Professional Documents
Culture Documents
Applications of Computers & Their Social Implications
Applications of Computers & Their Social Implications
THEME 2:
APPLICATIONS OF COMPUTERS AND THEIR SOCIAL AND ECONOMIC
IMPLICATIONS
2.1 Computer applications
2.1.1 Communication and information systems
: DESCRIBE SERVICES AVAILABLE ON THE INTERNET
The Internet
The Internet-this is a global network of computer networks which is public and does not
belong to any particular organization or person. It consists of a lot of servers and clients.
Anyone can use the internet at any time.
• E-commerce
– Shopping
– Banking
– Payroll
• Social media
– Communication
– Entertainment
– Marketing
– Learning
• E-health services
COMPUTER STUDIES GRADE 10 – 11Page 24 of 256
This is the storing, managing and processing of data online, instead of your own physical
computer or local server. An example of cloud computing is iCloud.
This is software or a program that allows a user to open and view web pages on the
internet. Examples of web browsers are Internet explorer, Mozilla Firefox, Google Chrome
An intranet is a private network that is similar to the internet in functionality, but is only
available to an organization internally.
A simple intranet consists of an internal email system and perhaps a message board
service. More sophisticated intranets include Web sites and databases containing
company news, forms, and personnel information.
Intranets facilitate communication between people in an organization and they improve the
data sharing capabilities. A good example of intranets is bank networks.
An extranet is a private network that uses Internet technology and the public
telecommunication system to securely share part of a business's information or operations
with suppliers, vendors, partners, customers, or other businesses. An extranet can be
viewed as part of a company's intranet that is extended to users outside the company.
Social media
Social media refers to websites and applications that are designed to allow people to share
information quickly, efficiently, and in real-time. Users install applications on their
smartphones or tablets or computers and share photos, opinions and events, in real-time
and this has transformed the way people live and, also, the way business is done.
Examples of social networking sites and apps are Facebook, Twitter, Instagram, YouTube,
etc.
Entertainment
Social networking and listening to music
Watching full length television shows and full length movies
Watching video clips (e.g. YouTube)
Instant messaging
Most users log in to their social media not really to be informed but to be
entertained.
Marketing
The explosion of social media has led to the increasingly important
practice of Social Media Marketing. Social Media Marketing programs
usually focus on efforts to create content that attracts attention and
encourages readers to share with their social networks.
Marketing a product on social media gives the seller the advantage of a
worldwide market, cheaper advertisement, reaching a much larger
audience than other types of marketing, as well as tracking of shares and
followers.
Some social media sites such as Facebook allows users to create an
online shop where products can be advertised, tracked and sold.
Learning
Most educational institutions use social networks to engage and stay
connected with the world. (Community members, parents of students,
potential supporters, staff and all interested parties are a tweet or a “like”
away.
Students can benefit from online tutorials and resources that are shared
through social networks and Learning Management Systems (LMS).
Social media provides a medium where students can establish valuable
connection for their careers, LinkedIn.
Channels like YouTube can be used by students to teach themselves
about any topic by watching tutorial videos.
COMPUTER STUDIES GRADE 10 – 11Page 30 of 256
Instant News and Information - We do not have to look for the news visiting different
news websites, the news will find us on the social networking sites.
Great marketing channel for Business - Social networking sites are the best marketing
channel available in the world.
Exchange of ideas and Collaboration - Social networking sites have collaboration features
like Groups. One can create a group and start to share ideas and information for a specific
purpose.
1. Addiction
One can become a social media addict by constantly checking Social Media Feeds or
checking people’s profiles and statuses for hours and hours. Researchers at Chicago
University concluded that social media addiction can be stronger than addiction to
cigarettes and alcohol.
2. Mental Illness
Social networking sites are linked to increased risk of mental health problems like
depression, anxiety, and loneliness. Too much time spent scrolling through social media
can result in symptoms of anxiety and/or depression.
There are billions of fake accounts on various social networking sites including Facebook,
Instagram, and Twitter. Facebook removes more than 3 billion fake accounts in six months
and Five per cent of Facebook’s monthly active users are fake.
4. Misleading Information
COMPUTER STUDIES GRADE 10 – 11Page 31 of 256
Fake news and misleading information can go viral in no time on social media platforms.
Many publishers and spammers are misusing the platforms by sharing fake and misleading
information.
5. Cyberbullying
Many users use social media platforms to express hatred and aggression. The public
figures are the commonly targeted victims of cyberbullying. Teenagers are also at risk of
cyberbullying. Cyberbullying is also associated with depression, anxiety and suicidal
thoughts.
6. Hacking
Most users of social networking sites are not fully aware of the risks of sharing some kinds
of information. They share thoughts, personal experiences, photos, etc not knowing that
such information can be used by hackers to hack your accounts in social media, emails or
even your phone.
Several personal twitter and Facebook accounts have been hacked in the past that have
affected the individuals’ personal lives.
7. Privacy Issues
Your life is not private when you use social media. One can know who you are just by your
use of social media. They can find out how many friends you meet daily, or what type of
food you like, or where you hang out.
COMPUTER STUDIES GRADE 10 – 11Page 32 of 256
1. With the use of appropriate examples, explain the use of social media in
a. Communication:
…………………………………………………………………………………………
………………………………………………………………………………………[2]
b. Entertainment:
…………………………………………………………………………………………
………………………………………………………………………………………[2]
c. Marketing:
…………………………………………………………………………………………
………………………………………………………………………………………[2]
d. Learning:
…………………………………………………………………………………………
………………………………………………………………………………………[2]
2. Discuss any three advantages and three disadvantages of social media
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………… [6]
COMPUTER STUDIES GRADE 10 – 11Page 33 of 256
- Email is faster to reach the recipient because the message is delivered almost
instantly depending on the connectivity.
- One can send an e-mail anytime. It is available 24/7 unlike the post office which
closes at end of day.
- One can send attachments with email. This reduces the costs and effort of sending
files such as photos, videos, music files etc.
- Email is more secure because one needs a password to access an email account.
- The sender is assured of the arrival of the email. It won’t get lost as long as the
address is correct.
COMPUTER STUDIES GRADE 10 – 11Page 34 of 256
Disadvantages of e-mail
- The recipient may not check the email regularly meaning that it may take time for
one to get the message.
- It exposes your computer to viruses.
This is a facility which allows people in different locations to meet via the internet in real
time, while they are able to see and hear each other. General uses for video conferencing
include business meetings, educational training or instruction and collaboration among
health officials or other representatives.
1. Web camera
2. Soundcard
3. Speakers
4. Microphone
Technology can fail or systems may crash/go off-line. Remote connections are
sometimes known to be hampered by environmental changes.
Have to give extra training to use the Equipment. On some occasions, the absence
of technical support personnel creates difficulty for participants who are unfamiliar
with the videoconferencing technological concepts.
Need to employ somebody to set up and maintain Equipment.
Time zones may be different if conferencing in different parts of the world
A remote database is a database which can be accessed by people from all over the world
through a network. An example of a remote database is the WWW which can be accessed
through the Internet. Information about any topic is held in the database and it is available
to all who need it.
Multimedia
This is the use of a combination of text, graphics, video sequences, sound, and animation
to present information.
Applications of Multimedia
2. Marketing
Multimedia can also by companies to advertise their products. This would draw the
attention of the viewers and thereby attracting them to buy their products.
COMPUTER STUDIES GRADE 10 – 11Page 37 of 256
3. Entertainment
Multimedia is also used in the entertainment industry in the form of movies, cartoons
(Animations) etc.
This is when bank customers do banking transactions via the internet instead of going to
the bank. That means customer will not need to travel to the bank and stand in long
queues. With online banking, banking transactions can be done at any time, 24/7.
However, online banking has some risks which make people afraid of using it. These
include the following:
- There are some bogus sites which look like the original web sites from the bank yet
they are just there to steal customers’ confidential information which will lead to loss
of money.
- Confidential information can also be lost to hackers who will end up staling funds
from customers’ accounts.
- Making use of the Internet exposes the computer system to a lot of harmful viruses.
Online shopping
This is when customers buy their items over the internet. Traders advertise their products
on websites. Pictures of the product and the price will be shown on the website and when
a customer is interested in any product then they can either transfer money to the seller’s
account or they can provide the seller with their credit card number, which the seller will
use to get money from the customer’s bank account. When the seller gets the money, then
he/she will send the product by post.
COMPUTER STUDIES GRADE 10 – 11Page 38 of 256
This means that the seller does not need to rent a shop for putting his/her products. The
seller can also get customers from all over the world and a customer can buy any time
which means the business would run very well.
Customers also have the opportunity of buying goods from anywhere in the world. It also
cuts the traveling costs to the customer and no need to go to the shop and stand in long
queues. Customers can do their shopping at any time of the day.
However, this kind of technology is turning towns into ghost towns because many shops
are closing and running their businesses online.
When doing online shopping, one has to know the risks involved. The risks are as follows
1. You do not get to see the product before you buy it and you may end up buying a
product which you do not really want. Some products look good just on the picture.
2. There are also bogus sites which advertise goods which they are not really selling.
The criminals just want you to provide them with your account details and they will
end up stealing from you.
3. Using online shopping exposes your computer to a lot of viruses on the internet.
4. There is no social interaction when compared to going to the shop and stand in a
queue where you would chat with other customers.
COMPUTER STUDIES GRADE 10 – 11Page 39 of 256
Network security is the protection of information and resources over a network from loss,
corruption, and improper use.
Public Wi-Fi is not safe; remember anyone can have access to it and not all people
access it for good intentions.
Wi-Fi is experiencing some attacks such as war driving, karma, and cracking
attacks.
Unauthorized users can potentially log onto your network and gain access to your
devices and data.
Radio waves penetrate through walls and can be received from a few blocks away
from the house, or building, therefore, your data is exposed to unauthorized users.
Encryptions will be required.
You have no way to ascertain the security of the network or even verify and validate that it
is truly the network and not an "Evil Twin". You have no way* to make sure no one can
intercept and read and/or modify your data. Furthermore, while not dangerous yet still
annoying, the stores can also monitor your connections and dependent upon the fine print
you click "OK" in order to connect, they could query your device and get data about you
• Convenience; one can access his/her network resources from any location within
wireless network coverage area or from any Wi-Fi hotspot
• Mobility; you are no longer restricted to your desk, as with a wired connection
• Productivity; wireless access to the Internet helps your staff to get the job done on
time despite your location from the office and it encourages collaboration
It is a wireless local area network that uses radio waves to connect devices such as
laptops to the internet and to business network and its application over a small area.
This connects devices over a large geographic area such as city, country or the word by
using mobile telecommunications cellular network technologies to transfer data.
Transmission speed is the rate at which data is transferred from one computer to another.
It is measured in bits per second (bps). The transmission speed of data is affected by
several things including
Your computer
Your computer's set-up for example, operating system and amount of RAM, may affect
speed.
Your Modem
Not all modems are created equal, and some may not give as high quality connection as
others.
Loose wiring in telephone cables running from your modem to your telephone jack may
cause your connection speed to degrade. Additionally, if you have a long extension cable
running from your modem to the telephone jack, this may also affect your connection.
Internet traffic
During busy periods you may experience slower speeds as more people are accessing the
Internet. Telecom allocate a certain amount of bandwidth to your telephone exchange,
COMPUTER STUDIES GRADE 10 – 11Page 42 of 256
which may mean that at peak times, the maximum speed you can reach is limited because
everyone on your exchange is using the same bandwidth at the same time.
If you are downloading on your own computer whilst trying to do other things, these
activities may slow down your downloads, email or web browsing.
COMPUTER STUDIES GRADE 10 – 11Page 43 of 256
Computers are extensively used in the banking industry for a variety of data processing
tasks.
A large database is used to store the details of bank customers as well as their account
details. The database will be stored on a server and all the clients in other brunches can
access the customer data.
Computers are used as ATMs where customers can perform various banking transactions
such as withdrawing money, transferring money from one account to another, e.t.c.
customers will have to be issued with an ATM card which they will have to use together
with a Personal identification number (PIN) for security.
The cards can also be used as credit/debit card to make purchases from shops and this
would avoid moving around with a lot of cash and thereby reducing cash robberies. ATMs
also reduce pressure in the banking hall.
Computers are used in shops to monitor the levels of stock so that the shops should not
run out of stock without knowing.
All EPOS terminals are connected to one server which has a database where stock details
such as the barcode, item names, stock quantity, re-order levels, names and addresses of
suppliers, etc.
if the bar code can’t be read, the POS operator has to enter the bar code manually
using a keyboard
the bar code is searched for on the database
once the bar code is found, the appropriate file/record is accessed
the price of the good/item is found and sent back to the POS
the stock quantity of the item is reduced by 1
if the stock quantity is less than or equal to the re-order/minimum stock level then
the system automatically re-orders goods items from the suppliers
this procedure is repeated until all the items in the customer’s basket/trolley have
been scanned
when all items/goods have been scanned, the customer is given a receipt showing a
list (with prices) of everything they have bought
when new goods arrive, the bar codes are used to update the stock files
Hospital Administration
Payroll systems
A payroll system is a system that is used to process the salaries or wages of employees.
The computer system will have to calculate the right amount which has to be given to the
worker and at the right time. Some workers are paid weekly, some fort nightly and some
monthly. Some wages are calculated from the number of hours worked with different rates
per hour. All the necessary details such as the employee’s personal data (Name, surname,
Position), salary scale, rate of pay or basic salary, etc., will have to be entered into the
computer and then the computer will do the processing. Payroll is normally done using
COMPUTER STUDIES GRADE 10 – 11Page 46 of 256
batch processing usually overnight. This means data about every employee will have to be
entered into the system before any processing can be done.
At the end of each pay period (usually weekly or monthly) a company needs to pay its
employees. Payroll systems are used to calculate wages and print out pay slips. The
inputs are: employee details from file (e.g. rate of pay, tax code, bank details), number of
hours worked (often obtained from a timesheet), any overtime working, holidays, etc.
The processing done is calculation of: gross pay, any deductions (tax, medical aid,
insurance), net pay, etc.
The outputs are: printed pay slips, updating of the employee file, transfer to Bank
This is run as a batch system, where all the timesheets, etc. are gathered together before
the payroll calculations are done in one go (often overnight). Since there is no need for any
further input, nor is it urgent to get the output (unlike in, for example, a booking system),
batch processing works efficiently. The process is shown in Figure.
COMPUTER STUDIES GRADE 10 – 11Page 47 of 256
Library systems
Many library systems are computer controlled. They usually involve the use of barcodes on
the books being borrowed and on the borrower’s library card when a borrower takes out a
book, the book’s barcode is scanned. The book details are then found on the book file. The
borrower’s library card barcode is then scanned for the borrower’s unique number. The
book file is linked to the borrower’s file and both files are updated to indicate which book
has been borrowed and when it is due back. On a daily basis, the borrower’s file is
interrogated by the computer to see which books are overdue for return:
Computers are used in libraries to monitor the borrowing and returning of books. The
computer will store a database containing information about all the books in the library
such as title, author, publisher etc. the database also contains information about all the
members of the library.
Information about those who borrow books and the due dates can also be obtained from
the database, by searching using queries.
The computer can automatically send reminders to those members with books that are due
to be returned.
Barcode systems can be used to capture information about books and members.
COMPUTER STUDIES GRADE 10 – 11Page 48 of 256
1. A point-of-sale system is installed at the local DVD and music shop for sales and
stock. Data about the items sold are collected from the barcode.
a) Explain how the data reads from the barcodes, are used to find the prices of the
specific items sold.
……………………………………………………………………………………………
……………………………………………………………………………………….. [2]
b) Describe how the point of sale system reads the data on the barcode.
……………………………………………………………………………………………
……………………………………………………………………………………….. [2]
c) Computers are used in libraries to monitor the borrowing and returning of books.
Briefly explain how the library system work.
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
………………………………………………………………………………………... [4]
COMPUTER STUDIES GRADE 10 – 11Page 49 of 256
Another example of simulation is predicting weather (i.e. a weather forecaster). In this case
we will consider how/what data is collected, how the simulation is done and consider how it
can be used in predicted possible climate changes.
- Sensors are placed in a radiosonde which is released into the atmosphere to transmit
information such as humidity, temperature etc.
- The collected information is sent to the earth based weather stations where they are
used.
- pilots also send in information regarding weather conditions during long flights
Known as drones, they are used to fly into hazardous areas such as into the eye of the
hurricane to collect weather data.
COMPUTER STUDIES GRADE 10 – 11Page 50 of 256
Doppler Rada
Produces weather images seen in weather forecasts. The radar can detect whether the
precipitation is moving towards or away from the location of the antenna and sent to the
weather station
- computer can show graphically how weather (e.g. cloud formations) will change with time
(i.e. predict weather patterns) – this is often presented as a computer- generated video
showing how clouds build up, how temperature and pressure changes over, for example,
the next 7 days, wind speeds etc.
- The model is able to change parameters to see how future climate can be affected
- Using the collected data from previous days and current day, the computer analyse the
data and predict the next weather.
- The models use equations, along with new and past weather data, to provide forecast
guidance to meteorologist.
COMPUTER STUDIES GRADE 10 – 11Page 51 of 256
CAD software consists of ready-made symbols or shapes that may be included or not
included in the installer. The benefits of these libraries are:
The already existing objects can be modified to suite the exact need and it saves
time instead of starting from scratch.
Modifying an object gives flexibility to create exactly what is required
3D allows users to see the product from all possible angles and give a better
impression of what it will look like
Users can also see any discrepancies and make corrections before the product is
done.
powerful processor
large quantities of RAM
large hard disk space
A plotter for printing the designs on large papers.
High resolution monitor to clearly view the designs
The idea is to try and find out what mechanisms control how a system behaves and
consequently predict the behavior of the system in the future and also see if it is possible
to influence this future behavior.
Simulations
To demonstrate how a simulation can be developed for use in a real situation the following
example has been chosen. The scenario chosen is a series of traffic lights at two busy
junctions:
To make this as realistic as possible, data needs to be gathered over a long period of time.
This can be done by sensors in/near the road, using cameras or manual data collection.
Data gathered includes:
- count the number of vehicles passing in all directions at each junction …..
The data is entered into the computer and the simulation is run. The following scenarios
may be tried out:
- build up number of vehicles stopped at a junction and change timing of lights to see how
it affects the traffic flow
- increase/decrease traffic flow in all directions to see how the traffic is affected
- once the simulation is run, the timing of the lights is determined and how they interact so
that the maximum traffic flow is achieved; fault scenarios (e.g. an accident) and their
impact are considered
- sensors in/near the road gather data (these can be light/infrared sensors, induction loops,
pressure sensors, etc.) – the data captured is usually number of vehicles passing a
particular point
- the gathered data is compared to data stored in the system (the stored data is based on
simulation runs, how the number of vehicles at a junction at a particular time of day affects
the traffic flow, etc.)
- the control box or computer “decides” what course of action to take and…..
- as with any system involving sensors, ADC and DAC interfaces may be needed
- safer (scenarios tried out on the simulation first before used in reality)
- some environments make simulations the only way to carry out a task beforehand (e.g.
outer space, under sea, chemical processes, nuclear reactors, crash testing cars, etc.)
- faster (no need to build and test real system, so it is possible to get results more quickly)
COMPUTER STUDIES GRADE 10 – 11Page 56 of 256
5. Types of Simulators:
Flight simulator tests the ability of the user to fly an aeroplane and includes features such
as
• take-off
• manoeuvres
• steady flight
• stunts and
Driving Simulators
Imitates the skills required to control vehicles such as cars, trucks, buses and trains
- population growth (i.e. predict how the world’s population will increase based on a
number of different scenarios)
- weather
This is an interactive 3D computer-created world that you can explore so you feel you
really are there, both mentally and physically. Very often the user wears data goggles, data
helmet or data gloves to give a feeling of “being there”. Apart from feeding sensory input to
the user, these devices also monitor user actions e.g. data goggles track eye movement
and respond by sending new video input.
Data goggles/helmets – these use display screens and optical systems that send
3D images to the eyes.
Motion sensors measure the position and orientation of the head; this information is
sent back to a computer which enables it to adjust the image being sent to the user.
Data gloves, suits containing sensors and joysticks are all used to interface with a
virtual reality system depending on the application.
The CAVE is a VR system which provides the illusion of 3D by projecting images on
the walls and floor of a room. Participants wearing data goggles can enter the room
and freely walk about. Sensors in the goggles and in the room continually track the
participants’ position and adjust the images based on this information.
When a virtual tour of, for example, a house is shown on a website the images need to be
first created and then manipulated. The following summarizes how this can be done (a
similar method/technique could be used for various applications):
- the camera is rotated around the room as a number of photos are taken
- use hotspots on the web page to allow a user to move around the house (e.g. from room
to room). Integrate plans and maps into the image to allow user to navigate the house.
- it is safer (since techniques can be tried out in advance without the dangers of the real
operation e.g. maintaining a nuclear plant where it is possible to try a task on a computer
first to learn how to do it; if mistakes are made the results would be harmless; e.g. doing a
medical task on a “virtual” patient is much safer in case of mistakes, etc.)
- cost savings (no need to build the real thing which could save large sums of money e.g.
testing out a real moon buggy or building a part of a chemical plant would be very
expensive).
- there is a feeling of “being there” which makes the training more realistic and can allow a
number of very realistic scenarios to be tested out e.g. how to deal with an emergency on
a chemical plant which could be made to be really realistic!!
COMPUTER STUDIES GRADE 10 – 11Page 60 of 256
Input: Sensors are used to detect the environment around it and takes measurements.
The measurements are in analogue form which a computer cannot understand.
Types of sensors
Temperature, Light, Pressure, Proximity etc.
Process: decision is made when the measurement from sensors are compared to stored
(predefined) values. If there is a need, the processor turns on/off actuator(s).
COMPUTER STUDIES GRADE 10 – 11Page 62 of 256
Output: actuators (output devices) are used to respond to the results of a process.
Examples of Actuators
Light bulb, Heater, Cooling unit, Motor, Pump, Buzzer / Bell / Siren, etc.
Is the application of extremely small things that can be used across all science fields, such
as engineering, chemistry, electronics and medicine
This type of engineering is aimed at building electronic components and devices measured
in nanometres, which are extremely tiny in size and structure.
Medicine
Individuals who need artificial parts in their body - legs, limbs, ligaments or organs - can
expect more reliable and rejection-proof substitutes using Nano-materials.
• Nanoparticles deliver drugs, heat, light or other substances to other specific types of
cells such as cancer cells.
• Damaged tissues can be reproduced or repaired with the help of nanotechnology
tissue engineering
• Perform microsurgeries on any part of the body to avoid damage to larger parts of
the body
• Nanorobots are used injected in human body to destroy cancer cells in the body,
diagnose and treat diabetes and for dental treatment.
COMPUTER STUDIES GRADE 10 – 11Page 66 of 256
Environmental pollution of air, soil and water, including the impact of toxic waste in
landfills, is a major concern across the world. Using nanotechnology, scientists are
designing new catalysts for waste remediation, and for conversion of toxic gases into
environmentally friendly components.
Nano materials are used to develop other alternative energy technologies. This includes
the production of solar cells using flexible substances like plastic and thin metal. It also
includes the production of wind energy making use of nano components.
Nano drones
These are the smallest drones; they have the same dimensions as insects. They are easy
to operate; they are affordable, portable and safe to fly indoors or outdoors. Their crashes
are not very destructive. As a result they are used for entertainment purposes, spying in
military, training to fly actual drones, and for other smaller tasks, since they can easily be
maneuvered and they can reach remote locations.
Uses of a drone
Used in military for
Search and rescue missions,
Disaster management
Delivery
Geographic mapping
Wild life monitoring/poaching
Space exploration
Space simulation that leads to the creation of space models for flights experience.
Computers are used to calculate the flight route and driving force that a space vehicle will
take to fly into space
Sea Exploration
Remotely Operated Submersibles (ROV) are used to discover and search for things that
are unusual an expected on the sea bed.
COMPUTER STUDIES GRADE 10 – 11Page 70 of 256
The Global Positioning System (GPS) is a satellite system that provides reliable location
and time of any object anywhere on or near the Earth. It is freely accessible by anyone
with a GPS receiver.
Applications of GPS
Map creation
Giving driving directions to drivers- allow a driver to keep track of where he or she is
and suggest the best route to follow to reach a designated location
Used by hunters to find where they are.
Aircraft navigation- to locate aircraft.
Also for tracking children to prevent child abductions and wondering that can lead to
them getting lost.
Benefits of GPS
Limitations of GPS
- Maps not up to date therefore instructed to carry out an incorrect manoeuvre (e.g. turn
into a road which no longer exists)
- Unless the system is very sophisticated, road closures due to accidents or road works will
cause problems to a sat nav system
Benefits
Limitation
……………………………………………………………………………………………
……………………………………………………………………………………………
………………………………………………………………………………………… [3]
Advantages:
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………… [2]
Disadvantages:
……………………………………………………………………………….……………
……………………………………………………………………………………………
……………………………………………………………..……………….………… [2]
……………………………………………………………………………………………
…………………………………………………………………………………..……. [3]
COMPUTER STUDIES GRADE 10 – 11Page 73 of 256
A robot is a complex moving machine that is controlled by a processor. All robots consist of
the following components:
Applications of robots
Robots can only be used to perform physical tasks. Some of the applications where robots
can be used are as follows:
1. Car manufacturing. They perform tasks such as spray painting, welding and car
assembling.
2. Assembling computers.
3. Underwater maintenance workers.
4. Toys
1. Robots can work in environments which are hazardous to humans. E.g. at nuclear
power stations. They can perform dangerous tasks.
2. They reduce labor costs. Labor costs are costs of paying human workers.
3. Robots produce a consistent quality of work. They produce similar products.
4. Robots can work 24/7 which increases productivity.
COMPUTER STUDIES GRADE 10 – 11Page 74 of 256
1. They cause de-skilling. This means that the human workers are no longer doing
the work. All they do is to control the robots.
2. Some employees lose their jobs because they are being replaced by robots.
Workers have to be trained how to operate the robots so they acquire new skills.
CCTV is often used in areas that may need monitoring such as banks, casinos, airports,
military installations, and supermarkets.
1. Robots have become increasingly important in today’s life. Briefly discuss some
of the uses of robots?
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
………………………………………………………………………………………… [3]
3. Every good thing has drawbacks too. What are the drawbacks of using robots in
the manufacturing?
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………… [4]
COMPUTER STUDIES GRADE 10 – 11Page 76 of 256
This is a system programmed with the knowledge from a human expert and it gives
reasoned advice in a particular field with explanations of its reasoning meaning it can
explain how it arrived at a particular decision.
1. The knowledge base. This is the knowledge from a human expert which is in the
form of IF……THEN rules. It store large quantities of information which has been
collected from a human expert. This is also called the rule base. In other words,
knowledge is stored as rules in the rule base.
2. Inference engine. This is the code which provides the reasoning mechanism which
is used to arrive at a decision.
3. User interface. This provides the means by which the user can communicate
(interact) with the system. It passes questions from the system to the user and it
displays the responses from the system in a way that the user can understand.
1. Gather information from the human experts. This can be done by holding meetings
or discussions with the human experts.
2. Create the rule base/ knowledge base by entering the data from the experts.
3. Design the inference engine.
4. Design the user interface.
Test the system with known problems to see if it is functioning well.
COMPUTER STUDIES GRADE 10 – 11Page 77 of 256
1. The inference engine queries/asks the user some questions. These questions are
normally yes/no questions. These questions will be displayed on the user interface.
2. The inference engine then uses the responses from the user to search for all
possible matches from the rules base.
3. The results are then displayed on the user interface together with explanations of
how the system arrived at its decision.
- less skilled work force needed, therefore potentially can save money
- errors in the knowledge base can lead to incorrect decisions being made
Stands for Electronic learning; this is a learning environment which uses information and
communication technologies (ICT’s) as a platform for teaching and learning activities. It
utilities electronic technologies (like tutorials on YouTube) to access educational
curriculums outside a traditional classroom.
COMPUTER STUDIES GRADE 10 – 11Page 80 of 256
This is where the computer is used as an instructional medium in the training environment.
It is used to train many students at a time, teaching then different skills, from how to type
text in a word processor up to how to fly a Jumbo jet. Computer Bases Training (CBT)
makes use of a computer system to train people in a number of applications. It makes use
of multimedia and self-assessment with minimum input needed from a human trainer.
The advantages of training people using computer systems (such as CBT) include:
Recent technology trends are evolving quicker and so much that teaching and assessment
doesn’t depend on a teacher or learner to be physically present in a classroom.
The modern assessments include video conferencing where interactive learning takes
place. There are web-based assessments where you find exercises that be automatically
mark given answers and provide corrections.
COMPUTER STUDIES GRADE 10 – 11Page 81 of 256
Social learning
Social media such as Facebook, Twitter, Google Plus, and Flickr, as well as open social
practices such as blogging, can be used in learning for the purpose of convenient
communication with other students and potentially with others outside the class, such as
students of the same topic and subject experts.
Computer animation is the art of creating moving images via computer hardware and
software.
Animated subjects appear to move because images appear on screen and are quickly
replaced with a series of similar, slightly altered images in a sequence that suggests
walking, waving, contesting or any action the viewer’s eyes perceive to be occurring.
Computer animation is favored precisely because it speeds up the process of creating the
many images needed for such a sequence. The production process for a live action TV
show is fairly straightforward. Writers come up with a script, actors perform the script in
front of a few cameras and a studio audience, the footage is edited, and the show is ready
for broadcast.
Benefits of SFX
1. Special effects make it possible to combine separate pieces of film and replace
part of an image, thus allowing for effects such as characters flying in the air, this helps is
creating film pieces that looks real.
2. Explosives, fire and scenes of buildings being destroyed can be made without
actually destroying building as it is very costly and dangerous.
3. Scenes of actors doing dangerous stuff like fighting dinosaurs or poisonous
snakes can be made without exposing actors to danger
anyone at risk with no risk involved, students can interact with simulated emergency or
accidents in virtual reality environment.
- Demonstrate negative effects of intake of some stuff e.g. demonstrate the negative
effects of smoking
-Medical students can explore the human nervous system, cardiovascular systems etc.
Training medical pilots
VR aircraft simulators, make pilots training more effective and adaptable. Pilot students
can train on how to take off, fly, land Boeings, and also for emergency landing, etc. this is
more effective as they can crash in the simulated environment as many times as possible
until they get it right. This is cost effective as planes are very expensive to buy.
In the Agricultural sector, with the use of VR employees can be trained on how to use
complicated machinery. This safe guards human life and machines from damages.
2. Clearly explain the difference between Web-based Training and Computer Aided
Instructions
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………..…….………………………………………
…………………………………………………………………………………………..……. [2]
3. Clearly explain the use of each of the following:
a) Inference engine
………………………………………………………………………………………………………
…………………………………………………………………………………………..……. [2]
b) Knowledge base
………………………………………………………………………………………………………
…………………………………………….……………………………………………..……. [2]
4. Describe how expert systems created
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………..……………………………………………
COMPUTER STUDIES GRADE 10 – 11Page 87 of 256
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………..…….………………………………………………………………………………
…………………………………………………………………………………………………..…
……………. [8]
………………………………………………………..……………………………………………
……………………………………………………………………………………………………..
…………………………………………………………………………..……. [3]
7. Mr. Mandume wants to advertise using his image in the form of a cartoon.
a) Clearly explain to him how he can superimpose his image to a cartoon using Adobe
Illustrator.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………..……….……………………………………
…………………………………………………………………………………………..……. [4]
Disadvantages
- De-skilling employees
- Retrenchment of employees
Cons
- They are however contributing to poverty, as they are required to use a lot of money on a
daily basis; e.g. on airtime, maintenance, etc.
- Contributing to health hazards like cancer issues, and heart associated problems
- High criminal activities
COMPUTER STUDIES GRADE 10 – 11Page 90 of 256
Pros
- There are shorter queues since, banking is now online
- There are smarter traffic lights
- Cloud computing allows you to work on the go
- Sensors improved expert system
- Enhanced communication, advertising, shopping, e-Library and emergence of Artificial
Intelligence
Cons
- Privacy is becoming a concern
- Viruses are spreading very fast and damaging the data pools and computers/devices
- Cybercrime
- Loss of employment; no more messengers employed to deliver mails, Emails are being
used to deliver messages
COMPUTER STUDIES GRADE 10 – 11Page 91 of 256
Cons
- Privacy is becoming a concern
- If there is machinery faults, there is no production
- Loss of skills
- Loss of employment; no more messengers employed to deliver mails, Emails are being
used to deliver messages
Advantages
Work is done easily and workers are not strained anymore
Social media is a fast way of marketing and providing information
Surveillance systems promote security
Simulations makes it easier to make discoveries and train people
Payments are now done in a more comfortable way e.g EFTPOS
Mass production; the final product is better designed and manufactured much
faster and with better quality
COMPUTER STUDIES GRADE 10 – 11Page 92 of 256
Disadvantages
Loss of jobs promoting poverty, people with ‘older skills’ do not benefit so much,
since IT knowledge has become a necessity for most jobs.
Malware, software piracy, hacking and equipment theft have become a major
economic concern
If the system fails, then no production goes on and results in huge losses
It is expensive to acquire new technology
Deskilling: people are losing skills
Faster marketing and provision of information using social media
Printing indiscriminately
Unnecessary massive printing should be avoided as printing has some negative effects on
the environment. Remember printing requires a printer print cartridge, and paper. The
following are the negative effects caused by printing:
- Paper waste leads to deforestation
- Paper waste leads to pollution, both atmospheric and water-based. Paper mills
frequently release harmful gases such as CO2 and Nitrogen Dioxide into the
atmosphere, and it can be in fresh water sources, thus contributing to water
pollution.
COMPUTER STUDIES GRADE 10 – 11Page 94 of 256
- Ink waste leads to soil and water pollution; the volatile organic compounds and
heavy metals in ink can lead to soil and even water pollution when left in landfill.
- Ink plastic waste slowly degrades and pollutes soil
- Disposing a printer has e-waste effects, since it is an electronic machine.
These are rules which govern how organizations obtain, keep and use data about people.
The rules say that data must:
This is when a computer system fails to perform its function. The consequences of system
failure are different depending on the type of system
COMPUTER STUDIES GRADE 10 – 11Page 95 of 256
1. Software problem for example corruption of some files. To prevent failure due to
software problem, make sure that the files are protected by hiding them or locking
them.
2. Hardware failure e.g. hard disk crush. To prevent system failure due to a hardware
malfunction, make sure you use parallel systems. This is when two identical
systems are used so that when one fails, then the other one can be used.
3. Viruses. To prevent system failure due to viruses, ensure that you install antivirus
software and update it regularly.
4. Power failure. To prevent failure due to power cuts, use generators or
uninterruptible power supply devices (UPS).
In cases of hardware failures, new hardware should be bought and in cases of software
problem, the software will need to be re-installed.
System failures usually result in the loss of data. To recover this data. Backups can be
used. For those systems which use transaction and master files, data can be recovered
from previous files which were created before the systems failed.
Consequences of system failure in control or monitoring systems have more impact than
business systems because they can be dangerous and life threatening. For example
COMPUTER STUDIES GRADE 10 – 11Page 96 of 256
A backup is a copy of the original, kept to be used in cases where the original is lost or
damaged. Nowadays data is very important and should therefore be stored or kept safe as
a contingency plan in case the original is lost or damaged.
Computer crime
fraud or other crimes. The crime takes many forms. Identity thieves may rent an
apartment, obtain a credit card, or open a
Telephone account in your name, You may not find out about the theft until you
review your credit report or a credit card statement and notice charges you didn’t
make—or until you’re contacted by a debt collector.
Identity theft is serious. While some identity theft victims can resolve their problems
quickly, others spend a lot of money and many days repairing damage to their good
name and credit record. Some consumers victimized by identity theft may lose out
on job opportunities, or be denied loans for education, housing or cars because of
negative information on their credit reports. In rare cases, they may even be
arrested for crimes they did not commit.
3. Phishing- Phishing is a crime in which the phisher sends out an email that looks
legal, in an attempt to gather personal and financial information from recipients. The
e-mail messages appear to come from well-known and trustworthy Web sites such
as most bank websites. The phisher sends the email hoping to fool at least a few of
the recipients.
Usually the email will be asking for confidential data or inviting you to access a
website, or to fill in a form in the email itself. The information collected will be used
for identity theft.
Users should be suspicious of any official-looking e-mail message that asks for
updates on personal or financial information. You should go directly to the
organization's Web site to find out whether the request is genuine.
4. Piracy- This is the illegal copying of software either for personal use or for sale. It is
the use of software without a license. Software piracy makes the software
developers run into loses because people are using their software for free. The
software developers have the right to take those who practice software piracy to
court. The disadvantage of software piracy to the users is that they will not have any
support if they have problems with the software and they cannot get and software
COMPUTER STUDIES GRADE 10 – 11Page 98 of 256
updates. Viruses may also copy themselves to the disks during the copying which
means that pirated software can be a source of viruses.
5. Spam attacks. Spam is also known as junk e-mail. Spam is a type of crime in which
many copies of the same message are sent to people who would not otherwise
choose to receive it. Most spam is commercial advertising, often for dubious
products, get-rich-quick schemes or telling lies that you have won.
6. Virus attacks. A virus is a computer program that is capable of replicating itself and
it will disturb the proper functioning of a computer system. A virus can delete data,
corrupt files or cause a hard disk to crush. Viruses spread by copying themselves to
disks and across networks. They can be sent through e-mail as an attachment.
ACTIVITY
1. A large company has data stored on its computer system. The data needs to be
backed up at regular intervals
a. Explain the meaning of backup.
…………………………………………………………………………………………
…………………………………………………………………………………… [2]
b. Name any two backing storage devices which are applicable in this situation
and give reasons why.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………… [2]
The internet offers a lot of good facilities but people are still afraid of using it. This is
because of some of the following reasons.
1. There are high chances of losing confidential information such as credit card
numbers to hackers on the Internet.
COMPUTER STUDIES GRADE 10 – 11Page 99 of 256
2. There are a lot of bogus sites. Bogus sites are web sites which pretend to belong to
a certain company when they do not. Such sites pretend to belong to a certain bank
or shop.
3. There are a lot of viruses on the internet. Viruses can come to your computer by
downloading files which you are unsure of. They can also be sent to you via e-mail.
1. Physical security. This is making sure that only authorized people are allowed
access to computer system rooms. This can be done by making use of door locks or
use machine readable cards (smart cards) to enter doors.
2. Develop complex security code systems. This is the use of complex passwords,
voice recognition, iris recognition or fingerprint recognition, to gain access to
systems.
3. Data encryption. This is the scrambling of data when sending it and then it will
have to be unscrambled so that it can be read. Encrypted data cannot be
understood unless it is decrypted. Only the sender and the receiver will know the
method of encrypting and decrypting the data. Even if a hacker gains access to the
data, they cannot understand it. It will be meaningless.
4. Monitoring of all attempts to access the computer system whether successful
or not. System administrators should be regularly checking all the attempts that
were made by some people to log on to the system. This will give them an idea
whether a hacker tried to enter the system.
5. Install up to date antivirus software and have it running all the time. Update it via
the internet regularly so that it can be able to detect new viruses.
6. Firewalls. This is a combination of hardware and software which rejects
unauthorized access to a private computer network.
Security token-is an electronic software access and identity verification device used
instead of or with an authentication password.
-it generates OTP in addition to a username and password known by the user
-token can come as smart cards or embedded in devices like key fob
Group Discussion:
Personal Unblocking key (PUK)- If the wrong PIN is typed in more than three times,
either the SIM card, the phone or both become locked. They can be unlocked by
entering a PUK, provided by your service operator through v erification.
Note: If the wrong PUK is entered ten times in a row, the device will become
permanently blocked and unrecoverable, requiring a new SIM card. You should
keep PUK written down in a safe place separate from the phone.
One-Time-Password/Pad (OTP) - is a unique character code that can only be used once
and is sent only to a registered mobile number in online banking. After setting up your user
ID and password, you are required to enter the correct OTP to complete the transaction,
such as sending money to a mobile number, etc.
COMPUTER STUDIES GRADE 10 – 11Page 101 of 256
Advantage of an OTP is that if a fraudster hacks your ID and password, the login process
will not be completed without the correct OTP because it is sent to your mobile number or
e-mail. And they can only be used once then it expires.
Hardware token- is a physical device that is used to generate security codes that are used
when a user is authenticating themselves during a logon process.
The token above is an example of a Hardware
Token that generates a different 6 digit code (usually
every 30 or 60 seconds). When a user is logging on
to a protected application they would enter their
credentials (typically username and password), then
will be asked for the 6 digit OTP code currently
shown on the hardware token.
Cyber stalking
This is a crime in which the attacker harasses a victim using electronic communication,
such as email or instant messaging, through forums, or chat rooms. It is also known as
‘catfishing’. Cyberstalking takes advantage of anonymity given by the internet to allow
them to stalk their victims without being detected.
Cyber bullying
This is when people use cellphones, instant messaging, e-mails, chat rooms, or social
networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
It is common amongst teenagers. Bullying behavior is harmful; it includes negative labels,
humiliating photo posts, posting gossips, intimidation, sexual remarks, etc.
Hate speech
This is negative talk about someone/ business, degrading the person or business.
Sexting
Sexting is when you send sexy pictures, and sexual messages electronically through
technologies such as mobile phones.
COMPUTER STUDIES GRADE 10 – 11Page 103 of 256
………………………………………………………………………………………………………
…………………………………………………………………………….……………..……. [2]
4. Explain the use/function, using examples where needed, of the following security
measures:
a) Software token
………………………………………………………………………………………………………
…………………………………………………………………………………………………. [1]
b) Hardware token
………………………………………………………………………………………………………
……………………………………………………………………….…………………..……. [1]
c) PUK
………………………………………………………………………………………………… [1]
5. Discuss the consequences of cyber bulling
………………………………………………………………………………………………………
………………………………………………………………………………..……………………
………………………….………….……………………………………………..……………. [2]
6. If the internet offers a lot of good facilities why are people still afraid of using it?
………………………………………………………………………………………………………
………………………………………………………………………………………………….…..
……………………………………………………………………………………………..…. [2]
7. Give a brief discussion on how printing indiscriminately affects the environment.
………………………………………………………………………………………………………
…………………………………………………………………………………..………………….
…………………………………………………………………………………………………. [2]
8. List 5 social advantages of computer use
………………………………………………………………………………………………………
………………………………………………………………………………………………….…..
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………. [5]
COMPUTER STUDIES GRADE 10 – 11Page 105 of 256
9. a) Discuss the impact of the changing computer trends on the Internet of Things (IoT).
………………………………………………………………………………………………………
………………………………………………………………………………………………….…..
…………………………………………………………………………………………………. [3]