You are on page 1of 18

Section 4: Applications and implications of information and communications

technology

Internet and communications technology


3
Data communications home, school computer laboratory, office
building, or closely positioned group of buildings.
and networks
Metropolitan Area Network (MAN)
What is data communications? MAN is a high-speed network that connects local
area networks in a metropolitan area such as a city
Data communication is the transmission of data or town and handles the bulk of communications
from one point to another via transmission activity across that region. A MAN typically
channels. includes one or more LANs.

What is transmission channel? Wide Area Network (WAN)

Transmission channel refers to the different media WANs are networks that covers a large
that can be used to move data. Transmission geographic area (such as a city, country, or the
media are cables and airwaves used to carry data world) using a communications channel that
from one point to another. combines many types of media such as telephone
lines, cables, and radio waves. A WAN can be one
large network or can consist of two or more LANs
What is a network? connected together. The Internet is the world’s
largest WAN.
A network is a collection of computers and
devices connected together, often wirelessly, via
communications devices and transmission media, What is a transmission
allowing computers to share resources, such as medium?
hardware, software, communication facilities, data
and information. Transmission media are materials or substances
capable of carrying one or more signals in a
Each computer or device on the network, called a communications channel.
node.
Types of transmission media
Types of networks 1. Wired/cable
1. Local Area Network 2. Wireless.
2. Metropolitan Area Network
3. Wide Area Network.

Local Area Network (LAN)


LAN is a network that connects computers and
devices in a limited geographical area such as a Wired/cable transmission media

4
What is a transmission
twisted pair Bandwidth?
A bandwidth is the amount of data, instructions,
and information that can travel over a
communications channel. The higher the
bandwidth, the more the channel transmits.
Coaxial

Types of transmission media


1. Narrowband: Narrowband is a term used to
fibre-optics describe an Internet connection speed that is
most commonly associated with a dial-up
connection. Using phone lines and
transmitting over voice-grade frequencies,
the highest effective speed a connection can
Wireless media
provide is approximately 56k, which is
infra-red 56,000 bits per second.

2. Broadband: Broadband is a high-speed


microwave Internet connection provided through cable,
DSL, fiber optics, radio signals, or satellite.
Broadband media transmit multiple signals
simultaneously.

satellite 3. Voiceband: Voiceband is a term applied to


the "group" or band of frequencies that cover
the range of human hearing. That range is
Wireless network technology generally 20 Hertz (Hz or 20 cycles per
1. Bluetooth second – 20 cps) to 20 kiloHertz. That's 20
Hz to 20 kHz in the shorthand of the trade.
2. Wi-Fi

Types of communication modes


The communication modes are:

1. Simplex: Simplex communication is


permanent unidirectional communication.
Some of the very first serial connections
between computers were simplex
connections.

5
2. Half duplex: A half duplex link can
communicate in only one direction, at a
time. Two-way communication is possible,
but not simultaneously. Walkie-talkies and
CB radios sort of mimic this behavior in that
you cannot hear the other person if you are
talking

3. full duplex: Full duplex communication is


two-way communication achieved over a
physical link that has the ability to
communicate in both directions
simultaneously

6
7
Internet, Intranet and Extranet Internet Relay Chat (IRC)
Internet Relay Chat allows users to go online at
What is Internet? the same time and exchange text or audio
Internet is the worldwide collection of networks messages in real time.
that connects millions of businesses, government
agencies, educational institutions, and individuals.
Telnet
Telnet is a terminal emulation program for
What is Intranet? TCP/IP networks such as the Internet. The Telnet
An intranet (intra means within) is an internal program runs on your computer and connects your
network that uses Internet technologies. Intranets PC to a server on the network.
generally make company information accessible
to employees and facilitate working in groups.
File Transfer protocol (FTP)
Simple intranet applications include electronic
publishing of organizational materials such as File Transfer Protocol is an Internet standard
telephone directories, event calendars, procedure that permits file uploading and downloading with
manuals, employee benefits information, and job other computers on the Internet.
postings.
Uploading
What is Extranet? Uploading is the process of transferring
Extranet refers to an intranet that is partially documents, graphics, and other objects from a
accessible to authorized outsiders. Whereas an computer to a server on the Internet.
intranet resides behind a firewall and is accessible
only to people who are members of the same Downloading
company or organization, an extranet provides
various levels of accessibility to outsiders. Downloading is the process of a computer
receiving information, such as a Web page, from a
server on the Internet.
Concepts associated with Internet
World Wide Web (WWW)
Electronic mail (E-mail)
The World Wide Web, or Web, consists of a
Electronic mail is the transmission of messages worldwide collection of electronic documents.
and files via a computer network. Each electronic document on the Web is called a
Web page, which can contain text, graphics,
Newsgroup animation, audio, and video. Additionally, Web
pages usually have built-in connections to other
Newsgroups are online discussion groups where documents.
users with common interest, anywhere in the
world, can share their views.

8
Web browser
 Errors that occur when data is transmitted
A Web browser, or browser, is application
from one computer to another.
software that allows users to access and view
Web pages or access Web programs.
 Software bugs or viruses.

Hyper Text Transfer Protocol (HTTP)  Hardware malfunctions, such as disk crashes
Hyper Text Transfer Protocol is a set of rules that
defines how pages transfer on the Internet.  Natural disasters, such as fires and floods.

Hyper Text Markup Language (HTML) What are the measures to maintain data
integrity?
Hypertext Markup Language is a special
formatting language that programmers use to
format documents for display on the Web. Some of the measures to maintain data integrity
are categorized in:
Similarly, XHTML (extensible HTML) is a
markup language that enables Web sites to be
1. software restriction
displayed more easily on micro browsers in smart
2. physical access restriction
phones and other mobile devices, as well as on
3. archiving
desktop and notebook computers.
4. backup and recovery procedures
5. Propriety data and software.
Website
A Website is a collection of related Web pages. Software restrictions
Software restrictions include
Blog A password is a private combination
A blog is web site consisting of time-stamped of characters associated with the user
Password
articles, or posts, in a diary or journal format, name that allows access to certain
usually listed in reversed chronological order. computer resources, restricting access
to only authorized users.
Encryption is the process of encoding
Measures to secure data and encryptio
n
data and information to an
maintain data integrity unreadable form.
protection Antivirus software is a utility that
searches a hard disk for viruses and
What is data Integrity?
removes any that are found. Most
Data integrity refers to the validity of data that is
how accurate and complete data is. Data integrity antivirus programs include an auto-
can be compromised in a number of ways: update feature that enables the
program to download profiles of new
 Human errors when data is entered
viruses so that it can check for the

9
new viruses as soon as they are
discovered.
Firewall is hardware and/or software Archiving
that protect a network’s resources Archiving is preserving files that are no longer in
firewall
from intrusion by users on another use on a regular basis. There are physical
network such as the Internet. archiving and software archiving. Files can be
placed in archive in specific storage space on the
hard disk or stored on secondary media such as
Physical access restriction microfiche, CD-R and Magnetic tape.
Physical access restrictions include:
Backup and recovery procedures
1. Biometric systems
To copy files to a second medium (a disk or tape)
2. guards as a precaution in case the first medium fails. One
3. Locks of the cardinal rules in using computers is back up
your files regularly. A Disaster Recovery Plan, a
Biometric systems plan for business continuity in the event of a
disaster that destroys part or all of a business's
In computer security, biometrics refers to resources, including IT equipment, data records
authentication techniques that rely on measurable and the physical space of an organization. The
physical characteristics that can be automatically goal of a DRP is to resume normal computing
checked. There are several types of biometric capabilities in as little time as possible.
identification schemes:

Guards Propriety data and software


Security guards can also be used to prevent and The data and software developed and used
restrict access to building and rooms with exclusively by the organization is known as
computers. proprietary data and must often is used by
employees for day to day operations.
Organisations go to great lengths to protect the
Locks
integrity and security of this data
Various types of computer controlled locks are
available to protect rooms and buildings with Storing data in separate building can also help to
computer. protect total data loss.

Fire/water proof cabinets


Storage media and company files can be stored in
fireproof cabinets to physically protect them.

10
11
Applications and implications
This subsection describes how data are stored and manipulated within the computer system

The ways by which information Software piracy


can be misused Software piracy is the unauthorized copying of
software. Most retail programs are licensed for
1. Violation of privacy use at just one computer site or for use by only
one user at any time. By buying the software, you
2. Propaganda become a licensed user rather than an owner (see
3. Software piracy EULA). You are allowed to make copies of the
program for backup purposes, but it is against the
4. computer fraud law to give copies to someone.
5. Electronic eavesdropping
6. Industrial espionage
Computer fraud
7. Surveillance Computer Fraud is the use of computer and
electronic devices and software to carryout illegal
8. Storage of inaccurate information activities.
9. Identity theft
10. Credit card fraud Electronic eavesdropping
Electronic eavesdropping is the use of electronic
Violation devices to monitor electronic communications
A computer user's privacy can be violated in one between two or more persons/group without their
or more of the following ways, miss use of their permission.
personal information, unauthorized access to their
personal information, electronic eavesdropping, Industrial espionage
industrial espionage, and surveillance Industrial espionage describes activities such as
theft of trade secrets, bribery, blackmail, and
Propaganda technological surveillance. As well as spying on
commercial organizations, governments can also
Propaganda is a form of communication aimed at
be targets of commercial espionage.
influencing the attitude of a community toward
some cause or position. As opposed to impartially
providing information, propaganda in its most Surveillance
basic sense, presents information primarily to Surveillance is the monitoring of the behavior,
influence an audience away from some other activities, or other changing information, usually
information. The internet is an important tool in of people and often in a surreptitious manner.
the spreading of this type of information. Computer surveillance is the act of performing
surveillance of computer activity, and of data

12
stored on a hard drive or being transferred over Appropriate hardware and
the Internet.
software
Storage of inaccurate information Open source verses proprietary
Open source software is a software product in
which the code used to write it is available to all,
Identity theft
and may be improved and distributed freely.
Identity theft is a term used to refer to fraud that Though most may be familiar with open source
involves someone pretending to be someone else applications that are available for Windows®
in order to steal money or get other benefits. based systems, software is available over a wide
variety of platforms including Mactintosh® and
Credit card fraud Linux® systems.

Credit Card fraud is a wide-ranging term for theft Proprietary software is specifically licensed and
and fraud committed using a credit card or any exclusively owned by a company or person. There
similar payment mechanism as a fraudulent source are specific rights associated with proprietary
of funds in a transaction. ownership that protect the owner from the creation
of imitation products that possess the same
features and functions.

Appropriate hardware and


software

Business
Hardware – POS, barcode readers, personal
computers, printers, magnetic card
readers

Software – Inventory software, accounting,


word processing, spreadsheet

Banks
Hardware – Mainframe computers, personal
computers, printers, MICR, Magnetic
Card Readers (ATM and hand held),
Currency counters, Camera system

Software – Accounting, Database, Word


processing, Data security, Network,

13
Video conferencing,
Internet/intranet/extranet and e-mail Software – Database software, Biometric
software identification Software, Composite
profiling software, Statistical
analysis software.
Industry
Hardware – Robots, Sensors, Mainframe, Medicine
Printers, Plotters, Light Pen and
Hardware – mainframe, Sensors, printer,
Digitizing Tablets.
Magnetic Resonance imaging,
computer axial tomography,
Software – CAD, CADD, Specialized software to
scanning (X-ray tubes)
control machines.
Software – Database management software,
Patient monitoring system software,
Science and technology
Expert systems imaging software.
Hardware – Robots, Sensors, Voice recognition
systems, voice synthesis systems,
Recreation and Gaming
Virtual Reality systems (devices such
as special clothing, head gear, data Hardware – Microcomputer, Speakers, gaming
gloves, joysticks and handheld consoles, gaming wheel, joystick,
wands) game-pad

Software – Software to control machinery, Software – Music recording and editing software,
Virtual reality software, Voice animation software, special effects
recognition and voice synthesis software, actual games.
software, Expert systems.
Music Industry
Education Hardware – Microcomputer, Speakers, Music
Hardware – Computers, Printers, scanners, (MIDI) consoles.
Devices for learning for the disabled
Software – Music recording and editing software
Software – Word processing, web and video
conferencing, CAI and CAL and with special effects, database software.
CAA, Database software,
spreadsheets Weather forecasting
Hardware – Supercomputers, Satellites, Radar,
Law enforcement Weather balloons, sensors, (pressure,
humidity, temperature), plotters,
Hardware – Camera (surveillance equipment),
printers.
biometric identification systems,
scanners, mainframe, Printers.

14
Software – Database software, Statistical
software, Weather model forecasting
software. Computer Aided Drafting and Design
Current and emerging (CADD)
technological trends
Computer-aided design and drafting uses a
Professional workers, such as engineers, require computer and special software to aid in
specialized software and systems to perform their engineering, drafting, and design CADD offers
tasks.
several advantages over traditional manual
drafting methods. CADD software, for example,
Expert systems allows engineers to view single or multiple layers
An expert system is an information system that of an airplane’s design. The layers might include
captures and stores the knowledge of human electrical systems, flight control systems, and
experts and then imitates human reasoning and passenger seating. Using CADD, the engineer can
decision making. detect areas where the systems may interact
improperly.
Expert systems consist of two main components: a
knowledge base and inference rules. A knowledge
base is the combined subject knowledge and Computer Aided Engineering (CAE)
experiences of the human experts. The inference Computer-aided engineering (CAE) uses
rules are a set of logical judgments that are computers to test product designs. Using CAE,
applied to the knowledge base each time a user engineers can test the design of a car or bridge
describes a situation to the expert system. before it is built. These sophisticated programs
Expert systems help all levels of users make simulate the effects of wind, weight, temperature,
decisions. and stress on product shapes and materials. CAE
also allows engineers to create a computer
prototype for use in testing under a variety of
Robots conditions, such as hurricanes and earthquakes.
A robot is a device that responds to sensory input, Engineers sometimes use 3-D visualization, which
usually under the control of programs that runs allows them to interact with a product without the
automatically without human intervention. need to build a prototype.
Typically, a robot is endowed with some artificial
intelligence so that it can react to different Computer Aided Manufacturing (CAM)
situations it may encounter. Robotics is one
branch of artificial intelligence. Robots are now Computer aided manufacturing is the use of
widely used in factories to perform high-precision computers to control production equipment.
jobs such as welding and riveting. They are also CAM production equipment includes software-
used in special situations that would be dangerous controlled drilling, lathe, welding, and milling
for humans, for example, in cleaning toxic wastes machines.
or defusing bombs.

15
Impact of information
Computer integrated manufacturing
(CIM)
technology on jobs
Computer integrated manufacturing uses
computers to integrate the many different The effect of information technology on
operations of the manufacturing process, using the work place
technologies such as CADD, CAE, and CAM.
Social impact
Using CIM for example, a factory can link
individual processes so that production is Less social contact, large increase in the use of
balanced, efficient, driven by customer demand, computer games promotes time wasting although
and results in high-quality products. some are educational. It may be easier to keep in
touch with people.

Telemarketing Work pattern


Telemarketing is the use of the telephone as an Telecommuting is on the increase,
interactive medium for promotion and sales. (Telecommuting, e-commuting, e-work, tele
work, working from home (WFH), or working
Teleconferencing at home (WAH) is a work arrangement in which
employees enjoy flexibility in working location
Teleconferencing is to hold a conference via a
and hours. In other words, the daily commute to a
telephone or network connection. Computers have
central place of work is replaced by
given new meaning to the term because they allow
telecommunication links.
groups to do much more than just talk. Once a
teleconference is established, the group can share I.T. has created a cashless society-Electronic
applications and mark up a common whiteboard. Funds Transfer, credit and debit cards
There are many teleconferencing applications that
work over private networks. One of the first to
Employment
operate over the Internet is Microsoft's
NetMeeting. Practical skilled jobs on the decline, more
efficient I.T. base system may cause redundancy.
New jobs are being created in I.T. related field
worker may need to be re-trained.

Health and Safety


Computer related illnesses - repetitive strain
injury, computer vision syndrome, Lower back
Pain, Carpel tunnel syndrome and tendonitis. I.T.
devices such as monitor also present radiation
hazards.

16
Computer skills Medical personnel

The computer industry has created thousands of Skills needed are expert system consultation,
high-tech jobs, even in companies whose primary budgeting, manipulating various health devices,
business is not computer related. Job opportunities good communication, computer skills, document
in the computer industry generally are available in processing and conducting teleconferencing.
one or more of these areas:
Musicians
 General business and government
organizations and their IT departments Skills needed are sound editing etc, use of MIDI,
computer skills, music notation software to
 Computer equipment field compose music and preparing lyrics, retrieving
sound (music) from storage media.
 Computer software field
Mass media personnel
 Computer service and repair field
Word processing, Database searching,
 Computer sales communication (email, fax new groups and
forums, devices for filming and sound capture and
 Computer education and training field editing.

 IT consulting
Law enforcement personnel
Word processing, internet, and database are used
Office employment
by law enforcers to prepare, search for, store and
Skills needed are electronic document preparation retrieve, etc, criminal records.
the use of word processors, Spreadsheet
PowerPoint etc, handling switchboards,
Movie industry
budgeting, communication, and basic trouble
shooting of hardware and software. Skills needed are video editing software, sound
effect and animation software and budgeting.
Teachers
Teacher use multimedia equipment, Presentation Loss of jobs
software and equipment (whiteboards, projectors Computers are often installed as part of a program
etc), electronic document preparation, using the to automate systems which were originally
internet, use of CAI and CAL software, Network manually done, in order to improve on
use, and installation and basic troubleshooting of productivity, e.g. CAM systems. This very often
hardware and software. results in loss of jobs. The introduction of
computers into organizations has also had the
Engineers opposite effect of creating job opportunities of
Software programming, installing hardware and new as well as existing workers.
software, manipulating peripherals, using
communication systems and Problem Solving.

17
Retraining Personnel in computer-related
New workers may be required to administer the professions
computer system, to do repair and maintenance, to
train users, etc. Existing workers are often This section describes the roles of various personnel in
computer-related professions.
retrained to perform the same functions on the
computer or to perform new functions created by
the computer system. E.g. sales persons may no Functions of information technology
longer need a secretary to prepare their quotations personnel
since the computer system may now allow them to
do these from their desk. If the secretary shows Programmers
the ability and interest she/he may be retrained as A computer programmer, often called a
a salesperson. developer, creates and modifies computer
programs. To create a program, programmers
sometimes write, or code, a program’s instructions
Telecommuting using a programming language.

This technology allows to remain at home or other


System analysts and engineers
location and connect by telecommunications
channels to other workers at other locations. A systems analyst works closely with users to
analyze their requirements, designs and develops
1. increased productivity for people who new information systems, and incorporates new
don't need supervision; technologies
2. Saving time and expense for travel; saving
IT managers
on expenses for office space and furniture.
I.T. Managers direct the planning, research,
development, evaluation, and integration of
Examples
technology.
1. executives who normally spend many late
hours working can do so in the comfort of Systems programmer
home;
A System Programmer installs and maintains
2. Many computer programmers tend to operating system software and provides technical
perform better outside of an office support to the programming staff.
environment.
Database administrators
A database administrator (DBA) requires a
more technical inside view of the data. The DBA
creates and maintains the data dictionary, manages
database security, monitors database performance,
and checks backup and recovery procedures.

18
Network administrators manufacturing and installation of computer or
computer-related equipment and components.
The network administrator oversees network
operations, uses the server operating system to
Software engineers
add and remove users, computers, and other
devices to and from the network. The network Software engineer confer with systems analysts,
administrator also uses the server operating engineers, programmers and others to design
system to install software and administer network system and to obtain information on project
security. limitations and capabilities, performance
requirements and interfaces. Modify existing
software to correct errors, allow it to adapt to new
File librarians
hardware, or to improve its performance. Analyze
A File librarian manages data files and programs user needs and software requirements to
stored off-line on tapes, disk and microfilm and so determine feasibility of design within time and
on. They also manage program and system cost constraints. Consult with customers about
documentation, manuals and journals. The software system design and maintenance.
librarian is responsible for all lending and return Coordinate software system installation and
transaction by personnel using the resources of the monitor equipment functioning to ensure
library. specifications are met. Design, develop and
modify software systems, using scientific analysis
Computer technicians and mathematical models to predict and measure
A computer repair technician installs, maintains, outcome and consequences of design. Develop
and repairs hardware; installs, upgrades, and and direct software system
configures software; and troubleshoots hardware
problems. A computer technician’s job is Software testers
challenging, designed for people who like to Software testers check to ensure that the
troubleshoot and solve problems, and possess a application developed works the way it was
strong background in electronics. Computer intended to, and that it is up to standard and
technicians often replace a malfunctioning quality expected.
component, such as a hard disk, at the site of the
computer equipment and then take the faulty part
Webmaster
back for repair at an office or special repair
facility. Webmasters are responsible for maintaining an
existing website by editing or updating text,
graphics and links to update the content. Also they
Computer engineers
oversee Web site performance. They can also
A computer engineer’s job description is different create new WebPages to be added to the content.
from that of a Software Engineer. A computer
engineer job description deals with hardware, with
some software integration. Research, design,
develop, and test computer or computer-related
equipment for commercial, industrial, military, or
scientific use. They may also supervise the
19
Web developer Multi-media artists
A Web-developer is a software developer who is Multimedia Artists are contemporary artists who
specifically engaged in the development of World use a wide range of media to communicate their
Wide Web applications, or distributed network art. Such media range from installation art, to
rooms containing found objects or other material,
applications that are run over the HTTP protocol
to kinetic sculpture, to sound and visual effects.
from a web server to a web browser. Design web
interfaces; develop layout design and concept;
select and secure appropriate illustrative materials
to be used. Maintain and update web site, ensuring
consistency and accuracy. Work with other
departments to enhance and maintain functionality
of website. Design and develop computer-based,
web-based, and multimedia layout, graphics, and
content for use in presentations, web sites, emails,
and other electronic media maintain existing web
applications as well as develop new applications.
Enhance interactions between applications and
SQL Server 2000. Test and document new
applications and upgrades, and train staff
members. Analyze site and e-marketing
approaches; propose internet-based advertising
and promotion methods. They also research new
technologies and trends. Communicate with
vendors to research products and resolve technical
problems. Make recommendations to department
for software and hardware purchases

Software trainer
A software trainer teaches individuals how to use
computer programs. The trainer must present
materials efficiently and at an appropriate level for
those being trained. Conduct educational
programs in information technology and systems.
Develop training coursework including creation of
technical classes. Identify training needs that is
aligned to company's vision. Observe and report
employee progress and program effectiveness.

20

You might also like