- Explain the benefit to the Investment Company of using an MIS System.
- Identify 2 Advantages of EDI to the Investment Company?
- Customers may want to be able to access real time information about their investments, stocks and shares. Describe the technology that Hector’s company can implement to achieve this?
- Compare Wi-fi and Wi-MAX?
- Compare the advantages and disadvantages, of using a web conferencing system in Hector’s business?
- Describe how the use of encryption can increase security of data within the Investment Company?
- Define VPN, and explain which problem it might solve for the Investment business?
- Explain how DHCP works, and whether this would be a good option within one of the offices?
- Compare WEP/WPA encryption methods and which is most secure, and so should be used by the company?
- If the company goes with using a browser for its main communication systems, explain why they would use a https:// URL address protocol?
- Describe two systems that the company could use that would stop document compatibility problems?
- Discuss the term ‘data integrity’ in relation to the Investment Companies problems?
- If the company was to introduce a VLE, what features could the company include to enable collaboration?
- What does an International Fund Manager do?
- How would the Investment Company stop issues of data security on it’s laptops completely (think of a complete solution?)
- Explain the main features of a VLE?
- Evaluate the use of SSID encryption within wireless networks?
- To what extent do you think the following technology will increase efficiency at the Investment Company – MIS?
- Explain with a diagram the main components of a LAN using a diagram and then suggest the main vulnerabilities of this LAN – please use the following terms: - router, switch, MAC address, IP address, Proxy Server, File Server, Gateway?
- Evaluate the main issues with introducing new technologies within the Investment Company and therefore an IT system, which will help these issues?
- Explain the benefits and problems of using Bluetooth to send data between the businesses personnel?
Sunday, December 7, 2008
CASE STUDY 2009 QUESTION
Sunday, November 9, 2008
Expert system Task
http://easydiagnosis.com/
Discuss the answer for the following question in pairs
- What kinds of human jobs are most likely to be eliminated because of expert systems?
- What kinds of new jobs will be created because of expert systems?
Summary Notes of Expert
http://library.thinkquest.org/11534/expert.htm
http://library.thinkquest.org/29483/fuzzy_index.shtml
https://ict-patana.wikispaces.com/Examples+of+Expert+Systems
Knowledge Base
https://ict-patana.wikispaces.com/collection+and+creation+of+a+knowledge+base?f=print
http://www.bisnet.or.id/vle/mod/wiki/view.php?id=2860&page=knowledge+base
Inference Engine
http://www.bisnet.or.id/vle/mod/wiki/view.php?id=2860&page=inference+engine
https://ict-patana.wikispaces.com/AI+and+Expert+Systems
Fuzzy logic
http://www.bisnet.or.id/vle/mod/wiki/view.php?id=2860&page=fuzzy+logic
http://library.thinkquest.org/29483/fuzzy_index.shtml
Monday, November 3, 2008
Portfolio 3 Task
Portfolio 3 1st draft will be submitted on Monday 1oth Nov 2008.
Enjoy your lesson.
Thursday, October 30, 2008
HL/SL Artificial intelligence Task 31/10/2008
https://ict-patana.wikispaces.com/AI+and+Expert+Systems#toc0
http://wps.prenhall.com/bp_beekman_tomtech_8/58/14910/3817124.cw/index.html
Sunday, October 26, 2008
AI activities
http://www-ai.ijs.si/eliza/eliza.html
http://www.pandorabots.com/pandora/talk?botid=f5d922d97e345aa1
Turing Test Page
http://www.fil.ion.ucl.ac.uk/~asaygin/tt/ttest.html
http://www.weblab.org/press/031899nytimes.htm
http://www.macrovu.com/CCTGeneralInfo.html
http://www.psych.utoronto.ca/users/reingold/courses/ai/turing.html
http://www.stanford.edu/group/SHR/4-2/text/dialogues.html
http://library.thinkquest.org/05aug/01158/turingTest.html
Thursday, October 23, 2008
N&Q Case study task 24/10/2008
1) Having looked at the types of networks, research for the at least five security threats that any investment company was involved in through their computer networks.
a) What was the name of the investment company
b) Describe the security threat encountered
c) what was the solution by the company to address the threats.
Each student will be given a chance to share their findings.
Task 2 (Wireless Technologies)
a) What is wireless computer communication?
b) Describe the different wireless technologies
c) What are the advantages and disadvantages of using each wireless technology?
d) Describe briefly how Investment Companies such as N&Q can utilize the wireless technologies.
Task 3 (PDA and Mobile Computing)
a) What is a PDA?
b) Name the different types of PDA stating their features, and operating system they used
c)Name some functions of PDA.
d) How does a PDA work?
e) How can PDA's be used in N&Q investment company?
Friday, October 3, 2008
SL and HL Tasks for 3/10/2008
http://itgs.wikispaces.com/Robotics
Thursday, October 2, 2008
N&Q Case study task 3/10/2008 (HL students Only)
Our class research will be on types of networks;
LAN
a) What is LAN?
b) State some facts about LAN?
c) What are the limitations of LAN?
WAN
a) What is WAN?
b) State some facts about WAN?
c) What are the limitations of WAN?
d) Compare WAN and LAN
Other Types of Networks
Describe briefly the other types of networks
- PAN
- SAN
- CAN
- MAN
- WWAN
Identify at least five security threats to computer networks?
Sunday, September 28, 2008
Robots Cababilities and Limitations
Use this site to learn a bit about the different aspects of robots
http://www.robotsandus.org/
Experience navigating a robot (a fairly simple task)
http://www.thetech.org/exhibits/online/robotics/
Using these examples compare/describe the capabilities and limitations of robots and humans with respect to
a. Vision
b. Touch
c. Sound
d. Movement
e. Processing power
f. Communication
Feel free to use other websites as well.
Friday, September 26, 2008
HL Robotic task for 26th Sept 2008
Can Cyborg Moths Bring Down Terrorists? [Times Online 24 May 2007]
a) Sensors.
i) List possible sensors and say where they might be used
ii) Determining situations in which it is more appropriate to use a robot than a human being in terms of danger, expense, rapidity, boredom?
iii) what are the social impact and ethical considerations regarding the use of robotics in medicine e.g. robotic surgery, computer-controlled prostheses
Read the article 'Birthing robots' training medics in S. Korea [BBC news]
iv) Is there a social impact of human interaction with robots e.g. artificial pets, robots for the disabled and elderly
v) What are the social and economic effects of replacing people with robots in the workplace?
vii) what do hydraulic and pneumatic mean?
b) What are reasons why robots are or are not designed as androids with human-like form
i) do they HAVE to look like us?
f) What are the capabilities and limitations of robots (processing power, vision, touch, sound and movement)-what is the DARPA Grand Challenge?-
Katana
Artificial hand
ZAR5
Humanoid-2
Robots
Roboter
Robots
http://links999.net/robotics/robots/robots_ethical.html
http://www.powerhousemuseum.com/hsc/aibo/ethics.htm
http://library.thinkquest.org/06aug/02423/new_page_9.htm
http://bettscomputers.com/moodle/mod/resource/view.php?id=26
Sunday, September 21, 2008
Robotics Task (Hl /SL)
a) social and economic effects of replacing people with robots in the workplace
b) situations in which it is more appropriate to use a robot than a human being
c) Types of robotics input/output peripherals used in various situations, for example, arms, fingers, voice, wheels.
d) State the Asimov's three laws of robotics.
The following links can be beneficial
http://links999.net/robotics/robots/robots_ethical.html
http://www.powerhousemuseum.com/hsc/aibo/ethics.htm
http://library.thinkquest.org/06aug/02423/new_page_9.htm
http://bettscomputers.com/moodle/mod/resource/view.php?id=26
Wednesday, September 10, 2008
HL Case Study 12/09/08 Period 2
From the ITGS Guide (Page 10) we know that the stake holders are:"individuals, institutions, societies who initiate and control the IT developments and are affected by them"
Guiding Questions. Answer the questions
Who are the Individual Stakeholders and why?
Who are the Institutional Stakeholders and why?
Who are the societal stakeholders and why?
Period 5 SL & HL ITGS Converging Technologies
Converging Technologies
This is an example of an IB question. You will likely need to do some research on the WWW to answer some of these such as (c) and possibly (a). However, the remainder you should be able to identify. You may quietly discuss possible answers to these questions in small groups.
Many IT developments have resulted from the merging of two or more technologies. For example, phones permitted people to communicate 1000 times faster than by sending written messages and computers let people compute and manipulate data 1000 times faster than by manual methods. When phones and computers were joined to create the Internet, there was a multiplier effect; people could then calculate, manipulate data, search for information, and exchange information a million times faster than by the old methods.
(a) List two other IT developments that use at least two different IT technologies to give a specific service or to achieve a specific function. [2 marks]
(b) Suggest one new IT development that might occur within the next ten years that will be made possible by the combining of two or more current IT technologies. [4 marks]
(c) List four uses of computer chips in modern cars. [4 marks]
(d) Discuss the ethical considerations that should be involved when a new technology is developed. [8 marks]
The PDA and Bluetooth technology
Emerging technologies have resulted in the convergence of computers and communications technology.If you thought mobile phones were intrusive, watch out for the Blackberry. These palm-sized mobile offices are threatening the very fabric of family life says Mimi SpencerYou Magazine, 24th July 2005.
Discuss the answers in twos and email your findings to serem@yahoo.com
a) What does the word ‘convergence’ mean in this context?
b) Give 3 examples of converging technology.
c)PDA is an example of a converging technology. What does PDA stand for.
d) What is Bluetooth technology and how is it used with PDA’s?
e) There are 5 ways to load content onto mobile devices – push, pull, peer, plug and stream. Describe each of these.
f) PDAs have many uses – the news identifies PDA’s being used by Doctors, in the classroom and to help drivers. Find out more about each of these situations.
Thursday, September 4, 2008
HL Case study Task 05/09/08 "Investment"
a) What is Invsetment
b) What is Investment management
c) What types of investments exist and briefly describe each type
d) List the positions or titles that can exist in an investment company.
e) List the function of each title
Sunday, August 31, 2008
3G Mobile Phones
a) From this website, describe all the features that are offered for 3G users.
b) Also from this website outline the different payment schemes that are on offer.
c) Either visit Gadong or search the mobile phone websites, and identify at least 3 different brands and models of 3G mobile phones.
d) 3G Technology is a relatively new communications technology, research 3G and in your own words explain the basics of it. What technology has been developed to enable 3G networks to be introduced into Kenya or Africa?
e) 3G Technology is new technology to Kenya or Africa, research to find out when and where this technology was first introduced.
Personal & Public Communication
a) Define the terms
b) Describe how the technologies work
c) List any advantages and disadvantages of the technologies
d) Name the equipment required where possible
e) Give real examples of their use where possible
f) Mention any two social/ethical issues arising from their use
At the end of the research, prepare to share your findings with the class.
Sahil & Samantha- Information Technology Convergence & Pull Technology
Sabeeha & Swaleh- Teleconferencing & Push Technology
Oshan & Akshay- Videoconferencing & Pull Technology
Hussein & Shailen- Digital television & Push Technology
Thursday, August 28, 2008
HL Case Study Task. 29/08/08
a) What investments do they deal in
b) Who are their clients
c) What successes have they had
d) What challenges have they faced
e) What IT systems do they use.
1. Sebeeha - CFC financial Services Limited Kenya
2. Hussein - Standard Investment bank Kenya
3. Sahil -Suntra Investment Bank Kenya
4. Oshan- Dyer & Blair Investment Bank
Sunday, June 8, 2008
Class Work
http://www.teach-ict.com/ecdl/module_1/workbook12/miniweb/index.htm
Answer the questions in the next link and submitt your printout. Make sure you write name are written.
http://www.teach-ict.com/ecdl/module_1/workbook12/workbook12.pdf
Thursday, May 29, 2008
HL & SL webdesign Activity 29/05/08
Your site should have
a) atleast five pages linked together
b) at least three images in each page
c) at least two tables
d) at least FOUR animations
e) different shades of background colors for each page comparable th the ones used in the internet.
http://www.actden.com/
http://www.tutorials-expert.com/tutorials/Microsoft-FrontPage/
http://www.crews.org/curriculum/ex/compsci/webresources/animation/thumbnail/index.htm
Check out the following examples
http://www.crews.org/curriculum/ex/compsci/spp/7thgrade/voteforzack/
http://www.crews.org/curriculum/ex/compsci/spp/7thgrade/maddieforpresident/
Thursday, May 22, 2008
HL DP1 News Item Work
Tuesday, May 20, 2008
HL Education
http://www.newhorizons.org/strategies/technology/burgstahler.htm
http://www.pcmag.com/encyclopedia_term/0,2542,t=texttospeech&i=52797,00.asp
http://www.webopedia.com/TERM/V/voice_recognition.html
When you've done some research answer the questions below in your own words.
a) Define voice recognition hardware and software.
b)Explain the purpose of text-to-speech and speech-to-text software.
c)Describe two input and two output devices that have been developed to meet special educational needs
Thursday, May 15, 2008
Search Engines : How they Work? 15/5/08
http://www.xseo.com/making-sense-of-search-engines.htm
http://searchenginewatch.com/webmasters/article.php/2168031
http://computer.howstuffworks.com/search-engine.htm
http://www.learnthenet.com/english/animate/search.html
Answer the following questions and submit your work at the end of the lesson for grading: Note that sources used in this work should be cited, and attempt the tasks individually.
1. Write a list of the most commonly used search engines.
2. What is meant by page ranking ?
3. How does Google rank its search results?
4. Define White Hats and Black Hats SEO (Search engine optimizers).
5. How can you improve your page ranking?
6. What is search engine ‘spamming’?
7. Why do different search engines come up with different results?
8. Explain ‘cloaking’?
9. The English language is for sale! Have you noticed that when you search your first page begins with a sponsored listing. People pay for keywords. Visit the site http://www.overture.com/ and watch the demo if it is possible. View Advertisers Max bids and look at the results. Describe how the advertiser will pay Overture for this service.
10. Read the article BBC News ‘Cheating’ the search engines, 05/04/07 and describe in your own words how search engines were tricked.
11. With the ever increase of Internet content being multimedia e.g. images, video clips and podcasts – how can these be searched for? Describe how
a) podcasts may use transcription,
b) images use segmentation mapping,
c) how Marvel is used to help search for videos
d) how tagging is being used by individuals.
Tuesday, May 13, 2008
Internet Task 14/5/08
Read and make brief notes in the links below about the internet if neccessary
http://www.open2.net/ictportal/comm/internet/introduction.htm
http://computer.howstuffworks.com/internet-infrastructure.htm
2. Prepare brief notes on the tasks assigned to you. Be ready to present your findings in the next lesson
Akshay
a) Describe the types of connections that one can connect to the internet
b) Visit www.brunet.bn/ name the internet connection available and compare their speeds.
Samantha
a) Wimax is a new Internet connection technology being developed, research what it is and describe your findings
b) How does data travel the Internet? Understanding Internet Protocols TCP/IP and packet switching and how data travels over the internet. Use this http://www.learnthenet.com/
Shailen
a) In your own words describe how the Internet using TCP/IP and packet switching for data to travel over the Internet. Using a diagram would also be useful.
b) Point of Interest IP addresses are running out at present there are over 3 billion IP addresses available but we are running out. So the new IPv6 is being developed. Explain why the IP addresses are running out and how the IPv6 will be a solution
Swaleh
a)Internet Service Provider (ISP) and Online Service Providers (OSP). Describe what each of these is?
b) What are the differences between the Internet and the WWW?
Hussein
a) URL (Uniform Resource Locator) is the naming system and addresses for each web address. Explain by giving examples.
b) Define the term ‘Cookies’
Sabeeha
a)Identify two pieces of information that would be stored by cookies.
b) Discuss the use of cookies and their impact on web surfing.
c) Define bandwidth
Sahil
a) What is Internet 2 – What is the future of the Internet 2?
b) How will internet 2 solve our present challenges?
Harsev
a) What is web 2?
b) Describe the future of Web 2
Thursday, May 8, 2008
Communication Class Task DP1 8/5/08
a) Apart from the discussed internet protocols, identify at least 5 other internet protocols by describing their function
b) List as many browser types and compare and contrast them where possible.
c) Identify and try to use different types of search engines in the internet.
Tuesday, May 6, 2008
Tutorials programs Dp1
Choose a any 3 programs installed on your computer. They may be new software or software that you have had for a while. Use the Help features to learn a new skill or feature of the software.
Evaluate the help guide or tutorial you used by answering the following questions:
1. Tell us the title of the software and skills learned
2. Provide a brief summary about the help guide/tutorial
4. Describe by shairing the useful features of the help/tutorial
5. Describe the aspects that you found unhelpful or irritating
6. Give the feature a rating out of 5 stars.
Wednesday, April 30, 2008
Models Task DP1
Students are asked to visit the Global Warming model at
http://cs.clark.edu/~mac/physlets/GlobalPollution/CO2assign.htm#RunModel
1. Click on the 'To Run Model Window' link at the bottom of the page.
2. Calibration: Goal of this exercise is to adjust values of initial concentration,initial emission rate and emission growth rate per year to match the current record (black line).
3. Once you have calibrated the to match the current trend, click on 'CO2 #2' button at the bottom of the page and use the growth rate values determined above to predict future values.
4. Describe 2 problems you had in duplicating the natural data.
Visit the following website: http://www.mec.ca/splash.jsp
1. Complete the questionnaire and determine your ecological footprint.
2. Identify the limitation and/or assumptions of this model (hint: view the first page).
Thursday, April 24, 2008
HL DP2 Case Study Tasks 25/4/08
http://ict-patana.wikispaces.com/CaseStudy2008Questions
Case Study links for DP2 HL
Salsabila
Cashless systems
http://www.cashlesssystems.com/
Owais
Smart shelf
http://www.news.com/2100-1017_3-1023934.html
Katalina
RFID
http://kellyhs.org/itgs/government/rfid/
Arif
Dry Money
http://www.proximities.com/media_20060620.php
Alex
Snooping shopping carts
http://www.nocards.org/news/supermarketnews_tech.shtml
Jamsheed
http://news.bbc.co.uk/2/hi/technology/6453931.stm
All Students
Visit and Review
http://ict-patana.wikispaces.com/CaseStudy2008
DP1 Education Assignment 24/4/08
Sahil
Teleconferencing
http://findarticles.com/p/articles/mi_pric/is_198311/ai_1538511333
Harsev
Web conferencing
http://chronicle.com/free/2002/10/2002102502t.htm
Hussein
Labtops
http://www.usask.ca/communications/ocn/03-sep-19/feature04.shtml
Sabeeha
Educational Policy Recommendation
http://www.tecweb.org/eddevel/telecon/de913-4.html
When you've done some research answer ONE of the questions below in your own words.
a) Discuss two issues that arise with the use of portable computers in school classrooms. Evaluate your arguments. [10 marks]
or
b) Discuss one social and one ethical issue that arises from the use of telecommunications to teach college/university courses. Evaluate your arguments. [10 marks]
Tuesday, April 22, 2008
DP1 HL&SL Simulation News Items
Your report and presentation should;
a) Describe the technology in the news item
b) the effects of the technology
c) Identify any one main problem from the technology
d) Offer any viable solution to the problem identified if any
Sahil
http://news.bbc.co.uk/2/hi/uk_news/scotland/7167856.stm
Harsev
http://news.bbc.co.uk/2/hi/uk_news/scotland/tayside_and_central/7185971.stm
Hussein
http://news.bbc.co.uk/2/hi/technology/7195718.stm
Sebeeha
http://news.bbc.co.uk/2/hi/uk_news/northern_ireland/7293220.stm
Shailen
http://news.bbc.co.uk/2/hi/health/7322951.stm
Akshay
http://news.bbc.co.uk/2/hi/technology/7056199.stm
Samantha
http://news.bbc.co.uk/1/hi/technology/7346325.stm
Swaleh
http://news.bbc.co.uk/2/hi/health/6951918.stm
HL DP1 IT cafe's
a) Choose the richest and most IB External Assessment related article from each area of impact.
b) Complete the review sheet for your articles.
HL Education Area of Impact Study
Interactive Whiteboard
Owais
a) What is it and how does it work?
Arif
b) What potential does the interactive whiteboard have on changing your lesson?
Katalina
c) Discuss the impact on learning from the introduction of IWB using AKAM as an example
All Students
d) Try out the ActivStudio software to see it’s full functions and visit www.promethean.com to look at all of it’s features. And read the paper presented below. Beyond IT in Educational Transformation – Gwen Ooi, Elink Pte LtdPresents a paper, which you can read about the interactive whiteboard
Mobile Phones and PDA
Pilot projects have been run in the UK where a class of students were given a PDA and could use it in class whenever they wished for whatever purpose. Some companies are embracing text messaging as a way of reaching out to students. See the article BBC News Literary classics become txt messages. Also text messaging is being used in schools to notify parents if students are not in school or if there is an emergency message e.g. school closure. With this push and pull technology. Schools can pay to have messages pushed to parents and parents can pull student information e.g. test results or the most recent report grades. While other schools are banning the use of mobile phones because of the distraction they are in class, the problems of theft.
Salsabila
a) Research about the use of Mobile phones / PDAs in education.
Alex
b) What are the benefits that have been found from using them?
Jamsheed
c) What are the reasons that there is not wide spread use of PDAs and mobile phones in education.
Owais
d) How has text messaging impacted on the use of student’s English grammar.
All Students
e) How are mobile phones being used to improve the communication between parent and school
All students
f) Should a school embrace or ban mobile phones in school….discuss.
Thursday, April 17, 2008
Modelling and Simulation Activities
0. http://www.thepcmanwebsite.com/media/helicopter_flight/helicopter_flight.shtml
1. The Roller Coaster
http://www.funderstanding.com/k12/coaster/index.html
2. The Seat belt Simulator -
http://www.thinkseatbelts.com/launch.html
3. Active History - http://www.activehistory.co.uk/Miscellaneous/free_stuff/renaissance/frameset.htm
4. Break Even Simulator - http://www.tutor2u.net/assets/simulations/breakeven_simulator_1.swf
5. Fireworks Simulation -
http://www.maylin.net/fireworks.html
6. Photo electric effect -
http://tre.ngfl.gov.uk/uploads/materials/13151/Photoelectric%20Effect.ppt
7. Banking simulation -
http://www.banksa.com.au/int_bank/default.asp?orc=personal
Monday, April 7, 2008
April Holidya Work For HL & SL
1. Describe what is meant by the term 'Data Logging'
2. Describe the hardware and software required to perform data logging.
3. Create a table of the advantages and disadvantages of data logging.
4. Discuss the use of data logging used by Science Teachers and Scientist doing research and development.
The following links may help you:
Defining data logging:
http://www.webopedia.com/TERM/D/data_logging.html
General information including quizzes to try: http://www.teach-ict.com/gcse/software/datalogging/students/shome_datalogging.htm
Different uses of data logging in schools: http://www.hitchams.suffolk.sch.uk/datalogging/examples.htm
General information about data logging: http://www.bbc.co.uk/schools/gcsebitesize/ict/measurecontrol/3dataloggingrev1.shtml
Thursday, April 3, 2008
Online Libraries DP1
Here are some examples of half decent online libraries from other schools ...
http://www.ouhsd.k12.ca.us/lmc/hhs/hhshome.htm
http://lhs.lexingtonma.org/Library/
a) Describe what you can find in each as far as tools, capabilities, etc.. (6 marks)
b) What advantages does this one system provide over the other? (6 marks)
2. Now visit www.turnitin.com, view the Flash tour and describe the services it provides. (6 marks)
3. Finally skim the article found at www.wired.com/news/business/0,1367,62906,00.html. Describe the criticism against Turn-it-in. (4 marks)
Library System
Visit http://home.capitaes.co.uk/learningplatform/solution/index.aspto find out about the new developments of SIMS in education. Try out their demonstrations to see the full impact of what it can do. Look at all of the new modules including Assessment Manager, Parent Gateway, Timetabler and Student gateway
a) If AKAM was to implement this, describe the benefits to the students, the teachers and the parents.
b) What are the limitations of using such a system?
c) Describe some of the social and ethical issues of implementing this system.
Tuesday, April 1, 2008
Case study questions DP2 HL
Research on all the questions given.
CASE STUDY QUESTIONS FOR PAPER 3 EXAMINATION 2008
1. Identify 2 types of processes done by the POS.
2.Describe how the bar code is used to determine the price.
3. Examine the reliability of different input devices in the POS.
4. To what extent can the staff of La Vianda Supermarket be blamed for a pricing error?
5. Identify two human error associated with barcode reader
6. Describe the role of a clocking in system
7. Compare the advantages and disadvantages, of using smart cards in supermarkets
8. Discuss the issues related to the use of servers and barcode readers
9. Identify two technologies use in the supermarket.
10. How do your chosen technologies work?
11. Explain the effect of the technologies on two stakeholders in La Vianda Supermarket.
12. Analyze the issue related with the use of new technologies in supermarket.· Identify the IT Systems used in the supermarket· Describe two of the IT Systems used· Evaluate the two IT Systems above· Compare these IT Systems
13. Identify 2 input devices at a POS Terminal
14. Describe how Biometrics can be used to reduce shoplifting
15. Explain how Supermarkets can get in more contact with customers?
16. To what extent is privacy an issue when customers handout about themselves information to supermarkets?
17. Describe the advantages of Loyalty cards to the supermarkets and to the Consumer
18. Identify 2 Advantages of EDI to the Supermarket?
19. Identify two technologies for check-out in a super market.
20. Describe how a bar code reader works.
21. Compare how a bar code reader works differently form a POS Terminal.
22. To what extent does technology increase supermarket efficiency?
23. Identify 2 IT Systems used in supermarkets
24. Describe how the IT system works.
25. Evaluate the EPOS/Bar codes.26. Compare bar codes and RFID tags.
27. Discuss three possible social and/ or ethical issues raised by the use of RFID tags in supermarkets like the La Vianda.
28. Describe the purpose LAN in reference to La Vianda supermarket
29. Customers may want faster ways of buying goods. Describe the technology the supermarket can implement to achieve this.
30. Explain the benefit to the supermarket of using online shopping.
Games In Education (HL&SL)
There has been lots of debate in education about the value of teaching with computer games.Some sites e.g. the Gridclub – have provided a whole site with educational games that you can subscribe to. What value does ‘The Age of Empire’ have on the teaching of history?
a) Research the use of games in education and present your findings.
b) How do games motivate students?
c) What skills are students learning when gaming?
d) Do you think parents who are paying expensive school fees would approve of games being played in school? How would you overcome this obstacle?
Case Study Termimologies
Jamsheed
Biometrics
Arif
Data Mining
Alex
Dynamic Pricing
Owais
EDI – Electronic Data Interchange
Salsabila
EPOS/POS
Katalina
RFID Tags
Case study Challenges
Jamsheed
Theft
Arif
Running out of stock on the shelves
Alessandro
Food safety + freshness
Owais
Slow Checkouts
Salsabila
Advertising
Katalina
Loyalty Card Scheme
Monday, March 31, 2008
CASE study assignment Tuesday 1 April
http://www.marksandspencer.com/gp/node/n/42966030/026-2737318-3944440?ie=UTF8&mnSBrand=core
and Tesco’s Online stores http://www.tesco.com/
Questions:
a) Describe all of the features of the sites that you have looked into.
b) Outline the policy statements included on these sites?
Marks and Spencer policy statement Terms and conditions Outlines:
Ownership of rights , Accuracy of content Damage to your computer Password/account security, Availability Ordering errors, Delivery charges Acknowledgment and acceptance of your order, Delays Cancellation right, Substitution Restrictions on purchase ,Gift list gift messages and gift wrapping, Technology guarantee Links to other websites, Exclusions of liability,
i) Describe the hardware and software that would be required to set up an online store.
ii) You are a website designer – write a proposal to La Vianda for a website design so that customers could order online – describing the features that you would include and what hardware would be required to run this site.
iii) Describe how you would make online ordering secure and describe the payment methods that you would offer.
iv) You are the Marketing Manager – brainstorm with your team, how you would launch the opening of the new website and encourage existing loyal customers to use it? Global customers to be aware of it? And to encourage local residents who are not customers to use it.
Thursday, March 27, 2008
Interactive Whiteboards (Area of Imapct education)
a) What is it and how does it work?
b) What potential does the interactive whiteboard have on changing your lesson?
c) Discuss the impact on learning from the introduction of IWB using ISB as an example
d) Try out the ActivStudio software to see it’s full functions and visit www.promethean.com to look at all of it’s features.
Ipods In educations
Ipods in Education
Read the following case studies of the use of podcasting and ipods in education.
http://www.gracemount.edin.sch.uk/
http://www.dukenews.duke.edu/2005/12/ipodupdate_print.htm
a) Define the term podcast
b) Describe the steps in detail that a teacher would need to take to make available one of their lessons through podcasting.
c) Describe the benefits from using this new technology in these schools/universities
d) Describe the limitations or drawbacks from introducing this technology?
e) Research using the Internet to find out if other schools/colleges are encouraging the use of ipods in schools and describe your findings.
Education (Area of Impact) DP1
a) Define telelearning and VLE (virtual learning Environments)
b) Describe how the technology works
c) Name the stakeholders and at least two real examples from research
d) Describe the effects of its use
e) Discuss at least three social/ethical issues arising
Swaleh & Sabeeha
Hospitals
Samantha & Hussein
Prisons
Oshan & Akshay
Retirement Homes
Shailen & Sahil
Military camps
Tuesday, March 25, 2008
Virtual Actors Assignment(HL/SL)
Visit http://mrl.nyu.edu/~perlin/experiments/emotive-actors/,
NOVA Online Special Effects- Titanic and Beyond Virtual Humans
Practice with the characters on this website.
a) Describe the advantages and disadvantages of designing a play with this site. (4 marks)
b)Describe two IT processes which are used to create VActors. (4 marks)
c)Investigate 3D modelling software, wire mesh and rendering software.
Visit: http://computer.howstuffworks.com/3dgraphics3.htm
d) Explain three economic issues which are related to the use of VActors. (6 marks)
e) Discuss three non-economic issues which emerge from the use of VActors. Use specific examples in your discussion. (10 marks)
Thursday, March 13, 2008
DP1 Graphic: Digital Rights Management
http://edition.cnn.com/2004/TECH/ptech/08/18/file.formats/index.html
a.What is a DRM and what does it do?For a more recent article Music Lovers caught in a DRM battle http://news.bbc.co.uk/2/hi/technology/5041684.stm
b. Describe how DRM controls what we do with our CDs
c. Why is DRM considered unfair for consumers?Has the program Fairuse4wm enabled DRM technology to be circumvented?
2. Sony’s XCP copyright system to prevent the illegal copying of its CDs has had to stop. read the article. http://news.bbc.co.uk/2/hi/technology/4430608.stm
a) Explain how the system worked and why it has had to stop? How were consumers compensated?
b) Learn more about file formats and prepare to have a class discuss on the same http://edition.cnn.com/SPECIALS/2004/online.music/interactive.html
Prepare for a discussion on Facing the Digital Music – Downloading Music in the link below http://edition.cnn.com/2004/TECH/07/20/digital.download/index.html
c) What have companies like iPod and the new Napster allowed new artist to accomplish?
3. Copyright Laws – How copyright laws hurt culture?http://www.wired.com/news/culture/0,1284,48625,00.html
Write brief points for discussion iin class.
a) Why does the author feel copyright laws have hurt the actual artist and helped the corporate side of digital media?
b) What is the DMCA? When was it passed? What is the maximum penalty?
Monday, March 10, 2008
DP1 Graphics Notes
Animation, bit-mapped versus vector graphics, object oriented graphics, clip art, CAD, hypermedia, hypertext, pixel, resolution, MP3, MIDI, and Morph.
2) Visit this site to describe the various forms VR can take: http://www-vrl.umich.edu/intro/.
a) In your own words outline the similarities and differences between the following: (6 marks)
BOOM
CAVE
HMD
b) Distinguish between immersive and non-imersive VR technologies. Provide examples.
(3 marks)
c)) Explain whether VRML is immersive or non-immersive VR technology. (3 marks)
d) Outline 4 areas of business that VR would be helpful. For each area describe how it might
be applied. You may need to do some additional research here for examples. Type the
keywords ‘VR application’ or ‘virtual reality’ into a search engine. (8 marks)
Total - /20 marks
DP1 Ecommerce
1. Watch the Power point presentation on e-commerce (CC Chp 13 – slide 6) and explain what is meant by e-commerce
There are 3 different types of e-commerce models
Business to Business This is where businesses handle transactions with their business colleagues such as suppliers, distributers and banks.
2. Read about how businesses use information systems for business transactions.
3. How has EDI helped business transactions
Business to Consumer – which handles retail transactions between a company and individual consumers.
4. How is online shopping done? http://www.scsite.com/selabs/
Thursday, March 6, 2008
DP1 HL Friday class work
1. Visit the site: http://www.banksafeonline.org.uk/
a) identify the types of scams that are available at the moment.
b) Write down the steps that customers should be taking to protect themselves the types of scams.
2.
a) Define the terms "Phishing" and "Pharming "
b) Visit http://www.howstuffworks.com/ for an update on how ‘Phishing works. Explain in your own words how phishing attacks occur.
c) City Bank and PayPal are common targets of Phishing attacks, search their websites to find out what the company is doing about phishing.
d) Provide some easy advice to users on how to prevent phishing attacks.
DP1 both (HL & SL) Weekend Assignment (7th March 2008)
File Sharing
Visit the following link and answer questions 1 & 2. BBC ClickOnline; File Sharing 3-18-04
http://www.bbcworld.com/content/clickonline_archive_11_2004.asp?pageid=666&co_pageid=2
1. What company supplied the “big break” in file sharing?
2. What are three reasons why file sharing music and software was so successful?Who is responsible for downloading?
File-sharing suffers major defeat
http://news.bbc.co.uk/2/hi/technology/4627679.stm
3. In June 2006, The US Supreme Court has made a new ruling about who is responsible for the downloading of media from file sharing networks? Who is responsible? How is this different to the comparison to video recorders?
Monday, March 3, 2008
DP1 Banking Assignment
a) What is meant by e-money?
b) What is meant by the term Digital Cash?
c) What are ATM Machines and how do they work?
d) What details are stored on credit/debit cards and how do they work?
e) How easy is it to create forged cards and what steps can be taken to minimise this?
f) What does online banking mean and what services does it include?
Have you ever been Internet Banking? Are you too young? Go to the following site: http://www.banksa.com.au and try out the interactive demonstration.
Visit the HSBC Branch and from this visit find out the following:
- What banking services do they offer for individuals and banks
Which of these services involve the use of IT? - Are there any future services that are being planned?
- Security and banking is in the news a lot at the moment with stories of Phishing. What extra steps are banks taking to ensure the security of customers bank details when doing Internet Banking.
- What measures do you feel that customers should take to work with you on the extra security of the Internet banking?
- If security was breached who would pay? The bank or the customer?
- How does the bank feel that customers benefit from online banking?
- What impact has the technology developments had on banking employment and training.
Wednesday, February 27, 2008
DP1 Activities
http://www.scsite.com/dc2005/index.cfm?action=CheckPoint&chapter=10
Monday, February 25, 2008
DP1 Group Activities (26/2/08)
Law enforcement agencies are extensive users of databases. Have each member of your team discuss how a local police department use computerized databases in law enforcement. Research on the different databases that are used by law enforcement force.
a) What databases are used by them?
b) What information do they contain?
c) How are the databases used?
d) How are they searched?
e) How often are they updated?
f) In what ways does a database contribute to law enforcement?
g) What are the advantages and disadvantages of using a computerized database?
Meet with the members of your team to discuss the results of your findings. Then, share your findings with the class in within 10 minutes.
Second Group Discussion
Choose one Issue http://www.privacy.org/pi/activities/idcard/idcard_faq.html from the following issues in this chapter:
a) Should Americans Have a National Identification Card?
b) Should Criminal Databases Be Shared?
c) Is Unauthorized Access a Crime?
d) What Access Privileges Should Be Used?
e) When Should Web Bugs Be Exterminated?
Use the Web and/or print media to research the issue. Then, present a debate for the class, with different members of your team supporting different responses to the questions that accompany the issue.
DP1 BUS/EMP TASK
a) What is spam and how is it sent?
b) Describe the measures a business can take to prevent spam
c) Describe the measures that employees need to take to limit spam.
d) Research the name of current spam filters and explain how they work?
e) For America, UK and one other country of your choice..identify the legislation in place to prevent spamming.
f) Research the Internet and identify one case where a spammer has been caught, briefly outline the situation and identify the consequences.
g) Research and discuss the trends in spamming. Cite your sources of information and if possible include a graph. Explain the privacy and security issues associated with spam
Thursday, February 14, 2008
DP2 Case Study Homework
DP2 ITGS
Research on all the questions given.
CASE STUDY QUESTIONS FOR PAPER 3 EXAMINATION 2008
1. Identify 2 types of processes done by the POS.
2.Describe how the bar code is used to determine the price.
3. Examine the reliability of different input devices in the POS.
4. To what extent can the staff of La Vianda Supermarket be blamed for a pricing error?
5. Identify two human error associated with barcode reader
6. Describe the role of a clocking in system
7. Compare the advantages and disadvantages, of using smart cards in supermarkets
8. Discuss the issues related to the use of servers and barcode readers
9. Identify two technologies use in the supermarket.
10. How do your chosen technologies work?
11. Explain the effect of the technologies on two stakeholders in La Vianda Supermarket.
12. Analyze the issue related with the use of new technologies in supermarket.
· Identify the IT Systems used in the supermarket
· Describe two of the IT Systems used
· Evaluate the two IT Systems above
· Compare these IT Systems
13. Identify 2 input devices at a POS Terminal
14. Describe how Biometrics can be used to reduce shoplifting
15. Explain how Supermarkets can get in more contact with customers?
16. To what extent is privacy an issue when customers handout about themselves information to supermarkets?
17. Describe the advantages of Loyalty cards to the supermarkets and to the Consumer
18. Identify 2 Advantages of EDI to the Supermarket?
19. Identify two technologies for check-out in a super market.
20. Describe how a bar code reader works.
21. Compare how a bar code reader works differently form a POS Terminal.
22. To what extent does technology increase supermarket efficiency?
23. Identify 2 IT Systems used in supermarkets
24. Describe how the IT system works.
25. Evaluate the EPOS/Bar codes.
26. Compare bar codes and RFID tags.
27. Discuss three possible social and/ or ethical issues raised by the use of RFID tags in supermarkets like the La Vianda.
28. Describe the purpose LAN in reference to La Vianda supermarket
29. Customers may want faster ways of buying goods. Describe the technology the supermarket can implement to achieve this.
30. Explain the benefit to the supermarket of using online shopping.
DP2 Mid Term Homework
Extended portfolio
Finalize work on the extended portfolio.
a) Interview the identified stakeholders
b) Write the portfolio in the given criteria.
Use the following links for references
http://www.abc.edu.sv/seniors/ICT/itgs/curriculum/EPHLintro.htm
http://www.bodine.phila.k12.pa.us/kaufman/ITGSweb/assignments/portfolioextension/extensionindex.html
SL students
Project work
a) The logbook should have all the entries of the project work process. Any changes made to the product should be detailed in the report and also in the logbook.
b) The project report should be in it's last criterion stage.
Use the following links for reference
http://www.abc.edu.sv/seniors/ITGS/Subject%20Details/Projects/project%20mats2.pdf
http://dabrook.org/itgs/single/itgs-made-simple-projects/
ITGS Database Research Work
Date Due
Whereas Electronic databases have been beneficial to the society, its misuse has been a problem. Illegal access to database has led to ethical and social issues. The mobile company database can be accessed for illegal crediting of your phone.
Research on a minimum of TWO examples of crimes related to databases.
² State the crime
² Describe how the database was used to commit the crime
² Describe one solution to control the crime
² Quote the sources of each of your example ( state the writer of the article if possible)
An Example is below
Cop Suspected of Using Database to Plan Murder of Ex-wife
A State Police detective whose estranged wife was shot dead at a Michigan zoo admitted using the Law Enforcement Information Network (LEIN) database to check on his wife and her acquaintances, according to Lansing police search warrant requests. Although the detective is not suspected of pulling the trigger, the Lansing, Michigan, police department says it believes he knows who shot his wife a month after she filed for divorce.
Written by James Hamilton
Web producer on Thursday, August 01, 2002
Tuesday, February 12, 2008
Hussein
1. Smart Traffic lights
http://auto.howstuffworks.com/question234.htm
a) Describe how do smart traffic lights work giving examples of places being used.
http://www.sefton.gov.uk/page&2781http://www.tech-faq.com/traffic-lights.shtml
b) Discuss any four issues to the stakeholders arising from using smart traffic ligts.
Sahil
Smart Roads
a) Describe how smart roads work, giving examples where possible.
http://science.howstuffworks.com/intelligent-highway.htm
b) Describe what is meant by the term ‘Smart roads’.
c) Discuss from any news articles issues that arise from the development of this technology. Discuss your findings.
Sabeeha
Smart Cars
For information – look at the range of articles about technology in cars and thenhttp://auto.howstuffworks.com/car-computer.htmon how car computers work
a) Describe how smart cars work giving example of them wher possible.
b) Research the latest technology used in cars, how is this making cars more intelligent. Describe the impact this technology is having on various stakeholders.
Oshan
Traffic Safety systems
a) Describe how crash testing works http://auto.howstuffworks.com/crash-test.htm
b) How airport security works http://travel.howstuffworks.com/airport-security.htm
c) Describe the technology used to improve the safety of traffic systems.
d) Describe the technology being used to improve the safety of road traffic systems
Thursday, February 7, 2008
More Case Study Questions
Identify 2 types of processes done by the POS.
Describe how the bar code is used to determine the price.
Examine the reliability of different input devices in the POS.
Salsabila
To what extent can the staff of La Vianda Supermarket be blamed for a pricing error?
Identify two human error associated with barcode reader
Describe the role of a clocking in system
• Identify two technologies for check-out in a super market.
Arif
• Describe how a bar code reader works.
• Compare how a bar code reader works differently form a POS Terminal.
• To what extent does technology increase supermarket efficiency?
Alex
• Identify 2 IT Systems used in supermarkets
• Describe how the IT system works.
• Evaluate the EPOS/Bar codes.
Katalina
• Compare bar codes and RFID tags.
• Discuss three possible social and/ or ethical issues raised by the use of RFID tags in supermarkets like the La Vianda.
• Describe the purpose LAN in reference to La Vianda supermarket
Owais
• Customers may want faster ways of buying goods. Describe the technology the supermarket can implement to achieve this.
• Explain the benefit to the supermarket of using online shopping.
Case Study Question HL
2. Describe four hardware devices that the supermarket might invest in?
3. Ecommerce is a popular means for selling products over the Internet. Evaluate the impact this type of selling has had on the retail industry.
4. Evaluate the possible benefits to a supermarket of introducing RFID tags to their products.
5. Discuss whether express self service counters give customers a greater advantage than point of sales.
6. Describe how an EDI systems work.
Tuesday, February 5, 2008
DP1 HL Bus&Emply Assignment
Visit the links and prepare a presentation thereafter
1. Reservation SystemsAbout Online air travel reservation systems http://www.faqs.org/faqs/travel/air/handbook/part4/section-3.html SABRE computerized reservation system used by Silkair, Malaysian airlineshttp://www.sabre-holdings.com/ or http://www.sabretravelnetwork.com/
a) Describe the systems used by transport companies to allow the reservations by customers.
b) Discuss the social and ethical issues/impacts this has on the different stakeholders
Oshan
2. Luggage ProcessingPatent for Luggage processing http://www.freepatentsonline.com/4137567.html
Airline – luggage handling system e.g. Helsinki http://www.airport-technology.com/contractors/baggage/airport-innovation/
Baggage Handling software http://www.airport-technology.com/contractors/consult/sky/ And http://www.airport-technology.com/contractors/baggage/crisplant/
a) Describe the technology being used to assist in the handling of luggage.Research in the news any issues that have arisen through the use of this technology.
Sabeeha
3.
a)Transport SchedulingResearch how IT may be used in the scheduling of transport e.g. trains, aeroplanes, coaches
b) Discuss any social and ethical issues that arise from using this technology.
Hussein
4. Traffic Simulations (see Simulations and Modelling)An example of traffic simulations
http://vwisb7.vkw.tu-dresden.de/~treiber/MicroApplet/
a)How could Brunei have benefited from this before building the new traffic lights at the airport roundabout?
http://destech.mit.edu/akilian/newscreens/traffic/index.html for more examples of traffic simulations
b)Describe the changing variables in these simulations
c)Why would road planners perform traffic simulations?
Monday, January 21, 2008
Portfolio Extention Support Site
http://www.bodine.phila.k12.pa.us/kaufman/ITGSweb/assignments/portfolioextension/extensionindex.html