SlideShare a Scribd company logo
The effects of the use of on-line services on employment  Mr. Powell
General Staff – unemployment   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical staff opportunities   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

More from MISY

Uses of dbms
Uses of dbmsUses of dbms
Uses of dbms
MISY
 
3. use of ict in time management
3. use of ict in time management3. use of ict in time management
3. use of ict in time management
MISY
 
Ict in time management ca
Ict in time management caIct in time management ca
Ict in time management ca
MISY
 
Ict in publishing ca
Ict in publishing caIct in publishing ca
Ict in publishing ca
MISY
 
Ict in teaching learning ca
Ict in teaching  learning caIct in teaching  learning ca
Ict in teaching learning ca
MISY
 
Ict in advertising ca
Ict in advertising caIct in advertising ca
Ict in advertising ca
MISY
 
Use of ict in advertising
Use of ict in advertisingUse of ict in advertising
Use of ict in advertising
MISY
 
2b working practices
2b working practices2b working practices
2b working practices
MISY
 
Working practices ca
Working practices caWorking practices ca
Working practices ca
MISY
 
Process control ca
Process control caProcess control ca
Process control ca
MISY
 
Intro to control ca
Intro to control caIntro to control ca
Intro to control ca
MISY
 
2a contol systems
2a contol systems2a contol systems
2a contol systems
MISY
 
Robots and cars ca
Robots and cars caRobots and cars ca
Robots and cars ca
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
3f - Health & Safety
3f - Health & Safety3f - Health & Safety
3f - Health & Safety
MISY
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
MISY
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3d - Working Practices
3d - Working Practices3d - Working Practices
3d - Working Practices
MISY
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
MISY
 

More from MISY (20)

Uses of dbms
Uses of dbmsUses of dbms
Uses of dbms
 
3. use of ict in time management
3. use of ict in time management3. use of ict in time management
3. use of ict in time management
 
Ict in time management ca
Ict in time management caIct in time management ca
Ict in time management ca
 
Ict in publishing ca
Ict in publishing caIct in publishing ca
Ict in publishing ca
 
Ict in teaching learning ca
Ict in teaching  learning caIct in teaching  learning ca
Ict in teaching learning ca
 
Ict in advertising ca
Ict in advertising caIct in advertising ca
Ict in advertising ca
 
Use of ict in advertising
Use of ict in advertisingUse of ict in advertising
Use of ict in advertising
 
2b working practices
2b working practices2b working practices
2b working practices
 
Working practices ca
Working practices caWorking practices ca
Working practices ca
 
Process control ca
Process control caProcess control ca
Process control ca
 
Intro to control ca
Intro to control caIntro to control ca
Intro to control ca
 
2a contol systems
2a contol systems2a contol systems
2a contol systems
 
Robots and cars ca
Robots and cars caRobots and cars ca
Robots and cars ca
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
3f - Health & Safety
3f - Health & Safety3f - Health & Safety
3f - Health & Safety
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3d - Working Practices
3d - Working Practices3d - Working Practices
3d - Working Practices
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 

Recently uploaded

Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 

Recently uploaded (20)

Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 

3b - The Effects Of The Use Of On Line Services

  • 1. The effects of the use of on-line services on employment Mr. Powell
  • 2.
  • 3.
  • 4.
  • 5.

Editor's Notes

  1. Unemployment has occurred as many jobs involving car workers have been replaced by robots. Many clerical duties involved with applications such as payroll are now performed by computers. Car park attendants have been replaced by microprocessor operated machines. Many shop workers and bank workers have lost their jobs because of on-line services. Many jobs have been lost because: ICT can make someone more efficient at their job, a company can therefore employ less people to complete that job.
  2.   For example: In a factory , skilled technicians and machinists have been replaced by computer-controlled robots which can work faster, for longer and more consistently. In a factory , many dirty and dangerous monitoring jobs have been replaced by data-logging equipment using sensors. In a factory , many quality control jobs involved routine sampling and were very boring, many have now been replaced by automatic machines. In a warehouse , many loading and sorting jobs have been replaced by a few staff running a computer-controlled warehouse.
  3. In an office , many typists can be replaced by one person using a word processor. This is a lot more efficient, for example documents can be saved and reloaded for editing rather than being re-typed and mail merging can be used to create apparently custom-typed documents. In an office , many payroll clerks using calculators and paper-based records can be replaced by one person using a spreadsheet to calculate a company's payroll. In an office , many clerks updating paper-based files in filing cabinets can be replaced by one person using a database. In a telephone exchange , operators have been replaced by computer systems that make the phone connections automatically. In a car park, the car park attendant can be replaced by automatic ticket machines and barriers using control technology. In a shop , online shopping means sales staff and cashiers etc. are replaced by staff selecting and sending out goods from a warehouse etc. In a shop , stock control staff can be replaced by automated with bar-code readers recording items entering the building and being sold. In a bank , ATM machines mean less cashiers are needed inside the bank to deal with customers. Working with ICT requires new skills and many workers found it difficult to retrain because they found the new skills to hard to learn. Converting a business to make use of ICT can be very expensive and many small companies could not afford to make the change and could not compete against those that had.
  4. The use of ICT obviously makes more jobs available for technically qualified people such as computer programmers, systems analysts, computer technicians and people who can perform robot maintenance. In addition, call centres have created fresh opportunities particularly for women in the developed countries and for men and women in developing countries. Many jobs have been created because: Computerisation has created many new jobs or radically changed existing jobs. For example: Engineers are needed to build the new computerised machines. Programmers are needed to write the new programs that the computers run. Systems analysts are needed to design the new computerised systems. Skilled workers are needed to operate the new computerised machinery. Skilled workers are needed to use new software such as graphics packages, web-design software and CAD programs. More staff may be needed because of the increased business generated by improved efficiency.