Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Technology In Action © 2008 Prentice-Hall, Inc. 1 Technology In Action Chapter 1 Why Computers Matter to You: Becoming Computer Fluent © 2008 Prentice-Hall, Inc. 2 Chapter Topics • • • • • • • Computer fluency Computers and careers Computer functions Data vs. information Computer hardware and software Societal challenges and computers Future technologies © 2008 Prentice-Hall, Inc. 3 What is Computer Fluency? • Computers are everywhere in our society. • You find them in – – – – – – – – Schools Cars Airports Shopping Centers Toys Medical Devices Homes Peoples’ pockets © 2008 Prentice-Hall, Inc. 4 What is Computer Fluency? • Americans interact with computers almost every day, sometimes, without even knowing it. – Credit cards – E-mail – Cell phones – Digital cameras – Web sites © 2008 Prentice-Hall, Inc. 5 What is Computer Fluency? • To be computer fluent you must: – Understand a computer’s capabilities and limitations – Know how to use a computer © 2008 Prentice-Hall, Inc. 6 What is Computer Fluency? • You can use your computer more wisely and be a more knowledgeable consumer. • Computer-fluent employees are sought after in most every vocation. • Becoming computer fluent will help you better understand and take advantage of future technologies. © 2008 Prentice-Hall, Inc. 7 Being a Savvy Computer User and Consumer • Make good purchase decisions – Understanding the computer buzz-words • • • Maintain your computer Keep abreast of changes in technology Understand the real risks – Be able to identify the real privacy and security risks • Use the Internet wisely – Finding information and finding good information are two different things • Avoid online annoyances – Spam - adware • Avoid hackers and viruses – What are they and how can you avoid them • Protect your privacy – Identity theft © 2008 Prentice-Hall, Inc. 8 Computers in your Career? • Regardless of your profession, if computers are not already in use, they most likely will be soon. • The U.S. Department of Labor predicts that by 2010, 70% of the U.S. work force will be using computers at work. • The Department of Agriculture has found that employees who use a computer on the job earn 10% more than those who don’t. © 2008 Prentice-Hall, Inc. 9 Computers in your Career? • Becoming truly computer fluent – understanding the capabilities and limitations of computers and what you can do with them – will undoubtedly help you – Perform your job more effectively – Become a more desirable employee – Earn more and grow your career © 2008 Prentice-Hall, Inc. 10 Computers in your Career? • Computer careers in: – – – – – – – – – Business The Arts The Medical Field Law Enforcement Legal Fields Education The Sciences Gaming Homes © 2008 Prentice-Hall, Inc. 11 Computers in Business • Point of Sale Terminals • Tracking merchandise • Data mining © 2008 Prentice-Hall, Inc. 12 Computers in Business • Businesses accumulate a lot of data • How do they separate the anomalies from the trends? They use a process called • Data Mining – The process of searching huge amounts of data with the hope of finding a pattern. – Allows retailers to respond to consumer buying patterns. © 2008 Prentice-Hall, Inc. 13 Computers in Business • Data Mining – Large retailers often study the data gathered from register terminals to determine which products are selling on a given day and in a specific location • This helps managers figure out how much merchandise they need in order to replace stock that is sold. © 2008 Prentice-Hall, Inc. 14 Computers in Business • Data Mining – Managers determine that for a certain product to sell well, they must lower its price – especially if they cut the price at one store and see sales increase. © 2008 Prentice-Hall, Inc. 15 Computers in Business • Personal Shopper Systems (PSS) – A small handheld computer that you can pick up when you enter the store – As you move about the store, scanning the item’s tag or a label near the item pulls up the current price and any specials the store is offering © 2008 Prentice-Hall, Inc. 16 Computers in Business • Personal Shopper Systems (PSS) – If you decide to buy, pull the trigger and place the item in your basket, bagging the items as you move along. – If you’d rather think about it a bit more, the system can e-mail information about the product to you. – At any time prior to leaving the store, you can check the total amount of your purchases. © 2008 Prentice-Hall, Inc. 17 Computers in Business • Personal Shopper Systems (PSS) – When you have completed shopping, simply get into a self-checkout lane. – The information collected in the PSS will be integrated with the POS terminal in the selfcheckout lane – Press the “end of trip” button and pay the total. – There’s no need to unload and individually scan the items in your shopping cart. © 2008 Prentice-Hall, Inc. 18 Computers in Business • Point of Sale Terminal (POS Terminal) – Records purchases, processes debit or credit cards, and updates inventory. © 2008 Prentice-Hall, Inc. 19 Computers in Business • United Parcel Service (UPS) handles more than 14 million packages per day. • UPS uses a sophisticated database and a very efficient package-tracking tracking system that follows the packages as they move around the world © 2008 Prentice-Hall, Inc. 20 Computers in Business • When the sender drops off a package, UPS creates a “smart label” for the package. • In addition to the standard postal bar code and a bar code showing UPS customer numbers, the smart label contains a MaxiCode. – Contains information about the package • Class of service, destination, etc. © 2008 Prentice-Hall, Inc. 21 Computers in Business • When the package is handled in processing centers, UPS workers scan the MaxiCode. • The information is transmitted to terminals the workers wear. • The terminals then sends the data across wireless networks to the UPS database. © 2008 Prentice-Hall, Inc. 22 Computers in Business • To track package delivery, UPS carriers use delivery acquisition devices that feature wireless networking capabilities, infrared scanners to scan the smart labels and transmit the information back to the UPS database, and an electronic pad to capture customer signatures. © 2008 Prentice-Hall, Inc. 23 Computers in Business • By capturing this data and making it available on its Internet database, UPS enables its customers to track their packages through the delivery process. © 2008 Prentice-Hall, Inc. 24 Computers in Business • UPS is also able to make informed decisions about staffing and deploying equipment (trucks, airplanes, etc.) based on the volume and type of packages in the system at any given time. © 2008 Prentice-Hall, Inc. 25 Computers in Farming and Ranching • Assist in managing complex farming business and information systems • RFID tags track and record animals in case of diseases • Computerized sensors and equipment activation protect crops © 2008 Prentice-Hall, Inc. 26 Computers in Farming and Ranching • Ranchers must watch out for and prevent diseases like hoof and mouth, mad cow, and even E.coli outbreak. • Outbreaks can be managed and minimized with the use of radio frequency identification tags (RFID tags). • The RFID tag placed on each cow’s ear is a very small button. © 2008 Prentice-Hall, Inc. 27 Computers in Farming and Ranching • When the cow walks past a panel reader, its location is automatically recorded and tracked in a database. • If a cow is identified as having disease, all of its movements have been recorded. • By using the database that stores the RFID information, it is simple to identify exactly which food lots it ate from and which other animals from that same food. © 2008 Prentice-Hall, Inc. 28 Computers in Farming and Ranching • Cranberry crops easily can be destroyed by frost. • Growers had to race to protect the bogs of berries on cold nights by turning on pumps to force out water to surround the berries and keep them from freezing. © 2008 Prentice-Hall, Inc. 29 Computers in Farming and Ranching • Today, growers use a web-based system that can automatically control the pumps. • It analyzes information about the current time, the temperature measured near the berries, watering schedules, rainfall, and wind conditions • Automatically turn on and off the pumps around the bog fields as needed. © 2008 Prentice-Hall, Inc. 30 Computers in the Arts • Virtual art • Virtual dance © 2008 Prentice-Hall, Inc. 31 Computers in the Arts • Virtual Art – Many artists today work exclusively with computers to create digital art. – Camille Utterback used a computer and video clips of pedestrians in Tokyo to create a visual art piece entitled Liquid Time. – When no one is near the visual art piece, the screen displays a static image. © 2008 Prentice-Hall, Inc. 32 Computers in the Arts • Virtual Art – As onlookers in the gallery move closer to the work, a camera mounted on the ceiling of the art gallery captures the movements and dimensions of the onlookers in the gallery. – A computer with specialized software then uses this captured data and causes the video playing in the Liquid Time piece Inc.to ripple. © 2008 Prentice-Hall, 33 Computers in the Arts • Virtual Art – Because the rippling effect is based on the movement and size of the gallery patrons, the work looks different to each person looking at it. – As viewers move away from the work, the video returns to a static display. © 2008 Prentice-Hall, Inc. 34 Computers in the Arts • Virtual Dance – Georgia Institute of Technology is using computers to create virtual dancers and new performances for audiences. – Live dancers are wired with sensors that are connected to a computer that captures the dancers’ movements. – Based on the data it collects, the computer generates a virtual dancer on © 2008 Prentice-Hall, Inc. 35 the screen. Computers in the Arts • Virtual Dance – The computer operator can easily manipulate this virtual dancer as well as change the dancer’s costume with the click of a mouse. – This allows the ballet company to create new experiences for the audience by pairing virtual dancers with live dancers. © 2008 Prentice-Hall, Inc. 36 Computers in the Medical Field • Virtual reality in medical applications • Patient simulator • Da Vinci Surgical System © 2008 Prentice-Hall, Inc. 37 Computers in the Medical Field • Virtual Reality in Medical Applications – Wired magazine recently reported that a company called Cyberkinetics has designed a human neural interface system, known as BrainGate, capable of translating a person’s thoughts into cursor movements. © 2008 Prentice-Hall, Inc. 38 Computers in the Medical Field • Patient Simulator – Medical students are getting access o better training opportunities thanks to a computer technology called a Patient Simulator • Life-sized mannequins that can speak, breathe, and blink. • They have a pulse and a heartbeat, and they respond just like humans to procedures such as the administration of intravenous drugs. © 2008 Prentice-Hall, Inc. 39 Computers in the Medical Field • Patient Simulator – Medical students can train on patient simulators and experience firsthand how a human would react to their treatments without any risk to a live patient. • Physiome Project – Bioengineers are creating realistic computer simulations of all systems and features of the human anatomy. – They have recently completed a digital recreation of the human heart and lungs. © 2008 Prentice-Hall, Inc. 40 Computers in the Medical Field • Da Vinci Surgical System – Surgeons are often limited by their manual dexterity and can have trouble making small, precise incisions. – Robotic surgery devices can exercise much finer control when making delicate incisions than can a human guiding a scalpel. © 2008 Prentice-Hall, Inc. 41 Computers in Law Enforcement • Computer forensics © 2008 Prentice-Hall, Inc. 42 Computers in Law Enforcement • Computer forensics – The application of computer systems and techniques to gather potential legal evidence. – Facial reconstruction systems can turn a skull into a finished digital image of a face, allowing investigators to proceed with identification. – Computers can search the vast number of databases on the Internet © 2008 Prentice-Hall, Inc. 43 Computers in Law Enforcement • Computer forensics – Proprietary law enforcement databases such as the National Center for the Analysis of Violent Crime (NCAVC) database enable detectives to track a wealth of information about similarities between crimes, trying to detect patterns that may reveal serial crimes. © 2008 Prentice-Hall, Inc. 44 Computers in the Legal Fields • Surveillance cameras • Forensic animation © 2008 Prentice-Hall, Inc. 45 Computers in the Legal Fields • Surveillance cameras – Video of crimes in progress are sometimes displayed to the jury to help them understand how a crime unfolded. © 2008 Prentice-Hall, Inc. 46 Computers in the Legal Fields • Forensic Animation – Extremely detailed (and often lifelike) recreations that have been generated with computers based on forensic evidence, disposition of witnesses, and the opinions of experts. © 2008 Prentice-Hall, Inc. 47 Computers in Education • Computers in the classroom • Distance education • Computerized research • The Internet © 2008 Prentice-Hall, Inc. 48 Computers in Education • Computers are part of most schools, even preschools • The Internet has obvious advantages in the classroom as a research tool for students. • Many museums have virtual tours on their Web sites that allow students to examine objects in the museum collections © 2008 Prentice-Hall, Inc. 49 Computers and the Sciences • Supercomputers • Archeology • Meteorology © 2008 Prentice-Hall, Inc. 50 Computers and the Sciences • Supercomputers – Using data collected during a tornado in South Dakota, scientists have been able to create the most advanced color-coded digital storm model known to date. – The model is so detailed it takes nine days for a supercomputer to generate the simulation, even though the computer is executing four billion operations a second. © 2008 Prentice-Hall, Inc. 51 Computers and the Sciences • Supercomputers – By studying the data produced by this simulation, forecasters hope to improve their predictions about where tornadoes will form and touch down. © 2008 Prentice-Hall, Inc. 52 Computers and the Sciences • Archeology – The ancient site of Pompeii has been under the intense scrutiny of tourists and archeologists for decades. – All the foot traffic and exposure to the elements is eroding portions of the ruins. – Today, scientists are using three-dimensional scanners and imaging software to capture a detailed record of the current condition of the ruins. © 2008 Prentice-Hall, Inc. 53 Computers and the Sciences • Archeology – The virtual re-creation of the ruins is so lifelike that archeologists can study the ruins on screen instead of at the actual site. © 2008 Prentice-Hall, Inc. 54 Computers in Sports • Training • Timing and scorekeeping • Data storage and statistics • “Smartballs” sense when soccer goals are scored © 2008 Prentice-Hall, Inc. 55 Computers in Sports • Computers are now being used to help athletes analyze their performance and improve their game. • Employees in golf shops are now using sophisticated motion capture equipment to improve golfers’; swings. • Adidas is developing a new soccer ball that contains an integrated circuit chip. • When the “Smartball” crosses a goal line, it sends a radio signal to the referee’s watch. © 2008 Prentice-Hall, Inc. 56 Computer Gaming Careers • Programming • 3D animation © 2008 Prentice-Hall, Inc. 57 Computer Gaming Careers • Revenues from computer gaming in the United States have surpassed revenues from the Hollywood film industry. • Computer gaming is now a $10 billion industry in the United States. © 2008 Prentice-Hall, Inc. 58 Computers at Home • Robotics • Smart appliances Internetconnected refrigerator © 2008 Prentice-Hall, Inc. Robomower 59 Computers at Home • Robotic “maintenance workers” are now emerging for the home market. • Smart Devices – devices such as temperature controls, lights, and security devices that contain computer chips and can control functions in the home without human intervention – are becoming widely available for the home. © 2008 Prentice-Hall, Inc. 60 Technology of Tomorrow • Nanoscience • Biomedical chip implants • Artificial Intelligence © 2008 Prentice-Hall, Inc. 61 Nanoscience • Molecules and nanostructures • Nanomachines Fluid flow inside Nanomachines 5.4n m Four-α-helix protein scaffold © 2008 Prentice-Hall, Inc. 62 Nanoscience • Involves the study of molecules and structures (nanostructures) • Nanotechnology – the science revolving around the use of nanostructures to build devices on an extremely small scale. – Nanoscience is currently limited to improving existing products such as enhancing fibers used in clothing with coatings so that they repel stains or don’t wrinkle. © 2008 Prentice-Hall, Inc. 63 Nanoscience • Scientists hope to use nanostructures to build computing devices too small to be seen by the naked eye. • Developments such as this could lead to computers the size of a pencil eraser that are far more powerful than today’s desktop computer. © 2008 Prentice-Hall, Inc. 64 Biomedical Chip Implants • Technological solutions to physical problems • Identity chips Retinal Implants VeriChip © 2008 Prentice-Hall, Inc. 65 Biomedical Chip Implants • To provide technological solutions to physical problems and to provide a means for positively identifying individuals. • Providing sight to the blind – Macular degeneration and retinitis pigmentosa are two diseases that account for the majority of blindness in developing nations. – Both diseases result in damage to the photoreceptors contained in the retina of the eye. © 2008 Prentice-Hall, Inc. 66 Biomedical Chip Implants • Providing sight to the blind – Researchers are experimenting with chips that contain microscopic solar cells and are implanted in the damaged retina of patients. – The idea is to have the chip take over for the damaged photoreceptors and transmit electrical images to the brain. © 2008 Prentice-Hall, Inc. 67 Biomedical Chip Implants • Identity Chips – The VeriChip is already being implanted in humans as a means of verifying a person’s identity. – This “personal ID chip” is about the size of a grain of rice and is implanted underneath the skin. – When exposed to radio waves from a scanning device, the chip emits a signal that transmits its unique serial number to the scanner. – The scanner connects to a database that contains the name, address, and medical conditions of the person in whom the chip has been implanted. © 2008 Prentice-Hall, Inc. 68 Artificial Intelligence • Robots • Neurons vs. Microchips © 2008 Prentice-Hall, Inc. 69 Artificial Intelligence • Artificial Intelligence – The science that attempts to produce machines that display the same type of intelligence that humans do. – The performance of tasks by current robots is based on preprogrammed algorithms – Currently, no computer can emulate the human thought process completely. © 2008 Prentice-Hall, Inc. 70 Artificial Intelligence • Artificial Intelligence – The human brain is capable of processing almost a limitless number of tasks at the same time. • Just to write an e-mail on your computer, your brain coordinates thousands of nerve impulses that control your hands, eyes, and thought processes. – Until the human brain is fully understood, progress in the area of artificial intelligence is likely to proceed slowly. © 2008 Prentice-Hall, Inc. 71 Challenges Facing a Digital Society • Computer use ethics • Privacy risks • Personal data collection • Monitoring e-mail • Copyright infringement • Software piracy © 2008 Prentice-Hall, Inc. 72 Becoming Computer Fluent • • • • • • Data processing Bits and bytes Computer hardware Computer software Computer platforms Specialty computers © 2008 Prentice-Hall, Inc. 73 Computers are Data Processing Devices • Four major functions: – Input data – Process data – Output information – Store data and information DATA IN INFORMATION OUT © 2008 Prentice-Hall, Inc. 74 Bits and Bytes: The Language of Computers • Bit – Binary digit – 0 or 1 Microchip Switch • Byte OFF ON 0 1 – Eight bits • ASCII – Each byte represents a letter, number or special character =4 0 0 1 1 0 1 0 0 =A 0 © 2008 Prentice-Hall, Inc. 1 0 0 0 0 0 1 75 How Much is a Byte? NAME ABBREVIATION NUMBER OF BYTES RELATIVE SIZE Byte B 1 byte Can hold one character of data. Kilobyte KB 1,024 bytes Can hold 1,024 characters or about half of a typewritten page double-spaced. Megabyte MB 1,048,576 bytes A floppy disk holds approximately 1.4 MB of data, or approximately 768 pages of typed text. Gigabyte GB 1,073,741,824 bytes Approximately 786,432 pages of text. Since 500 sheets of paper is approximately 2 inches, this represents a stack of paper 262 feet high. Terabyte TB 1,099,511,627,776 bytes This represents a stack of typewritten pages almost 51 miles high. Petabyte PB 1,125,899,906,842,624 bytes The stack of pages is now 52,000 miles high, or about one-fourth the distance from the Earth to the moon. © 2008 Prentice-Hall, Inc. 76 Computer Hardware • • • • Input devices System unit Output devices Storage devices © 2008 Prentice-Hall, Inc. 77 Input Devices • Enter data to be processed – – – – – – – – Keyboard Scanners Mouse Trackball Touch screen Microphone Game controller Digital camera © 2008 Prentice-Hall, Inc. 78 System Unit • • • • Cabinet that houses all components Motherboard CPU Memory modules System Unit CPU Memory Module Motherboard © 2008 Prentice-Hall, Inc. 79 Output Devices • Enable us to see or hear the processed information – Monitor – Speakers – Printers © 2008 Prentice-Hall, Inc. 80 Storage Devices • Enable us to store data or information to be accessed again Hard Disk Drive Floppy Disk CD / DVD Drive Flash Drive © 2008 Prentice-Hall, Inc. 81 Computer Software • Software - programs that enable the hardware to perform different tasks • Application software – Tools for getting things done © 2008 Prentice-Hall, Inc. 82 Computer Software • System software – Essential for platform operation and support © 2008 Prentice-Hall, Inc. 83 Computer Platforms: PCs and Macs PC • CPU – Intel, AMD • Operating system – Microsoft Windows © 2008 Prentice-Hall, Inc. Mac • CPU – Motorola • Operating system – Apple Mac OS 84 Specialty Computers • • • • • PDA Server Mainframe Supercomputer Microcontrollers PDA Server Mainframe Supercomputer © 2008 Prentice-Hall, Inc. 85 Chapter 1 Summary Questions • What does it mean to be “computer fluent”? © 2008 Prentice-Hall, Inc. 86 Chapter 1 Summary Questions • What is a savvy computer user and consumer? © 2008 Prentice-Hall, Inc. 87 Chapter 1 Summary Questions • How can becoming computer fluent help you in a career? © 2008 Prentice-Hall, Inc. 88 Chapter 1 Summary Questions • What are some future technologies? © 2008 Prentice-Hall, Inc. 89 Chapter 1 Summary Questions • What kinds of challenges do computers bring to society? © 2008 Prentice-Hall, Inc. 90 Chapter 1 Summary Questions • What are a computer’s four main functions? © 2008 Prentice-Hall, Inc. 91 Chapter 1 Summary Questions • What is the difference between data and information? © 2008 Prentice-Hall, Inc. 92 Chapter 1 Summary Questions • What are a bit and a byte? © 2008 Prentice-Hall, Inc. 93 Chapter 1 Summary Questions • What hardware does a computer use to perform its functions? © 2008 Prentice-Hall, Inc. 94 Chapter 1 Summary Questions • What are the two main types of software? © 2008 Prentice-Hall, Inc. 95 Chapter 1 Summary Questions • What different kinds of computers are there? © 2008 Prentice-Hall, Inc. 96