Sunday, December 7, 2008

CASE STUDY 2009 QUESTION

  1. Explain the benefit to the Investment Company of using an MIS System.
  2. Identify 2 Advantages of EDI to the Investment Company?
  3. Customers may want to be able to access real time information about their investments, stocks and shares. Describe the technology that Hector’s company can implement to achieve this?
  4. Compare Wi-fi and Wi-MAX?
  5. Compare the advantages and disadvantages, of using a web conferencing system in Hector’s business?
  6. Describe how the use of encryption can increase security of data within the Investment Company?
  7. Define VPN, and explain which problem it might solve for the Investment business?
  8. Explain how DHCP works, and whether this would be a good option within one of the offices?
  9. Compare WEP/WPA encryption methods and which is most secure, and so should be used by the company?
  10. If the company goes with using a browser for its main communication systems, explain why they would use a https:// URL address protocol?
  11. Describe two systems that the company could use that would stop document compatibility problems?
  12. Discuss the term ‘data integrity’ in relation to the Investment Companies problems?
  13. If the company was to introduce a VLE, what features could the company include to enable collaboration?
  14. What does an International Fund Manager do?
  15. How would the Investment Company stop issues of data security on it’s laptops completely (think of a complete solution?)
  16. Explain the main features of a VLE?
  17. Evaluate the use of SSID encryption within wireless networks?
  18. To what extent do you think the following technology will increase efficiency at the Investment Company – MIS?
  19. Explain with a diagram the main components of a LAN using a diagram and then suggest the main vulnerabilities of this LAN – please use the following terms: - router, switch, MAC address, IP address, Proxy Server, File Server, Gateway?
  20. Evaluate the main issues with introducing new technologies within the Investment Company and therefore an IT system, which will help these issues?
  21. Explain the benefits and problems of using Bluetooth to send data between the businesses personnel?

Monday, November 3, 2008

Portfolio 3 Task

You are to start collecting resources for your portfolio number 3. The collected sources of information should have both local and global perspective. All the sources to be used should have authors.

Portfolio 3 1st draft will be submitted on Monday 1oth Nov 2008.


Enjoy your lesson.

Thursday, October 30, 2008

Thursday, October 23, 2008

N&Q Case study task 24/10/2008

Task 1 (30 minutes)
1) Having looked at the types of networks, research for the at least five security threats that any investment company was involved in through their computer networks.
a) What was the name of the investment company
b) Describe the security threat encountered
c) what was the solution by the company to address the threats.

Each student will be given a chance to share their findings.

Task 2 (Wireless Technologies)
a) What is wireless computer communication?
b) Describe the different wireless technologies
c) What are the advantages and disadvantages of using each wireless technology?
d) Describe briefly how Investment Companies such as N&Q can utilize the wireless technologies.

Task 3 (PDA and Mobile Computing)
a) What is a PDA?
b) Name the different types of PDA stating their features, and operating system they used
c)Name some functions of PDA.
d) How does a PDA work?
e) How can PDA's be used in N&Q investment company?

Friday, October 3, 2008

SL and HL Tasks for 3/10/2008

Go through all the researched work on robotics in the following wiki spaces.
http://itgs.wikispaces.com/Robotics

Thursday, October 2, 2008

N&Q Case study task 3/10/2008 (HL students Only)

In order to tackle N&Q investment, we will need to understand the IT systems that can support such investments. (each individual student will be assigned to present any area at random)

Our class research will be on types of networks;
LAN
a) What is LAN?
b) State some facts about LAN?
c) What are the limitations of LAN?

WAN
a) What is WAN?
b) State some facts about WAN?
c) What are the limitations of WAN?
d) Compare WAN and LAN


Other Types of Networks
Describe briefly the other types of networks

  1. PAN
  2. SAN
  3. CAN
  4. MAN
  5. WWAN

Identify at least five security threats to computer networks?

Sunday, September 28, 2008

Robots Cababilities and Limitations

Visit the following sites:

Use this site to learn a bit about the different aspects of robots

http://www.robotsandus.org/
Experience navigating a robot (a fairly simple task)

http://www.thetech.org/exhibits/online/robotics/

Using these examples compare/describe the capabilities and limitations of robots and humans with respect to
a. Vision
b. Touch
c. Sound
d. Movement
e. Processing power
f. Communication
Feel free to use other websites as well.

Friday, September 26, 2008

HL Robotic task for 26th Sept 2008

Read this article
Can Cyborg Moths Bring Down Terrorists? [Times Online 24 May 2007]

a) Sensors.
i) List possible sensors and say where they might be used


ii) Determining situations in which it is more appropriate to use a robot than a human being in terms of danger, expense, rapidity, boredom?


iii) what are the social impact and ethical considerations regarding the use of robotics in medicine e.g. robotic surgery, computer-controlled prostheses



Read the article 'Birthing robots' training medics in S. Korea [BBC news]

iv) Is there a social impact of human interaction with robots e.g. artificial pets, robots for the disabled and elderly

v) What are the social and economic effects of replacing people with robots in the workplace?

vii) what do hydraulic and pneumatic mean?


b) What are reasons why robots are or are not designed as androids with human-like form
i) do they HAVE to look like us?

f) What are the capabilities and limitations of robots (processing power, vision, touch, sound and movement)-what is the DARPA Grand Challenge?-
Katana
Artificial hand
ZAR5
Humanoid-2
Robots
Roboter
Robots

http://links999.net/robotics/robots/robots_ethical.html

http://www.powerhousemuseum.com/hsc/aibo/ethics.htm

http://library.thinkquest.org/06aug/02423/new_page_9.htm

http://bettscomputers.com/moodle/mod/resource/view.php?id=26

Sunday, September 21, 2008

Robotics Task (Hl /SL)

Use the internet to obtain brief notes on the following

a) social and economic effects of replacing people with robots in the workplace

b) situations in which it is more appropriate to use a robot than a human being

c) Types of robotics input/output peripherals used in various situations, for example, arms, fingers, voice, wheels.

d) State the Asimov's three laws of robotics.

The following links can be beneficial
http://links999.net/robotics/robots/robots_ethical.html

http://www.powerhousemuseum.com/hsc/aibo/ethics.htm

http://library.thinkquest.org/06aug/02423/new_page_9.htm

http://bettscomputers.com/moodle/mod/resource/view.php?id=26

Wednesday, September 10, 2008

HL Case Study 12/09/08 Period 2

Who are the stakeholders in this casestudy?

From the ITGS Guide (Page 10) we know that the stake holders are:"individuals, institutions, societies who initiate and control the IT developments and are affected by them"

Guiding Questions. Answer the questions

Who are the Individual Stakeholders and why?

Who are the Institutional Stakeholders and why?

Who are the societal stakeholders and why?

Period 5 SL & HL ITGS Converging Technologies

Your have two tasks to attempt during the lesson

Converging Technologies
This is an example of an IB question. You will likely need to do some research on the WWW to answer some of these such as (c) and possibly (a). However, the remainder you should be able to identify. You may quietly discuss possible answers to these questions in small groups.


Many IT developments have resulted from the merging of two or more technologies. For example, phones permitted people to communicate 1000 times faster than by sending written messages and computers let people compute and manipulate data 1000 times faster than by manual methods. When phones and computers were joined to create the Internet, there was a multiplier effect; people could then calculate, manipulate data, search for information, and exchange information a million times faster than by the old methods.

(a) List two other IT developments that use at least two different IT technologies to give a specific service or to achieve a specific function. [2 marks]




(b) Suggest one new IT development that might occur within the next ten years that will be made possible by the combining of two or more current IT technologies. [4 marks]




(c) List four uses of computer chips in modern cars. [4 marks]




(d) Discuss the ethical considerations that should be involved when a new technology is developed. [8 marks]


The PDA and Bluetooth technology

Emerging technologies have resulted in the convergence of computers and communications technology.If you thought mobile phones were intrusive, watch out for the Blackberry. These palm-sized mobile offices are threatening the very fabric of family life says Mimi SpencerYou Magazine, 24th July 2005.

Discuss the answers in twos and email your findings to serem@yahoo.com

a) What does the word ‘convergence’ mean in this context?

b) Give 3 examples of converging technology.

c)PDA is an example of a converging technology. What does PDA stand for.

d) What is Bluetooth technology and how is it used with PDA’s?


e) There are 5 ways to load content onto mobile devices – push, pull, peer, plug and stream. Describe each of these.


f) PDAs have many uses – the news identifies PDA’s being used by Doctors, in the classroom and to help drivers. Find out more about each of these situations.

Thursday, September 4, 2008

HL Case study Task 05/09/08 "Investment"

Based on the case study document, reseearch on the following

a) What is Invsetment

b) What is Investment management

c) What types of investments exist and briefly describe each type

d) List the positions or titles that can exist in an investment company.

e) List the function of each title

Sunday, August 31, 2008

3G Mobile Phones

Visit the B-Mobile website http://www.bmobile.com.bn/

a) From this website, describe all the features that are offered for 3G users.

b) Also from this website outline the different payment schemes that are on offer.

c) Either visit Gadong or search the mobile phone websites, and identify at least 3 different brands and models of 3G mobile phones.

d) 3G Technology is a relatively new communications technology, research 3G and in your own words explain the basics of it. What technology has been developed to enable 3G networks to be introduced into Kenya or Africa?

e) 3G Technology is new technology to Kenya or Africa, research to find out when and where this technology was first introduced.

Personal & Public Communication

Obtain brief notes on the following stating the following;
a) Define the terms
b) Describe how the technologies work
c) List any advantages and disadvantages of the technologies
d) Name the equipment required where possible
e) Give real examples of their use where possible
f) Mention any two social/ethical issues arising from their use

At the end of the research, prepare to share your findings with the class.

Sahil & Samantha- Information Technology Convergence & Pull Technology
Sabeeha & Swaleh- Teleconferencing & Push Technology
Oshan & Akshay- Videoconferencing & Pull Technology
Hussein & Shailen- Digital television & Push Technology

Thursday, August 28, 2008

HL Case Study Task. 29/08/08

There are many investment banks in Kenya. Research on the assigned investment to find out the following;

a) What investments do they deal in
b) Who are their clients
c) What successes have they had
d) What challenges have they faced
e) What IT systems do they use.

1. Sebeeha - CFC financial Services Limited Kenya
2. Hussein - Standard Investment bank Kenya
3. Sahil -Suntra Investment Bank Kenya
4. Oshan- Dyer & Blair Investment Bank

Sunday, June 8, 2008

Class Work

Make brief notes from the link below on application of IT in your note books

http://www.teach-ict.com/ecdl/module_1/workbook12/miniweb/index.htm

Answer the questions in the next link and submitt your printout. Make sure you write name are written.

http://www.teach-ict.com/ecdl/module_1/workbook12/workbook12.pdf

Thursday, May 29, 2008

HL & SL webdesign Activity 29/05/08

Using Microsoft frontpage and the tutorial links below, design a website that address any social issue around mombasa. The issues can range from drugs effects to environmental concerns to the Mombasa community.

Your site should have
a) atleast five pages linked together
b) at least three images in each page
c) at least two tables
d) at least FOUR animations
e) different shades of background colors for each page comparable th the ones used in the internet.

http://www.actden.com/

http://www.tutorials-expert.com/tutorials/Microsoft-FrontPage/

http://www.crews.org/curriculum/ex/compsci/webresources/animation/thumbnail/index.htm

Check out the following examples

http://www.crews.org/curriculum/ex/compsci/spp/7thgrade/voteforzack/

http://www.crews.org/curriculum/ex/compsci/spp/7thgrade/maddieforpresident/

Thursday, May 22, 2008

HL DP1 News Item Work

If you don't have by now the news item for portfolio extension, please use this time to do so. Also use the lesson to get a minimum of 10 sites that will be used to write you portfolio extension. The work should be submitted at the end of lesson to my email.

Tuesday, May 20, 2008

HL Education

Visit the following on issues concerning education and answer the question that follow
http://www.newhorizons.org/strategies/technology/burgstahler.htm

http://www.pcmag.com/encyclopedia_term/0,2542,t=texttospeech&i=52797,00.asp

http://www.webopedia.com/TERM/V/voice_recognition.html

When you've done some research answer the questions below in your own words.

a) Define voice recognition hardware and software.

b)Explain the purpose of text-to-speech and speech-to-text software.

c)Describe two input and two output devices that have been developed to meet special educational needs

Thursday, May 15, 2008

Search Engines : How they Work? 15/5/08

Using the links below as resources, describe how web searching works. Useful links:
http://www.xseo.com/making-sense-of-search-engines.htm
http://searchenginewatch.com/webmasters/article.php/2168031
http://computer.howstuffworks.com/search-engine.htm
http://www.learnthenet.com/english/animate/search.html

Answer the following questions and submit your work at the end of the lesson for grading: Note that sources used in this work should be cited, and attempt the tasks individually.

1. Write a list of the most commonly used search engines.

2. What is meant by page ranking ?

3. How does Google rank its search results?

4. Define White Hats and Black Hats SEO (Search engine optimizers).

5. How can you improve your page ranking?

6. What is search engine ‘spamming’?

7. Why do different search engines come up with different results?

8. Explain ‘cloaking’?

9. The English language is for sale! Have you noticed that when you search your first page begins with a sponsored listing. People pay for keywords. Visit the site http://www.overture.com/ and watch the demo if it is possible. View Advertisers Max bids and look at the results. Describe how the advertiser will pay Overture for this service.

10. Read the article BBC News ‘Cheating’ the search engines, 05/04/07 and describe in your own words how search engines were tricked.

11. With the ever increase of Internet content being multimedia e.g. images, video clips and podcasts – how can these be searched for? Describe how
a) podcasts may use transcription,
b) images use segmentation mapping,
c) how Marvel is used to help search for videos
d) how tagging is being used by individuals.

Tuesday, May 13, 2008

Internet Task 14/5/08

1.
Read and make brief notes in the links below about the internet if neccessary

http://www.open2.net/ictportal/comm/internet/introduction.htm

http://computer.howstuffworks.com/internet-infrastructure.htm


2. Prepare brief notes on the tasks assigned to you. Be ready to present your findings in the next lesson

Akshay
a) Describe the types of connections that one can connect to the internet

b) Visit www.brunet.bn/ name the internet connection available and compare their speeds.


Samantha

a) Wimax is a new Internet connection technology being developed, research what it is and describe your findings


b) How does data travel the Internet? Understanding Internet Protocols TCP/IP and packet switching and how data travels over the internet. Use this http://www.learnthenet.com/

Shailen

a) In your own words describe how the Internet using TCP/IP and packet switching for data to travel over the Internet. Using a diagram would also be useful.

b) Point of Interest IP addresses are running out at present there are over 3 billion IP addresses available but we are running out. So the new IPv6 is being developed. Explain why the IP addresses are running out and how the IPv6 will be a solution

Swaleh

a)Internet Service Provider (ISP) and Online Service Providers (OSP). Describe what each of these is?

b) What are the differences between the Internet and the WWW?

Hussein
a) URL (Uniform Resource Locator) is the naming system and addresses for each web address. Explain by giving examples.

b) Define the term ‘Cookies’

Sabeeha

a)Identify two pieces of information that would be stored by cookies.

b) Discuss the use of cookies and their impact on web surfing.

c) Define bandwidth

Sahil

a) What is Internet 2 – What is the future of the Internet 2?

b) How will internet 2 solve our present challenges?

Harsev

a) What is web 2?

b) Describe the future of Web 2

Thursday, May 8, 2008

Communication Class Task DP1 8/5/08

Obtain further brief notes the following

a) Apart from the discussed internet protocols, identify at least 5 other internet protocols by describing their function

b) List as many browser types and compare and contrast them where possible.

c) Identify and try to use different types of search engines in the internet.

Tuesday, May 6, 2008

Tutorials programs Dp1

Activity
Choose a any 3 programs installed on your computer. They may be new software or software that you have had for a while. Use the Help features to learn a new skill or feature of the software.

Evaluate the help guide or tutorial you used by answering the following questions:

1. Tell us the title of the software and skills learned


2. Provide a brief summary about the help guide/tutorial

4. Describe by shairing the useful features of the help/tutorial

5. Describe the aspects that you found unhelpful or irritating

6. Give the feature a rating out of 5 stars.

Wednesday, April 30, 2008

Models Task DP1

Models


Students are asked to visit the Global Warming model at

http://cs.clark.edu/~mac/physlets/GlobalPollution/CO2assign.htm#RunModel

1. Click on the 'To Run Model Window' link at the bottom of the page.

2. Calibration: Goal of this exercise is to adjust values of initial concentration,initial emission rate and emission growth rate per year to match the current record (black line).

3. Once you have calibrated the to match the current trend, click on 'CO2 #2' button at the bottom of the page and use the growth rate values determined above to predict future values.

4. Describe 2 problems you had in duplicating the natural data.

Visit the following website: http://www.mec.ca/splash.jsp

1. Complete the questionnaire and determine your ecological footprint.
2. Identify the limitation and/or assumptions of this model (hint: view the first page).

Thursday, April 24, 2008

HL DP2 Case Study Tasks 25/4/08

Visit the following site an attempt to answer as many questions as possible.

http://ict-patana.wikispaces.com/CaseStudy2008Questions

Case Study links for DP2 HL

Study the article in the link assigned to you and share your findings;

Salsabila
Cashless systems
http://www.cashlesssystems.com/

Owais
Smart shelf
http://www.news.com/2100-1017_3-1023934.html

Katalina
RFID
http://kellyhs.org/itgs/government/rfid/

Arif
Dry Money
http://www.proximities.com/media_20060620.php

Alex
Snooping shopping carts
http://www.nocards.org/news/supermarketnews_tech.shtml


Jamsheed
http://news.bbc.co.uk/2/hi/technology/6453931.stm


All Students
Visit and Review
http://ict-patana.wikispaces.com/CaseStudy2008

DP1 Education Assignment 24/4/08

Read the article assigned to you and share your findings in class;

Sahil
Teleconferencing
http://findarticles.com/p/articles/mi_pric/is_198311/ai_1538511333

Harsev
Web conferencing
http://chronicle.com/free/2002/10/2002102502t.htm

Hussein
Labtops
http://www.usask.ca/communications/ocn/03-sep-19/feature04.shtml


Sabeeha
Educational Policy Recommendation
http://www.tecweb.org/eddevel/telecon/de913-4.html


When you've done some research answer ONE of the questions below in your own words.

a) Discuss two issues that arise with the use of portable computers in school classrooms. Evaluate your arguments. [10 marks]

or

b) Discuss one social and one ethical issue that arises from the use of telecommunications to teach college/university courses. Evaluate your arguments. [10 marks]

Tuesday, April 22, 2008

DP1 HL&SL Simulation News Items

Read the assigned news item and present your finding in class.
Your report and presentation should;

a) Describe the technology in the news item
b) the effects of the technology
c) Identify any one main problem from the technology
d) Offer any viable solution to the problem identified if any

Sahil
http://news.bbc.co.uk/2/hi/uk_news/scotland/7167856.stm

Harsev
http://news.bbc.co.uk/2/hi/uk_news/scotland/tayside_and_central/7185971.stm

Hussein
http://news.bbc.co.uk/2/hi/technology/7195718.stm

Sebeeha
http://news.bbc.co.uk/2/hi/uk_news/northern_ireland/7293220.stm

Shailen
http://news.bbc.co.uk/2/hi/health/7322951.stm

Akshay
http://news.bbc.co.uk/2/hi/technology/7056199.stm

Samantha
http://news.bbc.co.uk/1/hi/technology/7346325.stm

Swaleh
http://news.bbc.co.uk/2/hi/health/6951918.stm

HL DP1 IT cafe's

Read and identify IT Cafe articles.

a) Choose the richest and most IB External Assessment related article from each area of impact.

b) Complete the review sheet for your articles.

HL Education Area of Impact Study

Each student should research for the First 10 Minutes and present thier findings

Interactive Whiteboard
Owais
a) What is it and how does it work?

Arif
b) What potential does the interactive whiteboard have on changing your lesson?

Katalina
c) Discuss the impact on learning from the introduction of IWB using AKAM as an example


All Students

d) Try out the ActivStudio software to see it’s full functions and visit www.promethean.com to look at all of it’s features. And read the paper presented below. Beyond IT in Educational Transformation – Gwen Ooi, Elink Pte LtdPresents a paper, which you can read about the interactive whiteboard


Mobile Phones and PDA
Pilot projects have been run in the UK where a class of students were given a PDA and could use it in class whenever they wished for whatever purpose. Some companies are embracing text messaging as a way of reaching out to students. See the article BBC News Literary classics become txt messages. Also text messaging is being used in schools to notify parents if students are not in school or if there is an emergency message e.g. school closure. With this push and pull technology. Schools can pay to have messages pushed to parents and parents can pull student information e.g. test results or the most recent report grades. While other schools are banning the use of mobile phones because of the distraction they are in class, the problems of theft.

Salsabila
a) Research about the use of Mobile phones / PDAs in education.

Alex
b) What are the benefits that have been found from using them?

Jamsheed
c) What are the reasons that there is not wide spread use of PDAs and mobile phones in education.

Owais

d) How has text messaging impacted on the use of student’s English grammar.

All Students
e) How are mobile phones being used to improve the communication between parent and school

All students
f) Should a school embrace or ban mobile phones in school….discuss.

Monday, April 7, 2008

April Holidya Work For HL & SL

Data Logging
1. Describe what is meant by the term 'Data Logging'
2. Describe the hardware and software required to perform data logging.
3. Create a table of the advantages and disadvantages of data logging.
4. Discuss the use of data logging used by Science Teachers and Scientist doing research and development.

The following links may help you:
Defining data logging:
http://www.webopedia.com/TERM/D/data_logging.html
General information including quizzes to try: http://www.teach-ict.com/gcse/software/datalogging/students/shome_datalogging.htm
Different uses of data logging in schools: http://www.hitchams.suffolk.sch.uk/datalogging/examples.htm
General information about data logging: http://www.bbc.co.uk/schools/gcsebitesize/ict/measurecontrol/3dataloggingrev1.shtml

Thursday, April 3, 2008

Online Libraries DP1

Visit and investigate some other high school library that is online and check it out for 15 minutes or so.

Here are some examples of half decent online libraries from other schools ...
http://www.ouhsd.k12.ca.us/lmc/hhs/hhshome.htm

http://lhs.lexingtonma.org/Library/

a) Describe what you can find in each as far as tools, capabilities, etc.. (6 marks)

b) What advantages does this one system provide over the other? (6 marks)


2. Now visit www.turnitin.com, view the Flash tour and describe the services it provides. (6 marks)

3. Finally skim the article found at www.wired.com/news/business/0,1367,62906,00.html. Describe the criticism against Turn-it-in. (4 marks)

Library System

Library and SIMSIT is being used at the core of schools information processes by using School Information Management systems
Visit http://home.capitaes.co.uk/learningplatform/solution/index.aspto find out about the new developments of SIMS in education. Try out their demonstrations to see the full impact of what it can do. Look at all of the new modules including Assessment Manager, Parent Gateway, Timetabler and Student gateway

a) If AKAM was to implement this, describe the benefits to the students, the teachers and the parents.

b) What are the limitations of using such a system?

c) Describe some of the social and ethical issues of implementing this system.

Tuesday, April 1, 2008

Case study questions DP2 HL

DP2 ITGS
Research on all the questions given.
CASE STUDY QUESTIONS FOR PAPER 3 EXAMINATION 2008
1. Identify 2 types of processes done by the POS.
2.Describe how the bar code is used to determine the price.
3. Examine the reliability of different input devices in the POS.
4. To what extent can the staff of La Vianda Supermarket be blamed for a pricing error?
5. Identify two human error associated with barcode reader
6. Describe the role of a clocking in system
7. Compare the advantages and disadvantages, of using smart cards in supermarkets
8. Discuss the issues related to the use of servers and barcode readers
9. Identify two technologies use in the supermarket.
10. How do your chosen technologies work?
11. Explain the effect of the technologies on two stakeholders in La Vianda Supermarket.
12. Analyze the issue related with the use of new technologies in supermarket.· Identify the IT Systems used in the supermarket· Describe two of the IT Systems used· Evaluate the two IT Systems above· Compare these IT Systems
13. Identify 2 input devices at a POS Terminal
14. Describe how Biometrics can be used to reduce shoplifting
15. Explain how Supermarkets can get in more contact with customers?
16. To what extent is privacy an issue when customers handout about themselves information to supermarkets?
17. Describe the advantages of Loyalty cards to the supermarkets and to the Consumer
18. Identify 2 Advantages of EDI to the Supermarket?
19. Identify two technologies for check-out in a super market.
20. Describe how a bar code reader works.
21. Compare how a bar code reader works differently form a POS Terminal.
22. To what extent does technology increase supermarket efficiency?
23. Identify 2 IT Systems used in supermarkets
24. Describe how the IT system works.
25. Evaluate the EPOS/Bar codes.26. Compare bar codes and RFID tags.
27. Discuss three possible social and/ or ethical issues raised by the use of RFID tags in supermarkets like the La Vianda.
28. Describe the purpose LAN in reference to La Vianda supermarket
29. Customers may want faster ways of buying goods. Describe the technology the supermarket can implement to achieve this.
30. Explain the benefit to the supermarket of using online shopping.

Games In Education (HL&SL)

Games in Education
There has been lots of debate in education about the value of teaching with computer games.Some sites e.g. the Gridclub – have provided a whole site with educational games that you can subscribe to. What value does ‘The Age of Empire’ have on the teaching of history?

a) Research the use of games in education and present your findings.

b) How do games motivate students?

c) What skills are students learning when gaming?

d) Do you think parents who are paying expensive school fees would approve of games being played in school? How would you overcome this obstacle?

Case Study Termimologies

What are the advantages and disdvantages of the following terminologies

Jamsheed
Biometrics

Arif
Data Mining

Alex
Dynamic Pricing

Owais
EDI – Electronic Data Interchange

Salsabila
EPOS/POS

Katalina
RFID Tags

Case study Challenges

Using the listed supemarket challenges provide possible solutions

Jamsheed
Theft

Arif
Running out of stock on the shelves

Alessandro
Food safety + freshness

Owais
Slow Checkouts


Salsabila
Advertising

Katalina
Loyalty Card Scheme

Monday, March 31, 2008

CASE study assignment Tuesday 1 April

Online Stores View the Marks and Spencers

http://www.marksandspencer.com/gp/node/n/42966030/026-2737318-3944440?ie=UTF8&mnSBrand=core
and Tesco’s Online stores http://www.tesco.com/
Questions:
a) Describe all of the features of the sites that you have looked into.

b) Outline the policy statements included on these sites?

Marks and Spencer policy statement Terms and conditions Outlines:
Ownership of rights , Accuracy of content Damage to your computer Password/account security, Availability Ordering errors, Delivery charges Acknowledgment and acceptance of your order, Delays Cancellation right, Substitution Restrictions on purchase ,Gift list gift messages and gift wrapping, Technology guarantee Links to other websites, Exclusions of liability,


i) Describe the hardware and software that would be required to set up an online store.

ii) You are a website designer – write a proposal to La Vianda for a website design so that customers could order online – describing the features that you would include and what hardware would be required to run this site.

iii) Describe how you would make online ordering secure and describe the payment methods that you would offer.

iv) You are the Marketing Manager – brainstorm with your team, how you would launch the opening of the new website and encourage existing loyal customers to use it? Global customers to be aware of it? And to encourage local residents who are not customers to use it.

Thursday, March 27, 2008

Interactive Whiteboards (Area of Imapct education)

Interactive Whiteboard

a) What is it and how does it work?

b) What potential does the interactive whiteboard have on changing your lesson?

c) Discuss the impact on learning from the introduction of IWB using ISB as an example

d) Try out the ActivStudio software to see it’s full functions and visit www.promethean.com to look at all of it’s features.

Ipods In educations

The task is to be done individually.

Ipods in Education

Read the following case studies of the use of podcasting and ipods in education.
http://www.gracemount.edin.sch.uk/

http://www.dukenews.duke.edu/2005/12/ipodupdate_print.htm
a) Define the term podcast

b) Describe the steps in detail that a teacher would need to take to make available one of their lessons through podcasting.

c) Describe the benefits from using this new technology in these schools/universities


d) Describe the limitations or drawbacks from introducing this technology?


e) Research using the Internet to find out if other schools/colleges are encouraging the use of ipods in schools and describe your findings.

Education (Area of Impact) DP1

Research on how telelearning has been used in the areas assigned to you. Be prepared to present your findings. In your research
a) Define telelearning and VLE (virtual learning Environments)
b) Describe how the technology works
c) Name the stakeholders and at least two real examples from research
d) Describe the effects of its use
e) Discuss at least three social/ethical issues arising

Swaleh & Sabeeha
Hospitals

Samantha & Hussein
Prisons

Oshan & Akshay
Retirement Homes

Shailen & Sahil
Military camps

Tuesday, March 25, 2008

Virtual Actors Assignment(HL/SL)

Ananova has her own news site on the Internet. She is not real, but merely a virtual actor (VActor). She is a sample of the virtual characters that can be created using 3D graphics programs. These actors live in a virtual world and their designers offer descriptions of their virtual lifestyles. Such Web sites are very popular and are visited by thousands of fans.
Visit http://mrl.nyu.edu/~perlin/experiments/emotive-actors/,
NOVA Online Special Effects- Titanic and Beyond Virtual Humans

Practice with the characters on this website.
a) Describe the advantages and disadvantages of designing a play with this site. (4 marks)
b)Describe two IT processes which are used to create VActors. (4 marks)
c)Investigate 3D modelling software, wire mesh and rendering software.

Visit: http://computer.howstuffworks.com/3dgraphics3.htm

d) Explain three economic issues which are related to the use of VActors. (6 marks)
e) Discuss three non-economic issues which emerge from the use of VActors. Use specific examples in your discussion. (10 marks)

Thursday, March 13, 2008

DP1 Graphic: Digital Rights Management

1. Digital Rights Management

http://edition.cnn.com/2004/TECH/ptech/08/18/file.formats/index.html

a.What is a DRM and what does it do?For a more recent article Music Lovers caught in a DRM battle http://news.bbc.co.uk/2/hi/technology/5041684.stm

b. Describe how DRM controls what we do with our CDs

c. Why is DRM considered unfair for consumers?Has the program Fairuse4wm enabled DRM technology to be circumvented?

2. Sony’s XCP copyright system to prevent the illegal copying of its CDs has had to stop. read the article. http://news.bbc.co.uk/2/hi/technology/4430608.stm
a) Explain how the system worked and why it has had to stop? How were consumers compensated?

b) Learn more about file formats and prepare to have a class discuss on the same http://edition.cnn.com/SPECIALS/2004/online.music/interactive.html
Prepare for a discussion on Facing the Digital Music – Downloading Music in the link below http://edition.cnn.com/2004/TECH/07/20/digital.download/index.html

c) What have companies like iPod and the new Napster allowed new artist to accomplish?

3. Copyright Laws – How copyright laws hurt culture?http://www.wired.com/news/culture/0,1284,48625,00.html
Write brief points for discussion iin class.

a) Why does the author feel copyright laws have hurt the actual artist and helped the corporate side of digital media?

b) What is the DMCA? When was it passed? What is the maximum penalty?

Monday, March 10, 2008

DP1 Graphics Notes

1) Obtain brief notes on the following;

Animation, bit-mapped versus vector graphics, object oriented graphics, clip art, CAD, hypermedia, hypertext, pixel, resolution, MP3, MIDI, and Morph.

2) Visit this site to describe the various forms VR can take: http://www-vrl.umich.edu/intro/.
a) In your own words outline the similarities and differences between the following: (6 marks)
BOOM
CAVE
HMD
b) Distinguish between immersive and non-imersive VR technologies. Provide examples.
(3 marks)
c)) Explain whether VRML is immersive or non-immersive VR technology. (3 marks)

d) Outline 4 areas of business that VR would be helpful. For each area describe how it might
be applied. You may need to do some additional research here for examples. Type the
keywords ‘VR application’ or ‘virtual reality’ into a search engine. (8 marks)

Total - /20 marks

DP1 Ecommerce

Discovering Computers – online chapter review Chapter 14 at www.scsite.com/dc2005/

1. Watch the Power point presentation on e-commerce (CC Chp 13 – slide 6) and explain what is meant by e-commerce

There are 3 different types of e-commerce models

Business to Business This is where businesses handle transactions with their business colleagues such as suppliers, distributers and banks.

2. Read about how businesses use information systems for business transactions.
3. How has EDI helped business transactions

Business to Consumer – which handles retail transactions between a company and individual consumers.

4. How is online shopping done? http://www.scsite.com/selabs/

Thursday, March 6, 2008

DP1 HL Friday class work

Respond to the following question in one page.

1. Visit the site: http://www.banksafeonline.org.uk/
a) identify the types of scams that are available at the moment.

b) Write down the steps that customers should be taking to protect themselves the types of scams.


2.
a) Define the terms "Phishing" and "Pharming "

b) Visit http://www.howstuffworks.com/ for an update on how ‘Phishing works. Explain in your own words how phishing attacks occur.

c) City Bank and PayPal are common targets of Phishing attacks, search their websites to find out what the company is doing about phishing.

d) Provide some easy advice to users on how to prevent phishing attacks.

DP1 both (HL & SL) Weekend Assignment (7th March 2008)

Prepare a one page document in response to the below questions (10 marks)

File Sharing
Visit the following link and answer questions 1 & 2. BBC ClickOnline; File Sharing 3-18-04
http://www.bbcworld.com/content/clickonline_archive_11_2004.asp?pageid=666&co_pageid=2

1. What company supplied the “big break” in file sharing?

2. What are three reasons why file sharing music and software was so successful?Who is responsible for downloading?

File-sharing suffers major defeat
http://news.bbc.co.uk/2/hi/technology/4627679.stm

3. In June 2006, The US Supreme Court has made a new ruling about who is responsible for the downloading of media from file sharing networks? Who is responsible? How is this different to the comparison to video recorders?

Monday, March 3, 2008

DP1 Banking Assignment

Research using the Internet and the site www.bankrate.com/brm/olbstep2.asp

a) What is meant by e-money?
b) What is meant by the term Digital Cash?
c) What are ATM Machines and how do they work?
d) What details are stored on credit/debit cards and how do they work?
e) How easy is it to create forged cards and what steps can be taken to minimise this?
f) What does online banking mean and what services does it include?

Have you ever been Internet Banking? Are you too young? Go to the following site: http://www.banksa.com.au and try out the interactive demonstration.

Visit the HSBC Branch and from this visit find out the following:

  • What banking services do they offer for individuals and banks
    Which of these services involve the use of IT?
  • Are there any future services that are being planned?
  • Security and banking is in the news a lot at the moment with stories of Phishing. What extra steps are banks taking to ensure the security of customers bank details when doing Internet Banking.
  • What measures do you feel that customers should take to work with you on the extra security of the Internet banking?
  • If security was breached who would pay? The bank or the customer?
  • How does the bank feel that customers benefit from online banking?
  • What impact has the technology developments had on banking employment and training.

Wednesday, February 27, 2008

DP1 Activities

Click on the link that follows. Try out each activity stated
http://www.scsite.com/dc2005/index.cfm?action=CheckPoint&chapter=10

Monday, February 25, 2008

DP1 Group Activities (26/2/08)

First Group Discussion
Law enforcement agencies are extensive users of databases. Have each member of your team discuss how a local police department use computerized databases in law enforcement. Research on the different databases that are used by law enforcement force.
a) What databases are used by them?
b) What information do they contain?
c) How are the databases used?
d) How are they searched?
e) How often are they updated?
f) In what ways does a database contribute to law enforcement?
g) What are the advantages and disadvantages of using a computerized database?

Meet with the members of your team to discuss the results of your findings. Then, share your findings with the class in within 10 minutes.


Second Group Discussion

Choose one Issue http://www.privacy.org/pi/activities/idcard/idcard_faq.html from the following issues in this chapter:
a) Should Americans Have a National Identification Card?
b) Should Criminal Databases Be Shared?
c) Is Unauthorized Access a Crime?
d) What Access Privileges Should Be Used?
e) When Should Web Bugs Be Exterminated?

Use the Web and/or print media to research the issue. Then, present a debate for the class, with different members of your team supporting different responses to the questions that accompany the issue.

DP1 BUS/EMP TASK

Answers all the Questions and hand in an hardcopy of the information

a) What is spam and how is it sent?
b) Describe the measures a business can take to prevent spam
c) Describe the measures that employees need to take to limit spam.
d) Research the name of current spam filters and explain how they work?
e) For America, UK and one other country of your choice..identify the legislation in place to prevent spamming.
f) Research the Internet and identify one case where a spammer has been caught, briefly outline the situation and identify the consequences.
g) Research and discuss the trends in spamming. Cite your sources of information and if possible include a graph. Explain the privacy and security issues associated with spam

Thursday, February 14, 2008

DP2 Case Study Homework

DP2 ITGS

Research on all the questions given.


CASE STUDY QUESTIONS FOR PAPER 3 EXAMINATION 2008

1. Identify 2 types of processes done by the POS.
2.Describe how the bar code is used to determine the price.
3. Examine the reliability of different input devices in the POS.
4. To what extent can the staff of La Vianda Supermarket be blamed for a pricing error?
5. Identify two human error associated with barcode reader
6. Describe the role of a clocking in system
7. Compare the advantages and disadvantages, of using smart cards in supermarkets
8. Discuss the issues related to the use of servers and barcode readers
9. Identify two technologies use in the supermarket.
10. How do your chosen technologies work?
11. Explain the effect of the technologies on two stakeholders in La Vianda Supermarket.
12. Analyze the issue related with the use of new technologies in supermarket.
· Identify the IT Systems used in the supermarket
· Describe two of the IT Systems used
· Evaluate the two IT Systems above
· Compare these IT Systems
13. Identify 2 input devices at a POS Terminal
14. Describe how Biometrics can be used to reduce shoplifting
15. Explain how Supermarkets can get in more contact with customers?
16. To what extent is privacy an issue when customers handout about themselves information to supermarkets?
17. Describe the advantages of Loyalty cards to the supermarkets and to the Consumer
18. Identify 2 Advantages of EDI to the Supermarket?
19. Identify two technologies for check-out in a super market.
20. Describe how a bar code reader works.
21. Compare how a bar code reader works differently form a POS Terminal.
22. To what extent does technology increase supermarket efficiency?
23. Identify 2 IT Systems used in supermarkets
24. Describe how the IT system works.
25. Evaluate the EPOS/Bar codes.
26. Compare bar codes and RFID tags.
27. Discuss three possible social and/ or ethical issues raised by the use of RFID tags in supermarkets like the La Vianda.
28. Describe the purpose LAN in reference to La Vianda supermarket
29. Customers may want faster ways of buying goods. Describe the technology the supermarket can implement to achieve this.
30. Explain the benefit to the supermarket of using online shopping.

DP2 Mid Term Homework

HL students
Extended portfolio
Finalize work on the extended portfolio.
a) Interview the identified stakeholders
b) Write the portfolio in the given criteria.

Use the following links for references
http://www.abc.edu.sv/seniors/ICT/itgs/curriculum/EPHLintro.htm

http://www.bodine.phila.k12.pa.us/kaufman/ITGSweb/assignments/portfolioextension/extensionindex.html



SL students
Project work
a) The logbook should have all the entries of the project work process. Any changes made to the product should be detailed in the report and also in the logbook.

b) The project report should be in it's last criterion stage.

Use the following links for reference
http://www.abc.edu.sv/seniors/ITGS/Subject%20Details/Projects/project%20mats2.pdf

http://dabrook.org/itgs/single/itgs-made-simple-projects/

ITGS Database Research Work

Date Submitted
Date Due


Whereas Electronic databases have been beneficial to the society, its misuse has been a problem. Illegal access to database has led to ethical and social issues. The mobile company database can be accessed for illegal crediting of your phone.

Research on a minimum of TWO examples of crimes related to databases.

² State the crime
² Describe how the database was used to commit the crime
² Describe one solution to control the crime
² Quote the sources of each of your example ( state the writer of the article if possible)

An Example is below


Cop Suspected of Using Database to Plan Murder of Ex-wife
A State Police detective whose estranged wife was shot dead at a Michigan zoo admitted using the Law Enforcement Information Network (LEIN) database to check on his wife and her acquaintances, according to Lansing police search warrant requests. Although the detective is not suspected of pulling the trigger, the Lansing, Michigan, police department says it believes he knows who shot his wife a month after she filed for divorce.

Written by James Hamilton
Web producer on Thursday, August 01, 2002

Tuesday, February 12, 2008

All the topics below should be presented
Hussein
1. Smart Traffic lights
http://auto.howstuffworks.com/question234.htm

a) Describe how do smart traffic lights work giving examples of places being used.

http://www.sefton.gov.uk/page&2781http://www.tech-faq.com/traffic-lights.shtml
b) Discuss any four issues to the stakeholders arising from using smart traffic ligts.


Sahil
Smart Roads
a) Describe how smart roads work, giving examples where possible.
http://science.howstuffworks.com/intelligent-highway.htm

b) Describe what is meant by the term ‘Smart roads’.

c) Discuss from any news articles issues that arise from the development of this technology. Discuss your findings.


Sabeeha
Smart Cars

For information – look at the range of articles about technology in cars and thenhttp://auto.howstuffworks.com/car-computer.htmon how car computers work
a) Describe how smart cars work giving example of them wher possible.

b) Research the latest technology used in cars, how is this making cars more intelligent. Describe the impact this technology is having on various stakeholders.

Oshan
Traffic Safety systems

a) Describe how crash testing works http://auto.howstuffworks.com/crash-test.htm

b) How airport security works http://travel.howstuffworks.com/airport-security.htm
c) Describe the technology used to improve the safety of traffic systems.
d) Describe the technology being used to improve the safety of road traffic systems

Thursday, February 7, 2008

More Case Study Questions

Jamsheed
Identify 2 types of processes done by the POS.

Describe how the bar code is used to determine the price.

Examine the reliability of different input devices in the POS.

Salsabila
To what extent can the staff of La Vianda Supermarket be blamed for a pricing error?

Identify two human error associated with barcode reader
Describe the role of a clocking in system

• Identify two technologies for check-out in a super market.

Arif
• Describe how a bar code reader works.

• Compare how a bar code reader works differently form a POS Terminal.

• To what extent does technology increase supermarket efficiency?

Alex
• Identify 2 IT Systems used in supermarkets

• Describe how the IT system works.

• Evaluate the EPOS/Bar codes.

Katalina

• Compare bar codes and RFID tags.

• Discuss three possible social and/ or ethical issues raised by the use of RFID tags in supermarkets like the La Vianda.

• Describe the purpose LAN in reference to La Vianda supermarket

Owais
• Customers may want faster ways of buying goods. Describe the technology the supermarket can implement to achieve this.

• Explain the benefit to the supermarket of using online shopping.

Case Study Question HL

1. Define Electronic Data Interface (EDI)

2. Describe four hardware devices that the supermarket might invest in?

3. Ecommerce is a popular means for selling products over the Internet. Evaluate the impact this type of selling has had on the retail industry.

4. Evaluate the possible benefits to a supermarket of introducing RFID tags to their products.

5. Discuss whether express self service counters give customers a greater advantage than point of sales.

6. Describe how an EDI systems work.

Tuesday, February 5, 2008

DP1 HL Bus&Emply Assignment

Sahil
Visit the links and prepare a presentation thereafter
1. Reservation SystemsAbout Online air travel reservation systems http://www.faqs.org/faqs/travel/air/handbook/part4/section-3.html SABRE computerized reservation system used by Silkair, Malaysian airlineshttp://www.sabre-holdings.com/ or http://www.sabretravelnetwork.com/
a) Describe the systems used by transport companies to allow the reservations by customers.

b) Discuss the social and ethical issues/impacts this has on the different stakeholders

Oshan

2. Luggage ProcessingPatent for Luggage processing http://www.freepatentsonline.com/4137567.html

Airline – luggage handling system e.g. Helsinki http://www.airport-technology.com/contractors/baggage/airport-innovation/
Baggage Handling software http://www.airport-technology.com/contractors/consult/sky/ And http://www.airport-technology.com/contractors/baggage/crisplant/

a) Describe the technology being used to assist in the handling of luggage.Research in the news any issues that have arisen through the use of this technology.


Sabeeha
3.
a)Transport SchedulingResearch how IT may be used in the scheduling of transport e.g. trains, aeroplanes, coaches

b) Discuss any social and ethical issues that arise from using this technology.


Hussein
4. Traffic Simulations (see Simulations and Modelling)An example of traffic simulations
http://vwisb7.vkw.tu-dresden.de/~treiber/MicroApplet/

a)How could Brunei have benefited from this before building the new traffic lights at the airport roundabout?

http://destech.mit.edu/akilian/newscreens/traffic/index.html for more examples of traffic simulations

b)Describe the changing variables in these simulations

c)Why would road planners perform traffic simulations?

Monday, January 21, 2008