Tuesday, May 5, 2020

Business Environmental Analysis Samples †MyAssignmenthelp.com

Question: Discuss about the Business Environmental Analysis. Answer: Introduction Technology plays a great role in conducting the day to day operations of the business. Activities of the organization are conducted electronically because of the internet access in every company. Computers are present in every organization to complete the specific tasks. Technology at the workplace has brought a drastic change to complete the work. The technology like computers removed the workplace boundaries and also helps to take correct decisions at your workplace. So, in this report the emphasis will be given on the use of computer in the modern workplace. At the modern workplace technology is used so that the task can be completed fast and the organization can easily attain goals and objectives. Modern workplace The computer system is used to simplify the work and also to complete the work on time. Latest technology should be used by every organization, so that it can be easy for the organization to attain the goals and objectives. A computer gives knowledge to the workers about the tasks and operations that should be performed in a proper way. Computer is an important technology that should be taken into consideration by the organization to attain the success in the market (Raspotnig and Opdahl, 2013). Without the use of computer or laptop it is very difficult for an organization to maintain the records. Computer is very essential to record the transactions and also to keep a proper record of the employees who are conducting the activities in the business. Computer is defined as an electronic machine that helps to store, organize and search the information. The important components of computer are hardware and software. The computer system has various modern components like primary storage, input devices, output devices and communication devices (Arachchilage and Love, 2014). Hardware and Software components The hardware components of the computer system are: CPU: It is considered as a hardware component of the computer system in which the manipulation of the symbols are done. The full form of CPU is Central processing unit. It stores the data and the instructions of programs temporarily before or after processing. It is considered as a brain of the computer. CPU is considered as an electronic circuit that carries the instructions which are given by the computer. CPU executes instructions which are given by a computer program and also it take into consideration basic arithmetic and logical operations. It is analyzed that the speed and efficiency of the computer is dependent on the CPU. The basic function of CPU is that it controls all the parts of machines and sends time signals. It helps to transfer the data between the various devices and decodes the instructions. Also it executes programs stored in the memory and performs communication among the Devices (Gartshore and Blake, 2014). Computer Keyboard: It contains many mechanical switches which are called keys. The keyboard can be wireless and also connected with wires. Wireless keyboard are connected via Bluetooth. It is an input device which helps to enter the letters, numbers and also the symbols into a computer. It is known as one of the common technique which is used for writing. Mouse: It is considered as a pointing device that has two dimensional motions that are related with the surface. It helps to control the graphical user interface. Mouse is designed in such a manner in which two buttons and a scroll wheel is seen (Grkaynak, Yilmaz and Taskiran, 2014). The software components of the computer system are: Operating system software: It helps to load all the programs at the time when the computer starts. It uses the characteristics of a computer without having the knowledge of the hardware information. The operating system helps the computer to have the knowledge of bits and bytes. All the functions of a computer system can be conducted by using the operating system software. Without this software it will be difficult to operate the activities in an effective manner (Lee, Connor and Bourgoin, 2014). Application software: This software can be used when the operating system is loaded in a proper way. It contains many programs like word processing programs, spreadsheets and databases. Microsoft word is considered as a part of word processing applications (Larson, Menagarishvili, Rubinoff, Smith and Waters, 2016). Advantages and threats of computer in the workplace There are various benefits and advantages that are connected with the computer. Computer helps to record the transactions in an accurate manner. Computer is a technology that simplifies the work of an individual. It reduces the workload of the employees or the workers who are working in the company. There are various software that are used with the help of the computer, in which the proper record of the files, documents are kept. The information of the businesses is organized in a very proper manner (Galegher, Kraut and Egido, 2014). The large amount of data can be stored in a convenient and inexpensive way. The computer has the ability to organize the organization files in an efficient manner, so that there can be enhancement in the time management and also in the level of productivity. For example: It is very easy for the company to make the training material. The operations of the business can be completed in a speedy way and also it help to collect the consumer feedback, ordering the raw material. It helps the organization to save time and enhances the better quality outcomes. The high sales and profits can be generated by using the company website. There are many businesses that conduct their operations online and allow the customers to shop for their products. These all activities can be taken into consideration by using the latest technologies like computers (De Cocker, De Bourdeaudhuij, Cardon and Vandelanotte, 2016). The main threat that is emerged by the use of computers in the workplace is concerned with the loss of confidential information. It is seen that confidential information are leaked from the computer. The company or the manager saves information in the computer and when it is leaked it is a threat for the organization. Loss of information can also reduce the profitability of the organization (Nelson,Phillips and Steuart, 2014). Physical Danger Ergonomics is considered as a scientific study of a person and also their relation with the working environment. The individual in the organization suffers pain at the time of conducting the operations of the organization. There are many factors that are concerned with the ergonomically related problems. The person who sits for a long time in front of computer faces various different problems. If an individual do not work or conduct its operations with a good posture, then it is very difficult to survive in an organization. Good posture helps the individual to work in effective way. If the person or an individual gives excessive force on the body parts, then it can result in excessive pain (Eijckelhof, et al., 2013). For example: Poor posture can be determined if the keyboard and the monitor is not kept in a straight line from the seat. The awkward position at the workplace can lead to severe stress in the neck, wrist and shoulders. So, to conduct the operations or the activity it is very essential for an individual to carry a good posture. It is seen that if an individual conducts its operation in a same position for a long time then it can enhance the possibility of injury. The organization should give comfortable seats, so that the employees can sit in a good posture and can conduct their task effectively (Chory, Vela and Avtgis, 2016). It is very essential for an individual to have a proper knowledge of the positions that can minimize the risk of injury. It is seen that there are many individuals who faces the severe problem of neck pain. It is due to the wrong position in which the individual is working. It is very important for an individual to be aware about the risk factors that can result in musculoskeletal problems. If an individual is aware then it can be easy to avoid the problem at the time of using computer (Hoepman, 2014). Data protection legislation Data protection legislation requires every organization to take into consideration the personal information so that the essential principles concerned with privacy and security can be implemented. It is very essential to make sure that the information is accurate and can be handled according to data protection rights of an individual. It is the duty of information commissioner officer to take into consideration the rights that assures about the information of an individual. The principles that are related with privacy and disclosure should be used to handle the personal information of an individual. Conclusion By taking into consideration this report, it is concluded that computers are the essential technology that should be adopted by every organization. It is very beneficial and also helps the organization to maintain the records in efficient way. In the recent scenario, it is analyzed that without computer or laptop not even a small business can survive. Computer is an essential requirement for every organization to sustain in the competitive environment. References Arachchilage, N.A.G. and Love, S., 2014. Security awareness of computer users: A phishing threat avoidance perspective.Computers in Human Behavior,38, pp.304-312. Chory, R.M., Vela, L.E. and Avtgis, T.A., 2016. Organizational surveillance of computer-mediated workplace communication: Employee privacy concerns and responses.Employee Responsibilities and Rights Journal,28(1), pp.23-43. De Cocker, K., De Bourdeaudhuij, I., Cardon, G. and Vandelanotte, C., 2016. The effectiveness of a web-based computer-tailored intervention on workplace sitting: a randomized controlled trial.Journal of medical Internet research,18(5). Eijckelhof, B.H.W., Huysmans, M.A., Garza, J.B., Blatter, B.M., Van Dien, J.H., Dennerlein, J.T. and Van Der Beek, A.J., 2013. The effects of workplace stressors on muscle activity in the neck-shoulder and forearm muscles during computer work: A systematic review and meta-analysis.European Journal of Applied Physiology,113(12), pp.2897-2912. Galegher, J., Kraut, R.E. and Egido, C., 2014.Intellectual teamwork: Social and technological foundations of cooperative work. Psychology Press. Gartshore, E. and Blake, H., 2014. Development and evaluation of a computer based e-learning tool to enhance knowledge of workplace wellness in a healthcare setting. Grkaynak, G., Yilmaz, I. and Taskiran, N.P., 2014. Protecting the communication: Data protection and security measures under telecommunications regulations in the digital age.Computer law security review,30(2), pp.179-189. Hoepman, J.H., 2014, June. Privacy design strategies. InIFIP International Information Security Conference(pp. 446-459). Springer, Berlin, Heidelberg. Larson, B., Menagarishvili, O., Rubinoff, A., Smith, J. and Waters, R., 2016. Technical Communication in the Workplace: Computer Science, Business, and Law. Lee, C., Connor, T. and Bourgoin, D., 2014. Human Factor Approach to Computer Documentation Design, Implemenatation, and Workplace Ergonomics.Journal of PeriAnesthesia Nursing,29(5), p.e12. Nelson, B., Phillips, A. and Steuart, C., 2014.Guide to computer forensics and investigations. Cengage Learning. Raspotnig, C. and Opdahl, A., 2013. Comparing risk identification techniques for safety and security requirements.Journal of Systems and Software,86(4), pp.1124-1151.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.