Premium Essay

Re: Computers and Commerce

In:

Submitted By wxz1817
Words 759
Pages 4
Revolution in the world of personal computer
Name
DateRevolution in the world of personal computer
The personal computer in the 21st century can be considered more of a basic need than a luxury. This is as a result of the world becoming computerized and more and more people even in the older generation are becoming dependent on it. The entertainment industry has become more sophisticated, and everything now revolves around computers from music, games, gambling, movies, news, communication just to mention a few (Jacko & Stephanidis, 2003).
A personal computer connected to the Internet enables a person to enjoy any form of entertainment from all corners of the world. A football fan in Africa can now support an English team and catch all the live games by the click of a button. A musician can now have his/her song played in any corner of the world within minutes of releasing it. Gamers can now compete with anyone from across the word. Movie lovers can now catch their favorite episodes just by opening their personal computers. Millions of online books are now available for those who enjoy reading. All forms of entertainment are now just a click away (Misa, 2007).
Social media has enabled people to communicate more easily across the world and friendships have been created without even meeting. Nowadays things go viral, and people have become celebrities just by uploading a video of themselves from the comfort of their living rooms. It is amazing what a personal computer can do with regards to entertainment (Misa, 2007).
Personal Computers were first designed to help to solve complex mathematical problems, but all this changed between the 1980s and 1990s when computers started becoming popular (Yvonne Rogers, 2011). Today computers are more sophisticated, and the numerous programs designed, have changed the way people do things. The current generation of personal

Similar Documents

Premium Essay

Mr Adam

...store manager has a net workstation and a networked and laser printer.’ Software- ‘A router provides broadband access to the internet, including a secure link to the banking system for electronic funds transfer.’ ‘The supermarket’s stock database is stored on the server, along with word processing and spreadsheet software. Input, processing and output Checkout procedures Input- ‘The checkout operator scans the barcode of each item’ Processing- ‘The product code is used to look up the description and the price of the item’. Output- ‘There are displayed on the touch screen and the customer display screen’. Procedures for re-stocking supermarkets Input- ‘As the barcode of each item is scanned’ Processing-‘Product code is used to look up the item records in the stock database’. Output-‘Prints out the re-order list for non-perishable goods’. Procedures for...

Words: 1899 - Pages: 8

Free Essay

Social Media

...implications: aggregation, sorting, linking, contrasting… provision in “decision points” Knowledge – information within contextual structure – contextual structure: inter-related information, added value of the generic structure of experiences, contextual process structure and/or insights – implications: tends to be personal, implicit 6 / 21 2 ‫ט"ו/אדר/תשע"ה‬ The basic services of information systems Transaction Processing (TP): – Key concepts: event  capture  data – Organized around process and feedback – Examples: bidding on courses, purchasing a product, paying a bill Decision Support (DS): – Key concepts: information  decision  action – Organized around a decision situation – Examples: classroom assignment, inventory re-order, cash-flow planning 7 / 21 TP and DS are very different TP DS Use Mandatory voluntary...

Words: 815 - Pages: 4

Premium Essay

E-Coomerce of Bangladesh

...ASSIGNMENT ON E-COMMERCE IN BANGLADESH Submitted To: Submitted by: Table of Contents Ecommerce .....................................................................................3 History of E-Commerce....................................................................3 Why e-Commerce for Bangladesh……………………………………………….4 Traditional and Electronics Business Transaction ............................5 Traditional Commerce vs e-Commerce............................................3 Dimensions of E-Commerce .............................................................6 Business to consumer(B2C) ..................................................7 Business to Business (B2B) ...................................................7 Business to Government(B2G) ..............................................7 Benefits of E-Commerce ...................................................................7 e-Commerce in Different Sector in Bangladesh ................................8 Overview of implementation stage of e-Commerce in Bangladesh 8 Some e-Commerce shop in Bangladesh ............................................9 The impact of e-Commerce ...............................................................9 Constraints to E-Commerce in Bangladesh......................................10 Challenges of E-commerce for Bangladesh......................................11 Recommendations………………………………………………………………………11 Conclusion........

Words: 2763 - Pages: 12

Free Essay

Club It Part 2

...Club IT part 2 Mark Reis Xbis/219 August 18, 2013 Katherine Escobar Club IT part 2 Ruben Keys and Lisa Tejada along with many other business owners understand that information system technologies will let their originations to compete and flourish in the market place. Lisa, Rubin, and a systems consultant have analyzed the current information system status and during this analysis they have identified three areas that need improvement. This prompted Lisa and Ruben made the decision to upgrade their information management systems. The first problem their information system identified was neither Lisa nor Ruben were not up-to-speed with e-commerce. The second problem is that their computers are old and out-dated along with that their Internet connection was the old hard-wired system that plugged directly into the computer. The third problem, they need a better way to keep track of customer orders along with keeping track of inventory. A “Water Fall” method was Lisa and Rubens choice of method to use in their systems analysis (Wiley Higher Education, 2006). Current Information System Lisa and Rubin use their information system to help run their business and in their decision-making process’ (Wiley Higher Education, 2006). Their intranet and using the Internet helps them search for and retrieve needed information quickly. The web site has a login for employees, and they can access their personal information like, how many hours they...

Words: 941 - Pages: 4

Premium Essay

Curiculum Vitae

...RE: APPLICATION FOR INTERNSHIP. I am writing to request for an internship at your esteemed organization as from April to August 2015. I am currently a junior student pursuing bachelor of commerce majoring in finance option at Kenyatta University. I offer three years of academic excellence in commerce, excellent communication skills and demonstrated desire for exceeding expectations. The course has given me a solid foundation in tools, process and methodologies involved in a business environment. It has also enabled me to learn and adapt to challenging concepts quickly. In addition to my strengths, I bring advanced computer skills; expert in ms office suite and leadership skills. These skills have enabled me to work under minimal supervition, focus on achievement and appreciate my job. Your teachings, during your visit to finance society of Kenyatta University, were very educating and knowlegeable.Am now looking for an opportunity to put the skills in all fields to a more practical application in the market. I am impressed by Unilever’s innovations and success and I would very much like to be part of such a winning institution. I will really appreciate it if your accept me to work in your company as an intern.This will enable me fulfill my industrial training requirement and my career objective and also make a valuable addition to your team. Thank you very much for your time and considerations in viewing my application and enclosed curriculum vitae. Looking forward to hear...

Words: 492 - Pages: 2

Premium Essay

Enterprise Resource Planning

...Questions. Multiple Choices: 1. Enterprise resource planning is_______ a) Computer System b) Manufacturing Organization c) Method of effective planning of all the resources in an organization d) None of the above 2. Enterprise resource planning vendors are those people_________ a) Who are experts in administration and management of project b) Who have developed the ERP package c) Who uses the ERP system d) None of the above 3. The objectives of ERP ____________ a) Provide support for all variations best business practices b) Enable implementation of these practices c) Empower the customer to modify the implemented business process d) All of the above 4. Which of the followings not the advantages of ERP________ a) ERP eliminates duplication of work b) Reduce overheads, lead type, cycle time and work in progress c) Customization of the ERP software is limited d) Help to achieve competitive advantage 5. EDI stands for__________________ a) Electronic digital interface b) Electronic data interchange c) Enterprise data interface d) None of these 6. A____________________ tool use to quickly develop quality database design by reusing commonly available data models which are applicable to the enterprises requirements and customizing the details for the application at hand. a) Integrated data model b) Integrated management information system c) Business process re-engineering d) Supply chain management 1 IIBM Institute of Business Management ...

Words: 2912 - Pages: 12

Free Essay

Viewing Business Process Security from Different Presepctives

...Viewing Business-Process Security from Different Perspectives Author(s): Gaby Herrmann and Günther Pernul Source: International Journal of Electronic Commerce, Vol. 3, No. 3, Developing the Business Components of the Digital Economy (Spring, 1999), pp. 89-103 Published by: M.E. Sharpe, Inc. Stable URL: http://www.jstor.org/stable/27750897 . Accessed: 31/01/2015 04:15 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp . Viewing Business-Process Security fromDifferent Perspectives Gaby Herrmann and G?nther Pernul are crucial success factors inelectronic commerce. ABSTRACT: Security and integrity a framework that includes the securityand integrity This paper offers requirementsof business processes in businessprocess execution. An themodeling and refinement securityand integrity of requirements. High-level security of requirements business processes are viewed fromfivedifferent perspectives. The tasks involved in the different perspectives are described, and the modeling of security re quirements isoutlined by focusingon the example of the legal binding of contracts. KEYWORDS binding, important part of the framework is AND PHRASES: Business process, business-process reengineering, legal semantics. security of markets in recent years, many enterprises Because of the globalization have located their offices and production sites all...

Words: 6003 - Pages: 25

Premium Essay

The Role of E Commerce

...and Robert M. O’Keefe 1 1 Department of Information Systems and Computing, Brunel University, Uxbridge, UK 2 Institute for Information Systems, University of Munster, Germany Abstract Early research in electronic markets seemed to suggest that E -Commerce transactions would result in decreased costs for buyers and sellers alike, and would therefore ultimately lead to the elimination of intermediaries from electronic value chains. However, a careful analysis of the structure and functions of electronic marketplaces reveals a different picture. Intermediaries provide many value-adding functions that cannot be easily substituted or ‘internalised’ through direct supplier-buyer dealings, and hence mediating parties may continue to play a significant role even in the E-Commerce world. In this paper we provide an analysis of the potential roles of intermediaries in electronic markets and we articulate a number of hypotheses for the future of intermediation in such markets. Three main scenarios are discussed: the disintermediation scenario where market dynamics will favour direct buyer-seller transactions, the reintermediation scenario where traditional intermediaries will be forced to differentiate themselves and re emerge in the electronic marketplace, and the cybermediation scenario where wholly new markets for intermediaries will be created. The analysis suggests that the likelihood of each scenario dominating a given market is primarily dependent on the exact functions...

Words: 6810 - Pages: 28

Premium Essay

Managment of Account Receivable

...Management of Accounts Receivable December 1997 Contents Preface Introduction The Accounts Receivable Process Re-Engineering Accounts Receivable Risk Management Use of Advanced Technology Debt Collection Processes Performance Measurement Appendix Preface This guide accompanies the Auditor-General’s Audit Report No. 29, Management of Accounts Receivable in the Commonwealth. It is intended to provide an overview of the current trends and "better practice" approaches that are being adopted by organisations in managing accounts receivable. In the commercial world the way in which organisations manage their accounts receivable has significant implications for the financial health of those organisations. This creates an imperative to ensure the management of receivables is both efficient and effective. The practices used in common business processes such as accounts receivable management have universal application and are not industry specific. In this regard there are lessons to be learned by others from the practices followed by organisations for whom accounts receivable is a core business process. The better practices discussed in this guide are therefore recommended for consideration by Commonwealth government agencies. Not all of the practices outlined in this guide will suit each agency’s circumstances, however, it is considered that most agencies, which derive revenue on sale of goods and services on credit terms, will benefit from benchmarking their current practices...

Words: 4242 - Pages: 17

Premium Essay

Amazon

...Subject: E-logistics and International Supply Chain Management. Topic: How to use internet to support logistic activities? Abstract: Now a day’s, many companies are adopting the usage of internet technologies to improve the effectiveness of the logistic activities. This paper aims to investigate the use of internet technologies at Amazon and how it manages its logistic activities. Keywords: Internet, logistic activities, E-logistics, E-commerce. Introduction: Internet connects entities to global market place. It is a computer to computer communication. The use of internet affects the success of the companies and help in developing e-logistic activities. It has a major impact on information exchange of the companies has it acts as a communication channel with which business transactions are made fast. The growing application of Internet-based systems like Enterprise Resource Planning (e-ERP); Maintenance, Repair and Operations (e-MRO); Materials Requirements Planning (e-MRP); Electronic Data Interchange (e-EDI); e-procurement and e-auctions in various parts of the world has shown that the Internet can help to provide efficiency in supply chain activities to improve the competitiveness of the companies involved (Bendoly and Schoenherr (2005); Davila et al.,(2003); Hartley et al.,(2004); Kheng and Al-Hawamdeh (2002); Muffatto and Payaro (2004); Paterson (2005); Presutti (2003); Puschmann and Alt (2005); Singer (2003); and Yang et al.,(2007)). Amazon.com: Amazon was...

Words: 1092 - Pages: 5

Premium Essay

Breaking Free from Product Life Cycle

...used by tangible packaged goods. The stealth positioning method can be used on technology based products. 3. Reverse positioning occurs when a service providing firm drastically eliminates the number of features typically offered the customer in the industry. While reducing the number of options given to the customer, the firm introduces new high quality features that serve a niche market. Breakaway positioning involves the re-branding of a product into a new marketplace. No features of the product are eliminated nor introduced. The product is simply marketed toward a new audience. Stealth positioning is a complex strategy of introducing new products to consumers in a non-straightforward manner. In short, consumers buy the product believing it to be used for one purpose, when in practical function, it is used for other purposes. Part B. Implications for Application 1. Commerce Bank and JetBlue are two models of reverse positioning. Instead of competing with other banks by offering high interest and other account opening incentives for opening, Commerce Bank offers a very limited number of account types, but many more convenient benefits to the customer including notably the extended late night and weekend hours and coin counting...

Words: 456 - Pages: 2

Premium Essay

Problems Faced by E-Commerce Firms in India

...PROBLEMS FACED BY E-COMMERCE FIRMS IN INDIA Electronic commerce or ecommerce is a term for any type of business, or commercial transaction, that involves the transfer of information across the Internet. It covers a range of different types of businesses, from consumer based retail sites, through auction or music sites, to business exchanges trading goods and services between corporations. It is currently one of the most important aspects of the Internet to emerge. Ecommerce allows consumers to electronically exchange goods and services with no barriers of time or distance. Electronic commerce has expanded rapidly over the past five years and is predicted to continue at this rate, or even accelerate. In the near future the boundaries between "conventional" and "electronic" commerce will become increasingly blurred as more and more businesses move sections of their operations onto the Internet How does e-commerce work? Because there are hundreds of different products and services for consumers and the multitude of different ways these products and services can be delivered, e-commerce by its nature is varied in the way it works. In its most basic form e-commerce works as follows: Consumers choose a product or service on a website. Consumers pay electronically on the website (online credit card transactions) or using a third party payment provider such as PayPal The business owner or merchant receives the order and payment and the order is fulfilled (delivered by post...

Words: 2122 - Pages: 9

Premium Essay

Clicks with Click2Procure

...nglom erate is a leading m anufact urer of automati on a nd control systems, co m m unications, li ghting, m edical , se m i-co n du ctors, power, and tran spo rtation produ cts and services. Click2procure is u sed today b y 35, 000 Siemens em ployees, of wh ich 6,000 ar e in volved with strategic purch asing: Siemens purchases over 45 billion (e uro) a y ear in direct an d in dire ct goods. Curre n tly, Click2proc ure has ab out 9,00 0 registered su ppliers . Su ppliers can eithe r re gis te r free of charge for a "Basic Registration" or pay a sub scrip tion fee of 3,000 (eu ro ) a y ear for "Advan ced Bus iness Service," which entitles the supplier to additional marketing sup port, such as the co n tact informatio n News l1ndUpdat es: Welco me to c/lck2procure 's ne ..... software upgrade . This releas e indudes a more intuitive la yout and new features . Our online traini o has n also been upgrade d to help j ou becom e familiar with our ne w c1fc:k2procure . f or the latest news about dick2procu re please d ick: c!icl<2 QrtXlj r¢ = in-the TER 1 2 828 E- c o m m e r c e for rele van t Siemens customers an d an a nalysis of the suppli er's i n d ivid u a l competitive po sition . As of .Ianuary 2007, Click2p rocure h as handled over 4 billio n (euro) in purch asin g volume...

Words: 2357 - Pages: 10

Premium Essay

E-Commerce

...Introduction of e-commerce Electronic commerce can be defined as sales or purchase of goods and services or any commercial transaction through electronic systems such as internet, telephone and e-mail. There are several forms of e-commerce, including: Business-to-Business (B2B) is the electronic transactions between enterprises for conducting business. Business-to-Consumer (B2C) is the business sell of products or services directly to customers, such as Gmarket, Alibaba etc. Consumer-to-consumer (C2C) is the business conduct between consumers. This usually is a form of auction or forum site, such as E-bay. Consumers post what they intend to sell on the webpage, other consumers can access and bid for the item. Customer-to-business (C2B) is a form of business offered by consumer to business to exchange for money. For example, designers sell a design to a multimedia manufacturing company online. One of the major subset of E-commerce is mobile commerce. It is the sale and purchase of goods or services or conducts any business activities through internet connection using handy devices such as mobile phones and tablets. Mobile commerce is getting popular and can be defined as the next generation of e-commerce. Businesses conduct e-commerce to stay competitive. Some of the businesses are successful with the use of e-commerce, such as online shop Amazon and DBS Bank. Amazon provides a massive range of products. They are focus on their selection, price and convenience. Customers can...

Words: 3739 - Pages: 15

Free Essay

Cybercrime

...Nowadays, E-commerce is a fundamental part of marketing activity. Most of e-commerce proceeds on the websites of publicly traded companies. A challenge that e-business face is that vulnerably experience e-crime, also known as cybercrime. As Internet technology continues to rise throughout the world, the threat of cyber crime also grows. While some of these crimes are relatively harmless and commonplace, others are very serious and carry with them felony charges. Various types of Cyber crimes that can be encountered over the net are spam, fraud, cyber terrorism and so on. Whether for individuals, companies or governments, cybercrime has become a big problem. Spam is defined as unsolicited junk e-mail. It is used by chain mailers, forger and some others who selling dubious products.  “The Federal Trade Commission (FTC) has identified 12 types of scams that are most likely to arrive in consumers’ e-mail boxes. The “dirty dozen” are: business opportunities, bulk e-mail, work at home schemes, health and diet scams, effortless income, free goods, investment opportunities, cable descrambler kits, guaranteed loans or credit on easy terms, credit repair, and vacation prize promotions”(Phommalinh). Meanwhile, the most common type of cybercrimes occurred in spam is virus which spread by e-mails. When one receive an e-mail with a virus, the default settings of your computer do not have any action required to resist virus. At that point, virus can follow instructions and does anything whatever...

Words: 1173 - Pages: 5