Wednesday, May 19, 2010

Class work

Area of Impact: Politics and Government

a. Identify two features of Optical Character Recognition
Two features of OCR Technology is that there is a camera that records unusual behavior and a wireless transmitter which will transmit the data to a data base which can be viewed by police or other officials.

b. Describe two situations where the use of a wireless link between the camera and the network would not be possible.
Two situations where the use of a wireless link between the camera and the network be if the power went out so that the wireless transmitter would be powered off and therefore it would no longer have the capabilities to work, and another situation would be, if the range of the wireless signal could not reach the network.

c. Explain how this new expanded system will be able to detect regnoized unusual situations.
This new system can detect unusual situations because it will be programed to record when there are/are not people present depending on the location of the site. Also cars speeding through the red lights is unusual.

d. To what extend are citizen's concerns about the expanded system outweighed by the benefits of it providing continuous information to the police department .

The citizens concerns about having the system recording are understandable but they are outweighed by the benefits of it providing the continuos information to the police department.
The Citizens could think that it is an invasion of privacy because they could be being monotered if they are acting unusual. However the police department, with the opposing view would resopond with that if they withstand from unusual behavoir they do not have to worry about being monotered.
Antoher view could be that, The OCR technology would not work. and that it could either miss the crime or document something that does not matter.
In conclusion, it seems that the it is the best thing to do to instill the new technology because yes it may record people without their permission but it can help solve crimes. Also it does not matter if it falsely records data, it is a shame if it misses something important but it does not matter at all if it gets something thats unimportant.

Wednesday, April 14, 2010

Case Study- class and vocab words

ITGS HL2 2010 Midyear Exam

Refer to the Healthcare in an East African country case study and to your own related research in responding to the following questions.

1. Define the following terms:

(a) internet [2 marks]

A computer network that connects computers across the world

(b) intranet [2 marks]

A restricted network that only connects specific computers (not restricted by location)

2. (a)"Dr Ogola wants the Western Province to be in the forefront of medical care in the future and to be an example for other provinces to follow. The key to this transformation will be the development of an integrated IT system linking the hospital and the outlying clinics" (lines 84-86). Explain the purposes of the following in a client-server network:

(i) server [2 marks]

A server would be the computer where all of the data is stored. This would be the computer which house the EMR.

(ii) firewall [2 marks]

is part of the intranet which is used for blocking unwanted accesses, in this case it is preventing outside people to view the EMR. The Fire wall also

(iii) security software [2 marks]

Software which protects against hackers, and virus.

(b) Examine two methods Dr. Ogola can use to ensure the security of the data he intends to transmit among the medical centers of the Western Province. [8 marks]

Two methods Dr.Ogola can use to ensure the security of the data that he intends to transmit among the medical centers of the Western Province would be to, encrypt the data, and also to create an intranet with a very specific access key. Which would ensure that only a select few could.

The benefits to encrypting the data with a complex key, would be to insure that even if someone did attain access to the data that they would not be able to understand it, and read the medical files.

One way to create a very secure intranet is to give out key chains which wirelessly connect to the server and every hour or so, a new combination of letters and numbers appear on the keychain so that inorder to access the site the user has to provide a user name and the number letter code on the key chain piece.

3. "In 2007, there was a significant loss of data when the system crashed due to a power surge. An effective disaster recovery and backup plan was not in place and has still not been implemented" (lines 72-74).

Evaluate two possible strategies that Dr. Ogola could adopt in order to reduce the problems with major system crashes. [12 marks]

Two possible strategies that Dr. Ogola could adopt would be to have an external hard drive which is updated every day and stored in a different location, or to work off of an Intranet so that the data is always stored online.

Having an external hard drive would reduce to problems with having major system crashed. If having an external hard drive is implemented then if there is a system crash, all of the lost information could be retained by collecting it off of the external hard drive. The best way to go about having an external hard drive is to set one person responsible to export the data every day, and then to store the external hard drive at a separate location in case of a fire or flood because in that case the computers and the hard drive would be destroyed if it was kept at the same location.

Another solution to the problem would be to create an intranet which would allow documents and files to be stored online, and to be worked on online. This is safe depending on how secure the intranet is. It would still be smart to back up the server from time to time as well with an external hard drive.

4. (a) Describe two advantages of a peer-to-peer network. [4 marks]

(b) State two ways clinics in outlying areas could use mobile phones to effectively support healthcare. [2 marks]

a. Two advantages to a peer to peer network is that, with the system it is very easy to share files because, the files are stored on each individual computer so that when they are needed by another user they can be attained very easily and the fact that they are relatively easy to create.

b. Two ways that clinics in outlying areas could use mobile phones to effectively support healthcare is that, they can help to connect remote doctors to hospital doctors if there is a sickness that is unknown that hospital doctors might know what to do. And also if PDA are used, the doctors could use those instead of computers, which would save money.

5. (a) Describe two ways an EMR management system could lead to better healthcare in the Western Province. [4 marks]

An EMR management system could lead to a better healthcare in the Western Province because it makes it easier to share files. This is a benefit because now doctors can share files with more modern hospitals and send patients there. This implies that the hospitals do not need to do all of the tests that the local doctors have already done.

Another way that EMR Management system could lead to better healthcare is because if there was a disaster, and if the EMR system was properly backed up then nothing would happen. But if the system has not be implemented and only paper is used then everything will be lost.

(b) Explain how the main hospital and the outlying clinics can use IT to exchange information. [8 marks]

The Main hospital and the outlying clinics can use IT to transmit data by using an Intranet. This is beneficial because an intranet it built so that data is updated

6. "The government has recently started improving Internet coverage, including WiFi and Broadband Wireless Access, as well as increasing the number of mobile phone providers licensed to operate in the country." (lines 76-78)

Evaluate the use of WiFi and Broadband Wireless Access as means of connecting the various health facilities of the Western Province. [12 marks]

Case Study vocab words

Backup Software-Software that allows copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.

can you find an example of a brand name with specific features it offers? -Justin Scott 6/1/09 9:18 AM

Broadband Wireless Access-Wireless Broadband is a fairly new technology that provides high-speed wireless internet and data network access over a wide area. how wide of an area? -Justin Scott 6/1/09 9:19 AM

Client/server network-A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network.

CT scanner (CAT Scan)- Tomography (a method of producing a three-dimensional image of the internal structures of a solid object (as the human body or the earth) by the observation and recording of the differences in the effects on the passage of waves of energy impinging on those structures) in which computer analysis of a series of cross-sectional scans made along a single axis of a bodily structure or tissue is used to construct a three-dimensional image of that structure. The technique is used in diagnostic studies of internal bodily structures, as in the detection of tumors or brain aneurysms.

-A machine does imaging of you body to look for growths and other things that shouldn't be there.

Data redundancy- The occurrence of values for data elements more than once within a file or database. (this is bad because: One of the biggest disadvantages of data redundancy is that it increases the size of the database unnecessarily. Also data redundancy might cause the same result to be returned as multiple search results when searching the database causing confusion and clutter in results.)

Disaster recovery-Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption of applications, data, hardware, communications (such as networking) and other IT infrastructure. A business continuity plan (BCP) includes planning for non-IT related aspects such as key personnel, facilities, crisis communication and reputation protection, and should refer to the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. This article focuses on disaster recovery planning as related to IT infrastructure.

Embedded IT systems-Any electronic system that uses a computer chip, but that is not a general-purpose workstation, desktop or laptop computer. Such systems use microcontrollers (MCUs) or microprocessors (MPUs), or they may use custom-designed chips. Deployed by the billions each year in myriad applications, the embedded systems market uses the lion's share of all the electronic components in the world.Embedded systems are employed in automobiles, planes, trains, space vehicles, machine tools, cameras, consumer electronics, office appliances, network appliances, video games, cellphones, PDAs, GPS navigation as well as robots and toys. Low-cost consumer products can use microcontroller chips that cost less than a dollar. See microprocessor and microcontroller.

EMR- Electronic Medical Records-An electronic medical record (EMR) is a medical record in digital format. In health informatics and most contexts, EMR and EHR (electronic health records) are used synonymously, but many people define an EMR as just the physician interface and EHR including both a physician and patient interface. The term has sometimes included other systems which keep track of medical information, such as the practice management system which supports the electronic medical record.

Failover systems-Failover is the capability to switch over automatically to a redundant or standby computer server, system, or network upon the failure or abnormal termination of the previously active server, system, or network. Failover happens without human intervention and generally without warning, unlike switchover.Systems designers usually provide failover capability in servers, systems or networks requiring continuous availability and a high degree of reliability.

File server-In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.

A program or mechanism that enables the required processes for file sharing can also be called a file server. On the Internet, such programs often use the File Transfer Protocol (FTP).

Fire wall-computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users (as of the Internet)

Internet-an electronic communications network that connects computer networks and organizational computer facilities around the world

Intranet-a network operating like the World Wide Web but having access restricted to a limited group of authorized users (as employees of a company)

LAN hardware and software- A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office or building.

Network server- A computer system that serves as a central repository of data and programs shared by users in a network.

Peer-to-peer network- A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network

Security software and hardware-

Software- McAfee

Hardware- Biometrics

Server-a computer in a network that is used to provide services (as access to files or shared peripherals or the routing of e-mail) to other computers in the network

VPN- Virtual Private Network- A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost.

WiFi- The term Wi-Fi is often used by the public as a synonym for wireless LAN (WLAN); but not every wireless LAN product has a Wi-Fi certification, which may be because of certification costs that must be paid for each certified device type.

Wi-Fi is supported by most personal computer operating systems, many game consoles, laptops, smartphones, pri

Tuesday, March 30, 2010

In Class Work- Paper 1

4. Artificial Intelligence is one way in which computer systems are used to solve problems. It is used in many different situations, including on personal system. An example on artificial intelligence is the use of office assistant (Clippy) in Microsoft Office.

a. Define the term artificial intelligence.
Artificial intelligence is when a computer has some intelligence. It obtains this intelligence by having a programer define words, and phrases, so it "knows" what the computer user is asking it.

b. Describe how Clippy could tell that the user was writing a letter.
Clippy would be able to know that a user was writing a letter because when the programer was programing Clippy, not only defining terms it defines phases or key formats. Clippy would know the general phrases used in a letter. (ie. dear who ever, and also the formatting of starting off with an address or date in the upper right hand corner.) When Clippy recognizes these phrases it will send a dialogue box out to the user asking what to do to continue.

c. Explain why it is possible that Eliza in this conversation is not a human being but really a computer running artificial intelligence.
It is possible for Eliza to be from computer intelligence because the conversation does not make since. It does not flow like a normal conversation between two people. To start off a conversation it is never started with "Hi I'm Eliza, Tell me your problems." just like that and expect the other person to tell you the problems. The fact that the other contributer in the conversation went along with it shows that it was what they were expecting it to be a computer with artificial intelligence. Also, A key tell of that Eliza is really just a computer is because she asks what "you certainly would means" any moderate level english speaker knows what this means. When Eliza asks what it mean and then the definition that is given then is stored in her data base so in the future she will know what it means.

Friday, March 26, 2010

Area of Impact: Health

3. In many hospitals around the world, surgeons are performing surgery with the assistances of robots. Robot surgery has been taken a step further with surgeons being able to use remote-controlled robots to perform surgery on patients thousands of miles away.

a. Identify one input and one output device using in robotic surgery.

One input device is a joy stick which would control the knife in surgery. One output device is the monitor in which the doctor is watching the surgery take place on so he knows where to move the tools.

b. Describe one capability and one limitation of Robot when used in surgery.
One capability of this sort of robotic sugary is that the doctor could be out of the country or the patent could get a specialist to do the work, this would save the patient money because they no longer have to travel out of the country for the work. ONe limitation to this sort of persedure is that the robot can not be nearly as persice as a human, and if something was to go wrong with the technology, then the patient will be in danger because the doctor is not there to finish the surgery

d. Discuss one economic concern, one reliability concern and one other concern patients under going robotic surgery. Evaluate the significance of these concerns.

There are many concerns for this type of surgery. When discuss the economics behind the surgery it really matters if the surgeon being used is out of the country and there is no one else who could perform the surgery then it would be cheaper rather to have to travel. If it is such an important surgery like heart surgery then most likely doctors will not recommend flights back afterwards. This will increase the cost. In this case it would appear to be more beneficial to use to robotic surgery so the recovery could be in the comforts of home. Both cases the cost would be more but it would seem that traveling would increase the cost even more.

There are much more reliability concerns, money is something that can be earned and fixed, but if something goes wrong in surgery the patient could easily die. There are more smaller concerns as well. Being a doctor, they must have great control of their hands and not miss place the knife and accidently cut a vein, or tendon. also the input device being a joy stick, does not have nearly the control of hands. this effects the reliably because it seems that these sort of surgeries would not be as reliable as with a doctor.

Another concern would also be even with all of the protection and security, the transfer of information from the doctor to the patient must take place online which means the connection could be lost or someone could hack into maliciously. and potentially kill the patient. this is a great concern because there are people with great hacking abilities.

With all of these concerns taken into consideration, it seems like there are too many concerns to the benefits. As stated above money can be re-earned, but when someone's life/health/ and well being is on the line then the money should be spent in order to insure a surgery by a doctor doing the work is done.

Monday, March 15, 2010

Simulation Pratice

ITGS SL1/HL2

Modeling/Simulations Practice

1. When customers visit a supermarket, they do not expect to wait in checkout queues for too long, however the supermarket manager cannot afford to have all the checkouts open all of the time.

In an attempt to solve the problem the supermarket manager may decide to make a computer model using a spreadsheet to calculate the optimum number of checkouts that should be open at any time. N07P1

(a) Define the term computer model. (2)

Computer model is a simulation of a real life situation like a check out line a grocery store that allows variables to be changed in order to receive the most possible productivity.

(b) Describe two inputs into the model that would be needed in order to calculate the best number of checkout operators. (4)

Two different inputs that could be used could be, a key board for alternating the data also sensors which automatically collect data from the check out machines.

(c) Explain why this or any other computer model may not give accurate results. (4)

This and other computer models like it could potentially not give accurate results because there are going to be other variables that can not be accounted for. this would cause the rate of costumers to change and then the amount that the grocery store opens would not be correct. Another way that the table could not work completely is because the grocery store can account for holidays but there are other holidays and special events that they will not be able to calculate, there might be a big local game so everyone goes to the store that night or something along those lines.

2. Computer models and computer simulations are often used by businesses to test and train staff. One situation where a computer simulation is used is in the training of airline pilots. M07P1

(a) Define the term computer simulation. (2)

Computer simulation is a situation that is completely simulated- pilots are often trained using this sort of technology.

(b) Describe two input devices that would be used in a pilot training computer simulation. (4)

Two input devices that a pilot uses are the joy stick thing that they use to steer the plane and also another input device would be all of the buttons in which control the wings, wheels, air pressure, and others as well.

(c) Explain one benefit and one problem associated with training pilots on simulators instead of using real planes. (4)

One benefit to training pilots in simulations instead of real life is that they are not liable for the really expensive planes if they do "crash" while they are learning. One draw back is that it is a simulation, yes if it is good enough to train people with it must have a lot of the different variables connected into it, but there is nothing like first hand experience, and truly learning how to fly the plane and how it feels like.

Monday, March 8, 2010

Vocab

model- a computer design that can "predict the future"
simulation- a computer model that is designed to copy a real situation and teach people to work with it, ie, the way that pilots are trained.
feedback loop-A feedback loop (FBL), sometimes called a complaint feedback loop, is an inter-organizational form of feedback by which an internet service provider (ISP) forwards the complaints originating from their users to the sender's organizations
tutorial software- Software that shows the user how to run the program
training software- software that tells the user how to run the program
wizards and assistants- Software that helps with a specific task (normally recognizes the task then helps with it ie, completing the date)
help menu and help features- Helps the user search for and then complete specific tasks,
“Read Me” files-A file meant to be read before taking any significant action with the items in its directory

Monday, March 1, 2010

Class work

4.5 reading and questions

There was not enough time to finish

4.25 Fire departments often do "controlled burns:" that is, they carefully burn areas of brush to prevent a destructive wildfire from starting alter. some departments use a computer model to tell when it is safe to do a burn. A fire department official with 25 years experience believed the computer model was not very good. He ignored the model, used his own judgement, and did a burn safely with no problems. But he was reprimanded by his boss for ignoring the computer. Give an argument in his defense. Give an argument in support of his boss.

The worker would say that when he started working as a fire fighter, they did not have the option of this software, he learned by using reason. also he would say that his brain can take into effect all of the conditions, and really have a better understanding of what is going on. The boss would say that the company has standardized on the modeling software so he should participle in effort, the old guy does not get spacial treatment just because he is old.

4.26 suppose there are three companies that make a similar product. One does physical tests to check the safety of the product. one uses only computer simulations. the third will not disclose the testing methods it uses. suppose ou are on jury for a case where someone's is suing on of the companies because of an injury received from the product.
a. would your decision about awarding money to the plaintiff be be affected by the company's policy about testing? if so how? if not, what factors are more important to you?
b. suppose reliable data show that the injury for the product is almost identical for all three companies. With that additional information, would your decision be affected by the company's testing policy.

a. My decision about awarding money would be affected by the policys about the testing, the one company that will not release their information seem very questionable. I feel most comfortable with the physical testing and then the computer modeling close behind, and very uncomfortable with the one that is not mentioned.

b. with the second information, i would want to compare all of the testing results. If all of the different companies had the same problem then it was something that all three companies were looking over.

4.27 An article in the magazine in 1993 stated that "since the 1960's more than 100 separte studies have confirmed that doubling of the CO2 concentration would raise average surface temperatures by one to four degrees centigrade." was this an accurate statement? Explain your answer.
  • I agree with this statement but in the reading it refers to an idea of a potential new ice age, this is obvisoly incorrect and it shows that computer modeling is not always correct. This is correct because all of these different studies used computer models, The models use past knowledge and then create a hypothesis for the future based on what was entered into the computer model.
4.28 which of the following models do you think would produce very accurate results? which do you think would be less reliable?

Reliable
  • Income tax- that is forumal based
  • moon- science based
  • co2 science based
Not reliable
  • optical fiber- 30 years is a long time
  • speed of a boat- conditions are always different

4.29 suppose you have the following data:
  • The number of tons in the known reserves of an important natural resources say copper
  • the average amount of the resource used per person (worldwide) per year
  • the total population of the world.
Suppose a computer program uses these data to determine in how many years the resource will run out. it also uses and ..... Out of time....