Anda di halaman 1dari 17

Chapter 12: APPLICATIONS & EFFECTS

Joanna Ko | 11vb

PAYROLL
Payrolls are used to manage wages and salaries of the
employees.
There is a lot of data to put into account and may need a
few days or processing.
Workers are paid in arrearsthey are paid for the week
before the one they have just worked. This means that the
payroll system has one week to process the payroll data.
Swipe cards
Each employee has a swipe card that carries:
A unique employee number
Clock-in time
Clock-out time
This information is passed onto the ICT systems every
time the card is swiped.
Validation
Validation checks are made on all data that passes through the system.
This is to ensure that the data is appropriate and accurate.
The data can be checked against a table of known employees (table look-up); the clock-in
and clock-out times are of a reasonable range (range check) e.g. the clock-in time must be
less than the clock-out equivalent.
Invalid data is corrected before it is processed any further.
Valid data is processed onto the transaction file [abbreviated t-file] (this data changes
often).
Master files
Data that does not change frequently is saved on an old master file [abbreviated m-file],
which every employee has one of. It contains:

Employee #
Employee name
Address and other contact details
Hourly rate of pay
Details of the tax to be paid
Cumulative totals of the tax paid during the current tax year
Employees bank account details

For every employee, the record on the transaction file and the corresponding record on the
master file are quickly matched so that the data is available when the payroll program runs.
Payroll programs
Once the data has been captured and validated, it can be input into the payroll program.
In the program, the t-file will be matched to the equivalent m-file. A new m-file will be
created containing the new data.
The program pays directly to the employees bank account through electronic fund
transfer (EFT).
Backup
These are done for security purposes and can be generated as a consequence of the need to
create a new master file every time the program is run.

Ancestral backup systems are used because they provide three levels of backup (even
four at times). The table below explains the levels:
Son
New master file will become the old master file when the payroll
program is run again
Father
Old master file stored securely but accessibly, possibly on site
Grandfather
Previous old master file stored securely, possible on site
Corresponding copies must also be kept just in case the current files get lost. Repeating
previous runs of the program can retrieve these copies.
This can also be called batch processing because the data captured is divided into batches
before backing it up.
The system can also run offline, meaning that there does not need to be continuous input for
the program to process the data.
Hardware used
Swipe card readers (to read employees swipe cards)
Printers (capable of printing wage slips)
Disk drives (addition disk drives may be required)
Advantages of a computerized payroll program
Faster because you dont have to repeat the same calculations again and again
Using a computer is faster
A computer is more accurate less chance of human error
Saves money for the company because less accountants/cashiers are needed
Security dont have to keep a lot of money in the site
Disadvantages of a computerized payroll program
Cashiers lose jobs
Huge reliance on computers and the stability of the disk drives if both crash, no more files
High initial set up cost i.e. computers, swipe card/scanners etc

AIRLINE BOOKING SYSTEMS


Details of flight schedules and passenger bookings are
stored on a mainframe computer.
Passengers may inquire about these over the Web or
through travel agents.
The airlines computer should support multi-access
because a large number of passengers may access the
data at one time
So they must also be stored on magnetic disks because
the data held on those can be read via direct (any record
on the file can be read without having to read previous
records much faster) or random access.
A real-time processing system is used to process the
data that is inputted is processed in real-time; before any
further input can be processed. This processor must be
fast enough to keep up with the constant feed if
information.

Process
1. Decide on seat on flight
2. The flight information and booking file must be updated (on the airlines side) so that
further enquiries show the seat has already been booked
3. Those particular seats will also be locked out to avoid double booking
4. Tickets may be printed out on the spot or at a later date
5. Payment may be made in cash through travel agents, online using a credit card or
through a bill sent by the airline a few days later for the m to reply to
Cancellation and refund of payments are also available if need be.
Security of access is maintained by giving each travel agent a unique username and
password.
Hot standby
This is when an ICT system needs to be online 24 hours a day and shouldnt suffer from a
mechanical breakdown.
Having two identical computers the other posing as a backup, does the above.
Backups
Because the system is always in use, the usual way of copying/backing up files cannot be
done. Therefore, a process called fingerprinting is done:
So two disks are used and when new data/changed data comes in, they will be added to both
disks. When one is faulty, the other will continue the process.
Hardware used
Terminals (networked PCs are needed to access the booking system. Dedicated terminals are
needed in locations where there is a high volume of bookings [online]. Elsewhere, the
bookings may run on travel agents computer)
Computers (two are needed i.e. hot standby)
Disk drives (two are needed i.e. fingerprinting. The capacity depends on the volume of data
being handled)
Communication (a specialized computer that will act as a communication controller)

SUPERMARKET STOCK CONTROL


At the checkout, the point of sale (POS) terminal
scans the barcode and then transfers this data to the
main computer, where the stock levels are managed.
It does this using a laser scanner that scans the
barcode and a keyboard for the few items to enter
their product ID if they dont have a barcode. A small
monitor is used to display the messages sent from the
central computer to the POS terminal. A small dot
matrix printer is also built into these terminals to print
the receipts.
A general purpose ICT system is used, where there
will be several checkout computers that are all
connected to the main computer in the store. Disk
drives, a printer and a broadband link are also
connected via telephone network.

Barcodes
The data held on a barcode identifies the product and includes the product code and the
check digit.
When the barcode is scanned i.e. the item is purchased, the data is transmitted to the main
computer and checked against the check digit of the main computerif it doesnt match, a
re-scan is asked for. If they match, the product code is then checked against the product info
e.g. name of product, price.
Reports
The sales made at each checkout are recorded (the product code and the quantity sold).
The individual product codes are read from this file and the total quantity sold is calculated
and a report is made from this data.
As stock control file is also produced, where the ff. data will be stored:

Product code e.g. 243953


Number of stock left e.g. 300
At what level more should be ordered (reorder level) e.g. 100
How much more should be ordered (reorder quantity) e.g. 500

The importance of managing stock levels and info


We must be able to keep up with the customers demand of a product if they dont get the
products they want, they will probably leave unsatisfied and not come back.
A stock control system will be able to compile and calculate the total stock levels if, for
example, a new delivery comes in, allowing the manager to control the flow of stock into the
supermarket in response to sales of the product. It may also do the ff.:

The number of items sold and the takings at each till used to monitor the
performance of staff/operators
The rate of sales market research increase particular products stock
The pattern of sales so that stocks are not held at times of the year it doesnt sell
well
The effectiveness of sales promotions
Goods with high profit margins could be stocked with lower profit margins balances
them out

To keep business expense to a minimum, stocks of goods should be kept as low as possible.
If a max stock level is recorded for each product, the reorder level & quantity should be
adjusted to ensure it does not go over the specified amount.
Theft if the cross reference of stock control system info and actual stock levels dont match
Supermarket ICT systems
These will include:

POS terminals at every supermarket checkout (operated by employees and are used
to record sales to customers and payments. They are likely to include a bar code
scanner, small screen, receipt printer, beeper, smart card reader and arrangements
for handling cash or paying be credit or debit card)
Hand-held terminals are used by the customer to scan bar codes as purchases are
placed in their shopping trolleythis makes the purchasing process easier as the
checkout only has to briefly read the hand-held terminal to arrange the payments
Self-service POS terminals allow customers to check out their own purchases e.g. a
touch screen is used to allow the user to start, operate and end the purchasing
process. A customer scans the item and puts it on a weighing scale, which lets the
terminal check the weight to avoid theft or fraud
Mobile terminals are used in the warehouse and elsewhere for recording deliveries
and for stocktaking. They are built to be robust and are likely to have a barcode
scanner, a touch screen and a stylus
Communications networkan internal network based on the main computer and
external access to the Internet for general email and auto re-ordering

Main computer may be a general computer used for a range of applications, but it
must have the sufficient capacity to handle communications from all POS terminals
and sufficient storage to record details about all products.

E-commerce (online shopping)


Online shopping is the buying or selling or goods or a service on the Internet.
Customers log on to the company website where categories, products and prices will be
shown.

ADVANTAGES of e-commerce for the CUSTOMER


More convenient no need for customers to go out
This also saves travel time and money
The product stock levels are not restricted to the amount the physical store is capable of
holding
Not restricted by opening hours i.e. 24/7
Can easily see new products/promotions

DISADVANTAGES of e-commerce for the CUSTOMER


No face-to-face communication from staff to customers no rapport
Cannot test or try the item on
Possibility/higher risk of credit card fraud
Only available if the Internet and/or the website is working

ADVANTAGES of e-commerce for the COMPANY


Less cost/save money less staff needed
Dont have to pay for rent saved money
Possibly increase customer base because the Internet reaches more people than, say, a
physical store in a mall

DISADVANTAGES of e-commerce for the COMPANY


High initial cost of set up have to think about whether it would be worth it i.e. would we be
able to break even and gain profit
Need to hire a transport service e.g. vans, cargo planes etc - expensive
BANKING
Banks use ICT to store customer information, processing transactions etc.
Improves overall efficiency and provides greater convenience for the customers because
many banks also offer home or Internet/online banking.
Automatic teller machines (ATMs)
ATMs or cashpoints are electronic terminals that allow customers to make bank transactions
at virtually any time although a fee may be charged.
An ATM can:

Withdraw cash
Make deposits
Transfer funds between accounts
Obtain account balances
Pay bills

USING AN ATM MACHINE


1. Customer inserts a card the ATM reads the info from the card and matches it up
with the customers record. The info on the card may be stored on a magnetic stripe
or on an embedded microchip
2. A message appears on the screen asking for their personal identification number
(PIN)

3. If the PIN entered does not match, the customer is given x number of chances to
enter the PIN. If its still not correct, the ATM keeps the card the and the customer
cannot carry on with the transaction
4. If the PIN is correct, the customer is asked to select a transaction from the list
displayed. If the option of a withdrawal or a transfer is selected, the computer checks
his account to see if there is a sufficient amount of money
5. If there are sufficient funds, the account will be updated accordingly

ADVANTAGES of an ATM machine


Much more convenient because customers can do it while on-the-go
No need to line up at the bank faster
Because there are often two ATM machines in one area/spot

DISADVANTAGES of an ATM machine


Loss of jobs i.e. those who work at the counters in banks
Some people dont know how to use an ATM and if there are less physical branches, they will
not be able to make banking transaction effectively losing a percentage of their customer
base
Electronic funds transfer (EFT)
EFT is the electronic movement of funds from one bank account to another.
A typical example would be from a customers account to a retailers account when he/she
pays with a credit or debit card at an electronic funds transfer (at the) point of sale
(EFTPOS).

ADVANTAGES of online banking for the BANK


Less staff required automation
Save money because dont need to open actual branches
Safer less amounts of cash in the actual site

DISADVANTAGES of online banking for the BANK


Initial set ups costs are high
Website maintenance can be tedious (i.e. need to hire more specialized staff)
Higher risk of identity and credit card fraud

ADVANTAGES of online banking for the CUSTOMER


The customer doesnt have to go to the branch so its more convenient
Banking 24/7 not restricted by the opening hours
Can carry out a range of transactions in one place e.g. transfer/send money overseas

DISADVANTAGES of online banking for the CUSTOMER


May not have sufficient access to the Internet i.e. too slow, down
No face-to-face interaction with staff
Possibility of credit card or identity fraud
Smart cards
Smart cards are more technologically advanced versions of debit and credit cards, in that
they have a microchip embedded into it instead of a magnetic strip. This magnetic strip can
be altered or forged, whereas a microchip is more difficult to tamper, providing better
security. These microchips also have a larger storage capacity than magnetic strips.
Eventually, smart cards will be able to store biometric data e.g. voiceprints, fingerprints and
retinal scans.

ENGINEERING AND MANUFACTURING


Computer-aided design (CAD)
A CAD system uses a computer hardware and software in the drawing of engineering or
architectural designs. It is designed to make it easier to produce detailed plans and accurate
technical drawings.
It contains software that provides a set of standard components and basic elements like
points, lines, circles, shapes and solids, from which CAD drawings can be constructed.
They can produce 3D drawings that can be rotated and viewed at different angles on the
screen. The computer also keeps track of the design dependencies, so when a value is
changed all other dependent values are automatically changed as well.
High-resolution graphics is needed to show sufficient detail on the monitor.
The input devices include a light pen or a digitized tablet for drawing.
A special printer or plotter is also needed to print big-scale.

ADVANTAGES of CAD

Designs produced faster less expense


Easier to make changes on the design
Easer to make duplicates
Documentation generated as well as the design
Standard components can be used, reducing construction time and costs

Computer-aided manufacture (CAM)


CAM is the use of a computer to control manufacturing plant and equipment in a production
system. It is used in applications where precision and accuracy is essential e.g. welding,
spray painting, cutting etc.
CAM software generates instructions for the computerized control of machines. These CNC
(computerized numerical control) machines include computerized lathes for turning and
drilling and machines for cutting and polishing large stones for building purposes.
And example of a CAM software is CATIA (developed jointly by Dassault Systemes and
IBM) for automobile and aerospace industries; CADdy (now owned by German company
DataSolid) for architecture, electronics, engineering and manufacturing.

ADVANTAGES OF CAM

Faster production of parts and products


Production of a more consistent product
The ability to better control and maintain the quality of a product
Production of more complex designs and moldings

CAD/CAM systems
These are used to integrate design AND manufacturing.
They can create drawings, model trajectories (develop and work out the movement) of
cutting tools and develop numeric control programs.
They also support 3D modeling, sheet metal punching and mending etc.
Computer-aided engineering (CAE)
CAE systems analyze engineering designs produced by CAD systems and simulate a variety of
conditions to see if the design works. CAE features are found in most CAD packages. One
CAD/CAM/CAE package is hyperMILL.
WEATHER STATIONS
Weather stations use ICT systems to collect information about the weather through data
logging e.g. amount of rain etc. Data logging is data is automatically collected.
If up-to-date information was not needed immediately, the details of the current weather
conditions could be recorded on a backing storage at the weather station.

Communication of any change in weather data between different weather stations take place
using IT systems
Weather stations are simply groups of sensors that provide useful information regarding the
weather.
Weather forecasting
Weather forecasting tries to predict what weather conditions will be like by measuring and
observing the current weather and supplying the data to a supercomputer.
ROBOTS
Robots are hardware devices that perform physical tasks, which may be complex industrial or
manufacturing tasks e.g. welding, paint spraying, assembling products, packaging, handling
dangerous substances and assembling cars.
Specialized robots have been developed for a number of tasks:

Used to enter active volcanoes to gather information


Remotely-operated vehicles (ROVs) are robots that perform tasks e.g. searching
for and recovering ship and plane wreckage, and the repair of underground
telecommunication cables
Can clean up hazardous waste sites and handle wastes that might be too dangerous
for humans
Can decontaminate and dismantle radioactive devices, and measure levels of
radioactivity at waste sites
Mine for metal and coal
Paint bridges
Deactivate bombs

There are two ways to program a robot: the teach & learn method, which is when you
control the robots actions one instruction at a time and watch it while it carries out your
instruction. If you are satisfied, then you can save the instruction.
The other way to program a robot is to physically move the machine and the computer
converts these actions into a program and saves it.
PROCESS CONTROL
This is the use of digital computers in industrial settings e.g. chemical plants to monitor the
manufacturing process closely and prevent any accidental errors from happening. However,
human supervision is still required because unusual or unforeseen developments might not
be adequately managed by a computer-controlled system.
The computer inputs data like temperature, pressure, flow and volume from the process
using sensors.

ADVANTAGES OF PROCESS CONTROL

Data from the process can be stored and displayed, which is useful if there has been
an industrial accident and investigators are trying to find out what went wrong. The
data can be used to improve the operation process
Safety is ensured by constant monitoring and alarms that sound automatically
Maintenance of product quality
Employees have better working conditions
Operating costs are lower because the system is
more efficient

FLIGHT SIMULATORS
These are used to train pilots to fly aircrafts.
They are very complex constructions that involve a wide
range of computer control subsystems with highly
developed interacting feedback loops.

LOGISTICS
This was developed to organize the supply, movement and maintenance of an armed force
under operational conditions.
Logistics could involve the organization of:

Information (the integration and coordination of information about customers needs)


e.g. for a supermarket collected from loyalty cards/analysis of sales
Transport (the transport of a wide range of goods to the supermarket from diff
suppliers)
Materials handling (organizing the movement of goods so that materials are moved
to where they are needed)
Packaging (ensuring that all goods are in stock to meet demand)
Stock control (enough goods to meet demand)
Warehousing (warehouses can store the goods in good condition that prevents
damage)
Security (prevention of theft)

EDUCATION
Virtual learning environments (VLEs)
Virtual learning environments help students access a range of specific learning resources in
school, college, university and at home. Examples are Blackboard and Moodle.

What can be done with a VLE?

Learning resources are easily made available anywhere there is Internet


o Absent students still have access to the work
Learning resources are organized students can easily find worksheets, homework
Students can study any time and at their own pace
Students can easily take a break and return to their work
Access to wikis, blogs, podcasts, web links and glossaries that are relevant to their
work
Digital drop boxes can be used to store/submit work via uploading
Students can see grades and teachers can look at the grade profiles
Online surveys help students and teachers with their research

Computer-aided learning (CAL) or computer-assisted instruction (CAI)


CAL is the software that helps the students learn the specific skills.
This can fall into three categories:

Drill and practice is when the teacher uses CAL to implement his instruction, to
reinforce old lessons rather than teach new ones. This is especially useful for
memorization work like new vocabulary
Tutorials are self-instructional programs that are designed to introduce and teach
new material to students. The computer acts like a tutor and allows students to move
at their own pace. Many tutorial programs can assess a students competence level
and adjust the course accordingly
Simulations predict the outcome of a real-life situation by using a computer-based
model of the situation. This is one of the most effective of CAL tools available, since
it provides the opportunity to carry situations in order to see difference outcomes
without any risk to the students or wastage or materials e.g. for sciences and
geography

ADVANTAGES OF CAL

Provides immediate feedback to students, who are able to tell if they understand the
topics or not
Enables students to recognize their own weaknesses and provides the opportunity to
work on strengthening them (e.g. in tutorials)
Encourages students by displaying a congratulatory message for each correct
response, motivating students to continue studying
May be embedded in a learning program accessible via VLE

School information management systems (SIMS)


These systems are widely used to help with the day-to-day running of schools. They can be
used for various purposes: to store students records, to produce class lists, to register
students, to produce reports, to manage book loans from the school library, to construct the
school timetable etc.

ADVANTAGES OF SIMS

Support automatic reporting e.g. attendance at school and SIMS can automatically
contact parents of the absence of their child using email, letter or telephone. This can
also be used by libraries to inform students of overdue books
Communication with parents can be personalized using e.g. mail merge
Quality of communications with parents can be monitored e.g. standard forms and
letters can be used and school reports can be compiled using statement banks
Faster access to information
Statistics and accounting information can be generated automatically and quickly

DISADVANTAGES OF SIMS

Data stored on the system must be up to datethis can be expensive. E.g. office
staffs are needed to ensure that students records are accurate i.e. for school reports.
o Another alternative is to allow carers or students to keep their personal
information up to date using a web-based system and password protection,
however the school still cant be sure that the info is up to date

THE LAW/POLICE
Law enforcement
National databases are used by police e.g. the National Crime Information Center (NCIC of
the USA) and the Police National Computer (PNS for the UK). Law enforcement officers
throughout the respective country can access these databases.
Police officers use computers to:

Prepare reports
Track history of telephone calls form a particular address
Managing cases
Identifying trends and patterns of criminal behavior and carrying out statistical
analysis
Tracking parolees (criminals who have been released before the end of their jail term
because of good conduct)
Posting surveillance photos of wanted criminals and missing people
Developing contacts with other police organizations, including, transmitting,
exchanging and obtaining information from other police stations
If a witness sees but cannot identify a criminal, the police can use software to
compose a picture of the alleged criminal based on the witnesss descriptionthis is
called profiling. This picture can then be compared with those on the national
database
A device attached to a computer is used to digitize and store an individuals
fingerprint, which can be compared with those on the national/local databases
Holding equipment inventories

In some countries, police officers have laptops in their patrol cars to make online inquiries
about vehicle registrations and drivers licenses from their databases
Video glasses are also being used, where a small video camera or webcam is built into a pair
of spectacles and communicates wirelessly to the local police station

CCTV
Surveillance cameras are used to monitor, for example, the street or specific buildings where
the owners or the police may want to inspect. They provide actual visual evidence instead of
using testimonials in court.
It is combined with facial recognition to identify culprits even in a low quality shot

Communication: police to police

10

Via two-way radio where they can contact for backup


Through walkie-talkies, for example, is much faster
GPS

Communication: police and public


Through social networking i.e. Facebook, Twitter where they update the public about e.g. law
changes, major events and can even monitor behavior like cyberbullying

Plate number recognition


Linked to a system that is capable of recognizing letters and numbers
The image is checked against the database and then the owner of the car is then identified
and may even find out the location

UKNDNAD
The United Kingdom National DNA Database is used to identify whom e.g. hair, blood
samples belong to because everyone has a unique DNA signature.
Law firms
ICT is used for reviewing case statuses and deadlines and preparing legal documents and is
much faster compared to doing it manually.
In the area of business management, ICT can be used for

Word processing legal documents. Detailed templates of legal documents can be


set up and quickly adapted
Data storage and retrieval info about clients
Spreadsheets accounting e.g. billing, incomes, expenses

Practice management can help lawyers practice law, which includes

Software that offers expertise in a substantive area of law e.g. bankruptcy, family law
or personal injury
Software to help with case management and document assembly, which enables
lawyers to quickly find information on past cases and judgment to use as precedents
in their arguments
Legal research websites e.g. Westlaw or Quicklaw help lawyers and law students
obtain comprehensive information about case law and legislation from many
countries around the world

HEALTHCARE AND MEDICINE


Computerized patient records
All patient records used to be paper-based, which was tedious and prone to human error
Now, electronic medical records (EMR) are now being used.

ADVANTAGES OF COMPUTERIZED PATIENT RECORDS

Records can be found quickly


Details of medical treatments can be stored, shared and transferred from hospital to
hospital
Less physical storage space needed can use that space for something else
Multimedia capabilities i.e. x-rays in the same place

DISADVANTAGES OF COMPUTERIZED PATIENT RECORDS

Security concerns confidentiality


Over-reliance on ICT
Extra training needed for doctors/nurses
Time needed to transfer handwritten files to digital copies

Patient monitoring
Doctors can now externally monitor patients e.g. in ICU via sensors connect to a computer
that record vital signs like blood pressure, heart rate etc.
If the vital sign goes below or above the set limit, an alarm is sounded to alert the personnel.
The information obtained can also be stored in the patients record.

11

Telemedicine
Medical dictionaries
Online diagnosis (expert systems)
Support groups

ADVANTAGES OF USING THE INTERNET

24/7 access to information


Because of reading alternative treatments, patients can now make informed choices
Reduces burden on hospitals and staff
Moral and emotional support good for patients well being
Professionals can access research online

DISADVANTAGES OF USING THE INTERNET

The website is not always accurate can make the wrong diagnosis
Prescription drugs may not be what they say they are and are illegal
Not everyone has access to the Internet
Lose rapport between doctor and patients

Magnetic resonance imaging (MRI)


These large machines scan the body using very large magnets, reconstructing either a 2D or
3D image of the slice to the computer, which can then be analyzed by doctors.
MRI machines are excellent for showing abnormalities in the brain e.g. strokes, tumors,
infections, hemorrhages and can be used to detect defects in the neck and spine.
Computer axial tomography (CAT) scans
This is an x-ray tube that rotates in a circle around the patient, giving 3D axial slice images of
the chosen part. This is useful for detecting tumors etc.
Medical expert systems
A medical expert system, or knowledge-based system, is one that analyzes questions
inputted by a practitioner and then answered using information previously stocked up. This
is used to support a doctors own diagnosis of a patient.
It consists of the following:

Knowledge base (the previously stocked up information)


Inference engine (analyses the input using reasoning and the knowledge base)

It is much quicker for doctors and diagnosis can be proven more accurate as it is guided by
medical facts.
The Quick Medical Reference (QMR) system (available from the Camdat Corporation) is an
example of a medical expert system that performs differential diagnosis in many areas of
internal medicine. Other examples include Mycin and Dendral.

ADVANTAGES OF MEDICAL EXPERT SYSTEMS

Can indicate the range of possible health problems based on the known symptoms
Gives support in making decisions about which a doctor may be unsure because of
lack of knowledge/experience
Help experts arrive at an accurate solution much quicker
Can be developed and kept up to date as new discoveries are always made
Can show concepts it used to arrive at its conclusions

DISADVANTAGES OF MEDICAL EXPERT SYSTEMS

Lacks judgment and intuition, which are often vital in diagnoses


Cannot learn from mistakes

LIBRARIES
Libraries use IT systems to keep track of books and other resources they lend to borrowers.
Some libraries are even connected to others in the area via WAN and share resources (like if
one doesnt have the book, they can recommend the borrower to go to the other library).

12

Other processes:

Store and access personal details of borrowers


Store and access a catalogue of books owned by the library
Search the catalogue to see if the library has the book in stock
Reserve a book
Send reminders to borrowers who have not returned books
Keep track of fines paid by borrowers

ADVANTAGES OF USING ICT IN LIBRARIES

Better organization
Easier access i.e. dont have to look for a long time to find a particular book/record
using barcodes etc
If a book cannot be found within the library, the RFID tag can be tracked using the
machine
Database software can be used to produce such an ICT system. At its simplest, there are
likely to be three tables in a relational database:
Borrowers table

Book catalogue table

Books borrowed table

Borrower identification
number

Book identification number

Borrower identification
number

Name

Title

Book identification number

Address and other contact


details

Author

Date borrowed

Other details

Location

Other details

Reviews and other details


ENTERTAINMENT AND LEISURE ACTIVITIES
Communication
Applications like Skype allow you to talk while video conferencing in real-time. This helps
people keep in touch even though they are in different countries.
Games
Computer games are inclusive of this e.g. FarmVille, World of Warcraft etc. These games
include graphics that may require a standard to high-quality graphics card installed in your
computer.
Media streaming
Media streaming is experiencing media e.g. the radio/music, looking at pictures, watching TV,
videos etc.

THE SOCIAL IMPACT OF ICT


A digital divide is when some people have easy access to the wide range of goods and
services available using ICT while others have limited or no access.

Effects on employment
Job losses:
This happens because of the almost complete automation of some companies, causing
workers to be laid off because they are not needed anymore e.g. automobile industry
automated assembly lines and chemical plants/oil refineries for monitoring and adjusting of
machinery to control processes.

13

Changes in job skills:


Workers have had to accommodate with the changes in the workspace i.e. technology and
computers. This means that the company has to provide new training courses for their staff
to learn how to operate the new machineries.
Job creation
However, jobs are also created when ICT is introduced e.g.

IT consultants
Video game developers/programmers
Graphic and web designers
Computer engineers etc

Changes in work patterns


Examples:
A journalist can work from home instead of having to be at a desk in the newspapers office
A teacher can have an entire class work on VLE or CAL software and provide very little input
during the session
A police officer can access information on criminals and stolen vehicles form a police car
Workers can telecommute instead of having to travel to work everyday
Teleworking
This is working from home or anywhere outside the office.

ADVANTAGES for WORKERS

Less stress (from travel, traffic etc)


Time waiting can be used for working ergo the availability via laptops, phones
FLEXIBLE SCHEDULE can take breaks whenever, not restricted
Reduced expenses for travel and clothing
More convenient

ADVANTAGES for COMPANY

Can attract/retain more workers


Can work from far those who are away can still work
Less expensive overhead for office space
Productivity goes up because work is now more accessible and easier to do

DISADVANTAGES for WORKERS

Distractions from family, friends etc


Temptation to slack because of Internet, TV
Less social interaction with colleagues may get boring so efficiency goes down
No feedback from managers
Less likely to get promotion
Lack of access to specialist facilities e.g. large-scale printers

DISADVANTAGES for COMPANY

Management can get more difficult not all in one spot


Workers may not be available when management wants to contact them
The task being done may need to be supervised

HEALTH
Ergonomics is important in reducing injury to people using computers, including:

Design and arrangement of the seating and the computer system esp. keyboard and
monitor
Arrangement to support someone using the computer i.e. foot/wrist supports
Rules governing the users behavior when using the computer e.g. how often breaks
should be taken

14

Health risks associated with intense/prolonged computer use are:

Repetitive strain injury (RSI) to the hands and arms. This is a painful condition
that occurs because of damage to tendons, nerves, muscles and soft tissue and can
be caused by the repetitive use of a keyboard and a mouse. Taking regular breaks

can reduce this possibility

Eye problems e.g. soreness, lack of focus and eye dryness from staring at a
monitor too long. Can be avoided by taking breaks, having regular eye examinations

by an optician using antistatic and other screen filters

Backache and similar problems can arise through sitting in an inappropriate posture
for long periods of time
Fatigue and headaches
Trip hazards are associated with trailing cables and should be reduced by putting
cabling in trunking or where it is not likely to interfere with users movement
Electric shock can be minimized by the use of residual current device (RCD) on the
main power supply to the computer and is designed to turn off the power if a user
receives an electric shock

PRIVACY
Privacy refers to the right of individuals to determine what what information is stored about
them and how that information will be used.
The Data Protection Acts (1984 and 1998) set out principles to make sure that personal
information is handled appropriately. Organizations in the UK that store personal information
must, by law, keep to these principles, which include

Data must be fairly and lawfully processed


Data must be used only for its intended purpose
Data collected must be adequate for its intended purpose, relevant to it and should
not be excessive
Accuracy of data my be maintained up to date, complete and not kept for longer
than necessary
Data must be stored securely and protected from unauthorized access
Personal data must not be transferred to countries that dont have similar rules to
protect personal privacy

COMPUTER CRIME
Software piracy
Software piracy is the unauthorized copying, using or selling of software without an
appropriate license. It includes copying CDs with software or music on them and downloading
software or music without paying for it.
Copyright violation
Using the Web you can download music, pictures, animated graphics, videos, books and
software. The copyright to some of this material is restricted to its owners, who sell you the
right to copy it. But if you copy it without permission this is effectively theft.
Hacking
Hacking means gaining unauthorized access to an ICT system and an individual who does so
is referred to as a hacker. Why do hackers hack?

Steal commercially sensitive data


Alter or destroy data via deletion or by installing a virus to destroy/corrupt it
o Done to disrupt legitimate commercial or governmental activities
Steal money by transferring it from one account to another using EFT

15

Identity theft
Spyware may be installed in your computer without your knowledge. This could send
information about your computer to others who may have malicious intent e.g. they may
want to know when your computer is online so they can use it to send spam without
knowledge. They may also collect information about you and your online bank accountsto
steal your identity.
Anti-spybot software like Spybot Search & Destroy can be used to remove spyware and
adware but info about you may not be stolen when you are online
Phishing
When you receive an unsolicited email inviting you to a response that involves you entering
your username, password and other personal details on a bogus website with a bogus
company. For example, you order from the supposedly legit website and you enter your
purchasing details. The bogus company charges your bank account for this but doesnt
deliver the products you ordered and paid for.
SECURITY
Physical safeguards

Access control: locks that open with entry codes, swipe cards or biometrics + security
guards can ensure that those entering are not fake
Access monitoring: CCTV cameras so that rooms can be monitored 24/7 and can see
who enters and leaves the room
Data security: taking regular backups and storing these in a fireproof safe in another
location
Protect hardware from natural disasters, theft and malicious damage: e.g. storing
hardware in a concrete underground bunker, hard-to-reach places that thieves
cannot easily access
Protect hardware from theft: clamping individual computers to desks, installing
burglar alarms attached to individual computers, CCTV cameras
Contingency plans + disaster recovery: ICT systems continue to operate with
minimum disruption and swift recovery e.g. contact another facility with similar ICT
systems so you can use that if yours crash

Software safeguards

Usernames and passwords for each user


Restricted access i.e. different access rights per user depending on their rank etc
Protect individual files with passwords
Virus scanners to prevent viruses from accessing the system because the intention
of some viruses is to damage, steal or copy the software
Firewalls are programs or hardware devices that filter the information coming
through the internet connection into a computer or network
o Can also block cookies, pop-up adverts or spam mail
Data encryption: used so that if someone unauthorized is able to access the file, it
cannot by understood i.e. the file is encryptedencrypted data is scrambled during
storage and transmission (an encryption key is needed to put the scrambled data in
the correct order)
Transaction logs: automatically track alterations to ICT systems, including identity
of those who access data and all changes made

Individual responsibility

Be cautious when you are on the internet and to whom you share your personal
data withdont publish your personal data (full name, address etc) on web pages
that everyone can access
o Dont publish anyone elses data either
Make sure you know who stores your personal data and that it is accurate and
appropriately protected (Data Protection Act 1998 used in the UK)
Dont plagiarize (copying someone elses work off a source and not including them
in the bibliography or crediting them/passing it off as your own work)

16

Dont download software or music unless it is copyright-free i.e. is not protected by


the Copyright, Design and Patent Act if in the UK
Dont engage in activities like hacking
Dont believe everything that you see online make sure you know the source
of any information and decide whether it is likely to be true or biased
Use virus scanners and other malware detection software, which protect you from
any malicious activity that may have been injected into your computer via Internet
Be polite and reasonable in all your online interactions dont bully others and
report and cyber bullies
Ensure that wireless networks that you use are secure i.e. encrypted

17

Anda mungkin juga menyukai