You are on page 1of 15

ICT Applications

I. Communication Applications
I.

Flyers, posters, brochures and newspapers

Newsletters
- Usually produced for a specific audience
- Lots of words and images
- Events, local news, activities
- Handed out or collected by those who want them
Flyers and Posters
- Advertising an event, products or services
- Poster one sided; flyer two sided
- Posted by hand through letterboxed, inside magazines

Newsletters, flyers and posters can be produced using desktop publishing (DTP)
software or word processing software or Photoshop and more

Advantages:
they are cheap to produce
organisations can print as they need
previous and different versions can be stored electronically
they can be distributed as paper copies or electronically
correcting is quick and easy

Advantages:
sound/video/animation can be added
links to other websites/hyperlinks can be used
use of hotspots
buttons to navigate/more around the website leading to information
hit countries to see how many people have visited the website
can be seen by a global audience
cant be defaced or thrown away
it is much easier to update a website (no reprint)
Disadvantages
Websites can be hacked into and modified or viruses introduced
Websites can be illegally altered without the knowledge or authorization of the
producer
It is necessary for the potential customers to have a computer and internet
connection
Need for the company to maintain the website once it is set up this can be
expensive

I.

I.

ii

Websites

iii

Multimedia presentations

A series of slides used to give info to an audience, engages audience, often showing and
explaining to them the content of a topic by using not just text, but images, charts and
diagrams, sound, video and animation

I.

iv

Music Scores

Computer systems can now produce music and print music scores
Some of the features of this technology include:
-

I.

music samplers and mixers allow original tracks that were recorded in the studio to
be modified in any way that the producer wants
electronic instruments can play back through electronic effects machines
music notes are automatically printed out in the correct format
electronic organs can mimic any other instruments
synthesizers combine simple wave forms to produce complex music creations
software can automatically correct music notes in one score
the music score can be generated from the music itself

Cartoons

Animation can be produced using computer hardware and software. 3-D animation is
created using key frames that put together and calculated by software (tweening or
morphing) create a realistic image by a technique known as rendering.
However, cartoons can simply be freehand drawings and then scanned in or can be
computer generated. Essentially, cartoons can add humor to any form of communication
and can be a very efficient and way to get a message across.

I.

vi

Mobile Phones

Mobile phones communicate by using radio towers (base stations transceiver)


inside many cells networked together to cover larger areas. Mobile phone networks are
also called cellular networks (thats why we call them cell phones)
Each radio tower transmits in its own cell (base station). Mobile phone signals tends to
weaken when approaching the edge of a cell. If you move into another cell, your mobile
phone picks up signal of that cell.
If you call someone in a different country, satellite technology is used to connect you.

I.

vii

Video Conferencing

Conducting a conference between two or more participants at different sites by using


computer networks to transmit audio and video data

I.

viii

VOIP (Voice Over Internet Protocol)

Having a telephone conversation via the internet. (e.g. Skype)

I.

ix

Fax Machine

I.

Letterheads and Business Cards

I.

websites provide templates for business cards and letterhead designs

business cards handed out as personal advertisement

less likely to be thrown away, seen as personal contact

same format used on business cards adopted on company letterhead

printed on high-quality paper using laser printer

flyers and brochures use same design/logo show same company

professionalism - gives degree of credibility to company

legal reasons - legitimate documents using company letterhead = proof of actual


communication

advertising - letterhead can contain useful information to advertise company

xi

Email

E-mail is a system that allows text-based messages to be sent and received by


computers. E-mail is the most common form of electronic communication. Other types of
file can also be sent a attachments.
Laws to protect people against misuse of emails:
- In many countries, companies can only send out emails after clients gave opt-in
permission
- Companies must provide subscribers with a very clear way to unsubscribe from the
mailing list
- A valid postal address must be in emails from companies or organizations
- Companies cannot harvest (steal) email addresses

Netiquette (rules needed to respect other users in online discussion groups and
sending emails):

Acceptable language (no obscene images, abusive, profane, coercive language,


racist and violent messages, illegal materials copyright)
Dont spam. Electronic junk mail, that clogs up users inboxes. Repeatedly send
somebody the same information
Always check for spelling mistakes and grammar
Dont CAPITAL LETTERS
Dont plagiarize
Dont use too many emoticons
Respect peoples privacy and dont discuss or publish info that might embarrass
somebody

I.

xii

Blogs, wikis and networking sites

Blogs personal internet journals (Saveur)


Microblogs blogs used on social networking sites to make short, frequent posts
(Tumblr, Twitter)
Wikis web applications or websites that allow user to create and edit web pages
(Wikipedia, Wikitravel)
Social networking sites focused on building online communities of users who
share the same interests and activities (Instagram, Facebook)

II.

Satellite Applications/Systems

II.

Global positioning satellite systems (GPS)

They are used to determine the exact location of a lot of modes of transport like cars,
ships and airplanes. Sometimes, the GPS systems are referred to as satellite navigation
systems (sat navs).
The cars, ships or airplanes are equipped with a computer device with navigation
system. These devices receive signals from satellites. They interpret the signals. The
satellites signals indicates its position and time. The device (computer) in the car, ship
or airplane calculates its position based on information from at least three satellites.

II.ii

Geographic information systems (GIS)

In a general sense, the term describes any information system that integrates, stores,
edits, analyzes, shares, and displays geographic information. GIS applications are tools
that allow users to create interactive queries (user-created searches), analyze spatial
information, edit data in maps, and present the results of all these operations.
Biologists and environmentalists use GIS to protect animal life and plants in certain
vulnerable areas. Emergency services use GIS systems to send the closest emergency
personnel to a location. Teachers can use GIS in their geography, science or
engineering lessons.

II.

iii

Media communication systems

Many media like fibre optic cables and Wi-Fi are used to send and receive information but
for global communication satellites are used. The satellite system is used to transmit
data from one part of the planet to another. Due to the great distances, cables would be
too costly and there is also the problem of signal deterioration over long distances.
Satellite systems are used to transmit television, telephone and internet data around the
world.

III.

Data handling applications

A number of applications make use of simple data handling techniques:


-

III.

Surveys
Address lists
Databases (book shop, clubs and society records)
School management
School libraries

Surveys

Online questionnaires (radio buttons) collected and processed faster, paper surveys are
scanned using OMR or OCR. Advantages:
-

III.

Faster results
Fewer errors
Easier to do statistical analysis
Less expensive
Results for Online questionnaires are sent directly to a database

ii

Address lists

Computers, tablets and mobile phones are used to store information such as peoples
home addresses, phone numbers, email addresses or personal data such as date of birth.
The user can then search by name, grouping, and address and so on. Many address book
applications also allow synchronization with tablets and mobile phones. It is possible to
change the data on one system but ensure all devices are up to date.

III.

iii

Clubs and society records

Records are kept in databases making it necessary to keep paper records. The computer
system can quickly scan all the records on a file and query data for a certain criteria.

Then automatically contact the narrowed down results like members an email or using
mail merge, send out a letter or flyer.

III.iv School management system


Schools have to manage a no. of different tasks everyday:
-

Registration and attendance records of students


Student performance and reports
Organizing school exams
Creating timetables
Teachers attendance absence and substitution

Students performance and reports


Computers are used to keep data on the academic performance of all the students in a
school. The database is used to produce a printed copy of the students progress in a
form of a report.

III.

School registration systems

There are now a number of possible ways of automating the registration process using
hardware and software.
-

III.

Issue each student with an ID card. Magnetic stripe, use of a PIN, chip with RFID.
Make use of biometrics. Unique fingerprints stored in the database.

vi

Library systems

Libraries often contain many thousands of books, magazines. CD-ROMs, etc. Libraries
use computer-based systems to a record of their books, and of the people who borrow
the books. A computerized library database allows:
-

Quick and easy searching for books


Easy printing out of book lists/labels
Easy tracking of books loans (who has it, when it was borrowed, etc.)
Automatic printing of warning letters for borrowers who have not returned books

Each published book has an International standard Book Number (ISBN). The ISBN is
typically printed on the back of the book in numeric form, and as a barcode (to allow for
quick data entry).
The book file
Barcode

Book
Title

The borrower File

Name
of
Author

Date of Unique
Purcha book
se
identifier

Borrowers
ID

Catego
ry

Publish
er

Borrowers are commonly given library cards that have their details printed on, so that
they dont have to remember their ID. Most cards also have the borrowers ID in the form
of a barcode for quick and easy data input when borrowing books.
Borrowers
ID

Borrower
s First
Name

Borrower
s Last
Name

Unique book
identifier

Date due
back

Phone
No.

Ema
il

Borrowers ID is the Primary key in the borrower file, and the Foreign key in the book file.
ISBN cannot be the Primary key to relate book file and borrower file because there may
more than one copy of the book in the library with the same ISBN.
Every day, the database is interrogated to see overdue books
1.
2.
3.
4.
5.
6.
7.

IV.

Computer reads record from book file.


It compares the due date with current date.
If due date < current date, the book is overdue.
Using the book barcode, the book file is linked to the borrowers file.
Corresponding record is read from the borrowers file.
Borrowers details are found, a letter/email/sms is sent out.
The next record in the book file is read until the whole file has been checked.

Retail applications

The Point-of-sale in a store is the place that you pay for your purchases (POS).

IV.

Automatic stock control system

1. A method of inputting the codes of goods purchased usually a barcode scanner. The
codes are used to find more information about the goods, such as price, from a
database.
2. Each barcode is associated with a stock file (price, stock levels, product description).
If barcode cant be read, EPOS needs to type no.
3. The barcode is searched for on the stock file record by record until match, price and
description is send back to EPOS.
4. Stock level for the item is found and reduced by 1: if no. in stock is less or equal to
the re-order/minimum no. in stock, the computer automatically orders a batch of
items from supplier.
Supplier information would be found on another file called the order file or supplier file (barcode
would be the link between the 2 files)Once goods have been ordered the item is flagged on the
file to indicate an order has been placed, this prevents re-order act until the new stock
arrives.When goods arrive, the barcode on the cartons will be used to update the stock files, also
any flags associated with these goods will be removed so that that stock checks can start to be
made again.

5. The stock-control system updates the stock-levels in the stock database for the
purchased goods.

6. The above procedure is repeated until all the items in the customers basket/trolley
have been scanned.

IV.

ii

Electronic funds transfer

EFT allows money transfer instructions to be sent directly to a banks computer system.
Electronic transfer of money between accounts.
Payment of salaries to the staff of a large company. On the day when payment is made,
the company instructs the bank to transfer money from their account into the bank
accounts of their employees.
When you use a bank card (debit or credit card) to pay for a purchase in a store, the
payment is made using a system called electronic fund Transfer at Point-of-Sale
(EFTPOS).
-

Credit card the bank is lending (crediting) you money (and you then pay it back

over the following months)


Debit card the money is taken (debited) from your account (you must already have
the money)

Chip in a PIN
Suppose a customer goes into a restaurant to pay for a meal using a chip and PIN card:
1. The PIN is entered using a keypad
2. The card is checked to see if it is valid (check on expiry date, whether stolen card,
etc.)
3. The PIN is read from the chip on the card and is compared to the one just keyed in
4. If they are the same, the transaction can proceed. If this is the third attempt at
entering the PIN, then the transaction is terminated
5. The restaurants bank contacts the customers bank
6. A check is made on whether they have enough funds
7. If the card is not valid or there arent enough funds available, then the transaction
is terminated
8. If everything checks out OK, then the transaction is authorized
9. An authorization code is sent to the restaurant
10.
The price of the meal is then deducted from the customers account
11.
The same amount of the money is then add
12.
A receipt is produced as proof of purchased

V.

Banking Applications

V.

Automated teller machines (ATMs)

transferring money
paying bills
print bank statements
change PIN
top up mobile credit
cash/cheque deposit
Withdraw cash

Withdrawing cash from an ATM


Customer inserts bank card

Language selection
PIN is entered using a numeric keypad

What goes on behind the scene


Contact is made with banks computer
machine reads the chip and checks if card
is valid
Displays system in chosen language
PIN read from the chip on the card and is
compared to the one just keyed in, if it is
correct then transaction can proceed

A number of options are given (change PIN,


top up mobile phone, see account balance
on screen or printed out, pay in cheques,
money transfer, withdraw, etc.)
Customer selects each option
Card is checked for validity
Customer chooses an amount or enters Check made on whether they have enough
desired amount
funds; it is checked for daily withdrawal
limits; customers account is updated
Customer chooses to have a receipt or not
A receipt is produced as proof of
transaction
Card is returned
Money dispensed

V.

ii

Telephone banking

Uses telephone rather than computer


1. The customer calls the bank
2. Customer keys account number
3. Requested to enter a 4 digit PIN or selected numbers from their PIN
4. The customer will then hear various options, which might include:
- Press 1 for your balance
- Press 2 to carry out a money transfer
- Press 3 to pay bill
- Press 4 to talk to one of our representatives
5. Customer enters key or speak the number (voice recognition)

V.

iii

Internet/Online banking

V.

iv

Clearing of Cheques

1. Joe Jones bank sends the cheque to a centralised clearing centre. It is processed by
a machine to check.
2. Cheques are sorted using their sort codes (unique 6 digit no. used to identify each
bank branch)

3. Data from cheque is converted into an encrypted file called IBDE (Inter-Bank Data
Exchange). IBDE is signed with a digital signature so that receiving bank can be
sure that the data hasnt been tampered.
4. Cheques are delivered back to Joes bank which sends it back to Johns bank. MAC
bank will do the same procedure.
5. Check to see if John has enough money in his account, signed, dated and written
correctly, genuine
6. If everything ok, pay Joes bank. If not ok, send the unpaid cheque back to Joes
bank.

VI. Booking systems


Input data needs to be processed immediately so that its output can be used to affect
the next input (real-time processing). If system response time is slow double-booking is
possible.
Examples: flights, trains, buses, cinema and theatre bookings.
Theatre and cinema booking systems:
1. The customer clicks on the performance they wish to see
2. A date and time is typed in
3. The required number of seats is also entered
4. The seating display in the theatre is shown on the screen
5. The user selects their seat(s) by highlighting the actual seats on the screen display
and clicks confirm
6. The database is then searched to check availability of the selected seats
7. If seats available, the total price is shown + seat no.
8. If happy with selection on the customer CONFIRMS
9. Customer enters personal details or indicates returning customer (website knows
details)
10.
Payment method selected and paid
11.
Theatre seats booked after payment under customers name
12.
Final details shown on screen
13.
Email sent to the customer for printing e-ticket
Flight booking systems:
Similar to cinema and theatre online booking systems, involves choosing airport.
Imagine that two people are using an airlines website to try and book seats on a flight.
Both people try to book seat 38C at the same time Even though the booking requests
are made at the same time, one request will be received by the airlines computer just
before the other (since requests come into the system through a queue).

VII. Measurement applications


This type of application involves sensor constantly taking measurement data (such as
temperature or light intensity).

After conversion, the data is sent to a microprocessor where it is processed. Data from
sensors are reviewed, compare it to data stored in memory and updates files and
sometimes gives a warning signal if values are outside given parameters.
The microprocessor will take no action to change any of the conditions during the
measurement process.

VII. i

Weather stations

Set up automatically to gather data from sensors (rainfall, temperature, wind speed,
wind direction, air pressure, and humidity). Data is gathered for 24 hours, so that
weather forecasters can predict the weather for the next few days.

VII. ii
-

Sensors read key vital signs (pulse rate, heart rate, temperature, blood pressure,
respiration)
The data from the sensors is converted into digital using ADC
Data is stored in computers memory
The computer compares the data from sensors with values stored in its memory
(input by nurse or doctor)
Results are output on a screen in form of graphs of graphs and/or numerical
readouts
An alarm is activated if any of the data is outside acceptable input values
The system continues to measure the patients vital signs until computer is
switched off

VII. iii
-

Measuring a patients vital signs in a hospital

Measuring pollution in a river

Sensors are placed in at least 2 different positions so that pollution comparison can
be made
Data from sensors is converted into digital using ADC and sent to a computer
o Light sensor to detect solids/chemicals in rivers, would block light
Computer stores received data
Oxygen levels and acidity levels are compared to the historical data stored in
memory and compared to pre-set levels
Oxygen and acidity levels in different positions in the river are also compared to try
and find the source of pollution
Either the data is saved (CD/DVD or memory stick) and taken for further analysis or
the computer automatically sends through phone or email back to the monitoring
station

VIII. Microprocessors in control applications


In control applications, sensors, microprocessors and actuators are used.
Sensors send data to the microprocessor or computer, an ADC maybe needed, compares
incoming data with stored values or data earlier entered. If data is outside given
parameters it will trigger an actuator to take some action to affect the next input value.

Automatic oven/cooker
Central heating systems
Chemical process control
Controlled greenhouse
Burglar alarm system
Turtle graphics

IX. Modeling applications


A system/simulation that represents/mimics a real situation in order to study the
behavior of the system
- e.g. tuck shop model (spreadsheets), traffic light simulation, flight simulators.
- Find out what mechanisms control how a system behaves
- Makes possible prediction of behaviors of system in future and try to influence
future behavior
Traffic light simulator
Necessary to consider:
- How and what data needs to be collected:
o Count no. of vehicles passing the junction in all directions at different times
and days of week
o How long it takes a vehicle to pass through
o Any pedestrian crossings?
- How the computer model is carried out:
o After data is inputted into computer the model is ran
o Designers model the real situations
o Different scenarios can be tried out
- How the system would work in real life:
1. Sensors in the road gather data and count no. of vehicles
2. Data sent to computer
3. Data compared with data stored in system
4. Computer decides what to do
5. Signals sent to traffic lights
Limitations of simulations
- They are only as good as the data used and mathematical algorithms lead to
limited use in some very complex applications like simulating a nuclear process
- Can be expensive to set up and requires software specialists
- Require expensive and fast processors/computer systems

X.

Manufacturing applications

Automation with Robotics improve productivity, reduce costs, improve consistency and
make factories safer and environmentally friendly.

XI. The Use of Expert system


An expert system is computer software that attempts to act like a human expert on a
particular subject area.

An expert system is a system that mimics the expertise and knowledge of an expert in a
given field like medicine, finance, engineering, etc.
Expert systems are often used to advice non-experts in situations where a human expert
is unavailable.
An expert system is a program that analyses questions input by a practitioner and
provides answers at the level of an expert in a particular field. An expert system is useful
in providing support for making decisions and can also suggest alternatives of other
issues to be considered.
An expert system includes:
A user interface this is the system that allows a non-expert user to query the expert
system and to receive advice. The user-interface is designed to be as simple to use as
possible. /
A knowledge base this is a collection of facts and rules. The knowledge base is created
from information provided by human experts.
An inference engine this acts like a search engine, examining the knowledge base for
information that matches the users query. / Software which attempts to find answers
from the knowledge base by applying Rules to data
v

User

Explanation

Inference

Knowledge

Rules base

Rules base this is a set of rules which data must abide e.g. IF if the country is in South
America AND the language used is Portuguese then the country must be Brazil
Explanation system developed
Medical expert system
Advantages
- Can indicate range of possible health problems based on known symptoms
- Gives support in making decisions about which a doctor may be doubtful because
of a lack of knowledge or lack of experience
- Can help experts arrive at an accurate solution much faster
- Can show concepts used to arrive at conclusions
- Can be developed and kept up-to-date as knowledge is advanced
Disadvantages
- Lacks judgment and intuition which is sometimes vital in diagnosis
- Cannot learn from mistakes
- Cant easily adapt to new circumstances
Oil Prospecting
- An interactive user screen appears
- Questions are asked about geological profiles
- Answers to questions and information about geological profiles are typed in

Suggests the probability of finding oil as an output


Indicates probable depth of deposits
Makes predictions about geological deposits above the soil
Produces contour maps showing concentration of minerals, rocks, oil, etc.

Using 3D Printers
- Design of medical tools and equipment, allow new equipment printed for specific
surgeries
- Surgical diagnostic aids: patient scanned first using CT or MRI. The printer can
then reproduce a solid object showing the exact internal organs.
Can print blood vessels, major arteries, tumors
Can print hard nylon objects for pre surgical planning
- Prosthetics: print false arms, hands and legs
- Tissue Engineering: printing of bio-compatible materials, cells and supporting
structures. Allows the function of cells within a 3D printed object to produce
multilayered skin tissue, bone tissue heart/artery grafts and tracheal splints.

XII. Batch Processing


A number of tasks (jobs) collected together over a period of time and then processed in
batches. Once the batch processing starts, no user interaction is required. E.g. billing
systems like electricity, gas, water, telephone, payroll systems and processing of bank
cheques and updating stock data.
Real-time/online processing
Used in systems where data needs to be processed immediately we cannot wait and
process it later
When booking seats on a flight or at the theater, this type of online processing is
required. The response to a query needs to be very fast in order to prevent double
booking. E.g. any type of monitoring system, any type of computer control system,
payment systems, all booking systems, and computer games.
Automatic Number Plate Recognition (ANPR) System
Reads number plates on cars in different applications. For example in a car park to
enable entry and exit to be automatically controlled by a computer system:
1. A sensor detects a vehicle and sends a signal to the microprocessor to instruct
camera to capture an image of the front car.
2. The number plate is isolated from the image and each character is recognized
using OCR software. The characters are converted into a string and stored on the
database.
3. The car park barrier is raised and a ticket is issued. The ticket shows date and
time of park entering.
4. The motorist pays the ticket. The payment is registered on the database. At the
barrier the ANPR system reads again the plate number. If the number plate
matches with payment the barrier is raised.

Police - to spot cars that have been flagged for some reason. For example, the car may
have been reported. Stolen or there may be no record of car tax being paid on the
vehicle.
The system is commonly found over major roads and motorways. It is also fitted inside
police cars,
The system works so well, that it is also the basis of the London congestion charge
system and is also used at airport car parks.

XIII. Monitoring and Tracking systems


1. Monitoring/Tracking a member of public (prisoner, elderly person, marathoner)
- Makes use of RFID, having a microchip strapped around ankle, wrist
- They are tamper-proof and sends in timed interval, containing persons
location
- (prisoners, elderly people) have a device at home picking up these signals.
This unit is connected a computer in a control room (police station e.g.) by
landline or mobile phone networks. An alert is sent if person is not detected.
- GPS is also used to track exact location
- CCTV cameras (monitoring ppl in streets, shopping malls)
2. Cookies (keep track of persons buying habits when using internet)
3. Keylogging/spyware, software used to monitor each key press on a users
computer (send back to person installed the software)
4. Employee call monitors, listen to employees telephone calls (improvement, joint in
a call if necessary, training tool)
- Monitor, line is muted so that employee or other person doesnt know
- Whisper, allows manager to speck without other person listening
- Barge, allows manager to be heard by both

You might also like