Here - Warilla High School Intranet
Transcription
Here - Warilla High School Intranet
175P IPT HSC Cover 7/9/00 9:23 AM Page 1 Key features • list of outcomes and overview at the beginning of each chapter • social and ethical issues and Internet activities integrated throughout the book • numerous practical tasks that can be used with any software or make of computer • case studies and examples of information systems • learning activities to help students apply the content in every section • chapter review at the end of each chapter • interesting IT facts and cartoons 1to2promote 3 4 5class 67890-1234567890-1234567890discussion QWERTYUYIOPQWERTYUYIOPQWERTYUYIOP • key terms highlighted for quick reference ASDFGHJKL:”ASDFGHJKL:”ASDFGHJKL:” • glossary ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? • index. !@ $%^&*()_)_+!@ $%^&*()_)_+ 567890-1234567890UYIOPQWERTYUYIOP FGHJKL:”ASDFGHJKL:” ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? !@ $%^&*()_)_+!@ $%^&*()_)_+ Additional resources to support and are0 - 1 2 3 4 1 2extend 3 4 5this 6 book 789 available at Heinemann’s World Wide Web site, hi.com.au. QWERTYUYIOPQWERTY These include a sample teaching program, assessment DFGHJKL:”ASD advice and answers to exercises from AtheS textbook. About the author Greg Powers is a head teacher with many years’ experience in writing and implementing computing studies programs. He is the author of several highly successful texts including Computing Studies–An Introductory Course. ISBN 0 86462 501 4 ISBN 0-86462-512-X You can visit the Heinemann World Wide Web site at hi.com.au or send email to info@hi.com.au 9 780864 625120 G.K. Powers Also available Heinemann Information Processes and Technology: Preliminary Course Heinemann Information Processes and Technology: HSC Course Heinemann Information Processes and Technology: HSC Course has been written to meet all of the requirements of the new Information Processes and Technology syllabus in NSW. This text will help students to develop their understanding of information processes in the context of different information systems. It is designed to build on the knowledge and skills gained in the Preliminary course and to help students become confident, competent, discriminating and ethical users of information technology. This text provides up-to-date information, a practical approach, and a large number of questions that cater for a wide range of students. H e i n e m a n n Information Processes and Technology 1234567890-1234567890-1234567890QWERTYUYIOPQWERTYUYIOPQWERTYUYIOP ASDFGHJKL:”ASDFGHJKL:”ASDFGHJKL:” ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? HSC COURSE !@ $%^&*()_)_+!@ $%^&*()_)_+ 1234567890-1234567890-1234567890QWERTYUYIOPQWERTYUYIOPQWERTYUYIOP ASDFGHJKL:”ASDFGHJKL:”ASDFGHJKL:” ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? !@ $%^&*()_)_+!@ $%^&*()_)_+ G. K. Powers Y F Y F Heinemann Information Processes and Technology 1234567890-1234567890-1234567890QWERTYUYIOPQWERTYUYIOPQWERTYUYIOP ASDFGHJKL:”ASDFGHJKL:”ASDFGHJKL:” ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? !@ $%^&*()_)_+!@ $%^&*()_)_+ 1234567890-1234567890-1234 QWERTYUYIOPQWERTYUYIOPQWERTY HSC COURSE ASDFGHJKL:”ASDFGHJKL:”ASDF ZXCVBNM<>?ZXCVBNM<>?ZXC !@ $%^&*()_)_+!@ $%^ 1234567890-1234567890-1234 QWERTYUYIOPQWERTYUYIOPQWERTY ASDFGHJKL:”ASDFGHJKL:”ASDF ZXCVBNM<>?ZXCVBNM<>?ZXC !@ $%^&*()_)_+!@ $%^ G.K. Powers @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@ @@@@@@@@@@@? ?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@6X?hW2@@@@@@@@@@@@@@@@@@@@6Xh?W2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@)Xg?W&@@@@@@@@@@@@@@@@@@@@@@)X?gW&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0MI'@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@1g?7@@@@@@@@@@@@@@@@@@@@@@@@1?g7@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@fV'@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@f?N@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@f?J@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@fO&@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6?2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@@@@f@@@@@@@@@@@@@@@@@@@@@@0Y@@@@@@@@@@@@@@@@0Y@@@@@@@@@@0M?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@f@@@@@@@@@@@@@@@@@@@@@0Y@@@@@@@@@@0M??I4@@@@@@@@@@@@@@@0MeI4@@@@@@@@@@@@@@@@@@@@@@@@@?fW@@@@@@@@@@@@@@@@@@@@@@@@0Y@@@@@@@@@@0M??I4@@@@@@@@@@@@@@@@@@@@@0Y@@@@@@@@@@0MeI4@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@@@@X@@@@@@@??I'@@@@@@@@@@@@@0Mf@@@@@@@@@@@0M?f@@@@@@@@h?I'@@@@@@@@@@@@@@@@@@@X?@@@@@@@?W@@@@@@@@@@@@@0Mf?@@@@@@@@?hI'@@@@@@@@@@h?I'@@@@@@@@@@@@@@@@@0MW@@@@@@@@Y?I4@@@@@@@@@@@@@@@@0M?e?3@@@@@@@?hI'@@@@@@@@@@@@@@0Mf@@@@@@@@hI4@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@@@0MS@@@@@@@@@6XV4@@@@@@@@he@@@@@@@@@?h@@@@@@@@@@@@@6X?eV'@@@@@@@@@@@@@@@(MS@@@@@@@@@@@UI'@@@@@@@@h?@@@@@@?@@@@@@6Ke?V'@@@@@@@?@@@@@@6X?eV'@@@@@@@@@@@@@@(M?W&@@@@@@@@@@??I'@@@@@@@@@@@h?N@@@@@@@@@@@@@6X??V'@@@@@@@@@@?h3@@@@@@@@@@@@6X?eI'@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@@(M?W&@@@@@@@@@@)X?I'@@@@@@@@@6X?f@@@@@@@@@@@@6Xf3@@@@@@@@@@@@@)Xe?N@@@@@@@@@@@@@@(Y?7@@@@@@@@@@@1?V'@@@@@@@@@@6X?e?3@@@X@@@@@@@@@@@?eV'@@@@X@@@@@@@@@)Xe?V'@@@@@@@@@@@@(Y??7@@@@@@@@@@@LeV'@@@@@@@@@@@@@6X?f@@@@@@@@@@@@@@1?eV'@@@@@@@@@@@@6XfN@@@@@@@@@@@@@)Xe?N@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@ @@@@@@@@@@@(Y??7@@@@@@@@@@@@1??N@@@@@@@@@@1?f@@@@@@@@@@@@@1fN@@@@@@@@@@@@@@1f3@@@@@@@@@@@@(Y?J@@@@@@@@@@@@@L?V'@@@@@@@@@@1?e?N@@>@@@@@@@@@@@@Le?N@@@>@@@@@@@@@@@1fN@@@@@@@@@@@(YeJ@@@@@@@@@@@@1e?N@@@@@@@@@@@@@@1?f@@@@@@@@@@@@@@@Le?N@@@@@@@@@@@@@1f?@@@@@@@@@@@@@@1f3@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@ @@@@@@@@@@@HeJ@@@@@@@@@@@@@@?e3@@@@@@@@@@?f@@@@@@@@@@@@@@f?3@@@@@@@@@@@@@@L?eN@@@@@@@@@@@(Ye7@@@@@@@@@@@@@1??V'@@@@@@@@@@?f3>@@@@@@@@@@@@@1f@@>@@@@@@@@@@@@@L?e?@@@@@@@@@@@H?e7@@@@@@@@@@@@@f3@@@@@@@@@@@@@@?f3@@@@@@@@@@@@@@1f@@@@@@@@@@@@@@f?3@@@@@@@@@@@@@@L?eN@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@5?e7@@@@@@@@@@@@@@?eN@@@@@@@@@@?f@@@@@@@@@@@@@@g@@@@@@@@@@@@@@1?e?@@@@@@@@@@@H?e@@@@@@@@@@@@@@@?eN@@@@@@@@@@?fS@@@@@@@@@@@@@@@f3>@@@@@@@@@@@@@@1?e?@@@@@@@@@@@L??J@@@@@@@@@@@@@@fN@@@@@@@@@@@@@@?f?@@@@@@@@@@@@@@@f3@@@@@@@@@@@@@g@@@@@@@@@@@@@@1?e?@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@H?e@@@@@@@@@@@@@@@?e?3@@@@@@@@@?f@@@@@@@@@@@@@@f?7@@@@@@@@@@@@@@@?e?@@@@@@@@@@5e?J@@@@@@@@@@@@@@@?e?@@@@@@@@@@?f7@@@@@@@@@@@@@@@fN@@@@@@@@@@@@@@@@?e?3@@@@@@@@@@)KO&@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@? 7@@@@@@@@@@@@@@@fN@@@@@@@@@@@@@f?7@@@@@@@@@@@@@@@?e?@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@5f@@@@@@@@@@@@@@@?e?N@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?e?3@@@@@@@@@He?7@@@@@@@@@@@@@@@?e?3@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?e?N@@@@@@@@@@@@@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?e?3@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@Hf@@@@@@@@@@@@@@@?f@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?e?N@@@@@@@@5?e?@@@@@@@@@@@@@@@@?e?N@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?e?N@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@5? @@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@H? @@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@@@@@@@@@@@@5f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@H?e?W2@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@@@@@@@@@@@@?f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@f?7@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@@@@@@@@@@?@1f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@@@@@@@@?@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@5f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@@@@@X?@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@?f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@@@XV@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@1f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@0MS@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@(M?W&@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@f?3@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@(Y?W&@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@L?e?N@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@f?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@(Y??7@@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@1?f@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@L?e?3@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@(YeJ@@@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@?f@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@1?e?N@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@(Y?e7@@@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@Lf@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@Lf@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@Hf@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@)X?e3@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@1f@@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@1?eN@@@@@@@@@@@@@@@@@@?@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@L?e3@@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@5g?@@@@@@@@@@@@@@@@@@@@@@@@@@?g@@@@@@@@@@@Le?3@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@)XeV'@@@@@@@@@@@@@@@@?@@@@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@?f3@@@@@@@@@@@@@f?@@@@@@?@@@@@@@?f@@@@@@@@@@@@@@@@f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@Hg?3@@@@@@@@@@@@@@@@@@@@@@@@5?g3@@@@@@@@@@)X??V'@@@@@@@@@@@@@@@X@@@@@@@@@@?f3@@@@@@@@@@@@5f?@@@@@@@@@@@@@@@5?f@@@@@@@@@@@)X??N@@@@@@@@@@@@@@@@@@@@@@@@@@@?f@@@@@@@@@@@@@@@5f?@@@@@@@@@@@@@@@5?f@@@@@@@@@LfN@@@@@@@@@@@@@L?e?@@@@@@@@@@@@@@? @@@@@@@@@@@@@@@5f?@@@@@@@@@@@@@f?@@@@@@@@@@@@@@@5?f@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@5?g?V'@@@@@@@@@@@@@@@@@@@@@@(Y?gV'@@@@@@@@@@)KeV'@@@@@@@@@@@@@V@@@@@@@@@@5?fN@@@@@@@@@@@@Hf?3@@@@@@@@@@@@@@H?f3@@@@@@@@@@@)Xe3@@@@@@@@@@@@@@@@@@@@@@@@@5?f3@@@@@@@@@@@@@@Hf?3@@@@@@@@@@@@@@H?f3@@@@@@@@)X?e?@@@@@@@@@@@@@)Xe?3@@@@X@@@@@@@5? 3@@@@@@@@@@@@@@Hf?3@@@@@@@@@@@5f?3@@@@@@@@@@@@@@H?f3@@@@@@@@@@@@@ @@@@@@@@@@@@@@@0Y?hV4@@@@@@@@@@@@@@@@@@@@0Yh?V4@@@@@@@@@@@6X?V4@@@@@@@@@@@@@@@@@@@@@@0Y?f?@@@@@@@@@@@@?f?V4@@@@@@@@@@@@@gV4@@@@@@@@@@@)K?V4@@@@@@@@@@@?@@@@@@@@@@@0Y?fV4@@@@@@@@@@@@@?f?V4@@@@@@@@@@@@@gV4@@@@@@@@)XfI4@@@?@@@@@@@)X??V4@@>@@@@@@@0Y?fV4@@@@@@@@@@@@@?f?V4@@@@@@@@@0Yf?V4@@@@@@@@@@@@@gV4@@@@@@@@@@@@ @@@@@@@@@@ @@@@@@@@@@@? ?@@@@@@@@)K??I4@@@@@@??@@@@@@@@@ ?@@@@? @@@@@@ ?@@@@@@@@@@6K?W@@@@@@@@?@@@@@@@@@@ ?@@@@@@? @@@@@@ ?@@@@@@)K?g@@@@@@@@@@)KfV@@@@@ ?@@@@@@? @@@? @@@@@@ @@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6Kg@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@Yf?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6?2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M? I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M? ?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@0M ?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@0M ?O@KO2@@@@@@@@6K I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M ?I4@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@0M ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K? ?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M I4@@@@@@@@@@@@@@@@ @0M? ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K?h?I4@@@@@@@@@@@ O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K? I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6KhI4@@@@@@ ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K? ?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6KgI4@@ O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K ?I4@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@0M O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K?f O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K? O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K? O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K? O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6K ?O2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ 2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@6KhfO2@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Heinemann A division of Reed International Books Australia Pty Ltd 22 Salmon Street, Port Melbourne, Victoria 3207 World Wide Web hi.com.au Email info@hi.com.au Offices in Sydney, Brisbane, Adelaide and Perth. Associated companies, branches and representatives throughout the world. © Gregory Powers 2000 First published 2000 2003 2002 2001 2000 10 9 8 7 6 5 4 3 2 1 0 Copying for educational purposes The Australian Copyright Act 1968 (the Act) allows a maximum of one chapter or 10% of this book, whichever is the greater, to be copied by any educational institution for its educational purposes provided that that educational institution (or the body that administers it) has given a remuneration notice to Copyright Agency Limited (CAL) under the Act. For details of the CAL licence for educational institutions contact CAL, Level 19, 157 Liverpool Street, Sydney, NSW, 2000, tel (02) 9394 7600, fax (02) 9394 7601, email info@copyright.com.au. Copying for other purposes Except as permitted under the Act, for example any fair dealing for the purposes of study, research, criticism or review, no part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without prior written permission. All enquiries should be made to the publisher at the address above. Publisher: Rosie Adams Editor: Liz Jacobsen Designer: Giulia De Vincentis Text designer: Giulia De Vincentis Cover designer: Relish Design Illustrator: Guy Holt Photograph researcher: Janet Pheasant Typeset in 10.5/12.5 Berling by Palmer Higgs Pty Ltd Film supplied by Type Scan, Adelaide Printed in Hong Kong by H & Y Printing National Library of Australia cataloguing-in-publication data: Powers, G.K. (Gregory K.). Heinemann information processes and technology : HSC course. Includes index. ISBN 0 86462 512 X. 1. Information storage and retrieval systems. 2. Electronic data processing. 3. Information technology. I. Title 004 Disclaimer All the Internet addresses (URLs) given in this book were valid at the time of printing. However, due to the dynamic nature of the Internet, some addresses may have changed, or sites may have ceased to exist since publication. While the authors and publisher regret any inconvenience this may cause readers, no responsibility for any such changes can be accepted by either the authors or the publisher. Contents To the teacher About the contributing authors Part 1 Core v vi 1 Chapter 1 Project work 1.1 Project management 1.2 Social and ethical design 1.3 Understanding the problem 1.4 Making decisions 1.5 Designing solutions 1.6 Implementing 1.7 Testing, evaluating and maintaining Chapter review 2 4 8 12 15 18 26 29 33 Chapter 2 Information systems and databases 2.1 Information systems 2.2 Organisation methods 2.3 Storage and retrieval 2.4 Other information processes 2.5 Issues related to information systems and databases Chapter review 35 36 42 53 64 69 73 Chapter 3 Communication systems 3.1 Characteristics of communication systems 3.2 Examples of communication systems 3.3 Transmitting and receiving 3.4 Other information processes 3.5 Issues related to communication systems Chapter review 75 76 80 87 100 104 109 Part 2 Options 111 Chapter 4 Transaction processing systems Christopher Lean 4.1 Characteristics of transaction processing systems 4.2 Examples of transaction processing systems 4.3 Storing and retrieving 4.4 Other information processes 4.5 Issues related to transaction processing systems Chapter review 112 113 119 126 134 139 144 iii Chapter 5 Decision support systems 5.1 Characteristics of decision support systems 5.2 Examples of decision support systems 5.3 Organising and decision support systems 5.4 Processing and decision support systems 5.5 Analysing and decision support systems 5.6 Other information processes 5.7 Issues related to decision support systems Chapter review Quentin Evans 146 147 152 159 167 171 176 179 184 Chapter 6 Automated manufacturing systems Wayne Moore 6.1 Characteristics of automated manufacturing systems 6.2 Examples of automated manufacturing systems 6.3 Collecting in automated manufacturing systems 6.4 Other information processes 6.5 Issues related to automated manufacturing systems Chapter review 186 187 192 198 207 213 217 Chapter 7 Multimedia systems 7.1 Characteristics of multimedia systems 7.2 Examples of multimedia systems 7.3 Displaying in multimedia systems 7.4 Other information processes 7.5 Issues related to multimedia systems Chapter review 219 220 230 238 245 254 258 Glossary Index Acknowledgments Ellen Sheerin 260 268 274 To the teacher This book has been written as a textbook for the New South Wales Information Processes and Technology HSC course. The aim of this course is to enable students to become confident, competent, discriminating and ethical users of information technologies and information processes. This book addresses this aim and provides an excellent understanding of all aspects of information technology. Even though students undertaking this course have satisfactorily completed the Preliminary course, they will vary substantially in understanding and skills. This book has been written to cater for students with a wide range of knowledge levels. Organisation of the text The book closely follows the syllabus and the software/course specifications. It is presented in two parts. Part 1 covers the first three components of the syllabus (60%). Each component occupies 20% of the course time. Part 2 covers the option strands (40%). Students are required to select two options. Each option covers 20% of the course time. • Part 1 Core 1 Project work (20%) 2 Information systems and databases (20%) 3 Communication systems (20%) • Part 2 Options (Students select only two options) 4 Option 1: Transaction processing systems (20%) 5 Option 2: Decision support systems (20%) 6 Option 3: Automated manufacturing systems (20%) 7 Option 4: Multimedia systems (20%) Teaching program Teachers can decide on the sequencing of the content depending on the ability and knowledge of their students. The first chapter on project work is fundamental to the other chapters. Students need to cover this chapter early in the teaching program. Projects can be one large project or a number of smaller projects. Project work in the HSC course is intended to give students an opportunity to plan, design and implement an information system. The information systems chosen should be one of the following: • a database information system • a communication system • a transaction processing system • a decision support system • an automated manufacturing system • a multimedia system. The teaching program needs be consistent with the indicative times specified above. Additional resources to support and extend this book are available at the Heinemann World Wide Web site (hi.com.au). v About the contributing authors Christopher Lean is a programmer who develops and publishes software for his company InfoVision. He has taught at TAFE level and at UTS and UNSW, and has worked with a range of industries as a consultant. Quentin Evans is an experienced teacher of Science and Computing Studies, having taught a variety of computer courses since 1986. She currently holds the position of Computer Coordinator at Concord High School. Dr Wayne Moore is a senior lecturer in computing at Charles Sturt University, Bathurst. He has been a mathematics teacher and science lecturer and currently teaches information technology to undergraduate and postgraduate students. He conducts research in industrial control systems and robotics and has interests in simulation and virtual worlds. Ellen Sheerin has been involved in teaching computing courses in schools since 1985 and is currently Computer Coordinator at Gorokan High School. She has been an HSC Computing Studies examination marker as well as presenting workshops in computing for teachers. vi Core Chapter 1 Project work Chapter 2 Information systems and databases Chapter 3 Communication systems 1 chapter PROJECT WORK Outcomes Overview Project work for the HSC course follows the five stages of the traditional system development cycle that were outlined in the Preliminary course. This chapter builds on these concepts and includes additional content on prototyping and participant development. Students are required to construct an information system using the knowledge gained from this chapter. • applies an understanding of the nature and function of information technologies to a specific practical situation (H1.1) • explains and justifies the way in which information systems relate to information processes in a specific context (H1.2) • analyses and describes a system in terms of the information processes involved (H2.1) • develops solutions for an identified need which address all of the information processes (H2.2) • evaluates the effect of information systems on the individual, society and the environment (H3.1) • demonstrates ethical practice in the use of information systems, technologies and processes (H3.2) • proposes ways in which information systems will meet emerging needs (H4.1) • justifies the selection and use of appropriate resources and tools to effectively develop and manage projects (H5.1) • assesses the ethical implications of selecting and using specific resources and tools (H5.2) • analyses situations, identifies a need and develops solutions (H6.1) • selects and applies a methodical approach to planning, designing or implementing a solution (H6.2) • implements effective management techniques (H7.1) • uses methods to thoroughly document the development of individual and/or group projects (H7.2) In the Preliminary course, you were introduced to the system development cycle. It is a series of stages used in the development of a new information system. The traditional system development cycle has five broad stages (see Figure 1.1): 1 understanding the problem—requirements of a system to solve the problem 2 making decisions—feasibility of a new system to solve the problem 3 designing solutions—creating the new system 4 implementing—using the system to solve the problem 5 testing, evaluating and maintaining—ongoing operation of the system. In the system development cycle, there are four important features: • Each stage in the cycle is not always separate and distinct. People involved in the development of a new system often switch between stages. • The cycle does not end with the testing, evaluating and maintaining stage. It is a cycle, and the results from the final stage are used for the initial stages of another new system. In this way the cycle is an ongoing process. • The extent of the cycle depends on the complexity and size of the project. In a small project, some of the stages can be simplified and completed very quickly. However, in a large project, all the stages are more involved. A large project usually requires a detailed study of the existing system and extensive work in the analysis and design stages. • Each stage of the system development cycle has certain tasks to be completed. It builds on the conclusions of the previous stages. However, there is often a good reason to revisit the previous stages. Understanding the problem Statement of problem Change in purpose Making decisions Type of new system Change type of system Designing solutions New system Change system Implementing Using new system Change use of system Testing, evaluating and maintaining Problem with system Figure 1.1 Stages of the system development cycle. Project work 3 1.1 Project management Project management is the process of planning, scheduling and controlling all the activities within each stage of the system development cycle. It aims to deliver a new system within an acceptable time frame and budget. Project management involves creating a project plan. Project plans A project plan is a summary of a project that specifies who, what, how and when. It clarifies what needs to be done and helps people to understand how they fit into the project. A project plan usually breaks the project into major tasks called subprojects. It must provide an overall schedule, the details of the subprojects and a schedule for each subproject. It must also identify the people, information technology and data/information required by the system. A project plan is an important tool that helps to deliver a system on time and to minimise the effect of unanticipated problems. If a project has problems, they can cause the schedule to be lengthened and costs to be increased. They could also force the project to be reduced in scope, and this could affect the success of the project. To minimise problems, people working on the project should understand the need for project goals, deliverables and schedules: • Project goal—result of the project if it is successful. Goals may be broad, such as creating a new system that works efficiently; or they may be very specific, such as developing a system within a budget of $150 000. • Deliverable—a tangible item expected from a task. It may be a diagram, report, data dictionary, program or training manual. • Schedule—the timing of major tasks and who will do the work. The success of a new system depends on accurate time estimates for each task. A schedule that doesn’t allow a reasonable amount of time for each task can actually result in delays and additional costs. ITITFact Fact Researchers have found that 37% of software faults would have been avoided by appropriate scheduling and reducing the stress on developers. Project plans are constructed and managed using information management software and project management software: • Information management software helps individuals on a project to manage information and schedule tasks. It allows email messages to be exchanged and organised. Appointments, events and meetings can be put onto an electronic calendar and viewed by the day, week or month. Information management software stores names and addresses of individuals and organisations.Tasks in the project are assigned, sorted and organised. The progress made on tasks is seen at a glance. • Project management software contains most of the features of information management software. It is a tool to efficiently plan, manage and communicate information about a large project (see Figure 1.2). Project management software allows projects to be joined, tasks to be split among team members and the project to be tracked over the Internet or via email. It provides analysis tools to assist with decision-making, such as ‘what if’ analysis. 4 Core Figure 1.2 Microsoft Project is an example of project management software. One popular project management tool used to record and track schedules is called a Gantt chart. A Gantt chart is a bar chart with each bar representing a task or stage in the system development cycle. The vertical axis of a Gantt chart lists the tasks, and the horizontal axis shows the time frame (see Figure 1.3). Gantt charts provide a quick method of determining whether the project is on schedule. They are used in meetings to review progress and identify problems. Project plan Evaluate existing system Data collection Prototype Proposal—new system 1 2 3 4 5 6 7 Time (Days) 8 9 10 11 Figure 1.3 Gantt charts help to record and track schedules. Project work 5 Communication skills Communication skills incorporate a variety of strategies and techniques for dealing with other people. Good communication facilitates the sharing of information and genuine understanding. Some of the strategies for effective communication are: • Active listening involves restating, reflecting and summarising the speaker’s major ideas and feelings. Active listeners encourage the speaker and are noncommittal. • Conflict resolution solves arguments and disputes. It involves listening to the other person’s views and looking at the conflict as a problem to be solved. • Negotiation skills involve discussing a problem and arriving at a consensus. They involve listening to different views and compromising to reach a solution. • Interview techniques involve careful preparation, implementation and followup. A list of questions should be prepared with a clear purpose. Here are some general rules for interviews: – Make the interviewee aware of the purpose of the interview. – Ask open-ended questions so that the interviewee must provide information. – Check the responses by restating the interviewee’s viewpoint. – Try to be aware of the interviewee’s body language. It may be communicating a different attitude. – Close the interview by reviewing the main points and thanking the interviewee. – Review notes immediately and follow up with the interviewee on any information that is unclear. • Team building is the process of getting a group of people working together. Each team member negotiates a role in the team with specific responsibilities. The team members’ efforts are coordinated to ensure the efficiency of the team. Communication skills are required by every person in the project. The number of people involved in a project depends on its size and complexity. It includes information system personnel such as systems analysts and programmers. Systems analysts perform the analysis to decide whether a new or updated system will solve the problem. They must be familiar with the organisation’s operations and the latest developments in information technology and computer programming techniques. Systems analysts communicate their results to the programmers (see Figure 1.4). Programmers convert a written description of a problem into a set of programs. They code programs and produce documentation. Both systems analysts and programmers work in teams and must be people with excellent communication and interpersonal skills. A large project may involve hundreds or even thousands of people. To manage the project, the organisation forms a project team and assigns the team to the project. The team is responsible for the project from the beginning to the end. The project team consists of participants, systems analysts and programmers. One person from the team is appointed the project leader. It is usually a systems analyst. A project leader (also called a project manager) develops schedules, checks work and resolves conflicts. He or she ensures that the project is meeting its goals. The project leader is responsible both for developing the project plan and ensuring it is implemented correctly. 6 Core Figure 1.4 Systems analyst communicating with programmers. Exercise 1.1 1 List the five stages in the system development cycle. 2 Why is the system development cycle an ongoing process? 3 How does the system development cycle differ between a small and large project? 4 What is a project plan? 5 Explain the difference between a deliverable and a schedule. 6 What is the purpose of information management software? 7 Why are Gantt charts a popular management tool? 8 List five strategies for effective communication. 9 Describe the role of a systems analyst. 10 What tasks are performed by a project leader? LEARNING ACTIVITIES 1 ‘If each stage of the system development cycle is carried out properly, it should not be necessary to return to the previous stage.’ Discuss this statement. 2 Describe one possible problem that might occur if the system development cycle is not applied. 3 After one year of operation, an organisation had complaints from every department about a new information system. The new system contained a substantial number of errors. At what stage of the system development cycle is it easier and less expensive to identify and solve problems? Why? At what stage of the system development cycle is it difficult and more expensive to identify and solve problems? Why? 4 Why is it important to be able to return to the previous stage when developing a new system? 5 A project leader estimated a time schedule for the following tasks: – Write system design documentation: 2 weeks – Purchase application software: 1 week (during the system design documentation) Project work 7 – Code and test the custom software: 5 weeks (after the system design documentation) – Write hardware specifications: 1 week (after the system design documentation) – Obtain quotations for hardware: 2 weeks (after hardware specifications) – Select supplier of hardware: 1 week – Deliver hardware: 2 weeks – Install hardware: 1 week – Set up software: 2 weeks (after hardware is installed). Draw a Gantt chart for the project. What is the minimum time for completion of the project? 6 A systems analyst has estimated the following time for these tasks: – Define and code input screens: 5 days – Define and code output screens: 3 days – Define data structure: 2 days – Define file structure: 4 days. Draw a Gantt chart for the project if the tasks do not overlap. What is the minimum time for completion of the project? 1.2 Social and ethical design This section builds on the social and ethical issues discussed in the Preliminary course. It examines the issues related to the implementation of a new system. Design of systems Information systems should be designed to take into account the strengths and weaknesses of both people and machines. People are good at understanding and thinking up new ideas but have an unpredictable memory and get bored with very structured tasks. On the other hand, machines are good at repetitive tasks involving endurance, consistency and speed. They have very predictable storage and retrieval times and can only perform structured tasks. The information processes in a system should exploit the strengths and avoid the weaknesses of people and machines. Machine-centred systems and human-centred systems provide examples of contrasting designs. Machine-centred systems are designed to simplify what the computer must do at the expense of participants. They assume people will follow confusing procedures and illogical user manuals. If errors occur in a machine-centred system, they are usually blamed on the participant (operator error) rather than on the technology. Machine-centred systems are not always the best systems for participants. Human-centred systems are those that make participants’ work as effective and satisfying as possible. They allow people to do their work without wasting time and effort struggling with the information technology. In the past, information systems were difficult to use. People needed to understand a programming language to complete the simplest tasks. Today, with developments in technology such as graphical user interfaces, computers are much more user-friendly. User-friendly describes a tool that people find easy to use. User-friendly information systems are more productive as participants do not waste time and effort dealing with the system. In other words, the information system does not 8 Core get in the way of the work. The software in the information system is a critical factor in designing a user-friendly information system. It is the link between people and the machines. User-friendly software has the following characteristics: • prompts the user in non-technical terms (see Figure 1.5) • doesn’t require precise spelling of commands • uses a similar appearance and structure for multiple applications • provides easier ways of achieving a task, such as templates • structures menus so they are logical and easy to understand • adjusts software to the ability of the user so that, for example, beginners see and use only basic features • allows previous work to be imported and used easily. Figure 1.5 Wizards are a user-friendly feature. Work environment The design of a system impacts on the work environment. The impact can be positive or negative. That is, for some people a new system can be exciting and enjoyable while for others it is frustrating and difficult. When designing a new system, it is important to consider the health and safety issues and the nature of the work. Health and safety The relationship between people and their work environment is called ergonomics. It refers to the process of designing or arranging workplaces, products and systems so that they fit the people who use them. The way information technology is used in the work environment can have an effect on the body. Incorrect use of computers can cause health problems, such as eyestrain, headaches, backaches, fatigue, muscle pain and repetitive strain injury (RSI). To reduce these health problems, numerous reports and standards have been developed that deal with ergonomics and information technology. The recommendations are briefly outlined below: • Furniture. Furniture needs to be adjusted to suit each person’s body. The desk and chair should be positioned to reduce strain and undue fatigue. Desk height must be between 660 mm and 680 mm. Chairs should have an adjustable seat height that ranges from 370 to 520 mm. The seat should be flat, well padded and slanted slightly backwards. Project work 9 • Information technology. The screen should be about an arm’s length away with the user looking down on the screen. The keyboard must be detachable and positioned so that the user’s forearms are parallel to the floor. The mouse must fit the hand and be easily moved. Software must be ergonomically designed to make the user feel relaxed and comfortable. It should minimise movement, improve speed and be easy to use. • Environmental factors. Lighting needs to be uniform and bright enough for all text to be easily read. The air temperature should range between 20°C and 23°C. The relative humidity of the air should be between 30% and 70% with air movements less than 0.2 m/s. Noise levels should not exceed 55 decibels. ITITFact Fact The most frequently reported health concern for information technology participants is vision-related problems. Eye specialists estimate that 36% of these problems are related to the work environment. Nature of work A new information system will change a participant’s work. It will be positive if the new system involves a variety of tasks and a balance between work and rest. However, if the new system creates high levels of stress, the impact will be negative. Stress may result from increased workload, inadequate job design, lack of social relations or concerns about job security. New systems have an impact on work in the following areas: • Use of skills. Participants may be required to retrain and learn new skills (become multiskilled) or perform work requiring less skills (become deskilled). • Meaningful work. Participants who work on the computer may not understand the importance of their work. Their work may be abstract in nature and focused on symbols on the screen. • Nature of the workplace. Part-time work and the use of contracted labour may increase. There is the expectation that workers will continually change jobs throughout their careers. • Social relationships. Social interaction may change when a new system is implemented. For example, people looking at a screen for most of the day tend to have less social interaction. Systems and ethics Ethics is a set of beliefs we hold about what is right and wrong. There are a number of issues involving the use of information systems that many people are concerned about. These include environmental damage, equity and access, invasion of privacy, freedom of information, computer crime and copyright. These issues will be discussed throughout the text. Environment Information systems give us the power to affect the environment. They have the ability to help us reduce pollution. The use of communication systems has the potential to reduce the need for transportation and hence air pollution. It allows people to work from home, regardless of where they live. Communication systems 10 Core also enable people to access electronic services in country areas. This may reduce the need for high-density housing and the overpopulation of cities. Conversely, information systems are also increasing the damage to our environment. The manufacture of silicon chips increases the consumption of fossil fuels, builds mountains of waste and produces toxic chemicals. Paper consumption by our printers is destroying our forests and increasing our consumption of fossil fuels. However, our reliance on paper as a medium is decreasing. Compact discs (CDs) are replacing such books as encyclopedias, and people are reading electronic newspapers and magazines (see Figure 1.6) Figure 1.6 Electronic newspapers. Equity Equity concerns equal rights for all. It means that all people should have equal access to the benefits of information technology. Information technology has the potential to give many people equal access to education, employment, medical treatment and many other benefits. It can overcome differences in race, sex, location or disability. Communication systems can give people in isolated communities the chance to gain education that was previously only available in larger cities. New technologies have allowed people affected by disabilities to better participate in society, gain employment and have greater freedom. On the other hand, people do not always have equal access to information technology. People may be disadvantaged because of the cost of buying and training in the use of the technology. Gender equity is a concern to many people. They argue that women are not taking advantage of information technology in the same numbers as men. Significantly fewer women than men have information technology careers. Similarly, fewer women than men use the Internet regularly. There are several reasons for this. There is an image in society that computers are ‘technical’ and therefore an area more for men than for women. This image is reinforced by advertising in the media that has traditionally targeted men and excluded women. Project work 11 Conversely, it can be argued that the percentages of men and women working in information technology are roughly the same as in any other industry. The fact that women are employed in the lowest paid positions, such as data entry operators, has nothing to do with information technology. Gender equity is an issue throughout our society. For instance, the number of male doctors is much greater than the number of female doctors. Furthermore, there are many examples of women playing a leadership role in information technology. Exercise 1.2 1 Outline the strengths and weaknesses of people and machines. 2 What are the differences between a machine-centred and a human-centred system? 3 What is the advantage of a user-friendly information system? 4 What health problems are caused by the incorrect use of computers? 5 Describe the ergonomic recommendations for furniture. 6 What are the environmental factors that affect the work environment? 7 How can a new system create a high level of stress? 8 Describe the impact of new systems on work. 9 How can information systems reduce pollution? 10 Why is gender equity a concern to many people? LEARNING ACTIVITIES 1 ‘The use of information systems is impacting on our environment.’ Discuss this statement. Outline your view on this issue. 2 Choose a small business that uses an information system. List the advantages and disadvantages the use of information technology may have on this business. Outline some of the issues raised by the use of an information system. 3 ‘Information technology has brought nothing but stress, suffering and deskilling into modern society.’ Outline your view on this statement. 4 Imagine you are the project leader responsible for the development of a new system for a large organisation. Describe some of the steps you would take to reduce any social and ethical problems that might arise from its implementation. 5 The introduction of information systems has led to employment redundancy. Name and discuss two other social and ethical issues that are commonly associated with information systems. 1.3 Understanding the problem Understanding the problem is the first stage in the system development cycle. The exact nature of the problem must be determined and whether it can be solved by an information system (see Figure 1.7). This may involve redefining the problem and identifying its important elements. A clear problem statement is essential at this stage. Understanding the problem often involves a preliminary investigation and completing a requirement report. These concepts are briefly outlined here as they were examined in detail in the Preliminary course. 12 Core Input • Problem • Participants • Data Ι Understanding the problem Ο Output • Clear problem statement • Requirements Figure 1.7 Block diagram of understanding the problem. Preliminary investigation A preliminary investigation, or requirement definition, determines whether a quick fix of the existing system will solve the problem or a new system is necessary. The fundamental operations of and problems with the existing system must be understood. Each of the information processes is examined, and any deficiencies in the existing system are recorded. The preliminary investigation takes into account the needs and concerns of all the participants. Participants play an important part in developing a workable system. Their views are gathered using different data collection methods, such as interviews, surveys, observations and measurements. Data is collected to understand the problem and to develop an appropriate solution. Data collection is very important. If the data is incorrect, the new system may not meet the needs of the participants. ITITFact Fact It is estimated that participants use only 30% of the software developed for a new system in the specified manner. The main reason for this statistic is that developers do not understand what their participants need. The requirement report is a statement about the need for a new system. It outlines the aims and objectives of the new system and how it will help the organisation. The requirement report is based on data collected from the participants. It must match the goals of the organisation to ensure that management is satisfied with the solution. The requirement report also provides an overview of the new system in terms of the data/information, information processes and information technology to be used. The requirement report is used to develop potential solutions to the problem. Prototypes A prototype is a working model of an information system. Prototypes are built in order to understand the requirements of the system. They also can help in defining the problem to be solved and in determining how an information system might solve the problem. Prototypes can be used to test possible information system features. In this case, participants actively use the prototype to identify both good and bad features of the new system. Prototypes may contain data entry screens and a small sample database or may use formulas that provide approximate results. Project work 13 A prototype assumes that the participants cannot say exactly what the proposed information system should do. It proceeds by building a succession of models. The process is repetitive. That is, the participants evaluate the model, they suggest improvements, and then another version of the prototype is built. These three steps are repeated until the prototype successfully solves the problem or the project is abandoned. Clearly, the later versions of a prototype are more detailed and accurate. When the prototype has clarified the requirements of the system, it is either discarded or adapted for more permanent use. There are three main advantages in using a prototype: • The requirements of the system more accurately reflect the needs of the participants. Most participants will better understand the new system if they use a prototype rather than read the design specifications. • Participants have the opportunity to be involved earlier and more directly in the development of the new system. This may reduce the number of changes required by the participants in the testing, evaluating and maintaining stage. • The new system is easier to create from a prototype. For example, if a database management system (DBMS) was used to create a prototype, then some or all of the forms and reports developed for the prototype could be used to build the new system. However, using a prototype has some disadvantages. First, the greater involvement of the participants could impact on their work with the old system. Second, the repetitive process of the prototype can be frustrating if the succeeding versions do not provide a better solution. Finally, successful prototypes can produce software that is difficult to maintain, unreliable or inadequate. This may occur if any design restrictions are not taken into account when creating the prototype. Exercise 1.3 1 2 3 4 5 6 7 8 What is essential in the understanding the problem stage? Describe some of the activities completed in the preliminary investigation. What is provided by the requirement report? Why are prototypes built? What do prototypes contain? Why is the use of a prototype a repetitive process? Describe three advantages in using a prototype. How could a greater involvement of participants in the use of a prototype be a disadvantage? LEARNING ACTIVITIES 1 Explain why it is important to involve the participant in the system development cycle. 2 The first two stages of the system development cycle involve much consultation with participants. However, participants usually do not have design or programming skills. Why does the project leader rely on information gathered from participants? 3 Your family would like to create a yearly newsletter that contains the major achievements of each family member. Create a prototype of the newsletter using 14 Core a software application. Discuss the model with your family and make any modifications. Save the prototype with the filename FAMILY. 4 A teacher at one school requires the students to summarise all the concepts presented in this course, so a glossary is to be developed. The glossary consists of key terms, an explanation, text reference and relevant topic. Create a prototype for this project using a DBMS. The prototype is to contain sample screens and reports. It should also contain sample data. Save the prototype with the filename GLOSSARY. 1.4 Making decisions This stage involves making decisions using the data gathered in the preliminary investigation (see Figure 1.8). The first task is to develop one or more potential solutions to the problem. A computer system should be seen only as a tool that may offer the best solution to the problem. It is not the solution to every problem. Each potential solution is developed using the requirement report and the scope of the problem. The scope of the problem places constraints on the new system. A constraint is a factor that affects the system and prevents it from achieving the desired objectives. There are different types of constraints, such as financial, technical, environmental or personal. For example, a financial constraint would be the amount of money an organisation is prepared to spend to solve the problem. After establishing several potential solutions, the project leader seeks further guidance from the management of the organisation. Management receives a brief written or verbal statement outlining the advantages and disadvantages of each solution. If the potential solutions seem appropriate, a feasibility study is carried out. Input • Problem statement • Constraints • Feasibility • Data Ι Making decisions Ο Output • Recommendation • Specifications Figure 1.8 Block diagram of making decisions. Feasibility study A feasibility study is a short report that analyses potential solutions in terms of the known constraints and makes a recommendation. It does not attempt to find a detailed solution. The feasibility study briefly examines the available options, estimates costs and identifies any constraints to be considered. It judges whether a potential solution can actually be implemented. It should identify the nature of any problems, indicating the size or magnitude of the problem and whether it appears to be solvable. The study also needs to indicate the scope or boundaries set on the development of a new system, such as the maximum cost or the amount of change that is acceptable. Feasibility studies are an extension of the preliminary investigation and are divided into different sections (see Table 1.1). Project work 15 Section Content Title page Project name, report title, authors, date Contents A list of report sections and page numbers Problem definition Exact nature of the problem Requirement report Aims and objectives of the new system Summary of investigation Overview of the existing system; benefits, costs and constraints of the new system Alternative solutions Expanded details of each proposed new system Recommendations Recommended course of action; justify the decision Project plan Schedule if the recommendation is to proceed Appendix Supplementary material, such as surveys, Gantt charts and diagrams Table 1.1 Typical sections of a feasibility study. The initial sections of the feasibility study (problem definition, requirement report and summary of investigation) state the nature of the problem, list the aims and objectives of the new system and give an overview of the existing system. They identify problems or requirements that are not satisfied by the existing system and outline the constraints on the development of a new system. They also restate the aims and objectives of the new system more precisely than the requirement report. The middle section of the feasibility study analyses the data collected in the preliminary investigation. It often requires more data to be gathered about each potential solution. After analysing the data, each solution is briefly described with its expected advantages and disadvantages. These descriptions are written in terms of how well they meet the aims and objectives of the new system. The result of the feasibility study is the recommendation. The recommendation is based on a number of criteria, such as economic, technical, schedule and organisational: • Economic feasibility compares the costs of developing the new system with the expected benefits. A financial analyst is often asked to assess economic feasibility. Economic feasibility is also called cost/benefit feasibility. • Technical feasibility determines the information technology requirements of the new system and the technical demands that will be placed on the new system. • Schedule feasibility determines whether time is available to implement the new system. • Organisational feasibility determines whether the new system will fit into the organisation and meet the current goals and objectives. It also determines whether the new system will have enough support from participants to be successfully implemented and whether participants can operate the system. A feasibility study has three recommendation options (no change, develop a new system or investigate other solutions), and it often examines the effect of adopting each of these recommendations. The managers of the organisation select the recommendation that seems most feasible. If the managers decide to proceed with a new system, then a detailed analysis is completed. The final section of the feasibility study is the project plan, which was discussed earlier in this chapter. 16 Core Analysis report If the managers decide to proceed with a new system, then a more detailed analysis is required. The existing system is investigated in greater depth to ensure all current operations and problems are understood. The project leader must also further clarify the needs of the new system (see Figure 1.9). This requires more data to be gathered, using interviews, surveys, observations and measurements. When the data is collected, it must be organised and analysed. It is necessary to understand the flow of data through the system and how Figure 1.9 Project leader discussing the system the data is processed within the requirements with a participant. system. Various tools are used for this purpose, and they are described in the next section. When the detailed analysis is completed, an analysis report is written. It provides more detail than was presented in the feasibility study. The analysis report provides a basis for further development. The details of the new system are presented, along with recommendations for design, implementation and maintenance. The analysis report contains design specifications for the next stage. These specifications give the general hardware configuration of the new system and designs for both input and output. The analysis report is the basis for a more detailed project plan. Remember that the project plan must provide an overall schedule, the details of the subprojects, and a schedule for each subproject, as well as identify the people, information technology and data/information required by the system. ITITFact Fact One third of all software projects fail. The major causes of failure are lack of participant input, lack of managerial support and incomplete design specifications. Exercise 1.4 1 2 3 4 5 6 7 8 Describe the second stage of the system development cycle. What is a feasibility study? Describe the initial sections of the feasibility study. What is economic feasibility? What is determined by organisational feasibility? What are the options available to management after receiving a feasibility study? Describe an analysis report? What are some of the design specifications contained in the analysis report? Project work 17 LEARNING ACTIVITIES 1 A new system requires a piece of application software to run on a network. However, the software licence states that the software can only be used on a standalone personal computer. The project leader needs to make a recommendation in the feasibility study. What options need to be investigated by the project leader? 2 Melissa would like a digital camera so she can include photographs on her Web site. Analyse the current trends in digital cameras and prepare a list of possible solutions. Make a recommendation and justify your choice. 3 Terry requires a personal computer for less than $3000 to access the Internet. Analyse the current trends in the computer market and prepare a set of design specifications for Terry. The specifications should give the general hardware configuration of the new system and any software requirements. 4 A feasibility study is to be completed for an online tutorial system for your school: a List three groups of people who will be affected by the new system. b For each group, describe some of the possible effects on them. c Describe some of the factors that will affect the recommendation. 5 Write a feasibility study using the information in the answers to the above question. It should contain the following sections: title page, contents, problem definition, requirement report, summary of investigation and a recommendation. 1.5 Designing solutions Designing a solution is the transformation of the specifications into appropriate hardware, software and information processes. It involves purchasing hardware, writing or purchasing software, and specifying information processes to make the system operational (see Figure 1.10). Systems analysts and programmers often use a top-down approach to designing a solution. It divides a large, complicated problem into a series of smaller, easier to solve problems. The smaller problems are solved and brought together to solve the larger problem. In addition to information systems personnel developing a solution, it may be developed by a participant. Input • Specifications Ι Designing solutions Ο Output • Hardware • Software • Information processes Figure 1.10 Block diagram of designing solutions. Participant development Participant development occurs when people within the information system develop the solution. Participants produce their own information system using readily available information technology (see Figure 1.11). Information system personnel do not develop the system. Software tools for participant development include general applications, such as spreadsheets and DBMS, and specific industry applications, such as software developed for real estate and libraries. 18 Core Participant development is used when the project is not a basis for other projects and reliability is not crucial. For example, a solution created and tested by a team of programmers will probably be more reliable than one developed by a user who is creating his or her first solution using a simple spreadsheet. Figure 1.11 Software tools available on the Internet. Participant development became a solution because information system personnel were often very busy and unable to provide immediate service. Participants could solve small problems using application packages and allow the information system personnel to focus on the major problems. The stages in the system development cycle are affected by participant development: • Understanding the problem—participant identifies the problem. Information system personnel might be used to advise the participant on possible tools to solve the problem. • Making decisions—participant chooses an appropriate solution. • Designing solutions—participant develops the solution, often using guided processes found in application packages. The participant may require some training to design a solution. • Implementation—participant begins using the system. This stage is often easier to accomplish with participant development than with a system developed by information system personnel as the participant is familiar with the application and does not require further training. There is no issue regarding acceptance of the solution by the participant. • Testing, evaluating and maintaining—participant is totally responsible for the maintenance and testing of the solution and determining if any changes need to be made to the solution. Participant development is more responsive to participant needs and has the potential to save time and money. It reduces the involvement of information system personnel. There is no need for programmers. In addition, the participant does not have to communicate his or her needs during the initial stages, and training in the implementation stage should be reduced. However, there are some disadvantages: Project work 19 • Participants who develop a solution are not hardware experts. Information system personnel often make more informed decisions and may receive a discount for bulk purchases. They also have specialised knowledge about the particular equipment that they purchase. • Applications and the operating system chosen by a participant may be different to those used by other participants in the organisation. This creates additional costs in terms of site licences and training. Incompatible software makes it difficult for people to work together. • Participants need access to data for their solutions. This creates security problems. Downloading data to a disk and transferring it to another computer increases the risk of the data being stolen. Participant development could also be a component of the system development cycle. First, the core of the information system is created by the information system personnel based on the design specifications. Second, the participants develop the user reports and screens using a fourth-generation language (4GL) that can be taught to users. This approach maintains control of the system while providing some of the advantages of participant development. Design tools Design tools assist in the development of a new system. They describe the information processes and rules within the system. Design tools include context diagrams, data flow diagrams, system flowcharts, decision trees, decision tables and data dictionaries. Context diagrams A context diagram is a graphical method of representing a system that uses only a single process together with inputs and outputs (external entities). There are only three symbols in a context diagram: the process, data flow and external entity (see Table 1.2). The external entities are linked to the single process by data flow arrows. A context diagram is often the starting point of a data flow diagram (discussed below). The context diagram in Figure 1.12 shows a system for searching the Internet. It clearly shows the flow of data in the system. Symbol Meaning Single process: A circle is used to represent the entire system. Process Data flow: An arrow is used to represent the flow of data between the process and external entities. External entity External entity: A square or rectangle represents any person or organisation that sends data to or receives data from the system. Table 1.2 Symbols used in a context diagram. 20 Core Student Keywords Use search engine Internet address Student Figure 1.12 Context diagram for searching the Internet. Data flow diagrams A data flow diagram (DFD) is a graphical method of representing a system that uses a number of processes together with inputs, outputs and storage. A DFD focuses on the flow of data between information processes in a system. It shows where data is collected, organised, analysed, stored, processed, transmitted and displayed. DFDs provide a simple technique for visualising the movement of data and describing what participants do rather than what the computers do. There are four main symbols in a DFD: the process, data flow, data store and external entity (see Table 1.3). Symbol Meaning Process: A circle is used to represent the processes or actions that transform inputs to outputs. Process Data flow: An arrow is used to represent the flow of data between the process, external entity and data store. Data store External entity Data store: An open rectangle represents the location where data is stored. It could be a filing cabinet, hard disk or DVD. External entity: A square or rectangle represents any person or organisation that sends data to or receives data from the system. Table 1.3 Symbols used in a data flow diagram. The data flows and data stores are given names to describe the data. The processes should contain a description of the change in data. Each process must contain at least one input and at least one output. The DFD in Figure 1.13 illustrates the movement of data for searching the Internet. To draw a DFD, start with the processes and link them to data stores and external entities using data flows. It is often easier to start with a simple diagram, such as a context diagram, and then add some more details. If the DFD becomes too complicated, it should be broken down into a smaller DFDs. This creates different levels. The top-level DFD identifies the major processes while lower-level DFDs add the detail. Project work 21 DFDs and context diagrams are easy to understand as there are only three or four symbols. Participants can see what tasks are completed by the information system. Context diagrams and DFDs often identify issues of responsibility before the system is designed. However, the simplicity of these design tools creates certain limitations. For example, they do not show the sequence of operations or decisions that are needed by a programmer. Student Keyword Use search engine Internet address Load Web site Internet address Keyword Database of Web sites Graphic Project Figure 1.13 DFD for searching the Internet. Decision trees and decision tables The information processes that operate on data in most information systems are determined by decisions. These decisions are made on the basis of the data entered into the system according to a set of rules or conditions. Two tools used to display and analyse decisions are decision trees and decision tables. A decision tree is a diagrammatic way of representing all possible combinations of decisions and their resulting actions. It represents the decisions made within a system as the branches of a tree. Each branch ends with a particular action. The decision tree in Figure 1.14 shows decisions made when searching the Internet. It is applying rules based on the number of hits. Condition Search Number of Web sites is greater than 10 Use a more specific search Number of Web sites is less than 10 Access each Web site No result Try a new keyword Figure 1.14 A decision tree for searching the Internet. 22 Core Action A decision table is a table that represents all possible conditions and actions. It indicates the alternatives for different conditions and actions based on the rules. The table is divided vertically into conditions and actions, and then horizontally into rules. The decision table in Figure 1.15 shows the decisions made when searching the Internet. Decision tables are often more difficult to understand than decision trees, especially when decisions are based on previous decisions. Conditions Rules Number of Web sites is greater than 10 ✓ ✘ ✘ Number of Web sites is less than 10 ✘ ✓ ✘ No results ✘ ✘ ✓ Use a more specific search ✓ ✘ ✘ Access each Web site ✘ ✓ ✘ Try a new keyword ✘ ✘ ✓ Actions Figure 1.15 A decision table for searching the Internet. Data dictionary A data dictionary describes the data within the system. It is a tool used to manage the information resources. A data dictionary is often used to assist the design and check the accuracy of data flow diagrams. It is also a starting point for designing screens and reports. (See Figure 1.16.) Data item Web site Internet address Author Start Keyword Description Domain name of Web site Unique address Name of author Date created (dd/mm/yy) List of keywords Example www.hi.com.au 205.188.200.58 Bloggs, Joe 02/12/99 technology, computer Figure 1.16 A data dictionary of Web sites. A data dictionary also describes each field in the database. It provides information about the characteristics of each item entered in the database, such as the field names, field sizes, data types and field descriptions. Data dictionaries may contain validation rules that specify appropriate codes, ranges or values for each data item. For example, a validation rule for a data item named State might only allow participants to enter one particular abbreviation for each state name, such as NSW for New South Wales or QLD for Queensland. Project work 23 System flowcharts A system flowchart is a graphical method of representing both the flow of data and the logic of a system. It documents the essential details of the system, such as the sequence, the processes, and the precise rules for selecting particular actions. A system flowchart also shows the hardware used to process data, such as the peripheral devices, storage mediums and processing units. System flowcharts use standard flowcharting symbols plus special symbols for peripheral devices (see Table 1.4). Some of these symbols have become out of date, such as the punch card symbol. Each symbol contains messages and is linked by lines called flowlines. Symbol Meaning Symbol Meaning Input/output Manual operation Paper document Magnetic tape Online display Direct access storage device Online input Flowline Punched card Telecommunications link Process Predefined process Terminal Decision Table 1.4 Symbols used in a system flowchart. The system flowchart in Figure 1.17 clearly illustrates the logic of a system for finding information on the Internet. It shows the sequence, selection and repetition involved in the system. 24 Core Begin Internet browser Access search engine Enter keywords Search results Access a Web site Read data False Is data appropriate? True Project False Are you finished? True End Figure 1.17 System flowchart for finding information on the Internet. Exercise 1.5 1 Describe the third stage in the system development cycle. 2 What is participant development? 3 How are the stages in the system development cycle affected by participant development? 4 Describe three disadvantages of participant development. 5 Name and describe the three symbols of a context diagram. 6 What is a data flow diagram? 7 Name and describe the four symbols of a data flow diagram. 8 What is the difference between a decision tree and a decision table? 9 Describe some of the information provided by a data dictionary for a database. 10 What is a system flowchart? Project work 25 LEARNING ACTIVITIES 1 Why is it important to consider how data is manipulated by a system in the system development cycle? 2 A study system is a process to improve HSC results. Students decide the subjects to be studied and the amount of time required. The study system produces the knowledge and understanding needed for the HSC examination. Construct a context diagram for the study system. 3 The study system in question 2 is extended to include a table and a tutor. The table lists the subjects and time allocations. Construct a data flow diagram to show the study system. 4 The table in question 3 is created using a word processor by following these processes: enter subjects and time, save data, format table, edit table if required, print table. Construct a system flowchart for the study system. 5 An organisation intends to pay a bonus to some of its employees. To be eligible for the bonus, an employee must have worked for the organisation for at least two years. Managers get $700 and other employees get $500. Construct a decision tree and a decision table to clarify this process. 6 Al’s Mechanical Repairs has developed a policy for accepting a customer’s cheque. The cheques will be accepted if all of the following conditions apply: cheques are less than $300, current driver’s licence is shown, and customer’s signature matches driver’s licence signature. Construct a decision tree and a decision table to clarify this process. 7 A shoe store offers a discount on the number of shoes purchased by the customer. If customers buy one pair of shoes, they receive no discount; two or three pairs of shoes, they receive a discount of 10%; and more than three pairs of shoes, a discount of 15%. In addition, if their purchases are greater than three pairs of shoes and exceed $200, they receive a further discount of 5% (for a total discount of 20%). Construct a decision tree and a decision table to clarify this process. 1.6 Implementing The implementation stage delivers the new system to the participants. It involves using the solution to solve the problem (see Figure 1.18). The implementation stage may involve a major change in the way the organisation operates. To ensure the new system is successfully implemented, it must be carefully planned. Implementation procedures need to be carried out in the correct order. For example, it is necessary to ensure the hardware of a system is installed before the software is set up. Large projects require an implementation plan to detail the participant training, the conversion method and the system testing. Input • Solution • Training • Conversion • Testing Ι Implementing Figure 1.18 Block diagram of implementing. 26 Core Ο Output • Using new system Participant training Training ensures participants can use the new system and understand its benefits. Training is also needed in the installation of a new system and to ensure that the computer is being used efficiently. The type of training depends on the existing knowledge of the participants and the features of the new system. Training is provided by range of different people and technology (see Figure 1.19). Management may decide to train one person who has responsibility for training other people. The suppliers of the hardware and software may carry out some training. Training specialists instruct participants in how to operate their system. Training manuals and presentations are used to explain the new system and any changes in the information processes. Initial training is completed before the old system is converted to the new system. Participants may also need training updates to keep pace with the latest developments in hardware and software. Technical support staff are people who assist participants of a system on an as-needed basis. Their services are usually provided over the phone. Technical support staff need to be completely familiar with the system. Figure 1.19 Multimedia used for training. Conversion method The method of conversion is the way in which the information processes performed by the old system will be transferred to a new system. It must be carefully planned and executed to avoid errors. The method chosen for conversion depends on the nature of the work and the characteristics of the new system. There are four methods of conversion: direct, parallel, phased and pilot. Direct conversion involves the immediate change to the new system on a chosen date. On that date, the old system ends and the new system starts. All data from the old system is transferred to the new system, and the participants stop using the old system and begin using the new system. Direct conversion is not commonly used even though there are minimal transition costs. One reason that direct conversion is not commonly used is that it does not allow the project team to check whether the new system will operate correctly and whether participants understand the system. Another reason is that, if the new system fails or problems occur, the old system is not available as a backup. Parallel conversion involves the old and new systems both working together at the same time. Participants can compare both systems and obtain a good understanding of the differences between the systems. If there are any problems with the new system, it can be solved before the old system is discontinued. However, parallel conversion results in additional workloads for participants as they must operate both systems until the new system is accepted. It may also result in confusion about which system has the correct data. Phased conversion involves the gradual implementation of the new system. Certain operations of the new system are implemented while the remaining operations are completed by the old system. When one operation of the new Project work 27 system is successful, another operation is implemented until the new system is fully operational. Each operation is individually tested. If there is a problem with a certain operation, it is possible to switch back to the old system. Unfortunately, phased conversion is often confusing because some participants are on the old system and some are on the new system. Name Method of conversion over time Direct conversion Old system New system Parallel conversion Old system New system Phased conversion Old system New system Pilot conversion Old system Old system Old system New system New system Figure 1.20 Methods of conversion. Pilot conversion involves trialing the new system in a small portion of the organisation. The old system is still available if the new system fails or experiences problems. Pilot conversion is usually started by a keen group of participants who appreciate the benefits of the new system. If pilot conversion works, it is usually easier to motivate the other participants of the organisation to change to the new system. System testing Testing a system is a very important part of the implementation of a system. Without rigorous testing, the system cannot be guaranteed to work as expected. Tests must be designed to examine the system operation under all possible events. It is necessary to test both the information technology and the information processes: • Hardware is tested using diagnostic software and through general operation (for example, the speed and resolution of a printer). Backup systems should be tested by selecting files to be Figure 1.21 Magnetic tape restored (see Figure 1.21). used for backup. • Software is tested using data that has been structured to test all decisions made within the system. This test data must cover all possible combinations of data that may be encountered. It should be based on the original design specifications. • Information processes are continually tested during the implementation of the system over a period of time. Minor changes to procedures are immediately implemented. 28 Core Exercise 1.6 1 2 3 4 5 6 7 8 9 Describe the fourth stage of the system development cycle. List the contents of an implementation plan for a large project. Why is participant training necessary? Describe some of the training provided by training specialists. List the four methods of conversion. What are the risks of implementing a new system using direct conversion? Explain the difference between parallel conversion and phased conversion. Why is testing a system very important? What is test data? LEARNING ACTIVITIES 1 Write an outline of a training program to help beginners use the Internet. The training program should include accessing Web sites, using domain names and using search engines. The training program must specify a list of appropriate Web sites. 2 What is the method of conversion in which a new computer system is developed and implemented alongside the old system until the new system is working well? Outline the advantages and disadvantages of this system. 3 A project leader is preparing to meet management and participants to discuss the method of conversion to a new system. At this meeting, the project leader wishes to discuss two alternative conversion strategies. Compare and contrast two methods of conversion that could be proposed by the project leader. 4 A school is implementing an electronic attendance system. This will replace the manual method of checking students’ attendance. Initially, the new system will be used to check the attendance of one group of students. The number of groups will be gradually increased until the system is fully implemented. What is the method of conversion to the new system? Do you think it is the best method of conversion for this project? Why? 1.7 Testing, evaluating and maintaining After the new system is fully implemented, participants expect the system to be working correctly. The successful operation of a system involves the information technology working correctly and the participants using it effectively. People responsible for operation of the system include computer operators and managers. Input • Using new system Ι Testing, evaluating and maintaining Ο Output • Modifications • Upgrade Figure 1.22 Block diagram of testing, evaluating and maintaining. Project work 29 Computer operators perform tasks on the equipment, such as monitoring performance, starting up, running jobs and backing up. The operators manual is used to specify tasks to be completed on a regular basis. If there are problems and the system breaks down, the problems must be diagnosed and corrected immediately. The computer operator attempts to identify the problem and, if necessary, liaises with a technician to rectify the problem. Managers are responsible for the effective use of the system. They oversee the computer operation and ensure that Figure 1.23 Managers of a system. participants and machines work efficiently (see Figure 1.23). There are many different types of managers with slightly different roles. An information systems manager plans and oversees all the information resources in the organisation. After the new system has been in operation for a number of months, it must be tested and evaluated. Testing and evaluating In this stage, the performance of the system is tested and then evaluated. Testing a solution ensures that it works. Testing is carried out throughout the system development cycle. Evaluation determines whether the system is working as expected or whether changes are required. It occurs after the new system is established and minor problems have been fixed. The project leader, in consultation with participants, often completes an evaluation. It is based on interviews, surveys, observations and measurements. During an evaluation, the results of the new system are compared to the initial aims and objectives outlined in the requirement report. Evaluation is ongoing. If the new system is not performing, then changes need to be made. If a major upgrade is required, then the system development cycle starts again. The results of the evaluation are the basis for understanding the problem in the next cycle. Information systems are involved in a constant process of evaluation, analysis and development to improve their efficiency. Evaluation is also used to improve the processes involved in the system development cycle. In some situations, evaluation results in the system undergoing maintenance. ITITFact Fact Microsoft builds software products by first identifying the new capabilities that customers request and then identifying any features it wants to include for its own strategic reasons. Maintenance Maintenance is the modification of the system by making minor improvements. During the operation of the system, participants may discover deficiencies in the system and suggest improvements. For example, a secretary may suggest some change in the format of an input screen. Maintenance may also involve installing 30 Core new hardware and upgrading software packages. The longer the system has been operational, the more difficult it is to change. However, good documentation makes it easier to undertake maintenance without causing problems elsewhere. Simple changes in a large information system are often complex to implement and require retesting of other parts of the system. This often results in starting the system development cycle again. The tasks in this stage are ongoing and continue until another system is developed or the system is terminated. Operation manual An operation manual details procedures participants follow when using a new system. Participants need to be instructed about and assisted with the major features and functions of the system. To create an operation manual, it is necessary to determine the background of the participants. This will determine the format, language and depth of instructions required. A beginner will need simple instructions using non-technical language and may need additional guidance, such as tutorials. The operation manual is usually presented as a hard copy, although online versions are frequently available. Some of the factors for creating an easyto-use operation manual include: • user-friendly format and structure • clear and concise instructions • steps listed in point form • tasks completed in the simplest way • appropriate instructions for file management and security • screen dumps included where possible. Case study Port Nelson Tourism Port Nelson Tourism is a small, privately owned business that works with the local community to promote the region’s tourist attractions. It produces printed material to advertise tourist attractions, such as beaches, fun parks, sporting activities and cruises. The promotional material is distributed at tourist information booths, motels, tourist attractions and shopping centres. Port Nelson Tourism receives income by charging businesses for inclusion in their printed material and by selling advertising space. Port Nelson Tourism would like to expand their business by developing a restaurant guide. This guide would be aimed at both tourists and local residents. To develop a solution, the manager of Port Nelson Tourism completed the system development cycle: • Understanding the problem—a meeting was arranged with the owners of the major restaurants in the region. This provided general directions about the possible formats and typical information to be included. Then a survey was Project work 31 sent out to all restaurants, and this data was analysed to determine the requirement report. • Making decisions—a feasibility study was completed that recommended a 40-page booklet be published for the summer season and that two additional staff be contracted for the project. A project plan was then developed to schedule subprojects, such as data collection and graphics. The analysis report outlined specifications for the required information technology and a more detailed costing. A process of checking was to be implemented to validate the data. • Designing solutions—a data flow diagram was used to specify the information processes and the flow of data. Each restaurant was visited, the employees were interviewed, and photographs were taken. A highperformance personal computer and a digital camera were purchased along with a word processing program, painting program and desktop publishing program. A template for the publication was created to ensure consistency. Ergonomic furniture was purchased in consultation with the staff. • Implementing—staff were given some brief training with the new system, as they were experienced users. The booklet was created in a desktop publishing program by importing the text from a word processing program and the graphics from a painting program. Each restaurant was given a draft copy of the booklet before publication. • Testing, evaluating and maintaining— the new system was monitored throughout the implementation stage, and changes to the front page design were suggested. At the end of the summer season, a series of interviews were completed to evaluate the performance of the finished product. The feedback was positive; however, some changes to the structure of the booklet were suggested. The manager of Port Nelson Tourism evaluated the project and recommended a second edition be published next year. Exercise 1.7 1 2 3 4 5 6 7 8 Describe the final stage of the system development cycle. What does the computer operator do if the system breaks down? Describe the role of a manager. What is testing? How is a new system evaluated? List two tasks that may be performed during maintenance. What is an operation manual? Describe some of the factors for creating an easy-to-use operation manual. LEARNING ACTIVITIES 1 Why should a new system be evaluated after installation? 2 If a system is designed correctly, it should carry out the required tasks. Why is there a need for ongoing testing and evaluation? 3 A desktop publishing program was part of the solution in the case study. Investigate the latest desktop publishing software. Suggest the most appropriate packages for this situation. Justify your answer. 4 A high-performance personal computer was mentioned in the case study. Describe a high-performance personal computer. List any peripheral devices that would be required by Port Nelson Tourism to implement its new system. Investigate the options and costs of each device. List these details. 5 Interviews were part of the evaluation in the case study. Which people should be interviewed? Make a list of interview questions that could be used to evaluate the restaurant guide. 32 Core Chapter review PART A Select the alternative (A, B, C or D) that best answers the question. 1 A diagram where the vertical axis lists the tasks and the horizontal axis shows the time frame is called a: A decision table B Gantt chart C system flowchart D data flow diagram 2 A system designed to make participants’ work as effective and as satisfying as possible is called: A equity system B human-centred system C participant system D ethical system 3 The third stage in the development of a new system is: A understanding the problem B implementing C making decisions D designing solutions 4 During the development of a project, the details of the time schedule occur in the: A feasibility study B prototype C project plan D operation manual 5 In the feasibility study, the project leader focuses on: A the appropriateness of a solution B the cost of the new system C designing a system to meet the participants’ needs D how the existing system works 6 7 8 9 10 In a data flow diagram, a person who receives data would be represented by a: A external entity B data flow C process D online output The conversion method where the old and new systems both work together at the same time is called: A pilot B direct C parallel D phased When a new system is not meeting the original requirements of the problem, it is necessary to: A change the management B retrain the participants C restart the system development cycle D evaluate the system In which stage of the system development cycle is a decision tree used? A testing, evaluating and maintaining B understanding the problem C implementing D designing solutions The most likely location for the description of data is a: A operation manual B data manual C data dictionary D data validation Project work 33 Chapter review PART B For each of the following statements, select from the list of terms the one that most closely fits the statement. Write the letter corresponding to your choice next to the statement number. Statements 1 A table that represents all possible conditions and actions. 2 The immediate change to the new system. 3 The process of planning, scheduling and controlling all the activities within each stage of the system development cycle. 4 A series of stages used in the development of a new information system. 5 The general hardware configuration of the new system and designs for both input and output. 6 A short report that analyses potential solutions and makes a recommendation. 7 Determines if a quick fix of the existing system will solve the problem or a new system is necessary. 8 A working model of an information system built in order to understand the requirements of the system. 9 When people within the information system develop the solution. 10 A graphical method of representing a system using a number of processes together with inputs, outputs and storage. 11 The gradual implementation of the new system. 12 Details the procedures participants follow when using a new system. List of terms a data flow diagram b decision table 34 Core c d e f g h i j k l direct conversion feasibility study operation manual participant development phased conversion preliminary investigation project management prototype specification system development cycle PART C Write at least one paragraph on each of the following. 1 What is a Gantt chart? Draw a Gantt chart for the activities you completed today. 2 Briefly outline some of the ergonomic issues that impact on the design of a new system. 3 Why do people create a prototype? How are prototypes used to develop a new system? 4 Describe the typical sections of a feasibility study. 5 Explain the use of the following tools in the design of a new system: a decision table b data dictionary. 6 What are the reasons for participant development? Describe some of the tools used for participant development. 7 Pilot conversion is used in the implementation stage of the system development cycle. a Explain the process of pilot conversion. b What are the advantages and disadvantages of using pilot conversion? 8 Describe the final stage of the system development cycle. 2 chapter I N F O R M AT I O N SYSTEMS AND D ATA B A S E S Outcomes • applies an understanding of the nature and function of information technologies to a specific practical situation (H1.1) • explains and justifies the way in which information systems relate to information processes in a specific context (H1.2) • analyses and describes a system in terms of the information processes involved (H2.1) • develops solutions for an identified need which address all of the information processes (H2.2) • evaluates the effect of information systems on the individual, society and the environment (H3.1) • demonstrates ethical practice in the use of information systems, technologies and processes (H3.2) • proposes ways in which information systems will meet emerging needs (H4.1) • assesses the ethical implications of selecting and using specific resources and tools (H5.2) Overview The emphasis in this chapter is on the information processes of organising, storing and retrieving with database systems and hypermedia. You will gain a greater understanding of information systems and develop skills with relational databases. 2.1 Information systems In the Preliminary course, you studied the basic concepts of an information system. Information systems perform a set of information processes requiring participants, data/information and information technology. They perform the information processes of collecting, organising, analysing, storing/retrieving, processing, transmitting/receiving and displaying information. The relationship between the elements of an information system is described in Figure 2.1. The links between the elements are represented using arrows. Information systems are created for a purpose and operate in a particular environment. INPUT PROCESSING CONTROL ST ORAGE OUTPUT OUTPUT Figure 2.1 Information system. Characteristics of information systems Information systems are created to provide access to information for an organisation or individual. For a large number of information systems, the data is held in a database and access is achieved using a DBMS. The characteristics of an information system are the: • Organisation of data into information. Data must be organised before it can be stored and analysed by the information system. Careful thought is needed to organise data; otherwise, the resulting information will be meaningless. Organising may require sorting, summarising or classifying. Data in an information system is organised into data structures using such organisational methods as data dictionaries. • Analysis of information to give knowledge. Access to information and the resulting knowledge is the purpose of an information system. For people to gain knowledge from information, the information must be analysed. Information systems provide a range of tools for the analysis of data, such as tables, queries and reports. People make decisions based on the information they receive from an information system. 36 Core ITITFact Fact A spider or crawler is a program that visits Web sites and reads their pages to create entries for a search engine. It is called a spider because its ‘legs’ span a large area of the ‘Web’. Types and purposes of information systems The types of information systems and their purposes are changing with developments in information technology. These types and purposes are also not mutually exclusive. They often overlap and change as new applications or new versions of existing applications are introduced. Five types of information systems are examined in this section. Transaction processing systems (TPSs) collect, store, modify and retrieve the daily transactions of an organisation. Some examples of the application of TPSs are buying goods at a point-of-sale (POS) terminal, processing credit card payments and tracking receipts of materials from suppliers. Organisations rely heavily on their TPS. A breakdown will disrupt operations or even stop the business. For this reason, well-design backup and recovery procedures are essential. There are two types of transaction processing: batch processing and real-time processing. Batch processing collects the transaction data into a group and processes it later. It is currently used where transaction data is on paper, such as processing cheques. Batch processing has a time delay, and this may be a significant disadvantage. In real-time processing, each transaction is immediately processed. It provides instant confirmation of a transaction but does require access to an online database. Decision support systems (DSSs) assist people to make decisions by providing information, models and analysis tools. A DSS can be used on a daily basis or when an organisation has to react to something unexpected or make changes. One example of a DSS is a system that analyses the stockmarket and helps the user make decisions about buying and selling shares. A DSS creates a mathematical model of the variables affecting the decision, using statistical tools, databases, spreadsheets and graphics. The model allows a manager to ask what-if questions by changing one or more of the variables and seeing the projected results. What would happen if the price were raised? What would happen if the organisation changed the design of its package? The DSS depends on the accuracy of the mathematical model and the ability of the manager to formulate appropriate questions. Expert systems are a type of DSS. Expert systems provide information and solve problems that would otherwise require a person experienced in that field (an expert). They are useful in diagnosing, monitoring, selecting, designing, predicting and training. An expert system asks users a set of questions and compares their answers to a knowledge base. The knowledge base is a set of general facts and if-then rules supplied by an expert. The expert system must reason to obtain a possible solution. For example, one expert system has been designed to help doctors diagnose infectious blood diseases and prescribe antibiotics (see Figure 2.2). The system uses the patient’s medical history, symptoms and laboratory test results as its input and compares these to its knowledge base. If a match occurs, the system uses its pharmacological knowledge base to recommend an antibiotic. The solutions from an expert system are not always correct, and it is up to the user to accept or reject the solution. Information systems and databases 37 Figure 2.2 Expert systems are used in medicine. Management information systems (MISs) provide information for the organisation’s managers. An MIS presents basic facts about the performance of the organisation. Some common examples of MIS output are reports on sales, stock inventory, payroll, orders and budgets. The fact that people are aware of how the performance is measured helps managers motivate workers and make decisions. A special type of management information system is called the Executive Information System (EIS). The EIS is designed for the information needs of senior managers and provides information on strategic issues, using data from the share market, commodity prices, interest rates and other economic indicators. Office automation systems provide people with effective ways to complete administrative tasks in an organisation. An office automation system uses a range of software tools, such as word processors, spreadsheets, databases, desktop publishing, presentation programs and project management software. Office automation systems also use communications technology, such as Web browsers, email, facsimile, and video-conferencing. In office automation systems, letters and documents are constructed quickly, edited if required and easily stored for future reference or re-use. Email improves productivity by delivering messages and data more quickly than the paper-based interoffice mail system could. Desktop publishing software is used to create high-quality flyers, reports and brochures. Examples of database information systems Most information systems store data in a database. Information systems that use a database are called database information systems. You will remember from the Preliminary course that a database is an organised collection of data. Databases are accessed by a database management system (DBMS). A DBMS has no data in it. It is a software package that allows the user to enter, maintain and provide access 38 Core to a database. The user can choose which data is required and how to display that information in a meaningful way. The term database is often used instead of DBMS. There are many examples of database information systems, such as school databases that hold information on teachers, subjects, classrooms and students. This chapter will use the Address and School databases to explain the important concepts involved in a database information system. Two other examples of database information systems are the RTA holding information on automobiles and video stores holding information on borrowers and videos. These latter two examples are used in case studies in this chapter. Case study MovieTime Video MovieTime Video is a store that uses a database information system. The store’s purpose is to hire videos and sell associated products. The environment is not only the contents of the store but such factors as location, communications, suppliers, competitors and borrowers. MovieTime uses a POS system, and electronic funds transfer at point of sale (EFTPOS) is available. MovieTime Video performs a set of information processes that requires participants, data/information and information technology (see Figure 2.3). Purpose • Hire videos and sell associated products Information Processes • Scan video/card • Save database • Transfer data • Search database • Update data • Display information Participants Data/ Information Information Technology • Manager • Member data • Personal computer • Staff • Video data • Barcode reader • Barcodes • Database • Receipt Information System Figure 2.3 Hiring a video at MovieTime. Information systems and databases 39 A database is used to store membership data, video data and all video transactions. When new customers come into the store, they fill out a membership form containing personal details. The membership data consists of their last name, first name, address, home phone number, date of birth, and work phone number. The data is entered into a membership table. New customers select a personal identification number (PIN) and receive a membership card with a barcode. When the store buys a new video, data is entered into the video table. The video data consists of an identity number, title, main stars, rating, and an entertainment category. The videos are also barcoded for efficient processing. When a customer borrows a video, the membership and video barcodes are both scanned. This data is automatically inserted into the membership and video tables (see Figure 2.4). The participants at MovieTime Video are continually carrying out the information processes. These processes are not completed in any order. The staff can move from collecting the data to displaying the information. The information processes include: • collecting—scanning the video bar-code • organising—searching the database for membership details • analysing—determining the type of information required (see Figure 2.5) • storing and retrieving—saving the database to a disk • processing—updating the data after it has been entered • transmitting and receiving—transferring the data between peripheral devices • displaying—obtaining a report on a member’s transactions (see Figure 2.6). Card, PIN, cash Member MovieTime Video Video, receipt Transaction data Member data Video data Video database Figure 2.4 Flow of data at MovieTime Video. 40 Core Figure 2.5 Constructing a query for MovieTime Video. Figure 2.6 The results of the query in Figure 2.5. Exercise 2.1 1 2 3 4 5 6 7 8 9 What is an information system? List five types of information systems. Explain the difference between batch processing and real-time processing. What factors is a DSS dependent on? Where are expert systems useful? What is the knowledge base in an expert system? What information is presented by an MIS? Describe an office automation system. The following questions relate to the MovieTime Video case study: a What is the purpose of MovieTime Video? b Describe the participants, data/information and information technology. c List the data in the membership table. d List the data in the video table. e Describe the information processes at MovieTime Video. LEARNING ACTIVITIES 1 Information systems are making unprecedented changes to our society. Briefly describe the effect of information systems on your way of life. Then select one impact of an information system that you regard as the most significant. Give a reason for your choice. Information systems and databases 41 2 ‘New office automation systems do not always result in increased productivity. Workers often spend too much time on relatively unimportant tasks, such as reformatting documents, organising irrelevant data or surfing the Web.’ Do you agree with these statements? Why? What steps should be taken by the manager to ensure office automation systems are used productively? 3 Developing an effective expert system requires a large database and powerful software. Constructing the knowledge base is expensive and requires human experts who are willing to provide the data in a suitable form. Consider these issues and then outline some areas where expert systems could be used effectively. Are there any areas where expert systems should not be used? 4 Construct a data flow diagram to describe the flow of data in an existing information system. Choose an information system that you use regularly. 5 In the MovieTime Video case study, the staff could store the history of the videos borrowed by a particular person as well as the address of that person. This data could be valuable information to many other businesses, such as book companies. Outline the ethical issue raise by this situation. What is your view on this issue? 2.2 Organisation methods Organising is the process of arranging, representing and formatting data. It involves the concept of a database. A database is an organised collection of data. People have used this concept of a database throughout the existence of the human race. Non-computer and computer-based methods People need to keep information about themselves and their activities. Common databases in the home include telephone books, dictionaries, recipe files, encyclopedias or even a list of things to be done. A database is simply a place to organise and store data so that it can be retrieved later for a particular purpose. A telephone book is a noncomputer database that organises data alphabetically according to a person’s family name. Searching for the person’s name retrieves their phone number. A paper filing system is a non-computer database. It involves paper, folders and filing cabinets to store data in an organised way (see Figure 2.7). Searching the folders in the filing cabinet retrieves a single piece of paper. Non-computer databases are often the best way to organise data. It is convenient to obtain information from a book or access it from a filing cabinet. People can Figure 2.7 Non-computer databases have been easily and inexpensively organise used for years. data using a non-computer data42 Core base. They do not need a computer or computer skills. Non-computer databases are easier to keep secure, and they remain more private. The data is more difficult to use for other purposes. For example, a telephone book does not allow a thief to search for an address and find the phone number of a house. Computer-based databases are being increasingly used to organise and store data. Some examples include taxation records, library systems, car registrations, student records, CD-ROM encyclopedias and census data. Computer-based databases have several advantages over non-computer databases: • Easily edited. Data can be corrected and updated without having to retype all the data. • Large storage. Data is stored on a disk and retrieved when required. • Fast retrieval. Data is searched and sorted quickly and accurately to obtain the required information. • Display options. Data is presented in a variety of ways, using tables, forms and reports to suit most purposes. Computer-based methods of organising include flat file systems, database management systems and hypermedia. Flat file databases A flat file database organises data into a single table and is suitable for many small applications. Flat file databases organise data using data structures called files, records, fields, and characters (see Figure 2.8): • A file is a block of data. When you have done some work on the computer, it is stored in a file. The Address database is a file. A file in a database is divided into a set of related records. • A record is a collection of facts about one specific entry in a database. In the Address database, a record is information about a person’s name, address and home phone. A record is divided into one or more related fields. • A field is a specific category of data in a database. In the Address database, the family name, given name, street, suburb, postcode and home phone are fields. Data items in a field are made up of characters. • A character is the smallest unit of data that people can use. Characters include letters, numbers, and special symbols. Field Record Character Figure 2.8 Part of the Address database. Keys are fields that are used to sort and retrieve information. Usually, each key holds a unique item that applies to only one record. When the records are sorted, the key is used so that not all the data has to be read or retrieved. There are different types of keys, such as a single key, composite key, primary key and secondary key: Information systems and databases 43 • A single key is a field in which each item of data is unique. Care must be taken when choosing a single key, as some fields, such as Family Name, are not always unique. • A composite key, or compound key, is made by joining two or more fields together. It is used when no data item in any field can be guaranteed to be unique. For example, a compound key can be made from such fields as Gender and Date of Birth. • A primary key is a single key or compound key that must have a value. Primary keys cannot be empty or null. • A secondary key is a field that contains useful items of data often used in searches. Unlike other keys, secondary keys are not always unique. Relational databases A relational database organises data using a series of related tables. Relationships are built between the tables to provide a flexible way of manipulating and combining data. Forms are used to view, enter and change data in the tables. Relational databases are the most commonly used database structure. The organisation of data in a relational database involves a schema. Schema A schema (pronounced ‘skee-ma’) is the data definition for a database. It is an organised plan of the entire database showing how and where the data is found, descriptions of the data, and the data’s logical relationships. In a relational database, the schema defines the entities, attributes and relationships: • An entity is a specific thing about which information is collected and stored. The School database has an entity for students, for teachers, for classes and for students and classes (see Table 2.1). A flat file database would have a separate file for each of these entities. • An attribute is a defined property of an entity. The Students entity in the School database has such attributes as LastName, FirstName and PhoneNumber. Each attribute of the entity contains a data item. Attributes are the same as fields in a flat file database. • A relationship is the way the entities are related to each other. In the School database, the entities are related using keys, such as StudentID. Entities are related in three ways (see Figure 2.9): – A one-to-one relationship occurs when each record in the first entity is related to exactly one record in the second entity. For example, in primary school each class has one teacher and each teacher relates to only one class. As another example, only one customer purchases a new car, and the sale of each new car is related to only one customer. – A one-to-many relationship occurs when one record in the first entity is related to many records in the second entity, but any record in the second entity only relates to one record in the first entity. For example, one student can take out many books from the library, but any one book can only be taken out by one student at a time. – A many-to-many relationship occurs when each record in the first entity is related to many records in the second entity, and each record in the second entity is related to many records in the first entity. For example, each student studies many subjects, and each subject is studied by many students. 44 Core Entity Students Attribute StudentID Table 2.1 Entities and attributes for the School database. FirstName LastName Address Suburb PostCode PhoneNumber Teachers TeacherID Teacher PhoneNumber Extension Classes ClassID ClassName TeacherID Units Students and Classes StudentClassID ClassID StudentID One-to-one One-to-many Student Many-to-many Student Physics Class IPT Class Student Student Mathematics Class Figure 2.9 A relational database can use three types of relationships. Information systems and databases 45 A foreign key is an attribute (field) of a table that is a primary key of another table. In the School database, the StudentID attribute is a foreign key of the Students and Classes table and a primary key of the Students table. The data in a foreign key of one table must match the data in the primary key of another table. Tables Information about an entity is displayed in a table. A table is the organisation of data into columns and rows (see Figure 2.10). It is sometimes referred to as a relation. A column of a table is also an attribute of an entity or a field of a record. The data in a column must have the same data type and have a distinct name. A row in a table is also called a tuple of an entity, or one record. Each row must be uniquely identified by a key. The intersection of a row and column stores a particular data item, such as ‘Rebecca’ in the first row and second column of the School database. The rows and columns in a table can be viewed in any order without affecting the contents of the table. Attribute of the entity (field) Tuple of the entity (record) Key field Figure 2.10 Table from the School database. Forms Data is viewed for different purposes using forms. A form is used to view, enter, and change data in a table (see Figure 2.11). The layout of the form can be changed. The user can position fields, headings, instructions and graphics. A welldesigned form provides information explaining the required data and any dataentry rules that apply to particular fields. For example, the field name ‘Sex (M/F)’ leaves no confusion about what data is required and how it should be entered. In a relational database, forms can be based on a single table or on multiple tables. Figure 2.11 A form in the School database. 46 Core Data modelling Data modelling is the process of identifying entities, the relationships between those entities and the attributes of those entities. It is used to develop a schema for the database. Data modelling is critical to creating an efficient database. There are a number of tools used for data modelling, such as data dictionaries, schematic diagrams and normalisation. Data dictionaries A data dictionary is a comprehensive description of each field (attribute) in the database. It contains information about the characteristics of each item entered in the database, such as the field name, field size, data type and field description (see Figure 2.12): • Field name is the name of the field. It should be carefully selected to avoid confusion. Field names should be relatively short but clear and unambiguous. • Data type (or field type) is the kind of data that can be stored in the field. Each field stores data in a single data type. Some common data types are text, memo, number, currency, yes/no and date/time. Logical fields contain the logic values ‘true’ or ‘false’. • Field size, or width, is the number of characters allowed in each field. It should be limited to the smallest number of characters likely to be needed, as smaller field sizes let the database work faster. • Description specifies the contents of the field. Figure 2.12 Data dictionary for the School database. A data dictionary is a fundamental tool in the development of a database. It consists of metadata, or information about data. It provides a common ground for people working on a project at the same time. For example, if people are Information systems and databases 47 working on different entities, they can refer to the data dictionary to check whether a particular attribute already exists. This reduces data redundancy. Data redundancy is the undesirable duplication of data within a database. Schematic diagrams Schematic diagrams are graphical tools that help define the database and develop a schema. A common schematic diagram is called an entity-relationship diagram. An entity-relationship diagram (ERD) is a graphical method of identifying the entities and showing the relationships between them. It helps to determine the data to be included in and excluded from the database. ERDs force people to have a common understanding of the database. They are a useful tool to explain the database. There are numerous notations for ERD. The ERD in Figure 2.13 represents an entity as a rectangle and uses lines to specify the relationships between the entities. Figure 2.13 An ERD generated from Microsoft Access for the School database. Normalisation Normalisation is the process of organising data into tables so that the results of using the database are unambiguous and as intended. It is a refinement process that aims to reduce data redundancy. Normalisation results in a database that is more efficient but more complex because data is separated into more tables. For example, Table 2.2 is used to keep track of customer purchases and the price of the products. If you deleted a customer, you would also delete a price. Normalising would solve this problem by dividing this table into two tables: a table about each customer and a product they had bought and a table about each product and its price. Making additions or deletions to either table would not affect the other. 48 Core CustomerID Product purchased Price 929 IT Today $50 970 Computers for dummies $45 568 Access made easy $60 Table 2.2 Customer table. The degree of normalisation has been defined in terms of forms, such as: • First Norm Form (1NF)—moving data items into separate tables where the data in each table is a similar type. Each table is given a primary key. 1NF is the basic level of normalisation and usually corresponds to the definition of a database. • Domain/key normal form (DKNF)—a key uniquely identifies each row in a table. A domain is the set of permissible values for each attribute. Enforcing key and domain restrictions ensures there are no problems when modifying the database. DKNF is a final level of normalisation that most designers aim to achieve. Hypermedia Hypermedia is a combination of media whose locations are linked electronically to provide an easy way to navigate between the information. The information is stored using a set of documents that may contain text, images, audio, video or executable programs. Each document is independent, and information is retrieved using hypertext. Hypertext is a system that allows documents to be cross-linked in such a way that the user can move from one document to another by clicking on a link. A link, or hyperlink, is indicated by a highlighted item (usually an underlined word or a graphic) that allows the electronic connection. The author of the hypertext must specify the location of the information accessed by each link. If another computer is the destination of the link, that computer is called a node. The most well-known application of hypermedia and hypertext is the World Wide Web. On the Web, each document is accessed through its uniform resource locator (URL). ITITFact Fact The Web is currently the largest index at over 200 million pages. Yahoo employs over 150 editors and Web surfers to create its directories. Uniform resource locator A URL is the address of a file or resource on the Web. It is usually written in lower case, as a single unbroken line, with no spaces (see Figure 2.14). The main parts of the URL are the: • protocol—the transfer method used to access a particular resource on the Web. In most cases the protocol will be ‘http://’ (hypertext transfer protocol). • domain name—address of the specific computer where the resource is located, such as ‘www.hi.com.au’. The domain name can be replaced by the IP address. Information systems and databases 49 http:// This stands for hypertext transfer protocol, which is the set of rules that govern the transfer of data on the World Wide Web. It indicates that the resource is a Web page. /atlas/ This indicates a directory called ‘atlas’ within the Web site. www This stands for the World Wide Web. http://www.hi.com.au/atlas/about.htm hi.com This is known as the domain name. It is usually made up of the name of the organisation (hi for Heinemann Interactive) and an extension that indicates the type of organisation (in this case ‘com’, which stands for ‘commercial’). au This is a two-letter extension that indicates the country of the Web site (in this case, Australia).Web sites in the USA do not have a country extension. about.htm This is the file name of an individual Web page in the subdirectory.The extension .htm stands for hypertext markup language, which is the code used to format all Web pages. Some Web pages have a four-letter extension (.html). Figure 2.14 A uniform resource locator. • file path—the full path to the file to be retrieved. It may be a simple filename, or it may be a directory path, such as ‘atlas/about.htm’. The domain name and the file path are separated by a forward slash (/). URLs must be complete and exact; if they are not, the file or resource will not be found. It is not necessary to memorise URLs. Web browsers have the ability to store the addresses of Web sites. These stored URLs are called bookmarks or favourites and can be organised into categories or folders to save you time. Storyboard A storyboard is a series of frames, each representing a different action or screen image. It is a tool used to organise hypermedia. Storyboards are drawn on paper or using a computer (see Figure 2.15). They are frequently edited. They define each screen and its specific media type. Storyboards consist of navigation paths, information and graphics. They are popular because they are simple to construct, are easy to read and can be modified at every stage. There are four storyboard layouts: • linear—a simple sequential path that is set up quickly • hierarchical—a sequential path in a top-down design; the user starts at the beginning and moves down through the multimedia product • non-linear—no structure; the user moves between different layouts in any direction • combination—a blending of the above layouts. 50 Core Figure 2.15 A storyboard layout. HTML Web pages are created using hypertext markup language (HTML). HTML is a set of special instructions that indicate how parts of a document will be displayed and navigated. HTML documents are actually text files that contain HTML instructions. Many applications will save a document in HTML and insert the special instructions. HTML documents are viewed in a Web browser. An HTML editor is a software program that specialises in writing HTML code. Instructions in HTML are given using HTML tags. HTML tags are metadata, or information about data. A tag consists of a left angle bracket (<), a tag name and a right angle bracket (>). Tags are usually paired, such as <H1> and </H1>, to start and end the tag instruction. The end tag looks like the start tag except a slash (/) precedes the text within the brackets. Every HTML document contains certain standard tags, such as <head> and <body>. The <head> tag precedes the title and the <body> tag indicates the beginning of the actual text (see Figure 2.16). <html> <head> <TITLE> HTML </TITLE> </head> <body> <H1>HTML document </H1> <P>Welcome. This is a paragraph in HTML. It is just text!</P> <P>This is another paragraph in HTML. HTML is easy.</P> </body> </html> Figure 2.16 A basic HTML document. Information systems and databases 51 Links are achieved using HTML’s hypertext-related tag. It is <A> and stands for anchor. The document to be linked is specified using the instruction HREF=“filename”. The filename refers to the location, or path, of the link. After the hypertext reference, the text that will provide the link is specified. For example, the format of a link is: <A HREF=“ipt.html”>technology</A>. The hypertext reference is the document ‘ipt.html’, and the word ‘technology’ is the hypertext link to this document. If the hypertext reference is in a different folder or on another computer, its path must be specified. For example, the format of a link to the file ‘ipt.html’ on the ‘hi.com’ computer is: <A HREF=“http://www.hi.com/ipt.html/”>technology</A>. Exercise 2.2 1 What are the advantages of computer-based databases over non-computer databases? 2 Describe the data structure in a flat file database. 3 Explain the difference between a primary key and a secondary key. 4 What is a relational database? 5 Describe a schema. 6 List three ways entities are related. 7 What is data modelling? 8 What information is contained in a data dictionary? 9 What is the purpose of normalisation? 10 Explain the difference between a link and a node. 11 Describe the three parts of a URL. 12 What is a storyboard? 13 Describe HTML. 14 How are links achieved in HTML? LEARNING ACTIVITIES 1 Investigate three different non-computer methods of organising data, such as card files, filing cabinets and address books. How is the data organised? How is the data stored? Who uses this method of organising data? Outline the advantages and disadvantages of each method. 2 Find three different examples of non-computer databases in your home. For each database, answer the following questions: a What is the storage medium used for the data (what is the data stored in or on)? b How is the data organised? c Is it possible to reorganise the stored data in a different way? d Is it possible to maintain the database by adding, deleting or changing the information? 3 The library uses a relational database to store information about borrowers and books. Construct a schematic diagram to represent this existing system. 4 Stadium Australia has set up a booking system for all its events. The system uses a relational database. There are three entities: Customers, Seats, and Events. 52 Core – Customers: CustomerID, LastName, FirstName, Address, Suburb, PostCode, Deposit and CreditCard. – Seats: SeatNumber, EventID and CustomerID. – Events: EventID, EventTitle, Date and Time. a What would be the primary key for each entity? Give a reason for your answer. b Create a data dictionary for this relational database. c Create a schematic diagram for this relational database. d Design a form for each entity that could be used for data entry. e The date of birth is a useful piece of information about the customer. Add this attribute to the database. f Populate the database with dummy data. Save the database with the filename STADIUM. 5 An organisation has a database that holds records of any gifts received from the community during the year. The database is organised as follows: – Person: PersonID, LastName, FirstName, Address, AmountToDate, and DateLastGift. – Gifts: PersonID, GiftDate and GiftAmount a What attribute in the database is redundant? Give a reason for your answer. b The manager of the organisation would like to personally thank all the people who made a contribution to the organisation. He requires a list of supporters by street and suburb. Modify the data structure so that this information would be easily obtained. c What would be the primary key for each entity? d Create a data dictionary for this relational database. e Create a schematic diagram for this relational database. f Populate the database with dummy data. Save the database with the filename GIFTS. 6 Max Music is a small business that offers an online ordering service for its customers via the Internet. It wants to expand its Web site by adding Web pages to display the latest music releases. Each new Web page should contain information about one CD, such as the artist, type of music, background, date released and a description. Construct a hypertext document from a storyboard for these Web pages. Each Web page should be linked. 2.3 Storage and retrieval People need secure and efficient methods for storage and retrieval of information from a database. The tool used for this purpose is called a database management system. Database management systems A database management system (DBMS) is a software package that allows users to access a database so they can enter, maintain and view the data. The terms database and DBMS are often used incorrectly. A database contains the data, and the DBMS provides access to this data. The data is independent from the DBMS. In a DBMS, data is organised into tables, viewed in forms, retrieved using queries and displayed in reports. A DBMS manipulates the data in many different ways, such as sorting and searching. It also performs a number of tasks to help users develop and maintain a database, such as: Information systems and databases 53 • • • • • • organising the data using a data dictionary showing relationships between entities using schematic diagrams checking for identifiable errors in data entry allowing flexibility to change the definition of the database restricting access to the data to authorised people (see Figure 2.17) providing information about the performance of the database. Figure 2.17 Restricting access to a database. Methods of accessing data Sequential and direct access are two methods of accessing data. Sequential access occurs when data is accessed in a sequence. It is the only method of accessing data stored on magnetic tape. Data on a magnetic tape is retrieved by starting at the beginning of the tape and reading all of the data until the required item is found. Sequential access processes data in the order it was stored. It does not require the exact location of the data item. Sequential access is much slower than direct access and impractical when immediate processing is required. Direct access occurs when data is accessed without accessing previous data items. Data is stored in a particular storage location based on a mathematical procedure or algorithm. Direct access uses this algorithm to calculate the approximate location of the data. If the data is not found at this location, the computer searches through successive locations until the desired data is accessed. Direct access often involves the use of an index and is then called indexed access. An index is a table that contains information about the location of the data. Data is accessed by referring to the index and obtaining the exact location of the data. Indexed access requires additional processing time to search the index and to maintain the index. The indexed access method is widely used to store data on a disk, as well as to store the logical location of data within a database. Distributed databases A distributed database is a database located at more than one site. It acts as a single collection of data but is geographically dispersed. Distributed databases reduce the data transmission costs that would occur if all users at all sites had to access one centralised database. However, a distributed database makes it more difficult to obtain a complete view of the database. Distributed databases often need to be synchronised to keep them current. Consider a distributed database with part of the database at a warehouse and 54 Core another part at head office. If the office staff place an order from the warehouse, then both parts of the database need updating. This may create a problem if an error occurs in transmission and only one part of the database processes the transaction. A two-phase commit is part of the DBMS used to maintain consistency across a distributed database. It checks whether both parts of the database are ready for the transmission and then performs the transmission. Storage media Storage of data is online or offline. Online storage uses a peripheral device that is under the user’s direct control, such as a hard disk on a personal computer. Offline storage uses a peripheral device that is not under the user’s direct control, such as a centralised database. Both online and offline storage use a variety of peripheral devices and storage mediums: • A hard disk is a disk made of metal or glass and covered with magnetic material. Hard disks are usually mounted inside the computer’s case (fixed), and their storage capacity is usually measured in Gb. Magnetic disks use direct access to retrieve data. • An optical disc is a polycarbonate plastic disk with a reflective layer of metal covering the surface. Data is read and written using laser technology. Optical discs use direct access to retrieve data. There are many kinds of optical discs, such as compact disks with read-only memory (CD-ROMs) and digital versatile disks (DVDs): – CD-ROM disks are 12 centimetres wide and capable of storing 650 Mb. They are convenient for storing data that remains constant, such as encyclopedias. – DVD is a disk format that can store large amounts of data. A DVD-ROM is the same physical size as a CD-ROM but provides storage of 4.7 Gb to 17 Gb. • A removable cartridge is a hard disk encased in a metal or plastic cartridge and can be removed like a floppy disk. Removable cartridges are fast, though usually not as fast as fixed hard disks, and use direct access. There are two common types of removable cartridges: – Zip disks (or cartridges) store 100 or 250 Mb of data and have a transfer rate of 1 Mb per second. – Jaz disks (or cartridges) are an upgrade of the Zip disks. They store up to 2 Gb of data and have a transfer rate of 5.5 Mb per second. • A magnetic tape is a very long, thin strip of plastic, coated with a thin layer of magnetic material. The tape is wound on two reels inside a cartridge. Magnetic tapes can store large quantities of data inexpensively and are often used as a backup medium. They use sequential access to retrieve data. Encryption Encryption is the process of encoding data, and decryption is the process of changing it back (decoding). It is the most effective way to achieve data security during the transmission of data. Data is encoded, transmitted, and then converted back to its original form. Encrypting data is essential for transferring financial transactions and is used extensively on the Internet. Encryption methods often involve complex manipulations of bit patterns. One problem with encryption is to find a method that is difficult to decode but is also practical to use. There are two main types of encryption: Information systems and databases 55 • Asymmetric encryption requires a key for encryption and a key for decryption. A common asymmetric encryption system is public key encryption. It involves a public key that is widely available and a private key that is kept secret. Both keys are developed using complicated number theory. The public key is used to encrypt the message before it is transmitted, and the private key is used to decrypt the message when it is received. • Symmetric encryption requires the same key for both encryption and decryption. A common symmetric encryption system is the Data Encryption Standard (DES). ITITFact Fact Whitfield Diffie and Martin Hellman invented public key cryptography in 1976. For this reason, public key encryption is sometimes called DiffieHellman encryption. Backup and security If the computer goes down or the storage media or database is damaged, the costs of interrupted operations and replacing any lost data can be enormous. A DBMS contains backup and recovery capabilities to guard against data loss. A backup is another copy of the data that can be used to rebuild the system. A DBMS creates a backup at a specified time. If the system goes down, the recovery process rebuilds the data. It uses the last completed backup and a journal listing all the actions completed by the DBMS since the last backup. The success of backup and recovery depends on implementing appropriate procedures. Backups are usually stored offsite or in a fireproof safe. Security is another important database issue. Data can be stolen, destroyed or maliciously modified. There is a greater risk when the data is accessible to multiple users over a network. Data security involves a series of safeguards to protect the data. The first line of defence is to only allow access to data by authorised people using passwords, personal objects and biometric devices. However, some people are capable of evading these procedures. Further safeguards to protect data involve data encryption and firewalls. A firewall can be used on the Internet or on any network to verify and authenticate all incoming data. It checks the password of anyone trying to access the network. Firewalls are expensive to install and maintain. On large systems, more than one firewall is necessary because barriers need to be placed at all critical points. 56 Core Sorting Database information is always easier to use when data is arranged in a meaningful order rather than randomly as it was entered. Sorting is the process of arranging data in a particular order. Sorts are performed in either ascending or descending order. Ascending order arranges data from smallest to largest (for example, 0 to 9) or from first to last (for example, A to Z). Descending order is the reverse, from largest to smallest (9 to 0) or from last to first (Z to A). Sorting can be done on more than one field (attribute) so that records are arranged in the most useful order. For example, Figure 2.18 shows the School database sorted on two levels, with Last Name being the primary sort field and First Name the secondary sort field. Figure 2.18 The School database sorted on two levels. Searching Data needs to be quickly and efficiently retrieved from a database. Searching is the process of examining the database to retrieve data. An effective search in a small database may involve browsing a table or using the Find or Search command. However, in a large database, the most efficient way of searching is to construct a query. Querying A query is a search of a database for records that meet a certain condition. It is a question you ask of the database. For example, what is the name of the student who lives at ‘4 Beach Rd’? The results of a query are usually displayed in a table but can be used as the basis of a form, report or graph or even another query. A query can also update or delete multiple records at the same time and perform built-in or custom calculations on data. A query is constructed in the form: <Field name> <Operator> <data>. The data in the query is often called the criteria. For example, if the Information Processes and Technology class from the School database was required, the query would be in the form ‘ClassName = Information Processes and Technology’. A common method for constructing a query is query by example (QBE). It requires the user to enter the criteria against a field. For example, in Figure 2.19, the criteria ‘Information Processes and Technology’ is entered underneath the ClassName field. If the search of a database involves two or more entities, it is called a relational query. Information systems and databases 57 Figure 2.19 A query by example on the School database. Operator Description Relational Operators = Equal to <> Not equal to < Less than > Greater than <= Less than or equal to >= Greater than or equal to contains does not contain begins with ends with is blank is not blank Logical Operators AND both OR either one NOT exact opposite Table 2.3 Examples of operators. 58 Core Operators Some queries are constructed using an operator, such as those in Table 2.3. The operator represents the action to be performed in the query. Operators are classified as either relational or logical. Relational operators (=, <>, <, >, <=, >=) are characters or symbols indicating the relationship between two expressions. Wildcard characters represent one or more unknown characters. Some common wildcard characters are the asterisk (*), which substitutes for any number of characters, and the question mark (?), which substitutes for one character. The query ‘LastName = Ma*’ would find such last names as Mat, May, Madrid and Martinelli. However, the query ‘LastName = Ma?’ would only find such last names as Mat and May. Logical operators (AND, OR, NOT) are used to combine queries so that a search is carried out on one or more fields. It is important to understand the difference between the AND and OR operators: • The AND operator requires both the first and the second query to be true. It retrieves records that satisfy both queries. For example, if you require data about a student with the last name Howe who lives in Kearns, the query would be: ‘LastName = Howe’ AND ‘Suburb = Kearns’. • The OR operator requires either the first or the second query to be true. It retrieves records that satisfy either of the queries. For example, if you require data about all of the students with the last name Howe and all the students who live in Kearns, the query would be: ‘LastName = Howe‘ OR ‘Suburb = Kearns’. SQL A query language is a specialised language designed to search a database. There are different query languages, each with its own grammar, syntax and vocabulary. Structured Query Language (SQL and pronounced ‘see-qwell’) is a query language used to access and manipulate data in a relational database. Variations to SQL have been developed by specific DBMSs. However, most of these variations are extensions to ANSI SQL, or standard SQL. ITITFact Fact SQL grew out of research on relational database models conducted by IBM in the 1970s. It developed from Structured English Query Language (SEQUEL). For this reason, the pronunciation of SQL is ‘sequel’ and not ‘squeal’. SQL statements contain keywords that are used to perform a particular task. For example, the select statement is used to query the database and retrieve selected data that matches the criteria. A simple select statement may contain the keywords SELECT, FROM, WHERE and ORDER BY (see Table 2.4). Keyword Values Description Example SELECT Field(s) The data to be displayed SELECT FirstName,LastName FROM Table(s) The source of the data FROM Students WHERE Search criteria The query WHERE LastName = “Mullins” ORDER BY Field(s) ORDER BY LastName DESC The order in which the results are to be displayed Table 2.4 Keywords used in a simple SQL select statement. Information systems and databases 59 When searching in SQL, it is essential to use the correct syntax. In most DBMSs, the keywords are written in upper case, the fields are separated by commas, an entity and an attribute in that entity are separated by a full stop, and the search criteria or data item is enclosed in double quotes. The keyword ORDER BY sorts on a field in ascending (ASC) or descending (DESC) order. Ascending order is the default and can be omitted. The SQL query in Figure 2.20 is the same as the query in Figure 2.19 that was developed using QBE. Figure 2.20 A SQL query on the School database. Hypermedia and searching Data is retrieved from a database using the data structures and the relationships between entities. The process of retrieving data in hypermedia is completely different. It involves using search engines. Search engines A search engine is a database of indexed Web sites that allows a keyword search. An index is a table that contains information about the location of data. A search engine’s index is built by regularly scanning the Web for new sites and accepting submissions from Web page authors. The scanning is often completed by programs called spiders, crawlers or robots. They send back the URL of any document they find to the search engine’s indexing software (see Figure 2.21). This indexing software collects information, such as titles and keywords, from the Web sites, then indexes these words in a database. Each search engine has a different method of building its index; this is why you often obtain different results from the same keyword search when you use a different search engine. Indexes allow documents to be found using a keyword search. A keyword is entered related to the topic of interest. Most search engines allow a search on a series of keywords and for specific information. When the user requests a keyword search, the search engine scans the index for the keywords and lists the Web sites that contain those keywords. Choosing the right keyword is crucial to the success of a search. In general, use more than one keyword such as synonyms and select keywords that are very specific. Search engines allow the use of Boolean qualifiers, such as ‘AND’, ‘OR’ and ‘NOT’ to refine a search. 60 Core WORLD WIDE WEB YOUR COMPUTER 1 SEARCH ENGINE 3 Database 2 URLs Keywords URLs 4 1 Spiders follow hyperlinks on the World Wide Web 2 The spider sends back URLs to the search engine’s indexing software 3 You conduct a keyword search 4 A list of URLs for Web pages containing these keywords is returned to your computer Figure 2.21 How a search engine works. Some search engines offer directories. Directories are lists of Web sites organised into categories, such as computers, games or sport (see Figure 2.22). They are another way to find information on the Internet. The owners of a Web site have to register their site to be included in a directory. As a result, directories cover only a small fraction of the pages available on the Web. A directory is useful for finding information on a general topic. Figure 2.22 Directories at AltaVista. Information systems and databases 61 A search robot is a program that accesses Web sites and gathers information for search engine indexes. AltaVista has a search robot called Scooter. It asks each server which files should be excluded from being indexed, it does not go through firewalls, and it uses a special algorithm so that response time for other users is not affected. Exercise 2.3 1 2 3 4 5 6 7 8 9 10 11 12 13 Explain the difference between a database and a DBMS. Describe accessing data using an index. What is a distributed database? Briefly describe some of the storage media used by information systems. What is public key encryption? Describe the process of backup and recovery. Explain the difference between searching and sorting. What is QBE? List four keywords in SQL and describe their purpose. How is a search engine index built? Describe a search engine that offers directories. What is a search robot? Write the meaning of the following queries: a Class = 12* b Postcode = 261? c LastName begins with H d Assessment > 60 e FirstName = “Peter” AND Suburb = “Mossman” f Colour = “Red” AND Cost > $500 g LastName = “Tran” OR PostCode = “2534” h StreetNumber = “9” OR Price < $500 14 Write out queries using relational operators for each of these searches: a Year 12 boys in the school. b Borrowers who live in either Auburn or Lidcombe. c Girls in the netball club who are eligible to play in 18 and under teams. d All customers who owe more than $10 000 for the month of July. 15 The following questions refer to the School database in Figure 2.18. a Write down the StudentID of the second record if sorted on ‘FirstName’ in ascending order. b Write down the StudentID of the third record if sorted on ‘Phone Number’ in descending order. c Which of the ‘Mullins’ would come first if the primary sort field was ‘LastName’ and a secondary sort field was ‘StudentID’? d Write down the StudentID of the first record if the primary sort field was ‘Address’ and a secondary sort field was ‘StudentID’? 62 Core LEARNING ACTIVITIES 1 Melissa Harris has decided to organise a small bus service. She has constructed a database using the following data structure: – Bus: RegistrationNo, PeopleCapacity, Model, Colour and Details – Patron: PatronID, FirstName, LastName, Address, Suburb and Postcode – Job: JobNumber, PatronID, RegistrationNo, AmountReceived and Destination. Create a data dictionary and an ERD for this database. Populate this database with dummy data. Save the database with the filename SMALL BUS. Construct the following queries: a All the buses with a capacity greater than 8 people. b All the buses whose model is a type of Toyota. c All the patrons whose last name starts with the letter ‘S’. d All the patrons whose address is in a street. e All the jobs where the amount received was greater than $40. f All the patrons where the amount received was less than $50. g All the jobs that used a Toyota bus or whose destination was Sydney. h All the patrons who travelled in a red bus and whose address contains the letter ‘a’. 2 A retail organisation keeps data about its employees in a database: – Employee: EmployeeID, LastName, FirstName, Address, Suburb, PostCode, and Department – Wage: EmployeeID, WeeklyPay, PayDate and WeeklyTax a Describe the results of this SQL query: SELECT FirstName, LastName FROM Employee, Wage WHERE Employee.Department = “Sport” AND Wage.WeeklyPay > 1000 ORDER BY LastName b Describe the results of this SQL query: SELECT EmployeeID FROM Employee, Wage WHERE Employee.Suburb = “Cabramatta” OR Wage.PayDate = #31/07/01# ORDER BY LastName DESC c Construct a SQL query that could be used to retrieve the name of all employees who work in the office and live at either Ryde or Hunters Hill. d Construct a SQL query that could be used to retrieve the name and address of all employees whose weekly tax is less than $50 on 12 August 2001. e Create a data dictionary and an ERD for this database. Populate this database with dummy data. Save the database with the filename RETAIL. Verify your answers to the queries in questions (a) to (d). 3 The Internet has many large databases that can be accessed using a keyword search. Use your Web browser to access the following Web sites. Describe the information that can be obtained from each site. a http://www.whitepages.com.au b http://www.hoyts.com.au c http://www.tradingpost.com.au 4 Find information about databases on the Web by using more than one search engine. Create a list of sites and their URLs that you found useful. Compare your list with another student in your class. Rank the top three sites from both lists. Compare these lists as a class. What are your class’s top three sites? Information systems and databases 63 2.4 Other information processes Displaying is presenting the output from an information system or database to meet a given purpose. The presentation of information could be in the form of text, numerals, images, audio or video. A report is one way to display information from a database. Reporting A report is the formatted and organised presentation of data. Examples of reports are mailing labels, invoices, sales summaries and telephone lists. A DBMS allows complete control in the design of a report in either a tabular layout (displays data with the fields extending across the page) or a column layout (displays data with the fields going down the page). It is possible to insert headings, sort data, choose the fields, switch fields, change column widths and select records. The purpose of the report determines its content, format and style. Most DBMSs allow different reports to be created from the database for different purposes (see Figure 2.23). Figure 2.23 A report from the School database. Before creating a report, the user needs to select the required records by constructing a query. For example, you may not need a mailing label for everybody in the School database. Reports are often based on a query. The next step in creating a report is to select the fields. These fields are placed in appropriate positions, formatted, and sorted. DBMS reports often offer such functions as count, sum, and average to perform calculations on selected fields. Most DBMS reports have the following sections (see Figure 2.24): 64 Core • The report header appears once at the beginning of a report. It contains such items as a logo, report title and date. • The page header displays information such as a title, column headings, or any information needed at the top of every page. A page header appears after the report header on the first page of the report. • The details section displays most of the information. The user has a variety of tools to manipulate and format fields. • The page footer displays information such as the date, page number or any other information the user wants at the bottom of every page. • The report footer appears once at the end of the report. It displays items such as report totals. The report footer appears after the page footer on the last page of the report. Figure 2.24 Designing a report for the School database. Constructing different views Different views of a database are obtained using a form. A form is used to view, enter, and change data in a table. The layout of the form can be changed. The user can position fields, headings, instructions and graphics on the form. A well-designed form provides information explaining the required data and any rules that apply to particular fields. Forms are used to display information for different purposes. Before selecting the ‘Print’ command to send the report to the printer, make sure the report has the correct format. When formatting a report, the user needs to adopt good design principles, such as: • headings that identify the purpose of the report • layouts, such as tabular or column, that efficiently present the information • text that is balanced on the page either vertically or horizontally • styles that are consistent throughout the report and with its purpose • columns that have clear and descriptive headings • white space that is appropriately used to improve readability • page numbers and the date included in the header or footer. Information systems and databases 65 ITITFact Fact Stickiness is the quality of a Web site that induces visitors to remain on the site rather than move to another site. It is the length of time a visitor accesses a site. Stickiness is a valuable measure for convincing advertisers to patronise a site. Case study Roads and Traffic Authority The Roads and Traffic Authority (RTA) is an organisation that uses a database information system. Its purposes are to ensure vehicles are safe and to provide individuals with a driver’s licence. The environment of the RTA is not only its offices throughout New South Wales but also such factors as communications, insurance cover, police records and the cost of new vehicles. The RTA performs a set of information processes that requires participants, data/information and information technology (see Figure 2.25). When the owner of a vehicle needs to renew the registration, he or she requires a pink slip and a green slip. This data is presented at one of the RTA offices. A central database is used to store the details of each vehicle, such as plate number, model and engine number. The owner pays the registration and presents the pink and green slips. This data is automatically updated using offline storage. An entity also exists to store information about holders of driver’s licences, such as their licence number, address and expiry date. Purpose • Ensure vehicles are safe • Protect road users Information Processes • Collect pink/green slips • Search database • Update database • Print details on rego form Participants Data/ Information Information Technology • Manager • Owner data • Terminals • Staff • Pink slip • Central computer • IT personnel • Green slip • Database Information System Figure 2.25 Registering a vehicle at the RTA. 66 Core Figure 2.26 RTA’s Web site. This information is also updated at RTA offices. Information about registration of vehicles and obtaining a driver’s licence is obtained from the RTA Web site (see Figure 2.26). The participants of the RTA are continually carrying out the information processes. These processes are not completed in any order. The staff can move from collecting the data to displaying the information. The information processes include: • collecting—entering data from pink and green slips • organising—searching the database for owner details • analysing—determining the type of information required • storing and retrieving—saving and backing up the database • processing—updating the information in the database • transmitting and receiving—transferring the data between terminals and the central computer • displaying—printing details on the registration form. Figure 2.27 An ERD for the RTA, showing entities, attributes and relationships. Information systems and databases 67 Exercise 2.4 1 2 3 4 5 6 7 What is a report? List some examples of reports. Why is a report often based on a query? List the sections of a report. Explain the difference between a report header and a page header. What is usually displayed in a report footer? The following questions relate to the RTA case study: a What are the purposes of the RTA? b Describe the participants, data/information and information technology. c List the data in the registration table. d List the data in the driver’s licence table. e Describe the information processes at the RTA. LEARNING ACTIVITIES 1 In the RTA case study, a relational database was used to organise and store data. Create a data dictionary and an ERD for this database. Populate this database with dummy data. Save the database with the filename RTA. a Create a report to display all the registration information. The report should be sorted on expiry date in ascending order. b Create a report to display all the driver’s licence information. The report should be sorted on expiry date in ascending order. 2 St Peters High School is using a relational database to store student data. A portion of the database involves the following three entities: – Students: StudentID, FirstName, LastName, Address, Suburb, Postcode, Date of Birth and Gender – Contact: StudentID, FirstName, LastName, Address, Suburb, Postcode, MailingName and ContactPhone – School: StudentID, SportHouse and Subjects Create a data dictionary and ERD for this database. Populate this database with dummy data. Save the database with the filename ST PETERS. a Create a report that lists all the male students. The report should display the students’ first name, last name and gender. It should be sorted on last name in ascending order. b Create a report that lists all the students who are in a particular sports house. The report should display the students’ first name, last name and contact phone number. It should be sorted on contact number in descending order. c Write a letter using a word processor advising the contact person about some proposed changes to the school this year. Insert merged fields from the database into the letter. Merge the letter and the database so that each person receives a personalised letter. Create mailing labels for each letter, using the database. 68 Core 2.5 Issues related to information systems and databases Both positive and negative impacts arise from the introduction of information systems and databases. In this section, we examine some of the social and ethical issues raised by information systems. Data source The source of the data is the person or organisation that developed the data. Data may come from informal sources, such as a conversation, meeting or observations. It may also be obtained from formal sources, such as a report, book or official document. A formal source often provides data that is logically organised. However, this is no guarantee to its accuracy. The source of the data is protected by the Copyright Act. People are not allowed to copy the work of another person without permission. It is against the law to violate copyright. Most data obtained from the Internet is protected by copyright. Text and images obtained from a Web site should not be used without acknowledgment of and permission from the owner. However, the Copyright Act does make special provisions for students to use information for research purposes. It allows students to use a reasonable portion of the original work if the work is correctly cited. To cite an Internet source, include the following information: author’s surname and initial or organisation’s name, title of the complete work or Web page, URL of the Web page, date of the document or Web page publication, and the download date. Accuracy of data Accuracy of data is the extent to which it is free from errors. Data that is collected on individuals is not always accurate. The inaccuracies may be caused by mistakes in gathering or entering the data, by a mismatch of the data and the person, or by out-of-date information. For example, a car recorded as stolen is later recovered and returned to the owner. If the data has not been quickly updated, the legal owner runs the risk of being arrested as a car thief. Opportunities to check and change incorrect data need to be provided. It is often necessary to compare data from a number of different sources to determine which data is accurate. Data validation is used to check the entry of data: • A range check is used if the data is restricted to a small range of particular values. For example, when the data is entered in the format dd/mm/yyyy, a range check could be used to determine whether the first two digits are in the range of 1 to 31 and whether the second two digits are in the range of 1 to 12. • A list check is used when the data can be compared to a set of accepted data. For example, when the data entered is an Australian state, then NSW would be accepted but not NSX. • A type check is used to determine whether the data type is correct (see Figure 2.28). For example, when the data is entered for a person’s family name the software will check whether the data is text. It would not accept a ‘date’ for a person’s name. • A check digit is a digit calculated from the digits of a code number and then added to that number as an extra digit. For example, the ISBN number 0 85859 921 319 4 has a check digit of 4, and the check digit is calculated from 0 85859 921 319. Information systems and databases 69 Invalid data type Figure 2.28 Data validation rules. Data integrity describes the reliability of the data. Reliable data is accurate, current and relevant. There is no guarantee that data received from the Internet is reliable. It is easy to publish information on the Internet. Organisations that are not the creators of the information often provide access to it. Who is responsible for the accuracy of the information? Is the creator the only person responsible for the accuracy of the data? Do organisations that provide access to information have a responsibility to verify its accuracy? Clearly it is necessary to compare data from a number of sources and to determine which data is accurate. ITITFact Fact A ghost site is a Web site that is no longer maintained but that remains available for viewing. It is often difficult to identify ghost sites, as many Web sites do not display the date of the last update. Privacy Privacy is the ability of an individual to control personal data. It is a major concern for those involved with databases and their use. Large organisations, such as banks, use databases to store information about their customers. This information is confidential. It should not be used for other purposes or be made available to anyone outside the organisation. Privacy is also eroded by linking databases. People leave a trail of electronic data when they use a credit card, visit the doctor, use the library, access the Internet or subscribe to a magazine. If this data was combined, it could create a fairly detailed picture of a person. Access to data Access to data is the extent data is available to people. Should all information be free and available to all? What kind of access should individuals have to information about themselves? Why can’t people have free access to data about themselves located in business databases? Do people have the right to access and check their credit history or medical data? The Freedom of Information Act is 70 Core designed to allow individuals to find out what data is being kept by the government and other public bodies. It states that individuals have the right to access information where it relates to the individual and does not invade another person’s privacy. There is a fee for the release of this information (see Figure 2.29). However, knowing what data is being kept does not indicate how it will be used. Figure 2.29 Web site for Freedom of Information Act. People can use our preferences, weaknesses and habits to their advantage. That is, data on what we buy, how we pay for it, what we read, what we watch on television and how much we earn is valuable data for those who want to sell us things. Ownership and control of this data is an ethical issue. Who owns this data? Is it the individual, or is it the organisation that has processed the data? Is the data being combined, sold and exchanged? For example, an application for an extension to a house is sent to the local council for approval. Who owns this data? Does the building inspector have the right to sell this processed data to a bricklayer? On the other hand, might the owner of the house appreciate another quote for laying bricks? Data warehousing and data mining A data warehouse is a database that collects information from different data sources. It is a storage area of raw data that can be analysed to assist organisations to make decisions. A data warehouse involves careful planning to decide what data to collect. The contents of a data warehouse are usually historical and static. However, they will change if new requirements are identified. A more sophisticated approach to obtaining information is to use data mining. Data mining is a process that looks for relationships and patterns in the data stored in a database. It sorts through the data and turns up interesting and useful connections. For example, data mining could be used to analyse the transactions at a supermarket. It might determine that there was a relationship between tomato sauce sales and meat pie sales. This information might be useful for marketing promotions. One problem with data mining is that many of the patterns occur by chance and have no value in making decisions. It also raises issues of privacy and ownership of data. Information systems and databases 71 Exercise 2.5 1 2 3 4 5 6 7 8 Explain the difference between an informal and a formal source of data. How do you cite an Internet source? How is inaccurate data obtained? List four methods of validating data. Describe a range check. Why is privacy a major concern? What is the purpose of the Freedom of Information Act? Describe a problem with data mining. LEARNING ACTIVITIES 1 A flat file database is used by a school for student records. There are separate files for student data, financial data, teacher data and assessment results. A relational database has been suggested to the principal as a better system. Outline the advantages of a relational database over a flat file database. Your answer should contain references to data accuracy, data redundancy, security and development time. 2 Privacy and access to data are two important issues related to databases. Consider a student database containing name, address, gender, ethnicity, family, financial status, health, discipline record and assessment results. Should access to this data be given to the student, other students, teachers, the department of education, potential employers or other organisations? Is there a need to provide some groups with limited access? Explain your answers. 3 ‘Databases should not have the same copyright protection as books and software.’ Do you agree with this statement? Give reasons for your view. 4 Max Music is a small business that offers an online shopping service for its customers via the Internet. Customers place orders for CDs using their credit card and register preferences for categories of music. This data is stored in a database. Research indicates that preferences for music are also a good indicator for book and video preferences. Describe the ethical issues raised if Max Music sells each customer’s preferences to a book company? 72 Core Chapter review PART A Select the alternative (A, B, C or D) that best answers the question. 1 The main advantage of a computerbased database compared to a paper filing system for retrieving information is that the: A data can be searched more efficiently B data is very accurate C storage medium is a hard disk D data is organised into data structures 2 What is the specific thing about which information is collected and stored in a relational database? A file B record C entity D schema 3 A single key that must have a unique value and is used to sort and retrieve information: A secondary key B primary key C composite key D foreign key 4 A storyboard layout that has no structure is called: A linear B hierarchical C non-linear D combination 5 Metadata is contained in a: A data dictionary B data record C hyperlink D primary key 6 A customer file contains an identification number that is linked to a transaction file. This is an example of a: 7 8 9 10 A hypertext link B record C key D column. The video staff wish to retrieve information from the membership file about borrowers whose first name is ‘Ann’ with a post code of ‘2176’ who borrowed movies starring ‘Cary Grant’. A FirstName = “Ann” OR PostCode = “2176” OR Mainstars = “Cary Grant” B FirstName = “Ann” AND PostCode = “2176” OR Mainstars = “Cary Grant” C FirstName = “Ann” OR PostCode = “2176” AND Mainstars = “Cary Grant” D FirstName = “Ann” AND PostCode = “2176” AND Mainstars = “Cary Grant” Metadata is used in the organisation and retrieval of data. One example of metadata is the: A records stored in a database. B tables used to organise data into rows and columns. C HTML tags used to create Web pages. D search engines used to retrieve data from the Web. A query uses a wildcard to search a database in the form FirstName = “M?c*”. Which of the following would not be retrieved? A Michael B Mick C Mac D Mitchell The reliability of the data in a database is called: A data security B data redundancy C data integrity D data validation Information systems and databases 73 Chapter review PART B For each of the following statements, select from the list of terms the one that most closely fits the statement. Write the letter corresponding to your choice next to the statement number. Statements 1 A database that organises data using a series of related tables. 2 A query language used to access and manipulate data in a relational database. 3 The address of a file or resource on the Web. 4 Data accessed without accessing previous data items. 5 The data definition for a database. 6 A field that is used to sort and retrieve information. 7 A comprehensive description of each field in the database. 8 A formatted and organised presentation of data. 9 A technique to reduce data redundancy. 10 A system that allows documents to be cross-linked. 11 Data accessed in a sequence. 12 A search of a database that meets a certain condition. List of terms a data dictionary b direct c hypertext d key e normalisation 74 Core f g h i j k l query relational report schema sequential SQL URL PART C Write at least one paragraph on each of the following questions. 1 What is hypermedia? How are documents created on the Web? 2 Explain the difference between the following terms: a schema and data dictionary b data validation and data redundancy. 3 What is a DBMS? Outline some its functions. 4 Explain the difference in organisational methods between a flat file database and a relational database. 5 Describe a method of identifying entities and showing their relationships. 6 Outline two methods for constructing a query. 7 Describe the process of retrieving data using a search engine. 8 Identify a social or ethical issue involved in keeping data about individuals in a database. Briefly explain how the rights of the individual can be protected in this case. 3 chapter C O M M U N I C AT I O N SYSTEMS Outcomes • applies an understanding of the nature and function of information technologies to a specific practical situation (H1.1) • explains and justifies the way in which information systems relate to information processes in a specific context (H1.2) • analyses and describes a system in terms of the information processes involved (H2.1) • develops solutions for an identified need which address all of the information processes (H2.2) • evaluates the effect of information systems on the individual, society and the environment (H3.1) • demonstrates ethical practice in the use of information systems, technologies and processes (H3.2) • proposes ways in which information systems will meet emerging needs (H4.1) • assesses the ethical implications of selecting and using specific resources and tools (H5.2) Overview This chapter features the information processes of transmitting and receiving using communication systems. You will learn the characteristics of communication systems and some of their applications. The chapter provides a comprehensive understanding of networks and the issues related to communication systems. 3.1 Characteristics of communication systems A communication system enables people to send and receive data and information. We depend on communication systems. The telephone, radio and television are examples of communication systems that have had a dramatic impact on our society. All communication systems have five basic components: 1 The data source produces the data to be sent. 2 The transmitter encodes the data into a signal suitable for a transmission medium. 3 The transmission medium is a channel, such as a cable, in which the signal is transmitted to the destination. The signal may be changed or distorted during transmission. 4 The receiver decodes the signal back into the original data or an approximation of the data. 5 The destination is the receiver of the information. These components can be applied to any communication system, such as the radio. In radio, the data source is the person speaking into the microphone. The transmitter is the microphone and associated electronics that change the sound into a signal. The transmission medium, or channel, is the space between the transmitting and receiving antennas. The receiver is the radio that converts the signal into the original sounds, and the destination is the person listening to the radio. Communication systems are used in information systems when participants need to transmit and receive data and information. When people withdraw money from an ATM, they are accessing an information system and using a communication system (see Figure 3.1). Data and information are being transferred between an ATM terminal and the bank’s central computer. When computers and other devices are connected in some way like the ATMs, they form a network. In this topic, we are focused on communication systems that involve a network. Good communication systems have an accurate, reliable and secure transmission medium. They should also have a minimum delay in communicating. Good communication depends on protocols, handshaking, speed of transmission and error checking. These factors depend on the information technology used in the communication system. Figure 3.1 ATMs are part of a communication system. 76 Core Protocols Communication systems need protocols for communication. A protocol is a set of rules that governs the transfer of data between computers. It defines how the information is transmitted and how the errors are detected. Two computers must use the same protocols when they are communicating; otherwise, the data transfer may be unsuccessful. The standardisation of data communication protocols has been the focus of a major international effort over many years. Protocols are written into internationally accepted standards, such as the OSI reference model. The OSI reference model divides data communication into seven layers. Each layer expresses the standard, using a protocol. The bottom layers are responsible for transfer of data from one place to another. They include protocols that specify the type of plugs, the format of data, the method of transmission and error checking. The top layers examine the exchange of data between application programs. They include protocols that specify file transfer, passwords and network management. Handshaking Data can only be successfully transferred between devices if handshaking occurs. Handshaking is an agreement about which protocol to use to accomplish the exchange of information. It is a series of signals that flow between devices during data transmission. When using a modem, a handshake is those crunching sounds heard when making a connection. Handshaking is needed between devices as they may have different capabilities and may transfer data in different ways. Handshaking involves sending signals to indicate the type of protocol to be used. The transmitting device will send a signal and wait for an appropriate response. When two devices successfully handshake, then a connection is made. When a handshake is not successful, then the devices ‘hang up’ and try again. There are two methods of handshaking to control the flow of data: • Hardware flow control uses a dedicated connection, such as a wire. It is only practical when devices are close enough to be linked with a cable. A common hardware protocol is RTS/CTS (request to send/clear to send). • Software flow control uses a special code sent with the data. It is used for long distance communication. A common software protocol is XON/XOFF (X stands for transmit). If a break in transmission is needed, then the XOFF command is sent. When transmission is to start again, then the XON command is sent. Speed of transmission The speed of data transmission is determined by the transmitting device and the bandwidth. The bandwidth is the capacity of the channel, or transmission medium. A transmission medium with a high bandwidth can transfer more data. For example, a fibre-optic cable has a high bandwidth. When cable television is transmitted through fibre-optic cable, many different channels can be transmitted at the same time. Figure 3.2 Modem speeds are measured in bits per second. Communication systems 77 The speed of data transfer is measured by the number of bits per second or by the baud rate: • Bits per second (bps) is the maximum number of bits that can be transmitted in one second. This measure of speed includes special bits used in asynchronous transmission and any error checking bits. Bps is also called the bit rate. • Baud rate is the maximum number of data symbols or electrical signals that can be transmitted in one second. Because a data symbol can contain more than one bit of data, the baud rate and the bit rate may be different. For example, 1200 baud might transmit at 4800 bps. Error checking When data arrives at its destination, it may contain errors. These errors may be caused by interference with the signal or simply by errors in encoding and decoding the data. Errors must first be detected and then corrected. Three common methods for error detection are parity checking, checksum and cyclic redundancy check: • Parity checking is a method of checking for errors in data transmission using an additional bit called a parity bit. This bit is used only for the purpose of identifying whether the bits being moved have arrived successfully. When data is represented using an 8-bit ASCII, then a ninth bit is used that holds a 0 or a 1. When an odd parity is chosen, the number of ones in the nine bits must be odd. This means that if the number of ones in the first eight bits is even, then the parity bit must be one to make it odd. If the number of ones in the first eight bits is odd, the parity bit must be zero to keep it odd. The sender and receiver can also decide to send an even parity, in which case the number of ones in the nine bits must be even. If an error has occurred in a single bit, then the parity will be different and an error in transmission has occurred. • Checksum is a method of checking for errors in data transmission by counting the number of bits in a data packet. A data packet is created by dividing the total data into smaller groups. The count of the bits in a data packet is attached to the data packet. It is used by the receiver to check whether all the bits have arrived successfully. If the count matches, it is assumed that a complete transmission was received. • Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided by a fixed divisor. The remainder of the calculation is attached and sent with the data. When the data is received, the remainder is recalculated. If the remainders do not match, an error in transmission has occurred. There are a number of different standards for CRC. A 32-bit CRC achieves a 99.99% detection of all possible errors. The most common form of error correction is to retransmit the data. ITITFact Fact A Web gardener is a person who acts like an editor to ensure that information posted on a Web page is accurate and relevant. 78 Core Communication settings The characteristics of the communication system are the basis of the communication settings. Communication settings can be changed by the user to ensure a connection between two devices. The settings are often a parameter. A parameter is a variable that is given a constant value for a particular application. Some common parameters include bps, data bits, parity, stop/start bits and flow control. • Bits per second is the speed of transmission, such as 56 000. • Data bits are the number of bits in each group of data. Each data group is usually sent as a byte, such as 7-bit ASCII or an 8-bit ASCII. • Parity is whether the data contains a parity bit for error detection. Parity is odd, even or none. • Stop/start bits are the number of stop and start bits used in asynchronous transmission. This parameter is used to identify each byte. The normal range is between 0 and 2. Some systems only use a stop bit. • Flow control is the software handshaking protocol, such as XON/XOFF. Figure 3.3 Parameters for a modem. Communication systems 79 Exercise 3.1 1 2 3 4 5 6 7 8 9 10 Describe the five basic components of all communication systems. Explain the difference between a protocol and handshaking. What is the OSI reference model? What is involved in the handshaking of two devices? Describe software flow control as a method of handshaking. What is the bandwidth? Explain the difference between baud rate and bps. Describe parity checking as a method of detecting errors in data transmission. What is a cyclic redundancy check? List five common parameters used to connect two devices. LEARNING ACTIVITIES 1 All communication systems have five basic components. Identify the five components in these systems: a William writes a letter to a friend. He puts the letter into an envelope and sends it through the mail system. b Julia needs to transfer the directions of a conference venue to her partner. She draws a diagram on a piece of paper and sends it using a fax machine. 2 The 7-bit ASCII character 1011011 is to be sent with a parity bit. What is the value of the parity bit if the parity is even? The character was received with the ASCII character of 1010001. Do you think the parity method of error detection would have found the error in transmission? Why? 3 Cyclic redundancy checking is an error checking method used when transferring files. Explain how CRC works. Describe another method of error checking. What is one advantage of CRC over this other method? 4 A network is capable of transmitting data at 28 800 bps. How long would it take to transmit a 400-Mb file? Characters are transmitted in 8-bit ASCII, including a parity bit and an additional start and stop bit. What is the maximum transmission rate over the network expressed in characters per second? 5 A high school and a primary school are trying to establish a communication link. However, the link is not working. Describe any communication settings that need to be investigated to ensure correct operation. Confidential student information is to be sent using this link. Describe any methods of securing the data during transmission. 6 Establish a communication link and transfer data between two computers. Describe the steps taken to establish the link. 3.2 Examples of communication systems New communication capabilities have made it possible for people to do many things that were not possible a few years ago. This section examines three examples of communication systems: teleconferencing, messaging systems and electronic commerce. 80 Core Teleconferencing Teleconferencing is the use of an electronic transmission to allow a meeting to occur at the same time in different locations. It is an alternative to a face-to-face meeting. Teleconferencing refers to communication, such as an audio conference or a video conference, that goes beyond the normal telephone call between two people. • An audio conference is a single telephone call involving three or more people at different locations. It is a service provided by a telephone company. Audio data is transmitted and received using the existing telephone lines. • A video conference is a meeting that allows people in different locations to see video images of each other on a screen, as well as hear speech. The least expensive form of video conferencing is a tiny camera and a 4-inch window displayed on a computer screen. In a typical business video conference, people appear on a larger screen (see Figure 3.4). This may require special communication arrangements because of the high bandwidth required to transmit video. Teleconferencing simulates a face-to-face meeting and reduces costs. Money is saved by not buying airfares, hotel rooms and meals. Teleconferencing also saves people the time and energy involved in travelling to attend a face-to-face meeting. Teleconferencing is frequently used in business and distance education. However, tele-conferencing does remove the inter-personal relationship achieved through a face-to-face meeting. Physical contact and informal discussions are often needed to clarify ideas and develop partnerships. Figure 3.4 Video conferencing. Messaging systems A messaging system is used to send messages to people in different locations who may receive the message at a later time. It has been used for centuries in the form of letters. Messaging systems involve the creation, storage, exchange and management of messages. Messages are sent to an individual or a group of people. Traditional systems Traditional messaging systems include the telephone and fax. They are communication systems used regularly by individuals and organisations. • A telephone is a system for transmitting sounds or speech between distant locations along telephone lines. It is a convenient method of communicating with people around the world. A telephone answering system is a messaging system. It stores messages and allows a person to hear the message at a later time. • A fax, or facsimile, machine is a system of transmitting and reproducing documents by means of signals sent over telephone lines. The fax machine Communication systems 81 scans a document and converts it into a bit-mapped image. This image is compressed and transmitted along the telephone network to a destination fax machine. This machine decompresses the image and reconstructs the original document. Fax machines have become very popular as people can quickly transfer a hard copy of a document or send a written message. Personal computers equipped with a fax modem are capable of performing almost all the tasks of a fax machine. Voice mail Voice mail, or v-mail, allows communication with other people by storing and forwarding spoken messages. The sender dials a voice-mail number and records a message. The message is digitally stored on a computer system and can only be retrieved by the intended receiver of the message. To retrieve a message, you dial into the voice-mail system using any telephone and enter an account number and password. After you enter the voice-mail system, you can listen to the message, delete it, save it or send it to another person. Voice mail combines the features of a telephone answering system and some of the concepts of email. It provides some advantages over email. More people have access to a telephone than to a computer equipped for email. People also often express their feelings more clearly with the spoken word. However, email is much better at communicating complex information and sending different data types. Electronic mail Electronic mail, or email, allows communication with other email users by sending and receiving electronic messages using a computer. Email was one of the earliest uses of the Internet and is now widely used. It is fast, economical and a convenient way to send messages to people all over the world. An email message can travel around the world in minutes. To use email, you need a computer that is linked to a network or the Internet, an account with an Internet service provider (ISP), an email address and email software. ITITFact Fact The Internet revolutionised email by turning countless incompatible networks into one global system. It is regarded as the messaging system for the planet. Trillions of email messages are sent each year over the Internet. Email can be written to anyone who has an email address. Email addresses are unique and are obtained free. An email address consists of two parts separated by the @ (‘at’) symbol in the form ‘name’@‘domain name’. The first part is the name of the account. It is often a person’s username and is chosen when a user signs up with an ISP. If a name is already in use by someone else at the domain, the user may have to modify his or her preferred name by adding some more letters or numbers. The second part is the domain name. It is the location of the person’s account on the Internet. The domain name identifies the specific computer or server where the person’s email messages are stored. For example, in the address nick@ozemail.com.au: • ‘nick’ is the name. • ‘ozemail.com.au’ is the domain name. ‘Ozemail’ is the ISP, ‘com’ means the domain is commercial, and ‘au’ is Australia. 82 Core Most email messages contain two main parts: the header and the body of the message. The header is similar to an envelope used in traditional letters. It contains information needed to deliver the message. The sender’s email address is usually automatically inserted, just like an envelope with a pre-printed return address. The header contains four main parts that the sender fills in as required (see Figure 3.5): • Email address (To:) is the address of the person receiving the message. It must be correctly typed. • Carbon copy (Cc:) sends the same message to other people apart from the main recipient (optional). • Blind carbon copy (Bcc:) sends a copy to other people without revealing that these other people got the message (optional). • Subject is the topic of the message or a brief description. This is very useful for the receiver of the message (optional). Figure 3.5 An email message. The body of the message is typed using the email software or is imported or copied from a word processor. Email messages are often short and typed very quickly. Some people use inventive spelling in emails, such as coughy, bizzy, thanx and enuff. The user does not have to be online to compose an email message. Messages can be written offline and sent when the user logs onto a LAN or the Internet. This saves money if the ISP charges by the hour for connection time. When email is sent, it is stored on the server where the recipient has an account. It stays on the server until the person checks his or her email. After the email is read, it can be deleted, printed or stored in an appropriate folder for later reference. The user can reply to an email message simply by clicking on the ‘reply’ icon (see Figure 3.6). The address of the receiver (the sender of the message being replied to) and the subject are automatically inserted in the header of the reply. Leaving the subject the same identifies the ‘thread’ of the message. The previous message can be retained so that the original sender remembers the message. This is called quoting. Forwarding messages involves sending messages you received to someone else. Communication systems 83 Subject thread Emoticon Portion of original message ‘quoted’ Figure 3.6 A reply to an email message. Email software provides a number of features to help users create their email. An address book is used to store email addresses (see Figure 3.7). This saves time typing the address and avoids the problem of remembering each address. A mailing list is a group of people who may want to receive the same messages. It may be people working on the same project or a group of people with the same interests. Mailing lists are created by entering the email address of each person in the list and giving the list a name. A signature is several lines automatically appended to outgoing email messages. It may include an email address, Web site, graphic, occupation or telephone number. Figure 3.7 An email address book. 84 Core Electronic commerce Electronic commerce, or e-commerce, is the buying and selling of goods and services via the Internet. It has become a multibillion-dollar source of revenue for the world’s businesses. E-commerce provides 24-hour availability, global reach, the ability to interact and provide customer information, and a multimedia environment. The most popular e-commerce sites sell computer products, books, gardening products, music or office supplies (see Figure 3.8). However, e-commerce is expected to expand into most retail areas. Each day, there are new businesses being established that are based entirely on Web sales. Figure 3.8 Amazon.com is a popular e-commerce site. EFTPOS EFTPOS (electronic funds transfer at point-of-sale) is a system that allows people to purchase goods and services using a credit or debit card. It is the electronic transfer of money from the customer’s bank account to the retailer’s bank account. EFTPOS has made shopping easier for customers and allowed retailers to immediately receive payment for their goods. Each point-of-sale terminal is linked to the computer of the customer’s bank using the account number on the card. Entering the PIN number is a security measure to identify the customer. When a connection is made and approved, the money is immediately transferred. Electronic banking Electronic banking allows customers to view their account balances and transaction histories, transfer money between accounts and pay bills using Bpay (see Figure 3.9). It provides banking services 24 hours a day but cannot cater for cash or cheque withdrawals. However, automatic electronic debits are becoming more popular with consumers. Cheques are an expensive and inefficient way of settling debts because the cheque passes through many hands before the transaction is completed. Communication systems 85 Figure 3.9 Internet banking services. Some electronic banking providers require customers to download special banking software and install it on their personal computer. Electronic banking raises the issue of security. All banks are determined to make their online banking services safe from inference and to secure customer details. Data encryption is used to secure the data transfer between the customer’s computer and the bank’s computer. Exercise 3.2 1 2 3 4 5 6 7 8 9 10 What is teleconferencing? Outline the advantages and disadvantages in teleconferencing. What is a messaging system? How does voice mail work? Describe the two parts of an email address. List the four main parts in the header of an email message. Why are email messages sometimes written offline? What is a mailing list? Describe some the benefits of e-commerce. What is provided by electronic banking? LEARNING ACTIVITIES 1 Communication systems perform information processes requiring participants, data/information and information technology. Clearly identify the participants, data/information, information technology and the purpose of the following communication systems: 86 Core 2 3 4 5 6 a teleconferencing b messaging systems c electronic commerce. Construct a chart to compare the advantages and disadvantages of three messaging systems: a traditional system, voice mail and electronic mail. Create a brief email message about this Information Processes and Technology course. a Send the email message to a partner and a carbon copy to the teacher. b Check that your partner received the email message. c Send a reply to your partner by quoting. d Forward your original message to another person in your class. Create an email questionnaire on communication systems. a Design a simple questionnaire with only one or two questions. b Create a mailing list and send the email questionnaire to the mailing list. c Store the replies in a separate folder. Collate the results. A spreadsheet is a useful tool to collate and graph the results. d Distribute the results of the survey to the people on the mailing list and thank them for their participation. David frequently uses the Internet to access information. Briefly outline the issue of copyright in relation to the Internet. Kerry recently downloaded banking software for electronic banking. Describe the process of downloading. Describe two factors that affect the speed of transmission. 3.3 Transmitting and receiving Transmitting and receiving refers to the transfer of data and information. It is carried out using numerous communication concepts and completed by network hardware and software. Communication concepts Communication concepts include the transmission of data, protocols, handshaking, networks, network topologies and network access methods. Transmission of data Data is transferred between devices in two ways: serial transmission and parallel transmission. Parallel transmission is the transmission of data simultaneously using separate channels. Serial transmission is the transmission of data one after the other. Serial transmission is used to transmit data to peripheral devices, such as modems and printers, and is used on networks. Serial transmission can be either synchronous or asynchronous. Asynchronous transmission is the sending of data by identifying each byte with special start and stop bits. It has become the standard for personal computers. Part of protocol agreement is to specify how many start and stop bits. The normal range is between 0 and 2. Synchronous transmission requires all the data to be sent at the same rate. The same number of bytes is sent each second. This is synchronised by each device using a clock. Synchronous transmission is faster and more efficient than asynchronous transmission as there are no extra bits. It is used on larger computer systems. (See Figure 3.10.) Communication systems 87 Character 6 Character 7 Source Character 4 Character 5 Character 3 0 1 0 1 0 0 1 1 1 1 0 1 1 0 0 0 1 1 1 0 0 1 1 0 0 1 1 0 1 1 0 1 Receiver Synchronous transmission Source 1 0 0 Start bit Character 6 Character 5 1 0 1 1 1 1 0 1 1 0 1 0 0 0 1 1 1 0 0 0 Stop bit Start bit Stop bit Start bit 1 0 1 Receiver Stop bit Asynchronous transmission Figure 3.10 Serial transmission. The direction of data flow can be simplex, half-duplex or full-duplex mode. Simplex mode allows transmission in one direction only, from the sender to the receiver. An example of simplex mode is the radio, a telegram or television. Halfduplex mode allows transmission in both directions but not at the same time. This means the sender and the receiver take turns. An example of half-duplex mode is an intercom, walkie-talkie or disk drive. Full-duplex mode allows transmission in both directions at the same time. Most communications systems, such as the telephone or email, use full-duplex mode. Protocols and handshaking A protocol is a set of rules that governs the transfer of data between computers. Protocols define how a link is established, how data is transmitted and how errors are detected and corrected. When the same protocols are used, different types of computers and other devices can communicate with each other. Numerous protocols have been developed for specific technologies (see Table 3.1). Protocols change over time and often are the basis for the development of a particular product. When an agreement is reached about which protocol to use, it results in an exchange of information. Handshaking involves sending signals to indicate the type of protocol to be used for an agreement to be reached. Handshaking is needed as modems at each end of the line may have different capabilities. For example, they need to inform each other about and agree on the highest transmission speed. 88 Core Protocol Description IPX Internet Packet Exchange. A NetWare data delivery protocol used by Novell’s NetWare Operating System. SNA Systems Network Architecture. A protocol that defines data communication on a network. It was originally used to link mainframes. FDDI Fibre Distributed Data Interface. A protocol that specifies computer input/output interface standards using fibre-optic cables. X.25 The standard packet switching protocol. It is used for low-speed applications, such as credit card verifications and automatic teller machine transactions. ATM Asynchronous Transfer Mode. A standard transport protocol that specifies a method of packaging data into cells. It transmits all data types over any type of media. Kermit Asynchronous communication protocol for transmission of files using the public telephone network. XModem File transfer protocol developed in the late 1970s for personal computers. Data is transferred in blocks 128 bytes long. XModem originally supported checksum but later versions support CRC. YModem File transfer protocol developed as an extension to Xmodem. Data is transferred in blocks 1024 bytes long. YModem includes such features as transfer of filenames, increased reliability of error checking and increased data transfer. ZModem File transfer protocol developed to rectify the limitations associated with YModem. ZModem uses a variable block size and supports CRC. It provides for high-speed packet and network communication environments. TCP/IP Transmission Control Protocol/Internet Protocol. A common set of rules for data transmission and error detection across the Internet. It works by breaking information into smaller packets of data. HTTP Hypertext Transfer Protocol. A protocol that enables the user to send and retrieve files using the Internet. HTTP allows access to Web pages that are based on hypertext. FTP File Transfer Protocol. A protocol used to enable the client computer (user) to log on to the server. FTP is the oldest form of remote file access for the Internet. POP Post Office Protocol. A protocol that specifies how email messages may be exchanged between a computer and the ISP. MIME Multipurpose Internet Mail. A protocol designed to enable files to be sent across the Internet as email. Table 3.1 Common data transfer protocols. Networks A network is a number of computers and their peripheral devices connected together in some way. Each device in a network is called a node. The nodes in a network include many different types of devices, such as printers, storage devices, terminals and workstations. Terminals are devices that send data to and receive data from another computer system. If the terminal has both memory and Communication systems 89 processing capabilities, it is called an intelligent terminal. Most personal computers are classified as intelligent terminals and are called workstations on a network. The simplest form of a network is when one computer is connected directly to another computer, using a cable. However, a network can also consist of thousands of computers connected together. Networks are classified as local area networks or wide area networks: • Local area networks (LANs) connect computers within a building or group of buildings on one site. LANs cover a small geographical area, and the computers are linked together by coaxial cable or fibre-optic cable. There are three main advantages in using a LAN: – sharing limited hardware resources, such as printers, hard disks and modems – sharing application software, such as word processing, database, spreadsheet and graphics programs – improved communication among users by sending electronic messages. • Wide area networks (WANs) connect computers over hundreds or thousands of kilometres. WANs often consist of a mainframe computer called the host and a number of terminals. For example, the EFTPOS terminals of many retail organisations and the ATM terminals of banks are all part of a WAN (see Figure 3.11). A WAN may use a private leased line, the normal telephone network or a combination of both. A private leased line is dedicated to the network. It offers higher transmission speeds and more accurate transfer of data than those available through the public switched telephone network (PSTN). PSTN links are relatively cheap if computers do not require constant connection. However, PSTN links are not guaranteed and can be interrupted. Most data sent over a network uses packet switching. Packet switching is a technique that divides messages into small data packets, transmits the packets and later joins the packets to form the original message. It allows multiple users to use the same transmission line by interspersing the data packets from different users. Data packets may not be sent along the same path and could arrive at the destination at different times and in the wrong order. Each data packet contains an address and control instruction to reassemble the message in the correct order. Data transfer on the Internet is based on packet switching. Figure 3.11 EFTPOS uses a WAN. 90 Core ITITFact Fact The word ‘packet’ was coined by people working on ARPANET to divide long messages generated by their computers. The ARPANET was a network developed in 1969 by the U.S. Department of Defense that later expanded to become the Internet. Network topologies Network topology is the physical arrangement of the devices in a network. There are many possible network topologies, such as star, bus and ring (see Figure 3.12). Bus Network Star Network Ring Network Figure 3.12 Common network topologies. A star topology has a central computer with each device connected directly to it. The central computer serves as a switch. It receives messages and sends them to the destination device. Star topology requires extra cabling because each device needs a cable to the central computer rather than to the nearest device. If one device or cable is broken, the network can still operate. However, if the central computer fails, then the network fails. It is also limited by the processing power of the central computer. Star networks use a time-sharing system that allocates a certain amount of CPU time for each user. It is the most common topology for a mainframe. Communication systems 91 A bus topology is an arrangement where all the devices are attached to a direct line called the bus. Each device has a unique identity and can only recognise those signals intended for it. Devices check the bus and retrieve their messages as data travels along the bus. Each device is considered to be connected to every other device and can communicate directly along the network to any other device. Bus topology is one of the easiest to set up and can still operate if one node fails. Ethernet and PowerTalk use a bus topology. A ring topology is an arrangement where all devices are attached so that the path is in the shape of a continuous circle. Each device in the ring has a unique address. Data flow is in one direction, moving from device to device until the data arrives at its destination. The token ring network is the most common form of access for ring topology. Network access methods There are a number of ways of dealing with multiple users wanting to access the network at the same time. The two most common access methods are Ethernet and token ring: • Ethernet—the first industry-standard LAN access method, or protocol, based on a bus topology. Ethernet allows data to be transmitted simultaneously to all nodes on the network in both directions. Addressing information allows each node to recognise and receive individual data packets intended for it.With data packets travelling simultaneously, collisions will occur and will cause errors. To overcome this problem, Ethernet uses a method called Carrier Sense Multiple Access and Collision Detection (CSMA/CD). In CSMA/CD, all nodes have the ability to sense signals on the network. When a node wishes to transmit, it ‘listens’ to the bus for signals. When there is no signals on the bus, it transmits. However, occasionally a collision will occur if two nodes sense a clear bus at the same. When a collision is detected, each device stops transmitting and then retransmits at another time. Ethernet is defined in a standard called IEEE 802.3. • Token ring—a LAN access method, or protocol, based on a ring topology. The token ring operates by continually passing special data packets called tokens between nodes on the network. Workstations with data to send capture a free token and attach data along with addressing information. A busy token with data cannot be used by other nodes. When the data arrives at the destination, the data is replaced with an acknowledgment and sent back to original sending node. ITITFact Fact A ‘phreak’ is a person who breaks into the telephone network illegally. Pheaks typically try to make free long-distance phone calls or to tap phone lines. However, the term is sometimes used to include anyone who breaks or tries to break the security of any network. Network hardware Networks are not just made up of cables connected to such devices as computers, terminals and printers. Several special-purpose hardware devices are needed to successfully construct a network. 92 Core Network interface card Each computer connected to the network requires a special network interface card. A network interface card (NIC, pronounced ‘nick’) is an expansion card that fits into an expansion slot of a computer or other device, so that the device can be connected to a network. Most NICs require a network cable connection and have connectors on the card for different types of cables. The type of NIC depends upon the type of network. NICs package data according to the rules of the network operating system and transmit data along the connecting network cable. Servers A server is a computer that provides services to other computers on the network. Individual computers log on to the server, which gives them access to files, applications or peripheral devices. There are different types of servers, such as file servers, print servers, mail servers and Web servers. • A file server is a controlling computer in a network that stores the programs and data shared by users. The files stored on this server can be retrieved by any node provided it has access rights. • A print server is a computer in a network that controls one or more printers and stores data to be printed. A print server can be used with or without a file server. • A mail server is a computer in a network that provides email facilities. It stores incoming mail for distribution to users and forwards outgoing mail to appropriate devices. • A Web server is a computer in a network that provides a connection to the Internet. All the Internet traffic is directed through this server. Routers and switches Data often travels between networks. This requires networks to be linked to other networks, paths to be established between the networks and signal strength to be boosted. Devices used to determine the path between networks include: • Router—a device that determines where to send a data packet between at least two networks. Its decision is based on its current understanding of the networks. A router maintains a table of the available routes and their conditions. It uses this table together with distance and cost algorithms to determine the best route for a given data packet. Data packets often travel through a number of networks and routers before arriving at their destination. • Switch—a device that directs data packets along a path. It may include the function of a router. In general, a switch is a simpler and faster mechanism than a router as it does not maintain knowledge of the networks. A switch is not always required in a network. Many LANs are organised so that the nodes inspect each data packet. Bridges and gateways The actual interconnection between networks is achieved using devices such as bridges and gateways. • Bridge—a combination of hardware and software to link two similar networks. It often connects LANs that use the same protocol, such as Ethernet. A bridge Communication systems 93 examines each data packet on a LAN and forwards any data packets addressed to a connected LAN. Bridges are faster than routers because they connect networks that are using the same protocol. • Gateway—a combination of hardware and software to link two different types of networks. This usually involves converting different protocols. For example, a gateway could be used to convert a TCP/IP packet to a NetWare IPX packet. A signal may be corrupted due to long distances or interference from electromagnetic fields. A repeater is used to rebuild a fading signal to its original strength and shape before transmitting it onwards. It ensures that the data is received as it was sent. A network repeater is used in a LAN to connect network segments. Repeaters are less intelligent than a bridge or gateway. Hubs A hub is a central connecting device in a network. Data arrives at the hub from one or more devices and is forwarded out using just one cable (see Figure 3.13). For example, four cables from three computers and a printer are connected to a hub and then a single cable connects the hub to a server. A hub can also include a router. Most hubs were originally passive. The data simply passed through the hub without any change. Intelligent hubs are more frequently used in today’s networks. They often contain a CPU and network operating system. This allows them to perform some of the functions of a server. 24 computers Switch gh Hi k lin ed e sp Each computer on a 10 Mb/sec lin Switch Computers sharing 10 Mb/sec line Server Hub Hub Hub Figure 3.13 Network hardware. Transmission media Data is transferred along a transmission medium. The capacity of the transmission medium is called the bandwidth, and it is measured in bits per second. A transmission medium with a high bandwidth can transfer more data. Transmission media are categorised as either wire transmission or wireless transmission. Wire transmission transfers the data through wires and cables. These cables must be protected from damage, they take up space, and they can be difficult to install. However, wire transmission can carry large amounts of data with little interference from other signals. Wire transmission media include twisted-pair, coaxial or fibre-optic cable (see Figure 3.14). 94 Core • Twisted-pair cable consists of two thin insulated copper wires, twisted to form a spiral. Twisting reduces the amount of interference from other cabling. The two main types of twisted-pair cables are unshielded twisted-pair (UTP) and shielded twisted-pair (STP). UTP is the most common. STP is used in ‘noisy’ environments where its shield protects against excessive electromagnetic interference. Twisted pair is the slowest medium, with a bandwidth up to 60 Kbps. • Coaxial cable (or coax, pronounced ‘co-axe’) consists of a single copper wire surrounded by an insulator, grounded shielding and an outer insulator. The shielding allows data to be transmitted with little distortion. It is commonly used over distances of less than a few kilometres. The bandwidth for a coaxial cable is 10 Mbps. • Fibre-optic cable uses a laser of light to carry data in small glass fibres about the diameter of a human hair. It is free from electromagnetic and radio interference, is very secure and can transmit data at high speeds without errors. Fibre-optic cables are replacing conventional copper-wire cables. The bandwidth for fibre-optic cables is in excess of 400 Mbps. A single strand of optical fibre can carry thousands of telephone conversations. Twisted pair Fibre-optic cable Coaxial cable Conductor Insulator Covering Outer insulation Grounded shielding Cladding Insulation Glass optical fibre Inner conductor Figure 3.14 Wire transmission. Most LANs use either twisted-pair cable or coaxial cable. Fibre-optic cable is usually too expensive and difficult to install. There are two types of transmission used: baseband and broadband. Baseband networks use the entire capacity of the cable to transmit only one signal at a time. Most LANs are baseband. Broadband networks divide the cable so that several signals can be transmitted at the same time. Wireless transmission moves the data through air and space. It does not need a fixed physical connection between the source and the destination. Radio and television are examples of wireless transmission. Wireless transmission involves microwaves, satellites, wireless networks and mobile phones. • A microwave is a high-frequency radio signal sent through space in a straight line from one antenna to another. Microwaves have been used for several decades to transmit both voice and data. Antennas are placed on tall buildings or mountain tops to continue transmission over long distances (see Figure 3.15). Microwave transmission is faster than telephone lines or coaxial cables. Even though it is reasonably error free, weather conditions or such objects as trees and buildings can obstruct the signal and affect the transmission. Communication systems 95 Antenna 50 km Antenna Signal Figure 3.15 Microwave transmission. • A satellite is a specialised receiver and transmitter that is launched by a rocket and placed in orbit around the earth. A signal is sent from one ground station to the satellite, which receives and retransmits the signal to another ground station. Each ground station uses a satellite dish to send and receive the signals (see Figure 3.16). Satellites can transmit large amounts of data over long distances and at great speeds. There are hundreds of satellites currently in operation. They are used for weather forecasting, television broadcasts, radio communications and Internet communications. • Wireless LANs use radio waves, not cables, as their transmission medium. Problems in maintaining signal quality and concerns about electromagnetic radiation have not made wireless networks popular. • Mobile phones transmit data to a grid of cellular stations that are linked to the wiretransmission telephone network. Mobile phones use radio waves to communicate with the cellular station. They are portable devices, and monthly service fees and percall costs are higher than those for a normal telephone in most countries. Figure 3.16 A satellite dish. Network software Each computer in a network must have appropriate network software. This software contains the ‘rules’ for communication and determines how the network devices send and receive data. Network software is organised by a network administrator. A network administrator is a person who manages a network within an organisation. His or her responsibilities include network security, installing new applications, distributing software upgrades, monitoring daily activity, enforcing licensing agreements, developing a storage system and providing routine backups. These responsibilities are completed using the network operating system. Network operating systems A network operating system (NOS) is an operating system that is designed primarily to support computers connected on a LAN. Some common examples of network operating systems are Novell’s Netware, Artisoft’s LANtastic and Microsoft’s Windows NT (see Figure 3.17). One part of the network operating 96 Core system resides in each node and another resides in the server. The network operating system performs a range of different tasks. Figure 3.17 Windows NT Web site. Network operating system tasks The network operating system controls the flow of data between the devices on the network and controls the requests for data. It organises messages from nodes until the network is ready to process each message. The tasks performed by a network operating system include: • administration—adds, removes and organises users; installs hardware devices and software applications; and carries out maintenance operations, such as backup • file management—gives users access to the remote hard disks on the server and provides a file system and the ability to manage a network directory • applications—handles requests from users to share data and applications • resource management—allows network devices, such as printers and modems, to be shared; assigns users to printers; and orders print jobs • security—monitors and restricts access to network resources. Logon and logoff procedures When a user connects to a network, the user is granted a certain level of access. This is done during the process of logging on. Logon is the procedure used to get access to the network. The user is identified by means of a user ID and a password. The user ID usually conforms to a limited length, such as eight characters; and the password often must contain at least one digit. The password is an important security measure and must be not be readily available or an easily guessed word, such as a nickname. The network must also keep passwords secure. The password file should be encrypted and protected from unauthorised access. Network systems may require users to frequently change their passwords as a security measure. Communication systems 97 The logon procedure usually allows the user two or three attempts to enter the correct name and password. Mistakes can occur in typing or in the communication link. After logging on, the user is given access to only those features authorised by the network administrator. The correct procedure for logging off should always be carried out. It clears the communication line for another user. Intranets An intranet is a private network that uses a similar interface to the Web. It usually has a connection to the Internet and consists of many interlinked LANs. The main purpose of an intranet is to share information and computing resources among the employees of an organisation. The information may be staff news, product information, telephone directories, policies, employee manuals or calendars. When the intranet provides access to the Internet, it is through firewalls. Firewalls monitor the flow of data in both directions to maintain the security of the organisation. An extranet is an intranet that is accessible to customers, suppliers or others outside the organisation. It provides such information as product descriptions, answers to frequently asked questions, warranties and how to contact customer service. Organisations are attempting to make extranets easy to use and a source of relevant information. ITITFact Fact Infosurfing is using the Internet to get the maximum information in the shortest amount of time. It favours textual content over images. Infosurfing is practiced by people who become impatient waiting for multimedia to load or who just need to focus on text. Exercise 3.3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 98 Core Explain the difference between simplex, half-duplex and full-duplex mode. Describe the function of a protocol. Explain the difference between the YModem and the ZModem protocols. Describe an X.25 protocol. What is the difference between a LAN and a WAN? Describe the advantages of using a private leased line. What is packet switching? Explain the difference between a bus topology and a ring topology. Describe the way a LAN transmits messages using an Ethernet and using a token ring. Describe the collision-detection mechanism used on an Ethernet. Describe four different types of servers. How does a router determine where to send a data packet? Explain the difference between a bridge and a gateway. What is a hub? 15 16 17 18 19 20 21 Describe three methods of wire transmission. Explain the difference between baseband and broadband. Describe microwave as a transmission medium. What are the responsibilities of the network administrator? Describe the tasks performed by a network operating system. Describe the process of logging on to a network. What is the main purpose of the Intranet? LEARNING ACTIVITIES 1 Gloria connected to a remote computer. She used the following communication settings: 7-bit ASCII, 1 start bit, 1 stop bit, odd parity, and 4800 baud. What is this type of transmission? Explain the type of error detection method used in this connection. What is one major deficiency of this method? Describe an alternative error detection method that would provide better results. 2 A LAN is to be constructed with seven nodes, using a ring topology. Draw a diagram to show this arrangement. How will this network transfer data? Describe how the network will overcome the problem of multiple users. 3 The management of a large organisation has decided to connect two LANs. What are some of the benefits to the organisation if the LANs are linked? One LAN uses the Ethernet protocol and the other a token ring protocol. Name a device that could be used to connect the LANs. What does this device do? 4 An organisation is planning to introduce two LANs, one in each of two different buildings on the same site. These networks are to be linked together. The organisation decides to install a bus network for both LANs. Draw a diagram to show this arrangement. How will each LAN transfer data? Describe how the network will overcome the problem of multiple users. Describe a device that could be used to connect the two LANs. 5 A large organisation uses a LAN that has a bus network topology. The network has a file server, one print server, a printer and six workstations. Draw a sketch of this network. Describe the function of the print server. A mail server is to be added to the network. What is the function of a mail server? Describe any procedures that could be used to provide security for files on the network. 6 Investigate a LAN either at your school or in the local community. Draw the topology of the LAN. Describe the advantages of this network topology over other topologies. List the types of problems likely to be encountered on this type of network. What network software controls the functions of this LAN? List the tasks performed by the network software. 7 Explain the differences between an intranet and the Internet for transmitting and receiving information in a communication system. What do these communication systems have in common? Communication systems 99 3.4 Other information processes All information processes play a role in communication systems, including collecting, processing and displaying. Collecting Collecting data for a communication system involves generating the data to be transmitted. For example, a person using an ATM generates data by inserting a transaction card and typing a request on a keyboard. This data is collected and transmitted to the bank’s computer. Another example is when a salesperson in a shop scans the barcodes of a product. The product’s details are collected and transmitted to a central computer. Collecting data involves a range of collection devices to gather different types of data. The choice of device depends on the application and the type of data to be transmitted. Some collection devices include: • ATM terminals for electronic banking • EFTPOS terminals for a retail store • telephones for voice mail • keyboards for electronic mail • video cameras for a surveillance system. ITITFact Fact Internesia is an inability to remember on which Web site an item of information was located. People suffering from internesia often bookmark so many sites that they cannot find anything by using their bookmark list. Processing In a communication system, processing data is the manipulation of the data. After the data is collected, it must be converted into a form for transmission. This process involves encoding and decoding. Encoding and decoding Encoding involves converting data from its original form into another form for transmission. Decoding is the reverse process. It converts data from the form used for transmission back into the original form. For example, a telephone encodes the sounds from your voice into electrical pulses that can be transmitted along the telephone lines. The telephone receiving the call decodes the electrical pulses back to the sounds of your voice. The type of encoding and decoding depends on whether the original data is in analog or digital form. Analog data is represented by using continuous variable physical quantities, such as voltages. For example, a clock that displays the time by hands moving smoothly around the clock face is an analog device. At any moment, the clock will give you an instant measure of the exact time, since you can estimate parts of a second as the second hand moves. Most natural events in the real world, such as temperature, light and pressure, are in analog form. They change smoothly and slowly like the hands of the clock. Sounds, images and video are naturally in analog form. Analog signals are pulses, usually electrical or optical, in the form of a continuous wave. 100 Core Digital data is represented in the form of digits or numbers. For example, a digital clock shows the time as a certain number of hours and minutes. The time changes in a series of jumps. Numbers, text and other characters are naturally in digital form. Information technology works with data in a digital form. Digital signals are represented as a series of 0s and 1s. The form of the data (either analog or digital) and the transmission signal (either analog or digital signal) affects the quality of the data received and the cost of transmission. The quality of analog data depends on maintaining the exact wave as it moves through a wire or space. If it is corrupted in any way, there is no way of regenerating the wave. However, digital data is transmitted as a series of 0s and 1s, and it is possible to regenerate data that has been corrupted. That is, to reconstruct the data, it is only necessary to distinguish between a 0 and a 1. As discussed previously, common methods for error detection include parity checking, checksum and cyclic redundancy check. There are four encoding and decoding possibilities in transmission: • Analog data to analog signal. The wave shape of the data is encoded into the signal. A telephone encodes analog data in the form of sounds into analog signals suitable for the telephone line. If the signal is corrupted, there is no way of restoring the original analog data. • Digital data to analog signal. A series of 0s and 1s is encoded into a continuous wave. A modem encodes (or modulates) digital data from a computer into analog signals for the telephone line. When the analog signal is received by another modem, it decodes (or demodulates) the analog signal into digital data (see Figure 3.18). • Digital data to digital signal. A series of 0s and 1s is transmitted by sending it through a channel as a series of on and off pulses. Data transmitted in a LAN is digital data using a digital signal. There is a low error rate for this type of transmission. Digital data is encoded (changed) into a digital signal by the computer or a specific peripheral device. Computer Digital signal 1 1 0 1 0 1 0 1 0 0 Modem Analog signal 1 0 1 0 Phone line Modem 1 1 0 1 1 1 0 0 0 0 Digital signal Computer Figure 3.18 A modem encodes digital data to analog signals and decodes analog signals to digital data. Communication systems 101 • Analog data to digital signal—the wave shape of the data is encoded into a series of 0s and 1s. This process of generating digits or numbers is called digitising. Images are digitised using such devices as scanners, and sounds are digitised using a process called sampling. The transmission of television using a cable is an example of analog data to digital signal. Attachments Attachments are computer files, such as text, video, sound, pictures or programs, sent with an email message. Clearly, the receiver of the email must have an application that can read or convert the file. When sending attachments, it is important to include a brief explanation in the main body of the email. The explanation should state that there is an attachment and give its filename and its format. All email programs need to ‘encode’ file attachments into characters since the Internet TCP/IP protocol does not allow transmission of binary code. Many email programs use the Multipurpose Internet Mail Extension (MIME) protocol to do this. It is an Internet protocol that is able to negotiate many different operating systems and types of software. It has been a major step forward in the ability to exchange files other than plain-text files. Client-server architecture Client-server architecture describes the software relationship between the client (user) and the server. A client sends a request to a server according to an agreed protocol, and the server responds. It is similar to a customer (client) sending an order (request) on an order form (protocol) to a supplier (server) for particular goods (data). Client-server architecture provides a convenient way to interconnect programs that are distributed across different locations of a network. Most business applications today use a client-server architecture, as does the Internet. The Web browser is a client program that requests services from a Web server to complete the request. Ideally, a server should provide a user-friendly interface so that clients are not aware of the information technology that is providing the service. Displaying Displaying is the presentation of information in the form of text, numbers, images, audio or video. A range of hardware and software combinations can be used to display different types of information in a communication system such as a telephone and an EFTPOS terminal: 102 Core • Telephone. Audio information is displayed using a telephone. A telephone contains a transmitter that converts sound into a signal suitable for the transmission medium and a receiver that converts the signal back into sound. When a message is retrieved from voice mail, the telephone is the display device used to listen to the message. • EFTPOS terminal. Information about EFTPOS transactions is displayed using an EFTPOS terminal. The EFTPOS terminal contains a screen to display the name and price of the product being purchased. When the customer’s bank has been contacted, then the EFTPOS terminal displays the approval if funds are available. The EFTPOS terminal provides a receipt for the customer of all transactions. ITITFact Fact Netscape sometimes uses a cartoon character called Mozilla as a mascot for its products. Mozilla was Netscape’s original name for Navigator. It was used by Navigator’s developers as a follow up to Mosaic. Exercise 3.4 1 2 3 4 5 6 7 8 9 List five collection devices used in communication systems. Explain the difference between encoding and decoding. What types of data are naturally in analog form? How are digital signals represented? Describe the processing of digital data to an analog signal. Describe the processing of analog data to a digital signal. How does the client-server architecture work? Describe the Internet as a client-server architecture. What information is displayed by an EFTPOS terminal? LEARNING ACTIVITIES 1 What is the difference between an analog and a digital signal? Draw a diagram to illustrate your answer. Describe one device that converts analog and digital data. 2 Information resources sharing is usually provided by a file server or a client server method. Illustrate the difference between these methods when a request is made to an account file for all customers who have a balance of over $5000. 3 EFTPOS terminals are used to carry out some of the information processes in a communication system. Examine EFTPOS terminals and classify the procedures in terms of the information processes. 4 Create an email message that contains an attachment, such as a simple graphic. The email is to contain a brief explanation of the attachment. a Send the email message to a friend and a carbon copy to the teacher. b Check that your friend received the email message and could open the attachment. Communication systems 103 3.5 Issues related to communication systems Both positive and negative impacts arise in the use of communication systems. In this section, we examine some of the social and ethical issues raised by communication systems. Messaging systems Messaging systems have improved communication between people; however, they have raised a number of issues: • Social context. Ideas delivered by messaging systems appear less forceful and caring than ideas delivered personally. Messaging systems have difficulty when communication depends on users expressing their feelings. • Danger of misinterpretation. Communication often depends on the context, inflection in the speaker’s voice, and body language. For example, ‘this has been a great day’ could have a negative or a positive meaning depending on the way the words are spoken. This phrase could easily be misinterpreted using email or a fax. There are also dangers with voice mail and the telephone, as body language is not communicated. • Power relationships. Messaging systems may change the relationship between people in an organisation. For example, email could provide an easy avenue for the lowest paid worker of an organisation to provide information to the senior manager. The normal method of communication through middle management is affected. • Privacy and confidentiality. A characteristic of messaging systems is that the messages are stored. Email and voice mail store messages on servers, and these can be accessed by the people who are providing the service. Hackers may also break the security of these servers. Telephone conversations can be intercepted, and fax messages can be read by anybody near the machine. Clearly, messaging systems do not guarantee the privacy and confidentiality of messages. • Electronic junk mail. Unwanted mail is a problem for messaging systems. People can send an email message to one person or thousands of people (spamming) very easily. It may simply be a message about a product or service. However, if a person receives hundreds of junk emails each day, it takes up valuable time. Prohibiting this practice would be difficult and compromise our free society. • Information overload. This term refers to the enormous amount of information that people have to absorb. Messaging systems are a source of information. The large amount of email and voice mail received by some people has increased their workload and caused stress. There is often an expectation that people will respond more quickly to email and voice mail than to a letter or to a telephone message written down by someone else. ITITFact Fact The volume of information that is absorbed in one week at the end of the 20th century is more than a person received in a lifetime at the beginning of the 20th century. 104 Core Internet Many social and ethical issues have been raised by the use of the Internet. Some of the issues include Internet trading, censorship and Internet banking. Internet trading Internet trading, or e-commerce, is increasing at a staggering rate to meet the needs of consumers. Most experts predict that Internet trading and the number of customers on the Net will continue to rise in the next few years. E-commerce is presently valued at approximately $200 billion. Many businesses are establishing a Web site to promote their goods and services. The Internet provides significant advantages for consumers, such as more information about products and services, shopping globally and increased competition that has resulted in lower prices. Some of the implications of Internet trading include: • Taxation. Present governments have been unable to tax transactions on the Internet. The increased business on the Internet will reduce the money governments receive from their goods and services taxes. • Employment ramifications. The increase in Internet trading requires more people to be employed in the information technology industry. It may result in fewer shop fronts and fewer people employed to provide this type of service. • Nature of business. Traditional businesses that provide opportunities for human interaction are being challenged. For example, people are choosing to buy their groceries using the Internet instead of visiting the store (see Figure 3.19). People can complete some of their business at home without the hassle of travelling. • Trade barriers. The developments in communication technology have made trade barriers between countries irrelevant. The whole issue of where one country ends and another one begins is open to question. People are buying and selling goods on the Internet with little thought given to the countries involved or to trade barriers. Figure 3.19 Internet shopping. Communication systems 105 Censorship One of the most controversial issues to have arisen with the Internet is censorship. The Internet provides access to a large amount of offensive material, such as pornography, racism and violence, and the information is not hard to find. The Internet allows children to access any material they wish, either deliberately or unintentionally. Some people believe that offensive material should be banned, while others argue that banning any material compromises our free society. There have been many unsuccessful attempts to censor material on the Internet by governments and law enforcement bodies all around the world. The Internet Industry Association (IIA) represents Australian ISPs (see Figure 3.20). It has released a code of conduct that deals with censorship of online content. The code requires ISPs to remove offensive content from their servers and to block access to classified material hosted on overseas sites. The federal government has passed a law requiring ISPs to subscribe to the IIA’s code. The difficulty with enforcing censorship is the enormous number of Web sites and the fact that thousands of new sites are published daily. Monitoring Web sites on a global basis is impossible. Clearly multinational agreement is needed on offensive material. However, this agreement may be difficult to obtain and regulate. The prime responsibility for preventing children from accessing offensive material rests with parents and teachers. Figure 3.20 The IIA’s Web site provides access to the IIA’s code of practice. Internet banking Internet banking allows customers to view their account balances and transaction histories, transfer money between accounts, and pay bills using Bpay. It provides banking services 24 hours a day but cannot cater for cash withdrawals or for cash or cheque deposits. Issues arising from Internet banking include: • Security. All banks are determined to make their online banking services safe from inference and secure for customer details. Data encryption is used to secure the data transfer between the customer’s computer and the bank’s computer. • Changing nature of work. People working for the bank are not carrying out the services provided by Internet banking. Banks require more people with information technology skills and fewer people with banking skills. 106 Core • Branch closures and job loss. With many customers using Internet banking, EFTPOS and ATMs, there is less need to access the facilities provided by a bank branch. This has resulted in branch closures and job losses. Radio and video The number of services delivered by the Internet is rapidly increasing. Two examples of this development are radio and video. There are currently thousands of Web sites broadcasting radio from around the world. These radio stations cater for a variety of tastes. For example, it is possible to listen to a major sporting event live on the Internet. In addition to the Internet providing radio services, there are many Web sites with video. Video on the Internet is replacing videotapes and other media. It allows organisations to create unlimited video channels. These video channels are used for sales, training, communication and a host of other purposes. Video on the Internet saves time, reduces costs and provides the ability to view the video globally. The size and quality of the video is currently less than that of a normal television broadcast; however, it will improve with developments in technology, such as increasing bandwidth. ITITFact Fact A ‘mouse potato’ is an Internet user who spends an excessive amount of time online and is addicted to the Internet. It comes from the term ‘couch potato’. Working from home Communication systems have led to an increase in the number of people who either choose or are asked to work from home. This is called telecommuting. Telecommuting is working at home and electronically communicating with the office (see Figure 3.21). Even though working at the office is not likely to disappear, advances in telecommunication are likely to make telecommuting more common in the future. Factors that will affect the future of telecommuting include the availability of bandwidth, the perceived value in telecommuting, and the opportunities to work collaboratively across large distances. The Internet has provided the means for a new type of organisation to develop whose employees work almost entirely through telecommunication with an occasional face-to-face meeting. The main advantages of telecommuting are greater flexibility in work hours; saving money on transport, clothing and food; and saving time. In particular, it benefits people who are physically impaired or required to look after small children. The employer saves on overheads, such as office space and furniture. However, working from home Figure 3.21 Working from home. Communication systems 107 can have its disadvantages. People can miss the social and professional contact offered by an external place of work. They experience feelings of loneliness and isolation. Telecommuting can also blur the distinction between work and home life. The home is no longer a place where the pressures of work can be forgotten, and work may be interrupted by domestic chores. There are many other issues that arise when people work from home, such as: • Is there going to be a greater investment in the equipment needed to cater for telecommuters? • Who is responsible for the maintenance of the equipment used in the home? • Does the telecommuter have the same loyalty to an employer as an employee working in an office? • How secure are sensitive documents in the home? Exercise 3.5 1 2 3 4 5 6 7 Why is there a danger of misinterpretation with messaging systems? How are privacy and confidentiality a concern with messaging systems? What is electronic junk mail? Why is it a problem? Why are businesses establishing a Web site? What is the effect of Internet trading on employment? How are trade barriers affected by Internet trading? Describe the method used by the IIA to deal with offensive material on the Internet. 8 Describe three issues that have arisen from Internet banking. 9 Why is video used on the Internet? 10 Outline the advantages and disadvantages of telecommuting. LEARNING ACTIVITIES 1 Outline some of the changes to the banking industry as a result of new communication systems. Are these changes positive or negative? Give a reason for your answer. How have these changes affected the nature of jobs in the banking industry? 2 Alanna finds it convenient to shop on the Internet. However, she is concerned about the issue of security. Explain why security is a problem. Describe two measures that have been taken to overcome these security problems. Investigate the issue of security by searching the Internet. Compare your results with another student in your class. 3 ‘Information technology has resulted in people spending more time inside their houses and less time exploring the world.’ Discuss this statement in terms of developments in communication systems. 4 Communication systems are having positive and negative impacts on our society. Briefly describe some of the changes to our society caused by communication systems. What do you think is the greatest concern with communication systems? Give a reason for your answer. 5 ‘Offensive material should be banned from the Internet.’ What is your view on censorship of the Internet? Give reasons for your answer. 108 Core Chapter review PART A Select the alternative (A, B, C or D) that best answers the question. 1 Cyclic redundancy check is an error detection method that: A uses a division process B counts the number of bits in a data packet C checks for redundant data D performs a check in cycles 2 A seven-bit ASCII character 1001011 was sent with a parity bit of 1. The character was received as the ASCII character 1000011 and a parity bit of 1. A Data was sent using an even parity and interpreted as correct B Data was sent using an even parity and interpreted as incorrect C Data was sent using an odd parity and interpreted as correct D Data was sent using an odd parity and interpreted as incorrect 3 The baud rate is the: A number of bits that can be transmitted in one second B transmission of data at the same rate C maximum number of data symbols or electrical signals that can transmitted in one second D number of bauds that can be transmitted in one second 4 LANs often store application software on more a powerful computer called a: A Web server B mail server C file server D print server 5 A person uses a debit card to purchase goods in a shop. The transaction details are transferred to the bank’s computer. This data is protected during transmission by: 6 7 8 9 10 A a password B protected transmission media C data encryption D a firewall A combination of hardware and software to link two similar networks: A bridge B switch C hub D router A data packet is sent through a LAN to a terminal. The data packet passes through each node until it reaches the terminal or returns to the sender. The network topology is a: A star B ring C bus D TCP/IP XModem and ZModem are: A file transfer protocols B types of modems C error checking methods D network access methods Each device in a network is called a: A node B terminal C server D workstation The bandwidth, from lowest to highest, is: A fibre-optic cable, coaxial cable, microwave B coaxial cable, microwave, fibre-optic cable C microwave, coaxial cable, fibre-optic cable D coaxial cable, fibre-optic cable, microwave Communication systems 109 Chapter review PART B For each of the following statements, select from the list of terms the one that most closely fits the statement. Write the letter corresponding to your choice next to the statement number. Statements 1 A method of checking for errors in data transmission using a division process. 2 A set of rules that governs the transfer of data between computers. 3 A network topology that uses a central computer with each device connected directly to it. 4 The number of bits that can be transmitted in one second. 5 Data represented in the form of digits or numbers. 6 An agreement that results in the exchange of information. 7 A method of checking for errors in data transmission by counting the number of bits in a data packet. 8 A central connecting device in a network. 9 It allows communication with other people by storing and forwarding spoken messages. 10 LAN access method that allows data to be transmitted simultaneously to all nodes on the network in both directions. 11 It allows communication with other users by sending and receiving electronic messages using a computer. 12 The maximum number of data symbols or electrical signals that can transmitted in one second. 13 A network topology where all devices are attached so that the path is in the shape of a continuous circle. 14 A device that directs data packets along a path. 110 Core 15 Data represented by using continuous variable physical quantities, such as voltages. List of terms a analog b baud rate c bps d checksum e CRC f digital g email h Ethernet i j k l m n o handshaking hub protocol ring star switch v-mail PART C Write at least one paragraph on each of the following questions. 1 What is a communication system? List the five basic components of a communication system. Identify these components when using email. 2 One method of error detection is parity checking. How does this method work? Describe one specific error that a parity check would fail to detect. 3 Explain the difference between the following pairs of terms: a Coaxial cable and optical-fibre cable b Host computer and terminal c Asynchronous and synchronous d Error detection and error correction. 4 Briefly describe the three network topologies. 5 Draw a diagram to explain the communication link between two computers. It should illustrate any encoding and decoding that is carried out by the link. 6 Identify a social and ethical issue involved in a communication system. Outline both the positive and negative sides of the issue. Options Chapter 4 Chapter 5 Chapter 6 Chapter 7 Transaction processing systems Decision support systems Automated manufacturing systems Multimedia systems 4 chapter TRANSACTION PROCESSING SYSTEMS Outcomes Overview This chapter examines the characteristics of transaction processing systems. It investigates specific examples of real-time transaction processing and batch transaction processing. The information processes of storing and retrieving, collecting, and analysing for a transaction processing system are examined. The chapter concludes by outlining the social and ethical issues that relate to transaction processing systems. • applies an understanding of the nature and function of information technologies to a specific practical situation (H1.1) • explains and justifies the way in which information systems relate to information processes in a specific context (H1.2) • analyses and describes a system in terms of the information processes involved (H2.1) • develops solutions for an identified need which address all of the information processes (H2.2) • evaluates the effect of information systems on the individual, society and the environment (H3.1) • demonstrates ethical practice in the use of information systems, technologies and processes (H3.2) • proposes ways in which information systems will meet emerging needs (H4.1) • assesses the ethical implications of selecting and using specific resources and tools (H5.2) 4.1 Characteristics of transaction processing systems Transaction processing systems (TPSs) collect, store, modify and retrieve the transactions of an organisation. A transaction is an event that generates or modifies data that is eventually stored in an information system. Some examples of TPSs are selling goods using a point-of-sale (POS) system, processing credit card payments, or making a motel reservation. TPSs differ in character from other types of information systems in that they directly support business operations. They must be designed in conjunction with the organisation’s procedures. The transaction data obtained from a TPS is stored in an information system and processed using a range of application software. It usually involves updating a database to reflect changes to the transaction data. The main information processes of a TPS are collecting and storage. If a TPS is used to record a sale and generate a receipt, the transaction data is collected at the POS terminal and then stored using an online database. The four important characteristics of a TPS are rapid response, reliability, inflexibility and controlled processing. • Rapid response. Fast performance with a rapid response time is critical. Businesses cannot afford to have customers waiting for a TPS to respond. The turnaround time from the input of the transaction to the production of the output must be a few seconds or less. • Reliability. Many organisations rely heavily on their TPS. A breakdown will disrupt operations or even stop the business. For a TPS to be effective, its failure rate must be very low. If a TPS does fail, then quick and accurate recovery must be possible. This makes well-designed backup and recovery procedures essential. • Inflexibility. A TPS wants every transaction to be processed in the same way regardless of the user, the customer or the time of day. If a TPS were flexible, there would be too many opportunities for non-standard operations. For example, a commercial airline needs to consistently accept airline reservations from a range of travel agents. Accepting different transaction data from different travel agents would be a problem. • Controlled processing. The processing in a TPS must support an organisation’s operations. For example, if an organisation allocates roles and responsibilities to particular employees, then the TPS should enforce and maintain this requirement. A TPS minimises the organisation’s costs by reducing the number of times that data must be handled and by providing timely updates to the database. There are two types of transaction processing: batch transaction processing and real-time transaction processing Transaction processing systems 113 Batch transaction processing Batch transaction processing collects the transaction data as a group, or batch, and processes it later. It has a time delay. Transactions are collected and held for processing until it is convenient or economical to process them. Waiting for a large volume of data generally results in lower processing costs per transaction. The transactions are collected and stored offline on a magnetic tape or on paper. The time delay before processing or completing a batch run could be several minutes, hours or even days. For example, the clearance of cheques is a batch process that takes several days. Batch processing is used when a time delay will not decrease the usefulness of the results. A batch approach is used for generating pay cheques and other forms of paper output. ITITFact Fact The term ‘batch’ originated when punch cards were the usual input medium. A batch of cards represented a computer program and was stored in sequence in a box. A computer operator fed the cards into the computer. The output was obtained the next day. Batch processing is carried out by large organisations using a mainframe or mid-range computer (see Figure 4.1). It involves a large batch of an identical data type, such as payroll or stock information. For example, a payroll application collects data for each employee, such as the hours worked and overtime earned. This data is processed in batches by updating a payroll master file. After the master file is updated, the pay slips are created for all employees in the organisation. Batch programs are often run at night when there is less demand for the information system. There are three disadvantages in batch processing: • All processing must wait until a set time. The processing schedule is predetermined. • Errors cannot be corrected during processing. • Sorting the transaction data is expensive and time consuming. Figure 4.1 Batch processing using a mainframe computer and magnetic tape. 114 Options Batch transaction processing was the only feasible form of transaction processing when data was stored on punch cards or tapes. However, advances in information technology have resulted in the ability to do real-time transaction processing. Real-time transaction processing Real-time transaction processing is the immediate processing of data. It provides instant confirmation of a transaction but does require access to an online database. Real-time processing involves using a terminal or workstation to enter data and display the results of the TPS. It uses a computer network to link the terminals to the mainframe computer and to access the online database. Real-time processing involves a large number of users who are simultaneously performing transactions to change data. Even though each individual user is processing a relatively small number of records, their requests are being made at the same time. Two common examples of real-time processing are airline reservation systems and banking transaction systems. ITITFact Fact Real-time transaction processing is often called OLTP (online transaction processing). An online database is updated as the result of a business transaction. The two main concerns with real-time processing are concurrency and atomicity. • Concurrency ensures that two users cannot change the same data at the same time. That is, one user cannot change a piece of data before another user has finished with it. For example, if an airline ticket agent starts to reserve the last seat on a flight, then another agent cannot tell another passenger that a seat is available. • Atomicity ensures that all of the steps involved in a transaction are completed successfully as a group. If any step fails, no other step should be completed. For example, a banking transaction may involve two steps: withdrawing money from a cheque account and transferring it into a savings account. If the first step (the withdrawal) succeeds, then the second step (the transfer) must succeed; otherwise, the entire transaction is abandoned. This ensures that the withdrawal isn’t recorded twice and the transfer only once. Every real-time TPS has a user response-time delay caused by its transaction processing activities. For a TPS to be classified as ‘real-time’, the response-time delay must be acceptable for that application. For example, a computer system controlling an aircraft guidance system requires a response time limited to a fraction of a second. However, in an airline reservation system, a response time of several seconds would be satisfactory. In this case, instantaneous access to any or all of the data is either unrealistic or uneconomical. The main disadvantage associated with real-time processing is the tremendous expense. Both the hardware and software costs of this type of processing exceed those of batch processing. Transaction processing systems 115 Terminal Terminal Terminal User Interface TP Monitor Application DBMS Database Figure 4.2 Real-time transaction processing. Transaction processing monitor A transaction processing monitor (TP monitor) is software that allows the transaction processing application programs to run efficiently. It manages the sequence of events that are part of a transaction. A TP monitor provides a standard interface between the input devices (such as terminals), the transaction processing application programs, and the DBMS. It also provides data security by ensuring that transactions do not get lost or corrupted. A TP monitor is used in conjunction with a particular operating system. Real-time and batch processing There are a number of differences between real-time and batch processing. These are outlined below: • Each transaction in real-time processing is unique. It is not part of a group of transactions, even though those transactions are processed in the same manner. Transactions in real-time processing are stand-alone both in the entry to the system and also in the handling of output. • Real-time processing requires the master file to be available more often for updating and reference than batch processing. The database is not accessible all of the time for batch processing. • Real-time processing has fewer errors than batch processing, as transaction data is validated and entered immediately. With batch processing, the data is organised and stored before the master file is updated. Errors can occur during these steps. • Infrequent errors may occur in real-time processing; however, they are often tolerated. It is not practical to shut down the system for infrequent errors. 116 Options • More computer operators are required in real-time processing, as the operations are not centralised. It is more difficult to maintain a real-time processing system than a batch processing system. Data validation Data validation is used to check the entry of transaction data. It involves procedures to ensure that transactions are correct and have been accurately stored in the database. Data validation involves transaction initiation and field checking. • Transaction initiation is used to acknowledge that the TP monitor is ready to receive the transaction data. It is used in real-time processing to eliminate a number of possible errors. Some TPSs add an entry time to the transaction data in an attempt to trace the data if it is lost. • Field checking occurs when the transaction data is entered into a database. The data is organised into files, records, fields and characters. Data validation is carried out by checking the fields, using a range check, list check, type check or check digit as described in Chapter 2. Even though data validation is essential, it is impossible to validate all the data in the system. For example, a user may incorrectly type ‘45’ instead of ‘54’. This simple transposition is often difficult to detect. There may be no reason to question this type of error. Historical significance of transaction processing systems Transaction processing was the first type of information system. TPSs were used during the 1950s when the electronic computer became available for business use. The first commercially available electronic computer was called UNIVAC (Universal Automatic Computer). It was designed by John Presper Eckert and John William Mauchly. The first UNIVAC was delivered to the U.S. Bureau of Census. It could process both numerical and alphabetical calculations with ease. UNIVAC was used by organisations to batch process business transactions, such as paying employees and recording customer purchases and payments. These initial applications of a TPS are still important today. Figure 4.3 UNIVAC. Transaction processing systems 117 Manual transaction systems Manual transaction systems are business systems that operate without the use of machines. People are used to record the data about the business activities. For example, a manual POS system has eleven operational steps performed by a sales assistant to sell a product to a customer: 1 Examine the product and determine the product price. 2 Record the product price on the sales slip and add it to the total price of all selected products. 3 Repeat steps 1 and 2 for subsequent products. 4 Check the total price of all the products selected. 5 Inform the customer of the total price and wait for payment. 6 Receive payment for the products. 7 Calculate the amount of change owing to the customer. 8 Give the selected products, a copy of the sales slip, and the change to the customer. 9 Repeat steps 1 to 8 for the next customer. 10 At the end of the business day, total all sales slips to check that the money collected is correct. 11 Do a stocktake to count all products remaining. Check that the stock remaining equals the stock at the beginning of the business day minus the stock sold. The manual POS system is typical of a manual transaction system. It is based on a clear set of rules that is followed by a person. These rules, or procedures, in a manual transaction system allow the system to be easily computerised. The procedures that can be computerised are identified by the data they are processing. In the manual POS system, the data being processed is the price of products sold and the receipt of payments. The manual procedures that collect, manipulate and store this data (steps 1, 2, 4, 6, 7, 10 and 11) could be computerised. A transaction is made up of steps 1, 2, 4, 6 and 7. These steps must be completed before the transaction is considered successful. Steps 10 and 11 update the organisation’s financial position and its stock inventory. They verify that the money collected and the remaining stock are correct. They give the assurance that the business has not had any money or stock misplaced or stolen. A stocktake is a simple procedure but very labour intensive when done manually. Computerisation of a manual transaction system provides significant benefits to the business. First, it increases the rate at which products are sold. There is less time taken for a customer to purchase a product. Customers are not waiting for a person to complete the manual procedures. A second benefit is that it provides information on which products are in demand. The business knows what products are selling from the inventory database. After a period of time, the business can modify its range of products to suit its customers’ purchasing habits. Computerisation of a manual transaction system aims to maximise the profits of the business. The design of a TPS should be based on detailed specifications of how transactions are performed and how to control the collection of data. The transaction data must be collected in a specific format and must match the operation of the organisation. 118 Options Exercise 4.1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 What is a transaction processing system? How do TPSs differ in character from other types of information systems? Describe four important characteristics of a TPS. What is batch transaction processing? List three disadvantages of batch processing. What is real-time transaction processing? Explain the difference between concurrency and atomicity. What is the main disadvantage associated with real-time processing? Describe a TP monitor. Why does real-time processing have fewer errors than batch processing? Why are infrequent errors in real-time processing often tolerated? List some ways in which data is validated in a TPS. Why is it impossible to validate all the data? When were TPSs first used? Describe the benefits of computerising a manual transaction system. LEARNING ACTIVITIES 1 Identify a batch transaction processing system. Describe the steps in its operation. What information technology is used in this TPS? Distinguish between the storage of the collected data and the storage of the processed data. 2 Identify a real-time transaction processing system. Describe the steps in its operation. What information technology is used in this TPS? 3 Compare and contrast batch and real-time transaction processing. 4 Analyse an existing TPS and determine its strengths and weaknesses. 5 Search the Internet for information on UNIVAC. Describe its technical and physical features. Why was the UNIVAC an important development for transaction processing? 4.2 Examples of transaction processing systems In this section, we examine the components of a TPS and examples of real-time transaction processing and batch transaction processing. Components of a transaction processing system People are an important component of a TPS. They can be classified as users, participants, and people in the environment: • Users of a TPS often take the data provided by the TPS and use it in another type of information system. This is a main feature of a TPS. For example, a POS system could provide stock inventory that is used by an automated manufacturing system. The users of the other information systems belong to the same organisation that owns the TPS. They are not interacting with the TPS Transaction processing systems 119 but are using the data provided by the TPS. Managers often take the data from a TPS and use it in other information systems to make strategic decisions. • Participants are the people who conduct the information processing. They are the people who do the work. Participants need to know what to do, how to do it and when to do it. They have an essential role in a TPS, and the success or failure of the system is dependent on them. However, the credit for the success of a TPS is often given to the information technology. Similarly, if the system fails, it is reported as a ‘computer error’ even when the error is human, such as entering the wrong data. • People from the environment are becoming participants in real-time processing systems as they directly enter transactions and perform validation. For example, when you withdraw money from an ATM, you are the participant of a TPS. The transaction is performed using real-time processing. You enter the data, such as account number, PIN and withdrawal amount. You also check and validate the data at the ATM. ITITFact Fact A transaction-processing designer (TP designer) is a person with the responsibility for translating business requirements into a TPS that will support the business. Examples of real-time transaction processing Three examples of real-time transaction processing are reservation systems, POS terminals and library loan systems. Reservation systems Reservation systems are used extensively in any type of business involved in setting aside a service or product for a customer to use at a future time. They are commonly used for people who are travelling, such as making a motel reservation or booking a seat on a train. These systems require an acceptable response time because the transactions are made in the presence of the customers. Some reservation systems automate decision-making functions, such as finding the flight that best meets the customer’s needs. The steps for a typical motel reservation system are as follows: 1 Answer customer enquiries about room availability and pricing for a certain period. 2 Place a reservation on one or more rooms and receive confirmation of that reservation. 3 Perform a cancellation of a reservation. 4 Take up the reservation on arrival. 5 Close off a customer’s account at the end of the stay and provide an invoice. 6 Perform consolidation activities, such as a ‘night audit’ in which transactions for the day are posted to the general ledger. 7 Provide a report and information management functions. 120 Options The motel reservation system is a TPS. It consists of participants, data/ information and information technology (see Figure 4.4). Steps 1 to 5 require realtime processing and are known as the ‘front office’ functions. Steps 6 and 7 are not so critical and are known as the ‘back office’ functions. In most reservation systems, the ‘front office’ is taken off line when the night audit is taking place. The night audit performs such tasks as backing up the reservations database, posting completed occupancy settlement transactions to the general ledger, executing periodic reports, and updating the data used for occupancy calcu-lations. The night audit is normally performed during the quiet business period, such as between 1.00 a.m. and 3.00 a.m. Periodic reporting functions, such as costing reports and occupancy reports, are scheduled during a night audit as they only need to be run infrequently. The night audit is often done using batch processing. Purpose • Sell a room and other services Information Processes • Collect customer details • Search database • Update transactions • Display room information Participants Data/ Information Information Technology • Motel staff • Confirmation • Personal computer • Manager • Customer account • DBMS • Room details • EFTPOS • Receipt/reports Information System Figure 4.4 Motel reservation system. Transaction processing systems 121 Point-of-sale terminals POS terminals are used by retail stores to sell goods and services (see Figure 4.5). In large retail organisations, POS terminals send inventory data to a central computer when the sale is made. The central computer is usually a mainframe or mid-range computer that does the processing for the entire chain. If the POS terminal immediately processes the transaction data, it minimises the costs of batch handling. To accomplish this centralised processing of the transaction data, the data is converted to a form that can be easily transmitted through a communication system. Purpose • Sell goods and services Information Processes • Scan product • Update product inventory • Search database • Display product information Participants Data/ Information Information Technology • Store staff • Barcode • POS terminal • Computing personnel • Product details • Central computer • Receipt • Barcode reader Information System Figure 4.5 POS system. One of the advantages of a POS terminal is that the correct price of the product is received once the product number is entered. The product number is usually entered using the barcodes on the product. Barcode readers are used to read the barcodes and identify the product. Once the product is identified, the POS terminal can provide the price and any other relevant information about the product (see Figure 4.6). 122 Options Customer receipt MIS Server UP C/ qu an tity Inventory database UPC POS system UP tity an qu C/ UPC Price Purchase database Inventory report Product database Figure 4.6 System flowchart for a POS system. Library loan system A library loan system is used to keep track of items borrowed from the library. When a person borrows a book, the librarian scans the barcode on the person’s membership card and the barcode on the book. This information and the date are immediately recorded on the library database. The library loan system completes each transaction in real time. (See Figure 4.7.) A library loan system has many similarities with a reservation system. Its operational activities are similar and involve keeping information on products, their availabilities, usage and maintenance. It also shares the concepts of a ‘front office’ and a ‘back office’ in which activities are similar to a reservation system. The only Figure 4.7 A library loan system. significant difference is that the library loan system has a larger number of items compared to the reservation system. These items are often stored in a special database called a data warehouse. Transaction processing systems 123 Examples of batch transaction processing Three examples of batch transaction processing are cheque clearance, bill generation and credit card transactions. Cheque clearance A cheque is a written order asking the bank to pay a certain amount of money to a particular person. When a cheque is issued to a person, he or she deposits it into a bank account. However, the money cannot be withdrawn until the cheque has been cleared. Cheque clearance involves checking that the person who wrote the cheque has enough money in his or her account to cover the cheque. It usually takes three working days. The cheques are cleared as a group during the bank’s quiet period of the day. Cheque clearance involves batch processing. Bill generation Organisations create a bill, or invoice, for goods or services that have been supplied to a customer (see Figure 4.8). They usually generate a group of bills at a scheduled time. This enables the user to effectively manage his or her time and results in less disruption to the main database. Bill generation is not done immediately but as a group. BQM blast quarry maintenance 11 July 2000 TAX INVOICE Peter CIANCIOSI trading as BQM Milestone Mining Services Mobile: 0414 00 44 22 24 Green Street WOODSTOCK VIC 3751 ABN: 02 089466 721 Invoice Number: PC00015 Date Work Carried Out 05-07-00 Workshop XM-0515 Exhibition Centre Filters 3 5 $0084.00 $0140.00 $0092.40 $0154.00 06-07-00 XP-0879 Gauges Frankston Change over Filters Delivered Springs - EyeWise Eppalock Workshop 1 2 $0028.00 $0056.00 $0030.80 $0061.60 2 3 $0056.00 $0084.00 $0061.60 $0092.40 Workshop Delivered Toggle - EyeWise Eppalock 5 $0140.00 $0154.00 5 $0140.00 $0154.00 TOTAL HOURS 26Hrs $3728.00 $3800.80 07-07-00 Hrs@$28 p/hr Plus GST (GST inc.) Figure 4.8 Invoice. 124 Options Credit card sales transactions Credit cards have become an important method of paying for goods and services. Millions of such credit card sales transactions are completed every day. Some are done at POS terminals, and some are done by taking an impression of the customer’s credit card on a multi-page credit slip, which is then filled in by the sales clerk. The retailer sends the credit slips to the bank in a group and does not send each credit slip individually. Similarly, the POS credit card sales transactions are not processed immediately but are stored for later processing. In either case, credit card sales transactions are processed as a batch. Customers may view credit card sales transactions, particularly those done at a POS terminal, as real-time processing; but the actual updating is processed in a batch. Exercise 4.2 1 2 3 4 5 6 7 8 9 Explain the difference between users and participants in the context of a TPS. How are people from the environment becoming participants of a TPS? Describe the steps for a typical motel reservation system. Outline one advantage of a POS system. Describe the procedures for a library loan system. Compare and contrast a library loan system and a reservation system. Describe the procedures for cheque clearance. Why is bill generation done in a batch? Describe the processing carried out in credit card sales transactions. LEARNING ACTIVITIES 1 Real-time transaction processing systems perform information processes requiring participants, data/information and information technology. Clearly identify the participants, data/information, information technology and purpose of the following TPSs: a reservation systems b point-of-sale terminals c library loan system. 2 Batch transaction processing systems perform information processes requiring participants, data/information and information technology. Clearly identify the participants, data/information, information technology and purpose of the following TPSs: a cheque clearance b bill generation c credit card sales transactions. 3 Describe the relationship between participants, data/information and information technology for a POS system. 4 Construct a data flow diagram and a system flowchart to represent the following TPSs: a library loan system b credit card sales transactions. Transaction processing systems 125 4.3 Storing and retrieving A TPS requires an efficient method for the storage and retrieval of data. Data is stored in a database or a data warehouse. The data storage system requires welldesigned backup and recovery procedures. Databases and files The information processes in any large organisation are often unique and complex. The storage and retrieval of data must occur accurately many times each day. Storage and retrieval depend on databases and files. A database is an organised collection of data. An organisation stores all accounting and operational records in a database, often called an operational database. This database is a model of the organisation’s operational aspects. The data in an operational database is defined in a schema. The TPS usually has a restricted view of the operational database. For example, there is no need for an order entry system to have access to the accounts payable data. This restricted view, or subset, of the data is called a subschema. Databases are designed using a hierarchical, network or relational structure (see Figure 4.9). • A hierarchical database organises data in a series of levels. It uses a top-down structure consisting of nodes and branches. Each node can have many branches, but each lower-level node (child) is linked to only one higher-level node (parent). • A network database organises data as a series of nodes linked by branches. Each node can have many branches, and each lower-level node (child) may be linked to more than one higher-level node (parent). • A relational database organises data using a series of related tables. Relationships are built between the tables to provide a flexible way of manipulating and combining data. Hierarchical structure Network structure Figure 4.9 Hierarchical, network and relational structures. 126 Options Relational structure When designing a database for real-time transaction processing, the following features are important: • Good data placement. A large number of users are simultaneously performing transactions to change data. The database should be designed to access patterns of data use and to place frequently accessed data together. • Short transactions. Keeping transactions short enables the entire transaction to be processed quickly, which improves concurrency. User interaction during transaction processing should be avoided as this slows down the system. • Real-time backup. Real-time processing is characterised by continuous operations with downtime kept to an absolute minimum. Backing up the database needs to be scheduled during times of low activity to minimise effects on users. • High normalisation. Redundant information is kept to a minimum whenever possible to increase the speed of updates and improve concurrency. Reducing data also improves the speed of backups because less data needs to be backed up. • Archiving of historical data. Data that is rarely referenced should be archived into separate databases or moved out of the heavily updated tables. This keeps tables as small as possible, improving backup times and query performance. • Good hardware configuration. The hardware needs to be able to handle a large number of concurrent users and to provide quick response times. A file is a block of data. In a database, a file is divided into a set of related records. The records contain the specific information, such as details about a customer or a product. Every TPS uses files to store and organise its transaction data. Batch transaction processing and real-time transaction processing require different types of files and different methods of storage and retrieval. In a TPS, there are five basic types of files: • A master file contains information about an organisation’s business situation. The master file stores the operational database. Transaction data is stored in the master file. • A transaction file is a collection of transaction records. The data in the transaction file is used to update the master file. Transaction files also serve as audit trails and history for the organisation. • A report file contains data that has been formatted for presentation to a user. • A work file is a temporary file in the system used during the processing. • A program file contains instructions for the processing of data. It is created from a high-level programming language, such as Cobol, Fortran, Visual Basic or C++. Data warehousing A data warehouse is a database that collects information from different data sources. Data gathered in real-time transactions can be used for analysis in an efficient manner if it is stored in a data warehouse. A data warehouse provides data that is consolidated, subject-oriented, historical and read-only: • Consolidated. Data is organised using consistent naming conventions, measurements, attributes and semantics. Organisations can use similar data in different formats. For example, true or false data can be represented as one/zero, on/off, true/false, or positive/negative. Data in the data warehouse is stored in a single, acceptable format. Data warehousing allows data from across the organisation to be effectively used in a consistent manner. Transaction processing systems 127 • Subject-oriented. A large amount of data is stored across an organisation. Some of this data is irrelevant for executive reporting and makes querying the data difficult. A data warehouse organises only the key business information from operational sources so that it is available for analysis. • Historical. Real-time transaction processing systems represent the current value at any moment in time for various aspects of the business, such as the stock inventory. They do not show the inventory at some time in the past. Querying the stock inventory a moment later may return a different response. However, data stored in a data warehouse is accurate for a specific moment in time, as it represents historical information and cannot change. The data warehouse stores a series of snapshots of an organisation’s operational data generated over a long period of time. • Read-only. After data has been moved to the data warehouse successfully, it does not change unless the data was incorrect. The data stored in a data warehouse represents a particular point in time; it must never be updated. Deletes, inserts, and updates are not applicable in a data warehouse. The only operations that occur in a data warehouse are loading and querying data. Backup procedures Organisations have become very dependent on their TPSs. For example, making a reservation when the computerised reservation system is down is often impossible. A breakdown in the TPS may stop the business. Well-designed backup and recovery procedures minimise disruptions when the TPS goes down (see Figure 4.10). A backup is another copy of the data that could be used to rebuild the system. If the system goes down, the recovery process rebuilds the system. The success of backup and recovery depends on implementing appropriate procedures. Backups are usually stored offsite or stored onsite in a fireproof safe. Users Transaction data Process transaction Data to complete transaction Transaction data Transaction data Master file Database Perform backup Transaction file Database Updated database Backup file Database Perform recovery Figure 4.10 A DFD showing backup and recovery. 128 Options Transaction data since last backup Recovery process A TPS may fail for a number of reasons, such as system failure, human error, hardware failure, incorrect or invalid data, program errors, computer viruses or natural disasters. To cope with failures, the TPS must be able to detect and correct errors. The recovery of a database involves the backup, journal, checkpoint and recovery manager: • Backup. Periodic backup copies are made of the entire database. Typically, a backup copy is produced at least once a day. The copy should be stored in a secure location where it is protected from loss or damage. • Journal. Journals maintain an audit trail of transactions and database changes. There are two basic journals, or logs. First, there is the transaction log. It records all the essential data for each transaction, such as data values, time of transaction and terminal number. The second kind of journal is the database change log. It contains before and after copies of records that have been modified by transactions. • Checkpoint. The DBMS periodically suspends all processing to synchronise its files and journals. All transactions in progress are completed, and the journal entries are updated. The system is then said to be in a ‘quiet state’; and the database, together with the transaction logs, is synchronised. The DBMS then writes a special record to the transaction file. This special record is called the ‘checkpoint record’. The checkpoint record contains information necessary to restart the system. A copy of the database up to the checkpoint record is known as a ‘checkpoint copy’. Checkpoints should be taken frequently, such as several times an hour. When failures do occur, it is often possible to resume processing from the most recent checkpoint with only a few minutes of processing work to be repeated. • Recovery manager. This is a program that restores the database to a correct condition and restarts the transaction processing. The type of recovery procedure that is used in a given situation depends on the nature of the failure. The general procedure involves restoring the data collected from a backup device and running the transaction processing again. The two types of recovery are backward recovery and forward recovery: • Backward recovery is used to back out or undo unwanted changes to the database. It is used to reverse the changes made by transactions that have aborted. For example, a bank transaction involved transferring $100 between two different accounts. However, failure occurred after the $100 was subtracted from one account but before it was deposited to the required account. Backward recovery involves the recovery manager restoring the first account to its original value. • Forward recovery starts with a backup copy of the database. It then reprocesses the transactions in the transaction journal that occurred between the time the backup was made and the present time. Forward recovery is much faster and more accurate than backward recovery. Backward recovery involves the logic of reprocessing each transaction, and this is very time consuming. Transaction processing systems 129 Magnetic tape Magnetic tape is often used as a backup medium. It can store large quantities of data inexpensively. Magnetic tape is a very long, thin strip of plastic, coated with a thin layer of magnetic material. The tape is often wound on two reels inside a cartridge. Tape is read from and written to using a tape drive that winds the tape from one reel to the other reel, causing it to pass a read/write head. The main disadvantage with magnetic tape is that it uses sequential access to retrieve data. This form of access starts at the beginning of the tape and reads all of the data until the required item is found. Sequential access to data is slow, but magnetic tape is a suitable medium for backup. Magnetic tapes have a variety of sizes and formats, such QIC tapes, DAT cartridges and 8-mm cartridges. (See Figure 4.11.) Figure 4.11 Magnetic tapes. Grandfather-father-son Grandfather-father-son is a backup procedure that refers to at least three generations of backup master files. The most recent backup is the son, the second last is the father, and the oldest is the grandfather. Grandfather-father-son is commonly used with magnetic tape for a batch transaction processing system. If failure occurs during a batch run, the master file is recreated by using the son backup and restarting the batch run. This backup is one generation from the master file. However, if the son backup is destroyed or corrupted, it is necessary to go back another generation and use the previous backup (father). This process of keeping several generations of backup files ensures that the data can be recreated and not lost. Organisations often keep more than three generations. For example, banks generally keep up to twenty generations. Partial backups Partial backups occur when only parts of the master file are backed up. The master file is usually backed up to magnetic tape at regular intervals, such as weekly or monthly. Transactions completed since the last backup are stored separately and are called journals, or journal files. In the event of an accident, the master file can be recreated from the backup tape and the journal files. Updating in a batch Batch transaction processing collects the transaction data as a group, or batch, and processes it later. It has a time delay. Updating in a batch is used when transactions are recorded onto paper (such as credit card slips) or stored on a magnetic tape. Transactions are collected and updated in a batch when it is convenient or economical to process them. Historically, updating in a batch was the only feasible method when transaction details were stored on punch cards or magnetic tape. The information technology did not exist to allow the immediate processing of transaction data. 130 Options There are two stages in batch processing. The first stage is the collecting and storage of the transaction data in a transaction file. It involves sorting the data into sequential order. The second stage is the processing of the data by updating the master file. This is not always a simple process. The updating of the master file may involve data additions, updates and deletions that need to happen in a certain order. If one error occurs in the batch, then the entire batch is rejected (see Figure 4.12). Updating in a batch involves sequential access. Sequential access occurs when data is accessed in a sequence. It is the only method of accessing data stored on magnetic tape. The steps in a batch update involve retrieving the transaction data from a Data entry magnetic tape. A batch update starts at the beginning of the magnetic tape and reads all of the data in the order it was stored. It is a time-consuming process to locate a specific transaction on magnetic tape. All previous transactions need to be examined. Daily transactions The information technology in a batch transaction processing system requires a secondary storage medium that Transaction file can store large quantities of data inexpensively. Magnetic tape is Batch run frequently chosen for these reasons. The software used to collect the transaction data does not have to be online; and, if necessary, the user interface can be modified to suit the specific application. Update Master file Figure 4.12 Batch transaction processing. Transaction processing systems 131 Updating in real time Real-time transaction processing is the immediate processing of data. It provides instant confirmation of a transaction. Real-time processing involves a large number of users who are simultaneously performing transactions to change data. It has resulted from recent advances in technology. Increases in the speed of data transmission and improvements in bandwidth have made real-time transaction processing possible. The steps in a real-time update involve sending the transaction data to an online database in a master file (see Figure 4.13). The person providing the information is typically available to help with error correction and receives confirmation of transaction completion. Data entry Update Daily transactions Transaction file Transaction data Master file Figure 4.13 Real-time transaction processing. Data is accessed from a real-time transaction processing system using direct access or random access. Direct access occurs when data is accessed without accessing previous data items. It is much faster than sequential access, as the previous data is not read. A direct access storage device stores data in a particular storage location based on a mathematical procedure, or algorithm. It uses this algorithm to calculate the approximate location of the data. If the data is not found at this location, it searches through successive locations until the desired data is accessed. Direct access often involves the use of an index and is called indexed access. An index is a table that contains information about the location of the data. The information technology in a real-time transaction processing system requires a secondary storage medium that can store large quantities of data and provide quick access. Magnetic disk storage was developed to provide immediate access to data. The software used to collect transaction data is online and has a 132 Options user-friendly interface. The interface is very important, as a rapid response time is critical. The turnaround time from the input of the transaction to the production of the output must be a few seconds or less. Exercise 4.3 1 Explain the difference between hierarchical, network and relational databases. 2 List six important features in the design of a database for real-time transaction processing. 3 Describe five file types used in a TPS. 4 What is the purpose of a transaction file? 5 Describe the features of consolidated data in a data warehouse. 6 ‘Data stored in a data warehouse is accurate as it represents historical information.’ Explain this statement. 7 What is a backup? 8 Explain the difference between a transaction log and a database change log. 9 What is a checkpoint in the recovery process? 10 Explain the difference between backward recovery and forward recovery. 11 Why is magnetic tape often used as a backup medium? 12 Describe the process of using generations of backup master files for recovery. 13 What are the two stages in batch processing? 14 Describe updating in a batch that involves sequential access. 15 What are the steps in a real-time update? 16 Describe direct access of data from a real-time transaction processing system. LEARNING ACTIVITIES 1 Relational databases are used for TPSs. They organise data using a series of related tables. Briefly describe the following terms: schema, entity, attribute, relationship, table and form. 2 The entertainment centre has set up a reservation system for all its events. The system uses a relational database. There are three entities: Customer, Seats, and Events. – Customer: CustomerID, LastName, FirstName, Address, Suburb, PostCode, Deposit and CreditCard. – Seats: SeatNumber, EventID and CustomerID. – Events: EventID, EventTitle, Date and Time. a What would the primary key be for each entity? b Create a data dictionary for this relational database. c Create a schematic diagram for this relational database. d Design a form for each entity that could be used for data entry. e Populate the database with dummy data. f Create four queries that would be relevant to this database. g Create a report that lists all the customers and their seat numbers for a particular event. The report should be sorted on seat number in descending order. h Apply backup and recovery procedures to protect this data. Transaction processing systems 133 3 A relational database is used for a library loan system. There are three entities: Book, Borrower and Transaction. a List the attributes needed for each entity. b Create a data dictionary for this relational database. c Create a schematic diagram for this relational database. d Design a form for each entity that could be used for data entry. e Populate the database with dummy data. f Create four queries that would be relevant to this database. g Create a report that lists all the transactions on a particular date. h Apply backup and recovery procedures to protect this data. 4.4 Other information processes All information processes play a role in a TPS, including collecting and analysing data. Collecting Collecting data for a TPS involves generating the transaction data. For example, people using an ATM generate transaction data by entering their debit card numbers and typing their requests on a keyboard. Collecting in transaction processing involves the use of hardware and a variety of forms. Hardware Hardware used to collect data for a TPS includes MICR readers, ATMs and barcode readers. MICR (magnetic ink character recognition, pronounced ‘my-ker’) systems are widely used by banks to read account numbers on cheques (see Figure 4.14). Characters are printed using magnetic ink that contains magnetised particles. Figure 4.14 Cheque with MICR. 134 Options MICR systems are designed to quickly and accurately read prerecorded data on cheques and deposit slips. A MICR reader processes cheques at speeds of up to 2000 cheques per minute. The use of MICR for reading cheques is an example of a batch transaction processing system. An ATM (automatic teller machine) is a banking terminal that performs common banking transactions, such as deposits and withdrawals. An ATM can be used at any time during the day or night. When people complete a transaction using an ATM, they are participants in a real-time transaction processing system. The ATM accesses a communication system. Data and information are being transferred between an ATM terminal and the bank’s central computer in real time. Barcode readers are used extensively in retail industries to collect product information at point of sale. Supermarkets use a laser to read barcodes (see Figure 4.15), and many businesses use handheld barcode readers. Product information (description, price and code) is held on a central computer linked to the POS terminal. Data about the item passing the barcode reader is collected quickly and accurately. The description and price of the item is displayed on the cash register and printed on the receipt. Libraries and many industries use barcode readers to keep track of stock movements. Figure 4.15 Barcode reader in use. Forms A form is a document used to collect data from a person. When the form is completed, it is processed in a batch or in real time. There are many different types of paper forms, such as a sign-on sheet for payroll. A person completes the paper form, and the form is processed as a batch at a convenient time. (See Figure 4.16.) Transaction processing systems 135 Figure 4.16 A Medicare form. On-screen forms are created for computerised data entry purposes to populate fields in a database. The user can view, enter and change data in real time. (See Figure 4.17.) For example, an airline ticket reservation system collects details of a customer’s required flight via a form. A transaction is completed when the user completes the form. A well-designed form provides information explaining the Reservation code 005-3001.01 Book code [USING MEDIAGRAM] Book title Required inputs Reserved date 03/01/00 Student ID 1710GLB [AVRIL STARK] Student name OK Figure 4.17 Data entry. 136 Options [10123] Cancel Verification information from system required data and any rules that apply to particular fields, such as Sex (M/F). Forms can minimise data entry errors by automatically filling in previously stored data, such as a customer’s address, once the user has entered the customer’s name. Web forms are typically used by users who wish to purchase items over the Internet (see Figure 4.18). A form on a Web page may request relevant data, such as items to be purchased, delivery address and method of payment. The data from a Web form may be processed immediately (real-time processing) or at a later time in a group of Web forms (batch processing). The responses from a Web form become data in fields of a database. Figure 4.18 Web form. Analysing data The results of processing transactions are stored in a database and are analysed in many ways to meet the information needs of users. That is, the output from a TPS is the input to other types of information systems, such as decision support systems and management information systems. Decision support systems TPSs flow through all aspects of an organisation and can provide the information necessary to make informed decisions. Decision support systems (DSSs) assist people to make decisions by providing information, models and analysis tools. For example, a business uses a TPS to process its sales transactions. It uses a database as a DSS to periodically summarise its sales data by date, region and product. This summary information is stored in a separate database to be analysed by senior management. To make decisions, management needs to be able to determine trends in sales quickly by querying the data based on various criteria. The amount of information available from TPSs is increasing at a staggering rate. It has reached the point where people are being frustrated by information Transaction processing systems 137 overload. Data mining is used in DSSs to find relationships and patterns in the data stored in a database. It sorts through the data and turns up interesting and often useful connections. For example, data mining could be used to analyse the transactions at the supermarket. It might determine whether there was a relationship between tomato sauce sales and meat pie sales. This information might be useful for marketing promotions. The information obtained from data mining allows organisations to make more informed decisions about such topics as improving marketing campaigns or siting a new store. ITITFact Fact CICS (customer information control system, pronounced ‘kicks’) is a mainframe operating environment designed to enable transactions entered at terminals to be processed concurrently. Management information systems Management information systems (MISs) provide information for the organisation’s managers. They present basic facts about the performance of the organisation. Some common examples of MIS output are reports on sales, stock inventory, payroll, orders and budgets. Information from an MIS is generally presented in report form. There are many different types of reports, such as scheduled reports, forecasting reports, on-demand reports and exception reports: • Scheduled reports are standard reports provided on a regular basis. Middlelevel to low-level management uses these reports. • Forecasting reports are used to help make projections about business trends. These reports are important to the decision-making process. They are also known as planning reports as they assist in the strategic planning of the organisation. High-level management normally uses these reports. • On-demand reports are generated on request and usually in response to a specific need. They are generally requested by high-level management. • Exception reports are used to alert management to unexpected or unfavourable situations that necessitate special handling. This type of reporting is of interest to middle management. The development of MISs and DSSs brought operations researchers and industrial engineers to the forefront of business planning. These information systems require knowledge of an organisation and its activities in addition to technical skills in computer programming and data handling. The key issues in designing an MIS or a DSS include how a system will be modelled, how the model of the system will be handled by the computer, what data will be used, and how far into the future trends will be extrapolated. 138 Options Exercise 4.4 1 2 3 4 5 6 7 8 9 10 What are the advantages of using a MICR system? Describe an ATM. How are barcode readers used in retail industries? What is an on-screen form? How can forms minimise data entry? Describe a Web form. What is a decision support system? What is the purpose of data mining? Describe four types of reports used in management information systems. What are the key issues in designing an MIS or a DSS? LEARNING ACTIVITIES 1 A range of hardware devices is used in TPSs. Clearly describe the operation of the following devices to collect data: a ATM b barcode readers. 2 Identify and collect three paper forms used in a TPS. Compare and contrast the design of these forms. Will these paper forms be replaced by electronic versions in the future? Give reasons for your answer. 3 Design a user-friendly form that could be used in a real-time transaction processing system, such as an airline reservation system. Describe the features that make your form user-friendly. 4 Search the Internet for Web forms that would be used in a TPS. List the address of three Web forms that follow good design principles. Compare your choices with three students in the class. Determine the best Web form in your group. 4.5 Issues related to transaction processing systems Both positive and negative impacts arise from the use of a TPS. In this section, we examine some of the issues raised by TPSs, such as the nature of work, noncomputer procedures, bias, the importance of data, and control in transaction processing. Nature of work TPSs are changing the nature of work for many people. They essentially automate business operations and hence will affect the people who perform these operations. The automation of jobs and people from the environment completing the transaction have affected the nature of work in many organisations. Automation of jobs Automation of jobs refers to the use of information technology to perform tasks once performed by people. For example, the POS terminal has replaced many of the tasks performed by people in a manual transaction system, such as memorising Transaction processing systems 139 the price of products. Organisations are increasing their use of information technology and TPSs. TPSs have allowed organisations to be more efficient and offer a range of new services. However, they have contributed to many of the changes in the workplace. Workers are required to learn new skills and complete ongoing training. The automation of jobs often results in fewer people being required to perform the same task. However, the loss of jobs in one industry is often replaced by the job growth in another industry, such as the information technology industry. The key ingredient is being retrained to perform new roles in this growing industry. People as participants People from the environment have become participants in TPSs as they directly enter transactions. For example, when a person withdraws money from an ATM, he or she is the participant of a TPS (see Figure 4.19). The effect of this change on the nature of work is significant. An employee of the bank once carried out the tasks completed by a person at the ATM. This has resulted in fewer jobs in banks. This issue is not restricted to banks. The Internet is allowing people to become participants in a range of TPSs. People are purchasing an increasing range of products by completing a Web form. They are bypassing a range of people who provided this service at the shop front. On the other hand, more opportunities are being created in the information technology industry to create this user interface. Figure 4.19 People as participants. Non-computer procedures Many organisations rely heavily on their TPS. When the computer is unavailable due to a breakdown or other reason, non-computer procedures are needed to deal with transactions in real time. For example, if the library loan system crashes, then the librarian needs to have a non-computer procedure for customers to borrow a book. When the computerised system is working again, the user needs a procedure to enter the transactions completed by non-computer procedures. Bias Data needs to be free from bias. Bias means that the data is unfairly skewed or gives too much weight to a particular result. It is rarely an issue in the collection 140 Options of data from a TPS, such as a POS terminal. This information process is carefully designed and examined in many ways. However, the data gathered from a TPS can be presented in a biased way using tables and charts. For example, tables can be constructed without all the relevant data, and scales on charts can distort trends. Some bias may exist in any explanation; however, it becomes an ethical issue when the relevant information is knowingly misrepresented. Importance of data An organisation relies on its TPS and the data it processes. It is important for organisations to have procedures in place to ensure that data is secure, accurate and valid. Data security Data security involves a series of safeguards to protect the data. Data is under threat of being stolen, destroyed or maliciously modified. There is a greater risk when the data is accessible to multiple users in a real-time transaction processing system. The first line of defence is to only allow access to data to authorised people using passwords, personal objects and biometric devices. However, some people are capable of evading these procedures. Further safeguards to protect data involve data encryption and firewalls. • Encryption is the process of coding data, and decryption is the process of changing it back. It is the most effective way to achieve data security during the transmission of data. Data is coded, transmitted, and then converted back to its original form. • Firewalls are used on networks to verify and authenticate all incoming data. A firewall checks the password of anyone trying to access a network. Firewalls are expensive to install and maintain. On large systems, more than one firewall is necessary because barriers need to be placed at all critical points. Data accuracy Accuracy of data is the extent to which it is free from errors. Data entered into a TPS is not always accurate. Errors can be caused by mistakes in gathering the data, mistakes in data entry, a mismatch of the data and the person, or out-of-date information. For example, if the price of a product has been entered incorrectly into the database, then customers buying that product will be charged the wrong price. This could be very costly to the organisation. Opportunities need to exist to check and change data if it is wrong. Transaction processing systems 141 Data validation is used to check the entry of data. A well-designed TPS checks each transaction for easily detectable errors, such as missing data, data values that are obviously too high or too low, data values that are inconsistent with other data in the database, and data in the wrong format. Data validation is carried out using range checks, list checks, type checks and check digits as discussed in Chapter 2. Data integrity Data integrity describes the reliability of the data. It involves the accuracy, currency and relevance of the data. Data integrity in real-time transaction processing is provided when the transaction passes the ACID (atomicity, consistency, isolation and durability) test. • Atomicity occurs when all of the steps involved in a transaction are completed successfully as a group. If any step fails, no other step should be completed. If the first step succeeds, then the second step must succeed; otherwise, the entire transaction is abandoned. If some operations succeed and others fail, there is no atomicity. • Consistency occurs when a transaction successfully transforms the system and the database from one valid state to another. Consistency in a TPS stems from the correct application programming, such as always debiting and crediting the same amount. • Isolation occurs if a transaction is processed concurrently with other transactions and still behaves as if it were the only transaction executing the system. Transactions must not interfere with each other’s database updates. • Durability occurs if all the changes that a transaction makes to the database become permanent when the transaction is committed. These ACID properties guarantee that a transaction is never incomplete, the data is never inconsistent, concurrent transactions are independent, and the effects of a transaction are permanent. ITITFact Fact ‘Acid test’ comes from the days when alchemists subjected metal samples to strong acid to isolate the gold content. Today, it refers to rigorous testing. Control in transaction processing Controlling transaction processing starts with collecting and includes the way the TPS manipulates the data and the way errors are corrected. Data preparation and authorisation create the transaction data that will be entered into the TPS. People in management positions of some organisations have created false transaction data to promote their careers. Even though strict precautions are taken with data preparation and authorisation, the results from a TPS are not always correct. People should not become completely dependent on a TPS. They need to maintain control over their organisation’s operations. 142 Options Exercise 4.5 1 2 3 4 5 6 7 8 9 10 What is the automation of jobs? Describe some of the changes in the workplace as a result of automation. How is the Internet allowing people to become participants in a range of TPSs? Why are non-computer procedures needed in a TPS? How is bias a problem in a TPS? Explain the difference between encryption and firewalls. Describe some of the ways inaccurate data is entered into a TPS. What is data integrity? What is the purpose of the ACID text? Outline the issue of control of data in a TPS. LEARNING ACTIVITIES 1 Identify three jobs that have changed as a result of TPS. Describe the implications of these changes for participants of the system. 2 ‘The computerisation of transaction processing has resulted in people performing menial tasks. People are now not required to think.’ Comment on these statements. 3 ‘The major concern for organisations in TPS is ensuring data is secure, accurate and valid.’ Discuss this statement. Use the Internet to find information about data security. Compare Australian and overseas data. 4 A friend has obtained access to a bank’s credit card transactions. Do you think your friend is clever? Has your friend committed a crime? What would you do if the friend deleted all your credit transactions for the past month? Describe the penalty your friend should receive if he or she is caught. Transaction processing systems 143 Chapter review PART A Select the alternative (A, B, C or D) that best answers the question. 1 Which of the following is not an important characteristic of a TPS? A rapid response B reliability C flexibility D controlled processing 2 Batch transaction processing is used for: A generating pay cheques B making an airline reservation C buying a product at a point-of-sale terminal D borrowing a book at the library 3 Real-time transaction processing: A has more errors than batch transaction processing B does not require continuous access to the master file C is more difficult to maintain than a batch transaction processing system D processes transactions in a group 4 Data compared to a set of accepted data is called a: A range check B list check C type check D check digit 5 Which of the following is not a feature of data in a data warehouse from a realtime transaction processing system? A a large amount of data is stored from across an organisation B data is stored in a single, acceptable format C data is current and contains the latest transaction data D data does not change unless the data was incorrect 144 Options 6 7 8 9 10 A database that organises data using a series of related tables is called a: A hierarchical database B relational database C operational database D network database Updating in a batch usually involves: A sequential access B an online database C direct access D magnetic disk storage Which of the following is not involved in collecting data for a TPS? A ATM B MICR C POS D DSS Which part of the ACID test ensures that all of the steps involved in a transaction are completed successfully as a group? A atomicity B consistency C isolation D durability The issue of bias is raised: A during the collection of data B to ensure people maintain control over their organisation’s operations C when data is gathered from a TPS and presented using tables and charts D during the transmitting and receiving of data Chapter review PART B For each of the following statements, select from the list of terms the one that most closely fits the statement. Write the letter corresponding to your choice next to the statement number. Statements 1 A database that collects information from different data sources. 2 A copy of the data that could be used to rebuild the system. 3 Collects, stores, modifies and retrieves the transactions of an organisation. 4 Collects the transaction data as a group and processes it later. 5 Involves the accuracy, currency and relevance of the data. 6 Ensures that all of the steps involved in a transaction are completed successfully as a group. 7 Ensures that two users cannot change the same data. 8 Occurs when data is accessed without accessing previous data items. 9 The immediate processing of data. 10 Used in DSSs to find relationships and patterns in the data stored in a database. 11 Used to check the entry of transaction data. 12 Maintains an audit trail of transactions and database changes. 13 Occurs when data is accessed in a sequence. 14 At least three generations of backup master files. 15 The use of information technology to perform tasks once performed by people. 16 The software that allows the transaction processing application programs to run efficiently. List of terms a atomicity b c d e f g h i j k l m n o p automation backup batch transaction processing concurrency data integrity data mining data validation data warehouse direct access grandfather-father-son journal real-time transaction processing sequential access transaction processing monitor transaction processing system PART C Write at least one paragraph on each of the following. 1 Outline the main differences between real-time transaction processing and batch transaction processing. 2 ‘Customers may view credit card sales transactions as real-time processing, but the actual updating is processed in a batch.’ Comment on this statement. 3 Explain the meaning of the following terms: a transaction b atomicity c grandfather-father-son. 4 Describe the backup and recovery procedures for a TPS. 5 How is updating in a batch different from updating in real time? 6 Data is important in a TPS. Briefly describe some of the procedures used to ensure that data is secure, accurate and validated. 7 Data integrity is provided when a transaction passes the ACID text. Describe the four parts of the ACID test. Transaction processing systems 145 5 chapter DECISION SUPPORT SYSTEMS Outcomes Overview This chapter examines the characteristics of information systems that help users make decisions. You will study examples of decision support systems and learn to develop your own decision support systems. Decision support systems focus on the information processes of organising, analysing and processing. • applies an understanding of the nature and function of information technologies to a specific practical situation (H1.1) • explains and justifies the way in which information systems relate to information processes in a specific context (H1.2) • analyses and describes a system in terms of the information processes involved (H2.1) • develops solutions for an identified need which address all of the information processes (H2.2) • evaluates the effect of information systems on the individual, society and the environment (H3.1) • demonstrates ethical practice in the use of information systems, technologies and processes (H3.2) • proposes ways in which information systems will meet emerging needs (H4.1) • assesses the ethical implications of selecting and using specific resources and tools (H5.2) 5.1 Characteristics of decision support systems The success of most human activities depends on the quality of the decisions. Decisions are needed whenever a problem needs to be solved. Decision support systems (DSSs) are information systems that assist users to make a decision by providing information, models and analysis tools. They use a range of software tools, such as databases, spreadsheets and expert systems. DSSs help decisionmaking by providing information using a model. A model is a representation of some aspect of the real world, and a simulation is the use of that model. A model may be a formula for calculating the cost of a new product to make a profit. A DSS depends on the accuracy of the model. ITITFact Fact ‘Wetware’ is the term computer scientists use to refer to the brain’s knowledge. Computer scientists are trying to find ways to connect human brains to computers, so people can directly interact with them. A DSS can be used on a daily basis or when an organisation has to make changes or react to something unexpected. One example of a DSS is a system that analyses the stock market and helps make decisions about shares. A DSS creates a mathematical model of the variables affecting the decision, using statistical tools, databases, spreadsheets and graphics. The model allows a manager to ask what-if questions by changing one or more of the variables and seeing the projected results. For example, the manager might ask what would happen if the share price were raised. Nature of decision support systems The interactive nature of DSSs and the ability of the user to ask appropriate questions are important factors in a DSS. Interactivity allows the user to choose the sequence and content of the information to be displayed. It allows a DSS to make decisions based on the data entered by the user. For example, a manager wants to expand a business into a new product line. He or she enters the details of the business’s current operations and an estimate of the effect of the new product into a DSS. The DSS provides the information to assist the manager to make the correct decision. The interactive nature of DSSs requires the user to have an understanding of analytical tasks. If the user does not ask the right questions, it is unlikely that the DSS will provide the right decision. DSSs require the user to have an understanding of the problem and whether using a DSS is appropriate. For example, taking a holiday requires a number of decisions regarding time, place, transport, and accommodation (see Figure 5.1). The user needs to understand the problem and all the factors that have an effect on the decision. The difficulty of making a decision depends on the number of conditions that have to be satisfied. A decision is easy to make when one option is Decision support systems 147 clearly better than another option. DSSs use three important information processes: • collecting—gathering data, such as facts, beliefs and ideas, that are related to the problem • organising—determining a method of organising data and selecting an appropriate model • analysing—selecting a course of action based on the information provided in the previous steps. Figure 5.1 Taking a holiday trip requires a number of decisions. Components of a decision support system Most DSSs have three components: data management, model management and dialogue management (see Figure 5.2): • Data management is used to collect and organise the data. For example, stockbrokers need access to share prices for past years. They use a database system for data management. It maintains the data and provides a means for selecting the required information. A DSS is often linked to external databases that are used for other purposes, such as shipping, invoicing or daily transactions. • Model management involves the use of a model to turn data into information. People establish the relationship between quantities based on what they observe and measure in real life. A model describes the relationship between inputs, outputs and conditions. Models must be built and tested. There are many types of models depending on the application, such as accounting models to represent depreciation, tax planning or cost analysis. The validity of the information obtained from model management is dependent on the accuracy of the model. • Dialogue management allows the user to enter a request in a convenient manner. It provides the interactivity of DSSs. Dialogue management helps the user to search large amounts of data, focus on relevant facts and apply a model. 148 Options Data Management Retrieves and manipulates relevant data Model Management Maintains alphanumeric and graphical models, formulas and algorithms that are often used to select the best model Dialogue Management Input tools (icons and commands) accept inquiries Presentation tools (tables and charts) present analysed information Figure 5.2 Components of a decision support system. Classifying situations A DSS depends on the situation, the nature of data, the accuracy of the model and the method of analysis. Situations are classified as structured, semi-structured or unstructured. Structured situations Structured situations have decisions that are automated. The decision or solution is reached using an algorithm. An algorithm is a series of steps that will solve the problem in a finite time. In a structured situation, the steps are known and must be followed in a certain sequence. For example, calculating the amount of carpet needed for a room is solved using an algorithm. It uses a parameter (or a value of data that may change), such as the width of the carpet or the dimensions of the room. Structured situations always result in the same solution if the values of the parameters remain the same. DSSs are not required in structured situations. Semi-structured situations Semi-structured situations follow a method to reach a decision, but the correct decision is not guaranteed. The requirements of a semi-structured situation are clear cut, but there are too many factors or some unknown factor that may affect the decision. Experts in the fields of financial investment, weather prediction and Decision support systems 149 Figure 5.3 Weather forecasting, stock investing and horse racing are examples of semi-structured decision-making. horse racing believe that these are semi-structured situations. The experts’ knowledge allows them to obtain a manageable number of alternative solutions but does not always result in the best solution. Some experts in a semi-structured situation may reach a completely different solution. Most real-world situations are semi-structured and can use a DSS (see Figure 5.3). A semi-structured situation is a combination of a structured and an unstructured situation. It is neither clear cut like a structured situtation nor unpredictable like an unstructured situation. Structured Problems Semi-structured Problems How many workers are needed to fully staff this production line? What are the benefits of merging with XYZ Inc.? What is our optimal order quantity for raw material, based on our production? Where should we build the next five stores of our retail chain? How many turbines are needed to supply power to this factory? How will the consumer react if we lower the price of our product by 10%? Which of our regions yields the highest revenue per salesperson? What is the best advertisement campaign to launch our new financial service? Which money market fund currently yields the highest return? What are the benefits of opening an office in Paris, France? How much would the implementation of pollution-preventing devices cost us? Which stock will yield the highest return by the end of the year? Table 5.1 Examples of structured and semi-structured problems. Unstructured recognised situations Unstructured recognised situations do not use a method to reach a decision. They require judgement and insight into the problem. In an unstructured situation, there is no algorithm to reach the best solution. There are too many factors or too little knowledge about the situation. For example, people who buy shares with no knowledge of financial investments are making a decision in an unstructured situation. It is unpredictable. If the people used a financial adviser, their decision would be based on a better judgement. However, the situation would still be unstructured unless the financial adviser followed a method to reach a decision. In unstructured situations, there is no single method to reach a decision and no guarantee that the decision will be correct. It is dependent on intuition. DSSs are used for unstructured recognised situations. 150 Options Whether a situation is classified as semi-structured or unstructured depends on the amount of knowledge and experience the user has in that area. For example, a meteorologist would regard predicting the chance of rain tomorrow as a semistructured situation, while many people would regard it as unpredictable and an unstructured situation. The development of DSSs that use artificial intelligence, such as expert systems, have resulted in previously unstructured situations being regarded as semi-structured situations. Exercise 5.1 1 2 3 4 5 6 7 8 9 10 11 What is a decision support system? List three types of software tools used in a DSS. What is a model? Why is interactivity an important factor in a DSS? List the three components of a DSS. Explain the difference between data management and model management. What is the purpose of dialogue management in a DSS? Explain the difference between structured and unstructured situations. Describe a structured situation. What is a semi-structured situation? Why isn’t an algorithm used in an unstructured situation? LEARNING ACTIVITIES 1 A DSS is used by a manager to employee a secretary. Decisions are based on selection criteria, such as typing speed. List the criteria you would regard as relevant for this DSS. How would you organise this data? Which criteria are the most important? How could the DSS make decisions based on this information? 2 Describe a marketing situation that would benefit by using a DSS. Outline the information technology needed by this system. 3 ‘The classification of situations into unstructured and semi-structured is dependent on the user of the DSS.’ Do you agree with this statement? Give reasons. 4 Describe two situations that you would classify as: a structured b semi-structured c unstructured. 5 Search the Internet for two examples of a decision support system. Describe the characteristics of these systems. Decision support systems 151 5.2 Examples of decision support systems DSSs assist users in semi-structured and unstructured situations. They are not used in structured situations. Semi-structured situations Many decisions are made by people in semi-structured situations, such as a bank officer deciding how much to lend a customer or a fingerprint expert doing fingerprint matching. Banking Bank officers are involved in approving loans. This is a semi-structured situation, as there are many different options for both the bank and the customer. The bank has to assess the risk involved in lending the money. The bank officer collects data about the customer’s financial status, such as the customer’s income and expenses. The customer compares different types of loans and then makes a decision on the most suitable loan. A bank officer enters all the relevant data into a DSS. A list of loan options allows the bank officer to compare different loans. The DSS assists by screening the applicants and helping the bank officer to make a consistent decision in line with the bank’s lending policy. It also provides advice to the customer on an appropriate type of loan. Customers also have access to a range of software to analyse loans, such as the Home Loan Analyser. This DSS allows the user to compare different home loans from any lender and accurately estimate the total cost of the loan. Fingerprint matching An automated fingerprint identification system (AFIS) is used to help fingerprint experts to match prints (see Figure 5.4). It is a database system that is capable of matching prints and searching at a rate of 2000 fingerprints per second. An AFIS uses a combination of image processing and matching algorithms to find a match in a few seconds. Before AFISs, the manual identification of fingerprints would have taken hours or even days. It was a labour-intensive task. Fingerprint experts had to be knowledgeable in all areas of fingerprint identification. They needed extensive knowledge to compare prints and also had to know the procedures for locating, processing and preserving prints. An AFIS still requires an expert, as the AFIS generates a list of possible matches. However, advances in scanning, digital imaging and matching algorithms have result in more accurate Figure 5.4 Fingerprint. 152 Options AFISs. These advances have resulted in experts seeing themselves as little more than technicians. However, fingerprint matching still requires an expert to witness all phases of fingerprint identification. The expert is required to make a decision and use judgement regarding the degree of similarity between two prints. ITITFact Fact The NSW Police Fingerprint Section was established in 1903 with 6000 sets of fingerprints. Their automated fingerprint identification system was established in 1986. It now uses a database containing 1.8 million sets of fingerprints. Unstructured situations People make many decisions in unstructured situations, such as predicting stock prices and managing disaster relief. Predicting stock prices DSSs are used to analyse stock prices and make decisions about shares. They often store data on share prices in a database or a spreadsheet. DSSs use this data and a model based on different parameters to predict future stock prices. Unfortunately, predicting stock prices is an unstructured situation and unforeseen events occur. A financial adviser may suggest certain shares to buy. However, this type of advice is based on intuition and judgement. Financial advisers are usually very confident about their advice but will never guarantee their decisions. DSSs in this situation make use of spreadsheets, databases and neural networks. Managing disaster relief A disaster is a sudden, usually unexpected, catastrophe. In Australia, disasters include fires, floods, earthquakes and cyclones. Disaster relief organisations respond after the diaster has occurred. They may use a geographic information system (GIS). A GIS is an information system capable of assembling, storing, manipulating, and displaying geographically referenced information (see Figure 5.5). It lets the user query or analyse a relational database and display the results in the form of a map. A GIS has many uses besides disaster relief management, such as weather forecasting, sales analysis and population forecasting. In a GIS, the geographic information is described explicitly in terms of geographic coordinates, such as latitude or longitude, or implicitly in terms of a street address. Decision support systems 153 Digitising of existing maps Multiple paper products GIS Translation of existing maps Cartographic database Multiple digital products Figure 5.5 Components of a GIS. Types of decision support systems DSSs use a combination of spreadsheets, databases, expert systems and neural networks to assist in decision-making. Spreadsheets A spreadsheet uses a rectangular grid made up of rows and columns to organise and store data that requires some type of calculation. The results of these calculations are often displayed in charts for analysis. Business people were the first to use a spreadsheet to keep track of financial transactions and in stock control. It allowed them to make decisions based on trends and to present data in tables and charts. Today, spreadsheets are used by scientists, engineers and a wide range of other people to assist in decision-making. A spreadsheet creates a model using formulas to represent the real situation. For example, a spreadsheet could be used to calculate loan repayments. It would use a formula that relates the interest rate, time period and present value of the loan. A spreadsheet helps with decision-making using a technique called ‘what-if’ predictions. ‘What-if’ is the process of making changes to the data and observing their effects. For example, in the Best Books spreadsheet (see Figure 5.6), the user could change the cost price and observe the effect on the profit. The intersection of a row and a column in a spreadsheet is called a cell. The position of the cell in the spreadsheet is called its cell reference (or cell address). A range is a group of cells in a single row or column or in several adjacent rows and columns. For example, the range B5 to C7 (written as B5:C7) contains the data in cells B5, B6, B7, C5, C6, and C7. A spreadsheet is very particular about the type of data that is entered into each cell. It has three main types of data: • A label is text entered into a cell to provide some explanation of the spreadsheet. Calculations are not carried out using this data. Labels are used for headings in rows and columns. 154 Options = C5*1.5 = B5*D5 = B5*C5 = E5–F5 Formula = SUM(G5:G10) Label Value Figure 5.6 A spreadsheet for Best Books. • Values are numbers stored in a spreadsheet on which calculations are carried out. • Formulas are instructions to perform a calculation. The answer to the calculation will always appear in the cell that contains the formula. The formula itself is not shown. The user can create a formula or select a function such as AVERAGE. IF statements are combined with functions to allow complex decision-making (see Figure 5.7). = IF(OR(B6>10,C6>50),10*C6,0) = IF(AND(B6>10,C6>50),200,0) = D6+E6 Figure 5.7 A spreadsheet for Mick’s Music. Spreadsheets have many features that make them easy to use and suitable for a DSS. Some of the features include editing data, workbooks, templates, macros and charts. • Editing data is completed on the spreadsheet or using the formula bar. Cut and paste, copy and paste, or drag and drop features are used to copy values, labels, cell references and formulas into other cells. The ‘Fill Down’ or ‘Fill Right’ commands copy the contents of a cell into a range of adjacent cells. • A workbook is made up of one or more spreadsheets called worksheets or sheets. These sheets allow the user to organise related information in a single file. • A template is a document created for repeated use. A spreadsheet template contains labels and formulas to solve a particular problem. The user enters the values to obtain the required solution. A template saves time and effort. Decision support systems 155 • A macro is a series of commands stored in a file that can be executed by pressing a few keys. Macros allow many operations to be performed automatically, such as opening menus, choosing commands or entering text. Macros are used to create the dialogue management component of a spreadsheet being used as a DSS. • A chart is a graphical representation of numerical data. Charts convert data in rows and columns into a picture that can be read at a glance. Charts make data easier to understand. Trends are revealed, and comparisons can be made instantly. Charts can assist people to make quick and accurate decisions. Databases A database is an organised collection of data. A flat file database organises data into a single table and is suitable for many small applications. Flat file databases organise data using data structures called files, records, fields, and characters. A relational database organises data using a series of related tables. Relationships are built between the tables to provide a flexible way of manipulating and combining data. Relational databases are the most popular database structure. Databases are an important component of most DSSs. They enable users to access large amounts of data to make a decision. Retrieving data for decisionmaking usually requires the construction of a query. A query is a search of a database for records that meet a certain condition. It is a question you ask of the database. A query is constructed in the form: <Field name> <Operator> <data>. The data in the query is often called the criteria. A common method for describing a query is query by example (QBE). QBE requires the user to enter the criteria against a field. A query language is a specialised language designed to search the database. There are different query languages, each with its own grammar, syntax and vocabulary. A data warehouse is a database that collects information from different data sources. It is a storage area of raw data that can be analysed to assist organisations to make decisions. A data warehouse involves careful planning to decide what data to collect. The contents of a data warehouse are usually historical and fairly static. A data warehouse is separate from the operational databases and is updated from them at specified intervals. An enterprise data warehouse is a centralised store of data from many different sources. It sells access to many different users for their own analysis. A data mart is a smaller version of a data warehouse. It is a store of data about a specific topic or area. The emphasis of a data mart is on meeting the specific demands of a particular group of users in terms of analysis, content, presentation, and ease of use. Data marts may be part of a data warehouse, or they may be created independently. Data marts allow users to get quick answers to their queries. Expert systems Expert systems provide information and solve problems that would otherwise require a person experienced in that field (an expert). They are designed for use in highly unstructured settings, such as medicine and investment in shares. Expert systems make a decision based on the knowledge of an expert. However, their conclusions are not guaranteed. It is up to the user to accept or reject the decision. The main advantage of expert systems is their low cost compared with the expense of paying an expert or team of specialists. 156 Options ITITFact Fact The concept of expert systems originated in the 1960s but first gained prominence in 1977 when Edward Feigenbaum demonstrated the power of an expert system to help with decision-making. There are two important components of an expert system: the knowledge base and the inference engine. The knowledge base is a set of general facts and if-then rules supplied by an expert. Expert systems generate questions using the knowledge base and carry out reasoning using the inference engine. For example, a medical expert system might use medical history, the patient’s symptoms and laboratory test results to help doctors to diagnose infectious blood diseases and prescribe antibiotics. Neural networks A neural network is an information system that works like the human brain and is capable of learning. It contains a large number of processors connected like nerve cells in the human brain. These processors, or nodes, form a network and act like cells in the brain. A neural network finds relationships between sets of data to develop an understanding of the situation. In an early demonstration, researchers trained a neural network to read aloud. It learned to do this task by being shown thousands of examples. Neural networks are very good at finding a link between the data and a result. They are being used by: • financial firms for economic forecasting and loan approval (see Figure 5.8) • insurers to decide if a potential customer is a good risk • marketers to predict which products will sell • manufacturers to predict how much material they will need • stockmarket firms to make predictions. Input layer Hidden layer Output layer Years at address Approve loan Years at job Salary/loan Health Disapprove loan Credit rating Figure 5.8 A simplified neural network to approve or deny a loan. Decision support systems 157 ITITFact Fact In 1982, John Hopfield and several researchers at the California Institute of Technology rejected the traditional concept of a computer with a CPU and running a program. They built the first machines called ‘neural networks’. Even though neural networks have been very successful, their applications are still limited. Most neural networks contain a few thousand nodes compared to about 100 billion nerve cells in the human brain. As a result, neural networks take a very long time to train, and recognising visual images requires the processing of large amounts of data. Neural networks are in the developmental stages, and billions of dollars are being spent on research. Current applications of neural networks include oil exploration, weather prediction and the exploration of models of thinking and consciousness. Exercise 5.2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 List two semi-structured situations where a DSS would be useful. Describe a DSS used by a bank officer to approve a loan. What is an AFIS? What is the role of an expert in an AFIS? List two unstructured situations where a DSS would be useful. How does a DSS predict future stock prices? What is a GIS? List four types of DSS. How does a spreadsheet help with decision-making? Describe the type of data entered into a spreadsheet. Describe the features that make spreadsheets easy to use and suitable for a DSS. Why are databases an important component of most DSSs? Explain the difference between a data warehouse and a data mart. What are expert systems? Describe the main advantage of an expert system. What is a neural network? Where are neural networks being used? LEARNING ACTIVITIES 1 DSSs perform information processes requiring participants, data/information and information technology. Clearly identify the participants, data/information, information technology and the purpose of the following DSSs: a a bank officer deciding how much to lend a customer b fingerprint matching. 2 Create a spreadsheet using the data in Figure 5.6. Save the spreadsheet with the filename BOOKS. a Best Books is aiming to make a profit of $1000 for Complete Idiot’s Guide. What is the minimum number of units needed to be sold to make this profit for this book? 158 Options 3 4 5 6 b Best Books is aiming to make a profit of $2000 for Mastering Spreadsheets. What is the minimum number of units needed to be sold to make this profit for this book? c The selling price of each book is calculated by adding 50% to the cost price. Best Books has decided to have a sale and decrease the markup on all books from 50% to 20%. What is the total profit using this markup if the sales figures remain the same? d The sale described in question (c) has resulted in an increase in sales of 30% on all books. Add a new column after column B with a heading of ‘New sales’. Enter formulas into this column to calculate the new sales figures. What is the total profit based on these sales figures? e What increase in sales is required to obtain a total profit of $7000? (Make your answer correct to the nearest whole number.) Create a spreadsheet using the data in Figure 5.7. Save the spreadsheet with the filename MUSIC. a Mick’s Music needs to determine the total bonus for all of its employees. Enter a formula in cell F12 to calculate the total bonus. b How much overtime does Sandra White need to complete to receive a total bonus of $1400? c What is the effect on the total bonus if the additional bonus is increased from $200 to $250? d What is the effect on the total bonus if the bonus and additional bonus are calculated on 40 hours of overtime instead of 50 hours? Michael is considering purchasing a restaurant in the local area. Each week the restaurant buys $20 000 of stock for about 250 customers. This stock is sold at a profit of 60%. The wages bill for the week is $9500, and Michael would need to repay a loan at $5000 per month. Michael needs to analyse this data to determine the restaurant’s profitability. Construct a spreadsheet to help Michael make his decision and save it with the filename MICHAEL. What is the minimum number of customers needed for the restaurant to break even? Melissa works for a tourist bureau. She has been asked to collect and organise data on popular Australian tourist destinations. The data collected includes the location, cost, hours of operation, rating, amenities and characteristics. Develop a database solution for Melissa using real or fictitious data and save it with the filename TOURIST. Melissa needs to use the database to help with decisionmaking. Describe and demonstrate five different ways the database would help Melissa make a decision. The Internet contains many Web sites that use and promote a DSS. Describe the features in two Web sites for each the following applications: a predicting stock prices b home loan analyser. 5.3 Organising and decision support systems Organising is the modification of data by arranging, representing and formatting data. It is carried out after the data is collected. In a DSS, it involves designing spreadsheets and constructing the knowledge base of an expert system. Decision support systems 159 Designing spreadsheets Designing spreadsheets involves creating a pen and paper model, identifying data sources, planning the user interface and developing the formulas to be used. Pen and paper For centuries, people have used pen and paper to construct rows and columns of numerical data and manipulate it in some way (see Figure 5.9). For example, people used ledgers to keep records of their sales, incomes and payments. Today, pen and paper are still used to plan a spreadsheet and create a model of the situation. How is the spreadsheet going to solve the problem? What data needs to be entered? How will I obtain the data? What will the headings and titles be? How will the numbers look? What is the relationship between the data? Does it require a calculation? What formulas are to be used? What results are required? Creating a spreadsheet may also involve using a template. A template is a document created for repeated use. A spreadsheet template contains labels and formulas to solve a particular problem. The user enters the values to obtain the required solution. For this reason, a template can save time and effort. Templates are available in many spreadsheet programs to help with decision-making. Figure 5.9 A traditional pen and paper spreadsheet. Data sources Data is collected for a spreadsheet from a variety of data sources. It may be obtained by researching the topic and selecting relevant facts. The Internet is a source of data. Web sites and newsgroups present information on a range of topics. Data sources may also include interviews, surveys, observations and measurements. Data should be gathered in an organised way to ensure nothing is omitted. After the data is collected, it must be carefully interpreted to ensure that the resulting information is valid. For example, can the results of a survey be generalised to a large group of people? The reliability of the data source is another issue. If similar data was gathered at another time and place, would the results be the same? User interface A spreadsheet must be well-designed and easy to use. There is no correct way to design a spreadsheet. Each particular problem has its own design requirements. ITITFact Fact In a survey of blue-chip companies, more than 90% of large spreadsheets contained at least one calculation error. Some spreadsheets were so badly written they were impossible to test and had to be completely rewritten. 160 Options However, a well-designed spreadsheet has four easily identifiable areas: instruction, input, calculation, and output (see Figure 5.10): • Instruction area. The instruction area provides information about the spreadsheet or directions for use of the spreadsheet. It is usually at the top of the spreadsheet and includes a title, a description, the authors and the creation or revision date. Larger spreadsheets include a brief outline of their structure, directions and parameters. A parameter is a variable that is given a constant value for a particular application. • Input area. The input area includes labels for headings and the values on which calculations are based. The format of the values and labels is often completed after the data has been entered. For example, when entering money values do not include the dollar sign ($) as these values can be formatted as currency, which will automatically enter the dollar sign. All inputs should be labelled clearly so the user knows where and how to enter the data. • Calculation area. The calculation area contains the formulas and functions that complete the work of the spreadsheet. The calculation area is the heart of a spreadsheet. • Output area. The output area displays the result of the spreadsheet. In many spreadsheets, the output area and the calculation area will be the same. All outputs should be clearly labelled so the user understands the results. Presentation of data should be suitable to the type of that data and its use. Often a chart will display the information in a more understandable form for a decision to be made. Instruction area Calculation area Output area Input area Figure 5.10 A well-designed spreadsheet. Formulas A formula is an instruction to perform a calculation. Whenever values are changed, the formulas are recalculated and produce new results. Formulas consist of four main elements: numbers, cell references, operators and functions: • Cell references allow formulas to refer to other cells in the same sheet or even cells in other sheets. Cell references are often in the form of a range or name. Decision support systems 161 A name is assigned to a cell reference or to a range to make the spreadsheet easier to use. For example, in the formula =SUM(FirstQuarterSales), the name FirstQuarterSales represents the range C20:C30 on the sheet named Sales. It is easier to identify than =SUM(Sales!C20:C30). • Operators are used to perform a process and are used to construct the required formulas. Operators can be grouped as arithmetic, relational or text (see Table 5.2). Operator Description Example + addition =6+2 gives 8 – subtraction =6–2 gives 4 * multiplication =6*2 gives 12 / division =6/2 gives 3 ^ exponentiation =6^2 gives 36 % per cent =15% gives 0.15 = equal to =3+2=4 gives FALSE <> not equal to =22–1<>20 gives TRUE < less than =22<20 gives FALSE > greater than =22>20 gives TRUE <= less than or equal to =15+4<=20 gives TRUE >= greater than or equal to =15+4>=20 gives FALSE text joining =’A=’&FALSE gives A=FALSE Arithmetic Relational Text & Table 5.2 Some spreadsheet operators. • Functions perform a simple or complex calculation. Special rules or syntax must be followed when functions are used. Functions consist of a function name, such as SUM; one or more sets of parentheses (()); and arguments (see Table 5.3). Arguments are the values on which the functions operate, such as the range of cells B4:B8 in the formula =SUM(B4:B8). Cell references make a spreadsheet very flexible. The value in a cell can be changed and the results seen without having to change the formulas. This process can be repeated many times, and it assists in decision-making. If a formula refers to itself, either directly or indirectly, it is called a circular reference. For example, if the contents of cell B4 were =B4+1, this would be a circular reference. It will result in an endless loop, and an error message will be displayed. When a formula is copied, the content of the formula in its new location may change or it may remain exactly the same, depending on whether absolute referencing and relative referencing was used to construct the formula: • With absolute referencing (also called absolute addressing), the formula is copied exactly, with the cell references remaining the same. Using the dollar sign ($) in the cell reference (for example, $A$1) indicates that it is an absolute cell reference. For example, if the formula =$B$5*$C$5 in cell D5 is copied to 162 Options Function Description Example ABS absolute value =ABS(–12) gives 12 INT integer part =INT(2.99) gives 2 LOOKUP searches a range of cells for for a lookup value =LOOKUP(B6,A9:C14) PI mathematical constant =PI() ROUND rounds to a number of decimal places =ROUND(3.14159,3) gives 3.142 SQRT square root of a value =SQRT(144) gives 12 SUM adds up all the values in a list =SUM(B4,B5,B6,B7) AVERAGE average of its arguments =AVERAGE(2,4) gives 3 COUNT how many numbers in the list of arguments =COUNT(5,1,12,5) gives 4 MAX maximum value in a list of arguments =MAX(3,6,1,4) gives 6 MEDIAN median (middle) of the given numbers =MEDIAN(8,3,10) gives 8 MODE most common value =MODE(4,6,6,4,4,4) gives 4 MIN minimum value in a list of arguments =MIN(3,6,1,4) gives 1 STDEV standard deviation =STDEV(5,10,15) gives 5 AND returns TRUE if all the arguments are true; returns FALSE if one or more arguments are FALSE =AND(2+2=4,2+3=5) gives TRUE =AND(2+2=5,2+3=5) gives FALSE FALSE returns the logical value FALSE =FALSE() IF returns one value if logical test evaluates to TRUE and another value if it evaluates to FALSE =IF(5<7,1,2) gives 1 =IF(8<7,1,2) gives 2 NOT reverses the logic of the argument =NOT(1+1=2) gives FALSE OR returns TRUE if any argument is TRUE; returns FALSE if all arguments are FALSE =OR(1+1=2,2+2=5) gives TRUE =OR(1+1=1,2+2=5) gives FALSE TRUE returns the logical value TRUE =TRUE() Arithmetic Statistical Logical Table 5.3 Some spreadsheet functions. cell D6, the new formula is identical (=$B$5*$C$5) and the result of the formula stays the same. • With relative referencing (also called relative addressing), the mathematical processes, such as the operators and functions, are copied but the cell references change so that they relate to the destination. For example, if the formula =B5*C5 in cell D5 is copied to cell D6, the new formula would become =B6*C6. The cell references have changed relative to the destination. Decision support systems 163 It is possible to have a formula containing both absolute and relative references. This is called a mixed cell reference. For example, if the formula =LOOKUP(A5,$B$15:$C$22) in cell C5 is copied to cell C6, the new formula would become =LOOKUP(A6,$B$15:$C$22) (see Figure 5.11). = B5*C5 = LOOKUP(A5,$B$15:$B$22,$D$15:$D$22) = LOOKUP(A5,$B$15:$C$22) Figure 5.11 Spreadsheet showing a mixed cell reference. Constructing a knowledge base A knowledge base is a set of general facts and if-then rules supplied by an expert. If the condition is true, then a certain deduction is made. For example, IF it has 4 legs, THEN it is a dog. This deduction would not always be valid. A more accurate deduction is obtained by using a set of if-then rules. For example, IF it has 4 legs AND IF it has a tail AND IF it barks, THEN it is a dog (see Figure 5.12). Each if-then rule is combined using the AND operator or the OR operator. When the AND operator is used, each condition must be true for the deduction to be made. When the OR operator is used, only one of the conditions must be true for the deduction to be made. For example, a knowledge base to screen job seekers: IF: applicant_occupation NOT = "retired" AND IF: hours_worked > 12 THEN: applicant_status = "worker". A knowledge base is often constructed using expert system shells (also called shells). Expert system shells are a ready-made expert system except that they contain no knowledge. When the knowledge is entered, it results in an expert 164 Options Antecedent Conclusion IF It has four legs AND IF It has a tail AND IF It has fur It is a dog AND IF It barks AND IF It meows It is a cat Figure 5.12 With if-then rules, different combinations lead to different deductions. system. Shells provide an interface to assist the user in creating an expert system. The shell queries the user for facts and for links between the facts. It enters this data into the knowledge base. The majority of shells represent knowledge using ifthen rules. The shell displays the word IF on the screen, and the user enters the conditions. The deductions (THENs) are added after the conditions (IFs). When a set of if-then rules is completed, the shell builds a knowledge base and an inference engine. Expert system shells allow expert systems to be built very quickly. The great majority of expert systems in Australia have been built using shells. MYCIN is a famous expert system developed in the 1970s at Stanford University in California. It was designed to assist non-specialist doctors in the diagnosis and treatment of bacterial blood infections. MYCIN asks the doctor about cultures grown from samples taken from the site of infection and the results of other tests. The knowledge base about bacterial infections is coded in if-then rules similar to following: IF: The stain of the organism is Gram-negative AND IF: The morphology of the organism is rod AND IF: The aerobicity of the organism is aerobic THEN: The suggestive evidence is that the organism is Enterobacteriaceae. Exercise 5.3 1 2 3 4 5 6 7 List the questions answered using pen and paper to design a spreadsheet. What is a template? Describe some of the data sources for a DSS. Describe the four main areas used in the layout of a spreadsheet. List four main elements in a formula. What is a ‘name’ in a spreadsheet? What is a circular reference? Decision support systems 165 8 9 10 11 12 13 14 15 Explain the difference between an absolute and a relative reference. What is a mixed cell reference? What are if-then rules in a knowledge base? Explain the difference between the AND and OR operator as they are applied in a knowledge base. Design a set of if-then rules to identify a cat. What is an expert system shell? What is the purpose of MYCIN? What are the results of the following formulas: a =8+2*5+7 b =9^2 + (24/6) c =AVERAGE(8,12) d =COUNT(6,2,14,7) e =SUM(1,5,9,12) f =MAX(8,5,1,9,8) g =IF(6<12,5,10) h =IF(13<12,5,10) LEARNING ACTIVITIES 1 Create a spreadsheet using the data in Figure 5.11. Save the spreadsheet with the filename ACE. a Enter each employee ID from the lookup table into cells A6 to A12. b Enter dummy data into cells B6 to B12 to represent the hours worked for each employee. c Copy the formulas in cells C5:E5 to cells C12:E12. Examine the formulas in cells C6, D6 and E6. What changes have occurred? d Todd Bradley is hired by Ace Technology. His employee ID is 945, hourly rate $14 and bank account number 7881225. Enter this data into row 23. Modify the spreadsheet so that it will calculate Todd’s weekly wage. e Ace Technology needs to determine the total weekly wage for all of its employees and the average hourly pay rate per employee. Edit the spreadsheet to do these calculations. f What would the total weekly wage bill be if every employee worked 35 hours a week? g What would the total weekly wage bill be if every employee received an hourly pay rate of $20? 2 Create a spreadsheet template that could be used as a personal budget for a Year 12 student. Save the spreadsheet as a template with the filename BUDTEMP. The template is to contain possible sources of income and expenses. Formulas are to be used to calculate total income and expenses and to balance the budget. Enter a range of values. List five what-if questions that could be asked of the spreadsheet for decision-making. 3 A video shop is having problems meeting its costs. It needs to decide whether it should increase its rental prices. Design a spreadsheet model that could be used to estimate the effects of different rental prices on revenue and the number of rentals. Visit a local video store to obtain current price structures and typical weekly rental numbers. Construct a well-designed spreadsheet. What will the effect of increasing rental prices be? 166 Options 4 A person is eligible to drive if he or she is 16 years and 9 months old and has passed a practical test and a theoretical test. Write down the if-then rules that could be used in an expert system to determine whether a person is eligible to drive. 5 An expert system is to be designed to assist a pet-shop owner to suggest a suitable pet for a customer. Create a knowledge base of if-then rules that could be used in the expert system. Design some test data to verify the rules. 6 Use an expert system shell to create a simple expert system. Choose a situation in which you are the expert. Simple expert system shells can be downloaded from the Internet. 5.4 Processing and decision support systems Processing in DSSs is the manipulation of data by editing it and updating it. This section describes the structure of expert systems, how they deal with data and the inclusion of certainty factors to handle unclear situations. It also includes a section on macros as valuable tools in the processing of spreadsheet models. The structure of expert systems An expert system has four major components: a knowledge base, a database of facts, an inference engine and an explanation mechanism. Knowledge base The knowledge base is a set of general facts and if-then rules supplied by an expert. It is the heart of an expert system as it contains the detailed knowledge supplied by an expert. The knowledge base is in the form of rules, such as if-then rules. A knowledge base can contain just a few rules or thousands depending on the scope of the expert system. The knowledge of an expert is expressed using the if-then rules in the knowledge base. Database of facts The database of facts is the data that relates to the specific situation being analysed. The database of facts is used by the inference engine when it is working on a problem. It is simply a table. The database of facts holds the data about the current task, such as the user’s answers to questions, data from outside sources, intermediate results of the reasoning or conclusions reached so far. There is a clear distinction between the knowledge base and the database of facts. The database of facts contains data about the current problem. For example, a knowledge base to predict sales would contain data from a range of different companies. However, the database of facts would contain data from a specific company and its trading performance. Inference engine The inference engine is the part of the expert system that carries out the reasoning. It is a set of routines that carries out deductive reasoning by applying the facts, assumptions, theories, and rules in the knowledge base. It carries out the Decision support systems 167 reasoning by following a set of strict logical processes as opposed to the richness of human reasoning. The inference engine applies the if-then rules in the knowledge base plus the database of facts to decide what question to ask next. It is essentially a rule interpreter whose function is to use the if-then rules, facts and other items in the knowledge base to solve the problem set by the user. Explanation mechanism The explanation mechanism is a method of checking how the expert system inferred its deduction. Experts systems do not guarantee decisions; it is always up to the user to make a final judgement. If users check the explanation mechanism, they find out how a particular fact was inferred or why a particular question is being asked. The explanation mechanism confirms the series of inferences that have led to a conclusion or to a particular question being asked. Types of inference engine There are two main types of inference engines: forward chaining and backward chaining. Forward chaining Forward chaining is an inference strategy in which the user supplies all the data before the question is asked or the inference is made. It begins with data and works forward to see if any conclusions can be reached. Forward chaining is often used when there is no clear goal and the system is just attempting to determine all of the conclusions implied by the data. For example, in forward chaining you might be asked a series of questions about your eating habits. Forward chaining then draws an inference or conclusion based on your answers, such as you have a healthy diet. Backward chaining Backward chaining starts with one or more possible solutions and searches back through the system to determine the questions to be asked. It is also known as ‘goal-directed reasoning’ or ‘conclusion-driven reasoning’. Backward chaining starts with a tentative conclusion and searches back through the rules for the questions or facts that support that conclusion. Backward chaining works in the opposite direction to forward chaining. It starts with the tentative conclusion, such as you are on a healthy diet, and then asks all the questions to ensure the user meets the conditions (see Table 5.4). Backward chaining Starts from Possible solutions New data Works towards New data Any conclusions Progression through rules Conclusions to conditions Conditions to conclusion Style Conservative Opportunisitic Processing Efficient Possibly wasteful User’s impression Plodding but predictable Responsive but quirky Obvious usage Selection between alternative solutions Building up solutions and ‘leaps’ in reasoning Table 5.4 Comparison of backward and forward chaining. 168 Options Forward chaining Backward and forward chaining have different uses and different effects. Although they proceed in opposite directions, an expert system might use them in combination. A doctor’s typical analysis process is a combination of forward and backward chaining. The doctor starts with a brief medical history and draws some tentative conclusions (forward chaining). The doctor then uses backward chaining to confirm or deny the diagnosis (see Figure 5.13). Forward Chaining Bump on head Head Injury Vomited Nausea Disorientated Dizziness Suspect brain haemorrhage Backward Chaining Perform CAT scan Eliminate brain haemorrhage Figure 5.13 Forward chaining versus backward chaining. Fuzzy logic Fuzzy logic describes the variables that exist between a ‘true’ and a ‘false’. For example, a piece of information might be ‘fairly’ true. Fuzzy logic seems closer to the way our brains work. We combine data and form a number of partial truths on many topics. Fuzzy logic is used in neural networks and expert systems. The results of fuzzy logic operations may be expressed as probabilities or possibilities. Fuzzy logic relies on historical data, mathematical probabilities and rules. Consider this unclear situation: ‘If Stella is tired, then there’s quite a good chance she’ll be in a bad mood’. The expert system must interpret the meaning of the words ‘a good chance’. It does this by adding certainty values, or probabilities, to the rule and attaching certainties to any new conclusions. Thus, fuzzy logic might conclude that Stella is probably in a bad mood and that this conclusion has a certainty value of 0.6. Fuzzy logic is based on probability theory. However, it is much less rigorous than probability theory and aims for a good guess rather than a precise probability. The basic idea is to add certainty factors to rules and use these to calculate the measure of belief in some deduction. Certainty factors are often based on the rough guesses, or rules of thumb, of experts rather than on actual statistical knowledge. They are easily updated if new information is received. The following if-then rules have certainty values attached: IF: car won’t start THEN: battery is flat (certainty value = 0.7) IF: car won’t start THEN: starter motor is broken (certainty value = 0.2). Decision support systems 169 The certainty values in the example are based on the expert’s knowledge or guess about how often flat batteries are the cause of a car not starting versus how often broken starter motors are the cause. Macros A macro is a series of commands stored in a file that can be executed by pressing a few keys. Macros allow many operations to be performed automatically, such as opening menus, choosing commands or entering text. Macros save time and reduce keyboard errors. Any sequence of actions that a user performs can be recorded as a macro. For example, your name may appear in all your spreadsheets. If you store your name in a macro assigned to the ‘F2’ key, then every time you press the ‘F2’ key, the macro will type your name. To record a macro, select the ‘Record New Macro’ command. The command will ask for a name for the macro so it can be saved as a file and will ask which key or keys to assign the macro to. After you enter a name and key assignment, the macro recorder starts working. Each action that you complete will be remembered. Do the task that the macro will perform. When all the actions are completed, turn off the macro recorder by selecting the ‘Stop Recorder’ command. The macro is used by selecting the ‘Run Macro’ command. This command will carry out all the actions stored in the macro. Macros are used to automatically move to specific areas of the spreadsheet, to sort data areas or to format areas. Macros can also be created using programming languages, such as Visual Basic. Exercise 5.4 1 2 3 4 5 6 7 8 9 10 11 List the four major components of an expert system. Explain the difference between a knowledge base and a database of facts. What is an inference engine? How is the explanation mechanism used in decision-making? What is forward chaining? Describe a situation that combines forward and backward chaining. What is fuzzy logic? What is a certainty value? How is fuzzy logic calculated? What is the meaning of a conclusion with a certainty factor of 0.2? How do you record a macro? LEARNING ACTIVITIES 1 A person’s results from a series of tests, such as running up stairs or throwing a ball, are entered into a sports expert system. The expert system then suggests the most appropriate sport for that person. a Describe the type of information held by the knowledge base. Your answer should include some if-then rules. b Describe the type of information held by the database of facts. c Do you think the expert system is using forward chaining or backward chaining? Justify your answer. 170 Options 2 Sarah is prepared to invest somewhere between $3000 to $15 000 in a financial institution. Investigate the current interest rates for a term deposit at three different financial institutions. Sarah needs to make a decision on the amount of the investment and the length of her investment. a Construct a spreadsheet with clearly defined instruction, input, calculation and output areas. Save the spreadsheet with the filename SARAH. b Create a simple macro to automatically move to each specific area of the spreadsheet. c What is the effect of different interest rates on her investment? If you had this amount of money, where would you invest it? Estimate the return for your investment and include it on the spreadsheet. 3 How can backward chaining be used to draw conclusions in an expert system based on the following set of rules: If wage > $50 000, then wage is good. If assets > $120 000, then credit risk is good. If wage is good and credit risk is good, then grant loan. 4 An expert system uses the following if-then rules: IF has-spots(X) AND has-fever(X), THEN has-measles(X). Certainty factor is 0.5. What is the meaning of the fuzzy logic in this situation? 5 Name three situations where fuzzy logic needs to be applied. Describe these situations using if-then rules and attach certainty factors to the conclusions. 6 ‘Intelligent enterprise’ is a rapidly growing aspect of the Internet. Search the Web to obtain information on this topic. (Try www.intelligententerprise.com.) 5.5 Analysing and decision support systems Analysing in a DSS is the interpretation of the data. It involves examining the data and giving meaning to it. This section looks at methods of extracting relevant information from spreadsheets and databases. It also compares and contrasts the different methods of matching data used by databases, neural networks and expert systems. Data mining Data mining is a process that finds relationships and patterns in the data stored in a database. It sorts through the data and turns up interesting and often useful connections. Intelligent agents are pieces of software used in data mining to search through relational databases for relevant data. For example, data mining could be used to analyse the transactions at the supermarket. It might determine that there was a relationship between tomato sauce sales and meat pie sales. This information might be useful for marketing promotions. The main purpose of data mining is to identify new marketing opportunities and to target particular niche markets. However, one problem with data mining is that many of the patterns occur by chance and have no value in making decisions. Data mining also raises issues of privacy and ownership of data. Data mining identifies patterns in data and infers rules from these patterns. It then uses additional data to refine the rules based on the original patterns of data. Results from data mining include: Decision support systems 171 • linking a number of events together, such as linking two mandatory courses so they are timetabled at different times • identifying patterns, such as a sequence of courses over a number of years that students commonly choose • organising data into patterns, such as the length of degree • inferring rules from certain subgroups that distinguish them from other groups, such as groups based on age or interest. Internet search engines, such as AltaVista, provide data mining tools to assist with finding information on the Internet. These sites maintain large databases of information about Web pages. Their search engines have Web crawlers that search the Web and group sites into classifications. Users can search for relevant Web sites by using the classifications and subject headings. ITITFact Fact Search engines are a relatively ancient technology. In the 1970s, a search engine was used by IBM to search voluminous text files created by lawyers defending IBM against a U.S. Government anti-trust suit. Extracting summary data The purpose of a spreadsheet is to produce information in a useful form to assist decision-making. It changes data into information by performing calculations. However, information is difficult to understand when too much information is presented or it is in the wrong format. Extracting summary data from a spreadsheet may involve using a range of different tools: • Filtering data so that it will display only the desired data. For example, a spreadsheet of international sales data can be filtered to only show the Australian sales data. Extracting summary data is often easier if the data is sorted. • A report allows you to insert headings and titles and choose the information to be printed. Spreadsheet programs allow the user to prepare more than one report from the same spreadsheet. • A pivot table is an interactive table that quickly summarises large amounts of data. The user specifies the data and the calculations to be performed. When the table is built, it is possible to rotate the rows and columns to see different summaries. This ability to pivot the dimensions of the table makes it a very powerful tool. Pivot tables are linked to the original data in the spreadsheet. Spreadsheet analysis Spreadsheets are analysed in many different ways to obtained information and help with decision-making. Three of these methods are what-if models, statistical analysis and charts. What-if models A what-if model, or sensitivity analysis, is the process of making changes to the data and observing their effects. For example, in a budget spreadsheet, the user could change one of the expenses and observe the effect on the balance (see 172 Options Figure 5.14). Most spreadsheet programs allow data from other sources to be used. Data can be imported from relational databases or even from the Internet. This allows different sets of data, or scenarios, to be used within the same spreadsheet model. For example, in the budget spreadsheet the user could use a new sheet for each family member. Each sheet would have a set of values for that person. The ‘what-if’ analysis is then performed using a combination of the data in each sheet. Figure 5.14 Spreadsheet used for what-if questions. Statistical analysis Spreadsheet programs contain many built-in statistical functions. Statistical functions are used to analyse and interpret data. Table 5.3 on page 163 describes seven statistical functions commonly used in a spreadsheet for statistical analysis, such as STDEV. Statistical functions are often used to construct statistical models that perform complicated analyses, such as analysis of variance or regression analysis. A linear regression model is the best-fit relationship between two types of data, such as sales and money spent on marketing (see Figure 5.15). An organisation might develop a linear regression model to estimate future sales based on past experience. Charts A chart is a graphical representation of numerical data. Charts convert data in rows and columns into pictures that can be read at a glance (see Figure 5.16). Text and tables require close study to obtain a general impression of a subject. Charts make data easier to understand: trends are revealed and comparisons are made instantly. Charts can help people make quick and accurate decisions. There are many different types of charts, including bar, column, line and pie charts: Decision support systems 173 ne li nd Tre 40 35 Advertising ($M/month) Sales ($M/month) 1.1 20.3 Sales ($ million/month) 30 1.3 21 25 1.2 20.1 20 1.5 22.7 15 1.4 21.9 1.4 22 2.5 32 2.8 36 2.8 35 2.8 34.8 10 5 0 1.1 1.3 1.2 1.5 1.4 1.4 2.5 2.8 2.8 2.8 Advertising ($ million/month) Figure 5.15 A linear regression model for predicting sales volume. Cost • A bar chart allows comparisons between items to be made at a glance and shows variation over a period of time. A bar chart presents data in horizontal rectangles. The length of the rectangle gives a visual representation of its value. In bar charts, numeric values are plotted along the X-axis, and categories are plotted along the Y-axis. • A column chart also allows comparisons between items to be made at a glance and shows variation over a period of time. A column chart presents data in vertical rectangles, and the length of each rectangle gives a visual representation of its value. In column charts, categories are plotted along the X-axis, and numeric values are plotted along the Y-axis. • A line chart shows trends or changes in data over a period of time. It emphasises time flow and rate of change rather than the amount of change. A line chart presents data by joining a line between adjacent values. Each value is plotted as a dot called a data marker or data Warehouses against location point. In line charts, categories are 7000 usually plotted along the X-axis, and numeric values are plotted 6000 along the Y-axis. Distance 5000 • A pie chart shows the relationship, or proportions, of parts to a whole. 4000 Pie charts appeal to people Hour & cost because they are easy to read and 3000 attractive. A pie chart presents data as sectors of a circle. Sectors of a 2000 circle are similar to slices of a pie. 1000 0 1 2 3 Warehouses Figure 5.16 Charts convert data into pictures that can be read at a glance. 174 Options Data matching Data matching involves finding data and giving some meaning to it. DSSs use different ways to match data in a database, a neural network and an expert system. Data matching in: • a database involves searching and sorting data. It requires the user to construct an appropriate query and interpret the results. Data matching in a data warehouse is achieved using data mining. It finds relationships and patterns in the data stored in a database. • a neural network is achieved by finding relationships between sets of data to develop an understanding of the situation. Neural networks are capable of learning. They examine the data and create new information as they are training. • an expert system involves the use of a knowledge base, a database of facts and an inference engine. The knowledge base and database of facts contain all the data, and the inference engine carries out the reasoning by using the facts, assumptions, theories, and rules. Both the database and the expert system have a fixed body of data, unlike the neural network whose learning may create more data and information. However, this distinction is blurring. For example, many recent expert systems have a neural network component to allow them to learn. In addition, data mining used in data warehouses applies many of the techniques from neural networks to discover new information. Exercise 5.5 1 2 3 4 5 6 7 8 What is the purpose of data mining? Describe four results obtained from data mining. List three tools for extracting summary data from a spreadsheet. Why is data filtered? What is a pivot table? List three ways that spreadsheets can be analysed. What is a linear regression model? Describe the four different types of charts that are commonly used to display information. 9 What is data matching? 10 How is data matching achieved in a neural network? 11 Explain a distinction in data matching between the database and expert system compared to a neural network. LEARNING ACTIVITIES 1 Create separate spreadsheets and an appropriate chart for the following data: a Compare sales figures over two days at the following stores to show any variation over time: Castle Hill, $15 000 and $13 000; Rose Bay, $17 000 and $18 000; Parramatta, $23 000 and $26 000; and Campbelltown, $12 000 and $10 000. b Show the proportions of parts to the whole for the following age groups: 0 to 20, 36%; 20 to 40, 26%; 40 to 60, 24%; and 60 to 80, 14%. c Analyse each of the above spreadsheets and draw a conclusion based on your analysis. Decision support systems 175 2 Michelle has accepted a position as a librarian. She is moving away from home and concerned about her finances. Develop a spreadsheet to analyse Michelle’s finances. Michelle will receive $40 126 per annum (before tax) as a librarian and is paid fortnightly. She has $4500 invested in a bank, and interest is paid half-yearly. Michelle wants to purchase a car and needs a personal loan of $30 000 from a bank. Payments will be paid monthly for five years. Michelle needs to budget for the following expenses: rent, food, utilities, clothing, entertainment, car repayments and savings. She is hoping to save some money for a holiday at the end of the year. Investigate your local community to obtain appropriate living expenses, then: a Design a spreadsheet for Michelle’s finances. Save the spreadsheet with the filename MICHELLE. b Use some of the statistical functions to analyse the spreadsheet. c Construct appropriate charts to help analyse the spreadsheet. d Create some what-if models and draw a conclusion based on your analysis. 5.6 Other information processes All information processes play a role in decision support systems, including collecting and storing and retrieving. Collecting Collecting is the information process that involves deciding what to collect, locating it and collecting it. In DSSs, it involves identifying data and identifying the roles of the expert and the knowledge engineer in the creation of expert systems. Identification of data When collecting data for DSSs, it is important to know what decisions you have to make. This determines whether the source of data is primary or secondary. Primary source is when data is collected first hand. Many organisations generate their own primary source data because they consider it more meaningful and reliable, although it is time consuming and costly. Data from primary sources is acquired through interviewing people, conducting surveys and questionnaires, or observing the system in operation. Secondary source is when data is collected or created by someone else, such as data collected from newspapers, books, other print media, electronic databases, CD-ROMs and the Internet. This is often the quickest and least costly method of collecting data, but it may be less meaningful and reliable than primary source data. After the data is gathered, it is often classified as structured or unstructured. Structured data is predefined characters, usually numbers, whose meaning and format is specified. It is easily stored and retrieved in an orderly manner for decision-making. Spreadsheets and many databases use structured data. Unstructured data does not fit a predefined or descriptive model. It includes all types of media, such as text, audio, numbers, images and video. Unstructured data is more difficult to use in DSSs as it creates greater processing and storage demands. When collecting data for DSSs, users should consider the data range, time span and level of detail. The data range is the amount of data and the number of sources. To make a strategic decision, management may need a wide range of data, 176 Options such as the average monthly amount spent on advertising over the last ten years by companies in the same industry. Although the required information is only one number, it is derived from vast amounts of data from many organisations over a long time period. This data would have a broad data range, a wide time span (ten years) and a low level of detail (one number). The role of the expert Expert systems collect data from a person experienced in that field, or an expert. The expert supplies the knowledge for the knowledge base and the inference engine. The quality of an expert system is dependent on the knowledge of the expert. Expertise is the skill and knowledge, generally gained by experience, that, when applied to a problem, results in a performance well above the normal. Expertise often consists of large amounts of factual information that is applied using specific rules to analyse a problem in an efficient manner. Most rules that experts use are heuristic. Heuristic rules require more than ordinary knowledge; they are put together from the experts’ experience and hindsight. The role of the knowledge engineer Knowledge engineers are the people who build the expert system (see Figure 5.17). They are responsible for obtaining information from the human experts and for designing the structure of the knowledge base and the inference engine. A knowledge engineer will help experts describe their knowledge and design an expert system that is attractive and useful. The information presented by the expert system should be displayed using language that is appropriate to the intended user of the expert system. Figure 5.17 A knowledge engineer. Knowledge engineering is an interactive procedure performed by the knowledge engineer and the expert to develop an expert system that will solve a problem. Knowledge engineers need not be experts themselves and should not think that they are experts. However, a broad experience in the field is a distinct advantage when the knowledge engineer has to solve a new problem. Knowledge engineers tend to be verbal, curious and quick to understand complex relationships. Decision support systems 177 Storing and retrieving Storing and retrieving data is a two-step process for retaining data. In DSSs, data is stored in large databases, such as data warehouses, with intelligent agents used to search and retrieve data. Businesses have always relied on unstructured information. The amount of unstructured information, such as the Internet with Web sites, email and newsgroups, is increasing at a staggering rate. The rapid increase in information has reached the point where people are being frustrated by information overload. Decision-makers are facing an increasingly challenging task in searching through the available sources of information to find the most appropriate ones. Intelligent agents are tools to help decision-makers. Intelligent agents Intelligent agents are pieces of software that search through relational databases for relevant data. They use neural networks to efficiently search vast amounts of data. Intelligent agents are independent goal-directed agents that can be launched into a computer system or network to operate in the background. Intelligent agents are used in data mining to find relationships and patterns in the data stored in a database. However, the most common use of these agents is on the Internet, such as an email agent or a news agent. An email agent can screen a user’s incoming email for those requiring immediate action. Similarly, a news agent can be trained to scan articles in a news service and to deliver a personal bulletin based on the user’s preferences. The main purpose of intelligent agents is to carry out these tasks faster and more effectively than a human. The hardest thing to program into these agents is commonsense. ITITFact Fact An intelligent agent is sometimes called a bot (short for robot). They have been developed to personalise information on a Web site based on registration information and usage analysis. Exercise 5.6 1 2 3 4 5 6 7 8 9 10 Explain the difference between primary source and secondary source. Describe structured data. What is the meaning of data range? Describe the role of the expert in an expert system. What are heuristic rules? Describe the role of the knowledge engineer. What is an intelligent agent? Describe how an intelligent agent works. List two examples of the use of an intelligent agent. Outline the main purpose of an intelligent agent. LEARNING ACTIVITIES 1 The source of data for a particular DSS depends on the particular problem: a A punter intends to train a neural network program to select winners of horse races. Suggest sources and types of data that could be included in a training database. 178 Options b A knowledge engineer is constructing an expert system to assess eligibility for bank loans. Suggest sources of data for the knowledge base. c A manager is constructing a spreadsheet model to assist with long-range planning. Describe some of the primary and secondary sources of data that might be relevant. 2 There are many popular search engines. Review at least four search engine sites, including an Australian site, such as webwombat; a meta search engine, such as dogpile; and a special-interest search engine. a How are they different? Do they have different rules for using keywords? b Pick a topic that interests you. Using the same keywords, try your search in the four search engines. Did you get different results? c Write a short review of the results of your research. 5.7 Issues related to decision support systems Both positive and negative impacts arise in the use of a DSS. In this section, we examine some of the issues raised by the increasing use of DSS by decisionmakers. Intelligent systems Scientists are aiming to give computers the ability to think like humans; this is called artificial intelligence, or AI. Artificial intelligence is behaviour by a computer system that, if exhibited by people, would be called intelligent. Artificial intelligence is used by intelligent systems. Intelligent systems receive data from the environment, react to that data and produce an intelligent response (see Figure 5.18). They are used in DSSs, such as expert systems, to perform the following functions. Figure 5.18 The Sendai railway system in Japan operates without drivers, using artificial intelligence. Decision support systems 179 Preserving expert’s knowledge Preserving an expert’s knowledge is one of the reasons for developing an expert system. The factual knowledge supplied by an expert is maintained and applied even after the expert has changed jobs or moved locations. For example, the knowledge of specialist doctors can be used to create an expert system. This allows other doctors without specialist training to access the knowledge of the specialist doctors. An expert system can also combine the knowledge of many different experts. Once the expert system has been created, the expert’s knowledge is stored and available to a range of different users. It can also be argued that a DSS has resulted in a loss of expert knowledge. That is, the use of a DSS has resulted in jobs that now require less expertise, such as tasks involved in authorising, scheduling, pricing and buying. For example, loan officers have become dependent on the use of a DSS for the approval of a loan. They do not require the same level of expertise as a loan officer without a DSS. Improving performance and consistency DSSs have improved performance and consistency in decision-making. This was the original reason for creating a DSS. In general, people make decisions in a limited amount of time based on limited information and with limited processing. A common problem with decision-making is that the language used to describe the information influences decision-makers. For example, an 80% chance of success seems much more positive than a 20% chance of failure. People often give undue weight to the most recent information, are too confident, or are not prepared to change their opinion. Think about the last decision that you made. Did you collect all the relevant information and consider all the possible alternatives? Expert systems will arrive at a decision based on the knowledge of the expert. These decisions are not objective but are based on the relevant facts of the problem. The decision-making is consistent but not always correct. An expert system only assists decision-making; it is up to the user to make the final judgement. Making rapid decisions DSSs make rapid decisions. They are substantially quicker and more consistent than an expert in many situations where large amounts of data and numerous alternatives are to be considered. A DSS provides more information and helps to generate and define alternatives. Analysing unstructured situations DSSs using neural networks and expert systems have improved decision-making in unstructured areas, such as disaster relief management, mining exploration and predicting share prices. In an unstructured situation, there is no single method to reach a decision and no guarantee that the decision will be correct. There are too many factors or too little knowledge about the situation. DSSs are used to analyse unstructured situations and provide information to make the situation semistructured. They reduce the problem to obtain a manageable number of alternative solutions, but they don’t always result in the best solution. Data mining Data mining is the process of finding relationships and patterns in the data stored in a database. It sorts through the data and turns up interesting and often useful 180 Options connections. The information obtained from data mining allows organisations to make more informed decisions in such areas as improving marketing campaigns or siting a new store. However, it does raise the issues of erroneous inferences and privacy. Erroneous inferences Data mining identifies patterns in data and infers rules from these patterns. It then uses additional data to refine the rules based on the original patterns of data. Erroneous inferences occur when these rules are incorrect. This happens because many patterns occur by chance, and there is no relationship between the data. For example, the fact that the sales of ice cream in Sydney are linked to the sales of socks in Melbourne is a low probability relationship. People need to apply commonsense when analysing the results from data mining. Decisions made from data mining must be checked to avoid using an erroneous inference. Privacy Privacy is the ability of an individual to control personal data. Personal data used in data mining is often used in an unintentional way. For example, some businesses collect and sell information about their customers’ buying habits. Information is collected at the checkout and combined with a customer profile. The customer profile is obtained by enticing a customer to use a special card for a discount, such as earning Frequent Flyer points. This card provides the business with details of age, sex, income, job and address. Data mining finds relationships between the customers’ buying habits and their customer profiles. This information is very valuable for marketing products and providing better services to customers. However, people’s personal data is being used without their permission. People’s privacy is being invaded. The issue of privacy has always existed. However, information technology is widening the scope of the issue and making the invasion of privacy much easier. Many common activities leave an electronic trail. Every time a person uses a credit card or surfs the net, data is added to a database. Data mining is being used to analyse this data and find relationships. The Internet has countless Web sites that request information from users. Whenever users fill out a form, they are providing valuable information. Privacy is invaded when an email from an unknown organisation is sent to an email address and it uses the receiver’s name. This makes some people very angry. The information technology industry is currently self-regulated. There are many Web sites that provide disclaimers stating that any information provided will not be used for other purposes. However, these organisations may not have control of the data in their databases. The federal government has realised that selfregulation is inadequate and is preparing further legislation for privacy protection. Group decision support systems Many decisions are made by people in groups. A group decision support system (GDSS) is an information system that assists users to make a decision by working together in a group. GDSSs have the potential to improve both the efficiency and the effectiveness of some kinds of decision-making. A GDSS contains five main features: • presentation material—displays information on a screen of previously prepared material Decision support systems 181 • commenting—participants add comments on topics or ideas previously generated by other participants • brainstorming—participants add comments anonymously • voting—participants use the computer to vote on a topic • evaluation—ranks the alternative decisions based on the preferences of the participants. GDSSs are an emerging trend rather than common practice in business. IBM has been using GDSSs, and they have reduced the length of meetings and allowed people to focus on the particular topic. The brainstorming feature of a GDSS encourages participation by allowing ideas to be entered anonymously. However, it often increases conflict, as people are more assertive. For example, a GDSS makes it possible to tell the boss that he or she is incorrect without fear of retribution. Responsibility for decisions Research into artificial intelligence led to the development of intelligent DSSs based on neural networks and expert systems. This provided a class of DSSs that could replicate an expert’s knowledge and could learn from experience. More and more tasks are being done by expert systems, including preparing tax returns, writing wills and diagnosing diseases. However, this increasing dependence on machine intelligence raises new issues. Who is responsible for these automated decisions? Do users of these expert systems also require knowledge in the area? Who would be at fault when a wrong decision is reached as a result of using a DSS? There are four participants involved in the development and use of an expert system: the expert, the knowledge engineer, the professional who uses it, and the person who is affected by the decision. The problem can be caused by any of the participants. The expert might have provided inadequate knowledge, the knowledge engineer might have built the expert system poorly, the user might have applied the system incorrectly, or the affected person might have supplied the wrong data. An expert system is only as accurate as the expert and the knowledge engineer have made it. It will only consider the alternatives thought of by the expert. It is important to remember that a DSS only provides advice. It is the responsibility of the user to make the final decision. 182 Options Exercise 5.7 1 2 3 4 5 6 7 8 9 10 11 What is an intelligent system? Why is it important to preserve an expert’s knowledge? How can a DSS result in a loss of expert knowledge? Describe a common problem with decision-making. How are DSSs used in unstructured situations? How can erroneous inferences come from data mining? Describe the issue of privacy in terms of data mining. What is a GDSS? Describe the five main features of a GDSS. List the advantages for IBM of using a GDSS. Who is responsible for decisions in the use of an expert system? LEARNING ACTIVITIES 1 The manager of a $100 million pension fund used a neural network instead of common stockmarket indicators to make investment decisions. When the neural network suggested that the fund should invest 40% of its assets in bank stocks, the manager overruled it. In retrospect, the neural network was correct. Explain why this experience should or should not convince people to overrule a neural network. 2 ‘The recent advances in technology should make it possible to protect an individual’s privacy.’ Discuss this statement. 3 Fingerprint analysis is part of the science of biometrics, that is, the statistical measurement of biological characteristics. Recently biometrics has been used in fraud detection. Use the Internet to research other applications of biometrics. Does biometrics have the potential to invade our privacy? 4 You are a passenger on an aeroplane and have just learned that it will be landing automatically, using an expert system. How would you feel about this situation? Give reasons for your answer. 5 What are an individual’s privacy rights in New South Wales? (Hint: Visit the Privacy Commissioner’s Web page.) Decision support systems 183 Chapter review PART A Select the alternative (A, B, C or D) that best answers the question. 1 Which of the following is used to handle uncertainty in a DSS? A fuzzy logic B conflict resolution C data matching D spreadsheets 2 An inference engine is something that: A is required in any artificial intelligence application B produces the rules and inferences found in an expert system C acquires the knowledge required to populate the knowledge base D is the part of the expert system that carries out the reasoning 3 Knowledge engineering is: A the art of designing and building an expert system B the process of determining a conclusion from a given set of facts C the art of designing and building a neural network D building a collection of knowledge 4 The three main components of a DSS are: A inference engine, model management, explanation mechanism B data management, model management, dialogue management C model management, dialogue management, database D data management, database, user interface 5 Decision support systems: A help users make decisions in structured situations 184 Options 6 7 8 9 10 B are needed to solve all problems C need not be interactive D help users solve problems in semistructured situations Heuristics: A are supplied by experts in an expert system B are a basis for queries in a relational database C are used in spreadsheet models D are the same as algorithms An intelligent agent could be used to: A search expert systems for the right information B train neural networks C filter email D solve problems Fingerprint matching as performed by an AFIS: A takes days to find a match B still requires an expert to make the final decision C is an incredibly labour-intensive task D will replace DNA matching MYCIN is: A a famous medical neural network B the first fingerprint-matching expert system C a system that can replace doctors D an aid to diagnosing blood infections A GDSS is a system that: A makes decisions for managers B always uses video-conferencing C is based on certainty factors and is interactive D assists users to make a decision by working together in a group Chapter review PART B For each of the following statements, select from the list of terms the one that most closely fits the statement. Write the letter corresponding to your choice next to the statement number. Statements 1 A piece of software to search through relational databases for relevant data. 2 A process of finding relationships and patterns in the data stored in a database. 3 An information system that assist users to make a decision. 4 Depends on a method to reach a decision but the correct decision is not guaranteed. 5 A rectangular grid made up of rows and columns to organise and store data that requires some type of calculation. 6 An inference strategy where the user supplies all the data before the question is asked or the inference is made. 7 Starts with one or more possible solutions and searches back through the system to determine the questions to be asked. 8 Provides information and solves problems that would otherwise require a person experienced in that field. 9 An information system that works like the human brain and is capable of learning. 10 A database that collects information from different data sources. 11 A ready-made expert system except that it contains no knowledge. 12 An information system that assists users to make a decision by working together in a group. 13 A set of general facts and if-then rules supplied by an expert. 14 Describes the variables that exist between a ‘true’ and a ‘false’. 15 Does not use a method to reach a decision. 16 An information system that receives data from the environment, reacts to that data and produces an intelligent response. List of terms a backward chaining b data mining c data warehouse d DSS e expert system shell f forward chaining g fuzzy logic h intelligent agent i intelligent system j k l m n o p knowledge base expert system GDSS neural network semi-structured situation spreadsheet unstructured situation PART C Write at least one paragraph on each of the following. 1 Briefly describe four different types of DSSs. 2 A medical diagnostic DSS can assist a doctor by providing a patient diagnosis. It must be able to explain to the doctor how it reached that diagnosis. Do you think an expert system or a neural network is suitable for this situation? Give reasons for your answer. 3 Explain the difference between the following terms: a forward and backward chaining b structured and unstructured situations c database of facts and knowledge base. 4 Describe some of the analysis tools provided in a spreadsheet. 5 Neural networks have to be ‘trained’. What does this mean and why is it necessary? 6 Identify a social or ethical issue involved in DSSs. Identify both the positive and negative aspects of the issue. Decision support systems 185 6 chapter AUTOMATED MANUFACTURING SYSTEMS Outcomes Overview This chapter examines the characteristics of automated manufacturing systems. It investigates specific examples and reasons for automation. The information processes of an automated manufacturing system and the social and ethical issues that relate to these systems are presented. • applies an understanding of the nature and function of information technologies to a specific practical situation (H1.1) • explains and justifies the way in which information systems relate to information processes in a specific context (H1.2) • analyses and describes a system in terms of the information processes involved (H2.1) • develops solutions for an identified need which address all of the information processes (H2.2) • evaluates the effect of information systems on the individual, society and the environment (H3.1) • demonstrates ethical practice in the use of information systems, technologies and processes (H3.2) • proposes ways in which information systems will meet emerging needs (H4.1) • assesses the ethical implications of selecting and using specific resources and tools (H5.2) 6.1 Characteristics of automated manufacturing systems Automation refers to the application of automatic control to industrial processes. It refers to the application of machines to tasks once performed by human beings. The development of automation has become increasingly dependent on the use of information technology. This has resulted in automated systems that have become increasingly sophisticated and complex. Advanced automation systems represent a level of capability and performance often greater than what people could achieve. Automation is a term used widely in a manufacturing context. ITITFact Fact The term ‘automation’ was used by D. S. Harder, an engineering manager at the Ford Motor Company, in 1946. He used the term to describe the increased use of automatic devices and controls in mechanised production lines of the automobile industry. During the Industrial Revolution, products were still custom-made with manually operated machine tools. The automation concept of the assembly line became a reality in the twentieth century. It resulted in better and cheaper goods and services. These automated manufacturing systems out-produced human workers. Since the 1950s, a great number of scientific and technological breakthroughs have occurred. One of the most important developments was the invention of the digital computer. This invention, coupled with the concept of computer control, has made possible the present-day automated manufacturing industry. Manufacturing is the process of producing a product that meets a specific need. A strong manufacturing industry is necessary for strong economic growth in the modern world. To maintain a strong manufacturing base, it is necessary to produce high-quality products from this base. The products must be as cheap as possible while still maintaining a high level of quality. Automated manufacturing systems aim to provide these benefits. Automated manufacturing systems An automated manufacturing system is an information system involved in production by inventory tracking, record-keeping, production scheduling and actual production. The information technology employed in automated manufacturing systems is divided into several uses. The first use is keeping track of an inventory and the location of products and parts. The second use is performing the record-keeping about who did what work, when they did it, and how well they did it. The third use is related to the actual production, including production scheduling. Automated manufacturing systems have computerised controls built Automated manufacturing systems 187 into the manufacturing equipment. Every part of the production is scheduled and performed automatically. It requires automatic movement of material, precise scheduling and execution of all work steps, and automatic monitoring of quality and safety. An automated manufacturing system has the ability to perform the following tasks: • Collecting data from the environment through a wide range of sensors. A sensor is an input device that measures data from the environment, such as temperature, pressure, motion, flow and light. • Processing data into information using a microprocessor as a controller. A controller receives data from a sensor and changes it into information that can be used by the system. For example, sensors often collect data in analog form, and this needs to be converted to digital form for use in the system. • Performing work on a product. In most cases, the product must be moved from one location to another during the series of processing steps. At each processing location, the accurate positioning of the product is generally required. Actuators perform the actual work of the system, such as stopping a pump, moving a switch or turning on a light beam. An actuator carries out a mechanical action under the control of a signal from a controller. Some common actuators are electric motors, solenoids and stepping motors. (See Figure 6.1.) Figure 6.1 Automated manufacturing system using robots. Direct users Automated manufacturing industries employ a wide range of people with different skills. Each employee has certain responsibilities in his or her job, and all employees depend on information and data to perform their jobs satisfactorily. The organisation of most manufacturing companies is arranged in a hierarchy of responsibilities. This can help new employees to identify their position in a company and the people to whom they are responsible (see Figure 6.2). Each 188 Options person employed by the company is dependent on the flow of information throughout the system. Some people in an automated manufacturing system are classified as direct users. (Shareholders) (Board of Directors) (Managing Director) Sales/ Marketing Technical, R&D, Engineering Casting Department Lathe 1 Finance Manufacturing/ Factory (Managers) Procurement Production Planning Production Quality Machining Cell 1 Machining Cell 2 Finishing Department Lathe 2 Grinder Drill Press Secretarial (Managers) Assembly Department (Supervisors) (Operators) Figure 6.2 Organisation chart of a manufacturing company. The direct users are people who interact with or are in control of the automated manufacturing system. They include both the people using the machines and the supervisors. The supervisors oversee the operation to ensure that production does not get behind schedule. Direct users have a task that is dependent on the information produced during the manufacturing process. The information in an automated manufacturing system might include the following: • number of parts needed for a product • number of employees and skills needed to produce the product • cost of parts • cost of production • sources of component parts • prediction of market need • time required to machine or process parts • number of finished products in stock. Automated manufacturing systems 189 Block diagrams A system is a group of elements that work together to achieve a purpose. Systems are used to understand and explain the world around us. A block diagram is a diagram used to represent a system. The system is shown inside a rectangle, and the edge of the rectangle is the system boundary. Circles are used to represent inputs and outputs that are external to the system. A circle with a line down the middle is used to represent output from one system that is the input to another system (see Table 6.1). Symbol I Meaning External input System O External output External output/input Table 6.1 Symbols used in a block diagram. A system will take one or more inputs and perform a series of actions to produce one or more outputs. At the simplest level, a block diagram consists of a single input, a single output and a single system. The block diagram in Figure 6.3 represents the manufacture of a system unit for a personal computer. The input is the components that make up a personal computer, such as the casing, motherboard and hard drive. The automated manufacturing system assembles these parts using a computerised control. The output or product is the system unit. Computer Parts Ι Assemble Parts Figure 6.3 A simple block diagram for the manufacture of a system unit. 190 Options Ο System Unit Refinement is examining a system in greater detail by breaking it down into smaller parts. Each part is considered a system in itself, or a subsystem. A subsystem is a small system that is part of a larger system. It also contains a group of elements that work together to achieve a purpose. The block diagram in Figure 6.4 shows the manufacture of a system unit containing a subsystem for the motherboard, hard drive and DVD drive. Casing Ι Insert Motherboard Insert Hard Drive Insert DVD Drive Ι Ι Ι Motherboard Hard Drive DVD Drive Ο System Unit Figure 6.4 A block diagram for the manufacture of a system unit showing subsystems. Exercise 6.1 1 2 3 4 5 6 7 8 9 What is automation? What is an automated manufacturing system? How is information technology used in an automated manufacturing system? Describe three tasks performed by automated manufacturing systems. Explain the difference between a sensor and a controller. List three common types of actuators. What are direct users of an automated manufacturing system? What is the purpose of a block diagram? List the symbols used in a block diagram. LEARNING ACTIVITIES 1 Choose a common household product: a List the raw materials that go into its manufacture. b List the processes that would go into making this item. c Draw a block diagram to represent this manufacturing system. 2 Choose an automated manufacturing industry near you: a Describe this automated manufacturing system. b Identify the characteristics of this system. c Draw a block diagram to represent this system. 3 What is the role of accounting in manufacturing? How does an accountant in a factory depend on using a computer? What sort of information would the accounting department need in a factory? Automated manufacturing systems 191 4 What are the different engineering professions that might be employed in an automated manufacturing industry? Make a list of the jobs that they might do. 5 How is a database used in an automated manufacturing system? Draw a simple data flow diagram to indicate the flow of data between the customer and the system. 6.2 Examples of automated manufacturing systems In this section, we examine four examples of automated manufacturing systems and the reasons for automation. Specific examples Four specific examples of automated manufacturing systems are assembly line production, automated warehouses, CAD/CAM and mail sorting. Assembly line production Assembly line production is a series of workstations connected by a transfer system that moves parts between each workstation. Each workstation is designed to perform a specific processing operation, so that the product is gradually constructed as it progresses along the line. Raw materials enter at one end of the line, proceed through each workstation, and emerge at the other end as a completed product. Workstations are simultaneously processing a part of the product. One finished product is produced with each cycle of the line. Assembly line production requires various operations and product transfers to be properly coordinated. This is controlled by special computers called programmable logic controllers. PLCs are the main process control computers used in manufacturing. They are used for data capture and actuator control and to perform timing and sequencing functions. Assembly line production is applied in many industries, such as the car industry (see Figure 6.5). A typical car has over 5000 separate parts that need to be assembled to produce the final car. A large car manufacturer, such as Mitsubishi or Ford, might employ 3000 to 4000 employees in such jobs as accounting, management, car assembly, warehousing and marketing. Car assembly often requires some products from other manufacturers. An example would be the alternator and electrical systems used in a car. The car manufacturer needs to keep a database on the quantity and stock number of each part so that reordering from the warehouse is Figure 6.5 Assembly line production. not a problem. On the assembly 192 Options line, information needs to be kept about production times, machine maintenance, faults in production and total number of cars produced over a set period. Cars need to be labelled and packed for various destinations both interstate and internationally. Assembly line production is very important in the car industry for maintaining good quality control, as well as for reducing the cost of production. ITITFact Fact Automation was seen to be a valuable asset in the early 1930s when Henry Ford produced his famous Model T car. Automated warehouses An automated warehouse uses automatic control for the storage of products (see Figure 6.6). It is a very important aspect of modern businesses. Manufacturing industries need to be able to store parts that are used to make up a final product, as well as to store products for future customer orders. The tracking of warehouse items is necessary for the following reasons: • knowing when to reorder a part • monitoring the daily or weekly use of a part • knowing which products are not being sold • calculating capital tied up in warehouse stock • being able to assemble customer orders from warehouse stock • knowing what space is available for new product storage. The above reasons have been influential in the progress and development of automated warehouses. Automation has taken the form of automatic tracking by using barcodes on the products or parts in the warehouse. By scanning an item’s barcode and storing this information in a database, it is possible to know everything about the product or part, as well as its storage location in the warehouse. Automated warehouses use machines independent of human guidance for loading or unloading a product. These machines are controlled by a central computer linked to the database. This computer system is used to track products across Figure 6.6 Jobs such as this may become redundant as multiple warehouses that may be warehouses become increasingly automated. separated from each other by large distances. CAD/CAM CAD (computer-aided design) is the use of information technology to design and analyse a product or object. Designers working with a CAD system, rather than on a traditional drafting board, create the lines and surfaces that form the object and Automated manufacturing systems 193 store this model in the database. The CAD software allows the designer to perform various analyses on the object, such as heat transfer calculations. The design is refined by adjustments made on the basis of these analyses. Once the design procedure has been completed, the CAD system generates the detailed drawings required to make the product. CAM (computer-aided manufacturing) refers to the specialised information technology tools that automate the entire manufacturing process. A computer system is used to automatically control the actions of the plant equipment. It is also used to monitor the collection of data from the factory, the analysis of the data, and the communication of results to management. A CAD/CAM system involves not only the automation of the manufacturing operations but also the automation of elements in the entire design and manufacturing procedure. The combination of CAD and CAM has been applied in many industries, such as machined components, electronics products and equipment design. CAD/CAM systems often use numerical control machines. Numerical control (NC) is a form of programmable automation in which numbers control a machine. The initial application of numerical control was in the machine tool industry. It was used to control the position of a cutting tool relative to the product part being machined. The numbers are coordinates in three dimensions that define the exact position of the cutting tool in relation to the product part. It then uses a program to sequence the coordinates that direct the cutting tool to machine the part. NC usually receives feedback from the system to ensure the program has been correctly performed. NC technology allows complex parts to be fabricated quickly and accurately by automated machine tools that directly drill, grind, cut, punch and mill to turn raw material into a finished product. NC machine tools use a numerical control method for activating the tools in response to a predetermined command stored as digital data on tapes or in semiconductor memory. The programs have two functions: positioning the tool point in three dimensions relative to a product part and controlling secondary functions, such as speed, feeding, coolant flow, gauging and tool selection. There are basically three types of NC machine tools. The first is the conventional NC system where functions are wired together in a fixed pre-engineered arrangement. The second is computer numerical control (CNC) in which a microprocessor is programmed to control some or all of the NC functions. The third approach is direct numerical control (DNC) in which a group of NC (or CNC) machine tools are simultaneously controlled by a host computer. Many applications of NC have been developed since its initial use to control machine tools. NC is used in electronic assembly, drafting machines that prepare engineering drawings, coordinate measuring machines that perform accurate inspections of parts, and flame cutting machines. In all these applications, coded numerical data is employed to control the position of a tool or workhead relative to some object. The four advantages of NC machine tools over standard machine tools are: • one person can operate more than two NC machine tools • greater accuracy with better repeatability • the ability to process products that have complex shapes • shorter processing time. 194 Options Mail sorting Mail sorting involves the collection, sorting and delivery of mail to various homes and businesses. In the early days of postal sorting and delivery, people sorted the mail by hand, reading the addresses and sorting the mail into groups based on cities and towns. Once sorted into various destinations, the mail was then transported to the city or town and then re-sorted to a final level for delivery to the home or business. Mail sorting became easier with the advent of postcodes and machine-stamped codes on envelopes. Today, automated mail sorting machines accept a wide variety of letters and parcels and have the ability to sort them quickly and efficiently. Automated mail sorting machines use optical character reader (OCR) machines. An example of an OCR machine is the Electrovision EV-40. The EV-40 is used in high-volume outbound and incoming mail applications. The EV-40 is entirely software based. If the EV-40 is installed in an automated mail-sorting machine, it scans 10 cm vertically, starting at the bottom of the mail piece, and 28 cm horizontally. It optically reads and interprets four lines of the address block on machine-printed mail. This information is converted to a barcode, and the envelope is encoded with this barcode. This means that high-volume mailers achieve higher percentages of barcode mail, which leads to greater cost savings and higher efficiency in mail operations. The National Presort Inc NP-8000 is a machine that can sort up to 40 000 mail pieces per hour and handle small flat parcels as well. This machine allows a computer to monitor mail and check for changed addresses, as well as other accounting information, that can be used by various businesses. Reasons for automation Automated manufacturing systems are able to repeat their actions accurately. For the automobile industry, this means that quality control is maintained on all cars by the use of machines that do not tire on the production line. It is possible to run machines for many hours at little cost, and this reduces costs associated with car manufacture. This reduction in cost by the use of computer-controlled machines also applies to other industries. The ability of machines to run for long periods of time on repetitive tasks at a reduced cost also means productivity gains. When designing new products or modifying older products, computers can be used to help automate the design process. The software used in CAD allows the user to make a virtual model in the computer. This modelling can be used to simulate the sizes that a product may need to have or perhaps the wear and tear that might occur in a certain situation. A simple example might be the design of a seat in a car. The computer can automatically, with the help of an engineer, design a seat that can then be simulated to see if it will fit neatly into the car. It can also be tested for proper movement for different sized people. If the design is Automated manufacturing systems 195 found to be unsatisfactory, then it is relatively easy to modify the design using the CAD package. This leads to design gains through simulation and modelling. Another major advantage of automation is increased safety. Automated manufacturing systems can protect people who must work in high-risk working environments, such as welding car doors or operating a dangerous machine. Sensors can collect data about the operator’s position, as well as information about the machinery and raw materials. A simple example would be a sensor detecting that an operator’s hand is too close to a revolving shaft and automatically stopping the shaft, as well as signalling an alert on a display device. This information can also be logged into a central database for later evaluation of safety features and their effectiveness. The information could also be used for aggregate safety statistics on the machine floor. Case study Arco Saucepans Arco is a company that manufactures saucepans. The saucepans are made from plate steel in a factory. The design of the saucepan is done with the help of a CAD system. It stores the three-dimensional design of the saucepan along with the relevant sizes of sides, bases and lids; base thicknesses; and hole positions for the handles in a CAD database. The weight of each saucepan is automatically calculated by the CAD package. This information is made available to a DBMS. Data is required by: • finance employees to estimate the cost for each saucepan and the necessary mark-up of the product • marketing employees to describe the size of the saucepan, as well as its colour and handle shape if it has a choice of handle shapes • pressing machine operators on the factory floor to provide the thickness of material to be pressed by the machine into the saucepan so that the sizes and tolerances can be set on the machine 196 Options • quality control employees to ensure that the handles are fixed on properly and will not shake loose, as well as to ensure that the saucepan base is flat and won’t wobble on a stove • customers (retailers) to know what materials the saucepan is made from and its life expectancy, as well as the price. The flow of data in this automated manufacturing system is important. It is used in different ways by different people and is obtained from a central database. The information is collected from different points in the factory, including the design, finance, marketing and quality control units. On the shop floor, the data is collected using a range of sensors and transferred to the database. The sensor data from the production line is also used to control actuators that will start motors and other machinery to manufacture the saucepan. Exercise 6.2 1 2 3 4 5 6 7 8 9 10 11 12 Describe an assembly line production. What is performed by PLCs? How is assembly line production applied in the car industry? What is an automated warehouse? Explain the difference between CAD and CAM. What is numerical control? List the three types of NC machine tools. Outline four advantages of NC machine tools over standard machine tools. Why are automated mail-sorting machines used? List some of the reasons for automation. How does automation achieve increased safety? The following questions relate to the Arco Saucepans case study: a What is stored by the CAD system? b List the people who require data from the database. c Describe the flow of data in this automated manufacturing system. LEARNING ACTIVITIES 1 Automated manufacturing systems perform information processes requiring participants, data/information and information technology. Clearly identify the participants, data/information and information technology for the following automated manufacturing systems: a assembly line production b automated warehouse c CAD/CAM d mail sorting. 2 Discuss the relationships between participants, data/information and information technology for the following automated manufacturing systems: a assembly line production b automated warehouse c CAD/CAM d mail sorting. 3 Outline the reasons for automation in each of the following automated manufacturing systems: a assembly line production b automated warehouse c CAD/CAM d mail sorting. 4 What cars are assembled in Australia? Are all the parts made in Australia? Identify ten parts that go into building a car. Briefly outline the advantages and disadvantages of the same company manufacturing every part of a car rather than buying parts from other manufacturers. Automated manufacturing systems 197 6.3 Collecting in automated manufacturing systems Collecting for an automated manufacturing system involves using CAD/CAM, sensors, barcode readers and analog-to-digital conversion. CAD/CAM CAD/CAM is the use of computers to perform many of the functions related to design and production. It is based on the ability of a computer system to process, store, and display large amounts of data representing both part and product specifications. CAD refers to the use of information technology to design and analyse a product. CAM refers to the specialised information technology tools that automate the entire manufacturing process. The CAD/CAM system can be regarded as a flow of information from the design workstation to the database and then from the database to the factory machinery (see Figure 6.7). CAM CAD Numerical Control Geometric Modeling Robotics Analysis Data Base SPE CS Interactive Terminal Process Planning Product Specifications Automated Drafting Automated Factory Factory Management Figure 6.7 CAD/CAM relationship through a common database. A CAD system requires a high-performance computer with specialised CAD software and a plotter. The CAD software is made up of different software modules that carry out specific tasks, such as circuit analysis or three-dimensional solid modelling. The CAD software stores the designs and provides data for a 198 Options database. This data consists of product specifications, such as plate thickness, number of screws needed, size of sheet metal base, weight of product and overall dimensions for packaging. The information from the CAD system stored in the database is used by the CAM system. Some of the commonly available functions provided by CAD software are: • image manipulation—add, delete and edit images • transformations—rotate, translate and scale images • libraries—store standard and customised drafting symbols • file management—create, merge and delete image files. Automated manufacturing systems use the data supplied by a CAD/CAM system for other functions in the organisation. A CIM (computer-integrated manufacturing) system includes all the engineering functions of CAD/CAM plus the business functions of the organisation. The business functions include order entry, cost accounting, employee payroll and customer invoicing. CIM involves computerised data collection and integrated flow of data between design, manufacturing and planning. It applies information technology to all the operational and information processing functions. CIM has benefited by recent technical advances, such as increased Figure 6.8 Computer-integrated manufacturing. computer power, better data management and faster communications. CIM represents the highest level of automation in manufacturing. Sensors Sensors are input devices that measure data from the environment. They convert input provided by the environment into a signal that can be communicated to a control program. Recent advances in technology have provided a vast array of sensors, such as highly sensitive electromechanical probes, scanning laser beams and machine vision. Machine vision, which requires the processing of large amounts of data, can be accomplished only by high-speed computers. It is being used for many manufacturing tasks, such as part identification, quality inspection and robot guidance. Sensors are sometimes referred to as transducers because they convert one physical quantity into another. They often generate a potential difference, or voltage. For example, a tachometer is a rotational speed sensor that converts velocity into a voltage. A good sensor needs to rate highly on the following criteria: • accuracy—the difference, if any, between the value of the measured variable and the measurement obtained by the sensor • resolution—the level of change to which the sensor will respond by changing its output Automated manufacturing systems 199 • repeatability—the variation, if any, shown by the sensor over repeated measurements of a given value • range—the upper and lower limits of the sensor’s measurements • dynamic response—the maximum frequency of change in a measured variable. ITITFact Fact Sensors are used by robots to inspect the manufacturing process. They determine whether each machine part is consistent with quality specifications. Sensors are used to detect different physical conditions, such as temperature, pressure, motion, flow and light. Temperature Temperature sensors are devices that measure the temperature of the air, a fluid or an object. The control of temperature is very important in many industries. Different temperature sensors are required for different applications. Some sensors would be inappropriate due to the range of temperatures they detect, their sensitivity or their fragility. Temperature is detected using the resistance of a conductor. When the temperature rises or falls, the resistance of the conductor increases or decreases. The three main types of temperature detectors are the resistance thermometer, the thermocouple and the thermistor. • Resistance thermometers measure temperature using a metallic conductor, such as copper, nickel or platinum. The conductor’s resistance to electrical current increases with temperature. The metal is either wound as a coil or deposited as a thin film onto some suitable material called a substrate. Resistance thermometers are available for temperatures that range from 200°C to 800°C. • Thermocouples measure temperature using two different metals (a couple) in electrical contact. A voltage is produced that is proportional to their temperature difference. The point at which the two different metals meet is called a thermojunction. The thermocouple has two such junctions: one held at a reference temperature and the other in contact with the temperature source that needs to be measured. A temperature difference has to be provided to make a thermocouple work. The temperature range for thermocouples is quite large, being from 250°C to 1400°C. • A thermistor (thermal resistor) is a semiconductor device that measures temperature in a manner similar to a resistance thermometer. The resistance of the semiconductor in a thermistor is very rapid. This makes thermistors more sensitive than resistance thermometers to small changes in temperature. Pressure Pressure sensors are devices that measure the exertion of a force. Pressure in a pipe or container can be sensed by using a pressure gauge. The gauge is designed in such a way that the liquid or gas that is being measured is connected to a curved tube. The higher the pressure, the more the tube is forced into a straight line from its initial curved position. The amount of movement is turned into a voltage by using a variable resistor called a potentiometer. This resistor has an electric current 200 Options passing through it, and the difference in voltage can be detected as the resistance changes. This voltage is then used to register the pressure. The same effect can be obtained by using a diaphragm. A diaphragm is usually a small circular piece of material held inside a small container with one surface in contact with the liquid or gas being measured and the other exposed to normal air pressure. A diaphragm is made of flexible material that will move different amounts according to the pressure on one side of the diaphragm. This movement is converted into a voltage in a manner similar to the one mentioned above. In some diaphragm devices, the diaphragm is directly connected to a piezoelectric material, and the voltage is generated by the pressure being applied to the material. This voltage is then passed as a signal back to the computer. Motion Motion sensors, or velocity sensors, are devices that measure the rate of change of position. They calculate how far an object has moved from a starting position. They use electromagnetic induction to produce a voltage proportional to the velocity of a conductor (wire) moving in a magnetic field. The device consists of an armature with fixed magnets around it like an electric motor. Rotation of the armature produces an induced current in the windings and a voltage proportional to the rate at which the conductor is being rotated. Acceleration sensors depend on the piezoelectric properties of materials, such as quartz or ceramic crystals. A crystal is attached to the base of a mass. As a force is applied to the crystal and then onto the mass, a small electric current is generated in the crystal due to the strains that are set up. Flow Flow sensors are devices that detect the motion of fluids, including liquids and gases. They are often used to measure the flow of liquids and gases through pipes and drains. One method of detecting a flow of liquid is to have the liquid turn a small paddle wheel just like an old water wheel. The speed with which the wheel turns gives a measure of the flow of the liquid. The wheel is attached to a tachometer, and the voltage generated by the tachometer is proportional to the flow of liquid. Another type of flow sensor uses an ultrasonic signal to detect the change in frequency of the returned signal due to the interference of the passing liquid or gas. The change in frequency is converted to a voltage or current proportional to the flow of liquid or gas. Light Light sensors, or optical sensors, are devices that can detect changes in the level of light. They are used in industrial processes to detect imperfections in products. For example, in steel milling, light sensors detect irregularities in the rolled steel as it passes along the rolling mills. Light sensors are used to control the motion of robots and their interpretation of the environment. Researchers are working very hard at interpretation of light images received by various detectors. The two main problems associated with light sensors on robots are: • High bandwidth. The large amount of data to be transferred requires very high frequencies. The higher the frequency of the bandwidth, the more bits per second that can be transmitted. Automated manufacturing systems 201 • Enormous amount of processing. Each piece of data or pixel contained in the picture requires calculations to determine whether it is part of an object. These problems do not arise in simple optical devices used for brightness detection. These devices may only detect differences between black and white, such as the dark lines and white spaces in barcodes. The development of solidstate optical sensor arrays has reduced both costs and processing requirements. An example of these light sensors is a photodiode. A photodiode produces a voltage in proportion to the amount of light falling on its surface. The most common use of photodiodes is as a light-beam switch. A source of light is placed to strike the diode; and if the beam is interrupted, the voltage of the diode falls. This device can be used for many applications that need to detect when an object is present or not present. A simple example would be the detection of customers walking into a shop. In an automated manufacturing situation, the computer might wait for a break in the light beam to signal that a part has moved onto a conveyor belt or near a robot. The computer would then send a signal to the robot or to another machine to cause some action to happen. Images from the outside world can be detected by the use of a two-dimensional array of solid-state devices called charge-coupled devices (CCD). A twodimensional CCD is made up of a grid of photosensitive elements. The more light at each location in the grid, the more electrical charge. CCD devices are made into very robust and accurate cameras for use on robots and in industry. CCD cameras: • work at low voltages and have only a small power requirement • are very accurate at positioning objects • are not damaged by intense light • are sensitive over a wide spectral range (light range) • do not have memory and so moving objects are not smeared. Barcode readers and inventory tracking Figure 6.9 Barcode reader. 202 Options Barcode readers are input devices that allow a computer to read barcodes found on products or parts (see Figure 6.9). The barcodes contain information about the product or part. This information is needed by managers to track how many products are available to sell and how many parts are available for use in manufacturing the products. The total number of products or parts held is called an inventory. This information is vital if the factory is not to run out of components that go into the finished product and thus delay production. It also helps the managers determine how quickly products are selling and whether a suf-ficient quantity has been scheduled for manufacturing. The majority of companies label parts and products with barcodes. The use of barcodes enables easy tracking of the parts through the factory as well as easy warehousing of parts and products. A barcode is represented by a pattern of wide and narrow bars. The barcode reader scans the bars and translates the different patterns back into regular characters and sends them on to a computer for further processing and storage. The processing might involve calculating the cost of an item, as in supermarkets, or making a decision about the item, such as whether to machine it or stack it in box. ITITFact Fact Barcodes were first developed for U.S railways to keep track of which carriages went with which engine. The barcodes were imprinted at a uniform height above the ground on the side of railway carriages that went with a particular ‘system’. The barcodes of the different carriages could then be read to compile information on particular groupings of carriages. Every barcode starts with a special start character and ends with a special stop character. These codes help the barcode reader detect whether to start scanning forward or backwards. Some barcodes may include a checksum character just before the stop character. When the barcode is printed, a checksum is calculated from the characters in the barcode. The barcode reader performs the same calculation and compares its answer to the checksum it read at the end of the barcode. If the two numbers don’t agree, then the barcode reader will try to read the barcode again. There are different barcodes, each with its own particular pattern of bars. For example, the UPC-A code is used in retail in the USA, has twelve numeric digits, and identifies the manufacturer and particular product. Other codes, such as Code39 and Code128, include upper-case and lower-case letters, digits and a few symbols. EAN-13 is the code used in Australia, as well as other countries, for marking retail goods. It consists of thirteen digits: the first two or three are a country code, followed by nine or ten digits and a single-digit checksum. Supplementary two-digit and five-digit barcodes are sometimes added to the code. Each participating country has EAN barcoding authorities that regulate the use of retail barcodes. The last digit in the EAN barcode is a checksum and is a modulo-10 calculation. The algorithm to calculate the checksum is given below: 1 Add the values of the digits in the even positions (positions 2, 4, 6 etc.). 2 Multiply this result by 3. 3 Add the value of the digits in the odd numbered positions (positions 1, 3, 5 etc.). 4 Sum the results of steps 2 and 3. 5 The check digit is the smallest number that, when added to the result in step 4, produces a multiple of 10. 1 2 3 4 5 For example, to find the checksum for the barcode 012345768901: 1+3+5+6+9+1 = 25 (adding the digits in the even positions). 25×3 = 75 (multiplying the result by 3). 0+2+4+7+8+0 = 21 (adding the digits in the odd positions). 75+21 = 96 (adding the results of steps 2 and 3). 96+x = 100 (finding the smallest number that, added to the result in step 4, will produce the nearest multiple of 10). Therefore, the check sum is 4 (96+4 = 100). Automated manufacturing systems 203 Analog-to-digital conversion Data collected from sensors is often in analog form, and this needs to be converted into digital form so it can be used by a digital computer. A device used to change analog into digital is called an analog-to-digital converter (ADC). Data may also need to be converted from digital back to analog. A digital-to-analog converter (DAC) is a device that converts a digital signal into an analog signal. Most ADCs are also DACs. An ADC takes an analog signal, such as a voltage or electric current, and electronically converts it into digital data. The digital data comprises a number of bits, such as eight, sixteen, thirty-two or sixty-four. The more bits that are used, the more expensive the ADC. For example, a temperature sensor might measure a range of temperatures from 0°C to 100°C using a voltage range from 0 to 5 volts. If the temperature is 40°C, a voltage of 2 volts will be produced. The computer stores its data in a byte made up of eight bits, and a range of values from 0 (00000000) to 250 (11111010) can be used. The ADC must change a voltage range of 0 to 5 into a value range of 0 to 250. The mathematics required involves dividing the voltages by 5 and multiplying the result by 250 (see Table 6.2). A reading of 2 volts from the temperature sensor is converted to a decimal number of 100 or a binary number of 01100100 inside the computer. It is important to note that the temperature is only measured to the nearest 0.4°C since digital devices are restricted to discrete quantities, in this case 0 to 250. For example, 1°C would be represented by 0.05 volts, but this voltage converts to 2.5 and cannot be represented as a discrete quantity on a digital scale of 0 to 250. Temperature (°C) Volts Decimal Binary 0 0 0 00000000 0.4 0.02 1 00000001 0.8 0.04 2 00000010 1.2 0.06 3 00000011 1.6 0.08 4 00000100 2.0 0.10 5 00000101 : : : : 19.6 0.98 49 00110001 20 1.00 50 00110010 40 2.00 100 01100100 60 3.00 150 10010110 80 4.00 200 11001000 : : : : 99.6 4.98 249 11111001 100 5 250 11111010 Table 6.2 Analog-to-digital conversion for the example temperature sensor. 204 Options Damping Damping is a decrease caused in the amplitude of successive oscillations or waves. For example, shock absorbers in a car are a damping device. They restrain the motion of the car’s springs so that the expansion and contraction of the springs do not shake the car excessively. When applied to automated manufacturing systems, damping is the process that modifies the signal to the output device based on the input signal. Signals are received from a sensor, the controller changes these signals into information, and the actuator carries out some action. The rate at which a system responds to the controller is very important, and damping devices help to determine that response rate. There are three types of damping (see Figure 6.10): • Overdamping occurs if the change is too slow, and the actuator takes longer to reach the desired level or position. However, overdamping does not overshoot the desired level. It is a slow reaction to change and return to stability. • Underdamping occurs if the change is too fast, and the actuator overshoots the desired level. Underdamping then causes a return movement that will also be too quick, causing the actuator to undershoot the desired level. Underdamping is a quick reaction to change resulting in rapid fluctuations before stability is reached. • Critical damping is the preferred rate of change in the output of the system. The desired level is achieved in the quickest amount of time. Critical damping is a quick reaction and a quick return to stability. Final Measured quantity Initial Critical damping Time Final Measured quantity Initial Overdamping Time Final Measured quantity Initial Underdamping Time Figure 6.10 Damping. Automated manufacturing systems 205 Exercise 6.3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Describe a CAD/CAM system. List some of the functions commonly provided by CAD software. Describe CIM. What is a sensor? Describe the three main types of temperature sensors. How does a pressure gauge work? What is calculated by motion sensors? Describe the two main problems associated with light sensors on robots. What is a photodiode? Describe the use of barcodes in a factory. Calculate the checksum for the barcode 108976453811. What does an ADC do? What is damping? Which type of damping is the preferred rate of change? LEARNING ACTIVITIES 1 Aeroplanes are fitted with an automatic cruise control that keeps the plane at a steady speed. a Draw a block diagram of this system showing the flow of data within the system and the sensors required. b Describe the operation of one sensor that would be needed in the cruise control system. c Describe the effect of underdamping in this system. 2 Collect some barcodes from various objects. What do you notice about the first character? The second character? If the barcode has 13 characters, check the checksum using the algorithm presented in the text. 3 Pick two examples where damping can be seen. Describe for each example what the effect of overdamping, underdamping, and critical damping would be. 4 A sensor measures temperatures from –20°C to 30°C using voltages ranging from 0 to 5 volts. Convert the following temperatures into bytes (range from 0 to 250) that the computer can understand: a 30°C b –10°C c 0°C d 20°C 5 Suppose you had to get a computer to make a measurement of a voltage that ranged from 0 volt to 200 volts. Assume that the ADC used 8 bits to encode the range, using a value range of 0 to 250. a What would the digital 8-bit reading for 160 volts be? b What would the digital 8-bit reading for 100 volts be? c What would the digital 8-bit reading for 20 volts be? d How accurately could the computer read a voltage? e How would the accuracy increase with a 16-bit ADC? 6 Use a CAD software package to design a personal computer. 206 Options 6.4 Other information processes All information processes play a role in automated manufacturing systems, including processing, displaying, and transmitting and receiving. Processing Processing data for an automated manufacturing system is the manipulation of the data. After the data is collected, it must be converted into a form for transmission. This process involves mass production and types of production. Mass production Mass production is the manufacture of products in large quantities by standardised mechanical processes. It is based on four basic principles: • Production is divided into specialised tasks that are relatively simple and highly repetitive. • Standardisation of parts, such as dimensional tolerances, allows parts to be readily fitted to other parts without adjustment. • Specialised machines, materials and processes minimise the amount of human effort and maximise the output. • Systematic planning of the total production process permits the best balance between human effort and machinery. The principles of mass production have led to lower costs and major improvements in uniformity and quality. Large volumes and standardisation have allowed statistical control and inspection techniques to monitor production and control quality. Mass production is used to manufacture a range of products, such as cars, televisions, refrigerators and kitchenware. Individual parts of these products, such as batteries and refrigerator compressors, may also be mass-produced. The workforce in mass production is usually semi-skilled for machine operation and assembly. Industrial robots are used in many mass production industries. Inflexibility is a major problem of mass production. Maximum efficiency is achieved by using specialised tools, standardised parts and a very structured process. Redesigning a product is expensive, as the new design may make the old tools and machinery obsolete. Organisations are now using machinery with builtin flexibility. For relatively little extra cost, the tooling can be changed to adapt the machine to accommodate changes in design. In addition to allowing greater flexibility, this machinery provides opportunities to make customised products. There is a trend towards customising a product to meet the needs of individuals. It is an attempt to retain the advantages of mass production while providing customised value. The manufacturer regards the product as mass-produced, while the customer regards the product as customised. ITITFact Fact Early cars were mass-produced with every unit identical to every other unit in all aspects, including their colour, which was black. Automated manufacturing systems 207 Types of production The three types of production used in automated manufacturing systems are continuous, batch and discrete. Continuous systems are capable of operating 24 hours per day for weeks or months without stopping. Specific times are set aside for maintenance and finetuning of the manufacturing system. The manufacturing equipment used for a continuous system is specially designed for the individual industry and its product. The product being made is often required in bulk form with the output measured by volume or weight. Continuous systems are often used in chemical manufacture, food production and the processing of certain basic metals. In these operations, the products are processed in gas, liquid, or powder form to allow the flow of the material through the various steps of the production cycle. A batch system is a discontinuous system that produces a specific quantity of a product. The quantity of the product is called a batch run, or production run. Batch runs may produce several dozen to thousands of units of a product. A batch run may have to be repeated at a later time. Batch systems are used to manufacture different types of products using the same manufacturing equipment. Consequently, the manufacturing equipment in a batch system must be much more flexible than that in a continuous system. To provide flexibility, workers in a batch system will need to be more highly skilled than workers in a continuous system. Metals are typically produced in batches rather than continuously as it is generally more difficult to handle metals in bulk form. For each new batch, the manufacturing equipment must be reprogrammed and changed over to accommodate the new product. The time required for this changeover is a disadvantage of batch systems. It is lost production time. However, the variety of products in batch systems is limited, and the changeover of equipment can be done very quickly. In a large batch manufacturing system, there are often control and scheduling problems because batch runs are needed for different products, with different customers and at different delivery times. Batch systems require a coordinated approach to material ordering, warehousing and part machining. Information systems can be a useful tool for solving these problems. Batch systems are used to make such products as spare parts for aircraft, cars, trucks and construction equipment. A discrete system is a discontinuous system that performs a single task in a small time interval. It produces items made to a customer’s exact specification and is sometimes called ‘jobbing’. Discrete systems use general-purpose machines, such as lathes and hand tools. The workforce is more highly skilled to make very specific products. Discrete systems manufacture products with the highest unit cost. Examples of products made with discrete systems include space satellites, ships, oil rigs and special-purpose manufacturing equipment. Products are often made using a combination of continuous, batch and discrete systems. For example, a large ship is the only one of its kind, and this implies a discrete system. However, the steel plates in the hull are produced by continuous casting and rolling in a steel mill. They are made using a batch system. Displaying Automated manufacturing systems display information by performing some work on the product. They use specialised display devices called actuators and may have to convert data from digital to analog so that the actuators can perform their tasks. 208 Options Actuators An actuator is a display device that performs a mechanical action under the control of a signal from a controller. Actuators perform the actual work of the system. Some common actuators are solenoids, electric motors, stepping motors, relays and hydraulic pumps. ITITFact Fact A ‘cell’ is an autonomous manufacturing unit that can produce a finished product. Control at the cell level involves scheduling of individual parts onto machines. A solenoid is a coil of wire around a movable magnet (see Figure 6.11). When an electric current passes through the wire, a magnetic field is generated that will move the magnet in the centre of the wire coil in one direction or the other depending on which direction the current is going. Washing machines use a solenoid to control the level of water entering the tub. The solenoid is attached to a small valve, which can be opened or closed depending on the electric current in the solenoid. Degree of movement On/off electric current Solenoid coil Iron rod core Figure 6.11 Solenoid. Electric motors are clean and capable of high precision if operated carefully. Electric direct-current (DC) motors are very popular actuators because of their ease of use. DC motors run continuously, first in one direction and then in the other direction. The motion remains smooth and continuous. There is no particular inherent control of position in DC motors. DC motors develop large torques. Torque is the shaft-turning power that a motor can output. A high torque means that the shaft can move a load easily. An example of a high torque value used in an antisocial way is the spinning of car wheels at traffic lights. A DC motor can have its direction changed by reversing the current in its electric windings. This can be done by a relay or by power amplifiers electronically switching the direction of current flow. DC motors are capable of high precision, fast acceleration and high reliability, making them good candidates for converting an incoming signal into mechanical motion. Stepper motors are used in robots when precise open-loop control is needed. Open-loop control means that the desired position is calculated and then the device, or system, is told to go to that position. A stepper motor allows this to happen easily. It is capable of being told to rotate through a number of degrees and then stop. It can rotate in either direction, just as a DC motor can, but it stops Automated manufacturing systems 209 after a very accurate number of degrees. For example, a stepper motor can be instructed to rotate exactly 20 degrees to the right and then 120 degrees to the left. A disadvantage of the stepper motor is that it has a low torque compared with a DC motor and usually takes up more space than a DC motor. This means that, if a robotic device needs to move heavy loads, a stepper motor is not a good choice. Another disadvantage is that stepper motors accelerate and decelerate at each step and therefore do not provide a smooth and continuous motion. A relay is a switching device. It is primarily used when a small electric current is used to turn on or turn off a large electric current. The device is made from a solenoid in which the movable magnet is connected to a mechanical switch, which is held in a default position by a spring. When an electric current passes through the coil, the magnet moves against the spring and causes the switch to either open or close. The switch is usually connected to a more powerful electric source than the activation current for the coil. This means that a small voltage can control a much larger current or voltage switch. This also means that the signal currents can be isolated from a much more dangerous current grid. Sometimes many different switches may be connected to the moving magnet in the coil, and this allows one relay to control many motors or other electric devices. Hydraulic pumps are used when great strength is needed. A hydraulic fluid powers the pump, or actuator. Hydraulic fluids are non-compressible fluids, such as oil, that can be used in very high-pressure situations. The power transmitted by the hydraulic fluid comes from the pressure the fluid exerts against things and not from compression of the fluid itself. The power from a hydraulic pump is transmitted through high-pressure tubing to a hydraulic device and then returned to the fluid supply tank. Digital-to-analog conversion Displaying data may require converting digital data from the computer system into analog data for an output device. A digital-to-analog converter (DAC) is a device that converts a digital signal into an analog signal. For example, the computer might be connected to an actuator, such as an electric motor. This electric motor might be designed to accept voltages ranging from 0 to 10 volts. Therefore, the DAC could convert the digital signals in the range 0 to 250 into voltage values from 0 to 10. The mathematics required involves dividing the decimal number by 250 and then multiplying the result by 10. These calculations have been approximated in Table 6.3. Binary Decimal Volts 00000000 0 0 00000001 1 0.04 00000010 2 0.08 00000011 3 0.12 00000100 4 0.16 : : : 11111001 249 9.96 11111010 250 10 Table 6.3 Digital-to-analog conversion for the example electric motor. 210 Options If the computer sends a signal of 11111010, it is converted into a voltage of 10 volts in the electric motor. Transmitting and receiving In automated manufacturing systems, the transfer of data and information involves a signal. A signal describes the physical form in which data is transmitted, such as pulses of electricity in a wire or pulses of light in a fibre-optic cable. Signals have a physical value that can be sensed and moved from one place to another. Sensors often generate a very weak signal. This requires the signal to be modified before a controller can use it. Signal conditioning is the modification of a signal for normal usage. Amplification is a common signal conditioning technique that modifies a signal by increasing its strength. Noise Signals are affected by noise. Noise is unwanted data or interference that reduces the quality of the signal. It is often the result of a poorly designed system where other electrical equipment gives off unwanted high-frequency pulses. There are two types of noise: random noise and periodic noise. Random noise (or white noise) is a signal added to the original signal in a random fashion and is usually of a fairly low value. Periodic (or coloured) noise is a signal with some type of regular pattern or shape that is added to the desired signal. Shielding surrounding cables and equipment reduces the problem of noise. For example, the shielding in a coaxial cable allows data to be transmitted with little distortion. A signal that is affected by noise needs to be filtered. Filters are used to get rid of noise and get a smooth signal (see Figure 6.12). Just as filters on a water supply remove dirt and grease, so electrical filters remove unwanted noise from the signal. High-pass and low-pass filters are devices that remove frequencies above or below a certain value. For example, noise might be added to a high-frequency signal. This noise could be removed by using a high-pass filter that only allows high-frequency signals to pass. Noise is also reduced by signal conditioning. (a) High-frequency noise level (b) Low-frequency signal from sensor with noise added (c) Signal from sensor with noise removed by lowpass filter Figure 6.12 Filters. Automated manufacturing systems 211 Noise can cause errors in the transmission of digital signals. Error checking techniques for digital signals were discussed in Chapter 3. Errors in a digital signal must first be detected and then corrected. Three common methods for error detection are parity checking, checksum and cyclic redundancy check. Exercise 6.4 1 2 3 4 5 6 7 8 9 10 11 12 13 What is mass production? Outline some of the benefits of mass production. Describe a trend in mass production. List three types of production used in automated manufacturing systems. What is a continuous system? Outline some of the disadvantages of a batch system. Describe a discrete system. What is an actuator? Briefly describe five different types of actuators. What is the purpose of a DAC? Why is signal conditioning often needed in automated manufacturing systems? Explain the difference between a signal and noise. Describe two techniques that reduce the problem of noise. LEARNING ACTIVITIES 1 An automated manufacturing system is being designed to produce kitchen tables for domestic use. The factory aims to cater for a range of different retailers and specific requests from its customers. The intended output of the factory is 10 000 tables per year. a What information is needed to set up the factory? b One retailer requires 500 identical kitchen tables every year. Describe the appropriate type of production. 2 A car manufacturer has decided to produce cars that match the exact colour specifications obtained from its customers. a Outline any advantages for the customer and the manufacturer for this type of production. b Draw a data flow diagram to represent the movement of data. 3 Most of the items we use each day are mass produced. a List one mass-produced product that you use. b Describe the automated manufacturing system used to produce this product. c What actuators are used to manufacturer this product? 4 Use a graphics program to design a robot arm that is able to pick up small items. On your diagram, show the type and placement of each of the electric motors used to operate the arm. Indicate the positioning of sensors and the environmental data each sensor is designed to detect (for example, the height of the arm above a conveyor belt). 212 Options 6.5 Issues related to automated manufacturing systems Both positive and negative impacts arise from the use of automated manufacturing systems. In this section, we examine some of the issues raised by automated manufacturing systems. Nature of work Automated manufacturing systems have involved replace-ment of people by an automated system. The longterm effects of automated manufacturing systems on employment are a debatable issue. People have lost jobs through automation, but population increases and consumer demand for the products have minimised these losses. Many people argue that displaced workers should be retrained for other positions. This argument only succeeds if the organisation is growing at a rate fast enough to create new positions. A worker whose job is taken over by a machine undergoes a period of emotional stress. On the other hand, the use of automation does create more jobs for people with information technology skills (see Figure 6.13). Figure 6.13 People programming a robot. Automated manufacturing systems affect not only the number of workers but also the nature of work. Automation is directed towards the use of information technology rather than manual labour. It places a greater emphasis on knowledge and technical skill than on physical work. The types of jobs found in automated manu-facturing systems include machine operation and main-tenance, operators, systems analysis and computer pro-gramming. Workers must be technologically proficient to perform these jobs. Organisations in the manufacturing industry are making a greater effort in their job design. For example, operators working on a conveyor can vary their pace by working ahead and then slowing down, and work breaks occur during production. Organisations are also beginning to recognise that people have different job needs. Some people prefer tasks that are repetitive and narrowly skilled. Other people are bored by repetitive tasks. These organisations are providing opportunities for job rotation and educational programs to diversify employees’ experience and to acquaint them with various aspects of the manufacturing process. This will give each employee a concept of the total manufacturing task and the importance of each employee’s specific function within that task. Automated manufacturing systems 213 Semi-automation Semi-automation occurs when some tasks are performed by humans and some by machines. Most factories are only partially automated as they get better results by only automating some of the functions. For example, in the food industry, a person inspects the food as it passes along a conveyor belt. Poor-quality items are removed from production. Another example is the use of machinery to pack and wrap heavy boxes of the product while people move the boxes using a fork-lift. ITITFact Fact Robots are increasingly being used for many different tasks, from shearing sheep and washing windows on tall buildings to assembling parts for machines. Semi-automation provides advantages to an organisation. The manufacturing process can be designed to take into account the strengths and weaknesses of people and machines. People’s strengths are their flexibility, commonsense and ingenuity. They are better than machines at visualising, understanding and thinking of new ideas. Machines are better at repetitive tasks and performing calculations. Human-centred systems Machine-centred systems are designed to simplify what the machine must do at the expense of participants. They assume people will follow confusing procedures and still work efficiently. If errors occur in a machine-centred system, they are usually blamed on the participant (operator error) rather than on the technology. Machine-centred systems are not always the best systems for people. Automated manufacturing systems consist of many machines; however, the systems should be human centred. Human-centred systems are those that make participants’ work as effective and satisfying as possible. They allow people to do their work without wasting time and effort dealing with the information technology. Automated manufacturing systems should be designed in consultation with the participants. It is important that attention is given to the work environment and to the needs of the participants, as well as to the information technology. An increasing amount of research has been completed on the relationship between people and machines. This has led to the improved design of tools, machines and participants’ work positions. Reliability and quality Automated manufacturing systems perform manufacturing processes with greater control and consistency of product than a human worker. They also make more efficient use of materials, and this results in less wastage. Machines can repeat a given task almost endlessly and with a great degree of accuracy. Automated manufacturing systems can perform repetitive tasks, such as automatic painting, spot welding and newspaper printing, with a great degree of reliability and accuracy. They provide an opportunity to relieve people from repetitive, hazardous, or unpleasant work. The general idea is to free people to do more challenging and rewarding jobs. 214 Options The reliability and quality of an automated manufacturing system are dependent on participants. Appropriate procedures need to be in place to ensure automated manufacturing systems maintain reliability and quality. It is not only the consistency of the product that is a concern. There are many examples where lack of quality control has caused a serious accident. For example, the Chernobyl nuclear-reactor catastrophe in 1987 would have been avoided with better procedures to test reliability and quality. Machines that are improperly designed or used kill many Australians each year. Safety Automated manufacturing systems have improved safety in the workplace. Machines are doing dangerous and hazardous jobs, such as spot welding. Most automated manufacturing systems include safety-monitoring systems. Sensors detect that a safety condition has developed that may be hazardous to the equipment or to people. The safety-monitoring system takes the most appropriate action to remove or reduce the hazard. This may involve stopping the machine and alerting maintenance personnel, or it may involve a more complex set of actions to eliminate the safety problem. On the other hand, unsafe practices and poor machine design can cause accidents. In dangerous environments, such as near grinding machines, suitable protective gear should be worn. This would include earmuffs, face masks and protective clothing made of heavy material. Dangerous machinery should be shielded from being accidentally touched by workers. General safety issues relate to adequate lighting, ventilation and fire safety measures. Organisations are required to provide a workplace that conforms to the Occupational Health and Safety Act. This act provides heavy penalties for organisations that do not provide adequate health and safety conditions for their employees. Case study Uncle Ben’s Pet Food Uncle Ben’s Pet Food manufactures such items as cat food. It is an example of an automated manufacturing system that uses robots together with a human controller. A robot arm examines the boxes of packaged food going past on the conveyor belt. When the boxes pass, the robot will inspect each to see if it is defective in some way. The defect might be the colour of the wrapping paper, incorrect alignment of the labels, incorrect labels, or holes and tears on the side of the box. The robot has its gripper over the conveyor belt as the boxes pass beneath its camera. When a defective box passes the camera, the robot will grip the box and then move its arm over a waste bin where it will let the box fall into the bin. The arm will then return to its original position waiting for the next defective box to be selected. It will repeat this action over and over again. Uncle Ben’s Pet Food factory is a continuous production system. Food is manufactured 24 hours a day. People are used to control the moving conveyor belts and fix any breakdowns. When they become tired, there is a greater risk of accidents. For example, the operator might get careless and lean too far over the moving belt and get caught. Uncle Ben’s Pet Food factory was designed to provide a safe working environment. For example, the movements of the robot arm were restricted to ensure the arm does not move too far away from the conveyor belt. This is important as it reduces the risk that a worker will be hit by the arm. All moving parts have protective covers, and special ‘stop’ buttons are within reach of the worker to allow for emergency shutdowns. Automated manufacturing systems 215 Exercise 6.5 1 2 3 4 5 6 7 8 9 10 11 Describe the effect of automated manufacturing systems on employment. How are automated manufacturing systems affecting the nature of work? Describe some of the ways the manufacturing industry is designing jobs. What is semi-automation? Describe the advantages of semi-automation. Outline some ways of designing human-centred manufacturing systems. List some of the repetitive tasks performed by automated manufacturing systems. Why are reliability and quality important in an automated manufacturing system? What is safety monitoring? Describe some of the ways manufacturing industries can improve safety. The following questions relate to the Uncle Ben’s Pet Food case study: a Describe the automated manufacturing system. b List some of the information technology used in this system. c Outline some of the safety issues in this system. LEARNING ACTIVITIES 1 The introduction of information technology into the manufacturing industry has changed the nature of work. Choose one manufacturing industry and compare the tasks performed by the employees before and after the introduction of information technology. What old skills have been lost and what new skills have been developed in the process of automation? 2 Explain the meaning of the term ‘quality control’ when applied to an automated manufacturing system. Illustrate your answer with an example. 3 What are some of the safety issues that might effect you at school? Do any of these issues apply to the workers in an automated manufacturing system? 4 Should workers be trained in first aid at a factory? Who do you think should pay for this training? Who is responsible for worker safety at a factory? 5 Automated manufacturing systems are having a positive and negative impact on our society. Briefly describe some of the changes to our society caused by automated manufacturing systems. What do you think is the greatest concern with automated manufacturing systems? Give a reason for your answer. 216 Options Chapter review PART A Select the alternative (A, B, C or D) that best answers the question. 1 The process of producing a product that meets a specific need is: A automation B manufacturing C automated manufacturing system D actuator 2 Direct users of an automated manufacturing system do not: A interact with the information technology B perform the actual work on the product C include supervisors who oversee the operation D control the manufacturing system 3 The use of information technology to design and analyse a product is called: A CAD B design specifications C CIM D IT design 4 A form of programmable automation in which numbers control a machine is: A binary code B automatic code C NC D controller 5 A thermistor is a temperature sensor that: A measures the temperature using two different metals in electrical contact B uses a semiconductor device to measure temperature C measures temperature using a metallic conductor D uses a liquid or gas to measure temperature 6 Which of the following terms is not related to light sensors: A potentiometer B photodiode C CCD D barcode reader 7 A type of damping that occurs if the change is too fast and it overshoots the desired level is: A fastdamping B underdamping C overdamping D critical damping 8 A batch system is a type of production that: A is capable of operating 24 hours per day for weeks or months without stopping B performs a single task in a small time interval C produces output usually measured by volume or weight D produces a specific quantity of a product 9 An actuator that consists of a coil of wire around a movable magnet is called a: A solenoid B stepper motor C relay D magnetised coil 10 A major problem with mass production is the: A standardisation of the parts B balance between human effort and machinery C maximisation of the output D inflexibility of the system Automated manufacturing systems 217 Chapter review PART B For each of the following statements, select from the list of terms the one that most closely fits the statement. Write the letter corresponding to your choice next to the statement number. Statements 1 The use of information technology to design and analyse a product or object. 2 A form of programmable automation in which numbers control a machine. 3 The physical form in which data is transmitted, such as pulses of electricity in a wire. 4 A production system that performs a single task in a small time interval. 5 A display device that performs a mechanical action under the control of a signal from a controller. 6 The process of producing a product that meets a specific need. 7 An information system involved in production by inventory tracking, recordkeeping, production scheduling and actual production. 8 The use of automatic control for the storage of products. 9 A system capable of operating 24 hours per day for weeks or months without stopping. 10 The specialised information technology tools that automate the entire manufacturing process. 11 An input device that measures data from the environment. 12 The process that modifies the signal to the output device based on the input signal. 13 A series of workstations connected by a transfer system that moves parts between each workstation. 14 The manufacture of products in large quantities by standardised mechanical processes. 15 Unwanted data or interference that reduces the quality of a signal. 218 Options 16 The application of automatic control to industrial processes. List of terms a actuator b assembly line production c automated manufacturing system d automated warehouse e automation f CAD g CAM h continuous system i damping j discrete system k manufacturing l mass production m noise n NC o sensor p signal PART C Write at least one paragraph on each of the following. 1 What are the characteristics of an automated manufacturing system? 2 Explain the difference between the following terms: a a continuous and a batch system b an actuator and a sensor c CAD and CAM. 3 Outline three reasons for automation. 4 Describe assembly line production. 5 Briefly describe five different types of sensors. 6 What are the three types of damping? Briefly explain the differences. 7 Outline one method of removing noise from a signal. 8 Identify a social or ethical issue involved in automated manufacturing systems. Identify both the positive and negative aspects of the issue. 7 chapter M U LT I M E D I A SYSTEMS Outcomes • applies an understanding of the nature and function of information technologies to a specific practical situation (H1.1) • explains and justifies the way in which information systems relate to information processes in a specific context (H1.2) • analyses and describes a system in terms of the information processes involved (H2.1) • develops solutions for an identified need which address all of the information processes (H2.2) • evaluates the effect of information systems on the individual, society and the environment (H3.1) • demonstrates ethical practice in the use of information systems, technologies and processes (H3.2) • proposes ways in which information systems will meet emerging needs (H4.1) • assesses the ethical implications of selecting and using specific resources and tools (H5.2) Overview This chapter examines the characteristics of multimedia systems, including the different types of media used in these systems. It investigates the software and hardware used to prepare and display multimedia. The information processes of a multimedia system and the social and ethical issues related to multimedia systems are presented. 7.1 Characteristics of multimedia systems A multimedia system is an information system that combines different types of media. It uses at least three media types, such as text, images, animation, audio and video. Multimedia systems have the potential to provide a better experience than any other information medium. They can combine the best of television, film, graphics, animation, books, magazines and radio. The result of a multimedia system is called a multimedia product or a multimedia presentation. Multimedia is created and displayed using a range of software, such as authoring software and presentation software. Types of media The types of media used in a multimedia product include text, numbers, hypertext, audio, images, animations and video. Text, hypertext and numbers Text refers to letters, numbers and other characters whose meaning and format is not specified. It has no meaning until a person reads and interprets it. Text in a multimedia product is written using a word processor. The first basic concern with text is how much information should be presented. It is recommended that each screen should only relate to one task or piece of information. The screen should not be overloaded with text. Figure 7.1 A hypertext link. Hypertext allows the user to navigate through a multimedia product. It is a system that allows documents to be cross-linked in such a way that the user can move from one document to another by clicking on a link. A hyperlink (link or hotword) is the highlighted item (usually an underlined word or a graphic) that allows the electronic connection (see Figure 7.1). The author of the hypertext must specify the location of the information accessed by each link. In a multimedia product, the link may be to text, an image, audio, animation or video. When you click on a link, you move from one document to another even if they are different media types. Hypertext provides the interactivity in a multimedia product. The most well-known application of hypertext is the Web. Numbers refer to predefined characters, usually numerals, whose meaning and format are specified. Calculations are often performed on this data type. For 220 Options example, the purchase amount is a number with a predefined dollar format. Numbers may take different forms but are sometimes linked to some type of chart. Audio Audio is sound that has been digitised. The meaning of audio data is determined by listening to and interpreting the sounds. Audio has become an essential part of most multimedia products. It is used to explain concepts, reinforce selections and provide special effects. Sounds may be available in digitised form or may have to be converted before use. Audio files tend to be large and may be very slow to load in standard WAV format. The development of the MP3 format for audio has greatly improved quality and decreased both transmission time and storage requirements. Images Images are pictures, such as drawings, paintings or photographs. The meaning of an image is determined by looking at the image and interpreting it. Images are used to create interest and provide information. All images on the screen are made up of tiny dots called pixels. A pixel, or picture element, is the smallest part of the screen that can be controlled by the computer. The total number of pixels on the screen is called its resolution. Images are either bit-mapped graphics or vector graphics. Bit-mapped graphics treat each pixel on the screen individually and represent this by bits in memory. They produce good quality images where shading and detail are needed. However, when transformed (resized or stretched), bit-mapped graphics become ragged and suffer loss of resolution. Enlarging each pixel in a bitmapped graphic creates a staircase pattern called aliasing. Bit-mapped images require large amounts of storage. They are often stored in compressed formats, such as GIF and JPEG. Vector graphics are made up of objects, such as a straight line, a curve, or a shape. Each object is defined by its characteristics, such as position, line width, and pattern. These characteristics are stored as mathematical expressions and displayed on the screen as pixels. Some common formats for vector graphics include CGM, EPS and WMF. ITITFact Fact The aspect ratio is the relationship between the vertical and horizontal size of an image. In normal television, the aspect ratio is 3:4, and in digital television the aspect ratio is 9:16. Animation Animation is the movement of a graphic. It is the result of a series of still images, or frames, presented in rapid succession. Each frame used in an animation sequence is called a cell (or cel). The term ‘cell’ derives from the traditional cartoon frames that were hand-drawn on separate sheets of celluloid. Animations can present information more effectively than text or an image. For example, an animation that shows the movement of blood throughout the body is more effective than a still image. Animations are usually started by entering a page or clicking a button. Animated GIF and QuickTime are two common formats for animation. Multimedia systems 221 Video Figure 7.2 A video player in a multimedia product. Video combines pictures and sounds displayed over time. It is important to note the difference between video and animation. Video starts with a continuous event and breaks it up into discrete frames. Animation starts with independent pictures and puts them together to form the illusion of movement. MPEG is a family of formats for compressed video that has become a standard for many applications. QuickTime is a video and animation format developed by Apple Computer. It is built into the Macintosh operating system and used with most Macintosh applications. Apple has also produced a QuickTime version for Windows. Video can be displayed in a multimedia product by inserting a video player (see Figure 7.2). Print and multimedia The major differences between print and multimedia versions of similar content are the mode of display and interactivity. Mode of display Printed information is displayed using a printer or plotter. In contrast, a multimedia product is displayed using a screen and speakers: • A screen is a display surface that provides immediate feedback about what the computer is doing. It can display text, image, animation and the visual portion of video data. Every screen is capable of displaying more than one resolution. The resolution and size of the screen affect the quality of the multimedia product. Multimedia products are often displayed on an information kiosk. It allows people to use a touch screen and select information about an organisation or service. • A speaker is a device used to produce sounds. A small speaker is usually located in most personal computers inside the system unit. However, high-quality stereo speakers are often connected to the computer, using a port and a sound card, or are built into the sides of the monitor. Interactivity A major difference between print and multimedia is interactivity. Interactivity allows the user to choose the sequence and content of information. A multimedia product is often judged on the quantity of its interactivity. The Internet is an example of an interactive environment. The expression ‘surfing the Net’ or ‘browsing’ refers to the experience of jumping from one page to another using interactivity. Interactive multimedia accepts input from a mouse, touch screen or keyboard and performs some action. Hypertext and hypermedia are used to navigate through a multimedia product. The product may link audio, image, animation, video or another screen. Print provides a limited form of interactivity. In books, it is possible to choose the sequence and content of the information by referring to the contents and the index. 222 Options Hardware demands by multimedia systems The developments in information technology have allowed people to create multimedia products that were once only developed by film professionals. The hardware of a multimedia system places limits on the quality and size of the multimedia product that can be produced or displayed. For this reason, a multimedia system makes use of the latest technology, such as a fast processor, large primary storage, high-resolution screen, quality speakers, and the latest in disk drives. Image storage Images place extra demands on the multimedia system including storage. The current image being displayed is stored in a section of memory called the frame buffer. When selecting images to include in a multimedia product, it is important to consider the format of the image and the resolution of the presentation device. Large high-resolution images may affect the performance of the multimedia product. An image with high resolution will require more memory than an image with low resolution. The storage requirements of an image are dependent on the number, size, tone and colour of each pixel. The relationship between the image on the screen and the bits in memory is called bit mapping, or memory mapping. It is dependent on the bit depth. Bit depth (or colour depth or pixel depth) for images is the number of bits per pixel. One or more bits must be stored for each pixel on the screen. At the simplest level, one pixel can represent one bit, where a 0 bit means the pixel is off and a 1 bit means the pixel is on. Example: What is the file size in kilobytes of a black-and-white image with a resolution of 640 by 400 pixels? File size = Horizontal × Vertical × Bit depth 8 × 1024 bits (= 1 Kb) = 640 × 400 × 1 8 × 1024 = 31.25 Kb Bit depth (bits per pixel) Number of colours or tones Relationship 1 2 21 = 2 2 4 22 = 4 3 8 23 = 8 4 16 24 = 16 6 64 26 = 64 8 256 28 = 256 16 65 536 216 = 65 536 24 16 777 216 224 = 16 777 216 32 4 294 967 296 232 = 4 294 967 296 Table 7.1 Relationship between bit depth and tones or colours. Multimedia systems 223 Colour graphics and graphics with tones (or grey scale) increase the number of bits per pixel and require more storage. Colour graphics are obtained from an RGB (red-green-blue) screen that uses a combination of red, green and blue colours. The minimum number of colours is eight: red only; green only; blue only; red and green (yellow); red and blue (magenta); blue and green (cyan); red, green and blue (white); and no colour (black). For example, as shown in Table 7.1, a bit depth of 8 allows a graphic to contain 256 colours, or 64 colours each with 4 tones (64 × 4 = 256), or 32 colours each with 8 tones (32 × 8 = 256). Photo realistic images require at least 24-bit colour. Example: What is the file size in kilobytes of a 256-colour image with a resolution of 1024 by 768 pixels? File size = Horizontal × Vertical × Bit depth 8 × 1024 = 1024 × 768 x 8 8 × 1024 = 768 Kb Audio storage Sound travels through the air in waves with a particular volume and pitch. A sound wave is analog data. Analog data is represented by continuous variable quantities while digital data is represented in the form of digits or numbers. Computers are digital. Audio is sound that has been digitised. It is created using an analog-to-digital converter (ADC) and reversed by a digital-to-analog converter (DAC). The ADC and DAC are built into the computer’s motherboard or are added using a sound card. The method used by the ADC to digitise a sound wave is called sampling (see Figure 7.3). Sampling has three important characteristics: the sampling rate, the sampling size and whether the sound is mono or stereo: • Sampling rate is the number of times a sample (slice) is taken from the sound wave. During a sample, the amplitude of the wave (volume) is measured and converted to a number. Two common sampling rates are 44.1 kHz (44 100 samples per second) and 22.05 kHz (22 050 samples per second). The higher the sampling rate, the better the sound (see Table 7.2). • Sample size (or bit resolution) is the number of bits per sample. The most common sampling sizes are 8-bit sound and 16-bit sound. Better-quality sound is recorded using 16 bits; however, for most voice uses, 8-bit sound is sufficient. CD-quality stereo sound requires 16 bits. Sampling rate Best uses 11 kHz Recommended for speech and short segments of music 22 kHz Better music playback 32 kHz Broadcast audio standard 44 kHz CD-quality audio playback 48 kHz Digital audio tape (DAT) playback Table 7.2 Sampling rates and their uses. 224 Options Digital audio system Audio input Sampling +3 +2 +1 0 –1 –2 –3 A/D conversion 0 +2 +3 +2 –1 –3 –2 0 100 110 111 110 011 001 010 100 Disk Reproduced signal D/A conversion +3 +2 +1 0 –1 –2 –3 Audio output Figure 7.3 Sound wave and its digitised form. • Mono uses one channel of sound, and stereo uses two channels (left and right). Stereo sound is regarded as the better sound. An audio file size is calculated by multiplying the sample rate, the sample size and the time in seconds. If the file is in stereo, then the result of the previous calculation is multiplied by 2. Example: Calculate the file size of a CD-quality audio that uses a sample rate of 44.1 kHz with a 16-bit sample size and a track that lasts for three minutes in stereo: File size = (Sample rate × Sample size × time) × 2 = 44 100 × 16 × 180 × 2 bits = 254 016 000 bits = 31 752 000 bytes (1 byte = 8 bits) = 30.28 Mb (1 Mb = 1 048 576 bytes) The large file size of CD-quality audio has been a problem. MP3 format is a compressed format that reduces this problem. It filters out superfluous information from the original audio source. This results in smaller audio files with no apparent reduction in quality. In general, one minute of music equals 1 Mb in an MP3 file. This can vary depending on the type of compression chosen and the software used (see Table 7.3). Multimedia systems 225 Audio track time WAV MP3 4.11 minutes 42.4 Mb 3.5 Mb 3.33 minutes 36 Mb 3 Mb 8.16 minutes 83.5 Mb 6.95 Mb Table 7.3 File sizes for WAV and MP3 files. Video processing Video can be an excellent medium to explain concepts; however, it places extra demands on the multimedia system. A decision to use video is often made in terms of providing exciting additional elements and ensuring the multimedia product will function effectively. A video camera is used to create a video clip in analog or digital form. Analog signals need to be converted into digital using a video capture card. Digital video production software is used to edit the video into a multimedia product. Editing may involve adding text, audio or images to the video clip. Video files are usually very large, and this factor must be taken into account before including them in a multimedia product. To satisfactorily display video or animations, we need to consider the speed at which the image can be shown. The speed of a video or animation is called the frame rate. It is measured by the frames per second (fps). The higher the frame rate, the smoother the video or animation (see Table 7.4). Full-screen video or animation requires a fast processor and a lot of random access memory. Frames per second Examples 30 Screen refresh rate of monitors 25 Video speed for the PAL system 24 Film speed for motion pictures 12 Cartoon animation speed 8 Minimum speed for the illusion of motion Table 7.4 Comparison of frame rates. Large videos and animations can also require large storage facilities. For example, calculate the file size in kilobytes of a 90-minute movie at 24 fps. Each frame is 2048 by 872 pixels with 32 bits for each pixel: Number of frames = (Frame rate x time in seconds) = 24 × 90 × 60 = 129 600 frames File size for each frame = Horizontal × Vertical × Bit depth 8 × 1024 = 2048 × 872 × 32 8 × 1024 = 6976 Kb File size for movie = 129 600 × 6976 = 904 089 600 Kb = 862.207 03 Gb (1 Gb = 1 048 576 Kb) 226 Options Animation processing Animation creation is affected by the size of the image and the speed of the movement. It is frequently set at 30 frames per second, or 9000 frames for a fiveminute animation (30 × 60 × 5). This creates a smooth illusion of movement. However, drawing 9000 images is a huge task. A computer with animation software makes this task much easier. Animation is created using path-based and cell-based animation. Cell-based animation (or cel animation) involves drawing and displaying individual frames or cells. Each frame is stored separately and loaded into a graphics page of primary memory. It is the traditional method of animation. The animation works by displaying the first frame from a graphics page while creating the second frame in another graphics page. The second frame is slightly different from the first frame depending on the items to be animated. The second frame is then displayed, and the third frame is created in the graphics page of the first frame. Animation occurs by alternating the display of graphics pages. This method of animation requires a very powerful computer to achieve 30 frames per second. For example, a high-resolution colour graphic containing 500 000 pixels would require calculations for 15 million (500 000 × 30) pixels in one second. A fast processor and a large fast-access storage device are required to ensure that the animation flows at the appropriate speed. For this reason, path-based animation is preferred. Path-based animation involves displaying the movement of objects onto a fixed background in a particular sequence or path. The pixels in the background do not change, only those for the moving object. This saves memory and processing time. Animation is achieved by drawing the object, wiping it, and then drawing the object in a new position. This process is made easier because animation software can generate the intermediate frames between two objects. This is called tweening (short for in-betweening). It is a key process in computer animation. Morphing and warping are animation techniques that create special effects. Morphing is the smooth change between two different images. It transforms the shape, size, dimension, and colour of one image into those of another. Morphing results in one image merging into another (see Figure 7.4). For example, a Figure 7.4 Morphing. Multimedia systems 227 Warping involves transforming or distorting a portion of the image. It divides the image into objects that can be manipulated (see Figure 7.5). For example, a sad face could be given a smile with the remainder of the face staying the same. Warping involves one image while morphing requires two images. Figure 7.5 Warping. People in multimedia systems Multimedia products are usually designed by a group of people who have an expertise in a particular field. Each person works on a different part of the project. There are people who are responsible for the system design, content and each of the media types, as well as people with information technology skills. Multimedia products require careful planning. People involved in multimedia systems include: • Content providers are people who provide the material for the multimedia product. This may include text, graphics sketches or final drawings, video footage and audio tracks. Generally these people are skilled in their field without necessarily having any technical skills in the software or hardware areas. • The system designer plans and organises the hardware and software required for the presentation. He or she may also act as the project manager or provide technical support. • The project manager organises the scheduling of various components of the product, provides overall supervision of the components and ensures that all components are delivered on time. • The technical staff includes a variety of artists and technicians who edit the graphic and video material, text and all other material into appropriate formats for the final document. It also includes layout and design personnel who work to develop an overall theme and look of the product. These people may also include the content providers, or they may be a totally separate group. People may be multi-skilled and work in different aspects of the multimedia product at the direction of the project manager. The development of any presentation involves a great deal of planning. This leads into a more detailed project plan. 228 Options ITITFact Fact A ‘Webmaster’ is responsible for the coordination of all tasks to keep a Web site active, secure and functional. The daily operation of a Web site is completed by a person called a ‘gatekeeper’. Exercise 7.1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 What is a multimedia system? List seven different types of media used in multimedia products. Explain the difference between the media types of text and number. Describe a hyperlink or hotword. Why is audio an essential part of most multimedia products? What are the advantages and disadvantages of a bit-mapped graphic? Explain the differences between animation and video. What is interactivity? Where are current images stored? Explain the difference between the sampling rate and the sampling size. What is the frame rate? How is it measured? Explain the difference between cell-based animation and path-based animation. Why is tweening a key process in computer animation? Describe morphing. Describe the roles of the people involved in producing a multimedia presentation. LEARNING ACTIVITIES 1 Calculate the size of the following graphics (answer in Kb to the nearest whole number): a A black-and-white graphic with a resolution of 640 by 480 and 2 tones b A colour graphic with a resolution of 1024 by 768 and 64 colours c A colour graphic with a resolution of 1600 by 1200 and 1024 colours each with 64 tones d An 8-bit colour graphic with a resolution of 1280 by 1024 e A 32-bit colour graphic with a resolution of 1152 by 864. 2 Calculate the size of the following audio files (answer in Mb, correct to two decimal places): a Sampling rate of 22.05 kHz with an 8-bit sound for two minutes in stereo b Sampling rate of 44.1 kHz with a 16-bit sound for three minutes in stereo c Sampling rate of 22.05 kHz with a 16-bit sound for one minute in mono d Sampling rate of 11 kHz with an 8-bit sound for four minutes in mono e Sampling rate of 44.1 kHz with a 16-bit sound for ten minutes in stereo. 3 Calculate the size of the following video files (answer in Gb, correct to two decimal places): a Frame rate of 25 fps, 120 minutes, frame resolution of 1024 by 768 pixels with 16 bits per pixel b Frame rate of 30 fps, 75 minutes, frames resolution of 1600 by 1200 pixels with 32 bits per pixel Multimedia systems 229 4 The resolution of a screen is set at 640 by 480 pixels. What is the size of the frame buffer for (answer in Mb, correct to two decimal places): a 8-bit colour images? b 32-bit colour images? 5 A shopping centre is creating a multimedia display for an information kiosk. What types of media could be used in the display? Give an example of the information to be displayed by each type of media. 6 Multimedia productions, such as television, are being displayed on the Internet. Outline some of the benefits for users and owners of Internet television over traditional television. 7 Pauline has scanned a photographic image of her dog. She wants to display the photograph using 24-bit colour. Is 24-bit colour a suitable bit depth? What file format would be suitable to save this photograph onto a hard disk with limited free space? Explain your answer. 7.2 Examples of multimedia systems Multimedia has developed into a major industry. It is being applied in most areas of our society, and recent advances in technology are influencing further multimedia development. Major areas of multimedia use There are four major areas of multimedia use: education and training, leisure and entertainment, information, and virtual reality and simulations. Education and training Multimedia systems are very effective at helping people to learn. A good multimedia product that uses different media types can maintain the user’s interest. The interactive nature of multimedia allows the user to control the learning. It addresses each user’s particular needs. Multimedia systems also allow training to be carried out at convenient times and are developed to cater for a wide range of abilities. They are a cost-effective method of education and training. Computer-based training (CBT) is a type of multimedia product used for education and training. A person uses CBT at his or her own pace. Information is presented using different types of media, and the user has the opportunity to review misunderstood concepts. CBT products are designed by experts in their fields and designed to cater for different rates of learning.The ‘Typing Tutor’ is a simple example of CBT that is designed to improve keyboard skills. Interactivity in CBT is the basis for an individual to progress through the system. CBT usually contains some form of assessment to determine whether an individual is ready for the next level. Leisure and entertainment Multimedia systems designed for leisure and entertainment are generally classified as computer games. Computer games provide a high level of interactivity. The responses of the user determine the game being played.The sequence of actions may be limited by the game designer or may have a large range of possibilities. Games tend to be time restricted and have complex animation. The level and amount of text is limited. Depending on the type of game, the navigation may be deliberately hidden until the user reaches a certain level. Computer games feature high 230 Options Figure 7.6 Characters from the computer game Carmaggedon. resolution images, audio, and animation or video. They often use some form of alternative to the keyboard, such as a joystick, for input. Developments in technology have resulted in computer games that are more realistic (see Figure 7.6). Information Multimedia systems provide users with an easy way to display information. The user controls when, how and what information will be displayed. The interactive nature of multimedia allows the user to search using related keywords to find specific information (see Figure 7.7). This is a distinct advantage over printed forms of the same material. A multimedia encyclopaedia is a good example of a multimedia system used to obtain information. It displays information using text, colour, audio, and video or animation. This makes it easier for people to understand information. Figure 7.7 The Encyclopaedia Britannica Web site. Multimedia systems 231 Information kiosks allow people to use a touch screen and select information about an organisation or service (see Figure 7.8). The information displayed depends on the selections of the user. Information kiosks commonly provide information about items, the location of items or a map to a particular product or service. They use large navigation buttons with few options. Information kiosks can also be used to provide information to the organisation. The selections made by the user are a source of information about the level of interest in a product or service. Virtual reality and simulations Multimedia systems are used for virtual reality and simulations. Virtual reality (VR) is the use of computer modelling and simulation to enable a person to interact Figure 7.8 Information kiosk. with an artificial environment. VR immerses the user in an environment that simulates reality through the use of interactive devices, such as goggles, head-up displays, gloves, or body suits (see Figure 7.9). In a common VR application, the user wears a helmet with a screen for each eye to view animated images of a simulated environment. Motion sensors that pick up the user’s movements and adjust the view on the screens create the illusion of reality. Data-gloves equipped with force-feedback devices provide the sensation of touch. The user picks up and manipulates objects that he sees in the virtual environment. VR is highly interactive. Figure 7.9 Virtual reality mask. 232 Options Flight simulators are used to train pilots. The external effects, such as changing weather conditions, require high-resolution images and the ability to control different aspects of the system. Different scenarios are carefully modelled, and the reactions of the plane are made as realistic as possible. Flight simulators tend to require a lot of physical room as they involve complex hydraulic systems. This makes them expensive. However, ‘crashing’ a flight simulator is cheaper than crashing a real plane. ITITFact Fact Simnet (simulator network) was a network of workstations that enabled military personnel to practice combat operations on interactive, real-time training systems. It was used to prepare U.S. troops for the Persian Gulf War in 1991. Advances in technology Advances in technology are influencing multimedia development. For example, increases in processing speed have allowed video and animation to move at realistic speeds. The improvements in storage capacity have allowed better-quality images to be a part of the multimedia production. Dramatic progress in communication technology has allowed multimedia to be displayed on the Internet. It is now possible to access audio and video over the Internet in real time. Three significant advances in technology that have influenced multimedia are the World Wide Web, CD-ROM speed and DVD. World Wide Web The World Wide Web (WWW or Web) is an Internet network that allows people at one computer to collect information stored on another. People connect to other computers to look at Web sites. A Web site is group of documents that present information on a particular topic. Each single document is called a Web page. These Web pages are stored on powerful computers called servers. Each server stores thousands of Web pages from different Web sites. To view a particular Web site, the computer connects to the server and receives the Web pages. The Web is an interactive environment. A hyperlink instantly connects to another web page with a click of the mouse button. The expression ‘surfing the Net’ or ‘browsing’ refers to the experience of jumping from one page to another using hyperlinks. A hyperlink takes the user to another Web site, or another page within the Web site, or even another location on the same Web page. Development on the Web has exploded. The increased power of personal computers and increased speed of access have made the Web a valuable multimedia tool. Organisations and individuals are creating Web sites that contain multimedia material to present information (see Figure 7.10). This information is displayed around the world at a reasonable cost. Multimedia systems 233 Figure 7.10 Web site containing multimedia. CD-ROM speed CD-ROM (compact disc with read only memory) disks are 12 centimetres wide and capable of storing 650 Mb. However, the data is read only and cannot be changed. CDROMs are convenient for storing data that remains constant, such as multimedia applications. A CDROM drive is needed to read data (see Figure 7.11). The speed of CD-ROM drives has steadily increased, resulting in faster retrieval of data. These improvements have made multimedia products approach a more realistic level. Figure 7.11 CD-ROM drive. DVD DVD (digital versatile disk) is a disk format that can store large amounts of data. It is an optical disk storage medium that may replace audio CD, CD-ROM, videotape and video game cartridges. DVD has the ability to produce studio-quality video and audio. DVDs can store full-length movies. There is DVD Video and DVD-ROM. DVD Video holds video and is played in a DVD player connected to the television. Data is compressed (lossy) in MPEG-2 format. However, there is no noticeable effect on the quality of the video. DVD Video is formatted to play on either of two mutually incompatible television systems: 525/60 (NTSC) or 625/50 (PAL/SECAM). Video equipment in Australia must conform to the PAL system, whereas the USA uses the NTSC system. 234 Options A DVD-ROM is the same size as a CD-ROM but provides storage of 4.7 Gb to 17 Gb. DVD-ROM drives can play CD-ROM and audio CD, and most DVDROM drives will play DVD Videos. One of the major advantages of a DVD is that text, image, video and audio have the same file structure. This file structure is called UDF (Universal Disc Format). This overcomes problems of incompatibility with multimedia applications. ITITFact Fact Polymedia is an advanced and highly sophisticated multimedia system used in defence, industry and medicine. It uses supercomputers to provide realtime animation and simulation. Multimedia design Designing multimedia products involves more than simply using the authoring software. Good design is critical to the success of a multimedia product. (See Figure 7.12.) Figure 7.12 Web site promoting good design. Design principles The different media types must be combined into one effective multimedia product. The design of each screen should be based on the three basic design principles: • Consistent. Layout, format and style should be the same throughout the multimedia product unless different media types demand a change. Readability is improved when similar items are grouped. Grouping is achieved by spacing, using colour for the text, changing the backgrounds, or using borders. • Navigation. People need to understand the structure of the multimedia product and easily proceed to the desired information. The time the multimedia product takes to respond to a particular action is important. People become frustrated if they are waiting more than a few seconds for the next screen or a video clip to load. Multimedia systems 235 • Simple. Do not use too many design elements as it often confuses the user. The overuse of colour, sound and animations can be distracting. Media Text depends on the purpose, the intended audience and the method of displaying the multimedia product. There are some generally accepted design principles to format text: • Characters. Avoid using too many fonts. San serif typefaces can be clearer than serif typefaces on the screen. Care should be taken when using font styles such as bold and italic. Long lines of text are difficult to read. A multimedia product often uses a larger type size, such as 20 point, than a word processing document would. Headings can be written in serif or san serif typefaces. Different size headings reflect their importance. • Screen layout. Appropriate conventions exist for column width, alignment, line spacing, character spacing, indentation, hyphenation, and kerning. Bullets and numbering are a common way to organise text in a multimedia product. • Text colour. Colour contributes to the style and theme of a multimedia product and draws attention to the text. Some colours should not be used together as they produce poor contrast and reduce readability (for example, blue text on a red background). Too many colours can be distracting and reduce readability. A colour scheme is used to ensure the colours result in a professional-looking multimedia product. Images and animations are used to create interest and provide information. However, they place extra demands on the multimedia system. The position and size of an image or animation is dependent on its importance and balance with the other design elements. They can support or weaken a multimedia product. If too many images are used, they lose their impact. The same goes for animations. Animations should be used sparingly, such as to introduce a new section within the multimedia product. Images and animations are edited and adjusted to suit the screen resolutions. The resolution of an image is dependent on the screen and the number of colours that can be displayed. The intention of an image must be easily understood. For example, an image might guide the user to another section of a multimedia product. Titling is the placement of a caption to accompany an image or graphic element. Audio and video are also used to create interest and provide information. An occasional burst of sound for special effects will focus the audience on the multimedia. However, the frequent use of sound effects can draw attention away from the main information. Audio and video can be excellent media to explain concepts; however, they place extra demands on the multimedia system. Audio and video files are usually very large, and this factor must be taken into account before including them in the multimedia product. 236 Options Exercise 7.2 1 Why are multimedia products effective at helping people to learn? 2 Why do computer games have a high level of interactivity? 3 Outline a distinct advantage of multimedia over printed forms of the same material. 4 What is commonly provided in information kiosks? 5 What is virtual reality? 6 List some of the interactive devices used in VR. 7 How does a flight simulator train pilots? 8 List three significant advances in technology that have influenced multimedia. 9 How is the Web an interactive environment? 10 What factors have made the Web a valuable multimedia tool? 11 Why has the speed of the CD-ROM drive been important in the development of multimedia? 12 What is DVD? 13 What compressed file format does DVD Video use? 14 Describe a DVD-ROM. 15 Why is UDF an important file structure? 16 Describe three basic design principles for a multimedia product. 17 What are some of the design principles for text colour? 18 What is titling? 19 When should audio and video be used in a multimedia product? LEARNING ACTIVITIES 1 Multimedia systems perform information processes requiring participants, data/ information and information technology. Clearly identify the participants, data/ information, and information technology in these major areas of multimedia use: a education and training b leisure and entertainment c information d virtual reality and simulations. 2 Use a multimedia encyclopaedia and a print encyclopaedia to research the same topic: a Comment on the similarities and differences between the two encyclopaedias. b Describe the type of media used in the multimedia encyclopaedia. c What navigation methods were used in the multimedia encyclopaedia? d Is it possible to improve on the navigation methods in the multimedia encyclopaedia? How? 3 Review at least five Web sites that contain different types of media. Comment on each Web site in terms of design; ease of use; how the media affects the site operation; and the relevance of audio, video and image files. 4 An interactive multimedia product about your local community is to be created: a What type of media could be used in the display? Give examples of each type. b How could the product be interactive? Multimedia systems 237 c Describe the design features that could be used in the product. d Design a home screen for this product. 5 A multimedia Web site is to be created to describe the important developments in computer technology over the last fifty years: a What type of media could be used in the display? Give an example. b How could the product be interactive? c Describe the design features that could be used in the product. d Design a home screen for this product. 7.3 Displaying in multimedia systems Many different tools are used for displaying a multimedia system. Multimedia systems depend on both hardware and software to create and display different types of media. Hardware The hardware for creating and displaying multimedia includes screens, projection devices, speakers, CD-ROM, video and head-up displays. Screens A screen is a display surface that provides immediate feedback about what the computer is doing. It can display text, image, animation and video data. The most common type of screen is a monitor. It uses CRT (cathode ray tube) technology. CRT displays produce images by firing a stream of electrons onto the inside of the screen, which is coated with tiny dots or pixels made of phosphor. Monochrome monitors use one stream, and colour monitors use three streams to strike red, green and blue phosphor (see Figure 7.13). When the stream of electrons hits the pixel, the phosphor glows to produce the image. The process by which the colour of a pixel changes gradually from its original colour to a new colour is called a cross fade. The total intensity of the pixel usually remains constant during this process. Three electron guns are located at the back of the monitor’s cathode ray tube (CRT). Each electronic gun shoots out a stream of electrons, one stream for each of the three primary colours: red, blue and green. The magnetic deflection yoke bends the path of the electron streams. Figure 7.13 CRT. 238 Options The beams pass through holes in a metal plate called a shadow mask, which aligns them with their targets on the inside of the CRT’s screen. The electrons strike the phosphors coating the inside of the screen, causing them to glow. Most CRT displays use a raster scan. A raster scan fires the electron stream in a series of zigzag lines that starts in the upper left-hand corner and moves left to right and top to bottom. It is repeated to maintain the image as the phosphor only glows for a short time. This is called refreshing. Interlaced monitors speed up refreshing by first scanning the odd lines from top to bottom and then scanning the even lines. However, this can cause the monitor to flicker. Non-interlaced monitors refresh the screen by scanning every line at up to 72 times every second. When the screen is being altered, only the data that is changed is transmitted. The information that describes the difference between the two screens is called delta information. It is the ‘change’ information. A special type of CRT display is available to only display vector graphics. Vector display systems direct the electron stream to draw only the lines required for the image. Shading can only be drawn as a series of lines. Vector display systems have a faster refresh rate than CRT displays using a raster scan. LCDs (liquid crystal displays) are a flat screen. They consist of a layer of liquid crystal material placed between two polarising sheets. Light is passed through the liquid crystal material, and current is applied at particular points. LCD technology provides displays that are very light, take up less room, produce no heat, have no glare, and create no radiation. Furthermore, LCDs require less power than CRTs, allowing them to run on batteries. At present, LCD technology does not produce the same picture quality as CRT technology, and larger displays are more expensive. LCDs are used in portable computers (see Figure 7.14) and can be mounted on the wall. Touch screens enter data by detecting the touch of the user’s finger. The user’s finger interrupts a Figure 7.14 LCD screens used on portable computers. matrix of infrared light beams shining horizontally and vertically across the screen. Touch screens do not allow fine precision of input and use big buttons or areas of the screen. Projection devices A data projection panel is a device that can be used together with a standard overhead projector to project an image from the computer screen onto a wall or white screen. The projection panel uses LCD technology to display the image from the computer. Light passes through the image much like a normal overhead projection slide. Data projectors, which can take a video signal directly from a computer and project it onto a wall or screen, are also available. They are smaller and more versatile than a projection panel but are more expensive (see Figure 7.15). Multimedia systems 239 Figure 7.15 A data projector. Speakers Speakers are devices used to produce sounds. Audio signals from a computer are translated into analog sound waves for transmission through the speakers. The sound is generated electromagnetically. A coil of wire is attached to a cone or diaphragm. The coil is placed around a permanent magnet, so that an electronic signal passing through the coil magnetises it. As the coil is magnetised, it pulls and pushes against the permanent magnet, causing the cone to vibrate according to the strength of the electronic signal. The movement of the cone makes the air near the cone vibrate, and this creates sound waves. Head-up displays Head-up displays are devices worn on the head to display information. They were originally developed for virtual reality. However, as the technology has been miniaturised, their application has widened. The heavy helmets have been replaced by displays no larger than a pair of glasses. In virtual reality, the participant watches himself or herself reacting to the environment. In other multimedia systems, the display is projected onto the surface of the glasses. The participant sees the display overlaying the real world. ITITFact Fact ‘There is no reason for any individual to have a computer in their home.’ —Ken Olson, World Future Society Convention, 1977. Software The software used for creating and displaying multimedia includes presentation software, application software, authoring software, animation software, Web browsers and HTML editors. 240 Options Presentation software Presentation software is used to make a professional presentation to a group of people. It improves the communication of information. A presentation consists of a series of slides. A slide is an individual screen or page of the presentation. Each slide may contain text, graphics, animation, audio and video. Some popular presentation software programs include Microsoft PowerPoint, Lotus Freelance and Aldus Persuasion. Presentation software creates several documents that are used in a presentation, such as on-screen presentations, audience handouts, overhead transparencies and speaker’s notes: • On-screen presentations are slides displayed on a monitor or projected onto a screen. The timing of the presentation is controlled either automatically or manually. Automatic timing requires the user to set the timing for each slide; the slides then advance by themselves. Manual timing requires the user to click the mouse button to advance each slide. • Audience handouts are images of two or more slides on a page. Handouts are given to people who attend the presentation. • Overhead transparencies are slides printed as an overhead transparency in black and white or in colour using either portrait or landscape orientation. • Speaker’s notes are the notes the speaker needs when discussing the slides. A transition is a special effect used to change from one image or screen to another. For example, one screen might slowly dissolve as the next screen comes into view. In general, two or three transitions in a multimedia product will maximise their impact on the audience. Transitions are frequently used in presentation software to allow a smooth change between slides (see Figure 7.16). Figure 7.16 A transition design window in PowerPoint. Application software Application software is software used for a specific task. A variety of application software is used in a multimedia system. It is often used to create the different types of media in the multimedia system. Application software used in multimedia systems includes: Multimedia systems 241 • Word processors allow text to be entered and documents to be created. The superior editing tools in word processors are used to write the text for a multimedia system. Some word processors can create documents that include images and sound. • Spreadsheets use a rectangular grid made up of rows and columns to organise and store data that requires some type of calculation. Spreadsheets are also used to produce different types of charts used in multimedia. • Graphics software creates and edits images. A paint program creates a bitmapped graphic. A drawing program creates a vector graphic. Images are often created using advanced graphic tools in graphic software. • Audio software creates and edits audio. Sounds are edited in many different ways, such as deleting sounds, changing the speed, adding a echo, overlaying (mixing) sound files and altering the quality of the sound file. • Video software creates and edits video. It involves adding text, audio and images to a video clip. Video software allows for a variety of effects, as well as the ability to combine segments of different videos into one production. A frame grabber captures and digitises images from a video. Frames can be cut, moved, cropped and pasted within the video. Adobe Premiere is an example of video software (see Figure 7.17). Figure 7.17 Adobe Premiere. • Project management software is used to efficiently plan, manage and communicate information on the development of a multimedia project. Project management software allows projects to be joined, tasks to be split among team members, and the project to be tracked over the Internet or via email. Authoring software Authoring software is used to combine text, graphics, animation, audio and video into a multimedia product. The software allows the user to bring together the separate media types. Authoring software allows the user to create interactivity. It assigns relationships and actions for the different media elements using a scripting language. Most authoring software shares similar features and is capable of creating similar multimedia products. Popular authoring software includes Macromedia Director, Asymetrix Toolbook, Macromedia Authorware, HyperCard (see Figure 7.18) and HyperStudio. 242 Options Figure 7.18 HyperCard. Animation software Animation software takes individual images and creates the illusion of movement. Remember that animation is just a series of images that are displayed in rapid succession. There are different types of animation software, such as twodimensional (2D) animation, three-dimensional (3D) animation, and warping and morphing. • 2D animation software uses flat two-dimensional images and combines them to create the animation. Macromedia Flash is an example of 2D animation software. • 3D animation software uses a mathematical model of a three-dimensional object to realistically portray objects with depth. It is a common element in many movies made today. • Warping and morphing software is used to create special effects using a range of powerful tools. Web browsers A Web browser is a software program stored on a computer that allows access to the Web. It will display a Web site if the address (or location) is entered directly into the browser. Web browsers will receive multimedia files that are embedded in a Web page. Web pages that have multimedia files take longer to download, as they are larger in size. However, developments in technology are continually improving the quality and speed of images, audio and video over the Internet. Some popular Web browsers include Netscape Navigator and Microsoft Internet Explorer. Both browsers will display a variety of images and can play audio and video with the appropriate additional software (plug-ins). HTML editors Web pages are created using hypertext markup language (HTML). HTML is a set of special instructions (called tags) that indicate how parts of a document will be displayed. An HTML editor is a software program that specialises in writing HTML code. Instructions in HTML are given using HTML tags. Tags are metadata, or information about data. A tag consists of a left angle bracket (<), a tag name and a right angle bracket (>). Tags are usually paired such as <TITLE> and </TITLE> to start and end the tag instruction. The end tag looks like the start tag except a slash (/) precedes the text within the brackets. Every HTML document contains certain standard tags, such as <HEAD> and <BODY>. (See Figure 7.19.) Multimedia systems 243 <HTML> </HEAD> <TITLE>sample HTML</TITLE> <BODY BGCOLOR="#FFFFFF"> <H1><CENTER>Pet World</CENTER></H1> <H3><CENTER>Dogs</CENTER></H3> <CENTER><TABLE BORDER=1> <TR> <TD WIDTH=107> <P><IMG SRC="dog.gif" WIDTH=94 HEIGHT=183 ALIGN=middle></P> </TD> <TD> <P>Click on the large image to find out more about this breed of dog. Click on the sound icon to hear the dog barking, or click on the movie icon to see the dog running.</P> </TD> <TD> <P><IMG SRC="DOGRUN.GIF" WIDTH=200 HEIGHT=35 ALIGN=bottom></P> <P><IMG SRC="sound.gif" WIDTH=119 HEIGHT=86 ALIGN=bottom></P> </BODY> </HTML> Figure 7.19 An HTML document. Exercise 7.3 1 How does a CRT display produce images? 2 What is a cross fade? 3 Explain the difference between a CRT display that uses a raster scan and one that uses a vector display system. 4 Describe an interlaced monitor. 5 How does an LCD display produce images? 6 Describe a data projection panel. 7 How is sound generated in a speaker? 8 Describe some of the documents that can be created using presentation software. 9 List the application software used in a multimedia system. What type of data does each type of application software create? 10 What is authoring software? 11 List three different types of animation software. 12 How are Web browsers related to multimedia? LEARNING ACTIVITIES 1 A multimedia presentation is to be created on the requirements of the HSC. The presentation requires handouts for the audience. What software would you choose? Why? Describe the processes you would use to create the presentation. 2 Copy and complete Table 7.5 on page 245 by listing the software that is readily available to create the types of media listed in the first column. If possible, create a sample file using this software. 244 Options Media Name of software Default file format Text Audio Bit-mapped graphic Vector graphic Animation Video Table 7.5 Types of media. 3 Use audio software and record sound at several different settings. Compare the quality of the files with the size of the files. 4 Create a multimedia presentation on the content of this chapter (multimedia). a Use different media types in the presentation. b Apply good design to the presentation. c Create a handout of your presentation. d Show the presentation to the class. 5 Review another group’s multimedia presentation from question 4. a How effective is the use of the different media types? b Does the multimedia add to the presentation? c Does the use of image, audio or video detract from the information being presented? d Outline the design principles applied in the presentation. e What system has been used to help navigate the presentation? 7.4 Other information processes All information processes play a role in multimedia systems, including collecting, organising, processing, and storing and retrieving. Collecting Collecting for a multimedia system may involve a range of tasks, such as writing the text, drawing images, recording and editing audio files, recording video tracks, or gathering data from the Internet. It is important to correctly identify the source and verify the accuracy of any information collected. A range of hardware collection devices is used to collect different media types for a multimedia product. Methods for digitising Scanners are input devices that can electronically capture text or images, such as photographs and drawings. The scanner converts the text or image into digital data that can be processed by the computer. The digital data can be printed, edited or merged into another document. Scanners offer a range of different resolutions, such as 2400 dpi, 4800 dpi and 9600 dpi. The higher the resolution, the better the quality of the final output. Scanners may be single-pass (scans only once) or multiple-pass (scans for each colour). They use a software standard called TWAIN (Technology Without An Interesting Name) that allows the digital image to be used in a range of different applications. There are three common types of scanners: Multimedia systems 245 • Hand-held scanners enter text and images that are less than a page wide. The hand is used to make a pass of the document. Handheld scanners are adequate for small pictures and photos but cannot easily capture an entire page. Software is used to join scanned items to make a full page. • Flatbed scanners look similar to a small photocopier. The document remains flat and stationary during the scanning (see Figure 7.20). • Overhead scanners look like an overhead projector. Documents are placed face up on Figure 7.20 Flatbed scanner. the scanning bed, and a small overhead tower moves across the page. Digital cameras are input devices that capture and store images in digital form rather than on film. They contain a viewfinder, a lens to focus the image and a storage medium, such as a memory card, hard disk drive or floppy disk, to retain the images. After a picture is taken, it is transferred to a computer and can be manipulated using graphics software. Digital photos are limited by the amount of memory in the camera, the quality of the lens and the output device. The main advantage of digital cameras is that making the photos is both inexpensive and fast because there is no film processing. Most digital cameras compress and save their images in standard JPEG or FlashPix format. Video cameras are used to create a video clip in analog or digital form. Analog form in a super VHS format is converted into digital form using a video capture card, which interprets each frame of the video as a bitmapped image. Video capture cards compress the video clip by using a compression algorithm that analyses the changes from one frame to the next. They encode the starting frame and a sequence of differences between the frames. Digital video cameras are input devices that capture video in a compressed digital format, such as MPEG. These video files are transferred directly to a computer (see Figure 7.21). A VCR (video cassette recorder) is used to select footage from existing videotapes. The final product may also be placed on a videotape for use. A composite video system sends all the video information using one Figure 7.21 Video camera collecting data on road users. signal. The RCA phono connector is commonly used for composite video on VCRs and video cameras. Professional-quality video systems produce two separate signals: one for colour and one for brightness. Video equipment in Australia must conform to the PAL system, whereas the USA system is called NTSC. A video digitiser takes the signal from a single-frame video or videos with a freeze frame signal. A frame grabber captures and digitises images from a video. The rate of capture may vary, but usually video frames display at around 30 per second, so a 246 Options freeze frame or frame grabber system operates by grabbing an image that lasts for 1/30th of a second. Microphones are input devices that capture sound. Sound travels through the air in waves and is analog data. Audio is sound that has been digitised. A sound card transforms the sounds from a microphone into audio. SoundBlaster cards are a standard for digital audio on a personal computer (see Figure 7.22). They are capable of recording and playing digital audio at 44.1 kHz stereo, or CD-quality sound. Sound cards support a MIDI sequence. This allows a musician to use a MIDI instrument to play music while the computer can store and edit the music. Sound may be recorded onto the computer directly or Figure 7.22 Sound card being inserted into a PC. imported from storage systems located on the Internet or on optical disks. Organising A script and a storyboard are two tools used to organise a multimedia product. A script is a printout of all the text, graphics, animation, audio and video used in the production. It outlines the interactivity in the project. A script gives directions for the construction of the multimedia product. It is a textual method of representing ideas and actions. On the other hand, a storyboard is a visual method. Storyboard A storyboard is a series of frames each representing a different action or screen image. It is based on the traditional cartoonist storyboard where the cartoonist sketches each frame of the cartoon. Storyboards are drawn on paper and frequently edited. They define each screen and the specific media types of the multimedia product. Storyboards consist of navigation paths, information and graphics. They are popular because they are simple to construct, easy to read and can be modified at every stage. There are four storyboard layouts: (Figure 7.23): • linear layout—a simple sequential path that is set up quickly • hierarchical layout—a sequential path in a top-down design in which the user starts at the beginning and moves down through the multimedia product • non-linear layout—no structure; the user moves between different layouts in any direction • combination layout—a blending of the above layouts. Multimedia systems 247 linear hierarchical non-linear combination Figure 7.23 Storyboard layouts. Processing Processing data for a multimedia system is the manipulation of the data. It involves the integration of data, compression of data and hypermedia. Integration of data After the data is collected, it is often imported into multimedia software. Multimedia software is used to integrate text, number, image, animation, audio and video data. It allows the user to bring together the separate media types. Multimedia software will accept different media types in a variety of formats. It also allows the user to create interactivity. Compression and decompression Multimedia products are characterised by large file sizes. This is the result of importing large graphics, animation, audio, or video files. Compression reduces the number of bits required to represent information. It allows the user to store more data and makes data transfer faster. Compressed data must be decompressed to extract the original information. There are a number of standard compressed file formats for different media, such as JPEG for images and MPEG for video. The use of compressed file formats is very common in multimedia systems. Images are often stored in GIF or JPEG formats. The major difference between these formats is the colour support. GIF files are limited to 256 colours, whereas JPEG images can use the full spectrum of 16.7 million colours. Images are created using graphics software and saved using one of these formats. This allows them to be easily imported into an authoring program. 248 Options A CODEC (coder-decoder, pronounced ‘ko-dek’) is used to encode and decode (or compress and decompress) various types of data. It is typically used for sound and video files. CODECs convert analog video signals into compressed video files, such as MPEG, or analog sound signals into digitised sound, such as RealAudio. The CODEC’s video compression algorithm uses the fact that there are usually only small changes from one frame to the next to select the data that can be ‘discarded’ during compression. It encodes the starting frame and a sequence of differences between frames. CODECs are also used with streaming (live video or audio). Hypermedia Hypermedia involves the linking of information in different types of media. The information is stored using a set of documents that may contain text, images, audio, video or executable programs. Each document is independent, and information is retrieved using hypertext. All the various forms of information are linked together to provide an easy way to navigate. The most well-known application of hypermedia and hypertext is the Web. ITITFact Fact Click streaming is a technique used to study how individual users navigate a Web site by recording where they click. Web page designers use it to see how users are accessing their page and what areas are of interest to the visitor. Storing and retrieving People need efficient methods for the storage and retrieval of information from a multimedia product. These methods involve different compression techniques and file formats. Compression techniques Compressing files increases the storage efficiency. The amount a file is compressed is measured by the compression ratio. The compression ratio describes how much smaller the compressed file is compared to the uncompressed file. If a compressed file is half the size of the uncompressed file, the compression ratio is 2 to 1 (2:1). That is, two units of data in the uncompressed file equal one unit of data in the compressed file. A higher compression ratio indicates greater compression of data. For example, a compression ratio of 3:1 means the file is more compressed than a file with a compression ratio of 2:1. A compression ratio of 1:1 indicates the file has not been compressed at all. The two basic types of compression are called lossy and lossless: • Lossy compression removes a number of data bytes from the file. The resulting file is smaller in size but the quality is reduced. However, audio and video files can be compressed with high compression ratios and without any change noticeable to the human ear or eye. For example, an MPEG file can provide a compression ratio up to 200:1. • Lossless compression allows the original file to be recovered in full. It works by replacing repeated data with something that takes up less room. For example, Multimedia systems 249 in this book the word ‘and’ appears many times. If each ‘and’ is replaced with a one-character symbol or token, two-thirds of the space required by the word ‘and’ is saved. Lossless compression is used mainly on text files, such as word processing, spreadsheet and database files. Each file of a given type can have a different compression ratio depending on the contents of the file. A text file usually has a compression ratio of 3:1. File formats It is important to choose an appropriate file format for each type of media. The application software and the quality of the data will influence the file format. The type of multimedia product will also influence the file format. For example, if you were using a Web browser, then images would usually be saved as GIF or JPEG files. If the multimedia product is to be played as a stand-alone product, then it must be saved as an application or provided with a player program. It is also important to store all files on a convenient storage device, such as removable cartridges (Zip or Jaz disks), optical disks (CD or DVD), flash memory or videotape. There are many different file formats used for multimedia. These formats are constantly changing, and new formats are being developed: • ASCII (American Standard Code for Information Interchange, pronounced ‘ass-kee’), or TXT (text), format is a standard format for storing text and numeric data. The data is essentially raw text without any formatting. Each byte in the file contains one character that conforms to the standard ASCII code. Most applications can store data in ASCII format. • RTF (Rich Text Format) is a standard developed by Microsoft for specifying the format of text documents. RTF files are actually ACSII files with special commands to indicate the formatting of characters and paragraphs. • HTML (Hypertext Markup Language) is used to create documents for the Web. It uses a set of special instructions (called tags) that indicate how parts of a document will be displayed. • BMP (Bit-map) is the native bit-mapped graphic format for Microsoft Windows. The images displayed when Windows starts and the wallpaper used on the desktop are in BMP format. BMP tends to store graphical data inefficiently with larger file sizes than other graphic file formats. • JPEG (Joint Photographic Experts Group, pronounced ‘jay-peg’) stores bitmapped graphics. JPEG files are compressed with a compression ratio of up to 100:1. However, JPEG uses lossy compression, so some data is lost during the process of compression. JPEG format is a popular choice for the Web. It is best used for photos and continuous tone images. JPEG images can use the full spectrum of 16.7 million colours. • GIF (Graphics Interchange Format) stores bit-mapped graphics. It was developed as the predominant format for Web graphics. GIF files can be compressed to reduce size without loss of quality (lossless compression). It is best used for line-art drawings, logos and simple graphics. GIF compresses graphics files using 8-bit colour (256 colours) and achieves a compression ratio of 2:1. 250 Options ITITFact Fact A GIF image appears on a Web page in a rough format at first, and then later, as the page completes loading, becomes clearer and sharper. This method keeps the viewer interested in the image that is being formatted and makes the process seem shorter. • TIFF (Tagged Image File Format) stores bit-mapped graphics. It is widely supported by applications on both Windows and Macintosh platforms. Some caution needs to be used when transferring TIFF files across platforms as there are several variants, some of which involve compression. • PICT (Picture) stores bit-mapped or vector graphics. It is the standard graphics file format on Macintosh computers. PICT files are encoded in QuickDraw commands and can also be used on IBM-compatible computers. • EPS (Encapsulated Postscript) stores vector graphics. Postscript is a printer language that is used for high-end publishing. This format is commonly used for files that will be output on high-resolution devices. EPS files are not viewed directly on the screen (see Figure 7.24). Figure 7.24 Software to convert EPS files. • WMF (Windows Metafile Format) stores bit-mapped or vector graphics. The WMF file format is commonly used by Microsoft Windows applications. WMF is used to exchange images between Windows applications. • CGM (Computer Graphics Metafile) stores vector graphics. It was designed by several standards organisations to become the standard vector graphics file format. It is supported by a wide variety of software and hardware products. • WAV (pronounced ‘wave’) stores either 8-bit or 16-bit sound. It was developed jointly by Microsoft and IBM and built into Windows. One disadvantage with WAV sound files is that they require a large file size. For example, a ten-minute CD-audio sound file will require over 100 Mb. Multimedia systems 251 • RealAudio is a de facto standard for exchanging sound files over the Internet. It was developed by RealNetworks and supports FM-stereo quality sound. A RealAudio player is required to hear a RealAudio sound file on a Web page. Web browsers such as Internet Explorer and Netscape Navigator include a RealAudio player. • AIFF (Audio Interchange File Format) stores 8-bit digitised sound files. It is a sound file format developed by Apple. • MIDI (Musical Instrument Digital Interface, pronounced ‘middy’) is a standard connection for computers and elec-tronic musical instruments. A musician uses a MIDI instrument to play music and uses the computer to store and edit the music (see Figure 7.25). MIDI allows 16 instruments to be played simultaneously from MIDI interfaces. The sound is recorded in a file format called the MIDI sequence. MIDI files require less storage as they only contain the note information and not details of the sound wave. The quality of the sound from MIDI files is dependent on the synthesiser. • MP3 (MPEG Audio Layer 3) is an audio compression technology that is part of MPEG-1 and MPEG-2 (discussed below). It compresses CD-quality sound using a compression ratio of 11:1. MP3 has made it possible to download quality audio from the Internet (see Figure 7.26). For example, a four-minute song that would normally require 44 Mb of storage will be compressed Figure 7.25 Artist recording music in MIDI format. using MP3 to only 4 Mb. MP3 compresses a file by removing the high and low frequencies out of human hearing range. • MPEG (Motion Picture Expert Group, pronounced ‘em-peg’) is a family of formats for compressed video that has become a standard. MPEG files achieve a high compression ratio by using lossy compression and only storing the changes from one video frame to another. MPEG-1 standard provides a video resolution of 353 x 240 at 30 fps. It is similar to the quality of conventional VCR videos. MPEG-2 standard offers resolutions up to 1280 x 720 and 60 fps. It is sufficient for all major TV standards and is used on DVDs. • QuickTime is a video and animation format developed by Apple Computer. It is built into the Macintosh operating system and can be used with most Macintosh applications. Apple has produced a QuickTime version for Windows. • Animated GIF (Graphics Interchange Format) is a type of GIF image that can be animated. Animated GIF does not give the same level of control as other animation formats but is supported by all Web browsers. 252 Options Figure 7.26 Web site for MP3. Exercise 7.4 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Describe three common types of scanners. What is the main advantage of digital cameras? How does a video capture card work? What is a composite video system? What is the usual rate at which a frame grabber captures an image? Describe four storyboard layouts. What is compression? Describe the major difference between GIF and JPEG file formats. What is the purpose of a CODEC? What is hypermedia? Explain the difference between lossy and lossless compression. What is the difference between an ASCII file and an RTF file? Describe the JPEG file format. Describe the EPS file format. Outline the major difference between MIDI and digital waveform sound files, such as WAV. 16 Why is MP3 an important file format? 17 Describe two common file formats for video. LEARNING ACTIVITIES 1 A multimedia production is to be created about your family. What storyboard layout would be appropriate? Give reasons for your answer. Construct a storyboard for your family. Multimedia systems 253 2 A multimedia production is to be available on CD-ROM and via the Internet. What audio and video formats would you choose? Justify your decision. Do these formats require additional plug-ins? 3 Investigate the current compression formats for video, audio and image files. Outline the advantages of these formats. Present the results of your investigation to the class. 4 Create an image using a paint program and a draw program: a Convert the image to a different resolution and compare the file sizes. b Convert the image to a different file format and compare the file sizes. 5 A group of students intends to develop a multimedia production about their school. It is to be displayed on the Web. Outline any problems for users of the Web site if the multimedia production is developed using a linear layout. What storyboard layout would you suggest for these students? 6 You have been asked to put together a multimedia presentation for a well-known charity. They are holding a dinner and auction and want to show images of their work during the meal: a Describe the hardware you would use to collect information. b Describe the application software you would use to create or capture the information. c List the file formats you would use to store the different types of media. d Describe the hardware you would need to display the presentation. e Describe the software you would use to display the presentation. 7 A music store is planning an interactive multimedia Web site of the latest CD releases using all the media types. The Web site is to include selected songs, historical data about the artists, photos and interviews. Work in groups to complete the following tasks: a Write a storyboard layout for the multimedia display. b Describe the design features you would use in the production. c Design a home screen for this display. d Develop the multimedia product for the Web. 7.5 Issues related to multimedia systems Both positive and negative impacts arise from the use of multimedia systems. In this section, we examine some of the issues raised by multimedia systems. Copyright Copyright is the right to use, copy or control the work of authors and artists. It is against the law to break copyright. You are not allowed to use or copy the work of another person without the person’s permission. Data collected from the Internet is usually protected by copyright. Text, images, video or animations obtained from a Web site should not be used without acknowledgment or permission from the owner. However, the Copyright Act does make special provisions for students to use information for research purposes. It allows students to use a reasonable portion of the original work if correctly cited. When citing an Internet source, include the following information: • author’s surname and initial or organisation’s name 254 Options • • • • title of the completed work or Web page URL of the page date of document or Web page publication download date. The copyright issue is highlighted with music files. It is legal to rip (the technical term for transferring songs from standard audio to MP3 format) music from your own CDs. It is also legal to download music from Web sites where the artists own the rights. However, playing or distributing any other music files is breaking the copyright law. Even if you listen to streamed music from a Web site, the original artist must give permission. The copyright law aims to protect the original artist for creating the piece of music. The issue of copyright is a moral issue. Is it right to copy the original work of an author or artist without their permission? Authors or artists often spend hundreds of hours developing a product and deserve some return for their efforts. The fact that it is relatively easy for anyone with a computer to make copies of the product is irrelevant. If people infringe copyright, authors and artists are not getting royalties and they will be reluctant to spend time developing good products. We should take care when downloading files to ensure that they are free to download or that licensing fees have been paid. Appropriate use of the Internet New developments on the Internet are creating a range of different issues. The introduction of live video data raises the issue of privacy. Privacy is the ability of an individual to control personal data. Digital video cameras are being located in streets and streamed live on the Internet (see Figure 7.27). People who are walking down the street are not aware they are being photographed nor have they given permission to be presented on the video. Is our personal privacy being invaded? Will all aspects of our lives, such as work, be streamed onto the Internet? How can our privacy be protected from this new development? Merging technologies Figure 7.27 Live video on www.coastalwatch.com. The merging of different technologies is a trend occurring at a staggering rate. Today, communication capabilities are essential for a computer system and computer technology is essential for communication. When people buy a personal computer, they purchase a modem and connect it to a phone line to access the Internet. Similarly, telephones have become data entry terminals into computer systems. Organisations are asking individuals to make choices using the keypad on the telephone. Radio, television and the Internet are converging. An increasing number of Web sites are providing radio and video broadcasts (see Figure 7.28). Will the Internet replace radio and television? Multimedia systems 255 Figure 7.28 Radio on the Internet. Advances and cost reductions in processing speeds, storage capacities, miniaturisation, file compression, and the speed of electrical components have made the use of digital data more affordable. Digital data is represented in the form of digits or numbers and is used by computer technology. The digitisation of data provides the opportunity to use computer technology. Advances in digitisation have made the extensive use of multimedia feasible. A few years ago it was not possible for personal computers to combine different types of data. One example of the benefits of digitisation is digital television. Digital television systems are designed to present interactive multimedia. They merge communication, television and computer technologies. Digital television will offer more channel choices, a higher resolution screen and greater control over the program the user is watching. For example, a user watching a football match can choose to watch a particular football player. ITITFact Fact ‘The danger from computers is not that they will eventually get as smart as men, but that we will meanwhile agree to meet them halfway.’—Bernard Avishai from ‘Charades,’ an Internet collection of quotations. Data integrity Data integrity describes the reliability of the data. It involves the accuracy, currency and relevance of the data. There is no guarantee of the integrity of data in multimedia systems. The source of any data needs to be cross-referenced. The Internet is an obvious way of cross-referencing data obtained from a multimedia system. However, the Internet does not always provide accurate data. Data integrity raises a number of issues. Who is responsible for the accuracy of the information? Is the creator the only person responsible for the accuracy of the data? Do organisations that provide access to information in a multimedia 256 Options system have a responsibility to verify its accuracy? Responsible users must take care when obtaining information from multimedia systems. Clearly, it is necessary to compare data from a number of sources to determine which data is accurate. Exercise 7.5 1 2 3 4 5 6 7 8 9 What is protected by the copyright law? List the information needed to correctly cite an Internet source. How does the copyright issue apply to music files? Why is copyright a moral issue? How is live video on the Internet an issue? Describe the merging of computer technology and communication. What advances in technology have made digital data more affordable? List some of the advantages of digital television. Why is data integrity an ethical issue? LEARNING ACTIVITIES 1 Multimedia systems are having a positive and negative impact on our society. Briefly describe some of the changes to our society caused by multimedia systems. 2 Active billboards combined with wireless Internet could allow people to order items from their car. What issues do you see with this concept? Do you think this concept will develop in the future? Why? 3 A friend downloaded a multimedia presentation from the Internet and submitted it to the teacher as her own work. Why is this an ethical issue? What can be done to stop this practise? Would you take any action? Why? 4 Developments in technology have made huge changes to multimedia systems in the past five years. Predict some possible changes to multimedia productions in the next five years. Justify your predictions. 5 Locate and download an MP3 format file with no copyright from the Internet. Describe this process. What software do you need to play these files on a computer? Why are musicians and recording companies worried about the MP3 format? Is downloading a song from a Web site the same as stealing? Give reasons for your answer. 6 You have been asked to update the design of a school Web site. The multimedia site is to contain some images of the school grounds, staff lists, email contacts for the school, information about courses, samples of student work and photos of school activities. a What privacy issues do you need to consider when showing images of staff or students? b How would you ensure that all work displayed is original? Multimedia systems 257 Chapter review PART A Select the alternative (A, B, C or D) that best answers the question. 1 Which of the following is not a type of media used in a multimedia product: A text B hypertext C video D interactivity 2 To produce realistic animation, frames must be displayed at close to: A 5 frames per second B 5 frames per minute C 30 frames per second D 30 frames per minute 3 Tweening involves: A a computer generating intermediate frames between two objects B an artist drawing each frame individually C using cartoon characters in an animation D creating a path between two objects 4 Morphing is: A changing one image into another image B changing the appearance of one image C changing the resolution of an image D changing the colour depth of an image 5 The storage requirements for bitmapped graphics will increase if the: A number of colours increases B resolution increases 258 Options 6 7 8 9 10 C bit depth increases D all of the above A content provider: A designs the presentation B often works as project manager C supplies the material for a presentation D converts the raw material into digital format Virtual reality enables a person to: A interact with an artificial environment B interact with the real environment C select real data for a multimedia product D select the content of the information Which of the following software is not used to create a multimedia product: A authoring software B word processing C graphics software D Web browser When saved to disk, sound may be stored as: A WAV, MP3 or RealAudio B WAV, MPEG or MIDI C JPEG, RealAudio or MIDI D JPEG, MPEG or MP3 The most common file format for compressed digitised video is: A JPEG B MPEG C GIF D MP3 Chapter review PART B For each of the following statements, select from the list of terms the one that most closely fits the statement. Write the letter corresponding to your choice next to the statement number. Statements 1 The legal right to ownership of a work. 2 Pictures, such as drawings, paintings or photographs. 3 The number of bits per pixel. 4 Sound that has been digitised. 5 A file format for images that uses lossy compression. 6 It is used to create documents on the Web. 7 A file format for images that uses 8-bit colour (256 colours). 8 A graphic that is made up of objects, such as a straight line, curve or shape. 9 A link between two parts of a multimedia product. 10 An audio file format developed by MPEG. 11 A display that is produced by firing a stream of electrons onto the inside of the screen. 12 A device that captures and digitises images from a video. 13 The number of times a sample is taken from the sound wave. 14 A graphic that treats each pixel on the screen individually and represents this by bits in memory. 15 A type of medium that starts with a continuous event and breaks it into discrete frames. 16 The number of bits per sample. List of terms a frame grabber b hotword c audio d video e f g h i j k l m n o p HTML sample size GIF copyright bit-mapped vector CRT JPEG image MP3 bit depth sampling rate PART C Write at least one paragraph on each of the following. 1 Describe the different types of media used in a multimedia product. 2 Compare a multimedia presentation to a paper-based presentation. Give advantages and disadvantages for each version. 3 You have been employed as a project manager for a multimedia game design team. a What is your role in the production? b Describe the roles of the other members of the team. c Describe the hardware and software you will use. 4 Your school is planning a new Web site. You have been given the job of designing the site from scratch with a team of other students. a What features would you describe as essential for this site? b Develop a storyboard for the site. c Give reasons for your choice of storyboard layout. d Describe your navigation system. e Describe the ethical issues that need to be considered before adding student photos to the site. Multimedia systems 259 Glossary analog-to-digital converter (ADC) A device that takes an analog signal, such as a voltage or electric current, and electronically converts it into digital data. absolute referencing Copying a formula in a spreadsheet where the contents of the formula in the source cell do not change when pasted into the destination cell. Absolute references are indicated by a $ sign. (e.g., $B$5). access See data access. accuracy See data accuracy. actuator A display device in an automated manufacturing system that performs a mechanical action under the control of a signal from a controller. aliasing A staircase pattern created when a bitmapped graphic is enlarged. analog data Data represented by using continuous variable physical quantities, such as voltages. analysing The information process that involves the interpretation of data, transforming it into information. analysis report A report that contains details of the new system with recommendations for design, implementation and maintenance. animation The movement of a graphic, as in a cartoon, accomplished by presenting a series of still images in rapid succession. animation software Software that takes individual images and creates the illusion of movement. ascending order Data arranged from smallest to largest (0 to 9) or from first to last (A to Z). assembly line production A series of workstations connected by a transfer system that moves parts between each workstation. asynchronous transmission Serial transmission method that sends one byte at a time with special start and stop bits before and after each byte of data. atomicity A property of a transaction processing system that ensures that all of the steps involved in a transaction are completed successfully as a group. attachment A file sent with an email message. attribute A defined property of an entity in a relational database. audio Sound that has been digitised. audio conference A single telephone call involving three or more people at different locations. authoring software Software used to combine text, graphics, animation, audio and video into a multimedia product. automated manufacturing system An information system involved in production by inventory tracking, record-keeping, production scheduling and actual production. automated warehouse A storage facility that uses automatic control for the storage of products. 260 Glossary automation The application of automatic control to industrial processes. It refers to the application of machines to tasks once performed by human beings. backup A copy of data or software for the purpose of safety. It is used to rebuild a system. backward chaining An inference strategy that starts with one or more possible solutions and searches back through the system to determine the questions to be asked. bandwidth The capacity of a channel, or transmission medium, to transfer data. barcode reader An input device that enters product identification at a point-of-sale terminal. baseband A network that uses the entire capacity of the cable to transmit only one signal at a time. batch system An automated manufacturing system that produces a specific quantity of a product. batch transaction processing A transaction processing method that collects transaction data as a group, or batch, and processes it later. baud rate The maximum number of data symbols or electrical signals that can be transmitted in one second. bias Data that is unfairly skewed or gives too much weight to a particular result. biometric device A device that uses personal characteristics, such as fingerprints, hand size, signature, eye and voice, to gain access to an information system. bit depth The number of bits per pixel for an image. bit mapping The relationship between the image and the bits in memory. Also called memory mapping. bit-mapped graphic A graphic that treats each pixel on the screen individually and represents this by bits in memory. bit rate See bits per second. bits per second (bps) A unit of measurement for the speed of data transfer. It is the number of bits that can be transmitted in one second. Also called bit rate. block diagram A diagram used to represent a system. bridge A combination of hardware and software used to link two similar networks. broadband A network that divides the cable so that several signals can be transmitted at the same time. bus A pathway of wires and connectors that provides the link between input, storage, process and output devices. bus topology A network topology where all the devices are attached to a direct line called a bus. computer-aided design (CAD) The use of information technology to design and analyse a product or object. computer-aided manufacturing (CAM) The use of specialised information technology tools to automate the entire manufacturing process. computer-based training (CBT) A type of multimedia product used for education and training. cell The intersection of a row and column in a spreadsheet. Also a frame or still image used in an animation sequence. cell reference The position of the cell in the spreadsheet. cell-based animation Animation that involves drawing and displaying individual frames or cells. character The smallest unit of data that people can handle. It is a single letter, number, punctuation mark, or special symbol that can be displayed on the screen. chart A graphical representation of numerical data. Types of charts typically include bar (histogram), column (stacked bar), line (continuous) and pie (sector). checksum A method of checking for errors in data transmission by counting the number of bits in a data packet. computer-integrated manufacturing (CIM) An automated manufacturing system that involves all the engineering functions of CAD/CAM, as well as the business functions of the organisation. circular reference A formula in a spreadsheet that refers to itself, either directly or indirectly. client-server architecture The software relationship between the client (user) and server. coaxial cable A cable consisting of a single copper wire surrounded by an insulator, grounded shielding and an outer insulator. coder-decoder (CODEC) A method used to encode and decode (or compress and decompress) various types of data. collecting The information process that involves deciding what to collect, locating it and collecting it. communication system An information system that enables people to send and receive data and information. composite key A key in a database that is made by joining two or more fields together. It is used when no data item in any field can be guaranteed to be unique. Also called compound key. composite video A system that sends all the video information using one signal. compression See data compression. compression ratio A measurement of the amount a file has been compressed. computer operator A person who performs tasks on the computer equipment, such as monitoring performance, starting up, running jobs and backing up. concurrency A property of a transaction processing system that ensures two users cannot change the same data at the same time. constraint A factor that affects an information system and prevents it from achieving the objectives. context diagram A graphical method of representing an information system using only a single process together with inputs and outputs (external entities). continuous system An automated manufacturing system capable of operating 24 hours per day for weeks or months without stopping. controller A device in an automated manufacturing system that receives data from a sensor and changes it into information that can be used by the system. copyright The right to use, copy or control the work of authors and artists, including software developers. cyclic redundancy check (CRC) A method of checking for errors in data transmission using a division process. critical damping Damping at the preferred rate of change in the output of the system. cathode ray tube (CRT) A type of screen that produce images by firing a stream of electrons onto the inside of the screen, which is coated with tiny dots, or pixels, made of phosphor. carrier sense multiple access and collision detection (CSMA/CD) A method to avoid collisions on an ethernet network where all nodes have the ability to sense signals. custom software Application software written by programmers using the exact specifications for the new system. damping The process in an automated manufacturing system that modifies the signal to the output device based on the input signal. data The raw material entered into the information system. data access The extent to which data is available to people. data accuracy The extent to which data is free from errors. data bits The number of bits in each group of data. data compression A data storage technique that reduces the number of bits required to represent information. data dictionary A comprehensive description of each field (attribute) in a database. data encryption The process of encoding data. It is the most effective way to achieve data security during the transmission of data. data flow diagram (DFD) A graphical method of representing an information system using a number of processes together with inputs, outputs and storage. data integrity The reliability of the data. data mart A smaller version of a data warehouse used to store data about a specific topic or area. data mining A process that finds relationships and patterns in the data stored in a database. Glossary 261 data modelling The process of identifying entities, the relationships between those entities and the attributes of those entities in a relational database. data ownership An ethical issue related to who owns and controls data about an individual collected by another individual or organisation. data projection panel A display device that can be used together with a standard overhead projector to project an image from the computer screen onto a wall or white screen. data redundancy The undesirable duplication of data within a database. data security A series of safeguards to protect data. data type The kind of data, such as image, audio, video, text or numbers, that can be stored in a database field. data validation The checking of the accuracy of the data before it is processed into information. data warehouse A database that collects information from different data sources. database An organised collection of data. database information system An information system that uses a database. database management system (DBMS) A software package that builds, maintains, and provides access to a database. database of facts Data in an expert system that relates to the specific situation being analysed. decision support system (DSS) An information system that assists people to make decisions by providing information, models and analysis tools. decision table A table that represents all possible conditions and actions. It indicates the alternatives for different conditions and actions based on the rules. decision tree A diagrammatic way of representing all possible combinations of decisions and their resulting actions. It represents the decisions made within a system as the branches of a tree. decoding The conversion of data from the form used for transmission back to its original form. descending order Data arranged from largest to smallest (9 to 0) or from last to first (Z to A). digital camera An input device that captures and stores images in digital form rather than on film. digital data Data that is represented in the form of digits or numbers. direct access A method of retrieving data that allows data to be found directly, without accessing all the previous data. direct conversion Conversion to a new system involving the immediate change to the new system on a chosen date and the discontinuation of the old system. discrete system An automated manufacturing system that performs a single task in a small time interval. displaying The information process that presents the output from an information system to meet a given purpose. 262 Glossary distributed database A database located at more than one site that acts as a single collection of data but is geographically dispersed. documentation A written description to explain the development and operation of an information system. domain name The address of a specific computer on the Internet. downloading The action of receiving a file from another computer. electronic mail (email) A messaging system that allows the sending and receiving of electronic messages using a computer. encoding The conversion of data from its original form into another form for transmission. encryption See data encryption. entity A specific thing in a relational database about which information is collected and stored. entity-relationship diagram (ERD) A graphical method of identifying the entities in a relational database and showing the relationships between them. environment Everything that influences or is influenced by an information system and its purpose. ergonomics The relationship between people and their work environment. ethernet The first industry-standard local area network access method, or protocol, based on a bus topology. evaluation The process of determining whether the system is working as expected or whether changes are required. expert system An information system that provides information and solves problems that would otherwise require a person experienced in that field (an expert). expert system shell A ready-made expert system that contains no knowledge. explanation mechanism A method of checking how a deduction was inferred in an expert system. extranet An intranet that is accessible to customers, suppliers or others outside the organisation. feasibility study A short report that analyses potential solutions and makes a recommendation. fibre-optic cable A cable that uses a laser of light to carry data in small glass fibres about the diameter of a human hair. field A specific category of data in a database. field name The name of a field in a database. field size The number of characters allowed in a field in a database. file A collection of information stored on a computer system and given a name. A file in a database is made up of records, fields and characters. file server A controlling computer in a network that stores the programs and data shared by users. filter A tool to limit the records viewed in a database. A tool used to display only the desire data in a spreadsheet. firewall A data protection method used on the Internet or any network to verify and authenticate all incoming data, including passwords. flat file database A database that organises data into a single table. foreign key An attribute (field) of a table in a relational database that is a primary key in another table. form An arrangement of fields on the screen, often from a single record, that is used to view, enter, and change data in a database. Also a document used to collect data from a person. formula An instruction to perform a calculation in a spreadsheet. forward chaining An inference strategy in which the user supplies all the data before the question is asked or the inference is made. frame buffer A section of memory that stores the image currently being displayed. frame grabber A tool used to capture and digitise images from a video. frame rate The speed of a video or animation, measured in frames per second. full-duplex mode The transmission of data in both directions at the same time. function A predefined set of operations in a spreadsheet that perform simple or complex calculations. fuzzy logic A term used to describe the variables that exist between a ‘true’ and a ‘false’ situation in an expert system or neural network. Gantt chart A bar chart with each bar representing a task or stage in the system development cycle. It provides a quick method of determining whether the project is on schedule. gateway A combination of hardware and software used to link two different types of networks. grandfather-father-son A backup procedure that refers to at least three generations of backup master files. graphic A picture, such as a drawing, painting, or photograph. group decision support system (GDSS) An information system that assists users to make a decision by working together in a group. half-duplex mode The transmission of data in both directions but not at the same time. handshaking The sending of signals to reach an agreement about which protocol to use to accomplish an exchange of information. hard disk A disk made of metal or glass and covered with magnetic material. It is used to store data. hardware flow control A handshaking method that uses a dedicated connection, such as a wire, to control the flow of data. head-up display A device worn on the head to display information. hierarchical database A database that organises data in a series of levels. hypertext markup language (HTML) A set of special instructions (called tags) that indicate how parts of a document on the Web will be displayed and navigated. HTML editor A software program that specialises in writing HTML code. HTML tag An instruction in HTML. hub A central connecting device in a network. Data arrives at the hub from one or more devices and is forwarded out using just one cable. human-centred system A system that makes participants’ work as effective and satisfying as possible. hyperlink The highlighted item (usually an underlined word or graphic) that allows an electronic connection between documents in a hypertext system. Also called link or hotword. hypermedia A combination of media whose locations are linked to provide an easy way to navigate between the documents. hypertext A system that allows documents to be cross-linked in such a way that the user can move from one document to another by clicking on a link. image Data in the form of a picture, such as a drawing, painting or photograph. implementation plan A document that details the participant training, method of conversion and testing for a new information system. indexed access Direct access that involves the use of an index. inference engine A set of routines in an expert system that carries out deductive reasoning by applying the facts, assumptions, theories, and rules in the knowledge base. information Data that has been ordered and given some meaning by people. information kiosk A multimedia device that allows people to use a touch screen and select information about an organisation or service. information processes The steps taken to change data into information: collecting, organising, analysing, storing/retrieving, processing, transmitting/receiving and displaying. information processing The creation of information by processing data using information technology. information system A set of information processes requiring participants, data/information and information technology. It is created for a purpose and to operate in a particular environment. It performs the seven information processes. information technology The hardware and software used by an information system. intelligent agent A piece of software used to search through relational databases for relevant data. intelligent system A system that receives data from the environment, reacts to that data and produces an intelligent response. interactivity The property of an information system that allows the user to choose the sequence and content of the information to be displayed. Glossary 263 Internet A global collection of computer networks that speak the same language and are hooked together to share information. intranet A private network that uses a similar interface to the Web. key A field in a database that is used to sort and retrieve information. knowledge base A set of general facts and if-then rules supplied by an expert and forming part of an expert system. knowledge engineer A person who builds an expert system. label Text entered into a cell of a spreadsheet to provide some explanation of the spreadsheet. link See hyperlink. liquid crystal display (LCD) A display device that consists of a flat screen formed from a layer of liquid crystal material placed between two polarising sheets. local area network (LAN) A network that connects computers (or terminals) within a building or group of buildings on one site. logical operator A series of characters or a symbol used to combine simple queries. logon The procedure used to get access to the network. lossless compression A type of compression that works by replacing repeated data with something that takes up less room. lossy compression A type of compression that removes a number of data bytes from the file. machine-centred system A system designed to simplify what the computer must do at the expense of participants. macro A series of commands stored in a file that can be executed by pressing a few keys. magnetic disk A circular piece of metal or plastic whose surface has been coated with a thin layer of magnetic material. It is used to store data. magnetic tape A very long, thin strip of plastic, coated with a thin layer of magnetic material. It is used to store data. mail server A computer in a network that provides email facilities. maintenance The modification of the system by making minor improvements. management information system (MIS) An information system that provides information for the organisation’s managers. It presents basic facts about the performance of the organisation. manufacturing The process of producing a product that meets a specific need. mass production The manufacture of products in large quantities by standardised mechanical processes. messaging system A system used to send messages to people in different locations who can receive the message at a different time. metadata Information about data. magnetic ink character recognition (MICR) Characters written using magnetic ink that 264 Glossary contains magnetised particles. It is widely used by banks to print serial numbers on cheques. microwave A high frequency radio signal sent through space in a straight line from one antenna to another. model A representation of some aspect of the real world. modem A device that enables the transmission of data from one computer to another. morphing Animation technique that involves the smooth change between two different images. multimedia The presentation of information using text, graphics, animation, audio and video. multimedia system An information system that combines different types of media. MYCIN A famous expert system designed to assist non-specialist doctors in the diagnosis and treatment of bacterial blood infections. network A number of computers and their peripheral devices connected together in some way. network administrator A person who manages a network within an organisation. network database A database that organises data as a series of nodes linked by branches. network interface card (NIC) An expansion card that fits into an expansion slot of a computer or other device, so that the device can be connected to a network. network licence A licence that allows people to use a program on a network. network operating system (NOS) An operating system that is designed primarily to support computers connected on a LAN. network topology The physical arrangement of the devices on a network. neural network An information system that works like the human brain and is capable of learning. newsgroup A discussion group where people can read messages and join in discussions by sending or posting messages. node A device in a network. noise Unwanted data or interference that reduces the quality of a signal. normalisation The process of organising data into tables so that the results of using the database are unambiguous and as intended. number A data type consisting of predefined characters (usually numbers) whose meaning and format are specified. numerical control (NC) A form of programmable automation in which numbers control a machine. office automation system An information system that provides people with effective ways to complete administrative tasks in an organisation. offline storage The use of a peripheral device that is not under the user’s direct control to store data. online storage The use of a peripheral device that is under the user’s direct control to store data. operation manual A document containing detailed procedures for participants to follow when using a new system. optical disc A polycarbonate plastic disk the surface of which is covered with a reflective layer of metal. It is used to store data. organising The information process that involves the modification of data by arranging, representing and formatting. overdamping Damping that occurs if the change is too slow and the actuator takes longer to reach the desired level or position. ownership See data ownership. packet switching A data transmission technique that divides messages into small data packets, transmits the packets and later joins the packets to form the original message. parallel conversion Conversion to a new system involving the old and the new system both working together at the same time. parallel transmission The transmission of data simultaneously using separate channels. parameter A variable that is given a constant value for a particular application. parity bit An additional bit attached to the binary code for each transmitted character whose purpose is to check the accuracy of the received character. parity checking A method of checking for errors in data transmission using an additional bit called a parity bit. partial backup A backup that only stores parts of the master file. participant A person who carries out the information processes within an information system. participant development The development of an information system by the people who will use it. path-based animation Animation that involves displaying the movement of objects onto a fixed background in a particular sequence or path. phased conversion Conversion to a new system by gradually implementing the new system. pilot conversion Conversion to a new system by trialing the new system in a small portion of the organisation. pivot table An interactive table in a spreadsheet that quickly summarises large amounts of data. pixel The smallest part of the screen that can be controlled by the computer. port A socket used to connect peripheral devices. preliminary investigation The process of determining whether a quick fix of the existing system will solve the problem or a new system is necessary. presentation software Software used to make a professional presentation to a group of people. primary key A single key or compound key in a database that must have a value; i.e., it cannot be empty or null. primary source Data collected first hand. print server A computer in a network that controls one or more printers and stores data to be printed. privacy The ability of an individual to control personal data. processing The information process that involves the manipulation of data and information. programmable logic controller (PLC) A computer that performs the timing and sequencing functions required to operate industrial equipment in an automated manufacturing system. programmer A person who converts a written description of a problem into a set of computer programs. project leader A person who develops schedules, checks work and resolves conflicts for a project team. Also called project manager. project management The process of planning, scheduling and controlling all the activities within each stage of the system development cycle. project plan A summary of a project that specifies who, what, how and when. protocol In data transmission, a set of rules that governs the transfer of data between computer devices. prototype A working model of an information system built in order to understand the requirements of the system. query A search of a database for records that meet a certain condition. query by example (QBE) A common method for describing a query. It requires the user to enter the criteria against a field. query language (QL) A specialised language designed to allow users to search for information from a database. random access See direct access. range A group of cells in a single row or column or in several adjacent rows and columns of a spreadsheet. raster scan A device that fires an electron stream in a series of zigzag lines to produce an image on a screen. real-time transaction processing A transaction processing method that processes data immediately. record A collection of facts about one specific entry in a database. refreshing The process of maintaining an image on a screen by repeating a raster scan. relational database A database that organises data using a series of related tables. relational operator A character or a symbol indicating the relationship between two expressions in a query. relationship The way entities are related to each other in a relational database. Relationships can be one to one, one to many, and many to many. relative referencing Copying a formula in which the cell references change so that they relate to the destination. Glossary 265 removable cartridge A hard disk encased in a metal or plastic cartridge that can be removed like a floppy disk. It is used for data storage. repeater A device used during the transmission of data to rebuild a fading signal to its original strength and shape. report A formatted and organised presentation of data. requirement definition See preliminary investigation. requirement report A statement about the need for a new system. resolution A measurement of the detail of an image produced on a screen or output to a printer. response time The amount of time taken by the computer to respond to a command. ring topology A network topology in which all devices are attached so that the path is in the shape of a continuous circle. router A device that determines where to send a data packet between at least two networks. sample size The number of bits per sample. Also called bit resolution. sampling The method used to digitise a sound wave. sampling rate The number of times a sample (slice) is taken from the sound wave. scanner An input device that can electronically capture text or images, such as photographs and drawings. schema An organised plan of the entire database showing how and where the data is found, descriptions of the data and the data’s logical relationships. schematic diagram A graphical tool to help define a database and develop a schema. screen A display surface that provides immediate feedback about what the computer is doing. search engine A database of indexed Web sites that allows a keyword search. search robot A program that accesses Web sites and gathers information for search engine indexes. searching The process of examining the database to retrieve data. secondary key A field in a database that contains useful items of data, not necessarily unique and often used in searches. secondary source Data that is collected or created by someone else. sensor An input device that measures data from the environment, such as temperature, pressure, motion, flow and light. Also called transducer. sequential access A method of retrieving data that searches the storage medium from its beginning and reads all the data until it finds the desired data. serial port A type of port that transmits data one bit at a time using only one communication line. serial transmission The transmission of data one after the other. server A computer that provides services to other computers on the network. 266 Glossary signal The physical form in which data is transmitted, such as pulses of electricity in a wire or pulses of light in a fibre-optic cable. signal conditioning The modification of a signal for normal usage. simplex mode The transmission of data in one direction only, from the sender to the receiver. simulation The use of a model. single key A field in a database in which each item of data is unique. software flow control A handshaking method that uses a special code sent with the data to control the flow of data. software package Application software bought to cover most requirements. sorting The process of arranging data in a particular order. sound card An expansion card that transforms the sounds from a microphone into audio. speaker A device used to produce sounds. spreadsheet A rectangular grid made up of rows and columns to organise and store data that requires some type of calculation. structured query language (SQL) A query language used to access and manipulate data in a relational database. star topology A network topology that has a central computer with each device connected directly to it but not to one another. storing and retrieving The information process that involves saving data and information for later use (storing data) and obtaining data and information that has been previously saved (retrieving data). storyboard A series of frames, each representing a different action or screen image. It shows the navigation between frames. switch A device that directs data packets along a path. synchronous transmission Serial transmission method in which data is all sent at the same rate; i.e., the same number of bytes is sent each second. system A group of elements that work together to achieve a purpose. systems analyst A person who performs the analysis to decide whether a new or updated system will solve the problem. system development cycle A traditional method for developing a new information system. system flowchart A graphical method of representing both the flow of data and the logic of a system. table In a document, rows and columns of cells that are filled with text and graphics. In a database, the organisation of data into columns (fields) and rows (records). technical support staff People who assist participants of a system on an as-needed basis. teleconferencing The use of an electronic transmission to allow a meeting to occur at the same time in different locations. template A document created for repeated use. terminal A device used to send data to and receive data from another computer system. test data A range of data values structured to test all decisions made within an information system and to cover all possible combinations of data that may be encountered. text A data type consisting of letters, numbers and other characters whose meaning and format are not specified. titling The placement of a caption to accompany an image or graphic element. token ring A local area network access method, or protocol, based on a ring topology. top-down design The process of dividing a large, complicated problem into a series of smaller, easier to solve problems. topology See network topology. training specialist A person who teaches participants how to operate their system. transaction An event that generates or modifies data that is eventually stored in an information system. transaction processing monitor Software that allows transaction processing application programs to run efficiently. transaction processing system (TPS) An information system that collects, stores, modifies and retrieves the daily transactions of an organisation. transition A special effect used to change from one image or screen to another. transmitting and receiving The information process that involves the transfer of data and information within and between information systems. tuple A row in a table of a relational database. tweening The process of taking two images of an animation and producing intermediate images so that the animation is smoother. twisted-pair A cable that consists of two thin insulated copper wires, twisted to form a spiral. underdamping Damping that occurs if the change is too fast and the actuator overshoots the desired level. uploading The action of transferring a file from the user’s computer to another computer. uniform resource locator (URL) The address of a file or resource on the Web. user-friendly A term used to describe a tool that people find easy to use. value A number stored in a spreadsheet on which calculations are carried out. vector display system A special type of cathode ray tube display that only displays vector graphics. It directs the electronic stream to draw only the lines required for the image. vector graphic A graphic made up of objects, such as a straight line, curve, or shape. video A data type that combines pictures and sounds displayed over time. video conference A meeting that allows people at different locations to see video images of each other on a screen, as well as to hear speech. virtual reality The use of computer modelling and simulation to enable a person to interact with an artificial environment. voice mail (v-mail) A messaging system that allows communication with other people by storing and forwarding spoken messages. wide area network (WAN) A network that connects computers (or terminals) over hundreds or thousands of kilometres. warping An animation technique that involves transforming or distorting a portion of an image. World Wide Web (Web or WWW) Part of the Internet and the most user-friendly way to access the Internet. Web browser A software program stored on a computer that allows access to the Web. Web page A single document on a Web site, usually in HTML format. Web server A computer in a network that provides a connection to the Internet. Web site A linked collection of Web pages by the same organisation or person. ‘what if’ The process of making changes to the data in a spreadsheet and observing the effects of those changes. wildcard character A character that represents one or more unknown characters in a search or query. workstation An intelligent terminal, such as personal computer, in a network. Glossary 267 Index absolute referencing 162–3 acceleration sensors 201 accuracy of data 69, 141–2 active listening 6 actuators 188, 209–10 AIFF (Audio Interchange File Format) 252 aliasing 221 analog data 100 analog-to-digital conversion 204–5, 224 see also digital-to-analog conversion analysis report 17 Animated GIF (Graphics Interchange Format) 252 animation 221, 236 cell-based 227 file formats 252 path-based 227 processing 227–8 software 243 application software, multimedia 241–2 ASCII 250 assembly line production 192–3 asymmetric encryption 55 asynchronous transmission 87, 88 attachments, email 102 attribute 44 audio 221, 236 conference 81 file formats 251–2 software 242 storage 224–6 authoring software, multimedia 242–3 automated manufacturing systems assembly line production 192–3 automated warehouses 193 CAD/CAM 193–4 characteristics 187–91 data collection 198–205 human-centred systems 214 and information display 208–11 mail sorting 195 reliability and quality 214–15 safety 215 semi-automation 214 and work 213 automated warehouses 193 automatic teller machine (ATM) 135 automation defined 187 of jobs 139–40 reasons for 195–6 backup 56, 128–31 backward chaining 168–9 banking and decision support systems 152 Internet 106–7 bandwidth 77 bar charts 174 268 Index barcode readers 135, 202–4 baseband transmission 95 batch transaction processing 114–15, 116–17, 124–5, 130–1 see also real-time transaction processing baud rate 78 bias 141 bill generation 124 bit depth 223 mapping 223 bit-mapped graphics 221 file formats 250-–1 bits data 79 stop/start 79 bits per second (bps) 78, 79 block diagram 190–1 BMP (Bit-map) 250 bridges 93–4 broadband transmission 95 bus topology 92 CAD/CAM 193–4, 198–9 cameras 246 car industry 192–3 CD-ROM speed 234 cell 221 cell-based animation 227 censorship 106 CGM (Computer Graphics Metafile) 251 characters 43, 236 charge-coupled devices (CCD) 202 charts 156, 173–4 check digit 69 cheque clearance 124 checksum 78 CIM (computer-integrated manufacturing) 199 client-server architecture 102 coaxial cable 95 CODEC (coder-decoder) 249 collecting data 100, 134–7, 176–8, 188, 198–205, 245–7 colour graphics 223 column charts 174 communication concepts 87–98 skills 6 settings 79 systems 76–86, 104–8 composite key 44 video system 246 compression 248–9 ratio 249 techniques 249–50 computer games 230 operators 30 computer-based training (CBT) 230 confidentiality 104 conflict resolution 6 constraints 15 content provider 228 context diagrams 20–1 controller 188 conversion method 27–8 copyright 254–5 credit cards 125 cross fade 238 CRT displays 238 CSMA/CD 92 cyclic redundancy check (CRC) 78 damping devices 205 data access to 70–1 accuracy 69, 141–2 analog 100 analysing 137–8 bits 79 collection 100, 134–7, 176–8, 188, 198–205 digital 101–2 extracting summary 172 filtering 172 flow 88 identification 176–7 importance of 141–2 integration of 248 integrity 70, 142, 256–7 management 148, 149 matching 175 methods of accessing 54 modelling 47–9 ownership of 71 processing 100–2, 188, 207–8 range 176 redundancy 48 security 56, 141 storage and retrieval 53–62, 126–33, 178 structured 176 transmission 87–98, 211–12 type 47 unstructured 176, 180 validation 69, 117 data dictionary, 23, 47–8 Data Encryption Standard (DES) 56 data flow diagram (DFD) 21–2 data mart 156 data mining 71, 138, 171–2, 180–1 data projection panel 239 data projectors 239–40 data sources 69, 76, 160 primary 176 secondary 176 data warehouse 71, 127–8, 156 database information systems 38–9 database of facts 167 database management systems (DBMS) 53–4, 55 56 databases constructing different views 65–6 distributed 54–5 defined 126, 156, 175 and files 126–7 flat file 43–4 relational 44–7 decision making 15–18, 180, 182 tables 22–3 trees 22–3 decision support systems (DSSs) 37, 137–8 and analysing 171–5 characteristics of 147–51 issues related to 179–82 nature of 147–9 and organisation 159–65 and processing 167–70 semi-structured situations 149–50, 152–3 structured situations 149 types of 154–8 unstructured situations 150–1, 153, 180 decoding 100–2 decompression 248–9 delta information 239 design multimedia 235–6 principles 235–6 social and ethical 8–12 solutions 18–25 specifications 17 of systems 8–9 tools 20–5 dialogue management 148, 149 digital cameras 246 data 101–2 television 256 digital-to-analog conversion 210–11, 224 see also analog-to-digital conversion digitising 256 methods for 245–8 direct access 54 conversion 27 users 188–9 directories 61 displaying 64, 102–3 in multimedia systems 238–44 distributed databases 54–5 domain/key normal form (DKNF) 49 DVD 234–5 economic feasibility 16 education and multimedia 230 EFTPOS 85, 103 electric motors 209 electronic banking 85–6 electronic commerce (e-commerce) 85 electronic junk mail 104 electronic mail (email) 82–4 employment and automation 139–40, 213 see also work Index 269 encoding 100–2 encryption 55–6 entertainment and multimedia 230 entity 44 entity-relationship diagram (ERD) 48 environment 10–11 EPS (Encapsulated Postscript) 251 equity 11–12 ergonomics 9–10 erroneous inferences 181 error checking 78 ethernet 92 ethical design 8–12 ethics 10 evaluation, system 30 expert knowledge 180 expert systems 37, 156–7, 167–8, 175, 177 shells 164 explanation mechanism 168 extranet 98 fax 81–2 feasibility study 15–16 fibre-optic cable 95 field 43 name 47 size 47 file 43 formats 250–2 filters data 172 noise 211 firewall 56 First Norm Form (1NF) 49 flat file databases 43–4 flight simulators 233 flow control 79 sensors 201 flowcharts, system 24–5 foreign key 46 forms on-screen 46, 136–7 paper 135 Web 137 formulas 155, 161–4 forward chaining 168, 169 frame buffer 223 grabber 246–7 rate 226 full-duplex mode 88 functions, spreadsheet 162–3 furniture 9 fuzzy logic 169–70 Gantt chart 5 gateways 93–4 gender equity 11–12 geographic information system (GIS) 153–4 ghost site 70 GIF (Graphics Interchange Format) 250–1 grandfather-father-son backup procedure 130 270 Index graphics colour 223 file formats 250–1 software 242 group decision support system (GDSS) 181–2 half-duplex mode 88 handshaking 77, 88–9 hard disk 55 hardware data collection 134–5 flow control 77 and multimedia systems 223–8, 238–40 network 92–6 head-up displays 240 health and safety 9–10 heuristic rules 177 HTML 51–2, 250 editors 243–4 hubs 94 human-centred systems 8, 214 hydraulic pump 210 hyperlink 49, 220 hypermedia 49, 60–2, 249 hypertext 49, 220 identification of data 176–7 image storage 223–4 images 221, 236 implementation 26–8 index 54, 60 indexed access 54 inference engine 167–9 information kiosks 232 management software 4 and multimedia 231–2 processes 36, 64–7, 100–3, 134–8, 176–8, 207–12, 245–53 information systems 36–9 characteristics 36 database 38–9 types and purposes 37–8 intelligent agents 171, 178 systems 179–80 interactive environment 233 interactivity 147, 222 Internet 105–7 appropriate use of 255 banking 106–7 and censorship 106 radio and video 107 trading 105 Internet Industry Association (IIA) 106 interview techniques 6 intranet 98 inventory tracking 202–4 jobs see employment journal 129 JPEG (Joint Photographic Experts Group) 250 keys 43–4 knowledge base 164–5, 167 engineers 177 expert 180 label 154 LCDs (liquid crystal displays) 239 leisure and multimedia 230 library loan system 123 light sensors 201–2 line charts 174 linear regression models 173 link see hyperlink list check 69 live video 255 local area networks (LANs) 90, 92, 95 wireless 96 logical operators in queries 59 in spreadsheets 162–3 logon and logoff procedures 97–8 machine-centred systems 8, 214 macros 156, 170 magnetic ink character recognition (MICR) 134–5 magnetic tape 55, 130 mail sorting 195 maintenance, system 30–1 management data 148, 149 dialogue 148, 149 model 148, 149 management information systems (MISs) 38, 138 managers 30 manual transaction systems 118 manufacturing 187 mass production 207 media and multimedia design 236 types of 220–2 merging technologies 255–6 messaging systems 81–6, 104 metadata 47 microphones 247 microwave transmission 95–6 MIDI (Musical Instrument Digital Interface) 252 mobile phones 96 model management 148, 149 mono 224 morphing 227 motion sensors 201 MPEG (Motion Picture Expert Group) 252 MP3 (MPEG Audio Layer 3) 252 multimedia systems animation processing 227–8 audio storage 224–6 characteristics 220–8 defined 220 design 235–6 displaying in 238–44 education and training 230 encyclopaedia 231 examples 230–6 hardware 238–40 image storage 223–4 and information 231–2 and interactivity 222 leisure and entertainment 230 major areas of use 230–3 and mode of display 222 and people 228 and print 222 and technology advances 233–5 and text 220, 236 video processing 226–7 virtual reality and simulations 232–3 negotiation skills 6 network access methods 92 administrator 96 hardware 92–6 software 96–8 topologies 91–2 network interface card (NIC) 93 network operating systems (NOS) 96–7 networks 89–91 local area (LANs) 90, 92, 95, 96 neural 157–8, 175 wide area (WANs) 90 neural networks 157–8, 175 node 49, 89 noise 211 non-computer organisational methods 42–3 procedures 140 normalisation 48–9 numbers 220–1 numerical control (NC) 194 office automation systems 38 offline storage 55 online storage 55 operating systems 96–7 operation manual 31 operators in queries 58–9 in spreadsheets 162–3 optical disc 55 organisation methods 42–52 organisational feasibility 16 organising a multimedia product 247–8 OSI reference model 77 packet switching 90 parallel conversion 27 transmission 87 parameter 79 parity 79 checking 78 participant development 18–20 training 27 Index 271 passwords 97 path-based animation 227 people in multimedia systems 228 as participants 140 phased conversion 27 photodiode 202 PICT (Picture) 251 pie charts 174 pilot conversion 28 pivot table 172 pixel 221 point-of-sale terminals 122 presentation software 241 presentations, on-screen 241 primary data 176 key 44 print and interactivity 222 and mode of display 222 and multimedia 222 privacy 70, 104, 181, 255 private leased line 90 processing data 100–2, 188, 207–8, 248 production assembly line 192–3 batch system 208 continuous systems 208 discrete system 208 mass 107 programmable logic controllers (PLCs) 192 programmers 6 project goal 4 leader 6 management 4 management software 4, 242 manager 228 plan 4–5, 17 projection devices 239–40 protocols 77, 88–9 prototypes 13–14 query by example (QBE) 57 query language 59 querying 57 QuickTime 252 radio and Internet 107 range 154 check 69 raster scan 239 RealAudio file format 252 real-time transaction processing 115–17, 120–3, 132–3 see also batch transaction processing receiver 76 record 43 recovery process 129 refreshing 239 relational databases 44–6 272 Index operators 58 relationship 44 relative referencing 163–4 relay 210 removable cartridge 55 reporting 64–5 reports 172 analysis report 17 requirement 13 requirement report 13 reservation systems 120–1 resistance thermometers 200 resolution 221 retrieval, data 53–62, 126–33, 178, 249–53 RTF (Rich Text Format) 250 ring topology 92 routers 93 safety, workplace 215 sample size 224 sampling rate 224 satellites 96 scanners 245 schedule feasibility 16 schema 44–6 schematic diagrams 48 screen 222, 238–9 layout 236 script 247 search engines 60–2, 172 robot 62 searching 57–62 secondary data 176 key 44 security, data 56, 141–2 semi-automation 214 sensors 188, 199–202 flow 201 light 201–2 motion 201 pressure 200–1 temperature 200 sequential access 54, 130, 131 serial transmission 87, 88 servers 93 shielding 211 signal 211 signal conditioning 211 simplex mode 88 simulations 232–3 simulators, flight 233 single key 44 skills communication 6 negotiation 6 social design 8–12 software animation 243 application 241–2 audio 242 authoring 242 flow control 77 graphics 242 information management 4 multimedia 240–4 network 96–8 presentation 241 project management 4, 242 video 242 solenoids 209 solutions, designing 18–25 sorting 56–7 sound card 247 speakers 222, 240 speed of transmission 77–8 spreadsheets analysis 172–4 defined 154–6 designing 160–4 functions operators 162 SQL 59–60 star topology 91 statistical analysis 173 stepper motors 209–10 stereo 224 stock prices 153 storage data 53–62, 126–33, 178, 249–53 media 55 offline 55 online 55 storyboard 50–1, 247–8 structured data 176 Structured Query Language (SQL) 59–60 switches 93 symmetric encryption 55 synchronous transmission 87, 88 system defined 190 designer 228 evaluation 30 flowcharts 24–5 maintenance 31 testing 28, 30 system development cycle 3, 30 systems analysts 6 automated manufacturing 187–95, 198–205, 208–11, 213–15 communication 76–86, 104–8 and ethics 10–12 expert 37, 156–7, 167–8, 175, 177 human-centred 8 intelligent 179–80 machine-centred 8 messaging 81–6, 104 multimedia 220–8, 230–6, 238–43, 245–57 reservation 120–1 transaction processing 37, 113–18, 119–25, 130–1, 134, 139–42 see also decision support systems tables 46 team building 6 technical feasibility 16 staff 228 support staff 27 technologies, merging 255–6 telecommuting 107 teleconferencing 81 telephone 81, 103 temperature sensors 200 templates 155, 160 terminals 89 test data 28 testing, system 28 text colour 236 file formats 250 and multimedia 220, 236 thermistor 200 thermocouples 200 TIFF (Tagged Image File Format) 251 titling 236 token ring 92 top-down design 18 touch screens 239 training and multimedia 230 transaction processing monitor (TP monitor) 116 transaction processing systems (TPSs) 37, 113–18, 119–25, 130–4, 139–42 transducers 199 transition 241 transmission of data 87–98, 211–12 media 76, 94–6 microwave 95–6 speed 77–8 wire 94–5 wireless 95 transmitter 76 tuple 46 TWAIN (Technology Without An Interesting Name) 245 tweening 227 twisted-pair cable 95 two-phase commit 55 type check 69 uniform resource locator (URL) 49–50 unstructured data 176, 180 user interface 161 user-friendly 8–9 validation of data 69, 117 VCR (video cassette recorder) 246 vector display systems 239 graphics 221 video 236 cameras 246 capture 226 capture card 246 conference 81 defined 222 file formats 252 Index 273 and Internet 107 live 255 processing 226–7 software 242 virtual reality (VR) 232–3 voice mail 82 warping 228 WAV file format 251 Web browsers 243 site 233 what-if models 154, 172–3 wide area networks (WANs) 90 wildcard characters 58 wire transmission 94–5 WMF (Windows Metafile Format) 251 work environment 9–10 nature of 10, 139–40, 213 working from home 107–8 workplace safety 215 workstations 90 World Wide Web (WWW) 49, 233–4 Acknowledgments The publisher wishes to thank Catherine Webber, Rick Walker and Anthony Connolly for their assistance with this project. The author and publisher would like to thank the following for granting permission to reproduce the copyright material in this book: The Age, pp. 246 (bottom), 252; Coo-ee Picture Library, p. 96; Corbis/Australian Picture Library, p. 117; Malcolm Cross, pp. 28, 76, 77, 130, 177, 234, 240, 247; Randy Glasbergen, p. 102; Great Southern Stock/Brian Gilkes, p. 123, 150 (centre); The Image Bank, p. 193; Mark Parisi, pp. 31, 56, 141, 182, 195, 232; PhotoDisc, pp. 7, 17, 27, 30, 38, 42, 81, 90, 107, 135, 140, 148 (all), 150 (right and left), 152, 160, 199, 202; Redflex Systems, p. 232 (top); Ellen Sheerin, pp. 227, 228; Yurikamome, p. 179. Every effort has been made to trace and acknowledge copyright. The author and publisher would welcome any information from people who believe they own copyright to material in this book. 274 Index 175P IPT HSC Cover 7/9/00 9:13 AM Page 1 Key features • list of outcomes and overview at the beginning of each chapter • social and ethical issues and Internet activities integrated throughout the book • numerous practical tasks that can be used with any software or make of computer • case studies and examples of information systems • learning activities to help students apply the content in every section • chapter review at the end of each chapter • interesting IT facts and cartoons 1to2promote 3 4 5class 67890-1234567890-1234567890discussion QWERTYUYIOPQWERTYUYIOPQWERTYUYIOP • key terms highlighted for quick reference ASDFGHJKL:”ASDFGHJKL:”ASDFGHJKL:” • glossary ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? • index. !@ $%^&*()_)_+!@ $%^&*()_)_+ 567890-1234567890UYIOPQWERTYUYIOP FGHJKL:”ASDFGHJKL:” ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? !@ $%^&*()_)_+!@ $%^&*()_)_+ Additional resources to support and are0 - 1 2 3 4 1 2extend 3 4 5this 6 book 789 available at Heinemann’s World Wide Web site, hi.com.au. QWERTYUYIOPQWERTY These include a sample teaching program, assessment DFGHJKL:”ASD advice and answers to exercises from AtheS textbook. About the author Greg Powers is a head teacher with many years’ experience in writing and implementing computing studies programs. He is the author of several highly successful texts including Computing Studies–An Introductory Course. ISBN 0 86462 501 4 ISBN 0-86462-512-X You can visit the Heinemann World Wide Web site at hi.com.au or send email to info@hi.com.au 9 780864 625120 G.K. Powers Also available Heinemann Information Processes and Technology: Preliminary Course Heinemann Information Processes and Technology: HSC Course Heinemann Information Processes and Technology: HSC Course has been written to meet all of the requirements of the new Information Processes and Technology syllabus in NSW. This text will help students to develop their understanding of information processes in the context of different information systems. It is designed to build on the knowledge and skills gained in the Preliminary course and to help students become confident, competent, discriminating and ethical users of information technology. This text provides up-to-date information, a practical approach, and a large number of questions that cater for a wide range of students. H e i n e m a n n Information Processes and Technology 1234567890-1234567890-1234567890QWERTYUYIOPQWERTYUYIOPQWERTYUYIOP ASDFGHJKL:”ASDFGHJKL:”ASDFGHJKL:” ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? HSC COURSE !@ $%^&*()_)_+!@ $%^&*()_)_+ 1234567890-1234567890-1234567890QWERTYUYIOPQWERTYUYIOPQWERTYUYIOP ASDFGHJKL:”ASDFGHJKL:”ASDFGHJKL:” ZXCVBNM<>?ZXCVBNM<>?ZXCVBNM<>? !@ $%^&*()_)_+!@ $%^&*()_)_+ G. K. Powers