978-0073524597 Bonus B Part 2

subject Type Homework Help
subject Pages 14
subject Words 2400
subject Authors James M. McHugh, Susan M. McHugh, William G. Nickels

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Bonus B - Using Technology to Manage Information
B-21
ters and a select group of universities; it
runs more than 22,000 times faster than to-
day’s public infrastructure and supports
heavy-duty applications.
a. Companies can collaborate with customers
on products, service, and promotion.
page-pf2
Bonus B - Using Technology to Manage Information
PPT B-22
Social Media
(See complete PowerPoint slide notes on page B.54.)
TEXT FIGURE B.4
Tips for Using Social Media to
Partner with Customers
(Text page B-11)
This text figure gives some tips on how to enhance your
brand through social media efforts.
PPT B-23
Web 2.0
(See complete PowerPoint slide notes on page B.54.)
page-pf3
Bonus B - Using Technology to Manage Information
D. WEB 3.0
1. The Internet is evolving into a new generation
that learns about you and pushes information it
“thinks” you might like.
2. WEB 3.0 is a combination of technologies that
adds intelligence and changes how people in-
teract with the Web; includes the semantic
Web, mobile Web, and immersive Internet.
IV. THE ENABLING TECHNOLOGY: HARDWARE
A. What is powerful today in computer hardware may
be obsolete by the time you study this.
1. Gordon Moore, former chair of Intel Corpora-
tion, said that the capacity of computer chips
page-pf4
Bonus B - Using Technology to Manage Information
PPT B-24
Americans and Social
Networks
(See complete PowerPoint slide notes on page B.55.)
PPT B-25
Americans and Social
Networks
(See complete PowerPoint slide notes on page B.55.)
PPT B-26
Web 3.0
(See complete PowerPoint slide notes on page B.56.)
PPT B-27
Components of Web 3.0
(See complete PowerPoint slide notes on page B.56.)
progress
assessment
(Text page B-13)
PPT B-28
Progress Assessment
(See complete PowerPoint slide notes on page B.56.)
lecture link B-4
REVISING MOORES LAW
In the mid-1970s Gordon Moore, former chair of Intel Corpo-
ration, predicted that the capacity of computer chips would dou-
ble every year or so. (See the complete lecture link on page B.66
of this manual.)
page-pf5
Bonus B - Using Technology to Manage Information
B-25
B. MOBILE DEVICES
1. SMARTPHONES are designed to connect peo-
ple to the Internet and to e-mail.
many users to access information at the same
time.
page-pf6
Bonus B - Using Technology to Manage Information
lecture link B-5
JOHN ATANASOFFS
COMPUTER
Dr. John V. Atanasoff built the first digital computer over
half a century ago, but his contribution to computing was nearly
lost to history. (See complete lecture link on page B.67 of this
manual.)
PPT B-29
Moving from a Computer.
Dominant Environment
(See complete PowerPoint slide notes on page B.57.)
PPT B-30
Fastest-Growing Cell Phone
Activities
(See complete PowerPoint slide notes on page B.57.)
PPT B-31
The Intelligence of Apps
(See complete PowerPoint slide notes on page B.57.)
PPT B-32
Computer Networks
(See complete PowerPoint slide notes on page B.58.)
page-pf7
Bonus B - Using Technology to Manage Information
b. System and hardware upgrades can be dis-
ruptive and expensive.
3. One option to reduce costs was to RENT soft-
over the Internet (the CLOUD).
ries of centers anywhere.
page-pf8
Bonus B - Using Technology to Manage Information
PPT B-33
Virtualization and Cloud
Computing
(See complete PowerPoint slide notes on page B.58.)
PPT B-34
Advantages of Cloud Computing
(See complete PowerPoint slide notes on page B.59.)
PPT B-35
Disadvantages of Cloud
Computing
(See complete PowerPoint slide notes on page B.60.)
PPT B-36
Clouds in the Office
(See complete PowerPoint slide notes on page B.60.)
page-pf9
Bonus B - Using Technology to Manage Information
B-29
4 The ADVANTAGES of cloud computing are:
V. SOFTWARE
A. COMPUTER SOFTWARE provides the instructions
that enable you to tell the computer what to do.
page-pfa
Bonus B - Using Technology to Manage Information
PPT B-37
Top Cloud Applications
(See complete PowerPoint slide notes on page B.60.)
lecture link B-6
APPLE TAKES TO THE ICLOUD
In the summer of 2011, the late Steve Jobs introduced one of
the most anticipated consumer cloud storage systems. (See the
complete lecture link on page B.68 of this manual.)
PPT B-38
Software: Telling the Computer
What to Do
(See complete PowerPoint slide notes on page B.60.)
lecture link B-7
SHARING IN SILICON VALLEY
In most industries, competitors dont share their intel. Thats
what makes Silicon Valley a bit differentbut not everyone is
willing to release their information. (See the complete lecture
link on page B.68 in this manual.)
page-pfb
1. WRITING (word processors)
Evaluate the human resource, security, privacy, and stability issues in management that
are affected by information technology.
VI. EFFECTS OF INFORMATION TECHNOLOGY
ON MANAGEMENT
A. HUMAN RESOURCE ISSUES
page-pfc
Bonus B - Using Technology to Manage Information
progress
assessment
(Text page B-16)
PPT B-39
Progress Assessment
(See complete PowerPoint slide notes on page B.61.)
PPT B-40
Contemporary Issues in
Technology
(See complete PowerPoint slide notes on page B.61.)
page-pfd
Bonus B - Using Technology to Manage Information
a. Telecommuting involves LESS TRAVEL
TIME and costs, and often increases
productivity.
ing left out of the office loop.
page-pfe
Bonus B - Using Technology to Manage Information
TEXT FIGURE B.5
When Information Technology
Alters the Workplace
(Text page B-19)
This text figure illustrates how information technology
changes the way managers and workers interact.
page-pff
week.
5. A new class of mobile worker has emerged:
nearly autonomous, not in the office, doing busi-
ness in his or her own time staff (or NANO-
BOTS).
USB storage devices have become hackers’ tar-
gets.
page-pf10
B-36
lecture link B-8
PASSWORD OVERLOAD
Passwords protect information, but too many passwords
can lead to decreased security. (See the complete lecture link
on page B.69 in this manual.)
PPT B-41
Viruses and Phishing
(See complete PowerPoint slide notes on page B.61.)
page-pf11
Bonus B - Using Technology to Manage Information
of the company and with other companies.
4. A VIRUS is a piece of programming code insert-
ed into other programming to cause some unex-
pected and, for the victim, usually undesirable
event.
a. Phishers use messages like “account activa-
tion required” to lure users.
b. Recipients who click on the link in the mes-
sage are sent to a phony site that tries to
page-pf12
Bonus B - Using Technology to Manage Information
PPT B-42
How to Protect Yourself
Against Phishing
(See complete PowerPoint slide notes on page B.62.)
lecture link B-9
WEB SHOPPING SAFELY
Here are a few tips to shop safely. (See the complete lecture
link on page B.69 in this manual.)
page-pf13
Bonus B - Using Technology to Manage Information
message.
a. In order to do this, the agency needs the co-
operation of businesses.
page-pf14
Bonus B - Using Technology to Manage Information
PPT B-43
Laws and the Internet
(See complete PowerPoint slide notes on page B.62.)
PPT B-44
Cyberterrorism
(See complete PowerPoint slide notes on page B.62.)
lecture link B-10
E-MAIL NEVER GOES AWAY
When it comes to the Internet, nothing is ever really forgot-
ten and everything leaves a trail. (See the complete lecture link
on page B.49 of this manual.)

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.