SlideShare una empresa de Scribd logo
1 de 14
Chapter    14
          Using Technology to Manage
          Information
Learning Objectives

1   Distinguish between data and information     5   Discuss the security and ethical
    and explain the role of management               issues involving computer
    information systems in business.                 information systems.

2   List the components and different types of   6   Explain the steps that companies go
    information systems.                             through in anticipating, planning for,
                                                     and recovering from information
3   Outline how computer hardware and                system disasters.
    software are used to manage information.
                                                 7   Review current trends in information
4   Describe the networking and                      systems.
    telecommunications technology and types
    of computer networks.
Information Systems

s   Data– raw facts and figures
s   Information– knowledge gained from
    processing data
s   Information system– organized method for
    collecting, storing, and communicating
    information on operations
s   Chief information officer– executive
    responsible for directing information systems
    and operations
Components of Information Systems

s   Computer Hardware

s   Computer Software

s   Telecommunications and Computer Networks

s   Data Resource Management
Types of Information Systems
s   Operational Support Systems
    s   Transaction Processing System
    s   Process Control System


s   Management Support Systems
    s   Management Information System (MIS)
    s   Decision Support System (DSS)
    s   Executive Support System (ESS)
Computer Hardware

s   The tangible elements of a computer system
s   The components that store and process data,
    perform calculations
s   Input devices like the keyboard and mouse allow
    users to enter data and commands.
s   Storage and processing components consist of
    the hard drive and other storage components
    like flash drives.
Types of Computers

s   Desktop (personal)
    computers
s   Server
s   Mainframes
s   Supercomputers
s   Notebook computers
s   Handheld devices– PDAs
    and smart phones
Computer Software
s   Programs, routines, and computer
    languages that control a computer

s   Operating System
    s   Windows Operating System
    s   Mac Operating System

s   Application Software
    s   Microsoft PowerPoint
    s   Quicken
Computer Networks



s   The Internet
s   Local Area Networks (LAN)
s   Wide Area Networks (WAN)
s   Wireless Local Networks (Wi-Fi)
s   Intranets
s   Virtual Private Networks (VPN)
s   Voice over Internet Protocol (VoIP)
Security Issues

s   E-Crime
s   Computer Viruses
    s   Worms
    s   Trojan Horses
    s   Spyware
Ethical Issues
s   Use of information systems by employees
    and vendors:
    s   Personal use
    s   Privacy
s   Organizational use of information:
    s   Employment records
    s   Employee monitoring
    s   Customer data
Disaster Recovery and Backup

s   Natural Disasters
s   Power Failures           90% of firms that sustained

s   Equipment Malfunctions   a loss of critical data went

s   Software Glitches        out of business within two

s   Human Error              years.

s   Terrorist Attacks
s   The most basic
    precaution– backup.
Information Systems Trends
s   The Distributed Workforce
    s   Employees who work in virtual
        offices
s   Application Service
    Providers
    s   A firm that provides
        computers and application
        support
s   On Demand, Cloud, and
    Grid Computing
    s   Renting software time
Chapter 14: Information Technology

Más contenido relacionado

La actualidad más candente

INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...Sreedevi Santhosh
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Information management
Information managementInformation management
Information managementDeepak John
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceMark John Lado, MIT
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course IntroKaushik Panta
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data securitySaranSwathi1
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-applSR NAIDU
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Info...group 3
Info...group 3Info...group 3
Info...group 3rubyjade
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 

La actualidad más candente (20)

INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...INFORMATION TECHNOLOGY  (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
INFORMATION TECHNOLOGY (Animated PPT ):- Sreedevi V.S, LIBRARIAN, Holygrcae ...
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Information management
Information managementInformation management
Information management
 
Data security
Data securityData security
Data security
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial Intelligence
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Information technology - Course Intro
Introduction to Information technology - Course IntroIntroduction to Information technology - Course Intro
Introduction to Information technology - Course Intro
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
INFORMATION SYSTEM lecture
INFORMATION SYSTEM lectureINFORMATION SYSTEM lecture
INFORMATION SYSTEM lecture
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
 
Dstca
DstcaDstca
Dstca
 
Data Security
Data SecurityData Security
Data Security
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cis(11122223333)
Cis(11122223333)Cis(11122223333)
Cis(11122223333)
 
Info...group 3
Info...group 3Info...group 3
Info...group 3
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 

Destacado (6)

Logistics and Information Technology
Logistics and Information TechnologyLogistics and Information Technology
Logistics and Information Technology
 
Logistics in the information age
Logistics in the information ageLogistics in the information age
Logistics in the information age
 
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 2 Set 1 - Information Technology ArchitectureICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
 
Use of technology in logistics
Use of technology in logisticsUse of technology in logistics
Use of technology in logistics
 
Top technology trends in supply chain & logistics industry
Top technology trends in supply chain & logistics industryTop technology trends in supply chain & logistics industry
Top technology trends in supply chain & logistics industry
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 

Similar a Chapter 14: Information Technology

Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_introAleeza Aziz
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information systemNareshBabu285920
 
Information Systems Chapter 1
Information Systems Chapter 1Information Systems Chapter 1
Information Systems Chapter 1Jim Constantinou
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Mohamed EL Zayat
 
Explain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docxExplain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docxintel-writers.com
 
INFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMSINFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMSJennifer De Julio
 
Organisational information systems
Organisational information systemsOrganisational information systems
Organisational information systemsmrscjrobertson
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Management information systems and cyber
Management information systems and cyberManagement information systems and cyber
Management information systems and cyberAnjali
 
Mis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in businessMis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in businessHassan Samoon
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and misAlsufaacademy
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information SystemNirajan Silwal
 

Similar a Chapter 14: Information Technology (20)

Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_intro
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdf
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Components of an information system
Components of an information systemComponents of an information system
Components of an information system
 
Information Systems Chapter 1
Information Systems Chapter 1Information Systems Chapter 1
Information Systems Chapter 1
 
Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1Introduction to Information and Education Technology 1
Introduction to Information and Education Technology 1
 
Components
ComponentsComponents
Components
 
Cyber security
Cyber securityCyber security
Cyber security
 
Explain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docxExplain the major IT system component [ updated 2023].docx
Explain the major IT system component [ updated 2023].docx
 
INFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMSINFORMATICS, INFORMATION SYSTEMS
INFORMATICS, INFORMATION SYSTEMS
 
Information Technology for Business
Information Technology for BusinessInformation Technology for Business
Information Technology for Business
 
Organisational information systems
Organisational information systemsOrganisational information systems
Organisational information systems
 
Information security
Information securityInformation security
Information security
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
MANAGEMENT INFORMATION SYSTEM
MANAGEMENT INFORMATION SYSTEMMANAGEMENT INFORMATION SYSTEM
MANAGEMENT INFORMATION SYSTEM
 
Management information systems and cyber
Management information systems and cyberManagement information systems and cyber
Management information systems and cyber
 
Mis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in businessMis 1st chapter notes foundation of is in business
Mis 1st chapter notes foundation of is in business
 
Information technology and mis
Information technology and misInformation technology and mis
Information technology and mis
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information System
 

Más de dmeyeravc

Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03dmeyeravc
 
Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02dmeyeravc
 
Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01dmeyeravc
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamworkdmeyeravc
 
Chapter 17: Financial Management
Chapter 17: Financial ManagementChapter 17: Financial Management
Chapter 17: Financial Managementdmeyeravc
 
Chapter 16: Financial System
Chapter 16: Financial SystemChapter 16: Financial System
Chapter 16: Financial Systemdmeyeravc
 
Chapter 15: Accounting
Chapter 15: AccountingChapter 15: Accounting
Chapter 15: Accountingdmeyeravc
 
Chapter 13: Promotion, Pricing
Chapter 13: Promotion, PricingChapter 13: Promotion, Pricing
Chapter 13: Promotion, Pricingdmeyeravc
 
Chapter 11: Marketing
Chapter 11: MarketingChapter 11: Marketing
Chapter 11: Marketingdmeyeravc
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamworkdmeyeravc
 
Chapter 8: Human Resources
Chapter 8: Human ResourcesChapter 8: Human Resources
Chapter 8: Human Resourcesdmeyeravc
 
Chapter 7: Management
Chapter 7: ManagementChapter 7: Management
Chapter 7: Managementdmeyeravc
 
Chapter 6: Entrepreneurship
Chapter 6: EntrepreneurshipChapter 6: Entrepreneurship
Chapter 6: Entrepreneurshipdmeyeravc
 
Chapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus OrganizationChapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus Organizationdmeyeravc
 
Chapter 3: Economics
Chapter 3: EconomicsChapter 3: Economics
Chapter 3: Economicsdmeyeravc
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethicsdmeyeravc
 
Chapter 1: Global Environment
Chapter 1: Global EnvironmentChapter 1: Global Environment
Chapter 1: Global Environmentdmeyeravc
 

Más de dmeyeravc (18)

Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03Boone 15e student_ppt_ch03
Boone 15e student_ppt_ch03
 
Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02Boone 15e student_ppt_ch02
Boone 15e student_ppt_ch02
 
Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01Boone 15e student_ppt_ch01
Boone 15e student_ppt_ch01
 
Ch01
Ch01Ch01
Ch01
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamwork
 
Chapter 17: Financial Management
Chapter 17: Financial ManagementChapter 17: Financial Management
Chapter 17: Financial Management
 
Chapter 16: Financial System
Chapter 16: Financial SystemChapter 16: Financial System
Chapter 16: Financial System
 
Chapter 15: Accounting
Chapter 15: AccountingChapter 15: Accounting
Chapter 15: Accounting
 
Chapter 13: Promotion, Pricing
Chapter 13: Promotion, PricingChapter 13: Promotion, Pricing
Chapter 13: Promotion, Pricing
 
Chapter 11: Marketing
Chapter 11: MarketingChapter 11: Marketing
Chapter 11: Marketing
 
Chapter 9: Teamwork
Chapter 9: TeamworkChapter 9: Teamwork
Chapter 9: Teamwork
 
Chapter 8: Human Resources
Chapter 8: Human ResourcesChapter 8: Human Resources
Chapter 8: Human Resources
 
Chapter 7: Management
Chapter 7: ManagementChapter 7: Management
Chapter 7: Management
 
Chapter 6: Entrepreneurship
Chapter 6: EntrepreneurshipChapter 6: Entrepreneurship
Chapter 6: Entrepreneurship
 
Chapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus OrganizationChapter 5: Forms of Bus Organization
Chapter 5: Forms of Bus Organization
 
Chapter 3: Economics
Chapter 3: EconomicsChapter 3: Economics
Chapter 3: Economics
 
Chapter 2: Ethics
Chapter 2: EthicsChapter 2: Ethics
Chapter 2: Ethics
 
Chapter 1: Global Environment
Chapter 1: Global EnvironmentChapter 1: Global Environment
Chapter 1: Global Environment
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Chapter 14: Information Technology

  • 1. Chapter 14 Using Technology to Manage Information
  • 2. Learning Objectives 1 Distinguish between data and information 5 Discuss the security and ethical and explain the role of management issues involving computer information systems in business. information systems. 2 List the components and different types of 6 Explain the steps that companies go information systems. through in anticipating, planning for, and recovering from information 3 Outline how computer hardware and system disasters. software are used to manage information. 7 Review current trends in information 4 Describe the networking and systems. telecommunications technology and types of computer networks.
  • 3. Information Systems s Data– raw facts and figures s Information– knowledge gained from processing data s Information system– organized method for collecting, storing, and communicating information on operations s Chief information officer– executive responsible for directing information systems and operations
  • 4. Components of Information Systems s Computer Hardware s Computer Software s Telecommunications and Computer Networks s Data Resource Management
  • 5. Types of Information Systems s Operational Support Systems s Transaction Processing System s Process Control System s Management Support Systems s Management Information System (MIS) s Decision Support System (DSS) s Executive Support System (ESS)
  • 6. Computer Hardware s The tangible elements of a computer system s The components that store and process data, perform calculations s Input devices like the keyboard and mouse allow users to enter data and commands. s Storage and processing components consist of the hard drive and other storage components like flash drives.
  • 7. Types of Computers s Desktop (personal) computers s Server s Mainframes s Supercomputers s Notebook computers s Handheld devices– PDAs and smart phones
  • 8. Computer Software s Programs, routines, and computer languages that control a computer s Operating System s Windows Operating System s Mac Operating System s Application Software s Microsoft PowerPoint s Quicken
  • 9. Computer Networks s The Internet s Local Area Networks (LAN) s Wide Area Networks (WAN) s Wireless Local Networks (Wi-Fi) s Intranets s Virtual Private Networks (VPN) s Voice over Internet Protocol (VoIP)
  • 10. Security Issues s E-Crime s Computer Viruses s Worms s Trojan Horses s Spyware
  • 11. Ethical Issues s Use of information systems by employees and vendors: s Personal use s Privacy s Organizational use of information: s Employment records s Employee monitoring s Customer data
  • 12. Disaster Recovery and Backup s Natural Disasters s Power Failures 90% of firms that sustained s Equipment Malfunctions a loss of critical data went s Software Glitches out of business within two s Human Error years. s Terrorist Attacks s The most basic precaution– backup.
  • 13. Information Systems Trends s The Distributed Workforce s Employees who work in virtual offices s Application Service Providers s A firm that provides computers and application support s On Demand, Cloud, and Grid Computing s Renting software time