Top Banner
© 2007 Prentice Hall, Inc . 1 Using Management Information Systems David Kroenke Hardware and Software Chapter 3
86
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ch 03

© 2007 Prentice Hall, Inc. 1

Using Management Information Systems

David Kroenke

Hardware and Software

Chapter 3

Page 2: Ch 03

© 2007 Prentice Hall, Inc. 2

Learning Objectives

Learn the terminology necessary to be an intelligent consumer of hardware products.

Know the functions and basic features of common hardware devices.

Understand the essentials of the representation of computer instructions and data.

Know the purpose of the CPU and main memory, and understand their interaction.

Page 3: Ch 03

© 2007 Prentice Hall, Inc. 3

Learning Objectives (Continued)

Learn about viruses, Trojan horses, and worms and how to prevent them.

Understand the key factors that affect computer performance.

Learn basic characteristics of the four most popular operating systems.

Know the sources and types of application software.

Page 4: Ch 03

© 2007 Prentice Hall, Inc. 4

Essential Hardware Terminology

Computing devices consists of computer hardware and software.

Hardware is electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software.

Your personal computer and other computers like it are general-purpose computers. They can run different programs to perform different

functions.

Page 5: Ch 03

© 2007 Prentice Hall, Inc. 5

Essential Hardware Terminology (Continued)

Some computers are special-purpose computers. The programs they run are fixed permanently in

memory. The computer in your cell phone is a special-purpose

computer, and so is the computer in your car that meters fuel to your car’s engine.

Page 6: Ch 03

© 2007 Prentice Hall, Inc. 6

Essential Hardware Terminology (Continued)

The principles and fundamental components of general-purpose and special-purpose computers are the same; The sole difference is the computer can process a

variety of different programs

Page 7: Ch 03

© 2007 Prentice Hall, Inc. 7

Input, Processing, Output, and Storage Hardware

One easy way to categorize hardware is by its primary function: Input hardware Processing hardware Output hardware Storage hardware Communication hardware

Page 8: Ch 03

© 2007 Prentice Hall, Inc. 8

Figure 3-1 Input, Process, Output, and Storage Hardware

Page 9: Ch 03

© 2007 Prentice Hall, Inc. 9

Input, Processing, Output, and Storage Hardware

Input hardware devices are the keyboard, mouse, document scanners, and bar-code (Universal Product Code) scanners.

Microphones also are input devices; with tablet PCs, human handwriting can be input as well.

Processing devices include the central processing unit (CPU), which is sometimes called “the brain” of the computer.

Page 10: Ch 03

© 2007 Prentice Hall, Inc. 10

Figure 3-2 Scantron Scanner

Page 11: Ch 03

© 2007 Prentice Hall, Inc. 11

Input, Processing, Output, and Storage Hardware (Continued)

The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory.

CPU’s vary in speed, function, and cost.

Whether you or your department needs the latest, greatest CPU depends on the nature of your work.

The CPU works in conjunction with main memory.

Page 12: Ch 03

© 2007 Prentice Hall, Inc. 12

Input, Processing, Output, and Storage Hardware (Continued)

The CPU reads data and instructions from memory, and it stores results of computations in main memory.

Computers also can have special function cards that can be added to the computer to augment the computer’s basic capabilities. A common example is a card that provides enhanced

clarity and refresh speed for the computer’s video display.

Page 13: Ch 03

© 2007 Prentice Hall, Inc. 13

Figure 3-3 Special Function Cards

Page 14: Ch 03

© 2007 Prentice Hall, Inc. 14

Input, Processing, Output, and Storage Hardware (Continued)

Output hardware consists of video displays, printers, audio speakers, overhead projectors, and other special-purpose devices, such as large flatbed plotters.

Storage hardware saves data and programs.

Magnetic disk is by far the most common storage device, although optical disks, such as CDs and DVDs are popular.

In large corporate data centers, data are sometimes stored on magnetic tape.

Page 15: Ch 03

© 2007 Prentice Hall, Inc. 15

Binary Digits

Computers represent data using binary digits, called bits.

A bit is either a zero or a one.

Bits are used for computer data because they are easy to represent physically.

A switch can either be closed or open.

Page 16: Ch 03

© 2007 Prentice Hall, Inc. 16

Binary Digits (Continued)

A computer can be designed so an open switch represents zero and a closed switch represents a one.

Or, the orientation of a magnetic field can represent a bit; Magnetism in one direction represents a zero Magnetism in the opposite direction represents a one

Or, for optical media, small pits are burned onto the surface of the disk so that they will reflect light In a given spot, a reflection means a one No reflection means a zero

Page 17: Ch 03

© 2007 Prentice Hall, Inc. 17

Figure 3-4 Bits Are Easy to Represent Physically

Page 18: Ch 03

© 2007 Prentice Hall, Inc. 18

Computer Instructions

Computers use bits for two purposes: instructions and data.

A given instruction, say to add two numbers together, is represented by a string of digits (0111100010001110).

When the CPU reads such an instruction from main memory, it adds the numbers or takes whatever action the instruction specifies.

The collection of instructions that a computer can process is called the computer’s instruction set.

Page 19: Ch 03

© 2007 Prentice Hall, Inc. 19

Computer Instructions (Continued)

All of the personal computers that run Microsoft Windows are based on an instruction set developed by Intel Corporation that is called Intel instruction set.

Until 2006, all Macintosh computers used a different instruction set, the PowerPC instruction set, designed for Powerful PC processors.

In 2006, Apple began offering Macintosh computers with a choice of either Intel or PowerPC processors.

Page 20: Ch 03

© 2007 Prentice Hall, Inc. 20

Computer Instructions (Continued)

Currently, you cannot run a program designed for one instruction set on a computer having a different instruction set.

In the future, you may be able to run Windows on a Macintosh that uses the Intel instruction set, although the particulars of that are uncertain.

When you pick a family of computers, such as Windows or the Macintosh, you pick not only the hardware, but also the sets of programs that can run on one family of computers.

Page 21: Ch 03

© 2007 Prentice Hall, Inc. 21

Computer Data

All computer data are represented by bits.

The data can be numbers, characters, currency amounts, photos, recordings, or whatever.

Bits are grouped into 8-bit chunks called bytes.

For character data, such as letters in a person’s name, one character will fit into one byte. Thus, when you read a specification that a computing

device has 100 million bytes of memory, you know that the device can hold 100 million characters.

Page 22: Ch 03

© 2007 Prentice Hall, Inc. 22

Figure 3-5 Important Storage-Capacity Terminology

Page 23: Ch 03

© 2007 Prentice Hall, Inc. 23

Ambiguity of Binary Data

It is not possible to determine the type of computer data just by looking at the data. The bit string 01000001 can be interpreted as the decimal

number 65, as the character A, or as part of a picture or a sound file.

Further, it could be part of a computer instruction.

The CPU determines how to interpret a bit string from the context in which it encounters it.

If the string occurs in the context of reading instructions, it will be interpreted as a computer instruction.

Page 24: Ch 03

© 2007 Prentice Hall, Inc. 24

Ambiguity of Binary Data (Continued)

If it occurs in the context of reading instructions, it will be interpreted as the character A.

If it occurs during arithmetic operations, it will be interpreted as the number 65.

This ambiguity is more than curiosity; virus authors and other cyber-criminal use it to their advantage.

Page 25: Ch 03

© 2007 Prentice Hall, Inc. 25

Knowledge for the Informed Professional

Suppose that your IS department states that you can buy three different computer configurations for three different prices.

The computers are described by expressions like the following: Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data

Bus and 512K cache, 256MB RAM Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data

Bus and 512K cache, 512 MB RAM Intel Pentium 4 Processor at 3.6 GHz with 533MHz Data

Bus and 1MB cache, 256 MB RAM

Page 26: Ch 03

© 2007 Prentice Hall, Inc. 26

Knowledge for the Informed Professional (Continued)

Now, you, have two choices: You can tell the people in the IS department to specify

what they think is best; Or, with a little bit of knowledge on your part, you can work

with the IS department to ask intelligent questions about the relationship of these computers to the kind of work your department does

Page 27: Ch 03

© 2007 Prentice Hall, Inc. 27

Figure 3-6 Computer with Applications Loaded

Page 28: Ch 03

© 2007 Prentice Hall, Inc. 28

CPU and Memory Usage

The motherboard is a circuit board upon which the processing components are mounted and/or connected.

The central processing unit (CPU) reads instructions and data from main memory, and it writes data to main memory via a data channel, or bus.

Main memory consists of a set of cells, each of which holds a byte of data or instruction.

Page 29: Ch 03

© 2007 Prentice Hall, Inc. 29

CPU and Memory Usage (Continued)

Each cell has an address, and the CPU uses the addresses to identify particular data items.

Main memory is also called RAM memory, or just RAM.

RAM stands for random access memory.

The term random is used to indicate that the computer does not need to access memory cells in sequence; rather, they can be referenced in any order.

Page 30: Ch 03

© 2007 Prentice Hall, Inc. 30

CPU and Memory Usage (Continued)

To store data or instructions, main memory or RAM must have electrical power.

When power is shut off, the contents of main memory are lost.

The term volatile is used to indicate that data will be lost when the computer is not powered. Main memory is volatile.

Page 31: Ch 03

© 2007 Prentice Hall, Inc. 31

CPU and Memory Usage (Continued)

Magnetic and optical disks maintain their contents without power and serves as storage devices.

You can turn the computer off and back on, and the contents of both magnetic and optical disks will be unchanged. Magnetic and optical disk are nonvolatile.

Page 32: Ch 03

© 2007 Prentice Hall, Inc. 32

The Contents of Memory

Memory is used for three purposes: It holds instructions of the operating system It holds instructions for application programs such as Excel or Acrobat. It holds data.

The operating system (OS) is a computer program that controls all of the computer’s resources It manages main memory. It processes key strokes and mouse movements. It sends signals to the display monitor. It reads and writes disk files. It controls the processing of other programs.

,

Page 33: Ch 03

© 2007 Prentice Hall, Inc. 33

Memory Swapping

Memory swapping occurs when there is a request to the operating system to store data in memory and the data will not fit because there is not enough free memory to store the requested data.

In this case, the operating system will have to remove something to make space.

Little swapping occurs when: Your computer has a very large main memory. You use only one or a few programs at a time. You use small files.

,

Page 34: Ch 03

© 2007 Prentice Hall, Inc. 34

Memory Swapping (Continued)

You may have a serious problem if: Your computer has a small memory capacity. You need to use many programs or process many large data files. Your computer has a small memory capacity.

In this latter case, adding more main memory will substantially improve your computer’s performance.

,

Page 35: Ch 03

© 2007 Prentice Hall, Inc. 35

Figure 3-7 Picture File Overlays Memory Previously Used by Excel

Page 36: Ch 03

© 2007 Prentice Hall, Inc. 36

Work at the CPU

The CPU reads instructions and data from memory via the data bus.

The maximum speed at which it transfers data is determined by the speed of main memory and the speed and width of the data bus.

A bus that is 16 bits wide can carry 16 bits at a time; one that is 64 bits wide can carry 64 bits at a time.

The wider the bus, the more data it can carry in a given interval of time.

,

Page 37: Ch 03

© 2007 Prentice Hall, Inc. 37

Work at the CPU (Continued)

Because the data transfer rate depends on both the width of the data bus and the speed of main memory, another way to speed up the computer is to obtain faster memory.

Some data are accessed more frequently than other data. Because of this, computer engineers found they could speed up the overall throughput of the CPU by creating

a small amount of very fast memory, called cache memory. The most frequently used data are placed in the cache. Typically, the CPU stores intermediate results and the most frequently used computer instructions in the

cache.

,

Page 38: Ch 03

© 2007 Prentice Hall, Inc. 38

Work at the CPU (Continued)

Each CPU has a clock speed that is measured in cycles per second, or hertz.

A fast modern computer has a clock speed of 3.0 gigahertz (abbreviated GHz), or 3 billion cycles per second. By the time you read this, CPU speeds will be greater.

In general, the faster the clock speed, the faster work will get done.

,

Page 39: Ch 03

© 2007 Prentice Hall, Inc. 39

Figure 3-8 Hardware Components and Computer Performance

Page 40: Ch 03

© 2007 Prentice Hall, Inc. 40

The CPU and Memory (Continued)

A fast CPU and data bus are most useful when processing data that already reside in main memory. Once you have downloaded a large spreadsheet, a fast CPU will rapidly perform complicated, formula-based

what-if analyses. A fast CPU also is useful for processing large graphics files.

Example, manipulating the brightness of the elements of a large picture

If the applications that you or your employees use do not involve millions of calculations or manipulations on data in main memory, then buying the fastest CPU is probably not worthwhile.

,

Page 41: Ch 03

© 2007 Prentice Hall, Inc. 41

Main Memory

Page 42: Ch 03

© 2007 Prentice Hall, Inc. 42

Main Memory (Continued)

Page 43: Ch 03

© 2007 Prentice Hall, Inc. 43

Figure 3-9 Magnetic Disk Components

Page 44: Ch 03

© 2007 Prentice Hall, Inc. 44

Magnetic DisksMagnetic and optical disks provide long-term, nonvolatile data storage.

The types and sizes of such storage devices will affect computer performance.

Data are recorded on magnetic disks in concentric circles. The disks spin inside the disk unit, and as they spin magnetic spots on the disks are read or written by the read/write head. The time required to read data from a disk depends on two measures:

Rotational delaySeek time

,

Page 45: Ch 03

© 2007 Prentice Hall, Inc. 45

Magnetic Disks (Continued)

Page 46: Ch 03

© 2007 Prentice Hall, Inc. 46

Magnetic Disks (Continued)

Page 47: Ch 03

© 2007 Prentice Hall, Inc. 47

Optical Disks

Page 48: Ch 03

© 2007 Prentice Hall, Inc. 48

Optical Disks (Continued)

Page 49: Ch 03

© 2007 Prentice Hall, Inc. 49

Video Displays

Page 50: Ch 03

© 2007 Prentice Hall, Inc. 50

Video Displays (Continued)

Page 51: Ch 03

© 2007 Prentice Hall, Inc. 51

Video Displays (Continued)

Page 52: Ch 03

© 2007 Prentice Hall, Inc. 52

Video Displays (Continued)

Page 53: Ch 03

© 2007 Prentice Hall, Inc. 53

Figure 3-10 Contemporary Operating Systems

Page 54: Ch 03

© 2007 Prentice Hall, Inc. 54

Mac OS

Page 55: Ch 03

© 2007 Prentice Hall, Inc. 55

Unix OS

Page 56: Ch 03

© 2007 Prentice Hall, Inc. 56

Linux OS

Page 57: Ch 03

© 2007 Prentice Hall, Inc. 57

Application Software

Page 58: Ch 03

© 2007 Prentice Hall, Inc. 58

Application Software (Continued)

Page 59: Ch 03

© 2007 Prentice Hall, Inc. 59

Application Software (Continued)

Page 60: Ch 03

© 2007 Prentice Hall, Inc. 60

Application Software (Continued)

Page 61: Ch 03

© 2007 Prentice Hall, Inc. 61

Figure 3-11 Software Sources and Types

Page 62: Ch 03

© 2007 Prentice Hall, Inc. 62

Firmware

Page 63: Ch 03

© 2007 Prentice Hall, Inc. 63

Summary

Computing devices consists of hardware and software.General-purpose computers can run multiple programs; special-purpose computers, like those in cell phones, run only one program that is fixed in memory.Hardware can be categorized according to its primary functions: input, processing, output, and storage.Input hardware includes devices such as keyboards and mice.

Page 64: Ch 03

© 2007 Prentice Hall, Inc. 64

Summary (Continued)

Processing hardware includes the CPU and main memory.

Output devices are video displays, printers, and the like.

Storage devices include magnetic and optical disks.

Computers use bits to represent data.

A bit, or binary digit, has a value of zero or one.

Bits are used to represent computer instructions and data.

Page 65: Ch 03

© 2007 Prentice Hall, Inc. 65

Summary (Continued)

Four popular operating systems are Windows, Mac, OS, Unix, and Linux.Computer software consists of the operating system and application software.Software can be purchased off-the-rack, purchased off-the-rack and then altered, or tailor-made.Types of software include horizontal, vertical, and custom.Firmware is program code installed in read-only memory of printers or communications devices.

Page 66: Ch 03

© 2007 Prentice Hall, Inc. 66

Key Terms and Concepts

Antivirus programsApplication softwareATA-100Binary digitB2B (business-to-business)BusByteCache memoryCD-RCD-ROMCD-RWCRT monitor

Central processing unit (CPU)Clock speedCustom softwareData channelDot pitchDVD-RDVD-ROMDVD-RWFirmwareGeneral-purpose computerGigabyte (GB)Hardware

Page 67: Ch 03

© 2007 Prentice Hall, Inc. 67

Key Terms and Concepts (Continued)

Horizontal-market application

Input hardwareIntel instruction setKilobyte (K)LCD monitorLicense agreementLinuxMac OSMacro virusMain memoryMegabyte (MB)Memory swapping

MotherboardNonvolatileOEM (original equipment

manufacturer)Off-the-self softwareOpen-source communityOperating system (OS)Optimal resolutionOutput hardwarePatchPayloadPixel

Page 68: Ch 03

© 2007 Prentice Hall, Inc. 68

Key Terms and Concepts (Continued)

Pixel pitchPower PC instruction setRAM memorySeek timeSoftware piracySpecial function cardsSpecial-purpose computerStorage hardwareTCG/NGSCBTerabyte (TB)Trojan horseUnix

VAR (value-added resellers)

Vertical-market applicationVirusVolatileWindowsWorm

Page 69: Ch 03

© 2007 Prentice Hall, Inc. 69

Problem Solving Guide–Questioning your Questions

For most problems, in the business world, the difficult and creative acts are generating the questions and formulating a strategy for getting the answers.

Once the questions and strategy are set, the rest is simply legwork.

As a future consumer of information technology and services, you will benefit from being able to ask good questions and effectively obtain answers to them.

Page 70: Ch 03

© 2007 Prentice Hall, Inc. 70

Problem Solving Guide–Questioning your Questions (Continued)

It is probably the single most important behavior you can learn.

There are billions of bad questions, and you will be better off if you learn not to ask them.

Questions can be bad in three ways: They can be irrelevant Dead Asked of the wrong source

Page 71: Ch 03

© 2007 Prentice Hall, Inc. 71

Problem Solving Guide–Questioning your Questions

A dead question is one that leads to nowhere, it provides no insight into the subject. Example–“Is the material on how a computer works going

to be on the test? The answer will help you in school, but it won’t help you

use MIS on the job. Instead ask questions like,

“What is the purpose of the section on how a computer works?”

‘”Why are we studying it?” “How will it help me use MIS in my career?”

Page 72: Ch 03

© 2007 Prentice Hall, Inc. 72

Problem Solving Guide–Questioning your Questions

Information technology questions fall into three categories: “What is it?” “How can I use it?” “Is it the best choice?”

Page 73: Ch 03

© 2007 Prentice Hall, Inc. 73

Security Guide–Viruses, Trojan Horses, and Worms

A virus is a computer program that replicates itself and consumes the computer’s resources.

The program code that causes unwanted activity is called the payload.

There are many different virus types: Trojan horses Macro viruses Worm

Page 74: Ch 03

© 2007 Prentice Hall, Inc. 74

Security Guide–Viruses, Trojan Horses, and Worms (Continued)

Prevention steps are: Find and apply patches to the operating system and to

applications. Never download files, programs, or attachments from

unknown Web sites. Do not open attachments to emails from strangers. Do not open unexpected attachments to emails, even

from known sources. Do not rely on file extensions. Run a retroactive antivirus program at regular intervals,

at least once per week.

Page 75: Ch 03

© 2007 Prentice Hall, Inc. 75

Opposing Forces Guide–Churn and Burn

“Frankly, I think there’s a conspiracy between hardware and software vendors”. “They both want to sell new products, so the hardware

people come up with these incredibly fast and huge computers”.

“Then, given all that power, the software types develop monster products bloated with features and functions that nobody uses”.

“It would take me months to learn all the features in Word, not only to find out that I don’t need those features”.

“In my version of Word, there are 19 toolbars to select, plus one more to customize my own toolbar”.

Page 76: Ch 03

© 2007 Prentice Hall, Inc. 76

Opposing Forces Guide–Churn and Burn (Continued)

“Frankly, I think there’s a conspiracy between hardware and software vendors” (continued) “I write all the time, and I have two selected: Standard and

Formatting”.

“Because we live in a connected world, they don’t have to get all of us to use those 19 toolbars, just one of us”. “Bridgette likes to use the redlining features, and she likes

me to use them when I change draft contracts she sends me”.

“So, If I want to work on her documents, I have to turn on the Reviewing toolbar”.

Page 77: Ch 03

© 2007 Prentice Hall, Inc. 77

Opposing Forces Guide–Churn and Burn (Continued)

“Viruses are one of their best ploys. They say you can better buy the latest and greatest products in software, and then apply all the patches that follow so that you’ll be protected from the latest zinger from the computer bad guys”. “If vendors had built the products correctly the first time,

then there would be no holes for the baddies to find, would there?”

“One of these days, users are going to rise up and say, That’s enough. I don’t need any more. I’ll stay with what I have, thanks you very much.” “In fact, maybe that’s happening right now”

Page 78: Ch 03

© 2007 Prentice Hall, Inc. 78

Ethics Guide–Using Hardware to Enforce Licenses

Every commercial software program, whether an operating system or an application, is sold under the restrictions of a license agreement that stipulates how the program can be used.

Software piracy occurs when a programs are used in violation of the license agreement.

Piracy occurs on a large scale when a company illegally copies a program and sells it on the black market.

Page 79: Ch 03

© 2007 Prentice Hall, Inc. 79

Ethics Guide–Using Hardware to Enforce Licenses (Continued)

But piracy also occurs on a small scale when one user allows another user to load the program on her computer in violation of the license agreement.

Over the years, vendors have applied many different techniques to prevent software piracy.

The most effective strategies involve a combination of hardware and program identify.

Today, Microsoft, Intel, and other companies have been working together on a project called TCG/NGSCB.

Page 80: Ch 03

© 2007 Prentice Hall, Inc. 80

Ethics Guide–Using Hardware to Enforce Licenses (Continued)

No products yet implement this work, but product designs are underway.

According to the TCG standard, future computers will include a hardware component that emits passwords and other security data that uniquely identify that particular computer. Because these identifiers are created by the hardware,

they cannot be hacked without running the hardware. The bottom line is that software companies will be able

to license programs to a particular computer.

Page 81: Ch 03

© 2007 Prentice Hall, Inc. 81

Ethics Guide–Using Hardware to Enforce Licenses (Continued)

Once the TCG/NGSCB has been implemented, it can be used to enforce not only program licenses, but content licenses as well. Entertainment companies and other content vendors will

be able to license music, video, and similar content to a particular computer.

With the TCG/NGSCB components in place, no other computer will be able to play copies of that music, video, or file.

Page 82: Ch 03

© 2007 Prentice Hall, Inc. 82

Ethics Guide–Using Hardware to Enforce Licenses (Continued)

Microsoft and other software vendors will license software to a particular computer, possibly for a particular time period. The license will automatically expire at the end of that

period. Any attempt to run unlicensed software will fail and could

result in the sending of a report to the vendor that such an attempt was made.

Software vendors can make the files unusable after the licenses expire.

Page 83: Ch 03

© 2007 Prentice Hall, Inc. 83

Ethics Guide–Using Hardware to Enforce Licenses (Continued)

Governments can ensure that sensitive government documents are readable only on certain machines.

The industry groups justify this program as providing a “secure computing environment” and attempt to spin this initiative as something that will benefit the consumer.

Hundreds of independent observers disagree with these stated objectives and believe the objective is to prevent unauthorized copying of software and files.

Page 84: Ch 03

© 2007 Prentice Hall, Inc. 84

Reflection Guide–Keeping Up to Speed

Technology change is a fact, and the only appropriate question is, “What am I going to do about it?” One strategy you can take is to bury your head in the sand:

“Look, I’m not a technology person. I’ll leave it to the pros. As long as I can send email and use the Internet, I’m happy.”

This strategy is fine, as far as it goes, and many business people use it. However, it won’t give you a competitive advantage over anyone, and it will give someone else a competitive advantage over you.

What about your department though? If the expert says, “Every computer needs a 120GB disk,” are you going to nod your head and say, “Great. Sell them to me!” Or, are you going to know enough to realize that’s a big disk and ask why everyone needs such a large amount of storage?

Page 85: Ch 03

© 2007 Prentice Hall, Inc. 85

Reflection Guide–Keeping Up to Speed (Continued)

At the other end of the spectrum, are those who are not only knowledgeable in their field, but also enjoy information technology. These people are sprinting along the technology conveyor

belt; they will never end up in the techno-trash, and they will use their knowledge of IT to gain competitive advantage throughout their careers.

Many business professionals are in between these extremes.

Page 86: Ch 03

© 2007 Prentice Hall, Inc. 86

Reflection Guide–Keeping Up to Speed (Continued)

There are a couple of strategies: Don’t allow yourself to ignore technology. Take a seminar or pay attention to professional events that

combine your specialty with technology. Get involved in as a user in your organization. Later in your career, become a member of the business

practice technology committee, or whatever they call it at your organization.