Professional Documents
Culture Documents
Unit 1
Introduction to Information Systems
Name: .................................................
Teacher: Mr Morris
Email: chris.morris@stursulakingsgrove.catholic.edu.au
Twitter: morry_tweet
MSN/Gmail: morryc@gmail.com
Skype: dj_morry
Mobile: NO WAY!!
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
The Information Processes and Technology Stage 6 course, teaches students about information-
based systems. It covers the processes of collecting, organising, analysing, storing and
retrieving, processing, transmitting and receiving, and displaying, as well as the technologies that
support them. With this background, students will be well placed to adapt to new technologies as
they emerge.
Through this course, students will gain a good working knowledge of:
• the key concepts of data, information and systems
• the interactive nature of effective information-based systems
• available and emerging information technologies
• the social and ethical issues associated with the use of information technology and
information systems, such as equity and access, privacy, freedom of information and
copyright
• the communication, personal and team skills necessary to ensure that an information
systems solution is appropriate for the needs of the users
• related issues such as project management, documentation and user interfaces.
Students who successfully complete Information Processes and Technology will be confident,
competent and discriminating users of information processes and information technology. They
will appreciate the nature of information, its ethical use and its impact on many aspects of life. As
such, they will be well prepared to pursue further education and employment across an
especially wide range of contexts.
2
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Course Structure
The arrangement and relationship between components of the Preliminary course and the HSC
course for Information Processes and Technology Stage 6 are outlined below. The percentage
values refer to indicative course time. A minimum of 40% course time is to be devoted to the
integration of content into project work in both the Preliminary and HSC courses. It is also
expected that a significant proportion of time will be devoted to integrated practical activities.
3
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Information Processes
Transmitting/Receiving
Storing and Retrieving
Processing
Organising
Displaying
Collecting
Analysing
Project Work
Preliminary
4
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
5
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
information processes
collecting – the process by which data is distinguish between, and categorise, the
entered into or captured by a computer activities within an information system in
system, including: terms of the seven information
– deciding what data is required processes
– how it is sourced use an existing information system to meet
– how it is encoded for entry into the a simple need
system manually step through a given information
organising – the process by which data is system identifying the information
structured into a form appropriate for the process
use of other information processes such for a given information system, describe
as the format in which data will be how the following relate to the
represented information processes:
analysing – the process by which data is – participants
interpreted, transforming it into – data/information
information – information technology
storing and retrieving – the process by schematically represent the flow of data and
which data and information is saved and information through a given information
accessed later system, identifying the information
processes
6
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
7
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
8
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
What is Information?
Source: Davis, S (2008) ‘Information Processes and Technology – Preliminary Course’ Parramatta Education Centre: Sydney
The word ‗information‘ appears to be the catchword of the century. Apparently we are
living in the ‗information age‘.
Information is supposed to help us all and the more we have the more enlightened and fulfilled
our lives are supposed to be. There are even charitable organisations devoted to making
information more accessible to those in third world countries. Information is traded as a
commodity, like oil or even gold. The Internet is often referred to as the information super
highway. So what is this stuff called information?
This is really the primary aim of this course, to examine the processes and technologies used to
turn raw facts or data into meaningful information. We must be careful with our understanding of
facts in this context, the information resulting from the data will only be correct if indeed the data
is factual.
The cliché ‗garbage in – garbage out‘ holds true, if the data is rubbish then the
resulting information will also be rubbish.
Information is therefore the meaning that we, as humans, assign to data. We gain
knowledge when information is received concerning some fact or circumstance.
For example, ‗123456.65‘ is data; ‗your savings account balance is $123,456.65‘ is
information; whereas ‗I‘ve got enough money to buy that Ferrari‘ is knowledge.
2.
9
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
An information system (IS) is created for a purpose. The participants of an information system
use information technology and data to carry out information processes in order to produce
information and fulfill this purpose. An information system may address the needs of a group
(group information system) or an individual (personal information system) and is operated in
a particular environment.
Information systems give rise to ethical issues for people directly and indirectly involved with
them. They have a social impact on the environment in which they operate.
The arrows in the diagram indicate the interactions between the elements.
The diagram is sometimes referred to as an “information system diagram”. (ISD)
The system‟s purpose is the reason for its existence and it is used to measure its success.
The environment is everything that influences or is influenced by an information system and its
purpose. It is constantly changing.
Participants are a special class of user who carries out the information processes within an
information system. Participants are direct users (e.g. employees) and are part of the system.
A user or indirect users (e.g. customers) are not part of the system, but the system exists
to service or benefit them in some way.
Information is data that has been ordered and given some meaning by people. It is created or
modified by the information processes.
Information technology refers to the hardware and software used by the information system.
Communication technology which may include hardware and software should also be included
when information technology is mentioned.
10
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Information processes may involve computer and non-computer activities. There are seven
information processes:
collecting,
organising,
analysing,
storing/retrieving,
processing,
transmitting/receiving and
displaying.
Collecting is the process that defines the required data, identifies the source for the data,
determines how the data will be gathered and gathers the data.
Organising is the process that determines the format in which data will be represented in the
information system.
Analysing is the process that interprets the data and transforms it into information.
Storing/retrieving is the process that saves the data/information for later use and obtains
data/information previously saved.
Transmitting/receiving is the process that sends and receives data and information, within and
beyond information systems.
Displaying is the process that decides the form in which the information will be displayed and
displays the information.
11
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
2
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Draw the boxes and headings. Do not forget to include the arrows.
Fill in the blanks!
It would be rather impossible to list every component and detail of an information system,
especially under examination situations.
The important point is to include the key factors first. More details can be added if time permits.
3
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
6. ______________________ is data that has been ordered and given some meaning by
people. It is created or modified by the _______________________________
4
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
13. __________________is the process that manipulates data into information. is the process
that sends and receives data. is the process that saves data and obtains data that have been
saved previously.
15. When a customer visits a bank and withdraws money with the help of a bank teller, the
customer is a ______________________________________ of the information system of the
bank and the teller is a ____________________________________ of the information system
of the bank.
16. When a customer conducts online banking via the internet, the customer is a
_____________________________________ of the information system of the bank.
2
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
A group of innovative high school students use an information system to run an “opinion website”
analyzing opinions among young people on current issues. A question is posted on the website
each week and visitors can express their opinions by completing a form on the website. The
responses are categorized and stored on a database. The responses are then studied carefully
taking into consideration gender and age differences. The results are presented in graphical
form and are displayed on the website the following week.
3
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
4
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Activity: „Pretzels”
Pretzel Wagon is a company that makes and sells fresh pretzels. It has 20 outlets, a warehouse
to supply ingredients to the outlets, and a head office. Until recently, Pretzel Wagon knew little
about its customers. It did not know which type of its pretzels was the most popular and did not
know which one of its outlets was doing the best.
An information system has been implemented recently to identify customer preferences and to
maintain accurate records of sales. A computer with a hand-held scanner was installed in each
outlet. A list of barcodes corresponding to the different kinds of pretzels available is placed on
the side of the computer. Every time when a pretzel is sold, the shop assistant would scan the
appropriate barcode with the hand-held scanner. The type and price of the pretzel are displayed
and a receipt is printed after cash is received. This sales information is recorded on a database
on the computer. At the end of each day, a sales report is sent electronically to the head office
database where daily reports of all outlets are stored. The head office studies these reports
periodically to identify customer preferences and compare outlet performances. A sales graph
comparing the performance of all the outlets is sent to each outlet every month.
5
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Activity: “Kindergarten”
A small kindergarten has an information system to keep track of the details of students and their
health records. Personal details and contact information of each child are entered into the
computer system from the enrolment form as soon as the enrolment process is completed. Each
child undergoes medical examinations such as eye testing, hearing testing and motor skills
testing on a regular basis. These records are also kept in the kindergarten database. In addition,
the information system generates fee notices and produces a progress report for each child at
the end of the year.
6
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
An Australian company is about to release what it says is a world first software suite, enabling
parents to completely control their children's mobile phone usage.
Meg Dennis, co-founder of Leopard Labs, which developed most of the suite, said it would help keep
phone bills in check, prevent cyber bullying and ensure children were not exposed to adult
content.
The software, loaded on to the phone and managed over the web, lets users filter inappropriate
websites, control all SMS and MMS messaging and block expensive premium SMS numbers.
Effectively, parents could use it to control what sites their kids looked at on their mobile phones,
what messages they received and the people they contacted.
Also part of the package is an anti-virus program from Kaspersky Lab to protect against mobile
malware and spam, which security companies say is on the rise as mobile phones become more like
computers.
"What we see happening is mobiles becoming the device of choice to access the internet ... and the
mobile world is very similar to the PC world in that it needs those types of controls available,"
Dennis said.
Alexey Gromyko, business development manager at Kaspersky Lab, said that, while mobile phone
viruses were yet to become a serious threat, this would change rapidly as more traditionally PC-
based tasks such as web browsing and internet banking were conducted on handsets.
MMS messages and Bluetooth were popular vehicles for sending mobile viruses, which could steal
data or trick the phone into sending messages to costly premium numbers.
"Normally users need to be infected before they start to take action ... there needs to be several
outbreaks after which mobile security will come as a standard," Gromyko said.
Dennis said the complete software package, called mozone, which Leopard Labs had been working on
since 2005, would be available to buy from the company's website in November.
The price had not been set but Dennis said it would be "completely affordable".
The company was also shopping the software around to mobile carriers, which could offer it directly
to their customers.
Dennis said some mobile carriers already offered customers the ability to restrict the content
delivered to handsets, but mozone, being a client-side solution, put total control in the hands of the
user.
A new program, loaded on to phones, lets users filter inappropriate websites, control
all SMS and MMS messaging and block
expensive premium SMS numbers.
Sites could be blocked based on their category (adult, gambling, shopping, etc) or individual url,
while al lpremium SMS numbers could be barred save for exceptions such as those for Big Brother or
Australian Idol.
7
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Time of day profiles enabled parents to block certain sites such as Facebook and MySpace during
school hours, but open them up for access after a certain time.
"You can say I only want people in my address book who know my kid to access them [and] anyone
outside that address book will get rejected," Dennis said.
Specific words could also be filtered from SMS messages, but Dennis said she did not expect that
particular feature to be widely used as it was easy to bypass using abbreviations.
"It's not about stopping access; it's about facilitating it and making it a great user experience for kids
and parents as well," she said.
Mozone at first will only support the Symbian platform, which analyst firm Canalys says represents
72 per cent of the world's smartphone market, but Dennis said support for other platforms would be
added early next year.
8
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Numerical
Data
Text Data
Image Data
Five
types of
Data
Audio Data
Video Data
9
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
What is a Computer?
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
We sometimes call objects that are useful to us tools, for example, a pen or a spade. A computer
is an extremely useful tool because it is many tools in one. It can perform a variety of tasks for
us, the user, such as:
assisting to write a letter
keeping an address book
controlling spacecraft
doing mathematical calculations
creating pictures and animation.
The first computers were mechanical, but today‘s computers are mainly electronic, using
electricity for power.
A computer is an electronic tool that can process data
according to a stored sequence of instructions.
10
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Whether small or large, computers can perform four general operations. These operations
describe the computer‘s role in information processing and are: input, processing, output and
storage. Collectively, these operations describe the procedures that a computer performs to
process data into information and store it for future use. (The major steps in information
processing include acquisition, input, validation, manipulation, storage, retrieval, output,
communication, and disposal.)
All computer processing requires data. The term data refers to the raw facts, including numbers,
words, images and sounds, given to a computer during the input operation. In the processing
step, the computer manipulates the data to create information. Information refers to data that has
been processed into a meaningful and useful form. The production of information by processing
data on a computer is called information processing, or sometimes data processing (DP). During
the output operation, the information created is put into some form, such as a printed report, that
people can use. The information can also be stored electronically for future use.
The list of instructions that a computer executes is called software. Physical computer equipment
is called hardware. Without instructions, a computer (hardware) cannot process the data.
In this way, software provides the link between participants (people) and hardware.
A typical computer system can perform many different tasks simultaneously. Data can be
entered into a computer system using an input device. The data is then manipulated or changed
in some way to produce information. This manipulation is called processing. This information
may then be displayed on an output device. If required the data input, or the information output
can also be placed in a storage device for later use.
There are five logical elements of a computer system; those being input, processing, output,
storage and control.
Processing +
Control
Input Output
11
Storage
(Primary +
Secondary)
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
The control unit (CU) , which is located in the central processing unit (CPU) performs the
function sof management and control. The control unit supervises and executes instructions by
instructing other parts of the CPU to carry out the required operation.
12
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
The input, process, output and storage operations that a computer performs may seem very
basic and simple. However, the computer‘s power derives from its ability to perform these
operations with speed and reliability and to store large amounts of data and information.
Speed
In a computer, operations occur through the use of electronic circuits contained on small chips
as shown in Figure 1-4. When data flows along these circuits it travels at close to the speed of
light. This allows processing to be accomplished in billionths of a second.
Reliability
The electronic components in modern computers are very reliable and seldom fail. The high
reliability of the components enables the computer to produce accurate results on a consistent
basis.
Storage
Computers can store enormous amounts of data and keep that data readily available for
processing. Using modern storage methods, the data can be quickly retrieved and
processed and then re-stored for future use.
Accuracy
Computers can process even complex data precisely and accurately, and output error-free
information. In fact, most instances of computer error can be traced back to other causes, often
human mistakes.
Communications
A computer that can communicate with other computers has many more options than a stand-
alone computer. If a computer is able to communicate with a remote computer, it can share any
of the four information processing operations — input, process, output and storage — with that
remote computer.
13
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Review Questions (Complete the following answers to the questions in your books)
Make a poster showing the five main application software used in homes around
Australia. Include images which can be obtained over the internet
(www.google.com) – Image search
14
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Files are stored on a disk and are represented as a series of 0‘s and 1‘s called BInary digiTs
(bits). The term byte is used to represent each group of eight bits.
1 Byte
bit
0 1 0 1 1 0 0 1
Storage Units
Questions:
1. How many kilobytes can be stored on a 4 Gb USB Memory Stick
2. How many bytes of information can be stored on a CD/RW with a storage capacity of
80mins or 700 megabytes?
3. How many bytes would it take to store question 1?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
15
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
16
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
What is Hardware?
The physical parts (called devices) of a computer are the parts you can actually hold. They are
the hardware.
The most common pieces of hardware found on a personal computer (PC) are shown in the
following illustration.
17
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
The majority of primary storage is RAM with, typically, a small amount being ROM (stores
a part of the operating system). The relative proportion of primary storage available to
the various tasks will vary depending upon the:
size of operating system software
size of application software, more features
typically require more primary storage
execution of program instructions and
temporary storage of data
amount of input/output data to buffer (store
temporarily)
18
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
New software applications typically provide more and more features, which requires larger
storage (both primary and secondary). Often there will be insufficient storage available and
hence it will not be possible for the application software to perform the required task. If this
occurs it will be necessary to add more storage. If this cannot be done then a more
capable computer system would need to be purchased.
Magnetic disks, either hard disks or floppy disks provide the most common form of online
secondary storage. Optical disks such as CD's and DVD's are also a popular form of secondary
storage.
Free Primary Storage
Secondary
Storage
Application Software
Operating System
The more
RAM the
better!!!
19
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
During the execution of a program, data and instructions are held in primary storage (RAM and
ROM). These consist of:
If you are working on a word processing document, the document and the word processing
program will both be in RAM. When you instruct your word processor to save your work to a disk,
the instructions on how to do this are stored in RAM. These instructions are 'fetched‘, one-by-
one, by the CPU's control unit for the CPU to obey. Since the CPU and the RAM are on the
same motherboard, the communication between them is as fast as possible.
The process of reading and obeying instructions in the CPU is called the fetch-execute cycle.
20
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Input Devices
The Keyboard
The Sholes (QWERTY) keyboard was designed with the keys placed to slow the typist down. In
particular the left hand has more work to do than the right hand. As the majority of people
are right handed, extra work for the less able left hand slowed the typing speed. Also commonly
used letters on the QWERTY layout are positioned away from the typist's speedy index
fingers (the 'hunt & peck' fingers).
Keyboard Areas
Alphanumeric
These keys provide alphabetic, numeric, punctuation and other characters. Many
keyboards now provide a separate numeric keypad section which makes it easier to enter
numeric data.
Function keys
Special keys usually labelled F1 to F10 or F12. Function keys can be programmed to perform
various program operations, for example, press F1 to obtain help information
screens. Some application software comes with a paper or plastic keyboard function key
template, which is printed with the operation of each function key.
Modifier keys
21
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
A range of keys can modify the action of another key. Also many computer systems now
use a mouse and when a modifier key is pressed it affects the action of a mouse click.
Other keys
[Return] or [Enter]: Used to execute a command, move the cursor to a new line or
create a new line.
[Esc] or [Escape]: Terminates the execution of a command or program.
Cursor keys: Often referred to as 'arrow keys' because they are labelled with
arrows pointing left, right, up and down. They are used to move the cursor (up,
down, left or right) to the appropriate place on the screen display.
[Tab] Moves the cursor to a preset location on the current line. This is useful for
lining text up in table form. The Tab key is also used to 'jump' to the next data
entry item on a screen display, for example, within a screen dialogue box or when
using a database.
[Backspace] or [Delete]: (Backspace] deletes the character immediately to the left of
the cursor and moves the cursor back one character to the left. This is useful for
deleting mistakes that have just been typed. On some computers the backspace
key is labelled with an arrow pointing left or may be labelled as [Delete]. With
many keyboards both [Backspace] and [Delete] are both provided. In this case the
[Delete] deletes the character directly above the cursor and the [Backspace] deletes
the character to the left of the cursor. Somewhat confusingly the [Backspace] key is
also used to move back to the previous page in a Web browser.
Most keyboards also have specific keys for large cursor movements, for example, [Page
Up], [Page Down], [Home] and [End].
22
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
[Page Up] Moves the cursor to the start of the previous screen.
[Page Down] Moves the cursor to the start of the next screen.
[Home] Moves the cursor to the start of the current line or start of a document.
[End] Moves the cursor to the end of the current line or end of a document.
Research Activity
1. Research some information regarding the DVORAK Keyboard.
Why was it developed?
Whom was it developed by?
Why is it not the most commonly accepted keyboard today
Other common input types are locating devices or locators. This type of device
enables various screen positions or locations to be selected by a screen pointer.
• Mouse — the three types of mouse currently available are:
1. Mechanical mouse where movements in the mouse ball are converted
into vertical and horizontal movements of a screen pointer.
2. Optical mouse uses reflected light to detect movement over a silvered mat
containing a black grid. As the mouse crosses the black grid lines, no light is
reflected back. This tells the pointer to move to the next pixel on the screen.
3. Trackball (inverted mouse) where the user moves the trackball itself with
the palm or fingers of the hand.
How it works!
The mouse converts movements in a ball underneath the mouse into a new screen pointer
position. The screen pointer relates directly to the movement in the ball. For this reason, the
mouse is called a relative device.
Graphics (or digitising) Tablet — the term 'digitising' means converting into digital form or
binary, which the computer can understand. A 'tablet' consists of a table containing a grid.
The graphics tablet uses a magnetic puck or stylus (often referred to as a hand-cursor) to
precisely enter actual locations from the tablet onto identical positions on the screen. They
are especially suitable in graphic design and map making where traditional maps can be
traced to produce line objects.
How it works!
In a graphics tablet, the actual position of the locator puck or stylus always corresponds to the
same screen location.
Review Questions (Complete the following answers to the questions in your books)
1. Which input device would be most suitable in the following situations:
a. To be built into a notebook computer
b. To enter text into a computer
23
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Scanner
A scanner is a digitising device. It scans an image to create an accurate binary representation,
which can be further processed or saved in secondary storage. Desktop scanners typically
scan a complete A4 or A3 page in a single pass.
The scanner moves a light source (a strip of light) across the page, which is somewhat
similar to a photocopier. As the strip of light moves along the page, the reflected light is
measured with light sensors. These light sensors output binary data with a one to one
relationship. The scanned image, now in binary form, may then be processed using:
graphics software to enhance and/or modify the image
OCR (Optical Character Recognition) software for text based data. OCR software
converts the image of the text directly into primary storage, just as if the text was
keyed at the keyboard.
Others include a microphone, video camera and a digital (still) camera. These will be
discussed in the second unit Tools for Information Processing.
Output Devices
Even high-resolution displays cannot match the resolution of high quality printers. Common
laser printers achieve a minimum of 300 dpi, with many now providing a resolution of
1200 dpi. Converting pixels on a display into equivalent dots per inch reveals that a
typical high resolution display is less than 100 pixels per inch (ppi) while some specialist
displays can achieve 150 ppi.
24
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
CRT's are the most popular and widely used output visual display device, most personal
computers come with one! Typically a CRT display is of the raster scan type allowing text and
graphics to be displayed. The internal operation of a computer CRT visual display is much like a
normal television CRT display, however a computer CRT is manufactured to produce a higher
resolution image than a normal television. The inner surface of a CRT screen is coated with a
phosphorescent coating that glows briefly when hit by a beam of moving electrons. The electron
beam is generated at the rear of the CRT and is projected toward the front screen. An electron
beam can only strike one point (called a pixel) on the screen at a time. Therefore the beam must
be continually scanned back and forth across the screen in lines. The beam scans from left to
right, moves down a small amount, scans left to right, moves down a small amount and so on
until the screen has been completely scanned. This pattern of scanning is called a raster scan.
This display uses similar technology to the displays used in digital watches and calculators.
LCD's used in computer displays provide higher resolution than displays used in
calculators and watches. LCD displays are commonly used with notebook, laptop and portable
computers, but are also being used with desktop computers. The LCD display is controlled by a
video controller that switches the appropriate pixels on or off to create a matrix of pixels much
like a CRT display.
Colour LCD's are now very common as they don‘t occupy as much desk space as a CRT
monitor. Notice that most offices and government departments have now opted for the LCD
displays as their price is continually decreasing.
The most common method of printing is by applying dots to the paper, which is called, bit
mapped printing. The term bit mapped is used because there is a one to one relationship
between storage (stored binary digits, that is, bits) and the dots on the paper. The quality of print
with a bit mapped printer is determined by the number of dots (similar to screen resolution) per
unit length — typically measured in dots per inch (dpi). The more dots per unit area the higher
the quality of the print out. Bit mapped printers are either impact or non-impact.
Impact printing involves a hammer or series of tiny pins hitting an inked ribbon, which causes ink
to be pressed onto the paper. This leaves a printed image on the paper. In contrast with non-
impact printing the print head does not actually touch the paper. The hard copy is produced by
squirting ink, in minuscule amounts, or by use of heat and/or laser beams onto the paper.
25
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Impact Printers
Dot matrix printers were the most popular impact printer for personal computers but now
they are starting to "disappear into history". The print head consists of a line of 9, 24 or even 48
pins, which produce dots by striking an inked ribbon and pressing it against the paper. The
print head moves across the paper to form a thick scan of dots or a line of characters. The
print head makes many passes across the paper, line by line down the page to produce either
text and/a graphic image.
The quality of dot matrix print is usually referred to as draft, near letter quality (NLQ) or letter
quality (LQ). In draft mode the print head only makes one pass across each line, 9
pin draft is poor, 24/48 pin draft is quite acceptable. The final print quality depends on
the number of passes the print head makes and the number of pins in the print head.
Standard dot matrix printers produced hard copy with around 150 dpi resolution and
because of the impact nature, they are noisy in operation. They are commonly used to print
receipts in department stores and restaurants as there is little need for high quality image
printing.
An ink jet printer is a non impact printer. The print head is somewhat similar to that of a
standard dot matrix printer. Instead of pins there are tiny holes, called nozzles or ink jets.
Most print heads currently have at least 80 nozzles and some have up to 304 nozzles.
Whereas a dot matrix printer pushes pins out to strike the ribbon, the ink jet printer squirts
droplet(s) of ink directly onto the paper to produce characters and/or graphical images. The hard
copy is made up of dots of ink that hit the paper and hence an ink jet printer is a bit mapped
printer. Ink jet printers now achieve resolution of up to 1200 dpi and are relatively quiet in
operation.
Laser printers
26
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Laser printers are more expensive than the other printers. However prices are dropping and in
conjunction with the print resolution they offer, provide practical quality output. In comparison
with standard ink jet printers basic laser printers are often cheaper to run and only marginally
more expensive to purchase.
Laser printers are quite fast, producing a minimum of 6 and up to 24 pages per minute.
Resolution of print is typically 600 dots per inch (2.54cm) while laser printers producing 1200
dots per inch are becoming more commonly available. Colour laser printers are also becoming
more common, albeit at a higher price and it will be some time before colour laser printing
technology is used for standard printing functions.
Activity
1. For each hardware device studied thus far, create a table or Venn diagram that compares
the different functions of an alternative device eg impact vs non-impact printers, mouse vs
trackball.
2. Do a cost/benefit analysis on each item using an on-line computer e-tailer.
Eg. www.dstore.com.au, www.dicksmith.com.au,
Ergonomics
In a typical computer-based system there is an interaction between the human user and the
machine. In the past many employees would spend their entire working day in front of a
computer monitor keying in data. Little rest time was provided and poorly designed office
equipment was often used. The symptoms that can arise from incorrect or repetitive practices
include dizziness, headaches, stiff neck, back problems, blurred vision and aching joints.
Ergonomics is the study of human factors involved in the design of the workplace. It
involves adopting work and working conditions to suit the individual worker. Ergonomics involves
studying many factors including the following:
• design of furniture • total work environment
• work routine • techniques used at the keyboard
• placement of equipment •design of software
.
Design of Furniture
Ergonomically designed furniture is designed to reduce the risk of injury workers and to make
their work more enjoyable and productive. Studies have shown that the single most important
item of furniture is the chair. Chairs should provide good posture and have a back rest.
The height of any seat should be adjustable so that your elbows are about level with the desk.
Mobility is important since, if you have a fixed seat and you have to lean sideways or twist to get
to your disks or phone, then this action can cause problems for your back.
Desks should have height and tilt adjustment so that each user can find a comfortable position. A
desk should be large enough so that everything is easily reached. A copy holder should be used
so that the typist can see both the copy and the screen without undue head movement.
27
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Monitors have been a cause of concern due to the possible radiation effects on workers over
long periods of use. More common problems with monitors include eye strain and headaches
(caused by flickering screens) and neck problems (caused by monitors being placed at the
incorrect height).
Monitor screens should be flicker-free, have a high resolution so that the screen is easily read
and have an anti-glare coating to prevent eye strain. A large screen size is better
(35 cm or larger) for prolonged work.
Placement of Equipment
The keyboard should be placed so that your lower arms are horizontal while your upper arms are
vertical. The keyboard should angle up slightly and be in direct line with the monitor so that you
do not have to twist sideways to see what you have typed. The mouse should be placed to the
side of the keyboard in easy reach. The monitor should be placed at a comfortable distance but
the centre of the screen should be just below eye level to eliminate possible neck ache and
sore shoulders. The use of a monitor arm which is attached to the desk is highly recommended.
Work Routine
Regular breaks from repetitive keyboard input and exercising while at the keyboard have been
found to be useful in reducing the risk of injury to workers.
Flexing interlocked fingers a few times every hour, looking out the window or across the office at
regular intervals, stretching your legs under the desk or standing up at regular intervals are all
exercises designed to help the worker cope with computer use in an office.
16
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Job rotation, where keyboard operators are given breaks by performing other jobs in the office, is
also a common way to alter the work routine.
A – 60 cm between eyes and monitor
D - Adjustable
height
E - Footrest to relieve
thigh/leg strain
17
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
18
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
19
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
1. What, if any ergonomic features are employed in your school‘s computer rooms?
2. Describe how the correct placement of equipment can help reduce stress in the
workplace?
3. The diagram below points out six important ergonomic features that would be present in a
well designed computer workstation.
20
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Review Test
18
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
We live together as a social group rather than in isolation, for this to occur harmoniously requires
laws for correct conduct but it also involves many unwritten ways of going about the business of
living. These unwritten morals are known as ethics, some ethics have evolved over time into
laws, however many others remain principles that are understood by society and that influence
the conduct of its members.
For example, most of us would agree that it is morally unacceptable to commence a new
relationship whilst already in a relationship. It is not illegal, however most of us would look poorly
on someone who does this. We would also accept that stealing is unethical, in this
case society has, over time, evolved laws to ensure those who steal are punished.
There inevitably are social and ethical issues which arise from the processing of data into
information. These issues affect not only the participants within the system but also
those outside the information system. It is the responsibility of system designers to
ensure that information systems they create take account of social and ethical issues.
Likewise participants must ensure they use systems in a socially and ethically
acceptable manner. Some of these issues have been recognised by governments and as
a consequence laws have been enacted to ensure compliance. Some of the major issues
include:
Privacy of the individual
Security of data and information
Accuracy of data and information
Changing nature of work
Appropriate information use
Health and safety
Copyright laws
Consider the following:
1. A website collects email addresses and subsequently sends out advertising emails.
2. A mail order company sells its customer details to another direct mail company.
3. An employee of an energy company views details of her friends‟ accounts.
4. A student downloads information from the web and uses it as part of an
assignment.
5. An employee spends at least 8 hours per day at the keyboard.
19
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
In Australia, privacy is legally protected via the Privacy Act 1988 and its subsequent
amendments. This act contains ten National Privacy Principles, that set standards that
organisations are required to meet when dealing with personal information, the text in
Fig 1.10 briefly explains each of these principles.
20
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Consequences of the Privacy Act 1988 mean that information systems that contain
personal information must legally be able to:
• explain why personal information is being collected and how it will be used
• provide individuals with access to their records
• correct inaccurate information
• divulge details of other organisations that may be provided with information from
the system
• describe to individuals the purpose of holding the information
• describe the information held and how it is managed
STIMULUS:
Tiny silicon chips have been embedded into three people who
volunteered to help test the tagging technology at a surveillance
equipment company, an official said pn Monday.
The chips are the size of a grain of rice and a doctor embedded them in the forearm just under the
surface of the skin, Darks said.
They work "like an access card. There's a reader outside the door; you walk up to the reader, put
your arm under it, and it opens the door," Darks said.
Darks said the implants don't enable CityWatcher.com to track employees' movements.
"It's a passive chip. It emits no signal whatsoever," Darks said. "It's the same thing as a keycard."
CityWatcher.com has contracts with six cities to provide cameras and internet monitoring of high-
crime areas, Darks said.
The company is experimenting with the chips to identify workers with access to vaults where data
and images are kept for police departments, he said.
The technology predates World War II, but has appeared in numerous modern adaptations, such as
tracking pets, vehicles and commercial goods at warehouses.
After Hurricane Katrina, as body counts mounted and missing-person reports multiplied, some
morgue workers in Mississippi used the tiny computer chips to keep track of unidentified remains.
AP
21
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Security of most resources is about guarding against theft or destruction. For example,
an alarm on your car aims to deter thieves and vandals. PIN and PUK codes on mobile
phones are deterrents to theft.
Some possible security issues that all information system designers need to consider
include:
Virus attacks- Viruses are software programs that deliberately produce some
undesired or unwanted result. Most viruses are spread via attachments to emails
but also by infected media such as floppy disks and CDs.
Hackers- These are people, often with extensive technical knowledge and skill,
who aim to overcome or get around any security mechanisms used by a computer
system. This allows them to view, and even edit, data and information.
Theft- Unauthorised copying of data and information onto another system. Also
physical theft of hardware, and as a consequence, the data and information it
contains.
Unauthorised access by past and present employees- Past and present employees
may maliciously tamper with data or they may view and use data of a private
nature inappropriately.
Hardware faults- Failure of hardware, and in particular storage devices, can result
in loss of data. It is inevitable that hardware will eventually fail at some time.
22
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Anti-virus software- All files are scanned to look for possible viruses. The antivirus
software then either removes the virus or quarantines the file. The
widespread use of networks, and in particular the Internet, has made anti-virus
software a virtual necessity.
Audit trails- The information system maintains records of the details of all
transactions. The aim being to make it possible to work backwards and trace the
origin of any problem that may occur.
To implement the above strategies requires that procedures be put in place to ensure
their correct operation. For example: if an employee leaves, their user name and
password needs to be removed, anti-virus software needs to updated regularly to take
account of any new viruses and backup copies need to be checked to ensure they are
occurring correctly.
23
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Inaccurate data results in incorrect information being output from the information system. The
consequences of such incorrect information can be minor, for example a letter addressed
incorrectly, or major, for example a country going to war.
All information systems should include mechanisms for ensuring data accuracy.
There are various techniques used including: data validation and data verification
checks. Data validation involves checking the data is in the correct format and is
reasonable as it is entered into the system.
For example your HSC assessment mark in this course must be a number between 0 and 100,
data can be validated to ensure this is the case, however knowing the mark entered is your
actual result is a different matter. Data verification checks ensure the data entered is actually
correct. For example although 97 is a legitimate HSC mark, perhaps it was mistyped as 79, data
verification corrects such errors. Verifying the integrity or correctness of data is a
much more difficult task than validating it as reasonable.
For example computer-based forms can use check boxes, radio buttons or list boxes to ensure
input is of the type required. These items are said to be „self-validating‟ as they ensure
the data entered is correct in terms of format and range. Both computer and
paper-based forms can include masks that provide a template to indicate the
format of the data required. For example a phone number mask could
be ( _ _ ) _ _ _ _ _ _ _ _, a post code mask could be ####.
The nature of work has seen significant change since the 1960s. These changes have
been both in terms of the types of jobs available and also in the way work is
undertaken. The widespread implementation of computer-based systems, including
computer-based information systems, has been the driving force behind most of these
changes.
In the early 1970s many thought that the consequence of new technologies
would be a reduction in the total amount of work needing to be done, this has not
occurred, rather new industries and new types of employment have been created.
Many people are now working longer hours, in more highly skilled and stressful jobs
than ever before.
24
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Consider the growth in revenue generated over the Internet (see Fig 1.12); in 1994 it was
estimated to be around 0.008 billion US dollars and in 2002 this had risen to 1234 billion US
dollars.
Globalisation means markets have expanded and international competition has increased.
Furthermore components, services and capital used by business can be sourced from a
worldwide market place.
These changes in the nature of the economy are having profound affects on the nature
of work for the majority of employees. They have altered the type of jobs available to
employees as well as altering the way employees perform these jobs. Let us now
examine what these changes are and how they affect workers.
During the 1960s there was much concern in regard to the automation of many tasks
traditionally undertaken using manual labour. These jobs were predominantly found
within goods producing industries such as agriculture, mining, manufacturing,
construction and utilities.
The fear, at the time, was that unemployment rates would spiral out of control. Although there
has been a significant decline in the number of jobs within goods producing industries there has
also been a corresponding increase in knowledge and person based service industries.
The data and graph in Fig 1.13 uses information from the Australian Bureau of Statistics to
illustrate this trend.
Knowledge and person based service industries include finance, property, education,
health, entertainment and communication industries.
Jobs within knowledge and person based service industries require skills in regard to
using technology rather than skills that substitute for technology. For example, a clerk
no longer needs to manually search through filing cabinets, rather they need to be able
to use software to query a database.
In other words, the technology performs the search under the clerk‟s direction; the clerk requires
more advanced skills to direct the search than were required to carry out the manual search.
Similarly an increase in the importance of inter-personal skills and a decrease in the importance
of manual skills is occurring. There is little need for physical strength and coordination in
knowledge and person based service industries rather there is an increased need for people to
communicate more effectively with each other.
25
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
STIMULUS:
The money we spend on the net has jumped 38 per cent since March last year,
according to figures issued yesterday by Visa International. The average transaction was $142.
Visa's survey was backed up by research from ACNielsen which showed that online
shopping in Australia was growing faster than internet usage.
In the past six months, another 343,000 Australians began buying online, an increase of
almost 9 per cent. The research firm said there were now 4.2 million online shoppers in
the country.
"On a per capita basis, we're heavy users of the net and we are comfortable with the
security and technology that comes with online shopping," said Mike Veverka, the chief
executive of Jumbo Corp which manages the online shopping portal www.jumbomall.com.
Mr Veverka said the Brisbane company's total sales were now about $20 million a year,
compared with $2 million five years ago.
EBay Australia said the number of bids on its online auction site jumped by 68 per cent in the
year to January and it now had more than 2 million members.
Visa's general manager for Australia and New Zealand, Bruce Mansfield, said consumers liked
convenience and access to specialised products. He said about one in six Visa e-commerce
transactions was international.
Information is created to fulfil some purpose, however often this same information is also useful
to assist in achieving some other purpose. The possibility for inappropriate use of information
arises. Inappropriate use of information can occur intentionally or
it can be quite innocent and unintentional. It is vital to thoroughly understand the
source, nature and accuracy of any information before it is used.
26
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
1. Client‟s email addresses, collected by a business, are sold to a direct mail company. The
direct mail company then sends out mass advertising or spam mail.
2. A student adds up their trial HSC marks, and converts the total to a percentage in
an attempt to estimate their UAI.
3. Credit checks are made on all applicants for a job based solely on their name. The
employer incorrectly culls some applicants when in fact it is someone else, who
has the same name, that has the poor credit rating.
4. A graph showing a steady increase in sales over the past few years is used to
predict future sales. Management insists each salesman increases their sales to
match this future prediction.
5. A newspaper reporter uses the number of students who gained a band 6 in IPT to
rank the effectiveness of schools.
The appropriate use of information systems is often detailed as a policy statement for
the organisation. The policy outlines inappropriate activities together with the
consequences should a user violate any of the conditions. Typically such a policy
statement would include the following activities as inappropriate usage:
27
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
COPYRIGHT LAWS
All works are automatically covered by copyright law unless the author specifically states that the
copyrights for the work have been relinquished. The use of the familiar
copyright symbol ©, together with the author‟s name and publication date is not necessary,
however its use is recommended to assist others to establish the owner of a work‟s copyrights.
Computer software, data and information is easily copied, and the copy is identical to
the original. This is not the case with most other products. As a consequence special
amendments to the Copyright Act have been enacted.
In regard to software:
28
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
ACTIVITY
“The Creative Commons movement can solve the problems caused by copyright infringement”
Discuss
In your response, you will need to refer to Creative Commons, Flickr, the Copyright Act (1968).
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
29
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Notes/ Definitions
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
30
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Notes/ Definitions
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
31
Information Processes and Technology
―What‘s Inside I.T‖
Introduction to Information Skills and Systems
Notes/ Definitions
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
32