application and implication

Upload: latoya-anderson

Post on 07-Aug-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/20/2019 Application and Implication

    1/53

    APPLICATION AND IMPLICATION

    A. Internet and communication Technology

    Use terms associated with data communication andnetworks

    Data Communications and Networks

    We have been communicating using various methods for centuries!

    Face to face conversationUsing two tins tied to astring

    Posting mail via a postalservice

    Modern Communication

    Tablets

    Smart Phones

    Many of us are unaware of the movement of data (Data communication) and connection of manycomputers that allow us to communicate quickly, at any time, and anywhere.

    Let's take a peek into the world of Data Communication.

    First! Just as we communicate (talk, interact, share, touch...) in pairs or among several other people, data communication involves the movement or transmission of data or information between two computers, or among several computers.

  • 8/20/2019 Application and Implication

    2/53

    Now when we have many computers connected together to share data, it is called a network .Why do we want to connect computers? To share data, to send and receive data faster, and toshare peripherals (like printers).

    Local Area Network (LAN) .

    If we link computers together in a small location like a school or a businessor even a region, then this type of network is called a local area network(LAN) . Computers in a LAN can share a printer, if they are all in the same

    LAN.

    Wide Area Network (WAN)

    The office buildings in a WAN may be in different countries. For example, themain branch or headquarters may be located in the USA, while anotherbranch may a building in Dominica, and a third branch may be in a buildingSingapore. The workers in the three buildings will therefore use a WAN tocollaborate with each other. Note that the Internet can also be considered asa WAN.

    A WAN cannot share a printer, so a computer in one country cannot use aprinter in another country.

    Also, a WAN requires a special-purpose computer, whose only purpose is tosend and receive data from the Internet.

    Watch this video to understand the difference between a LAN and a WideArea Network (WAN) Metropolitan Area Network (MAN)

    A Metropolitan Area Network (MAN) links two

    or more individual Local Area Networks (LANS). It is therefore smaller thana WAN but larger than a LAN.

    This is video explains the LAN, WAN and the Metropolitan Area Network(MAN)

  • 8/20/2019 Application and Implication

    3/53

    Network Topologies

    Networks can be connected with or without the use of wires. How they are connected is calleda topology .

    Name ofTopology Advantages and Disadvantages

    Bus Topology

    Advantage

    It is best suited for small networks.

    Disadvantage

    Should only be used for a limited number of computers andperipherals. Its performance degrades as more computers areadded.

    Star topology

    Advantage

    This topology isolates each computers and/or peripherals in thenetwork.

    Disadvantage

    Operations depend on how well the central node functions.Therefore if the central device fails, then the entire network fails.

    Ring topology

    Advantage

    Any data transmitted between two devices must pass through allintermediate nodes. A central device (server) is not necessary forthis topology.

  • 8/20/2019 Application and Implication

    4/53

    Disadvantage

    If a single node in the network fails, then this can cause the entirenetwork to fail.

    How the Internet Works

    The Internet is really a Wide Area Network (WAN). Many text books will describe it as anetwork or networks. So it is able to connect all computers all over the world. Let's take a peekinto what some of the networks in rooms, buildings, companies and countries who are connectedto the Internet could possibly involve:

    Cable/Wired Media

    Three common types of cabled or wired media are used of the data transmission. The type ofwired media used depends on distance and type of network. The three types of wired media thatwill be discussed are explained below:

    Coaxial Cable Twisted Pair Cable Fiber Optic Cable

    This cable issomewhatresistant toelectromagneticinterference

    This cable consists of pairs oftwisted copper wires,enclosed in an outer sheath

    Uses electrical signals totransmit data. It uses

    light to moves in onedirection. Two- waycommunication takesplace when a secondconnection is madebetween the two devices

    It is expensive Most widely used Less Most Expensive, very

  • 8/20/2019 Application and Implication

    5/53

    expensive compared tocoaxial cable and fiber optics

    hard to install, capable ofextremely high speed

    Can be used overlonger distanceson a shared linethan twisted pair

    Can support higherfrequencies and data rates

    No energy radiation;little interference withother devices; securityfrom eavesdropping

    Most common useis in cable TV andbroadbandapplications

    Most common twisted paircable is used in LANS andtelephone connections

    Increasingly common intelephone networks. Maybe able to handle imageand video in addition tovoice and data

  • 8/20/2019 Application and Implication

    6/53

    Wireless network technology

    Bluetooth

    Bluetooth is a type of radio communication and networking protocol combined that wasdeveloped so that devices close to each other could exchange data, without having a physicalconnection. Having a wall between them does not affect the connectivity.

    Advantages of Bluetooth:

    It only needs a tiny amount of radio power to work. This means it is ideal for batteryoperated devices such as mobile phones.

    It is completely automatic - once it is active, every Bluetooth enabled device senses the presence of another device within range. They can do this because they share a 'network protocol' that allows them to share data.

    http://csecitsurepasses.weebly.com/uploads/2/5/8/0/25809793/6840894_orig.jpg?1394945519

  • 8/20/2019 Application and Implication

    7/53

    WIFI

    Wi-Fi is a communication technology that uses radio waves in order to connect to a local areanetwork. So, laptops and smart phones can connect to Internet when they are not close to cablesto connectivity.

    Since Wi-Fi based on radio waves it is affected between devices. For example, at home the basefor the Wi-Fi might be downstairs and so the signal upstairs may be very weak.

    Bandwidth (broadband, narrowband, voice band)

    The most important question of communication channels is "How much digital data can it carry".Remember that the smallest form of digital data is the BIT and time interval to send these bits isin Seconds

    What is the maximum amount of digital data that can travel along a communications channel in agiven time?

    This answer is found in its " BANDWIDTH ".

    Digital data can travel very quickly or really slow over a communications channel. That is, the bandwidth varies

  • 8/20/2019 Application and Implication

    8/53

    Communication Modes:

    Direction that data travels in:Simplex

    We can talk to each other but only one at atime. One after the other.

    FULL DUPLEX

    I talk and you listen

    Digital data travels in one direction only.

    Full duplex. We can both talk to each other atthe same time.

    Digital data travels in both directions at thesame time.

  • 8/20/2019 Application and Implication

    9/53

    DISTINGUISH BETWEEN INTRANET, EXTRANETAND INTERNET

    The Internet, an extranet and an intranet are different based on:

    Who is allowed access from OUTSIDE of the company's network Who is allowed access WITHIN the company's network The size of the network

    The Internet

    Remember that the Internet is a 'network of networks', so it includes a very large maze of

    networks. The Internet can be accessed by the public (everyone, including you!).

    Your CXC syllabus (page 51) states that:

    'The Internet is the largest computer network system in the world. It consists of many smallernetworks connected together by a global public network. The Internet is often called theinformation superhighway or cyberspace.'

    The are very few restrictions on users who can access to the Internet, so there can be accessamong many organizations and users throughout the world.

    Just to make sure, you can watch the following video!

    Intranets

    An intranet is a private network that is only available or accessible to select users within aspecific group. So, an intranet restricts access to only employees within a company or business.

    Examples:

    A school may have an intranet so that students and teachers and office staff andadministrative staff can work and share files and peripherals within the schoolenvironment. Once they are not logged in at school, they cannot access the intranet.

    A company's employees can access the company's intranet to do their work, share filesand peripherals. If you are not an employee, then no access!

    An intranet is NOT like the Internet because an intranet restricts public access to that network.The intranet (network) is limited to that organization.

  • 8/20/2019 Application and Implication

    10/53

    Extranets

    An extranet takes some aspects of the Internet and an intranet.

    An extranet allows users who are NOT members of the company or business to restricted orlimited access their network.

    For example,:

    Suppliers can have specifed access to the company's network. That is, they can onlyaccess the system that may tell them about their supplies to that company. They cannothowever, access other areas on the network.

    Customers can have limited and restricted access to a company's network to say, placeorders online or check the status of their order.

    An extranet is NOT like the Internet, because it restricts or limits outside users from full accessto a company's network.

    An extranet is NOT like an intranet because an extranet gives access to specific users who arenot employees of the company or business.

    The diagram below illustrates the differences among the Internet, intranet and extranet:

  • 8/20/2019 Application and Implication

    11/53

    TERMS ASSOCIATED WITH THE INTERNET

    Electronic Commerce

    Electronic commerce , commonly known as e-commerce or eCommerce , is the buying andselling of products or services using electronic systems such as the Internet.

    For ecommerce to work you need:

    Buyers - people with money who want to purchase a product or service. Sellers - people who offer goods and services for sale. Sellers can be retailers who sell directly to

    buyers and wholesalers. Sellers can also be distributors who sell to retailers and other businesses. Producers - people who create the products or provide the service to sellers or buyers.

    E-Learning

    http://caribbean.notesmaster.com/uploads/library/user_media/8336/Chapter%204/ecommerce1.jpg

  • 8/20/2019 Application and Implication

    12/53

    E-Learning is web delivered and / or supported teaching and learning using a computer,multimedia and Internet technologies. E -learning allows you to learn anywhere and usually at any time,usually through a computer or mobile phone that connects to the Internet.

    Podcasting

    Podcasting combines blogging and mp3s to make an exciting new way to listen to information on acomputer or personal digital audio player. It allowed anyone with a computer to become a DJ, talk show hostor even a recording artist. Podcasting combines blogging with digital audio technology to create content.

    Bulletin Board

    These are text discussion groups. Individuals post a message to the bulletin board and then otherscan read it and reply if they want to

    Hacker culture involves the use of bulletin board systems in order to share information. Learnmore about some of the elements of hacker culture... bulletin board systems (BBS). A hackercould host a bulletin board system on his or her computer and let people dial into the system tosend messages, share information, play games and download programs. As hackers found one another,information exchanges increased dramatically.

    VoIP

    This is a method that allows users to use the Internet in much the same way that a regularlandline telephone uses a phone line. Most IP telephony software requires that each user have a computer,Internet connection and special software such as speakers, sound card and microphone.

    Instant Messaging

    Chat - Chat is a conversation between two or more people that takes place in a chat room . Thechat room software allows a group of people to type in messages that are seen by everyone in the"room."

    Chat is most effective when:

    You need an immediate answer. You want to communicate with more than one person. You can communicate in brief messages the information you need to know or wish to

    provide. You want to meet new people.

  • 8/20/2019 Application and Implication

    13/53

  • 8/20/2019 Application and Implication

    14/53

    Concepts associated with the Internet (Continued)

    World Wide Web (WWW)

    The WWW is accessed through a web browser to link files together using hyperlinks. The WWW transmitshypertext documents.

    The internet hosts all forms of data, including games, video, telecommunications, files and programs. Witha web browser, the user can view web pages that may contain mainly text, but also images and videos in orderto navigate between them via hyperlinks.

    Web browser

    A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web. An informationresource is identified by a Uniform Resource Identifier (URL) and may be a web page, image,video or other piece of content.

    Hyperlinks present in resources enable users easily to navigate their browsers to relatedresources.

    Although browsers are primarily intended to use the World Wide Web, they can also be used toaccess information provided by web servers in private networks or files in file systems.

    The major web browsers are Google Chrome, Mozilla Firefox, Internet Explorer, Opera,and Safari .

  • 8/20/2019 Application and Implication

    15/53

    HTTP

    The Hypertext Transfer Protocol (HTTP) is a networking protocol behind the World Wide Web.

    HTTP allows for transmission of Hypertext documents and webpages.

    HTML - Hypertext Markup Language is used for building web pages.

    All web pages have the following basic structure:

    HTML - specifies that this is a web pageo Head - contains the title of the page with code and css includeso Body - displays the main page content

    Which can be represented in HTML code using the following Tags:

    ...

    ...

    HTML5 makes websites fully interactive with the ability to quickly embed videos and interactwith web pages. Over the next few years you'll increasingly see applications moving over to thisnew technology

  • 8/20/2019 Application and Implication

    16/53

    Uniform Resource Locator ( URL)

    When you use the Web or send an e-mail message, you use a domain name to do it.

    For example, the Uniform Resource Locator (URL) "http://www.notesmaster.com" contains

    the domain name notesmaster.com, and the URL http://www.cxc.org contains the domain namecxc.org. So does this e-mail address: [email protected]. Every time you use a domainname, the software in the background translates the domain name as we know it, into themachine-readable address.

    WebPage (or webpage )

    A webpage is a document, typically written in plain text by formatted using Hypertext MarkupLanguage (HTML, XHTML). A webpage may incorporate elements from other websites that

    link to them. A web browser displays a web page on a computer monitor or mobile device.

    Website

    This is a set of related web pages served from a single web domain.

    Webserver

    The most common use of web servers is to host websites, but there are other uses such as gaming or datastorage

    Blogging

    A Blog (also known as a weblog ) serves as an online journal of a person's thoughts, opinions, visits oranything that they find interesting including links to other sites and news stories. So there is no particularsequence to the posts. It is normally a single page of entries written by one person, and is organized with themost recent entry at the top. A blog is normally public meaning that anyone on the Internet can view itscontents

  • 8/20/2019 Application and Implication

    17/53

    Concepts associated with the Internet (Continued)

    Electronic Mail (email)

    “Electronic Mail” , better known as e-mail or email, is one of the most widely used forms ofcommunication today.

    Email allows a user to write text, send and receive messages that may contain images or othersoftcopy files attached to the email. Emails are transmitted through a network to a specifiedcomputer user or group of users.

    An email message is stored on a server or the user's computer and can be read at any time. Web-based email can be accessed simply by going to the appropriate website and entering a usernameand password.

  • 8/20/2019 Application and Implication

    18/53

    Popular email hosts are hotmail.com, yahoo.com, and gmail.com

    E m a i l a d d r e s s e s :

    An email address comprises three parts. Here are some examples of email addresses:

    [email protected] [email protected]

    [email protected] [email protected]

    The first part of all e-mail addresses is the alias, user, group, or department of a company. In ourabove examples, user, help, my.name, and support is the username of the email address.

    The @ symbol separates the username from the domain name of the company. It is used as adivider in the e-mail address and is required for many e-mail addresses.

    The last part of the email address is the domain name of the email host where the user belongs. Thedomain names in the examples above are furniture.com, notesmaster.com, hotmail.com, and acompany.com

  • 8/20/2019 Application and Implication

    19/53

    Newsgroups

    One source of both information and communication is newsgroups . A newsgroup is a continuouspublic discussion about a particular topic. You can join a newsgroup at any time to become part of ahuge conversation between hundreds or even thousands of people. There are newsgroups for carenthusiasts, aviators, education, religion, exercise and fitness and so many more! That is,newsgroups allow the free exchange of information between its users on practically any topic.

    Newsgroups are most effective when the user:

    does not need an immediate answer. wants to communicate with more than one user. wants to share information with a group of users interested in the same topic.

    Internet Relay Chat (IRC)

    Chat - Chat is a conversation between two or more people that takes place in a chat room . Thechat room software allows a group of people to type in messages that are seen by everyone in the"room."

  • 8/20/2019 Application and Implication

    20/53

    Chat is useful:

    You need an immediate answer from another user who is also online and can accept a chat. You want to communicate with more than one user who is also online. You can communicate in brief messages the information you need to know or wish to

    provide. You want to meet new users.

    Telnet

    Telnet allows a user to control remote computer

    Telnet is one of the famous network protocol widely used to manage network and other equipment.

    File Transfer Protocol (FTP)

    File Transfer Protocol (FTP) is a standard network protocol used to copy one or more files from onehost to another over a TCP-based network, such as the Internet.

    Here is a one-minute video on FTP:

  • 8/20/2019 Application and Implication

    21/53

    Upload / Download

    Upload refers to the transfer of data from a computer system to a remote system such as a serverwhich usually stores a copy of the data being transferred.

    Download refers to receiving data from a remote system such as a server to a local system.

  • 8/20/2019 Application and Implication

    22/53

    DESCRIBE MEASURES TO SECURE DATA AND MAINTAIN DATAINTEGRITY

    Physical Access Restrictions

    What are physical access restrictions?

    This involves physically making the building with the computers, the computer rooms or thecomputer itself difficult to access. This can be achieved by blocking unauthorised access to the

    building and computer room thus keeping those computers in secure areas.

    Sometimes it is best to prevent unauthorized users from getting near to your data and computersystems than to try to remove them once they have gained access. Let us discuss some waysto protect computer equipment from intentional theft or vandalism, also from accidental damage

    by person who should not be using them

    - Keeping important computers such as servers or mainframes in locked rooms

    - Posting security guards

    - Security locks, smart cards

    - Keeping sensitive data on stand-alone machines instead of networks

    - Using alarm systems and video cameras

    Guards

  • 8/20/2019 Application and Implication

    23/53

    Locks

    Biometric Systems

    Fire Resistant Cabinets

  • 8/20/2019 Application and Implication

    24/53

    Software Restrictions

    Users and businesses can use software to help protect their systems.

    - User Identification and Passwords

    - Data encryption

    - Virus Protection

    - Firewalls

    - Access rights

    We will discuss some of these software restrictions:

    User Identification and Passwords

    User identification ( user ID) along with a password can control access to a computer's operating system, orthe network that the computer is connected to or especially the computer itself.

    Each user must enter a unique username and a password to log on. Since the username is unique, each usercan be identified and their user's access to the system can be logged.

    A password is a combination of letters, numbers or symbols that is private to each user. The password isgiven to each user so that only the genuine user is logging on. This prevents hackers and unauthorized usersfrom logging on with someone else's user ID.

    To maintain the integrity of access to the system, passwords should be changed about every 90 days(3 months). T he longer a user keeps the same password, the more likely the password will bediscovered and breached. If a password is wrongly entered three times, then the user is automaticallylocked out. This may prevent a hacker repeatedly trying to guess a password.

  • 8/20/2019 Application and Implication

    25/53

    Encryption

    Encryption is a way of protecting data by scrambling it so that it unreadable without a specialdecryption code. Only an authorised user would be given this code and the software to decodeand get the original information.

    It is useful to encrypt data that is transferred over wireless networks since it is easy tointercept. E-commerce web sites also use encryption to protect the personal and financial details

    of their customers because their credit card and other information is transferred over the Internet.If anyone intercepted the information it would be unreadable.

    This is an example of the contents of a document:

    This page has been created by NotesMaster for InformationTechnology

    After using an encrypted code, the document may look like:

    jkd2f*hlj86ik7$171kjfh7d1h4d jkd2f*86ik7$171k

    An authorized user would have the correct key code to translate the document and produce theoriginal document.

  • 8/20/2019 Application and Implication

    26/53

    Virus Protection

    Since a virus is a program that can attach copies of itself to system files or programs, it can cause

    damage by altering or destroying programs, files and even operating systems of computers.

    Anti-virus software can detect and destroy viruses by scanning computer files for any viruses

    which it then removes and alerts the user. Since there are so many viruses, the anti-virus software

    need to be updated regularly.

    Firewall

    Computers that use ADSL and other permanent connections to the Internet need software called

    a 'firewall' to prevent unauthorised access to the system. A firewall allows mainly one way

    access, so that you can access web sites and search the Internet, but the firewall checks all dataand information coming TO your computer system against a set of rules. If the data accessing

    your system is from an unauthorized source, then it is blocked unless you specifically grant

    permission for it to be accessed on your computer.

    Access Rights

    User Identification (user ID) controls who has access to which files and even parts of files or settingson the computer or network. Controlling access levels can restrict users from installing software accessing

    some files or changing the computer setup.

    Some users will only have READ access to files while others may have READ and COPY and yet another set

    of users may have DELETE access.

  • 8/20/2019 Application and Implication

    27/53

    Keeping your Data

    Many times you have so much data that you need to create space for the incoming data and move

    the older data that you are not using as often to another location. This is called Data Archiving .

    Other times you will need to store your current data somewhere else just in case it becomes

    corrupted or lost. We make backups of our data in this case. Let's discuss these in more detail:

    Data Archiving

    As you create more and more data, some of it becomes old as the

    new data is created. Old data can range from a day old to years old - it all depends on what the

    data is used for.

    Data archiving is the process of moving that data that is old or data that we are no longer actively

    using, to a separate location or storage device. At any time we can retrieve this data for use, so it

    must be stored and kept in an environment that will not let it get destroyed or corrupted or lost.

    This also means that the data should be stored and organized in a way that it can be located and

    presented easily. It is also important to keep this data, as some laws insist that the data and files

    be kept for a certain period of time before they can be destroyed.

  • 8/20/2019 Application and Implication

    28/53

    We can archive our email, physical files, files on ourcomputer memory sticks, CD...once data is stored, itcan be archived.

    Data Backup and Recovery

    In many organizations, data is copied at regular intervals. In case the current data is corrupted or

    lost, the last set of saved data can be used and then the lost or corrupted data can be re-entered.

    When you backup our data , you create a copy of it. You continue to

    add data using the original storage device as if you did not create a backup. However in case the

    data on the current storage device becomes corrupted, destroyed or lost, you can use the last set

    of data that was backed up and re-enter the most recent data that was not included in the backup.

    Data loss can be a common experience of computer users. You can backup your data so that it

    can be recovered if it is loss, whether through accidental or deliberate data deletion or corruption.

  • 8/20/2019 Application and Implication

    29/53

    Your data is usually located on a storage device or media, such as a hard

    drive, CD, or USB Flash Drive. If the storage device becomes damaged, or you cannot access

    your data from the device or media, then you should extract your data. This process of getting

    your data from this damaged device or media is called data recovery.

    Difference between data backup and data archiving

    Backup your data - Create a copy of current data which can be used easily in case the original

    data becomes corrupted

    Archive your data - Data that you do not use often. It is not archived because it was corrupted,

    but for historical purposes, just in case it is needed

  • 8/20/2019 Application and Implication

    30/53

    B: Applications And Implications

    Outline ways by which information can be misused

    Ways in which information can be misused

    The Internet is not only used by innocent members of the public, but also by fraudulent traders,

    software pirates, hackers and con-artists, to name but a few.

    Here are a few ways in which information can be misused:

    Violation of privacy

    Users have passwords to keep their data private and secure it from being stolen or modified. Some

    computer users such as hackers use software to decipher codes and passwords to gain

    unauthorised access to computer systems for their own illegal purposes. This violation of privacy

    resulted in the creation of the Computer Misuse Act of 1990, where users if found guilty

    were punishable by fines or imprisonment.

    There are three levels of hacking:

    Viewing another user's information without permission - o this includes accessing someone's files or email or accessing their personal

    information without their knowledge or permission.

    Using accessed information for illegal purposes

  • 8/20/2019 Application and Implication

    31/53

    o the information that the user has, is accessed by the hacker and used as blackmail

    or for unfair advantage

    Altering accessed information for fraudulent purposes o the hacker alters the accessed information, such as changing figures on bank

    accounts or deleting files

    Propaganda

    This is a form of communication through email, online articles, websites and other electronic

    methods, to bias users' attitudes toward supporting a cause. The information shared is usually

    partially true. This information is bombarded using many electronic methods to create the chosen

    result in users' attitudes.

    Computer Fraud

    This is a criminal activity where someone uses a computer to defraud an individual or organisation of

    money or goods. Computer fraud can be difficult to detect because the user committing the crime is

    very skilled, discreet and difficult to locate since they are accessing the computer through the

    Internet from another user's computer.

    Electronic eavesdropping

    This is a method of using a computer system to record the keystrokes such as passwords and

    websites that a user accesses. These details are then transferred over the internet to the illegal user

    for fraudulent use.

  • 8/20/2019 Application and Implication

    32/53

    Surveillance

    This is where users' activity on the computer is monitored and observed secretly to detect illegal

    activity. That is, a user can be illegally monitored to see when they perform an illegal activity!

    Many times this is authorized by governments, huge corporations, or influential individuals.

    These surveillance programs are used widely and almost anything on the Internet could potentially

    be monitored for proof of illegal activity.

    Identity Theft / Credit card fraud

    This is when a user pretends to be another user by assuming that person's identity, usually to

    access credit card information in order to use the funds on the credit card without permission.

  • 8/20/2019 Application and Implication

    33/53

    Using Appropriate hardware and software

    Business

    A- Banking, shopping, and buying and selling of goods and services

    The first applications of ICT within banking were the use of mainframes, and later minicomputers, to processdata such as customer accounts, bank inventories, personnel records, and accounting packages.

    Hardware : Computer, or an Automatic Teller Machine (ATM), Debit or Credit CardMachine; ( E lectronic F unds T ransfer at the P oint O f S ale ) system.

    Software: Payment for goods or services by debit and credit cards through the EFTPOS

    B - Using documents as feedback in a utility billing system:

    Hardware: Optical mark reader;

    Software : Application program to read the utility bill Science and Technology

    A - Expert Systems

    Hardware : Sensors in greenhouses (such as temperature, airhumidity, soilmoisture, light sensors).

  • 8/20/2019 Application and Implication

    34/53

    Feedback loops in a central heating control system:

    Inputs :

    Buttons - used to set the time and heatingoptions as well as override the programmedtimer.

    B - Engineering and Design

    Computer Aided Design (CAD); Computer Aided Manufacturing (CAM)

    Hardware : Robots, Computers

    Software: Programmes to design products, manage the robots

  • 8/20/2019 Application and Implication

    35/53

  • 8/20/2019 Application and Implication

    36/53

    Describe current and emerging technological trends

    Current and Emerging Technological Trends

    Technology impacts many aspects of our lives with no sign of slowing. Here are some currentand emerging technology trends:

    Robots

    A robot is a mechanical but virtualintelligent machine that canrepeatedly perform tasksautomatically or by remote control.

    Robots work in factories thatassemble vehicles, and can also haveroles in the film industry and fightwars in ways such as unmannedplanes. In 1984 a film called TheTerminator was released. It featured afuture world where the militarycreated robots to fight wars.

  • 8/20/2019 Application and Implication

    37/53

    Computer-Aided Learning (CAL):

    CAL focuses on teaching at adistance in an anywhere anytime

    environment.

    CAL is also used to providesimulations of training for real ordangerous situations for

    Examples of CAL include virtualclassrooms and Flight Simulator forthe space program or to fly anairline

    Games:

    These programs often simulate realor imaginary situations.

    Examples include military gamessuch as Call of Duty and ModernWarfare; simulations for flying aplane or playing basketball; orgeneral games to find goals andgather points for saving a city.

  • 8/20/2019 Application and Implication

    38/53

    Video conferencing

    Video conferencing allows computerusers in different locations or evencountries to see, hear, and interact among

    each other, and even share computerscreens as if they were in the same room.

    If your computer has hardware such asmicrophones, speakers and a videocamera, then you can take part in videoconferencing.

    It is best to have a good Internetconnection so that you can send andreceive images and large files quickly andeasily.

    Control software:

    Used to program external devices thathave repetitive tasks, such as traffic lightswhere programmed instructions are usedto control traffic on highways.

    They can also be used in other situationssuch in the space program, satellites,

    bomb disposal.

    CAD, CAE and CAM all use controlsoftware.

    Computer-Aided Design (CAD)

    This is the use of special computer

    software to design products including

    jewelry, vehicles, ships, parts,

    architectural designs and prosthetics.

  • 8/20/2019 Application and Implication

    39/53

    Computer-Aided Engineering (CAE)

    This is an area of CAD that focuses on

    engineering areas, specifically to analyze

    the robustness and reliability of parts andobjects such as buildings and vehicles.

    CAE can also be used to improve the

    safety and durability of vehicles

    Computer-Aided Manufacture (CAM)

    This is another area of CAD that isused to develop and test products andrelated machinery in the manufacturing ofwork pieces.

    The model is designed in CAD and testedusing CAE, CAM software is then used tocontrol the machine tool to produce thefinal mold or product.

  • 8/20/2019 Application and Implication

    40/53

  • 8/20/2019 Application and Implication

    41/53

    Expert Systems

    The purpose of an expert system is to use a system of 'artificial intelligence' to replace one or more

    people with the expertise of knowledge in a particular area. The expert system this requires a

    system that can process information into knowledge.

    To create such a system would require the following:

    a large database of organized data on the specific area

    a method of searching the database based on questions and answers. Depending on the

    answers, a different set of questions may be asked

    a set of rules for making decisions based on the responses given and the data in the

    database

    Examples:

    A medical diagnosis expert system.

    Patients would use a touch screen to answer questions on symptoms. Based on responses, the system could use the database of diseases and symptoms, and the list of

    rules on the various symptoms and responses to produce one or more possible diagnoses for the

    doctor to consider.

    Advantages .

    The doctor saves time since the patient has already describes his or her symptoms. The doctor is given possible diagnoses to consider. The database can easily be updated.

    Disadvantages

    It can be difficult for some patients in pain or unconscious to answer questions on

    symptoms to a computer system. It assumes that patients have basic technical skills and can use and respond to the

    computer It lacks the 'human touch' of a doctor actually talking to or examining a patient

    quickly.

  • 8/20/2019 Application and Implication

    42/53

    A trouble-shooting expert system

    This type of program could help diagnose what is causing problems with software or hardware. The

    system would ask a series of questions and give instructions on possible actions to try out. If the

    actions were successful the program would end but if not then it would ask further questions and

    suggest further tasks to try.

    Advantages .

    The system goes through a logical series of steps that are likely to solve common

    problems.

    The system can connect to and directly access areas of the software such as printer

    or network management screens to help diagnose the problem

    The computer can access data on a wide range of common computer problems to

    see if a similar problem has been solved. As new problems and solutions are entered into the system, the database can easily

    be updated.

    Disadvantages

    The user may not have technical knowledge to answer the questions.

    It lacks the 'human touch' of having the problem explained in sounds or use of handsto explain the problem.

    A car mechanic expert system

    This type of expert systems can help to diagnose faults and assist with regular maintenance of a car.

    The mechanic can answer questions on specific areas to help diagnose problems or it could be

    automated where there sensors and connections to a direct interface between the expert system

    and the computer system built into the car. The system would then run its diagnostic tests. The

    mechanic would get a list of any issues or even make automatic adjustments needed on the car.

    Advantages .

  • 8/20/2019 Application and Implication

    43/53

    Saves time because the mechanic is taken through a logical series of things to try

    out that are likely to solve common problems. The system can directly access computer systems built into many modern cars. Can be used as training for new mechanics.

    Disadvantages

    It can be difficult to answer questions if the mechanic is new or has no knowledge of

    the problem.

  • 8/20/2019 Application and Implication

    44/53

    Assess the impact of Information Technology on job skills and careers

    Job skills and careers with IT

    Most jobs today require that employees use or have access to some sort of technology. It seems to be the norm

    that employees have email addresses of the company in order to send and receive messages among customers

    and colleagues alike.

    Reports can now be distributed via softcopy with graphs and tables. The size of the reports can be compressed

    (zipped) and even password protected.

    Meetings can be conducted online using video, audio, and chat features, including the option to share

    documents

    Loss of jobs

    The introduction of Information Technology has influenced the automation of many tasks. This has made the

    jobs of many employees redundant such as:

  • 8/20/2019 Application and Implication

    45/53

    Typing pools : Secretaries were located in a central area typing documents using typewriters. Documents could

    not be saved and had to retyped if they were to be distributed to many people. The introduction of the word

    processor allowed documents to be saved and reduced the time spent retyping documents. The use of mail

    merge also simplified sending one document personalised to many people.

    Accounting tasks: Gone are the days of clerks assigned to manually calculate and count out wages.

    Accounting programs now calculate the wages and in some cases employers deposit wages directly on the

    employees' bank accounts.

    Typesetting for newspapers : there is no need for printers to

    manually typeset the newspaper pages. Many hundreds of thousands of people lost their jobs as these changes

    happened.

  • 8/20/2019 Application and Implication

    46/53

    Job loss is not pleasant; it affects one's self confidence and creates all kinds of stress and disruption in families

    and society in general.

    Technology drives much of business these days and so most companies want workers with the basic skills to

    use it - typing for example or having the ability to use email. The use of these basic skills in the workplace is

    as important as reading and writing.

    Many people have found that their job has been changed because of the introduction of computers. Sometimes

    employees can perform the same tasks but by using a computer.

    Training has become a major money earner based on the many people who need to keep up to date with

    technology to maintain their jobs.

    Telecommuting

    Information Technology has changed how we work in a major way. Some business have disappeared, new

    ones have been created because of IT, while others have adapt to meet the challenges of new technologies.

    Telecommuting is a method of working from home.

  • 8/20/2019 Application and Implication

    47/53

    Benefits and Challenges of Telecommuting for the Employee

    Benefits for employee

    Ability to schedule you own working hours

    Save traveling time and costs

    Environmental benefits such as saving on gas and airconditioning at work

    Collaboration is better with an Internet connection

    Challenges for employee

    Work place can contact you at any time

    It may be difficult to separate work fromhome life

    Employees may work even longer hours

    May miss the camaraderie and teamspirit at work.

    Benefits and Challenges of Telecommuting for the Employer

    Benefits for employer

    Less office space

    Can employee skilled workers from anywhere in theworld

    Keep employees who relocate but want to remain withthe business

    Challenges for employer

    Data security and confidentiality issuesmay arise

    The business culture may be lost.

    Use of Technology on Job Skills and Careers

    Office employees

    Most office employees spent time typingcorrespondence using a typewriter. Any mistakeswhen typing were difficult to correct and mostlikely the page had to be retyped.

    Now, with IT, many documents can be kept insoftcopy and edited easily. This saves time, and

  • 8/20/2019 Application and Implication

    48/53

    reduces wastage of paper.

    Office employees may now have different taskssuch as arranging meetings and appointments,making travel arrangements and so on.

    Teachers In the Classroom

    Typically, teachers use word processors to prepare tests and class notes, presentationsoftware (e.g. PowerPoint) to show notes andillustrations, spreadsheets (such as Excel) torecord and calculate marks, as well as use theInternet to search for material to support theteaching activities.

    Interactive whiteboards are used in many

    classrooms. These whiteboards can connect to acomputer, where students can interact with the board by using a special pen or their hands.

    Some teachers have access to a digital projectorwhich helps students to see the presentation andwhat the teacher is explaining on the teacher'scomputer.

    Computer rooms Students can use computer labs at schools tocomplete their school-based assessments.Teachers can also place exercises on the mainserver so that students can access these files towork with.

    Medical Personnel

    Doctors and medical personnel use equipment inwards, laboratories, pharmacies and offices.

    Skilled personnel are needed to be able to enter,store, and access patient record systems, as wellas interpret data and diagnose results frommonitoring of vital signs, CAT scans (ComputerAided Tomography), MRI scanners (Magneticresonance Imaging), ultrasounds, and X-rays.

  • 8/20/2019 Application and Implication

    49/53

    Law enforcement

    Criminals make use of the very latesttechnology, and so law enforcement also usestechnology to maintain law and order.

    Technology is used in analysing fingerprintstaken from objects at the scene of a crime oncethey are scanned into a computer

    Technology is also used to analyse DNA foundat a crime scene. These results can stored in acomputer and are used to identify criminals.

    CCTV cameras (closed circuit television) arealso placed in locations in and around cities,towns and main roads to monitor traffic flowsand those breaking the law by speeding.

    Movie industry

    Until recently, the only way films weredistributed to cinemas all around the world was

    by physically transporting large film reels toeach and every cinema.

    Now an alternative is appearing where the filmsare distributed as a digital file.

  • 8/20/2019 Application and Implication

    50/53

    Banking

    Banking services are now offered in

    supermarkets, department stores and many more

    places where commodities are sold. Customerscan also use online banking or use an Automatic

    Teller Machines or ATM, more recently called

    Automatic Banking Machines or ABM.

    The use of technology to enhance banking

    services has also attracted persons who attempt

    to fraudulently gain funds. 'Phishing' works

    mainly by email as an alarming email message

    appears in your inbox that your funds have been

    frozen or your account has been breached.

    Usually you are asked to log in to your account

    urgently. If you do log in, the criminal is able to

    access your password to withdraw your funds to

    another account.

    Shopping

    Almost every item that you purchase in a shop

    has a barcode on it. With the use of technology,

    shoppers are able to use EPOS ( Electronic Point

    Of Sale) to pay for their shopping using a debit

    or credit card instead of cash.

  • 8/20/2019 Application and Implication

    51/53

    Travelling

    Travelers can easily book flights through a travel

    agent or better yet, do it themselves very easily

    online.

    Technology is now integrated into electronic

    parking at the airport, reading flight information

    sent to your mobile phone, airport check-in, even

    baggage handling and passport security.

    A luggage label with a barcode is attached to

    each suitcase or bag. The label also has a bar

    code which contains your flight information. Asthe suitcase moves along the conveyor belt, the

    barcode is scanned and automatically routed to

    the correct area for loading onto your flight.

    Automation of baggage handling has reduced the

    workforce in this area.

    Passport Security

    Passport used to be purely paper documents with basic personal details and a photograph.

    Recently, each new passport contains an

    embedded microchip containing biometric

    details of the owner's face and a complete history

    of his or her travels. This is more secure and has

    allowed customs and immigration personnel to

    speed up the process in airports.

  • 8/20/2019 Application and Implication

    52/53

    Describe The Roles Of Various Personnel In Computer-RelatedProfessions

    Individual Job functions

    ComputerEngineer

    Responsible for designing, developing, implementing and testing computer-based hardwareand software. This includes configuring the computers and determine what cables are needed.

    ComputerTechnician

    Provides on-site support for clients, or internal support for computer maintenance. Can

    also install and update various software packages.

    DatabaseAdministrator

    Designs, implements, maintains and repairs an organisation’s database. It can also include

    monitoring and improving database performance and capacity as well as securing the database

    from intruders.

    File Librarian Keeps track of the tapes, CDs, disks and other storage devices that are stored and logged outfor use

    IT Manager Since technology tends to evolve rather quickly, the IT manager should periodically review

    and evaluate how current systems and applications are meeting the needs of the company or

    organization.

    Multi-media Artist Uses a wide range of media such as visual art involving sound, moving images and other

    media to create an art piece or product.

    NetworkAdministrator

    Responsible for support and management of computer networks (intranets and extranets, and

    aspects of the Internet) to ensure they run efficiently.

    Programmer Write, test, and maintain programs. Must be good at problem solving and work with a team todevelop systems solutions.

    Software Engineer The software engineer is responsible for the complete life cycle of a new or modified software package, from research and design to implementation, training and support.

    Software Tester Run tests, using various customer scenarios, stress testing, and performance testing. The

    ultimate goal is to iron out any bugs and improve the quality of the finished product.

    Software Trainer A specialist who teaches persons how to use computer applications such as spreadsheets,word processors, desktop publishing programs, or computer network systems software.

    Requires expert knowledge of computer software programs and strong communication skills.

  • 8/20/2019 Application and Implication

    53/53

    Systems Analystand Designer

    Identifies and specifies software requirements and specifications as well as manages the

    program design and development. A systems analyst may supervise a team of programmers in

    the development of a system solution.

    SystemsProgrammer

    Installs, customizes, and maintains the operating system as well as installs or upgrades

    applications that run on the operating system.

    Web-Developer Specializes in the development of applications for the Internet, or distributed networkapplications that use HTTP from a web server to be displayed on a web browser.

    Webmaster Responsible for maintaining one or more websites; may include ensuring that the web servers,

    as well as the computer hardware and software are operating correctly, designing websites,

    generating and revising web pages