Documente Academic
Documente Profesional
Documente Cultură
pg. 1
Section 4: Applications and Implications of Information and
Communication Technology
Objective 4.1 Use terms associated with data communication and networks
Objective 4.2 Distinguish among Internet, intranet and extranet
Data Communication
This is the transmission (movement) of data from one point to another for direct use or
for further processing e.g. from one computer to another, from a cell phone to computer
or vice-versa, or from a computer to fax machine.
Transmission media
These are the ways and/or materials used to move data. Media can be cabled/wired or
wireless. Cabled/wired media include:
Twisted pair cable: used for home networking where there is no great need for
speed. It is a cheap convenient method of connecting computers and peripherals
in a network.
Coaxial cable: used in medium-sized networks to transmit voice, video and data
at moderate speeds. This is more expensive than twisted pair because the
transmission capabilities are higher.
Fibre optic cable: used to transmit large volumes of digital data at extremely high
speed virtually error-free. These are relatively expensive.
pg. 2
Communications satellite is a space station that receives microwave signals from an
earth-based station, amplifies (strengthens) the signals, and broadcasts the signals back
over a wide area to any number of earth-based stations.
Microwaves are radio waves that provide a high speed signal transmission. It is also
called fixed wireless and involves sending signals from one microwave station to another.
A microwave station is an earth-based reflective dish that contains the antenna,
transceivers and other equipment necessary for microwave communications.
Infrared is a wireless transmission medium that sends signals using infrared light waves.
Mobile computers and devices , such as mouse, printer, and smart phones often have
IrDa ports that enables the transfer of data from one device to another using infrared
light waves.
Hot spot is a wireless network that provides Internet connections to mobile computers
and other devices. They are used by mobile users to check e-mail, browse the Web and
access any service on the Internet.
Wi-Fi is short for wireless fidelity. It is a type of broadband Internet connection that
uses radio signals to provide Internet connection to wireless computers and devices.
Communication modes
The lines that transmit data are also classified according to the direction in which data
flows through them. There are three (3) types of lines:
A simplex line permits data to flow in only one direction. You can send data or
receive data, but not both.
A half-duplex line can alternately send and receive data. That means that at any
particular time you can either send data but not receive it, or receive data but
not send it.
A full-duplex line can simultaneously send and receive data.
Networks
A network is group of two or more computers linked together so that they can share
resources (hardware, software and data) and can communicate with one another.
Computer networks maybe classified as one of the following:
Local Area Network (LAN)
Wide Area Network (WAN)
pg. 3
Metropolitan Network
Internet
Intranet
Extranet
pg. 4
usually managed by a single network provider that sells the service to users. Telephone
companies and cable television operators provide connections to the MAN.
Intranet
Extranet
This is an Intranet that allows limited access to it by people outside the company. A
company may set up an extranet, for example, to provide technical support information
to its customers based on products it sells or services it provides.
pg. 5
Objective 4.3 Explain concepts associated with the Internet
The Internet
This is the world’s largest WAN. It is a network of networks that connects computers
worldwide via a huge set of telecommunication links. The Internet does not have a
central authority. No one is in charge of the Internet. There are organizations which
develop technical aspects of the network and set standards for creating applications on
it, but no one governing body or government is in control.
Modem
A standard telephone line can transmit only analogue data, whereas data emitted from a
computer is in a digital form. A modem (modulator/demodulator) is a device used to
convert the digital data emitted from the computer into analogue data that can be
transmitted over a telephone line. When the data gets to the other end of the line, a
modem converts the analogue data back into digital data for the computer at that end of
pg. 6
the line to process. The data transmitted can be sound, pictures, video or text. Modems
can be external or internal (attached to the mother board). There are also different types
of modems:
Integrated Services digital network (ISDN)
Asymmetric digital subscriber line (ADSL)
Cable modems
This is a company that has a direct connection to the Internet and gives users access to
it, usually for a fee. The company usually has a small network that is linked via a high-
speed communication link to a high-speed link that forms part of the Internet’s
backbone (supercomputers and other large networks that make up the Internet
worldwide).
TCP/IP
Computers on the Internet use a protocol called TCP/IP. This is a set of protocols used to
transfer data from one computer to another over the Internet. A protocol is asset of
rules that defines how computers interact or communicate with each other. TCP/IP is not
designed for any specific type of computer so it enables hardware and operating systems
software from different computers to communicate. E.g. an IBM computer can
communicate with an Apple computer.
Browser
In order to navigate (go through) the World Wide Web (WWW), you need a web
browser. A web browser is a program that resides in your computer and enables you to
find, retrieve, view and send hypertext and hypermedia documents over the web.
Popular browsers are MS Internet Explorer and Mozilla Firefox. Some of the things you
can do with a browser are:
View hundreds of millions of web pages from all over the world.
Send and receive email
Participate in conferences
Chat
Shop online
See and hear recorded broadcasts
Each computer on the Internet has a unique address that identifies it as a node so that
information can be sent to it. This unique address is really a number consisting of four
sets of up to three digits each, separated by full stops, e.g. 196.361.232.4. Because this
address is difficult for humans to remember, names are used to correspond to each IP
address. The names are determined through the Domain Name System (DNS). The DNS
pg. 7
divides the Internet into a series of domains which are further divided into sub-domains,
and the sub-domains into lower level domains. The top-level domains are grouped into
categories. Some of them are:
Educational institutions .edu
Commercial entities .com
Public organizations .org
Government bodies .gov
Military .mil
Using the different domains from top down, a computer’s (host’s) name is determined.
The complete name of a computer on the Internet includes the computer’s name, all
sub-organizations, the organization and the top – level domain.
E.g. shop.ASCD.org
Top-level domain
Sub-domain
Computer’s name
These enable you to connect your computer to a remote host and use the services
available as if your computer were a terminal of the remote computer (host).Some of
the services accessible are online databases, library catalogues and chat services. A
popular TES is Telnet. This is a program that allows you to access data and programs
from a Telnet server. When connected to a Telnet site, your computer becomes a dumb
terminal that can only send text-based messages to the Telnet site and allow you to view
the results.
These allow you to locate and use electronic files stored on computers across the
Internet.
pg. 8
This is a set of rules for communicating over the Internet. An FTP program enables you
to find an electronic file stored on a computer somewhere and download it (take a file
from one computer on the Internet and copy it to a storage device on your computer).
It also allows you to upload files (send files to other computers on the Internet). Some
FTP sites are private and require you to pay to retrieve or store information on them.
Communication services
This is the most popular and widely used service on the Internet. It enables users
worldwide to send electronic messages (text, sound, video and graphics) to one
individual or group of individuals, and receive messages from others. E-mail is much
faster than regular mail. It is free since you do not pay to send the e-mail, you only pay
for Internet access from your ISP. It is convenient, since you can access your at anytime
and from anywhere as long as your have Internet access.
Email addresses
To send and /or receive e-mail, each user must have an e-mail address and an email
program. The address is unique to the user and consists of two parts separated by the @
(‘at’) symbol. The first part is the user name, which can be a real or made up name. The
second part is the domain name (the location of the e-mail account on the Internet).
Mailing Lists
An electronic mailing list is a group of people using e-mail to communicate their views
on common issues or interests. You subscribe to become part of the group. Not all
groups are open to everyone. Some allow only professionals in a certain field. When you
become a member of a group, you can send messages with comments or views on some
matter that is being discussed. A copy of your message is then sent to all subscribers on
pg. 9
the mailing list. Some mailing list only let subscribers receive messages but not send
them e.g. a mailing list that sends a joke a day.
Newsgroups
The main difference between newsgroups and mailing lists is the method of
communication. Mailing lists use e-mail to communicate with subscribers. Messages are
sent to a subscriber’s e-mail address. Newsgroups post messages on the Internet for all
the users to access. For you to be able to read and post messages to newsgroups, your
computer must have newsreader software.
Chat
Chat is a service used by a group of people who share the same interests and wish to
communicate with each other interactively, in real time. Three different ways of chatting
are:
1. Text-based Chat
Each user entering the chat room sees the comments being typed by other users
in the chat room in real time. Everyone is notified when new users enter the
discussion. Each user types his/her comments. They may also choose to talk to
specific persons in the group. An example of a text-based program is ICQ.
2. Internet Relay Chat (IRC)
This type of chat allows you to talk with as many people as you like but they are
grouped into channels based on the topics being discussed.
3. Instant messaging
This enables you to chat privately with another person, in real time. Here you do
not enter a chat room but you speak directly to the person.
4. Multimedia chat
This allows users to communicate real time using microphone and a web cam.
The users are able to see and hear each other.
World Wide Web (WWW)
pg. 10
The WWW also called W3 is part of the Internet. It consists of hypertext and hypermedia
documents called web pages.
Web page
This is a collection of text and multimedia documents.
Website
A group of related web pages on the same web server.
Web server
A computer that stores and makes available hypertext and hypermedia documents.
Blogging
This is the act of distributing information over the web. A blog is an informal website
consisting of time-stamped articles, or posts, in a diary or journal format, usually listed in
reverse chronological order. Blogger needs blog software to create/maintain a blog.
Hypertext documents
Hyperlink
This is an element in a document (text or graphics) that allows you to move easily from
one document to the next or to another position in the document.
Hypermedia
Hypermedia is the name given to documents that contains links to text, graphics, sound
or video files.
A computer that stores and makes available hypertext and hypermedia documents is
called a web server, and a computer that requests web pages is called the client.
pg. 11
Hypertext transfer protocol
Hypertext transfer protocol (HTTP) is a set of rules that controls how data travels
between the web server and client.
Search engines
To retrieve information on the Web you can use a search engine. A search engine is also
called a web portal. It is a website that allows users to find information quickly and
easily. Each search engine has a database (collection) of web documents. Some popular
search engines are Yahoo, Excite, MSN, AltaVista, Lycos, Askjeeves and Google.
Protocol://www.Server/Path/Filename
e.g. http://www.limewire.com/home/aboutUs.html
Protocol Path
Server Filename
Pod-casting
This is a method for distributing audio files, known as pod-casts, using web feeds. Audio
pod-cast files are stored on a website. A web feed is created for each pod-cast, or for a
collection of pod-cast files. Users can subscribe to a web feed by clicking on an icon, and
the pod-cast will be downloaded. If the pod-cast is part of a series then the new pod-
casts will be downloaded automatically when they become available.
VoIP
Short for Voice over Internet Protocol. Services such as Skype allow you to use the
Internet to have voice conversations. The calls are usually free. VoIP can be used on any
computer that has Internet connection, a microphone and speakers. You can add
webcams and see the person you are talking to. Some organizations combine the phone
system with their LAN. This means that all internal phone calls are sent through the LAN
using digital formats instead of analogue. In these cases the phones have additional
features such as the ability to search telephone directories to contact other people in
the organization.
pg. 12
Objective 4.4 Describe measures to secure data and maintain data integrity.
Computer crimes such as hacking, Internet Fraud, Industrial espionage and software
piracy have increased the need for data security.
Data Security
This refers to the physical, hardware and software methods used to protect data from
unauthorized access and corruption. Data security ensures that data integrity is
maintained.
Data Integrity
This refers to the accuracy and completeness of data as it enters the system and its
consistency after it has been processed. Data integrity can be compromised in several
ways:
1. Human error (e.g. inaccurate data entry, accidental deletion, accidental changing
of data)
2. Natural disasters (e.g. fires, floods and earthquakes)
3. Worms and viruses
4. Hardware malfunctions
5. Fraud
6. Malicious deletion or changing of data
Data security methods may be classified into two types: Physical access restrictions and
Software restrictions.
1. Locks
2. Security guards
3. Burglar alarms
4. Monitoring systems using surveillance cameras
5. Biometric scans e.g. retinal and fingerprints
6. Burglar roofing and the reinforcement of doorways
pg. 13
7. Fireproof or waterproof safes and cabinets
8. Recovery procedures and backups stored at a remote (faraway) location
9. Distribution of work among more than one employee so that no one has sole
control over the data.
10. Archiving: files no longer in use are backed-up for later use, if needed.
Do not use storage media (floppy disk, tape, CD, memory stick) from other
computers in your computer. If you have to use them, make sure you run a virus
scan first to remove any viruses.
Do not open any e-mail attachments that contain an executable file: these are
files with extensions such as .exe, .com and .vbs.
Use operating systems such as UNIX which have security features that protect
computers from some viruses.
If you are using Microsoft applications, ensure that the Macro Virus Protection is
turned on.
pg. 14
A backup file is a copy of a file that you can use if the original file is damaged or not
available. It must not be stored on the same storage medium as the original and it
should be stored somewhere safe. Backups can be done for a single system or an entire
network. There are two main types of backup:
1. Full backup: The computer or network can be set up so that it automatically
makes a backup of everything on a regular basis. Most organizations backup the
data on their networks every night, when users will not be trying to access it.
2. Incremental backup: Only the files that have been changed since the last backup
is copied. Incremental backups are much quicker than full backups and can be
done during normal work.
Backup files should be stored on a medium that:
Makes fast copies
Can be stored in a secure place away from the original
Common backup storage media are hard disks, CDs, USB drives or tapes. Digital tapes
are a popular choice to store full backups, as data can be copied to tape very quickly. All
backup tapes and disks need to be labeled very carefully with the date and time and
stored in a
fireproof and water
Proprietary software
This is software that is owned by a commercial company and available to anyone to buy
and use under license. It has a copyright owner who can exercise control over what
users can do with the software. There are restrictions on use or private modification, or
even restrictions on excessive copying or publishing of modified or unmodified versions.
These restrictions are placed on it by its proprietors and its use, redistribution or
modification is prohibited, or requires you to ask for permission.
\
\\\ \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
pg. 15
??/?///
//
/
/
pg. 16
1.
2.
Data privacy: This term refers to an individual’s rights to determine what information is
stored about them and how that information will be used.
On the Internet, many companies collect personal information on their clients for a
specific purpose. Because this information is valuable for businesses, sometimes it is
stolen and/or sold to interested companies. Consequently, persons’ private information
are used for purposes for which they were not intended. To protect individuals against
this, data protection laws have been and are being developed in many countries. These
data protection laws require that all data stored about an individual must be accurate
and used only for the purpose for which it was collected. It also states that organizations
must allow individuals to view whatever data is stored about them, and can request that
it be amended if it is not correct.
Computer Surveillance
This is a hardware method of computer surveillance. A key logger is a device that plugs
in between your keyboard and computer and stores all data entered using the keyboard
in its memory.
pg. 17
Spyware
This is software used for computer surveillance. It is secretly installed on a computer and
covertly monitors the user’s actions without his or her knowledge. It saves its findings on
the computer being spied on or transmits them to someone else. There are two types of
spyware:
1. Surveillance spyware: This includes software key loggers, screen captures
devices and Trojan horses. They are used by:
law enforcement and intelligence agencies to solve and/or prevent crimes.
Companies to monitor the use of their computer resources.
Criminals to acquire passwords and credit card numbers.
Private investigators hired to spy on individuals or organizations.
Government agencies to spy on citizens.
Parents to monitor their children’s use of the computer.
Electronic Eavesdropping
This is the act of secretly listening to the private conversation of others without their
consent. It can be accomplished on phones, instant messages, VoIP, video conferences
and fax transmissions. There are different methods used to eavesdrop, for example:
The electronic radiation from computer equipment can be monitored and put
back together into discernible information using with inexpensive equipment.
The method can be applied to most computer equipment, but it is particularly
effective with conventional (CRT-based) VDUs, situated in solitary locations close
to the outer wall of your building. Because of this, it is important that the
monitors of computers with highly confidential information be placed in areas
that are not susceptible to this threat.
Telephone/wire tapping is the monitoring of telephone and Internet
conversations by a third party using methods such as hardwire tapping a outside
telephone line, using a recording devices e.g. bugs on the phone or phone line or
using wireless communications devices to remotely monitor conversations.
Propaganda
Many persons use the communication services (blogs, email, chat, twitter, etc.) over the
Internet to spread propaganda. Propaganda is communication aimed at influencing the
attitude of an audience toward some cause or position. It often presents facts selectively
pg. 18
(thus possibly lying by omission) to encourage a particular way of thinking, or uses
loaded messages to produce an emotional rather than rational response to the
information presented. The desired result is a change of the attitude toward the subject
in the target audience to further a political (biased) agenda.
Computer in Banking
In banking computers are used to:
Process customer transactions (withdrawals, deposits, loans and bill payments)
Process cheques
Transfer funds (electronic fund transfer) from one account to another.
This machine, together with a ATM card (debit card) allows you to perform a number of
banking transactions (deposit and withdraw money, obtain balances, transfer funds and
pay bills), 24 hours a day. The card has a magnetic strip which holds a code to identify
the card-holder’s bank account. The card-holder enters a PIN (Personal Identification
Number) to gain access to their account.
Cheque processing
Cheques are used to pay for goods and services. The amount of money to be paid to an
individual or organization is printed at the bottom of the cheque using a magnetic ink
character recognition (MICR) font. This money is deposited in the bank. If the cheque is
presented at the bank where the cheque originated, payment can be received
immediately. If the both parties have accounts at the same branch the cheque is cashed
and the accounts of both parties are updated. If the cheque originated from a different
bank, it is sent to a clearing house (In the Caribbean, the Central Bank). An MICR reader
reads the information at the bottom of the cheque and the cheque is sorted according
to its bank origin. Payments are made between the different banks and the cheques are
sent to the original banks, where the information is read into the main computer so that
the customers’ account can be updated.
Credit Cards
Credit cards are similar to debit cards. They give you access to funds in your credit
account. When the credit card is swiped in a business to pay for goods or services, the
card’s magnetic strip is read and the information on the strip is transmitted to the credit
card company. A check is performed to determine if sufficient funds are available, before
pg. 19
payment can be transferred to a merchant’s account. If there is not enough money
available, the transaction is denied or declined. The transaction is verified by the card-
holder signing a receipt. Paying for an item in this way uses Electronic Funds Transfer
(EFT). The balances in both the merchant’s account and your account are updated.
Smart Cards
Smart cards contain wafer-thin memory chips embedded in the card. This chip can store
more information than magnetic strip cards, and the information can be updated. Smart
cards are more secure than debit or credit cards. The magnetic strips on the backs of
debit and credit cards can be altered or forged, but this is much more difficult with a
smart card chip. These chips can hold information for cell phone accounts, debit and
credit cards or any other financial services.
This form of banking gives you the convenience of doing transactions anytime and from
home or anywhere there is Internet access. You can check your accounts, order cheque
books, pay bills, transfer funds and apply for loans via the Internet.
Computers in Business
In business, computers are used create bills (invoices), monitor inventory (stock control),
in point–of-sale systems (store checkouts), in accounting (profit and loss accounts), in
marketing (promotion of merchandise), e-commerce and telecommuting.
pg. 20
Stock Control
Computers and its related technology is used to keep track of stock inventory. For
example, when an item is purchased in a store it is swiped over a barcode reader. The
reader sends a message to the stock computer to update the record of that particular
item – decreasing the stock by one.
The reverse occurs when items are added to stock and scanned by a reader in the
warehouse. This system allows companies to set up their system to automatically re-
order a quantity of an item. When the number of items sold diminishes to a point where
the stock is at a low level – the designated reorder level – the system can warn the stock
manager to re-order.
E-commerce
Electronic commerce consists of buying, selling, marketing and servicing of products and
services over computer networks. It also includes the transfer of funds in the buying
process. There are two types of e-commerce:
B2C or Business to Customer (where businesses retail their supply goods and
services over the Internet to individual private consumers).
B2B or Business to Business (where businesses supply other businesses with
products and services that are required in the operations of that business).
Telecommuting
This is also called teleworking. It is working from home and communicating with
colleagues and customers using computer facilities – modem, telephony, e-mail,
teleconferencing and faxing. Telecommuting can be part-time or full-time.
Computers in Education
pg. 21
Computer-Assisted Assessment (CAA)
This is the use of computers to assist in the marking of examination scripts, such as
multiple choice papers.
This is the use of computers and appropriate computer software to allow students to
learn at their own pace, and/or create a more interesting learning environment in which
teaching material is presented.
CML or CMI are administrative tools used in education to organize students’ data and
timetables and in libraries to manage indexes.
Online Library
pg. 22
or law libraries, or general libraries that cover a wide range of subject areas. Some
require you to register and subscribe to their service by paying either a monthly or
annual fee. Members are given a password and a user name to allow access. Others do
not charge a fee; however , for some books and articles your access is limited to the
abstracts and summaries.
Electronic Encyclopedias
Traditional encyclopedias are now also available on CD-ROMs or online. The advantages
of these are:
They can be updated regularly; new information can be added.
The electronic versions need less storage space than the printed encyclopedia.
Distance Learning
This involves classes being conducted via the Internet, an extranet or intranet, satellite
broadcasting, interactive television and CD-ROM. It includes:
Web-based Learning (WBL)
Tele-collaboration, which means using global computer networks in
teaching/learning environment to connect students all over the world. Learners
can collaborate or work together on projects through the use of e-mails,
synchronized chat, threaded conversations and other forms of electronically
mediated conversation
Virtual classrooms, which is an online learning environment designed to carry
out some of the roles of a physical school/classroom. They are used in home
schooling.
pg. 23
Direct assembly line operations
Perform simulations
Design, draw and manipulate engineering, architectural, product, graphic and
textile designs.
Computer Aided Design (CAD) and Computer Aided Design and Drafting (CADD)
This includes the hardware and software used to draw, manipulate and design
engineering and architectural designs, electronic products and even clothing designs.
They allow adjustments, updates and duplications of designs to done easily on the
computer. CADD systems allow designers to create three dimensional (3D) objects that
can be easily manipulated, rotated and viewed from many angles. The CAD package
contains basic elements such as points, lines, circles, shapes and solids, from which all
CAD drawings are constructed. Additionally, the computer keeps track of design
dependencies, so that when a value is changed all other dependent values are
automatically changed. A high-resolution graphics monitor is needed to show the details
of drawings done with a CAD package. Some advantages of using CAD are:
The length of time it takes to draw a design is reduced.
It is easier to make changes or update the original design.
Duplicates of the design are easy to produce, to distribute to various interested
parties or other parts of the company
These systems are used to control manufacturing plant equipment and production
equipment e.g. in a car manufacturing plant or a factory that makes microprocessors for
computers. CAM translates the design into the actual product, such as moulding a bottle
or spoon. Many CAM systems use robots and sensors along with computers in the
manufacturing process. The advantages of CAM include:
Faster production of parts and products, therefore meeting customer demand.
The ability to control and maintain the quality of the product better, so that it is
produced more consistently.
pg. 24
Hardware requirements Software requirements
Robots CAD and CADD software for design and
drafting
Sensors Specialized software to control machines
Mainframes, minicomputers and CAE or Simulation
microcomputers
Printers and plotters (for printing drawings)
Light pen and digitized tablets
Monitors (high-resolution)
Robotics
Expert Systems
These systems provide a vast knowledge database of information in specific fields such
as medicine, mathematics, engineering, geology, computer science, business, law,
defense and education. Expert systems or knowledge-based systems make decisions
based on the results of questions put to the user; the program analyses input data and
provides answers at the level of an expert in the particular field. By looking at various
possibilities the computer makes the best informed decision. These systems perform the
function of a human expert consultant in a particular field, providing support for
decision making. They can also ‘suggest’ alternatives or other issues to be considered.
pg. 25
Expert systems consist of two parts: the knowledge base and the inference engine. The
knowledge base contains a large volume of information in a particular field e.g. a
medical expert system knowledge base contains a vast array of information about
different types of diseases, symptoms and possible treatments. The inference engine
complements the knowledge base; it analyses the input data using ‘reasoning’ methods
along with the knowledge base, to arrive at a conclusion. It also provides the user with
an explanation of how it arrived at its conclusion, by showing the concepts that were
used.
Security cameras
These can act as a visible deterrent to a criminal. Sometimes they are hidden in order to
catch criminals in action. They can capture video footage of a crime in progress and the
images can be used to identify the criminals. Most cameras today are linked to computer
systems which can store and process the raw data.
pg. 26
Biometric identification systems
Profiling
This involves the use of software by the police to compose a picture of an alleged
criminal based on the description of a witness. The picture can then be compared to
those stored in criminal databases. This method reduces the cost of police stations
having a traditional sketch artist. It also allows the image to be sent electronically over
the Internet to other police departments.
Traffic control
Computerized traffic light systems control traffic flow using a specific sequence of
lighting managed by the computer. These sequences are adjusted throughout the day
depending of the flow of traffic. The systems use a sensor in the road to detect traffic
flow. They then process this data, adjusting the traffic lights as necessary to promote the
maximum flow of traffic at different times of the day. The data from the sensors is sent
via wire-based or fibre-optic cables to the processing computer.
Electronic surveillance
pg. 27
scanners identification and fingerprinting
identification software
Mainframes and minicomputers Profiling software
Printers Statistical analysis software
Computers in medicine
Patients’ Records
These help doctors monitor and treat patients – either at home or in hospital
intensive care – by providing 24 hour service. These are computerized systems
that monitor a person’s vital signs, such as blood pressure, temperature and
heart rate, using sensors attached to the patient. The system records the
information at specific intervals and may sound an alert in the event of a
dangerous abnormality in the readings.
Magnetic Resonance Imaging (MRI) uses magnets to create two and three
dimensional images of tissues such as the brain. The images are
processed by computers for analysis by doctors. This helps to detect
strokes, tumours, infections and even haemorrhages.
Computer Axial Tomography (CAT) scanning: A CAT scanner is an X-Ray
tube that takes as many as 30 pictures per second as it rotates around the
patient. The computer reconstructs a three dimensional view of parts of
pg. 28
the patient’s body from the pictures taken. This aids in the diagnosis of
brain diseases, tumours and so on.
Computers in Entertainment
The natural sounds of most musical instruments have been digitized into electronic
versions and can now be played from a single instrument such as a keyboard. When the
keyboard is connected to a computer you can record, play back and enhance music.
Software can be used to edit sound and music clips, and these clips can be inserted into
other pieces of music.
pg. 29
Games
Computers are used to play games for both entertainment and education e.g. Nintendo,
Game Boy, Marble Blast and Bookworm.
In addition to robots, expert systems, CADD, CAE, CAM, and telemarketing another
emerging technological trend is teleconferencing.
Teleconferencing
Objective 4.8 Assess the impact of Information Technology on job skills and
careers;
The effects of computers have been both good and bad – there has been job loss, job
creation and changes in job skills.
Office Employees
Teachers
pg. 30
Use word-processors to prepare exercises and notes
Use presentation software to make demonstrations
Use the Internet for research purposes and teach students how to do so
Teach students how to use the multimedia, simulation or tutorial software
designed to aid learning
Use spreadsheets applications to record and calculate students’ marks
Assemble the main parts of a computer and do simple troubleshooting
Engineers
Use CAAD software, simulation software and in some cases graphics plotters
Design computer-based process control systems
Medical personnel
Musicians
Do sound sampling
Record sounds
Do music synthesizing
Edit songs and add special effects
Movie Industry
pg. 31
Law Enforcement Personnel
Loss of Jobs
Because of automation, some jobs have become extinct. Many jobs previously
performed by humans are now being performed by computers or computer technology.
Automated assembly lines e.g. car production plants, can perform many assembly jobs
more efficiently and effectively than humans. As a result, significant job losses have
occurred in production lines over the world.
Automation has also been used to replace humans where the jobs are boring,
monotonous or dangerous. Dangerous or potentially hazardous jobs, such as handling
chemicals are now often done by robots instead of humans. In other cases, job losses
have occurred because jobs previously requiring two or more persons to do them are
now being done by just one person with a computer.
Job Creation
Even though computers have caused job loss, it has also created millions of new jobs.
Some jobs have been created as direct result of computerization in areas such as
research, design, manufacturing, programming, maintenance, communication,
education, consultation, marketing and security.
Computers have also made jobs more accessible to the disabled person.
Because of the introduction of computers in the work place, many workers now need
new skills or upgrading of old ones. Many jobs now require basic computer knowledge
and thus workers require retraining e.g. office secretaries are now being asked to use
word processors instead of typewriters; draughtsmen and architects are now required to
produce drawings and designs using CAD software.
pg. 32
Computers have changed the way people do their jobs. People can work from anywhere,
outside of normal working hours, using their laptops i.e. telecommuting. Teachers can
send homework to absent students via e-mail, after normal school hours. A police officer
can access and retrieve information from their police car instead of having to return to
headquarters.
N.B. System programmers write systems software, such as programs to monitor and
control peripherals. Their roles are the same as a programmer.
pg. 33
Communicate with, motivate and lead a number of highly skilled people
Be aware of the latest developments in the IT field
Read reports on the system’s performance and develop strategies to improve it
Meet users and members of other departments to discuss problems
encountered with the system or new projects for computerization
Prepare budget projections for the department
Interact with managers and users to ensure that the database is accomplishing
what they need
Meet with users to make modifications to the database whenever there are
changes in the company’s operation
Ensure that the database is performing at its optimum at all times to meet the
needs of its users
Develop policies and procedures to ensure the security and integrity of the
system
Select and maintain database management software
Co-ordinate database design
Establish backup and recovery procedure in case of failure or loss of data
Establish a data dictionary that records company-wide data definitions and
standards
Co-ordinate the data collection and storage needs of users
pg. 34
Roles or duties of a Computer Engineer
pg. 35