Professional Documents
Culture Documents
Information Software Technology
Information Software Technology
Offices in Sydney, Brisbane and Perth, and associated companies throughout the
world.
All rights reserved. Except under the conditions described in the Copyright Act 1968
of Australia and subsequent amendments, no part of this publication may be
reproduced, stored in a retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise, without the prior
permission of the copyright owner.
Includes index.
For secondary school students.
ISBN 0 12 360471 0.
Contents iii
10 Database Design 146 14 Robotics and Automated Systems 285
10.1 Database development 147 14.1 Robotics 286
10.2 Collecting, organising and storing data 154 14.2 Types of robots 288
10.3 Processing and analysing data 160 14.3 The purpose of robots 291
10.4 Presenting information 164 14.4 Use of robots 293
10.5 Integration 165 14.5 The function of robots 297
10.6 Project development 170 14.6 Automated control 302
10.7 Additional content 172 14.7 Sensing devices 304
14.8 What are actuators? 307
11 Digital media 175
14.9 Controlling devices 309
11.1 The purpose of digital media 177
14.10 Project development 310
11.2 Types of digital media products 181
14.11 Additional content 312
11.3 Data types for digital media products 187
11.4 Digitisation of data types 194 15 Software Development and
11.5 Digital manipulation techniques 198 Programming 315
11.6 Factors affecting file size 206 15.1 Basic programming concepts 316
11.7 Display and distribution 208 15.2 GUI layout 323
11.8 Project development 211 15.3 Data types 325
11.9 Additional content 213 15.4 Data operators 328
15.5 Algorithms 330
12 The Internet and Website Development 215
15.6 Program control structures 332
12.1 The Internet 216
15.7 Desk checking 337
12.2 An historical perspective on the Internet 217
15.8 Using sub-programs 338
12.3 Intranets 221
15.9 Programming languages 339
12.4 Features and uses of the Internet 221
15.10 Data structures 341
12.5 Internet software 233
15.11 Testing program code 344
12.6 Types of Internet protocols 237
15.12 Error detection 345
12.7 The World Wide Web 240
15.13 Error correction 346
12.8 Control of access to information 243
15.14 Documentation of program code 346
12.9 Website development 246
15.15 Project development 347
12.10 Project development 248
15.16 Additional content 350
12.11 Additional content 249
Index 354
13 Networking Systems 254
13.1 A communications network 255
13.2 Network protocols 260
13.3 Data transmission modes 262
13.4 Data transmission rates 263
13.5 Data transmission media 263
13.6 Types of networks 266
13.7 Peer-to-peer and client–server networks 267
13.8 Components of networks 267
13.9 Security of information 272
13.10 Network topology 276
13.11 Network operating systems 278
13.12 Factors influencing media transmission 280
13.13 Project development 281
13.14 Additional content 283
T
C
Approach is a brand new, full-colour text written to meet the refer students back to relevant Core Hardware
requirements of the new NSW 7–10 Information and content which supports teaching the core components
Software Technology syllabus to be implemented from 2005. as an integral part of the Option topics.
This text provides a clear project-development focus in line • The text features a lively full-colour design and
with the spirit of the syllabus. It also presents a concise high-impact artwork.
coverage of the Core topics to provide a ready reference as
the Option topics are studied.
Project development
The opening chapter Projects: Design, Produce, Evaluate
introduces the basic principles of project work.
Throughout each Option chapter a series of step-by-
step tasks are included. These are designed to develop
students’ skills in technology application and to help
prepare them for the major project at the end of each
chapter.
Each Option chapter culminates in a substantial project
structured around the design process outlined in the
syllabus: defining and analysing the problem; and designing, • Activities are placed at frequent intervals and are
producing and evaluating project solutions. Further project organised under the following headings: Identify, Analyse
ideas are provided in the Teacher’s Resource. and Investigate. Identify questions check students’
understanding of key content and concepts; Analyse and
Key features Investigate questions are higher-order questions involving
more critical thinking.
• Each chapter opens with a list of outcomes based on the
syllabus and a summary of the chapter contents,
followed by a panel called In Action, which presents a
real-life application of the chapter content to highlight its
relevance to students.
<In Action>
Student pack
The text is also available with a Student CD which contains Teacher’s Resource
’S RES
a PDF of the coursebook, a cached version of the Companion ER
OU
TEACH
The Teacher’s Resource provides a wide range WS
Website and the student worksheets from the Teacher’s
RCE
Resource. of additional support: programming 12
suggestions; a Core matrix showing the links
between the Option chapters and the Core
Companion Website content; approaches to developing projects; a list of
www.pearsoned.com.au/schools recommended software and other useful references; a range
The Companion Website provides a range of of worksheets for each Option chapter; answers to the
technology-based material: self-marking on-line worksheets; answers to all the activities in the coursebook;
chapter review questions; Destinations—links to websites and chapter tests and answers for each of the Option
referred to in the text plus other useful websites; and a wide chapters. All this material is clearly cross-referenced in the
range of technology activities—drag-and-drop interactives, text.
activities using software or specially developed files, The Teacher’s Resource comprises a printout and a CD
animations and video clips, as well as samples of students’ which includes editable Word files of the worksheets and the
work. All this material is clearly cross-referenced in the text. chapter tests, as well as the programming and Core matrix
The CW icon by itself indicates there are web links documents.
(Destinations) for students to use in support of the text. Other
CW icons are annotated to indicate further material to be
found on the Companion Website.
About
To the the
student
book vii
Acknowledgements
The publishers and authors wish to acknowledge the contribution made by Pam Kelly, Head of
Computing Studies, Arthur Phillip High School, to the chapter The Internet and Website
Development.
We would like to thank the following for permission to reproduce photographs, texts and illustrations.
The following abbreviations are used in this list: t = top, b = bottom, m = middle, l = left, r = right.
Acquired Intelligence: The ‘Whale Watcher’ was Corel Corporation Limited: Screen shot is ©
built in ACQUIRE by Acquired Intelligence Inc. Copyright Corel Corporation Limited, reprinted
<www.aiinc.ca> p. 94. by permission. p. 182.
Adobe Systems Incorporated: Adobe product CyberSmart, Inc.: From the CyberSmart!
screen shot(s) reprinted with permission from Education Company website
Adobe Systems Incorporated, pp. 25, 29, <www.cybersmart.org> Copyright © 2004 by
124(t). CyberSmart, Inc. Used by permission, p. 244.
Advanced Highway Maintenance and Cyril J. Shilansky: p. 200.
Construction Technology (AHMCT), University Digital Media World magazine: Reprinted with
of California: p. 297(r). kind permission of Digital Media World
Alex Mitchell: Reproduced by kind permission magazine (Australia), p. 113.
of Alex Mitchell, The Sun Herald, Sydney, and Dorling Kindersley: pp. 65, 120(r), 122, 190,
John Fairfax, pp. 312–313. 208.
Alias Systems: p. 185. Fairfax Photos: pp. 67, 313.
Animated Programs: Used with permission of FileMaker International Inc.: p. 153.
Animated Programs, p. 73. Getty Images: pp. 68, 147.
Apple Computer, Inc: pp. 39, 66, 123(b), 178, Google.com: pp. 227, 233.
203(t), 204. Harper San Francisco: Weaving the Web: The
Australian Associated Press: p. 289(b). Original Design and Ultimate Destiny of the
Australian Picture Library: pp. 5, 10(br), 19(ml, World Wide Web by its Inventor by Tim
tr), 61, 62, 72, 89, 154(bl, br, tm, tr), 176, 192, Berners-Lee, 1999, p. 219.
209, 293. Hornsby Shire Council:
Avalon: <www.avalon-rpg.com> p. 230(b). <www.hornsby.nsw.gov.au> p. 161.
Cinefex magazine: Joe Fordham, ‘Middle-earth http://www.indezine.com © Geetesh Bajaj:
Strikes Back’, Cinefex, January 2003, extracted p. 118.
and adapted with permission Human Rights and Equal Opportunity
<www.cinefex.com> p. 176. Commission: p. 250(b).
Commonwealth Department of Veterans’ IBM Australia Ltd: Photograph reproduced
Affairs: Visit Gallipoli website with permission of IBM Australia Ltd, p. 59.
<www.anzacsite.gov.au> p. 247(t). Image courtesy of Sydney Opera House Trust:
Commonwealth of Australia: p. 238.
<www.bom.gov.au/weather> copyright Klik & Play © Clickteam 1994: p. 134(br).
Commonwealth of Australia, reproduced by Krome Studios Pty Ltd: Ty the Tasmanian Tiger
permission, p. 216. TM & © 2004 Krome Studios Pty. Ltd., p. 113.
1 core
Projects: Design,
Produce, Evaluate
CHAPTER OUTCOMES CHAPTER CONTENTS
You will learn about: 1.1 Defining and analysing the problem 2
• defining and analysing a problem 1.2 Designing possible solutions 3
• designing possible solutions 1.3 Producing solutions 5
• producing solutions 1.4 Evaluation 6
• evaluation criteria 1.5 Management 7
• methods of evaluation 1.6 Communication techniques 8
• management 1.7 Group work 9
• communication techniques
• collaboration and group work
You will learn to:
• identify factors which impact on solutions
• generate ideas using a range of methods
• model possible solutions
• apply set criteria to choose an appropriate
solution
• establish evaluation criteria
• document feedback and decision-making
• communicate ideas and solutions
• collaborate in a group situation
CORE
1.1
x.x
problem-solving
In any project, there are various factors which
possible solutions Analyse
might impact on any planned solution. These fall Identify components
into four categories—technical, operational, The first major stage in project development is and the relationship
financial and ethical. the design phase, in which we need to produce between them.
• Technical factors might include whether the several possible solutions for the project. It is
Criteria
available hardware or software is adequate important to write down the criteria which the The elements that must
for the task. Is there other hardware which solutions must meet in order to keep the ideas on be included in a project
could be used to input information into the track. Think about the target audience, and the and the standards by
system? time-frames and resources available. which it will be
evaluated.
• Operational factors would need to be taken
into account to see how the new plans would Generating ideas
fit into the existing system or work place.
Generating ideas can be a creative and
Will the staff be comfortable using a new
spontaneous pursuit. It is a good idea to document
system or should there be some training
ideas so that you can revisit them later or share
opportunities offered?
them with other people. You might choose to use
• Financial factors will influence the budget. a concept map, such as in Figure 1.2. There are
How much will the whole project cost to set computer programs, such as Inspiration®, which
up and maintain? Will it in fact save money can help you to draw these diagrams. A concept
and increase profits eventually? map can help you to formulate ideas in a logical
• Ethical factors would influence ideas about and connected way. Use words such as how, why,
data access and marketing practices. What who, when, and where, to help ‘brainstorm’ issues.
information should be stored on the system Observing other people’s solutions can also
and who will be allowed access to it? help to create ideas. If your project involves
multimedia or website development, look
carefully at professional examples on television,
Project panel
Factors that impact on What shall
problem-solving I do today?
Stay at home How much
will it cost?
Denis and Susan get together and begin to
analyse the problem. They write down
Go to the
exactly what the problem is and several movies
ideas on how it can be solved. They soon What time does
realise that there are some factors which Where is it it start?
showing?
might affect some of their plans. For
Who shall I
example, they know they will need some go with?
new software, and probably hardware. How
much money can they afford to spend on Which How do I
Will my parents movie? get there?
the project and how will Lisa, the assistant,
allow me to go?
react to a new computer system? Which of
Where shall
the factors listed in the text are considered we meet?
here? What comments can you make about
the other factors that should be considered? Figure 1.2 Planning a trip to the movies.
Why are these important?
Chapter 1 Projects: Design, Produce, Evaluate 3
CORE
1.2
produce quality IST projects. These include Some other criteria which should be considered
evaluation, management plans, communication in the evaluation of all projects include
and the challenges of working in a group. functionality and quality of information.
Functionality means whether the application
Project panel works satisfactorily. If a program does not work
properly or in the way we expect, this can cause
Produce a solution an enormous amount of frustration. Thorough
testing needs to be carried out to ensure that
Denis and Susan gave the prototype database there is no potential for misunderstanding by the
that they had developed to the assistant Lisa to user. For example, in a multimedia presentation,
see if it worked successfully. Although she was if an icon needs to be clicked to play a movie
quite an experienced computer user and keen clip, prompt the user to do it.
to use the new system, Lisa seemed to have a Quality of information in any project is
problem understanding how it all worked. important. Information must be accurate,
There was obviously a need for some training otherwise errors can be made in processing data
and on-line user help. In light of Lisa’s or making decisions. This would certainly be the
comments, Denis and Susan decided that they case for a bank or a medical database service.
would be better off hiring a computer Clients may suffer as a result of incorrect data
professional to manage the whole project. The entry, and controls should be put in place to
time plan and financial analysis that they had guard against this happening. Information stored
carried out earlier confirmed this decision. Why in a system or displayed on a screen must be
do you think Denis and Susan decided to use a relevant to the project, otherwise it is useless and
computer professional to complete the project? it will take up valuable space. It may also be
What factors would have been important in confusing to the user.
Integrity of information is a measure of its
making this decision?
reliability and so it should be
collected only from a trusted source. Finding
1.4 Evaluation information in a newspaper or on the Internet
does not guarantee that it is true. You should
take reasonable measures yourself to ensure your
As the final stage in any project, it is essential to data is correct. Even though all these precautions
evaluate the solution. This means more than just are taken, information can also become out-of-
a verbal expression of personal opinion. date, for example clients can move house or
key words
Evaluations need to be planned and documented change their job. This factor is referred to as
as much as the solution itself. currency and is yet another factor to be
considered in collecting and storing information.
Evaluation
Evaluation criteria
How the solution Ethics and the environment
compares with original The evaluation criteria that were originally
expectations. specified for the solution will need to be Ethics and the environment will also be
Evaluation criteria examined carefully and you may need to explain important criteria for evaluating projects.
how they have been met. If, for example, you In core chapter 7: Issues, you will investigate
The factors by which
the project will be have been creating a digital media presentation the issues of ethics and how they apply to
judged. for an advertising agency, it may be more projects in IST. These issues must be part of the
important to use quality graphic design evaluation criteria of all projects. For example,
principles, rather than to include lots of busy there is a reasonable expectation that clients’
animations and sound effects. Similarly, file sizes personal details will be protected from hackers
may be critical for a website design. and that any statistics produced from stored data
will be presented in a fair and honest manner.
In addition, we must all take responsibility
Functionality and quality
deadlines. Items such as printer cartridges, e-mail in spending. Figure 1.4 shows a simple budget
attachments and floppy disks all have the record for a trip to the movies.
potential to let you down at the most inconvenient Organising a team of people calls for special
moments. Making secure backups of your work talents. A big project may need to be serviced by
will pay dividends and save you time. a variety of people, each with their own area of
Draw up a table of tasks that need to be done expertise. Their availability and correct
and allocate a realistic time-frame to complete understanding of needs will all have to be
them. Table 1.2 shows the stages appropriate to co-ordinated by the project manager. Their costs
a typical project. You will need to list specific and work location are issues that may need to be
tasks in your time schedule. Keep the negotiated. Perhaps some tasks could be
documentation up-to-date. It will be much easier out-sourced (sent to people outside the company
to edit an existing document at the last minute for completion) so that expertise and office
rather than try to create it all from scratch the accommodation costs would be optimised.
night before your project is due to be handed in.
expect. Practise the presentation beforehand on the problem in the shortest possible time. It is
the actual hardware you will use on the day. Any still important, however, for all of them to keep
visual aids you use must be large enough for all in touch and to receive regular feedback as the
your audience to see. Demonstrating the inside project progresses. Andrew has been careful to
workings of a hard disk drive, for example, will make notes of all discussions and has kept the
be difficult if your audience is too far away. documents that contained their original ideas.
Graphics and animations should be clear and He will continue to do this throughout the
appropriate. Try not to read your script too much project and to date and sign all decisions that
and never insult your audience by reading word- they make together. In turn, Andrew will need
for-word off a screen. to pass on specific tasks and time schedules to
Even though it is challenging, you should the members of his team. All three means of
take advantage of opportunities you have in this communication are important. How will they
course to present work in front of your class, as be used at this stage of the project?
this can be an important skill needed in the
workplace.
1.7 Group work
Written
Written documentation is an essential part of any Criteria for group formation
project. It is a good idea to write a diary of In any area of business, groups of people are
events so that you can reflect on the progress you brought together to work on projects so that
have made. This will become increasingly there is a range of expertise within the team.
important for larger projects. Hard copies of People find themselves working with other
documentation or research findings should be people who they don’t know very well and they
clearly named and dated and submitted in a may have different views on a number of work
folder so that they are easy to read. Always issues. The challenge for any team leader is to
acknowledge your sources of information and encourage collaboration so that each member of
anyone who helped you with the project. the team can contribute positively to the project.
Every situation can provide opportunities to
Graphical develop organisational, communication and
negotiation skills.
Throughout this course, you will have the
opportunity to incorporate many graphical
images and visual aids into your projects. These Roles and responsibilities
can add exciting impact and capture audience Organising a list of the roles and responsibilities
interest. However, you must ensure that they are for the team is important at an early stage in the
appropriate to the theme of the project and that project planning. Individuals can then plan each
issues of copyright are not violated. Another task so that it fits with everyone else’s schedule.
option for presenting your project might be to Sharing time and experience is an effective
publish it on the Internet or your school’s tool in developing group dynamics, and each
intranet.Your audience would have the flexibility team member should be prepared to do this. At
of accessing your presentation in their own time, group meetings, take turns in expressing ideas
and you could ask for feedback from them by and reporting problems. You can learn a lot from
e-mail or questionnaire. listening carefully to other people’s problem-
solving techniques. Take the opportunity to In the final project evaluation, reflect on the
understand other people’s strengths and challenges that collaboration presented and the
weaknesses. advantages you found from working as part of a
When working as a group, it is important to group.
let everyone have the opportunity to express
their opinions in a positive and comfortable
atmosphere. Write down ideas and decisions so
that there is no misunderstanding later on by any
individual. Describing a problem and its solution
can help to avoid similar problems being
repeated in the future. If you are using e-mail, Questions
make sure everyone gets a copy of each message. 1 Imagine that you have been given
Accept comments from your partners as positive permission to decorate your bedroom at
feedback and consider how any conflict might be home. List all the tasks that will need to be
resolved calmly and amicably. done before you actually start work on
applying the paint. Create a time plan and
Collaboration estimate the cost of the project using a
spreadsheet. Are there specific people you
It is essential to document ideas and decisions so will need help from? Will they be available
that everyone in the group understands their when you need them?
responsibilities. Plan regular meetings so that
people will work to deadlines and can report 2 Identify at least three ways to communicate
their progress. Phone calls and e-mails are information and discuss the advantages of
effective for reminders, but all members of the each.
key word
team need to be notified of any discussion that 3 Consider a group project that you have
took place. Allow time at meetings for each completed for another subject. What
member of the group to comment on the strategies did you use to ensure the project
Collaboration
development of the project as a whole. Agree on was completed on time? What were the
Working together in a strategies for assessment of individual largest areas of concern? How did you
group to share ideas contributions. If anyone seems to be falling negotiate through difficult situations? What
and expertise.
behind the agreed schedule, it is important that strengths do you feel you have that would
the problem be discussed and a solution be beneficial to a project team?
negotiated.
TER TE
AP
CH
ST
WS
2 core
Hardware
Storage devices
Figure 2.2 Data flow. Most of the devices connected to the computer are
under the control of the central processing unit (CPU). Data and information
flow into, around and out of the system.
Hardware
2.2 of silicon. The main chip, the CPU, is responsible
for processing data and instructions at high
key word
Cards inside the systems box have their own A port is where external All your computer’s electrical needs are The CPU is often
particular task to do. Typically, a PC would have a devices are attached to the supplied from this shielded metal box. called the brains
graphics or video card, a sound card, and perhaps systems box. Connectors are A transformer converts the mains of the computer.
a network or modem card. Empty expansion slots different in size and shape current to make it suitable to pass to Most of the devices
are available to insert extra cards as required. for different types of devices. the motherboard and disk drives. connected to the
computer
communicate with
Most of the the CPU in order to
components in a PC Ports Power supply carry out their task.
daptor
Graphics a card
are mounted on
printed circuit boards.
slots
permanent storage.
many types of chips.
The discs are
card
CPU
written and read by
laser light.
Bus lines CD/DVD
ROM is memory which
cannot have new data The floppy disk
ROM drive offers a cheap
written to it. It
contains permanent and quick method
instructions, such as 3.5" floppy of transferring
how to start up the Hard drive drive documents to
computer. another computer.
The data is stored
magnetically.
The bus lines transport data between the The hard drive is a series of thin disks which store
When the computer is switched programs and documents while you are not working on
on, programs and instructions processors, memory and other components
inside the systems box. They are tiny them. It also stores the system files which the computer
are loaded into RAM so that needs to make everything work. Data is stored
the CPU can process them. electrical pathways printed on the top and
bottom of the circuit boards. magnetically on the hard disks.
Chapter 2 Hardware 13
CORE
2.2
Ports
Hard drive External devices, such as keyboards, monitors or
printers, often are attached by a cable to the
systems box. A port is the interface, or point of
ROM attachment, to the systems box. There are many
CPU
different types of connectors at these ports, but
the ports themselves fall into two categories,
Figure 2.4 RAM and ROM chips. When you turn on the computer, the CPU serial and parallel. A serial port transmits data
starts reading instructions from ROM and the hard drive. These one bit at a time between the external device and
instructions are stored in RAM so that the CPU can access them quickly. the systems box, and is used for devices which do
as they relieve the CPU of some of the routine not need fast data transmission rates, such as a
tasks. Co-processor chips can be located on the keyboard, mouse or modem. A parallel port
motherboard, or on other controller cards, such allows several bytes of data to be transmitted at
as graphics cards. a time, and so is used for higher-speed devices
such as printers.
Controller cards
Controller cards are often expansion boards
which fit into slots in the motherboard. They
include such things as a video card, a sound card,
a network card and a modem card. A video card,
also called a graphics adaptor card, converts Keyboard Mouse
computer output into a video signal that can be USB
Having a standard port and connector If the computer is working from a battery,
greatly simplifies the process of attaching devices then this will need recharging at regular
to a computer. A universal serial bus (USB) port intervals. If the system is part of a network or key word
is many times faster than an ordinary serial port, large mainframe computer, an uninterruptible
and so is gradually replacing both parallel and power supply (UPS) is often used to protect
serial ports. A single USB port can connect up to against power failures. Port
127 different peripheral devices and supports
Point of attachment of
add-on devices such as keyboards, scanners,
printers, MPEG video devices and data gloves.
Secondary storage external devices to the
systems box.
With USB technology, a new device can be added Before you turn your computer off, the
to your computer without having to add an documents you have been working with need to
adapter card or even having to turn the computer be stored for future use. There are several
off. Modern operating systems can detect any secondary storage devices that can do this for
new USB devices connected, and so are you. They all have different capacities, access
immediately able to input or output data to it. speeds and portability factors, so you will need
A different plug-and-play standard, IEEE to make a decision about which one is most
1394, often referred to as FireWire®, supports suited to your needs. Magnetic storage disks
much higher data rates and devices such as video such as hard disks are fast and cheap, but not
camcorders and digital video disc (DVD) players. very portable. CDs are much more portable than
hard disks but are slower in reading and writing
Power supply the data and have a limited storage capacity.
Figure 2.6 compares the way in which data is
The many components that make up the stored on these two media.
computer system all need electricity to work. The
power supply is a small box inside the computer
case which makes sure that power is supplied to
Display
each component in a form that is suitable. Some Today’s monitors are capable of displaying
components need only a very small voltage, and graphics, animation and video, so it is important
so the mains supply needs to be transformed to a to know a little bit about what determines size
suitable level. and quality. The screen is divided into small
Chapter 2 Hardware 15
CORE
2.2
picture elements, or ‘pixels’. Typically there are computer and uses its own light source to display
about 72 pixels per inch (ppi), or 28 to the the image shown on the computer screen.
centimetre. The electronics of the monitor assign However, a digital light processing (DLP)
a colour to each one of these pixels, and so builds projector uses tiny mirrors to reflect light, which
up a meaningful image. It may be text or a produces crisp, bright images that can be seen
graphical image. Most monitors fall into one of easily, even in a well-lit room.
two categories—the cathode ray tube (CRT) or Sometimes you will need to produce your
the liquid crystal display (LCD). Until recently, display as hard copy, which means printing onto
CRTs were the popular choice because of their paper. This allows you easier access to your
clarity of image, speedy response time and low document when you are not working at your
cost. LCDs were only used for portable computer. Colour inkjet printers are now
computers and were an expensive alternative. inexpensive to buy and produce high-quality
However, flat screens are now becoming more images, but replacement ink can be quite
popular for desktop computers because they take expensive. Monochrome laser printers, which
up less room than the CRT, use less power and only print with black ink, are more expensive
give off little heat, and their quality of image is than inkjets, but they print faster and the
now much improved. Figures 2.7 and 2.8 show running costs are lower. Colour laser printers are
how these two display devices work. also becoming more affordable and therefore
Data projectors are a popular device for more popular, particularly in libraries and the
demonstrations and digital media presentations. workplace. Figure 2.9 shows how a
An LCD projector connects directly to a monochrome laser printer works.
3 The electron guns each shoot a 4 The gun 5 The beams pass through holes in a metal plate, 6 The electrons strike
stream of electrons through the vacuum mechanism also the shadow mask, which keeps the electron beam the phosphors
towards the screen of the monitor. The deflects the beams precisely aligned with their targets on the inside of coating the inside of
intensity of each beam is controlled by so that they sweep the screen. The closer the holes are to each other, the screen. Three
the voltage of each signal. across the screen. the sharper the image which can be displayed. different phosphor
materials are used,
one for each colour,
red, green and blue.
These chemicals glow
2 The signals are as the electrons hit
passed to three them, the stronger
electron guns at the beam, the
the back of the stronger the colour
cathode ray tube, emitted. The
one for each of the combinations of the
three colours. different intensities
of each of the beams
appear as different
colours to the human
eye.
1 Digital signals
from the
application
software go to the
video card. These
signals pass 7 After the beams
through digital-to- have made one
analogue horizontal sweep
converters, one for across the screen, the
each of the electron gun
primary colours— refocuses the stream
red, green and back to the left-hand
blue—used in the edge, just below the
display. previous scan line.
This process is called
Figure 2.7 How the cathode ray tube works. raster scanning.
1 Light from a fluorescent panel Fluorescent Polarising Liquid Coloured Second Front 5 A second polarising
spreads out in waves that vibrate light source filter crystal filters polariser panel filter only lets
in all directions. through light that is
vibrating in a
partially or fully
vertical plane.
2 A polarising filter lets through
only the light waves that are
vibrating horizontally.
6 The mixture of
colours on the front
panel combine to
3 The light waves then pass give the appearance
through the liquid crystal layer. of a whole spectrum
Each crystal cell is charged by of colours. In this
varying amounts to twist the example, full red, half
vibration of the light wave. green and no blue
will result in one
pixel appearing as a
pale brown.
4 One of three coloured filters
then colours the light red, green
or blue.
2 The instructions from the printer’s processor 3 A spinning mirror deflects the laser beam so that the path of the beam is a horizontal
rapidly turn a beam of laser light on and off. line across the surface of the drum. After the laser has flashed points of light across the
This on–off pattern represents the pattern of width of the drum, the drum rotates about 0.004 mm, and the laser starts work on the next
dots as they will appear across the paper. line of dots.
4 Where each
point of light
strikes the drum,
1 Your computer it makes a
sends signals to the charged dot on
printer’s processor the surface of
to determine where the drum which
each dot of printing will attract the
toner is to be black printer
placed on the toner.
paper.
6 The rotation of the drum brings its surface next to a thin wire,
called the corona wire, which has the task of removing the pattern
of charge from the surface of the drum.
Chapter 2 Hardware 17
CORE
2.3
Digital thermometer
Inside a digital
thermometer, the processor
converts the data from the
temperature sensor and
advances the LCD reading.
When the temperature is Sensors provide
steady, the reading is data to
locked in and a beeper processors in
sounds. hundreds of
applications,
such as climate
control and
robotics.
key word
2.3 Microprocessors Classification
2.4
Microprocessor
Microprocessors are tiny electrical circuits made
up of millions of transistor switches, mounted on
of systems
A tiny but complex a silicon chip, which control the flow of electrical Computers don’t just come in one size. They are
electrical circuit
signals. Much of what a computer does is often classified according to how powerful they
mounted on a silicon
dependent on these electronic switches routing are, and this usually determines what type of job
chip.
data in different ways, according to the software they do. System classification is used to give
instructions. The CPU inside the systems box of people a general idea of what the hardware can
a personal computer is often referred to as the do. The boundaries of these classifications are
processor, or microprocessor, as it is very small sometimes a little unclear because technology
and controls the main operations of data changes so rapidly. For example, several desktop
processing. computers can be networked with each other to
As well as computers, microprocessors are act as a powerful server.
found in many different electronic devices. Their Figure 2.11 shows five different types of
job is to store and process data—that is, to hardware systems—handheld, personal computer,
change data into a form that is useful to humans server, mainframe and supercomputer.
or another device. These devices include Handheld computers have small screens and
cameras, watches and monitoring devices. Figure keyboards, or sometimes no keyboard at all.
2.10 shows a range of devices which use They might use a stylus for input instead.
microprocessors. Delivery people or meter readers often use these,
Chapter 2 Hardware 19
CORE
2.5
portable, yet still powerful enough to meet most down the criteria to be met in the solution.
needs of the individual worker. What are the most important factors? Cost?
A server can be any networked computer Speed? Reliability? Storage capacity?
that has appropriate server software installed. Security?
However, in larger organisations, servers are • Design possible solutions—Put together
usually dedicated machines which control access some ideas that might provide a solution.
to software, files and printers. They are often What are the essential items of hardware
required to support thousands of connected users which will be needed? Are there any extra
at the same time. These host computers can be items which might be useful? Find out how
used on the Internet to act as web servers. much the system might cost, how easy it
Mainframe computers cost up to several would be to install and train users, and how
millions of dollars. They can store vast amounts long it would take.
of data and are accessed with terminals or
• Producing solutions—What problems might
personal computers. Banks and large government
there be when the system is to be installed?
organisations might use mainframe computers to
Will it be better to gradually install each
process their data. Users will communicate with
hardware item, or will the whole system
these computers using terminals.
need to be installed in one go? Training
A supercomputer is the fastest and most
courses and user manuals will need to be
expensive of all computers. They may contain
ready at this stage.
several processors that can share jobs and work
in parallel. This means that they are capable of • Evaluation—Each component of the
processing trillions of instructions in one second hardware should be tested to ensure it
and can be used for complex mathematical performs the task it was intended for.
calculations such as weather forecasting or Usually, test data has been prepared in the
scientific research. A supercomputer might cover design stage so that all important criteria
the area of two basketball courts. can be tested. A test report should be
written to confirm that the system performs
as expected. As time goes on, new
technology may become available or the
Hardware
2.5 users’ needs may change, so evaluation of
the system is an on-going process.
solutions Let’s consider applying this to the scenario of
Everyday, millions of computer users around the designing a new computer room at your school.
world rely on different types of computer You might discuss the most essential needs and
systems for a variety of purposes. A student wants with your teachers and fellow students,
key word working at home might require access to the and decide that the room will be dedicated to
Internet for research, a business person might multimedia projects. The budget has not yet been
need access to documents or a printer on a local approved, so you need to produce several
Hardware solution network. A bank or large retail organisation may alternative solutions, perhaps indicating the
need to process millions of transactions every priority items. The computers you need will have
A system of hardware
day, yet still have fast and secure access to data. large-capacity hard disk drives because the files
components designed to
meet a specific need. A different hardware solution will need to be you will work with will be large. The displays
found for each of these scenarios which will will need to be large and high-resolution
allow their tasks to be completed as required. monitors.
Whatever the situation, it is important to Video cameras and digital cameras are
develop hardware solutions with careful essential items, although quite expensive.
planning and consultation. In core chapter 1, we Perhaps the cost could be shared with another
considered the processes involved in project department? Scanners and colour printers are
development—design, produce, evaluate. useful, but perhaps not as essential as other
• Define and analyse the problem—Write items. What are some options for working with
audio? Will microphones be useful, and how will serious, however. Worn parts, such as disk
music be added to the project? drives, or dirty or damaged laser lenses in CD
Storage of final projects will be an issue. drives may need to be replaced.
How big will the files be? What are some
options? Would a DVD burner be useful, or are
there more economical alternatives? 2.7
Care and
maintenance key word
2.6 Troubleshooting Most computer equipment will last for years if
We all rely on computers to work correctly and treated with care.
Troubleshooting
efficiently, but there usually comes a time when • Make sure the computer is positioned
something goes wrong or the system does not correctly on a secure surface, with plenty of A systematic procedure
for finding a fault in a
seem to be working correctly. Troubleshooting is air circulation. Cables should be tidied
system.
a systematic, step-by-step, elimination process away so that they are not caught on feet or
for finding a system fault. Quite often, there will furniture. If you connect or disconnect any
be an easy solution if we know what to look for. power cables, make sure you switch the
According to some technicians, the most power off first.
common problem is that cords are not plugged in • Environmental factors, such as heat,
properly. If you are sure this is not a problem, humidity, static electricity and dust, can all
then Table 2.1 might help. affect the correct running of a computer
It is possible that the problem is a little more system. Clean your computer occasionally
Problem Check
Computer does not turn on Check power source is live—use another electrical appliance to confirm this
Check all leads are plugged in firmly and that power source is turned on
Check power lights on computer and monitor
Computer system acts erratically or Check connectors for each peripheral device
fails to connect to network Check Ethernet cable is plugged in correctly
If the connection is faulty, check the port for bent pins or other faults
Monitor does not display correctly Check the resolution and colour settings
Adjust the picture width and height settings
Printer does not work Check printer is switched on and that ‘on line’ light is on
Check paper is loaded correctly
Check the correct printer has been chosen in the print dialog box
Poor quality print Check printer cartridge
Check whether ‘draft quality’ has been selected in the print set-up dialog box
Disk drive fails to read or write Check the disk has been inserted the right way up
Ensure the disk is not old or damaged
Check the write–protect slot
Mouse does not respond correctly Check the connections
Reboot the machine
Clean dust and dirt from inside the mouse ball housing
Newly installed peripheral does not work correctly Ensure correct driver is installed
Check manual and manufacturer’s website
Table 2.1 Some common computer problems and possible solutions.
Chapter 2 Hardware 21
CORE
2.7
TER TE
AP
CH
ST
WS
3 core
Software
key word
Software
3.1 control the computer and perform one or more
tasks. To make the software do its work, you
execute the programs it contains.
Execute programs
systems
The process of using
The part of a computer you can see and touch is
software requires you to
execute, run, start, or
the hardware. To enable the computer to have a
diverse range of uses, you need software. In this
Types and
3.2
launch it. Whichever
term you use, the
software is loaded into
section, we consider the purpose of software. examples of
the computer memory
and the program starts
The purpose of software software
executing the The modern computer enables you to do an
instructions it contains.
extraordinary number of things, such as: Many different types of software have developed
in the short time that computers have been
• writing lots of different types of documents
around. If you were running a software shop,
• performing calculations you would probably want to organise the
• chatting with friends over the Internet software packages on the shelves so that people
• capturing and storing photographs, music could easily find what they needed. To do this,
and video you would start by classifying the software into
• managing the accounts for a business groups, probably on the basis of what you use
the software for. It is possible that the groups you
• playing computer games
would pick would be something like this:
• working with databases
• operating system (OS) software
• controlling your home
• PC applications software
• sending and receiving faxes
• PC utility software
• researching on the web
• development tools
For each of these, and other things you use
computers for, you need the appropriate • special-purpose software
software. Software is developed by programmers Let us consider each category of software so
as a set of one or more computer programs. A that we can guide a customer to the right part of
program is a set of detailed instructions which the software shop!
Output
Application software—
SCHEDULE OF EVENTS FOR SATURDAY APRIL 22 The ancient poet and philosop More than one a graphics program
glorious music, man would be silent. It is our universal tongue and the mother of all langua
musicians from around the globe. Each of the artists featured this year brings different genre
their music transcends cultural and national borders. We think you’ll be especially pleased w
application can
range from classical to grunge.
be in memory
9:00 VIOLINAS
This trio of violinists hails from Provençe, France. They have been touring for over ten year
series of engagements in Southeast Asia, sponsored by Winkydink Popcorn™. Today they w
at once
ballet, “The Dark Corner of Paradise,” at 9:00 a.m. in the lower pavilion.
First Movement
Paradise is engineered on Vos, the hidden sister planet of Earth that orbits the sun directly o
satyrs dance to the music of love and bounty; the seer arrives to warn of the approaching D
Second Movement
Los the Irrational attempts to stifle the music; the sirens and satyrs are concerned, but are to Operating system
which Vos rotates grinds to a halt; the birds and insects leave Paradise; the Darkness begins.
Third Movement
Many sirens and satyrs perish in the frigid Darkness; Emau stumbles across a hollow reed in
the operating system provides a layer that
Irrational battles Emau with Silence; Emau triumphs; light returns to Paradise.
interacts with and controls the hardware. The
10:00 GUNTER GOUDY
German opera legend Gunter Goudy joins the festival for the second year in a row. Former
operating system also provides all the
after he sawed through a beam he was standing on and fell 10 meters. “I guess I wasn’t cut
graphical user interface elements that we see
Output
accident. Good thing, or the world might never have heard his wonderful voice. Goudy per
a.m.
11:15 FIONA CLEMENTE
Virtually unknown before her victory at last year’s Grammy Awards, Italian artist Fiona Cle
on a computer screen. Here we see a volume
blending elements of traditional folk music with her own contemporary jazz style. Only 17
unbridled vitality and youthful flair. Already, her debut album “The Other Side” has sold ov control dialogue box, used to control the
Don't miss Fiona Clemente in the lower pavilion at 11:15 a.m.!
sound and audio hardware on the computer.
Hardware control
Figure 3.2 The operating system provides a ‘platform’ which supports other forms of software. The application software you use
doesn’t have to worry about what type of hardware is installed as the operating system conceals this detail and presents a
consistent interface. The examples here are from the Windows® operating system.
Chapter 3 Software 25
CORE
3.2
Ou
dialogue box ut
tp
to modify the tp to modify the
ut
Ou
sensitivity and way the
Memory screen is
behaviour of
the mouse. configured.
Operating system—
through the
operating system,
you can configure
the way the
computer system
Ou
ut
hardware works. tp
tp ut
Ou
Figure 3.3 You can use the operating system software to configure the way the computer hardware works, modifying things like
screen settings, the system clock and the way the mouse behaves. The examples here are from the Windows® operating system.
the operating system can be used to configure • use operating system features to secure files
how the operating system works. and folders
• open files or folders for editing or reading
Using the operating system to
manage files Starting up the operating system
Figure 3.4 shows an example of an operating The operating system is usually stored on your
system tool called Windows® Explorer. You use computer’s hard disk, and is loaded into
tools like this to work with the computer files computer memory when the power is turned on.
which contain your data and programs. One of Once the main part of the operating system, the
the main uses of Windows® Explorer is to kernel, is loaded, it is given control of the
manage files. The operating system of a computer. The kernel loads the rest of the
computer has a hierarchical file system—creating operating system and prepares it for you to use.
new levels within the system involves creating You are then able to use and control the
new folders (also called directories). Folders are computer by using the operating system and the
containers for files and other folders. tools it provides. Let us consider how the
Using an OS such as this, you can do various computer loads the operating system when it is
things with your files and folders, including: turned on.
• create new files and folders Computers have a small piece of software
called the basic input output system (BIOS),
• move files and folders from one location to
which is stored in a read-only memory (ROM)
another
chip. An important task of the BIOS is to manage
• copy files and folders from one location to
the computer ‘boot’ process of getting the
another
computer started. The BIOS does the work of
• delete files and folders loading the operating system and giving it
• rename files and folders control. Once the operating system is running,
Disk
The folders
the disk
contains.
the BIOS manages important but basic functions appointments, send and receive e-mails,
that make the computer work—things like: organise lists of contacts like an address
• the keyboard book, manage the business tasks in ‘to-do’
• the display lists, and many other things. When this
software is used to help communications in
• the computer’s ports
a work group, it is often referred to as
‘groupware’.
Application software • Accounting software is used to help manage
There are many types of application software. business accounts. Some common examples
An application may have some general purpose are MYOB® (Mind Your Own Business)
or a specific use. Figure 3.5 shows some common and QuickBooks®.
examples of applications that you might find on • Spreadsheet software was invented to help
typical PCs. with accounting calculations, but this form
of software now has much broader use.
Business software Some examples of spreadsheet uses include
a tradesperson creating a quotation for a
Business organisations depend on a variety of customer, managers using spreadsheets to
software tools to manage the workload analyse the figures from a business, and
effectively. These include the following. sporting groups using a spreadsheet to
• Word processing software is used to write a calculate the points scored by participants
broad variety of documents which may then in a competition.
be published in print or electronic form.
Sophisticated tools in word processors
enable you to distribute copies of
Internet software
documents with mail or e-mail merges. There are several types of products in this
• E-mail and scheduling software, such as category. These include the following.
Microsoft® Outlook®, has tools to enable • Internet browser software is used to browse
you to plan your time and schedule and view a wide variety of World Wide Web
Chapter 3 Software 27
CORE
3.2
and intranet documents. Browsers are also • Computer-aided design (CAD) software is
used to enable users to interact with web used to create 3D design diagrams for
applications, for example for on-line architecture, manufacturing and other
banking, shopping, auctions, and many purposes. AutoCAD® is a widely used
more. example. The software displays the designs
• File transfer programs allow users to in graphical format, giving many different
transfer files over the Internet. views of the designed object. Architects use
software like this to produce building plans
• Remote access programs enable users to
and specifications. Engineers can use this
connect to and control another computer
software to design machine parts, electrical
over a network or the Internet. Examples of
circuit boards and many other things.
this sort of software include Symantec®
pcAnywhere® or the built-in Remote Access • Page layout software is used to prepare
facility on the Macintosh®. documents for printing as books,
magazines, leaflets, posters and more,
• Videoconferencing software enables users to
whether in print or electronic form. Widely
have videoconferences between two or more
used examples include Adobe®
computer users over the Internet. To see
PageMaker® and InDesign®,
each other, each user needs to have a
QuarkXPress®, and Microsoft®
‘webcam’ (web camera) or video camera
Publisher®.
connected to the computer. These programs
provide audio, video and chat, and some
other sophisticated tools. Utility software
• Instant messaging software enables real- Utility software describes a range of tools which
time text-based communication between might be used to protect or maintain a computer,
two or more people. or help a computer to be more versatile. In
• Internet security software is used by families Figure 3.6 you can look at examples of some
to protect their children from unwanted types of utilities. There are several categories of
web content, such as pornography sites and utility software described below.
sites with content that children could find • Antivirus software protects a computer
disturbing. Schools and colleges also use system from computer viruses and related
such software to filter out inappropriate problems. The example seen in Figure 3.6 is
content in order to protect students from Norton® AntiVirus®. There are many
unsolicited and offensive materials. This products available to protect computers
form of software is becoming increasingly from viruses. To be an effective protection,
important with the growth in popularity of all antivirus software tools need to be kept
the Internet. up-to-date.
• Backup software is used by clever computer
Graphics software users to make sure that the work they do is
regularly copied (backed up) to protect
We have a wide choice of tools for working with against loss of data. Backup software is a
different types of graphics. These include the must on computer networks. Network
following. administrators spend a lot of their time
• Photographic and paint software, such as ensuring that backups of important data are
Adobe® Photoshop®, enables us to work made and protected.
with photographs, and other bitmapped
• Compression tools are used to compress or
pictures and line drawings.
‘squeeze’ large files into a smaller size,
• Drawing software, including Macromedia® usually to enable you to fit the files on a
Freehand® and Adobe® Illustrator®, is floppy disk, or to send them by e-mail.
used to create drawings with lines, Common compression programs include
polygons, circles and other objects.
This pamphlet is structured to allow a In this view, the designer has created a
heading across the top of the page, with brochure, using text, photographs and other
the rest of the document in two columns. shapes. More sophisticated programs, such
You can see several formatting examples Microsoft® Flight Simulator enables users to as Adobe® InDesign® and QuarkXPress® are
in this document. Microsoft® Word has practise using a variety of aircraft from light used in the design industry to prepare
evolved into a very sophisticated tool for plane to commercial airlines, without leaving books, magazines and a wide range of
working with documents. the ground! advertising publications.
Figure 3.5 You may use many applications at once on a computer for many different tasks. This diagram shows some of the more
commonly used applications.
Chapter 3 Software 29
CORE
3.2
The Search dialogue from Microsoft® Excel. The same feature is found in Word and other applications.
You can use it for many things, including finding documents with a key word in the file name, or Most applications have a Help file,
files which contain the key word within the document. On the right, you can see the Advanced Find which usually provides a contents
dialogue box used in Microsoft® Outlook®. You might use this to find an e-mail message, for example list, index and search feature so that
where you can’t remember who sent it or when, but can remember it was about chocolate. In this you can quickly find the answer to a
case, you would type in the word ‘chocolate’ in the Search for the word(s) text box. problem you are having with a
software package. Here we see the
Help file for Microsoft® Word.
Chapter 3 Software 31
CORE
3.2
key words Some users create macros by using a macro- • Paste—takes a copy of a clipboard item and
recording wizard. When activated, the macro inserts it into a document
recorder will ‘watch’ and record what you do—
Wizard
which commands you use, what you select in the Drag-and-drop
document, keystrokes you use, and other events.
A software feature
When you have finished recording, the wizard The computer mouse makes it easy to move
which involves stepping
creates a set of macro instructions to enable you things around in our documents and in the
the user through a
complex task, screen by to repeat the work the wizard has just recorded. operating system. The drag-and-drop feature lets
screen, to help make The macro may then be given a name and a you do many things, such as:
sure they get it right. keyboard shortcut, so that you can quickly • drag text from place to another
Many software execute or run the macro again when you need to.
• move a graphic from one place to another
applications contain
wizards to help you to Editing capabilities • move and copy files in the operating system
perform tasks.
Most applications enable you to work with or
Clipboard
edit data contained in documents, databases or
The Undo command
A special memory
feature which can other files. To enable editing, the application will From time to time we will make mistakes in our
temporarily hold things have one or more editing tools. work. Programs enable us in most cases to undo the
we have cut or copied. Microsoft® Word is a widely used tool for last action performed, using the Undo command.
The clipboard may be working with text documents. It provides several Some applications ‘remember’ a large number of
used by many editing views to enable you to choose the one our actions so that, if we choose, we could undo
applications so that we
which most suits your way of working. The main several of the last actions and commands.
can copy from one
views are: There are some actions which cannot be
application’s document
into a different • Print Layout—to view the document as it undone. If we have just deleted an important
application’s document. would print out part of our work and used the Save command,
• Normal—this views the document as if it this usually cannot be undone.
were on a continual roll of paper and does
not show some of the layout features, such Preventing users from editing a
as columns
document
• Outline—this view is used by more
advanced users to organise documents There are often reasons why you might want to
through the use of formatting styles provide documents for use by others, but you
• Web Layout or Online Layout—introduced may not want them to be able to change the
in recent versions to enable users to view document contents. When this is the situation,
and edit web documents you may choose to set the document as read-only
to prevent accidental change. If you really want
to ‘lock’ someone out of a document so they
Cut, Copy, Paste and the can’t tamper with it, you may have to provide
clipboard them with a version of the document which
cannot be changed. One approach is to secure
An important part of the graphical user interface
the document on a network server or you could
(GUI) of a computer is the ease with which you
place the document on a web server so that the
can edit your data, and move the data from one
original document can be seen but not changed.
program to another. There are three very
Another method is to publish it in the portable
important commands you can use to do this.
document format (PDF), which allows the
These are:
publisher to apply various security options, such
• Cut—removes the selected item from a as disabling the Save button so that users cannot
document, and places it into a clipboard save the document and redistribute it to others.
• Copy—leaves the selected item in the This format also prevents users altering an
document, but places a copy of it in the original document.
clipboard
Chapter 3 Software 33
CORE
3.4
what it can do for you. You have to know how The Macintosh® (or Mac® as it became
to unlock its functionality and you have to know known) had a small built-in screen, and included
how to drive it. a new piece of hardware—a pointing device
The user interface enables you to do this—to called a mouse. The interface was quickly
communicate or interact with the computer. described as a WIMP (windows, icons, menus
Once a computer has started up, it waits for you and pointers) interface.
to do something. The operating system software The main idea of a graphical interface was to
‘watches’ all of the input devices, to see if you create a visual metaphor (we consider the features
have given a command or entered some data. of this metaphor in more detail in the next topic).
The way you interact with the system The metaphor used the screen view to represent
depends on the type of interface you are using. the business desktop, and small pictures called
We can identify several types of interface in the icons to represent the documents that we work
development of the personal computer with. The window was a metaphor for a window
into a document so that we could see and work
Types of interfaces on the document through the window.
To open a window into a document, all you
There are three main types of interface we will have to do is to position the mouse pointer over
consider. These are the: the document’s icon, and double-click on the icon,
• command line interface (CLI) which is a fairly easy thing for a new computer
• graphical user interface (GUI) user to learn to do. The mouse pointer becomes an
• natural language interface (NLI) electronic extension of the user’s hand.
Chapter 3 Software 35
CORE
3.4
Figure 3.10 Windows, icons, menus and pointers: the features of a graphical user interface.
works, you can use that knowledge when using a of mouse clicks required to get to any page on
new application. the site.
A good GUI should be consistent in the:
• colour of forms, controls and text Radio buttons, drop-down
• layout of controls on forms and dialogues
• behaviour of controls—drop-down lists,
lists and other interface
checkboxes and other types of control elements
should behave consistently across
In Figure 3.11 you can see many of the
applications
commonly used elements used in software
There are widely used standards to help software
applications. These elements are known as
designers maintain consistency—this helps to
controls. They include:
make the software more ‘intuitive’.
• pull-down or drop-down menus and lists
Functionality • buttons—a click of a button is expected to
result in some action
Applications we use often make the functionality • check boxes—these allow us to make a
available in the commands visible in the menus. number of simple selections
Simply by pulling down the menus and exploring
• radio or option buttons—allow us to
the dialogue boxes, we may be able to work out
choose one from a number of options
some of the things the software is capable of.
Therefore, to make software relatively easy to • scrolling lists—these are used when we have
use, programmers need to consider how to lots of choices—often when these choices
arrange the menu and command structures— are things that change regularly
choosing the words carefully. • text fields or text boxes—used for free-form
Good software usually includes a quick-start text entry by the user
guide to walk the user through an introduction • spin boxes—these allow us to cycle through
to the software—this too reveals something of a list of choices
the functionality and purpose of the software. • sliders—these provide a graphic
representation of a sliding switch, for
Navigation example, a volume control
Navigation in software is the process by which • tab controls—used to group things together
you find your way to specific parts of the in a logical way on a dialogue or form, and
software’s functionality. Software may have a to save a lot of screen space
hierarchical menu and command structure. For • palettes—used where we need to make
example, to insert a picture into a Word colour choices in software, e.g. the fill
document, you might: colour of a rectangle or the colour of text
• pull down the Insert menu
• choose the Picture command Borders and white space
• choose from a sub-menu under the Picture
command Borders and white space need to be used
carefully in designing the interface.
• make choices from a dialogue box
White space is not necessarily white, but is
You may choose to use the mouse or space on which there are no text, graphics or
keyboard shortcuts to work your way to the objects.
same part of the software. You should always try It is a good design feature to include enough
to minimise the number of steps that have to be white space so that the design does not look
taken to perform an action. crowded. The amount of white space to include
Similarly, if you are designing a layout for a in any design is rather subjective, so the designer
website, you would try to minimise the number needs to consult with users who are testing the
Chapter 3 Software 37
CORE
3.5
Radio or options buttons are seen here The colour palette can set the three
in the Print dialogue in Microsoft® Word. primary screen colours—red, green and
You can choose to print either the whole blue—with choices in the range of 0–255
document (which is the default choice), for each colour. This can produce more
This dialogue has fourteen check
just the page the cursor is on, or a range than 16.7 million colours. Some computer
boxes, offering you a variety of
of pages that you can choose. screens are only set to show 256 colours
choices.
and so can only show a limited set of
colours. Note that most software programs
are from the US and therefore use the
word ‘color’ instead of ‘colour’
Chapter 3 Software 39
CORE
3.5
Questions
1 List as many elements as you can that can the ‘How do you like your coffee?’ dialogue
be found in a graphical user interface. box, including all the GUI elements which
2 Set out clear instructions for an older would be on it.
relative on how to: 4 Find out the main differences in the GUIs
a copy a document from their hard drive to used by Mac OS®, Windows® and Linux®, and
a floppy disk set them out in a comparison table. Also list
b save a word processor document to a the features they all have in common. Make
folder of their choice. sure you compare recent versions.
3 A friend is designing a computer-controlled 5 Find out about speech recognition features
coffee machine and has asked you to design and facilities for people with vision
the form that asks customers how they would impairment that are built into your
like their coffee. Consider carefully what computer’s operating system. Prepare a short
choices the customers might be offered on presentation on your findings.
the computer screen. Draw a sketch to show
TER TE
AP
CH
ST
WS
4 core
Data Handling
Video
.mpeg
.avi Printer
.mov
Computer
generated images Internet
.gif
.tif
Figure 4.1 Information
comes to our
computers from a Digitised
photographs
variety of sources and .jpg
in many different
forms. Screen
key words very quickly and accurately—which are probably Remember that each bit represents a unit of data,
the most important characteristics of any modern so a series of eight bits, or a byte, can represent
computer! 256 or 28 patterns of data, including zero. That
The two values are usually represented by a is enough for 256 colours on the screen or
Bit
zero for off and a one for on. Humans find it characters on the keyboard.
Short for ‘binary digit’ quite difficult to work with binary numbers, but When we type words in at the keyboard, we
and represents the with a little practice it can be fun. Think about think of the data as individual characters. The
smallest item of data
morse code. Just by using a series of dots and signals which travel from the keys to the CPU all
that the computer can
dashes, we can build up quite long messages. have to have their own unique binary data
work with.
Similarly, we can use a series of binary digits, or pattern—otherwise the computer would not
ASCII
bits, to represent bigger numbers and many know which key we had pressed. Most
A standard code used in
patterns of data. All the computer’s work is done computers use the same coding system, called
most personal
using streams of zeros and ones. ASCII. This is pronounced ‘as-kee’ and stands
computers to represent
characters on the So what does the series of bits 01100110 for American Standard Code for Information
keyboard. mean to a computer? There is no single answer Interchange. Figure 4.4 shows how each
to that question. It depends on how these bits are character has its own unique binary code.
being used. If it’s a signal coming from a Try to imagine the words on this page written
keyboard, it might represent a character. If it’s out in ASCII binary code. After the first few
going to a monitor, it might be the colour of one words, you would realise that it would be easier
of the pixels, or it might be a part of a program to write it in decimal numbers. That is why people
instruction in the central processing unit (CPU). often use the ASCII decimal code equivalents.
CPU
Input device(s)
68
Characters from the keyboard are
transferred to the CPU as a series of 67 D
binary signals. Each character has its 66 C
65 B 100
own unique 8-bit ASCII code. d
A 99
c ASCII codes for some characters. You can work out the
98
255 codes for most of the rest of the alphabet.
97 b
a 254 ÿ
253 Character ASCII code
252 ý Binary code Decimal
Pulse signal from equivalent
keyboard to CPU
ü A 0100 0001 65
B 0100 0010 66
Binary representation C ... ... ... ... 67
0 1 0 1 0 0 1 1
of signal
Characters from I ... ... ... ...
83 Decimal equivalent other languages can J ... ... ... ...
be represented by K ... ... ... ...
extending the
length of the codes. a 0110 0001 97
b 0110 0010 98
c ... ... ... ... 99
For convenience, strings of binary numbers 0 0011 0000 48
are also written in their decimal equivalent.
1 0011 0001 49
2 0011 0010 50
3 ... ... ... ...
space 0010 0000 32
comma 0010 1100 44
full stop 0010 1110 46
Questions
1 Why do computers work with bits rather than 4 Using three bits of data, we can make eight
decimal digits? binary patterns: 000, 001, 010, 011, 100,
2 Convert the following binary numbers to 101, 110, 111. How many binary patterns can
decimal: you make using:
a 0110 a 4 bits
b 01100011 b 8 bits
c 10101100 c 24 bits
3 Convert the following decimal numbers to 5 Look at the ASCII table in Figure 4.4.
binary: Complete the rows for the remainder of the
a 4 letters and their binary and decimal ASCII
b 64 equivalents. Encode your teacher’s name in
c 63 binary ASCII, and then in the decimal
equivalent.
Case studies
Throughout this book, case studies are used to The newspaper report below is presented as an
illustrate the main points of the text. To create a example of a case study which illustrates the issue
case study, you could research a variety of data of plagiarism. Read it through, then answer the
sources about an issue, or you could examine a questions which follow.
situation, person or business and report first-hand.
You can learn more about these data types in you may be able to edit them and save them as
option chapter 9: Authoring and Multimedia. different formats. Useful documents are also
published on the World Wide Web and you can
Manipulating data types copy a selection into a local document, always
remembering of course to acknowledge your
There are several ways to get the data into the sources.
computer and several ways we can store it,
process it and display it too. This means that you
have many opportunities to manipulate your data
into different forms. In core chapter 2: Hardware, Data
4.6
you learn about the hardware which you can use
key words
to input, process and output data and
information. In many of the option topics you will
transmission types
need to process your data into different forms. Data is repeatedly moved around between
Later in this chapter you will learn about the different parts of your computer. For example,
Manipulating different file formats associated with each data type. on starting up, data moves from the read-only
Changing the form or Most application software today will allow a memory (ROM) chips, and the operating system
appearance of a range of different data types to be used in one and applications are transferred from the hard
document. document. For example, a sound effect can be disk to the random-access memory (RAM) chips
Serial and parallel included in a Macromedia® Flash™ animation (see 4.7 Data storage and function). As you input
transmission or a graphic can be stored in a database. data from the keyboard, the computer stores
Bits travel one after the Text can be input to the computer via the your data in RAM and transfers it to the CPU for
other during serial keyboard or it can be scanned in and converted processing. The output may also be sent to the
transmission, but in to text using optical character recognition (OCR) screen, a printer, over a local network to a file
parallel transmission, software. Pictures can be changed and resized server or across the Internet to the other side of
bits can travel in groups using a graphics package. Video clips can be the world. The data will be sent by different
of several bytes. digitised using a combination of hardware and methods, serial or parallel, depending on how far
software. Often a digital video camera with a it has to go.
FireWire® (IEEE 1394) connection is used to Inside the computer the data travels along
create video files on the computer. Files can then multi-lane tracks called buses, so that 32 or 64
be edited, compressed and stored as different file bits of data can travel at the same instant. This is
formats. Data such as parallel transmission. Your
clipart or audio files are processor works at thousands
already digitised and you Parallel transmission of millions instructions per
to a printer etc. Serial transmission to
can access these from a modem or network second so it is important to
compact discs (CDs) or move the data quickly.
the Internet. However, Unfortunately, if the data has
~ ! @ # $ % ^ & * ( ) _ +
Ins Home
Pg Num / –
` 1 2 3 4 5 6 7 8 9 0 - = Up Lk *
{ } Pg
Tab Q W E R T Y U I O P Del End Dn 7 8 9
[ ] \
+
Caps : "
A S D F G H J K L Enter 4 5 6
transmission.
Lock ; '
< > ?
Shift Z X C V B N M , . / Shift 1 2 3
Enter
Ctrl Al Al Ctrl 0 Del
key words storage for other data that will be needed in the forward or rewind the tape to find the data you
future. need. However, the tapes store a lot more data
than hard disks, even though they are physically
Secondary storage Secondary storage much smaller. Magnetic and optical disks all use
random or direct access methods, so the location
This stores the user’s Secondary storage, often just called storage, of the data is known without having to search
data and software even
holds data files and software which is loaded through other data. This makes it much faster to
after the computer is
turned off.
into memory when it is needed. There are many find a particular data item or file than using
Byte
types of storage media which meet different sequential access.
A group of eight bits.
requirements. Capacity, cost and portability are
all factors which need to be considered when
choosing which one to use.
Units of data storage
Hard disks and floppy disks store data using We have already learned that the bit, or binary
magnetic spots to represent the data bits. digit, is the smallest unit of data that the
Compact discs (CDs) and digital versatile discs computer can work with. By convention, we
or digital video discs (DVDs) use optical count bits in groups of eight and call them a byte.
technology, which means that laser light is used The number of units of data stored in a word
to read and write data to the disk. processing document or on a floppy disk is often
Tape cartridges are sometimes used to measured in kilobytes (KB) or megabytes (MB).
backup hard disks and file servers. The tape is The prefixes used are approximately equivalent
similar to audio tape and data has to be found by to conventional usage—kilo- meaning one
sequential access. This means that you must run thousand and mega- one million. The capacity of
storage devices is increasing day by day.
Gigabytes (about one thousand MB) are now
used to measure the capacity of hard drives and
DVDs, and terabytes (about one million MB)
apply to some of the largest storage devices used.
Table 4.2 compares these units.
Figure 4.7 File icons and extensions. Why are there so many different file formats in use?
Microsoft® Word document will have the file .xls will be opened in Microsoft® Excel, while
extension .doc and it will be associated with an those with the file extension .mov will be opened
icon featuring a large ‘W’ on it. in QuickTime® Player. Files which are termed
Figure 4.7 illustrates some of the commonest ‘open-standard’ will have a default application
file types with their icons. Look at the icons and assigned to it. For example, your computer may
extensions associated with each. The icon in be set to open .jpg files in Adobe® Photoshop®
front of each file serves as a reminder of which by default, while another computer may be set to
application your computer will use to open each use Jasc® PaintShop™ Pro®. Table 4.3 provides
one. The extension at the end of the file name further information about file types and their
will indicate what type of file it is. (If they are not extensions.
visible, and you are working in the Windows® Usually, file types are decided for us by the
environment, check the box in the Folder default settings in our application software.
Options through the View menu, or just look at When we save a file, the Save As… dialog box
the file Properties in the File menu.) will already display the most likely file type and
By default, your computer will open a its extension. We can, however, choose
particular type of file with a particular differently. For example, we might be creating a
application. For example, files with the extension graphic file in Photoshop®, but choose to save it
Table 4.3 Common file types and their extensions. See Table 11.1 on p.186 for further details.
Questions
1 Why do computers have both primary and secondary 6 How big is one of your typical word processor files? How
storage? many of these would you be able to store on a floppy disk?
If a video file is about ten MB, which storage medium
2 Find out how much RAM you have in your computer. If you
would be most appropriate to use? Explain your answer.
are working in a Windows® environment, you can look at
this through the System Properties in the Control Panel. 7 If you are working in a Windows® environment or in Mac
For Macintosh® computers, you can find this under the OS® X, you can examine the file extensions on some of the
Apple menu at top-left under ‘About this Macintosh…’ . files on your computer. Draw up a table similar to Table
4.3. Add a column to note the typical file sizes.
3 Draw up a table to compare and contrast a range of primary
and secondary storage media. You might include some of 8 Investigate some other file extensions such as .pdf, .exe,
these headings: Examples, Location, Capacity, Speed, .mp3. What sorts of files or applications do these
Access type. represent? Are there any other common file types that you
use? Add them to the table you created in
4 Draw a table to compare the cost per MB of different
question 7.
storage media.
9 Open one of your existing word processing documents and
5 You have found a website on the Internet which allows you
save it as a text file. What difference has this made to the
to download lots of popular music. You have a DVD burner
file size? Double-click the text file to open it. Which
on your computer. Discuss the ethics of storing this music
application has opened it? How is the appearance of the
on your hard drive, burning it to a DVD, and then copying
contents different to the original file?
it to give to your friends.
in .jpg format rather than the default .psd. This produced. The higher the quality, the longer each
has the advantage that the file will be able to be string of binary data will be. As a result,
read by other graphics software applications. graphics, audio and video files tend to be very
Many applications can accommodate a large, which can be a problem for storage devices
variety of different file formats. For example, a and transmission times.
word processor may be able to display a We can, however, choose to compress the
spreadsheet and a graphic created in other data files so that they take up less room in
applications. The word processor might also storage, but sometimes this means a loss of
have a limited potential to edit these foreign files quality and we need to be careful about how
too. It is likely, however, that most of the editing much quality we can afford to lose. We will now
is more easily done in the original application. look at some of these options for data
compression.
key word
4.8
Data Lossy techniques
The JPEG (Joint Photographic Experts Group)
Lossy compression
A method used to
compression format is a type of file familiar to most computer
users these days, especially for graphics on the
reduce file size by
eliminating and techniques Internet. The original file of binary data has been
reduced by averaging areas of colours. This type
adjusting information
within the file. The As you learnt earlier in this chapter, data files are of compression works best for photographs or
original data cannot be series of ones and zeros that the computer can pictures containing gradient colours. It results in
restored. work with. A graphics file will have a string of the loss of some of the original colour
this binary data for each pixel to be displayed on information, which cannot be restored. For this
the screen. An audio file will contain a string of reason, it is called lossy compression. However,
binary data to represent each note of sound to be the reduction in picture quality is often able to be
set by the user. Experimenting with levels of done with a lossless method. All the data needs
compression can produce small file sizes where to be retrieved when the data is decompressed, so
loss of quality is not noticeable by the human eye. that the ASCII codes will actually make sense to
MPEG is the acronym for the Moving the computer. Again, repeated patterns of data
Pictures Experts Group. This group has are replaced with a simple symbol. For example,
developed compression methods for video data when we are writing notes, a repeated phrase
and DVD movies, with a subsystem responsible such as ‘information and software technology’,
for the sound compression producing MP3 can be replaced with the abbreviation IST. As
(MPEG layer 3) files. Downloading video from a long as we remember what the abbreviations
digital movie camera to your hard drive will take refer to, we can replace one thirty-five-letter
1 GB for about 5 minutes of footage. phrase by a three-letter one. That’s a
MP3 technology compresses audio files to considerable saving, especially if the phrase is
about ten per cent of the original file size, while used many times over in one document. Text files
still retaining almost the original quality. This such as word-processed documents and
means that a 30 MB song on a CD compresses databases can be compressed in this way by
down to about 3 MB in an MP3 file. saving them using a Zip application or StuffIt®.
Again these are lossy techniques, designed to Included in the file will be a look-up table to
significantly reduce file size by eliminating indicate what the many abbreviations refer to.
sections of information which humans cannot
key word
see or hear very well.
TER TE
AP
CH
ST
WS
5 core
Past
5.1 The developers of early electronic computers
wanted to develop machines which could
calculate rocket and missile trajectories more
information and accurately and faster than the enemy, and to code
and decode secret messages—to kill the enemy
software before being killed.
As you study the major developments in
technologies computing over time, you will discover that many
of them have been funded and motivated by war.
Sir Isaac Newton said that if he had seen further The army with the most sophisticated information
than others it was only because he had stood on and software technologies is more likely to be the
the shoulders of giants. victor. It is a sad fact that most technological
The technology we use today has only come advances have been driven by such motives.
about because of the hard work and vision of Alan Turing is famous for his early work in
others. There have been many discoveries and computers, but this happened only because of his
inventions which have led to today’s powerful involvement in unravelling the secret code used
personal computers and to important for communications between German officers in
communication technologies such as the Internet. World War II. The successful cracking of this
IBM’s invention of punched cards as a means famous Enigma code was an important
of input for computers was based on Joseph achievement in information technology during
Jacquard’s cards which controlled his weaving the war and helped the Allies greatly.
machines in the early 1800s; Aitken’s Mark I
computer was modelled on Charles Babbage’s
earlier designs; logic gates (the basis of integrated
circuitry and the chips in every PC) were an
application of George Boole’s writings.
Most inventors begin work by studying what
has gone before, avoiding repetitions and dead-
ends, and picking up the challenge at the point
others left off, yet most computing courses pay
little attention to history.
Apart from the fact that history is
Figure 5.2 Alan Turing played a major role in the
fascinating, if we never study it then we will be
early development of computing.
poorer inventors in the future, as well as
repeating the mistakes of the past. One exception which did not involve war
In the early years, mathematicians wished to would have to be the United States census of
automate the huge numbers of calculations 1880, which Herman Hollerith observed was
needed for creating trigonometric and still being counted eight years after the census
logarithmic tables for astronomers and engineers. had been completed! It was his solution to this
This was the motivation for the early inventors of which led eventually to the formation of the
mechanical calculators, such as Charles Babbage. company which would later become IBM.
Figure 5.1
Some important
milestones in
the history of 1617
2600 BC John Napier (Scottish
information and
The abacus—world’s first theologian, mathematician 1621
software Earliest times mechanical calculating and weapons designer) Slide rule invented, using
technology. Fingers used for calculation device invents Napier’s bones Napier’s ideas on logarithms
The technological advances which were a on physics, mathematics and other sciences—
result of the moon race of the 1960s were driven leading to huge technological growth among
by US fears of Russian superiority when they Western nations.
launched the Sputnik spaceship to beat the Today, a big motive for innovation is profit.
Americans to the first space flight. Large companies work hard to satisfy consumer
Fearing too that America’s educational demands for more sophisticated products in
system was falling behind the Russians, information and software technologies.
educators and policy-makers put more emphasis
1822
Charles Babbage, known
as father of modern
1678 computing, designs
1642 Grillet de Roven (clockmaker Difference Engine for
Blaise Pascal (French theologian to King Louis XIV of France) 1679 calculating—first digital
and mathematician) invents a turns the Pascaline into Leibnitz invents binary computer—assisted by Ada
1805
calculator he calls the pocket-sized device system of counting Lovelace
Jacquard controls loom by
Pascaline—first automatic
using punched cards
calculating device
Chapter 5 Past, Current and Emerging Technologies 57
CORE
5.2
chairman of IBM predicted in 1950 that the world Year Storage capacity of a
would only ever need four or five mainframe common DRAM chip in
computers. kilobits
Apple Computer commissioned a special
1972 1 (25 words)
effects filmmaker to visualise its own view of the
future. This vision involved a personal digital 1973 4
assistant which acted as your personal secretary. 1973 16
An animated image appeared on screen and 1980 64
conducted a normal conversation with you, the
1983 250
owner. It announced your diary entries, asked
what food you wanted delivered, and 1988 1 million (25,000 words)
automatically phoned, responding to your 1991 4 million
spoken instructions. 1993 16 million
Some large companies and governments 1996 64 million
employ scientists whose job is predicting the
1998 250 million
future. This profession is known as ‘future
studies’, and there are many methods used to do 2001 1 billion (I gigabit) (25 million words)
it. One is trend analysis. In option chapter 8: Table 5.1 The capacity of processing chips has
Artificial Intelligence, Simulation and Modelling, been doubling every two years or so.
you will use an ordinary spreadsheet to try this
approach yourself. and a half to two years. Table 5.1 shows how
We can trace information and software true this has been!
technology trends by looking at the journey they We can see this same pattern in storage
have made to this point and then predict the devices.
future by looking at the present. It is a very brave The gigabit chip can store 4 hours of digital
(or foolish!) person who tries to predict the music, 25 uncompressed high-quality pictures,
future, but let’s give it a try! 10 minutes of compressed video and can be
transmitted error free on an optic fibre in half a
Storage capacity and second.
The only limit to Moore’s law seems to be a
Moore’s Law physical one. When the components of the chip
Robert X. Cringely said that if the automobile approach the size of a single atom, further
had followed the same development history as storage increases will require new technologies.
the computer, a Rolls-Royce would today cost Because data is merely zeros or ones (off or
$100, travel one million miles to the gallon, and on signals), there are many possibilities for
explode once a year, killing everyone inside. storage. The difficulty is in addressing and
It is true that the speed of technological accessing the data. A lot of research at present is
development in computing has been astonishing. concentrating on biological molecules, a field of
Gordon Moore, the chairman of the Intel study known as bioinformatics, where protein
Corporation, said that the circuit densities of molecules are used to store data.
processing chips will double roughly every one
987
987
321
890
210
654
901
987
789
789
109
345
345
109 901
901
635 234
234
1834
Babbage’s Analytical 1936
Engine designed but never 1847 1890 Konrad Zuse in Berlin builds
built, with similar ideas to George Boole (English Hollerith tabulator—first first working digital
the modern computer: mathematician) publishes commercially successful 1913 computer in his kitchen,
sections for input, his ideas on logic computer adds up the 1890 Invention of vacuum tube using relays
processing and output US census
Computer size and cost alongside still photos, audio and SMS text
messaging. They have small cameras and allow
Computers are getting smaller and cheaper. additional services such as e-commerce, and the
To gain the equivalent processing power of a delivery of share prices and the latest sports
modern laptop in 1960 you had to pay more than results.
a million dollars and set aside a whole floor of an To achieve this a few years ago, we would
air-conditioned building (usually at a university). have needed at least a fixed telephone, a digital
Now the science fiction vision in the 1940s video camera situated in a videoconferencing
Dick Tracy cartoons has nearly become reality— room, a radio, a digital still camera, a fax machine
the technology is now being developed for a and a newspaper.
computer the size of a watch which can be This trend will continue—your mobile phone,
strapped around your wrist and send your voice, computer, radio, CD player, web browser, e-mail
along with your moving image, to anywhere in program, organiser and TV are likely soon to
the world. become integrated into one piece of equipment.
The data which all these industries use is
Convergence of technologies digital, so exchanging data will not be a problem.
The challenge will be to handle the massive
key word
When technologies become smaller, cheaper and volumes of data it will deliver with simple
more powerful, it is possible to combine them navigation tools and clever but logical interfaces.
Convergence
easily into a single piece of portable equipment. At present, five huge digital industries are
The process is known as convergence. rapidly becoming one. These five industries are The merging of
The biggest challenge is finding a way to personal computing, consumer electronics, previously separate
telecommunications (including the Internet), technologies into single
connect devices that have had a separate history
products.
and have developed different standards. publishing and entertainment. The world has
The changes we see in the mobile phone are never seen such an event before, and it will
an excellent example of convergence. Third- continue to affect every one of us.
generation mobile phones transmit video images
The nature of work and study
It is now possible for employees to work from
home. This is known as telecommuting, the
virtual office or SOHO (small office, home
office). Interactive videoconferencing means that
employees can talk from home to their boss or
colleague. On-line databases allow work to be
completed from home. Files can be attached to
e-mails and sent to others for group projects.
One successful computer game was entirely
created in this way by people in different parts of
the world who have never met each other. They
Figure 5.3 One member of a famous family— exchanged code via e-mail attachments.
the IBM 360 series of mainframe computers.
1943
1937 1942 Turing and Bletchley Park 1944
John Attanasoff in Iowa 1941 ABC (Attanasoff–Berry develop Colossus, first Mark I, first electronic
builds first electronic Zuse Z3 built, first working computer), first modern electronic special-purpose general-purpose computer,
computer programmed computer computer computer based on Babbage’s ideas
1951
UNIVAC, first commercial
1945 computer sold, correctly
ENIAC (Electronic predicts outcome of US
Numerical Integrator and 1949 Presidential election, but
Computer), first general- CSIRAC, first Australian then reprogrammed to
purpose stored-program 1947 electronic computer and incorrectly predict a close
electronic computer Invention of transistor only fifth in the world result
Questions
1 Predict two information and software 5 Identify one way in which the nature of
technology changes that you expect to see work has changed for one member of your
in your lifetime. family since you were born.
2 Describe Moore’s law. Can it continue 6 Exercise your imagination and draw a
indefinitely? picture of, as well as describe in words, the
3 Outline three equity issues in information computer classroom you will visit as a
and software technology. parent of high-school-aged children in
about 25 years.
4 What is convergence? Identify a product
which displays convergence.
1959 1964
Grace Hopper invents BASIC (Beginner’s All-
COBOL (Common Business Purpose Symbolic
1956 Oriented Language) Instruction Code) becomes
IBM develops FORTRAN programming language first widely used general
1954 (Formula Translator) for business. programming language.
IBM markets the 650, first programming language for First integrated circuit IBM launches 360 series,
mass-produced computer mathematics built first ‘family’ of mainframe
computer models
data so that a conclusion can be drawn. For the mouse appeared in 1984 it was possible for
example, computers are used to match faces in a the first time to manipulate objects on the screen
crowd to a known database using the directly. This was a major breakthrough and has
proportions and features of the face. Criminals lasted the test of time. However, many parents
can be identified from matches of digital images ask teachers if their school runs courses in
taken of arrivals at an airport. keyboard skills, because they realise so much
input is still done this way.
Translating language Many expected that by now direct voice
input would be commonplace and keyboards
Try this: within seconds it is possible to have would no longer be used, but it has proved a
today’s Sydney Morning Herald (or any other more difficult technology than expected to get to
web page) translated into another language. work smoothly and accurately.
Simply log on to Babel Fish Translation and For years, the Macintosh® computer has
enter the web address of the site you wish to included speech recognition as part of its
translate. operating system, particularly to assist the
Of course, the process is not yet a perfect disabled. Folders and applications can be opened
translation, but it is enough for us to understand by spoken instructions. Users can ask for the
what is written and it is the beginning of true date and time and even request a joke.
natural language translation. (Why is the site ViaVoice® from IBM is able to translate
called ‘Babel Fish’?) speech into text for word processing.
As the ability to recognise idiom and slang Help desks now use speech recognition to
increases, true language translation from speech answer calls. Telstra’s Directory Assistance
will become possible, breaking down one of the makes this attempt, only connecting to a human
barriers between nations. operator if it fails. Bookings for movies, airlines
and taxis use speech recognition to cut costs.
Towards natural language input The ultimate goal is a natural language
The keyboard is a very primitive input device, interface for a computer, where any human
but for many years it was the only choice. When speech can be recognised by the computer, and
the computer can be operated entirely by
conversation.
Expert systems
Expert systems have not yet replaced human
experts, but we can predict that the trend
towards this will continue. The knowledge and
diagnostic abilities of medical experts and others
can be programmed into computers. At present,
every time a skilled specialist retires, their
Figure 5.5 Perhaps lifetime of personal experience and specialist
history’s most famous knowledge is lost to future generations.
chess match—Deep We can predict that in the future many visits
Blue plays Kasparov. to doctors will become unnecessary because
patients will be able use ‘virtual doctors’ over the skills are becoming easier to use as interfaces and
Internet, in the form of expert systems. Even software improve. As home broadband Internet
now, it is possible for us to self-diagnose using connections increase, consumers will be able to
the web. Naturally there are risks involved: you access more media-rich content. Increased
may wrongly decide that you are not in medical bandwidth has allowed the Internet to become a
danger and avoid visiting a real doctor. truly interactive multimedia environment.
Applications of fuzzy logic will also become Movies-on-demand, selecting a movie
more widely used. Fuzzy logic assigns a ending, ordering over the Internet, and even
probability to events and predicts the most likely choosing your own camera angles in sporting
conclusion from a range of possibilities. matches, will all become commonplace.
Fuzzy logic is currently used to adjust the Plans for interactive TV include gambling and
picture in handheld video cameras to reduce guessing games between friends in the same room.
shaking. The camera’s hardware has to decide
which movements in the image are meant to be Future storage
part of the actual scene and which are not. Will the web one day replace disk-based
We study expert systems in detail in option multimedia altogether? Will CD-ROMs
chapter 8: Artificial Intelligence, Simulation and disappear? Already CD-ROMs have a restrictive
Modelling. size when it comes to storing significant amounts
of media-rich data, such as digital video. A full-
Neural networks length movie will fit on one DVD but not on a
Neural networks are trained to guess by trial and CD-ROM. Most people believe that DVDs will
error. Every time they are incorrect, the link they replace the CD-ROM as the most widely used
are using is made weaker. If it is correct they are storage medium, and the Internet will become
strengthened. This is similar to the operation of the most common information delivery platform.
the human brain Portable flash memory is widely used and
At present, neural networks are used to will continue to increase in capacity and
recognise signatures, identify heart attack risks by usefulness. Already it can be removed from a
examining the heartbeat patterns of patients, and digital camera and plugged straight into a
predict share market trends. Applications using printer, bypassing the computer altogether.
this type of network will no doubt increase in the There is another factor however. Although
future. advances in delivery speed via broadband
Internet connection may soon match the speed of
the hard drive of your desktop computer, users
Authoring and multimedia will still want to own permanent copies of
favourite titles. They may no longer be on CD-
Future delivery ROM or DVD, but on some ‘yet-to-be-invented’
You can already edit your own movies at home. storage medium.
In the same way, the ability to create full
multimedia productions will become more
common in the future. At present, considerable
skill and training is needed to use complex
authoring software, as you will discover in the
authoring multimedia option chapter, but these
1975
1972 0
808 S-128340
R02
Bill Gates creates DOS
Frames (windows) used for system language for
first time. 1973 1 Altair PC.
The 8'' floppy. RAM chips reach 4 Kb, then 1974 Laser printers.
First pocket calculator, 16 Kb in same year. Intel® 8080, first Altair 8800, first personal ALTAIR 2000 COMPUTER
made by Texas Instruments Hard drives sold by IBM commercial microprocessor computer in kit form
1979
First popular spreadsheet
1977 application, VisiCalc™. 1981
Apple® IIe, TRS-80 and First popular word First popular database
PET, first popular 1978 processor application, 1980 application, dBase II®.
commercial personal First 5'' floppy-disk drives Wordstar RAM reaches 64 Kb First IBM PC
computers
1983 1984
First Macintosh® computer,
graphical first successful GUI 1985
user computer. Microsoft launches Windows®.
interface Apple launches 3.5'' Combination of PageMaker®,
1982 (GUI) floppy disk. Macintosh® and laser printer begins
Internet begins when personal computer with mouse, RAM over 1 MB. Now over 1000 desktop publishing revolution using
rules are agreed Apple’s Lisa. RAM at 256 Kb Internet hosts personal computers
Figure 5.7 Two modern operating systems: Mac OS® X and Windows® XP.
rather than just behaving as its ‘personality automatically and orders made up and packaged
programming’ might tell it to behave. Steven without human intervention.
Spielberg’s movie, AI, is a modern Pinocchio Robots may not always be mobile. The majority
story. It makes an attempt to imagine the reverse of cars are now manufactured using stationary
situation—could humans form strong emotional automated welding and assembly robots.
links with robots? In the 1990s, annual sales of industrial
Both films imagine robots with artificial robots exceeded US$2 billion for the first time,
intelligence. Such a world may be a while off yet, with more than a million robots in daily use.
but there are real robots with us now.
Robots are increasingly used in dangerous
situations, such as bomb disposal, and for
Software development and
repetitive programmable tasks, such as motor programming
vehicle assembly—spray painting, welding and Software has become more user-friendly. The
assembly of parts. home user can now perform many tasks which
At John Fairfax’s printing works at Chullora needed dedicated programmers in the past.
in Sydney, robots move around the two Examples include movie editing and multimedia
kilometre floor of the printing works and presentations.
retrieve new rolls of newsprint (paper), remove Software can be written by amateur
the old rolls, insert the new ones and then move programmers using object-oriented program-
off to plug themselves in for recharging. This is ming environments. Multimedia authoring has
more like the type of robot predicted in the become possible for primary age students
1950s visions of the future. They are now a because the media to be included can be placed
reality. easily with the click of a mouse button.
Another common application is in inventory Software programs operate everything from
warehousing, where robots retrieve precise bread-making machines to mobile phones.
quantities of stored goods from huge aisles of
goods by knowing the exact location and sensing
a bar-coded destination. Stocks can be reordered Internet and website
development
What three
1992 technologies We can expect that tools for Internet searching
Newton® personal digital assistant would you will become more sophisticated, and it is quite
(PDA) launched by Apple. First with select to
handwriting recognition.
possible that search engines will begin charging
extend this
Bill Gates becomes richest person in timeline to the for their services.
United States. present? Websites can now be constructed by anyone,
First web browser, NCSA Mosaic™ (later
using pre-packaged forms with templates
to become Netscape Navigator®), allows
the World Wide Web to become popular
What environmental
problems can IT solve?
We can often predict the future by noticing the
present more carefully. For this reason, we
should take more careful note of environmental
warning signs, such as the loss of air and water
quality, diminishing habitats and forests, the
greenhouse effect and our degraded coastlines.
A survey once asked the question: ‘Which of
the following problems do you think technology
Figure 5.8 Mobile robots at work at the Chullora will be able to solve in the future?’ The results
newspaper printing complex. appear below. The issues people felt technology
was most able to solve appear towards the top,
supplied by your ISP (Internet service provider).
and those they felt it least able to solve are
Such packages will become more flexible and
towards the bottom.
web design software will become more user-
Would you have ranked these issues in the
friendly.
same order in answering the question? What do
We can expect that governments will become
you conclude from these results?
more involved in the control of Internet content.
You can see that most people believe ‘social
The reasons for this are that laws applying to
issues’ (all placed in the lower half) are a greater
ratings for film and TV can be evaded by storing
challenge to technology. In fact, some would
websites remotely. The increasing use of spam
argue that it is technology that causes many of
will mean that governments will experience
these problems.
public and corporate pressure to control
It is nuclear technology that makes nuclear
unsolicited (unrequested) junk e-mail. Laws may
weapons possible, and equity issues, explained
limit its use.
earlier, can cause famine, homelessness, violence
and unemployment.
In 1960, John Kennedy said, ‘For the first
time in human history, we have the power in our
The impact
5.4 hands to feed, clothe and house every person on
earth’. Perhaps all we lack is a willingness to
of technology on share. A similar statement may be made about
information technologies. Nations such as
the environment Australia control great power through the
information technologies they possess. We need
Questions
1 Use the contents page of this textbook to 2 Circle three issues from your table (or use
create a table where a left-hand column colour coding if using a computer) which
lists each of the option topics in this you believe will have the most impact in
course. Add three more columns. Use these the future.
to identify three current social or ethical IT
3 Identify two issues from your table which
issues for that topic. You may use the ones
have had the most impact in your lifetime.
collected here and then collect others
featured in each option chapter throughout 4 Identify one issue in your table which you
the text. You need not have studied each believe will require government action, and
option yet to do this. state why.
ST
recycling our equipment, often we have just to build equipment with fewer hazardous WS
shifted the pollution to another place on the materials.
globe.
In one Chinese town not far from Hong
Kong, mountains of hardware arrive by truck,
Question
tractor and even bicycle. Because labour is cheap Select an IT device and describe ways
the tedious work of removing the wiring and in which a company manufacturing this
separating the plastic from the metal components item could ‘take responsibility for what
is done by hand. happens to computers after they
The wiring removed during the day forms become obsolete’.
huge piles from which the insulation is removed
simply by burning it through the night. This
6 core
People
Roles and
6.1 troubleshooting skills. Troubleshooting involves
discovering and eliminating a problem with the
operation of a computer system.
responsibilities
Technology is now embedded in almost every
Systems analysts
facet of the modern world. In the coming years it The systems analyst’s role is primarily to design
is likely that technology workers will continue to and manage the development of computer
be highly sought–after. A career in information systems to solve a particular problem. In some
and software technology is obviously not for schools, for example, system analysts have
everyone, but for those interested in working in designed swipe-card systems in an attempt to
this area, there are many possibilities from which deal with the problem of truancy and to make key word
to choose. This section examines some of the roll-marking less time-consuming.
careers available and the roles and
responsibilities of information and software
technology personnel.
Users Troubleshooting
Chapter 6 People 71
CORE
6.1
operating systems. Tasks may involve the software. A software engineer must be a licensed
installation of new computers and the professional. People are generally not permitted
replacement of broken or outdated components. by law to refer to themselves as an engineer (of
Computer technicians need to diagnose and solve any type) unless they are professionally certified.
problems and also have a basic understanding of
networking. Maintenance is also an important Support staff
role in order to prevent system failures.
Technicians may also be required to install Support staff provide assistance for people who are
and maintain software or work on suitable file having problems with their computer system. Most
formats for various data types. large organisations have support staff, or help
desks, to answer user questions. A help desk is a
department within an organisation that responds
Multimedia specialists to users’ technical questions. Questions and
Multimedia specialists use text, graphics, video, answers can be delivered by telephone,
animation, and sound to produce interactive e-mail or fax. There is even help desk software that
computer displays, including sales presentations, makes it easier for the people running the help desk
training courses, information kiosks, and to quickly find answers to common questions.
entertainment and educational products. Support staff should be able to recognise and
interpret the meaning of common error codes that
key word
Software engineers sometimes appear on computer screens. They also
need to be able to rectify general problems
Software engineers are involved in the design and associated with the daily use of hardware.
Help desk
development of software for operating systems,
and of application software, including games,
A department within an
word processors and web browsers. They use Training specialists
organisation that
different programming languages, depending The rapid spread of computers has placed more
responds to users’
technical questions. upon the purpose of the program, and solve and more demands on people in terms of the
technical problems that arise from existing technology skills they need to work, live and learn.
This situation has generated a greater demand for
training specialists in the field of information and
software technology. Training specialists are
educators who teach others about information and
software technology. They educate people about a
diverse range of areas, including web page design,
networking, database administration, animation,
graphic design, and programming.
Programmers
A programmer is often confused with a software
engineer, but the two have different roles and
responsibilities. A programmer creates the code
that is used by engineers to design the whole
program package. A programmer also assists
systems analysts in finding out what type of
program the user or client needs. Once the type
of program has been identified, the programmer
translates the solution into a programming
Figure 6.2 Aspiring programmers can now use software such as Toon language. The programmer must also test the
Talk—a video game designed to teach the basics of programming. programs to make sure they work properly.
Chapter 6 People 73
CORE
6.2
Questions
1 List five types of organisations that are 4 Research information technology jobs
significantly affected by technology. advertised in The Australian and Sydney
2 Apart from technical ability, what types of Morning Herald newspapers or use their on-
skills do information technology employers line equivalents. Draw up a table and group
look for in a potential employee? these jobs into three or four categories and
list their educational requirements and
3 Explain the importance of interpersonal skills
salaries.
in terms of a worker in the information and
software technology industry. 5 Outline the potential advantages and
disadvantages of being a self-employed
information and software technology worker.
TER TE
AP
CH
ST
WS
Issues
key words
7.1 Legal issues Purchasing the software entitles the buyer to
become a licensed user. A licensed user is allowed
to make copies of the program for backup
purposes but it is against the law to give copies to
Copyright Copyright friends and colleagues. People who sell software
The right to control the that they have copied without authorisation are
production and
Those who develop software, like those who
write poetry, compose music and paint pictures, considered to be selling stolen goods. Students will
reproduction of work
have a right to control the production and often justify the theft of software applications by
and to receive the
benefits from that work. reproduction of their work, and to receive the saying ‘I could not afford to buy it’, yet they
benefits from their work. This right is called would never dream of justifying the theft of a bike
Piracy
copyright. All computer applications are or DVD player in this way.
The unauthorised
copying of software. copyright, but some software programmers allow
Intellectual property others to use their applications freely or within Intellectual property
A product of the certain limitations. However, for commercial
software programs, it might surprise you to learn Most people agree that it is wrong to steal, and
intellect that has
commercial value. that when you pay for the software, you do not most agree that laws in our society which
actually own it. What you have purchased is a discourage theft of property are important. Yet
Virus
licence to install it and use it on one or more many of the same people have difficulty applying
A software program or a
computers (depending on the type of licence it is). those same principles to intellectual property—to
piece of code that is
loaded onto your In the field of information technology, copyright the creative and innovative ideas that a person
computer without your laws are used to legally license a range of has worked on, perhaps for years of their life,
knowledge and may software programs and, in doing so, protect the and on which their income may depend.
damage, interfere with
intellectual property of the people who have Intellectual property can be referred to as a
or destroy other
created them. product of the intellect that has commercial
programs. value. Under the law you have automatic
protection of your intellectual property for 50
Piracy years from the date of its creation.
The unauthorised copying of software is referred
to as piracy. Most retail programs are licensed for Security and protection
one computer or for one user at any time.
There are also laws designed to protect
information systems and to prosecute people
who create and spread computer viruses. A virus
is a software program or a piece of code that is
loaded onto your computer without your
Figure 7.1 Sharing knowledge and may damage or destroy other
music over the
programs that are on your computer. Viruses can
Internet violates the
spread when a disk containing an infected
copyright laws of
program is inserted into a computer and the
some countries and
infected program is then opened. Viruses are also
the music industry
commonly spread via e-mail and through the
has been increasingly
prosecuting offenders. Internet. These viruses are particularly
Many artists, dangerous because they are capable of
including Australian transmitting themselves across networks and
band Little Birdy bypassing security systems.
(pictured here), allow
audiences to Legislation
legitimately download
their music from the We live in an environment which increasingly
Internet. requires us to rely upon computers, but there are
Ethical
7.2
issues
Codes of practice and
conduct
Codes of practice and conduct are developed by
business and industry groups in order to
promote honesty and fairness in their dealings
with the public and other clients. A code of
conduct is basically a set of rules which sets out,
for customers and staff, the standards of service
to be provided and what can be done if these
standards are not met. Such codes are not Figure 7.2 Antivirus programs are used to detect and delete viruses on all
necessarily legally enforceable, but they are types of computers.
Chapter 7 Issues 77
CORE
7.2
IN
®
OUT
Credit bureaus
Employer
Department Direct mail
stores advertisers
Insurance
companies
Health care
Political providers
organisations
Jury
selection
Banks
Mortgage
Universities companies
and colleges
Charities
Government
Figure 7.3 When an student loans
organisation acquires TUITION Voter
registrations Department of
data about you, it is Motor Vehicles Magazine Com
pute
sometimes shared subscriptions rs
key word and many people are understandably concerned • the electronic theft of money
about the ways in which organisations use and • the theft of information
protect personal and confidential information.
• deliberate vandalism, such as creating and
Questions that are frequently asked in relation to
Hacking spreading computer viruses
the privacy and security of data include:
A colloquial term which Most computers are now connected to the
• What personal details are stored about me
refers to unauthorised Internet. This allows an opportunity for those
access to computer (for example, at school)?
who wish to invade your computer from
systems. • Can this information be used against me in anywhere in the world to peek at the data stream
any way? that you transmit. Internet fraud is a major
• Are there procedures in place to ensure that information and software technology concern.
important information is not accidentally or This type of crime may be committed by hackers
deliberately lost? or company insiders, and often involves illegally
transferring money from one account to another.
Many of the biggest companies in Australia,
Inappropriate use of including the major banks, have been targeted by
information and software computer criminals. In 2002, for example,
automatic teller machine fraudsters robbed St
technology George Bank customers of more than $300 000
There is widespread concern about the by ‘skimming’ (rounding down) account details
inappropriate use of computers, particularly in encoded in the magnetic strips of customers’
regard to hacking. Hacking is a colloquial term cards. It is estimated that eighty per cent of armed
which refers to unauthorised access to computer bank robbers get caught, but only two per cent of
systems. More specifically, hacking can involve computer fraudsters are ever brought to justice.
such activities as:
situation. This is known as data bias. The chart Internet banking has significantly reduced the Data bias
and graph facilities of spreadsheet programs, for need for bank tellers. The manipulation of
example, can easily present trends and On a more positive note, information and data in order to present
relationships which, upon closer examination, software technology is more likely to have a one-sided view of a
changed someone’s work rather than have particular situation.
favour one point of view at the expense of
another. Consider a situation where a company eliminated it completely. Designers and Telecommuting
architects, for example, now use CAD Involves working from
displays a graph showing increased revenue, but
home, using modern
deliberately avoids showing a graph of increased (computer-aided design) software rather than
technology to keep in
expenses. pencil and paper. The development of
touch with your place of
Most problems with accuracy arise from information and software technology has also employment.
incorrect data entry using a keyboard. There are led to many new jobs, such as computer
a number of ways to improve the accuracy of technicians, programmers, web designers and
data entry. Software can check for spelling systems analysts.
mistakes or reject an entry, for example, which Employment trends, such as telecommuting,
has the wrong number of characters. See option videoconferencing and the introduction of the
chapter 10: Database Design, section 10.2, for virtual office have also changed the nature of work
more information. Checking for data entry and enterprise. Telecommuting involves working
errors is known as data validation. from home, using modern technology to keep in
touch with your place of employment. Jobs can be
relocated to places where it is more comfortable,
more convenient or less expensive to live.
Questions
1 Identify three types of computer crime. 5 Outline the codes of practice and conduct
2 Define the term ‘data validation’. that apply to students and teachers at your
3 Why do you think such a small percentage of school?
computer fraudsters get caught? 6 A computer-based crime that has been very
4 State one reason why large companies, difficult to trace is the practice of rounding
particularly banks, may not want the public down or skimming. Research and present a
to know that they have been targeted by report on the practice of skimming and
computer criminals. explain how cyber-criminals are able to make
millions of dollars by stealing small amounts
of money from many accounts.
Chapter 7 Issues 79
CORE
7.3
key words Some of the benefits that telecommuting anywhere. Their office could be in their car, on a
provides for employers include the reduction of train, in a café, or on the beach. Insurance
office running costs, such as rates, electricity and representatives and mortgage lenders are now
heating, as well as the elimination of travel- mobile and are able to travel to client locations
Videoconferencing
related problems which may lead to the late or other places away from the company’s
Using video to link two
arrival of employees. Employee benefits include premises. The basic equipment needed for a
or more people in
different locations. the flexibility to work around family and virtual office is a laptop computer, commu-
personal needs, as well as the elimination of the nications software and a mobile phone.
Equity and access
time, costs and stress associated with travelling
Refers to the belief that
all people should have
to and from work.
It is important to consider the potential
Equity, access and control
equal rights and all
people should enjoy the negative impacts of telecommuting. There is less Equity and access refer to the belief that all
benefits that opportunity, for example, to meet people and people should have equal rights and all people
information and share ideas. Teamwork is also made difficult and should enjoy the benefits (for example, medical,
software technology there may be more temptation to spend time on educational, recreational and financial) that
offer.
non-work-related activities. information and software technology offers.
Control Videoconferencing also raises the issue of Control refers to the power to make decisions
The power to make loss of personal contact. Videoconferencing uses about who does and does not gain access to
decisions about who information and software technology to bring information and software technology. Usually,
does and does not gain
people together despite geographical distances. It large multinational companies and governments
access to information
entails using information and software make these decisions. Unfortunately, not all
and software
technology.
technology to provide a video link between two people benefit from information and software
or more people. Videoconferencing can be technology. Quite often, those on lower incomes
expensive to set up, but is considered relatively are unable to purchase technology or learn how
inexpensive when compared to the travel to use it. Others have difficulty gaining access
expenses associated with face-to-face meetings. due to a disability or because they live in an
Another development in the workplace with isolated community. Recent studies have found
cost-saving potential is the virtual office. The that racial minorities and women had made few
technology currently available allows workers in inroads into high-tech employment. Access and
some industries to conduct business from almost participation can be difficult for some groups
Questions
1 How have computers changed the nature of negative impacts have arisen from the
work and enterprise? introduction and use of information and
2 Outline the potential employee benefits and software technology. Discuss this statement
disadvantages of telecommuting. in relation to legal, ethical, social and
industrial issues.
3 Identify the basic equipment needed for a
virtual office. 7 The web contains many e-zines (electronic
magazines) written by teenagers about
4 Discuss the reasons why telecommuting, issues of importance. Locate one or more e-
teleconferencing and virtual offices have the
zines on the web that explore the concerns
potential to save costs.
of students in your age group. Present a
5 Why do some people find it difficult gaining report on the issues that are identified,
access to information and software paying particular attention to the similarities
technology? and differences between the concerns and
6 Developments in information and software interests of girls as compared to those of
technology have affected people and boys.
communities worldwide. Both positive and
who, for one reason or another, are excluded schools)—they are digital communities stored in
from the information society, or perceive that our mobiles, our e-mail lists and chat rooms.
they are. For example, the elderly, Indigenous Advances in technology have brought
people, women, and people with disabilities are revolutionary changes, but have usually involved
sometimes reluctant to become involved in pain on the part of at least some sections of
information and software technology and lack society. The industrial revolution created a
confidence. They can find technology poorer working class and appalling living
threatening and inaccessible, and frequently lack conditions for many. The computer revolution
the resources to foresee the benefits that will has already had a huge impact on the nature of
accrue from using it. our work and leisure. What will be our
conclusions in 100 years’ time on the overall
The nature of our society social effects of our current computer
revolution?
What will society be like as we rely more and
Understanding digital media brings with it a
more on robots and intelligent agents rather than
responsibility to respond to its potential social
interacting with real people? Medical expert
and political effects.
systems can be used to eliminate tiresome and
repetitive questioning, but may also eliminate a
lot of what makes our lives worthwhile. Many
doctors pride themselves on the quality of their
relationships with their patients. Their
Industrial
7.4
consultations are more than just finding the
medical problem in as short a time as possible. issues
We can see this trend at work already in the
experience of supermarket shopping. In earlier Rights and responsibilities
times, local shoppers had a relationship with the of users
owner of the corner grocery shop, butcher or
chemist. This person knew us and our family, Many organisations attempt to provide quality
and their personal relationships with so many computing facilities for staff, customers and
local people acted as a bond between members of others who are involved with information
that community. It added to the quality of life. technology on a regular basis. These include large
As larger malls gradually eliminated many of and small systems, communication networks and
these smaller businesses, the experience of personal computers, as well as associated
shopping became cheaper in more ways than just software, files and data. Although computers
price! Shopping has become more impersonal— affect how individuals communicate and interact
even lonely—but at least we are still able to talk with each other, computers do not change
with the checkout assistant. Proposed underlying values with respect to the rights and
technological changes in the supermarket, responsibilities of users. In your school, for
however, may eliminate even this personal example, staff and students are expected to act
contact! It is likely that customers will be asked to responsibly so as not to violate the rights of others
swipe their own goods and an automatic weight while they are using computers.
check will check if every item has been swiped. It is impossible to ensure that all users of
We will then be able to shop without information and software technology will act
speaking to anyone at all. Further, if we also do responsibly. At the heart of successful
not wish to travel, we can order our shopping organisations are individuals whose personal
on-line from home via the web and pay by ethics and beliefs are clearly worked out and
automatic credit card deduction. lived out in their lives. Personal integrity is an
Human beings need social interaction. What important part of your life as a student, and it
will we become if there is less of it? Unlike 100 will continue to play a major role in many of the
years ago, our new communities are not personal and professional decisions you make
geographic (made up of local streets, shops and outside school.
Chapter 7 Issues 81
CORE
7.4
front of operator Keyboard Adjustable seatback relationship between machines and the people
support for lower who use them. In the workplace, this includes
back furniture design and the design of parts of the
Padding in front of
keyboard for wrist
computer like the keyboard and mouse. An
alignment and relaxation ergonomically designed workstation takes into
Chair adjusted, account such factors as the distance from the
Footrest if necessary thighs parallel eyes to the screen and the angle of the arms and
for comfort and stability to floor the wrists.
Many legal, ethical, social and industrial
issues arise when we study core chapter 5: Past,
Current and Emerging Technologies. See that
Figure 7.4 An ergonomically designed workstation helps reduce the risk of chapter for further study.
repetitive strain injuries and eye strain.
overuse injuries: WS
3
8 option
Artificial Intelligence,
Simulation and Modelling
CHAPTER OUTCOMES CHAPTER CONTENTS
You will learn about: 8.1 Artificial intelligence 84
• the meaning of artificial intelligence, 8.2 Areas of artificial intelligence 85
simulation and modelling
8.3 Requirements of artificial
• the application of artificial intelligence, intelligence 90
simulation and modelling
8.4 Modelling and simulations 95
• the hardware and software required for
8.5 Requirements of models and
artificial intelligence, simulation and
simulations 98
modelling
8.6 Advantages and limitations 99
• the advantages and limitations of simulation
and modelling programs 8.7 Using modelling and simulation
programs 102
• using simulation and modelling programs
8.8 Project development 106
You will learn to:
8.9 Additional content 108
• define and describe artificial intelligence,
simulation and modelling
• investigate the work of artificial intelligence
pioneers
• identify and examine a range of intelligent
systems and simulations
• design, create and evaluate a simple
simulation
• use spreadsheets to make predictions
• propose advantages and limitations of
simulation and modelling programs
OPTION
8.1
Crime mapping
<In Action> wealther the location, the volume of people in the area, and
Police are using artificial intelligence to predict the timing whether or not the crimes were committed during holiday
and location of assaults and a variety of other offences. periods or sporting events. It is a powerful tool that can be
Deterring or intercepting criminal acts is a difficult task. used for scheduling patrols and predicting illegal activity
There are many different factors that can influence when where there is a discernible pattern, such as assaults.
and where offences take place. Pattern recognition plays a very important role in artificial
Police have for some time used a process called crime intelligence and has already been used to identify a number
mapping to analyse the occurrence of crime. However, it is of trouble spots in various cities.
only recently that advanced artificial intelligence software, In this chapter, we will examine more applications of
capable of predicting crimes with a degree of accuracy, has artificial intelligence, including games and expert systems.
been developed. The software uses various data sources, We will also study a range of modelling and simulation
including the time and date of previous crimes, the systems and examine their application in the real world.
ER
’S RES
Artificial
8.1 • the ability to manipulate objects
OU
TEACH
level at least equal to humans. It asserts that a computer science and the person who launched
computer should be able to compete intellectually the field of artificial intelligence. Turing was a
with human beings on every level, and possibly British mathematician who is widely considered
even surpass us in mental dexterity. This is the to be one of the most important thinkers in the
kind of artificial intelligence that is portrayed in history of computing.
movies like Blade Runner and AI. In 1950, Turing proposed the idea of a test in infobit
There are some who believe that machines which a person uses a keyboard to ask questions of
will eventually reach a state where they are self- two subjects—a person and a machine—who are The Greek philosopher
aware. They believe that computers will be concealed from the questioner. Turing felt that if Aristotle (384–322 BC)
aware of their own existence and understand the questioner could not determine which of the believed that certain
that they are machines. Today’s computer two subjects was the machine, then the machine propositions can be
said to be true
technology is nowhere near this level of artificial was intelligent. Turing’s contributions to computer
because they are
intelligence. In fact, after half a century of science and early artificial intelligence extend well
related to other things
development, artificial intelligence systems have beyond the Turing test, but his proposal was crucial
that are known to be
left us with more questions than answers. in that it suggested the possibility of imitating true. This logical
human thought by using computation. argument forms the
Historical perspectives on basis of many modern
artificial intelligence
artificial intelligence systems.
OU
TEACH
WS
intelligence
RCE
nineteenth century English mathematician whose
Difference Engine was a special-purpose machine
8.3
for computing numbers and was the forerunner of
his Analytical Engine (see Figure 5.1 on page 58). Intelligent systems
The Analytical Engine, designed but not E ALE R
An intelligent system can be defined as a OR
successfully constructed during his lifetime (due
T
C
computer system that receives data, through an 5.1
to lack of funding), was a general-purpose input device such as a mouse, keyboard or Past information
programmable computing machine built on microphone, to produce an intelligent response. technologies
principles that anticipated modern electronic One aim of trying to develop computers with
computers. Perhaps the most striking feature of artificial intelligence is to make them more
Babbage’s work was its treatment of the pattern useful. Despite their limitations, artificial
of an intellectual activity as something that could intelligence systems are considered to be one of
be studied and then represented mechanically. the most exciting fields of computer
It is generally acknowledged that the first development. If you have used telephone
infobit
significant female figure in the field of computing directory assistance, for example, then you have In the 1968 film 2001: A
was Ada King (nee Byron), Countess of Lovelace been a user of an artificial intelligence system. As Space Odyssey, a
(1815–1852), who overcame Charles Babbage’s you speak into the telephone, you are entering machine called HAL
inability to communicate his ideas by translating data. The number sent back to you by the proves its innate
an Italian account of his Analytical Engine into computerised assistant is the intelligent response intelligence by fooling
English. She then added her own notes based on (hopefully it is the correct number). a human into thinking
her knowledge of Babbage’s work and created a that it is speaking to
program for the Analytical Engine, thus making one of its own kind.
her the first computer programmer.
Games The movie, and the
In 1956, a computer scientist by the name of After an explosion of research and development book that it was based
funded largely by software giants, computer upon, anticipated the
John McCarthy coined the term ‘artificial
development of
intelligence’. Alan Turing (1912–1954), however, games are now one of the most widely available
artificial intelligence.
is considered by many to be the founder of examples of intelligent systems. Many games
Activities
the Help menu to bring up a list of instructions human intervention. The term comes from Greek
from its knowledge base. mythology, where daemons were guardian spirits.
A public library, a database of related You have possibly noticed the words ‘mailer
information about a particular subject, and the daemon’ in the header of an e-mail message. If an
key words
Internet site HowStuffWorks could all be email is incorrectly addressed, a mailer daemon
considered examples of knowledge bases. In can generate an automated message to the sender
relation to information technology, a knowledge stating that the message was undeliverable. The
base can provide on-line explanations for demon performs this task without the user Knowledge base
problems. A well-organised knowledge base can having to start the program. These types of A centralised repository
save an organisation money by decreasing the demons are common on computers that function for information.
amount of employee time spent trying to find as servers. Demons (or daemons)
information, for example, about tax laws or Intelligent processes
company policies and procedures. As a customer Agents that run in the
background of computer
relationship tool, a knowledge base can give
customers easy access to information that would Agents are similar to demons and typically spend programs and attend to
most of their time waiting for an event or period various tasks without
otherwise require contact with an organisation’s human intervention.
staff. Your school’s website, for example, may when they will perform some task. The ability to
provide access to a knowledge base which assists automatically correct spelling in a word processing
its staff, students and the public to locate document is an example of a task carried out by an
information about the school. agent. If the letters ‘yuo’ are typed, for example,
Some other advantages of on-line knowledge most word processing programs will automatically
bases include: change them to ‘you’. The user of the program may
• cheaper distribution and easier maintenance not even notice that this has happened. Agents can infobit
of information on the web learn what to do for each individual user,
In 1997 the world
• availability of up-to-date information, sometimes without the user’s permission.
chess champion, Garry
anytime, from anywhere in the world Kasparov, lost to IBM’s
• searchable information, making access Expert systems computer, Deep Blue.
faster During the matches,
An expert is a person who possesses specialised Kasparov reported
skill, experience and knowledge that most people signs of ‘mind’ in the
Demons do not have, along with the ability to apply this machine. He worried
Demons (or daemons) are intelligent processes knowledge, using tricks, shortcuts and rules-of- there might be humans
behind the scenes
that run in the background of computer thumb to resolve problems efficiently. There are
helping Deep Blue.
programs and attend to various tasks without never enough experts to go around. Certainly
Activities
key words experts are not always available at the right place
at the right time and some jobs are so specialised
that there are a limited number of people who
Expert
can do them. If an organisation employs
somebody with specialised skills, problems may
One who possesses
specialised skill, arise if he or she becomes ill or takes a holiday.
experience and Fortunately, there are artificial intelligence
knowledge, along with systems which can provide expert information to
the ability to apply this decision-makers when a human expert is not
knowledge, to resolve
available. These systems are known as expert
problems efficiently.
systems. An expert system is a computer program
Expert system
that contains stored knowledge and solves
A computer program
problems in a specific field, such as medical
that contains stored
knowledge and solves
diagnosis, financial investment or even
Figure 8.2 Fingerprint expert systems are able to
problems in a specific agriculture. An expert system could, for example,
quickly compare millions of fingerprints. By
field. be one of the most useful tools for providing
using such systems, police can make important
farmers with the day-to-day specialist soil and
decisions about matches without having to
weather information needed to grow their crops consult a fingerprint expert.
in the most efficient way.
In an expert system a knowledge engineer
translates expert knowledge into terms that can
Medical expert systems
be understood by a computer. Medical expert systems are perhaps the most
impressive and valuable expert systems. Some of
the specific tasks they perform include:
Expert systems and the Internet are now being The system also uses historical data to
used in some cities to help people cope with the predict how traffic conditions will change by the
complex and frustrating problem of traffic time the driver is expected to arrive. In other
congestion. Personalised routing services can words, it doesn’t divert drivers around
advise drivers as to the best way to get to their congestion that can be expected to clear up by
destination and how long the journey is likely to the time they arrive. Conversely, it does divert
take. The system accesses traffic information from drivers away from areas that are currently clear
roadway sensors, and bases its recommendations but have a high probability of becoming
on real-time data. Real-time data is immediate, up congested. E ALE R
OR
to the second, because the data is recorded at the 6.1
T
C
same time the events are occurring. Neural networks Roles and
responsibilities
Neural networks are systems that are designed to
solve problems in a manner that imitates the way
the human brain works. Also called artificial neural
networks (ANN), one of the purposes of neural
networks is to learn to recognise patterns in data.
Once a neural network has been trained on
samples of data, it can make predictions by
detecting similar patterns in future data. For key words
Financial systems
Artificial intelligence systems are more adept
infobit
than humans at determining complex patterns.
Early speech recognition Credit card providers, telephone companies,
software could not banks and government departments all employ
understand female artificial intelligence systems to detect fraud and
voices because the to process financial transactions more quickly.
underlying technology Neural networks are used to detect unusual
was based on Figure 8.5 Though the field is still in its infancy, patterns that suggest credit fraud, and take the
recognising the lower many people believe that biometrics will play a appropriate action (such as disabling the credit
tonal range of the male critical role in future computer technology. card). By studying the habits of credit card users,
voice.
their pattern recognition systems develop a keen
Other areas where neural networks are used
eye for unusual or deviant behaviour.
include:
• speech recognition
• weather forecasting
• optical character recognition (OCR) 8.3
Requirements
key word
Speech recognition systems of artificial
Speech or voice recognition is the field of
artificial intelligence that deals with designing intelligence
computer systems that can recognise spoken
Speech or voice
recognition
words. Recent advances in speech technology Software
have led to a whole new range of systems that are
The field of computer Artificial intelligence systems require software
considered to be very reliable.
science that deals with that will enable them to make logical decisions
designing computer
Speech recognition systems can now
and respond intelligently to the inputs that they
systems that can authenticate voice characteristics so that workers
receive. Conventional computer software solves
recognise spoken words. are able to gain access to buildings. In this way,
problems by using step-by-step algorithms.
buildings can be physically secured using just a
Artificial intelligence programs also carry out the
telephone. These systems work by having a
tasks they were programmed to execute, but they
person speak into a telephone handset, creating a
do it in a more complex way. The response that
voiceprint that is sent to a computer for
an artificial intelligence system gives is
verification. It has to be a live voice, as a tape
E ALE R
supposedly its own—it hasn’t necessarily been
recording of the voice will not actually replicate
OR planned by programmers.
that person’s voiceprint. The computer will
T
C
T
C
Current and
Past, current and emerging technologies Biometrics emerging
technologies
The study of measurable biological characteristics is to create a unique ‘signature’ based on a person’s gait, and
known as biometrics. In computing terms, biometrics leg and arm movements. The resulting technology could be
refers to the identification of people using their biological used to aid police in locating suspects by scanning large
attributes. Apart from speech recognition, other examples crowds of people for those who have a particular manner of
of biometric techniques include fingerprint and retina walking. In simple terms, the system would attempt to find
scanning, iris pattern matching, and facial recognition. a unique, but reproducible, signature in a person’s style of
As the use of computers becomes more widespread, movement by sending out a radar pulse and receiving back
information technology researchers are increasingly a reflected signal from the person being examined. Health
looking at ways for people to interact with them without care providers could also use the technology to evaluate the
the use of a keyboard. Cars, for example, may someday changes in a person’s gait caused by conditions such as
rely on voice-activated systems. Parkinson’s disease and multiple sclerosis.
Artificially intelligent systems are also being developed
which might allow aeroplanes and trains to be fitted with
voice authentication equipment that only allows
authorised drivers to take control of the steering wheel.
Questions
1 Define the term ‘biometrics’.
Personal computers of the future might include a
fingerprint scanner. The computer would analyse your 2 Outline the factors that constitute a person’s unique
fingerprint to determine who you are and, based on your walking signature.
identity, allow you different levels of access. 3 Describe some of the problems that make biometrics
Artificial intelligence researchers in the United States such a challenging area of artificial intelligence.
are studying ways to identify and track you by the way you
walk. The research aims to use radar and computer vision
Activities
Games
The latest generation of computer games can
display seemingly unscripted behaviour.
Characters in the games exhibit new ways of
responding to their world, and display strategies
and behaviours that were not deliberately
planned by the designers. For example, if you as
a player punish your character after he devours a
E ALE R villager, you may find him refraining from eating
OR altogether for a while, because he will have
T
C
Issues Employment
Since so many tasks are being performed by artificial intelligence systems will create more jobs than they
intelligence systems, they pose a threat to human eliminate.
employees. Although they occasionally need repair, It is important to remember that, even when a job is
computers do not require sleep, they do not get tired, they not eliminated by computers, it can be radically altered.
do not go home ill or take time off for rest and relaxation. For example, airline pilots still sit at the controls of
At the same time, computers are often far more efficient commercial airplanes, but during much of a flight the pilot
than humans in performing many tasks. Therefore, simply observes and monitors as a computer flies the plane.
economic incentives to replace humans with computerised Similarly, those who prepare food in restaurants or make
devices are very high. Indeed, in the industrialised world products in factories may still have jobs, but often they
many workers already have been replaced by artificial simply push buttons and watch as computerised devices
intelligence systems—bank tellers, car workers, telephone actually perform the needed tasks.
operators, typists, graphic artists, security guards, In this way, it is possible for computers to cause the
assembly-line workers, and so on. In addition, medical deskilling of workers. Deskilling means that workers’ skills
doctors, lawyers, teachers, accountants and psychologists are no longer required by an industry, making active men
are now finding that computers can perform many of their and women redundant or turning them into passive
traditional duties. observers and button pushers.
The employment outlook, however, is not all bad.
Consider, for example, the fact that the artificial intelligence
sector of the computer industry has already generated a
Questions
1 List five information technology jobs that were not in
wide variety of new and existing jobs: hardware engineers,
existence twenty years ago.
software engineers, systems analysts, mechanical engineers,
knowledge engineers, journalists, information technology 2 Discuss the economic incentives of replacing humans
teachers, computer sales clerks, and so on. Even though with computerised devices.
most of these jobs are associated with information 3 Explain how computers have altered the skills used
technology and therefore not necessarily desired by all by some workers.
workers, it is hoped that in the long run, artificial
T
C
are two if–then rules that have been designed as whether or not to investigate the pattern deviation. 4.1
Data and
a result of talking to the plumber. information
Rule 1:
Natural language software
IF you have a leaky tap AND ELIZA is a program which makes natural
IF the leak is in the handle language conversation with a computer possible.
THEN tighten the washer nut. (Conclusion) When in conversation with ELIZA, the user
Figure 8.8 This whale identification expert system uses the web to help whale watchers to identify
whales. As with most computer applications, expert systems typically have user-friendly interfaces. A
friendly interface doesn’t make the system’s software work any more smoothly, but it does enable
inexperienced users to specify problems for the system to solve and to understand the system’s
conclusions more easily.
key word types in a statement or a set of statements using mention computers?’ ELIZA recognises the text
normal punctuation and sentence structures. The ‘I am’, but proceeds as if the user has typed
procedure of the program is quite simple: the something like ‘I am happy’. Since there is no
Inference engine
input is read and inspected for the presence of a word following ‘I am’, ELIZA’s response ‘How
key word (‘mother’, for example). ELIZA long have you been?’ makes little sense.
The part of the expert simulates understanding by identifying
system software
that makes a
categories for some of those words (‘family’), Hardware
recommendation for the
and repeating phrases from earlier statements.
Here is an example of a conversation with Artificial intelligence systems generally require
user.
the ELIZA program (the lines in italics are the hardware that can deal with large amounts of
machine responses): storage and quickly execute complex tasks.
How do you do? Please state your Speech recognition, for example, relies upon
problem. powerful processors in order to complete tasks
I spend too much time with computers. speedily. Consider the sentence: ‘I wannuh
Why do you mention computers? drink’. A speech recognition system should
You are one. generally recognise the sentence as ‘I want a
Does it please you to believe I am one? drink’. In order for the recognition to take place,
Yes. the processors have to quickly work through
You seem to be quite positive. enormous databases of sound patterns and
I suppose I am. libraries of written and spoken language that the
How long have you been? system designers have collected. This allows the
system to evaluate all the possible sentences that
The above transcript shows ELIZA’s
might have produced this group of sounds and
limitations fairly clearly. The program selects a
then decide which sentence is the best match.
key word, such as ‘computers’, and makes it the
The huge amount of audio data used by
subject of its next question: ‘Why do you
voice recognition systems means that they also complicated, like a model of the earth’s climate. key words
need large hard disks for data storage. Devices The process of creating a model is called
such as microphones are needed to capture the modelling. Modelling is a basic and common
voices of users of the system. Speech and other human activity, and from an early age many Sound card
sounds that microphones pick up are referred to people learn to represent objects as a model. As
as analogue data. Electronic circuits in the well as being a fun and enjoyable pursuit, Enables a computer to
manipulate sounds.
computer, which usually take the form of a building a model enables you to gain a better
sound card, help change the analogue sounds understanding of the object in question. Resolution
into digital data. Take a model ship for example. Small-scale The number of pixels
used to display a
replication shows how the masks, decks, rudder
Games and hull of a ship work together. The model-
graphic; the quality of
the graphic improves as
Games have to process data very quickly. As you making process offers more insight than the mere the resolution increases.
speed around a racing car track, trying to avoid act of reading or looking at pictures. It provides
Model
other vehicles and occasionally bumping into an in-depth understanding of the way a ship floats
A simpler version of a
them and other objects, the game responds very and moves. Of course, a model is no substitute for
real world object or
quickly to your actions. Your actions are the real thing, but if you live far from the sea or if idea.
detected by the game through a keyboard, the boat no longer exists (e.g. a medieval vessel),
Modelling
mouse, joystick, control pad, or some other then a model is the next best thing.
The process of creating
hardware device. a model.
High resolution monitors are also important What is a computer model?
in playing games in order to heighten the impact A computer model can generally be described as
of the graphics and animations. Resolution refers E ALE R
an electronic imitation or copy of an object or OR
to the number of pixels used to display a graphic;
T
C
idea. Computers can be used to create models of 2.2
the quality of the graphic improves as the all sorts of things, including cars, buildings, Hardware
resolution increases. aeroplanes, hair dryers, personal budgets,
components
OU
TEACH
WS
RCE
Simulation is the process of imitating real-life 8.4
What is a model? occurrences in order to test a model. A computer
simulation, therefore, generally tests a computer
A model is a simpler version of a real world model. Testing the computer model of a house to
object or idea. A model can be relatively simple, see what would happen to it in an earthquake is
like a model aeroplane, or something more an example of a computer simulation. Testing
Activities
Identify Analyse Investigate
1 How many if–then rules might an expert system 5 Discuss the importance 7 Use an Internet search engine
typically contain? of processors in speech to locate an example of the
recognition systems. ELIZA program. Have a
2 Give an explanation of the term ‘rules of thumb’.
6 Why are high resolution conversation with ELIZA and
3 Identify the main function of an inference discuss whether or not you
monitors important for
engine. think that it is an intelligent
artificial intelligence
4 Identify the person who is largely responsible for games? program.
building an expert system.
key words
Task If–then rules
1 Rearrange the following group of words and phrases into two separate if–then rules:
Computer model
the animal is a if you have a high and you have a headache
An electronic
penguin temperature
representation of an
object or idea. you have the flu and you also have and it does not fly
cold-like symptoms
Simulation
The process of imitating
and if it swims it is black and white and the animal is a bird
real-life occurrences in then then if if if
order to test a model.
Table 8.1
2 Identify the problem that each rule may be attempting to solve.
3 Identify the type of expert that may have provided the knowledge for each rule.
4 Write a set of if–then rules for deciding whether an animal is a cat or a dog.
5 Here is an if–then rule for selecting a suitable location for an industrial area.
IF the land is flat AND
IF there are good transport and communications services available AND
IF it is not in a residential area AND
IF there is a main road nearby AND
IF there is a water supply
THEN it is a suitable location for an industrial area.
Use this rule as the starting point for developing an expert system for deciding whether or not
an area is suitable for industrial or residential development. Design another rule that could be
used for identifying a suitable residential area.
6 Enter both rules into an expert system shell (your teacher or system administrator may need to
download an expert system shell if one is not already installed on your computer).
WS
RCE
T
C
7.3
Social issues
Past, current and emerging technologies Haptic systems
Medical applications are constantly being produced using doctor at a later time or by a physician at another location.
simulation and modelling systems, and there are some By wearing the glove, any physician can play back a
interesting developments on the horizon. Researchers are re-creation of an examination and simulate it as though
especially hopeful about an area of computer science called they are performing it in real time.
haptics. In the future, there may be a way for doctors at distant
Haptics is the science of applying tactile (relating to locations to share the experience of an examination by using
touch) sensation to human interaction with computers. A haptics. Currently, in cases where a patient has been
haptic device is one that involves physical contact between diagnosed at a rural hospital, the patient may have to be
the computer and the user, usually through an input/output airlifted to a larger medical facility for further examination.
device such as a joystick or data gloves, which sense the
body’s movements. By using haptic devices, the user can Questions
not only feed information to the computer, but can receive 1 Define the word ‘haptics’ and provide a description of
information from the computer in the form of a tactile a haptic device.
sensation on some part of the body.
An electronic glove is being developed that records 2 Explain the reasons why a haptic glove can serve as
what a doctor feels with his or her hands during a patient both an input and output device.
examination. This new virtual-reality glove will collect 3 Outline the advantages of medical haptic devices as
data during an examination through sensors located in the described above and propose any concerns that such
glove’s fingertips and store it in a computer database. devices may raise.
Stored information can then be accessed by the examining
Activities
Requirements
8.5 Simulators
A simulator is a hardware device that artificially
infobit
of models and imitates the conditions likely to be encountered
The Greek word ‘haptic’ in some activity. Our lives are full of primitive
means ‘to touch’. One
day, on-line shoppers
simulations simulators. Rocking horses, for example,
simulate the feeling of riding a horse for young
may be able to ‘feel’ a Computer modelling is a process that is similar to children.
piece of silk simply by that of building a model out of scrap materials.
touching their computer
Advanced computer programs can simulate
The main differences are the materials—using weather conditions, chemical reactions and
screens. They may
even be able to poke
software and hardware rather than detergent atomic explosions. Simulations are often applied
at vegetables through bottles, toilet-roll tubes and cereal packets. to dangerous, historical or time-consuming
the computer. activities. In theory, any situation that can be
Hardware reduced to mathematical data can be simulated
on a computer. In practice, however, simulations
Generating and processing graphics for
key word can be extremely difficult to program. Most
modelling and simulation systems involves
natural situations, for example, involve so many
considerable processing time. Modelling and
parameters that it is difficult to define them and
simulation systems therefore require hardware
Parallel processing their interrelationships correctly.
which is capable of very fast processing.
The linking of two or Modelling and simulation programs are most
more processing units
suited to computers that have many processors Flight simulators
within the one
computer. which can work in parallel with each other. Flight simulation demands a great deal from
Parallel processing involves the linking of computer hardware. A flight simulator generally
two or more processing units within the one consists of four hardware components:
computer. If we consider a processor to be • a working replica of the interior of the
comparable to the human brain, then parallel cockpit of an aircraft
ER
’S RES processing simply provides a computer with • computers
OU
TEACH
2.3 require significantly more processing power. of an aircraft. The instrument readings, the
Microprocessors position of the simulator, information about the
It is important that there is a large amount of
storage space in order to hold the graphical data characteristics of the aircraft being simulated,
needed to ensure computer models and and details about the terrain over which it is
simulations are realistic and accurate. supposed to be flying are co-ordinated by a
T
C
the cockpit alone, as the fuselage and other parts 3.2
using a simulation language Types of
of the plane are not necessary. software
appears to jump ahead or lag behind their own threatens to alter the climate of the whole world. These are specifically
movements. It is now widely accepted that global warming designed to allow the
will lead to a rapid and unprecedented rise in the user to create models
average temperature of the Earth within the next and then test the
Software fifty years. models in a simulated
environment.
Modelling and simulation programs are Computer-generated climate models and
Activities
simulations promise to significantly improve our understand how global warming and damage to
’S RES ability to predict long-range climate trends and the ozone layer may have an impact on the
ER
to tackle a wide spectrum of other environmental occurrences of droughts, floods, hurricanes and
OU
TEACH
WS
RCE
key word
• ice- and snow-covered regions and simulations must simplify a very complex
• land surfaces with vegetation cover climate system. There will continue to be a limit
to the extent that climate can be predicted,
largely due to the limited existing understanding
Weather forecasting of the climate system and to the limited
Some of the world’s most powerful computers capabilities of computers to simulate all key
are used to forecast the weather. The accuracy of climate factors. Climate models and simulations
forecasts is improving all the time and many must therefore be used with care and their results
people such as farmers and those in the fishing interpreted with these considerations in mind.
industry rely on these forecasts. Weather
forecasting depends on observational data such
as temperature, pressure and humidity.
Other advantages and
Numerical weather prediction is the process of limitations
obtaining an objective forecast of the future state One of the main advantages of modelling and
of the atmosphere by running a computer model. simulation programs is their ability to allow users
As the computer model is improved, the to model dangerous situations safely. Consider the
accuracy of the weather forecasts increases. advantages of flight simulator programs:
Despite their importance, climate models are • various flying conditions can safely be
not considered to be totally reliable when it presented to the pilot, e.g. poor weather or
comes to predicting climate change. Given the night flying
complexity of the global climate system, it is not
• emergency situations can be simulated
surprising that there are some discrepancies
without danger, e.g. frozen runways, fog or
between the climate changes simulated by
engine failure
models and actual observations. Weather models
’S RES
simulation Investigate
ER
programs
OU
TEACH
Goal seeking is a function of spreadsheets which Look-up tables are useful when you want to
allows choices to be tested and results to be seen compare a particular value to a set of other
Goal seeking
before a real decision has to be made. Goal values. Let’s say your teacher wants to assign
seeking works by determining the final figure grades to students based on the following scale: A function of
spreadsheets which
first and working backwards from there. We can • below 50 E
allows choices to be
use Uncle John and his loan to make this concept • at least 50 but below 60 D tested and results to be
clearer. He has now decided that he can only • at least 60 but below 70 C seen before a real
afford to repay a maximum of $1500 per month. decision has to be made.
• at least 70 but below 80 B
This is going to put restrictions on the size of his
• and 80 or above A
loan and his choice of car (see Figure 8.20).
As soon as your teacher enters
a mark for a particular student, the
mark will be compared to the
values in the look-up table and the
spreadsheet will automatically
assign a corresponding grade.
Figure 8.20 This goal seeking simulation indicates that if Uncle John limits his
monthly payments to $1500, the maximum amount he can borrow will be $14 560.
Figure 8.21 Spreadsheets are often initially designed using a pen-and-paper model.
Activities
Identify Analyse Investigate
1 Outline the purpose of 4 Imagine a scenario where you need 7 Name three simulation programs and
changing data in money for an end-of-year holiday. list the variables that they use.
model and simulation How could the goal seek function in 8 Many people think that spreadsheets
programs. spreadsheets help you save the belong solely within the domain of
2 Explain how required amount? accountants and others dealing with
spreadsheets may be 5 Discuss the problem-solving financial calculations. Investigate and
used in business and capabilities of spreadsheets. make a list of other areas and
education. 6 What are two advantages of occupations where spreadsheets are
3 Explain the purpose of spreadsheets programs when compared used extensively.
what–if predictions. to non-computerised alternatives?
Figure 8.22 There are a number of tasks associated with managing an overseas tour.
Project
8.8 project is the income and expenses associated
with managing a two-week concert tour. Using a
spreadsheet, the income and expenses of the tour
development can be represented. If the data changes in real
life, then the spreadsheet can be changed easily
to reflect this.
OR
E ALE R Managing an overseas tour
T
C
1.1
Defining the
You may have already had some experience of Defining and analysing the
the processes that take place when developing a
problem
computer-based project. Your project in this
problem
chapter will essentially involve the use of a You have just been employed as the manager of
spreadsheet program to model a financial your favourite band (or musician or recording
scenario. As well as predicting future trends and artist). The band members are currently in
E ALE R helping decision-making, spreadsheets can be England and have decided that they want to go
OR used to study running costs and profit margins. on a two-week tour of Australia. The tour will
T
C
1.2 A spreadsheet can be considered to be a model of comprise one concert in each of the
Designing
solutions the scenario it represents. following: Sydney, Brisbane, Melbourne, Perth,
The scenario you are to represent in your Adelaide, Hobart, Canberra and Newcastle.
As manager, you are responsible for a ballooning. You must research and calculate
number of tasks. You must create a tour budget the cost associated with these activities
which takes into account all expenses associated (multiplied by the total number of members
with the tour and which will allow a variety of in your band) and include them in your E ALE R
OR
financial simulations to take place. In addition, budget.
T
C
the band members know that you have very
1.3
• Your spreadsheet should be designed so that Producing
good graphic design skills and have asked you to you can make a range of calculations about solutions
design a T-shirt and CD cover. the financial success of the tour. Tickets will
You must also assemble a touring itinerary sell for $65. Twenty-five per cent of this
which includes one concert in each city as well as will be paid to the venues and promoters. It
all the other activities that you arrange. The is expected that the tour will be completely
band members (assume for the purposes of this sold out, generating 12 000 ticket sales in
project that they have never been to Australia total. Based on previous tour experience,
before) have also requested some general assume that one in every five concert–goers
information about Australia, including its will purchase a T-shirt and one in every ten
indigenous culture, history, geography, climate, will purchase a CD. Each T-shirt sale will
language and major attractions. return a profit of $18, while $15 profit will
be made on each CD.
Designing possible • Make a list of all the concerts and activities
as well as the corresponding dates.
solutions • Use the Internet to research the costs
• A spreadsheet will be needed to manage the associated with air travel, accommodation, E ALE R
running costs of the tour and to forecast car hire, visiting places of interest, and OR
T
C
potential profits or losses. Sketch a simple pen- anything else you think will arise. 1.4
Evaluation
and-paper model of a spreadsheet that will • Collect some ideas for your T-shirt and CD
keep track of your band’s budget. Some cover by examining other CD covers and
expenses are already known to you, including: T-shirts.
— insurance $8500 • Research Australia’s history, geography,
— equipment transport $4000 climate, etc.
— road crew $7000
— manager’s wages $5000
Producing solutions
— band allowance $4000 • Implement your design using a spreadsheet
— miscellaneous expenses $1000 program. Produce a pie graph which
You need to research the other expenses, displays all your expenses as a percentage of
including: the total tour costs.
— airfares, international (return) and • Use a word processing program to create an
domestic itinerary for the two weeks. This itinerary
— accommodation should include details about every day of
— car hire the tour.
— meals • Use a desktop publishing program to design
— visiting places of interest a pamphlet or brochure containing the
general information on Australia that the
— other expenses that you think may arise
band members have requested.
during the tour
• Use a graphics program to design a T-shirt
• You have asked the band members what they
and a CD cover (front only).
would like to do in their spare time on tour
and they have nominated the following
places of interest and activities: a museum,
an aquarium, horse riding and hot-air
Evaluation 8.9
Additional
• Use your spreadsheet to answer the
following questions: Content
— How many tickets, CDs and T-shirts
will need to be sold in order to cover
expenses? Spreadsheet design
— How many tickets will need to be sold
to earn the band a $10 000 profit for Spreadsheets should be designed with the
the tour? following criteria in mind:
— What if ticket sales are slow and the • accuracy—all the text, numbers and
band decides to spend $5000 on extra formulas should be correct
E ALE R
promotion. How will this affect the • clarity—the spreadsheet should be easy to
OR number of tickets required to cover understand and use
T
C
3.2 expenses?
Types of • flexibility—it should be straight forward
software — What if the band’s percentage of ticket
to modify the spreadsheet should the need
takings was reduced from 75% to
arise
65%? How would this affect the
number of ticket sales needed to cover
key word expenses? Macros
• Use a calculator to test the accuracy of the Macros are little pieces of programming which
above calculations. you can store in an electronic spreadsheet. They
Macro • Print your spreadsheet (including graph), initiate a series of instructions and are often used
Little pieces of itinerary, general information about to automate repetitive tasks. You can create a
programming which you Australia, T-shirt and CD cover. Show them macro if you have any sequence of actions that
can store in an to other students in your class and ask their you want to carry out.
electronic spreadsheet opinion of your project. The usual way to create a macro is to
to help automate
‘record’ it (most electronic spreadsheet programs
repetitive tasks.
will have this command). That is, you carry out
a sequence of actions and tell the spreadsheet
program to remember them. It is important to
Figure 8.23 The end result from motion capture is basically the motion of the ‘skeleton’.
remember to stop the macro when you are be used to capture movement data from various
finished recording. When you record, it live sources and this data is then transmitted to a
remembers everything that you do, so make sure computer, where it is displayed by three-
you that you only record what you want the dimensional simulation software. Motion
macro to do. The spreadsheet program will ask capture information can be used to better
you to assign a shortcut key to the macro—try to analyse a person’s movements for medical
use something that you can remember that isn’t reasons or sports performance, or could be used
already in use by the program (Ctrl+C to create more realistic virtual characters for
(Windows®) or Cmd+C (Macintosh®), for films or computer games. For further
example, will already have been assigned to the information, see option chapter 11: Digital
Copy command). Media.
You can then ‘run’ the macro to tell the Motion capture has been used for many
program to repeat the actions recorded. years in computer games. However, it is only
recently that it has made an impact in the film
Simulation software industry. In The Lord of the Rings: The Two
Towers, motion capture enabled the creation of
Motion capture Gollum, a creature which critics have referred to
as the screen’s first fully realised, truly believable
Optical motion capture involves minutely computer-generated character. Motion capture
recording the movements of performers and technology was also used in the creation of the
objects in order to model them and simulate their film versions of The Hulk and Spiderman.
movements on a computer. External devices can
Activities
Identify Analyse Investigate
1 How are spreadsheets initially 5 Explain motion capture 7 Examine and explain
designed? software and describe the operation of
2 List three criteria that should how it operates. motion capture
be kept in mind when 6 Outline the reasons why software in one of the
designing spreadsheets. motion capture software following areas: sport,
3 Explain the word ‘macro’ in is used for simulation dance or animation.
terms of its application to purposes.
spreadsheets.
4 Outline how macros are created
in spreadsheets.
chapteroverview
Artificial intelligence is a field of study in computer science. Models and simulations are valuable in cases where it is too
Artificial intelligence began as an attempt to answer some of expensive or dangerous to experiment with a real system.
the most fundamental questions about human existence by They have become an important tool in areas such as
understanding the nature of intelligence, but it has grown business, medicine, science, entertainment and education.
into a scientific and technological field affecting many aspects Modelling and simulation systems require hardware
of society. which is capable of very fast processing. It is also important
Artificial intelligence is used by financial institutions, that modelling and simulation systems have a large amount
scientists, medical practitioners, design engineers, of storage space in order to hold the data needed to make
government departments and game designers, among many accurate predictions.
others. The goal of artificial intelligence is to produce systems Computer-generated models and simulations offer a
that utilise behaviours and decision-making skills that are number of advantages; for example, the ability to
similar to those used by humans—in short, to create or mimic significantly improve predictions of long-range climate
intelligent behaviour. trends, as well as to tackle a wide spectrum of other
Artificial intelligence systems can do many different environmental concerns, such as global warming.
things. They can play games, predict share values, diagnose Spreadsheets are often used to model financial situations.
diseases, improve traffic flow, recognise voices and faces, and As well as predicting future trends and aiding decision-
forecast the weather. Artificial intelligence techniques are also making, they can also be used to study running costs and
applied in systems that are used to browse the Internet. profit margins. Spreadsheet programs offer a number of
There are many social and ethical issues associated with advantages over non-computerised alternatives.
artificial intelligence systems. Of particular concern are their However, it is important to remember that although
effect on employment and their ability to invade the privacy computer models can accurately represent real-world objects
of people and to make unwelcome predictions about their and situations, they are not perfect. Like a physical model,
behaviour. the success of a computer model reflects the level of
A model is a simpler version of a real-world object or understanding of its designer and the capabilities of available
idea. The process of creating a model is called modelling. information technology.
TER TE
AP
CH
ST
WS
3
9 option
Authoring
and Multimedia
CHAPTER OUTCOMES CHAPTER CONTENTS
You will learn about: 9.1 The beginning of a revolution 113
• what multimedia is 9.2 What is multimedia? 114
• where multimedia is heading 9.3 Types of multimedia products 115
• types of multimedia products 9.4 Multimedia data types 119
• multimedia data types 9.5 Multimedia hardware 125
• authoring software systems 9.6 Processes used with multimedia
• how to plan a multimedia product data types 129
• multimedia issues and people 9.7 Authoring software systems 130
You will learn to: 9.8 Developing a multimedia product 136
• define, describe and assess multimedia 9.9 Project development 143
products 9.10 Additional content 144
• recognise multimedia data types
• manipulate multimedia data types
• select appropriate multimedia authoring
software
• survey users and describe a target audience
• identify the purpose of a multimedia product
• use appropriate design principles including
interface design
• research and develop multimedia content
• create a storyboard and script
• design, produce and evaluate a multimedia
product for a given purpose
OPTION
9.1
The beginning
9.1 Images from movie projectors were
combined with stills from many slide projectors. infobit
The images faded and merged on projection
of a revolution screens, multi-channel sound filled the room, 3D
Jonar C. Nadar, in
Prentice Hall’s
holographic images appeared, and animations Illustrated Dictionary of
The word ‘multimedia’ has not always been swept across screen in 180-degree panoramas. Computing, suggests
associated with computers. The term was used Visitors were exposed to life in another that we will see the
long before the arrival of the desktop computer. country, or took a journey in space, or perhaps day when newspapers
If you had been a visitor to any of the learned about some scientific breakthrough. have disappeared and
pavilions to the Brisbane World Expo in 1988 Even non-digital multimedia can be an cinemas will have
you would probably have seen a multimedia exciting experience which appeals to at least two turned into parking
production, but it would not have involved a of our senses (sight and sound), and sometimes stations attached to
computer! An expo (short for ‘exposition’) is a holographic, virtual
even smells, which involves our olfactory sense
six-month show where the nations of the world reality cyber-interactive
as well. At the 3D movie at Movie World™ on
multimedia theatres!
advertise their best features. the Gold Coast, touch (our tactile sense) is
WS
RCE
• animation
9.1 • video
We could say that a book with graphics and organising and displaying words, pictures, ’S RES
ER
text is a multimedia product when viewed on a sounds, animation and film. It also gives users a
OU
TEACH
WS
RCE
computer, however we usually restrict the term
to products with at least three of the above
choice of what they wish to view.
Using these five media types, multimedia
9.2
media types. software gives structure to data, and displays it
A multimedia production is just a new way as highly useful information, involving most of
of telling a story or of giving instruction. our senses.
With computer-based multimedia, another
element can be added: interactivity. The user can
click a computer mouse on highlighted text or a
graphic, and a link will transport them to related Types of
9.3
information on another ‘page’ or screen. This
aspect is often categorised separately, and
interactive media are known as hypermedia.
multimedia
Any one of the five major multimedia
elements can be given this kind of interactivity
products
and turned into hypermedia, although most Multimedia wears various disguises. You may
hypermedia is still text-based. When you click on not imagine when you are surfing a favourite
the highlighted words on a web page, you are website or prowling corridors looking for
following a link called hypertext. enemies that you are using multimedia.
E ALE R
Multimedia offers us a powerful way of It can be helpful to group multimedia OR
5.2
T
C
Current
Past, current and emerging technologies and emerging
technologies
Activities
Identify Analyse Investigate
1 Name the five multimedia 4 Describe a multimedia product which you 6 Modern computer operating
elements. have viewed as a member of an audience. systems (OS) use multimedia
2 What is the name given List the multimedia elements used by the elements increasingly as an
to the navigational media designers and identify whether they were important part of their graphical
elements in multimedia? computer- or non-computer-based. Discuss user interfaces (GUIs). Examine
3 What is a major how effective you found the event. both the latest Windows® OS and
limitation of the CD-ROM 5 A famous Chinese proverb is: ‘I hear and I Macintosh® OS. Use columns with
as a storage medium for forget, I see and I remember, I do and I the headings: text, audio, graphics
multimedia? understand’. Do you agree with this? In and animation to collect examples
what ways is this true for multimedia? from each operating system.
key words projects into categories. The main ones are Board of Studies have been acclaimed for their
education, entertainment and information. innovation in multimedia. Educational CD-
ROMs such as Stagestruck bring drama concepts
to life. The Nardoo River CD-ROM allows
Hypermedia Educational products students to investigate the effects of human
Any media item (text,
Educational multimedia products can often have development and activity on a river over
graphics, audio,
animation or video) a greater impact on learning when compared to decades. Students sample water quality using
which allows a lecture or talk. their on-screen interactive personal digital
interactivity, often in There are some who argue that they do not assistant (PDA), listen to contemporary audio
the form of a mouse allow the user as much opportunity for their own and video broadcasts, research natural history,
press or rollover linking
creative thoughts, since they work on so many operate a water usage simulator, and then
that item to another
destination. senses at once. Such products should be seen prepare a talk for the class which includes a
Hypertext
as a useful additional resource rather than a range of multimedia elements.
replacement for the human interaction between a
Hypertext is text linked
to related information. teacher and their student. Multimedia presentations
When clicked with a Microsoft® PowerPoint® allows users to
mouse it allows access
to related data.
Interactive CD-ROMs produce slides with interactive elements, such as
animations, web links, animated text and digital
Multimedia resources have been used in movies. Most people have seen a talk using
classrooms for many years. PowerPoint®.
One of the earliest multimedia titles on CD- Although PowerPoint® can be used effectively
ROM was Microsoft’s encyclopaedia, Encarta®. to add visual interest to talks, a danger is that many
For the first time, students could access not only users design slides using the templates provided,
text, but video clips and sound bites of and these end up looking remarkably similar.
’S RES significant moments in history—along with a Presentation software is the most widely
ER
strong American bias! used multimedia application. For many people
OU
TEACH
WS
RCE
Figure 9.2 The NSW Board of Studies has been Figure 9.3 Computer-based training in action. In
producing award-winning educational the interactive interface for the 2002 School
multimedia CD-ROMs since 1992. Certificate computing test, students select and
drag their answers on-screen.
others in the workplace. A person can receive as the character’s direction and speed. These
training in the operation of machinery or the games have dramatic and realistic sound effects,
procedures to be followed in an office. An offer complex puzzles to solve, and immerse the
advantage of CBT over other types of training is player in a real-world environment.
that users can retrace their steps in a complex Brøderbund’s Myst®, and its successor
operation as many times as they wish. Riven™, are stunning in their realism and
CBT is used to assist learning a topic by detail—objects move, dials turn and levers
asking timed multiple-choice questions. For operate. Items of furniture are carefully crafted
example, students answer their computing test using 3D computer modelling.
for the School Certificate by selecting and As gaming consoles (such as PlayStation®,
dragging their responses on-screen. GameCube® and Xbox®) have become more
Once a template is created, material can be sophisticated, the realism of their graphics has
added or modified easily. Such a pre-designed increased. In FIFA® Soccer, a simulated match
interactive ‘shell’ offers significant time and cost now comes with an active commentary, crowd
savings when developing future training materials. chants, applause and the programmed playing
Java™ applets included in web pages are now styles of famous players.
a popular multimedia teaching tool which bring
practical concepts to life. Science experiments can Interactive DVD movies
be performed interactively, without expensive
equipment, and the results studied. DVDs not only offer additional video sequences
to those seen on the big screen, they also allow
the viewer to interact with the plot, actors,
Entertainment products writers and producers by selecting actions on
Entertainment often drives advances in screen. The higher capacity of DVDs over CD-
computing, and multimedia is an example of ROMs has encouraged these changes.
this. Games have become one of the most
popular applications of multimedia. Early games Interactive digital television
were two-dimensional platform games and With interactive digital television, audience
computerised copies of popular board games. involvement becomes part of the total home
entertainment experience. The viewer can control
Multimedia games the camera angle for sports broadcasts and choose
alternative endings for favourite soapies!
Today’s games have entered the third dimension,
where the user controls the camera angle as well
Information products
infobit Information kiosks
Sydney’s Powerhouse These days, many large institutions have
Museum used a replaced human guides with multimedia touch-
multimedia kiosk to screen information kiosks. These multimedia
allow visitors to build productions are designed for public and semi-
and explode their own public places and are usually used in institutions
fireworks! Visitors first such as museums, job agencies, hospitals,
watched a video clip exhibitions and businesses.
on pyrotechnics theory, Information kiosks satisfy a need. They save
selected the money on help desks and allow people to search
chemicals, the for information at their own speed and save
quantities, and the embarrassment in seeking answers to questions. Figure 9.4 A typical e-zine.
casing, and finally lit it Touch screens and a logical interface are
and stepped back! important for any successful kiosk. Multimedia databases
Their choices even
Multimedia databases are used to catalogue
matched the correct
visual effect.
Electronic books and magazines media. The designer of a multimedia product can
assign key words and ideas to video or graphical
Electronic books were among the earliest
elements so that they can identify and retrieve
examples of computer-based multimedia. Such
them rapidly. These databases are used in
pioneering attempts were designed to see if
advertising, product catalogues and executive
people would choose to read books using a
information systems.
laptop computer screen.
Schools have begun to establish digital
infobit The Living Books series provided a colourful
photographic registries of students and use them in
environment for young children in which almost
A National Museum of attendance systems. Students swipe their bar-coded
every object was hyperlinked to animations. An
Australia exhibit identity cards, which then display their image and
electronic version of the novel Jurassic Park
allowed participants to record their arrival and departure times.
stated on the cover: ‘Enjoy this tale of high
select building styles
technology in a fittingly high-tech way on your
of the future, have
digital photos taken
computer’, but the introductory comment from Other multimedia products
the publisher, admitted: ‘we are not yet sure Communication has become an important
and enter a three-
whether this form of electronic book will prove multimedia category only recently, with the
dimensional world
where they appeared
popular in the future…’ It didn’t! development of true multimedia mobile phones.
on a billboard in their
There have been many electronic magazines Multimedia has touched so many areas that
imaginary city. (e-zines). Text-based stories are combined with sometimes it is difficult to decide in which
sound, animation and video, and supplied on category an example should be placed.
CD-ROM or on the web—a kind of marriage of Companies also use multimedia to advertise
printed magazines with TV and radio. products using CD-ROM or web-based
Not many of the CD-ROM e-zines have been interactive catalogues.
successful. The earliest challenge was the lack of Sometimes a title crosses over more than one
a cross-platform standard CD-ROM format. area and a new word is coined by combining the
infobit Another was the difficulty of distributing the categories, such as edutainment (education +
CDs and attracting paid advertising. Customers entertainment) and infotainment (information +
In 1985, most people
usually like to browse a magazine before they entertainment).
were astonished that
buy it, but it is not possible to browse the
an entire book with
contents of a CD-ROM in a busy newsagency. Edutainment products
sounds and graphics
could fit on one 1.4 MB
Edutainment refers to multimedia which blends
floppy disk!
educational and entertainment content.
Home Ammar Gallery Calendar Location Kid's Courses Adult courses About us Search View cart
Current Category
Tayl r’s Close-Up Magic
MAGSh pC TAYLOR’S has always had the best range of close-up magic in australia for the hobbyist and professional
alike. This is an area in which we excel.
Product categories
BOOK EVANS
VIDEO DEMOS 05/06
NEW RELEASES 05/06 Domestic Prices International Prices
NEW RELEASES 13/05
CD Logue Products
Predicta BUY
Beginners Magic
Close-Up Magic
Card Magic
Coin/Money Magic
PREDICTA This was THE big seller at FISM and
we are currently the only shop
Kid Show Magic outside France to have them in
Parlour/Stage Magic stock so be quick. I hear the first
run is almost out of print. QTY: 1
Books
DVDs
Mental Magic
$79.95
Accessories
inc GST within
Sean Taylor’s Magic
Australia
BOOK ADULT COURSE
BOOK KID’S COURSE
Figure 9.5 Multimedia product catalogues: Figure 9.6 The main categories of information, education and
Taylor’s Magic Shop demonstrates its products entertainment often overlap. Find a multimedia title to fit each of the
and shows techniques by issuing its multimedia categories infotainment and edutainment shown above.
sales catalogue on an interactive CD-ROM.
Teachers have used games and storytelling entertaining way. key words
throughout history as a teaching method. Many people complain that the entertain-
Edutainment refers to media designed to educate ment used in infotainment products can
while being entertaining. overwhelm the more serious side of the subject.
Edutainment
Maths Invaders and Mavis Beacon Teaches Infotainment has become a more commonly
Typing® are two early software titles which used technique with the increasing availability of Multimedia which
blends educational and
included game elements as part of the learning interactive high-capacity DVDs.
entertainment content.
process.
Infotainment
OU
TEACH
docutainment (documentary + entertainment), as WS
RCE
it is frequently used to refer to television The five central elements of multimedia are text, 9.4
documentaries which cover serious issues in an audio, graphics, animation and video. When
Activities
Identify Analyse Investigate
1 Identify and describe the 4 What do you think is the most popular 7 Find a website with
major multimedia categories category of multimedia currently in use? interactive multimedia
of information, education Why do you think this is? content in the form of a
and entertainment. 5 Compare and contrast edutainment with Java™ applet which
2 Find a multimedia example of infotainment. simulates the planimeter, a
each of these categories. 6 Computer-based training (CBT) has been nineteenth century tool
3 Find a multimedia example of treated as a separate category in the used by mathematicians.
infotainment and of section above. What differences might you
edutainment. expect in a CBT multimedia title when
compared to other educational titles?
WS
next frame is presented. The demand placed upon
RCE
Information Interchange).
9.5 the processing power of a computer is enormous.
Text is an important element in multimedia,
The different sizes occupied by each in terms
but can be overused by beginners.
of the bits on a typical multimedia CD-ROM can
A designer needs to keep in mind how the final
be seen in Figure 9.8.
multimedia title will be displayed. The computer
The five categories head up a rich family tree
screen is not a book, and viewers will soon become
and we will now examine them more thoroughly.
tired of reading long blocks of text on a screen.
Note that more detail about each of the data types
key word
Many PowerPoint® presentations suffer from
can be found in option chapter 11: Digital Media.
screens with too much text and that is too small for
an audience to read easily. As a guide, try to use at
Text and hypertext most five lines of text, no smaller than thirty point
Text
Text is data which consists of strings of printable in size. It is also wise not to overuse animated
Data which consists of
characters separated by white space characters effects as they can become very distracting and even
strings of printable annoying to an audience.
(non-printing characters). In its raw form, it is a
characters separated by
series of zeros and ones grouped into sets of eight In multimedia work, text can be used in a
white space characters.
bits, called a byte, using a standard code known variety of ways. It can be:
• a scrolling box (use sparingly!)
The multimedia family tree • spoken aloud by a synthesised voice
• an animated heading in a three-dimensional
Multimedia Interactivity
design (use sparingly too!)
can be delivered by • hypertext
CD-ROM or the web Hypertext Other
hypermedia • bulleted lists
• synchronised with music in the form of
karaoke
Media types • transcribed using voice recognition
Next track
• searchable tracks which form the ‘chapters’
of a product
• captions for movies in multiple languages
Audio Animation Digital video Graphics Text
2D bitmapped graphics
Bitmapped images are also known as paint
graphics. Each pixel (picture element) in the
image is stored in the computer using a binary
code (either a 1 or a 0) to represent its colour.
This data forms what is known as the image’s bit
map and is stored in the computer’s memory.
A regular screen displays 800 × 600 Figure 9.10 Multimedia data types: 2D vector
(= 480 000) or 1024 × 768 (= 786 432) pixels. As graphic from a student’s Flash™-authored
animation.
infobit
Audio It is interesting to compare the background
and effects sounds in early games with those used
Movie producers know how important audio is now. Today, we hear the rustle of leaves, bird
Using laser scans, it is
possible to capture a
for making emotional contact with an audience. sounds and the splash of water—a full palette of
person’s face and
The impact of sound is underestimated. Watch sound, rather than just the beeps and clunks of
body. The newest how quickly a class of students pays attention to earlier games.
equipment even the image on a projection screen and stops There are two main types of digital sound,
records the surface talking when dramatic music begins. digitised sound files and musical instrument
colour data and Audio on a computer is digital data digital interface (MIDI) files. Both types of audio
reproduces the original representing sounds, including voice, music, are used extensively in multimedia titles.
object precisely, along sound effects and background noises. More detail on these two digitising
with surface You can test the impact of sound yourself by techniques is provided in option chapter 11:
imperfections. listening to an ad on TV without looking at the Digital Media.
picture and then again looking at the picture
with the sound turned off. Which had the most
Mixing desk At the Monitor The engineer can see the Peak limiter This electronic
mixing desk, sounds sound levels of the recording on screen. filter tones down the
of different pitches loudest sounds.
are boosted or
dampened.
infobit
De-esser This filter
Researchers at the reduces the high-pitched
Massachusetts whistle in s sounds.
Institute of Technology
(MIT) Media Laboratory Effects processor Effects
have found that sound such as echo can be
is more important than added to the recording.
we admit. In tests with
otherwise identical DAT recorder The
televisions, unknowing digital audio tape
test subjects recorder converts
Direct-to-disk recorder The the sound signal
consistently choose sound signal can also be saved to digital data and
Sound insulation Beneath a
the television with the thin cloth covering are layers right onto a computer hard disk. stores it on tape.
best sound system as of insulating material.
having the superior
picture.
Figure 9.11 Multimedia data types: an analogue audio signal is converted to digitised sound.
Digitised sound
Real-world sound is recorded with a
microphone. Sound waves vibrate a mechanism
in the microphone, which is then converted to
electrical signals. These signals are unsuitable for
use in a computer as they are in analogue form,
that is, they contain a continuous signal made up
of constantly changing frequencies and volumes.
An ADC (analogue-to-digital converter) chip
changes the continuous analogue signal into the
0s and 1s of the binary system. Animation frames Each sound effect is cued
The process of conversion of any analogue into a different frame in the animation.
signal to a digital one is called digitising.
Analogue sound (from a microphone) is digitised Figure 9.13 Multimedia uses layered audio tracks built up from separate
by taking samples at regular intervals and sound files, both digitised waveform and MIDI. Sound effects can be cued
measuring the volume (amplitude) of the sound. to animation.
This is then represented by an 8- or 16-bit
number, depending on the accuracy required. Data contains descriptions of the instrument, key word
This accuracy is called the sample size. duration, pitch and timing of each note. Multiple
The number of samples taken per second is instruments can be combined.
known as the sample rate. Remember what ten seconds of digitised sound
Video
Ten seconds of digitised sound normally occupied? A ten-second MIDI file would occupy
Separate frames of
takes up 1 MB. Compression techniques, such as approximately 4 Kb—many times smaller!
sequential bitmapped
MP3 encoding, can assist in reducing these large graphics which are
file sizes. Video shown rapidly to create
the illusion of
MIDI Video is made up of separate frames of movement, often using
sequential bitmapped graphics which are shown compression techniques.
The second way to store audio is using MIDI. rapidly to create the illusion of movement, often
MIDI files contain digital descriptions of actual using compression techniques.
musical instruments included in the software or A computer requires video to be digitised. A
hardware and are predefined in digital form. MIDI VCR records analogue data—a continuously
does not therefore store real-world sounds. changing signal. Digitised moving images are
usually captured by digital video cameras.
Video can include standard video (digitised
video), virtual reality panoramas (interactive video)
and virtual reality objects (interactive video).
Editing for multimedia involves careful
planning of the interactions between video and
other media. Popular video editing packages,
such as Adobe® Premiere®, allow each frame to
be separately manipulated. Transition effects can
be added to join separate clips, titles and credits
can be added to movies, and special effects can
be added to individual clips.
Each frame in a digital movie is a separate
bitmapped image. Movies would play very
Figure 9.12 Multimedia data types: audio in MIDI
jerkily on a computer if each frame had to be
format, showing instruments available in
QuickTime®.
processed in sequence by the CPU and moved to
the video buffer in the computer. Specialist
These two types of animation are sometimes lines, providing a more realistic and solid view of
combined. When animated cel-based frames in what the object will look like. In the third stage,
a looping sequence move along a pre-defined shading, shadowing and colour are added and
infobit
path, more complex animations can be created. the object begins to look more real. The fourth
stage is called rendering, where realistic surfaces The first full-length
3D animation are created. The final object can then be animated movie was
animated in the same way as a two-dimensional Walt Disney’s Snow
animation. White and the Seven
Dwarfs, which
appeared in 1937. This
used traditional cel
Multimedia
9.5 animation, comprising
477 000 individually
drawn and painted
hardware frames. It involved 750
artists toiling for three
years, at a cost of
Hardware for storage and US$1.5 million—a huge
Figure 9.16 Multimedia data types: path-based backup cost at that time!
animation created using Director®. While a multimedia title is being built, the
There are at least four stages through which a 3D separate working files are stored on the local
E ALE R
animation progresses. The lowest level is the hard drives of computers. OR
T
C
wire-frame model. The next stage uses It is vital that regular backups are made of 2.1
the work. Tape drives are often used because of Hardware
mathematical techniques to hide the wire frame functions
Activities E ALE R
OR
T
C
Identify Analyse Investigate 2.5
Hardware
1 State four different 5 The MIDI audio format 9 Use the web to find out about: solutions
ways in which text typically produces very small a the earliest non-computer
can be used in file sizes. Explain why this is animation—what was it about
multimedia systems. so. and who created it?
2 What is a key frame 6 List the five separate b the first full-length digital
in animation and elements in order of movie created entirely on
how is it used? increasing processing demand computer.
3 Name the two types for an average CD-ROM-based 10 Explore the websites for both
of audio files used multimedia encyclopaedia and QuickTime® and Windows Media®
in multimedia. state the reason for your Player. List the features,
placement of each. interfaces, sizes and merits of
4 Describe the process
7 Find out the origins of the each, paying particular attention
of tweening in
term ‘cel’, as used in to the full list of media types each
animation, and
animation. one can handle. Download each
illustrate it using
and compare and contrast the two
diagrams. 8 Video presents particular
pieces of software as players of
problems in authoring
multimedia elements.
multimedia. What are these
problems and what methods 11 Synchronisation of sound and
can be used to overcome video is a technical challenge in
them? multimedia. Research a software
technique used to achieve this.
their large capacity, but are very slow, and so CD-ROM speeds started at 150 kbps, but
backups are usually performed at night. A now are many times more than this. They have a
second copy of the working files should be kept capacity of 650 MB and can run video, although
infobit
on the hard drive (in case of file corruption). A this would be of very limited duration.
Tracking of a CD is third copy should be stored separately (in case of CD-ROMs are still very popular however,
equal to piloting a hard disk failure or computer theft), and a fourth particularly as they can be recorded cheaply—
aircraft along a three copy should be kept off-site (in case of fire or still a limitation for DVDs.
metre-wide flight path other disaster). These backup copies should be
at an altitude of about
twenty kilometres,
kept up-to-date. An out-of-date copy is not very DVD
useful in regaining last week’s work!
with an altitude error of
If the organisation uses a network, then the Another optical storage medium is the DVD
about two metres! In (digital versatile disc or digital video disc). These
addition, you are trying
separate working files of the team can be backed
up to a central server. Workers should still keep will eventually replace CD-ROMs (and VCR
to ignore the garbage videotape) as they allow much higher storage
(smudges, fibres, etc.), their own backup copies as added security, but it
is the responsibility of the system administrator to than a CD-ROM. A DVD stores up to 8.5 GB of
which on this scale are
backup daily and to keep copies off-site as well. data (or twice that, if it is dual-layered) on a disc
the size of mountains.
Most hardware used for multimedia is used 12 cm in diameter.
in other areas of computing as well.
Hardware for display
CD-ROM Common hardware for displaying multimedia
How can we store the final multimedia title? include the following.
This has always been a big problem for
• Cathode ray tubes (CRTs) or visual display
multimedia.
units (VDUs), which control three focused
Storage technology has not kept pace with
infobit
electron beams—one each for red, green
multimedia advances. The file sizes are so large
and blue—striking tiny phosphor dots of
and the ability of even the best storage media to
Some DVDs do not last pixels on the coated surface of a computer
as long as VHS keep up with the data transfer rates required has
monitor and causing them to glow briefly.
videotapes due to ‘DVD been an even bigger problem. Storage technology
rot’, which is caused is undergoing rapid change at present. It is likely • Liquid crystal displays (LCDs), which place
by deterioration of the that the popular CD-ROM will not survive these liquid crystal between two polarising sheets.
disc surface and poorly changes, just as the humble floppy disk is now A current is applied at various points,
designed cases. Some almost useless in the world of multimedia, where changing the light transmission
DVDs, such as those files are nearly always larger than its capacity of characteristics of the crystal at that point.
used for hiring, may 1.44 MB. It is now five years since Apple These displays were originally primarily
even be intentionally
Computer decided to build their first iMac® used in laptop and handheld computers, but
made to last only a are now common on desktop computers.
without a floppy drive!
short time before being They give out no heat, no radiation and no
Standard laptops now come equipped with
discarded. glare. Active matrix LCD displays are
drives which combine CD-ROM reading and
writing as well as DVD reading. clearer than regular LCD screens, but are
CD-ROMs are a cheap storage medium— more costly to manufacture.
around 50 cents per disc—and so can be • Plasma displays use tiny coloured
included free on magazine covers, but its days fluorescent lights which are illuminated to
are numbered. A CD-ROM is very slow create an image. Each pixel is made up of
compared to a hard drive, and although it holds three fluorescent lights—red, green and
nearly 500 times as much data as a floppy disk, blue—as in a CRT. The intensities of the
its storage capacity is now considered small! One different lights vary to create a full range of
CD disc can hold a huge amount of text, but one colours. The advantages of plasma displays
full-screen photographic image can take up the are that they can be made very wide and
equivalent of 150 000 words. Some games now thin, with an image which remains bright
occupy up to seven CD-ROMs! from every angle. Plasma displays are very
costly.
Headset Virtual reality games
• Touch screens use a matrix of infra-red Mass-produced virtual In his bedroom, 12-
beams in front of the screen to locate a reality headsets are year-old Ben is
finger position and translate this in the becoming more wearing virtual reality
same way as a mouse pointer. Such screens common in people’s gear. He is holding a
homes. stick, which he is
are popular display devices in public areas prodding toward the
such as museums. window. In his virtual
world, he is a medieval
• Data projectors contain a digital light knight, jousting. He is
Controller Depending on
processor (DLP), with 500 000 separately which game is being taking part in a global
controlled mirrors, used in combination played, the controller can ‘Knights of the Round
represent a lance, a light Table’ tournament.
with LCD technology. The computer screen Since there are a
sabre or a sword.
image can be projected onto a wall, million entrants, his
providing a large display for an audience. chances of winning the
These projectors are getting smaller and tournament (and the
hand of the king’s
cheaper, and can turn a lounge room into a daughter) are remote.
mini-theatre. Remote opponent Ben’s opponent is
• Speakers use a coil of wire to produce a another child who lives on the other
side of the world.
magnetic field, which pulls a cone of
cardboard or foil in and out rapidly to Figure 9.17 A head-up display.
produce sound waves. Their name betrays ’S RES
ER
OU
TEACH
WS
RCE
People People in multimedia 9.7
There are defined tasks which must be accomplished in any musicians, voice talent and sound designers; and 2D and
multimedia project. In larger projects, these tasks have clear 3D animators, who use modelling programs and
job descriptions. In smaller projects, one person may handle a rendering packages
number of jobs. This is called multiskilling. The major jobs in • the technical team, which maintains software and
the industry include: hardware, makes sure software is updated and working,
• business, financial and legal experts, who handle ensures that networks are operating correctly, solves
copyright and intellectual property, cash flow, contracts, operational issues, and may also help solve storage and
royalties and licensing file format issues
• the project manager, who co-ordinates the budget, • information designers, who are skilled at the
schedule and resources of the project organisation of large amounts of information
• the creative director, who supervises the design of the • interface designers and programmers, who use off-the-
project, and looks after the work of the writers, editors, shelf multimedia authoring packages or may develop a
artists, animators, musicians and programmers; in fact, a software tool of their own
major proportion of the total team may be under their
control Questions
• content experts, who know a subject area well, and as
1 Draw eight circles on a page and fill each with the
professionals in their area are concerned with the
name of one of the job categories listed in the panel
accuracy of the content
and add a one-sentence description of that task.
• the creative team, which includes writers, editors and
researchers who create the content; graphic designers, 2 Draw arrowed lines to show which groups will need to
who layout screens, design icons and establish colour communicate with groups in other circles. Make the
schemes; illustrators, who create the diagrams, maps, thickness of your lines correspond to how much
cartoons and drawings; photographers, who may also communication is likely to be needed during a typical
scan and image process; audio professionals, including multimedia project.
Activities
Identify Analyse Investigate
1 Name and describe briefly 4 Use the Internet to identify two multimedia 7 Choose an actual CD-ROM or DVD
three multimedia display authoring companies in your state. Compare multimedia title. Write a review
devices. these in terms of the skills they promote. of this title which is suitable for
2 State the major roles of 5 At home, examine the final credits of a a magazine which deals with
those people involved in video or DVD movie which uses computer- multimedia (about 200 words,
creating multimedia generated images (CGI). Identify all the jobs word-processed).
titles. which you believe would be identical to 8 Research the advertisements in
3 Outline the job those of a multimedia computer project. the IT supplement of a daily
description of a creative Note that they may not use exactly the newspaper (these usually appear
director in multimedia same job titles. weekly). Create a table of all the
authoring. 6 Examine the list of credits for a multimedia jobs advertised in multimedia
title (CD-ROM or DVD) and list the titles of and the stated qualifications or
the jobs involved. experience required.
their origins in reproducing only the human authoring software using its text entry tools.
voice. Graphics may be created in dedicated draw
• Head-up displays project an image onto a or paint software and imported into a
infobit
small screen inside a helmet. These are multimedia authoring program, or created inside
widely used in the entertainment field as the authoring software itself. They may also be British Telecom
virtual reality (VR) display devices. Users bought from collections of clip art and stock researchers working
experience a sense of immersion in the VR photography libraries. on ‘active skin’
Audio is usually created either by digitising a technology have
world, which can be disorienting.
microphone (analogue) recording, or by using predicted that calls
MIDI input devices and keyboards. could be made from
tiny mobiles embedded
Video is captured with digital video cameras
Processes
9.6 or by digitising analogue video or film footage.
in stickers or tattoos
on the skin.
Audio is often integrated with video material. Keyboards, music
used with Animations can be created inside authoring
software, but most are imported from external
players and TV screens
with Internet access
must not be stolen, and even if permission is The five data types may be edited using
granted for its use, the original authors should be appropriate software.
Prototype
credited with its creation. For example, audio software such as
To ignore this is really stealing another Macromedia® SoundEdit™ can be used to A basic working model
person’s ideas, creativity and intellectual effort. create special effects such as echoes, fades and built to show how a
project will look and
Larger amounts of text are usually created in pitch changes. Adobe® Photoshop® offers a
work. Not all parts may
a word processor and then imported into a huge range of editing possibilities for graphics. be complete.
multimedia authoring package. Smaller amounts iMovie® (Macintosh®) and Pinnacle®
(a few lines) can be entered directly in the (Windows®) allow sophisticated editing of video
Stage
Cast members
Script
Actors (sprites)
Task Authoring
multimedia using the
stage play/timeline
method
Create an interactive project to illustrate
and explain each of the elements of the
stage play/timeline method: timeline, stage,
cast members, score, and any other special
tools available in your software. Each
segment will automatically pause until the
user selects a return to ‘Home’ button. Use
any appropriate timeline-based authoring
software.
Figure 9.21 The Macromedia® Flash™ interface shows its use of the stage First, create a storyboard to represent
play/timeline method. Note the helpful tutorials and lessons provided in each segment of the timeline as a single
Flash™ for beginners. Such authoring software usually has a powerful rectangle showing all navigational links.
scripting language as an important tool. Find out the names of these Add sound effects, such as button clicks,
scripting languages in both Flash™ and Director®. and musical tracks or effects for each
method.
Suggested software: Director®, Flash™,
Dreamweaver®.
Questions
1 What analogy is used for authoring in Macromedia® Director®?
2 Explain the functions of each of the cast, stage and score in this authoring software.
3 From your observations of the screen designs and other content, describe the target audience for this product.
Flowchart method
The flowchart method certainly suits
multimedia, as each media element is represented
as an icon with logical flow lines between them.
One multimedia authoring tool which uses this
concept is Macromedia® Authorware®.
It tends to be the speediest of the methods (in
development time) and so is best suited to
projects with a short development time.
Human beings find planning a project by
using a flowchart to be a logical approach and it
enables complicated navigational paths with lots
of decision points to be seen at a glance.
Decision-table method
Figure 9.23 The Macromedia® Dreamweaver® interface, showing the What if all the rules were decided in advance and
timeline and project windows. Note the HTML code in the panel above the the user was let loose on the screen?
design panel. This multimedia programming approach
suits interactive multimedia games and is the
Figure 9.24 Macromedia® Authorware® uses the flowchart Figure 9.25 The Klik and Play interface, showing the decision-
approach to multimedia authoring. table approach to multimedia authoring.
pattern behind the popular game design software used to learn more features. If you want to E ALE R
OR
Klik and Play. attempt something more advanced, use
T
C
With this software, games are created using Director®, Dreamweaver® or Flash™. It may be
3.2
Types of
one of two methods. In the first (default) method preferable to save Dreamweaver® for your web software
the designer selects an active object (such as a design work and learn one of the other authoring
spaceship) and defines its movement during applications for now.
game play—for example: increasing a score or You should keep in mind that professional
losing a life. The second method gives the authoring software such as Director® or Flash™ ’S RES
ER
OU
TEACH
designer finer control and results in much more are typically taught in training institutions over WS
RCE
complex games. It uses a large decision table many weeks. So don’t expect to become a 9.6
where all objects and their possible actions are multimedia expert overnight—you may just
defined and organised. scratch the surface now!
Activities
Identify Analyse Investigate
1 State the differences between 4 Name four commercial examples of multimedia authoring 8 Examine carefully at
multimedia authoring and software and find the cost of each. least three CD-ROM or
multimedia programming. 5 Why would a multimedia author choose a programming web-based multimedia
2 Identify and describe the four environment rather than an authoring one for a products and
main authoring methods you multimedia project? determine the method
have studied. 6 Choose which method would be most suited to the used to author each
3 State the tools which you creation of a video adventure game and justify your one. The class could
would expect to find in a answer. combine their results
complete multimedia to determine the
7 Choose which method would suit a multimedia CD–ROM
authoring environment most commonly used
for training people in using photo–developing equipment
(software). authoring method.
in a photographic laboratory and justify your answer.
Developing a
9.8 multimedia product categories outlined
earlier. Is the purpose of the product to
inform, educate or entertain?
multimedia product • Try to state how the user will be changed as
a result of your product.
Michelangelo once described the process of
sculpting as ‘freeing the man inside the marble’. End user needs and target
Ideas remain locked away until someone carves
the stone and brings out the form into the world
audience
of the audience. Multimedia projects are The main reason products exist is to satisfy the
complicated and their special challenge is for a needs of their users.
team of people to catch the same vision and to • Before commencing any work on a project,
free the same statue from the block of marble. it is vital to find out what the target
Creating a commercial multimedia title audience for the multimedia project will be
involves many people working with specialist and what their needs as users are.
software over a long period of time. An • The production team must consider such
expensive task such as this takes a lot of careful issues as the age, educational and cultural
planning. background of the audience.
There are four major stages in any project
• A survey can be taken, or interviews
development.
conducted, to find out what direction the
Even when developing a small-scale project
project should take. One important
as part of a course at school, it is important not
technique is to invite a small group, known
to rush any of these stages and to plan the
as a focus group, to answer prepared
resources allocated for each stage to make sure
questions. These might include:
that the project can be finished.
— What are your favourite multimedia
titles?
Defining and analysing the — What would make you want to keep
problem using the title?
— What features would you like to see in
Stating a clear goal and purpose the final product?
— Where would you like to use it? On a
In this early stage of the development, it is
hard drive, CD-ROM or the web?
important for the team of people building the
title not only to understand exactly what they are Resources
being asked to do, but to agree together on how
the project should look and what it should • Decide if the author or team has the
E ALE R
OR contain. technical skills to complete the project.
T
C
— what—the purpose and goal In the early days of computing, even E ALE R
OR
— who—the audience adventure games had to be played by typing
T
C
— how—processes, techniques and written instructions on the screen. At this stage,
1.2
Designing
resources the mouse had not been invented. Users would solutions
be given a set of scenarios labelled with letters A,
B and C and would type their choice and the
Designing possible game would continue. There were no graphics. OR
E ALE R
T
C
solutions With the invention of the mouse and the new 3.5
Features of
ability of the computer to display pictures and a GUI
One important way of conveying a complex interactive elements, such as buttons, all that
multimedia concept is to create an early working changed forever.
prototype using presentation software (such as Users could now interact with their
PowerPoint®), which can give a quick result. computer graphically. Such an interface is known
• At this second stage, use storyboarding and as a graphical user interface (GUI). infobit
a prototype to complete an outline of the The most common GUI is the WIMP
concept of the project. A prototype is a (windows, icons, menu and pointer), but many Thomas Edison’s team
version of what the final product will be others are in existence and are used in programs created the light bulb
like, but with limited functionality. Instead, instead of the WIMP. by making thousands
for example, an icon might simply represent Some alternative interfaces can be seen in the of prototypes, and then
a navigational link to a module which has selecting the best.
software SuperGoo® and Bryce®.
not yet been designed. In some projects, the Coming up with the
Most interfaces depend upon a metaphor. A
prototype becomes the actual starting point idea of the light bulb
metaphor means to compare something to
and evolves into the final project. In most it was the simple part!
something else or to model its similarities. The
is simply used as a planning tool. This method is still
metaphor for the Macintosh® interface created used today in many
• The team meets to discuss the project and in 1984 depends upon the idea of an office desk multimedia projects.
decides on a timeline. Do they have the (hence the term ‘desktop’ for a computer
organisational skills to complete the task? window). Microsoft imitated it when it created E ALE R
Can they get on together? Is someone able its Windows® operating system and this resulted OR
T
C
to act as leader or group facilitator? Various in a court case between the two companies which 3.4
Interface
tasks are assigned to designers, editorial and went for many months. The final judgement was design
production teams. that the idea of a trash can, a menu and an office
• At this stage, many of the designs and plans desk were common ideas, available to anyone,
exist only on paper. The editors begin to and could not be copyrighted under United
research content and the designers begin to States laws. The case was lost by Apple.
experiment with screen layouts. You might decide to model an interface on a
infobit
Too many students do not spend enough street map metaphor, or a fun park metaphor or a
time on this stage, and rush to design a final journey through a house. Whatever metaphor you Douglas Engelbart
product too quickly, before their ideas and use should be natural and logical to your users. invented several user-
directions have been properly formed. A friendly information
GUI design principles access systems that
multimedia project is like a journey, with the
• Manipulation—People want to be in charge we take for granted
concept forming the journey’s destination and
of their actions. Objects should be moveable today, such as
the plan being the map showing how to get there.
windows, hypermedia
where appropriate and invite interaction.
and groupware. His
GUI design • See and point—Actions and navigation most famous invention
should be easily recognised on screen. A was his ‘X-Y position
We have already talked about the importance of user should not have to consult a manual. indicator for a display
a clear and logical interface. One of the • Consistency—Users expect that different system’—the prototype
challenges is to provide the user with as much applications will have a sameness to them, of the computer
control of their multimedia environment as which means knowledge about one product mouse.
possible and to make it enjoyable.
key words can be transferable to another. Screen person (‘I’) makes the user feel part of the
designs should have a sameness about them action (such as in an interactive game). The
which is familiar to the user. Consistency in second person (‘you’) makes the user feel
design is one of the most important like they are part of a conversation. The
Linear (sequential)
navigation principles of all. third person (‘they’) can suggest detachment
A form of interactivity • Feedback—A click on a button should result and make a project seem ‘official’ or
(or searching) in which in some response that lets the user know it authoritative.
all data in front of a occurred: a sound or a change in the
desired data item must appearance of the button is important. Storyboards and navigation
be read before that item
is reached. • Forgiveness—If users make mistakes, they In complex projects, careful planning of the
should be able to undo them and not be structure is important. A storyboard is a map or
Non-linear (random or
locked away in some other screen from plan of the final product. It represents each
direct) navigation
which there is no return. All actions should screen, each important screen element, their
A form of interactivity be reversible. placements and the links between them. These
(or searching) in which
any desired data item • Aesthetics—The design should be appealing links are usually shown as arrowed lines,
may be accessed to users. Objects should not be cluttered on indicating the direction of travel.
directly. Two types are the screen. White space is important and too It is important not to leave a user at a dead
hierarchical and much text should be avoided. end, and to always provide a quick path to the
composite.
• Functionality—Navigation should be clear, home screen.
and commonly used buttons should be The three main storyboard layouts for navi-
readily accessible. Dangerous actions, such gation are linear, and the two non-linear forms:
as erasing files, should be difficult to hierarchical and composite.
perform. • Linear: The path is a single one which can
• Voice—Which ‘person’ or voice will you be followed forward or backwards. Users
use? A multimedia title written in the first cannot make jumps.
• Hierarchical: The possible paths are
HOME
organised in the form of a ‘tree’ of
Linear HOME Hierarchical
branching choices. Users select which
‘branch’ of an imaginary tree they wish to
move along.
• Composite or network: This is a general all-
purpose term where no obvious pattern of
navigation exists. It may be a mix of the
linear and hierarchical layouts. Any part of
the multimedia product can be linked to
any other. Users can freely explore any one
of many possible ‘paths’ through the
product.
When we are viewing audiotapes, videotapes
or movies, we use linear or sequential
Network navigation. We usually watch movies from start
HOME
to finish. On videotape or film you cannot get to
that favourite scene in Shrek where the little bird
explodes without going past all the rest of the
movie first—even if you fast-forward. A regular
movie prevents you from making any navigation
decisions along the way. You cannot take an
interesting sidetrack or pause to find out more
Figure 9.26 Three possible storyboard navigational layouts. about one of the characters.
Figure 9.28 Screen and interface design should be appropriate. Here are two designs for interactive
multimedia products dealing with the species.
multimedia products and notice those screen • attention to storage requirements and
designs which please you. While you are delivery platform processing speeds.
learning, try to imitate the qualities you like.
Effective multimedia has: Content for the multimedia
• clearly expressed content product
• well-chosen use of multimedia elements
Once all the required data—text, audio,
• logical navigation
graphics, animation and video—is collected or
• an intuitive interface
created, the required authoring software and
• good screen design principles player engine are chosen for processing this
Activities
Identify Analyse Investigate
1 Identify social and 4 Find out the 6 The class rereads the text which deals
ethical issues current total with screen design principles and agree
involved in number of on the five most important screen
multimedia households in design characteristics. Each member of
authoring. Australia with the class then displays their designs
2 What are the trends broadband Internet from activity 5. The students examine
apparent now in access. each screen and award a rank out of 5
multimedia? 5 Design an opening (1 is poor, 5 is excellent) for each of
3 What are current screen for a these characteristics. These are totalled
technical challenges multimedia website to give each design a score out of 25.
facing multimedia? about yourself. Use 7 Examine carefully at least three CD-
any suitable ROM or web-based multimedia titles
software on the and evaluate each in terms of the
computer. interface issues discussed in this
section. Present your evaluations in
table form as a single word-processed
page with header.
input, and the final form of the output is decided. and/or authoring software are used alongside E ALE R
OR
It may be that it will be displayed on a other specialised software to create the final title.
T
C
monitor, a touchscreen in a museum, or in an At this stage, unexpected technical
1.3
Producing
interactive game controlled by joysticks. challenges may arise which will need to be solutions
If the project is large and complex, it will be solved. The final size of the project may need to
broken down into smaller, more manageable, be reduced to meet size restrictions in delivery
modules with separate teams. (such as the bandwidth limitations of the web or
At this stage, it is important to consider how the storage capacity of a CD-ROM). Perhaps the
the final project will be tested. This is determined media collected takes up more space than is E ALE R
OR
early so that later testing is kept true to the available, and compression will have to be T
C
original design specifications, and not altered reconsidered. The computer may not have
1.4
Evaluation
later to make the result look good. sufficient memory or be fast enough for the
chosen authoring software.
Producing solutions Now the project is being assembled, it may
also be necessary to develop other digital
In this fourth stage, the final title is given life. material that had not been thought of earlier. If
The designers assemble the separate resources the design stage is carried out thoroughly, such
into a working product. We have already seen extra work will not become a serious problem.
how various digital media can be combined in a The technical or programming team may
multimedia title and multimedia programming need to finetune the product to allow it to work
Activities
Identify Analyse Investigate
1 Identify and describe 4 Describe the advantages of prototyping as 7 View at least five multimedia titles, on
briefly each of the an aid to the development of a your own or as a class, and write out
stages of the multimedia project. (using a word processor) what you would
multimedia authoring 5 State the weaknesses and strengths of imagine the design brief might have been
process. PowerPoint® as a prototyping tool. for each title. Cover such issues as: target
2 Which of the stages 6 An edutainment game is planned to audience, end user, purpose, resources
do you think would teach multiplication tables to primary required, structure and delivery.
usually occupy the school students. Sums appear at the top 8 State the strengths that you believe you
most worker hours? of the screen and advance down to would bring to a team-based multimedia
3 Identify and describe collide with the player unless blasted authoring project. State the weaknesses
the types of testing first by typing the correct answer. Outline you believe you would have, and name a
involved in the kinds of planning you would conduct class member who you believe would
multimedia authoring. before starting to design this game. identify that as their strength.
smoothly on all platforms and computers. later to suggest improvements to the design.
Consumers often use older machines and will • Navigation testing makes sure that all links
expect the title to work on these. go to the right places.
infobit
• Functional testing checks if the final
Commercial testing of Evaluation product meets the original design
multimedia is often specifications. The title is tested on different
Testing begins by making sure you as designer
automated. One platforms, using different screen sizes and
available piece of walk in the shoes of the users of your product.
resolutions.
automated checking The development team tests the project first,
followed by the users for whom it was created. Final thorough testing of the ‘golden master’
software clicks on
Their comments will mean changes—revisions is vital. This is the final version of the product
every pixel on every
and improvements—before the final publishing before mass duplication begins. A mistake now
screen to see if stray
takes place. Never be the only tester of your work! (even a spelling error) would be very expensive!
unwanted buttons have
been left over in the Invite users to test it and do not interfere or guide A motto: Test early and test often! Then test
design process. them. Never grab the mouse and say, ‘No, here’s later and often!
how you do it!’ If they are having trouble, it is
probably your design which is at fault. Practical tips on design from a
One method of evaluation is to constantly professional
watch or even videotape people using the product.
If you hear them saying to each other something 1 Identify and meet your user.
like, ‘Wait, wait, wait…it’s doing something’, or 2 Write out a typical day in the life of your
‘So now what do I do?’, then you are probably not user.
giving enough feedback to the user. 3 Sketch steps as a rough storyboard.
At the end of the development process, a lot 4 Construct a navigational map.
of developers are too tired and broke to see if the 5 Build a flipbook prototype.
product works. They just want to get it out the 6 Get user feedback.
door. But you have to test—not testing causes a 7 Redesign interface using feedback.
lot of products to fail. 8 Get more user feedback.
• Interface testing asks users to comment on 9 Build prototype.
prototypes early in the project, and then 10 Test prototype.
11 Author the product and design interface. team. If you are working alone, interpret all
12 Repeat above as many times as possible. these as referring to yourself.
T
C
for this task. will have or, if team members each have a 1.1
If you complete the task outlined on page range of talents, you may wish to assign Defining the
problem
144, use those items as a portfolio to show the different modules to each person and allow
rest of your team what your work and skills are a set time for completion.
like. They may even decide some of your earlier • Decide on the software you will use to build
work is good enough to use. Follow the stages E ALE R
your prototype. OR T
C
chapteroverview
Multimedia products integrate several digital media types. working as a team. Storyboards are prepared, showing in
These data types are text, graphics (both two- and three- detail the navigational links to screens, and media is
dimensional), audio (both digitised sound and MIDI), collected, imported, scripted and placed.
animation (two- and three-dimensional) and video. Navigation may be linear (as in a sequence of slides) or
Multimedia may also be interactive. The user can control non-linear (as in interactive presentations). Multimedia
navigation within the product using hypertext or other authors aim for intuitive and user-friendly interfaces.
hypermedia. The challenge for multimedia has always been managing
Multimedia is used for a wide variety of purposes, the large file sizes and processing power needed, which results
including education, information and entertainment. It can from extensive use of video and animation.
often be more effective than print-based media because the CD-ROMs were the most popular delivery medium for
emotional impact of a variety of media in combination is multimedia until the wider availability of broadband Internet
greater on the senses than text and still graphics alone. A access meant that large multimedia files could be downloaded
large part of the multimedia industry is centred on movie more quickly from the web. The DVD is another large-
special effects. capacity delivery device suited to multimedia titles, and
Authoring software can be used to develop a multimedia multimedia elements are commonly included in popular
project. Careful planning is needed, particularly when movies issued on DVD.
TER TE
AP
CH
ST
WS
Database Design
CHAPTER OUTCOMES CHAPTER CONTENTS
You will learn about: 10.1 Database development 147
• collecting and storing data 10.2 Collecting, organising and storing data 154
• processing and analysing data 10.3 Processing and analysing data 160
• presenting information 10.4 Presenting information 164
• integrating data with other applications 10.5 Integration 165
• expert systems 10.6 Project development 170
You will learn to: 10.7 Additional content 172
• define database structure
• create a database
• edit, search and sort a database
• import and export data
• design, produce and evaluate a project
OPTION
10.1
The supermarket
<In Action>
Every day, millions of items of data are processed in
supermarkets around the world. As each barcode is swiped
past the scanner at the checkout, a number of processes are
triggered to transform that data into meaningful
information. The display screen tells the customer the price
of each item and the final total. If the EFTPOS (electronic
funds transfer at point-of-sale) terminal is used, the banks
are instructed to transfer money from one account to
another. At the end of the day, the floor manager knows
how many items need to be replaced on the shelves, the
store manager knows how many items need to be re-
ordered from the distribution warehouse, and the sales
manager receives the feedback on any promotion which the
store has been running. As the customer, you have a record
of your purchases in the form of the shopping docket.
Some customers are now using on-line services to do
their shopping, but basically, the same databases are
supplying the same information to the same people.
All these operations are possible because the data is
organised and stored in databases. In this chapter, you will Figure 10.1 Data input at the supermarket occurs both at
learn how information and software technology is used to the checkout, to identify products bought, and at the
build and maintain databases like these in a wide range of shelves, to check pricing and stock levels.
situations.
Database
10.1 The purpose of the
database
key word
key words You have probably used a word processor or A database needs to be supported by a whole
spreadsheet to organise data into a table. Tables system of technology—hardware and software—
of data like these are actually simple databases. working together to support the daily routines of
In more powerful databases, we can use people and organisations. They can help business
Database management
system (DBMS) specialised software to edit, sort and search the managers with problem-solving and decision-
Software that allows us data as well as being able to display it in different making, or they can supply single items of
to build a database, ways. This software is part of the database information to users halfway around the world.
access the data, and management system (DBMS). Databases themselves are not often easily
format the output. Databases consisting of a single table of data visible to the user—neither large commercial ones,
Flat-file database are called flat-file databases. By organising the such as in a bank or supermarket, nor PC-based
A database which data into more than one table, we can keep the ones that may be in use at your school. However,
consists of a single plan much simpler. Think about the school we probably interact with them several times a
table of data. library database. We would need a table of data day. The interfaces are designed to be user
Relational database about the books plus a table of data about the friendly, which means that they are easy to use
A database which borrowers. They obviously have different types and we can access the data quickly. Consequently,
organises data into a of data, so we need separate tables. But then we we are often not aware of the enormous amount
series of linked tables. might want to know who borrowed a particular of work that has been done in order to collect and
book and when it is due back. By linking tables organise the data. We will understand more about
together, we have created a relational database. this as we work through this chapter.
Activities
Identify Analyse Investigate
1 What is a database? 4 Look at Table 10.1. The table contains data about some 8 How would you find out
2 What is the most books in a library. What other data might be included in about available flights to
important function of a library’s database about its books? Europe for the next school
a database? holidays?
BookID Author Title Publisher
3 What are the 9 Find out all you can about
advantages of using a 222334 Grisham The Brethren Arrow the Dewey number system
database? 232145 Rowling Harry Potter Bloomsbury used in libraries. Prepare a
218934 Moon Discover Australia Random House report for the class.
Remember to acknowledge
Table 10.1
your sources.
5 What items of data would be relevant for a database in a
supermarket?
6 Copy and complete Table 10.2 to show typical data for
employees in a fast food outlet.
Name Address Phone Date of Hourly
Birth Pay Rate
Susan Smith 12/4/88 $10
John Brown
Ian Jones
Table 10.2
7 You would expect a video hire shop to have a
computerised database. What is the advantage of this
from the owner’s viewpoint? How would it benefit the
customer?
Activities
Identify Analyse Investigate
1 What are the main components of 4 Draw up a table which could be used 6 If data is repeated unnecessarily in
a database? for data about students who borrow a table, it is called ‘redundant’. Why
2 What is the difference between a books from a library. Identify and do you think that databases should
record and a field? label a record, a field and the be designed to minimise data
3 What are primary keys? What are primary key. redundancy?
they used for? 5 Why would we not put the students’
data in the same file as the books?
4.1 the output in a form on the screen or as a printed In addition to choosing what data we want
Data and report that people can take away with them. The displayed, we can also choose how we want the
information
DBMS helps us to change the data into data displayed. We may be happy with just the
meaningful information. listing on the screen, or we may need to present
our output as hard copy in a formal report. design. As we learned in core chapter 1: Projects: E ALE R
OR
Figure 10.5 shows different users of the database Design, Produce, Evaluate, the design stages of
T
C
and how their needs are different. all projects should be well documented.
4.5
Data types
Forms are usually used for data input and Questions to be asked at this stage might include:
quick searches for a single data item. They display who will be the likely end users? What
one record at a time on the screen so that data can information are they likely to need and how
be easily read or edited. New records are created should it be displayed? key word
this way as well, with an empty record being Some DBMSs create a data dictionary for
displayed on the screen, waiting for input. you automatically, and some prompt you to
Reports are usually used for data output. allow one to be created for you. You can also Data dictionary
Although the layout is designed and previewed define formatting and validation rules for input
A table to show field
on the screen, they are intended for printing hard data in the data dictionary. A table similar to the
names, data types, field
copies of quite large amounts of data. one in Figure 10.6 is commonly used for this size and validation rules
The layout of both forms and reports is purpose. for each file in the
important for the end user. We shall look at this We will look at the idea of data validation in database.
again, later in the chapter. the next section.
E ALE R
Types of data OR
T
C
Most data that we enter into the tables is text or Activities 1.2
Designing
numbers. We might, for example, list a book’s solutions
author and its price as required data for our Identify
database. Numeric data can be formatted as
currency or dates if required. 1 What is the DBMS? How is it different to
As processors become faster and storage the database itself?
space becomes cheaper, other data types are 2 How is data different from information?
increasingly being included in databases. 3 List the common data types. Which of
Multimedia elements such as graphics and audio these can we store in a database?
files can be stored in a database. A photograph 4 What data is contained in a data
of each student or a soundtrack of a CD could be dictionary?
useful information in some situations. You
should remember though, that all the data is
stored in memory and secondary storage in
digital form, so large graphics or audio files will
use a lot of storage and processing power.
The Boolean or logic data type indicates a
true/false type of value. This might be used to
indicate whether a book in the database is out
on loan or whether a return is overdue.
Microsoft Access
Data dictionaries File Edit View Insert Tools Window Help
?
Before a database is built, it is often helpful for
the database designer to create a data Field Name Data Type
dictionary to illustrate and describe the fields Student ID Number Code allocated by School Administrator, e.g. 890243
and data types which will be required in the Family Name Text
First Name Text
database. It is essential at this point that the
Date of Birth Date/Time Format dd/mm/yyyy
data be organised correctly in the different Year Group Text e.g. Year 9
tables and that data types are appropriately
assigned. As the project progresses, it is more Figure 10.6 Data dictionary for a students file, as a table (above), and as
difficult to implement major changes in the seen in Microsoft® Access (below).
Analyse Investigate
5 In the data dictionary 7 Look at the data types available in your database software application. List them and
for the students table give an example of each. Is your database software able to store integers and decimal
in Figure 10.6, what numbers? How are they different? Are the default field sizes different? Why is this?
does Field Size refer to? 8 Find out if you can use ‘look-up lists’ for data entry in your database application.
What are the default What are they and why are they useful?
field sizes for text, 9 Consider the data types of the information which we access from an on-line
number and other data encyclopaedia. It is not unusual to expect all the multimedia elements to be used to
types in your DBMS? present this information effectively. Find some on-line databases, and draw up a table
6 For a books file in a like the one below, to show the information and the data types used.
library database, what
sort of information Source Information Data type
could be of the data (URL or CD name)
type hypertext or
amazon.com pictures of books graphic
graphic?
ninemsn.com.au video
advertisement for… animation
Table 10.3
OR
E ALE R
6.1 T
Collecting,
10.2 complicated. Figure 10.8 shows several
situations in which data is being input to a
C
7.1 will be the best way of entering the data into the while in others, data entry clerks will be needed.
Ethical issues system? In this section, we will look at some The examples given above are termed as
sources of data and some methods for collecting it. primary sources of data. The information is
collected directly from the people involved in the
Data sources generation of the data.
Data is gathered from a wide range of sources There are times, however, when data is
and in various ways. Sometimes, it might seem a gathered from secondary sources, such as
fairly simple task to collect data. To collect the newspapers or research documents. It may be a
data about books in your school library, you quicker and more convenient method of collecting
might walk around the bookshelves writing data, but the data may not be totally reliable. In
infobit down the titles and authors’ names on a piece of all cases, sources should be documented and
paper. You could then type the data into a acknowledged. If anyone needs to go back and
Digital DNA is a term
computer using a keyboard. However, in larger check the data later, it should be easy to find, and
used for the personal
information we leave
projects, the system becomes a little more copyright issues must be respected.
behind at ATMs,
supermarkets, and
chat rooms. Databases
store this data, which
is continually
correlated and merged
to build profiles of
many demographic
groups.
^ Biometric security devices use ^ Computers use specialised ^ Data collected in the workshop is
biological characteristics to identify input devices to read transferred to the main database that
people. How does the computer know information stored as optical keeps track of parts used.
which person the data belongs to? marks, bar codes and special
characters. Where would you see
examples of this type of data?
E ALE R
Data input devices defined with a field. If we wanted to enter a date OR
of birth for students at a school, we could
T
C
Everywhere you look, there are data items being 7.2
assume that dates before 1983 would not be
processed. In the supermarket, the library, the Ethical issues
valid—all students would be less than 20 years of
bank and the fast food outlet. Consider all the age. Figure 10.9 shows this being set in the Field
different hardware devices which are used to Properties section of the data dictionary. Using
input the data about the products you are default values and look-up lists also helps to key words
buying. As well as magnetic stripe cards and bar reduce the chance of errors by minimising the
codes, we now use e-tags and smart cards to amount of data that has to be keyed in.
speed up transactions.
With the development of technology, data Verification Validation
input has become fast and reliable. By avoiding Verification of data means that a check is carried Checking to see if the
human intervention as much as possible, time is out to make sure that the data is true. It is not
data is reasonable and
saved and errors are reduced. always easy to check this. An incorrect date of
lies within a predefined
set of values.
birth may be entered for a student, within the
Validation and verification valid range of values. To verify the date, the data Verification
checks of data entry clerk would need to check back on the Checking the data
source to see if it is
In the previous section, we looked at some source document, the application form or birth true.
automated input devices. One of the major certificate. When you book a theatre ticket over
advantages of these is that it reduces the chance the telephone, the agency often reads your details
that an error will be made as data is being entered back to you for verification.
into the system. If the price of an item is incorrectly Bar codes and customer codes on invoices
often have check digits included with them to help infobit
entered at the supermarket check out, customers
would not be pleased! The use of bar codes has with verification. The check digit is calculated by Cognetics studies
increased the customers’ confidence that prices are applying a formula. The input device can then questions such as what
correct. The term integrity refers to the validity and apply the same formula to the input code and causes a computer user
accuracy of the data in the database. compare the answer with the check digit. The to make mistakes, or
Past, current and emerging technologies panel on what makes them
comfortable with using a
Validation page 156 explains more about this.
particular interface
Most systems have a range of validation checks Banks use magnetic ink character recognition feature. Researchers
to help to maintain the integrity or reliability of (MICR) devices to read information on customers’ have discovered that we
a database. Validation checks if the data is cheques. This can then be used to check whether can pay attention to only
sensible or reasonable. It is a check condition the bank clerk has entered the data correctly. one thing at a time.
Figure 10.9 Creating a validation rule for Date of Birth field in Figure 10.10 The characters at the bottom of this cheque are
Microsoft® Access. read by a magnetic ink character recognition (MICR) device.
Activities
Identify Analyse Investigate
1 List the common types of 5 Find an application form which is used to 8 Ask some adults about how data
data sources mentioned in apply for membership to a club or health input has changed at the
the text. What type of fund. How would the data be entered into supermarket over the last ten
data is collected and what the database? What chance is there of years and summarise their
sort of input device is human error? answers.
used? 6 Discuss the issues involved in the collection 9 How long ago was it that bar
2 Why is it important to of data from primary sources, and also from code scanners were introduced
document data sources? secondary sources. How are they different? at your library?
3 What is the advantage of Give examples from the text and others that 10 Look at one of the websites that
using automated data you know of. is used for purchasing items on-
collection devices? 7 Conduct a survey of different input devices line. List the ways in which the
4 What is the difference in use in your shopping centre. How many amount of data to be entered is
between validation and different types can you find? Organise your minimised, and other features
verification? findings into a table and include a field to which work to ensure accuracy
record where you saw each of them. of the data collected.
Organising data library contains the unique code for each book,
and a second table lists each person who has
ER
’S RES
OU
TEACH
WS
RCE
Tables books out on loan, then a link can be made
between the matching book codes, so that the
10.1
After identifying what data will be stored in our book details (title, author, date, etc.) will not
database, we need to think carefully about how have to be duplicated. Key fields are used to link ER
’S RES
OU
to organise it. A table of data on its own could
TEACH
WS
data between the tables. In the loans table, each
RCE
well be regarded as a database, since it is an book and student would be identified by their 10.4
organised collection of related data. If the primary key.
database application contains just one table, it is Databases which are designed with links ’S RES
referred to as a flat-file database. ER
between the tables are called relational
OU
TEACH
WS
It is important to separate data about
RCE
databases. These links give the DBMS much
different types of things into different tables. You greater power to process the data in the tables. If
10.5
would need to put data about books in a the library loans table tells us that a particular
different table to data about students in a library book was borrowed on a certain date, the DBMS key word
database. This seems fairly obvious, as the data can produce the name and address of the student
we collect about these two things is different. who borrowed the book.
However, there is sometimes a need for more When the primary key from one table Redundancy
careful thought. Would you put data about appears in another table for purposes of linking In a database, this
videos and DVDs that the library loans in the the tables, the key is referred to as a ‘foreign key’ means that it contains
same table as the books? in the second table. repeated data.
A more extreme example would be to
consider the loans file in a library database. If we
tried to put the student data and the book data
BookID, used to link the LOANS table to the BOOKS table,
into the loans table, we would soon realise that we becomes known as a foreign key in the Loans table.
would have to repeat data each time a student
borrowed another book, or when a book was
borrowed by a second student. You might try this
for yourself to illustrate the point. The repetition
of data in a database is referred to as redundancy,
and careful thought is required in order to
eliminate redundant data as far as possible. Foreign keys
Primary key
Links
To avoid data redundancy, separate database Figure 10.12 Organising the data into separate tables makes the database
tables can be connected by linking matching key relational. Linking the tables makes data access easier.
fields. If the book catalogue database table for a
OR
E ALE R Storing data organisations make backup files and store them
off-site, either sending them by courier service or
T
C
6.1 One of the biggest advantages of using a transmitting them over the Internet, so that in
Roles and
responsibilities computerised database is storage space. Vast the event of fire or other disasters, the data
volumes of filing cabinets used to hold thousands remains secure.
of paper documents. Now we can carry It is important to remember that while you
E ALE R thousands of megabytes worth of information are working on your database, the software
OR around in a pocket. The availability of CD and application and data files are in RAM. You
T
C
4.9 DVD technology means that the size of the should save your files regularly to your hard disk
Data security
physical storage space for databases has or network file server.
decreased manyfold. This has a further
advantage in that backup copies of files can be
easily transferred to disc or to magnetic tape. In
’S RES banks and offices that deal with large volumes of
ER
OU
TEACH
Activities
infobit
Identify Analyse Investigate
Most people use
1 How is a flat-file 5 Compare the file sizes of some 8 The Australian Tax Office ‘relational database’ to
database different from of your databases. Does adding needs to check data that is mean that there is a
a relational database? graphics to the data or headers submitted by taxpayers relation between tables
2 What is redundant increase the size of the file each year. It will use each in a database.
data? How is it significantly? individual’s tax file number However, to a systems
(TFN) to do this. Employers analyst, the term has a
eliminated? 6 Why are backup procedures
more technical
3 What are some of the carried out so often in banks are required to record TFNs
meaning, referring to
most common methods and large organisations? and banks strongly
the underlying
of storing database 7 Some backup systems need to recommend it. Why is this structure of the data
files? be large, while others need to necessary? Which other and the rules governing
be portable. Draw up a table to institutions ask for TFNs? how the data can be
4 How much data can a
manipulated.
CD or DVD hold? compare methods of backup
and give examples of where
they might be used.
2 In the design stage of your task, you will need to create form, and arrange the fields to give a customised look to
at least three separate tables of data. One for the your database. You might even be able to put a
customer’s details, one for the stocked items you are background to your form. Populate the database with
selling, and a third for the orders that you receive. In about ten records in each table.
your report, draw a data dictionary for each table 7 Make sure you save your work regularly and often.
showing data types and validation rules.
8 Create links between your tables. The primary keys from
3 Open your database application. Name and save your the Customer table and from the Stocked items table
database as ‘Mail Order Company’. should be linked to the fields with the same name in the
4 Create each of the three tables. Select an appropriate Orders tables. Indicate these links in the data dictionary
data type for each field. Customer name will be text, tables in your report.
Price will be numeric or currency. Include a primary key 9 Make a backup of your database. Where have you chosen
in each table. You may choose to include some graphics to store it? Explain your reasons in your report.
data too.
10 Examine the databases of some of the other students.
5 Add some format and validation rules into your data Are they different or similar to yours? Identify the
dictionary. criteria which you have used to make this evaluation.
6 You can enter data into your database using table/list Include your evaluation and a copy of several others in
view, or using a form. Apply a logo to the header of your your report.
Processing
10.3 they can update their database. It is likely that
their database is stored locally on the school’s
network file server or on the Department of
infobit
and analysing Education’s network. It would then be available
Some databases are to any person who has authorised access. In
designed to be closed
or ‘read-only’. This
data addition, new records would need to be created
for students new to the school.
means that it is not Some databases need to be updated so
In the previous section, we looked at the basic
intended that the data frequently that they are made available to many
structure of a database, and how relevant data
will be altered by the users over the Internet. An airline would need to
can be collected and stored there. In this section,
user. For example, the have the bookings file for its flights made
we will look at databases from the user’s
database which is
position. One of the most significant reasons for available to many users at the same time. Special
issued by the
using computers to store information is that we safeguards would be put in place so that a seat
Australian Bureau of
can edit data, and search and sort large volumes on a particular flight is not booked by two
Statistics after each
of data very quickly. people in different places at the same instant.
census would not
The record appropriate to a particular seat
require updating.
would need to be ‘locked’ from other users while
Editing the database anyone is working on it.
The structure for any database should be decided Other types of safeguards are put in place so
in the design stage of a project. Once the data is that, in the rare event of a systems crash, the
ER
’S RES entered into the database, there is usually little data’s integrity is maintained. In an EFTPOS
OU
TEACH
WS opportunity to change the field names and data system, if funds are being transferred from one
RCE
10.6 types. However, one of the biggest advantages of bank account to another, it is important that the
using an electronic database is that the data it debit of the money from one account is linked to
contains can be changed, updated and edited. the credit of the money to the other account. If
If you change your home address or the system crashes in the middle of the
telephone number, you would need to notify transaction, then the original status of the
your school’s administration department so that accounts must be restored.
infobit
1 In your data table, include Date of Birth as a date field. 4 Create a form to display your query results.
2 You can’t create a calculated field directly in a table, so
create a query or a form to do this.
3 In a query:
In a new field, enter the formula:
Age: DateDiff(“yyy”,[Date of Birth],Now())
Figure 10.14
Calculating a Final calculated field, “Age”
student’s age in
Microsoft® Access.
3.1
Software
systems Macros
A macro is a series of tasks which we want to
group together so that they can be run one after
key word
the other. In designing our database, we may want
to click a button on a form so that it displays a
message before it moves to another form. This
Macro involves three separate tasks—display a message,
Figure 10.15 Defining a series of tasks for a
close first form, open second form. If we group
A series of tasks macro. How many tasks are specified in the
grouped to be carried macro? What does ‘tiling the forms’ mean? these tasks together in a macro, they can be run
out one after the other. one after the other on the click of a button.
than their ages. We can set up a calculated field The tasks to be carried out in the macro can
to show the current age of the student by be defined in a dialog box, or they may be
calculating the difference between the date of recorded directly as the user performs each step.
birth and the current date. Figure 10.14 shows Figure 10.15 shows a typical dialog box for
how this is done on a form in Microsoft® defining the tasks in a macro. The macro is then
’S RES Access. You can see more details of how to do usually attached to a labelled button on the user
ER
these sorts of calculations in different database interface. You might also get a macro to run
OU
TEACH
WS
RCE
Activities
Identify Analyse
1 List three examples of databases in which 5 What is the difference between a query and a filter in searching a
data is edited frequently. database?
2 What criteria could be used to search a 6 The sports department at your school will probably need to calculate
library catalogue? students’ ages on 31 December of each year as only students of a certain
3 What is meant by secondary sorting? age are allowed to compete in carnivals and competitions. Describe how
4 What is a macro? Why are they so useful? you could get your database application to perform this task.
’S RES
ER
Investigate
OU
TEACH
WS
RCE
7 If a text field containing numerical data is sorted, it may result in a different order 10.7
than if it was defined as a numerical data type. Try this for yourself as an
experiment. Enter some numbers between 1 and 200 into a text field, then the same
numbers into a numeric field. Sort the data on each field. What happens? This is a
consequence of how the software represents the individual characters in memory.
What happens if you put commas and negative numbers into your numerical data?
Presenting
10.4 information on profits for a particular vehicle or
season. Alternatively, the manager may need to
access personal details about a member of staff
infobit
information or a customer. The database designer has to
In remote areas of consider how the end user of the database will
southern India, a It is important to remember that data stored in use the information, and in what form it should
series of Internet databases should be easily accessible to the end be made available.
kiosks have been set user. Database designers and administrators
up so that villagers can
access vital services
should always have the end user in mind as they
design, build and maintain the database. In
Presentation of reports
such as medical A report is a way of presenting data as a printed
section 10.1, we looked at a library loan report.
diagnosis, farming
The library assistant needed to access individual document. It will usually contain quite a large
advice and applying for
records about loans and customers, but the volume of data for use by the company’s
government loans.
manager needed a much broader perspective. management. The data may be generated directly
The information might be accessed locally, from from a table or, more often, it would be the result
across a network or the Internet. It might just of a query from several tables.
key words need to be displayed on a screen or as a hard Various design elements, such as text,
copy printout. pictures, lines and boxes, can be used to enhance
Consider the needs of the manager of our the appearance of a report and improve
Adventures for Rent company from the last communication of the information.
Reports
section. The manager may have little awareness Database software makes it possible to
Used to present data in organise the way the data is laid out on the
of the design of the database which holds
printed format.
information about bookings and customers, and printed page. In design mode, headers and
Form only be concerned with getting correct footers can be inserted for the whole report and
A form in a database information quickly and easily, such as for individual pages. A report header might
application is used to contain the report name and the company logo.
display one record at a March Bookings
Vehicle type Customer name Cost
The footer on each page might contain the page
time on the screen.
Bicycle Smith $60.00 number and perhaps the date. If the number of
Davis $48.00 columns is large, landscape orientation could be
Sum: $108.00 used. Reports can be exported to other
Helicopter Davis $3,750.00 applications for further processing, or printed to
James $2,500.00
Smith $10,000.00 special pre-printed stationery.
Sum: $16,250.00 Grouping the data can also make it easier to
Powerboat Davis $1,470.00 understand the information presented. Such
James $1,260.00 presentations of data are often referred to as
Sum: $2,730.00
summary reports. They can be quite useful for
March Bookings1 : Report
users who do not want to wade through pages of
Figure 10.17 Report 1 2 3 4 5 6 7 8 9
Report Header
detail. For our example of the Adventures for
from Adventures for
March Bookings Rent company, the manager might need a report
Rent company. A query
1 which summarises the information about which
was used to find the Page Header
Sum: =sum([Cost])
Forms
final report is shown
Page Footer
at top and the Design Have you ever looked at a computer screen and
=Now0 = "Page " &[Page]& " of " &[Pages] wondered what you were supposed to do to
view is shown below
Report Footer
it. make it work? As you become familiar with a
Activities
Identify Analyse Investigate
1 What is the main 5 A supermarket docket lists 8 Most garage service departments give their customers
common purpose store information as well as a printed report listing parts used and jobs completed
for building a items bought by the customer. for each vehicle serviced. Try to find an example of
report? In what way can this docket be one of these and design a database that could
2 Where does the classed as a report from a produce such a report. What is the advantage of such
data come from database? Which parts of the a report from the customer’s viewpoint? Why does the
that appears on a docket represent the header, garage used pre-printed stationery to print the
report? the body and the footer of the report?
3 In what ways can report? 9 Look at the user interface on several devices in your
reports be 6 Reports are often output to local shopping centre—ATMs and supermarkets in
formatted to pre-printed stationery. Why is particular. Draw a sketch of several examples and
improve this sometimes a better option indicate what design features have been used to keep
communication of than designing the headers in the interface user-friendly.
information? the database software? 10 Database designers often build a prototype user
4 What features of a 7 What happens when user interface. What is a prototype? Design a prototype
user interface make interfaces are difficult to use? user interface for a travel centre which specialises in
it easy to use? What does being user friendly cheap flights to the USA.
have to do with ergonomics?
computer application, it is easy to forget that Bookings The form header should Figure 10.18 Booking
there will be many people who may not remind the user which data form for Adventures
Bookings is to be entered. Graphics
understand how to use it. Database designers for Rent company.
can also help.
must put careful thought into what the users will Booking ID 1 Why is it important for
see on the screen. This plays a major part in Customer ID 1 the layout to be
Layout should be simple.
making the database user-friendly and Vehicle ID 2 Data can be entered into simple? What other
ergonomically sound. Date 1/03/04 different tables from one controls could be used
common form. to keep data entry
Figure 10.18 shows a form for recording Number Days 4
simple?
bookings made with the Adventures For Rent
company. It is a very simple design and the links
to other parts of the program are clear. However, Footers can contain buttons
to help navigation to other
if large amounts of data need to be input on the forms, functions or records.
same form, fields would need to be grouped Open
appropriately. Forms are used for data entry, Customer Form Print Form Close Form
viewing, editing and even printing data. They are Record: 1 of 7 E ALE R
used specifically to display one record at a time OR T
C
inappropriate as an interface to a database years ago. As more people became aware of the 3.5
designed for children. The wording and size of advantages of using application software, so there Features of
was an increasing need for compatibility between a GUI
text would also need to be chosen carefully.
hardware and software. Universal standards have
E ALE R Questions
OR
1 Find a copy of an application form for a 3 Use a database application to design a form
T
C
4.9 health fund (you may find one either in a for entering data about a new member to a
Data Security
brochure or on a website). What sort of health fund. Include a health fund logo and
validation checks would be used to help the apply validation checks to ensure accuracy.
data entry process? Who would be 4 Encryption is often used to ensure that the
responsible for verifying that the data cannot be understood by unauthorised
E ALE R
OR information that John supplied was correct? people. This is especially important for
T
C
7.2 2 Discuss the issues of data accuracy, security credit card details or other sensitive
Ethical issues and maintenance in this scenario. information. Research the topic of
encryption and present a report of
the latest encryption technology.
key words
Questions
5 Australia’s Privacy Act gives everyone the right you begin to document the extent of
to expect their personal information to be information that is held about you by Importing data
handled securely by government and private different organisations? Do you know why it is Transferring data from
organisations. You can now expect to know collected and what it will be used for? Find a an outside source into a
why your personal information is being copy of a privacy statement issued by any of database or other
collected and how it will be used. How would the health funds and summarise its content. applications.
Exporting data
Transferring data to
been established. This means that we can now Fortunately, many software programs can
other applications.
usually transfer data between different types of understand each other’s data, as long as it is in a
software on different types of computers. In this common format, for example, delimited text.
section, we will look at moving data from one The delimited format can take various forms.
software application to another. One of the most common is the tab-delimited
format which uses the ASCII tab character to
Importing existing separate each field and a carriage return to
separate each record in a database. Files can be
electronic data interchanged between spreadsheets and
Most database applications are able to store databases using this technique.
infobit
graphics, sound or video clips in their data Data in many applications can usually be
tables. Even though these files have been created converted into plain text by removing all of its In tomorrow’s world,
in a different application, the database software formatting. This option is commonly found in one digital storage may be
is able to work with it by importing the data. It of the menus of the application window, either as so cheap and sensors
is also possible to establish links between files, a ‘Save As’ or an ‘Import/Export’ command. so small that we will
rather than import the files themselves. This has live ‘documented lives’,
the advantage of keeping file sizes smaller, but it Exporting data for other wearing tiny ‘life cams’
may restrict the portability of the application. that create video and
Many software packages now have options to
uses data streams of our
integrate personal information, such as Saving data in the delimited text file format is a entire life experiences.
appointments, phone numbers and to-do lists, useful way of transferring or exporting data The information will be
with e-mail functions. Mobile phones and between different database applications. stored in databases
personal digital assistants (PDAs) may allow you However, some databases also allow you to and auto-archived for
to share information with your office-based transfer or link data directly to another type of instant access at any
time.
computer and between software applications. application, such as a spreadsheet or presen-
If a business needed to upgrade its database tation software. In this way, data can be
by having to re-enter all their data from the presented as charts or as web pages.
keyboard, it would be an enormous task. Figure 10.20 shows how a mail merge
Import data into Export data from
the database. the database.
Customer DateLastVisit Value of
Database tables can be Data can be
imported into database name purchase
exported to
applications. other
Peter 1/2/04 $200
Export data from applications.
Text, hypertext, Mary 2/5/04 $500
graphics, video, charts the database.
can all be stored in
David 3/4/04 $250
fields in the database. Figure 10.19 Data can
be imported from and
Data tables can be displayed in other applications
Whole databases can be saved in different formats, exported to a variety of
such as word processing documents, spreadsheets
then opened in different database applications. and presentation software. applications.
function is useful for customising letters and their stores. A personalised letter including an
producing mailing lists from a database. A offer of a 15% discount might encourage the
Mail merge
chain of retail stores is planning a special customer to visit the store once again. The mail
Combining data from a promotion on a particular item. From their merge option may also be used to print the
database into a word-
database, they can identify all customers who labels for the mail outs.
processed letter.
have spent a significant amount of money in
Activities
Identify Analyse Investigate
1 Why is it easier to share 4 File types such as JPG and RTF are now 7 Research the development of
information today compared considered universal standards. How does this technology—try to find some
to twenty years ago? make it easier for people to share data? old textbooks and talk to
2 What is the advantage of 5 Consult the Help files in your database some people who were
saving a document as a text- application to see if it is able to store sound working in the technology
only file? files and video clips. Which file formats does industry several years ago.
3 What are the advantages for a the application support? How easy was it twenty years
marketing manager in using a 6 Some schools or clubs might use a mail merge ago to transfer data from one
mail merge option? option to print mailing labels. When would application to another?
this be useful?
2 Add a graphic field to the database you created in the letter in a word processor to invite them to your
previous question. Populate this field with some birthday excursion. Mail merge the data from your query
photographs of your friends. You might use images from and save the document.
a digital camera, or scan in some printed photographs. 4 Using the database in the previous question, insert a
How does this affect the size of your database file? field to record the star sign of each of your friends.
3 Add another field in your database to include dates of Export the data to a spreadsheet and create a chart to
birth. Create a query to find only the names and show the distribution of friends and star signs.
addresses of friends over the age of 13. Create a form
E ALE R
OR
Past, current and emerging technologies
T
C
7.2
Tracking the products or tracking the customers? Ethical issues
Until recently, members of the public have such as aluminium cans and cardboard boxes.
been protected by privacy legislation from The tags have already been used in Sydney to
retailers who might use databanks and trace workers’ uniforms, by beef farmers to
analysis to track and widely share the track livestock, and to monitor the
information they gather about customers’ temperature of fruit and confectionery.
shopping habits. In the future however, Privacy advocates are alarmed about the
customers may be slowly desensitised to RFID technology, which could enable
sharing their information, because in doing so, businesses to collect an unprecedented amount
they will get discounts on products or faster or of information about consumers’ possessions
more personal service. Already the rewards of and movements.
‘loyalty programs’, such as shoppers cards and
frequent flyers points, are enough to allow
retailers to build profiles of their customers by Questions
tracking their purchases. This then enables 1 Why do retailers offer loyalty programs
them to tailor marketing and advertising to their customers? Could this practice
programs to fit the individual preferences of be considered unethical by some people?
their customers. 2 RFID tags were originally intended to
Auto-ID is a worldwide co-ordinating track products during manufacture and
group for the radio frequency identification delivery. Discuss how these tags would
(RFID) industry. The group plans to embed help in this situation.
RFID tags, tiny radio-emitting tracking 3 Why are some people becoming
devices, in all consumer goods, including concerned about the use of these tags?
clothes, household electronics, and packaging Is there a way to compromise so that
they can be used by the retailer but with
customer privacy still protected?
4 Discuss other situations where the
tracking and automatic identification of
people or animals might be useful.
Project
10.6 the library to research your topic. Interview
people who work in relevant areas. If you
have an opportunity, visit your local
development medical centre and observe how data is
captured and secured.
Project scenario • Document your project. Record and
Throughout this chapter, you have thought about acknowledge your sources of information,
databases for many different applications— plus anyone who has been particularly
business, education and social. In this section, you helpful to you. Keep a diary of your ideas,
will design a database for a medical centre. progress and any problems you might
You will need to consider what the owners of encounter. Always keep backups of your
the medical centre will require from this database. work separately in a secure place. A hard
The database will need to match the requirements copy of records and interfaces is useful as
of the users: are they to be the doctors or the backup and may be needed for user
receptionists? Apply all the design features that documentation later.
you have learnt about during this topic in the
context of core chapter 1: Projects: Design,
Produce, Evaluate. Manage your project
Designing possible
effectively by planning, communicating and solutions
E ALE R
OR documenting.
T
C
1.1 Start by getting the whole class to brainstorm • Plan your project. Draw a timeline to
Defining their ideas. Appoint one person to draw a concept allocate enough time to all parts of the
the problem
map as issues are discussed. Your teacher might project. Identify the main tasks to be
then organise you into smaller groups for the rest completed. Allow realistic time-frames for
of the project, or you may need to work research and documentation. If you are
E ALE R working in a group, decide responsibilities
OR individually.
and agree on communication issues. Who
T
C
T
C
their first visit to the medical centre. Are 1.3
Producing
there any input devices apart from the Producing solutions solutions
keyboard which would be particularly
useful for the data entry clerk? • If you built a prototype in the design stage,
• You will need to create queries and you may decide to develop on from this, or
calculated fields to process the data. These you may need to start on a whole new design
can be included in your design. The end for your database. In either case, you will
user will also want to edit and sort the data. need to document your decision—what you
Demonstrate how you can export your data decided and the reasons for your decision.
to other applications. Create meaningful • Before you build your database, you will
reports and include appropriate charts to know exactly what data you will include in
communicate information effectively. Mail your design and how it will be organised.
merge is a significant option to consider. Required forms, queries and reports etc.
Brainstorm some ideas with your group. will have been documented, along with user
• Build a prototype and have it evaluated. Get interfaces and controls. After this, creating
your peers to try it first, then teachers, the database should be straightforward, but
parents, siblings, etc. Do you know anyone it could also be a lengthy process. Try to
in a medical centre who might be willing to work ahead of your schedule. Document
try it out? Write down some questions that problems and their solutions, and backup
they might answer for you, such as regularly.
particular comments about the outputs of • If you are working in a group, be sure to
the database, how easy it is to use, screen allocate tasks fairly and give each other
design, etc. You might also observe the constructive feedback. Meet regularly and
testers to see if they are clear about ensure everyone knows about progress and
navigating through the database. Document problems.
this feedback and discuss it with your group • Populate the database with real data and
or teacher. Remember it is better to have a produce a user manual. Be sure that you
simple design that works, rather than a explain clearly what your application can
large fragmented application that is full of do, and how to do it.
errors. E ALE R
OR
Evaluation
T
C
• Document your design. When you have a 1.4
fair idea of your design, document it Evaluation
carefully. Draw detailed diagrams of the • You should have a list of evaluation criteria
data dictionary and user interfaces. Record well documented. Explain how these criteria
your thoughts and reasons for your have been met by your project.
decisions. Document the evaluation criteria • Hopefully, you will have had many
which will be used later. Some of the opportunities to test your application
following factors might be important for during its development, so you will know
measuring the success of the project: that it works. If there are any serious
delivery on time, processes well- limitations, you should discuss them in your
documented, comprehensive user manual, documentation. If there is no user manual
file sizes, cross-platform delivery, and or mail merge component, you should
compatibility with hardware. What security explain why.
measures should be implemented in the • Report on the various groups who have
project, such as backup and restrictions on tested your finished project. Include the
access? Can you include an on-line Help file documentation which records their
in your database, or hyperlinks to user feedback.
• Finally, you could comment on how well attractions and travel firms that are
you feel you have developed the project. Be particularly in need of user-friendly
honest and write down what you can databases
improve on next time. It is often the case • You could look in the Yellow Pages for more
that at the end of a large project, you can ideas.
look back and feel you could have done
better. This is because you have been
through a learning process—not just
Further ideas for projects
learning about technology, but about • As you have learnt throughout this topic,
yourself as well, and about working with databases are used in many walks of life,
other people. Try to document the positive and they are diverse in their structure and
aspects of the project and feel confident that interface. If you have the opportunity to
you can apply your new and improved skills design and produce another database design
in the future. project, try to include some different ideas.
You may choose to:
Ideas for projects — try a web-based application with some
scripting functionality in it
• You may choose instead to consider a
— link to a database that is available for
different scenario, such as:
public access
— a geography application containing a
— investigate the technology behind
list of countries, cities, forests,
distributed databases, or research some
landmarks or mountains as a database
encryption methodologies
— a business application for a small
— use a different software application;
company or organisation, for example,
there are some available for download
a fast food outlet, a bike hire shop,
from the web on a trial basis
carpet cleaning service, taxi service,
zoo, or museum
— an educational application, like a student
database with links to library loans and
teachers’ mark books, or a database of
Additional
10.7
key terms, issues, case studies etc from
this book
content
— a social application for clubs, tourist Expert systems
Humans are not particularly good at remembering
Components of an facts, but they are quite good at manipulating
Hardware and
Expert System
software interface knowledge—information that deals with
relationships between facts. If you were told that
Inference David is Susan’s brother, it may be easy for you to
engine conclude that Susan is David’s sister. One
key word
User statement is fact and the other is inference.
A database can contain vast amounts of
data, whereas a knowledge base also contains
rules for determining and changing the
Expert system
Knowledge relationships between that data. Expert systems
A software application Field
Expert
base are software applications which contain
which imitates the
knowledge bases, along with the ability to make
decision-making process
of a human expert.
decisions using inference engines.
Expert systems provide information and
Figure 10.22 Components of an expert system.
solve problems that would otherwise need a
person experienced in that area (an expert), such mechanic. Others can provide valuable second
as a research scientist or engineer, a lawyer, opinions in the medical and financial areas.
medical consultant or farmer. Some expert Some of the first expert systems were
systems can expand their own knowledge bases developed in the medical field. However, their
by observing how humans make decisions. use is now being applied to help train new staff,
Consider an experienced mechanic who has to reduce time and errors, and to provide expertise
test a piece of equipment. An expert system in a wide range of applications. American
might observe, or it might be told, the steps Express uses an expert system to automate the
which need to be followed to find the fault. At process of checking for fraud and card misuse.
another time, a less experienced mechanic could Insurance companies can automate insurance
be prompted to follow the same logic that the claims. Factory workers can find parts, tools and
expert system had learned from the previous procedures for maintenance jobs, reducing time
mechanic. and cost by a large factor. Some Microsoft
Along with the knowledge base, an expert packages contain expert systems for diagnosing
system needs a user interface which allows the printer network problems.
user to interact with the system, and an inference
engine which applies the logical principles. Some
expert systems provide automated data analysis,
which can save time, such as in the case of the
chapteroverview
Large business enterprises need to organise information the Internet. Some are freely available to the public, but
about their employees, customers, products and services so personal information must be kept private by the
that data can be accessed and updated appropriately. The organisation collecting it.
design of the databases in which this data is stored The database management system (DBMS) is the
determines the effectiveness of these processes. software which allows users to access, update and format the
The hierarchical structure of databases allows individual data in the database. Data can be kept current by editing the
data items to be easily identified, and presented in formats data regularly, while particular records can be found quickly
depending on the users’ needs. Forms and reports are two of by searching and sorting the data. Automated methods, such
the most common. as calculations and macros, help with processing the data into
Data is collected from a wide variety of sources, with useful forms.
social, ethical and legal standards applied to prevent the Integration of data into different software applications
misuse of this data. Input devices and methods ensure that means that information can be collected and presented in a
data is accurate, and personnel are employed to ensure the variety of formats. Data may be imported from another type
security of the data. Databases can be stored on a local of database, or a mail-merge letter can be written by
computer or access may be need to be across LANs, WANs or exporting data to a word-processed document.
TER TE
AP
CH
ST
WS
Digital Media
CHAPTER OUTCOMES CHAPTER CONTENTS
You will learn about: 11.1 The purpose of digital media 177
• the purpose of digital media 11.2 Types of digital media products 181
• types of digital media products
11.3 Data types for digital media
• data types for digital media products 187
• manipulation techniques for digital data 11.4 Digitisation of data types 194
• digitisation of data types
11.5 Digital manipulation techniques 198
• file formats
11.6 Factors affecting file size 206
• factors affecting file sizes
11.7 Display and distribution 208
• display and distribution of digital data
11.8 Project development 211
• development of digital media products
• people and issues involved in digital media 11.9 Additional content 213
• social, ethical and legal issues
• current applications of digital media
You will learn to:
• define digital media
• assess a range of digital media products
• recognise and select different digital media data
types
• describe the purpose of a digital media product
• explain and perform digitisation of a selected
data type using appropriate hardware
• select and use appropriate file formats
• discuss and manipulate factors that affect
file size
• examine the display and distribution of digital
media products
• select and deliver digital media products for a
targeted audience
• design, produce and evaluate a digital media
product
• critically analyse a range of digital media
products based on identified evaluation criteria
OPTION
11.1
Figure 11.1 After five years’ development at Weta Workshop and Weta Digital, and a brief appearance as a shadowy presence in
The Fellowship of the Ring, the CGI character of Gollum had a major role in The Two Towers and The Return of the King as a
digitally animated leading player.
Gino Acevedo exchanged his airbrush for a computer Actor Andy Serkis wore a custom motion-capture suit,
graphics tablet and stylus for the first time in his career. ‘I with fifty body markers which stood out from the actor’s
crossed over to the dark side’, he says. ‘They set up a computer bodysuit and reflected intense white light from their tips,
in my studio and we started tests. I painted silicone with veins providing the detail, down to toes and fingers, needed to
and moles and scanned them. I used a computer airbrush using animate the CGI Gollum. Serkis also wore dots on his face to
Maya Studio Paint, in 3D space. I have to say it’s a whole new help the CGI animators to track his facial movements.
medium. I’ve got all my favourite colours, they never run out, Motion-capture technicians eventually recorded 686
and they never spill. I told the guys that if they could put a versions of 315 Gollum actions, accumulating over
couple of vents on the side of the monitor and blow toxic 1.8 million frames!
fumes in my face, it would be perfect!’
The purpose
11.1 and video. These are known as the digital media
types. The word media (singular: medium) can
key words
continues to grow, touching almost every part of renderers—jobs which did not exist ten years
our lives. These changes have been brought ago! Commuters on railway platforms use
about by our ability to represent the real world mobile phones to dispense a soft drink from a
in digital form. vending machine, which then automatically E ALE R
We live in an analogue world, but computers debits their account; martial arts expert Bruce OR
5.2
T
C
live in a digital one. The analogue images we see, Lee is recreated for a new starring role thirty Current and
the shapes of the letters forming the words we years after his death; mobile phone users send emerging
technologies
read, or the sounds we hear vary continuously. and receive multimedia messages, or keep
This analogue data can be thought of as a updated on the current cricket score; visitors
continuous waveform. explore the ‘virtual’ Louvre Museum in Paris, or E ALE R
the Sydney Opera House, without leaving home. OR
Digital data, on the other hand, is
T
C
represented as an exact quantity, using digits. Digital media influence many areas of the arts.
4.5
Data types
Computers use binary data consisting of only Computer programs now control the special
two digits: zero and one. The challenge of effects of many stage plays, the synchronisation
representing real-world analogue data in digital of music and lighting at dance parties is digitally
form is to code continuous analogue data using controlled, and it is digital media which provide
only sequences of zeros and ones! the raw material for most computer-based
The main forms into which digital data can multimedia work. When three or more digital
be grouped are text, audio, graphics, animation media are combined in the one product we
WS
RCE
version of the Australian concert film, ‘Long The Internet and shopfront-based intranets
Way to the Top’, and made it available have provided many gamers with an interactive
continuously for 24 hours, during which viewers medium for playing computer-based network
could choose the form in which they viewed the games.
show. Some players spend many hours in artificial
ITV has a similar level of interactivity to environments known as MUDs (multi-user
DVDs, but is still fairly limited. Some domains), where each individual makes decisions
organisations have experimented with guessing affecting other players.
and betting games between friends watching in Three-dimensional realistic characters,
the same room or with other subscribers using a complex background sounds and greater attention
phone hook-up. to detail have meant that game environments have
An interactive version of the BBC’s successful become compelling. If you haven’t already done
‘Walking with Dinosaurs’ documentary was very so, read the In action story on the development of
popular. Option chapter 9: Authoring and the Australian game Ty, at the start of chapter 9:
Multimedia provides more details about this. Authoring and Multimedia.
Surgeons have also been able to use these Even simulation software used by the
techniques to perform remote operations, where military has benefited from advances in digital
they can select a camera view and control camera game development techniques.
angles while they operate on a patient in another
part of the world.
This exciting area of digital media will
Health
continue to grow and evolve and will draw upon There are many examples of digital media products
the talents of a large range of digital in the field of medicine. We will mention three.
professionals. Now, if you were to have an X-ray or
computerised axial tomography (CAT) scan, you
Games could request a CD-ROM with your scan stored
as a digital graphic.
Many of the advances made in digital media Digital hearing aids can now be attached to
have been driven by the games industry. computers, which allows patients to adjust the
Your younger brother is playing his latest sound quality and sensitivity to suit their needs.
video game title. It cost four times more than the Doctors can perform operations on patients
presents you remember getting, and fits on one in another country using digital virtual reality,
mini-CD-ROM. Games have certainly come a
long way!
Early computer games were played in shops
and arcades and then, as home computers
became widespread, their popularity increased
further. Most early games were based on a simple
bat and ball, but soon racing car simulations and
tank battles appeared.
By 1982, specialised game consoles such as
Atari® were popular—there were 15 million in
homes in the US alone! In 1985, the Japanese ex-
toy-maker Nintendo launched its own
entertainment system, with Sega following soon
after. When Sega asked Sony to develop a CD-
ROM drive for its new system, this eventually
led to the creation of the Sony PlayStation®.
More recently, Microsoft has entered the field
with its Xbox®. Figure 11.3 Digital version of an X-ray scan presented on CD-ROM.
guided by a team of surgeons from different opportunity to advertise to large audiences with
specialties all working together. customised ads which can be sent to consumers
who have already shown an interest in a
Commerce product. As SMS gives way to multimedia
messaging services (MMS), these ads become
Feel like a Coke® to take on the train but short of even more difficult to ignore—combining text,
change? Simply phone up the vending machine on audio, graphics and video. Flat-screen panels
the railway station and it will politely dispense a now even advertise to captive audiences in toilet
can for you and debit your account. cubicles.
Are you actually at the supermarket? How All these examples illustrate how far the
quaint! Now you will not only have to find and impact of digital media has reached in some
collect the items from the shelves yourself, but places, and this impact continues to grow.
you will also have to scan in their digital bar
codes, and weigh and pack your shopping while
random digital ads scroll across the screen.
Perhaps next time you will order on the web.
Real estate agents create virtual digital
journeys through houses which are up for sale,
using digital panoramic photographs.
Mobile phones offer companies the
Activities
Identify Analyse Investigate
1 Identify five examples of digital media 4 Identify three digital media 6 Use a class survey to find out what
applications which have only existed in products and determine the most popular digital media
the past few years. which data types are often game was among the class in their
2 Identify a popular digital media product found together in the same later primary years. Investigate
currently available for home computers. digital products. what made this game popular.
3 State two examples of digital media 5 Determine what is currently 7 Search for a site offering on-line
products from each of the following areas: the most popular digital grocery shopping. Select five
a arts and entertainment game among your friends. common items and work out the
b health Analyse what makes this cost. Compare the cost of using an
c commerce popular compared to other on-line site (include delivery) with
games. your usual supermarket.
Types of
11.2
digital media
products
Here we summarise some examples of digital
media products used in different areas and
examine their influences on our lives.
Desktop publishing
Digital images are used extensively in desktop
publishing (DTP), another digital media
application.
The DTP artist designs a template which will
Figure 11.4 Desktop publishing, such as this example using Adobe’s
form the basis of a project. They decide on the
PageMaker®, uses the basic metaphor of a desktop pasteboard arranged
typeface for headings, subheadings, body text and
with clippings of text and graphics pasted in position. The introduction of
captions and prepare the column layout guides
DTP software encouraged the acceptance of the GUI.
and master pages (content which will appear on
every page). They collect the media required: text,
line art (vector graphics) and photographic images
Graphical design
(bitmapped graphics). These are imported and There are four approaches to creating graphics E ALE R
OR
placed into the publication. on a computer, and each one copies a traditional
T
C
4.5
The advantage of DTP over word processors technique. Data types
is that the handling of text is more flexible. It can Photographic paint software (such as
be edited in resizable blocks rather than as Photoshop®) models the photographer’s studio.
inflexible words on a page. As the layout artist Draw software (such as Illustrator®) models the
stretches the box, the text reflows smoothly and technical illustrator’s drawing board, and natural
can wrap around the graphics (see Figure 11.5). media paint software (such as Corel® Painter™)
Although many word processors have added models the artist’s easel. There is a fair amount
DTP features, they do not yet match the power of overlap as well between these, as they
of specialised desktop publishing software. continue to add more features.
BANNER
Figure 11.5 Some
possible DTP
layouts. 2–column grid 3–column grid 5–column grid 3–column grid
Satellite imagery from space can be enhanced shapes wood) about its axis to produce a solid. key words
using false colours to highlight the world’s A third technique uses extrusion, which
shrinking resources and the population looks as if a solid was pushed like playdough
explosion on our planet. The DNA molecule can through a shaped hole.
Computer-generated
be shown in animated action: forming, dividing Three-dimensional graphics software allows
image (CGI)
and mutating. the designer to see the object from each of three
views: top, side and front elevation. A talented Used to create three-
3D graphics 3D artist can ‘think’ in this way and create the dimensional creatures as
characters in movies.
Three-dimensional images are an important required shape.
Lathing
component in many digital media products. They Hardware exists which allows real world
The process of creating
are the basis of computer-generated images objects to be scanned by lasers. The surfaces are a 3D image by rotation
(CGI) seen in movies, objects manipulated in read into the computer automatically to create of a two-dimensional
virtual reality, and in computer-aided an equivalent virtual digital shape. It is possible (2D) image (such as a
manufacturing (CAM). to scan a person’s face and body using this line segment) about a
technique. Recent equipment even records the central axis.
Creating realistic solid images is a difficult
task and various methods can assist the artist. surface colour data and reproduces the original Extrusion
One technique is to use colour to represent object precisely, along with surface The process of creating
a 3D image with a
heights, as in the program Bryce®. This software imperfections. Once the software has the shape
constant 2D
was used in the creation of the island of Myst in expressed as digital information, it can be used cross-section.
the game of the same name. To create a to manipulate the object in endless ways.
Wire frame
mountain, the designer simply drew higher areas Four basic stages are involved in creating 3D The skeletal outline of a
in paler colours and the lower elevations in images. First, wire frames are created using 3D 3D image made up of
darker colours. The software then created a software. The second stage uses mathematical both its visible and
mountain complete with valleys and ridges. calculations to decide which lines to hide, hidden edges.
A second technique uses lathing. The shape of providing a more realistic ‘solid’ view of the
the edge of the object is drawn and the computer object. In the third stage, shadowing and colour
rotates this (in the same way as a spinning lathe are added. The final stage is realistic rendering
Basic shapes The designer uses 3D modelling software Complex shapes As well as combining simple
to create the wire frame for the console (left). building blocks, the designer can use some advanced
modelling techniques.
Figure 11.9 The 3D console (top left) was created in stages, using standard tools in 3D modelling software.
Figure 11.10 A spaceship created using Strata3D shown as wireframe and Figure 11.12 This blimp was created using 3D
final rendered object. The 3D artist uses at least three separate views during StudioMax by a year 10 student. It is a single
design: top, side and elevation (front). frame from an animation.
3.2 Virtual reality techniques use these 3D Audio CDs were designed to hold over an
Types of
software
methods but add interactivity. hour of high-quality stereo audio and the
Animation sequences
Digital animation sequences can be either two-
infobit
dimensional or three-dimensional. Basic 2D
animation can be either cel-based or path-based. In the BBC TV series
These are explained later in section 11.3 Data ‘Walking with
types for digital media products. Dinosaurs’, it was
Animations where each individual ‘cel’ is necessary for human
drawn individually and handpainted are part of beings to kick up the
Figure 11.14 No limits to your imagination! You dust where the
a long tradition of Disney films, from Snow can digitally create any world you like using animal’s feet touched
White to The Lion King. However, even Corel’s Bryce® 3D graphics application. the ground and
traditionally created animations now contain
integrate it with the 3D
computer-generated segments. editing software on their laptops.
figures to make the
More recently, full-length animations such as Apple’s iMovie® and Pinnacle® Studio® scene more
Toy Story from Pixar have been created entirely software for Windows® allow professional- convincing.
using 3D digital animation techniques on a looking editing to be performed on home
computer. Digital media products are used to movies, complete with creative titles, transitions
create the rich textures of video games and the and sound effects. Professional-looking
fictional 3D worlds in movies. productions can be achieved with only a little
Movie special effects use CGI—see the experience and training.
At the higher end, Avid®, Adobe® Premiere® E ALE R
introductory section, Inside action. Debate has OR
T
C
even started on the ethics of creating artificial and Final Cut Pro® are used by video 4.5
‘cyber-actors’. professionals to digitally edit video. This has Data types
greatly simplified what used to be a tedious
process of linear editing, where each edited
Video production section of film had to be carefully cut and added
Each Christmas Day, proud parents across as the next segment of a master tape.
Australia are taping their children’s special Digital or non-linear editing allows video
moments on digital video cameras, and will later segments to be moved around in the same way as
edit them into a family home movie using movie sentences can be moved in a word processor.
The technical challenge of video computer requires dedicated graphics cards and
decoders.
Video and animation use the same binary
methods as still images, but place much greater
demands on processing speed. The processor in Common file formats
the computer must move huge amounts of data File formats can be very confusing. Each of the
very quickly to display frames without them digital media we have discussed can be stored in
appearing jerky. many different formats. Knowledge of file
A regular video requires 25 frames per formats can help to avoid problems when files
second (fps) and even the poorest quality need to be opened in different applications and
animation has a minimum requirement of 8 fps. E ALE R
on different platforms. OR
The processor must therefore move nearly 2 MB
T
C
A common example is a graphic designed in 4.7
of data every 0.04 seconds. This has been one of Adobe® Photoshop®. If it is to be used in a Data storage
the greatest obstacles for digital media and many desktop publishing application for reproduction and function
different solutions to the problem have been in the school magazine by offset printing, then a
invented. None of them has yet completely suitable format is TIFF, at a resolution of 300 dpi
solved the problem. (dots per inch). key word
Some of the techniques used by developers to If the same graphic is to be used in a web
help reduce the amount of data required include: page (where standard screen resolutions are
• reducing the number of colours displayed 72 dpi), a suitable choice is JPEG or GIF. These
• reducing the size of the frame the video formats keep file sizes to a minimum. See Table File format
plays in on the screen 11.1 for a list of other common formats. The agreed standard in
which data is arranged
• combining pixels to represent them as fewer
for a particular data
averaged colours
• recording only the pixels which change Data types
11.3 type.
OU
TEACH
WS
products
RCE
All of these solutions lead to a loss of quality 11.4
and care needs to be taken about which
technique to use and when. Each of the different data types used in digital
Playing DVD video at high quality on a media requires specialised knowledge. Each can
Activities
Identify Analyse Investigate
1 Name two software applications 4 Analyse why you think there 7 Search for the phrase ‘digital media’ on
used in the graphics industry. are so many file formats the web and use a single sentence to
2 Name the digital media types available for graphics when summarise the contents of the first ten
which can be used in desktop compared to other digital sites delivered by the Google™ search
publishing applications. media. engine. Repeat using a different search
3 Select two common file formats 5 Describe how desktop engine, such as All the Web. Compare
used for each of the media publishing differs from word the results of the two search engines
types—text, audio, graphics processing. and comment on the differences.
and video. 6 Outline the stages in the
creation of a 3D graphic for a
movie.
Table 11.1 The most common file formats used in digital media.
form the basis for a career. There are digital to related information. When clicked with a E ALE R
experts who only work in graphics, or only work mouse, it allows access to related data. OR
T
C
in audio, and so on. The interview at the end of 4.5
Data types
this chapter is with a specialist in 3D graphics.
In this section, the emphasis will be on
Audio
recognising and handling the data types of text, There are two basic methods of representing
hypertext, audio, graphics, animation and video. audio in digital form: digitised wave files or
Detailed explanations of the different data MIDI files. key words
types are to be found in core chapter 4: Data
Handling, and this should be studied alongside Digitised wave
this option.
Sound is made up of continuously vibrating air Hypertext
particles striking our eardrums. Sometimes they
Text and hypertext vibrate rapidly and at other times slowly. This
Text which is linked to
related information.
gives sound its changing pitch. Sometimes they When clicked with a
Text is the least demanding of the data types in
vibrate greatly and at other times a little. This mouse, it allows access
terms of processing and storage. A large amount
gives sound its changing volume. to related data.
of text-based information can be stored using a
Digitised wave audio takes small ‘slices’ of a Digitised wave
small amount of memory. As we learn in core
sound and represents them digitally. The smaller The digital
chapter 4: Data Handling, the code most
the sample (sample rate) and the more digits representation of
commonly used to represent the alphabetic and
available (sample size), the closer the digitised continuous waveform
numeric characters is known as ASCII (American
code is to the source signal. Standard audio analogue data.
Standard Code for Information Interchange).
sampling on your favourite CD is at a rate of
ASCII uses 7 bits, which allows 128 different
44 kHz, a size of 16 bits, and is in stereo.
symbols to be coded—enough for the letters of
There are many formats for digitised wave
the alphabet and some other symbols.
files and these are discussed later in this chapter.
Other ways of storing textual information are
available. Portable document format (PDF) files
can contain graphical as well as textual data. This
MIDI
format is especially useful when you do not wish A second way to store audio data is by using
people to alter your original document. MIDI codes. The MIDI protocol is an entire
Another popular use of text is as hypertext, music description language using binary code.
which we study in detail in option chapters 9: The musician uses a device such as a
Authoring and Multimedia and 12: Internet and keyboard to input the data.
Website Development. Hypertext is text linked MIDI does not send actual musical notes, but
4.5 Digitised wave audio, on the other hand, can three-dimensional space. These points form wire
Data types capture a live orchestra, a scream, a single frames which can then be lit, rendered (given
instrument or background noise. surfaces) and even rotated on the screen using a
mouse.
Some fun 3D software allows direct user
Graphics interaction with a blob of ‘clay’ which can be
nudged and poked into new shapes.
2D Graphics Hardware also exists which allows real 3D
Figure 11.16 illustrates two ways to store and objects to be scanned by laser.
infobit
process 2D computer graphics. We call these
The CSIRO Analytical paint and draw. There are other terms too: paint
Research Laboratory is
developing a method
for searching image,
Task Audio data types
audio and video files We will compare a digitised audio file to a MIDI (all 8-bit stereo). Give each a suitable file
without the need for
file of equal duration, using QuickTime® Pro or name.
key words. They have
any other suitable audio software. 3 Record a MIDI file, again exactly 10 seconds
coined the word
‘annodexing’ to 1 Record a sample of an audio CD, exactly 10 long, using about six instruments, and save
describe the process. seconds long, in MP3 format, and save it in it.
If successful, it will a suitable format, such as WAV or AIFF. 4 Compare the file sizes of all the files and
have application in 2 Save this as three separate files using three explain the differences.
medicine and in police sample rates: 11.025, 22.05 and 44.1 kHz
searches for faces.
Vector Raster
Task Draw software
Use a vector-based (draw) software package, such lines for the edges of the cutaway and r
as the drawing components of Microsoft® Works either fill the shape with black or make it (x, y)
and AppleWorks®, CorelDraw®, Illustrator®, or semi-transparent.
Freehand®, to imitate the illustration in Figure 5 Add three electron guns and a focusing
11.18 of a VDU monitor. ring with a pattern of pixels on the surface
Figure 11.16 A
1 Create the basic shapes needed using the of the screen. Create electron beams using
draw and a paint
rectangle tool (find out how to create the line tool.
image, both
rounded edges in your software package). 6 Use the words in bold in Figure 11.18 as depicting circles.
2 Add graduated fills to the sides to give an labels for your diagram.
illusion of depth. 7 Save this file with the name
3 Add other polygon shapes and use the ‘yourname_draw’. We will later compare the
circle tool to add four differently coloured size of this file to one produced using a
quadrants to the monitor screen. This part paint package.
will be a challenge! Find the ‘group’ 8 Extension exercise: Redesign your house,
function and group all objects as one so apartment or backyard using a draw
you can’t accidentally move them apart. package. If you have access to a landscape
4 Add a cutaway section to the side of the design tool, use this to design your own
monitor using the polygon tool. Use blue dream backyard.
magnetic deflection
three electron guns yoke
shadow mask
pixels
VDU
Task 3D software
Using three-dimensional software, such as 3Ds max™, 3 Add the three electron beams coming from the centre
Carrara™ 3D Basics, Strata™ 3D, or Bryce®, can be a steep back to the front of the screen.
learning curve. The idea of this task (if you have access to 4 Add the flat image on the screen at the front. Many
3D software!) is for you to dip your toe into 3D. If you like 3D packages allow you to wrap a 2D image onto a
what you see, there is a whole world to explore! surface. If you cannot do this, then simply create a
Your task is to develop a simplified illustration in 3D of flattened 3D sphere and place it at the front.
a VDU and its electron guns, as shown in Figure 11.18. 5 Add lighting, and render the final scene using matt
1 Select your software application and create the basic plastic surfaces for the casing, and glass for the screen
primitives (shapes) for the box as wire frame models. at the front.
2 Align these shapes in the correct way (a challenge!) 6 Use the words in bold in Figure 11.18 for your labels.
and group them. 7 Save the file with the name ‘yourname_3d’.
OR
E ALE R Animation popular for 2D animation. It is a vector-based
format and is very suited to the Internet, where
T
C
4.5 Animation is the rapid display of still images. It bandwidth can be a problem.
Data types is best described as the illusion of movement Working through the in-built lessons
generated by a series of still graphics, each included with your animation software will help
slightly different from the previous one, being you learn a lot about the different types of
rapidly presented to the eye. animation.
key word The two basic 2D animation techniques are
cel-based and path-based. In cel-based animation, a
series of separate images is presented rapidly on an
Video
unchanging background. In path-based animation, Handling video presents digital media workers
Animation
an object is moved along a predefined path. with their greatest challenge. The main issues are
An illusion of movement
Further description of animation techniques
produced by displaying
a series of images appears in option chapter 9: Authoring and
rapidly, each one Multimedia. The emphasis here is the creation of
slightly different from an animation.
the one before it. Macromedia’s Flash™ has proved extremely
E ALE R
Task Exploring animation software OR
T
C
3.2
Types of
In this task we will use two-dimensional 3 Add a background scene which will appear software
animation to move separate components of a throughout the animation.
VDU (as in Figure 11.18) to form the whole VDU, 4 If using Flash™, have some fun with ‘shape
using Macromedia® Flash™ or similar software. tweening’ to distort the model of the VDU.
1 Create the basic shapes required and place 5 Taking it further: try to make the VDU
them in separate layers on the screen. ‘dance’ to a music track!
2 Use path-based animation (called ‘motion
tweening’ in Flash™) to make the parts
gradually move together.
Activities
Identify Analyse Investigate
1 Identify the five digital media data types. 4 Explain the advantages and 6 Select a sample of one
2 State three common differences between disadvantages of the two audio of each digital media
the tools available in a paint and a draw types of digital media. type and use a suitable
application. 5 Draw a diagram which illustrates application to display
3 Identify two types of digital audio. the five digital media types and them in a linked way.
their subgroups.
Task Video
In the following task, we will work with digital video in the 4 Each group then uses video editing software to save
development of an actual product. and edit the segments into a digital video of
Create a short video consisting of segments which are a approximately one minute, adding transitions, titles
maximum of 10–15 seconds long. They should demonstrate a and background music.
secret skill, magic trick or tell a joke. Use software such as 5 One student in the class then edits together all the
iMovie® or Pinnacle® Studio®. group videos into a single short film and adds an
1 Form groups of four or five students. opening title.
2 Each person should then plan and script their segment 6 What tool would you put on a wish list which was not
and practise it with their group. available in your video editing software?
3 The group will then film each segment using a digital
video camera.
the large files produced and the need for high When a digital video is stored on CD-ROM,
processing speeds. This is discussed in more it takes time to be read from the disk, and then
detail in core chapter 4: Data Handling, as well the computer’s processor has to decompress the
as option chapter 9: Authoring and Multimedia. data as it plays.
The original filmed sequences may be shot
on film or analogue videotape and will first need
to be digitised and compressed.
ER
’S RES
Digitisation
11.4 Digitising text
OU
TEACH
WS
RCE
T
C
software process of using a scanner to convert a variables as accent and microphone distortion. 4.2
scanned graphic image, such as that of a printed Such measurements as volume, pitch and Data forms
page in a novel, into editable digital ASCII length are compared to a database of phonemes
characters. The scanned image of a page of text (the smallest sound units used to form words,
is a graphic rather than text, but after OCR is such as ‘duh’ + ‘oh’ + ‘guh’ to form ‘dog’).
carried out, the text can be copied and pasted
into a word processor.
The OCR software first looks at the white space
Audio
in the image to determine where the text flows, No digitisation is necessary for MIDI sound, as it
then tries to match the pixel patterns of each is created in digital form in the first place.
printed character to its in-built library of letter Analogue sounds, on the other hand, must go
shapes. If this fails for any letter, the more intensive through a conversion process.
process of ‘feature extraction’ takes place Analogue audio signals can be captured
(see Figure 11.20).
1 When a scanner reads in the 2 The OCR software reads in the 3 In its first pass at converting
image of a document, the bitmap created by the scanner images to text, the software
scanner converts the dark and averages out the zones of tries to match each character
elements—text and graphics— on and off pixels on the page, through a pixel-by-pixel
on the page to a bitmap. mapping the white space on comparison to character
the page. templates held in memory.
4 The characters that remain 5 Most OCR programs give you the
unrecognised go through a option of saving the converted
more intensive process called document in a popular word
‘feature extraction’. processor or spreadsheet
format.
Figure 11.20 The illustrations show the stages in the OCR process. The OCR software has identified the shapes of individual letters
and words on a printed page and then loaded these into a word processor as editable text.
using microphones. The first microphones We learned earlier that digitisation is a three-
consisted of carbon dust held in a diaphragm step process: sampling, averaging each slice and
through which passed an electric current. As the coding each slice.
sound waves struck the diaphragm and disturbed
the carbon, this current was altered. Most
microphones today contain a cone which
Graphics
vibrates in response to incoming sound waves. Bitmapped graphics can be digitised in a variety of
Magnets attached to this cone move and alter the ways: by drawing and painting with a mouse or a
current in a nearby coil of wire. These changes in graphics tablet and stylus, by scanning, or by using
current correspond to the sound waves. These a digital camera.
small currents are amplified and sampled as A digitising tablet (also known as a graphics
described above under 11.3 Data types for tablet) converts pen strokes into movements of
digital media products. The sampled ‘slices’ are the pointer on the screen. Most also respond to
each averaged and finally coded digitally as a pressure and allow more ‘digital ink’ to flow
stream of ones and zeros. when pressed harder, which is not possible using
Acoustic recogniser
Lexicon Natural language engine
Matches
Models Volume Pitch Length Tremor Matches
’Put it there...‘
i: as in six there Put it their
I as in sit
th e r their Put it there
as in ten
they’re Put it they’re
æ as in hat
Sound
waves au as in home The match is compared The best fit is found which
to the database of gives the sentence meaning.
as in sing known words.
a mouse as an input device. A grid of fine wires of digitised video. These are the size of the
in the surface of the tablet recognises the position window in which the video plays on a computer,
and intensity (due to pressure) of the pen tip’s how many times per second the video frame is
magnetic field. The screen pointer moves updated (30 fps for TV and about 15 fps for
appropriately to match these co-ordinates. most multimedia), and how many colours are
A digital camera uses an array of charge- used to draw the image.
coupled devices (CCD) to sense the light striking Video producers try to avoid ‘busy’
their surfaces. These have filters which ensure backgrounds with lots of colours, and actors
each one senses either red, green or blue light. wear costumes with few colours and avoid such
Figure 11.22
Voltages from these are sent to an ADC and the things as reflective ornaments. The more colours
Fingerprint
digital data is stored in suitable format in the which need to be handled, the more data is
identification
camera’s memory. This storage device is usually required for each frame, resulting in a larger
software (FID)
a flash memory card. video file, slower playback and lower quality in
looks at the ridges
the final image. to locate the
Most owners of digital video cameras must
Video keep lots of digital video (DV) tapes, as this
centre of the print
and the points
Digital video cameras use the same digitising remains the only practical way to store the large where the ridges
principles as digital still cameras outlined above, amounts of digital data at a high-enough quality. end or divide.
but need to process 25 frames per second (fps). Edited sequences used for computer
Frame grabbing is the process of capturing playback will have reduced quality after
an entire frame of analogue imagery and undergoing compression techniques such as
digitising it. Three factors affect the appearance MPEG.
Figure 11.23 A flatbed scanner uses a series of mirrors to focus the image picked up by a moving scan head on a series of sensors.
These sensors are light-sensitive diodes and translate the amount of light sensed into electrical current. The more reflected light,
the greater the voltage.
Text manipulation
2 The array consists of strips of CCDs that
overlay the entire picture area like rows Once it is digitised, it is possible to perform all
of bricks in a wall. Covering the array
are coloured filters that let every third the standard word processing manipulations,
stripe pick up only red, green or blue making the word processor a far superior tool to
light.
the typewriter. These manipulation features
3 The diodes in each red, blue and green CCD include cutting, copying and pasting, drag-and-
string are coupled, as they are in a scanner.
In addition, each diode in, say, the bottom
drop, typeface changes and spell-checking.
blue strip is coupled vertically to the next
blue diode two strips away. This happens for
red and yellow strips as well.
Figure 11.25 Digital still and video cameras need to process a lot of data
simultaneously instead of a single stream. The solution is to use charge-
coupled devices (CCDs), which use photodiodes connected like beads on a
necklace. Figure 11.24 A graphics tablet and stylus.
Activities
Identify Analyse Investigate
1 Define the term ‘digitising’. 5 Outline a situation in which each method 8 Outline, using diagrams, how
2 Describe four techniques for named above for digitising of text would analogue video recording tape (as
digitising text. be the most appropriate. used in a VCR) and digital
3 State three methods for digitising a 6 Outline a situation in which each method videotape (as used in a digital
graphic and identify a situation in named above for digitising of graphical video camera) differ in the way the
which each method would be the images would be the most appropriate. magnetic particles store the data.
most appropriate. 7 Explain in words how sound can be 9 Research the differing frame rates
4 Which of the five data types do not converted from analogue to digital data for cel-based animation, analogue
require digitisation? Explain why. and why digitisation of MIDI data is film, television and video, and
unnecessary. present these in a table.
Special software can take text and reshape MIDI can be edited easily using its built-in
and shadow it to create special text effects. The tools. Have you ever played a built-in tune on a
WordArt feature in Microsoft® Word provides MIDI keyboard and changed the instrument
a basic version of this, but Photoshop®, selection while it was playing? The digital code
Illustrator® and other specialist software allow for that instrument was being altered and the
far more extensive manipulation. effect of the change can be dramatic! It is even
Most computers can help the disabled by possible to substitute a sampled sound from your
speaking text. own voice as a replacement for the instrument.
councillors are overseas. Paint software can add image must fill this gap in some way, and the
them into the image in their correct positions. software algorithms must analyse the colours of
Professional-level paint software offers an the pixels and ‘interpolate’, or insert, new pixels
infobit
amazing variety of ways to manipulate an image. based on the original colours.
Photoshop® started Adobe® Photoshop® is the most widely used Morphing is the transformation of one image
life in George Lucas’s and popular image-editing application for into another. The word is an abbreviation of ‘meta-
company Industrial Macintosh® and Windows® computers. morphosis’. It requires two original images and the
Light and Magic (the Table 11.2 summarises the main effects available mapping of corresponding points on a mesh from
makers of Star Wars), in this program. the start image to the finished image. In-between
and was used to
frames are created by the software in a process
convert images from
one format to another. Advanced graphic known as tweening (from ‘in betweening’).
There are many examples of special software
It was then purchased
by Adobe for
manipulations designed to achieve these effects, but a
particularly popular one has been SuperGoo,
commercial sale and
has since had features
Warping and morphing features of which have been included in newer
added constantly. Warping is the manipulation of an image by versions of Adobe® Photoshop®. You can also
distorting or transforming. The software use Macromedia® Flash™ to easily achieve these
technology behind such a process is not simple. effects using its shape tweening approach.
When an image is stretched, some pixels must
‘move apart’, creating a gap. The new warped
Task Photoshop®
Here, you will create a zany cartoon person composed of bits 7 Choose a piece of fruit for the mouth, such as a red
of fruit, and practise digital graphics techniques. pepper. Use the magic wand to select all the red pixels,
1 Find pictures of fruit and vegetables from the Internet or duplicate and drag this onto the face.
other sources. Choose images that would be suitable for 8 Crop the final result.
this project, such as a potato for a body, orange slices for
ears, grapes or peas for eyes, etc. Resize each of these if
necessary.
2 Drag each image so they are all positioned in the one
window.
3 Choose a base piece of fruit to be the face.
4 Select a suitable fruit for the eyes, such as a grape. Use
the elliptical marquee to select the shape, then duplicate
it and position them on the face.
5 Choose a piece of fruit for the nose, such as a carrot or
squash. Resize if necessary. Use the magnetic lasso to
select it, duplicate it and drag it onto the face.
6 Choose a piece of fruit for the ears, such as a slice of Figure 11.26 Selection tools at work—an
orange. Use the magnetic lasso to separate the flesh from improvement on Mr Potato Head®?
the skin, duplicate it and position it on the face. Would you eat Mr Fruit Salad?
key words
Virtual reality reality which uses a keyboard and a mouse. Two
types of VR movies are possible using
Virtual reality (VR) effects are achieved using QuickTime®: panoramas (the best known) and
headsets, but there is a kind of desktop virtual objects.
Warping
Panoramas allow us to explore up to 360
The manipulation of an degrees of a scene with interactivity, whereas object
image by distortion.
movies give us the opportunity to feel as though we
Morphing are handling a three-dimensional object.
The transformation of This technology is suited to virtual reality
one image into a second
journeys through museums, where travel occurs
but different image.
between rooms or floors. Each node can be
Virtual reality (VR)
considered a jump to a new cylinder of the
A computer program journey.
and associated hardware
which convincingly
simulates a real-world
environment.
Figure 11.27 ‘Want a dance?’—things are never
the same after a warp.
Video manipulation
Amazing effects are now available to filmmakers
which would have been beyond belief in earlier
times.
It has now become easy for the home
computer user to create their own movies using
editing software available for desktop
computers. The film is usually shot on digital
movie cameras and stored on digital videotape.
There are four basic steps to editing a home
movie: collecting and ordering the clips, adding Figure 11.29 iMovie’s® straightforward interface
transitions, adding effects (such as sepia tones), makes simple video editing a four-step process:
adding sound, and adding titles. Professionals import clips, add transitions, add titles, and add
would include other steps, such as colour special effects and audio.
grading, adding filter effects, and the
compositing of live action with CGI. This last Animation manipulation infobit
step is where computer-generated images (CGI)
are combined with live action sequences or other Animation is an illusion. It is produced by The word ‘animation’
CGI into single scenes. displaying rapidly a series of images, each one comes from the Latin
Professional editing is performed on slightly different from the one before it. The eye word ‘animatus’,
advanced software such as Premiere® or Final ‘sees’ the effect as a smooth movement due to a meaning ‘to give life’.
Cut Pro®, where many more sophisticated characteristic of the retina and the brain known
effects are available. Digital video allows the use as ‘persistence of vision’.
of special effects such as chromakey, where an In cartoon animation, many drawings are
’S RES
required for every second of animation in order ER
actor is filmed against a coloured backdrop
OU
TEACH
WS
RCE
(often blue or green) which is removed before to give the illusion of movement. Each of these
superimposing the actor over a new background. drawings must then be traced and coloured by 11.6
Analogue film may be used in the initial hand. Digital animators use scanners and paint
stages of filming and digital editing used to software to colour and digitise these images
create the final product. rather than the traditional painstaking method of ER
’S RES
OU
TEACH
taking photographs of each of the drawings on WS
RCE
film. 11.7
OU
manipulate an image in such a way as to make the changes — altering the basic reality of the
TEACH
WS
RCE
undetectable. Models are given perfect complexions and photograph 11.3
prominent people are removed from being photographed in — removing objects from a photo
compromising situations. Frequently, portraits on the front — cloning pixels to create a new image
pages of newspapers are reversed so that the subject is — making radical colour changes
facing towards the text. Which of these changes is ethical • if a photo is questionable in taste, it must be discussed
and which are not? with the appropriate news editors
The following is the ethics guide of the Chicago Sun- • if a photograph has been radically altered, whether in
Times for image processing: the photo-taking process or in the electronic
• permissible: darkroom, it must be credited as a ‘photo illustration’
— dodging and/or burning in areas of a photograph
without changing content Question
— making overall improvements to improve
Your are a photo editor for this paper, the Chicago
reproduction
Sun-Times. Write a letter to the chief editor pleading
— correcting technical defects in a photo by cloning
for permission, despite the ethics guide, to remove
— making colour changes to correct colour shifts and
unwanted background from a photograph of a
improve quality
politician to make it more ‘suitable’ for the front page.
Macintosh® and Windows® computer platforms, synchronised within the same window.
was created to play digital video, but now it can The name chosen for that product reveals the
play many types of media: audio sound and technical challenge—how to process quickly
MIDI, virtual reality objects and panoramas with such large volumes of data. QuickTime® Pro also
hot spots, video with text ‘chapters’, karaoke, acts as a mini digital media editing tool.
vector-based sprites, 2D and 3D animations, and Such software allows export to many
web streaming audio and video. These can be on different formats (AVI, BMP, DV stream,
separate ‘tracks’ and yet play and be Photoshop®, Maya®, JPEG, TIFF, FLC,
Figure 11.33 A scene like this shows how a director can change the
The entrance look and feel of a shot. In this example about 40% of the
face shot final image is different from the original.
taken from The special effects team is able to work with the director
outside the to create a totally believable and convincing look.
park at night. One piece of equipment used in the industry is a Kodak
In this case the crew shoots the park from inside and Cineon scanner, which digitises analogue film at
removes the tower on the left. They then insert into the 12 7590 000 dots per frame, stores, manipulates it digitally
background of the scene a reversed image of the face and the and then records it back to film at the same resolution.
Luna Park name in lights. The amount of expense and effort required is often very
great in creating digital special effects but the results can be
spectacular—as anyone knows who has seen recent CGI
movies!
Activities
Identify Analyse Investigate
1 Explain the difference between warping 5 Outline a process for 8 Write a full account of the
and morphing. compositing a photograph of a steps involved in creating a
2 Identify four different methods of sunset over the ocean and a short movie of a family
selection used in advanced paint software. photograph of a full moon in holiday from DV tape input.
3 State two manipulation techniques for the night sky.
text which could assist a disabled person. 6 Explain two methods of
4 Describe possible manipulation techniques masking.
for digitised audio which might be used 7 Explain the function of the
by the sound engineer for a band in a cloning tool in a paint software
recording studio. package.
QuickTime®, WMP) and offers many types of need to be accessed from a hard drive, CD, DVD
compression for audio and video to reduce file or other storage device. This not only involves
sizes and allow smooth playback. reading the data, but finding it too—preferably
within a millisecond!
One solution is to use file compression. A
hard drive can read a compressed file much
Factors
11.6 faster than an uncompressed one. Today’s
processors can decompress a file faster than if
affecting file size they had to process an uncompressed one.
Compression is now a standard part of a
computer’s operating system.
Video and audio produce much larger files than
text or graphics. Without compression there
would only be enough space on a CD-ROM for Reducing file sizes
20 seconds of video at television broadcast There are standard ways to reduce the size of a
standard and it would take three seconds to file and this depends on the data type being used,
display each frame! but the quality represented by the file’s data may
To put it simply, the challenge for video be sacrificed.
hardware is to process and display as many For a graphic, this may mean either lowering
separate images as possible each second. Since an the image’s resolution (fewer dots per inch),
average graphic might be over one megabyte, displaying fewer colours (reducing the colour
this has presented computer engineers with their palette), or reducing the physical dimensions of
greatest challenge. the image. For a video, the above techniques
apply and it may also mean reducing the frame
Memory sizes and rate (the number of frames displayed per
second). At the display end of the process, a
key word
processing speed small image can be disguised by pixel doubling
Large file sizes present problems in three main (providing an apparent increase of the
areas: space on storage devices, available dimensions of the image) or, particularly in the
Colour palette case of video, by integrating it into a larger image
memory in the computer and processing speed.
The number of colours
These large files not only have to be stored, to disguise its small size.
available for displaying
an image.
processed and displayed quickly to provide the
illusion of smooth motion in a video, they also
Compression techniques technique as data and image quality are both lost
in the process. No decompression is performed
key word
Compression for video and audio is handled in viewing a JPEG file—the data removed is lost
using compression and decompression forever.
algorithms known as codecs (compressors– Codecs
For a sound file, compression can involve
decompressors). The best of these are able to reducing the sampling rate (the number of sound An algorithm to
work with the computer hardware to compress and
samples taken per second), making it mono
decompress a data file,
decompress each video frame as quickly as rather than stereo (this will halve the size), usually audio or video.
possible. reducing the sample size (the number of bits used This compression may
Compression works by eliminating to code the sound sample), or reducing the be either lossy or
unnecessary data. Compression can be applied to amount of data stored by not recording every lossless.
any kind of file: text, programs, audio, images frequency, as in the MP3 format.
and video. It can reduce the size of a 15 MB The MP3 audio format achieves compression
video to 150 KB. The uncompressed file would by eliminating the frequencies that the human
be far too large to deliver to a screen fast enough ear cannot detect. It involves loss of data,
or download from the web in a reasonable length although no one would be likely to notice the
of time, but the compressed file could be reduced sound quality.
downloaded in a few seconds. For viewing, a E ALE R
Video compression can use the methods OR
4.8
T
C
decompression algorithm is used. already discussed, but there are other
There are many standard codecs. Some are compression tricks available. Because the image Data
compression
designed to reduce file size and others are is constantly changing, and because adjacent techniques
designed to speed up file transfer over the frames of a video are usually only slightly
Internet. These codecs have names such as different, a common method involves recording
Cinepak®, MPEG-4 and Sorenson®. Such only pixels which change between frames. This
products as QuickTime® and Windows Media® requires storing less data, and video file sizes are
Player have many built-in codecs. Codecs can be greatly reduced. This method is used for sound
lossless (high quality, large files) or lossy compression as well, where only the differences
(lower quality, small files). between successive sound samples are recorded,
instead of the whole sample. See option
Lossy compression chapter 9: Authoring and Multimedia, Figure
The JPEG graphics format selects a range of 9.15. MPEG compression for video is very
pixels in the image that are nearly the same powerful and can reduce video file sizes by up to
colour and bands them together as one colour. 200:1. It uses very complex algorithms.
JPEG allows different levels of compression, and It is sometimes possible to see when
the higher the compression the more pixels that decompression fails to keep up in a video, with
will be replaced by that colour. JPEG ‘artefacts’ such as pixelation or blocking
compression is known as a ‘lossy’ compression appearing on the screen.
4 Half the samples To shrink the sound file even further, half as many
4 samples are used every second. This makes the sound muddier.
2.2 image which may appear ‘jumpy’. many ways, the development of these mobile
Hardware The lowest possible frame rate for acceptable delivery platforms parallels the evolution of early
components animation is 8 fps. Realistic motion starts at desktop computers from simple text-based
30 fps and motion pictures use 60 fps.
We have already discussed the fact that, due to this was referred to as the information
its limited capacity, CD-ROMs are likely to be superhighway, but today it is more often referred
replaced by DVDs as a storage medium in the to as the broadband network.
near future. Interactive television, e-commerce, on-line
Digital media need a easy, cheap and readily services such as theatre bookings, financial services,
available method of storage and distribution. encyclopaedias, and virtual reality entertainment
CD-ROMs became widely accepted when are some of the services we will experience.
How did you become involved in digital media? What software do you use?
In high school I wanted to be a traditional graphic artist. My I mostly use Photoshop® for painting textures and laying out
interest in digital art began when my mother booked me into projects. I also use After Effects®, Digital Fusion and Elastic
a digital effects production house for my year 10 work Reality®, and I use Shake® for compositing. For 3D, I use
experience. From that point, I did anything I could to learn Alias|Wavefront Maya® for modelling and animation, but
about computers, and graphics in particular. I’ve spent many years using 3D Studio Max®. For rendering
I most often use Renderman® or Mental Ray®.
What do you enjoy most and least about your
work? Is the computer platform used for the creation of
digital media an important consideration for
I especially like developing new techniques. The range of
you/others?
things we need to know is different for every project. I get a
big buzz out of learning new things about the craft. Finishing For me it’s important to understand the basics of a few
jobs in my industry can definitely be tedious. A film effects different platforms, such as Windows®, Mac OS® and Linux®.
project can last three to six months or longer. There are pros and cons for each. The previous company I
worked with used both Windows® and Mac®, but the current
What work have you done in the past that has one primarily uses Red Hat Linux®. Each company has their
pleased you most, and why? own reasons for choosing their preferred platform.
I’ve just finished two large projects this year, one dealing
What is your prediction for what will become the
with reproducing realistic water effects and the other
standard medium of distribution and delivery of
requiring us to create a photorealistic elephant and toucan.
digital media over the next five to ten years?
Both of these projects turned out well. The success of any job
depends on many factors, including the amount of time you Film- and video-based industries will see High Definition TV
have, the type of digital effect you are doing and the people (HDTV) starting to become the standard over the next five
you work with. to ten years. HDTV is around six times the resolution of
standard TV (1920 by 1080 pixels).
What would be your most recognised piece of
work? If you could conjure up any advance in technology
to assist your work in the field, what would it be?
Probably the National Nine News introduction graphics.
Faster computers! I don’t think they’ll ever be fast enough.
What should a budding high-school digital
designer do to develop their digital media skills?
They should definitely work on visual and creative skills first,
before worrying about learning different software and Questions
computer skills. Computer software is ever-changing, and Dan Kripac mentions a number of factors
what you learn one year won’t necessarily help you the next through this interview which he believes are
year. If you don’t have a good foundation in composition, important for the success of a digital media
form, colour, tone and movement, then the computer will be project. List these factors.
far less useful to you as a tool. In my profession, having a
good show reel is very important.
Activities
Identify Analyse Investigate
1 What are the three problems 5 Outline the method used in lossy 8 Use the Internet to find out how LZW
which large file sizes present compression to reduce graphics compression works and also describe one
in multimedia? file sizes. other lossless compression technique for
2 Identify five methods which 6 Identify a method of delivery of graphics.
can be used for reducing the digital media which does not 9 PKZIP® and Stuffit® are popular
file sizes of graphics and video. involve CD-ROM or DVD storage. compression formats for delivery of
3 Name two methods of 7 Select an appropriate display software and word processing files.
compression for graphics files. device for digital video for a Explain why these techniques must be
4 Name four devices used to shopping centre audience and lossless. Find out what the ‘PK’ stands for.
display digital graphics. justify your choice.
Project
11.8
•
in a quick chain.
Create a good soundtrack, possibly
T
C
Introductory moviemaking tips 1.1
Defining the
We see so many movies that we set high • Form a team of about 6–8 people. problem
standards when we watch anything on video.
• Agree on a statement which clearly
Include the following features in your video.
describes what you understand the project
• Insert a title at the beginning. above is asking and outlines a synopsis
• Use a fairly high number of shots. On any (story) for your short film. All team
TV show it is rare for the camera to stay members sign the statement. Have your
fixed for more that 15 seconds. The director teacher OK your final written synopsis by
will cut between different angles to signing it. This sheet will form the first part
maintain interest. For example, the screen of your documentation for the project.
might show a boy’s face while he’s riding • Assign each person one or more of the
his bike, and then switch to a more mid- following areas, although every person
range shot of him on the bike. should observe the others as they work and
• Use interesting angles for the camera any team member can suggest changes and
shots—tilt it, or get low down or high up. help with any task:
• Try some interesting transitions between — casting director
the shots. Some shots might fade into — desktop publisher
others, some might spin into others, and — scriptwriter
some cut very simply from one to another — storyboard
— camera operator
— director
Designing possible
— editor solutions
— technical assistant • Create or collect the required audio,
• Construct a storyboard for the project and graphics and video.
E ALE R have each member initial it to show they
OR • If you have divided the project into modules
agree with the concept.
T
C
1.4 — the scriptwriter word-processes the first Their comments will mean changes—
Evaluation draft and presents it to the group revisions and improvements.
— the storyboard designer refines the
content and sequence of scenes • The team completes their team
— DTP layout person designs logos for the documentation on all stages of the process.
project and starts designing the Include a record of the problems you faced,
pamphlet the solutions you found to these, and the
— the camera operator obtains equipment tasks each team member accomplished.
and practises their camera techniques • Include your promotional brochure with
— the director works with the scriptwriter your final documentation.
to establish a final script • Present your project to the class using the
— the editor learns and practises skills in brochure as a handout promoting the clip.
the editing software
— the technical assistant is ready to
arrange any equipment
Additional
11.9 2
as well as a set of basic criteria.
Select three columns from the list and, for each one,
select two actual products to compare and evaluate.
content 3 Place a tick in each box where that criterion is relevant.
4 Using the ticked boxes in a column as headings, evaluate
Evaluation of digital media each of the two products against those criteria.
products 5 For each heading, add a single paragraph comparing the
two products in terms of that heading.
Your task is to analyse a range of digital media products. 6 Circle each tick in the table where you judge that
1 Work through this chapter, carefully gathering the criterion to be a particularly important issue (such as file
various criteria used to evaluate digital media. Table size in the case of digital video).
11.3 provides suggestions of products you can analyse,
Criteria Adventure E-music CGI movie Bitmapped Vector Website Digital DTP 3D graphic Mobile phone
game sequence graphic graphic home movie with images
Digital media
types
Purpose
Audience
Effectiveness in
relation to stated
purpose
Digitisation
processes
Manipulation
techniques
File formats
Compression
techniques
File size
Storage
Delivery
Display
Speed
Suggested
improvements
Structure
(linear/non-linear)
Cost
Software used
Hardware used
Platforms
…more
chapteroverview
Digital media are used in many products that we encounter Many formats exist for the storage of each particular type
daily, from mobile phones to washing machines. Whatever of digital file. The requirements of efficient transmission and
their final forms, digital media files belong to one of the five storage, particularly of the often large files required by sound
categories of text (and hypertext), audio, graphics, and video, has resulted in the creation of compression
animation and video. standards. Compression can be either lossless or lossy.
To be used by computers, real-world analogue data must File sizes can be further reduced by methods such as
be digitised. lower sample rates (audio), reducing frames per second
Graphical digital media are manipulated in many ways, (video), or reducing the colour palette (animation, video and
including cropping, cloning, warping, morphing and graphics).
tweening. Digital video can be edited and special effects Text has long been the major digital media used for
added. Audio files can be ‘massaged’ to create the exact communication, but as transmission bandwidths continue to
sound required. increase, digital media of all types will become commonplace.
TER TE
AP
CH
ST
WS
WS everywhere were linked. Suppose I could London or the museum in Cairo you plan to
RCE
12.1 program my computer to create a space in which visit. World news is available at all hours from
everything could be linked to everything. These home, and favourite sporting events on the other
were the earliest questions Tim Berners-Lee, side of the world can be viewed in real time.
creator of the World Wide Web, says he asked. It is possible to virtually ‘attend’ a graduation
The Internet is one of the most dramatic or be ‘present’ at a friend’s wedding, to travel
examples of our ‘shrinking’ world. Instant almost anywhere in the world, and to visit places
communication, information and entertainment of interest and feel that you are really there.
are as close today as the touch of a button. The Closer to home, your family history can be
world has become a global community where traced, you can download and purchase just
each person can be as close as a telephone call, about any music you desire, watch videos and
e-mail or text message to any other person. share photos with family members anywhere in
the world. If English is not your first language
you can even have today’s Australian newspaper
translated for you in moments—as we’ll see later
in the chapter.
Before leaving for the beach you can use the
Internet to check surf conditions, or you can shop
on-line and order groceries delivered to the door.
You can use chat sites to collaborate on a
project, share files or simply communicate with
friends. Isolated or handicapped students can
study from home or hospital and access similar
Figure 12.1 resources to those who are able to attend school.
Websites allow The creation of the Internet is considered by
you to check the
many to be the biggest social change since the
weather across
Industrial Revolution, when the introduction of
the continent or
automation and production lines started huge
the globe.
social upheavals throughout Europe.
If you have access to the Internet, you have possible. The Internet Society decides the protocols key word
at your fingertips a stunning quantity of or rules that make the Internet work, such as the
information. At the time of writing, the Transmission Control Protocol (TCP) and Internet
Google™ search engine boasted it had indexed a Protocol (IP).
Internet
mind-boggling three billion pages! When your home computer is linked to an
Of course, information is very different from Internet service provider (ISP), it becomes a part A collection of
academic, government,
knowledge, and knowledge is very different from of this complex global communications network.
business and individual
wisdom! We can only now guess how we will use From your own point of view, you will be networks linked around
this powerful information tool and what effects unaware of the network boundaries you are the world via many
it will bring in the long term. crossing, the countries and computers through communication
which you are travelling, or the microwaves, channels.
Massachusetts, USA, was connected to a (ARPA) linked four computers and allowed
computer in California using a dial-up telephone hundreds of scientists to share research on a
line. Although data exchange was possible, the network known as ARPANET. Many other
circuits of the telephone system were not reliable institutions linked up over the next twenty years,
enough to successfully transmit a lengthy message including some private providers.
without errors. Another challenge was if a long In 1972, a new program allowed the sending
message was using a particular route, no other of messages over the net, and the first e-mail
communication was possible over the same route. (electronic mail) or direct person-to-person
A new way of sending large amounts of data communication took place.
to a destination was needed. Leonard Kleinrock Transmission Control Protocol/Internet
published the first ideas on a concept called Protocols (TCP/IP) were developed in 1974 by
‘packet switching’ in July 1961. He suggested ARPA scientists, which allowed different
message data should be split up into small networks to connect. Large mainframe computers
‘packets’. These could then be transmitted along owned by large corporations, governments and
different routes (using routers) and rejoined at the universities were the computers of the time.
other end in their correct order to re-form the Adjustments had to be made to allow for the
original message. In this way, any single link was newer, smaller microcomputers that were being
not occupied for the whole time it took to deliver developed. ARPANET remained the backbone of
a long message. the system until 1982, when the protocols TCP/IP
Communicating using packets instead of were adopted and the Internet as we know it was
circuits was one of the biggest steps in born.
networking, but first, lots of different computers By 1984, a thousand hosts were connected to
had to be able to talk to each other. the system, with each host transmitting such a
In 1969, the United States Defense large volume of traffic that concerns arose that the
Department’s Advanced Research Projects Agency new system would grind to a halt. More and more
010 011010 1
16
8.
34
1 1 1 010 .2
1 110 0
2
1
010 101011
0
110 100010
0
101 101011 Router desides most
0
011 101011
110
0 IP routes the data efficient path to
13
7.
16
IP
8.
3
Figure 12.4
4.
send pockets
22
01
11 0010
01 1101 010
110 01110 10101 01 A message is divided
10 010 01 0
01 1010 101 011 1001 Pockets have IP address
110 10101 0010 10010 11101 00100
010 011 11 111 101 1
101 1 001 001 0011 Router
into separate packets
1 010 010 011 001
01 10 1 11
110 10101 0010 100101 10110 1001
010 011 110 110 101
00 to send over the
101 10 010 010
101 101 101 1 010
0 1
110 10101 0010 00 11110 10010
0 16
7.
13
7.
13 13 8.
13
7.
16 Internet, and is
010 011 1 1
1 011 101 01
8. 16 7. 34
34
101
16 .2
1 10 10010 10010 01 rejoined at the
.2 8. 8. 2
4. 3 34
2
01 1010 101 1
22 .2
2
110 10101 0010 10
010 011
101
1 receiving end.
private providers offered the public a chance to each country, such ‘au’ (Australia) and ‘nz’
join this growing network. This put pressure on (New Zealand).
existing links to cope with the increasing demand. At first, all Internet communications were
infobit
The organisations maintaining the links had to only text and the Internet just meant e-mail, but
The WWW is the only upgrade continually. This process has continued with the introduction of graphical user interfaces
acronym that takes through the years to the point where even home (GUIs) there was a reason to invent agreed rules
longer to say than the users now expect high-speed access. (protocols) to allow images and sounds to be
words for which it In the early 1980s, the domain name system exchanged as well. HTML (hypertext markup
stands! (DNS) was developed to divide Internet addresses language—the code allowing web pages to display
into logical groups, such as ‘edu’ for educational correctly) and the first browsers made this
’S RES
ER organisations, ‘com’ for commercial, ‘gov’ for possible. These were able to display pages that
OU
TEACH
WS
government, and ‘org’ for non-profit had both text and graphics.
RCE
Activities
Identify Analyse Investigate
1 Identify five different activities that can be 5 What ways do you imagine 8 Investigate why dividing a
performed using the Internet. the Internet will impact on message up into small
2 Where did the word ‘Internet’ come from? our homes in the next ten packets is better than
3 Who created the Internet? years? sending the whole
6 How is the Internet built? message at once.
4 Name and describe the contributions of four of
the people or organisations that were involved 7 Describe how packets work on
in the development of the Internet. the Internet.
Another protocol (method) known as The major difference between the Internet
Hypertext Transfer Protocol (HTTP) was and an intranet are that the Internet is a public
developed to allow users to send and receive worldwide network and intranets are private and
HTML web page files across the Internet. It is controlled by particular smaller organisations or
HTTP which makes the Internet appear as if it is companies.
one large set of files, when in fact it is many files In some ways, intranet structures, although
stored on separate servers in different parts of smaller, can be more complex than the Internet
the world. It is HTTP which allows users to click as they may need to connect several local
on special words to link to other web pages and networks, each using different protocols.
to search the Internet.
Archie, the first search engine, was
developed in 1990, and in 1992 the World Wide
Web was released to the public by Tim Berners-
Lee and CERN.
Features and
12.4
uses of the
12.3 Intranets Internet
One of the Internet’s most powerful features is its key word
An intranet is a private network or group of cross-platform interoperability. The Internet
networks that are permanently connected and does not care whether you are using a
using the protocols of the Internet and the World Windows® PC, a Macintosh®, a UNIX™
Intranet
Wide Web. machine or any other. The Internet was designed
An intranet differs from a normal local area as a true cross-platform network. A private network or
This feature has made Internet technologies group of networks
network (LAN) because it uses international
permanently connected
standards, such as TCP/IP and HTTP, as its popular in internal networks as well. Many users
and using the protocols
communication protocols. at home and in workplaces have Windows®
of the Internet and the
Users attached to an intranet may have machines, but others have Macintoshes® and World Wide Web.
access to the Internet, but this is usually in a other types as well. Many use more than one
controlled way. An intranet can be protected platform in a mixed situation. The Internet allows
from open access to the wider Internet. them all to communicate and exchange data.
The police department, for example, may Another strength is that the Internet doesn’t
access databases from the motor registry office care what kind of network it is talking to.
and local council offices in a controlled way.
Together, these individual networks would form
a private intranet.
Connecting
A school-wide network is often a good It is possible to connect to the Internet in a
example of an intranet. Computers throughout number of different ways: traditional telephone
the school have access to the Internet, but dial-up connections which require a regular
through a proxy server. A proxy server is located modem; optic fibre cable which uses the same
between the user and the server they wish to means of delivery as cable TV; ADSL
contact. It can be used to prevent access to (asymmetric digital subscriber line) and ISDN
certain web pages or to speed up access by (integrated services digital network) connections
storing frequently used pages. Each terminal has which use telephone lines to deliver data only;
an address which obeys TCP/IP rules and there and wireless connections using mobile phone
are often school-based web servers which can be technology or even satellites.
accessed. Because Internet standards are used, Whichever method is used, the basic
computers throughout the school may use equipment includes a computer, some kind of data
different operating systems and still access connection, software for access, an account with
common files and servers. an Internet service provider (ISP) and a modem.
The telephone wire, as Type of line Transfer rate Cost (select a Special conditions
we know it, has in bits per monthly download (e.g. availability)
become too slow and second (bps) limit)
too small to handle
Internet traffic. It took Dial-up
75 years for ISDN
telephones to be used ADSL
by 50 million
Cable
customers, but it took
only four years for the
Satellite
Internet to reach that
many users. Table 12.1 Create a table in your word processing software like this one and complete the details.
23
The World Wide Web is a network of sites that 22 ARPANET hosts
can be searched and retrieved by a special 21
20 World Wide Web
protocol known as the Hypertext Transfer 19
A network of sites that
Protocol (HTTP). 18
can be searched and
Millions of websites have been created to 17
16 retrieved through
allow people to find information, share ideas, 15 hyperlinked pages using
express an opinion, provide on-line learning, 14 the Hypertext Transfer
Millions
13
entertain or just amuse. Newspapers and 12
Protocol (HTTP).
magazines are available from all over the world, 11
allowing ‘surfers’ to find out the news at home in 10
9
a language that they understand. 8
The WWW concept was designed in 1989 by 7
6
Tim Berners-Lee (see People profile earlier in this 5
chapter) and scientists at CERN, Geneva, who 4
were interested in making it easier to retrieve 3
2
research documentation. 1
Within a year they had developed a
Year 1969
1971
1973
1975
1977
1979
1981
1983
1985
1987
1989
1991
1993
1995
1997
‘browser/editor’ program and named the new infobit
network the World Wide Web. The browser was
When e-mail first
improved so that hypertext links could be used in Figure 12.6 This graph shows the dramatic increase
appeared, some
the search process. in Internet use which began in the early 1990s. questioned why
Hyperlinks join web pages together to create anyone would pay a
a website, with a home page (an file usually mail boxes all over the world that can send and fee to a service
called ‘index.htm’) being the first or opening receive mail wherever you are in the world. provider to receive their
page. Hyperlinks also join sites together across Although the message might travel right around mail. This shows how
the world. the world, the whole process takes only seconds. some people could not
It isn’t surprising that ordinary mail is referred to imagine the way in
It is possible to publish web pages privately which e-mail would
on an intranet. These pages are available to the now as ‘snail mail’.
begin a brand new
organisation using its own computers connected An e-mail server is like a web server that form of communication
to its own network or by authorised access using controls and stores e-mail. The mail client on the rather than replace
password and login identification. Schools and local computer receives and sends the messages. traditional ‘snail mail’.
businesses can give staff and students access to When the e-mail message arrives at the
material and information that is not available to recipient’s mail server, the message transfers to the
the general public, allowing for the publication POP (Post Office Protocol) server and remains
of student work and photos. there until retrieved. The SMTP (Simple Mail
Transfer Protocol) server handles outgoing mail.
To read an e-mail that has been received over
E-mail the Internet, an e-mail software tool (client) of infobit
Electronic mail or e-mail is the most used feature some kind is required. E-mail client software can Around 30 000 visits a
of the Internet, allowing people to communicate stand alone, as do Eudora®, Apple® Mail®, day are made to the
across the world. Communications can be sent to Microsoft® Outlook® or Pegasus Mail. Another school reunion site,
thousands of people at the same time with just type of e-mail client is one that is included as part Australian
one click, in the form of a bulk mail-out. of a browser (as in Netscape® and Microsoft’s SchoolFriends. The site
E-mail software acts like a simple word Internet Explorer 6+), and others offer free now uses four
e-mail services in the form of actual websites, dedicated servers and
processor, allowing you to edit, check the
requires a full-time
spelling and save a draft version of your letter such as Yahoo!® or Hotmail®.
worker to answer the
and then send the final e-mail. The mail client shows a list of all the messages
hundreds of e-mails
Imagine a collection of connected electronic in the user’s mailbox. By looking at the e-mail
daily.
message header, users can see who sent the e-mail, • CC: stands for ‘carbon copy’ and allows
the subject of the e-mail, and perhaps the time and you to send a message to more than one
date of the message and the size of the message. e-mail address at the same time.
infobit
When a user downloads this e-mail, the • BCC: stands for ‘blind carbon copy’. E-mail
A computer engineer e-mail client on the receiver’s computer takes addresses entered in this field are hidden
named Ray Tomlinson over, asking the e-mail server to: from the receiver.
sent the first e-mail • send a copy of the text file • Subject: should indicate what the message is
message in late 1971.
• save the file to the local computer about.
The link was made
from an internal mail • show all of the message headers in a list • Reply: creates a reply to the sender of the
program to the network • erase and reset the file message.
file transfer technology Clicking on any message header will open • Reply to all: creates replies to all of the
of ARPANET as a test the message and show the body of the text for recipients in the CC, BCC fields, as well as
message. the selected e-mail. to the sender.
Each account has a unique name so that • Forward: sends a copy of the message to
when a message is sent, the e-mail client gives the another recipient.
server the name of the receiver, the name of the • Attachments: allows you to send a file (one
sender and the body of the message. As other typical example would be a word-processed
mail is sent to the same recipient, the server document) along with your e-mail. The
recognises the messages and attaches the new attachment is sent using the File Transfer
messages to the bottom of a text file, which lists Protocol (FTP), which is different to the
them in the order in which they arrive. e-mail protocol.
An e-mail address has three parts, as shown Sending an e-mail involves many separate
in Figure 12.7: a mailbox name, an @ (‘at’) sign protocols all working together.
and a server address. In other words, it looks like Simple Mail Transfer Protocol (SMTP)
this: imastudent@institution.edu. controls how the ordinary text of an e-mail
The text file accumulates all the messages message is sent and received, as well as how the
until the receiver logs in to read them. message is organised, with a header (including
infobit subject, sender and receiver addresses) and body
In the U.S. alone, over
Parts of an e-mail (containing the message).
Multipurpose Internet Mail Extensions
seven trillion The following describes the elements of an e-mail
e-mail messages are
(MIME) controls how attachments, such as
message, as shown in Figure 12.8.
exchanged each year. computer programs, graphics or word-processed
• To: type in the e-mail address of the receiver documents, are encoded as binary files.
or get the address from your address book. Post Office Protocol (POP) controls how a
1 2 3 4
louis@doguemaison.com.au
Figure 12.7 Parts of an e-mail address. Figure 12.8 A typical e-mail letter.
mail server holds messages until they are of time is spent answering e-mail, and we have to
downloaded and cleared. pay to use an ISP.
The e-mail you type stays on your computer
until you hit ‘send’. Then a copy of the e-mail Spam
goes across the Internet to your service provider’s Electronic mail boxes can receive junk mail just
e-mail server. Here the server decides where the like an ordinary street letterbox.
e-mail is to go and sends it there. On the Internet, junk mail is called spam.
The e-mail remains on the recipient’s ISP e- Mass marketers obtain e-mail addresses, add them
mail server until the recipient goes on-line to to lists and mass-mail unwanted ads and offers.
check their e-mail. The advantage of e-mail is ’S RES
E-mail and viruses ER
OU
TEACH
that it is instant, automatic and cheaper than a WS
RCE
An e-mail virus is one that is usually contained in
telephone call, and the recipient does not have to
an attachment that is sent along with the e-mail.
12.3
be at their computer to receive it.
Some would argue that, far from making our The attachment is usually an executable file,
lives simpler, e-mail has introduced a whole new or a small program called a ‘macro’ which is
usually used by applications such as word ’S RES
set of issues to our daily lives. To keep in touch ER
OU
TEACH
processors or spreadsheets. WS
we must now log in to our computers each day
RCE
or two, most people receive large amounts of A genuine macro is a helpful addition, 12.4
unsolicited and unwelcome mail, a large amount allowing the automation of actions such as
WS
RCE
12.7 mini-programs, unwanted ones can be written Traditional letter writing requires the writer to
which damage files on your computer. If set the tone of their letter first. This takes time,
activated, these macro viruses can attack the and in the rapid-fire world of e-mail is
computer’s system files, or destroy files on the considered a luxury.
hard drive, by copying itself over them. Some Over time, users of e-mail have developed
viruses are designed to send out bulk e-mails and ground rules for its use. For example, writing a
clog networks rather than damage the host message in capitals is considered to be shouting,
computer system. and the term ‘flamer’ is applied to those who
E ALE R The safest advice is not to open attachments send messages which are angry and critical.
OR unless you recognise the sender and it is clear Because e-mail communications are frequently
T
C
7.3 they meant to send the attachment to you. The made up of brief phrases, it is often difficult to tell
Social and
ethical issues e-mail itself is safe to read. whether the writer is making a joke, being serious
or seeking the recipient’s opinion. A shorthand
Privacy of e-mail method of overcoming this problem has been
E-mail is as private as a postcard. A wrong developed, using keyboard characters in clever
key words address will sometimes see the e-mail delivered combinations to form cartoon-like ‘faces’, known
to the wrong person, or an ISP will return an as emoticons. These are inserted at relevant points
automated message explaining that the message in the text of the e-mail message. Some examples
could not be delivered. appear in Figure 12.10.
Spam
Most schools and employers have regulations
Electronic junk mail or
that allow the e-mail to be read to ensure that :-) or :) Smile
unwanted advertising ;-) or :) Wink
e-mails. unacceptable material is not included in an e-mail
:-D or :D Big Smile
Virus
or sent as an attachment. :-)) or :)) Very Happy
|-) Cool
A set of deliberately
hidden computer codes
E-mail passwords B-) or B) Evil grin
written to interfere with Password protection is very important for the >:-> or >:> Another evil grin
the normal operation of security of your e-mail. The password should be >;-> or >;> Evil grin with a wink
a computer system. something that you can remember, but not one :-X or :X I’m not telling
}-) Devilish
that is obvious to everyone else. The ‘remember :-ˆ) or :ˆ) Tongue in cheek
password’ checkbox in your mail software :-( or :( Sad
should be used with caution. If the computer is :-{ or :{ Sad
always used by the one person, this can save Characters:
time, but if you don’t want your e-mail to be ~(_:(1) Homer Simpson
available to everyone in the house, then the 888888888:-) Marge Simpson
password needs to be protected. :[~ Vampire
8(:-) Mickey Mouse
infobit
Activities
Identify Analyse Investigate
1 Identify and describe the different 4 A friend has purchased a new computer 7 What methods exist to
hardware devices that are required to and wants a dial-up connection to the eliminate the nuisance of
connect to the Internet. Internet. Outline the steps involved in spam?
2 State the differences between a dial-up establishing an Internet connection. 8 Research three e-mail
connection and a cable connection. 5 Describe the three parts of an e-mail viruses that are current
3 In which year did the World Wide Web address. now and the operating
begin? 6 Describe how antivirus software works. systems they infect.
key words One of the powerful features of the qualifications are met. For instance, a mailing list
newsgroup reader software is its ability to follow about health guidelines may be restricted to
what are known as ‘threads’ of a discussion. doctors.
Anyone can start on one topic and branch off into Like newsgroups, some mailing lists are
Forum
a side discussion on some other point. moderated. A moderator is a volunteer who
A public on-line space
where messages can be
You become part of a discussion by replying reads each message and decides if it is
posted and answered. to messages posted as part of a thread, but it is appropriate for everyone on the list.
Mailing list
also possible to subscribe to a newsgroup.
A collection of e-mail
Subscribers are notified when new messages have
been posted to the newsgroups to which they
Chatting
names and addresses
that is recognised as a belong. Live chat sessions on the Internet do not mean
single group. Some newsgroups are ‘moderated’. A that people are actually talking to one another.
Chat moderator checks an article or posting, to Instead they are messaging one another in real
A real-time on-line determine if it is suitable. A moderated newsgroup time using their keyboards. There are many ways
forum where users can can therefore be more valuable than a newsgroup, in which people are able to have live chat
connect and as less serious, irrelevant or offensive contributions conversations on the Internet—the most popular
communicate via their are removed. these days is through Internet relay chat (IRC).
keyboards.
Because old messages would soon fill a We can imagine that in the future, when
server’s storage space, these are usually deleted group videoconferencing is as common as chat
after a time, unless the server is dedicated to the channels are today, chat will seem very quaint
E ALE R job of saving (archiving) old messages. and primitive.
OR To join a channel, the IRC client on the user’s
T
C
3.2
Types of Forums and message computer communicates to an IRC server on the
Internet. Most browsers have their own client
software
boards software or provide software for download from
Many websites provide message boards. These the web. Chat servers exist in many locations
are public forums where messages can be posted around the world.
and answered. Like other Internet services they Once a user is logged on to the server, a
are accessible from all over the world. choice is made of a specific channel, where the
Forums are similar to newsgroups except channel name usually indicates the theme of the
that information is kept on a single server discussion. A user name is chosen and the chat
maintained by the owner or originator of the session commences.
discussion board When a channel is joined, you can see all the
messages that contributors are typing on their
keyboards and they can see the messages that
Mailing lists you are typing. Chat can be used to meet new
A mailing list (or listserv) is a collection of friends from all over the world, to discuss a
e-mail names and addresses that is recognised as group project with school friends, or to keep in
a single group. touch with friends and relatives. Manufacturers
Each mailing list has at least two addresses, have also used it to provide technical support for
one that allows participants to send a message to customers.
the entire group and an administrative address It is important to recognise that you have no
that is used to subscribe or unsubscribe members control over who you are exchanging text
from a mailing list. Some lists have all of the messages with in such a forum. These people
messages available as a digest, grouping past may be rude, aggressive and mindless, or perhaps
messages together. Collections of past mailings, not even be people at all, but small computer
often stretching back for years, can often be programs called ‘bots’ generating chatter.
accessed via archives. Chat sessions often have an operator who is
Some lists restrict either the number of responsible for monitoring the conversation and
participants or ensure that particular ‘removing’ from the chat session any user who is
visually demonstrated or displayed. A fast the opportunity for theft and misuse of credit
connection is very important to this type of card details over the Internet.
communication. Advantages of e-commerce include the fact
that access is available 24 hours per day, 7 days
Messaging per week, and the greater customer base offered
by the millions of participants on the Internet.
With e-mail there is no way of knowing if the Businesses can gather customer information,
analyse sales and react by making appropriate Whole websites are devoted to the most
changes in marketing quickly. The middle person is popular games and some people spend a great
removed as businesses deal directly with customers. deal of time creating imagined virtual worlds in
which their adventures take place.
Internet banking These games can also be played on locally
To open an Internet banking account, an connected computers (sometimes known as a
application can be made on-line at the bank’s LAN party). Players bring along their computers,
website. The application is received and connect them up and play among themselves as a
processed by the financial institution, a snail regular social activity.
mail communication may occur to obtain a Many computer games can now also be
signature, and then the account is activated. played in on-line versions. Quake and the ever-
Once the account is activated, money can be popular The Sims are two such examples.
transferred between accounts, account balances
can be obtained and bills can be paid using the
BPAY® system.
Virtual offices and
assistants
On-line shopping A virtual office is one that can conduct business
Shoppers can browse virtual stores 24 hours a from anywhere in the world using commu-
day, and comparisons can be made of the prices nication technology. A virtual office is usually set
before decisions are made and the purchase up in a home environment, but the business can
occurs. Shopping is not restricted to Australia. be continued from a plane, in the airport or on a
Other countries can be visited and the access and holiday. A virtual assistant can be found to assist
choices are wider.
Figure 12.12 The start of a long adventure! One player’s first moves in a MUD game.
Activities
Identify Analyse Investigate
1 State the differences 4 Outline the steps involved in 6 Select a newsgroup dealing with a topic which
between a newsgroup joining a newsgroup. interests you, join it and write a short report
and a mailing list. 5 You have been asked by a new on it.
2 Outline the difference computer user to find 7 Set up a chat from home with another
between messaging and somewhere on the Internet to member of the class where each person asks
chat. keep up with new developments. the other five questions from the information
3 Provide three examples Why might a listserv be more provided up to this point in this chapter.
of e-commerce. helpful than a newsgroup? Print out the conversation as evidence.
12.5
Internet
software
The two main Internet software applications are
the browser and e-mail client. Sometimes these
are combined in a single application.
Many common applications of the Internet
are available through your regular browser. Both
Netscape® and Explorer allow the user to
connect to newsgroups, bulletin boards and FTP
Figure 12.14 A subdirectory entry on spam.
Activities
Identify Analyse Investigate
1 Identify the different categories of search engines. 5 E-commerce has been 8 Examine a site which
2 Identify the appropriate search tools you would use for much more popular in offers virtual
each of the following searches about the British explorer the United States than assistants. What are
Captain James Cook and find answers to each. in Australia. Can you the strengths and
a What was Captain James Cook’s wife’s name? suggest a reason for weaknesses of this
b What did James Cook look like? this? arrangement?
c James Cook had some connection with the planet 6 Both e-mail and 9 Do you believe that
Venus and you want to find out what this newsgroups allow a web search engines
connection was. message to be made will charge for their
d Describe the circumstances of James Cook’s death available to many people services in the
and his age at the time. at once. Since this is future?
e In his own words, what were James Cook’s first true, what are the
impressions of the Aborigines? advantages of
f What are the big issues in current research on newsgroups over direct
James Cook? e-mail?
3 What is another name for ‘Advanced Search’ on the 7 State two reasons for
Internet? the popularity of
4 Chat (IRC) is a tool used on the Internet for on-line emoticons.
keyboarded conversations with other people. Name three
other tools which are part of the Internet.
(file downloading). E-mail software allows the Web browsers can also be extended to use E ALE R
OR
user to connect to newsgroups as well as regular other features not created using HTML, but using
T
C
mail. One other frequently used application has scripting languages such as JavaScript™, ActiveX®
3.2
Types of
been mentioned already—an IRC chat client. and XML (extensible markup language). software
With the addition of plug-ins, browsers can
be enhanced even further to read Adobe’s
Browsers portable document format (PDF) files, play
The creation of the first browser enabled movies, view Flash™ animations, stream sound
communication to break through the restrictions and video and much more.
of plain text and web pages to display colourful, We look at both browsers and the web in
often animated, graphics. more detail later in this chapter.
Marc Anderssen, who founded Netscape®,
created Mozilla™, the first web browser. Authoring software key word
A browser has one central function—to interpret
the coding language HTML in order to display HTML code
the text, graphics, movies and animations it It is possible to create a website using only
contains, and to enable the interactivity of Browser
HTML code. It is not the purpose of this text to
hypermedia. It places these elements within the A computer software
teach HTML coding, although we will introduce application which
browser window in their correct positions and you to the basic concepts involved. Your teacher interprets the scripting
often calls on helper applications or plug-ins to may give you a more in-depth understanding language HTML
assist in the delivery of sound or animations the than is covered here. (hypertext markup
browser cannot recognise on its own. Here is an example of one line of HTML code: language).
There are a number of browsers available for <b>My first web page</b>
each operating system and their features So what are all these ‘<’ and ‘>’ things?
continue to increase. As browsers have matured, These are known as tags. For example, the <b>
some have become complete sets of software, tag starts bold text, and the </b> tag stops bold
which allow users not only to view web pages text. You will be able to guess the meaning of
but also to create them, to enable most of the tags in the following task example.
videoconferencing and to double as e-mail Websites can be created by typing tags and
software. As the central communication tools of coding entirely in HTML, although today there
the Internet they have become so sophisticated are programs which automatically create the
that it is sometimes difficult to tell if we are using correct tags when the author makes selections
the Internet or are looking at our own computer from a menu, in the same way as formatting in a
desktop! A further trend involves operating word processor such as Microsoft® Word.
systems themselves, which are tending towards
full on-line integration with the web.
Before this becomes a reality however, it will
be necessary for most users to have a semi-
permanent fast connection to the Internet. Many
companies can see advantages in being able to
instantly message their customers with offers of
new or updated software or even to rent out
expensive software applications on-line.
Markup languages such as HTML are not
complex programming languages. They use
paired tags to describe how the content of a page
should be displayed. It is common for HTML to
be created using a text editor or word processor
only, although special HTML software can assist
greatly. Figure 12.15 Safari™ is an alternative browser to Explorer.
A quick look using a web search on ‘html basic text editors are to be preferred to using a
editors’ will reveal a large number of free tools regular word processor, such as Microsoft®
for creating the HTML code needed to create a Word, which may add unwanted internal code to
web page. All that is needed is a text editor, such the text you type.
Figure 12.16
as the stripped-down word processors which
Macromedia’s
Dreamweaver®
come free with every type of computer. Some Site authoring software
examples are Notepad for Windows®, and
interface. Authoring software is available to create
SimpleText and TextEdit for Macintosh®. These
websites without the need for coding. Popular
examples include the following:
• Macromedia® Dreamweaver®, a
professional-level powerful web design
application
• SiteCentral, an intermediate-level web
Code window
design application with drag-and-drop
functions
• Microsoft® Frontpage®, a quick and
efficient software tool for web authoring
• the built-in editor in Netscape®, a free tool
Tool palette
for intermediate-level web authoring
Once the site is created, it is uploaded to a
Design window server. Most ISPs provide personal web space
upon registration by the user.
The more advanced authoring applications
assist the designer to manage the whole site,
checking for inconsistencies in links and
Activities
Identify Analyse Investigate
1 Surf the web to 3 HTML is described as being 5 Find three websites
find a copyright- a ‘markup’ language using using three different
free good HTML tags. Describe how these non-English languages.
tutorial. Download tags work and give an By using the web, find
it for future use. example of how they would out how your computer
2 Why do you think create text which is a represents these
Dreamweaver® centred heading. characters if they are
allows you to view 4 Load a fairly simple web not resident in your
two panes at once, page and find out how to operating system.
one showing the view it in your browser as
HTML code and the ‘source’ code. Print this
other the actual code and identify at least
layout? five different paired tags by
using a pen or highlighter
to identify the text they
surround.
generating a diagram of the structure of the site. (Internet Relay Chat). These are better known by
This can be a real advantage when a large and the more familiar terms the web, e-mail, file
complex website is being designed. downloading, newsgroups and chat respectively.
Cheaper alternatives are available to The World Wide Web Consortium (W3C®)
download from shareware sites by looking under sets the standards for these protocols so everyone
web page editing/creating at the following sites: agrees on how a sent message should look.
• Shareware.com Obviously e-mail messages will need to be sent
differently to web pages!
• Download.com
• Tucows
At the end of this chapter, you will have the
Transfer protocols
opportunity to build your own website using Although we have already encountered the
your school’s authoring software. transfer protocols earlier in sections 12.2 and
12.3, we will now summarise them.
HTTP is the underlying protocol used by the
World Wide Web. It defines how messages are
Types of
12.6 formatted and transmitted, and what actions
web servers and browsers should take in
you need to specify both the POP and IMAP require a name and password. Other sites allow
server as well as the SMTP server when you access to public domain software or freeware
configure e-mail on your computer. and shareware programs. To allow the storage of
FTP is an Internet protocol that allows the many files and to save space on FTP servers,
upload and download of files to and from other large files are often compressed. Before the files
computers on a network. The files can be: can be used, they must be decompressed using
• programs to run on the local computer programs such as Zip or StuffIt®. To upload files
• graphics that are necessary for a personal website, many
• sounds and music web servers require the use of FTP programs to
• video complete the task. Clicking on links on a web
• text files page using a browser often results in behind-the-
In many instances, downloads are restricted scenes FTP downloads occurring. When you add
to those who have authorised accounts and an attachment to an e-mail you are using FTP.
NNTP is short for Network News Transfer The address is four numbers separated by
Protocol and is the protocol used to post, full stops, such as 128.254.241.147.
distribute and retrieve newsgroup messages. The second Internet protocol is Transmission
infobit
IRC is short for Internet Relay Chat, a chat Control Protocol (TCP), which defines how two
system developed by Jarkko Oikarinen in computers on the Internet exchange data. When The world is running
Finland in the late 1980s. IRC allows interactive your browser shows status information such as out of available IP
keyboard discussions between any number of addresses for use on
‘contacting server’ and ‘receiving data’, it is TCP
the Internet. The
people in real time. Unlike older chat systems, which is at work. current version, IPv4
IRC is not limited to just two participants. To (IP version 4), will
join an IRC discussion, you need an IRC client soon be replaced
and Internet access. Some chat clients include What is a packet? with IPv6. IPv6 is
Netscape®/AOL® Instant Messenger™, Every e-mail that you send travels as a series of managed by the
Internet Engineering
Yahoo!® Messenger, mIRC®, Ircle® and iChat. packets and every web page that you receive
Task Force, and more
The IRC client is a program that runs on your comes to you as a series of packets. information is
computer and sends and receives messages to Networks that send data in packets are available on the IPv6
and from an IRC server. The IRC server makes known as packet-switched networks. Each packet website.
sure all messages are broadcast to everyone indicates the sender’s IP address, and the IP
participating in a discussion. Although many address of the receiver, along with the total
discussions can happen at once, each is assigned number of packets and the number of each packet.
its own channel. Every packet contains fewer than 1500
characters, due to the limitations of the hardware.
Communication protocols These packets are sent via the best available
route so that the network is not clogged at any
You may have heard about TCP/IP, which every
point and the packets are put together again at
computer using the Internet needs, and imagine
their destination, ready to be viewed. The
it to be one protocol. In fact it consists of two
packets often do not travel together, but are
entirely separate protocols.
regrouped at the end of their journey using the
The most basic is Internet Protocol (IP), which
information in the packet.
defines the address of a computer on the Internet.
If it is a web page being delivered, then HTTP
Each computer is issued a unique number, known
will be active only until the page is received by
as an IP address. This may be a permanent one your computer. The TCP/IP connection, however,
issued by a network administrator (static will continue to be active until the user logs off the
addressing) or it may be dynamically issued Internet.
(dynamic addressing) by a remote server at the
start of each session you have on the Internet.
Activities
Identify Analyse Investigate
1 What is the function of a web 4 What is the function 6 Find out the historical order in which each of the
browser? of the protocol HTTP? following Internet applications were invented: web
2 Describe the functions of each 5 Why would the pages, e-mail, newsgroups and file transfer.
of the following: HTTP, SMTP, transfer of computer 7 The IP address of a computer is four numbers
IRC, NNTP and FTP. file attachments separated by full stops, such as 128.254.241.147.
require a separate These numbers are now running out and a new
3 What two protocols are
protocol such as FTP system called classless inter-domain routing (CIDR)
defined by TCP/IP and what
rather than being is being introduced. Use the web to find out how
are their purposes?
sent as e-mail? CIDR addresses work.
The World
12.7 and skilled writers are paid to work on them. In
the case of the web, anyone can have a go—and
that is both the web’s weakness and its strength.
infobit
Wide Web Another big difference between web pages
People in bushfire- and printed books is that the web has hyperlinks.
prone areas can now One thing that has made the growth of the On a web page, an author may write: ‘During
use the Internet to WWW so rapid in such a short time has been the the nineteenth century, the Industrial Revolution
view fire activity in fact that so many people have contributed to the changed the way Britons lived and worked’.
their area. The images total information it contains. One person may This sentence does not reveal what the
come from two NASA prepare a web page about the Industrial changes were, but the reader knows they can find
satellites orbiting the Revolution for their university lectures and out more by clicking on the underlined words. It
Earth. The website is
another might provide a link to this site from is this interactivity that makes the web so
available to the public
their course notes in another country. In this powerful. Nothing like it has existed before.
and can support
80 000 visits at the
way, the web continues to grow.
peak of the fire No one group could have achieved this result
and no government controls its content,
Web pages
season.
although some limit their citizens’ access to areas A web page is a hypertext document written
of the web they believe is unsuitable. using HTML code similar to the example studied
The way the web works can also create earlier. A web page is located through the
problems however. Internet using its uniform resource locator
key word
If you are the author or user of a site, you (URL), which is an address that defines the route
cannot be sure that a link to another website will to obtain the page from a specific server.
remain ‘live’. Further, it is not always possible on The main parts of the URL are the:
Uniform resource the web to find out the qualifications of an • transfer protocol—the transfer method used
locator (URL) author or even if the content of a site is all their to access a particular resource on the web
An address that defines own work. e.g. http://
the route to obtain a In comparison, encyclopaedias and similar • domain name—address of the specific
web page from a trusted reference books go through a number of computer where the resource is located (the
specific server. careful checks before publication, and because domain name can be replaced by a numeric
they are costly to publish, only the most qualified IP address)
• file path—the full path to the file to be
How URLs Are Structured retrieved; it may be a simple filename (e.g.
3 The third part of the URL is the directory on the gateway.html) or a directory path (e.g.
1 The first part of the URL host computer that contains a specific website. A
indicates which type of transfer host computer can house multiple websites. This
contactus/email.html)
protocol will be used to retrieve third segment of the address is essentially the root The domain name and the file path are
the specified document. The most
common request is for a
directory that houses the HTML document, CGI, separated by a forward slash ‘/’.
image, and so on that is being requested.
hypertext document, using HTTP. The URL must be exact in order to find the
Subdirectories might also be indicated in this part
of the address. resource. Web browsers have the ability to store
the addresses of websites as ‘Bookmarks’ or
‘Favourites’. Sites can also be saved and retrieved
2 The second portion of the URL is the name of the specific host using web-based software such as that found at
4 The last segment of the
computer on which the document resides, and which is to be
URL is the filename of
the Backflip website.
contacted by the browser software. This part of the address is also
the specific web page To obtain a URL the following sequence occurs:
called the domain. Domain names end in a suffix that indicates
you are requesting. If no 1 The browser sends the textual domain name
which type of organisation the domain is. For example, ‘com’
filename is indicated, the
indicates a commercial business, ‘edu’ indicates a school or
browser assumes a to a domain name server to determine the
university, ‘gov’ indicates a government office, ‘mil’ indicates a
default page, usually numerical IP address for the host computer
military facility, and ‘org’ indicates a not-for-profit organisation.
called index.html. that will supply the web page.
The suffix also can indicate the country in which the host computer
is located. For example, ‘au’ is in Australia and ‘ca’ is in Canada. 2 The browser builds a request for the page
that includes the port address of the server,
Figure 12.18 A URL dissected.
Figure 12.19 An example of a web page and part of the HTML code from which it was generated. Use ‘View Source’ on your
browser to see the code for a web page.
a description of what is requested, and a and read about the architect John Watts.
return address. HTML usually presents these links as
3 The computer that is running the browser underlined words, but they may also be images
transmits this message onto the Internet, or icons. When a mouse is clicked over these
which routes it to the server that will supply areas a request is launched for the linked item,
the web page. which is then delivered for viewing.
4 The server processes the request, sometimes
returning an existing page and sometimes Dynamic HTML
building a new page.
Dynamic HTML (DHTML) is really a family of
5 The server sends information back to the
technologies working together to provide
user’s computer via the Internet.
features unavailable in static HTML pages.
6 The browser displays the web page. For example, using DHTML it is possible to ’S RES
ER
OU
TEACH
WS
have an animation begin after a given number of
RCE
Hyperlinks seconds following the loading of a page, without 12.5
the server needing to be contacted.
It was during the late 1960s that Ted Nelson first
imagined the idea of words with attached ER
’S RES
XML
OU
TEACH
explanations. Later, Tim Berners-Lee imagined WS
RCE
that documents might be able to be linked The web is changing rapidly. Web pages are 12.6
electronically (hyperlinked) to help researchers. being delivered to many types of devices apart
Instead of an index that exists separately to from the computer and are being used for many
the text, he imagined an index that was part of purposes apart from straight text. For example, key word
the text itself. Important words could act like there are no HTML tags for footnotes and other
buttons and when pressed would take the reader specialist features required by lawyers, architects
on a journey where they could read more. and the medical profession.
A reader of Australian history could press Extensible markup language (XML) allows
Hyperlink
the words ‘Governor Macquarie’, for example, programmers to create their own definitions for A word, image or phrase
and they would be taken to a page with more tags for different purposes so that just one XML- with hidden code
detail. They might become interested in his coded page can be delivered to different devices allowing the user to
influence on the architecture of early towns such in very different forms.
click on it and call up a
as Windsor. They might then click on ‘Windsor’ related document.
Table 12.4 Create a table like this one to help you evaluate websites.
Activities
Identify Analyse Investigate
1 Identify four features which 4 Outline the steps involved 6 Research the current applications of XML.
make a web page different in locating a particular 7 Interview a relative or friend who is over the age
from a printed book. web page using its URL. of 70. Ask them questions about the World Wide
2 What is XML? 5 What is the difference Web and the Internet. Ask if they have ever used
3 Describe the parts of a URL. between HTML and the Internet. If not, ask why. If they have, ask what
DHTML? they use most often. The class compares summaries.
T
C
unreadable without a ‘key’. One area where this
7.3
Control of
12.8 is very important is when you need to transmit
Social issues
Digital certificates
These are issued by organisations known as
certificate authorities. The user requests a
certificate with the user’s name, a serial number
and the issuing authority.
Certificates can then be used to verify that
you are the person you claim to be in any
transaction. Usually these certificates are stored
on your computer.
Activities
Identify Analyse Investigate
1 What precautions 4 Examine your school’s website using the 7 You have asked your parents to make a
need to be taken same headings you used in the task purchase for you through an on-line store
when using the earlier: content, overall design, links, use using their credit card. In 200 words,
Internet? of frames, digital media used, coding and discuss the issues involved. Describe the
2 What is a cookie? plug-ins used, audience, and purpose. positives and the negatives of such a
5 Investigate encryption and explain the purchase.
3 What is a firewall?
Does your school’s differences between a public and private 8 Investigate one issue of privacy concerned
network exist key in encryption. with the Internet that has been taken to
behind a firewall? 6 Develop a ‘stranger danger’ strategy for court in Australia in the past five years.
users of the Internet between the ages of In less than 200 words, summarise the
5 and 8 years. final court judgement.
Website
12.9 • theme (the same theme or different themes
throughout)
American dictionary, so care must be taken. The • Security and privacy issues
site should be checked manually by • Imagining the future
proofreading, checking grammar, spelling and • FAQs—Frequently Asked Questions
punctuation, and for errors where the spelling is
You can use WYSIWYG web page design
correct but the word is not used in the correct
software, HTML hand-coding, or a mixture of
context. Manual proofreading also allows for the
both, to create the website.
accuracy of the information to be checked.
Your teacher will instruct you about whether
The manual checking of websites must also
to use an individual or team approach.
include checking that all the links work, that the
Follow the stages for the process of website
pictures load quickly, and that the information
development outlined in this chapter. Reread this
looks the same on a range of browsers and
earlier section and make notes of the main tasks
platforms.
in each stage.
Note: The following steps are written for a
Maintaining a website team. If you are working alone, interpret all
these as referring to yourself.
Sites should not just be uploaded and left alone.
They need to be maintained on a regular basis.
Some sites need to be updated continuously Defining and analysing the
during the day, as in the case of news and current
events; others need only be done daily, weekly or problem
even monthly. Maintaining may mean updating
• Form a team of students to complete the
E ALE R information and/or images by uploading and
OR project. Try to select team members who
replacing existing files. Your website should have
T
C
sections they will complete. The person • The team completes documentation on all
creating the home page is to be assigned the stages of the process. Include a record of
task of creating all links to the group’s the problems faced, the solutions found to
home page. these and the tasks each team member
• Work out the number of days you will accomplished.
allow for each of the stages of the project • Present your site to the class for final
so that you can complete it with time to evaluation by your teacher.
spare. Do not forget to allow time for OR
careful testing.
• Each student ranks the following aspects
• Design a template so that the separate from 1 (poor) to 5 (excellent) for the other
pages will have a consistent layout. teams’ websites by browsing them on a
• Each person begins research to find the network. Each student then creates a
audio, graphic, video, animation and text spreadsheet to add up the scores for each
content, and begins creating pages. site, and print a final summary for the
• Create or acquire the required text, audio, teacher, who will total and average the
graphics, video and animation. Agree on results.
your collection of FAQs and write answers — Overall content
to them. Change these items into the — Overall appearance
formats required by your software. — Navigation
• Meet regularly to check progress. — Text
• Decide how the final project will be tested. — Graphics E ALE R
— Audio OR
T
C
1.3
Producing solutions — Video and animation
— Use of plug-ins
Producing
solutions
• Create a single folder for all your work — Accessibility
from this point on. Inside this, create a — Final proofing (spelling, grammar, etc)
folder containing all images and other
media for your HTML pages.
• Select your authoring software. Assemble
the separate resources created in the last
stage into a working product using your
Additional
12.11
software. Test regularly using at least two
different browsers.
content
• Create and test all links, internal and
external. WebQuests
• Fine-tune your site to allow it to work A WebQuest is basically an assignment which
smoothly. asks you to work with others in using the World
E ALE R
Wide Web to study a specific topic. OR T
C
Figure 12.26
Disability rights
on the web.
Questions
1 Use the Bobby™ website to check the readability 2 Summarise the case against SOCOG argued by a
of some popular websites. visually impaired man relating to the website for
the 2000 Sydney Olympics.
T
C
the positive and adverse effects of this new This is a co-operative team project and during 7.1
technology. This WebQuest provides you with the course of the project, you will be meeting Legal issues
the opportunity to form and express your with your team often.
opinion on ethics in digital media, especially
when it comes to downloading copyrighted files Phase 1: Assigning specialised roles
from the Internet. In order to maximise productivity and minimise
frustration, it is helpful to assign specialised roles
The question for your team. To begin this WebQuest, hold a
meeting of your group and assign each member
What are the ethical arguments for and against
specialised roles.
the sharing of digital media?
Specialised roles
Your task These roles are in addition to the normal team
Your task in this WebQuest is to form and argue roles that each person plays. They should be
a position on the ethical question of assigned for each meeting or discussion session.
downloading copyrighted material from the It is very important that these roles be rotated
Internet. Where do we draw the line between among team members. Note that an assigned
theft and sharing? Through the process of this leader is not one of the specialised roles. Teams
WebQuest, you will understand how copyright do need effective leadership, but they do not
need a leader. It is best if the leaders develop as a Visit the web pages listed under ‘Links for
result of the team process and change over time. Film producers’ on the Companion Website.
• Facilitator: The responsibilities of the Artist (movie star): The student or students
facilitator are to schedule and manage the choosing the role of artist must argue the point
meeting. that downloading movies from the Internet is
• Recorder: The responsibilities of the wrong and that if people download their work
recorder are to keep records of the illegally, they are being robbed of the right for
meetings. payment for their work. The artist believes that
all sites enabling download of illegal material
• Spokesperson: It is the responsibility of the
should be shut down immediately and its owners
spokesperson to clearly represent team
sued.
results to the teacher and the class and to
Visit the web pages listed under ‘Links for
act as the team’s link with the teacher.
Artists’ on the Companion Website.
Phase 2: The big picture Film critic: The student or students choosing
Together, your team will gather to investigate the the role of film critic will support the view that
ethical issues surrounding the sharing of digital everyone in the film industry already makes
media, with the focus on the movie industry. plenty of money, and that copying and sharing
Together, use the web links below to list answers movies for personal use should not be illegal.
to the basic question. Be creative, insightful and Visit the web pages listed under ‘Links for
curious as you explore the web for answers. Film critics’ on the Companion Website.
Begin with the resources listed under ‘Good Lawyer: The student or students choosing
places to start’ on the Companion Website. the role of lawyer will look at the problem from
the legal angle, answering the question ‘What is
Phase 3: Digging deeper legal and what is not?’ They will listen to both
Each team member will now take on a role that sides of the issue and provide information to
will explore the ethics of digital media from fellow team members on past copyright rulings
different perspectives. and current issues and legal cases.
Read through the files linked to your Visit the web pages listed under ‘Links for
assigned role. Be creative as you explore the web Lawyers’ on the Companion website.
for answers. If you print out the files, underline Pirate: The student or students choosing the
the passages that you feel are the most role of pirate will determine what laws they are
important. If you look at the files on the breaking by providing digital material on-line
computer, copy sections you feel are important without permission. They may argue that if the
by dragging the mouse across the passage and existing laws are not enforced, then why should we
copying and pasting it into a word processor or take them seriously?
other writing software. Visit the web pages listed under ‘Links for
Note: Remember to write down or Pirates’ on the Companion website.
copy/paste the URL of the file you take the
passage from so you can quickly go back to it if
Phase 4: Debate, discuss and reach
you need to support your findings.
consensus
Be prepared to summarise what you’ve Now you should have a team meeting. Each
learned in one main opinion that answers the student will participate in a debate while playing
WebQuest based on what you have learned from their roles. Everyone should be prepared to state
the links for your role. their feelings about video piracy, but also be
flexible. This is a hotly contested subject in the
WebQuest roles real world, and will no doubt provoke spirited
Film producer: The student or students choosing dialogue in the group.
the role of film producer will form a view about At the end of your meeting, make of list of
ethics in digital media. Are the current laws steps that must be done to have your
adequate to protect their intellectual property? presentation ready by the due date.
chapteroverview
The Internet is not one network. It is thousands of intercon- The web is used for a large variety of tasks, including
nected ones forming a global network. e-commerce, education, entertainment, virtual journeys and
The Internet is not one protocol, nor is it just the web. information. It is accessed via software (browsers), which
Instead, it is many protocols, all of which operate on the interpret the HTML code and display the media-rich pages.
infrastructure of the cables, satellites, servers and routers The Internet has no index. Instead, both humans and
which form the whole. ‘bots’ build catalogues of key words and content. These
The Internet emerged from the ARPA research work of search engines provide effective and powerful searching
the United States Defense Department. From its text-only techniques.
e-mail beginnings, it has grown to include newsgroups, chat As is the case with most revolutionary changes in society,
groups, file transfers, and the hugely successful and rapidly the Internet has raised significant social and ethical issues.
growing World Wide Web. Viruses can gain access to personal computers via e-mail
Running under TCP/IP, the Internet is used by attachments; unwanted mail, known as spam, can flood our
government, commercial and non-profit organisations in accounts; our privacy can be invaded; copyright is easily
their daily operations. Individuals are free to publish their broken; equity of access is a problem; web pages with violent
own websites, which are instantly accessible from any or obscene material can be easily accessed; and websites can
connected computer in the world. be freely published without the usual ‘checks and balances’
There is not just one way to connect to the web, but which exist in regular printed publishing.
many, each involving different costs and speeds, from Perhaps of greatest concern is the alienation many may
telephone lines to satellites. feel as human communities are replaced by digital ones.
TER TE
AP
CH
ST
WS
Networking Systems
CHAPTER OUTCOMES CHAPTER CONTENTS
You will learn about: 13.1 A communications network 255
• the many advantages of communications 13.2 Network protocols 260
networks, as well as the challenges they present
13.3 Data transmission modes 262
to those who use and manage them
13.4 Data transmission rates 263
• a range of components used to create
communication networks 13.5 Data transmission media 263
• the role each component plays in enabling 13.6 Types of networks 266
communications 13.7 Peer-to-peer and client–server
• the technologies which are applied to enable networks 267
communications networks 13.8 Components of networks 267
• network operating systems software 13.9 Security of information 272
You will learn to: 13.10 Network topology 276
• make effective use of network resources and 13.11 Network operating systems 278
software 13.12 Factors influencing media
• assemble a small network using components and transmission 280
software techniques 13.13 Project development 281
• use problem-solving techniques on some of the 13.14 Additional content 283
common problems associated with network usage
• assess the nature of work done by an
organisation and apply this knowledge to
suggest how a communications network would
benefit the organisation
OPTION
13.1
What’s up doc?
<In Action> systems can check to see if a patient is allergic to the
medications being ordered for them, and the pharmacist
In a major teaching hospital, the use of personal digital
receives the prescription as soon as the doctor ‘writes it’ on
assistants (PDAs) by medical students and resident doctors
the PDA.
has transformed the way medical teams access the data they
A wireless network means the medical teams can tap into
need.
the data from anywhere in the hospital. Enthusiastic doctors
Carrying a wireless network PDA while doing their rounds
say the systems lets them spend more time face-to-face with
has meant that doctors can access and update medical
patients, and less time sitting at a desk copying notes
records, and order medications, scans and blood tests for
recorded on paper into a computer system. The network is
patients from wherever they are standing. Prescription
everywhere, and the medical teams are part of the network.
2.2 • creating and sending messages to others in • services, such as access to the Internet,
Hardware or outside the group e-mail servers, etc.
components
• creating documents, either electronically or
in print form Sharing peripheral devices
• publishing or distributing documents for use The ability to share printers, faxes and scanners
by members of the group, customers, or the among network users enables a business, group
general public, whether electronically or in or community to reduce the total number of
print form devices needed. Although each computer may be
• working with data shared by members of capable of having one or more printers attached,
the group in many situations this would waste money and
space. Usually you will allocate one or more computer, such as in educational institutions and key words
printers for the shared use of several people. This libraries. In a business, the users usually use the
scenario is often described by printer companies same computer all the time, and it should be set
as workgroup printing. Printers selected for this up to print to the correct printer. The network
Workgroup printing
scenario are often faster than the sort of printer administrator is the person who should
you might attach to a single-user computer. It is configure network printing settings correctly. The ability to share
printers among network
common for school, college and university
users to enable a
classrooms to share one or two printers among Sharing network applications business, group or
fifteen or more students. community to reduce
Application software may also be deployed using a
Network printing can be arranged in different the total number of
network and this allows many users to use the same
ways. The most common methods include: devices needed.
software with ease. There are many ways to deploy
• connecting a printer to one of the Print job
network applications, including the following.
computers on the network and setting it up A print job is created
• The network administrator can install an
as a shared printer whenever we click the
executable copy of an application on each Print button. The
• using print-server software on a network
computer which needs to use it. The original document to be printed
server to direct print jobs to printers which
or ‘master’ copy is protected on a network is ‘spooled’ to the
are connected to the network—these printers
server. Once installed on a workstation, a printer and added to a
usually have their own network card
user may operate the program. printer queue. It is then
installed or are connected to a network printed by the printer in
computer • A single executable copy of the program can
queue order.
be installed on a network server, enabling
• using small print-server devices, which may Network administrator
users to run the program on their individual
have one or more printers attached—these A person who
workstations. In this approach, the software
devices have a network card, and may have configures and manages
is not installed on individual computers.
one or more printer ports to connect to the network settings.
When the program is upgraded on the
printers
network server, everyone has immediate
The advantages of network printing are access to the new program, without needing
fairly obvious, and include such things as: to upgrade it on their own computers.
• reducing the number of printers needed
• Users can be given access to web-based
• enabling users to use a greater variety of applications via web browsers. The
printers via the network program or application remains on the
• having the capacity for a user in one server, and nearly all the processing for the
department to send a hard copy of a application is done by the server. This
document to a user in another department approach is different to the two previous
by printing to their printer options, which both involve the user’s
When a user uses the Print command, their computer executing the program
computer sends a print job to a network printer. instructions and requiring them to have the
The user will then usually walk over to the printer minimum hardware and software needed ’S RES
ER
to collect the output. It is important for the user for this. Web browsers have very minimal OU
TEACH
WS RCE
that they know where their print job is printing. requirements, so with this approach, even
One of the potential disadvantages of network users with older computers would be able
13.1
printing is that on large networks, users may send to use the application.
a print job to the wrong network printer without If the software requires licensing, the
realising it. The outcome will mean: ’S RES
network administrator needs to ensure that the ER
OU
TEACH
WS
• their work is delayed while they try to find licence requirements are met. For example, if the
RCE
people who should be using it. This can be done relationships. In the case of a web-based
using network security permissions or by ‘user group’, the e-mails responding to
building security features into the application members’ questions provide useful
software when it is being developed. knowledge for other members.
Many organisations have chosen to use web The capacity to share data enables people to
applications to enable staff, customers or work together to achieve the goals of the group.
members to work with data using an intranet or The rapid growth worldwide of the amount
the Internet. of data being produced has increased the space
requirements for storage on most networks. In
Shared data resources the early days of computing, data was stored
In nearly every network, the capacity to share onto computer tapes—this was slow and
data in different forms is the greatest benefit of inefficient by today’s standards, but was the most
all. Data used by a group of people working practical for the time.
together can be in many and diverse forms, In modern networks, most storage is on
including: large-capacity magnetic-storage hard disks. Over
• structured databases—databases may exist the years, the amount of storage which can be
as special files created by database purchased for the dollar has increased
applications such as Microsoft® Access or dramatically.
FileMaker® Pro, or in server-based systems The increased storage requirements of digital
such as Oracle® or Microsoft® SQL servers media on networks are causing network
• unstructured text, and numerical and image designers to fit larger and faster hard disks, and
data held in documents or files—these files to use faster network connections to support this
may be word-processed documents, web increased ‘need for speed’.
pages, image files, worksheets or other file The network administrator should provide
types storage for more than twice that expected, and
• e-mails—e-mails form a part of the will probably find this will still not be enough! It
correspondence in many groups, and may is important to plan and budget for progressive
need to be accessible for the work of the increases in the amount of storage on a network.
group. For a company, recording As the total amount of data stored on the
correspondence with customers is part of the network increases, so does the challenge of
way it deals with managing customer ensuring the safety of the data.
T
C
• full control—the user can do anything to
4.9
the data, including deleting it and changing Questions Data security
permissions for other users 1 A customer of Internet banking
If a user is not given any access at all to some receives a call from someone at the
data on the network, they won’t even be able to bank, asking for their account’s
read it, and if they try, they will receive a message personal identification number (PIN).
such as ‘Access denied’! What should that customer do?
If permissions are not set correctly, there is a
2 Internet banking doesn’t let us
risk that some people may have access to data that
deposit or withdraw cash—so what
they should not see, such as confidential personal
are the main benefits?
files, correspondence or bank account details.
Sharing data using a communications
network requires the organisation to take great
care to protect the data. transfer service to all network users—which is
clearly an advantage.
Sharing Internet services The potential disadvantage is that one careless
A network can also be used to share valuable user may bring viruses into the network, thus
services, such as access to the Internet. A single creating havoc and destruction. To prevent this,
connection to the Internet at the appropriate most network systems use protective measures
bandwidth may provide e-mail, web and file such as firewalls, which we discuss later.
Activities
Identify Analyse Investigate
1 Describe three ways of 3 List in order of importance (in your own opinion) 6 Sample a small group
providing printing the benefits of a communications network, explaining within the school using
capability to network why you placed each benefit at its position in a confidential survey to
users. the list. find out how many
2 List three main types 4 Suggest how a radio station might use a families are using a
of data that are communications network to do its work. network at home.
shared on a network. 5 Many people say that just dealing with our e-mail cuts
our productivity in other parts of our lives. Are they
right, or do the benefits outweigh the time used?
key words
Network
13.2 • Simple Object Access Protocol (SOAP)—
used to send application data over the web
Protocol
protocols IP addresses
An agreed method of One of the things the Internet Protocol (IP) deals
communication between
A protocol is an agreed method of commu- with is the identification of computers using an
two communicating nication between two communicating devices. In IP address. The IP address for a computer is
devices. communications between human beings, we represented using 4 bytes of data. Each byte can
have to deal with the fact that there are a lot of
Dynamic IP address represent decimal numbers between 0 and 255,
different spoken languages in the world, some of
Adddresses which are or a total of 256 different values. An IP address
assigned to computers which are quite common, but none of which are
viewed in decimal notation consists of 4
each time they log on common to all human beings. At the United
numbers, between 0 and 255, separated by dots.
to a network. They may Nations, the conversations of the speakers need
be different each time
For example, the IP address for http://www.
to be translated so that all of the UN delegates
the computer connects. pearsoned.com.au/ is ‘192.148.139.194’.
can understand them, no matter what language
When IP addressing protocols were invented,
Static IP address they are speaking in.
Addresses which are
it was calculated that there were 256 × 256
On a computer network, protocols are used
assigned permanently to × 256 × 256 possible addresses, or nearly
to enable a conversation between computers to
computers 4.3 billion addresses. Most industry experts at the
take place, usually a transaction such as
(usually servers). time thought this would be more than enough for
exchanging data. Protocols may be:
a long time.
• open—developed by agreements between When a computer becomes part of a network,
representatives of countries of the world it is given an IP address. Computers may be given
• proprietary—developed by a manufacturer to dynamic or static IP addresses.
work only with devices or software they make Dynamic IP addresses are allocated to the
computer by a Dynamic Host Control Protocol
Open protocols (DHCP) server, which has the equivalent of a bag
of IP numbers. Every time a machine logs on to
infobit Open protocols are published in the ‘public
the network, it can ask the DHCP server for an
domain’, and may even be modified over time by
Every URL can be IP number, which is allocated in an arrangement
committees in response to public comment. Many
‘translated’ into an IP called a ‘lease’. This is called dynamic allocation
Internet protocols are open protocols. They may
address for a server on and it means the IP address may be different
the Internet. The
be modified by international agreement. Internet-
every time a computer connects. This is a
translation is done by related protocols are managed by the Internet
common method of assigning IP numbers to
domain name servers Engineering Task Force (IETF).
Examples of open protocols include: computers on a network.
(DNS), which maintain
• Hypertext Transfer Protocol (HTTP)— Alternatively, computers (usually servers)
the equivalant of large
address books. We widely used for transferring web page data can be given a permanent or static IP address. A
use URLs because from place to place over the Internet static IP address is assigned to a computer by a
they are easier to network administrator. On some networks, the
• File Transfer Protocol (FTP)—widely used
remember than IP computers are given their IP address by a special
for file transfers, mostly over the Internet
addresses. network server.
• Internet Protocol (IP)—used like a postal Each computer visible on the Internet must
system to identify computers on a network have a unique IP address. Internet service
• Transmission Control Protocol (TCP), often providers (ISPs) help to ensure that the IP
’S RES
ER used in conjunction with the related IP addresses of their clients are not copies of
OU
TEACH
WS
(hence TCP/IP)—establishes a connection
RCE
Activities
Identify Analyse Investigate
1 Explain why 3 Why do you 4 Find out what each of the following protocols are
we use URLs think open used for: SOAP, SMTP, FTP. Explain how they key word
Data
13.4 • megabits per second (Mbps)—a million bits
of data per second OR
E ALE R
T
C
• gigabits per second (Gbps)—a billion bits of 4.3
transmission rates data per second Data coding
their data was being sent than how many signals data in the form of books and newspapers.
were actually used to transmit the data. The During the 19th century, the invention and Hardware
components
number of bits per second that a network or use of the telegraph led to widespread use of the
medium can support is considered to be a better electronic transmission of messages by signals. In
performance measure. the 21st century, most of our data transmission is
Modern communications mediums allow via the wires that make up telephone and
very fast transfers of data, and we use terms like: computer networks.
Insulation
Ripcord
Network computers are connected to each technologies. The main form of wires used in
other using: networking these days are known as unshielded
• a wire-based medium, such as copper wire twisted pair (UTP) or Category 5 cables.
• wireless adaptors and wireless access points
over a wireless medium Unshielded twisted pair (UTP)
• a combination of wired infrastructure and cables
wireless media UTP cables contain four pairs of wires, twisted
around each other like a rope to reduce
Wire-based media interference from external sources. This
technology usually involves connecting each
For many years we have been able to interconnect computer to a network device, such as a hub,
computers using a variety of wire-based media switch or router. Disconnecting any one
and their corresponding hardware and software computer from the hub will not affect
communications between the other computers.
If we only need to connect two computers,
Computers we could use just one ‘crossover’ UTP cable
can be especially designed for the purpose.
disconnected
UTP cable is used to
without Some forms of UTP cabling can support data
connect each computer to
a network device such as
affecting the transmissions of up to 100 Mbps, while others
others. support as much as 1 Gbps (ten times faster).
this hub or a switch or
router. If only two Large networks in office buildings are often
computers need to be
connected, a special connected using UTP cable which is installed as
‘crossover’ cable can be part of the building’s wiring. At each computer
used, without using a hub. workstation, a wall outlet is fitted, with UTP
UTP cable cable running inside ducting to a cabling cabinet
in the building. This type of network architecture
is usually very reliable, but expensive to install.
Uplink
Figure 13.5 Connecting computers together as a
network. When using UTP cables, the computers
10baseT RJ45 are usually connected to a hub or switch device.
The disadvantages of using built-in cabling Users with notebook computers are able to
for a communications network are that if a work at any location which is in range of a
company moves to a different location, the wireless access point, without needing to connect
wiring has to be left behind, and it can be a wire to a port in the wall ducting. This is a major
expensive to make major changes to the wiring. advantage for those businesses that rent premises
and may have to move offices from time to time.
Optical fibres There are several technologies for wireless
networking, and they continue to develop in speed
Optical fibre can carry data encoded in light of
and sophistication.
different frequencies. The advantage of optical
fibre is that it can carry many different Manufacturers may build-in wireless
frequencies simultaneously, allowing a single technologies such as Bluetooth® into portable
fibre to carry very high rates of transmission. computing devices, such as mobile phones and
Optical fibre is widely used in the personal digital assistants (PDAs). For organ-
telecommunications infrastructure of Telstra and isations with mobile workers, such as hospitals,
other companies. It is also used in corporate wireless and portable computing can significantly
networks where very large transmission rates are improve work efficiency.
essential. The relatively high cost of the Existing cabled networks can add wireless
communications equipment needed makes capability by connecting wireless access points in
optical fibre networks uncompetitive for most the building.
network applications, but in the future, this may An important consideration with wireless
’S RES
networks is security. Owners of wireless networks ER
change.
OU
TEACH
WS
RCE
should turn on the security features provided, or
they risk having intruders connecting to the 13.4
Wireless transmission network from outside the building. This is not as
Many new networks are being developed which likely to happen with conventional wire-based
require little or no cabling. These are known as networks. ’S RES
ER
Data transfer rates for wireless networks
OU
wireless networks, and they give more flexibility
TEACH
WS
RCE
to the layout of workstations and reduce the costs continue to increase, speeds from 11, 22 and 13.5
of installing networks. 54 Mbps are common. Although they do not have
Each computer on a wireless network has a the data transfer performance of some wired
wireless network adapter. These adapters use radio networks, they are more than adequate in small
signals to communicate with other computers and offices and for home use, and are becoming
network devices called wireless access points. cheaper to install.
Activities
Identify Analyse Investigate
1 List three methods which are 3 Find articles on the Internet 6 Perform the research, then prepare a
used to connect computers which give guidelines on comparison chart showing the difference in
together in a network. category 5 UTP cabling. transmission rates for the following
2 List two of the advantages of 4 Suggest why optical fibre media transmission media types: optical fibre,
using wired networks as is not the most common category 5 UTP cable, wireless local area
opposed to wireless networks. method of connecting networks. network (LAN). Identify the sources of
5 Prepare an argument for the your information.
situations when you would 7 Find out the comparative costs of dial-up
recommend either wired or Internet access and an available broadband
wireless networks. connection in your area.
Peer-to-peer
13.7 A peer-to-peer network—all computers are ’equal‘ and none has any special function.
and client–server
networks Server
We can also classify networks on the basis of the
roles that different computers play in the
networks. There are two main categories:
A client–server network—a dedicated server plays a special
• peer-to-peer (P2P) networks role on the network, providing network management and security functions.
• client–server networks A domain model is widely used for larger
Figure 13.7 Peer-
networks in which we need to apply some levels
to-peer and
Peer-to-peer networks of organisation and security. It is well suited to
client–server
business, government and educational organ- networks. Peer-to-
Peer-to-peer networks are so named because all isations. In this model, one or more servers
of the computers function with equal roles—they peer networks are
exercise management of a defined domain. The usually smaller
are all workstations used by computer users on domain has a structured security system, with
the network. There are no specialised servers in networks and
the administrator being at the user level with full don’t have the
such a network. Peer-to-peer networks are control over it. In most domains, there are special security
commonly used and are well suited to small usually only one or two administrators. and management
network installations, such as in a home or small The domain is managed by using a network functions that
office. directory service which enables the admin- client–server
The advantage of the peer-to-peer network is istrators to add other users and computers to the networks provide.
that it is relatively easy to set up, and the domain. The directory service is software that
maintenance cost is relatively low. Special runs on a network server. The domain model
network operating systems, which are quite requires users to authenticate, which means they
costly and take some expertise to configure must attempt to log onto the domain, identifying
properly, are not required. themselves with a username and password. If the
key words
In an office network, as more and more users username and password match stored values in
join the network, managing shared data and the security database, the user can then gain
security issues may become more difficult. We access to specified network resources. Client
may then need to consider upgrading to a
An application that runs
client–server network. on a computer and
works with a server to
Client–server networks Components
13.8 perform some
operations.
In this type of network, computers function as
user workstations with specialised software
of networks Server
A computer which runs
(clients) or as specialised servers. A server is a The architecture of a network should support the a network operating
computer which runs a network operating work done by the users of the network. A system and is designed
system and is designed to perform a range of communications network is assembled from a
to communicate with
tasks for the network users. Client–server client software to
variety of components to achieve the desired perform a range of tasks
networks may be configured to run under a result. In this section, we consider the different for the network users.
workgroup model, or within a domain model. types of components and the way they contribute
A workgroup model is a relatively informal to the functioning network.
collection of computers in a network which In the early days of computer networks, a
enables sharing of resources. A server may be local area network would have a single server,
used in a workgroup, but it takes a limited role and that was all that was required. Modern
in this scenario. networks are more sophisticated, and provide
key words
Activities
Workgroup
Identify Analyse Investigate
An informal collection 1 What is the main difference between a 4 Compare the 5 Find an example of
of computers on a local area network and a wide area differences a LAN in an
network where a network? between creating organisation in
server takes a limited a workgroup and your area. Prepare
2 What risks are taken when connecting
role, if any. a client–server a diagram showing
a network to the Internet?
Domain
3 Many organisations choose to use a network. the main
A group of computers
virtual private network (VPN) between components of the
which share a common LAN.
directory. This is not
offices in different towns. Describe
the same thing as a what advantages a VPN provides.
domain name on the
Internet. many more network services. Specialised server servers. The way that services are deployed in an
Share software has been developed to provide: organisation has to be carefully matched to its
A folder which can be • file sharing services needs.
accessed by network • printing services
users.
• faxing services Types of servers
• e-mail services
• web serving File-sharing servers
• database serving File-sharing servers, or file servers, have been in
• firewall protection use on networks for a long time. In many
organisations the file server was the only server
The network engineer may:
computer. Although most networks still have
• concentrate several different services onto
machines called file servers, more modern
one machine
networks are changing the way we share data.
• run each service on a separate server On modern networks, files or documents can
machine be shared by setting a folder as a share. File
• use several server machines to provide a servers typically have one or more shares
service available for use by network users.
For example, an Internet service provider A share is assigned a name, like any folder. A
would have multiple web servers, while a large share on a network is identified by the name of
business organisation might have many database its computer or server and the name of the share.
Figure 13.8 On a
A file server‘s main A mail server provides e-mail messaging for A database server runs a
small network purpose is to provide network users. It may use an Internet connection specialised database
with only a few users with access to data, to send transfer e-mails to other networks. system which manages
documents and files over access to the databases
users, we might
the network. for all users on the
concentrate all the network.
network functions
onto one machine
and call it a file Fileserver Mail server Database server
server. On larger
networks, we
separate out the
functions to Hub or switch to connect
network computers and
ensure the best servers
performance for
Users‘ computers, known as network clients or workstations
each of them.
The security settings for the share are set to allow • size of printouts needed—A4, A3, etc.
network users or groups of users different types • ability to duplex (print on both sides of a
of access to files in the share. page)
The types of access which can be given to • amount of memory built into the printer (to
users is discussed later in section 13.11: Network store jobs sent over the network)
Operating System.
• cost of consumables, such as toner or ink
The main advantage of concentrating shares on
a file server machine is the ease with which the files • reliability
can be located, preserved and protected. The main Using a network print server
risk of this approach is that if the one machine stops
working, lots of network users are affected. These devices are usually small boxes with
As we see later, in section 13.9, the storage of multiple printer ports, which enable a network
documents and databases is becoming administrator to place one or more printers
increasingly complex. together in a printing centre in the office. Paper
and consumables would be kept nearby for
E ALE R
Print servers convenience. A print server has a single network OR
2.2
T
C
connection through which the print jobs arrive
Many PC owners have their own printer and provides an independent channel for Hardware
connected to the PC. Computer networks enable components
printing which avoids slowing down the other
us to share printers, which saves both costs and servers in the network.
space. Networked printing can be achieved in a
number of ways: Fax services
• sharing a printer Many networks, especially businesses and
• using a network printer government departments, provide their users
• using a network print server with one or more fax servers. The concept is the
same as having shared printers, except that the
Sharing a printer documents sent to the fax server are transmitted
This is a simple way of sharing a printer which using fax protocols via a fax machine or
can only be physically connected to one PC at a fax/modem device, or via an Internet fax service.
time. Most PCs have the ability to make the From a user’s point of view, they simply print to
attached printer a shared device, which allows fax, provide the destination number and select
other network users to send jobs to that printer. the ‘Print’ command.
However, this means that the PC to which the
shared printer is attached must be turned on in Mail servers
order for the printer to be available to other
E-mail can be managed by an organisation in a
network users.
number of ways. Some small businesses obtain
Using a network printer Printers
Some printers are fitted with network cards and
behave as a network device. They appear on a
Figure 13.9 A
network like the other computers and servers.
network print
Network printers are usually designed for the server device
purpose and cost more than an economy printer. makes it easy to
Printer cables
The network administrator will usually select a connect multiple
network printer on the basis of several factors, Network cable
printers to the
including: network so that
• speed of printing, measured in pages per users can share
minute printers without
• whether monochrome or colour printing is going through the
needed file server.
key words e-mail services from their Internet service systems. Examples of this form of software
provider. Larger businesses and organisations include:
may run their own mail server, on one or more • Oracle®
server machines. Mail server software is used to • Microsoft® SQL Server
Hub
manage e-mail accounts for the users.
A network connection • IBM® Informix®
A commonly used product is Microsoft®
device used to
Exchange Server. Network users are provided • Sybase®
interconnect two or Database server software provides secure
more computers.
with a mailbox in the database on the mail
server. The mailbox has an associated e-mail and rapid access to data contained in the
Port databases it manages. Software developers in
address. Messages sent by the user have this
A port in a network companies using database servers create software
e-mail address in the message header. Messages
device such as a hub or
sent to this address are stored in the mail server applications which connect to the database
switch is usually a
database. Users may gain access to their e-mail server to read, write or update data in the
physical socket into
which we connect a messages using client software, such as databases the server manages.
cable. Microsoft® Outlook®. In this example, Outlook® Database administrators configure the
on the user’s workstation communicates with the database servers to keep them performing as fast
Exchange Server in a client–server relationship. as possible, while maintaining the security of the
E-mail works in a similar fashion to data. The challenge for the database administrator
conventional postal services. We ‘post’ our in modern times is to protect enterprise databases
Figure 13.10
messages at a local post box (the server), and from hackers on the Internet.
Network
components each messages are then relayed via the Internet to their
have a job to destination. Our e-mail client software (e.g. Connection devices
do—switches Outlook®) works rather like the post box at our
connect home for receiving mail. From the user’s point of Hubs
computers with view, the e-mail is delivered right to the ‘door’. A hub is a network connection device used to
other computers Many modern mobile phones and personal interconnect two or more computers. A hub has
and servers, digital assistants are e-mail-enabled, so that e-mail a fixed number of ports, with each port being
routers direct messages can often be delivered to users faster. able to connect to one device via a cable. For
network traffic, example, an 8-port hub could connect a network
and some may Database servers of up to eight computers or other devices.
have firewall Database servers are forms of server software A hub may also have an uplink port, which
capabilities. which manage shared database management enables it to connect to other hubs.
Switch
Router
The router may also act as
a firewall. Some networks
Server use firewall ’appliances‘.
Print server
Printer
Network clients
interfering with the traffic in another. The idea of and adjust their transmission rate to match the
segmenting a network is rather like keeping other computers.
different classes in a school in separate rooms— Modern wireless network cards transmit at
if they all tried to operate in one very large hall, 11, 22, 54 or 108 Mbps.
the noise from one class would interfere with the
others. A bridge can also be used to connect two
networks which use different media types.
Security of
13.9
Network interface cards
OR
E ALE R Computer hardware and operating systems are information
now well suited to communicate with other
T
C
optical media, or to magnetic disk storage. • Internet-based hackers can try to penetrate
Backup files are usually not simply copies of the a network
original files, but special compressed and tagged • computer viruses and worms can enter the
infobit
files which are used in a restoration process if the network, potentially leaving a trail of
The term ‘firewall’ was original data is lost. destruction
originally used in the Periodically, and very carefully, network To ensure these things don’t happen,
construction industry to administrators should test that the backed-up network administrators use a variety of tools and
describe a fireproof data files and processes actually work—but not
wall designed to
techniques, such as:
by restoring it over the top of real data!
prevent the spread of • firewalls
fire in a building. Since • antivirus programs
the early 1990s it has
Network security
• intrusion detection software
been used to describe A major role for every network administrator is
• anti-spam software
security hardware and managing security on a network. There are
software which several approaches which can be used to secure Firewalls are positioned between the
prevents the equivalent the communications network. These include: organisation’s network and the Internet. Many
of a firestorm in a routers used to connect to the Internet contain
• requiring network users to authenticate
network! firewall hardware and/or software. The most
• regulating access to network resources
effective firewalls make use of some software, as
• protecting the network from intrusion the threats that exist on the Internet keep
We consider the first two approaches later on changing, and any firewall device needs to be
in section 13.11, with a discussion of network
operating systems, so here we’ll consider how
network systems are protected from intrusion. Activities
Securing the network Identify
Many networks have a connection to the 1 Explain what is meant by the term
Internet so that users can use e-mail and use the ‘network gateway’.
web for research. That doorway to the web is 2 Describe and explain three main
also a doorway through which: approaches to securing a network.
3 What is the role of a firewall in a
network?
Security measures must The Internet is a
watch for danger coming wonderful resource
from the Internet, such as and an incredible Analyse
viruses and worms, threat to the
Security measures must intruders, spam e-mail. network. 4 Think of a way that a network user
protect data against danger could create a password that they can
from inside the network,
such as corrupt employees, remember easily, but which they can
irresponsible users, etc. Network change regularly.
gateway 5 Compare the cost of performing backups
to network-based hard disks with the
use of backup tapes. What are all of the
costs involved in the comparison?
Investigate
6 Research the data backup strategy used
Figure 13.12 For the network administrator, managing security requires by a local small business. Prepare a short
constant vigilance. Threats from inside the network and from the Internet report commenting on the effectiveness
must all be protected against. Most administrators use a subtle combination of the strategy.
of hardware, software and physical devices to manage security issues.
able to be upgraded regularly. We can install attacks, as hackers use software to try to get into
personal firewall software on each computer in lots of networks simultaneously.
a network as an added level of protection Anti-spam software is another tool used by
against threats. network administrators, as spam e-mail is both a
Antivirus software reads incoming files, nuisance and a major source of either viruses or
including e-mails and their attachments, for the worms. Some spam messages lay traps for users,
presence of virus ‘signatures’. These signatures encouraging them to download software which
are recognisable patterns that indicate the will make them instantly:
presence of a virus or worm in a file. As with • rich
other security measures, antivirus software also • attractive
needs to be kept up-to-date so that the latest
• popular
threats can be intercepted.
Intrusion detection software is used on • all of the above
servers and workstations to detect evidence of It is a fact that for network administrators,
hackers using techniques to gain access to or families or individuals connected to the Internet,
control of a network. Intrusion detection the threats continue to increase. Continual
software looks for evidence of activity which vigilance, and attention to installing and
would indicate that hackers are at work. Most upgrading protective measures is the only way
networks are potentially victims of hacker we can defend ourselves against the threat.
key word
Network
13.10 computer, it retransmits the message to the next
computer in the ring.
To manage the transmission of data, an
Topology
topology electronic ‘token’ is passed from machine to
machine in the ring. A computer can only
The topology of a
network is the way in During the evolution of computer network transmit data when it receives a token. It can
which it is shaped or technology there have been a number of ways of only hold the token for a very short time, then
laid out, which affects connecting computers together. It has proven of must pass it on to the next computer in the ring.
the way in which they use in the past to describe the topology of the This enables the computers to share the
are connected. network, or the way in which the network is availability of the physical network in an
shaped or laid out. There are three main ordered way.
topologies—bus, ring and star. As networks and An advantage of the ring topology is that the
technologies have evolved, we also see available time on the network is used without
combinations of these topologies, which we may any transmission ‘collisions’, as each computer
describe as hybrid topologies. can only ‘talk’ when it has its turn.
We can consider network topology from two A disadvantage is that the topology cannot
different perspectives: be easily extended without interrupting the
• the physical topology— the physical layout network functionality.
of machines and cabling Ring networks still exist, but the technology
is not introduced in new networks.
• the logical topology— how the signals are
transmitted on the network
Bus topology
Ring topology The physical bus topology became widely used
with the use of coaxial cabling, where lengths of
Ring topology became widespread in IBM coaxial cable would pass by and connect to each
networks, such as the Token Ring network. The computer or device on the network.
name came from the way that the computers were The logical bus topology involves all of the
connected physically in what looks like a ring, as computers sharing access to a common
we see in Figure 13.13. Computers which are transmission medium. On a bus network, the
connected in a ring network work a bit like computers use a protocol known as CSMA/CD,
repeaters—they receive an incoming signal, and if which stands for Carrier Sense, Multiple Access
the message is not addressed to the receiving with Collision Detection.
C
7 8 9 101112
A 12 34 56 1x 2x 3x 4x 5x 6x 1x 2x 3x 4x 5x 6x
A B
Bus network
Figure 13.13 Although we can identify physical network topologies, most modern networks have a different logical topology to their
physical topology. Networks connected through a network hub look like a star topology, but behave like a bus topology. Switched
networks look like and behave like a star topology.
This sounds complicated, but the idea is Computers connected to a network hub or to
quite simple. Consider a class discussion around a switch have a physical star topology, but only
a table. The discussion works best when only one the computers connected to a network switch
person is speaking at a time. Each person can form a logical star topology.
hear if anyone else is talking (we call this carrier The switch connects computers to enable the
sense), and we are all able to use the same movement of data between them, and forms
medium at once (we call this multiple access). If connections for data ‘conversations’ between
a collision occurs, such as when two people start computers. Network switches are able to support
talking at once (we know when this happens as very fast networks, as several data conversations
we have collision detection), each speaker should can take place at once without interrupting each
stop, and then one will start again, while the other. In some ways, a network using a switch
others listen. resembles a small version of the telephone system.
If this is the way computers in a bus topology
behave, then what stops a computer from
‘hogging’ the network? A variation on
Mesh topology
CSMA/CD enables the computers in a network The idea of a mesh topology is that each
to take turns at using the medium, using a time- computer has a connection to many other
sharing method. Each computer is allocated a computers, so that if one link fails, data can be
timeslot and transmits for a short time. This transmitted by another path. While the general
permits every computer on the network to idea makes sense, it is difficult and expensive to
transmit data, even when all computers have physically connect each computer in a network
something to transmit. to every other computer using cables.
Computers connected by UTP cable to a A wireless network, involving computers
network hub have a physical star topology, but with wireless network cards communicating
they communicate using a logical bus topology. either directly to each other or via wireless access
This is because all of the ports on the hub share points, could be considered a logical mesh
a common connector, or backbone. network, even though physically there may be
little or no interconnection.
Star topology
This topology describes a network where all the
Hybrid networks
computers are connected back to a central point, It would be very expensive to reconstruct
but there is no permanent connection between existing networks each time a new technology is
any two computers. released, so it is common for organisations to
key words extend a network, adding new structures to it. • the control of access to network resources
Ultimately the network takes on a hybrid form, • the security of data transmitted
often including ring, bus and star topologies. • and many more things
Network operating The subsystem processes work like a team,
system doing their own tasks, but communicating with
Like any operating
system, this is a
Network
13.11 other processes in an orderly way to get jobs done.
Security permissions
Every resource on the network has an access
control list (ACL) associated with it which
records who has been given permission to use the
resource, and the level of those permissions. The
network administrator or the owner of a
network object, such as a folder, can set the
permissions on that object.
Every time we try to use a network resource,
such as a network printer, a directory on a file
server, or an application on a server, the network
security system will check to see if we have the
correct permissions on that resource. If we do
have the permission, or if the group we are a
Figure 13.14 Administrators may set the user permissions of shares, member of has permissions, then access to the
folders, files, printers and other network resources.
resource is authorised, otherwise access is denied.
At the time we log on to the network, the Using the GPO, administrators can administer
security sub-system assigns us a hidden ‘security a wide range of settings for individuals or groups
pass’, which is stored by our desktop operating of users on a network, but most efficiencies are
system without us seeing a thing. This security gained by working with groups. Administrators
pass identifies us, and identifies the groups of can regulate such things as which software users
which we are members. have access to and the way their environment
When we try to open a folder on the works.
network, the security system will check our
‘security pass’, and check the ACL for the folder. User profiles
If our pass contains a user name or group
membership that is included in the ACL, then we On many networks, including schools, colleges
may be allowed to open the folder. and universities, the users don’t always use the
On a school network, for example, an same computer, as the resources are shared.
administrator creates a network share called A network administrator may choose to
‘StudentInformation’. The Year 10 co-ordinator configure the network so that a user can easily
has ownership of a network folder called switch from computer to computer, but keep
‘Year10’ and this folder is inside the share. The their environment the same. If we make
co-ordinator has write permissions on the folder extensive use of favourites or bookmarks in our
and so can add documents inside the share. The web browsers, it would be very handy if we
group AllStudents has read permissions on the could access those favourites from any machine.
share, and can see the list of all the folders inside Similarly, we might also want to take advantage
the share. The group Year10Students has read of desktop shortcuts we use regularly.
permissions on the folder called Year10, but All of these features that we take for granted
none of the students in other years can see inside on our own PCs can be provided for by using
the folder as they do not have permissions. profiles. If the administrator decides to use
Every time we access a folder, a file or some ‘roaming profiles’, then each time a user logs on
other resource, the security system checks our to the network at a computer, details about their
pass. The security system is very busy! profile are copied to the computer. The user can
then see all their browser favourites, use their
bookmarks, use the recent files feature, etc.
Security policies When the user logs out again, any changes they
To make it easier to manage all the computers have made to their environment are copied to
and users in a network, we can make use of their profile on a server.
security policies. In Windows® 2000 networks, Disadvantages of using roaming user profiles
Administrators can take advantage of the Group is that they:
Policy objects (GPO) utility—these contain group • use up space on the network computers, as
security templates to help us manage security. the user profile data is not removed
automatically from the computer after the • the length of cable—typically we run a
user logs out length of cable from each wall outlet back
• slow down the time taken to log on, as the to the chosen location for the network
profile needs to be copied to the machine communications equipment
• increase the amount of traffic on the • installing wall outlets, positioned close to
network our workstations
• the labour involved—cabling must be done
by licensed cablers and labour costs usually
Security and encryption include testing all the installed outlets to
A vitally important aspect of a network make sure they are working properly
operating system is the protection of data as it is • hub, switch or routing equipment needed to
transferred over the network, and to and from connect the computers and servers
key word
the Internet. • network interface cards for each computer,
Windows® 2000 uses Internet Protocol if needed, although some computers already
security (IPsec) to encrypt the data as it is have ‘onboard’ networking
Encrypt transferred over the network, so that unau- • configuration—setting up each computer to
Using a secret code to thorised users are prevented from intercepting the work on the network also takes some time,
transform data so that data and reading it. This security feature is built depending on what needs to be done
it cannot be read. into the operating system, so we don’t have to do Some very small networks, contained within
anything to make this work. a room, may not need to have cables and wall
outlets installed, as we could connect the
computers with appropriate lengths of cable
13.12
Factors directly between the computers and the hub or
switch units. For safety reasons, we would have
to be careful how we positioned the cables.
influencing media If we select wireless as our medium for data
transmission, we should include these costs:
transmission • wireless network adapters, which contain
antennas and need no cable connection
So far, we’ve considered how various technologies • wireless access point(s), if connecting our
in a communications network function. Ultimately, network to an existing network or to the
when designing a new network for a community or Internet
group, we have to weigh up several factors in the
• configuration—no network systems can read
process of making a decision. our minds, so we have to do some setting up
In selecting a transmission medium, we to make things easy for the network users
should consider:
• cost
• transmission distance Transmission distance
• ease of extension of the network The physical layout of the computers which will
We’ll consider each factor in the context of form the network should be considered. If they
developing a new network for a small office or a are all very close to together, such as in a typical
family home. family home or a small office, distance is not
really an issue.
UTP-cabled network guidelines suggest a
Cost of transmission media maximum cable length of around 100 m. This
Cost is a major factor, as any network project would enable us to have two computers up to
will have some form of budget, and it is nearly 200 m apart, each with a 100 m cable attached to
always smaller than we would like. a hub unit located between them.
If you chose to use UTP cables, the costs In large premises, such as a factory or ware-
involved would include: house, we may consider using repeater units,
optical fibre, or microwave beams for the longer Extending a wireless network is relatively ’S RES
ER
distances. simpler, although it may require additional
OU
TEACH
WS
RCE
Wireless networks have different standards wireless access points. 13.6
and each type has its own specifications. One If our network includes a shared Internet
thing they have in common is that as the link, then we may find that adding more users
transmission distance increases, the bandwidth affects the data throughput for each user. The
the link can support decreases. evidence for this will be that the users will ’S RES
ER
Obstacles between wireless antennas, grumble more about slowness of Internet
OU
TEACH
WS
RCE
particularly brick walls, can also affect the downloads!
maximum distance that the devices can be apart. Two possible solutions may be to negotiate a
13.7
The theoretical maximum distance for the faster connection with the Internet service
802.11b (FireWire®) specification to achieve its provider, or add another link.
maximum bandwidth is about 50 m, but walls
would reduce this distance. As most networks
exist indoors, we would usually work on a
transmission range considerably less than this— Project
13.13
around 20 m for most purposes.
development
Extensibility and
sustainability The project scenario
The scenario for this project is that you have
When we first install a new network, our been asked to develop a ‘demonstration model’
network design tells us how many computers, of a network that could be used to connect all the
servers and other devices we need to connect. educational computers in a school. It should be
Some questions we could ask ourselves during obvious to all who examine your network how
the design phase include: other schools should set up their networks to
• Will the network grow? Could our emulate your design and implementation.
organisation add new computers and users Your project should include a presentation
to the network as time goes by? This is which explains how your model works, and the
often a goal for a small business. benefits which can be gained from using a full-
• If the network does grow, how difficult will scale emulation of your model.
it be to extend the network we have You may wish to use the following broad
designed without affecting the performance guidelines, but you will need to do some research
of the network for existing users? on how to perform each part of the project in
advance. Some of the instructions given here are
We should plan our network so that it can
specifically for a Windows® server. If you have a
cope easily with being extended a reasonable
different type of server at your school, your
amount. We can do this by including in the first
teacher will give you the information you need.
installation enough capacity for a specified
Your teacher may also add additional tasks.
increase, for example, twenty per cent. We At each step, record the work you have done.
describe this deliberate additional capacity as If you have any problems, document how you
built-in redundancy. solved them so that you can remember how it
To add new clients to a cable-based network, was done and answer questions on the topic.
we may need to add more outlets on the wall, or When you have finished, you will be
we may need to add more hubs or switching expected to provide a PowerPoint® presentation
units. If we installed more outlets than needed in on the work which shows how you approached
the first installation, this might turn out to be each part of the project, the difficulties you had,
cheaper than installing the extra outlets later, and how, as a group, you solved the problems.
and would save a lot of disruption.
E ALE R
OR Defining and analysing the report, explain what guided your decision-
making processes in selecting a preferred
T
C
1.2 — What work do the users need to be able estimates of administrative labour.
Designing
solutions to do? • You may need to learn new skills and
— What resources or services are needed, techniques to be able to accomplish the project.
and by which users?
E ALE R
OR — How do we protect the users’ data and Producing solutions
T
C
1.3 privacy?
Producing • Before building the network to suit the
• During the design phase, you should try to
solutions overall design, you will need to obtain the
analyse the nature of the work being done, to
hardware components and software,
ensure that the communications network
ensuring that all of the components and
you design supports the workers and helps
software will be compatible. Modern
them to be even more efficient.
networking equipment and software is
• Decide on the criteria by which your project
relatively easy to configure. The actual task
will be evaluated. One of the criteria will be
of assembling the network is a step-by-step
whether or not the network enables the users
process, involving testing at each stage.
to get their work done and provides the
• Create a small client–server domain-based
services they need to do so. Develop a check
network. It should contain at least one client
list which can be used to verify that the
and one server. This project will involve setting
network performs to requirements. You
up a small working network as a model.
might wish to use this check list during your
own pre-release testing.
Create the server
Designing possible • To do this, install the network operating
solutions system available.
• The server should run Active Directory® if it
• There are often several possible ways to is a Windows® server.
achieve a desired outcome. For each possible • Make sure the server is running Dynamic
solution, consider the technical, operational, Host Control Protocol (DHCP) as this will
financial and ethical factors involved. For enable other computers to get their IP
this project, the technical factors will include address automatically. Also, make sure the
the equipment and software available. server is running a domain name service
Financial factors become important if new (DNS) as this is essential for a domain.
equipment and software have to be
• Once the server is built, you may wish to
purchased or licensed. Operational factors
create within the domain some organisational
you might consider include the amount of
units (OUs). These are containers for
work required to maintain the functioning
computers and users that you may wish to
network. How much work will there be for
group together. The OUs you create should be
the network administrator? Ethical issues
for each year level in the school.
may arise in terms of how the users’ data and
privacy are protected.
• For each of the factors, your design
Join the client to the domain
documentation should show how you have • You will need to have administrator rights to
taken the factor into account. In your project do this. Make sure you select the password
for the administrator account carefully, and Connect the network to the
you should write it down in a secure place.
Internet (optional)
Create user groups • Set up a connection to the Internet and
share the connection so that the Internet
• Create user domain groups by year group, can be accessed from the client machine.
e.g. Year9, Year10.
• Create user domain accounts for each Test the network
member of your class in your OU, and for
your teacher. Make each member of your • Use the check list you developed in the
class members of the appropriate year beginning of the project to ensure that you
grouping. have achieved all of the requirements, and
that the model works as required.
• Create a domain group called gIST and add
all the members of your class. • Make sure you logon to the network from
the client machine as each of the users to
• Create a group called gProject and add all
ensure that they have the required network
the members of your project group.
resources with the appropriate permission
• Make your teacher a member of the
levels.
administrators group.
• Use the client machine to logon to the E ALE R
Evaluation OR
network.
T
C
1.4
• When the network is ready, it should be Evaluation
Create a homepage presented to a client group—possibly a
• Create a homepage in the group of teachers or a teacher and students.
\inetpub\wwwroot directory on the server. Training for users (on the network
Create virtual directories for all members of environment you have developed) is
your group. important so that they can evaluate how
well the model fits the specified needs of a
Create network shares and folders school community.
• Make sure the evaluation group has a copy
• The network share should be set up to be of the evaluation criteria which were
shared as data. Set the security so that the determined when designing the project.
administrator has full control, and give the
group called ‘gProject’ full control. Give all
user groups permission to read the share.
• Within the share, create a folder for each
13.14
Additional
user in your class, giving the user full
control, the administrators group full
control, and deny access to all others.
content
• Create other folders as suggested by your Earlier in the chapter, in section 13.7, we
teacher to store content that can be shared considered peer-to-peer networks in comparison
by the whole class. with client–server networks. You may remember
that peer-to-peer networks do not involve special
Add an e-mail server (optional) server machines, which is why each of the
machines are referred to as ‘peers’. In many peer-
• Create e-mail accounts for each of your to-peer networks, the operating system on each
project group members and for your of the peers is the same—that is, all Windows®,
teacher. all Macintosh® or all Linux®.
• Check that the accounts work by sending Peer-to-peer networks can also involve a
and receiving some e-mails to each other. mixture of operating systems. In order for them
to communicate with each other to share files Setting up any LAN involves the following
and printers, the operating systems need the main steps:
appropriate protocols to be installed, as you will • design
find in the task which follows. The use of • acquisition of components
common protocols like TCP/IP have enabled
• installation of hardware and software
computers running different operating systems to
communicate with each other. • connection of computers to the network
• testing of all network features, such as
printing, file-sharing, and so on
Setting up a LAN Installation should be fairly simple. Most
In the project in section 13.13, you would have issues arise when one or more parts fail to work
gained valuable hands-on experience while properly. We troubleshoot problems by isolating
designing and developing a model network to each component in an assembly to verify that it
support a school community. is working correctly.
chapteroverview
Communications networks underpin much of the work In order to enable different types of computer and
done by society, providing communities of users with the application systems to communicate with each other,
infrastructure and tools needed to communicate and share protocols have been developed and implemented, further
data, both within and between groups. The Internet in extending the range of possibilities for businesses.
particular has provided us with ways of extending and As the technologies our networks use become more
linking these networks. complex and sophisticated, so too do computer security
The technologies used to enable communications issues become more important. Hackers and viruses search
networks continue to evolve and change. The rate at which relentlessly for ways to infiltrate and damage systems, so
we can transfer data is increasing, and we have more network administrators have to be as vigilant as ever to
flexibility through wireless technologies. ensure that networks are protected from such risks.
TER TE
AP
CH
ST
WS
Robotics and
Automated Systems
CHAPTER OUTCOMES CHAPTER CONTENTS
You will learn about: 14.1 Robotics 286
• the history of robots and robotics 14.2 Types of robots 288
• different types of robots 14.3 The purpose of robots 291
• the purpose, use and function of robots 14.4 Use of robots 293
• automated control systems 14.5 The function of robots 297
• input, output and processing devices 14.6 Automated control 302
associated with automated control systems
14.7 Sensing devices 304
You will learn to: 14.8 What are actuators? 307
• define and describe robots, robotics and 14.9 Controlling devices 309
automated control systems
14.10 Project development 310
• examine and discuss the purpose of robots and
14.11 Additional content 312
hardware devices associated with robots
• examine and discuss hardware devices
associated with automated control systems
• investigate robotic and automated control
systems
OPTION
14.1
up, wave its arms, and move its head, which was
attached to a flexible neck, and open and close
its jaw.
During the 1920s, a playwright named Karel
ˇCapek wrote a play called R.U.R. (Rossum’s
ˇ
Universal Robots). In Capek’s play, the Rossum’s
factory produced mechanical devices which were
called ‘robota’, the Czech word for work. At
first, these human-like machines are merely
unintelligent slaves, but later, a scientist gives the Figure 14.2 Leonardo
creatures emotions. In the play, the robots turn da Vinci’s design for a
bad, kill all the humans and take over the world. mechanical man.
Following the early instances of robots in
plays and science fiction stories, robots then
started to appear on television shows, such as
Asimov’s Laws of Robotics
‘Lost in Space’, and then featured in movies, such Isaac Asimov (1920–1992) took a different view
as the well-known Star Wars. of robots than those writers before him. He was
‘Lost in Space’ became a very popular TV the first to give robots characteristics which
series in an age when computers were not yet in showed respect for humans. Asimov thought
that robots should be considered as a very E ALE R
homes. It was set thirty years in the future, and OR
5.1
T
C
made a significant impact on the way people important technological innovation. In 1942, he
wrote a story about robots, ‘Runaround’, which Past
thought of robots. The robot in the series information
demonstrated human characteristics, such as contained his Three Laws of Robotics. He later technologies
feelings and emotions, as well as having a added a fourth law and called it the zeroth law.
programmable memory. These laws are:
Today, scientists are still a long way off from • Zeroth Law: a robot may not injure
programming robots which can think and act humanity, or, through inaction, allow
like humans. humanity to come to harm
Activities
Identify Analyse Investigate
1 Define the term 6 Scientists have a 8 Robots are used to perform many tasks. Research one
‘robot’. very different view area of robot use not mentioned so far in this chapter.
2 Define the term of robots from Prepare a presentation for the class. Include some
‘robotics’. science fiction comments on the effectiveness of the use of robots in
3 What are two readers and movie- this area.
characteristics of an goers. Explain 9 Visit BBC Science’s Robot World Techlab web page to view
intelligent robot? these differences. simulations of robots.
4 List the human senses 7 What prompted 10 With the help of your teacher, watch an episode of ‘Lost
that scientists are Asimov to write his in Space’.
experimenting with in Laws of Robotics? a List the characteristics of the robot character that fit
robots. Discuss the the definition of a robot.
relevance of these
5 What are three main b Write down the human-like qualities of the robot
laws to the robotics
features of modern character. How was this demonstrated?
industry today.
robots? c Does the robot character obey Asimov’s Laws of
Robotics?
Industrial robots
Robots are used extensively in industry,
particularly in manufacturing. In the
manufacturing industry, robots can perform many
tasks, such as:
• welding
• spray painting
• assembly operations
• palletising and material handling
• dispensing operations
• laboratory applications
Some robots used in manufacturing are
Figure 14.4 Robots in manufacturing. designed to perform one particular task, while
others are designed with interchangeable body
The robot industry parts, which makes them more versatile. For
example, a robot may act as a ‘welder’ for one
The history of robots is quite new. While the
task, but by changing the end gripper, it may be
ideas have been around for some time, the
turned into a ‘spray painter’.
construction and use of robots did not really
Most robots used in manufacturing are
begin until the mid-1950s:
stationary, but recently, progress has been made
• in 1956, the first robot company was in the development of more mobile robots.
’S RES
ER formed by George Devol and Joseph
OU
TEACH
WS
Engelberger
RCE
WS • in1961, the first industrial robot, called in the area of nuclear science. In 1979 a nuclear
RCE
14.2 UNIMATE, came on-line in a General accident at Three Mile Island in the USA caused a
Motors automobile factory in New Jersey leak of radioactive material. The accident was a
Figure 14.5 A robot used for security control. Figure 14.6 A team of robot soccer players in the 2003 Sony
Legged Robot League from the University of Newcastle.
major concern because of the amount of • localisation (determining the robot’s key word
radioactive substances that leaked into the position and the location of other objects)
environment. This incident led to the development • locomotion (moving from place to place)
and use of special robots, called teleoperators, to
• game play End effector
handle the radioactive material. Today, mobile
robots are used in areas such as security control, The robots are equipped with infrared and The mechanical device
bomb disposal, and even in the war against terror. foot contact sensors, and special-purpose attached to the end of
processors. This means they are able to play a a robotic arm which
scaled-down version of a real soccer game. carries out a particular
Educational robots task.
Figure 14.7 A WS
RCE
Activities
Identify Analyse Investigate
1 What is the 4 Find one example 6 Develop and conduct a survey on the use of robots in industry and
main difference of robots used in the home. Develop a chart to illustrate the findings and present the
between a manufacturing. For findings to the class. A sample of questions for domestic robots might
robotic arm your example, include the following.
and a mobile answer the a What would you want a domestic robot to do?
robot? following i Housework iv Security
2 Why are robots questions. ii Gardening v Entertainment
used in a What is iii Cooking vi Other
industry? manufactured? b How much would you be prepared to pay for a domestic robot?
3 List four tasks b What tasks i < $100 iii between $500 and $2000
performed by does the robot ii between $100 and $500 iv over $2000
robots in perform? A sample of questions for industrial robots might include the
manufacturing. c Is the robot a following questions.
stationary arm a How aware are you of robots being used in industry to
or a mobile manufacture goods?
robot?
b Why do you think robots are used in industry?
5 Find an example of
a robot used for c What advantages do robot workers have over human workers?
security control. 7 Visit the RoboCupJunior website and read about the RoboCupJunior
Describe the competition.
function of the a Find at least two Australian schools that have entered the
robot in the competition and read about their project.
system. b Find out where and when the next RoboCupJunior Competition is
going to be held.
c With your teacher, discuss the possibility of entering the
competition.
The purpose
14.3 • may be able to do work that is impossible
for humans to perform
This equipment may be operated by humans
of robots or may be computer-controlled.
without becoming tired. Robots do not have landmines in Kosovo, Croatia, Jordan, and
emotions and therefore do not feel that they are Lebanon.
worthless when performing menial tasks. For This is just one example of how robots are
most people, repetitive tasks performed in used in situations too dangerous or best left
industry would be considered very dull or untouched by humans.
boring. For example, a robot’s only task may be
to pick up an object from a conveyer belt and
place it in a box. The robot can perform this task
Impossible tasks
all day, every day, without getting bored! Some tasks are simply impossible for humans to
do. For example, exploring very deep under-
Dangerous tasks water areas, studying live volcanoes at short
distance, or travelling to distant planets. What
In manufacturing, it is common to see robots
humans are not yet able to do, robots are
performing tasks which are very dangerous for
beginning to do well.
people. This may include working with high
Robots are often called upon to perform
temperatures or using equipment which uses high
underwater salvage missions to find sunken ships
pressure. In cases like these, using robots in place
or planes. The Titanic, which sank in 1913, sat
of humans means that fewer people are exposed to
on the ocean floor at a depth of 3811 metres for
dangerous situations, and therefore the risk of
more than seventy years before being reached. At
workplace accidents occurring is reduced.
this depth, the ship was too deep to be explored
Apart from dangerous tasks in manufacturing,
by human divers. In 1985, a team of researchers,
robots are also being used to carry out other
with the aid of a robot named Jason Junior (JJ)
important but dangerous activities. Some examples
were able to locate the wreck of the Titanic. A
include clearing up landmines, working in nuclear
year later, the team undertook a further
reactors, or even being involved in dangerous
expedition, with the help of JJ, to explore and
search-and-rescue missions.
document the shipwreck more thoroughly with
As a result of the 1998 Iran–Iraq war,
pictures and video clips (see Figure 14.8).
millions of landmines were planted in Iran. Two
Norwegian landmine-clearing robots, called
OR
E ALE R
Minecats, were used to help survey and clear Robots assisting the
T
C
7.3
Social issues
some of these mines. Minecats are remote-
controlled and designed to travel over a wide
handicapped
range of terrains and in extreme weather An important area in which purpose-built robots
conditions. They have also been used to clear can work is in aiding people with disabilities.
Activities
Identify Analyse Investigate
1 List three 3 What types 5 Apart from the Titanic discovery, find another example of where
important reasons of jobs would robots were used to perform an underwater rescue mission.
why robots are robots not do 6 Apart from landmine clearing, find another example of how robots
used in very well? have been used to perform tasks too dangerous for humans.
manufacturing. 4 Why do you 7 Investigate other cases of robotic use in tasks which are impossible
2 List four areas of think robots for humans to perform. In each case:
robotic use today, are used to • describe the nature of the task
apart from in the help people • outline the processes performed by the robots
manufacturing with
• outline some of the processes performed by humans
industry. disabilities?
• identify any of the tasks carried out by people that a robot
would not perform well
The data collected by the robots was information about the latest Mars mission. 14.4
transferred to a computer at the station via Another new development in space robotics
infrared signals. Students conducting the is NASA’s Personal Satellite Assistant (PSA). The
experiment were able to obtain the data by PSA is a small robot, about the size and shape of
logging on at set times via the Internet. ’S RES
a softball, which is designed to help astronauts ER
OU
TEACH
WS
The robots used several different sensors to with basic housekeeping tasks on board the
RCE
monitor the weather: space shuttles, space station and other space 14.5
• a small anemometer to record wind speed exploration missions. The PSA can monitor the
Medical science
A lot of research has been done using robots in
the area of medical science. Medical scientists
believe that robotic technologies can improve
Figure 14.9 existing procedures, as well as providing new
Dante II visited where approaches to current problems.
no person could. One example is the use of a robot that acts as
step-by-step instructions. It greatly improved the preventative measures in road maintenance, the
speed and accuracy of the car manufacturing life of a road may be doubled.
industry. A good example of robots used in repair and
But this new technology resulted in changes to maintenance is the Longitudinal Crack Sealing
the nature of work in the manufacturing industry. Machine which is used to repair roads and
Many jobs were replaced by robots. Workers who maintain them in good working order (see
did retain their positions were required to re-skill Figure 14.12). It has a long robotic arm equipped
themselves, since the remaining jobs required with visual sensors which send information back
workers with more technical skills. to the driver. The driver remains in the vehicle
and positions the arm over a crack in the road.
Maintenance and repair From there, the arm takes over, tracing and
sealing the cracks on its own while the driver
Robots are well-suited to perform maintenance drives alongside it. The driver can monitor the
and repair work. activity from the truck. The robot has made the
You may have noticed how roads tend to work easier and much quicker. Road repair work
show signs of wear after long periods of heavy which previously, for example, might have taken
use or under extreme weather conditions. Roads two workers a full day to complete, can now be
can develop long cracks, which can make driving done in about one hour, with one person
hazardous, and therefore need to be repaired operating the sealing machine.
constantly. It has also been found that by taking
Figure 14.11 UNIMATE, introduced at General Figure 14.12 The Longitudinal Crack Sealing Machine (LCSM) was
Motors Holden in 1961, was the first industrial developed to automate the sealing of long cracks in roads. For example,
robot. the LCSM can repair cracks between a concrete road and its asphalt
shoulder.
Activities
The function
14.5 Movement—degrees of
of robots freedom
Robotic motion is described in terms of degrees
of freedom. One degree of freedom is equal to
Like other computer systems, robotic systems one movement either back and forth (linear
require the ability to move, hardware compo- movement), or around in a circle (rotational).
nents, and software to drive it.
key word To understand how this works, consider the that are similar to the human arm, for example,
human arm. an articulated arm type usually has six degrees of
The human arm has six degrees of freedom, freedom. The reason for this is that six degrees of
allowing the following movements: freedom normally is sufficient to conduct most
Degree of freedom
• shoulder—up and down (1 degree) simple tasks.
A measure of robotic So, in a robot with an articulated arm, the
motion. One degree of • shoulder—forward and backward (1 degree)
following movements are possible:
freedom is equal to one • elbow—up and down (1 degree)
movement either back • arm—up and down (1 degree)
• wrist—rotate (1 degree)
and forth (linear • arm—lengthen and shorten (1 degree)
movement), or around
• wrist—up and down (1 degree)
• body—rotate (1 degree)
in a circle (rotational). • wrist—left and right (1 degree)
• wrist—up and down (1 degree)
Additionally the operation of the thumbs
and fingers gives several more degrees of • wrist—rotate (1 degree)
freedom. • wrist—left and right (1 degree)
Figure 14.13 In a robotic system, usually one robotic joint The way robots move can be defined as one
Degrees of corresponds to one degree of freedom, but this of three types: pick-and-place, point-to-point
freedom in the depends on how the hardware is connected. and contouring.
human arm. Most jointed robots have six degrees of freedom • Pick-and-place—This movement has only
two positions per axis and suits loading and
Wrist left assembly functions in mass-production
and right situations.
• Point-to-point—This movement is controlled
Wrist
rotate from one point location in space to another.
Each point is programmed into the robot’s
Shoulder up and down Wrist up control memory and then played back during
Elbow up
and down and down the work cycle. This type of movement is
suited to tasks such as spot welding.
• Contouring—This movement allows the
Shoulder forward robot to follow a path which forms the
and backward
shape of a smooth curve. The robot’s gripper
carries out a programmable path movement
and performs variable functions on this path.
Applications include spray painting,
continuous welding and grasping objects
moving along a conveyor.
Wrist left and right
Table 14.1 The physical components of a human body system compared to the components of a robotic system.
OU
TEACH
WS
actuators to tell them to carry out some action, such
RCE
Effector
as switching a motor on or off, opening or closing a 14.6
valve, moving an arm to a specified point, or
avoiding bumping into an object.
Manipulator
Power supply key word
(stomach)
Processes
Sensors input signals Actuators
to output
(controller)
Manipulator Actuators
Control Gripper
system
Figure 14.16 We can represent a robotic system Output devices, such as
Sensor
system motors and end
with a block diagram.
effectors, which convert
End effectors are particular types of energy and signals to
actuators or output devices for robots and are motion. They are the
Effector
hardware components
the devices connected to the end of a robot arm.
that carry out actions
Different types of end effectors exist, and all
and do the work of
perform a physical task. All end effectors also the system.
Power supply have their own specific set of commands to
control them. End effectors may be tools,
E ALE R
Figure 14.15 The human body and computer- vacuum grippers or magnetic grippers. OR
T
C
controlled systems have similar components. A robotic arm can only be fitted with one 2.2
type of end effector at a time. If the end effector Hardware
The robot controller processes signals from
on the arm needs to be changed, then the robot components
sensors into output signals to move the robot’s
would need a new set of commands or program
parts. Our brain processes signals received from our
instructions to operate it. For example, it is not
possible to replace a gripper with a screwdriver purpose robots are instructed by more general-
head and expect the robot to perform the same purpose programming languages. Robolab is one
task. It would be necessary to change the language developed for LEGO® kits.
infobit
programming of the robot controller and use a Programming languages may use different
The programming different set of end-effector motors to drive it. techniques to train robots to perform tasks. They
language used by fall into two categories. These methods are called
LEGO’s® RoboLab
(LabVIEW) is used to
Software programs to on-line programming and off-line programming.
On-line programming involves teaching the
control the robots used control robots robot the path it must take. This is done by
in Mars missions, to
All robotic systems use software to instruct the manually moving the robot arm through the
test Xbox® controllers
hardware on how to perform tasks. Generally, required motions. The path is recorded and a
and by Toyota.
industrial robots tend to perform quite specific program is generated.
tasks. In cases like this, the software that drives With off-line programming, the program
the hardware is often a specialised control instructions are written to control the robot’s
language, for example, AML or VAL. Other motions before the robot is put to action. Once
robots are designed to perform more general the full program has been written, it is tested on
tasks, such as the LEGO® robots constructed for the robot. If necessary, modifications are made to
infobit
home and educational use. These general- the program. Robolab uses off-line programming
in graphical form.
A company has
developed a lawn-
Magnetic gripper Vacuum gripper Tools
Used for fragile Uses suction Drills,
mowing robot called parts of magnetic cups to lift polishers,
the Auto Mower. The materials. fragile parts. screwdrivers,
lawn mower has a glue guns,
sensor that detects a spray guns.
wire enclosing the
lawn area and uses it
as a guide for moving
around.
Vacuum
Magnetic
strips
Figure 14.18 A Robolab program to control a
Figure 14.17 Types of end effectors. LEGO® model.
Activities
Identify Analyse Investigate
1 What is meant by degrees of 6 Find at least one other 9 Conduct research on one type of end
freedom? programming language, other effector used on robots. In your research
2 How many degrees of freedom than those mentioned in this include:
does an articulated arm have? chapter, used to control robotic a the name of the end effector
3 List three types of end systems. Investigate what they b a picture or diagram
effectors. are used for.
c an explanation of the task it performs
4 Describe two ways that robots 7 How many degrees of freedom
d a poster or digital presentation on the
may be programmed. would be found in a human’s
findings of your research
elbow joint? Describe these
5 List the main components of 10 Use the on-line simulator at the BBC’s
movements and draw a diagram
a robotic system and describe Robot World Techlab to build and program a
to illustrate them.
the function of each. robot.
8 Describe the difference between
pick-and-place movements and
point-to-point movements.
Automated
14.6 The working of an automated system
External inputs External outputs
In our everyday lives we use devices that are Signal conditioners Signal conditioners
operated by manual control; that is, they need to be
operated by humans. Examples include cars, Controller
vacuum cleaners and electric drills. Automated
systems, on the other hand, are designed to operate
under automatic control. Automatic control means Figure 14.19 The components of an automated
infobit that they will operate independently or without control system.
human intervention. These devices are given
Today, a new concept appropriate instructions through special programs. thermostat on to adjust the temperature
in robots has
Robots are a special form of computer systems Robots are specialised automated control
developed called web systems. They have components similar to an
robots. Web robots are which use automated control.
automated system.
programs that traverse
Signal conditioners are used to ensure that
the web automatically
collecting and
Definition of automated data signals are suitable for the devices that
analysing data. They
are also known as
control receive it. Often, control systems need to convert
analogue data to digital data (and vice versa). In
web wanderers, bots, Automated control systems refer to those which this process, the signals may suffer from
crawlers or spiders. accept data, process this data, and produce data interference during the conversion. This
signals or actions to change the operations of interference is sometimes called noise. Signal
another system. The purpose of an automated conditioners help remove any unwanted
control system is to maintain a desired result. It interference and may be used on both input and
key word achieves this result by manipulating one or more output data signals.
variables of another system. A good example of
this is an air conditioning unit which uses a
thermostat to maintain a constant programmed
Historical perspective of
Automated control
system air temperature: automated control
A group of elements • input = the air conditioner reads the room The history of control systems is categorised
that maintains a desired temperature according to developments in technology. There
result by manipulating
the value of another
• process = this reading is compared to the set are four main periods:
variable in the system. temperature entered by the user • mechanical and hydraulic
• output = signals are sent to turn the • direct digital
E ALE R
Components Function OR
T
C
4.2
Sensors Input devices that detect conditions in the environment then send the results as signals
Data forms
to the controller
Signal conditioners Help keep the signals passed to and from the controller ‘clean’, that
is, reduces the amount of interference in the signals
Controller Devices that process the input signals from the sensors to produce the
output signals required to drive the actuators
Actuators Output devices that perform the physical actions that have an effect on the environment
Table 14.3 Features and examples of the different types of control systems.
Activities
Identify Analyse Investigate
1 List and describe 4 Think about the three types of 5 Find at least one example (different from
three types of automated control systems. Draw up those mentioned in the text) of each type
automated control a table as shown and write down the of control system—batch, continuous and
systems. advantages and disadvantages for discrete—and, for each example, discuss
each type of system. why you think this type of system is used.
2 What were the four
periods in the 6 Research one control system and write a
development of Advantages Disadvantages report. Include the category of control
process control? system, list the inputs and outputs,
Continuous
3 Describe the types of describe the main processes, and explain
Batch
automated control the role of the computer/s in the system.
Discrete
systems which were 7 Conduct some research to find the origins of
developed in these automation. Draw a timeline showing the
four periods. Table 14.4 Advantages and disadvantages developments made in automation. Show
of automated control systems. the use of automation in industry.
T
C
environment in order to operate. For example,
sensors movement 2.2
Optical (light) sensors Used to detect changes in light Hardware
most security systems use sensors called passive components
infrared detectors (PIR) to detect intruders and or changes in colour
turn on an alarm. PIRs are electronic devices that Chemical sensors Detect the presence and
detect body heat when intruders enter or move quantity of various chemicals
around the protected area.
Table 14.5 There are various forms of sensors
Traffic lights used to measure different types of data.
Traffic lights use a range of sensors to control the The way GPS works
traffic and ensure safety on the roads. There are twenty-seven GPS satellites (twenty-
Commonly, traffic light systems use an four working and three for backup) constantly
‘inductance loop’ placed in the road. As a car orbiting the earth. Cars that have navigation
goes over the loop, a small current is induced. systems installed have a GPS receiver attached to
This is fed to the processor controlling the infobit
a small computer in their car. Digital road maps
system. The system then recognises that a car is are either saved in its memory or on CD-ROM. Some early versions of
present. The inductance loop is a passive sensor • Step 1—The GPS receiver in the car locates the inductance loops
(see Task on pages 306). some satellites orbiting the earth. It must were not sensitive
locate at least three satellites. enough to pick up the
Navigation systems in cars • Step 2—Each satellite sends information to
presence of small
vehicles such as
Navigation systems in cars are becoming the receiver in the car, including its current
motorcycles.
popular. Using this type of system, the driver position relative to the receiver. Consequently it was
knows exactly where they are and where they are • Step 3—The GPS receiver analyses the not uncommon for a
heading. This type of system uses the global signals and uses mathematical calculations motorcyclist to be
position system (GPS) to navigate. to determine the location of the car on stranded or to have to
earth. To make the location details more go through a red light!
user-friendly, the data is usually fed into the
maps stored on the computers memory.
Using this type of system, a driver can
determine where they are at any moment in time.
This is possible by the use of very sophisticated
sensors that record every movement of the car.
Light sensor Temperature sensor
Security alarms
There are many types of security alarms used in
homes and commercial buildings. You may have
one in your home. A common design is an alarm
Touch (pressure) sensor
which uses a photo-sensor motion detector to
Figure 14.22 Light, temperature and touch pick up unexpected movements in its path. These
(pressure) sensors. types of systems have two components:
Developments in
chemical sensors will
Automatic doors
soon allow doctors to Automatic doors use a sensor so that the doors
GPS receiver
visit patients and in car
can open at the required time. The sensor is often
perform an immediate placed at the head of the door. The sensor is
Earth
blood test on the passive and may be an ultrasonic device or a
patient. The new passive infrared detector. When the presence of a
handheld sensors will person is detected, a message is sent to the
Figure 14.23 How global positioning systems work.
allow physicians to get controller to open the door.
an immediate on-site • a source of light such as a laser beam
chemical analysis,
without having to wait
• a light sensor
Chemical sensor
days or weeks for In a home security system, the light beam is
laboratory reports. aimed at the light sensor, across a passageway. Another type of sensor is a chemical sensor.
When somebody walks between the light source Chemical sensors are found in home safety
and the sensor, the path of the beam is blocked systems used to detect smoke or carbon
briefly. The sensor registers a drop in light levels monoxide. They are also used to monitor air and
and sends a signal to the control box. This would water pollution, both indoors and outdoors, and
set a timer going to give the homeowner time to monitor problems in car engine performance.
Activities
Identify Analyse
1 What is a sensing device? 4 Find an example of a system at your school which uses a sensing device
2 What is a sensor used for? and answer the following.
3 Name two types of sensors. a What does the system do?
b What type of sensor is used?
c Draw a diagram to represent the system, showing its main components.
d Discuss the effectiveness of the system in your school.
Figure 14.24 A traffic light system uses an inductance loop Control signals from
the computer Data to the
which is controlled by computer. computer
2 Choose the correct components from the RoboLab or d the light should remain red long enough for
other kit needed to build the model. someone to cross the road, and then turn green
3 Note which of the components are input devices again.
(sensors), and those which are output devices 6 Now convert what you have written into a program for
(actuators). your robot, using the appropriate programming
4 Build the model of a pedestrian traffic light, including a language.
touch sensor. 7 Run the program and observe the results.
5 Write in words a program for the model which obeys 8 Did the program run as expected? If not, make the
the following rules: necessary changes to the program and run it again.
a the light is green unless the sensor is activated 9 In your group, discuss how the system could be made
b the touch sensor is to be activated when a safer for pedestrians by including a walk/don’t walk
pedestrian pushes the button light for them.
c when the sensor is activated, the light is to turn 10 Challenge: Implement your safety ideas into the model.
amber for a set time, then red
E ALE R
What are
14.8 Stepping motors OR
T
C
2.2
These types of motors provide precise movement
actuators? to a specified location. The rotational movement
Hardware
components
may be controlled to an accurate number of
Actuators convert commands to actions, that is, degrees. Stepping motors are useful in automated
they perform the physical work of a control system. systems when very precise movements are
Table 14.6 lists the types of actuators available. required.
Actuator Function
Solenoid
Solenoids Used to move an arm though a small movement
A solenoid consists of a magnetised iron rod
Motors Provide smooth, continuous rotational motion in a
surrounded by a tightly bound coil of wire.
clockwise and anticlockwise direction
When an electric current passes through the
wire, a strong magnetic force is produced which Stepping motors Provide precise movement to a specified location
is strong enough to move the rod. When the Relays Act as a switch to control mechanical movement
current is switched on, the force moves the rod in Pumps Used to force liquid or gas into piston chambers to
one direction. When the current is switched off, cause mechanical movement
the rod moves in the opposite direction. A push
movement may be used to connect the starter Table 14.6 The types of actuators and their functions.
motor of a system, such as a car starter motor. A
pull movement may be used to open a valve, such Degree of
as in an automatic watering system. movement
On/off
Electric motors electric current
Relays
Relays are also called switches. They consist of a
infobit
solenoid connected to a mechanical switch.
Stepping motors are Relays are often used with a small electric
widely used in current to turn on a large electric current. For
printers, scanners and example, a 5-volt signal from a computer could
disk drives. be used to turn on a 240-volt power supply to an
electric motor. Relays then can act as a safety
mechanism to systems that use large currents.
Gas is pumped into the chamber.
Figure 14.27 An electric motor from the LEGO® Figure 14.28 A pump pushes gas into a chamber
Robolab kit. until it is so full that it forces pistons to move.
Activities
Identify Analyse Investigate
1 Define the term 3 What functions do actuators 6 Design and build a model with your robotic kit using
actuators. perform in automated control the motor actuator. The model should include a
2 List five types of systems? sensor to control the movement of the motor.
actuators and 4 Find at least three examples of Examples include:
describe what each actuators used in a system and a a car that travels in one direction until it
might be used for. describe their use. touches a wall, then reverses direction
5 List the actuators found in your b a conveyor belt that stops when a particular
robotic kit (note that lights are coloured item passes the light sensor on the belt
not actuators).
2.3
Microprocessors
Temperature Process/adjust Cold air
Input Process Output input cooling unit output
Figure 14.29 An example of how an open-loop Figure 14.30 An example of how a closed-loop
system, such as an oven, works. system, such as a thermostat, works.
Activities
Identify Analyse Investigate
1 What is a controlling device 3 What are the 4 Think of a system that does not use feedback. Draw
in a control system? Give an advantages of a the system as a simple block diagram.
example. closed-loop system 5 Build an open-loop system with your robotic kit
2 What is the difference over an open-loop (note this would not contain sensors).
between a closed-loop system system? 6 Draw a block diagram of a closed-loop system. Build a
and an open-loop system? closed-loop system with your robotic kit (note this
would contain sensors, such as a light or touch
sensor).
7 Compare and contrast how the models of open-loop
and closed-loop systems work.
T
C
solutions 1.2
• Word-process the document, with a list of Designing
names of members of the group. solutions
• Draw a block diagram of the system.
• Hand it in to the teacher for approval.
• Draw a diagram of how the model will
look.
Planning • List the rules and/or steps required for the
• If appropriate, break down the system into programming components of the project.
small components and list them. E ALE R
OR
• Assign team members to the following Producing solutions
T
C
roles, but all students should be aware of
1.3
Producing
what other group members are working on: • Build the model components. solutions
— building the model components • Write some programs according to the
— programming the model components specifications and save them.
— documenting the progress of the project
(in a written format as well as taking Testing the project
pictures, drawing diagrams and other • Test the model components with the
relevant documentation). programs written.
• Work out a time-frame for completing all • Make necessary modifications.
parts of the project and document this. Be • Did the model do what you set out in the
sure to include time for testing and modifying. planning stage?
• Determine the building blocks necessary for
E ALE R
the model. This would include the contents
of your robotic kit, with any additional
Evaluation OR
T
C
1.4
hardware or components. • All team members complete the Evaluation
• Determine the software you will need for documentation describing their part of the
your project. In most cases, this will be the project.
software of your robotic equipment, but • Each group takes a video of the working
you may also include PowerPoint® for the model and uses it with the documentation
final presentation, and graphics software for to create a PowerPoint® presentation of the
the digital images you take. project completed.
Activities
Additional
14.11 many people. This has been evident, for
example, in the banking industry. Automatic
teller machines (ATMs) and other technologies
E ALE R
content have replaced many tellers who used to work
over-the-counter in banks.
OR
5.2
T
C
Current and
emerging How have automated Innovations in robotics
technologies
systems affected our lives?
Send in Mr T to tackle terror
In the manufacturing industry, automated
Three high-tech bomb disposal robots have been
control has had a significant impact. Jobs such
bought by the State Government as the NSW
as lathing, welding and fitting have declined and
Police arm for Sydney’s worst nightmare—a
been replaced by automated equipment which
terrorist attack.
can carry out the same tasks. Usually, these tasks
The radio-controlled devices are the latest
are more economical when performed by
weapon in removing, disabling or detonating
automated control.
bombs that might be planted at major inner-city
Another result of the increased use of
locations.
automated systems in industry has been a
The $600 000 remote-controlled Teodor
positive one in the area of human health are
robot—nicknamed ‘Mr T’—will be able to
safety. Accidents and conditions such as
dismantle a suitcase bomb during a code red
industrial cancers have declined due to the
emergency. Two smaller robots costing $736 000
reduced risks to humans.
will also be delivered.
To the existing workforce, automation has
Equipped with four cameras, the robot can be
the potential to offer flexibility in working
armed with a 12-gauge shotgun or a high-
conditions, for example, greater leisure time for
powered water cannon and fitted with drills,
humans, a shorter working week, and earlier
grinders, cutting shears, a window breaker and a
retirement.
tearing hook. It also features a cryogenics pack
But the introduction of automated control
enabling the robot to freeze explosive devices, and
has also had negative effects. Often, the
a gadget that fires fragmenting projectiles that
introduction of machines that take the place of
break up before impact to foil a targeted bomb.
human workers has resulted in a loss of jobs for
Activities
chapteroverview
Robots are special types of systems that use automated by degrees of freedom. Robotic systems are governed by
control. There have been two areas of influence in the field of specialised hardware components and software to drive them.
robotics: science fiction, and science and technology. Science Automated systems are designed to manipulate variables
fiction writers and film producers have used robots to in the system in order to achieve a desired goal. Historical
entertain people, while science and technology engineers have developments in the area of automated control have been
used robotics to provide solutions to problems in the real strongly influenced by the introduction of computers.
world. Robots are used in many areas, including The three main types of automated systems are
manufacturing, exploration, entertainment, education, continuous, batch and discrete systems, each with their own
agriculture and medical science. different features and uses. Automated systems include
The main functions of robots are to perform tasks that special hardware components, known as sensors and
are dirty, very repetitive, very precise, too dangerous for actuators, which input to and output from the system.
humans, or impossible for humans to do themselves. Many Automated systems may be open-loop (not using feedback)
types of robots have been developed to suit different needs or or closed-loop (using feedback).
to perform different tasks. These include mobile robots and Automated systems have had a significant impact on our
stationary robotic arms. Robotic motion can be compared to daily living. Issues relating to the use of robots include job
the movement of certain human body parts and is described displacement and changes in working conditions.
TER TE
AP
CH
ST
WS
Software Development
and Programming
CHAPTER OUTCOMES CHAPTER CONTENTS
You will learn about: 15.1 Basic programming concepts 316
• some of the ways in which people can develop 15.2 GUI layout 323
software
15.3 Data types 325
• factors that need to be considered by the
15.4 Data operators 328
programmer when developing programs
15.5 Algorithms 330
• user interface design principles
15.6 Program control structures 332
• the methods of setting out your design for a
program 15.7 Desk checking 337
• a programming language, and how to write 15.8 Using sub-programs 338
and store programs 15.9 Programming languages 339
• how programs work with data 15.10 Data structures 341
You will learn to: 15.11 Testing program code 344
• design programs 15.12 Error detection 345
• write program code with an appropriate set of 15.13 Error correction 346
tools 15.14 Documentation of program code 346
• work carefully, testing your programs to make 15.15 Project development 347
sure that they work properly 15.16 Additional content 350
• set out your program code so that others can
read it and understand it easily
• use problem-solving techniques
OPTION
15.1
<In Action>
In the late 1980s, Apple computer released a marketing video dreams—creating software that can simulate humanity—
showing a radical concept—a virtual person—an ‘assistant’, software that can ‘think’. It was certainly a dream of Alan
existing only as software on the computer but able to have Turing, who, having lost a close friend while at school,
a conversation with the user. The assistant would be able to became immersed in the idea of how the human mind works,
answer phone calls, send messages to co-workers, organise and strived to create a machine that could work like a human
events and so on, according to our verbal instructions and mind. What Turing left unfinished was finding the bridge
using its own intelligence and initiative. between computability and humanity. There seems little
The video suggested that work was in progress to achieve doubt that we will accomplish this one day, yet there are
this, and viewers perceived a suggestion that the real many steps left in the path to this goal.
product was only a few years over the horizon. Will you be one of the people who moves us yet another
We still have some way to go towards achieving anything step along our way?
like this concept, yet it remains one of humankind’s
Basic programming
15.1 Begin
BEGIN
Ask for the BirthDate Display the user’s
Retrieve the SystemDate age in years
IF the SystemDate > BirthDate THEN
Calculate Age in years
Display calculated Age
ELSE
Output "Incorrect birth date"
END IF
End
END
Figure 15.1 Try out your logic! Here we see a flowchart for a simple program to calculate a person’s age in years. All users have to do is
enter their birth date and our program will check to see if the birth date is a date in the past (otherwise the birth date must be
incorrect). The use of flowcharts allows us to work out the logic of a program before writing it with a programming language. We have
also shown the same program logic in ‘pseudocode’, which looks more like the instructions we’d write in a computer program. We
learn more about these two ways of setting out program logic later in this chapter.
Age Check
The program provides output with this message box. The The program uses the birthdate entered
You are 15 years old
message tells this user their age is 15. The program waits by the user to calculate their age in
patiently until the user clicks the OK button before doing OK years. The calculation done by the
anything else. program is called processing.
Figure 15.2 In the input–process–output model, most interactive programs wait for an input from the user. The processing which
follows depends on what input was received. We normally expect some form of output from the processing, which is often displayed
on the computer screen.
Figure 15.5 Variables in memory. Variables are stored in memory. In this diagram we see variables represented like compartments
which can contain values. A computer program can look to see what value a variable contains—this is a read operation. The
program can also change the value of the variable—we call this a write operation.
FirstName = InputBox ("What is your first name?") What is your family name? OK
Variable initialisation
FamilyName = InputBox ("What is your family name?") Cancel
Figure 15.6 Declaring and using variables in a program. In this simple example of a program in Visual Basic®, the first three lines
are program variable declarations, the next two lines initialise the FirstName and FamilyName variables by asking the user to
enter a value for each variable. The processing step combines the FirstName variable value, a space character and the
FamilyName variable value, then places the combined text value into the WholeName variable. The last line in this example says
hello to the named person, using a message box.
We include program declarations at the very beginning of assignment statement. We usually place the initialisation
programs, before we do any other work, and before any of the statements immediately after the declaration statements in the
variables are used in program statements, as you can see in program, as you see in the program procedure structure
Figure 15.6. diagram in Figure 15.6.
Programming languages prevent us from using special
reserved words as variable names. Words like FOR, THEN and
IF are reserved words in most languages, so we cannot use
Assignment statements
them for variable names. When data is received by a program procedure, it will usually be
assigned to a variable. From that point, the variable contains the
Initialising variables value it has been assigned. At any time it suits us, the variable’s
Most programmers also initialise variables before they are value may be changed by the program code.
used in a program. Initialisation involves setting the initial Assignment statements are used in program code to
(starting) value for a variable. In order to do this, we use an assign a value to a variable. After the statement has been
key word executed, the variable will contain If Counter had the value 5 just before this line of code,
the value assigned to it. In the it would have the value of 6 immediately after the statement
following, a variable called Area is has executed.
being assigned a value calculated on
Assignment statement
the right-hand side of the equals Example 3: Subtraction
Used in program code sign. Coding can also be used to perform subtraction.
to assign a value to a
Visual Basic® Visual Basic®
variable.
Area = Length * Width BankBalance = BankBalance - AmountWithdrawn
Pascal Pascal
Area := Length * Width;
BankBalance := BankBalance - AmountWithdrawn;
In some programming lan-guages, In this example, BankBalance will be reduced by the
the assignment statement uses the amount the bank customer withdraws at the ATM. The code
infobit
equality sign (=). This symbol doesn’t will do these things:
Programmers can call mean ‘is equal to’, but instead it
• read the value from BankBalance
variables whatever should be interpreted as ‘gets the
they like, so long as value…’ or ‘is set to…’ or ‘is assigned • read the value from AmountWithdrawn
they don’t break the the value of…’. In Pascal, this is made • perform the subtraction
rules of the language. clear as the assignment operator is • assign the value resulting from the calculation into the
Good programmers
written as:=. variable BankBalance
follow naming
The value to the right of the Visual Basic®
conventions, such as
equality sign is copied into the ChangePayable = AmountTendered - TicketCost
the Hungarian notation
variable. Pascal
which starts each
Here we see some practical ChangePayable := AmountTendered - TicketCost;
variable name with a
three-letter tag to examples of assignment statements. In this line of code, a rail ticket machine subtracts how
indicate the type of much the ticket costs from the AmountTendered, and
variable, such as
Example 1: Assigning a literal assigns the value into the variable ChangePayable. If the
intCounter. or specific value to a variable ticket requested costs $5.40 and the amount tendered is
Variables can be assigned a specific $10.00, then the ChangePayable will be assigned the value
value. $4.60.
Visual Basic®
Score = 50
Example 4: Multiple calculations
Pascal The following program code works out the volume of a room
Score := 50; in a building.
In either language, once the statement is executed, Score Visual Basic®
will contain the value of 50. RoomVolume = Width * Length * Height
Pascal
Example 2: Incrementing a variable RoomVolume := Width * Length * Height;
We often need to increase a numeric counter variable, usually In this example, the variable RoomVolume will be
to keep count of how many times an action has happened. We assigned the value found by multiplying the width of a room
describe this as incrementing the variable. Code to do this by the length and the height.
might look like: The program will do the calculations as follows:
Visual Basic® • read the values of Width, Length and Height
Counter = Counter + 1 • multiply the three values to calculate the volume
Pascal
• assign the result to RoomVolume
Counter := Counter + 1;
Note that when there are multiple calculations in one line
The program will execute this line, which adds one to the of code, the order of operations is the same as we have
value in Counter, using the following steps: learned in mathematics. Calculations are performed in this
• read the value from Counter order:
• add one to this value • bracketed operations and order (raised to a power),
• assign the new value back into Counter from left to right
Functions
Each programming language has its own set of built-in
functions which we may use when programming.
When we write programs, we can take advantage of
functions in the programming language we are using. We just
need to know what functions are available, and have an idea
of how they work. It’s also quite normal for us to write some Figure 15.7 A popup dialogue asking for a user’s input.
of our own functions as we need them, as we see later in 15.2 Pascal
Sub-programs. Write("Please enter your birthday in form
Something that functions have in common is that they dd/mm/yyyy");
return a single value of some type. In the examples that Readln(BirthDate);
follow, we consider how existing functions may be used in When these statements are executed, the interaction looks
program statements. something like this:
Figure 15.9 A popup message asking for a simple response Other functions
from the user. The functions we have considered so far are only a few of the
very large number of functions we can possibly use.
We can see that the message box is asking us if we want
Programming languages have function references in Help files so
to delete some files. After we click either the ‘Yes’ or ‘No’
that we can explore and find functions of use to our programs.
button, the variable Response will be assigned an integer
value which can be checked by the program to see if it was a
‘Yes’ or a ‘No’ answer. Constants
Pascal As well as variables, programs may also use constants to
VAR
represent fixed numbers and strings. Like variables, constants
Response : char;
can be created in the program, use a reserved area of memory,
{this variable used to hold the letter typed at
and are given a name. Constants may, like variables, be set to
the keyboard}
BEGIN
a value. A constant cannot be changed once its value has been
Write("Delete Files: Y/N?") set in the program.
Readln(Response) In program code, we might set two constants with code,
… like the examples shown below.
END Visual Basic®
Const ProgramVersion = "Version 7.01" 'string
String-handling functions Const MaxFilesOpenAtOnce = 5 'integer
Pascal
There are many functions used to work with string data CONST
(text). Table 15.1 shows some examples of this. ProgramVersion = "Version 7.01"; {string}
MaxFilesOpenAtOnce = 5; {integer}
Function Output
Len() This function returns an integer value which is the number of characters in the string of text. For a string like ‘Program’, the
value will be 7.
Left() This function returns a specified number of characters from the left side of the string. If you ask for three characters, and the
string contains the value ‘Program’, the value returned will be ‘Pro’.
Right() This function returns a specified number of characters from the right side of the string. Asking for three characters from the
string value ‘Program’ will return a value of ‘ram’
Table 15.1 Functions which work with string data (text) and their output
Activities
For these activities, you may wish to use the programming language you are learning.
Identify Analyse Investigate
1 Write assignment statements that would assign: 3 Work out what the following line 5 Find out about five
a your own name to a string variable of code might do: functions used to work
b your birth date to a date variable SalePrice = RRP - (RRP * with dates and times
c the first three letters of your name to a DiscountRate) in your programming
string variable 4 Work out what the following line language, and prepare
2 Write a declaration for some program constants, of code might do: a short report showing
and set their values for use in a scientific TimeTaken = TimeFinished - examples of how these
program. We need two constants: one to hold TimeStarted functions can be
the boiling point of water and the other to hold useful to programmers.
the normal body temperature of a human.
3.5 objects available to create programs with In core chapter 3: Software, we discovered the range of
Features of
a GUI a graphical user interface. different GUI objects made available in operating systems.
A very important factor contributing When we design and develop a program which uses these
to the success of good software is the design and layout of the objects in a programming language, the graphical tools
interface presented to the user. enable us to drag these objects onto forms and position them
according to our design.
We are then able to write program code to make the
Graphical tools software behave as designed. For example, we may drag a
button onto a form, then create program code which runs
Using graphics tools can be quite effective in designing forms when the user clicks the button.
and reports for software. Many programming languages have Some of the more common objects we might use in graphical
built-in graphical programming tools so that the screen and programming are mentioned below.
form designs can be quickly turned into programs. • Text boxes—Text boxes are useful for displaying single
values of data, such as FirstName, CurrentScore,
EmailAddress, etc.
’S RES
ER
WS
OU
TEACH
Task Design a GUI layout
RCE
15.1
Your favourite television station has invented a new correct answer set is identified, and the winner is
interactive TV program which involves answering a quiz. entered into a ‘final’ competition, where they will appear
Viewers at home can respond to the quiz, using either a home on television against other winners.
computer connected to the Internet, a mobile phone, or 1 Design a screen form layout, using a graphics program,
personal digital assistant. They’ve decided to call it showing what the program will look like on a home
QuizDotComp. computer. Show the text boxes, buttons, labels, menus
In the hour prior to the quiz show, the viewers at and anything else that is needed.
home can download a program from the Internet and 2 Use the technique of storyboarding to plan the way the
load it on their computer or mobile phone. The data screens will appear in the game.
can’t be viewed without a password, which is announced 3 Design another graphical layout especially for the smaller
at the beginning of the show. screen of a mobile phone.
Each quiz has a set of multiple-choice questions or
4 List the features you have included to make the program
one-word-answer questions. Once the password is
more accessible to people with disabilities.
entered, the viewers can start answering the questions. If
5 Use a programming language to create a prototype for the
they don’t know an answer, they can skip the question,
software which includes all the graphical elements.
but can’t go back to it later. Once the quiz is completed,
the viewers click a button and the answers are sent, 6 Conduct a peer review with other students and assess
encrypted, to the TV station’s computer. The first fully which parts of each design work well.
T
C
• Command buttons—Command buttons are widely used with in memory locations called 4.3
variables. The amount of memory used Data coding
in GUI programming. They provide a simple clickable
object and usually are provided with a text caption or a for a variable depends on how much it
graphic icon to represent what the button is for. A has to hold, and that, in turn, depends
button may be programmed to respond to a click event, on what the data consists of.
which occurs when the user clicks on the button. There are many different types of E ALE R
OR
data that programs need to work with.
T
C
• Combo boxes—Combo boxes are used to present a
Each programming language supports a
4.5
drop-down list of choices. Like list boxes, a combo box Data types
can contain static data or may list data derived from a range of data types, and has rules about
database. The advantage of a combo box is that it what we can do with each data type.
doesn’t take up much room on a form. With combo Most of the data that programs
boxes, a user is limited to making one choice from the work with could be classified into one
key word
list, unlike list boxes which can enable multiple of the following categories:
selections. We can write program code for a combo box • character data—the building
so that something happens after a user has made a blocks of text
• string data—so-called because Data type
choice from the list of items.
they hold strings of characters, A specific category of
• Check boxes—Check boxes are widely used and can be
rather like strings of pearls! data representation. For
very useful. To change the value of a check box, the user each data type in a
only has to click it—much like a light switch—to ‘toggle’ • integer or whole numbers
language, there are
between checked (True) and unchecked (False). • real numbers—used for numbers rules about what
There are many other objects we can use in a GUI layout, with a fraction component operations can be
but we should always try to use the most appropriate • Boolean data—used to represent performed on that type.
combination to avoid confusing the user. true or false
• date and time data writing a program which needed to check the first letter of
• binary data—holds large objects such as movies, sound each word, we might need a variable called FirstLetter.
or graphics The examples below show how the variable FirstLetter
• complex software objects—used to represent things like could be declared.
documents, spreadsheet workbooks or collections of Visual Basic®
data from databases. Dim FirstLetter As Char
Let us consider some of the common data types in turn. Pascal
VAR
String variables are created to hold string data. The data type called Decimal, which uses 16 bytes and stores
maximum size of the string that can be held in a string variable enormous numbers. We might want to use this data type if we
depends on the language being used. are calculating how many paper clips it would take to stretch
across the universe!
Integers We may declare variables like this:
Visual Basic®
Integers are whole numbers, either positive or negative. The Dim WorldRecordTime As Single
number of bytes used to represent an integer determines the Dim DistanceToTheSun As Double
maximum size of the integer possible. Modern languages Pascal
support more than one size for integer data. Each size is VAR
influenced by the number of bytes reserved for the integer. WorldRecordTime : Real;
Integers represented by one byte can hold 28 or 256 DistanceToTheSun : Real;
different numbers. Two-byte integers hold 216 or 65 536
integers, four-byte variables can hold 232 or 4 294 967 296
different numbers, and so on. Eight-byte variables can
Boolean
represent 18 446 744 073 709 600 000 different integers! The Boolean data type, named after mathematician George
Boole, is used to represent data which can be expressed as
Real numbers either true or false. We might declare a Boolean variable like
this:
Real numbers are numbers which may have a remainder, and Visual Basic®
may exist as positive or negative numbers. Usually there are Dim GameOver As Boolean
two or more data types supporting real numbers. These are: and we might initialise the variable like this:
• single—meaning single precision, which usually has at GameOver = False
least six significant digits after the decimal point Pascal
• double—meaning double precision, which usually has at VAR
least ten significant digits after the decimal point GameOver : Boolean;
We should use one of these data types when our calculations and we might initialise the variable like this:
will result in a remainder. In Visual Basic® .NET there is also a GameOver := False;
Activities
Identify Analyse Investigate
1 List the data types and variable names you 3 Think about different 4 Search the web for examples of
might use in your programming language to ways of representing conventions for naming program
hold data such as the ones listed below: dates. Suggest more variables. Find tags which may
a first name than one way of be used for variables of the
b birth date representing dates in following types:
c URL for a web page a computer’s memory a integer
d recommended retail price b long integer
e bank balance c single-precision real numbers
f the number of printers in the d double-precision real
network numbers
g the sale price for a house e string
2 For your favourite computer program, list f Boolean
variables you think the program might be
using to hold data while the program works.
Date and time This statement is calculating the total points scored from
goals in the game by multiplying the number of goals scored
Many programming languages have data types to support the by the value for each goal. The result is assigned to the integer
modelling of dates and times. On many computer systems, variable GoalValue.
date and time data is stored as real numbers. The date
component is the integer component of the number and Division
represents the whole number of days since some point in
AverageScore = SumOfScores / NumberOfGames
history. The date used as the reference point depends on the
programming language used and the version of the language! In this statement, we find the average score for the team
The time component is usually represented by the fraction by dividing the variable SumOfScores by the
component of the number, and represents the fraction of a 24- NumberOfGames and then assign the resulting value into the
hour period. For example, 6 a.m. would be represented as variable AverageScore.
0.250 000, as a quarter of the day has elapsed by that time.
Relational operators
Relational operators can be used when we need to compare
15.4 Data operators two values with each other.
Less than operator competition must check their age and gender. The algorithm
might look like this:
Similarly, we can test to see if a value is less than another IF SwimmerAge = EventAgeGrouping AND
value, as seen in the example below: SwimmerGender = EventGenderGroup THEN
IF FileSize < SpaceLeftOnDisk THEN Permit event entry
We can copy file onto disk ELSE
ELSE Decline event entry for this event
Suggest using a different disk END IF
END IF In the algorithm, the swimmer must be the right age and
We may also test to see if a value is ‘less than or equal to’ gender before they are permitted to enter the event.
another value, using the <= operator, as we see in the If we use the OR operator in an expression, any one of two
following example: or more conditions proving true will cause the whole
IF WithdrawalRequested <= BankBalance THEN expression to prove true.
Permit withdrawal Consider an example where a video rental store provides
ELSE discounts if you have a discount voucher or if you have
Decline withdrawal borrowed more than five tapes in the last month. The logic
END IF might look like this:
IF DiscountVoucher OR
CustomerMonthlyBorrowings > 5 THEN
Logical expressions in programs Discount authorised
ELSE
Test conditions in program statements may use logical No discount and customer pays normal price
operators such as AND, OR and NOT. END IF
We use the AND expression when two or more separate The NOT operator may also be used in program expressions,
conditions must all be true in order to execute some code. For but is generally not as useful as the AND and OR operators. It can
example, a program to enter students into a swimming be used to specifically exclude one or more values.
Flowcharts
15.5 Algorithms Flowcharts are a graphical representation of the flow of logic
in a problem solution. They make use of standardised
One of the exciting things about programming is that we are symbols, as seen in Figure 15.10. Flowcharts are easy to read,
presented with opportunities to solve problems creatively. and it may be quite easy to draw the first version, but
Problem-solving takes place in our minds. Our ability to solve changing a flowchart later on can be more difficult. It is
problems is strengthened by lots of things we have learned in sensible to flowchart only small parts of a problem at a time.
the past and our experiences with other problem solutions. The algorithm described in a flowchart begins and ends
If you give several different people the same problem to with a terminator symbol, with the word ‘Begin’ or ‘End’ in
solve, you may find that they all solve it the same way, or they it, as shown in Figure 15.10. As we see in the examples
may solve it in many different ways. An important idea for us which follow, the symbols are connected using flow lines,
all to recognise is that there are often many solutions for a with arrows to show in which direction we trace through the
problem. The first one that we think of may be the best, but program.
Input and output symbols Let us now see how we might use these symbols by
Begin or End are used to indicate points in the looking at worked solutions.
program where some data is In the project at the end of this chapter, we will work on a
required, or where there is an TV quiz show program called ‘Double or Quit’. The program
Process or Input
output of data. doubles the player’s score each time they answer a question
or Output We use a process box to correctly. In Figure 15.11, we see only a simple part of the
indicate some form of processing program which asks a question, receives an answer, decides if the
by the algorithm—what we write answer given is correct, then provides appropriate output to the
Decision in the box indicates what the player. The way we compute the score will be different in the
processing does. For example, in project, and this will be revealed soon.
a computer game, we might write The project we will work on for this chapter will use logic
a process step that says similar to the logic seen in Figure 15.11.
Subprogram ‘Calculate score’. In this particular solution, the program begins, asks a
Decision symbols are used question, checks the answer, provides some output, then ends.
Flowline where an algorithm can change
the direction of flow, based on
the outcome of a decision. We Pseudocode
Figure 15.10 Here we see generally write a question in the Pseudocode is written in almost the same form as program
some of the common decision box that can be code, without using a specific program language. With
symbols used in answered with a ‘Yes’ or ‘No’ pseudocode we can specify the logic to be used in a program
flowcharting. answer. in such a way that a programmer could translate the
Sub-program or procedure algorithm into a program using one of many programming
symbols are used where the algorithm flow calls on some languages. Like flowcharts, pseudocode is language-
other pre-defined process to perform some processing. The independent, that is, it isn’t written in any specific
sub-program or procedure may have its own flowchart. programming language. Pseudocode uses the three control
Begin
Set Score = 1
End
Figure 15.11 Flowchart for part of a simple quiz game program, together with the pseudocode expression of the same algorithm.
This pseudocode algorithm uses the IF…THEN…ELSE…END IF structure, which we will explain in section 15.6.
’S RES
ER
WS
OU
TEACH
Task Describe an algorithm
RCE
15.1
1 Create an algorithm description for three or more of the 2 Represent the algorithms you selected in
following choices: flowchart form and in pseudocode, using computer-
a playing the memory card game (also known as based tools.
pelmanism, pairs or concentration) 3 Present the algorithm for peer review and feedback.
b using a toaster to prepare toast Each algorithm should include a narrative description of
c recording a television program on a videotape how you developed the algorithm, and should mention
d playing a selected track from a CD on a CD player any assumptions you had to make during the work.
e storing a name and number into the phone book
4 Make modifications to the algorithm if needed after
in a mobile phone
feedback is received.
Begin
End
IF <test condition> = True THEN
do Process 1 Is
Yes password No
ELSE
correct?
do Process 2
END IF Allow access to Deny access to
website website
Figure 15.13 In this flowchart and pseudocode representing
binary selection, if the test condition is true, we follow the ‘Yes’
path to Process 1, otherwise we follow the ‘No’ path to Process
End
2. In this simple example, the program would then end.
IF Password is correct THEN
Binary selection Allow access to website
ELSE
In a flowchart, we represent this structure with a diamond- Deny access to website
shaped box, as shown in Figure 15.13. Inside the diamond, we END IF
ask a question which can be answered with a ‘Yes’ or ‘No’. If
you prefer, you could answer with a ‘True’ or a ‘False’, which is Figure 15.14 Flowchart and pseudocode for part of a program
effectively the same thing for this discussion. which decides if a person can access a website.
Multiple branching In Figure 15.18 we see the program logic for a File menu
in some software. The user can choose one of four choices
In many programming situations we are confronted with from a menu and the action performed by the software will
situations where a program user may have many choices, but match the choice made by the user. The logic is expressed in
may only pick one of those choices. In such situations, we may flowchart and pseudocode format.
use the SELECT CASE structure for multiple branching. Figure
15.16 shows a flowchart example for the SELECT CASE control
structure.
Repetition
Here, we consider the choices available for a software- In many programs we need to be able to repeat some of the
driven hot drink machine. We have a choice of three drinks, actions, so we have program control structures to support
but we may only choose one of the three. The actions taken repetition. We call these control structures loops, and most
by the software after making the choice may vary depending languages support different types of loops.
on the drink. We may be presented with a graphical interface The loop structure does not have a special symbol in
and algorithm which looks something like Figure 15.17. flowcharting. A simple loop uses a decision box (diamond-
Only one of the actions will be performed and the drink shaped) and a process box (rectangle-shaped), with the logic
machine will fill the cup with the drink selected by the user. flow lines showing the movement through the loop. Figures
BEGIN Begin
Display prompt "Do you really want to
delete the file?"
Get the Response from the user Display ”Do you really want to delete the file?“
IF Response = "Y" THEN
delete the file from the hard disk
Input Answer
print a message saying "File has
been deleted"
ELSE Does
Yes Answer No
print a message saying "File has
= ”Y“ ?
not been deleted"
END IF Delete file from disc
END Display ”File has not been deleted“
Figure 15.16
Multiple selection Condition
control structure.
In this flow control
structure, the Choice 1 Choice 2 Choice n Otherwise
algorithm involves Process 2 Process n Default process
Process 1
multiple choices,
depending on the
outcome of the
decision or test
condition.
Pre-test loop
A pre-test loop performs a test before starting on the loop.
This type of loop might not execute the loop statements even
File menu
once, depending on the outcome of the test condition. If we
L Load file run a finger around the logic flow lines in Figure 15.19 we
S Save a file to disk
C Clear file from memory can see that the loop tests the condition, only executing the
P Print file loop code if the condition evaluates to True, then tests the
condition again, and repeats this cycle until the test condition
evaluates to False.
SELECT CASE menu_choice
CASE L: Load a file Post-test loop
CASE S: Save a file to disk A post-test loop performs the test condition after each
CASE C: Clear file from memory execution of the loop, and keeps repeating while the
CASE P: Print the file condition evaluates to False. This type of loop will perform
CASE ELSE: do the default process
the loop actions at least once—the very first time—and
END CASE
possibly many times, until the loop test condition evaluates to
True, which causes the loop to terminate.
In Figure 15.21 we see the idea of eating all the chips in
Menu choice the bag shown in the two loop forms.
is Most languages support pre-test and post-test loops.
Both types are terminated by the status of a condition. We
there-fore have to make sure some process happens, usually
None of inside the loop, to ensure that the loop will eventually
the four
terminate. We refer to these loop types as event-controlled, as
L S C P choices
some event (such as running out of chips) will cause the loop
Load a Save a Clear file Print the Default to terminate.
file file from memory file option
FOR…NEXT loops
There is another type of loop which we might use when we
want to perform an action a known number of times. This is
called the FOR…NEXT loop, and most programming
Figure 15.18 Algorithm for a File menu in an applications languages provide this loop type.
program. In the multiple branching control structure, we still The FOR…NEXT loop includes a counter, which is used by
anticipate that there may be a case where the input is different the loop to perform the required number of repetitions. The
from the choices presented, and our program should respond general appearance is like this:
accordingly. To enable this, the control structure includes a FOR Counter = StartValue to EndValue
CASE ELSE (otherwise) branch, and may have code written statements
to handle unanticipated user input. NEXT
1 The condition
is tested first.
If it evaluates
Pre-test loop Post-test loop
to True,
execution Test False The process is done at
moves to the condition least once before the
loop process.
condition is tested.
Repetition continues Process to do
3 After executing until the condition is inside the loop
the loop True, which means that
process, True it repeats while the
execution is
4 When the test
condition is False. When the test
condition Test True condition evaluates
transferred back Process to evaluates to condition to True, the loop
to the test. do inside False, the terminates and
the loop loop terminates
False execution of the
and execution program resumes
of the program at the next part
2 The statements
resumes at the
here are of the program
next part of the Process to do
executed each
program after
after the loop.
time the test after the loop
the loop. has finished
condition is
found to be Process to do
True. after the loop
has finished statement before the loop
REPEAT
WHILE test condition is TRUE process statements
do process statements UNTIL condition is TRUE
END WHILE statement after the loop
Figure 15.19 A pre-test loop, in flowchart and pseudocode Figure 15.20 A post-test loop in flowchart and pseudocode.
form. In the pre-tested loop we test a condition first. If the This loop will perform the loop statements at least once, and
condition evaluates to True, then the process(es) inside the continues to repeat while the condition evaluates to False.
loop are executed. Execution is then transferred to the test The loop will terminate when the condition evaluates to
condition to see if it is True or False. True.
Figure 15.21 Same problem, two different loops. We see the idea of eating all of the chips in a bag represented in both forms of
loop—pre-test and post-test. For this example, you might think that they both achieve the same thing. However, if the chip bag was
empty to start with, the post-test example will instruct you to do something that is not possible (eat chips). While this is not a
disaster in real life, in a program it could cause an error. The error would not happen with the pre-test loop. This idea is
particularly important when we write programs which use open-data sources, such as files or databases, to read data into the
program.
OU
TEACH
WS
RCE
1 Design algorithms in both flowchart and pseudocode program should ask for details like 15.3
formats for the following problems. customer name, street address, suburb,
a Pumping up a bicycle tyre. home phone number and the number of
b Filling a glass of water from a bottle. parcels. It should then print a label for each parcel.
c Making a cup of tea for a visitor, including the 3 Design a program for a machine which will record a
part where you ask them if they like milk or television program for the user. The design should
sugar. include the user interface. The user is asked what
d Making a Vegemite® sandwich. channel the program is on, the date and time for the
e Taking meal orders for customers at a table in a program screening, and how long the program runs for.
restaurant. Create a flowchart and pseudocode for an algorithm to
2 Create a GUI layout for a program at a supermarket record the program.
which organises home delivery for elderly customers. The
Advanced problem
We are designing a program to run security floodlights. The owner of the home wants to know how often the lights turn
floodlights should only operate during night time. If on during the night, the computer should record the time the
movement is detected by a movement sensor, the light should light came on in a database or file.
come on for 60 seconds, and then it should turn off. As the
For example, if we wanted a program to count from 1 to • set out a table or chart showing all the
10, with one-second intervals, we might use a loop like this: variables and data structures used by the program
FOR Counter = 1 to 10 • work through each statement of the program in the
display value of counter order it should execute, modifying the values in the desk
wait one second check chart as they go
NEXT • perform the desk check in such a way
The loop will start the value of the Counter variable at 1. that all possible choices by a user will be considered
The statements inside the loop are executed, then the Counter Desk checking can often reveal errors in programs, but is
is increased by 1 (to 2). If the Counter is not greater than the not guaranteed to do this. It is a very useful technique, but is
end value (10 in this case), the loop continues. not foolproof. It is just one of the techniques we use in
programming to try to verify that the program code will
properly implement the algorithm.
15.7 Desk checking If the desk check is conducted by someone other than the
programmer who wrote the code, it is even more useful,
Desk checking is used by programmers to check the logic of because the program author will often make assumptions
a program. The process involves simulating the action of a about how a user will respond to the program which may not
program as it would execute. The programmer will: be correct.
Activities
Identify Analyse Investigate
1 What pseudocode control 3 Compare the two types of loop 5 Find and list the syntax for each
structure is used for binary (pre-test and post-test), giving loop type supported in the
selection? examples showing when each type language you are using.
2 Identify which pseudocode is appropriate. 6 What do we mean by the term
control structure should be 4 Using the example shown in Figure ‘loop termination’?
used for repetition where a 15.18, write similar SELECT
condition is tested before CASE pseudocode for the File
executing the loop menu in your word processor
instructions. program.
A desk check may show no program defects for the The sub-programs are named as dice, peel, heat, etc.
sample inputs we choose. This may be because the program and each involves certain tools and skills that can be re-applied
works perfectly, or it could be that the inputs we have selected to different ingredients.
do not adequately test the program. Notice we ask a cook to peel some carrots. A bit later, we
We need to choose our input data sets very carefully to ask them to peel some potatoes. Each time we call for the sub-
simulate mistakes that users make. For example, if a program program peel, we also provide some information needed by
asks the user to enter a number, and instead they press the that sub-program—the ingredients and the quantity.
Enter key (without pressing a number key first), the program When we call the sub-program heat, we provide a
might fail. In our desk checks, we should consider what the different set of information—the ingredient, the amount,
program will do with something like this by running the desk what to use to heat with, and special instructions. The
check with the input values set to Null. information items we need to give to a sub-program are called
parameters or arguments.
If we were writing software for a robot to do the cooking,
15.8 Using sub-programs we might write sub-programs like the ones we have
considered so far.
Sub-programs are implemented in programming languages When we design software, our design will include
using differ-ent terms, such as function, procedure or sub- specifying the sub-programs that will be needed. We also decide
routine. Most software has a main program, which in turn what function or task each sub-program will have to do, and
uses the services of sub-programs to perform specific tasks. the information or parameters it will need to do its job.
It may help to think of the real-life analogy of cooking to We usually name a sub-program in such a way that it is
explain why we use sub-programs in programming. Let us obvious what it does.
think of some of the tasks a chef might perform in a kitchen In program code, the procedures which are written are seen
during food preparation, and turn them into sub-programs. in sequence, identified with the procedure names. Figure 15.22
Let us do this in such a way that we can ask one of the cooks shows the pseudocode listing for a
key word
to perform the sub-program. We might observe the chef program to make a sandwich.
giving instructions like the following: The sandwich maker has access to
• dice (two onions, finely) a list of different types of sandwiches,
each of which has an ingredient list. Main program
• peel (500 g carrots)
For example, if a customer asks for a When we run a program,
• heat (300 ml milk in saucepan, do not boil) cheese and tomato sandwich, the usually a main program
• strain (broth, keep liquid, discard solids) ingredients are obviously sliced cheese runs first as it is the
• whisk (egg whites, until stiff)) and tomato. If they ask for a salad starting point for the
• mix (500 g flour, 100 g sugar) sandwich, this might have a fixed list program. The main
of ingredients such as lettuce, tomato program may include
• peel (800 g potatoes) ‘calls’ to sub-programs
and beetroot.
• heat (100 g butter in saucepan, melt then remove) to do specific tasks.
When the sandwich maker
OU
TEACH
desk check on the program. execute each program instruction WS
RCE
1 Decide on some program inputs, using two or three manually, showing the value of each 15.4
examples. variable in the table.
2 Work out by hand, without looking at the program, what 5 Once you have completed the execution of the program,
the output should be, based on the inputs you have compare the program’s output with the output you
selected. calculated in step 2.
3 Work through the program, finding all of the variables 6 If you haven’t found any errors so far, repeat the process
that have been declared, as well as any that are used that using another one or two sets of program input, to see if
were not declared, and set these out as column headings they also work correctly.
of a table.
This sub-program is called by the main program. Its BEGIN SUBPROGRAM GetSandwichPreferences
job is to ask the customer for their preferences and REPEAT
store these into variables. get sandwich preference from user{into
program variables}
UNTIL all preferences noted
END SUBPROGRAM GetSandwichPreferences
run. This is true if the programmer has prepared the software Begin program
to run or execute in that environment. If we understand how
programs are executed on a computer system, we are in a Get sandwich preferences
much better position to write programs which work the most
effectively. Get ingredient list
There are many choices of programming
languages used widely in the industry, including: Check if ingredients available
• C++ (pronounced ‘see-plus-plus’)
• C# (pronounced ‘see-sharp’) Are
No
ingredients
• Java® available?
Activities
Identify Analyse Investigate
1 Describe the steps involved in 3 Functions are different to 4 Find out about the syntax for sub-
performing a desk check on a program. ordinary sub-programs in that programs in the language you are using.
2 What are the main reasons for using they return a value. Explain 5 Find out why the GOTO statement is
sub-programs? why some sub-programs don’t regarded as bad practice in programming.
need to return a value.
Projects you work on in this chapter should be in a This is why programming languages E ALE R
OR
language recommended to you by your teacher. provide us with the use of arrays.
T
C
Programmers usually write code in the form of lines of text, Arrays can be thought of as lists of
3.2
Types of
using the grammar (syntax) of a programming language. The variables or like tables of variables of software
text is usually written using a text editor provided as part of the the same data type, for example, an
programming language’s integrated development environment array of string variables, or an array of
key words
(IDE). The program, written in text, is referred to as source code, integer variables. In a program where
and is stored on the computer hard disk in its original form. we need to work with a set of data,
Computers cannot execute the programs in this form, and we can copy the data into the array,
the programming language tools have to translate the program do the work we need to do, such as Compiled language
instructions into a form which can be understood and executed sorting or modifying the data, then A language which is
by the computer. Once this is done, we call this form of the write the processed data to a file, converted to machine
program ‘machine language’ or ‘object code’. At this point, the database or some other destination. language by the
programmer, ready for
code is executable, and the computer can run it. Just like single-value (scalar)
later use.
Some languages are designed to be compiled by the variables, arrays are held in memory,
programmer, ready for use later. These languages are so that processing the data in an array Interpreted language
1 Wirth
Listing all the values in an array
2 Martin We might use a loop to display all of the names in an array.
3 Lin The pseudocode for this is shown below:
ArraySize = 6
4 Tabone
Counter = 1
5 Fenton WHILE ArraySize > Counter
6 Liang display Counter
(a) A one-dimensional array of string variables declared as display StudentName(Counter)
StudentNames() Counter = Counter + 1
END WHILE
1 Susan Wirth Note that in this example we used the pre-test WHILE
2 Oliver Martin loop. We set the ArraySize variable to 6 and the Counter
to 1. As we enter the test condition for the first time, the
3 Mai Lin
expression ArraySize > Counter will be True, so the
4 Julia Tabone loop statements will be executed. The Counter is increased
5 Aaron Fenton each time we go through the loop, which brings the loop
6 Julie Liang towards termination.
(b) A two-dimensional array of string variables declared as We could also use the FOR…NEXT loop, as follows:
StudentNames(6,2) ArraySize = 6
FOR Counter = 1 to ArraySize
Table 15.2 Here we see (a) a single-dimensional array and (b)
a two-dimensional array. The type of data we need to handle display Counter
will determine how we configure an array in our programs. display StudentName(Counter)
NEXT
approach this in several ways, but an approach using only In the FOR…NEXT loop, the Counter is initialised and
arrays might be to create one array to contain the string data told when to stop in the FOR… line, so we don’t need to have
and another array to hold the numeric data. a separate statement to increment the counter, as we did in the
In the program code, we need to have a way to make WHILE loop above.
reference to individual elements of the array. We use an index
number to do this. The index number for a one-dimensional Searching for a value in an array
array tells us the row the element takes up in the array. In the We may want to search the array to see if it contains a
list of StudentNames in the array shown in Table 15.2 (a), particular name. An algorithm to do this is presented below
we can see that the name ‘Tabone’ is contained in array in pseudocode form. In this case, the example stops when it
element 4. finds the value it is looking for.
In most programming languages, arrays are indexed FoundItem = False
starting at element 0. As this is not entirely helpful, many Move to the first array element
modern languages allow the programmer to specify that REPEAT
arrays will start at element 1, rather than element 0. In our Read the array element
examples in this section, arrays will start at element 1 in order IF the array element value = search value THEN
to avoid confusion. FoundItem = True
We often have need to represent data in table-like form. ELSE
For this, we can make use of two-dimensional arrays. For Move to the next array element
two-dimensional arrays, we have to use two index numbers END IF
to specify an element, the first for the row, the second for the UNTIL (FoundItem = True) OR (At end of array)
column. If we referenced the array StudentNames(4,2) in Note that in the example, the loop will terminate when
Table 15.2 (b), we would read the value ‘Tabone’, which is the item is found, or when the search reaches the end of the
Julia Tabone’s family name. To read Julia’s first name, we array. After all, the value we are looking for may not exist. In
would use a reference to StudentNames(4,1). this example, we can see that the loop test condition can be
made of a compound statement with Boolean operators like
OR, AND and NOT.
We could also use the FOR…NEXT loop to search, but we
would have to use a BREAK statement to exit the loop, and and perhaps other things that we might also include in the
this is regarded as bad practice in programming. record. At the end of a round, the data in the record may then
be copied into a data file or into a database record.
The record data structure
Many programs require us to deal with data about people or
Using files
things like products in a shop. To describe the properties of Files can be thought of as permanent containers for data. This
each person or object, we might need to use a collection of is very useful for keeping the data ready for the next time we
variables of different data types. wish to use it.
In Visual Basic®, the same form of structure is called a The simplest type of file is the text file, which can be thought
Type or a Structure, depending on the version of the of as a container for a long string of characters. Sometimes we
language. In the Pascal language, a collection of variables of write lines of text into a text file, indicating the break between
different types is called a Record. In C++, the same thing is one line and the next with a newline character (see section 15.16
called a Struct. for more details).
Creating a record type declaration suitable for holding For the discussions that take place in the next two sections,
the data about a competitor in a quiz is like this: we’ll be considering a text file containing lines of text.
Visual Basic®
Structure Competitor Reading files
Dim FirstName, FamilyName As String
Imagine that we are given the problem of searching through
Dim ScoreAchieved As Integer
a text file stored by a web server which is logging errors of a
End Structure
particular type—type 404. We are searching through each
Pascal
string for that error.
TYPE
Competitor = Record
An algorithm for pseudocode which will display all lines
FirstName, FamilyName : String;
from the file with the required error would be like this:
BEGIN
ScoreAchieved : Integer;
Open file
end;
WHILE not at end of file
In either language, the statements we have seen do not
Read next line of text from file into
create a new variable which we can use, but they have TextLine
effectively created a new type of record. To use the record or IF TextLine contains ErrorMessage THEN
structure, we would do something like this: Display Textline
Visual Basic® ELSE
Dim Competitor1, Competitor2 As Competitor No action required
Pascal END IF
VAR END WHILE
Competitor1, Competitor2 : Competitor; Close file
During the execution of our project quiz program, we can END
use the data stored in the records for things like displaying the
competitor’s name on the screen, to keep track of their score,
Activities
Identify Analyse Investigate
1 Explain the 3 Create a table listing at least five programming 5 Find out about the rules for using
purpose of a languages, and showing whether they are arrays in the language you are using.
compiler. compiled or interpreted languages. a Are you able to increase the size of
2 How do you declare 4 Compare the record data structure with the the array after it has been
an array in Visual array, giving examples of when you might use declared?
Basic® and Pascal? each type of data structure in a program. b How do you declare an array with
two dimensions?
Writing to files the unit through its paces. To do this, the programmer will run
the program unit using a set of test data. The programmer
We often need to write data into files. If we need to have data should already know what the program will do with each of
stored in a highly organised way, the best storage location is the sets of data. The programmer compares the actual program
a database. If we only need to store text to log events or output with the expected output. If the two sets of data don’t
actions, we might use a simple text file for simplicity. match, the programmer then attempts to find the cause for the
The simplest type of write we can do to a text file is to difference, which may be due to program errors. This is very
append text, which is like the way we write notes in a diary— much like what we did in desk checking, but the programmer
we just add text where we left off last time. If our server is tests the program with real data.
storing the error 404 we discussed earlier, we might use an The tester should ensure that the program is properly
algorithm like this: tested at the boundaries for the calculations being performed.
BEGIN
Let us consider an example of a program which decides the
Open file for appending
level of award to be granted to a student in a course, depending
Write line of text to file
Close file
on the mark achieved. The grading rules for the course are:
END • 0–49: Oopsie
• 50–69: Pass
• 70–82: Credit
15.11 Testing program • 83–100: Distinction
The function called DecideGrade is used to evaluate a
code mark and award the appropriate grade.
In code, the procedure is called with code like this:
The purpose of program testing is to try to verify that the StudentGrade = DecideGrade(StudentMark)
program works as it should. In the process of testing, we may The value of StudentMark which is passed to the
find errors and correct them when they are found. If we are function should be an integer value between 0 and 100. The
serious about making sure our programs work properly, we function DecideGrade should return values like ‘Oopsie’,
can apply a testing methodology. ‘Pass’, ‘Credit’ or ‘Distinction’, and assign such a value into
If we work carefully, and conduct peer reviews during our the variable StudentGrade.
development stages, testing is made much easier, as many The programmer should have ensured in the program
potential errors will already have been eliminated. code that the program rejects marks outside the acceptable
Software developers test new software at different stages limits. In this example, marks which are less than 0 or greater
of the process of development. Most software is composed of than 100 are outside the acceptable range. The program
many distinct components. Within each component, we may should also reject input which is not a number within the
isolate one or more units of code. Units can often be isolated range 0–100.
as distinct sub-programs, procedures or functions. The programmer will write code which systematically
Unit testing is usually done by the programmer first, but tests the program for a range of values, including values
may also be tested later by a software tester—someone with outside of the boundaries of the range of acceptable marks,
specific skills in program testing. The unit test involves putting such as –1 or 101. In particular, the program tester will check
When we design a program, we want it to work perfectly— which, each time you withdrew some ’S RES
ER
money from your account, added the
OU
TEACH
even brilliantly! We certainly don’t want there to be any WS
RCE
amount withdrawn to the balance,
errors in the program. Despite our best efforts, errors may be
instead of subtracting it. Each time
15.5
introduced into the program code. We will probably find
some of them before we think the job is finished, but perhaps you withdrew cash, the balance would
not all of them. get bigger. In your dreams only, of ER
’S RES
OU
TEACH
There are different types of errors made in programming. course! WS
RCE
Under-standing what they are and how they are introduced is 15.6
helpful, as we all like to avoid making errors. Run-time errors
The main types of errors are:
Some errors will only show up when
• syntax errors the program is executing. A common cause for run-time
• logical errors errors is that the program attempts to perform an invalid
• run-time errors operation. This might be as simple as:
• dividing a number by zero
Syntax errors • trying to open a file which no longer exists or which has
been renamed
Syntax errors are rather like grammatical errors or spelling
errors we make when writing an essay or assignment. The • attempting to work with a software object using the
errors have to do with our use of the language. In wrong name or path
programming, we must obey the rules of the language, or the • performing a calculation which results in a very large
program will not work. Modern programming languages number and then trying to assign it to a variable which
provide sophisticated syntax checkers, which even check the is too small to hold it
line of code you are writing as you write it, and if you make • expecting to receive data of a specific type but receiving
a syntax error, the development tool will warn you in some data of a type which does not match
way. The warning may be that the code changes colour—to Good programmers will try to avoid run-time errors
red—or a message may pop up on the screen. using a range of strategies, including:
• careful desk checking
Logical errors • peer review of the program code by someone who didn’t
write it
Logical errors in a program can be caused by: • carefully testing the program code against a range of
• a failure to understand what the program should do data, including data which is deliberately wrong
• an incorrect algorithm • writing code which anticipates errors like those above
Logic errors can be of many different forms, but they and deals with them when they do occur
Many programmers use variable names which include a documentation for different purposes and for different people.
prefix which acts as a ‘tag’ identifying the data type. We may For the users of the program we usually prepare a user manual—
use tags like str for string, lng for long integer, bln for a a guide on how to use the software we have developed. We may
Boolean variable. The tag helps remind the programmer of also prepare a Help file so that users can look up what they need
the type of data they are working with. If we apply tags, the to know using the normal Help menu on the menu bar of the
three examples above would be written as: software.
strStreetAddress
curWithdrawalAmount
lngTotalScore
Tip We haven’t used tags in variable names within this
chapter in order to make the algorithms slightly easier to
Project
15.15
read. In your programming, you should use such techniques.
Your teacher will advise on local requirements.
development
The process we apply to developing software solutions is
External documentation common to all solutions. The steps in the process are:
• defining and analysing the problem
Outside of our programs, we make use of other forms of
• designing possible solutions
(a) (b)
Help
• producing solutions
Using help Contents Index Site
1 Lines
SANDWICH-
MAKER
• evaluation
2 Syntax PRO
3 Author
4 Date
The first part—defining and analysing the problem—is
crucial. We have to really understand what is needed before we
REM MATHS PROGRAM
PRINT "THIS IS A PROGRAM"
PRINT "DESIGNED TO HELP YOU WORK THROUGH"
can design a solution
PRINT "YOUR MATHEMATICS PROBLEMS"
REM NEXT SECTION ASKS FOR USER NAME
The solution design phase involves a number of skills, and
will draw heavily on our problem-solving background. We
should attempt to consider more than one possible solution to a
problem. A common pressure on solution designers occurs when
(c) (d)
the solution is needed in a hurry.
SANDWICH-
MAKER Software developers have the advantage of being able to
PRO reflect on well-known solutions to problems like the one
under consideration. We don’t always have to re-invent the
TUTORIAL wheel. We are able to use existing code libraries to perform
DISK USER
REFERENCE tasks in a problem.
MANUAL
It therefore makes sense to closely examine existing
solutions to problems—to learn from the ways others have
Figure 15.24 Documentation methods: (a) Documenting
solved problems.
program code with comments, (b) Help files included with
In the quiz show project you develop for this topic, you
the software, (c) Tutorials on disk or on-line, (d) User
may like to consider a number of ways of approaching the
reference manual.
Activities
Identify Analyse Investigate
1 If a tester’s job is to test if 3 Explain why logical errors are often 5 Find out about the debugging
program code actually works, much harder to find than other errors. tools available in the
what steps should they take to 4 Run-time errors may not occur every programming language you are
prove this? time the program is used. Explain why using, and describe how they are
2 List the three main types of this might be so. used, with examples.
errors in programs.
problem and consult with your teacher for advice on the best database table or a file.
approaches. The project requires you to properly design, code and test
the program so that it fulfils the requirements described
The software above. As you work, record everything you do on the project
in the work diary. This should include all the design steps,
development project consultation with others and your project supervisor, as well
On the Companion Website there are other project choices. as all the program coding.
You may wish to select one of those or the project developed
below. Whichever project you select, you should follow the Defining and analysing OR
E ALE R
project guidelines developed in core chapter 1: Projects: the problem
T
C
1.1
Design, Produce, Evaluate. Defining the
It will be important to define the criteria by which your We can define a problem in a variety of ways. problem
project will be evaluated from the beginning, so that as you So far, we have seen a narrative version of the
design and produce the work, you make it possible to meet rules of the game ‘Double or Quit’. In this
the evaluation criteria. stage of the project, you should re-define the problem using
Another important aspect is creating and maintaining a both flowchart and pseudocode. Performing this step will
work diary of all the work done on the project. You might help ensure you understand how the game works.
present this diary for comment at each progress check during the Ask your teacher to check your problem description
project. before proceeding to the design stage.
T
C
The project we are working on is a quiz game which is to be
solutions 1.2
Designing
used for a television show called ‘Double or Quit’. The quiz The GUI layout solutions
game starts each contestant with $1, then asks them up to You will need to draw a sketch of the GUI
twenty multiple-choice questions. Each time they get a screen layout, showing how you will arrange the required
question right, their money doubles. elements.
The maximum prize is $1 048 576. As soon as a
• Decide what should appear on the scoreboard—it should
contestant incorrectly answers a question, they are out of the
show a list of all the prize levels, with an indicator
game and they take with them just the dollar they started
showing where the contestant is up to.
with. If the contestant doesn’t know the answer to a question,
they can quit with half of the prize money from their last • Work out how to display the questions. With their four
correct answer. or five possible choices, they should be clear and easy to
The software program drives the pace of the show by read.
displaying questions and providing contestants with a limited • Identify the controls or buttons the
time to respond. For each question, there is a time limit of contestant will need in order to respond to the question,
sixty seconds. The contestant must answer within this time. If proceed to the next question, quit the game, and so on.
they fail to answer the question within the time allowed, the • Figure out how the game will ask the contestant their
program treats this as an incorrect response. name before proceeding with the quiz.
Progress to the next question is also paced by the • Decide where you will display the timers, and how they
program. When a question is answered correctly, a timer will show how much time is left to answer the question,
waits a maximum of 120 seconds before the next question is the time left until the next question automatically loads,
automatically displayed. If they are ready to proceed before and so on.
that time is up, the contestant can click a button on the screen • Decide whether the questions will be completely text-
to go to the next question. based, or whether photographs will be included.
The program should ask the contestant their name, and
the name and score should be stored, along with the date and Algorithms
time of the competition, the maximum prize won, the number
You will also need to consider the algorithms required to
of questions correctly answered, and other details you think
develop the program.
make sense. The data should be stored ‘permanently’, in a
• Work out how to load a new set of questions for a required of it. For each improvement, save the program with
quiz—after all, if you always ask the same questions, it a new version number, and document in your work diary all
won’t be long before contestants always win the whole the changes you make.
competition! Perhaps in the first version of the program
it might use a pre-defined list of questions, then a later
version might enable the program to load the questions
Evaluation
from a database. If you picked sensible evaluation criteria for the project, the
• Outline an algorithm for setting the timers for questions. evaluation phase should be a simple matter of E ALE R
OR
If you use the sixty-second periods specified, then you comparing your project with those criteria—
T
C
they should work like a marking scale. 1.4
have to do a lot of waiting while developing and testing Evaluation
the program. Perhaps you might initially set the times to Feedback provided during progressive reviews
a lower value, such as ten seconds, then increase it later of the development of the prototype will also
when you know the timers are working properly. have guided you closer and closer to meeting
• Figure out how to record the quiz game attempts by the criteria.
contestants in a database. Should you record which The evaluation criteria might include factors such as:
questions have already been asked so that they don’t • correct use of inclusive design principles to ensure that
keep appearing in successive quizzes? the program can be used by people with disabilities
• Will you define levels of difficulty for each question— • the graphical user interface is easy to understand so that
should some be set as ‘easy’, others as ‘hard’? If you users are prompted to respond to the quiz game
decide to do this, how will your program select the appropriately
questions—will it pick only easy ones for the first ten • design elements are used consistently
questions, then only hard ones for the rest?
Project extension ideas
Producing solutions
E ALE R Once you have the basic features working, you may wish to
A prototype is a version of a program which OR
extend your project to include some of the following ideas.
T
C
• using ordinary operating system files of one or more Counting names in a sequential
types which are read and/or written to by the software text file
The choice about which method should be used depends If we needed to count the number of infobit
on the nature of the software and the type of data the names in a sequential text file, where
each name is on a separate line, the The newline or
software works with.
EndOfLine character is
For graphics software—working with bitmap images program logic would look something
a special formatting
such as digital photographs—the programmer might store the like this:
character meaning
data in files which conform to industry standards, such as BEGIN NameCount
‘start a new line’. In
TIFF (tagged image file format) or JPEG (Joint Photographic Set Counter to zero Windows®, it is
Experts Group). Open file for input marked by a carriage
Word processing software might read and write data WHILE not at EndOfFile return character (ASCII
using several different file types, such as text files (.txt), rich Read next line from file code 13) followed by a
text format (.rtf) or Word document files (.doc). Add 1 to Counter line feed character
Software which needs to store structured data, such as ENDWHILE (ASCII code 10). On a
data about students, customers or products, usually make Close file Macintosh®, only the
carriage return is used.
use of database management systems, and store the data into Display value of Counter
one or more tables within the database. In option chapter 10: END
Database Design, you will find more information on how Notice the use of the term EndOfFile. In
this is done. most languages, the EndOfFile marker is coded
Many situations require programmers to read from or with an abbreviation, such as EOF. Similarly, the
write to particular types of files. beginning of a file is abbreviated as BOF.
If we needed to copy these names into an array, we would
need to know how many names there are, or we would have
Types for file access to keep increasing the size of the array as the program runs.
The types of file access a programmer can choose from A simple method is to use the program above to count the
depends on the language, but may include: number of names, then perform a similar procedure to copy
the names into a string array called Names().
• sequential file access So, let us assume that we have a function, Count
• random access Names(FileName), which works like the example above,
and returns an integer equal to the number of names in the
Sequential file access file. The program pseudocode to copy the names into an
array would be like:
Sequential files are commonly used for storing plain text in
BEGIN CopyNamesIntoArray
continuous blocks, such as log files on a computer system. The
Create Array(CountNames(Filename))
data in the sequential file is typically stored as text characters—
Open file for input
even numbers are stored as strings of digit characters. The
WHILE not at EndOfFile
program Notepad, a Windows® accessory program, can read
NextArrayElement = NextLineOfFile
from and write to sequential text files. The text within the file
ENDWHILE
may be organised into lines, like the source code of a program,
Close file
using special characters from the ASCII code—such as the
END
newline character. In this case, the newline codes are stored as
characters after each line.
Writing to sequential files
Programs we write may need to read data from a
sequential file. Programs typically treat file access as ‘streams’. Sequential files may also be written to in two main ways—we
The data is read into the program, starting at the beginning of may choose to write over the existing file contents, or we may
the file. The programmer may choose to read the data one line append data to the end of the file.
at a time or one character at a time until the end of the file is
reached, or it may stop reading earlier if a required data item is Random access
found first. Some data that we deal with is organised into regular,
structured, repeating units which we describe as records. A
record is a collection of data items about some real-world representations of things, and are created in an object-oriented
item such as a customer. A program which works with programming language. An object type is usually defined as a
records will usually need to go straight to a specific data item ‘class’, and whenever our program needs to work with an
in the file. In order to be able to do this, the file needs to be object, we create a new object which is effectively a copy of the
organised in one of two ways: original class.
• using separators between the fields A software object has some data—usually in the form of
• using fixed-length fields attributes or properties—each of which has a value. An object
may also have methods, which are actions that can be
Separators which are commonly used are the comma or
performed on the object. The data in the object can only be
the tab characters. Comma-separated value files (.csv)
modified by the methods of the object, which guarantees that
separate the records into lines of data, with one record per
the business rules for that object are obeyed.
line. Each record is divided into fields, which are separated by
For example, if we chose to write a object-oriented music
commas. In this file type, string data is usually enclosed in
jukebox program, we might create a SoundTrack class, which
quotation marks, while numbers are not. Programs like Word
would have properties like: Title, Artist, MusicPublisher,
and Excel are able to open and read .csv files, importing them
PlayLength, and so on.
into either a Word document or an Excel workbook.
Methods of the SoundTrack class might include: Play,
The records in a file which uses separators may be of
Pause and Stop.
different lengths. This is because the individual field data may
Object-oriented programming (OOP) requires a different
be of different lengths. For example, family names can vary
design approach to the more conventional ‘procedural’
considerably in length.
programming. Object-oriented software design is well-
A programmer may have decided that fields will all be the
supported by design notations such as the universal modelling
same size, particularly if the data is known to have the same
language (UML).
size in each record. If this is the situation, a programmer may
In object-oriented programming, programmers define
define variables of a fixed size, and use files in which the
classes of objects. Each class contains characteristics that are
record field sizes exactly match the variables. A programmer
unique to objects of that class. In Figure 15.25, all the boats
working with student records for an educational institution
shown are instances of the Boats class. As well, classes can be
may define the field sizes for a random access file as shown in
split into sub-classes. Here, Sailboats, Powerboats and Canoes
Table 15.3. Each record will take exactly 201 characters
all inherit the characteristics of the Boats class. The sub-class
(adding up the field sizes). With fixed field sizes, we do not
Canoe, for example, contains not only its own characteristics,
need to use separator characters.
such as the need to be paddled, but also all the characteristics
Programming languages have special key words or
of the class it belongs to, such as the ability to float or sink.
functions to enable our programs to read from or write to
Objects receive messages and know how to respond to them.
random access files.
They don’t need to be told how by other parts
’S RES
of a program. If the canoe is told to ‘move’, ER
Database table access for data storage
OU
TEACH
WS
then its methods can tell it how to do that. In
RCE
Option chapter 10: Database Design, provides a detailed
OOP, an object has all its methods built-in. 15.7
coverage of database design and usage. Programmers should
become proficient with the use of database systems and
should choose databases as the best means of storage for sets
of record-like data. field name field size sample values
Programs which read from and write to database tables
FirstName 40 chars ''Julia''
only need to know what fields are contained in the database
table records; the programmer does not need to know the FamilyName 40 chars ''Tabone''
physical position of the data within a file. StreetAddress 60 chars ''205 Pacific Highway''
Suburb 50 chars ''Smithfield''
Object-oriented software StateCode 3 chars ''NSW''
development Birth date 8 chars 21041988 (for 24 April 1988)
Object-oriented (O-O) software development treats the world Table 15.3 Fields can be set to fixed sizes when the data is
and the transactions within as ‘objects’. Software objects are known to have the same size in each record.
Activities
chapteroverview
In this chapter we’ve introduced many of the important use it many times. As you write more programs, this technique
concepts and techniques needed to start creating computer will become fundamental to the way you program.
programs. As you have learned, computer programming is a Once you have learned one language, learning your second
skill requiring problem solving and logical thinking—and some programming language is easier than the first. As you have
creativity too. You have learned about using variables and seen from the examples in this chapter, the many different
constants to hold values needed in the processing of a computer languages that exist have a lot in common.
computer program. If you follow the procedure of carefully analysing a
You have also learned of the control structures we find in problem, designing a solution, turning the solution into a
all programming languages—sequence, branching and computer program and testing that the program works as it
repetition. In the section on sub-programs you have learned of should, you are well on your way to joining the ranks of
the way we can put regularly used code into a procedure and millions of programming enthusiasts around the world.
TER TE
AP
CH
ST
WS
Index 355
maths calculations 161 LCD 16, 127 websites 246–8
multimedia 118, 130 data security see security work 2
purpose of 147 data sources 46, 154 design, produce, evaluate 2, 20
records 149, i149, i153 data sources and destinations 42 design techniques 4, 4
searching 161, 163 data storage 7, 15, 18, 49, 50, 96, 99, 272–3, see also graphical user interface
sharing 258 352 desktop PC, system box components i13
sorting 161, 163 see also storage devices; storage desktop publishing 181–2, 211–12
types of data 151–2 technology devices
validation rule i155 data structures communication 34
see also data sources; flat-file arrays 341–3 external 15
database; foreign key; mail merge; primary record data structure 343 peripheral 34, 256
key; redundancy; relational database; using files 344 see also display device/s; input
reports data transmission media 263–5 device; output device; storage devices
database administration 158, 164 data transmission modes i262 digital
database analysis 160 full-duplex 262 camera 18, 197
database design 64, 147–74, 164, 165 half-duplex 262 light processing (DLP) 16
database forms, and data input 151, 165 simplex 262 sound 122–3
database integrity 155 data transmission rates 265 television 118
database maintenance 158 baud 263 thermometer 18
database management system (DBMS) bits per second 263 video editing 123–4, i124, 193
147, 148, 150 data types 325 digital animation 181–4
database project development 170–72 acquiring, multimedia 129 discussed 176
database queries 161, 161, 171 Boolean 327 sequences 184
database redundancy 157 character data 326 digital data 176, 189–98
database reports 164 date and time 328 digital manipulation techniques 198–206
and data output 151, 170 displaying, multimedia 130 digital media 64, 176–214, 176
database servers 270 distributing, multimedia 130 and commerce 180
database structure, hierarchy of for digital media products 189–98 and health 179
components i149 integers 327 ethics in 251–3
database tables 149, i149, 157, i157, i167, manipulating 46, 48, (multimedia) 129 factors in file size 206–8
352 multimedia 120–25, 129–30 file formats used in 188
data collection 154–7, 249 programming languages 325–8 jobs in 194
data compression 28, i30, 48, 58, 121, 123, real numbers 327 types 176
206 storing, multimedia 130 digital media products
lossless 53, i53, 207, 208 string data 326 data types for 189–98
lossy 52–3, 207, 208 data verifying/validating 155, 171 display/distribution 208–10
sound file i208 decimal data system 45 evaluation criteria 213–14
techniques 52–3, 207–8 counting in, versus binary i44, 45 types of 180–88
video 13, 124, 207 Deep Blue 62 digital newspapers 178
data dictionary 151, 151, i151, 155, 170 defining problems see problem/s digital video/versatile disc (DVD) 50, 52, 63,
data entry 6, i72, 72, 80, 153 defragmenting see file/s 115, 118, 124, 126, 209
data forms degree of freedom (robotics) 297, 298, digitised wave 189, 189
analogue 43 i298 digitising tablet 34, 197, i198
digital 43 demons (daemons) 88 directories see folders
data function 49 design/ing display device/s 16, 324
data input devices 155 consistency in 138, 140 data projectors 127
data management 166 (graphical user) interface see digital 208–9
data operators (logical) graphical user interface plasma 126
arithmetic 328–9 inclusivity in 39–40 touch screens 127
concatenation 330 phase 3 virtual reality (VR) 129
logical expressions 329 software 35 see also display hardware; monitor/s
relational 328–9 solutions 3, 20, 107–8, 137, 144, 170, display hardware, multimedia 126
data projectors 16, 127 212, 248, 282, 311, 349 DLP see digital light processing
DLP 16, 127 tips 142 DNS (domain name system) 220
Index 357
graphics adaptor i13, 14 bus, star and ring network topologies flowchart use to describe a program
see also video card compared i276 i340
graphics formats 188 byte quantifier prefixes i50 gas under pressure forcing piston
graphics software 28, i29, 34 cathode ray tube display device i16 movement i308
see also digital media charge-coupled device (in digital still how a cathode ray tube (CRT)
group work 8 and video cameras i198 monitor works i191
collaboration 10, 136 common file formats in digital media how a solenoid uses magnetic current
criteria for 9 i188 to move a rod i307
roles/responsibilities 9 common file types and their how a URL is structured i240
see also project (teams) extensions i51 how TCP/IP protocol enables packet
GUI see graphical user interface common symbols used in transmission i261
flowcharting i331 how the Internet works i218
H
components of an automated control human arm and robotic arm ‘degrees
hacking 6, 79, 79
system i302, i303 of freedom’ i298
handheld computer see computer/s
components of an e-mail address i224 importing into and exporting from a
handwriting recognition 195
components of an expert system i172 database i167
haptic gloves 98
counting in the decimal and binary input and output devices for
haptic systems 98
systems i44 programs i317
hard drive/s 13, i13, 15, i15, 49, 50, 126
creating a 3D console i183 input/process/output model i317, i318
hardware 3, 7, 12–22
creating a database report i164 linking network components i270
and system classification 18
database maths calculation i162 liquid crystal display device i17
artificial intelligence 96
database searching i161 lossless compression in a graphics
cards i13
data dictionary basics i151 file i53
components 13, i13
data elements and the multimedia mail-merging from a database i168
functions 12
family tree i120 making a multimedia game i113
integration with software 165
data transmission modes between microprocessors i18
interaction with operating system 26,
computers and devices i262 (monochrome) laser printer
36
declaring and using variables in a technology i17
multimedia 125–9
program i319 movie special effects (using
hardware components 13
defining macro tasks i162 Centropolis FX) i205
hardware control i25
desktop PC system box internal networking computers using UTP
hardware requirements
components i13 cables i264
factors in 33
digital media products evaluation network print server device i269
in modelling/simulating 99
criteria i213 optical character recognition
minimum, advice on 33
documenting program code i347 technology i195
hardware solutions 20, 20
e-mail emoticons i226 separating server functions on larger
hardware systems i19
flatbed scanner technology i197 networks i268
HDD see hard drive
flowchart and its algorithm serial and parallel data transmission
head-mounted display (HMD) 100
expression in pseudocode i331 i48
help desk 73
flowchart and its multiple branching simple representation of an closed-
hierarchical menu/command structure 37
algorithm for an loop system i309
history of artificial intelligence 85
application File menu i335 simple representation of an open-loop
host computer 20
flowchart and its pseudocode for a system i309
‘how it works’ illustrations/tabulations in
pre-test loop i335, i336 simulated dialogue between user and
this book
flowchart and its sequence control expert system i173
actuator types and their functions
structure algorithm i333 sound file compression i208
i307
flowchart illustrating binary selection, speech (voice) recognition i196
ASCII character set i45
and its pseudocode i333 spreadsheets i104
backing up network data i273
flowchart illustrating multiple storing variables in memory i319
basic computer data flow i12
branching, and its pseudocode i334 storyboard navigational layouts i138
basic database structure i149
flowchart illustrating multiple sub-programs shown in pseudocode
building a simple database in
selection control structure i334 i339
FileMaker Pro i153
flowchart use in constructing the command line interface i34
building a spreadsheet cost simulator
programming code logic i316 the graphical user interface i38
i109
Index 359
port i14 volatile 13, 49 people in 127
King, Ada 86 see also RAM; ROM product types 116–20
knowledge bases 87, 88, 94, 173 menus 37 screen design 139–40, i140
knowledge engineers 89 message boards 228 scripts 139
Kripac, Dan 210 microprocessor 18 target audience 136
microprocessor functions the five central elements of 120, 176
L
digital camera i18 video 123–4
LAN see local area network
digital thermometer i18 multimedia authoring 130–2, 130, 140, 141,
language translation 62
digital watch i18 142, 143–4
laser light 50
microprocessors 18, i18, 309 see also authoring software methods;
lathing 183, 183
capacity of 58 data types
LCD see monitor/s
see also processing multimedia data types 120–25, 129–30, 140
legal issues 77–8, 128
Microsoft see ‘software applications processes used with 129–30
copyright see copyright
mentioned in this book’ multimedia programming 130, 130
security/protection 77
MIDI 123, 143, 185, 188, 189, 190, 190, 200 multimedia project development 136–42
storing data 7
MIME (Multipurpose Internet Mail end-user needs 136
legislation 77–8
Extensions) 225 establishing purpose 136
linear (sequential) navigation 138–9, 138,
mobile phones 59 multimedia specialists, role of 73
i139
model 96, 97, 97, 98, 111 music compositions 184
Linux see ‘software applications mentioned
requirements of 99–100
in this book’ N
modelling 61, 96–111, 97, 117
liquid crystal display (LCD) see monitor/s natural language interface (NLI) 35–6, 95,
see also simulation
231
modelling and simulation programs 100
local area network (LAN) 221, 230, 266, NetBEUI 262
using 103–6
266, 284 netiquette 226–7
modem/s 221–2
logos 4 network/s
monitor/s
lossless 188 administration 28, 126, 257–8, 257,
CRT 16, i16, 126
lossless compression 53, 207, 208 267–77
LCD 16, i17, 126
lossy 188 applications 257–8
see also display device/s
lossy compression 53, 207 card 34
Moore, Gordon 58
Lycos 232 client-server 267, i267
morphing 200, 202
components 267–72
M motherboard 13, 13
hybrid 277
macro/s 32, 109, 109, 162, 162 motion capture 109, 111, 184
interface cards (NIC) 272
defined 162 mouse 137
Internet 217
defining tasks for i162 configuring 26
peer-to-peer 267, i267, 283–4
magnetic ink character recognition (MICR) dialog box for (Windows) 26
permissions 259, 259
155, i155 port i14
port i14
mailing lists 228 theory of 35
printing 257, 269
mail merge 167, 168, 171 movies 118, 123–4, 205, 211–12
protocols 260–62
mainframe computer see computer/s see also graphics
resource 256, 256
main program 338, 338 MP3 (MPEG layer 3) see graphics
security 274–5
manipulating (data) 48 MPEG (Moving Pictures Experts Group)
servers 256–7
McCarthy, John 86 see graphics
shared resources 258–9
media multimedia 4, 60, 63, 66, 113–45, 114
topology 276–8
electronic books/magazines 118, 217 audio 122–3, i123
types of 266
storage 15, i15 content 140
user 256
see also digital media criteria for effective 140
see also local area network; wide area
media transmission data elements of family tree i120
network
extensibility/sustainability 281 defined 114–5
network operating systems 278–80, 278
factors influencing 280–81 game-making 113
purpose of 278
memory 13, 33, 206, 325 GUI design 137
networking systems 64–5, 254–84
as primary storage 49 hardware 125–9
neural networks 63, 90, 95
chips 49 interactivity 113, 115
newsgroups 227–8, 227
demands on 34 making 130–33
Index 361
publishing 211–12 rendering 184, 184 see also flatbed scanner
Managing an overseas tour 106–8 repeaters 271 screen design guidelines 139–40
The quiz show scenario 348–50 repetitive strain injury 83 scripting language 139, 235
project documentation 5, 8, 9, 10, 20, 142, solutions in avoiding 83 scripts 139
144, 170, 171, 212, 249, 282 reports (database) 164 search engines 221, 231–4, 231
project evaluation 7, 20, 108, 141–2, 144, presenting 164–5 stimulating ideas with 4
171, 212, 249, 283, 311, 350 research 4, 108, 137, 143, 170, 232–3 secondary storage devices see storage
and ethics 6, 137 resolution 96, 187, 206 devices
criteria for 6 resources security 28, 32–3, 79, 243, 274–5, 278–80
feedback 7, 9 digital 4 data 53–4, 171, 259, 272–5
project management 7 print 4 legal issues 77
and out-sourcing 8 project 7 see also file/s; Internet
example of task schedule 8 responsibilities sensors 286
importance of 7 of technology workers 71–2 serial and parallel (data) transmission 48,
sample storyboard for 4 of users 81 i48, 49
team co-ordination 8, 136, 211–12 ring topology 276 server 267, 267
project managers, role of 72, 127 robot/s 286, 286 types 268–70
‘Project panel’ examples in this book characteristics of 286–7 see also computer/s; network/s
Communication 9 domestic 289 share 268, 268
Designing possible solutions 5, 107–8 educational 289 shell 94, 117
Evaluation 7 function of 297–302 silicon 13
Factors that impact on problem- in agriculture 295 simulation 61, 95–111, 97
solving 3 in assembly lines 295–6 advantages/limitations 101–3
Identifying a problem 2 industrial 288, i297 defined 97
Management 8 in medical science 294–5 purposes of 97
Produce a solution 6 intelligent 290 requirements of 99–100
project presentation 5 maintenance/repair 296–7, i297 software 100
oral 9 mobile 288 spreadsheet 105–6
visual aids in 9 purpose of 291–3 see also modelling
see also presentation/s types of tasks 291–3 simulator, defined 99
protocols 217, 237–40, 260 use of 292–7 skill/s
see also network/s robotics 65–6, i67, 285–314, 286 open-ended 2
prototype/s 4, 6, 129, 137, 142, 144, 171, actuators 307–9 planning 2
349 automated control 302–4, 302 thinking 2
proxy 243 hardware for controlling 289–300 SMTP (Simple Mail Transfer Protocol) 224,
punch cards 56 innovations in 312–13 225, 237, 238, 260
software for controlling 300–302 social
Q
see also robot/s equity 245–6
query (database) 161
robotics sensing devices 304–7 issues 80–82, 128, 137
R automatic doors 306 trends 82
radio button 37, i38 car navigation 305 see also privacy
radio frequency identification (RFID) 169, chemical 306 software
i169 controlling devices 309–10 and languages 329
RAM (random access memory) 13, i14, 48 GPS 305 development 66, 352–3
defined 49 security alarms 305–6 integration with hardware 165
see also memory traffic lights 305 object-oriented 352–3
random access memory see RAM ROM (read-only memory) 13, i14, 48 purpose of 24
read-only memory see ROM and BIOS 26 types of 24, i29
real-time data 90 defined 13, 49 software applications
recordable compact disc 15, i15 see also memory 3D 182–3, 184, 188, 190, 192, 210
redundancy (database) 157 router 266, 266, 271 accounting 27
relational database 148, 148, 157 and system requirements 33
S
remote access 159 antivirus 28, i30
scanners 20
Index 363
macros 32 ports 13, 15 U
navigation 37 system faults, common 21 UNIX 65
searching 31 system management tools 30, i30 unshielded twisted pair (UTP) cables 264,
undoing changes 32 systems classification 18 280
software programming see programming systems analysts 72 UPS 15
software systems 24 URL (uniform resource locator) 240, 240,
T
authoring see authoring software 241
TAFE 74
methods USB
tape cartridge/s 50, 126
software technologies devices, auto-detected 15
TCP/IP (Transmission Control
inappropriate use of 78 port see port/s
Protocol/Internet Protocols) 218, 221, 239,
past 56–7 user/s
260–61, i261, 262, 284
solution/s feedback 138, 139, 142
teamwork, 8, 9–10, 136
criteria for 5, 6 identifying 142
see also group work
designing 2, 107–8, 137, 144, 170, 212, input/output 317–18, 321–2
technical issues, factors in problem-solving
248, 282, 311, 349 profiles 279
3
evaluating 2, 6, 108, 144, 171, 212, 249, rights/responsibilities of 81
technologies
283, 311, 350 role of 72
and convergence 57, 59, 128
factors impacting on 3, 5 user interface 34–5
current and emerging 57–67
innovative 5 design 35
limitations in 128
producing 5, 20, 108, 141, 144, 171, function 35
technology
212, 249, 282, 311, 349 interaction with user 36
impact on environment 67–9
sound see audio the three types of 35
keeping pace with 2
sound card 14, 96 see also graphical user interface;
telecommuting 80, 81
sound effects 48, 132 interface/s
terminals 20
spam 67, 226, 226 user manuals 20, 37, 142, 144, 171, 212
testing 144
spamdexing 232, 232
functionality 142 V
speech (voice) recognition 35, 90, 91, 91,
ideas 4 validation 155, 247
96, 195, i196
interfaces 142 see also data (validity)
spreadsheet/s 8, 104–9, 104, 167, 282
navigation 142 variable/s 318–25, 318
as models 106
program code 344–5 declaring 318
basic elements of 104–5
software 6 incrementing 320
data types 105
websites 247 initialising 319
design 109
text 120, 120, 194, 246, 258 VCR 124
standard/s 15
in digital media 189, 198 vector graphics 46, 121, 122
star topology 277
in multimedia 120, 143 2D, defined 121
static electricity 21
text data 46 verbal communication 8
static IP address 260, 260
three-dimensional space 190 verification 155
storage devices
timeline see project (time-frame) video 120, 123, 193, 197, 198
capacity 58, 258
time management i8 as data 46, 129
examples of 12, 50
tools, system management 30, i30 compression 52, 207
future 63
topology 276, 276 console games 113
multimedia 125–6, 140
training defined 123
secondary 15, 49, 50, 161
computer-based 117, i117 editing 123–4, 143, 187, 211–12
see also data storage
course/s 20 frames 123–4, i124
storage technology 126, 158, 258, 272–3
using simulation 99 manipulation 203
storyboard 5, 113, 132, 137, 142, 143, 212
Transmission Control Protocol (TCP) 217 production 185
navigation 138–9
transmission distance 280 the basic problem of 120, 187
navigational layouts i138
transmission media cost 280 video cameras 20, 48
sample i4
troubleshooting 20, 72 video card 14, 34
supercomputer see computer/s
common computer problems 21 videoconferencing 28, 80
‘swap file’ 34
Turing, Alan 56, 61, 86 virtual office 231
system administrator 126
uninterruptible power supply 15 virtual private networks (VPN) 266
system box 12, i13, 49
universal serial bus see USB virtual reality (VR) 100, 129, 184, 202, 209
W
W3C 250
WAN see wide area network
warping 200, 202
weather forecasting 102
WebQuest 249, 251
web server 20
website/s
accessibility 250
accessing knowledge bases 88
building 247
development 246–8
evaluating 242
maintaining 248
website design 246
and file size 6
future 67
white space 39, 140
wide area network (WAN) 266, 266, i266
Wikipedia 234
wildcards 161
Wizard 32
Windows, Explorer 26, i27
windows, opening 35
wire-based media 264, i264
wire frames 183, 183, 184
wireless transmission 265
Word, views in 32
work, changing nature of 79
workgroup 268
workgroup printing 257, 257
workstation 19
World Wide Web 115, 223, 223, 240–42
see also Internet
X
XML (extensible markup language) 235,
241, 243
Y
Yahoo 231, 239
Index 365