Page 222 - Business Principles and Management
P. 222
C HAPTER 8 A SSESSMENT
APPLY WHAT YOU KNOW
20. Describe how the basic parts of a computer work together to process
information.
21. Describe how businesses have benefited from the efficiencies that
have resulted from the use of electronic technology.
22. Explain how management information systems use data to help
businesses operate.
23. Describe the characteristics that a chief information officer must
possess in order to be successful.
24. Describe the techniques that are being tried to make sure that the
wrong people do not gain access to information on a firm’s computer
system.
MAKE CONNECTIONS
25. Math Deborah and Kenneth Parks obtained prices from the following
companies for a desktop computer system with a modem for their
new business.
Computer House E-Z Electronics
Computer $1,200 $1,000
Monitor 500 550
Printer 400 350
Software programs 850 950
a. Which company has the best total price and by how much?
b. If the lowest-priced item were purchased from each company,
what would the total cost be? How much would each company
be paid?
26. Research Using a library or the Internet, find information about
a specific ergonomic problem related to working with electronic
equipment, such as one related to radiation from computer equip-
ment, uncomfortable chairs, or poorly designed desks. Prepare a
report of your findings.
27. Technology Trina Jones is considering purchasing cellular phone
PDAs for her employees. She wants to determine the yearly cost
for each type of PDA. PDA 1 costs $300 and has a monthly charge
of $65. PDA 2 costs $225 and has a monthly charge of $85. PDA
3 costs $100 and has a monthly charge of $105. Use spreadsheet
software to answer the following questions.
a. What would be the total annual cost for each PDA?
b. Assume Trina’s employees will use the PDAs for two years at
the same monthly cost. Which PDA is the least expensive over
two years?
28. Writing Join other students to write a report about any trouble group
members have had with losing data and files from school or home
computers on or off the Internet. Present the report to your class,
specifying the problems and indicating the security steps that should
be taken to prevent or reduce these problems.
209

