Professional Documents
Culture Documents
Applications and Implications
Applications and Implications
technology
Transmission channel refers to the different media WANs are networks that covers a large
that can be used to move data. Transmission geographic area (such as a city, country, or the
media are cables and airwaves used to carry data world) using a communications channel that
from one point to another. combines many types of media such as telephone
lines, cables, and radio waves. A WAN can be one
large network or can consist of two or more LANs
What is a network? connected together. The Internet is the world’s
largest WAN.
A network is a collection of computers and
devices connected together, often wirelessly, via
communications devices and transmission media, What is a transmission
allowing computers to share resources, such as medium?
hardware, software, communication facilities, data
and information. Transmission media are materials or substances
capable of carrying one or more signals in a
Each computer or device on the network, called a communications channel.
node.
Types of transmission media
Types of networks 1. Wired/cable
1. Local Area Network 2. Wireless.
2. Metropolitan Area Network
3. Wide Area Network.
4
What is a transmission
twisted pair Bandwidth?
A bandwidth is the amount of data, instructions,
and information that can travel over a
communications channel. The higher the
bandwidth, the more the channel transmits.
Coaxial
5
2. Half duplex: A half duplex link can
communicate in only one direction, at a
time. Two-way communication is possible,
but not simultaneously. Walkie-talkies and
CB radios sort of mimic this behavior in that
you cannot hear the other person if you are
talking
6
7
Internet, Intranet and Extranet Internet Relay Chat (IRC)
Internet Relay Chat allows users to go online at
What is Internet? the same time and exchange text or audio
Internet is the worldwide collection of networks messages in real time.
that connects millions of businesses, government
agencies, educational institutions, and individuals.
Telnet
Telnet is a terminal emulation program for
What is Intranet? TCP/IP networks such as the Internet. The Telnet
An intranet (intra means within) is an internal program runs on your computer and connects your
network that uses Internet technologies. Intranets PC to a server on the network.
generally make company information accessible
to employees and facilitate working in groups.
File Transfer protocol (FTP)
Simple intranet applications include electronic
publishing of organizational materials such as File Transfer Protocol is an Internet standard
telephone directories, event calendars, procedure that permits file uploading and downloading with
manuals, employee benefits information, and job other computers on the Internet.
postings.
Uploading
What is Extranet? Uploading is the process of transferring
Extranet refers to an intranet that is partially documents, graphics, and other objects from a
accessible to authorized outsiders. Whereas an computer to a server on the Internet.
intranet resides behind a firewall and is accessible
only to people who are members of the same Downloading
company or organization, an extranet provides
various levels of accessibility to outsiders. Downloading is the process of a computer
receiving information, such as a Web page, from a
server on the Internet.
Concepts associated with Internet
World Wide Web (WWW)
Electronic mail (E-mail)
The World Wide Web, or Web, consists of a
Electronic mail is the transmission of messages worldwide collection of electronic documents.
and files via a computer network. Each electronic document on the Web is called a
Web page, which can contain text, graphics,
Newsgroup animation, audio, and video. Additionally, Web
pages usually have built-in connections to other
Newsgroups are online discussion groups where documents.
users with common interest, anywhere in the
world, can share their views.
8
Web browser
Errors that occur when data is transmitted
A Web browser, or browser, is application
from one computer to another.
software that allows users to access and view
Web pages or access Web programs.
Software bugs or viruses.
Hyper Text Transfer Protocol (HTTP) Hardware malfunctions, such as disk crashes
Hyper Text Transfer Protocol is a set of rules that
defines how pages transfer on the Internet. Natural disasters, such as fires and floods.
Hyper Text Markup Language (HTML) What are the measures to maintain data
integrity?
Hypertext Markup Language is a special
formatting language that programmers use to
format documents for display on the Web. Some of the measures to maintain data integrity
are categorized in:
Similarly, XHTML (extensible HTML) is a
markup language that enables Web sites to be
1. software restriction
displayed more easily on micro browsers in smart
2. physical access restriction
phones and other mobile devices, as well as on
3. archiving
desktop and notebook computers.
4. backup and recovery procedures
5. Propriety data and software.
Website
A Website is a collection of related Web pages. Software restrictions
Software restrictions include
Blog A password is a private combination
A blog is web site consisting of time-stamped of characters associated with the user
Password
articles, or posts, in a diary or journal format, name that allows access to certain
usually listed in reversed chronological order. computer resources, restricting access
to only authorized users.
Encryption is the process of encoding
Measures to secure data and encryptio
n
data and information to an
maintain data integrity unreadable form.
protection Antivirus software is a utility that
searches a hard disk for viruses and
What is data Integrity?
removes any that are found. Most
Data integrity refers to the validity of data that is
how accurate and complete data is. Data integrity antivirus programs include an auto-
can be compromised in a number of ways: update feature that enables the
program to download profiles of new
Human errors when data is entered
viruses so that it can check for the
9
new viruses as soon as they are
discovered.
Firewall is hardware and/or software Archiving
that protect a network’s resources Archiving is preserving files that are no longer in
firewall
from intrusion by users on another use on a regular basis. There are physical
network such as the Internet. archiving and software archiving. Files can be
placed in archive in specific storage space on the
hard disk or stored on secondary media such as
Physical access restriction microfiche, CD-R and Magnetic tape.
Physical access restrictions include:
Backup and recovery procedures
1. Biometric systems
To copy files to a second medium (a disk or tape)
2. guards as a precaution in case the first medium fails. One
3. Locks of the cardinal rules in using computers is back up
your files regularly. A Disaster Recovery Plan, a
Biometric systems plan for business continuity in the event of a
disaster that destroys part or all of a business's
In computer security, biometrics refers to resources, including IT equipment, data records
authentication techniques that rely on measurable and the physical space of an organization. The
physical characteristics that can be automatically goal of a DRP is to resume normal computing
checked. There are several types of biometric capabilities in as little time as possible.
identification schemes:
10
11
Applications and implications
This subsection describes how data are stored and manipulated within the computer system
12
stored on a hard drive or being transferred over Appropriate hardware and
the Internet.
software
Storage of inaccurate information Open source verses proprietary
Open source software is a software product in
which the code used to write it is available to all,
Identity theft
and may be improved and distributed freely.
Identity theft is a term used to refer to fraud that Though most may be familiar with open source
involves someone pretending to be someone else applications that are available for Windows®
in order to steal money or get other benefits. based systems, software is available over a wide
variety of platforms including Mactintosh® and
Credit card fraud Linux® systems.
Credit Card fraud is a wide-ranging term for theft Proprietary software is specifically licensed and
and fraud committed using a credit card or any exclusively owned by a company or person. There
similar payment mechanism as a fraudulent source are specific rights associated with proprietary
of funds in a transaction. ownership that protect the owner from the creation
of imitation products that possess the same
features and functions.
Business
Hardware – POS, barcode readers, personal
computers, printers, magnetic card
readers
Banks
Hardware – Mainframe computers, personal
computers, printers, MICR, Magnetic
Card Readers (ATM and hand held),
Currency counters, Camera system
13
Video conferencing,
Internet/intranet/extranet and e-mail Software – Database software, Biometric
software identification Software, Composite
profiling software, Statistical
analysis software.
Industry
Hardware – Robots, Sensors, Mainframe, Medicine
Printers, Plotters, Light Pen and
Hardware – mainframe, Sensors, printer,
Digitizing Tablets.
Magnetic Resonance imaging,
computer axial tomography,
Software – CAD, CADD, Specialized software to
scanning (X-ray tubes)
control machines.
Software – Database management software,
Patient monitoring system software,
Science and technology
Expert systems imaging software.
Hardware – Robots, Sensors, Voice recognition
systems, voice synthesis systems,
Recreation and Gaming
Virtual Reality systems (devices such
as special clothing, head gear, data Hardware – Microcomputer, Speakers, gaming
gloves, joysticks and handheld consoles, gaming wheel, joystick,
wands) game-pad
Software – Software to control machinery, Software – Music recording and editing software,
Virtual reality software, Voice animation software, special effects
recognition and voice synthesis software, actual games.
software, Expert systems.
Music Industry
Education Hardware – Microcomputer, Speakers, Music
Hardware – Computers, Printers, scanners, (MIDI) consoles.
Devices for learning for the disabled
Software – Music recording and editing software
Software – Word processing, web and video
conferencing, CAI and CAL and with special effects, database software.
CAA, Database software,
spreadsheets Weather forecasting
Hardware – Supercomputers, Satellites, Radar,
Law enforcement Weather balloons, sensors, (pressure,
humidity, temperature), plotters,
Hardware – Camera (surveillance equipment),
printers.
biometric identification systems,
scanners, mainframe, Printers.
14
Software – Database software, Statistical
software, Weather model forecasting
software. Computer Aided Drafting and Design
Current and emerging (CADD)
technological trends
Computer-aided design and drafting uses a
Professional workers, such as engineers, require computer and special software to aid in
specialized software and systems to perform their engineering, drafting, and design CADD offers
tasks.
several advantages over traditional manual
drafting methods. CADD software, for example,
Expert systems allows engineers to view single or multiple layers
An expert system is an information system that of an airplane’s design. The layers might include
captures and stores the knowledge of human electrical systems, flight control systems, and
experts and then imitates human reasoning and passenger seating. Using CADD, the engineer can
decision making. detect areas where the systems may interact
improperly.
Expert systems consist of two main components: a
knowledge base and inference rules. A knowledge
base is the combined subject knowledge and Computer Aided Engineering (CAE)
experiences of the human experts. The inference Computer-aided engineering (CAE) uses
rules are a set of logical judgments that are computers to test product designs. Using CAE,
applied to the knowledge base each time a user engineers can test the design of a car or bridge
describes a situation to the expert system. before it is built. These sophisticated programs
Expert systems help all levels of users make simulate the effects of wind, weight, temperature,
decisions. and stress on product shapes and materials. CAE
also allows engineers to create a computer
prototype for use in testing under a variety of
Robots conditions, such as hurricanes and earthquakes.
A robot is a device that responds to sensory input, Engineers sometimes use 3-D visualization, which
usually under the control of programs that runs allows them to interact with a product without the
automatically without human intervention. need to build a prototype.
Typically, a robot is endowed with some artificial
intelligence so that it can react to different Computer Aided Manufacturing (CAM)
situations it may encounter. Robotics is one
branch of artificial intelligence. Robots are now Computer aided manufacturing is the use of
widely used in factories to perform high-precision computers to control production equipment.
jobs such as welding and riveting. They are also CAM production equipment includes software-
used in special situations that would be dangerous controlled drilling, lathe, welding, and milling
for humans, for example, in cleaning toxic wastes machines.
or defusing bombs.
15
Impact of information
Computer integrated manufacturing
(CIM)
technology on jobs
Computer integrated manufacturing uses
computers to integrate the many different The effect of information technology on
operations of the manufacturing process, using the work place
technologies such as CADD, CAE, and CAM.
Social impact
Using CIM for example, a factory can link
individual processes so that production is Less social contact, large increase in the use of
balanced, efficient, driven by customer demand, computer games promotes time wasting although
and results in high-quality products. some are educational. It may be easier to keep in
touch with people.
16
Computer skills Medical personnel
The computer industry has created thousands of Skills needed are expert system consultation,
high-tech jobs, even in companies whose primary budgeting, manipulating various health devices,
business is not computer related. Job opportunities good communication, computer skills, document
in the computer industry generally are available in processing and conducting teleconferencing.
one or more of these areas:
Musicians
General business and government
organizations and their IT departments Skills needed are sound editing etc, use of MIDI,
computer skills, music notation software to
Computer equipment field compose music and preparing lyrics, retrieving
sound (music) from storage media.
Computer software field
Mass media personnel
Computer service and repair field
Word processing, Database searching,
Computer sales communication (email, fax new groups and
forums, devices for filming and sound capture and
Computer education and training field editing.
IT consulting
Law enforcement personnel
Word processing, internet, and database are used
Office employment
by law enforcers to prepare, search for, store and
Skills needed are electronic document preparation retrieve, etc, criminal records.
the use of word processors, Spreadsheet
PowerPoint etc, handling switchboards,
Movie industry
budgeting, communication, and basic trouble
shooting of hardware and software. Skills needed are video editing software, sound
effect and animation software and budgeting.
Teachers
Teacher use multimedia equipment, Presentation Loss of jobs
software and equipment (whiteboards, projectors Computers are often installed as part of a program
etc), electronic document preparation, using the to automate systems which were originally
internet, use of CAI and CAL software, Network manually done, in order to improve on
use, and installation and basic troubleshooting of productivity, e.g. CAM systems. This very often
hardware and software. results in loss of jobs. The introduction of
computers into organizations has also had the
Engineers opposite effect of creating job opportunities of
Software programming, installing hardware and new as well as existing workers.
software, manipulating peripherals, using
communication systems and Problem Solving.
17
Retraining Personnel in computer-related
New workers may be required to administer the professions
computer system, to do repair and maintenance, to
train users, etc. Existing workers are often This section describes the roles of various personnel in
computer-related professions.
retrained to perform the same functions on the
computer or to perform new functions created by
the computer system. E.g. sales persons may no Functions of information technology
longer need a secretary to prepare their quotations personnel
since the computer system may now allow them to
do these from their desk. If the secretary shows Programmers
the ability and interest she/he may be retrained as A computer programmer, often called a
a salesperson. developer, creates and modifies computer
programs. To create a program, programmers
sometimes write, or code, a program’s instructions
Telecommuting using a programming language.
18
Network administrators manufacturing and installation of computer or
computer-related equipment and components.
The network administrator oversees network
operations, uses the server operating system to
Software engineers
add and remove users, computers, and other
devices to and from the network. The network Software engineer confer with systems analysts,
administrator also uses the server operating engineers, programmers and others to design
system to install software and administer network system and to obtain information on project
security. limitations and capabilities, performance
requirements and interfaces. Modify existing
software to correct errors, allow it to adapt to new
File librarians
hardware, or to improve its performance. Analyze
A File librarian manages data files and programs user needs and software requirements to
stored off-line on tapes, disk and microfilm and so determine feasibility of design within time and
on. They also manage program and system cost constraints. Consult with customers about
documentation, manuals and journals. The software system design and maintenance.
librarian is responsible for all lending and return Coordinate software system installation and
transaction by personnel using the resources of the monitor equipment functioning to ensure
library. specifications are met. Design, develop and
modify software systems, using scientific analysis
Computer technicians and mathematical models to predict and measure
A computer repair technician installs, maintains, outcome and consequences of design. Develop
and repairs hardware; installs, upgrades, and and direct software system
configures software; and troubleshoots hardware
problems. A computer technician’s job is Software testers
challenging, designed for people who like to Software testers check to ensure that the
troubleshoot and solve problems, and possess a application developed works the way it was
strong background in electronics. Computer intended to, and that it is up to standard and
technicians often replace a malfunctioning quality expected.
component, such as a hard disk, at the site of the
computer equipment and then take the faulty part
Webmaster
back for repair at an office or special repair
facility. Webmasters are responsible for maintaining an
existing website by editing or updating text,
graphics and links to update the content. Also they
Computer engineers
oversee Web site performance. They can also
A computer engineer’s job description is different create new WebPages to be added to the content.
from that of a Software Engineer. A computer
engineer job description deals with hardware, with
some software integration. Research, design,
develop, and test computer or computer-related
equipment for commercial, industrial, military, or
scientific use. They may also supervise the
19
Web developer Multi-media artists
A Web-developer is a software developer who is Multimedia Artists are contemporary artists who
specifically engaged in the development of World use a wide range of media to communicate their
Wide Web applications, or distributed network art. Such media range from installation art, to
rooms containing found objects or other material,
applications that are run over the HTTP protocol
to kinetic sculpture, to sound and visual effects.
from a web server to a web browser. Design web
interfaces; develop layout design and concept;
select and secure appropriate illustrative materials
to be used. Maintain and update web site, ensuring
consistency and accuracy. Work with other
departments to enhance and maintain functionality
of website. Design and develop computer-based,
web-based, and multimedia layout, graphics, and
content for use in presentations, web sites, emails,
and other electronic media maintain existing web
applications as well as develop new applications.
Enhance interactions between applications and
SQL Server 2000. Test and document new
applications and upgrades, and train staff
members. Analyze site and e-marketing
approaches; propose internet-based advertising
and promotion methods. They also research new
technologies and trends. Communicate with
vendors to research products and resolve technical
problems. Make recommendations to department
for software and hardware purchases
Software trainer
A software trainer teaches individuals how to use
computer programs. The trainer must present
materials efficiently and at an appropriate level for
those being trained. Conduct educational
programs in information technology and systems.
Develop training coursework including creation of
technical classes. Identify training needs that is
aligned to company's vision. Observe and report
employee progress and program effectiveness.
20