Joanna Ko | 11vb
PAYROLL
Payrolls are used to manage wages and salaries of the
employees.
There is a lot of data to put into account and may need a
few days or processing.
Workers are paid in arrearsthey are paid for the week
before the one they have just worked. This means that the
payroll system has one week to process the payroll data.
Swipe cards
Each employee has a swipe card that carries:
A unique employee number
Clock-in time
Clock-out time
This information is passed onto the ICT systems every
time the card is swiped.
Validation
Validation checks are made on all data that passes through the system.
This is to ensure that the data is appropriate and accurate.
The data can be checked against a table of known employees (table look-up); the clock-in
and clock-out times are of a reasonable range (range check) e.g. the clock-in time must be
less than the clock-out equivalent.
Invalid data is corrected before it is processed any further.
Valid data is processed onto the transaction file [abbreviated t-file] (this data changes
often).
Master files
Data that does not change frequently is saved on an old master file [abbreviated m-file],
which every employee has one of. It contains:
Employee #
Employee name
Address and other contact details
Hourly rate of pay
Details of the tax to be paid
Cumulative totals of the tax paid during the current tax year
Employees bank account details
For every employee, the record on the transaction file and the corresponding record on the
master file are quickly matched so that the data is available when the payroll program runs.
Payroll programs
Once the data has been captured and validated, it can be input into the payroll program.
In the program, the t-file will be matched to the equivalent m-file. A new m-file will be
created containing the new data.
The program pays directly to the employees bank account through electronic fund
transfer (EFT).
Backup
These are done for security purposes and can be generated as a consequence of the need to
create a new master file every time the program is run.
Ancestral backup systems are used because they provide three levels of backup (even
four at times). The table below explains the levels:
Son
New master file will become the old master file when the payroll
program is run again
Father
Old master file stored securely but accessibly, possibly on site
Grandfather
Previous old master file stored securely, possible on site
Corresponding copies must also be kept just in case the current files get lost. Repeating
previous runs of the program can retrieve these copies.
This can also be called batch processing because the data captured is divided into batches
before backing it up.
The system can also run offline, meaning that there does not need to be continuous input for
the program to process the data.
Hardware used
Swipe card readers (to read employees swipe cards)
Printers (capable of printing wage slips)
Disk drives (addition disk drives may be required)
Advantages of a computerized payroll program
Faster because you dont have to repeat the same calculations again and again
Using a computer is faster
A computer is more accurate less chance of human error
Saves money for the company because less accountants/cashiers are needed
Security dont have to keep a lot of money in the site
Disadvantages of a computerized payroll program
Cashiers lose jobs
Huge reliance on computers and the stability of the disk drives if both crash, no more files
High initial set up cost i.e. computers, swipe card/scanners etc
Process
1. Decide on seat on flight
2. The flight information and booking file must be updated (on the airlines side) so that
further enquiries show the seat has already been booked
3. Those particular seats will also be locked out to avoid double booking
4. Tickets may be printed out on the spot or at a later date
5. Payment may be made in cash through travel agents, online using a credit card or
through a bill sent by the airline a few days later for the m to reply to
Cancellation and refund of payments are also available if need be.
Security of access is maintained by giving each travel agent a unique username and
password.
Hot standby
This is when an ICT system needs to be online 24 hours a day and shouldnt suffer from a
mechanical breakdown.
Having two identical computers the other posing as a backup, does the above.
Backups
Because the system is always in use, the usual way of copying/backing up files cannot be
done. Therefore, a process called fingerprinting is done:
So two disks are used and when new data/changed data comes in, they will be added to both
disks. When one is faulty, the other will continue the process.
Hardware used
Terminals (networked PCs are needed to access the booking system. Dedicated terminals are
needed in locations where there is a high volume of bookings [online]. Elsewhere, the
bookings may run on travel agents computer)
Computers (two are needed i.e. hot standby)
Disk drives (two are needed i.e. fingerprinting. The capacity depends on the volume of data
being handled)
Communication (a specialized computer that will act as a communication controller)
Barcodes
The data held on a barcode identifies the product and includes the product code and the
check digit.
When the barcode is scanned i.e. the item is purchased, the data is transmitted to the main
computer and checked against the check digit of the main computerif it doesnt match, a
re-scan is asked for. If they match, the product code is then checked against the product info
e.g. name of product, price.
Reports
The sales made at each checkout are recorded (the product code and the quantity sold).
The individual product codes are read from this file and the total quantity sold is calculated
and a report is made from this data.
As stock control file is also produced, where the ff. data will be stored:
The number of items sold and the takings at each till used to monitor the
performance of staff/operators
The rate of sales market research increase particular products stock
The pattern of sales so that stocks are not held at times of the year it doesnt sell
well
The effectiveness of sales promotions
Goods with high profit margins could be stocked with lower profit margins balances
them out
To keep business expense to a minimum, stocks of goods should be kept as low as possible.
If a max stock level is recorded for each product, the reorder level & quantity should be
adjusted to ensure it does not go over the specified amount.
Theft if the cross reference of stock control system info and actual stock levels dont match
Supermarket ICT systems
These will include:
POS terminals at every supermarket checkout (operated by employees and are used
to record sales to customers and payments. They are likely to include a bar code
scanner, small screen, receipt printer, beeper, smart card reader and arrangements
for handling cash or paying be credit or debit card)
Hand-held terminals are used by the customer to scan bar codes as purchases are
placed in their shopping trolleythis makes the purchasing process easier as the
checkout only has to briefly read the hand-held terminal to arrange the payments
Self-service POS terminals allow customers to check out their own purchases e.g. a
touch screen is used to allow the user to start, operate and end the purchasing
process. A customer scans the item and puts it on a weighing scale, which lets the
terminal check the weight to avoid theft or fraud
Mobile terminals are used in the warehouse and elsewhere for recording deliveries
and for stocktaking. They are built to be robust and are likely to have a barcode
scanner, a touch screen and a stylus
Communications networkan internal network based on the main computer and
external access to the Internet for general email and auto re-ordering
Main computer may be a general computer used for a range of applications, but it
must have the sufficient capacity to handle communications from all POS terminals
and sufficient storage to record details about all products.
Withdraw cash
Make deposits
Transfer funds between accounts
Obtain account balances
Pay bills
3. If the PIN entered does not match, the customer is given x number of chances to
enter the PIN. If its still not correct, the ATM keeps the card the and the customer
cannot carry on with the transaction
4. If the PIN is correct, the customer is asked to select a transaction from the list
displayed. If the option of a withdrawal or a transfer is selected, the computer checks
his account to see if there is a sufficient amount of money
5. If there are sufficient funds, the account will be updated accordingly
ADVANTAGES of CAD
ADVANTAGES OF CAM
CAD/CAM systems
These are used to integrate design AND manufacturing.
They can create drawings, model trajectories (develop and work out the movement) of
cutting tools and develop numeric control programs.
They also support 3D modeling, sheet metal punching and mending etc.
Computer-aided engineering (CAE)
CAE systems analyze engineering designs produced by CAD systems and simulate a variety of
conditions to see if the design works. CAE features are found in most CAD packages. One
CAD/CAM/CAE package is hyperMILL.
WEATHER STATIONS
Weather stations use ICT systems to collect information about the weather through data
logging e.g. amount of rain etc. Data logging is data is automatically collected.
If up-to-date information was not needed immediately, the details of the current weather
conditions could be recorded on a backing storage at the weather station.
Communication of any change in weather data between different weather stations take place
using IT systems
Weather stations are simply groups of sensors that provide useful information regarding the
weather.
Weather forecasting
Weather forecasting tries to predict what weather conditions will be like by measuring and
observing the current weather and supplying the data to a supercomputer.
ROBOTS
Robots are hardware devices that perform physical tasks, which may be complex industrial or
manufacturing tasks e.g. welding, paint spraying, assembling products, packaging, handling
dangerous substances and assembling cars.
Specialized robots have been developed for a number of tasks:
There are two ways to program a robot: the teach & learn method, which is when you
control the robots actions one instruction at a time and watch it while it carries out your
instruction. If you are satisfied, then you can save the instruction.
The other way to program a robot is to physically move the machine and the computer
converts these actions into a program and saves it.
PROCESS CONTROL
This is the use of digital computers in industrial settings e.g. chemical plants to monitor the
manufacturing process closely and prevent any accidental errors from happening. However,
human supervision is still required because unusual or unforeseen developments might not
be adequately managed by a computer-controlled system.
The computer inputs data like temperature, pressure, flow and volume from the process
using sensors.
Data from the process can be stored and displayed, which is useful if there has been
an industrial accident and investigators are trying to find out what went wrong. The
data can be used to improve the operation process
Safety is ensured by constant monitoring and alarms that sound automatically
Maintenance of product quality
Employees have better working conditions
Operating costs are lower because the system is
more efficient
FLIGHT SIMULATORS
These are used to train pilots to fly aircrafts.
They are very complex constructions that involve a wide
range of computer control subsystems with highly
developed interacting feedback loops.
LOGISTICS
This was developed to organize the supply, movement and maintenance of an armed force
under operational conditions.
Logistics could involve the organization of:
EDUCATION
Virtual learning environments (VLEs)
Virtual learning environments help students access a range of specific learning resources in
school, college, university and at home. Examples are Blackboard and Moodle.
Drill and practice is when the teacher uses CAL to implement his instruction, to
reinforce old lessons rather than teach new ones. This is especially useful for
memorization work like new vocabulary
Tutorials are self-instructional programs that are designed to introduce and teach
new material to students. The computer acts like a tutor and allows students to move
at their own pace. Many tutorial programs can assess a students competence level
and adjust the course accordingly
Simulations predict the outcome of a real-life situation by using a computer-based
model of the situation. This is one of the most effective of CAL tools available, since
it provides the opportunity to carry situations in order to see difference outcomes
without any risk to the students or wastage or materials e.g. for sciences and
geography
ADVANTAGES OF CAL
Provides immediate feedback to students, who are able to tell if they understand the
topics or not
Enables students to recognize their own weaknesses and provides the opportunity to
work on strengthening them (e.g. in tutorials)
Encourages students by displaying a congratulatory message for each correct
response, motivating students to continue studying
May be embedded in a learning program accessible via VLE
ADVANTAGES OF SIMS
Support automatic reporting e.g. attendance at school and SIMS can automatically
contact parents of the absence of their child using email, letter or telephone. This can
also be used by libraries to inform students of overdue books
Communication with parents can be personalized using e.g. mail merge
Quality of communications with parents can be monitored e.g. standard forms and
letters can be used and school reports can be compiled using statement banks
Faster access to information
Statistics and accounting information can be generated automatically and quickly
DISADVANTAGES OF SIMS
Data stored on the system must be up to datethis can be expensive. E.g. office
staffs are needed to ensure that students records are accurate i.e. for school reports.
o Another alternative is to allow carers or students to keep their personal
information up to date using a web-based system and password protection,
however the school still cant be sure that the info is up to date
THE LAW/POLICE
Law enforcement
National databases are used by police e.g. the National Crime Information Center (NCIC of
the USA) and the Police National Computer (PNS for the UK). Law enforcement officers
throughout the respective country can access these databases.
Police officers use computers to:
Prepare reports
Track history of telephone calls form a particular address
Managing cases
Identifying trends and patterns of criminal behavior and carrying out statistical
analysis
Tracking parolees (criminals who have been released before the end of their jail term
because of good conduct)
Posting surveillance photos of wanted criminals and missing people
Developing contacts with other police organizations, including, transmitting,
exchanging and obtaining information from other police stations
If a witness sees but cannot identify a criminal, the police can use software to
compose a picture of the alleged criminal based on the witnesss descriptionthis is
called profiling. This picture can then be compared with those on the national
database
A device attached to a computer is used to digitize and store an individuals
fingerprint, which can be compared with those on the national/local databases
Holding equipment inventories
In some countries, police officers have laptops in their patrol cars to make online inquiries
about vehicle registrations and drivers licenses from their databases
Video glasses are also being used, where a small video camera or webcam is built into a pair
of spectacles and communicates wirelessly to the local police station
CCTV
Surveillance cameras are used to monitor, for example, the street or specific buildings where
the owners or the police may want to inspect. They provide actual visual evidence instead of
using testimonials in court.
It is combined with facial recognition to identify culprits even in a low quality shot
10
UKNDNAD
The United Kingdom National DNA Database is used to identify whom e.g. hair, blood
samples belong to because everyone has a unique DNA signature.
Law firms
ICT is used for reviewing case statuses and deadlines and preparing legal documents and is
much faster compared to doing it manually.
In the area of business management, ICT can be used for
Software that offers expertise in a substantive area of law e.g. bankruptcy, family law
or personal injury
Software to help with case management and document assembly, which enables
lawyers to quickly find information on past cases and judgment to use as precedents
in their arguments
Legal research websites e.g. Westlaw or Quicklaw help lawyers and law students
obtain comprehensive information about case law and legislation from many
countries around the world
Patient monitoring
Doctors can now externally monitor patients e.g. in ICU via sensors connect to a computer
that record vital signs like blood pressure, heart rate etc.
If the vital sign goes below or above the set limit, an alarm is sounded to alert the personnel.
The information obtained can also be stored in the patients record.
11
Telemedicine
Medical dictionaries
Online diagnosis (expert systems)
Support groups
The website is not always accurate can make the wrong diagnosis
Prescription drugs may not be what they say they are and are illegal
Not everyone has access to the Internet
Lose rapport between doctor and patients
It is much quicker for doctors and diagnosis can be proven more accurate as it is guided by
medical facts.
The Quick Medical Reference (QMR) system (available from the Camdat Corporation) is an
example of a medical expert system that performs differential diagnosis in many areas of
internal medicine. Other examples include Mycin and Dendral.
Can indicate the range of possible health problems based on the known symptoms
Gives support in making decisions about which a doctor may be unsure because of
lack of knowledge/experience
Help experts arrive at an accurate solution much quicker
Can be developed and kept up to date as new discoveries are always made
Can show concepts it used to arrive at its conclusions
LIBRARIES
Libraries use IT systems to keep track of books and other resources they lend to borrowers.
Some libraries are even connected to others in the area via WAN and share resources (like if
one doesnt have the book, they can recommend the borrower to go to the other library).
12
Other processes:
Better organization
Easier access i.e. dont have to look for a long time to find a particular book/record
using barcodes etc
If a book cannot be found within the library, the RFID tag can be tracked using the
machine
Database software can be used to produce such an ICT system. At its simplest, there are
likely to be three tables in a relational database:
Borrowers table
Borrower identification
number
Borrower identification
number
Name
Title
Author
Date borrowed
Other details
Location
Other details
Effects on employment
Job losses:
This happens because of the almost complete automation of some companies, causing
workers to be laid off because they are not needed anymore e.g. automobile industry
automated assembly lines and chemical plants/oil refineries for monitoring and adjusting of
machinery to control processes.
13
IT consultants
Video game developers/programmers
Graphic and web designers
Computer engineers etc
HEALTH
Ergonomics is important in reducing injury to people using computers, including:
Design and arrangement of the seating and the computer system esp. keyboard and
monitor
Arrangement to support someone using the computer i.e. foot/wrist supports
Rules governing the users behavior when using the computer e.g. how often breaks
should be taken
14
Repetitive strain injury (RSI) to the hands and arms. This is a painful condition
that occurs because of damage to tendons, nerves, muscles and soft tissue and can
be caused by the repetitive use of a keyboard and a mouse. Taking regular breaks
Eye problems e.g. soreness, lack of focus and eye dryness from staring at a
monitor too long. Can be avoided by taking breaks, having regular eye examinations
Backache and similar problems can arise through sitting in an inappropriate posture
for long periods of time
Fatigue and headaches
Trip hazards are associated with trailing cables and should be reduced by putting
cabling in trunking or where it is not likely to interfere with users movement
Electric shock can be minimized by the use of residual current device (RCD) on the
main power supply to the computer and is designed to turn off the power if a user
receives an electric shock
PRIVACY
Privacy refers to the right of individuals to determine what what information is stored about
them and how that information will be used.
The Data Protection Acts (1984 and 1998) set out principles to make sure that personal
information is handled appropriately. Organizations in the UK that store personal information
must, by law, keep to these principles, which include
COMPUTER CRIME
Software piracy
Software piracy is the unauthorized copying, using or selling of software without an
appropriate license. It includes copying CDs with software or music on them and downloading
software or music without paying for it.
Copyright violation
Using the Web you can download music, pictures, animated graphics, videos, books and
software. The copyright to some of this material is restricted to its owners, who sell you the
right to copy it. But if you copy it without permission this is effectively theft.
Hacking
Hacking means gaining unauthorized access to an ICT system and an individual who does so
is referred to as a hacker. Why do hackers hack?
15
Identity theft
Spyware may be installed in your computer without your knowledge. This could send
information about your computer to others who may have malicious intent e.g. they may
want to know when your computer is online so they can use it to send spam without
knowledge. They may also collect information about you and your online bank accountsto
steal your identity.
Anti-spybot software like Spybot Search & Destroy can be used to remove spyware and
adware but info about you may not be stolen when you are online
Phishing
When you receive an unsolicited email inviting you to a response that involves you entering
your username, password and other personal details on a bogus website with a bogus
company. For example, you order from the supposedly legit website and you enter your
purchasing details. The bogus company charges your bank account for this but doesnt
deliver the products you ordered and paid for.
SECURITY
Physical safeguards
Access control: locks that open with entry codes, swipe cards or biometrics + security
guards can ensure that those entering are not fake
Access monitoring: CCTV cameras so that rooms can be monitored 24/7 and can see
who enters and leaves the room
Data security: taking regular backups and storing these in a fireproof safe in another
location
Protect hardware from natural disasters, theft and malicious damage: e.g. storing
hardware in a concrete underground bunker, hard-to-reach places that thieves
cannot easily access
Protect hardware from theft: clamping individual computers to desks, installing
burglar alarms attached to individual computers, CCTV cameras
Contingency plans + disaster recovery: ICT systems continue to operate with
minimum disruption and swift recovery e.g. contact another facility with similar ICT
systems so you can use that if yours crash
Software safeguards
Individual responsibility
Be cautious when you are on the internet and to whom you share your personal
data withdont publish your personal data (full name, address etc) on web pages
that everyone can access
o Dont publish anyone elses data either
Make sure you know who stores your personal data and that it is accurate and
appropriately protected (Data Protection Act 1998 used in the UK)
Dont plagiarize (copying someone elses work off a source and not including them
in the bibliography or crediting them/passing it off as your own work)
16
17