Control techniques chpt 19
description
Transcript of Control techniques chpt 19
![Page 1: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/1.jpg)
SEWP ZC 241: SEWP ZC 241: PRINCIPLES OF PRINCIPLES OF MANAGEMENTMANAGEMENT
CONTROL CONTROL TECHNIQUES & TECHNIQUES & INFORMATION INFORMATION TECHNOLOGYTECHNOLOGY
![Page 2: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/2.jpg)
After studying this chapter, you After studying this chapter, you should understand::should understand::
1.The nature of budgeting and types of budgets.
2. Zero-base budgeting
3. Nonbudgetary control devices
4. The nature and applications of information technology
![Page 3: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/3.jpg)
After studying this chapter, you After studying this chapter, you should understand:should understand:5. The importance of computers in
handling information.
6. The challenges created by the new information technology, the Internet, other “nets,” groupware, and information security.
7.Developments in e-commerce, e-business, and m-commerce.
![Page 4: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/4.jpg)
BUDGET AS A CONTROL BUDGET AS A CONTROL DEVICEDEVICE
• Budget: Formulation of plans for a given time in NUMERICAL terms.
• In Financial termsRevenue Buget, Expense Budget,
Capital Budget• In Non Financial Terms
Materials, sales volume, Direct Labour Hours
![Page 5: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/5.jpg)
PITFALLS OF BUDGET AS A PITFALLS OF BUDGET AS A CONTROL DEVICECONTROL DEVICE
• Controls wrong things.
• Measures inputs, but ignores outputs like product quality, customer satisfaction.
![Page 6: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/6.jpg)
TIME EVENT NETWORK TIME EVENT NETWORK ANALYSISANALYSIS
• Shows time relationship between events.
• Total program goals regarded as series of inter related supporting plans.
• Picks out more critical
elements of plan.
![Page 7: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/7.jpg)
TIME EVENT NETWORK TIME EVENT NETWORK ANALYSISANALYSIS
• Breaks down project into controllable pieces.
• Milestones as identifiable segments.
![Page 8: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/8.jpg)
GANTT CHARTSGANTT CHARTS
![Page 9: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/9.jpg)
PERT CHARTSPERT CHARTS
![Page 10: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/10.jpg)
Information Technology Information Technology • Data are the raw facts that may
not be very useful until they become information, that is, after they are processed and become meaningful and understandable by the receiver
![Page 11: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/11.jpg)
Information Technology Information Technology • Data are the raw facts that may
not be very useful until they become information, that is, after they are processed and become meaningful and understandable by the receiver
![Page 12: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/12.jpg)
This Is This Is DATADATA……..……..
![Page 13: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/13.jpg)
Information Technology Information Technology
![Page 14: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/14.jpg)
This Is This Is
INFORMATIONINFORMATION……..……..
![Page 15: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/15.jpg)
Information Technology Information Technology
![Page 16: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/16.jpg)
Information Technology Information Technology
![Page 17: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/17.jpg)
Information Technology Information Technology
![Page 18: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/18.jpg)
Information Technology Information Technology
The information system is defined as a formal system of gathering, Processingdispersing information internal and external to the enterprise in a timely, effective, and efficient
manner
![Page 19: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/19.jpg)
Challenges Created by Challenges Created by Information Technology Information Technology
• Resistance to Computer Use
• Speech Recognition Devices
• Telecommuting Telecommuting means that a
person can work at a computer terminal at home instead of commuting to work
• Computer Networks
![Page 20: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/20.jpg)
Challenges Created by Challenges Created by Information Technology Information Technology
• Internet
• Other Types of Networks intranet extranet
• Groupware Groupware makes it possible
to collaborate with others over long distances at the same time
• Information Security
![Page 21: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/21.jpg)
The Digital Economy, The Digital Economy, E-commerce, and M-commerceE-commerce, and M-commerce
The Emerging Digital Economy
Four Kinds of Transactions
Business to Consumers (B2C).
Consumer to Business (C2B).
Consumer to Consumer (C2C).
Business to Business (B2B).
M-Commerce and Wireless Communication
![Page 22: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/22.jpg)
B2CB2C
![Page 23: Control techniques chpt 19](https://reader036.fdocuments.us/reader036/viewer/2022081414/54bfb9774a7959ab628b45ba/html5/thumbnails/23.jpg)
C2CC2C