Selasa, 02 Desember 2014
I. Banking Application

The use of computer technology has revolutionised how we do our banking transactions, for example:
- Internet Banking
- Automated Teller Machines (ATM)
- Chip and Pin Technoogy


A. Internet Banking
It is now very common for bank customers to access their bank account from home using on-line banking services.
Customers use a computer and connect to the bank’s secure (encrypted) website where they login (usually with a username and a password)
 


Customers can use the on-line banking system to...
  • Check the balance of bank accounts
  • Pay bills
  • Transfer money between accounts (using EFT)
  • Apply for loans, or other services
Compared to traveling to your actual bank, Internet banking has a fewadvantages...
  • More convenient - can be used 24 hours a day7 days a week
  • Saves time and money since you don't have to travel anywhere to use it
  • Data can be downloaded and analysed (e.g. in a spreadsheet) which can help with planning budgets
But there are some disadvantages too...
  • Requires you to have a computer and Internet access to use it
  • Some people prefer to speak to a person (personal service)
  • If your account is hacked, or your username / password is stolen (e.g. if your computer has malware) money could be stolen from your account


B. Automated Teller Machines (ATM)
ATMs can be used to for a range of banking services...
  • Withdrawing cash
  • Depositing money
  • Checking the balance of accounts
  • Transferring money between accounts
  • Paying bills

A customer identifies him/herself and their bank account by using abank card. The card is inserted into the ATM where it is read by amagnetic strip reader or a smart card reader. The customer also types a secret PIN into the ATM's numeric keypad to confirm that they are the real owner of the card.

ATMs can be used by customers of other banks as the ATM can useEFT...



If a customer of Bank A uses her debit card to withdraw cash from an ATM belonging to Bank B:
  1. Bank B gives her the cash
  2. Bank B now is owed money by Bank A
  3. Bank B sends an EFT instruction to Bank A asking for money to be transferred from the customer’s account to Bank B.
  4. Bank B has now been paid back

C. Chip and Pin Technology
Many credit cards are equipped with a chip as well as a magnetic stripe (see Figure 7.14) – this contains key information such as the PIN.

This system is designed to enhance security since it is better than relying only on a signature. When paying for items using a chip and PIN card, a form of electronic funds transfer (EFT) takes place. 

In this example, a customer pays for a meal in a restaurant using a chip and PIN card:
1. The waiter inserts the card into the chip and PIN reader.
2.The restaurant’s bank contacts the customer’s bank. 
3. The card is checked to see if it is valid (expiry date, whether stolen card, etc.). 
4. If the card is stolen or expired then the transaction is terminated. 

5.The customer enters the PIN using a keypad. q The PIN is read from the chip on the card and is compared to the one just keyed in. 
If they are the same, then the transaction can proceed.
If they are different, the transaction is terminated. 

6. A check is then made on whether they have enough funds. q If there are not enough funds available, then the transaction is terminated.
Otherwise, the transaction is authorised. 

7. An authorisation code is sent to the restaurant.
8. The price of the meal is deducted from the customer’s account. 
9. 1The same amount of money is credited to the restaurant’s bank account.
10. A receipt is produced as proof of purchase.

Source: Banking Systems


II. Library System



Senin, 27 Oktober 2014

There are several applications that make use of batch processing, the most common ones being payroll, billing (electricity, gas, water and telephone) and cheque processing.


I. Payroll
The 'payroll' of a business is the system used to calculate the salary(how much they are paid for their work) of each employee.


Employee wages are usually calculated and paid either every week or every month. 
 Payroll systems are quite complex with lots of calculations to take into account. Many
variables are part of the process including the following:
  • Gross pay (pay before any deductions like tax)
  • Net pay (pay after deductions)
  • Rate of pay (how much the employee is paid per hour)
  • Number of hours worked
  • Tax codes (used to work out how much tax the employee should pay)
  • Pension (deducted from employee pay)
  • Overtime (extra money paid for working more hours than contracted)
  • Bonuses (extra money paid for excellent performance)
  • etc....

After employee pay has been calculated, the system will print the information onto what
is known as a 'pay­slip'. The pay­slip fully breaks down the wage to show all rates,
bonuses, deductions etc.
2 copies of the pay­slip are printed ­ one for the employee and one for the company




Inputs
  • Bank details (so wages can be paid into employee's bank account)
  • Rate of pay (needed to calculate gross pay)
  • Number of hours worked
  • Overtime worked (usually paid at a higher hourly rate)
  • Tax code (needed to calculate tax dedcutions)
Processing:
  • Gross pay (hours worked mutiplied by hourly rate of pay, overtime etc)
  • Caculation of deductions (tax owed, insurance owed, pension contributions)
  • Net pay (gross pay minus deductions)

Outputs:
  • Printed pay slips
  • Wages paid into employee's bank account


Effects of payroll systems on companies:
Accuracy:  
If the payroll system has been programmed with accurate calculations, employees will be paid the correct wages.
Humans manually calculating wages with calculators can often make mistakes and employees could be paid too much / too little.

Quicker ­:
Manually calculating employee pay with calculators is a time consuming process.
A computerised payroll system does most of the work for you and is much faster.

Increased productivity :
With the payroll system doing most of the work, company managers are freed up to concentrate on other tasks.


II. Billing Systems
Billing systems are used by businesses to send out bills/invoices to customers.
Examples of companies that send bills to customers include water, gas, electricity and
phone bills.

These companies produce huge amounts of bills.

These bills/invoices can be sent out to customers in the following ways:
  • As a printed bill in the post
  • Online through the company website (customers get email alerts when a new bill arrives)

Customers would pay the bill in one of two ways:
  • Send a cheque through the post
  • Pay online using a credit card or a bank debit card.
Billing systems are usually automated. This means that bills are calculated automatically without much human input.

Inputs:
  • Customer details (name, address etc)
  • Electricity usage reading (read from electricity meter in customer's home)
  • Charge per unit of power used
  • Bank / Credit Card details (if customer pays their bill online)
Processing:
  • Calculate electricty usage (new usage reading minus old usage reading)
  • Calculate electricity costs (electricty usage multiplied by charge per unit)

Outputs:
  • Printed bill showing customer details and total amounts owed (if customer does not pay online)
  • Online bill showing total amounts owed (if customer pays online)
  • Email requesting online payment (if customer pays online)
Effects of billing systems on companies:
Increased productivity ­
Computerised billing systems are automated. This means that human employees do not need to spend a lot of time manually creating and calculating bills. Human employees will then have more time to handle other
tasks.

Lower employee costs ­
Because the automated computer system does most of the work in terms of billing, less employees are required. This saves in wages etc.

Reduced paper wastage ­
Many companies now use electronic online billing. This means that there are less paper­based bills being produced which is good for the environment.


III. Automatic Stock Control System

Stock control systems keep track of the items that a business manufactures or sells.
 Businesses do not want levels of stock to be too high or too low.

For Example:
Too much stock costs the business money for storage (warehouses etc)
Too little stock means that the business may run out of products to sell

A stock control system can help monitor stock levels and automatically re­order
products whenever their numbers fall too low.

A stock control system is really just a database that stores details of the products sold
by the business.

The database stores details of the products. For example:
  • Item code (a unique code which identifies each type of stock individually)
  • Description of stock items (brown bread, large eggs, coca cola etc)
  • Price of item
  • Item stock level
  • Minimum stock level (lowest amount of the item before we need to order more)
  • Number of stock to re­order (how many items should be re­ordered from supplier)
When items are delivered to the business they are scanned into the system. This is how it works: Items come with a barcode. Barcodes contain all of the information about the
product:
  • Item code
  • Description of item
  • Price of item
  • etc....
The item's barcode is scanned with an input device called a barcode reader.
 The barcode reader inputs the product's information into the stock database.
Each time the same type of product is scanned by the barcode reader, the stock level of
that item is increased by 1.

When products are sold their barcodes are scanned again at the checkout. Information
from the barcode is sent to the stock control database which then updates it's records.
This is how it works:

Barcodes
Barcodes are made up of alternating dark and light lines of varying thickness. A number underneath the barcode usually consists of four parts: country code, manufacturer’s code, product code and a check digit. The check digit is a form of validation which is used to make sure no errors occurred during the reading of the barcode.
The check digit can be calculated in a number of ways. The method discussed here works for codes which contain 11 digits.
Consider the following code:


Every time the barcode is read, this calculation is performed to ensure that it has
been scanned correctly. Barcodes are used in the following applications:
G library book systems administration systems (e.g. in hospitals) G passport and ID card systems G some burglar alarm systems G equipment checking systems (safety records on maintenance of equipment) G automatic stock control systems (described in this section).


Selasa, 23 September 2014

Control Application is split into two parts: turtle graphics and the use of sensors to control or monitor applications.

I. Turtle Graphics
A ‘turtle’ is an on-screen object that follows command given to it by the user. As the turtle moves around the screen it drags a ‘pen’ that leaves a trail behind it.
The command language is called ‘LOGO’.

What is LOGO?

LOGO (also known as 'Turtle Graphics') was developed in 1967 as a way to teach
children basic computer programming.
In LOGO, a curser (called a turtle) can be controlled and moved around the screen by
inputting simple commands. As the curser moves around the screen it draws a line.

Here are some examples of LOGO commands being used to draw simple shapes. You will practice drawing each shape in an online
version of LOGO which can be accessed by clicking the link in the grey box found on the right of each example.
LOGO commands to draw it:
PENDOWN
FORWARD 60
RIGHT 90
FORWARD 60
RIGHT 90
FORWARD 30
RIGHT 90
FORWARD 30
LEFT 90
FORWARD 30
RIGHT 90
FORWARD 30




LOGO commands to draw it:
PENDOWN
FORWARD 40
RIGHT 90
FORWARD 20
PENUP
FORWARD 10
PENDOWN
FORWARD 20
RIGHT 90
FORWARD 40
RIGHT 90
FORWARD 20
PENUP
FORWARD 10
PENDOWN
FORWARD 20


(using REPEAT and ENDREPEAT)
Option 1:
PENDOWN
FORWARD 30
RIGHT 90
FORWARD 30
RIGHT 90
FORWARD 30
RIGHT 90
FORWARD 30

Option 2:
PENDOWN
REPEAT 4
FORWARD 30
RIGHT 90
ENDREPEAT


II. Application Using Sensors
Sensors could be used alongside computers to measure quantities (like temperature, light intensity etc) and then log changes in these quantities.
Sensors can also be used alongside computers to control different devices . The process
goes like this:

Input - Sensor detects data in the environment around it
Process - Data passed to a computer (microprocessor) inside the device which analyses it and decides what action to take. The computer sends instructions to the device telling it what to do.
Output - The device would carry out the instructions.


In both cases, sensors are used to send data to a computer where the data is processed – it is what happens next where the differences occur:

In monitoring, the computer simply reviews the data from the sensors
(by comparing it to data stored in memory) and updates its files and/or gives a warning signal if the values are outside given parameters. No changes to the process are made during monitoring.

In control applications, the computer again reviews the data from the sensors (by comparing it to data stored in memory). But if the values are outside the given parameters it takes action to try and get the values within acceptable ranges. It does this by sending signals to devices controlling the process (such as motors, valves, etc.).


Advantages of Using A Computer Control Devices
Cheaper 
If a computer is monitoring and controlling applications, you don't need to employ people.

Higher Work Rate ­
Computers can control applications all day, every day without getting tired or bored.

Safer ­ Computers can work in conditions that would be too dangerous for people. Examples include chemical plants, radioactive sites and extremely cold areas (antarctic).

Accuracy ­ Computers will respond to inputs from sensors accurately every time. E.g. a heater will be switched on as soon as the temperature falls below 10°C.

Speed ­ Computers will respond to data received from sensors very quickly. E.g. as soon as an infrared sensor detects an intruder, the alarm will sound.


Radioactive sites can be too dangerous for people to work in.


Examples:

1. Burglar Alarms

Burglar alarms work in almost the same way as a security light system.

Input ­- Infra­red sensor detects movement when the sensor is broken and this information is sent to the computer.
Process ­- Computer makes the decision to sound the alarm
Output ­- Alarm is activated


a modern alarm system with infra-red sensors



2. Central Heating

Modern central heating systems can be programmed to maintain a constant desirable
temperature.

Let's imagine our perfect room temperature was set at 25°C ­, we could use sensors and a
computer to:
- Maintain the optimum temperature of 25°C
- Turn heating off when it rises above 25°C
- Turn heating on when it falls below 25°C


Here is how it would work:
Input ­- Heat sensor detects the current temperature and sends this data to the computer built into the heating system

Process ­- Computer would check the sensor heat data against the temperature setting stored in it's memory. Computer decides if the heating needs to be turned on (or off)

Output ­- Heating is switched on or off.





3. Computer Controlled Greenhouse

Automatic greenhouses can provide the optimum conditions for growing plants by
using computer control.

Computers can be used to monitor conditions and control a range of applications

(devices) to keep the perfect conditions constant.



Sensors needed to collect data:
-Light sensor 
-Moisture sensor 
-Heat sensor

Control applications (devices) needed:
-Grow lights to make plants flourish
-Motor to turn sprinkler on if plants need water 
-Heater to warm the greenhouse
-Motor to open window vent to cool greenhouse down if it gets too hot.





III. Robotics




Control Application & Robotics

Posted by Unknown
Minggu, 14 September 2014

A simulation is the creation of a model of a real system in order to study the behaviour of the system. The is computer generated and is based on mathematical representations.

The idea is to try and find out what mechanisms control how a system behaves and consequently predict the behaviour of the system in the future and also see if it is possible to influence this future behaviour.

Computer models have the advantage that they save money, can help find a solution more quickly and can be considerably safer (discussed further below). There are many examples of simulations, ranging from simple spreadsheet representations through to complex flight simulators. This section gives two examples: a model for showing a shop’s profit/loss and a traffic light simulation.

Why simulations are used?
  • They are less expensive than having to build the real thing (e.g. a bridge). 
  • On many occasions it is safer to run a simulation – some real situations are hazardous (e.g. chemical processes). 
  • With simulations, various scenarios can be tried out in advance. 
  • It is nearly impossible to try out some tasks in real life because of the high risk involved or the remoteness (e.g. in outer space, under the sea, in nuclear reactors, crash testing cars, etc.).
  • It is often faster to do a simulation than the real thing.  Some applications could take years before a result was known (e.g. climate change calculations, population growth, etc.).
Limitations:
  • They are only as good as the data used and the mathematical algorithms
    representing the real-life situations. 
  • They therefore have a limited use in some very complex applications (e.g. simulating a nuclear process). 
  • They can be very expensive to set up and often require specialist software to be written. 
  • They frequently require very fast processors/computer systems (which can be expensive) to do the necessary ‘number crunching’; many simulations are made up of 

I. Tuck Shop Model

This example uses a spreadsheet to do the modelling. Spreadsheet models can be used to predict finance type outcomes based on mathematical values.
This prediction show us things like profit/loss, over budget/between budget, and help us answer 'What if ...?' type of questions, e.g. “What if we decrease the workforce by 15%? Will our profits increase or decrease?” .
This is made possible with the use of 'formulae' which recalculate results based on new data entered. 


Running questions like this through the spreadsheet can help managers make 'informed decisions' and reduce the risk of overspending and reduced profits.




II. Driving Simulation



These mimics the skill required to control vehicles such as cars, trucks, trains,and buses. 

Uses:
  • Use of vehicle controls (steering wheel, accelerator, gears, clutch etc)
  • Practice driving maneuvers (emergency stop, reversing, parking etc)
  • Learning how to handle large trucks safely
  • Driving in hazardous conditions (snow, heavy rain etc)
Trainee drivers can build up a high level of confidence using the driving simulation before they actually begin to drive for real. Advantage: any mistakes or crashes are just 'virtual' and vehicles are not damaged or any people hurt.

Some driving simulators are used to mimic the effects of high-speed car crashes on the driver and passengers.

This replaces the old method of using actual cars and crash-test dummies and is muchcheaper and easier to set up.

Data taken from the simulation allows engineers to design and build safer cars. This is known as 'Computer Aided Engineering' (CAE).




III. Bridge Simulation

A computer model of a bridge can be used to test the design.
Bridges have to be able to survive extreme weather conditions. It is obvious not practical to build a real bridge and then wait to see if it falls down in a storm. Instead, a computer model of the bridge is created and tested in virtual storms

If the model breaks, it can be quickly and cheaply re-designed andre-tested. If it doesn’t break, the real bridge can be built, confident that it will survive real storms.

Bridges can also be tested to see if they can cope with heavy traffic. The virtual bridge can be loaded with a traffic jam of virtual trucks to check that it won’t collapse.
A similar system is used by building designers, especially for very large or tall buildings, such as skyscrapers.




VI. Traffic Light Simulation


In this simulation it is necessary to consider: 
  • how and what data needs to be collected 
  • how the simulation is carried out
  • how the system would work in real life.

The success (or failure) of a simulation model depends on how realistic it is, so the data needs to be collected by watching traffic for a long period of time at the Y-junction. This is best done by using induction loop sensors which count the number of vehicles at each junction.
 Manual data collection is possible but is prone to errors and is difficult to do over an 18-hour period per day, for example. The following data is an indication of what would need to be collected:
  • the number of vehicles passing the junction in all directions
  • the time of day for the vehicle count 
  • how many vehicles build up at the junction at different times of the day 
  • how vehicle movements change at weekends, bank holidays, etc.
  • how long it takes a vehicle to clear the junction 
  • how long it takes the slowest vehicle to pass through the junction 
  • the movements made by vehicles (e.g. left turns, right turns, filtering, etc.)
  • additional environmental factors, such as whether there are pedestrian crossings nearby.

Carrying Out The Simulation

Data from the above list is entered into the computer and the simulation run. The results of the simulation are compared with actual traffic flow from a number of data sets. Once the designers are satisfied that it simulates the real situation accurately, then different scenarios can be tried out. For example:
  • vary the timing of the lights and see how the traffic flow is affected
  • build up the number of vehicles stopped at part of the junction and then change the timing of the lights to see how the traffic flow is affected 
  • increase or decrease traffic flow in all directions 
  • how emergency vehicles affect traffic flow at different times of the day.
Using the Simulation
This simulation can then be used to optimise the flow of traffic through the junction on an ongoing basis.
  • Sensors in the road gather data and count the number of vehicles at the junction.
  • This data is sent to a control box or to a computer. It may need to be convertedfirst into a form understood by the computer. 
  • The gathered data is compared to data stored in the system. The stored data isbased on model/simulation predictions which were used to optimise the traffic flow.
  • The control box or computer ‘decides’ what action needs to be taken.
  • Signals are sent out to the traffic lights to change their timing if necessary.

There are three basic types of processing:
batch processing , real-time (transaction) or online processing, real-time process control.

I. Batch Processing

This is where a number of similar jobs or tasks are collected together (batched) and processed by a computer all at once than individualy.

The jobs are then loaded into a computer system (known as a job queue) and processed all at once (in a batch) without human intervention. Once the batch processing starts, no user interaction is needed. This type of processing can only be done where there are no timing constraints, i.e. files don’t need to be updated immediately or a response from the computer is not needed straight away.


Used in the following arena:
  • Producing bills
  • Payroll
  • Stock control
  • Producing monthly credit card statements
  • Processing bank cheques
  • Marking multiple choice examination papers
  • Warning systems on aircraft
  • Guiding missiles
  • Automatic greenhouses
  • Burglar alarms
  • Food warning system







Advantages: (1)Can be processed without a human present.  (2) Long jobs can be left processing overnight when everyone has gone home.
Disadvantages: (1) Batch jobs can take a long time to process. (2) 'Batching' the input data to feed into the system can take a long time.

II. Real-time Transaction Processing (Online Processing)

This type of processing is where a user communicates directly with a computer system. 
If the user change the data, it will automatically updated and re-processed.
Ex:  booking seats on a flight or at the theatre, music concert booking tickets, etc.

Advantage: Processing is carried out automatically without human supervision.
Disadvantage: Need virus/hacker security

III. Real-Time Process Control

Similar to online processing but this one often uses sensors rather than human input in order to obtain its data.
This type of processing is carried out immediately. The computers respond to inputs without any delays.
Used in:
Advantage: Can carry out jobs human are unable to.
Disadvantage: Very expensive and its system failure can costs lives.

Thank You for Reading :)

Minggu, 07 September 2014

At Thursday, September 4th 2014, I learned about safety aspect in using ICT. There are 4 aspects of safety:

1. Electricity

a. Risks
  • Electrical shock and burns
  • Fire from overheating cables
b. Causes
  • Plugging too many power cables into a socket
  • Exposed electrical wires
  • Spilling drinks over electrical equipment
  • Overheating cables

c. How to Prevent

  • Make sure wires are insulated.
  • Keep drinks or food away from the computers.
  • Do not use exposed electrical wires.
  • Never open up an electrical devices without pulling out the cables from the socket.
  • Do not plug too many power cables into a socket.

D. How to Handle
If there's an electrocution, do not touch the victim before turning off the power supply. Bring the victim to the nearest hospital.

2. Trailing Wires
a. Risks
People can easily be tripped over and fall. This can lead to back injuries.



b. Causes
Long wires spread across the floor.

C. How to Prevent
  • Place cables inside cable ducts
  • Tuck the wires under the carpet/flooring
  • Use wireless technology

3. Heavy Equipment Falling
a. Risks
Equipment falling can cause serious injury if they fall on people


b. Causes
  • Small space
  • Weak supported tables
C. How to Prevent/Handle
  • Avoid putting stuff on the edge.
  • Use well-supported/larger table.

4. Fire Risks
a. Risks

  • Burned
b. Causes
  • Smoking
  • Overheated electrical devices
  • Overloaded circuit
  • Covering air vents on devices like computers/laptops
C. How to Prevent
  • Do not smoke
  • Make an evacuation route
  • Use smoke detector
  • Do not use electrical devices for too long
D. How to Handle
  • If there's a fire, call the fire department
  • Bring victim to the hospital


Sources:
And my friend's presentation @ school



Thank You for Reading :)

Safety Issues with Computer

Posted by Unknown

Blogger templates

Blogroll

My Blog List

Visitor

Diberdayakan oleh Blogger.

Followers

Copyright © HJ's Blog -Black Rock Shooter- Powered by Blogger - Designed by Johanes Djogan