Describe some of the computer capabilities and how businesses can utilize them.
What will be an ideal response?
Computer technology is rapidly advancing so the following is simply an example of some of the capabilities and applications of computers for business. Businesses use word processing programs to develop reports, brochures, and presentations involving either words or graphics. The range of applications of word processing is staggering. Computer software that acts as a general electronic accounting ledger, known as spreadsheets, can simplify any mathematical computation and record keeping. Computers can be used for applications such as payroll, inventory control, scheduling, order processing, and are currently also being used to coordinate real time activities of employees through collaboration programs. Computers can aid in the design and manufacturing of a product. They can be used to simplify and produce efficient supply chain management, as well as customer relationship management. As stated earlier, the applications of ever-changing computer technology are staggering and almost boundless.
You might also like to view...
Abbot Laboratories warehouses and delivers 3M's medical and surgical products to hospitals across the United States. The best description of this form of alliance would be a(n) ________
A) product alliance B) logistics alliance C) pricing collaboration D) indirect collaboration E) promotional alliance
Crescent Corporation's interest revenue for 2013 was $13,100 . Accrued interest receivable on December 31 . 2013 . was $2,275 and $1,875 on December 31 . 2012 . The cash received for interest during 2013 was
a. $1,350. b. $10,825. c. $12,700. d. $13,100.
If fixed costs decrease, but variable cost and price remain the same, the break-even point:
A) decreases. B) increases. C) remains the same. D) may increase or decrease depending on sales.
A bank stores depositor data electronically. The data include financial account values, social security numbers, and other information
An outside party was able to gain access to the bank's customer data through unauthorized access to the bank's computer system. The outside party was able to steal money from the accounts and to sell customer data, including social security numbers, to others. This scenario illustrates A) terrorism risk. B) climate change risk. C) speculative financial risk. D) cyber-liability risk.