Wednesday, May 19, 2010
Class work
Wednesday, April 14, 2010
Case Study- class and vocab words
ITGS HL2 2010 Midyear Exam
Refer to the Healthcare in an East African country case study and to your own related research in responding to the following questions.
1. Define the following terms:
(a) internet [2 marks]
A computer network that connects computers across the world
(b) intranet [2 marks]
A restricted network that only connects specific computers (not restricted by location)
2. (a)"Dr Ogola wants the Western Province to be in the forefront of medical care in the future and to be an example for other provinces to follow. The key to this transformation will be the development of an integrated IT system linking the hospital and the outlying clinics" (lines 84-86). Explain the purposes of the following in a client-server network:
(i) server [2 marks]
A server would be the computer where all of the data is stored. This would be the computer which house the EMR.
(ii) firewall [2 marks]
is part of the intranet which is used for blocking unwanted accesses, in this case it is preventing outside people to view the EMR. The Fire wall also
(iii) security software [2 marks]
Software which protects against hackers, and virus.
(b) Examine two methods Dr. Ogola can use to ensure the security of the data he intends to transmit among the medical centers of the Western Province. [8 marks]
Two methods Dr.Ogola can use to ensure the security of the data that he intends to transmit among the medical centers of the Western Province would be to, encrypt the data, and also to create an intranet with a very specific access key. Which would ensure that only a select few could.
The benefits to encrypting the data with a complex key, would be to insure that even if someone did attain access to the data that they would not be able to understand it, and read the medical files.
One way to create a very secure intranet is to give out key chains which wirelessly connect to the server and every hour or so, a new combination of letters and numbers appear on the keychain so that inorder to access the site the user has to provide a user name and the number letter code on the key chain piece.
3. "In 2007, there was a significant loss of data when the system crashed due to a power surge. An effective disaster recovery and backup plan was not in place and has still not been implemented" (lines 72-74).
Evaluate two possible strategies that Dr. Ogola could adopt in order to reduce the problems with major system crashes. [12 marks]
Two possible strategies that Dr. Ogola could adopt would be to have an external hard drive which is updated every day and stored in a different location, or to work off of an Intranet so that the data is always stored online.
Having an external hard drive would reduce to problems with having major system crashed. If having an external hard drive is implemented then if there is a system crash, all of the lost information could be retained by collecting it off of the external hard drive. The best way to go about having an external hard drive is to set one person responsible to export the data every day, and then to store the external hard drive at a separate location in case of a fire or flood because in that case the computers and the hard drive would be destroyed if it was kept at the same location.
Another solution to the problem would be to create an intranet which would allow documents and files to be stored online, and to be worked on online. This is safe depending on how secure the intranet is. It would still be smart to back up the server from time to time as well with an external hard drive.
4. (a) Describe two advantages of a peer-to-peer network. [4 marks]
(b) State two ways clinics in outlying areas could use mobile phones to effectively support healthcare. [2 marks]
a. Two advantages to a peer to peer network is that, with the system it is very easy to share files because, the files are stored on each individual computer so that when they are needed by another user they can be attained very easily and the fact that they are relatively easy to create.
b. Two ways that clinics in outlying areas could use mobile phones to effectively support healthcare is that, they can help to connect remote doctors to hospital doctors if there is a sickness that is unknown that hospital doctors might know what to do. And also if PDA are used, the doctors could use those instead of computers, which would save money.
5. (a) Describe two ways an EMR management system could lead to better healthcare in the Western Province. [4 marks]
An EMR management system could lead to a better healthcare in the Western Province because it makes it easier to share files. This is a benefit because now doctors can share files with more modern hospitals and send patients there. This implies that the hospitals do not need to do all of the tests that the local doctors have already done.
Another way that EMR Management system could lead to better healthcare is because if there was a disaster, and if the EMR system was properly backed up then nothing would happen. But if the system has not be implemented and only paper is used then everything will be lost.
(b) Explain how the main hospital and the outlying clinics can use IT to exchange information. [8 marks]
The Main hospital and the outlying clinics can use IT to transmit data by using an Intranet. This is beneficial because an intranet it built so that data is updated
6. "The government has recently started improving Internet coverage, including WiFi and Broadband Wireless Access, as well as increasing the number of mobile phone providers licensed to operate in the country." (lines 76-78)
Evaluate the use of WiFi and Broadband Wireless Access as means of connecting the various health facilities of the Western Province. [12 marks]
Case Study vocab words
Backup Software-Software that allows copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.
can you find an example of a brand name with specific features it offers? -Justin Scott 6/1/09 9:18 AM
Broadband Wireless Access-Wireless Broadband is a fairly new technology that provides high-speed wireless internet and data network access over a wide area. how wide of an area? -Justin Scott 6/1/09 9:19 AM
Client/server network-A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network.
CT scanner (CAT Scan)- Tomography (a method of producing a three-dimensional image of the internal structures of a solid object (as the human body or the earth) by the observation and recording of the differences in the effects on the passage of waves of energy impinging on those structures) in which computer analysis of a series of cross-sectional scans made along a single axis of a bodily structure or tissue is used to construct a three-dimensional image of that structure. The technique is used in diagnostic studies of internal bodily structures, as in the detection of tumors or brain aneurysms.
-A machine does imaging of you body to look for growths and other things that shouldn't be there.
Data redundancy- The occurrence of values for data elements more than once within a file or database. (this is bad because: One of the biggest disadvantages of data redundancy is that it increases the size of the database unnecessarily. Also data redundancy might cause the same result to be returned as multiple search results when searching the database causing confusion and clutter in results.)
Disaster recovery-Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption of applications, data, hardware, communications (such as networking) and other IT infrastructure. A business continuity plan (BCP) includes planning for non-IT related aspects such as key personnel, facilities, crisis communication and reputation protection, and should refer to the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. This article focuses on disaster recovery planning as related to IT infrastructure.
Embedded IT systems-Any electronic system that uses a computer chip, but that is not a general-purpose workstation, desktop or laptop computer. Such systems use microcontrollers (MCUs) or microprocessors (MPUs), or they may use custom-designed chips. Deployed by the billions each year in myriad applications, the embedded systems market uses the lion's share of all the electronic components in the world.Embedded systems are employed in automobiles, planes, trains, space vehicles, machine tools, cameras, consumer electronics, office appliances, network appliances, video games, cellphones, PDAs, GPS navigation as well as robots and toys. Low-cost consumer products can use microcontroller chips that cost less than a dollar. See microprocessor and microcontroller.
EMR- Electronic Medical Records-An electronic medical record (EMR) is a medical record in digital format. In health informatics and most contexts, EMR and EHR (electronic health records) are used synonymously, but many people define an EMR as just the physician interface and EHR including both a physician and patient interface. The term has sometimes included other systems which keep track of medical information, such as the practice management system which supports the electronic medical record.
Failover systems-Failover is the capability to switch over automatically to a redundant or standby computer server, system, or network upon the failure or abnormal termination of the previously active server, system, or network. Failover happens without human intervention and generally without warning, unlike switchover.Systems designers usually provide failover capability in servers, systems or networks requiring continuous availability and a high degree of reliability.
File server-In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.
A program or mechanism that enables the required processes for file sharing can also be called a file server. On the Internet, such programs often use the File Transfer Protocol (FTP).
Fire wall-computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users (as of the Internet)
Internet-an electronic communications network that connects computer networks and organizational computer facilities around the world
Intranet-a network operating like the World Wide Web but having access restricted to a limited group of authorized users (as employees of a company)
LAN hardware and software- A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office or building.
Network server- A computer system that serves as a central repository of data and programs shared by users in a network.
Peer-to-peer network- A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network
Security software and hardware-
Software- McAfee
Hardware- Biometrics
Server-a computer in a network that is used to provide services (as access to files or shared peripherals or the routing of e-mail) to other computers in the network
VPN- Virtual Private Network- A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost.
WiFi- The term Wi-Fi is often used by the public as a synonym for wireless LAN (WLAN); but not every wireless LAN product has a Wi-Fi certification, which may be because of certification costs that must be paid for each certified device type.
Tuesday, March 30, 2010
In Class Work- Paper 1
Friday, March 26, 2010
Area of Impact: Health
Monday, March 15, 2010
Simulation Pratice
ITGS SL1/HL2
Modeling/Simulations Practice
1. When customers visit a supermarket, they do not expect to wait in checkout queues for too long, however the supermarket manager cannot afford to have all the checkouts open all of the time.
In an attempt to solve the problem the supermarket manager may decide to make a computer model using a spreadsheet to calculate the optimum number of checkouts that should be open at any time. N07P1
(a) Define the term computer model. (2)
Computer model is a simulation of a real life situation like a check out line a grocery store that allows variables to be changed in order to receive the most possible productivity.
(b) Describe two inputs into the model that would be needed in order to calculate the best number of checkout operators. (4)
Two different inputs that could be used could be, a key board for alternating the data also sensors which automatically collect data from the check out machines.
(c) Explain why this or any other computer model may not give accurate results. (4)
This and other computer models like it could potentially not give accurate results because there are going to be other variables that can not be accounted for. this would cause the rate of costumers to change and then the amount that the grocery store opens would not be correct. Another way that the table could not work completely is because the grocery store can account for holidays but there are other holidays and special events that they will not be able to calculate, there might be a big local game so everyone goes to the store that night or something along those lines.
2. Computer models and computer simulations are often used by businesses to test and train staff. One situation where a computer simulation is used is in the training of airline pilots. M07P1
(a) Define the term computer simulation. (2)
Computer simulation is a situation that is completely simulated- pilots are often trained using this sort of technology.
(b) Describe two input devices that would be used in a pilot training computer simulation. (4)
Two input devices that a pilot uses are the joy stick thing that they use to steer the plane and also another input device would be all of the buttons in which control the wings, wheels, air pressure, and others as well.
(c) Explain one benefit and one problem associated with training pilots on simulators instead of using real planes. (4)
One benefit to training pilots in simulations instead of real life is that they are not liable for the really expensive planes if they do "crash" while they are learning. One draw back is that it is a simulation, yes if it is good enough to train people with it must have a lot of the different variables connected into it, but there is nothing like first hand experience, and truly learning how to fly the plane and how it feels like.
Monday, March 8, 2010
Vocab
Monday, March 1, 2010
Class work
- I agree with this statement but in the reading it refers to an idea of a potential new ice age, this is obvisoly incorrect and it shows that computer modeling is not always correct. This is correct because all of these different studies used computer models, The models use past knowledge and then create a hypothesis for the future based on what was entered into the computer model.
- Income tax- that is forumal based
- moon- science based
- co2 science based
- optical fiber- 30 years is a long time
- speed of a boat- conditions are always different
- The number of tons in the known reserves of an important natural resources say copper
- the average amount of the resource used per person (worldwide) per year
- the total population of the world.