CHAPTER2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

PASS COLLEGE

APPLIED BUSINESS TOOLS AND TECHNOLOGIES


BSHM-II/BSTM-II
CHAPTER I
BUSINESS TECHNOLOGY
Learning Objectives:
At the end of this chapter, the student can:

 Define Business Technology;


 Identify different hardwares and softwares;
 Know the different communication tools;
 Know the importance of the work tasks.
Business technology refers to research, data, engineering, and information technologies for business purposes,
such as achieving economic and organizational objectives. The principle of transition, and how it can impact
business and society, is the primary element of technology, for several, as technological change occurs too
rapidly, the problem of potential shock arises that it causes people to be unable to tolerate changes or manage the
consequences.
I. Hardware
A. Computer Equipment
 Desktop computer or Laptop - A personal computer is now used by most companies. Some prefer laptops
but the desktop in the corporate world reigns supreme. The explanation for this is that processing power costs
less. When choosing a desktop or laptop, weigh your pros and cons. You’re going to need goods that last for
many years and hardware that needs limited maintenance.
 Printer – A printer is a device that accepts text and graphic output from a computer and transfers the
information to paper, usually to standard size sheets of paper. Printers vary in size, speed, sophistication, and
cost. In general, more expensive printers are used for higher resolution color printing.
 Scanner – A scanner is an input device that scans documents such as photographs and pages of text. When a
document is scanned, it is converted into a digital format. Thus creates an electronic version of the document
that can be viewed and edited on a computer.
B. Digital Cameras
Digital cameras are used to capture photographs and videos independently, Later, these photo and video files
can be transferred to a computer by connecting the camera directly with a cable, removing the memory card and
slotting it into the computer, or through wireless data transfer methods such as Bluetooth. Once the photos are on the
computer, they can be saved, edited, emailed, or printed.
C. Security Surveillance Technology
Businesses use different surveillance types to protect their employees, assets, and property from criminal
elements and other malicious breaches of security. Business owners invest time and money in their businesses and
use the various technologies available to protect this investment. The type of business and nature of protected
information and assets should dictate the type and extent of surveillance used.
 Video surveillance – Businesses set up video surveillance cameras for a variety of reasons, both outside
ad inside their buildings. Outside cameras protect against unlawful entry, including all-weather enclosures
to protect against elements and the ability to provide images of quality in very low light. Inside cameras
ensure honesty for employees around valuable assets and cash and protect against unlawful entry after
closing. Security firms can incorporate or configure these cameras into the business network, so owners
can view live footage from anywhere via the Internet.
 Internet Surveillance – Software reports on employee Internet monitoring. This powerful software
records all visited sites, any chats that occurred, and email activity from non-companies . Businesses
could load the software on individual PC’s or purchase and load the network version at server level to
monitor multiple stations at once. They must alert monitoring software employees to remind them of
company policy on personal Internet use, chat systems and personal email. Employees can dislike
introducing this intrusive level of monitoring, and as a result, may decline.
 Telephone surveillance – Businesses use this method of tracking mainly for quality control while
workers communicate to clients on the telephone, and when recruiting, they must warn employees that
they use phone recording devices. In certain states, consumers on the other end must also be told about
the telephone monitoring system. Mangers or company owners study client conversations and give staff
advice and training.
 Counter Surveillance – It sounds like a spy novel, but as business become more data-oriented and
information-oriented, the need for counter-surveillance inspections and devices increases. Competitive
espionage, illegal occurs in large and small businesses. It include audio-jammers, noise generators and
bug sweep machines. The first two masks, regular speech, reducing bugging device or secret recorder
effectiveness. Bug sweeping systems use radio transmitting technology for secret recording devices, bugs,
and hidden cameras.
D. Handheld devices input - An input device is essentially a piece of hardware that sends data to a computer. Most
input devices either interact with or control the computer in some way. The most input devices are the mouse and
the keyboard, but there are many others.
 Touchpad – Also known as a trackpad, a touchpad is a common substitute for a computer mouse. It is a
specialized surface that can detect the movement of a user’s finger and use that information to direct a
pointer and control a computer.
 Microphone – A microphone captures audio and sends it to a computer where it is converted to a digital
format. Once the audio has been digitized, it can be played back, copied, edited, uploaded, or emailed.
Microphones can also be used to record audio or to relay sounds live as part of a video chat or audio
stream.

E. Communication Systems – Communication is vital to the success of every organization. By making consumers
aware of your business and what is has to offer, good external communication helps develop your brand and
promote your product or service. In order to make the organization operate efficiently and effectively, internal
contact between workers, departments, partners, and leaders is important.
Two types of communication, external and internal, have different objectives:

 External Communication reaches out to the customer to make him or her aware of your product or service
and provide a reason to buy. Brochures, advertising, contact letters/direct mail, telephone calls, business
cards, blogs, and everything else that makes the public aware of what you do are part of this form of
communication.
 Internal Communication with team members is essential to attracting and retaining a talented staff and
monitoring business performance. Performance certificates, newsletters, seminars, telephone calls, and both
formal and informal conversations are tools for interacting internally.
Basic Communication Tools
For internal and internal communication, a large range of communication techniques are used. Fax, email, mobile,
cellphones, tables, computers, video and web conferencing apps, social networking, as well as online communication and
productivity channels are all included in these tools.

 Mail – Even with all the modern communication techniques, daily postal mail is still a powerful tool for a
business. It provides a personal touch and is also used to deliver protected documents and contracts and to provide
consumers with purchased goods.
 Email – In connecting with clients, suppliers, and internal teammates, getting a company email would be
beneficial. It is important to review e-mail on a regular basis. Depending on the account form you have, there are
several email features available. Sending outgoing emails, filtering incoming emails, and setting up automated
replies for various account types may also done.
 Landline – The telephone system that uses a physical cable for transmission is the landline. In your home, your
office. Or at a public phone spot, you may have a landline. You will still be able to use your landline if the
internet is unstable, since it depends on a different networking technology.
 Smartphone – A smartphone is a mobile phone that provide computer-like features with advanced capabilities.
Apps such as emails, the internet and social media are built into a smartphone. Smartphones are text message
capable and have a video-enabled camera.
 SMS Messaging and Texting – Although not all cellphones are smartphones capable of receiving videos and
pictures, SMS (short message service) messages can be received be received by almost all mobile phones. These
are texts of less than 160 characters, consisting solely of letters, numbers and symbols. A effective way to connect
is SMS messaging, and texting in general.
 Video Conferencing – Video conferencing offers a way without the cost of travel to hold face-to-face meetings.
It offers a more intimate way of communicating both internally with clients and associates and internally with
teams members or workers who might work outside the office.
 Social Networking Sites – A social network is an online community made up of people or organizations bound
together by shared interests. Internet-based social networking takes place across a range of website platforms that
allow content to be shared and interacted online by users of common interests. Yahoo, Instagram, Twitter,
LinkedIn, Pinterest and YouTube are several popular social networking sites.
II. Software Applications
Application software is a type o computer program that performs a particular function that is personal,
educational, and business. Each software is intended to help the user with a specific process that may be linked to
efficiency, innovation, and/or communication.
A. Word Processing Packages
To manipulate a text document such as resume or a journal, Word processing software is used. By typing, you
usually enter text, and the program offers tools for copying, deleting, and different formatting styles.
 Microsoft Word – Word regularly wins title of the most commonly used word processing application

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy