Monday, September 30, 2019

Computer Hardware

Use the link below to describe the different types of computer hardware.
https://www.slideshare.net/bappyislmdu/computer-hardware-a-class-presentation

Write shorts notes on your OneNote page on Input/Output Devices you do not know much about

https://www.computerhope.com/jargon/i/inputdev.htm

https://www.computerhope.com/jargon/o/outputde.htm

Obtain notes for the following devices
  1. MFP printers
  2. Eyegaze System
  3. blow pipe systems
  4. Braille keyboards
  5. VR goggles
  6. Magnetic stripe Readers
Distinguish between the following;
1. Bit, byte, kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (TB), petabyte (PB), exabyte (EB), zettabyte (ZB), yottabyte (YB)

2. Mac Address and IP address explaining how each is important.

3. MICR and RFID showing the areas of applications.


Computer Hardware Use In Health.
Investigate and make short notes on at least 5 unique special purpose computer hardwares / devices used in Healthcare and post your notes on OneNote page. For example the Xtensor.


Friday, September 27, 2019

Thursday, September 26, 2019

Paper 2 Practice



Criterion A;

Part 1: What is the concern all about?
            Why is it a concern?What is the negative impact on one or more stakeholders?
            What extracts from article will you use to support or give the context?
            Use evidences from the article to support the main issue identified
            N/b Do not describe an issue that is not directly stated or implied. The issue should be straight
                  away clear from the article.
Part 2: Who is the primary stakeholder?
            What is the use of the IT system?
            Which part of IT system is the stakeholder using?
            Can this be supported with extract or  an example from the article?
            This answers "Who", "How" and "Why"

Criterion B;
Use the document in the link below to learn how to respond to criterion B.
         Answering ITGS Paper 2 Criterion B

Criterion C;
Use the document in the link below for ideas on how to respond to criterion C;
         Answering ITGS Paper 2 Criterion C

Criterion D:
Part 1: Describe the one problem resulting from the use of the IT system.
            What is the impact of the problem?
            State  one solution to the one problem described
Part 2:  Describe how the solution will work
             NB Technical solutions should be describe with IT terms showing inputs, processing, storage, outputs.
             Non technical solutions should be supported with policies and actions required.
Part 3:  Evaluate some positives strengths of the solution in solving the problem.
            Evaluate some negatives of the solution in solving the problem.
Part 4; Conclusion
            What  areas of the solution do you have issues with?
            What do you recommend for future development of the solution
            Overall strategy for Paper 2 Criteria

Exercise
Read the news article in the link below and answers the assigned questions; Post your responses in your OneNote page.

Read the article in the link below;


Child Drinkers Article


Criterion A - The issue and stakeholder(s)
Describe one social/ethical concern related to the IT system

Describe the relationship of one primary stakeholder to the IT system 

Criterion B - The IT concepts and processes

Describe, step by step, how the IT system works

Explain the relationship between the IT system and the social/ethical concern described in Criterion A

Criterion C - The impact of the social/ethical issues on stakeholder
Evaluate the impact of the social/ethical issues on the relevant stakeholder

Criterion D - A solution to a problem arising from the article
Evaluate one solution that addresses at least one problem identified in Criterion C

Tuesday, September 10, 2019

Introduction to Computer Software

Introduction to Software


Computer software

Makes brief notes on software and post them on your OneNote page

Your notes should touch on the following;
  • Define software
  • Application software with examples
  • Systems software which includes operating system and utility programs with examples
  • Computer interface for example,  Command Line Interface CLI, GUI, MDI, HCI, Voice Interface and others
  • Software licencing; Distinguish between shareware, public domain, freeware, proprietary and open source software
  • Licensing authorities: Business Software Alliance (BSA)
  • Commercial and custom-built (bespoke) software
  • Registration, serial number, warranty, copyright agreement
  • Web-based software
  • User support: manuals, assistants, tutorials, help systems, “Read Me” files
  • Macros, templates, wizards

Make further Notes on the following;

Thursday's  lesson
File formats
- What are file formats?
- Describe the different computer file formats 

Notes presentation
https://www.slideshare.net/samudin/applicaton-software

https://pt.slideshare.net/chetanbirla/it-chetan/18?smtNoRedir=1

https://www.slideshare.net/myraijuan/kinds-of-computer-software

Future of software.
https://www.youtube.com/watch?v=bwj2s_5e12U

Friday's Lesson.

What would be the best thing to do in each of the following scenario,

One student in class should lead the discussions,

1. Copying an employee’s files. You are a computer system manager. An employee is out sick and another employee requests that you copy all files from the sick person’s computer to his so he can do some work.

 2. Insufficient privacy protection. Your customer is a community clinic that works with families that have problems of family violence. The clinic has three sites in the same city, including a shelter for battered women and children. Currently, the clinic uses no computers. The director wants a computerized record system, networked for the three sites, with the ability to transfer files among sites and make appointments at any site for any other. She wants to have an Internet connection for email communication with other social-service agencies about client needs. She wants a few notebook computers capable of storing copies of records that staffers can carry when they visit clients at home. At the shelter, staffers use only first names, but the records contain last names and forwarding addresses of women who have recently left. The director’s description of the system makes no mention of passwords or encryption. The clinic’s budget is small, and she wants to keep the cost as low as possible.

 3. Risky systems. Your team is working on a computer-controlled laser device for treating cancerous tumors. The computer controls direction, intensity, and timing of the beam that destroys the tumor. Various delays have put the project behind schedule, and the deadline is approaching. There will not be time to complete all the planned testing. The system has been functioning properly in the routine treatment scenarios that have been tested so far. You are the project manager, and you are considering whether to deliver the system on time, while continuing testing, and to make patches if bugs are found.

4. Risky systems. Suppose you are a member of a team working on a computer-controlled crash avoidance system for automobiles. You think the system has a flaw that could endanger people. The project manager does not seem concerned and expects to announce completion of the project soon. Are you ethically obligated to do something?

5. Release of personal information. You work for the IRS, the Social Security Administration, a medical clinic, or a large credit bureau. Someone asks you to get a copy of a person’s file. He will pay you $500.

6. Release of personal information—version 2. You work for the IRS, the Social Security Administration, a medical clinic, or a large credit bureau. You know another employee sells files with people’s personal information.

7. A test plan. A team of programmers is developing a communications system for firefighters to use when fighting a fire. Firefighters will be able to communicate with each other, with supervisors near the scene, and with other emergency personnel. The programmers will test the system in a field near the company office.

 8. Copyright violation. Your company has about 25 licenses for a computer program, but you discover that it has been copied onto 80 computers.

9. Hiring foreign programmers. You are a manager at a software company about to begin a large software project. You will need to hire dozens of new programmers. Using the Internet for communication and software delivery, you can hire programmers in another country at lower salary than programmers in your country. Should you do this? 1

10. A small company offers you a programming job. You are to work on new versions of its software product to disable copy-protection and other access controls on electronic books. The company’s program enables buyers of e-books to read their e-books on a variety of hardware devices (fair uses). Customers could also use the program to make many unauthorized copies of copyrighted books. The company’s Web page implicitly encourages this practice.

11. Suppose you came to the U.S. from Kosovo 15 years ago. You now have a small software company. You will need to hire six programmers this year. Because of the devastation by the ware in your homeland, you have decided to seek out and hire only programmers who are refugees from Kosovo.

12. You are the president of a small computer-game company. Your company has just bought another small game company that was developing three new games. You look them over and find that one is complete, ready to reproduce and sell. It is very violent and demeaning to women. It would probably sell 200,000–400,000 copies. You have to decide what to do with the game.

 13. In 1990, the campaign of a gubernatorial candidate in Massachusetts distorted a digital image of his opponent in a television interview to make the opponent appear more menacing.

14. The faculty at a large university requested that the campus store sell an electronic device, AutoGrader, that students would use when taking machine-scorable tests. Students would enter test answers into this personal electronic device and then send the answers via infrared signal to the instructor’s computer in the classroom. Once all the answers are received, the instructor’s computer immediately grades the test and sends the students’ scores back to their devices. Suppose you are a university dean who must decide whether to allow use of this system.

 Scenarios from Gift of Fire Book by Sara Baase

Mid-term DS Paper 3 Research Activities

  See below the assigned area of investigation Az-zara:  AI-Based Hiring Platforms: HireVue Objective: Research how HireVue uses AI-driven...