In: Computer Science
COMPUTER TECHNOLOGY
Computer technology combines the hardware of computers and computer controlled devices with software-operating systems ,authoring tools , expert systems and course ware- to support training technology.
As a technologist , problem solved by computer technology are:
1. ENTERPRISE RESOURCE PLANNING ( E R P ) : Small business operators do not normally equate the word
" enterprise" to local and mom-and-pop business. However, many enterprise resource planning software developers
are increasingly using this to meet the needs of small and average business. Most multinational mega corporation use E R P
to solve efficiency problems between various departments.
Example: A busy dinner might institute a system that shows orders on a LCD screen in the kitchen after the cashier or server inputs the order into a computerized cash register. This speeds order delivery and based on recorded service times ,dinner management can make decisions about improving service delivery.
2. COLLABORATION TOOLS: Many business have multiple locations that function independently. Sometimes a branch, manager and a personnel need tools that help the location stay on the same page with business practices and policies.
Collaboration tool software tools can solve the problem of helping several small business locations conduct business on
behalf of a large corporate unity.
3. BUSINESS ANALYSIS TOOLS: Enterprise can afford to staff and run an entire department devoted to business analytics .
However ,for smaller operations ,the owner and manager are all-things-at-once,including the business analyst.Instead of hiring this function,small companies can use business analysis tools to crunch data.
Example : if the previous month's sales performance was lackluster,based on customer traffic,a manager can plug data into
a spreadsheet to run a analysis about future performance.
4. DECISION SUPPORT SYSTEM: The concept of a decision support system is not new, but as computer processing power
increases , so does the role that these machine play in helping professionals make important decision about business
operations.Another way in which business can use DSS is an artificial intelligence to help professionals ,such as doctors
and nurses ,make informed decision when presented with a problem.
Problem created by computer technology are:
1. INFORMATION AND PRIVACY : The sheer amount of personal information make it east to breach the boundary
between using the internet for learning and information and using the internet to invade privacy.
2.COPYRIGHT AND PRIVACY: Items of media which are copyrighted are not in public domain and downloading and
distributing them is illegal. Unfortunately ,online piracy is widespread and notoriously difficult to prosecute,so it often goes without consequence.
3. COMPUTER CRIME : The availability of information that can be accessed with a computer paired with a lax attitude toward security means credit card number and identities are constantly at risk. While the amount and extent of computer crime is frightening , therefore it's necessary for consumers to protect themselves by purchasing from trusted retailers.
4. COMMUNICATION ISSUES : Computer technology have altered the way human interact with each other.With invention of social networking sites face-to-face conversations seems to be a dying art.
Potential abuses that warn the organisation /society about computer technology:
1.LOCK UP THE SERVER ROOM: Even before you lock down the servers ,in fact ,before you even turn them on for the first time ,you should ensure that there are good locks on the server room.The server room is the heart of your physical access to the servers,cables,switches and other devices in that room.
2. PROTECT THE PORTABLES: Laptops and handheld computers pose special physical security risks. If employees use laptops at their desks, they should take them with them when they leave or secure them with a lock,such as the one at PC Guardian.
3. PACK UP THE BACKUPS : Backing up important data is an essential element in disaster recovery ,but don't forget that the information on those backup tapes, disks or discs can be stolen and used by someone outside the company.They should be locked in a drawer or safe at the very least.
4. DISABLE THE DRIVES : If you don't want employees copying company data to removable media , you can disable the USB ports and other means of connecting external devices.Disk locks can be inserted into floppy drives on those computer.
5.PROTECT THE PRINTERS: You might not think about the printers posing a security risk, but many of today's printers store document contents in their own on board memories.If a hacker steals the printer ,he may be able to make copies of recently printed document.Printers should be located in secure locations.