Essential Standard 2.00 Objective 2.04 1 STUDENTS WILL: UNDERSTAND THE NATURE OF BUSINESS. UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. TOPICS: BUSINESSES USE OF TECHNOLOGY CONCERNS OF USING TECHNOLOGY Parts of the Computer Monitor Speakers Tower CPU Desktop CPU Ergonomic Keyboard Mouse Comparing Sizes of Computers http://www.youtube.com/user/sonyelectronics?feature=chclk Alternative Input Devices Digital Camcorder Writing Tablet Scientific Probe Biometric Device Digital Camera Scanner Webcam Mouse Smart Phone Business Technology Applications What are computer networks? Computer networks are computers linked in a school or business so users can share hardware, software, and data. Hickory Ridge is part of the CCS LAN (Local Access Network) network. We have over 300 computers that are run through the common network. Networking allows students to access previously saved information anywhere in the building or at other 5 schools in the system. Examples of Computer Networks 6 Internet Public network used most often for: Emailing Accessing the World Wide Web (WWW) Intranet Private network primarily used to share:information WITHIN a business Only members or employees can utilize Effective tool for sharing information, saving time & money Applications of Technology by Businesses 7 Why is Computer- What is artificial intelligence (AI)? software that enables computers to reason learn and make decisions. Example: voice recognition software aided design (CAD) used? used to create product styles and designs. Examples: Design for a camera Drawings for homes, buildings, equipment Electronic prototypes video link- robot Computer Assisted Design Example 8 Computer Assisted Design Video Clip 9 http://www.youtube.com/watch?v=3bgmP yr5Obc&safety_mode=true&persist_safet y_mode=1 Designing a Diamond Ring Business Technology Applications 10 Computer assisted Instruction Used in education Help people improve skills at their own pace Telemedicine Video conferencing from remote areas so patients have access to diagnosis by doctor in another location Public records Military records Social security Medical information Police records Financial Activities 11 Bill paying online, checking credit report, selling stocks Technology Applications by Businesses 12 What is E-commerce? E-commerce is conducting business transactions using the Internet or other technology. *E=electronic Common E-Commerce Activities 13 Providing product information Promoting/marketing a company Selling online Conducting market research Collecting/making payments on line Obtaining parts and supplies Tracking shipments E-Commerce 14 Examples Message on your cell phone screen from a business advertising their sale Ebay - online auction Website that asks market survey questions and give prizes for participation Four Basic E-commerce Models 15 B2C: Business-to-Consumer Example: Lands’ End.com selling swimwear to expecting mothers, Ben & Jerry’s selling ice cream related goods B2B: Business-to-Business Example: Staples.com ships office supplies to local hospital C2B: Consumer-to-Business Example: Customers completing on-line marketing surveys in order to provide feedback to Dunkin’ Donuts C2C: Consumer-to-Consumer Example: Customer buying electronics from other customers through eBay.com Expert Systems 16 How do expert systems help people? Expert systems are computer programs that help people solve technical problems including medical services, financial planning, and legal matters. Examples: -Automotive parts electronic catalogues -Quicken books -Peachtree Accounting Management Information Systems (MIS) 17 An ordered system of processing and reporting information in an organization Management uses information to make business decisions. Four main components of a MIS: Gathering data Analyzing data Storing data Reporting results http://www.youtube.com/watch?v=fJYFpwbvuDc&safety_mode=true&persist_safety_mode=1 MIS Categories of Information 18 Financial Information for budgets and financial reports and statements Production and inventory Information for production summaries and supplies Marketing and sales Information to determine customer needs, economic conditions, and competitors action http://www.5min.com/Video/HowT-Mobile-Leveraged-Social-Mediafor-Google-Phone-Sales-514899158 Human resources Information about employees’ salaries, benefits and evaluations Business Applications of Technology 14 What is robotics ? mechanical devices are programmed to do routine tasks, such as those seen on an assembly line in factories Robots can: Work underground Work under water Work in outer space Work 24 hours/7days a week Work in humanly impossible situations video link-Rosie the robot Vacuum Cleaner Telecommuting http://www.youtube.com/watch?v=TAJRgNu_O9U&safety_mode=true &persist_safety_mode=1 21 What happens during telecommuting activities? Workers use computers off-site (at home) to do a job, saving travel time and costs. Works well for occupations: Writers Editors Accountants Computer Programmers Web designers Workers send reports, documents, & ideas to employers via email, fax, videoconferencing Business Applications Financial activities Bill pay online Direct deposit Electronic Funds Transfer Selling stocks Completing tax returns Checking credit reports Public Records Military records Social security Medical information Police records 22 Telemedicine Video conferencing from remote locations so patients have access to diagnosis by doctor in another location Using robotics for surgical procedures Computer Assisted Instruction 23 Disadvantages Advantages Learner proceeds at own ability level and pace Learner has necessary tools to learn material Company/trainer can deliver same training to every user Offers flexibility in timing and outcomes Lack of personal contact with a teacher may be detrimental to the student Learner must be self motivated Learner must be technology savvy Learner must have access to computer Limited professional training given Concerns of Using Technology Ethics moral guidelines that govern the use of computers and information systems Employment Trends Shift in duties and skills needed in the workplace. Companies retrain displaced workers who are unemployed because of changing job conditions. Computer literacy is vital. Literacy the ability to enter, store, process, and retrieve information. 24 Concerns-Computer Crimes A computer virus is a hidden program code in a system that can do damage to software or stored data. How many people have encountered a computer virus? Will someone tell how they removed the virus? Viruses may be programmed to become active : At a specific date When certain keystrokes are made When certain data is accessed 25 Types of Viruses 26 Bomb - Destructive computer code or virus designed to activate at a specific time Hoax - A program intended to scare users into thinking they have a virus Phage - A program that modifies other programs, operating systems, and databases on a Personal Digital Assistant Trojan Horse - A virus disguised as a useful piece of software Virus - A computer program designed to cause damage to computer files Worm Destructive computer program that bores its way through a computer network http://www.copyright.gov/help/faq/ Copyright 27 Protection of intellectual property Gives owner/creator exclusive rights to reproduce or distribute copies of his/her own work From the US copyright website above: What are examples of protected property? Do I have to register with US Copyright office? Go to “is my copyright good in other countries”. Name three countries that do not recognize US copyrights. Name three countries with WTO international agreements. For works created after 1-1-78, : How many years does a copyright last? Can you renew the copyright? Theft Concerns How many people have access to software that has been copied to a CD by a personal contact? Did that person commit an act of piracy? Piracy -stealing or illegally copying software packages or information Copyright infringement - the illegal copying of proprietary (property of another) works 28 White Collar Crimes 29 An illegal act carried out by office or professional workers while at work including: stealing money, information, or computer time through improper use of computer systems. Would you be afraid of this person? Check out this website and see what he did. http://www.businessinsider.com/americas-most-wanted-whitecollar-criminals-2009-11#james-t-hammes-2 Health Concerns of Using Technology Eyestrain and vision problems Muscle tension and nerve damage Ergonomically poor equipment Carpal tunnel syndrome A repetitive stress syndrome Lack of physical exercise & obesity 30 Privacy Concerns of Using Technology 31 Dishonest people have access to customer records. Companies have changed which employees as well as other people that may have access to customer records. To protect customers, some companies are: Increasing database security Changing access codes multiple times during day Becoming more strict about who has access Purchasing tighter security systems Laws are changing but can’t keep up with technology. Identity Theft 32 Thieves: Obtain information online Apply for credit cards Access bank account information Do not give private information out over the internet or phone unless you know the site is secure! http://www.businessinsi der.com/americas-mostwanted-white-collarcriminals-200911#leonard-westonramey-12 Check out the website and see how many identities this man has had. Frank William Abagnale, Jr. 33 Known as a cheque forger, skilled impostor, and escape artist. Notorious in the 1960s for successfully passing US$2.5 million worth of meticulously forged checks across 26 countries over the course of five years, beginning when he was 16 years old. Assumed no fewer than eight separate identities, successfully impersonating an airline pilot, a doctor, a Bureau of Prisons agent, and a lawyer all before he was 21 years old. Protecting Your Information 34 Utilize antivirus programs, encryption; select passwords carefully and change often to reduce the risk of hackers accessing your personal information. Hacker Person who secretly gains access to computers and files without permission Password (access code) Safeguard for access to a computer program Should be unique Should be private Should be changed Antivirus program Detects viruses and repairs files Encryption Converts readable data into unreadable characters to prevent unauthorized access Cutting Edge Technology Innovations 35 link: my-blackberry-is- link to car that runs on not-working link: hubble-ultra-deep- air link to gps- how does it field-3d link: revolving-house- work? architecture link to gm-hy-wireconcept-car video link: helicopter- cable-inspector