3 Apr 2023

The "Information Super-Highway" as well as the "Ubiquitous nature of IT"



1. The "Information Super-Highway" as well as the "Ubiquitous nature of IT" has changed the way we live. Describe how the impact mentioned above on: 


 I. Education and Training. 


The World Wide Web has broken the traditional classroom paradigm and priorities and beliefs in pupils, teachers, and parents by utilizing Information Super-Highway. IT is ubiquitous nature shows this situation has been created and how the educator's position as educational people who can be ready to live in a society today must be re-aligned with current times. It has enabled communications and information concepts to evolve at levels not attained by any other technical facilities. His extension was historically unprecedented; there were no rules other than the simple communication protocols because complications could emerge (Richard De Rose, 1998). The traditional AAC device, for example Dynavox, is six times bigger than the standard mobile device with AAC capabilities like iPod Touch. The users can now take the iPod Touch® into their pockets or purses and, if they choose, place it in their palms (Autism Spectrum News, 2018).

II. Monitoring and Surveillance. 


With high-speed networks, big data, and analytics technologies in the defense and monitoring markets, technical developments continue unabated, allowing us to provide business managers with optimized solutions. Likewise, the Internet of Things is supposed to become a definition to be integrated into our everyday lives in a more detailed manner. This suggests the Internet-enabled computer makers need to go a long way to take even greater responsibility for the preset safety standards. The integration of applications, hardware, and resources before and after implementation leads to creating complete solutions that can solve differences. The integration of hardware and software and pre-and post-installation tools contributes to creating complete solutions for various scenarios (Hills, 2019). This involves developing high-performance sensors, storage, and access controls implemented carefully with video processing and administration software. For example,  Smart video monitoring technologies, especially systems, are being developed with recent developments in signal processing, which change the collection rate flexibly (Allied Telesis, 2017). In specific, where a predictor of security incidents is identified, the pace of data collection is increased to provide more reliable and trustworthy analysis of rich details.



III. Fund transfer and Financial transactions. 


The financial sector has been engaged in a post-implementation stage and transition that has decisively reformed from conventional interactions and contact. An increasing number of financial institutions are making significant investments in technological advancement. When digitized, they can give their customers more robust offerings and, ultimately, have increased experience. As a financial service, online banking has a positive effect on the customer at different stages. On the one side, it can connect to the banking service, but beyond that, it can now be accessed by smartphones that are huge from everywhere. On the one side, the bank can communicate at all times, but beyond this can also now access it from all over and from devices owned and used by a substantial part of the public in its day-to-day life. As an example, new technologies like technologies such as blockchain, robotics, Artificial Intelligence (AI), and more will further secure the sector. Furthermore, it eradicates the user's desire to visit several bank offices. The shift in the financial sector and improvements in how financial services are delivered may arise due to technological progress (Lin et al., 2011). It is not a question of developments in technology in other nations, but of a fact which we have already undoubtedly not all understood.



2. Data must be kept secured. 
Using the example at 1(iii) above, elaborate how security can be implemented using online systems to ensure safe monetary transactions.

The finance market would be dominated by online banks or cloud banking for more effortless operation and security. As a trend more banks have embraced it and move their databases into the cloud, including client relationships, managed documents, transactions, etc. chatbots or robots’ advisors these do consult operations or fund management) maybe a valuable resource for assisting customers easily and, for instance, taking on simpler query tasks or more complicated tasks. Solutions such as these save work, running costs and reduce errors. This is so many businesses have taken this technology as an optimal alternative for the businesses to take this tool as an effective approach that makes it possible for the user to talk to a chatbot, which will take care of the requests made by making use of the banking details available in the cloud. It sounds futuristic, but it is a reality now. Problems like cybersecurity, personal data safety, and others must be taken into consideration for the implementation of these solutions. The subjects mentioned above are not all of those in the financial services sector, but those that have happened or may occur in the short or medium term. Even significant technological progress may be in technological growth could be much better if a regulatory system were established that further stimulated progress in this industry and meant that consumers were given faster access to banking and more benefits (Shim and Lee, 2010).


 3. Give a brief review of the evolution of computers. 


In the 20th century, the advent of this kind of device revolutionized how we view the manufacturing process, function, culture, and other human life fields. No one entity may be attributable to the invention of the machine. The dad of the branch of intelligence that will be calculation later is regarded as Babbage. Alan Turing, the computer designer capable of measuring something and who has called it "universal machine" or "setting machine," was an influential pioneer in this phase. The ideas used in building the machine were the same as the first computer was born later. The history of computing without the invention would not have had the direction. The history of computing would never have been the result of Bell laboratories in the United States without the discovery of transistors in 1947. Douglas Engelbart introduced the first electronic machine in the fall of 1968 (www.nortonlifelockpartner.com, n.d.). It first had a mouse or a pointer and a GUI, forever changing the interaction between consumers and computer systems. ARPANET was the world's first electronic network, set up by the Defense Ministry of the United States in 1968. It served as a fast-medium for information-sharing, potentially for military purposes, between educational and state institutions.


Describe how an Expert system can be used to assist in surgery. 

Most popular in the field of AI application in medicine. Specialist programs allow users in a particular application field to store and use one or more individual experts' expertise. It increases effectiveness, boosts decision-making performance, or may solve challenges if experts are not present. Many representations have been created of expert programs. An expert system is essentially a computer program, know-how, and logic based on which tasks are typically carried out only by a human expert, that is, a program that imitates human conduct to the extent that it uses information given to provide an opinion on a particular subject. The expert system is an interactive computer program that includes the expertise, skills, and skill of an individual or a group of persons specialized in a particular field of human knowledge. Specific issues can be solved intelligently and satisfactorily in this area. The expert system is an interactive computer program. An expert system's principal role is to educate the customer. Expert systems are a commercial range of so-called information systems in a class of computer programs. Expert systems knowledge is highly unstructured, i.e., the problem resolution process within a domain is not evident (Abu-Naser et al., 2010).

Computer programs focused on diagnostic experts aim to imitate human experts' diagnostic decision-making capabilities. Some notable systems include Mycin for infectious diseases, and Internist-1, QMR and DXplain for general internal medicine. Moreover, it is expressly specified in relationships or derived deductively. The chain of proposals is expressly claimed in relationships or is assumed deductively. This includes basic systems for home users to support developed countries' programs to support the diagnosis of diseases in which experts are not open to general practitioners. The more sophisticated cases have tracking devices that can keep the patient stable, handle patient shifts and activate alarms. At this stage, the application fields are combined with classes or categories of applications that enable one to explore AI's future application. With such documents in a broad database in a medical field, the practitioner can ask about incidents similar to those specific to the patient. Contrary to the method that ideally attempts to substitute for man, this kind of experience may only be used to aid in decision-making for cases such as this (Abu-Naser et al., 2010). Code for such a framework has been time complicated because it needs time, a strong programming team, and a good end product to produce.


4. Computer systems make use of different types of software. Using appropriate examples, describe the following: 



(i)The role of the menu-driven interface in a mobile phone. 


Mobility does not only decrease the page size in order to accommodate more computers. The focus is on how individuals use mobile devices and recognize that the mobile experience is as personal as the consumer. Handheld devices use the way it sounds and the way it looks and the way it works. People use their fingertips - or rather their thumbs - to communicate with the monitor instead of the mouse and the keyboard's conventional desktop libraries. The web interface is also a lot touchier environment than the laptop. As soon as a user see it, they experience it. The desktop proxy framework has been removed for better experiences. Smartphone programmers have been confronted with a new generation of UX interface concepts (www.teach-ict.com, n.d.). The UI or UI includes the tools, processes, and methods used for facilitating people's contact with computers or devices. Its creation aims to make it easier and more intuitive for users to interact with the computer. Applications and programs need to be adapted in order to enhance user experience (UX). The components and forms that govern them are friendly for graphical user interfaces.

Whoever is the recipient or consumer, the more obvious it is. The more intuitive and economical the design is, the better for someone who is the consumer. This is also the case when delivering an e-mail that is graphically well portrayed. Functionality, user-friendliness, and presentation have an essential part to play. The outcome must be matched and interpreted constructively with the operation. The purposes that make sense of the UI architecture need to be met, and without doubt, the most critical is improving funnel or conversion funnel. The first thing to be done for a smartphone app or a software product is the user interface and this experience. Investing in organic or paying placement of a poorly developed website or software through search engines or social networks is a waste of funds. Without reporting gains, the public expenditure will rise, and the growth rate will not generate conversions but will also leave the visitor with a poor impact. A file name and the index node number representing the file are used as directory entries. The index node holds the numbers of the different code blocks used for storing the data in the file. Only a handful of data blocks at node -I are allowed; in all situations, when more is required, more space is dynamically positioned for pointing to data blocks (teach-ict.com, n.d.). For beginners and inexperienced users, menu-based GUI is extremely useful. E.g. on windows, most operations are performed with menus, meaning that whatever program we use the start menu is opened. It is very convenient to shut the machine down by using clear menus for children and the elderly.



(ii) The operations are done by the Disk and File Manager. 


The OS uses a file system to track files on disk or part, i.e., to organize files on a disk. It is a system of files. Any computer data is stored on such computers in elements known as files or records regardless of the type of content. The filename, type, weight, date of the development or alteration, and attributes are the most basic storage feature. A capital letter is provided to each storage unit by the operating system. When the hard disk has the letter C, each partition will be a separate storage unit and will have various successive letters (C, D, E, etc.) when separated into multiple partitions. The machine reserves the letters A and B for 3.5" disk drives (which are now in disuse). The letter would then be assigned to existing optical drives, from among those who are free, and eventually the removable USB drives; Pen drive is the most common, but other devices that have internal flash storage, such as cameras, cell phones, etc. All information is processed on these ds irrespective of the type of information. Files term also refers to a partition, disk, or computer file system that it uses. Users can see the difference between the filesystem from a disk or a partition. Few programmers (including those suitable for building file systems), which are either removed or severely corrupted when an existing file happens, run directly in the disk or partition's raw parts. Most applications run on the file system. There are often so many directories that usually contain a hard disk. There is also a need for some organizations (Nielsen, 1996). The files are contained in folders, the original word is that of directories, but as this symbol is implemented in Graphic Systems, it was replaced with folders. Displaying directories will form a tree-like structure one inside the other. There will be a root directory of the storage unit, files and directories within it, other subfolders and files within these folders, and so on in separate nesting layers. The depth of folder nesting is not limited in theory. On Windows, a file path has the following syntax: C: \ Folder \ Subfolder1 \ Subfolder2 \ .. \ file.ext.

References
  • Abu-Naser, S.S., Hissi, H.E. -, Rass, M.A. - and khozondar, N.E. - (2010). An Expert System for Endocrine Diagnosis and Treatments using JESS. Journal of Artificial Intelligence, 3(4), pp.239–251.
  • Hills, A. (2019). Monitoring Mogadishu. Surveillance & Society, 17(3/4), pp.338–351.
  • Lin, J., Lu, Y., Wang, B. and Wei, K.K. (2011). The role of inter-channel trust transfer in establishing mobile commerce trust. Electronic Commerce Research and Applications, 10(6), pp.615–625.
  • Nielsen, J. (1996). The impending demise of the file system. IEEE Software, 13(2), pp.100–101.
  • Richard De Rose (1998). Retail to Hell : why we need to fear the information highway, super stores and super powers! Athens, Ga: America @ Risk Publications.
  • Shim, S. and Lee, B. (2010). An economic model of optimal fraud control and the aftermarket for security services in online marketplaces. Electronic Commerce Research and Applications, 9(5), pp.435–445.
  • www.nortonlifelockpartner.com. (n.d.). The Evolution of Computers. [online] Available at: https://www.nortonlifelockpartner.com/security-center/evolution-of-computers.html [Accessed 23 Mar. 2021].
  • www.teach-ict.com. (n.d.). Computer Science learning for school students. [online] Available at: https://www.teach-ict.com/as_a2_ict_new/ocr/AS_G061/312_software_hardware/user_interfaces/miniweb/pg4.htm#:~:text=This%20type%20of%20interface%20lets.


No comments:

Post a Comment