workers use computers off-site (at home) to do a job,
saving travel time and costs.
 Works well for occupations:





Writers
Editors
Accountants
Computer Programmers
Web designers
 Workers send reports, documents, & ideas to
employers via email, fax, videoconferencing
Business Applications
 Financial activities






Bill pay online
Direct deposit
Electronic Funds Transfer
Selling stocks
Completing tax returns
Checking credit reports
 Public Records




Military records
Social security
Medical information
Police records
22
 Telemedicine


Video conferencing from
remote locations so
patients have access to
diagnosis by doctor in
another location
Using robotics for surgical
procedures
Computer Assisted Instruction
23
 Disadvantages

 Advantages




Learner proceeds at own
ability level and pace
Learner has necessary
tools to learn material
Company/trainer can
deliver same training to
every user
Offers flexibility in timing
and outcomes




Lack of personal contact
with a teacher may be
detrimental to the student
Learner must be self
motivated
Learner must be
technology savvy
Learner must have access
to computer
Limited professional
training given
Concerns of Using Technology
Ethics
moral guidelines that govern the use of computers
and information systems
Employment Trends
 Shift in duties and skills needed in the workplace.
 Companies retrain displaced workers who are
unemployed because of changing job conditions.
 Computer literacy is vital.

Literacy the ability to enter, store, process, and retrieve
information.
24
Concerns-Computer Crimes
 A computer virus is a hidden program code in a
system that can do damage to software or stored
data.


How many people have encountered a computer virus?
Will someone tell how they removed the virus?
 Viruses may be programmed to become active :
 At a specific date
 When certain keystrokes are made
 When certain data is accessed
25
Types of Viruses
26
Bomb - Destructive computer code or virus designed to activate at
a specific time
Hoax - A program intended to scare users into thinking they have
a virus
Phage - A program that modifies other programs, operating
systems, and databases on a Personal Digital Assistant
Trojan Horse - A virus disguised as a useful piece of software
Virus - A computer program designed to cause damage to
computer files
Worm Destructive computer program that bores its way through
a computer network
http://www.copyright.gov/help/faq/
Copyright
27
 Protection of intellectual property
 Gives owner/creator exclusive rights to reproduce or distribute
copies of his/her own work
 From the US copyright website above:
 What are examples of protected property?
 Do I have to register with US Copyright office?
 Go to “is my copyright good in other countries”.
 Name three countries that do not recognize US copyrights.
 Name three countries with WTO international agreements.
 For works created after 1-1-78, :
 How many years does a copyright last?
 Can you renew the copyright?
Theft Concerns
 How many people have access to software that has
been copied to a CD by a personal contact?
 Did that person commit an act of piracy?
Piracy -stealing or illegally copying software
packages or information
Copyright infringement - the illegal copying of
proprietary (property of another) works
28
White Collar Crimes
29
 An illegal act carried out
by office or professional
workers while at work
including:
 stealing money,
information, or computer
time through improper
use of computer systems.
 Would you be afraid of
this person?
 Check out this website
and see what he did.
http://www.businessinsider.com/americas-most-wanted-whitecollar-criminals-2009-11#james-t-hammes-2
Health Concerns of Using Technology
 Eyestrain and vision problems
 Muscle tension and nerve damage
 Ergonomically poor equipment
 Carpal tunnel syndrome
 A repetitive stress syndrome
 Lack of physical exercise & obesity
30
Privacy Concerns of Using Technology
31
 Dishonest people have access to customer records.
 Companies have changed which employees as well as
other people that may have access to customer
records.
 To protect customers, some companies are:




Increasing database security
Changing access codes multiple times during day
Becoming more strict about who has access
Purchasing tighter security systems
 Laws are changing but can’t keep up with technology.
Identity Theft
32
 Thieves:



Obtain information online
Apply for credit cards
Access bank account
information
 Do not give private
information out over the
internet or phone unless
you know the site is
secure!
 http://www.businessinsi
der.com/americas-mostwanted-white-collarcriminals-200911#leonard-westonramey-12
 Check out the website
and see how many
identities this man has
had.
Frank William Abagnale, Jr.
33
 Known as a cheque forger, skilled impostor, and
escape artist.
 Notorious in the 1960s for successfully passing
US$2.5 million worth of meticulously forged checks
across 26 countries over the course of five years,
beginning when he was 16 years old.
 Assumed no fewer than eight separate identities,
successfully impersonating an airline pilot, a doctor,
a Bureau of Prisons agent, and a lawyer all before he
was 21 years old.
Protecting Your Information
34
Utilize antivirus programs, encryption; select passwords
carefully and change often to reduce the risk of hackers
accessing your personal information.
 Hacker

Person who secretly gains
access to computers and files
without permission
 Password (access code)




Safeguard for access to a
computer program
Should be unique
Should be private
Should be changed
 Antivirus program

Detects viruses and
repairs files
 Encryption

Converts readable data
into unreadable characters
to prevent unauthorized
access
Cutting Edge Technology Innovations
35
 link: my-blackberry-is-
 link to car that runs on
not-working
 link: hubble-ultra-deep-
air
 link to gps- how does it
field-3d
 link: revolving-house-
work?

architecture
link to gm-hy-wireconcept-car

 video link: helicopter-
cable-inspector
Download