O SlideShare utiliza cookies para otimizar a funcionalidade e o desempenho do site, assim como para apresentar publicidade mais relevante aos nossos usuários. Se você continuar a navegar o site, você aceita o uso de cookies. Leia nosso Contrato do Usuário e nossa Política de Privacidade.
O SlideShare utiliza cookies para otimizar a funcionalidade e o desempenho do site, assim como para apresentar publicidade mais relevante aos nossos usuários. Se você continuar a utilizar o site, você aceita o uso de cookies. Leia nossa Política de Privacidade e nosso Contrato do Usuário para obter mais detalhes.
A Scribd passará a dirigir o SlideShare em 1 de dezembro de 2020A partir desta data, a Scribd passará a gerenciar sua conta do SlideShare e qualquer conteúdo que você possa ter na plataforma. Além disso, serão aplicados os Termos gerais de uso e a Política de Privacidade da Scribd. Se prefira sair da plataforma, por favor, encerre sua conta do SlideShare. Saiba mais.
Our group is going to be presented that what is IT? brief history that what technologies gradually came into being. Uses of IT in business its different advantages and disadvantages r abuses.
Stands for information technology . It refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies. Many companies now have IT departments for managing the computers, networks, and other technical areas of their businesses. IT jobs include computer programming, network administration, computer engineering, Web development, technical support, and many other related occupations. Since we live in the &quot;information age,&quot; information technology has become a part of our everyday lives. That means the term &quot;IT,&quot; already highly overused, is here to stay. It refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies. Many companies now have IT departments for managing the computers, networks, and other technical areas of their businesses. IT jobs include computer programming, network administration, computer engineering, Web development, technical support, and many other related occupations. Since we live in the &quot;information age,&quot; information technology has become a part of our everyday lives. That means the term &quot;IT,&quot; already highly overused, is here to stay.
Four basic periods Characterized by a principal technology used to solve the input, processing, output and
One of the very first information processors. abacus a technology of pre mechanical era from 3000 B.C. - 1450 A.D.
Mechanical age technologies Pascaline One of the first mechanical computing machines Analytical engines Difference engine
The Electromechanical Age: 1840 - 1940. The discovery of ways to harness electricity was the key advance made during this period. Knowledge and information could now be converted into electrical impulses. The Beginnings of Telecommunication. discovery that electrical waves travel through space Voltaic Battery. Telegraph. . Telephone and Radio.
Punch cards technology
Electronic age The First High-Speed, General-Purpose Computer Using Vacuum Tubes for calculation Stored-Program Computer(s) Computer for Commercial Use Digital Computing. MS Windows Graphical User Interfaces
Telecommunication is the transmission of messages over significant distances for the purpose of communication . In earlier times, telecommunications involved the use of visual signals, such as smoke , semaphore telegraphs , signal flags , and optical heliographs , or audio messages via coded drumbeats , lung-blown horns , or sent by loud whistles , for example. In the modern age of electricity and electronics , telecommunications has typically involved the use of electric means such as the telegraph , the telephone , and the teletype , the use of microwave communications , the use of fiber optics and their associated electronics, and/or the use of the Internet . The first breakthrough into modern electrical telecommunications came with the development of the telegraph during the 1830s and 1840s. The use of these electrical means of communications exploded into use on all of the continents of the world during the 19th century, and these also connected the continents via cables on the floors of the ocean . These three systems of communications all required the use of conducting metal wires. A revolution in wireless telecommunications began in the first decade of the 20th Century , with Guglielmo Marconi winning the Nobel Prize in Physics in 1909 for his pioneering developments in wireless radio communications . Other early inventors and developers in the field of electrical and electronic telecommunications included Samuel F.B. Morse and Joseph Henry of the United States , Alexander Graham Bell of Canada , Lee de Forest of the U.S., who invented the amplifying vacuum tube called the triode , Edwin Armstrong of the U.S., John Logie Baird of England , and Nikola Tesla whose most important inventions were created in the United States. Telecommunications play an important role in the world economy and the worldwide telecommunication industry's revenue was estimated to be $3.85 trillion in 2008.  The service revenue of the global telecommunications industry was estimated to be $1.7 trillion in 2008, and is expected to touch $2.7 trillion by 2013. 
PDAs For many years businesses and government organizations have relied upon rugged PDAs also known as enterprise digital assistants (EDAs) for mobile data applications. Typical applications include supply chain management in warehouses, package delivery, route accounting, medical treatment and record keeping in hospitals, facilities maintenance and management, parking enforcement, access control and security, capital asset maintenance, meter reading by utilities, and &quot;wireless waitress&quot; applications in restaurants and hospitality venues. A common feature of EDAs are the integration of Data Capture devices like Bar Code, RFID and Smart Card Readers.
Robotics is the engineering science and technology of robots, and their design, manufacture, application, and structural disposition. Robotics is related to electronics, mechanics, and software.
Today's robotics systems operate by way of hydraulic, pneumatic, and electrical power. Electric motors have become progressively smaller, with high power-to-weight ratios, enabling them to become the dominant means by which robots are powered.
Uses PICK AND PLACE OPERATIONS Industrial robots also perform what are referred to as pick and place operations. Among the most common of these operations is loading and unloading pallets, used across a broad range of industries. ASSEMBLY Assembly is one of the most demanding operations for industrial robots. Robotic assembly has come to be used in the production of a wide range of goods, including circuit boards, electronic components and equipment, household appliances, and automotive subassemblies. SPRAY FINISHING OPERATIONS Industrial robots are widely used in spray finishing operations, particularly in the automobile industry. One of the reasons these operations are cost-effective is that they minimize the need for environmental control to protect workers from fumes. Non-industrial applications for robots in security, commercial cleaning, food service, and health care are also on the rise.
Bar code reader A barcode reader (or barcode scanner ) is an electronic device for reading printed barcodes . Like a flatbed scanner , it consists of a light source, a lens and a light sensor translating optical impulses into electrical ones. Additionally, nearly all barcode readers contain decoder circuitry analyzing the barcode's image data provided by the sensor and sending the barcode's content to the scanner's output port
Atm An automated teller machine ( ATM ) or automatic banking machine ( ABM ) is a computerised telecommunications device that provides the clients of a financial institution with access tofinancial transactions in a public space without the need for a cashier, human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip, that contains a unique card number and some security information such as an expiration date or CVVC (CVV). Authentication is provided by the customer entering a personal identification number (PIN).
Using the web to market products guarantees worldwide reach at a nominal price. Advertising techniques like pay per click advertising ensure that the advertiser only pays for the advertisements that are actually viewed. Affiliate marketing, where customers are directed to a business portal because of the efforts of the affiliate who in turn receive a compensation for their efforts meeting with success, has emerged on account of e-business. Affiliate marketing has helped both the business and the affiliates. Firms engaging in e-business have managed to use cost effective online advertising strategies to their advantage.
Firms need to have a competitive strategy in order to ensure a competitive advantage. Without an effective strategy, they will find it impossible to maintain the advantage and earn profits. The strategy, that the firms can pursue, can be a be a cost strategy or a differentiation strategy. For instance, till the year 2007, Dell Inc. was selling computers only via the Internet and the phone. It adopted a differentiation strategy by selling its computers online and customizing its laptops to suit the requirements of the clients. Thus, e-business resulted in Dell Inc. managing to capture a vast segment of the market using the differentiation strategy.
E-Business has resulted in improved customer service . Many a times, on visiting a website, the customer is greeted by a pop-up chat window. Readily available customer service may help in encouraging the customer to know more about the product or service. Moreover, payments can be made online, products can be shipped to the customer without the customer having to leave the house.
This is the biggest advantage of conducting business online. A firm engaging in e-business can have a nationwide or a worldwide presence. IBM was one of the first companies to use the term e-business to refer to servicing customers and collaborating with business partners from all over the world. Dell Inc. too had a flourishing business selling PCs throughout the US, only via telephone and the Internet till the year 2007. Amazon.com is another success story that helps people buy internationally from third parties. Hence, worldwide presence is ensured if companies rethink their business in terms of the Internet.
There are man y opportunities right on the Internet to find the right IT in business help. If sales companies are doing business on the Internet there is the opportunity to find good Contact Management Systems (CMS) and Search Engine Optimization (SEO) software. The CMS software provides sales force managers with all of the tools necessary to monitor the status of the potential sales that are being worked by the members of the sales team. SEO software is the IT in business solution to propel a business website to high rankings on major Internet search engines like Google, Yahoo, and MSN. This brings targeted visitors to the website and leads to more contacts and more sales. Businesses that fail to get visitors to their website on a regular and continuing basis are usually not going to succeed. The IT in business solutions are available and affordable for businesses both large and small. It is important to do some research to find the right company with a good reputation and that provides the services needed. Once that is done, any business can make the necessary moves to get a step ahead of the competition. Joe Thorpe is a Professional Entrepreneur.
Abuses disadvantages and misuse of information technology. The big problem about technology misuses can be summarized in two words: culture and education. Some people aren't sufficiently cultured to use technology properly as a tool because they use it as an easy way solution or as a fashionable trends. Also, these people do not have education to use it correctly. Because of hundreds of services that technology offers, there are many techniques to harm persons and waste time. People use their time to harm others even though they know that it is not good. For example, people manufactures weapons to destroy others instead of improving themselves.
Computer Crimes including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.
Computer Crimes Software Software theft can be defined as the unauthorized use or illegal copying of computer software. This can take many forms such as commercial counterfeiting, deliberate and unauthorized copying by dealers, unlicensed copying and use by &quot;end users&quot; and plagiarism by competitors. Theft of hardware has increased from warehouses and manufacturing facilities due to the growing demand for high-tech products such as microprocessors, computer memory, microcomputers/PCs, Laptop/notebook, palmtop, hard disk drivers and cellular phone that are valuable, compact and easy to transport Credit fraud The internet allows many different types of invasions into personal information, and use of information with little consequences. Through the internet stolen credit cards are easily utilized without any check into if the user is the true owner of the card
Basically this means that you passed of a stolen check with the signature forged. You are asserting that the check is valid and is yours to use, when in reality it is not. Identity theft is a form of fraud in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Work place crime information overload Workplace crimes :the technological advances in the workplace have put the employer at risk of being robbed of time, energy and resources – all in the name of productivity! Information Overload Although many of the increased technology has greatly improved how we do business it has also caused excess stress, strain and burnout for the average worker. When you are overloaded with anything, in this case information you tend to forget tasks, fail to prioritize therefore your tasks will be completed with less care and detail. This information overload is causing many workplace illnesses and health problems.
Physical conversation work place crime Physical Conversation Email and fax have dramatically increased the speed and frequency of communication in the workplace. Email allows you to communicate without actually having a physical conversation. Email also allows you to send and share documents over long distances. Fax and scanning machines are also pieces of technology that have vastly improved the communication process. Many professionals also carry tools like cell phones, blackberries and laptop computers. Essentially an employee can be reached at all times of day. This 24/7 attitude has become somewhat of a standard in the corporate world especially once you reach the higher ranks in an organization. The separation from home and work becomes blurred
Lack of job security Lack of job security Industry experts believe that the internet has made job security a big issue as since technology keeps on changing with each day. This means that one has to be in a constant learning mode, if he or she wishes for their job to be secure.
Harmful for health
Lost Time How long do you have to wait for that program to load and run? Did you have to spend time, energy and money (ie, yours or your employers) in software training, upgrading or problem solving? How much time are you spending awaiting some technical support? Did you count the volume of junk e-mail and spam in your in-box? How much time did you devote to reading or deleting these? Did you have to sort out disk storage issues or re-organize your computer desktop today? Then, system maintenance interruptions – how much time did you lose waiting for the problem to be fixed and for the system to be returned to operation? Oh, just 10 minutes yesterday and another half hour today. Well, it all adds up !
Role of IT in Business
The Role Of IT in Business Presented By : Durya Akbar Hina Saeed Safia Anjum Kamran Imram M .Aftab Ali
All of the biggest technological inventions created by man - the airplane, the automobile, the computer - says little about his intelligence, but speaks volumes about his laziness. ~Mark Kennedy
Overview <ul><li>What is IT?? </li></ul><ul><li>IT in different era’s </li></ul><ul><li>IT in business </li></ul><ul><li>IT’s applications in </li></ul><ul><li>business </li></ul><ul><li>Abuses of IT in business </li></ul>
What is IT…?? Collection of technologies Deal with processing, storing, and communicating information, Including all types of computer and communications systems as well as reprographics methodologies.
What is IT…?? Study, design, development, implementation, support or management of computer-based information systems Includes software applications and computer hardware."
IT in different era’s Four basic periods <ul><li>Premechanical </li></ul><ul><li>Mechanical </li></ul><ul><li>Electromechanical, and </li></ul><ul><li>Electronic </li></ul>
IT in accounting and finance <ul><li>Spreadsheets </li></ul><ul><li>Credit control </li></ul><ul><li>banking & payments </li></ul><ul><li>EFTPOS Electronic </li></ul><ul><li>funds Transfer at Point Of Sale </li></ul>
<ul><li>New methodologies are </li></ul><ul><li>discovered </li></ul><ul><li>Improved way of working </li></ul><ul><li>Maximum output with </li></ul><ul><li>minimum input </li></ul>IT in production
<ul><li>Easily get the desired information </li></ul><ul><li>candidates via employment related sites. </li></ul><ul><li>Easily send information to the </li></ul><ul><li>candidates about the vacancies and </li></ul><ul><li>interview dates. </li></ul><ul><li>In touch with the job consultants. </li></ul>IT in HRM
IT in tracking market share we get day to day information of share market which is very important to do business because we have to be updated by the knowledge of share market to update our business.