ITGS HL2 2010 Midyear Exam
Refer to the Healthcare in an East African country case study and to your own related research in responding to the following questions.
1. Define the following terms:
(a) internet [2 marks]
A computer network that connects computers across the world
(b) intranet [2 marks]
A restricted network that only connects specific computers (not restricted by location)
2. (a)"Dr Ogola wants the Western Province to be in the forefront of medical care in the future and to be an example for other provinces to follow. The key to this transformation will be the development of an integrated IT system linking the hospital and the outlying clinics" (lines 84-86). Explain the purposes of the following in a client-server network:
(i) server [2 marks]
A server would be the computer where all of the data is stored. This would be the computer which house the EMR.
(ii) firewall [2 marks]
is part of the intranet which is used for blocking unwanted accesses, in this case it is preventing outside people to view the EMR. The Fire wall also
(iii) security software [2 marks]
Software which protects against hackers, and virus.
(b) Examine two methods Dr. Ogola can use to ensure the security of the data he intends to transmit among the medical centers of the Western Province. [8 marks]
Two methods Dr.Ogola can use to ensure the security of the data that he intends to transmit among the medical centers of the Western Province would be to, encrypt the data, and also to create an intranet with a very specific access key. Which would ensure that only a select few could.
The benefits to encrypting the data with a complex key, would be to insure that even if someone did attain access to the data that they would not be able to understand it, and read the medical files.
One way to create a very secure intranet is to give out key chains which wirelessly connect to the server and every hour or so, a new combination of letters and numbers appear on the keychain so that inorder to access the site the user has to provide a user name and the number letter code on the key chain piece.
3. "In 2007, there was a significant loss of data when the system crashed due to a power surge. An effective disaster recovery and backup plan was not in place and has still not been implemented" (lines 72-74).
Evaluate two possible strategies that Dr. Ogola could adopt in order to reduce the problems with major system crashes. [12 marks]
Two possible strategies that Dr. Ogola could adopt would be to have an external hard drive which is updated every day and stored in a different location, or to work off of an Intranet so that the data is always stored online.
Having an external hard drive would reduce to problems with having major system crashed. If having an external hard drive is implemented then if there is a system crash, all of the lost information could be retained by collecting it off of the external hard drive. The best way to go about having an external hard drive is to set one person responsible to export the data every day, and then to store the external hard drive at a separate location in case of a fire or flood because in that case the computers and the hard drive would be destroyed if it was kept at the same location.
Another solution to the problem would be to create an intranet which would allow documents and files to be stored online, and to be worked on online. This is safe depending on how secure the intranet is. It would still be smart to back up the server from time to time as well with an external hard drive.
4. (a) Describe two advantages of a peer-to-peer network. [4 marks]
(b) State two ways clinics in outlying areas could use mobile phones to effectively support healthcare. [2 marks]
a. Two advantages to a peer to peer network is that, with the system it is very easy to share files because, the files are stored on each individual computer so that when they are needed by another user they can be attained very easily and the fact that they are relatively easy to create.
b. Two ways that clinics in outlying areas could use mobile phones to effectively support healthcare is that, they can help to connect remote doctors to hospital doctors if there is a sickness that is unknown that hospital doctors might know what to do. And also if PDA are used, the doctors could use those instead of computers, which would save money.
5. (a) Describe two ways an EMR management system could lead to better healthcare in the Western Province. [4 marks]
An EMR management system could lead to a better healthcare in the Western Province because it makes it easier to share files. This is a benefit because now doctors can share files with more modern hospitals and send patients there. This implies that the hospitals do not need to do all of the tests that the local doctors have already done.
Another way that EMR Management system could lead to better healthcare is because if there was a disaster, and if the EMR system was properly backed up then nothing would happen. But if the system has not be implemented and only paper is used then everything will be lost.
(b) Explain how the main hospital and the outlying clinics can use IT to exchange information. [8 marks]
The Main hospital and the outlying clinics can use IT to transmit data by using an Intranet. This is beneficial because an intranet it built so that data is updated
6. "The government has recently started improving Internet coverage, including WiFi and Broadband Wireless Access, as well as increasing the number of mobile phone providers licensed to operate in the country." (lines 76-78)
Evaluate the use of WiFi and Broadband Wireless Access as means of connecting the various health facilities of the Western Province. [12 marks]
Case Study vocab words
Backup Software-Software that allows copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.
can you find an example of a brand name with specific features it offers? -Justin Scott 6/1/09 9:18 AM
Broadband Wireless Access-Wireless Broadband is a fairly new technology that provides high-speed wireless internet and data network access over a wide area. how wide of an area? -Justin Scott 6/1/09 9:19 AM
Client/server network-A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network.
CT scanner (CAT Scan)- Tomography (a method of producing a three-dimensional image of the internal structures of a solid object (as the human body or the earth) by the observation and recording of the differences in the effects on the passage of waves of energy impinging on those structures) in which computer analysis of a series of cross-sectional scans made along a single axis of a bodily structure or tissue is used to construct a three-dimensional image of that structure. The technique is used in diagnostic studies of internal bodily structures, as in the detection of tumors or brain aneurysms.
-A machine does imaging of you body to look for growths and other things that shouldn't be there.
Data redundancy- The occurrence of values for data elements more than once within a file or database. (this is bad because: One of the biggest disadvantages of data redundancy is that it increases the size of the database unnecessarily. Also data redundancy might cause the same result to be returned as multiple search results when searching the database causing confusion and clutter in results.)
Disaster recovery-Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption of applications, data, hardware, communications (such as networking) and other IT infrastructure. A business continuity plan (BCP) includes planning for non-IT related aspects such as key personnel, facilities, crisis communication and reputation protection, and should refer to the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. This article focuses on disaster recovery planning as related to IT infrastructure.
Embedded IT systems-Any electronic system that uses a computer chip, but that is not a general-purpose workstation, desktop or laptop computer. Such systems use microcontrollers (MCUs) or microprocessors (MPUs), or they may use custom-designed chips. Deployed by the billions each year in myriad applications, the embedded systems market uses the lion's share of all the electronic components in the world.Embedded systems are employed in automobiles, planes, trains, space vehicles, machine tools, cameras, consumer electronics, office appliances, network appliances, video games, cellphones, PDAs, GPS navigation as well as robots and toys. Low-cost consumer products can use microcontroller chips that cost less than a dollar. See microprocessor and microcontroller.
EMR- Electronic Medical Records-An electronic medical record (EMR) is a medical record in digital format. In health informatics and most contexts, EMR and EHR (electronic health records) are used synonymously, but many people define an EMR as just the physician interface and EHR including both a physician and patient interface. The term has sometimes included other systems which keep track of medical information, such as the practice management system which supports the electronic medical record.
Failover systems-Failover is the capability to switch over automatically to a redundant or standby computer server, system, or network upon the failure or abnormal termination of the previously active server, system, or network. Failover happens without human intervention and generally without warning, unlike switchover.Systems designers usually provide failover capability in servers, systems or networks requiring continuous availability and a high degree of reliability.
File server-In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.
A program or mechanism that enables the required processes for file sharing can also be called a file server. On the Internet, such programs often use the File Transfer Protocol (FTP).
Fire wall-computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users (as of the Internet)
Internet-an electronic communications network that connects computer networks and organizational computer facilities around the world
Intranet-a network operating like the World Wide Web but having access restricted to a limited group of authorized users (as employees of a company)
LAN hardware and software- A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office or building.
Network server- A computer system that serves as a central repository of data and programs shared by users in a network.
Peer-to-peer network- A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network
Security software and hardware-
Software- McAfee
Hardware- Biometrics
Server-a computer in a network that is used to provide services (as access to files or shared peripherals or the routing of e-mail) to other computers in the network
VPN- Virtual Private Network- A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost.
WiFi- The term Wi-Fi is often used by the public as a synonym for wireless LAN (WLAN); but not every wireless LAN product has a Wi-Fi certification, which may be because of certification costs that must be paid for each certified device type.