Download as pdf or txt
Download as pdf or txt
You are on page 1of 81

LESSON 1 | MANAGING HEALTHCARE the contraindications for the prescribed drug?

INFORMATION What is mr. Y's history? What orders did the


physician leave for ms. Z? Where is the latest x-
Informatics introduction ray report?
What is informatics? Isn't it just about An important part of healthcare information is
computers? Taking care of patients is nursing's nursing documentation. When information
primary concern, not thinking about
systems are designed for nursing, this
computers! These are not unusual thoughts for
documentation can also be used to expand
nurses to have. Transitions are always difficult,
our knowledge of what constitutes quality
and a transition to using more technology in healthcare. Have you ever wondered if the
managing information is no exception. This use patient for whom you provided care had an
of information technology in healthcare is outcome similar to others with the same
known as informatics, and its focus is
condition? From nursing documentation, are
information management, not computers. you easily able to see the relationship between
Whether nursing uses informatics effectively or nursing diagnoses, interventions, and
not will determine the quality of future patient outcomes for your patients? Without
care as well as the future of nursing. knowledge of these chain events, you have
Information is an integral part of nursing. When only your intuition and old knowledge to use
you are caring for patients, what besides the when making decisions about the best
knowledge that nursing education and interventions in patient care. Because
experience has provided do you depend on to observations tend to be self-selective, this is
provide care? You need to know the patient's often not the best information on which to
history, medical conditions, medications, base patient care. Informatics can furnish the
laboratory results, and more. Could you walk information needed to see these relationships
into a unit and care for a patient without this and to provide care based on actual patient
information? How this information is organized data.
and presented to you affects the care that you If florence nightingale were with us today, she
can provide as well as the time you spend
would be a champion of the push toward
finding it. more use of healthcare information
The old way is to record and keep the technology information in a paper chart
information for a patient's current admission in essentially disappears into a black hole after a
a paper chart. Today, with several specialties, patient is discharged. Because we can't easily
consults, medications, laboratory reports, and access it, we can't learn from it and use it in
procedures, the paper chart is inadequate. A patient care.
well-designed information system, developed This realization is international. Many countries,
with you and for you, can facilitate finding and
especially those with a national health service,
using information that you need for patient have long realized the need be able to use
care. Informatics skills enable you to
information buried in charts. In the united
participate in and benefit from this process. states, the strategic plan for wider
Informatics does not perform miracles; it implementation of health information
requires an investment by you, the clinician, to technology formulated four goals, all of which
assist those who design information systems so
will affect nurses and nursing. They are as
the systems are helpful and do not impede
follows:
your workflow.
1. Inform clinical practice with use of ehrs
If healthcare is to improve, it is imperative that (electronic health records). The
there be a workforce that can innovate and
strategies for achieving this goal are
implement information technology (ahima & a. Provide incentives for ehr adoption
amia, 2006). There are two roles in informatics: b. Reduce risk of ehr investment
the informatics specialist and the clinician who c. Promote the diffusion of ehr in rural
must use health information technology. This
and underserved areas
means that in essence every nurse has a role in
informatics. Information, the subject of 2. Interconnect clinicians so that they can
informatics, is the structure on which exchange health information using
healthcare is built. Except for purely technical advanced and secure electronic
procedures (of which there are few if any), a communication. The strategies for
healthcare professional's work revolves around achieving this goal are
information. Is the laboratory report available?
When is mrs. X scheduled for surgery? What are

NCM110A - PRELIM 1
a. Encourage regional collaborations depends on effective and efficient information
that reflect the needs and goals of management. Today, healthcare organizations
the region are waking up to the fact that how information
b. Develop a national health is handled and processed has a great effect
information network on both the outcomes for those who purchase
c. Coordinate federal health services and the economics of healthcare.
information systems Manual recording and filing of information are
inadequate to manage today's healthcare
3. Personalize care with consumer-based information. We have made some attempts to
health records and better information use technology to manage information, but
for consumers by these efforts often fall short as a result of our
a. Encourage the use of personal ehrs inexperience in grasping the schemes of where
b. Enhance informed consumer choice information originates, how it is used clinically
by providing information about and administratively, and how it can be used
clinicians and institutions to improve practice.
c. Promote use of telehealth systems
The complexity of today's healthcare milieu,
added to the explosion of knowledge, makes it
4. Improve public health through
advanced biosurveillance methods and impossible for any clinician to remember
streamlining the collection of datafor everything needed to provide high-quality
quality measurement and research. This patient care. Additionally, healthcare
consumers today want their healthcare
requires the collection of detailed
providers to integrate all known relevant
clinical information and will be
accomplished by scientific knowledge in providing their care.
We have passed the time when the unaided
a. Unify public health surveillance
architectures by making the systems human mind can perform this feat: modern
able to exchange information information management tools are needed as
b. Streamline quality and health status well as a commitment by healthcare
monitoring to provide the ability to professionals to change practices when more
look at quality at the point of care knowledge becomes available.
and in real time Questions
c. Provide tools to accelerate research 1. The component needed to provide
and dissemination of evidence into evidence-based care include all of the
clinically useful products, following, except:
applications, and knowledge - development of new models and tools
To fulfill these goals, information, which is the needed in the delivery of efficient nursing
structure on which healthcare is built, can no care
longer be managed with paper. If we are to 2. Personalized care with consumer-based
provide evidence-based care, the mountains health records and better information for
consumers can be based achieved
of data that are hidden in medical records
must be made to reveal their secrets. Bakken through all of the following:
(2001) told us that there are five components - promoting the use of tools to accelerate
research and dissemination of evidence
needed to provide evidence-based care:
based care
1. Standardization of terminologies and 3. All of the following are stated goals of the
structures used in documentation strategic plan for the wider implementation
2. The use of digital information of health information technology in us,
3. Standards to permit healthcare data except:
exchange between heterogeneous - promote the health of populations,
entities sentence communities, families and
4. The ability to capture data relevant to individuals by providing them with
the actual care provided, and adequate medical care
5. Competency among practitioners to
use this data. All of these are part of Definitions
informatics. Informatics is about managing information. The
Information is a capital good with a value the tendency to relate it to computers comes from
same as labor and materials (national advisory the fact that the ability to manage large
council on nurse education and practice, amounts of information was born with the
1997). The financial health of organizations computer and progressed as computers
became more powerful and commonplace. It

NCM110A - PRELIM 2
is, however, human ingenuity that is the crux of certification examination being given in the fall
informatics. The term "informatics" originated of 1995 (newbold, 1996). Nursing informatics
from the russian term "informatika" (sackett & has as its focus managing information
erdley 2002). A russian publication, oznovy pertaining to nursing. Specialists in this area
informatiki (foundations of informatics), look at how nursing information is acquired,
published in 1968 is credited with the origins of manipulated, stored, presented, and used.
the general discipline of informatics (middle Informatics nurses work with practicing nurses
east technical university, n.d.). At that time it to identify the needs of nurses for information
was described within the context of and support, and with system developers in the
computers. "medical informatics" was the first development of systems that work to
term used to identify informatics in healthcare. complement the practice needs of nurses.
It was defined as the information technologies Nursing informatics specialists bring to system
that are concerned with patient care and the development and implementation a viewpoint
medical decision making process. Another that supports the needs of the clinical end user.
definition stated that medical informatics is The objective is an information system that is
complex data processing by the computer to not only user friendly for data input, but
create new information. As with many presents the clinical nurse with needed
healthcare enterprises, there was debate information in a manner that is timely and
about whether "medical" referred only to useful. This is not to say that nursing informatics
informatics focusing on physician concerns, or stands alone, it is an integral part of the
if it refers to all healthcare disciplines. interdisciplinary field of healthcare informatics,
Increasingly, it is seen that other disciplines hence related to and responsible to all the
have a body of knowledge separate from healthcare disciplines.
medicine, but part of healthcare, and the term
healthcare informatics is becoming more Definitions of nursing informatics
commonly used. In essence, informatics is the The term "nursing informatics," was probably
management of information, using cognitive first used and defined by scholes and barber in
skills and the computer. 1980 in their address that year to the med-info
conference in tokyo. There is still no definitive
Health infomatics
agreement on exactly what the term nursing
Healthcare informatics focuses on managing informatics means. As simpson once said
information in healthcare. It is an umbrella term (simpson, 1998), defining nursing informatics is
that describes the capture, retrieval, storage, difficult because it is a moving target. The
presenting, sharing, and use of biomedical original definition said that nursing informatics
information, data, and knowledge for was the use of computer technology in all
providing care, problem solving, and decision nursing endeavors: nursing services, education,
making (shortliffe & blois, 2001). The purpose is and research. (scholes & barber, 1980) another
to improve the use of healthcare data, early definition that followed the broad
information, and knowledge in supporting definition of scholes and barber was written by
patient care, research, and education hannah, ball & edwards (1994). They defined
(delaney, 2001). The focus is on the subject, nursing informatics as any use of information
information, rather than the tool, the technologies in carrying out nursing functions.
computer. The distinction is not always obvious Like the scholes and barber definition, these
as a result of the need to master computer skills definitions focused on the technology and
to enable one to manage this information. The could be interpreted to mean any use of the
computer is used in acquiring, organizing, computer from word processing to the
manipulating, and presenting the information. creation of artificial intelligence for nurses as
It will not produce anything of value without long as the computer use involved the
human direction in how, when, and where the practice of professional nursing.
data is acquired, how it is treated, interpreted,
manipulated, and presented. Informatics The shift from a technology orientation in
definitions to one that is more information
provides that human direction.
oriented started in the mid 1980s with schwirian
Nursing informatics (staggers & thompson, 2002). She created a
model to be used as a framework for nursing
Healthcare has many disciplines, thus it is not
informatics investigators (schwirian, 1986). The
surprising that healthcare informatics has many model consisted of four elements arranged in
specialties of which nursing is one. Nursing a pyramid with a triangular base. The top of
informatics is also a subspecialty of nursing the pyramid was the desired goal of the
which the american nurses association (ana)
nursing informatics activity and the base was
recognized in 1992, with the first informatics

NCM110A - PRELIM 3
composed of three elements: 1) users (nurses knowledge conceptual framework. This most
and students), 2) raw material or nursing recent definition emphasized again that the
information, and 3) the technology, which is goal of nursing informatics is to optimize
computer hardware and software. They all information management and communication
interact in nursing informatics activity to to improve the health of individuals, families,
achieve a goal. The model was intended as a populations, and communities.
stimulus for research.
Staggers and thompson (2002), who believe
The first widely circulated definition that moved that the evolution of definitions will continue,
away from technology to concepts was from pointed out that in all of the current definitions,
graves and corcoran (staggers & thompson, the role of the patient is under emphasized.
2002). They defined nursing informatics as "a Some early definitions included the patient, but
combination of computer science, information as a passive recipient of care. With the advent
science and nursing science designed to assist of the internet, more and more patients are
in the management and processing of nursing taking an active role in their healthcare. This
data, information and knowledge to support factor changes not only the dynamics of
the practice of nursing and the delivery of healthcare, but permits a definition of nursing
nursing care" (graves & corcoran, 1989)(p. informatics that recognizes that patients as well
227). This definition secured the position of as healthcare professionals are consumers of
nursing informatics within the practice of healthcare information and that patients may
nursing and placed the emphasis on data, be participating in keeping their medical
information, and knowledge (staggers & records current. Staggers and thompson also
thompson, 2002). Many consider it the seminal pointed out that the role of the nurse as an
definition of nursing informatics. integrator of information has been overlooked
and should be considered in future definitions.
Turley (turley, 1996), after analyzing previous
definitions, added another discipline, cognitive Despite these definitions, the focus of much of
science, to the base for nursing informatics. today's practice informatics is still on capturing
Cognitive science emphasizes the human data at the point of care and presenting it in a
factor in informatics. Its main focus is the nature manner that facilitates the care of an
of knowledge, its components, development, individual patient. Although this is a vital first
and use. Goossen (1996), thinking along the step, when designing patient care information
same lines, used the graves and corcoran systems, thought needs to be given to
definition as a basis and expanded the secondary data analysis, or analysis of data for
meaning of nursing informatics to include the purposes other than for which it was originally
thinking that is done by nurses to make collected. Using aggregated data, or the
knowledge-based decisions and inferences for same piece(s) of data, for example, outcomes
patient care. Using this interpretation, he felt of a given intervention for many patients, you
that nursing informatics should focus on can make decisions based on actual patient
analyzing and modeling the cognitive care data. Understanding how informatics can
processing for all areas of nursing practice. serve you as an individual nurse, as well as the
Goossen also stated that nursing informatics profession, puts you in a position to work with
should look at the effects of computerized informatics specialists to make retrievable data
systems on nursing care delivery needed to improve patient care.
The first ana definition in 1992 added the role Questions
of the informatics nursing specialist to the
graves and corcoran definition. The 2001 ana 1. According to american nurses association,
nursing informatics:
definition stated that nursing informatics
combines nursing, information and computer - combines nursing, information, and
sciences for the purpose of managing and computer science for the purpose of
communicating data, information, and managing and communicating data,
knowledge to support nurses and healthcare information, and knowledge to support
providers in decision making (american nurses nurses and health care provider in decision
association, 2001). Information structures, making
processes, and technology are used to provide 2. Informatics in healthcare was formerly
known as:
this support. In the latest ana scope and
standards this definition was reiterated, albeit - medical informatics
in slightly different wording (american nurses 3. The focus of nursing informatics today is:
association, 2008) and with the addition of - capturing data at the point of care
wisdom to the data, information, and History of computer and healthcare

NCM110A - PRELIM 4
In 1850, it was possible for all the medical and subtract by itself was blaise pascal's
knowledge known to the western world to be "arithmetic machine," built in 1542. The first
put into two large volumes making it possible, "computer" to be a commercial success was
for one person to read and assimilate all this jacquard's weaving machine built in 1804. Its
information. The situation today is dramatically efficiency so frightened workers at the mill
different. The number of journals available in where it was built that they rioted, broke apart
healthcare and the research that fills them the machine, and sold the parts. Despite this
have increased many times over. Even in the setback, the machine proved a success
early 1990s, if physicians read two journal because it introduced a cost-effective way of
articles a day, by the end of a year they would producing goods.
be 800 years behind in their reading
The difference and analytical engines, early
(mcdonald, 1994). A healthcare clinician may
be expected to know something about 10,000 computers designed by charles babbage in
different diseases and syndromes, 3,000 the mid 19th century, although never built, laid
medications, 1,100 laboratory tests and the the foundation for modern computers
(analytical engine, 2007). The first time that an
information in the more than 400,000 articles
added to the biomedical information each automatic calculating machine was
successfully used was in the 1900 census.
year (davenport & glaser, 2002). Additionally,
current knowledge is constantly changing: one Herman hollerith (who later started ibm) used
can expect much of their knowledge to be the jacquard loom concept of punch cards to
create a machine that enabled the 1900
obsolete in five years or less.
census takers to compile the results in one year
In healthcare, the increase in knowledge has instead of the 10 (herman hollerith—punch
led to the development of many specialties cards) required for the 1890 census. The first
such as respiratory therapy, neonatology, and computer by today's perception was the
gerontology, and subspecialties within each of electronic numerical integrator and computer
these. As these specialties have proliferated (eniac) built by people at the moore school of
and spawned the development of many engineering at the university of pennsylvania in
miraculous treatments, healthcare has too partnership with the u.s. Government. When
often become fractionalized, resulting in completed in 1946, it consisted of 18,000
difficulty in gaining an overview of the entire vacuum tubes, 70,000 progresistors, and 5
patient. The pressure of accomplishing the million soldered joints. It consumed enough
tasks necessary for a patient's physical energy to dim the lights in an entire section of
recovery usually leaves little time for perusing a philadelphia (moye, 1996). The progress in
patient's record and putting together the bits hardware since then is phenomenal; today's
and pieces so carefully charted by each "palmtop" computers have more processing
discipline. Even if time is available there is power than eniac did.
simply so much data, in so many places, that it
is difficult to merge the data with the The use of computers in healthcare originated
knowledge that a healthcare provider has in the late 1950s and early 1960s as a way to
manage financial information. This was
learned, as well as with new knowledge
needed to provide the best patient care. We followed in the late 1960s by the development
are drowning in data but lack the time and of a few computerized patient care
skills to transform it to useful information or applications (saba & erdeley 2006). Some of
these hospital information systems included
knowledge.
patient diagnoses and other patient
The development of the computer as a tool to information as well as care plans based on
manage information can be seen in its history. physician and nursing orders. Because of the
The first information management task lack of processing power then available, these
"computerized" was numeric manipulation. systems were unable to deliver what was
Although not technically a computer by needed and never became widely used.
today's terminology, the first successful
computerization tool was the abacus, which Early healthcare informatics system
was developed about 3000 bc. Although when One of the interesting early uses of the
one developed skill, real speed in these tasks computer in patient care was the problem-
was possible, the operator of the abacus still oriented medical information system (promis)
had to mentally manipulate data. All the begun by dr. Lawrence weed at the university
abacus did was store the results step by step. medical center in burlington, vt (mcneill, 1979)
Slide rules came next in 1632, but like the in 1968. The importance of this system is that it
abacus required a great deal of skill on the was the first attempt at providing a total,
part of the operator. The first machine to add integrated system that covered all aspects of

NCM110A - PRELIM 5
healthcare, including patient treatment. It was creation of different software systems for
patient oriented and used as its framework the different departments, which unfortunately
problem-oriented medical record (pomr). The could not share data, creating a need for
unit featured an interactive touch screen and clinicians to enter data more than once. An
was known for fast responsiveness (problem- attempt to share data by integrating data
oriented medical information system, n.d.). At from disparate systems is a difficult and
its height, it consisted of over 60,000 frames of sometimes impossible task. Even when possible,
knowledge. the results are often disappointing and can
leave negative impressions of computerization
Promis was designed to overcome four in users' minds. These barriers are being slowly
problems that are still with us today: lack of overcome with the introduction of data
care coordination, reliance on memory, lack
standards, both in terminology and in protocols
of recorded logic of delivered care, and lack
for passing data from one system to another.
of an effective feedback loop (promis: the
problem-oriented medical information system, Newer systems, however, are organized by
1980). The system provided a wide array of data and are designed to use the same piece
information to all healthcare providers. All of data many times, thus requiring that the
disciplines recorded their observations and entry be made only once. The primary design is
plans, and related them to a specific problem. based on how data is gathered, stored, and
This broke down barriers between disciplines, used in an entire institution rather than on a
making it possible to see the relationship specific process such as pharmacy or
between conditions, treatments, costs, and laboratory. For example, when a medication
outcomes. Unfortunately, this system did not order is placed, the system can have access to
have wide acceptance. To embrace it meant all the information about a patient including his
a change in the structure of healthcare, diagnosis, age, weight, allergies, and
something that did not begin to happen until eventually genomics, as well as the
the 1990s, when managed care in all its medications he is currently taking. The order
variations reinvigorated a push toward more and patient information can also be matched
patient-centered information systems, a push against knowledge such as what drugs are
that is continuing as you read this. incompatible with the prescribed drug, the
dosage of the drug, and the appropriateness
Another early system that became functional of the drug for this patient. If there are
in 1967 and is still functioning, is the help difficulties, the system can deliver warnings at
evaluation logical processing (help) system
the time the medication is ordered instead of
developed by the informatics department at
requiring clinician intervention either in the
the university of utah school of medicine. It was
pharmacy or at the time of administration.
first implemented in a heart catheterization Another feature in a data-driven system is the
laboratory and a post open heart intensive ability to make the same information available
care unit. It is now hospital wide and to the dietician planning the patient's diet and
operational in many hospitals in the the nurse providing patient care and doing
intermountain healthcare system (gardner,
discharge planning, thus enabling a more
pryor, & warner, 1999). This is not only a hospital complete picture of a patient than one that
information system, but integrates a would be available when separate systems
sophisticated clinical decision support system
handle dietetics and nursing.
that provides information to clinical areas. It
was the first hospital information system that Evidence-based practice will result not only
collected data for clinical decision making from research and practice guidelines, but also
and integrated it with a medical knowledge from unidentifiable (data minus any patient
base. It is well accepted by clinicians and has identification) aggregated data from actual
demonstrated that a clinical support system is patients. It will also be possible to see how
feasible and that it reduces healthcare costs patients with a given genomics react to a
without sacrificing quality. drug, thus helping the clinician in prescribing
drugs. This same aggregated data will help
Progression of information system clinicians make decisions by providing
As the science of informatics has progressed, information about treatments that are most
there have been changes in information effective for given conditions, replacing the
systems. Originally computerized clinical current system, which is too often based on
information systems were process oriented. "what we have always done" rather than
That is, they were implemented to computerize empirical information. These systems will use
a specific process, for example, billing, order computers that are powerful enough to
entry, or laboratory reports. This led to the process data so that information is created "on

NCM110A - PRELIM 6
the fly," or immediately when requested. organism. Because infections for some patients
Systems that incorporate these features will are caused by two different pathogens in
require a new way of thinking. Instead of table 1-1, you see two entries for some
having all one's knowledge in memory, one patients, however, this is all produced from
must be comfortable both with needing to only one entry of the data. With just a few
access information and with changing one's clicks of a mouse, this same data could be
practice to accommodate the new organized by unit to show the number of
knowledge. infections on each unit. This is possible because
data that is structured as in table 1-1 and
Computerization will affect healthcare standardized can be presented in many
professionals in other ways. Some jobs will
different views.
change focus. As nurses we may find that our
job as a patient care coordinator has shifted When aggregated data is examined, patterns
from transcribing and checking orders to can be seen that might otherwise take several
accessing this information on the computer. To weeks or months to become evident, or might
preserve our ability to provide full care for our never become evident. When patterns, such
patients, and as an information integrator for as the prevalence of infections for dr. Smith
other disciplines, we will need to make our emerge (table 1-1), investigations into what
information needs known to those who design these patients have in common can begin.
the systems. To accomplish this we all need to Caution, however, should be observed. The
be aware of the value of both our data and aggregated data in table 1-1 are insufficient
our experience and to be able to identify the for drawing conclusions; the data only serves
data we need to perform our job, as well as to as an indication of a problem and clues to
appreciate the value of the data that others where to start investigating. Aggregated data
and we add to the healthcare system. is a type of information or even knowledge,
but wisdom says that it is incomplete. If this
Questions data were shared outside of an agency, or
1. The difference and analytical engines were with those who don't need to have personal
designed by: information about a patient, it would be de-
- charles babbage identified, that is, there would be no patient
2. All of the following statement about the
names and probably no physician names.
health evaluation logical processing (help) Deciding who can see what data is one of the
system are true, except: current issues in informatics.
- it featured an interactive touch screen
and it was known for its responsiveness Informatics through information systems can
3. Promis what's this side to solve all of the improve communication between all
following problems, except: healthcare providers, which will improve
- lack of proper scheduling of clinical staff patient care as well as reduce stress.
Additional benefits for healthcare include
Benefits of informatics making the storage and retrieval of healthcare
The information systems described previously records much easier, quicker retrieval of test
will bring many benefits to healthcare. These results, printouts of needed information
benefits can be seen in the ability to create organized to meet the needs of the user, and
and use aggregated data, prevent errors, fewer lost charges as a result of easier methods
ease working conditions, and provide better of recording charges. The computerization of
healthcare records. administrative tasks such as staffing and
scheduling also saves time and money.
For healthcare in general
One of the primary benefits of informatics is
that data that was previously buried in
inaccessible records becomes usable.
Informatics is not just about collecting data,
but about making it useful. When data is
captured electronically in a structured manner,
it can be retrieved and used in many different
ways, both to easily assimilate information
about one patient and as aggregated data.
Aggregated data is the same piece or pieces
of data for many patients. Table 1-1 shows
some aggregated data for postsurgical Benefits to the nursing profession
infections sorted by physician and then by the

NCM110A - PRELIM 7
Each healthcare discipline will benefit from its - increased nursing competency and
investment in informatics. In nursing, informatics satisfaction
will not only enhance practice, but also allow 2. Paper documentation in healthcare
nursing science to develop (fitzpatrick, 1988). creates all of the following problems,
Informatics will improve documentation and, except:
when properly implemented, can reduce the - overemphasis of clinical data
time spent in documentation. It is believed by 3. The benefits of informatics to the nursing
many nurses that they spend over 50% of their profession includes all of the following,
time doing paperwork (womack et al, 2004). except:
Entering vital signs both in nursing notes and on - informatics will provide an ave. For
a flow sheet, wastes time and invites errors. In a continuing education
well-designed clinical documentation system,
this data will be entered once, retrieved, and Nursing informatics competencies and
presented in many different forms to meet the information literacy
needs of the user. The need to manage complex amounts of
Paper documentation methods create other data in patient care demands that nurses,
problems such as inconsistency and irregularity regardless of specialty area, have informatics
in charting as well as the lack of data for skills (gaumer, koeniger-donohue, friel, &
evaluation and research mentioned above. sudbay, 2007; nelson, 2007; wilhoit, mustain, &
An electronic clinical information system can king, 2006). Informatics skills require basic
remind users of the need to provide data in computer skills as one component (staggers,
areas apt to be forgotten and provide a list of gassert, & curran, 2002). A recent survey of
terms that can be clicked to enter data. The hospital administrators in three states in the
ability to use patient data for both quality southeastern united states revealed that one
control and research is vastly improved when of the competencies that they wanted from
documentation is complete and electronic. nurses dealt with the use of the computer
(uttley-smith, 2004). This supports an earlier
Despite florence nightingale's emphasis on study by gravely, lust, & fullerton (1999) that
data, for much of nursing's history, nursing data found that 83% of hospital recruiters indicated
has not been valued. It is either buried in paper the importance of computer skills. Another skill
patient records that make retrieving it needed for proficiency in informatics is
economically infeasible or, worse, discarded information literacy. Both these skills have also
when a patient is discharged, hence been identified by the ana and national
unavailable for building nursing science. With league for nursing (nln) as necessary for
the advent of electronic clinical evidence-based practice.
documentation, nursing data can be made a
part of the ehr and become available to Computer fluency
researchers for building evidence-based The term "computer literacy" is used broadly to
nursing knowledge. The recent maryland mean the ability to perform various tasks with a
report on the use of technology to address the computer. Given the rapid changes in
nursing shortage demonstrated that technology and in nursing, perhaps a better
informatics can be used to improve staff perspective on computer use can be gained
morale and patient care (womack et al., by thinking in terms of computer fluency rather
2004). For example, paper request forms can than literacy. The term "fluency" implies that an
be eliminated, work announcements can be individual has a lifelong commitment to
more easily communicated, the time for in- acquiring new skills for the purpose of being
services can be reduced, and empty shifts can more effective in work and personal life
be filled using internet software. (committee on information technology
In understanding the role and value that literacy, 1999). This necessitates a goal of
informatics adds to nursing, it is necessary to gaining sufficient foundational skills and
recognize that the profession is not confined to knowledge to enable one to independently
tasks, but that it is cognitive. Providing the data acquire new skills. Thus, computer literacy is a
to support this is a joint function of nursing temporary state, whereas computer fluency
informatics and clinicians. Identifying and involves being able to increase one's ability to
determining how to facilitate its collection is an effectively use a computer when needed.
informatics skill that all nurses need. A perusal of listserv archives in informatics
Questions reveals periodic requests for instruments to
1. All of the following are benefits of measure the computer competency of staff.
informatics for healthcare, except: Unfortunately there is little agreement on

NCM110A - PRELIM 8
specific competencies needed, let alone an  The beginning nurse should possess
instrument to measure this, but there is a basic information management and
consensus that it involves a positive attitude computer technology skills.
toward computers, knowledge and Accomplishments should include the
understanding of computer technology, ability to access data, use a computer
computer hardware and software skills, and for communication, use basic desktop
the ability to visualize the overall benefits to software, and use decision support
nursing from this technology (hobbs, 2002). systems.
Simpson (1998) pointed out the need for nurses  Experienced nurses should be highly
to master computers to avoid extinction. A skilled in using information management
computer is a mind tool that frees us from the and computer technology to support
mental drudgery of data processing, just as the their major area of practice. Additional
bulldozer frees us from the drudgery of digging skills for the experienced nurse include
and moving dirt. Like, the bulldozer, however, being able to make judgments on the
the computer must be used intelligently or basis of trends and patterns within data
damage can result. elements and to collaborate with
nursing informatics nurses to suggest
Given the forces moving healthcare toward
improvements in nursing systems.
more use of informatics, it is important for  The informatics nurse specialist should
nurses to learn the skills associated with using a be able to meet the information needs
computer for managing information. of practicing nurses by integrating and
Additionally, knowing how to use graphical
applying information, computer, and
interfaces and application programs such as
nursing sciences.
word processing, spreadsheets, databases,  The informatics innovator will conduct
and presentation programs is as an important
informatics research and generate
an element in a professional career as
informatics theory.
mastering technology skills (mccannon &
o'neal, 2003). Just as anatomy and physiology Informatics literacy
provide a background for learning about
disease processes and treatments, computer Information literacy, or the ability to know
when one needs information and how to
fluency skills are necessary to appreciate more
complex informatics concepts (mcneil & locate, evaluate, and effectively use it
odom, 2000) and for learning clinical (national forum on information literacy, 2004) is
an informatics skill. Although it involves
applications (nagelkerk, ritolo, & vandort,
computer skills, like informatics, it requires
1998).
critical thinking and problem solving.
Ronald and skiba (1987) were the first to look at Information literacy is part of the foundation for
computer competencies required for nurses. In evidence-based practice and provides nurses
the late 1990s and early part of this century this with the ability to be intelligent information
issue was revisited, but the focus became the consumers in today's electronic environment
use of computer skills as part of informatics skills (jacobs, rosenfeld, & haber, 2003).
(mccannon & o'neal, 2003; mcneil et al., 2003;
pew health professions commissions, 1998; The level of computer fluency needed by
staggers, gassert, & curran, 2001; staggers et nurses to be both information literate and
al., 2002; uttley-smith, 2004). One of the more informatics capable in their practice is what is
expected of any educated nurse. In this
thorough studies is by staggers, gassert, and
curran (2001). They defined four levels of course, the lessons addressing basic computer
informatics competencies for practicing nurses. skills will emphasize concepts that promote the
The first two pertain to all nurses, the last two to ability to learn new applications. These lessons
provide information underlying the use of
informatics nurses.
informatics in professional life both on and off a
clinical unit, and to adapt to changes in
technology. In future lessons these principles
will be built upon to allow the reader to start to
develop beginning informatics skills, including
the ability to find and evaluate information
from electronic sources. Additional lessons will
allow the reader to develop skills necessary to
work with nursing informatics specialists in
providing effective information systems and
the use of nursing data.

NCM110A - PRELIM 9
Summary 1. The ability to know one needs information
and how to locate, evaluate, and
Healthcare is in transition and nursing is being effectively use this information is referred to
affected by these changes. Part of these as:
changes involves informatics. Whether the - information literacy
change will be positive or negative for patient
2. The first machine to add and subtract by
care and nursing depends on nurses. For the itself was the
change to be positive, nurses need to develop - arithmetic machine
skills in information management, known in 3. All of the following statements about health
healthcare as informatics. To gain these skills, a care informatics are true, except:
background in both computer and information - it is a subspecialty of medical informatics
literacy skills is necessary. and has its focus on managing information
As knowledge continues to expand pertaining to nursing
logarithmically, data and information can no 4. Computers were first used in the healthcare
longer be managed solely by the human mind. to:
The use of tools to aid the human mind has - manage financial information
become mandatory. Although healthcare has 5. The use of information technology in
been behind most industries in using healthcare is known as:
technology to manage its data, there are - informatics
many forces, both at the governmental and
Lesson 2 | Foundation of nursing
private levels that are working to change this.
With these pressures, healthcare informatics is Introduction
rapidly expanding. There are many
subspecialties in informatics, of which nursing is We have entered the information age. Home
one. Embracing informatics will allow nurses to computers, laptops, handheld computers, and
assess and evaluate practice just as a ipods are pervasive. Banks and stock markets
stethoscope allows the evaluation and move and track billions of dollars around the
assessment of a patient. world every day through information systems.
Factories and stores buy, build, sell, and
The use of computers in healthcare started in account for the products in our lives through
the 1960s, mostly in financial areas, but with the information systems. In schools, computers are
advance in computing power and the being used as teaching tools and as
demand for clinical data, computers are being instructional resources for students in such
used more and more in clinical areas. With this varied disciplines as astronomy, chinese, and
growth has come a change in focus for chemistry. The airline industry uses information
information systems from providing solutions for systems to book seats, calculate loads, order
just one process, to an enterprise-wide patient- meals, determine flight plans, determine fuel
centered system that focuses on data. This requirements, and even fly the planes and
new focus provides the functionality that control air traffic.
allows one piece of data to be used in multiple
ways. To understand and work with clinical The information age has not left the health
systems, as well as to fulfill other professional industry untouched. Moving beyond standard
responsibilities, nurses need to be computer data processing for administrative functions
fluent, information literate, and informatics common to all organizations such as human
knowledgeable. resources, payroll, and financial information
systems now play an important role in patient
Questions care by interpreting electrocardiograms,
scheduling, entering orders, reporting results,
1. Informatics skill require:
and preventing drug interactions (by cross-
- basic computer skills and information
referencing drug compatibility and warning
literacy
appropriate stall). We are beginning to see the
2. The novice nurses should possess basic
advent of lifetime electronic health records in
information management and computer
many countries. In addition, information
technology skills, including all of the
systems are now being more widely used in
following, except:
support of population health and public health
- how to generate informatics theories
activities related to health protection (e.g.,
3. The term “computer literacy” is used
immunization), health promotion (e.g., well
broadly to mean:
baby clinics), disease prevention (e.g., smoking
- the ability to perform various tasks with a
cessation or needle exchange programs), and
computer
health monitoring or surveillance (e.g.,
LESSON 1 : POST-QUIZ restaurant inspection or air quality monitoring).

NCM110A - PRELIM 10
Nurses have always had a major 2. The core of nursing practice is:
communication role at the interface between - to provide care and interventions that
the patient/client and the health system. This influence patient care outcomes
role is now labeled information management, 3. This is an example of a managerial nursing
and nurses are increasingly using information function:
systems to assist them to fulfill this role in clinical - transcribing orders and requisitions
practice, administration, research, and 4. Example of autonomous nursing function
education. Before attempting to talk about the include all of the following, except:
role of nursing in informatics, let us first establish - scheduling patient appointments for
definitions of "nursing" and "nursing informatics." diagnostic procedures
5. This nursing function includes physical
What is nursing? treatments and administration of
Nursing is emerging as a professional practice medication under the direction of a
discipline. Based on the work of theorists, physician:
nursing practitioners see its goals as the - delegated task
promotion of adaptation in health and illness
What is “medical/healthcare informatics?”
and the facilitation of achievement of the
highest possible individual state of health Before we explore the nature of hospital and
(rogers, 1970; roy, 1976). These early theoretical nursing information systems, we need to review
models have provided the impetus for the the definitions of health, medical, and nursing
development of current approaches to the informatics. Francois gremy of france is widely
classification of phenomena of concern to credited with coining the term informatique
nursing care. medical, which was translated into english as
medical informatics. Early on, the term medical
The practitioner of nursing has many roles and
informatics was used to describe "those
responsibilities. Among these roles are those of
collected informational technologies which
an interface between the client and the
concern themselves with the patient care,
healthcare system and that of client advocate
medical decision making process" (greenburg,
in the healthcare system. Nursing functions can
1975). Another early definition, in the first issue
be considered under three major categories.
of the journal of medical informatics, proposed
 Managerial, which includes establishing that medical informatics was "the complex
nursing care plans, keeping charts, processing of data by a computer to produce
transcribing orders and requisitions, and new kinds of information" (anderson, 1976). As
scheduling patient appointments for our understanding of this discipline developed,
diagnostic procedures or therapy; greenes and shortliffe (1990) redefined
 Delegated tasks, which include physical medical informatics as "the field that concerns
treatments and administration of itself with the cognitive, information processing
medications under the direction of a and communication tasks of medical practice,
physician; education, and research, including the
 Autonomous nursing functions, which information science and the technology to
include interpersonal communication support these tasks. An intrinsically
skills, application of the psychological interdisciplinary field... [with] an applied focus...
principles of client care, and providing [addressing] a number of fundamental
physical care to patients. research problems as well as planning and
policy issues," more recently, shortliffe et al.
It is the third category of nursing activities that (2001) defined medical informatics as "the
is the core of nursing practice. In this category scientific field that deals with biomedical
of autonomous activity nurses use their information, data, and knowledge their
knowledge, skills, judgment, and experience to storage, retrieval and optimal use for problem-
exercise independent decision making related solving and decision-making,"
to the phenomena for which nurses provide
care and the nursing interventions that effect One question consistently arose: "does the
those phenomena and influence patient care word medical refer only to physicians, or does
outcomes. it refer to all healthcare professions?" the
premise was that medical referred to all
Questions healthcare professions and that a parallel
1. The communication role of a nurse at the definition of medical informatics might be
interface between the client and the "those collected informational technologies
health system is referred to as: that concern themselves with the patient care
- information management decision-making process performed by

NCM110A - PRELIM 11
healthcare practitioners." thus, because nurses generated by all of a person's contacts with
are healthcare practitioners who are involved the healthcare system.
in the patient care and the decision-making
process that uses information captured by and Questions
extracted from the information technologies, 1. The early role of a nurse in medical
informatics was that of a/an:
there clearly was a place for nursing in medical
informatics. Increasingly, as research was - consumer
conducted and medical informatics evolved, 2. Health informatics focuses on:
nurses realized there was a discrete body of - the recipient of care
knowledge related to nursing and the use of 3. All of the following are appropriate
informatics. During the early 1990s, other health definitions of medical informatics, except:
- the specialized application of information
professions began to explore the use of
informatics in their disciplines. Mandil (1989) technology aimed at optimizing laboratory
coined the phrase "health informatics," which operations
he defined as the use of information Development of nursing informatics
technology (including both hardware and
software) in combination with information Nursing informatics, as originally defined
management concepts and methods to (hannah, 1985, p. 181) referred to the use of
support the delivery of healthcare. Thus, health information technologies in relation to those
informatics has become the umbrella term functions within the purview of nursing that are
encompassing medical, nursing, dental, and carried out by nurses when performing their
pharmacy informatics among others. Health duties. Therefore, any use of information
informatics focuses attention on the recipient technologies by nurses in relation to the care
of care rather than on the discipline of the of patients, the administration of healthcare
caregiver, facilities, or the educational preparation of
individuals to practice the discipline is
Nursing’s early role in medical informatics considered nursing informatics. For example,
The nurse's early role in medical informatics was nursing informatics would include, but not be
that of a consumer. The literature clearly shows limited to the following.
the contributions of medical informatics to the  Use of artificial intelligence or decision-
practice of nursing and patient care. Early making systems to support the use of the
developments in medical informatics and their nursing process
advantages to nursing have been thoroughly  Use of a computer-based scheduling
documented (hannah, 1976). These initial package to allocate staff in a hospital
developments were fragmentary and or healthcare organization
generally restricted to automating existing  Use of computers for patient education
functions or activities such as automated  Use of computer-assisted learning in
charting of nurses' notes, automated nursing nursing education
care plans, automated patient monitoring,  Nursing use of a hospital information
automated personnel time assignment, and system
the gathering of epidemiological and  Research related to what information
administrative statistics. Subsequently, an nurses use when making patient care
integrated approach to medical informatics decisions and how those decisions are
resulted in the development and marketing of made
sophisticated hospital information systems that
included nursing applications or modules. As As the field of nursing informatics has evolved,
models of health services delivery have shifted the definition of nursing informatics has been
toward integrated care delivery across the elaborated and refined. Graves and corcoran
entire spectrum of health services, integrated (1989) suggested that nursing informatics is "a
information systems have developed. These combination of computer science, information
enterprise systems provided an integrated science, and nursing science designed to assist
clinical record within a complex integrated in the management and processing of nursing
healthcare organization. Such systems support data, information, and knowledge to support
evidence-based nursing practice, facilitate the practice of nursing and the delivery of
nurses' participation in the healthcare team, nursing care." an expert panel of the american
and document nurses' contribution to patient nurses association (2001) promoted nursing
care outcomes. They have failed, however, to informatics as a specialty that integrates
meet the challenge of providing a nationwide nursing science, computer science, and
comprehensive, lifelong, electronic health information science to manage and
record that integrates the information communicate data, information, and

NCM110A - PRELIM 12
knowledge in nursing practice. Nursing optimizing information management and
informatics facilitates the integration of data, communication
information and knowledge to support
patients, nurses and other providers in their IMPACT OF INFORMATICS ON NURSING
decision-making in all roles and settings. This As we mentioned earlier, nursing informatics
support is accomplished through the use of has moved beyond merely the use of
information structures and information computers and is increasingly referring to the
technology. impact of information and information
In an extensive review and analysis of the management on the discipline of nursing.
evolution of definitions of nursing informatics, Staggers and Thompson (2002) affirmed our
staggers and thompson (2002, p. 259) long-held position that nurses are "information
concluded that after three decades as a integrators at the patient level." Nurses form the
specialty there was still a proliferation of largest group of healthcare professionals in any
definitions for nursing informatics. Staggers and setting to have a health information system.
thompson (2002) modified the ana definition Therefore, when providing patient care, nurses
and proposed a revised definition of nursing make use of information management more
informatics as a specialty that integrates often than any other group of healthcare
nursing science, computer science, and professionals.
information science to manage and The nursing profession is recognizing the
communicate data, information and potential of informatics to improve nursing
knowledge to support patients, nurses and practice and the quality of patient care. New
other providers in their decision making in all roles are evolving for nurses. The American
roles and settings. This support is accomplished Nurses Association (2001) recognized nursing
through the use of information structures, informatics as a nursing specialty in 2001.
information processes and information Hospitals and other healthcare organizations
technology. are now hiring informatics nurse specialists and
Furthermore, staggers and thompson (2002, p. informatics nurse consultants to help in the
259-260) built on the ana work to propose that design and implementation of information
the goal of nursing informatics is to improve the systems. Nurse educators are using information
health of populations, communities, families systems to manage the educational
and individuals by optimizing information environment. Computer-based information
management and communication. This systems are used to instruct, evaluate, and
includes the use of information and technology identify problem areas of specific students;
in the direct provision of care, in establishing gather data on how each student learns;
effective administrative systems, in managing process data for research purposes; and carry
and delivering educational experiences, in out continued education. Nurse researchers,
supporting lifelong learning, and in supporting who have been using computerized software
nursing research. for data manipulation for years, are turning
their attention to the problems of identifying
Questions variables for data sets essential to the
1. All of the following statement about nursing diagnosing of nursing problems, choosing
informatics are true, except: nursing actions, and evaluating patient care.
- It constitute the establishment of There is no doubt that we have reached the
administrative systems to electronically information age in nursing. We must now
communicate with consumer prepare for the full impact of informatics on
2. Examples of nursing informatics include all nursing.
of the following, except:
- use of pen- and paper-based
documentation to facilitate patient care
3. This statement best describes nursing
informatics:
- the use of any information technologies
with nurses in relation to the care of patient,
of health care facilities, or the educational
preparation of nurses Questions
4. The stated goal of nursing informatics is to: 1. The American Nurses Association
- promote the health of populations, recognized nursing informatics as a nursing
communities, families and individual by specialty in:
- 2001

NCM110A - PRELIM 13
2. They make use of information management Nurses still must assess, plan, carry out, and
more often than any other group of evaluate patient care, but advances in the
healthcare professionals when providing use of information management, information
care: processes, and technology will continue to
- nurses create a more scientific, complex approach to
3. They are the information integrators at the the nursing care process. They will have to be
patient level: better equipped by their education and
- nurses preparation to have a more inquiring and
investigative approach to patient care.
FUTURE IMPLICATIONS Evidence-based nursing practice is becoming
Technology has historically relieved people of the standard. As information systems assume
backbreaking drudgery and dreary monotony, more routine clerical functions, nurses will have
providing them with more free time to pursue more time for direct patient care. Accordingly,
personal relations and creative activities. nursing must be part of future developments in
Nurses, too, when relieved of routine and time- nursing informatics with strong input regarding
consuming clerical or managerial paper such decisions as the following.
handling chores, can devote more time to the 1. Which patient care-related nursing
unique problems and needs of individual functions could be accomplished by
patients or clients. Increasingly, across the nursing informatics?
world, the managerial and clerical paper- 2. What information do nurses require to
handling tasks of nursing are being performed make patient care decisions?
by information systems. In addition, robotics 3. What information do caregivers from
(e.g., lifting and turning patients, delivering other health professions require from
medications or meals, and recording nursing?
temperature, pulse, and other physiological 4. To what extent can nursing informatics
measurements) might assist with the physical support improvements in the quality of
care category of nursing tasks. Similarly, nursing care received by patients?
decision support systems may actively assist 5. How can the financial and emotional
with nursing judgments. costs of care to patients be reduced
Relieved of routine and less complex chores, using nursing informatics?
the professional nurse having enhanced 6. What is the impact of nursing on client
information management skills and working in outcomes?
an environment enhanced by information 7. What do nursing interventions contribute
systems will be expected to carry out higher to patient outcomes?
level, more complex activities that cannot be The implication is that nursing must continually
programmed. Nurses are being held reassess its status and reward systems.
responsible and accountable for the Presently, a nurse gains status and financial
systematic planning of holistic and humanistic reward by moving away from the bedside into
nursing care for patients and their families. supervisory and managerial roles. If more of
Nurses are also increasingly responsible for the these coordinating functions are taken over by
continual review and examination of nursing the computer, nursing must reappraise its value
practice (using innovative, continuous quality system and reward quality of care at the
improvement approaches), as well as applying bedside with prestige and money. Some
basic research to finding creative solutions for movement in this direction is already beginning
patient care problems and the development for example, the movement toward
of new models for the delivery of nursing care. employment of clinical nurse specialists
Increasingly, nurses will provide more primary prepared at the master's degree level to work
care through community-based programs at the bedside. However, currently this
providing health, promotion and early movement seems to be too little and too slow.
recognition and prevention of illness. Nurses'
role as patient educator is being extended by Questions
means of multimedia programs and the 1. All of the following are capabilities of
Internet. At the same time nurses must assume robotics in regards to physical nursing tasks,
greater responsibility for assisting the public to except:
become discriminating users of information as - planning and evaluating patient care
they select, sort, interpret, evaluate, and use 2. Nurses should be part of future
the vast volumes of facts available across the developments in nursing informatics with
Internet. strong input regarding all of the following,
except:

NCM110A - PRELIM 14
- nursing nomenclature and interdisciplinary 5. Nurses are information integrators at the
dependencies hospital level:
3. All of the following are responsibilities of - false
nurses, except:
- make a diagnosis based on physical LESSON 3 | HISTORICAL OVERVIEW OF NURSING
assessments and medical history COMPUTER

SUMMARY INTRODUCTION

The role of the nurse will intensify and diversify Since the beginning of time, people have
with the widespread integration of computer invented tools to help them. Tracing the
technology and information science into evolution of computers gives us a clearer
healthcare agencies and institutions. historical vantage point from which to view our
Redefinition, refinement, and modification of rapidly changing world. This approach also
identifies informatics as a tool that can
the practice of nursing will intensify the nurse's
role in the delivery of patient care. At the same advance the goal of high quality nursing care.
time, nurses will have greater diversity by virtue From a historical perspective, however, it is
of employment opportunities in the nursing difficult to identify the true origin of computers.
For instance, we could go back in time to the
informatics field.
devices introduced by Moslem scientists and to
Nursing's contributions can and will influence the mathematicians of the fifteenth century.
the evolution of healthcare informatics. Nursing An example is Al-Kashi, who designed his plate
will also be influenced by informatics, resulting of conjunctions to calculate the exact hour at
in a better understanding of our knowledge which two planets would have the same
and a closer link of that knowledge to nursing longitude (De and Price, 1959; Goldstine, 1972).
practice (Turley, 1997). As a profession, nursing A more familiar example is the first rudimentary
must anticipate the expansion and calculating tool, the Chinese abacus. This is still
development of nursing informatics. a rapid and efficient method of handling
Leadership and direction must be provided to addition and subtraction.
ensure that nursing informatics expands and
Questions
improves the quality of healthcare received by
patients within the collaborative 1. The first rudimentary calculating tool is
the:
interdisciplinary venue of health informatics.
- Chinese abavus
Questions 2. the plate of conjunction was designed
1. All of the following will help to intensify the by:
nurses role in the delivery of patient care, - Al-Kashi
except: 3. the plate of conjunction was designed
- delineation of nursing responsibilities to:
2. In regard to nursing informatics, all of the - Calculate the exact hour at which
following statements are true, except: planetary conjunctions will occur
- adequate fiscal resources will ensure that
nursing informatics expands and improves The 1950s
the quality of health care The transistor, invented by Shockley in 1947
LESSON 2 : POST-QUIZ (WGBH, 2004), was used to develop a second
generation of computers and ultimately the
1. The nursing profession is recognizing the
potential of informatics to improve nursing transistor lead to the silicon chip. Second-
practice and regulatory compliance: generation computers were smaller, produced
- false less heat, were more reliable, and were much
2. Any use of information technologies by easier to operate and maintain. Second-
nurses in relation to the care of patients is generation computers moved into the business
considered telehealth: and industrial world where they were used for
- false data-processing functions such as payroll and
3. The core of nursing practice is the accounting. The rapidly expanding healthcare
managerial rule nurses perform: industry began using computers to track
- false patient charges, calculate payrolls, control
4. The ultimate goal of nursing is to educate inventory, and analyze medical statistics.
clients: During the 1950s, Blumberg (1958) foresaw the
- false possibilities of automating selected nursing
activities and records. Little action was taken
then because the existing computer programs

NCM110A - PRELIM 15
were inflexible, computer manufacturers had a 1. The transmission control protocol (TCP) was
general lack of interest in the healthcare invented in the:
market, and hospital administrators and nursing - 1970s
management had a general lack of interest 2. he is known as the father of the Internet:
and knowledge about such equipment. - Vin Cerf
3. during the 1960s, third generation
The 1960s computers were identifiable by all of the
During the 1960s, universities were bursting at following characteristics, except:
the seams as members of the post-World War II - lower heat production
baby boom entered college. The philosophy of
The 1980s
"education for all" left educators searching for
a way to provide more individualized and self- Personal computer technology augmented
paced instruction. The computer seemed to and replaced the large, cumbersome
hold great promise. At the University of Illinois, hardware of the 1970s. In 1981 IBM debuted
Dr. Donald Bitzer was working on a display the PC with an Intel 8088 microprocessor, 16K
screen that would increase the graphics of RAM, and a 5.25 disk drive with two choices
resolution available on. The PLATO of operating system. The Apple Mac was
(programmed logic for automated teaching launched in 1984, and in 1986 Intel introduced
operations) computer system he developed. the 486 Processor. Research and development
in computer technology was aimed at "open
During 1965 and 1966, the "third generation" of
systems." This additional technological
computers was introduced. These third-
advance served the nursing profession
generation computers were identifiable by
because it systematized and simplified the
their modular components, increased speed,
process of data entry, storage, and retrieval.
ability to service multiple users simultaneously,
inexpensive bulk storage devices that allowed The 1990s
more data to be immediately accessible, and
rapid development of systems. During the 1990s, information technologies,
including personal computers and
The 1970s workstations, combined with
telecommunications technologies such as
The development of the silicon chip paved the
local and wide area networks to create
way for the development of minicomputers
client/server architectures. Client/server
and personal computers. The silicon chip
architecture integrated and capitalized on the
allowed large amounts of data to be stored in
strengths of the hardware, software, and
an extremely small space. This development
telecommunications capacities, allowing users
allowed the total size of computers to be
to navigate through data across many
significantly reduced. The first mass-market
systems. These linkages were vital to breaking
personal computer, the MITS Altair 3800, was
the barriers between different systems. The
sold in 1975 as a hobbyist kit; the Apple I,
open flow of information among systems
another personal computer kit marketed to
contributed to many developments in nursing
hobbyists by Stephen Wozniak and Steve Jobs,
informatics.
followed in 1976.
In 1990 Tim Berners-Lee created a new way to
Soon the vision of connecting computers to
interact with the Internet the World Wide Web.
share information began to spread, and many
His system made it much easier to share and
computer networks were being developed all
find data on the Internet. Others augmented
over the world, but they could not
the World Wide Web by creating new software
communicate with one another because they
and technologies to make it more functional.
used different protocols, or standards, for
For example, Marc Andreesen led the team
transmitting data. In 1974, Vint Cerf (sometimes
that created Netscape Navigator (Griffin,
known as the "father of the Internet"), along
2000).
with Bob Kahn, wrote a new protocol, TCP
(transmission control protocol), which became The New Millennium (2000)
the accepted international standard. The
implementation of TCP allowed the various The dawning of the twenty-first century saw
networks to connect and become the Internet pervasive digital proliferation. Digital cameras,
as we know it. music players, and videos became widely
available. Handheld devices of all sorts and for
Questions highly diverse purposes multiplied and became
widely available and affordable. Handheld
wireless communication devices such as

NCM110A - PRELIM 16
Blackberry are bringing convergence  As a data-gathering device to capture
telecommunications. charges and patient medical
information
Questions  As a scheduler to prepare such items as
1. The 486 professors was introduced in the: nursing station medication schedules
- 1980s  As a database manager with report
2. The apple Mac was launched in the: preparation and inquiry capabilities
- 1980s
These functions are often collectively called
3. The Berners-Lee created:
hospital information systems (HISs), medical
- World Wide Web information systems (MISs), and sometimes
Introduction of Computers into Healthcare hospital-medical information systems (HMISs).
The first term (or its acronym, HIS) is used in this
Healthcare trailed government and industry in book.
the initial exploration of the feasibility of
computer usage and in installation of Questions
computers. One reason for the delay was that 1. The first hospital computer system were
first and second-generation computers were used in:
not well suited for the data processing needs - accounting
of hospitals. A second reason was that only 2. functions of hospital information system
about 250 of the largest hospitals had in- include all of the following, except:
hospital punch card installations. These - an expert system that can diagnose
hospitals were usually the first targets of certain diseases
computer salesmen. The computer 3. during the 1950s, one of the reasons for
manufacturers simply did not understand the delay in the exploration of feasibility of
potential of the hospital market or ultimately computer usage in healthcare was that:
the healthcare market. - 1st and 2nd generation computers
were not well suited for the data
When focusing on the use of computers in processing needs of hospital
healthcare, computers traditionally gained
entry through the accounting area, where The 1960s
most hospital computer systems still have their Although a few hardware manufacturers
roots. Patient care requires continuous and offered some business and financial
instantaneous response in contrast to the fiscal application packages for in-hospital
methodology where timing is less critical. To processing during the early 1960s, it was not
achieve successful utilization of computers in until the mid-1960s that other vendors began to
healthcare, both needs must be addressed. see the potential of the hospital data-
The 1950s processing market. The hardware vendors
during the 1960s (e.g., IBM, Burroughs,
During the late 1950s a few pioneering Honeywell, UNIVAC, NCR, CDC) were
hospitals installed computers and began to committed primarily to selling large general-
develop their application software. Some purpose computers to support clinical,
hospitals had help from computer administrative, communication, and financial
manufacturers, especially IBM. Then, in 1958- systems of the hospitals.
1959, John Diebold and Associates undertook
an in-depth feasibility study of hospital The 200 to 400 bed hospitals that installed
computing at Baylor University Medical Center. computers during the late 1960s for
The final report identified two major hospital accounting applications found their
wide needs for computerization: (1) a set of environments growing more complex, which
business and financial applications, and (2) a resulted in a constant battle just to maintain
set of hospital-medical applications that would and update existing systems to keep pace with
require on-line terminals at nursing stations and regulating agencies. Many hospitals of this size
departments throughout the hospital. Such a turned to shared computer services.
system could be used for the following In 1966, Honeywell announced the availability
purposes. of a business and financial package for a
 As a communications and message- shared hospital data-processing center. IBM
switching device to route physicians' followed quickly the next year with SHAS
orders and test results to their proper (shared hospital accounting system). The
destinations availability of this software was an important
factor in establishing not-for-profit and for-
profit shared centers during the next 5 years.

NCM110A - PRELIM 17
There are still many shared-service companies 2. hospital information system that require
(e.g., SMS, McAuto) specializing in hospital little or no modification by individual
data processing. These companies continue to hospitals were developed during the:
provide useful services, particularly to smaller - mid 1960s
hospitals. The companies prospered not only 3. shared hospital accounting system were
because of their computer and systems developed in the:
products and services but because smaller, - 1960s
single hospitals were unable to justify, employ,
and retain the varied technical and The 1970s
management skills required for this complex During the early 1970s, with inflation problems
and constantly changing environment. and with cost reimbursement becoming
The first hospital computer systems for other stricter, some large hospitals that had installed
than accounting services were developed their own computers with marginal success
during the late 1960s. The technology that changed to the shared service. By this time the
attempted to address clinical applications was shared companies had improved earlier
unsuccessful. Terminal devices such as accounting software and could carry out
keyboard overlays, early cathode-ray tubes, tighter audit controls. Most importantly,
and a variety of keyboard and card systems however, the companies developed personnel
were expensive, unreliable, and unwieldy. Also, who understood hospital operations and could
hardware and software were scarce, communicate and translate the use of
expensive, and inflexible. Database computer systems into results in their client
management systems, which are at the heart hospitals. This added a dimension of service
of good information software today, had not that is seldom offered or understood by the
yet appeared. During this period, some major hardware vendors. As a result, the
hospitals installed computers in offices to do business opportunities for the service
specific jobs (Ball and Jacobs, 1980). The most companies increased. Over time, these
successful of these early clinical systems were companies have expanded their scope of
installed in the clinical pathology laboratory services from fiscal applications and
(Ball, 1973). Most of the hospitals that administrative services to clinical and
embarked on these dedicated clinical communication applications.
programs were large teaching institutions with Major hardware changes took place as the
access to federal funding or foundation minicomputer entered the scene. This was
research money. Limited attempts were made quickly followed by the introduction of the
to integrate the accounting computer with personal computer during the late 1970s,
these stand-alone systems. Technologic developments have resulted in a
During the mid-1960s, Lockheed Missile and steady trend toward microminiaturization of
Space Company and National Data computers. Personal computers are now more
Communications (then known as Reach) powerful than the original ENIAC. These
began the development of HISs that would personal computers have invaded homes,
require little or no modification by individual schools, offices, nursing stations, and
hospitals. This was the forerunner to the administrative offices to a degree never
product that is now marketed by Eclipsys. dreamed possible. The linking of these personal
computers, using local area networking
About 1965, the American Hospital Association technology, provided a better alternative to
(AHA) began to conduct four or five many of the processes formerly carried out by
conferences per year to acquaint hospital one large general-purpose computer.
executives with the potential the computer
holds for improving hospital administration. The Many major mainframe hardware companies
AHA also devoted two issues of its journal solely moved rapidly into the personal computer field
to data processing. These AHA activities served as well. Simultaneously, the service companies
to crystallize a market (i.e., hospitals ready for began to develop on-site networking systems
data processing) and to encourage existing to handle data, communications and
and new firms to enter the marketplace. specialized nonfinancial applications. They
began to expand their scope of data retention
Questions to support clinical applications that required a
1. the first hospital computer system that historical patient database
perform function other than accounting
were developed during the: The 1980s
- late 1960s During the 1980s, specific personal computer-
based systems were developed. These systems

NCM110A - PRELIM 18
did not replace but, instead, complemented a of Health Education and Welfare (HEW)-
variety of alternatives in various healthcare funded research projects. These projects
environments. Thus, awareness of computer undertook evaluative studies that documented
concepts by healthcare professionals became the efficacy of teaching nursing content using
even more essential. a computer. Until 1976 Bitzer was associated
with the Computer-Based Education Research
The 1990s Laboratory at the University of Illinois in Urbana,
During the 1990s, the advent of powerful, where she continued to develop computer-
affordable, portable personal computers assisted instruction lessons to teach nursing.
made information management tools During the 1970s many individual nursing
accessible to support highly mobile, remote faculties, schools, and units developed and
activities, especially in community health. At evaluated computer-assisted instruction (CAI)
the same time, the power of networks and
lessons to meet specific institutional student
database technology has made possible needs. Most of the software created was used
linkages of health data in widely separated
solely by the developing institution.
locations. There also was a growing emphasis
on information management across health The use of computers to teach nursing content
enterprises. Accompanying this was has been a focal point of informatics activity in
recognition of the importance of nursing education. However, the need to
patient/client-centered, integrated data in prepare nurses to use informatics in nursing
contrast to departmental focused data. Such practice is just as important. This aspect was
linkages and shift in focus created the pioneered in 1975 by Judith Ronald of the
possibility of a longitudinal, lifelong health School of Nursing, State University of New York
record encompassing healthcare encounters at Buffalo. Ronald developed the course that
by individuals with all sectors of the healthcare served as a model and inspiration for courses
system. developed later. Ronald's enthusiasm and her
willingness to share her course materials and
Questions experiences have greatly facilitated the
1. Portable personal computers were
implementation of other such courses
invented in the:
throughout North America.
- 1990s
2. Information management across health In Scotland, Christine Henney of the University
enterprises prospered during the: of Dundee undertook similar activities aimed at
- 1990s promoting computer literacy among nurses.
3. Personal computers were introduced during
the: Nursing Administration
- Late 1970s The use of computers to provide management
4. On site no working system were developed information to nurse managers in hospitals has
in the: been promoted on both sides of the Atlantic.
- 1970s Marilyn Plomann of the Hospital Research and
Educational Trust (an affiliate of the American
HISTORY OF NURSING USE OF COMPUTERS
Hospital Association) in Chicago was actively
Nursing Education involved for many years in the design,
development, and demonstration of a
The seminal work in the use of computers in planning, budgeting, and control system. (PB
nursing education was conducted by Maryann CS) for use by hospital managers. In Glasgow
Drost Bitzer. During the early 1960s, Bitzer wrote (Scotland) Catherine Cunningham was
a program that was used to teach obstetric actively involved in the development of nurse-
nursing. Her program was a simulation exercise. manpower planning projects on
It was the first simulation in nursing and one of microcomputers. Similarly, Elly Pluyter-Wenting
the first in the healthcare field. (Bitzer's 1963) (from 1976 to 1983 in Leiden, Holland), Christine
master's thesis showed that students learned Henney (from 1974 to 1983 in. Dundee,
and retained the same amount of material Scotland), Phyllis Giovanetti (from. 1978 to the
using the computer simulation in one-third the time of writing in Edmonton, Canada), and
time it would take using the classic lecture Elizabeth Butler (from 1973 to 1983 in London,
method. This thesis (Bitzer, 1963) has become a England) have been instrumental in
classic model for subsequent work by her and developing and implementing nurse
many others, including two of the authors scheduling and staffing systems for hospitals in
(K.J.H. and M.J.E.) of this volume. Bitzer's early their areas.
findings have been consistently confirmed. She
was later project director on two Department

NCM110A - PRELIM 19
In the public health area of nursing practice, Elizabeth Butler was associated with the Kings
Virginia Saba (a nurse consultant to the Division College Hospital from 1970 to 1973. As the
of Nursing, Bureau of Health Manpower, Health nursing officer on a medical unit, Butler was
Resources Administration, Public Health involved in developing and implementing the
Service, Department of Health and Human computerized nursing care plan system for the
Services) was instrumental in promoting the use Professional Medical Unit and for the nursing
of management information systems for public care plan system for all wards and specialties
health nursing services. The objective of all in the 500-bed general area of the hospital. In
these projects has been to use computers to Dundee, Scotland, Christine Henney worked
provide management information to help in with James Crooks (from 1974) on the design
decision-making by nurse administrators. and implementation of a real-time nursing
system at Ninewells Hospital.
Questions
1. She was instrumental in promoting the use In the United States, Carol Ostrowski and
of management information system for Donna Gane McNeill were both associated
public health nursing service: with the development of the Problem Oriented
- Virginia Saba Medical Information System (PROMIS) at
2. In Glasgow, Scotland, Catherine Medical Center Hospital of Vermont under the
Cunningham was actively involved in the: direction of Lawrence Weed. From 1969 to
- development of nurse manpower 1979, Donna Gane McNeill was a nurse
planning projects on microcomputers clinician on the PROMIS project. As such,
3. The first Seminal work in the use of McNeill managed the first computerized
computers in nursing education occurred nursing unit, developed content for PROMIS,
during the early: and developed functions and tasks for the
- 1960s computer. She also conducted a comparison
4. Nurse scheduling and staffing system in between computerized and noncomputerized
England were developed and units. From June 1976 to December 1977, Carol
implemented by: Ostrowski served as director of audit for the
- Elizabeth Butler PROMIS system. She was responsible for
implementing the components that supported
Nursing Care concurrent audit of medical and nursing care
Much research on the development of and the environment that guided and
computer applications for use in patient care evaluated patient care.
was conducted during the 1960s. Projects were In the United States, Margo Cook also began
designed to provide justification for the initial her association with computers in nursing in
costs of automation and to show improved 1970 when she was employed at El Camino
patient care. Hospital administrators became Hospital, Mountain View, California. Cook
aware of the possibilities of automating participated as the nursing representative on
healthcare activities other than business office the team that developed and implemented
procedures. Equipment became more refined the Medical Information System (still marketed
and sophisticated. Healthcare professionals by Elipsys). As nursing implementation
began to develop patient care applications, coordinator, Cook was responsible for
and the manufacturers recognized the sales identifying and addressing the needs of all
potential in the healthcare market. nursing units at El Camino. Often she
Nurse pioneers who have contributed to the functioned as interpreter between the
use of computers in patient care activities computer analysts and nurses. Eventually she
have been active on both sides of the Atlantic. assumed senior level responsibility for the MIS
In the United Kingdom, Maureen Scholes, chief maintenance and development. In 1983 Cook
nursing officer at The London Hospital left El Camino to become senior consultant of
(Whitechapel), began her involvement with Hospital Productivity Management Services.
computers and nursing in 1967 as the nurse In 1976 Dickey Johnson became computer
member of the steering team that directed coordinator at Latter Day Saints Hospital in Salt
and monitored The London Hospital Real-Time Lake City, Utah. Johnson's responsibilities
Computer Project. This project resulted in a involved coordination between the computer
hospital communication system that provided department and other hospital users in
patient administration services, laboratory planning, development, implementation, and
services, and radiography services using 105 maintenance of all programs either used by, or
visual display units in all hospital wards and affecting nursing personnel. In 1983, Johnson
departments. was the nursing representative on the hospital's

NCM110A - PRELIM 20
Computer Committee, which was actively separate nursing section at an International
involved in planning, designing, and Medical Informatics Association (IMIA) meeting
implementing a hospital-wide computer (Medinfo '80, Tokyo). Previously, nursing
system. Johnson was responsible for projects presentations at this international conference
that included order entries, nursing care plans, had been integrated within other sections. In
nurse acuity, and nurse staffing. 1982, based on the success of this Tokyo
workshop, which Hannah also chaired, a
In Canada, from 1978 to 1983, Joy Brown and contingent of British nurses led by Maureen
Marjorie Wright, systems coordinators at York Scholes mounted an International Open Forum
Central Hospital in Richmond Hill, Ontario, were and Working Conference on "The Impact of
actively involved in designing, coding, and Computers on Nursing." The international
implementing the computerized patient care
symposium on the impact of computers on
system at their hospital. They were also nursing was convened in London, England, in
responsible for training many nurse users on the the fall of 1982, followed immediately by an
system. Beginning in 1982 at Calgary General IMIA-sponsored working conference. One
Hospital in Calgary Alberta, Wendy Harper,
outcome of the working conference was a
assistant director, Nursing Systems, was book that documented the developments
responsible for all aspects of the nursing
related to nursing uses of computers from their
applications on the hospital information system beginning until 1982. The second outcome was
being installed in that hospital. a consensus that nurses needed a structure
Nurses have recognized the potential for within an international organization to promote
improving nursing practice and the quality of future regular international exchanges of ideas
patient care through nursing informatics. These related to the use of computers in nursing and
applications facilitate charting, care planning, healthcare. Consequently, in the spring of
patient monitoring, interdepartmental 1983, a proposal to establish a permanent
scheduling, and communication with the nursing working group (Group 8) was
hospital's other computers. New roles for nurses approved by the General Assembly of IMIA. In
have emerged. Nurses have formed computer August 1983, the inaugural meeting of the IMIA
and nursing informatics interest groups to Working Group on Nursing Informatics (Group
provide a forum through which information 8) was held in Amsterdam.
about computers and information systems is In 1992, the working group recommended a
communicated worldwide. change of bylaws and began its
Questions transformation to a nursing informatics society
1. This project resulted in a hospital within the IMIA. This society continues the
communication system that provided organization of symposia every 3 years for
patient administration services, laboratory exchange of ideas about nursing informatics,
services, and radiography services using dissemination of new ideas about nursing
105 visual display unit in all hospital wards informatics through its publications, provision of
and departments: leadership in the development of nursing
- London Hospital Real-Time Computer informatics internationally, and promotion of
Project awareness and education of nurses about
2. The design and implementation of real time nursing informatics.
nursing system at Ninewells Hospital where In the United States in 1981, Virginia Saba was
pure headed by:
instrumental in establishing a nursing presence
- Christine Henney and James Crooks at the Symposium on Computer Applications in
3. The problem oriented medical information Medical Care (SCAMC). This annual
system (PROMIS) was introduced by: symposium, although not a professional
- Lawrence Weed organization, provided opportunities for nurses
Communicating Nursing Developments in the United States to share their experiences.
In 1982 the American Association for Medical
Kathryn Hannah, of the University of Calgary, Systems and Informatics (AAMSI) established a
was the first nurse elected to the Board of Nursing Professional Specialty Group. This
Directors of the Canadian Organization for the group, which was chaired by Carol Ostrowski,
Advancement of Computers in Health provided the benefits of a national professional
(COACH). In that capacity, with the assistance organization as a focal point for discussion,
of David Shires of Dalhousie University (and at exchange of ideas, and leadership for nurses
that time program chairman for the involved in the use of computers.
International Medical Informatics Association), Subsequently, AAMSI merged with SCAMC to
Hannah was instrumental in establishing the first become the American Medical Informatics

NCM110A - PRELIM 21
Association (AMIA). This organization continues major focus during the 1960s was on the
to have a highly active nursing professional research aspect of computer applications for
specialty group. patient care; the business applications for
auditing functions in the healthcare industry
Question were becoming well established. Projects were
1. During the 1980s, Kathryn Hannah was
designed to provide justification for the initial
instrumental in: costs of automation and to display the variety
- Establishing the first separate nursing of areas in which computers could be used to
section at an international medical facilitate and improve patient care. Nurses
informatics association (IMIA) meeting began to recognize the potential of computers
2. The first international symposium on the for improving nursing practice and the quality
impact of computers on nursing was
of patient care, especially in the areas of
covered in London, England in: charting, care plans, patient monitoring,
- 1982 interdepartmental scheduling and
3. Develop in 1982, this group provided the communication, and personnel time
benefits of a national professional
assignment. These individual computer
organization as a focal point for discussion, applications or modules, which were
exchange of ideas, and leadership for
developed to support selected nursing
nurses involved in the use of computers: activities, were later integrated in modular
- Nursing Professional Specialty Group fashion into various hospital information
Summary systems. Today these hospital information
systems are widely promoted and marketed by
Despite their wide usage, computers are computer vendors.
historically young and did not come into
prominence until 1944 when the IBM-Harvard Simultaneously, advances in the uses of
project called Mark I was completed. This was computers in educational environments were
followed closely by the development, in 1946 initiated during the 1960s. The major focus
at the University of Pennsylvania, of the ENIAC during this decade was on showing the
I, the first electronic computer with no moving efficacy of computers as teaching methods.
parts. Subsequent refinement of computer During the 1970s, many projects were designed
technology, development of the silicon chip in to compare student learning via computer
1976, development of the Internet, and the with learning via traditional teaching methods.
World Wide Web have made personal The mid-1970s also saw the development of
computers as common in our homes as the personal microcomputer and during the
television sets. Handheld wireless digital latter years of that decade their widespread
telecommunications devices are now dissemination throughout society. During the
pervasive. 1980s nursing educators were scrambling to
develop software for use with this technology.
During the 1950s computers entered the In fact, the hardware technology has
healthcare professions. They were primarily advanced beyond nursing educators'
used for the purposes of tabulating patient capacity to use it all.
charges, calculating payrolls, controlling
inventory, and analyzing medical statistics. A Major contributions by nurses to developments
few farsighted individuals saw the possibilities leading to the use of computers in nursing
of automating selected nursing activities and were also discussed. Our apologies to those
records. However, little action was taken nurses whose activities were unknown to us. If
because of the inflexibility and slowness of the readers know of other nurses whose
equipment, the general disinterest of the contributions merit inclusion in future editions,
manufacturers in the healthcare market, and the authors would be pleased to receive such
the lack of knowledge concerning such information.
equipment among hospital management, The future demands that computer technology
hospital administrators, and nursing be integrated into the clinical practice
management. environment, education, and research
By the 1960s, hospital administrators had been domains of the nursing profession. The ultimate
exposed to the possibility of automating goal is always the best possible care for the
healthcare activities; in addition to existing patient.
business office automation, equipment had Question
become more refined and sophisticated, and 1. This is the first electronic computer with no
the manufacturers had recognized the sales moving parts:
potential in the healthcare market. The - ENIAC I

NCM110A - PRELIM 22
2. The functions of computers in the we look at the computer, and in the next, at
healthcare profession during the 1950s software.
include all of the following, except:
- Storing patient information COMPUTER MISCONCEPTIONS
3. The ultimate goal of using computer When computers were new, there were many
technology in Healthcare is to: fears and misconceptions about using them.
- Provide the best possible care for the Some of these were computers can think,
patient computers require a mathematical genius to
use, and computers make mistakes (Perry,
LESSON 3 : POST-QUIZ
1982). Today there are other misconceptions,
1. Informatics as a tool can advance the goal
perhaps born of familiarity, which can be
of high quality nursing care:
dangerous to users. It is important to
- true
understand that computers cannot think, and
2. In the 1950s, open system systemized and
they are not smart. Incidents like the one in
simplified the process of data entry, storage
which Deep Blue (the nickname given to an
and retrieval:
IBM computer specially designed to play
- false
chess) won a chess game against world
3. The rapidly expanding healthcare industry
champion Garry Kasparov led to such
began using computers in the 1990s the
misperceptions. Consider the game of chess.
truck patient charges, calculate payrolls,
Although there are many possible
control inventory, and analyze medical
combinations, there are a given set of moves,
statistics:
rules, and goals that make it a perfect stage to
- false
display the potential of computers. Deep Blue
4. The first hospital computer system for
is a very powerful computer, capable of
activities other than accounting services
quickly analyzing hundreds of millions of
were developed during the late 1960s:
possible moves and responding according to
- true
rules (known as algorithms) that were part of
5. The development of the silicon chip paved
the software that beat Kasparov. It made use
the way for the development of
of these qualities to beat Kasparov. It did not
minicomputers and personal computers:
use thinking in the human sense.
- true
The thought that only mathematical geniuses
LESSON 4 | ANATOMY AND PHYSIOLOGY OF can use computers, although just as false,
COMPUTERS continues to flourish. This belief is linked to the
INTRODUCTION development of the first computers as a means
to "crunch numbers," or process mathematical
Introducing the use of a stethoscope precedes equations. Hence, in colleges and universities,
learning how to listen to heart and lung sounds. many computer departments are still housed
To be effective in using the stethoscope, a in, or closely related to, the departments of
clinician needs to know when to use the bell mathematics. It did not take experts long to
and when to use the diaphragm. In the same translate the mathematical concepts into
way, it is imperative to have some everyday language, an accomplishment that
understanding of how and when to use the made the computer available to everyone,
tool of informatics, the computer. regardless of level of proficiency in math.
A complete computer system is the integration The last myth, that computers make mistakes,
of human input and information resources makes it a wonderful excuse for human error.
using hardware and software. In computer This was well illustrated by a cartoon in the
terms, hardware refers to objects such as disks, early 1990s that showed a man saying, "It's
disk drives, monitors, keyboards, speakers, wonderful to be able to blame my mistakes at
printers, mice, boards, chips, and the the office on the computer, I think I'll get a
computer itself. Software includes programs personal computer." Computers act on the
that give instructions to the computer that information they are given. As one humorist
make the machine useful. Information said, "Computers are designed to DWIS, or Do
resources are data that the computer What I Say" As many a user will tell you, they
manipulates. Human input refers to the entire resist with great determination any inclination
spectrum of human involvement, including to DWIM, or "Do What I Mean!" Unlike a
deciding what is to be input and how it is to be colleague to whom you only need to give
processed as well as evaluating output and partial instructions because the person is able
deciding how it should be used. In this chapter, to fill in the rest, a computer requires complete,
definitive, black-and-white directions. Unlike

NCM110A - PRELIM 23
humans, computers cannot perceive that a McBride & Nagle, 1996; Simpson & Kenrick,
colon and semicolon are closely related, and 1997). Today, these studies look at the attitudes
in many cases, a computer believes that an and anxiety toward the electronic health
uppercase letter and a lower case letter are as record (Chan, 2007; Dillon, Blankenship, &
different as the letter A from the letter X. This is Crews, 2005). It is highly likely that the same
known as case sensitivity. There are no type of anxieties were present when the
"almosts" with a computer. general population found it necessary to learn
to drive. There are, however, no known studies
COMPUTER CHARACTERISTICS of this phenomena dating from that time (Box
A computer accomplishes many things that 2-1).
are impossible without it. When programmed Addressing these fears takes time for both a
properly, it is superb in remembering and trainer and the individual experiencing the
processing details, calculating accurately,
fears. One- on-one sessions for the person
printing reports, facilitating editing documents, affected may be necessary and save time in
and sparing users many repetitive, tedious the long run by preventing frantic calls to the
tasks, which frees time for more productive help center. Studies show that the learning
endeavors. Remember, however, that patterns of those afraid of computers can be
computers are not infallible. Being electronic, improved by treating the bodily symptoms of
they are subject to electrical problems.
anxiety and providing distracting thought
Humans build computers, program them, and patterns (Bloom, 1985). Techniques, such as
enter data into them. For these reasons, many teaching relaxation methods before starting
situations can cause error and frustration. Two any hands- on training, often helps, as does
of the most common challenges with giving the anxious trainee something to repeat
computers are "glitches" and the "garbage in, internally such as, "You're in control, not the
garbage out" (GIGO) principle. That is, if data
computer."
input has errors, then the output will be
erroneous. Other helpful techniques include recognizing
and accepting fear. One method is to have
Anyone, who had been using a computer
trainees check off from a list of possible feelings
when it crashed or "went down" may have
(e.g. panicky, lost, curious) those that they are
experienced a guilty feeling that she or he did feeling, a practice that can help them face
something wrong. If the person actually did their fears. Inherent in all these terrors is the fear
create the crash, unless she or he were of failure and of looking incompetent in front of
purposely engaged in something destructive, their peers. This may be especially evident in
that person did not cause the crash; she or he people who see themselves as having a high
just found a flaw in the system that was
degree of competence in their profession and
inadvertently created by the to whom people look for answers. Therefore,
programmer(s).There are times, however, when placing themselves in a learning situation can
crashes occur for seemingly no reason.
be very threatening to their self- image.
Computers, regardless of their manufacturer,
will at some time, for unknown reasons, perform
in a totally unexpected manner (Perry, 1982).
This is as true today as when computers were
new. The good news is that this is much less apt
to happen despite the complexity of today's
computers.
OVERCOMING COMPUTER ANXIETY
The attitudes people have toward computers
range from complete dislike and frustration to
curiosity and excitement. Although the mass
media and personal acquaintances convey
both perceptions, people seem to remember
the negative points more clearly. As with all
new experiences, becoming acquainted with
a computer or learning a new computer
application can produce anxiety. When
computers in healthcare were fairly new, many
studies were done that looked at the attitude
of nurses toward computers (Focus, 1995;

NCM110A - PRELIM 24
time. These computers formed the backbone
of many hospital information systems. Users
used what were technically called videotext
terminals, but often referred to as "dumb
terminals." A videotext terminal consisted of a
display screen, keyboard, and modem or
device that connected it to the mainframe.
Information was entered on the keyboard and
transmitted to the mainframe, which was
located somewhere else, often in the
basement in a secure, temperature-controlled
room. Any processing done to the information
was done by the mainframe, which returns the
results to the screen of the videotext terminal.
This is why you still find the IS departments in the
basement of hospitals.
Minicomputers
TYPES OF COMPUTERS
As computers became more powerful, their
The progress in computers is measured by
size was reduced. The same work done by a
generations, each of which grew out of a new
mainframe became amenable to being
innovation. Computer sizes vary from
accomplished on what was termed a
supercomputers intended to process large
minicomputer. Minicomputers were like
amounts of data for one user at a time to small
mainframes (i.e., they were multiuser machines
palmtop computers. Each type has its niche in
that originally served videotext terminals), but
healthcare. However, it is becoming
they were smaller and less costly unlike larger
increasingly difficult to classify the different
mainframes, they did not require a special
types of computers, because smaller ones take
temperature-controlled room and were useful
on the characteristics of their bigger brothers
in situations with fewer users. As computers
as the amount of space needed for processing
started to be built in many sizes, it became
lessens.
impossible to classify one as a mainframe or
another as a minicomputer; these terms are
seldom used today.
Servers
The functions served by mainframes and
minicomputers today are performed by
computers of varying sizes, which are referred
to as servers. The functions performed by
Supercomputers servers and their powers are as varied as the
needs of the users. These functions vary from
Technically, supercomputers are the most
servers that operate in the mainframe/video
powerful type of computer, if power is judged
text format especially in hospital information
by the ability to do numerical calculations.
systems to those that are just a repository for
Supercomputers can process hundreds of
files (a user-created item) that are "served" to
millions of instructions per second. They are
users who have software that does the
used in applications that require extensive
processing on their personal computer (PC).
mathematical calculations, such as weather
Some servers in the middle of this continuum
forecasts, fluid dynamic calculations, and
may also store the programs that a user needs
nuclear energy research. Supercomputers are
designed to execute only one task at a time; and provide them as needed by the user.
hence, they devote all their resources to this Thin Clients
one situation. This gives them the speed they
need for their tasks. Thin clients are today's version of the video-text
terminal. These are computers without a hard
Mainframes drive and with limited, if any, processing
power. Besides costing much less, thin clients
The first computers were large, often taking up
do not need to be upgraded when new
an entire room. They were known as
software is made available because they do
mainframes and were designed to serve many
not contain any applications. Because they do
users and run many programs at the same

NCM110A - PRELIM 25
no processing, older PCs can function in this Notebook computers do have some
capacity instead of being retired. drawbacks. The screen is usually smaller than
the one in a desktop, and the resolution may
Personal or Single-User Computers not be as crisp. Keyboards are also smaller. The
PCs are designed for one individual to use at a mouse, or pointing and selecting device, can
time. PCs are based on microprocessor be a button the size of a pencil eraser in the
technology that enables manufacturers to put middle of the keyboard, or a small square on
an entire processing (controlling) unit on one the user end of the keyboard, or a small ball
chip, thus permitting the small size. When PCs embedded in the keyboard. Some users
were adopted in business, they freed users purchase docking stations for their notebook
from the resource limitations of the mainframe computers. The computer can be placed in
computer and allowed data processing staff the docking station (may be called a port
to concentrate on tasks that needed a large replicator, or notebook extender), which is
system. Today, although capable of connected to hardware such as a larger
functioning without being connected to a monitor, keyboard, and regular mouse. This
network, in businesses including healthcare, enables the user to have access to these
PCs are usually connected or networked to devices when at their desk, but makes it easy
either other PCs or servers. They still process to remove the computer and enjoy its
information, but when networked, they can portability, albeit, without the hardware
also share data. In information systems, PCs connected to the docking station.
often replace the old videotext terminal and Other Mobile Computers. Again, as the
handle the tasks of entering and retrieving processing power and storage capacity of
information from the central computer or computers increased, there was a demand for
server, although thin clients may be used for mobile computers that were more versatile
this purpose instead. When a full PC is available than laptops. The subnotebook and tablet
on the unit, personnel can use application computer are some of these as are personal
programs such as word processing. PCs are digital assistants (PDAs).
available in many different formats such as a
desktop or tower model, laptops, and tablet Questions
computers. The technical innovation that enables the first
generation of computers (from 1940 to 1956)
Desktop and Towers. The original PC was a was:
desktop model. You are probably familiar with
- The vacuum tube
these. They were placed horizontally on a desk
and a monitor was placed on top of them. As These our computers without a hard drive and
the use of computers became more common, with limited, if any, processing power:
users were reluctant to give up desk space to - Thin client
their computer, and computers that stood
upright, known as towers, were developed. Fears and misconception about using
computer include all of the following, except:
With these, only the monitor needed was on
the desk, while the computer itself stood on the - Computers can increase efficiency
floor, often under the desk. All of the following are examples of hardware
Laptops/Notebooks. As computer usage devices, except:
became popular, people found that they - Word processors
needed the files and software on their Basic Computer Ideas
computer to accomplish tasks away from their
desks. The first computer that made this For most people the inner workings of a
practical was really more transportable than television are a mystery, but that does not stop
portable. Developed in the 1980s, it was about them from using and enjoying television. In the
the size of a desktop and had a built-in same way, it is not necessary to understand all
monitor. Toward the end of the 1980s, the the details of computer technology before it
transportables were replaced by true can be used to great advantage. This lesson is
portables: laptops, or computers small enough intended to give an adequate but not
to fit on one's lap. As technology continued to exhaustive understanding of computers, thus
place more information on a chip, laptops enabling the student to take confident
became smaller. They are now referred to as advantage of whatever computer technology
notebook computers. Some healthcare is available. There are generally two main parts
organizations use notebook computers for to any computer system.
point-of-care (POC) data entry at the bedside
or anyplace where care is delivered.

NCM110A - PRELIM 26
transforming raw data into information.
Examples of applications include spreadsheets,
word processing, games, photo managers, etc

Software can be considered the physiology of


a computer, the instructions that make its
Hardware is the term that describes the anatomy function properly. These pieces of a
physical pieces of the computer, commonly computer are described later in more detail,
grouped into five categories. but it is important to have a mental picture of
1. Input - Data must be placed into the a "computer" before we proceed. It is also
computer before the computer can be useful. helpful to understand some computer
terminology (or jargon) that often overwhelms
2. Memory - All data processing takes place in or confuses.
memory.
Common Computer Terms
3. Central processing unit (CPU) - This is the
"brain" of the computer, which coordinates all • Chip refers to a small piece of silicon that has
the activities and does the actual data electronic logic circuits built into it. A chip can
processing. hold thousands of circuits in something that is
about one-quarter of an inch on each side.
4. Storage - The data and programs can be The chip is the fundamental physical piece
saved for future use. used for computer memory and central
5. Output - Processed data are of little value to processing units.
people unless they can see the data in some • RAM and ROM are the two types of memory
form. that a computer uses. ROM stands for Read-
Hardware can be considered the anatomy of Only Memory. This memory has information
already stored in it by the computer
a computer, its physical, mechanical portion.
manufacturer, and nothing is allowed to
change that information. RAM stands for
Random-Access Memory. This memory has no
information in it but is available for any
program to store information.
• Bit is the smallest part of computer memory. It
can hold exactly one piece of information that
has only two possible values, either a one (1) or
a zero (0). This "two-value" system is called a
binary system.
• Byte is the fundamental grouping of bits used
Software is the term that describes the to make up computer memory. By grouping
nonphysical pieces. It can be grouped into bits together and setting these bits to either 0
two categories. or 1 in different combinations, a coding
1. Operating system - This is the collection of scheme can be built to represent information.
standard computer activities that need to be The byte is the basic measuring unit for
done consistently and reliably. These processes memory capacity or storage capacity.
are the building blocks for computer functions • Kilo, mega, and giga are prefixes that
and programs. Well known examples include represent certain multipliers. Although "kilo" in
Microsoft Windows, Apple OS X, and the open scientific notation means "1000" (103), its value
source Linux flavors. is changed to "1024" (210) when talking about
2. Application programs - These are packages computer memory or storage. Numbers that
of instructions that combine logic and are powers of 2 (e.g., 4 is a power of 2, being
mathematical processing using the building 22) are chosen because the computer uses a
blocks of the computer. Programs are what binary system. Thus, one kilobyte of computer
make computers valuable to people by memory represents 1024 (1 x 1024) bytes, two

NCM110A - PRELIM 27
kilobytes represent 2048 (2 x 1024) bytes, and Across the very top of the keyboard is a row of
so on. One megabyte represents 1,048,576 Function Keys, usually designated as such with
(1024 x 1024) bytes, and one gigabyte labels such as F1, F2, F3, etc. These keys are
represents 1,073,741,824 bytes (1024 x 1024 x used to accomplish specific functions within
1024). Although it is not accurate, most people the context of each software program. When
tend to still give kilo, mega, and giga their using a new software package, it is best to
normal values of 103,106, and 109 when read the Commands & Function Keys pages of
referring to computers. the manual to learn how the F Keys work inside
of the particular program. And finally, there are
• Megahertz (MHz) and gigahertz (GHz)
keys along either side of the alpha layout
describe the frequency that the central which, similar to a typewriter, help to navigate
processing unit's internal clock uses for its timing
around the document. The Tab key helps to
control. insert indents; the Caps Lock will put you into
Computer technology has had an explosive an all bold mode; the Backspace key will
growth during the past several decades. The simultaneously back up your cursor and erase
large computers that used to fill their own the text you just typed; the Shift key is a
special purpose rooms have in many cases temporary capitalization or upper case
been replaced by computers small enough to character of the key; and the Enter key is also
fit on a desk ("desktop" model), on one's lap known as a hard return and designates a
("laptop" model), or in the palm of one's hand deliberate line space.
("palmtop" computers). This trend is expected Questions
to continue. 1. The function served by mainframes and
Questions minicomputers today are performed by
1. A collection of standard computer activities computers of varying sizes, which are
that are the building blocks for computer referred to as:
function and programs best describes: - Servers
- Operating system 2. Fears and misconception about using
2. this refers to the physical piece of the computer include all of the following,
computer: except:
- Hardware - Computers can increase efficiency
3. the basic measuring unit for memory 3. The technical innovation that enabled the
capacity or storage capacity is the: first-generation computers (from 1940 to
- Byte 1956) was:
- The Vacuum tube
Keyboard
Mouse
The keyboard is the primary data entry tool for
every computer. Commonly, keyboards consist The Mouse or clicker as it is known in some
of an alpha, typewriter formatted layout. Most places, is the small, palm sized device created
have an accounting/calculator type of by the industry to help the user short cut
numeric pad to the right of the alpha layout for command keys on the keyboard, and to
easy financial information entry. Additionally, navigate around computer software, an
there is a numeric/symbols row across the top internet page, or a document.
of the alpha layout, very similar to a typewriter. Click is the primary function of the mouse. The
Between the alpha and the user simply points and clicks onto whatever
calculator/numeric pad on a keyboard is a set they desire to see. On the internet and in
of page command keys. These usually control software documents, a double click is required
the page, such as Insert, Delete, Home, End, to open the page or document. Most mouse
Page Up and Page Down. In this general area designs have a left button, right button, and a
of the keyboard, also reside directional arrow roll button on the top center of the mouse. The
keys that help you to navigate around the left button is for the click and the double click
page of your document or website. functions, and the right button is for Reveal or
Copy codes in internet pages and software
screens.

NCM110A - PRELIM 28
then the computer will not start up correctly
and possibly not at all.
Questions
1. The primary function of ROM in the CPU is
to:
- Store the programs which boot-up the
The roll button on the top and center of your computer
mouse is for quick scrolling through a page. This 2. A computer’s RAM::
saves the operator grief when using the scroll - Determines the size of programs the
bar on the right side of the monitor. Some scroll computer can use
bars can be awkward. It is also helpful when 3. The CPU is often referred to us:
copying large amounts of text that require - The brain center
rolling the page down, since it makes it easier Processors
to copy and scroll without having to use the
side scroll bar. Memory
Questions The two basic types of memory, ROM and
1. This is the primary function of the mouse: RAM, were defined earlier. Generally, a
- clicking computer has a sufficient amount of ROM built
2. A double click on the mouse will: in by the manufacturer. ROM is preloaded with
- open a page or a document the low-level logic and processes needed to
3. This part of the mouse is used for quick start the computer when its power is turned on
scrolling: (a process called "booting up"). Most
- roll button computers also have a starting amount of RAM
preinstalled. RAM can be purchased
Central Processing Unit separately, though, and installed as needed.
The CPU of a computer is often referred to as Application programs are loaded, when called
the brains or the brain center. Technically, the for, into RAM. The program executes there and
term CPU is an abbreviation for Central stores information in other parts of RAM as is
Processing Unit. Also known among computer needed. Today, application programs have
geeks as the box, the CPU is housed inside of growing RAM requirements as more logic and
metal housing which usually includes floppy functions are packed in them.
drives, hard drives and other peripheral. Central Processing Unit
The CPU itself includes what is known as the The CPU of a computer is often referred to as
motherboard of the computer - the central the brains or the brain center. Technically, the
board which holds all of the computer's RAM term CPU is an abbreviation for Central
[random access memory] and all of the Processing Unit. Also known among computer
related components such as cooling fans, geeks as the box, the CPU is housed inside of
resistors and other electronic parts which metal housing which usually includes floppy
cause the computer to function properly. The drives, hard drives and other peripheral.
computer's RAM size determines the size of
programs the computer can use. Generally, a The CPU itself includes what is known as the
software package will have a RAM quote on it motherboard of the computer the central
- that is, the amount of RAM necessary to board which holds all of the computer's RAM
operate the program. A computer operator [random access memory] and all of the
must check the software requirements for RAM related components such as cooling fans,
against the system's known size. Most programs resistors and other electronic parts which
today require no more than 512MB [mega cause the computer to function properly. The
bytes] of RAM to operate. computer's RAM size determines the size of
programs the computer can use. Generally, a
Also contained in the CPU and the software package will have a RAM quote on it
motherboard, is the computer's ROM [read - that is, the amount of RAM necessary to
only memory], another essential component of operate the program. A computer operator
the computer's brains. The ROM functions in must check the software requirements for RAM
the motherboard to contain or store the against the system's known size. Most programs
program or programs which boot-up [or start today require no more 512MG [mega bytes] of
up] the computer. Anytime the ROM in a RAM to operate.
computer is damaged on the motherboard,

NCM110A - PRELIM 29
Also contained in the CPU and the operation:
motherboard, is the computer's ROM [read - internal memory unit
only memory], another essential component of 2. this element of central processing unit
the computer's brains. The ROM functions in perform all mathematical operations:
the motherboard to contain or store the - arithmetic logic unit
program or programs which boot-up [or start 3. the basic elements of a CPU include all of
up] the computer. Anytime the ROM in a the following, except:
computer is damaged on the motherboard, - special purpose register
then the computer will not start up correctly
and possibly not at all. Storage

There are several types of CPU chips. In the The memory of a computer is not the place to
personal computer world, the Intel Corporation store information and programs for a long time.
is probably the most recognized manufacturer ROM is read-only (unwritable) and therefore
with, first, its 80 x 86 series of CPU chips (i.e.. not of any use. RAM holds programs and
80386,80486,...) and then its Pentium chip (i.e., information but only so long as the computer is
Pentium 4 or P4) series. In the large computer turned on; once turned off; all information in
world, IBM (International Business Machines) is RAM is gone. Therefore other means are used
probably the most recognized name. for long-term storage, the most common
technologies being magnetic, optical, and
One measure of CPU processing capacity is special nonvolatile memory.
called MIPS ("millions of instructions per
second.") Although not a totally accurate
measure, it is useful to see the growth of
processing capacity over time. Intel's 80386
chip, produced in 1985, was rated at 5 MIPS.
Intel's Pentium chip, introduced 8 years later in
1993, was rated at 100 MIPS-about 20 times
faster. Intel's Pentium 4 chip, made 7 years later
in 2000, was rated at 1700 MIPS.

 Hard Drive is the computer's primary data


storage unit. The hard drive generally holds
all of your programs and all of your
created, downloaded and saved data.

 A flash drive is a small, portable drive that


can hold as much as small hard drives
[internal drive]. Most flash drives are the size
of a small cigarette lighter and fit in the
All CPUs have three basic elements: a control
palm of your hand. They come in several
unit, an arithmetic logic unit (ALU), and an
popular sizes, most commonly: 512MB; 1GB;
internal memory unit. The ALU performs all the
and 2GB. They range on average from
mathematical operations, the control unit
$19.95 to $99.95 and are popular among
determines where and when to send
the jet set, executive crowd. Memorex
information being used by the ALU, and the
gives theirs a standard dog-tag styled neck
internal memory is used to hold and store
information for those operations. The CPU has rope similar to company security passes
an internal system clock that it uses to keep that makes it easy to carry and access.
everything in synchronized order. The clock's Flash drives have replaced the older floppy
speed is described in terms of frequency, using drives, they are easier to use and they hold a
megahertz (MHz) or gigahertz (GHz), so a CPU lot more information on them. They are quickly
might be described as having a clock speed inserted, accessed, and removed from most
of 450 MHz or 2.4 GHz. Generally, the faster the small and personal computers. Older
clock, the faster the CPU can process computers have their USB ports in the rear of
information. the CPU [where the power cord plugs in], while
Questions the newer computers have the USB port in the
front, next to the CD drive. The USB port is what
1. This element of the central processing unit
holds and store all the mathematical the flash drive plugs into directly.

NCM110A - PRELIM 30
The cool thing about the flash drive, other than Questions
its portability, is that when you plug it in you do 1. All of the following are storage devices that
not have to go searching to find it in the store information magnetically, except:
computer. The USB port on any computer will - Compact disc-recordable
automatically prompt the computer to pull up 2. A flash drive is plugged into a/an:
the flash drive for the user. From that point, you - USB port
simply click and select your file to use or save. 3. A computer's primary data storage unit is
the:
 CD drives read documents saved on CDs
- Hard drive
[compact disk]. A CD will hold up to 700MB
of information on it. Most CDs are not Output
erasable, so they do not yet have the
flexibility of the earlier floppy drive.
However, the CD is a more reliable storage
tool because it is sealed into a digital
format. Unless you break your CD, the
information is relatively safe.
 Monitor is the visual display screen for the
Most computer programs and teaching contents of the computer and the data
programs are sold on CD. When you buy a being worked on or viewed. It is similar to a
new computer program, you download it from television screen and it displays the
a CD and the CD serves as your backup computer's content at a comfortable
information. If your computer has a CD burner brightness and resolution.
in it, then you can also make CDs of anything
you create. You create the file, save it, and The older monitors are large and bulky like
burn it into a new CD. Then it is available to a small office machine. Jokingly referred to
share with others on their computers. by geeks as "boat anchors", the older, large
 Floppy Drive is an older type of information monitors are on their way out of popular
saving device that is still peripherally in use. use. The newer monitors are similar to the
Generally, a floppy disk is a 3.5 inch disk newer televisions in that they are light
encased in plastic with a sliding access weight and slim. Generally, the newer
panel for the computer to read the monitors weight under 3 pounds, are 4
information from. Users insert a floppy disk inches or less in thickness, and are referred
into the floppy drive, usually located on the to as flat screens. The most common sized
front panel of your CPU, and save data monitors used in small business and home
onto the floppy for use at their computer operations are 15", 17" and 19"
convenience and in other locations. screens.

Today, the CD drive and the flash drive are Monitors can be adjusted internally to
replacing the floppy drive. However, there are accommodate the operator's comfort level for
still quite a number of small businesses and viewing. The lower the resolution selected, the
personal computer users which rely on floppy larger the lettering is on the screen. Most
drives to save their creations and company monitors can be adjusted for a resolution level
information. between 600 * 800 pixels [micro dots per inch]
to 1280 * 1024 pixels. There are two reasons to
 Removable Disk Drive is the same kind of adjust the resolution:
device as a hard disk drive with similar
storage capabilities. The difference is that 1. Size and/or use of the monitor - larger
the magnetic storage media can be screens require smaller resolution, and
removed and replaced, just as with a gaming programs require smaller
floppy disk. resolution for the best experience.
2. To make the user more visually
 Tape describes a medium that can comfortable - smaller resolution will
magnetically encode a lot of information. cause the letters in any screen to
In many ways, tape in a computer system is appear larger.
used like audio tape. Computer tape is
To find the adjustment page screen for a
typically used to store a copy of important
Windows XP computer, go to the Start button
information, to be recovered in case of a
on the bottom left of the Task Bar, click onto
major problem with the computer. Tape is
the Start button and go to Settings, and then
packaged in various ways, from large reels
to Control Panel and click. You will open the
to small cartridges. Tape is reusable. Control Panel's selection of options. Double

NCM110A - PRELIM 31
click onto Display, and you will open the Operating Systems
Display Properties. From this point, you want
There are (5) five basic types of operating
to select the Settings tab. On the left side of
systems (OS) used in small office and home
this screen, about midway down, you will see
computer systems today. They are:
a slide bar which will allow you to adjust the
resolution. Slide to smaller or larger, 1. DOS - Disk Operating System. This is the
according to your need, and then click onto system of most home computers.
Apply. From here you can close out of the 2. MS DOS - Microsoft's version of DOS. If the
entire Control Panel and your computer will home computer is made by Microsoft, or if
automatically update according to your it operates on a Microsoft based system
changes. such as Windows XP or any of the Windows
series, then it operates on MS DOS.
3. UNIX - A widespread operating system used
Visually impaired individuals now have options
primarily in businesses. Originally developed
not available 10 years ago for their computer
by engineers at Bell South in the late 1960's.
use. Included in these options are:
4. Linux - A derivative of the UNIX system,
o Screen readers - which will read the developed into a more flexible system in
information displayed on the screen to the the early 1990's. This is an up and coming
visually impaired user. OS that is starting to take hold in the
o Text readers - which will read text out loud marketplace.
that is typed into the user's keyboard, a text 5. The Mac OS series - Used by owners of
reader also reads out loud emails and Apple's Macintosh series of computers
common word processed documents, and a.k.a. Apple or Mac.
o Screen magnifiers - which magnify the
Although operating systems experienced
content of the screen from 2X to 16X its
growth, transitions and transformations since
original size.
the early days of the 1960's when they began
Monitor is the most common way a person sees to develop in competitive avenues of the
the information and instructions on a marketplace, those listed above dominate the
computer. Historically, on desktop computers marketplace today.
the monitor looks like a television screen and
Questions
uses the same display technology as a
1. Linus is a derivative of:
television. On laptop computers ("small enough
- UNIX
to fit in your lap"), the monitor is a flat screen
2. Window XP operates on:
that uses liquid crystal display (LCD)
- MS DOS
technology. This LCD technology is increasingly
3. All of the following are example of
being used in desktop monitors as well. Some
operating systems, excepts:
other names for the monitor are VDT (video
- Apple
display terminal), CRT (cathode ray tube),
screen, and display. Microsoft Windows Operating System
 Printers and plotters are two ways by which Because GUIs are easy to use, most healthcare
the computer can put the processed information systems use a GUI operating
information, such as a report or a chart, system, usually a version of Microsoft Windows.
onto paper for people. The most common For this reason, as well as the computer fluency
output device in offices is the laser printer, demanded of healthcare professionals, it is
capable of putting either text (e.g., a appropriate to review some basics of using
report) or graphics (e.g., a chart) onto Windows. When a PC is turned on and finishes
standard-size paper. booting (often a three- to five-minute
Questions process!), the screen that appears is called the
1. The lower the resolution, the: desktop. The desktop has icons representing
- Larger the letters many of the application programs that are
2. All of the following are possible alternate installed on the computer. Below these icons is
names for a computer monitor, except: the name of the application that the icon
- Graphics engine represents. When "clicked" (putting the mouse
3. Light weight and slim computer monitors pointer on the icon and left clicking), the
are commonly referred to as: program the icon represents will open.
- Flat screens OPENING A PROGRAM IN A PC
Types of Operating Systems

NCM110A - PRELIM 32
As with all things with Microsoft Windows, there In the context of a PC, the term "windows" may
are several ways to start a program when using refer to the operating system or to the various
a PC. Clicking the icon on the desktop, content boxes that appear on the screen.
mentioned earlier, is often used when the Each program that is open creates its own
computer is first turned on. If an icon for the window and places a tab on the task bar on
desired program is not on the desktop, the user the bottom of the screen. If a word processor
should click the Start button, then click All and a spreadsheet program are open
Programs and click the name of the program simultaneously, two program windows are
on that list. The Start button, so called because open; both may or may not be visible on the
it "starts" processes, is located in the lower left screen at the same time. Closing the window in
corner of the screen. In Windows Vista, the start any program involves clicking on an X in the
button is the Windows logo surrounded by a upper right corner of the screen. In some
blue circle. Some programs that are together programs you will see two Xs, one on top of the
in a suite such as Corel Office, Lotus SmartSuite, other (see Figure 3-3). In these cases clicking
or Microsoft Office may require that the folder the top one, which is usually red, will close the
containing all of them be opened, then the program itself and all the files that are open in
program selected from the secondary menu that program, while clicking the lower one will
contained in the folder. In XP, this will be close only the file that is open, leaving the
indicated by a black triangle mark pointing to application itself open. If there is only one X,
the right. In Windows 7, a container or more clicking it will close that file and instance of the
programs will be the folder icon as seen in program.
Figure 3-1. In either case, clicking the container
Looking at the task bar at the bottom of the
will show the programs with that folder, and
you can make your selection from there. screen tells you how many instances of each
Microsoft program are open, and any other
WORKING WITH A PROGRAM IN A PC programs that are open. When so many
programs are open that there is no room on
Once a program is opened, you will see the the task bar, multiple instances of the same
work screen, which may look like any of those program will be grouped under one icon
in Figure 3-2. The choices on the menu bar can meaning that you will have to click that tab
be clicked for a menu of features classified by
and select which file you wish to use for that
that choice. If you are using Microsoft Word
program.
2007, the menu bar is replaced with tabs,
which when clicked have icons for the features
classified under that tab. When first starting to
use a new application program, or a major
update, using Help to find the feature you
want is often necessary.
All programs will have a symbol, which
represents the mouse pointer, the shape of
which may vary according to the task and the
program. In some cases it can be changed by
the user. In word processing software it is often
a vertical "I" bar; in spreadsheets it may be a
large plus sign; and in a presentation or
graphics program, an arrow. Although many
choices on the top of the screen may be
represented by icons, if you rest the mouse
pointer on an icon, after a few seconds words
describing what the icon is will appear.
MULTIPLE WINDOWS
One of the advances of GUIs over DOS
included the ability to have multiple programs
open at the same time and to easily move
data between them. This makes it possible to
copy a graph from a spreadsheet into a word
processor.
Closing Files and Programs

NCM110A - PRELIM 33
said to be "minimized." This holds true whether it
takes up almost the entire screen or is reduced
to just the title bar (see Figure 3-4). You can
maximize it by clicking the square in the upper
right corner of the screen and minimize it by
clicking the 3D square that replaces the
original square when the window is maximized.
In a minimized format, you can place your
mouse pointer on the sides of the window until
it becomes a double-edged arrow, then drag
the side to change the size of the window. To
move a window, place the mouse pointer in
the title bar, or the top line of the window that
has the name of the program and often of the
file itself, and drag the window wherever you
want it. If the windows overlap, the window
that is the active window, or the window in
which you are working, will be on top. Clicking
in a window makes it the active window. If the
windows are side by side, the active window is
the one where the mouse pointer is, although
sometimes the title bar will be a little darker in
color in the active window. Placing windows
side by side or one on top of the other can be
very useful when working on two files in the
same program, or needing to synchronize files
from different programs.
Navigating Between Programs and Files
One of the hardest things to grasp for new
users of GUIs is that not only is it possible to
have many different windows open at one
time, but using this option is an aid to
productivity. As mentioned earlier, when you
have more than one program or file open, the
program name will be on the task bar, which is
at the bottom of the screen. If this line is not
visible, place your mouse pointer on the
bottom of the screen, and it will appear.
Part of the left side of the task bar is the Quick ACCESSORIES AND UTILITIES
Launch bar to which you can drag icons either
from the desktop or the program list for Operating systems usually come with some
programs that you frequently use. Then instead utilities and built-in software. Certain utilities are
of using the desktop or All Programs from the helpful with disk maintenance, such as the disk
Start button to open a program you can click utilities ScanDisk and Disk Defragmenter.
the icon in the Quick Launch bar that Additional accessories such as Paint, a simple
represents the program you wish to open. If drawing program, allow a user to create
you can't remember what the icons represent, drawings or various shapes, such as circles,
rest your mouse pointer a second or two on it squares, or triangles, in any of the colors
available in the program. Also available are
and the name of the program will appear.
writing accessories such as Notepad, a
MAXIMIZING AND MINIMIZING A WINDOW product that is useful in creating files in ASCII
(American Standard Code for Information
Not only does Windows allow you to have Interchange), which is a format that can be
more than one window open at a time, it lets
read by many different programs.
you see multiple windows at the same time.
Often when you open a program, you will see EXITING WINDOWS
that it does not take up the entire screen. You
In the earlier sections we have discussed how
may even see another program, or the
desktop behind it. In this format, the window is to close a file on which you are working, and
how to close a program. Before shutting down

NCM110A - PRELIM 34
a computer, it is necessary to exit Windows.
Although invisible to users, Microsoft Windows,
like all operating systems, actually works very
hard behind the scenes to provide its many
functions, as do many of the application
programs. To do this, application programs
 Graphical User Interface (GUI) Software - is
and Microsoft Windows have to have easy
a special type of software in common use
access to specific information. Often, this is
today. It can be part of the operating
accomplished by creating files on the hard disk
system software, or it can be a complete
of the information that the application needs
application program on its own; at times, a
to use. These files are temporary and unknown
GUI (pronounced "gooey") seems to
to the users. They are created, changed, and
straddle the line between operating and
deleted as users change what they are doing.
application software. The basic design of
Before quitting Windows, the application
any GUI is that it stands between the
programs need to be able to shut these files
operator of the computer and the
down. If users do not exit all programs and
computer itself and acts as the go
close Microsoft Windows properly, these
between. Any GUI has two primary goals:
temporary files are left on the disk and can
(1) to shield the operator from needing a
cause problems as well as fill up your hard disk.
great amount of technical knowledge to
To exit Windows and shut down your computer,
use the computer effectively and correctly;
click the Start button in the lower left corner of
and (2) to give a consistent "look-and-feel"
the screen, select Shut Down from the menu
to application programs (if they are
and let the computer go through the
designed for it).
shutdown process, which may take a minute or
more. If during the time you have used the Accomplishing the first goal means that an
computer, a program or the operating system operator can perform all necessary technical
has downloaded some updates, you may see tasks (e.g., copying data files between disks,
a message that files are being updated, backing up information) by pointing at icons
please don't turn off the computer. This (small pictures) on the screen. These icons
message may or may not add that the represent tasks that can be done. For example,
computer will be turned off by the program, by pointing to an icon that represents a
when the installation is complete, but in most desired data file and then dragging that icon
cases this will occur. over onto another icon that represents a
printer, a person can print the file.
Questions
1. This term may refer to the operating system Note that because of the GUI's capabilities, the
or to the various content boxes that appear person did not have to know the correct
on the screen: operating system commands to print the file.
- Windows Accomplishing the second goal means that
2. All of the following are built-in software any application program can be designed so
bundled with most operating systems, it is less difficult for a person to learn how to use
except: it. Basically, the GUI defines a standard set of
- A spreadsheet application functions that it can provide (e.g., open a
3. This show how many instances of each data file, save a data file, print a data file) and
Microsoft program are open: gives standard ways for application programs
- Task bar to use these functions. If application programs
are designed and built to use these functions,
Types of Software a person has to learn only once how to open a
 Application Programs are packages of data file. Any other program that uses the GUI
instructions and operations that take raw functions has the same "look-and-feel" that is, a
data and process them into information. person can open a data file in the same
Applications focus on working with people manner. Doing things in a consistent,
to produce information that is important to predictable way not only reduces a person's
them. Some examples of applications are learning time but increases a person's comfort
word processing, spreadsheets, and level and productivity.
desktop publishing.  Databases and Relational Database
Management Systems - A database is a
data file whose information is stored and
organized so it can be easily searched and

NCM110A - PRELIM 35
retrieved. A simple analogy is a filing 4. Linux - A derivative of the UNIX system,
cabinet drawer. developed into a more flexible system in
the early 1990's. This is an up and coming
The difference between a file and a database OS that is starting to take hold in the
is the same difference between a file drawer marketplace.
that has reports dumped into it in any old way
5. The Mac OS series - Used by owners of
and a drawer that has neatly labeled file Apple's Macintosh series of computers
folders, arranged in meaningful order, with an a.k.a. Apple or Mac.
index that shows where to store a report. In
both cases, we know the information we need Questions
is in the file drawer-only in the second case
(i.e., the database) we are confident that we 1. All of the following are examples of
can find that information quickly and easily. application programs, except:
- Windows 7
2. Database management system can be
best defined as:
- A set of functions that are used and
retrieve information in an organized way
3. Packages of instructions and operations
that take raw data and processes them
into information best describes:
- Application programs
A database management system (DBMS) is a
set of functions that application programs use Most Commonly Used Computer Terms
to store and retrieve information in an
organized way. Over the years, various ways to
organize information have been used (e.g.,
hierarchical, network, indexed). The way it is
used most frequently now is called relational. A
relational DBMS stores information in tables
(i.e., rows and columns of information). This
approach allows powerful searches to be
done quite easily.
 Operating systems are the basic control
programs for a computer. All the basic
logic required for using a computer's
hardware, such as the monitor, the printer,
and the hard drive, is contained in the The terms listed in this lesson are meant to be
operating system. Because the operating beginner's terms only. Reference for more
system handles those computer parts, it is advanced studies of terms and computer
unnecessary for application programs to do jargon are listed at the end of the lesson.
so. An example in the personal computer Included in some of the term's definitions are
world is Microsoft Corporation's Windows helpful information and tips, particularly for
operating system. those terms which require more details.
Backup- A saved copy of your computer hard
drive, temporary files or current project.
Generally, a backup is a digitally saved copy
[on CD] of everything on your hard drive.
Programs such as Ghost will also handle this
task automatically although most home
1. DOS - Disk Operating System. This is the operators perform the task manually
system of most home computers. themselves. It is essential to anyone who
2. MS DOS - Microsoft's version of DOS. If the seriously works on computers to backup their
home computer is made by Microsoft, or if work. Computers crash, accidents happen,
it operates on a Microsoft based system files get erased by the unsuspecting, and work
such as Windows XP or any of the Windows can be forever lost without a backup.
series, then it operates on MS DOS.
3. UNIX - A widespread operating system used Boot up- To start up your computer is to boot
primarily in businesses. Originally developed up your computer. If your computer crashes
by engineers at Bell South in the late 1960's. you may need to use your boot disk, the one

NCM110A - PRELIM 36
that came with your computer system, in order you paid for such as an MP3 music file. If you
to restore your system. go out to the internet, capture a file, and save
it on your computer, then it is a download.
Bug- A bug is an error in programming that was
overlooked. Bugs are the primary reason for DOS- The abbreviation for "Disk Operating
updates that have to be downloaded from the System"; also known as THE Microsoft language.
internet to keep your system up to date and Every product produced by Microsoft is written
running smoothly. in DOS.
Burn- To copy your file or information onto a DVD- An abbreviation for "Digital Versatile Disk".
CD is to burn a CD. This requires a CD burner It is currently the most high powered portable
since not all CD drives have burners in them. storage disk available on the market. The
current maximum storage for a DVD is 4.7GB
Bytes- Eight bits is a byte. Each bit is designated which is more than 5 times the storage space
by a 1 or zero; this is the basis of all written
on a CD.
computer code. Technically, there are
differences, but to the novice, the easy way to e-Book- A book made available online in a
think of it is that a byte is most commonly a digital format; also known as an "electronic
letter, punctuation or space. book". The e- Book is the most progressive
format for the book publishing industry, yet it
CD- Compact disk; a small, plastic disk which
suffers certain obstacles such as appeal to
retains information in a digital format [there are those over 30, portability, and the comfort
a variety of digital formats which can be
factor to name a few.
recorded on a CD]. The CD superceded the
floppy disk because it encases the saved Email- Online electronic communication
information in a hard plastic that is between people in different locations. Most
impenetrable without excessive force. It is commonly email is provided for and supported
virtually weatherproof and cannot be easily by large search engines, individual websites
destroyed. and public library accounts. Some of the best
places to look for free email providers are:
Chat Room- An online forum in which people
[usually adults although some young adult  Google - http://mail.google.com
forums exist] can talk to one another instantly  Yahoo - http://www.yahoo.com
via a login and password system. Most chat  Free ----- Email ----- Provider's ----- Guide -
rooms cover specific topics: consumer advice http://www.fepg.net/providers.html
or advocacy; dating; politics; religion;  EmailAddresses.com -
technical information; and others. http://www.emailaddresses.com
Crash- For the computer to crash is to have it Flash Drive- A flash drive is a small, portable
suddenly stop working and refuse to restart. drive that can hold as much as small hard
Indications of this are that you cannot get it to drives [internal drive]. Most flash drives are the
boot up, you cannot get it to reboot, you size of a small cigarette lighter and fit in the
cannot access your files, or it will not give you a palm of your hand. They come in several
prompt in DOS. Usually, if your system crashes, popular sizes, most commonly: 512MB; 1GB;
the information on your hard drive is gone and 2GB.
forever unless it is backed up somewhere.
Folder- A file; a place to store your documents.
Doc File- A doc file is usually a reference to the Located in the directory of your hard drive
Microsoft Word program in which a document [a.k.a. C drive].
is saved with a file extension of .doc. Doc files
are some of the most common files sent in Format a drive- To prepare a disk for use.
emails and used to transfer information from Gigabytes- 1024 megabytes or approximately
person to person in the internet. 1 billion bytes [characters].
Download- A download is a program, a Questions
program update, a file, or anything transferred 1. Online electronic communication between
via email. Some of the big search engines like people in different location is best
Google and Yahoo have downloads for their described by:
customers on a regular basis to update the - Email
customer's version of the search engine 2. This is a book made available online in a
program. A file sent from one person to digital format:
another in the internet is generally called a - e-Books
download. A download can also be a file that

NCM110A - PRELIM 37
3. Bugs refers to: Phish- Hackers and others bait email users to try
- Errors in a computer program to attain the user's personal identity and credit
card information for the purposes of
Computer Terms II perpetrating fraud and/or identity theft.
Hard Drive- The hard drive is the computer's Phishers also post fake websites that look
primary data storage unit. The hard drive identical to the real ones so they can trick users
generally holds all of your programs and all of into giving their credit card information.
your created, downloaded and saved data. Program- Also known as software, a program is
Hardware- Hardware is all of the physical, a set of commands, written in a computer
tangible elements of your computer. language, which instructs the computer to
function in certain ways. Examples of common
ISP- Information Services Provider; the programs include the Windows collection of
company that brings your computer services to popularly used products such as, MS Word for
your house or business. ISPs are very similar to everyday document production, MS Excel for
your phone or electric company in that they everyday accounting calculations and
provide a specific service. Most ISPs utilize your spreadsheets, and MS Access for everyday
current phone cabling or your database creations for small offices.
satellite/television cabling to provide their
services. Reboot- Reboot is what a computer operator
does when his or her computer crashes or
JPEG File- Joint Photographic Experts Group is suddenly shuts down and stops working.
the name of the committee that wrote the file
format that is now in widespread use for most Snail Mail- Snail mail is opposed to email which
online photos that are shared or posted on is fast, almost instantly and electronically. Snail
public sites. This is a file type in which you will mail is your regular paper delivery mail service
save most of the photos that you use in your in your country.
computer. Surfing- Surfing is what computer operators do
Laptop- A small, self-contained computer that when they go online via the internet and do
can fit in your lap. Generally used for mobile searches for various needs or topics. Surfing is
purposes such as business or travel. what you are doing when you are looking for
what you need; similar to shopping, except it is
Megabytes- 1024 kilobytes; 1 kilobyte is 1024 the web version.
bytes.
Text File- A text file [.txt] is the most common
Modem file used. It is also the most adaptable for
anything you want to use the contents for in
A communications medium between your
the future.
computer and the ISP, most commonly
contained in a box that connects to your Trojan- A Trojan is a hidden program inside of
computer with Ethernet cables and phone another program, usually serving a good
cables. The exception to this is the FIOS [fiber purpose. However, in reference to email and
optic cable] services available from Verizon. the internet, a Trojan is commonly a particularly
nasty type of virus that comes in via a hidden
Network- The computers in your home or
method.
business which are all connected together.
Virus- In computer usage, a virus is computer
PDA- Also known as a personal digital assistant;
code [as a computer user, your concern is for
the most popular ones are the Palm Pilot and
the harmful ones] that is transferred from one
the Blackberry. You can send and receive
computer to another without your knowledge
email and other documents via your PDA.
or permission. Most commonly, the harmful
PDF File- Technically, it means portable viruses that circulate on the internet come into
document format. The .pdf format is used your computer [to destroy it or take personal
primarily on Adobe's Acrobat programs. information from it, etc.] via your email.
Adobe owns the market on this format, and
Questions
provides free readers to anyone online.
1. This file format is used in Adobe’s Acrobat
Without the current Acrobat reader you
programs:
cannot see a .pdf file unless you purchase the
- PDF
Acrobat program for about $450. The .pdf file is
2. A program is best described as:
a common and popular file type for business
- A set of commands written in a computer
forms, e-Books and general mainstream
language
documents.

NCM110A - PRELIM 38
3. Trojan refers to: Small businesses are usually more concerned
- A hidden program inside of a another than individuals about these factors, although
program freelancers, independent contractors and
others who earn their living in a more
Your Data independent way than normal employment
Backup Systems will also find protection a central concern for
them.
The most traditional method of backing up
your data is the disk system. For home Questions
computers and small home offices a floppy 1. Backups for small businesses operation
disk. CD disk, or flash drive is the best method should be done:
for saving a backup copy of your created - Weekly
data. 2. For an average home computer operator,
file should be preserved in:
Innumerable computer operators, authors, - CD backups at least once every 3 months
artists, creators of original works, and others 3. Data is best protected by a number of
have lost their work due to the simple oversight factors, which include all of the following,
of a basic backup system. Any creation of except:
yours, in which you take time to build it and - Portability
store it, is worth saving to a recoverable file.
Terminals, Workstations, Stand-alone
Preserving Your Data
Terminals
The method of backup and storage that you In the early days of computer technology, an
decide to use will determine the quality of organization usually required only a single
preservation for your data. How well your data large-capacity computer to handle its
is preserved determines its use in the future. information needs. These computers were
Therefore, it is worth the effort to keep your called "mainframes." They required a trained
data backed up and preserved in systems that staff to maintain and run them and were quite
have longevity and can be accessed easily for expensive to purchase and upgrade (e.g., add
many years. more memory, more disk storage). People
To the average home computer operator, I gave information and commands to the
would suggest that you preserve your files in mainframe through a "terminal," essentially just
CD backups at least once every 3 months or in a keyboard and monitor; the terminal had no
a flash drive every month. Be sure to store your processing capability of its own. The number of
backup copies in a location off of the premises terminals a mainframe could handle was
of your computer, preferably a safe deposit limited, which created lineups of people
box or a relative's safe in their home. If your waiting their turn to submit computer requests.
home or office were severely vandalized or Workstations
caught on fire, you want your data in an off- Advances in computer technology, such as
site location so that you can recover your IBM's personal computer introduced in 1981,
work. dramatically changed this situation. Now it was
The same is true for small business operations, possible to have a powerful computer right in
except that the backups should be weekly the office and for far less money. What is more,
and definitely stored in a safe deposit box in all its resources and power were under the
your bank or similar financial institution. control of, and totally available to, its user. As
people began to move toward personal
Protecting Your Data computing, computer manufacturers built
more powerful workstations. Soon, these
Data is best protected by a number of factors
powerful workstations became small enough
such as passwords, encryption, storage
to be easily moved, promoting the idea of
location and method. Passwords protect
"mobile computing." Today, laptop computers
accessibility to your data, encryption protects
easily allow computer technology to be
your data from being used by unscrupulous or
available at the point of care.
unauthorized individuals, storage method will
determine your data's ability to survive natural Stand-alone
disasters and weather fluctuations, and By "stand-alone" we mean that all the pieces
location will help to secure your data in dire of a computer that are needed to gather,
emergency situations and other similar process, display, possibly store, and provide an
instances. output of the information are physically
connected; moreover, if needed, they can be

NCM110A - PRELIM 39
moved as a complete unit to another location. to text, the result needs to be checked for
This is the usual setup for most home and small accuracy. Further, unless the form that is
business computer systems. Such a setup is scanned is especially designed for
inexpensive and quite simple to manage. scanning, this free text is unstructured and
Although it makes sense to use a "stand-alone" not easily used for reporting information
computer, it is often better for a computer to from data.
be part of a network.  CLINICAL MONITORS can be part of a
network and monitored at a central
Questions location. They can also be programmed to
The usual setup for most home computer is: provide alarms, either at the central station
- Stand-alone or to individual pagers, when the monitor
shows something beyond the norm. Clinical
A stand alone is a computer: monitors whether attached to a network, or
- That can be easily moved as a complete unit not, can allow patient data such as that
to another location produced by cardiology or fetal monitors to
This was a single, - large capacity computer be directly input to a computer. The
use for bulk data processing during the early advantage of computerized clinical
days of computer technology: monitoring is that it allows one person to
- Mainframe monitor many patients at once as well as
provide notification of problems. It should
Peripherals and Ergonomics never be allowed to reduce nurse-patient
interaction.
Peripherals
Connecting Peripherals
A peripheral is any external device such as a
keyboard, monitor, or mouse, which is A peripheral is connected to a computer
connected to the computer. Because they are through a port. Although today the USB port is
external in desktops, it is easy to see that these the de facto standard for PCs, in the past there
are peripherals. On laptops, however, the were other types of ports such as serial and
connection of keyboards and monitors is parallel. Computers manufactured in the last
internal. In general, peripherals are the devices few years do not have serial or parallel ports.
that allow inputting of data to a computer and
 USB PORT or universal serial bus is a standard
outputting of information from a computer.
that was originally created to connect
Besides these obvious peripherals, there are
phones to PCs in the mid-1990s ("Everything
many others such as printers (output) and
USB... We Mean Everything!"). Lately, it has
scanners (input) that allow humans to use
become the standard port for connecting
computers. Although the CPU would happily
peripherals to PCs. These ports are a thin
complete any instructions it received without
slot, about half inch by one fourth of an
any visible output, users generally want some
inch, which are found on the sides of
type of output, such as what is seen on a
laptops and on the front of newer desktops
monitor or video screen. There are also devices
or towers. The port is designed with a solid
that both input and output information to a
piece in one part, usually the top, so that
computer such as the port to which a printer is
USB device can only be inserted one way.
connected.
The original USB port was capable of
 DIGITAL CAMERAS are finding a place in transmitting data at only 12 megabits
healthcare for purposes such as recording (Remember, it takes 8 bits to form a byte,
the healing progress of wounds. Text which is required to transfer one letter) per
descriptions cannot compare with a second, which made it useful for only mice
picture in letting clinicians and patients see and keyboards ("Everything USB... We Mean
healing progress. Everything!"). This easy connection method,
 SCANNERS take a picture of a document however, created a revolution that resulted
and then allow users to save this as a file. in devices such as flash drives, external hard
Unless there is character recognition drives, and webcams, which needed faster
software available, any text that is scanned transmission speeds. This need was met by
will be in a picture format and uneditable. a new standard, the USB2.0 port, which
Additionally some healthcare agencies are transmits information at 480 megabits per
inputting clinical records to electronic second. The USB connection has largely
health records by scanning free text. Even replaced older serial and parallel
when character recognition software is connectors.
used to translate the words in the "picture"

NCM110A - PRELIM 40
 FIREWIRE originated in the mid-1980s as a additional burdens on healthcare personnel.
high-speed data transfer method for Those planning a system should walk a day in
Macintosh internal hard drives (Nathanael, the shoes of a user or several days in the shoes
2006). Apple presented this technology to of several users before making firm decisions
the Institute of Electrical and Electronics about computer placement. Asking staff
Engineers (IEEE) who in December 1995 nurses and other clinical computer users to
released IEEE 1394, which is an official participate in determining computer
Firewire standard. It was often referred to as workstation design is another way of improving
Firewire 400 and had transfer speeds of 100 ergonomics (Nielsen & Trinkoff, 2003).
to 400 megabits per second. In April 2002,
the IEEE released a new standard for Unfortunately, few studies have been done on
nursing use of computers with most research
Firewire 800, which can theoretically
transfer data at up to 3.2 gigabits per concentrating on seated workstations (Nielsen
second. Although its speed is faster than & Trinkoff, 2003). Some simple things could
USB ports, it is impractical for low-bandwidth improve the work environment of nurses who
document with or otherwise use computers. For
devices. This fact, together with the
knowledge that only Macintoshes include nurses who are on their feet all day, if they are
to chart at the point of care, they need a way
Firewire ports by default, has kept it out of
the mainstream. Because of its superior to be able to sit while using the computer. If
ability to transfer uncompressed video from the computer is also used by those standing,
digital camcorders, it is now found in all an adjustable computer stand could be
employed so that a user who is standing does
modern digital camcorders. Most digital
not have to stoop. Additionally, if the
cameras, however, still use USB to transfer
images because USB ports are today computer is fixed at a height for users who are
standing, a stool should be provided for the
standard equipment on computers.
 INFRARED PORT is a connection on a nurse who uses the computer extensively.
computer that uses IR signals to wirelessly Touch screens and light pens may be ideal for
transmit information between devices such quick entry, but for extended entries, they are
as a PDA and a computer. It has a range of very tiring to the arm. Providing dual means of
entry may solve this situation. Resolution of a
about 5 to 10 feet. Most handheld devices
have the capability to communicate via IR screen is also important. The higher the
resolution, the easier the screen is on the eyes.
ports that allow the device to directly
It is also important to prevent glare on the
interface with another device to exchange
data. screen. In situations where this is impossible, it is
possible to purchase screen filters that will cut
Ergonomics down the glare.
Ergonomics is the science of designing a work More thought also needs to be given to how a
environment so that it is convenient to use and workstation is designed for those who will use a
does not prove injurious to health. Although it is computer for more than four hours a day.
an important consideration for preventive Consideration needs to be given to the posture
health, it is too often overlooked when setting the user will be forced to adopt. The best chairs
up computer hardware. This despite the fact have adequate support for the outward curve
that using a keyboard injures more workers in of the lumbar spine and the inward curve of
the United States than any other workplace the thoracic spine. Studies have shown that a
tool (Bailin, 1995) Even nurses who do not 100 to 110 reclined position is better than an
spend all day at the computer are affected. upright posture (Cornell University Ergonomics
One study from a Scandinavian journal, Web, 2007). The feet should be flat on the floor,
reported by Nielsen and Trinkoff (Nielsen & or a footrest should be provided (Figure 2-3).
Trinkoff, 2003) found that some nurses, even Wrists, knuckles, and the top of the forearm
those who use a computer less than four hours should fall into a straight line while typing
a day, had a 32% prevalence of upper arm (Bailin, 1995). To promote circulation to the
repetitive stress injury, 60% of which was carpal lower arm and hand, the elbow angle should
tunnel syndrome. be open. Both of these can be accomplished
with a negative tilt keyboard (Cornell University
Healthcare agencies, which should be very Ergonomics Web). The monitor should be
concerned about preventing injuries placed directly in front of the user to avoid
associated with any repetitive activity such as neck twisting. Studies have found that the best
typing, could save money by focusing more on
position for the monitor is for the center of the
ergonomics. Computers are supposed to screen to be about 17.5 degrees below eye
facilitate data recording, not impose level and about an arm's length away. The

NCM110A - PRELIM 41
ideal placement of a mouse is on a flat, problem. These conflicts can be caused by
movable mouse platform positioned one to different programs trying to store data in the
two inches above the numeric keypad. same location. If a warm boot fails to notify the
programs that it is time to stop fighting for the
Laptops, under most use conditions, violate all same space and give control back to the user,
ergonomic requirements for computers
the machine must be turned off for a cold
(Cornell University Ergonomics Web, 2004). This
boot.
is caused by the connection between the
keyboard, screen, and computer. If the A bug is a defect in either the program or
computer rests on a table, the keyboard will be hardware that causes a malfunction. It may be
too high for proper arm positioning. If the as simple as presenting the user with a blood
computer is lower, the monitor placement may pressure chart when a weight chart was
require that the head be tilted forward for use. requested, to a more serious defect that
For these reasons, if a laptop is your primary causes the entire system to crash.
computer, to provide more ergonomic working
conditions you should invest in a docking Compatibility refers to whether programs
station. If you carry the laptop and all the designed for one chip will work with an older or
required accessories such as spare battery, newer chip, or whether files created with one
power cord, or external drive weighing 10 version of a program will work with another
version of the same program. Most computer
pounds or more, consider a wheeled carrying
chips and software are backward compatible,
case.
that is, they will work with older versions of a
program or files created with an older version
of a program. Some are not, however, forward
compatible, or the situation in which an older
program does not recognize files created by a
newer version of the same program. This is
particularly true of spreadsheets, databases
and presentation programs.
A driver is a software program that allows data
to be transmitted between the computer and
a device that is connected to the computer.
Drivers are generally specific to the brand and
Computerese model of the device. They may come with a
new peripheral, or can often be downloaded
Many computer-related terms are used in from the vendor's Web site.
discussion, instruction, and advertising.
Although they are not strictly hardware terms, Although the term hacker originally meant a
they can often be confusing. If one watches a person who enjoyed learning about computer
computer when it has just been turned on, one systems and was often considered an expert
will see different types of information flashing on the subject, mass media have turned it into
across the screen. This information is produced a term to refer to individuals who gain
by what is called the "booting" process. unauthorized access to computer systems for
Booting refers to all the self-tests that a the purpose of stealing and corrupting data.
computer performs and the process of The original term for such a person was
retrieving, either from the BIOS or a disk, the cracker. Today, differentiations may be made
instructions necessary to allow the user to start by using the term white hat hacker for a person
using the computer. The term "reboot" means who uses his or her computer knowledge to
to restart the computer. A warm boot is benefit others. Black hat hacker is the term
restarting the computer without turning it off, a used for those who use their computer skills
selection that is offered when one elects to maliciously.
start turning off the computer. A cold boot is When used with a computer the terms logical
starting the computer when the power is and physical refer to where data are located
completely off. Avoid cold boots if you can, in the computer. The physical structure is the
because the jolt of electricity received each actual location, whereas a logical structure is
time the computer is turned on may shorten its how users see the data. For example, when a
life span. Warm boots are often used when a user requests information about laboratory
computer freezes or crashes. It erases tests, he or she may see the indications for the
information in RAM, which often eliminates test, the normal values, the cost of a test, and
memory conflicts that may have caused the the patient's test results. Although this

NCM110A - PRELIM 42
information may be presented as one screen, previous paragraph, the methods used to
which is a logical structure, different pieces will communicate in healthcare are today being
have been retrieved from different files in augmented with computer networking. Since
different locations, which is the physical the first computers talked to each other in the
structure of the information. late 1960s, networking has progressed to the
point where not only computers in an
Another potentially confusing computer term is organization are connected to each other, but
object. Although the more common use of the also institutions are connected to a worldwide
term "object" is for a physical entity, or at least
network known as the Internet.
a picture on the screen, to a computer, an
object is anything the computer can A network can range in size from a connection
manipulate. That is, an object can be a letter, between a palmtop and a personal computer
word, sentence, paragraph, piece of a (PC) to the worldwide, multiuser computer
document, or an entire document. Objects connection - the Internet. Variation in network
can be nested, that is, a word is an object size or the number and location of connected
nested within a sentence object. A paragraph computers is often seen in the name used to
is an object that is contained in a document. denote the network, such as a local area
When an object is selected, clicking the right network (LAN) or a wide area network (WAN).
mouse button presents a menu of properties of A LAN is a network in which the connected
that object that can be changed. computers are physically close to one another,
such as in the same department or building. A
Questions WAN is a network in which the connections are
1. This refers to the self-tests that the computer farther apart. Often, a WAN is an internetwork
performed in process of retrieving, either of LANs. WANS are sometimes referred to as
from the BIOS or a disk, the instruction enterprise networks because they connect all
necessary to allow the user to start using the the computer networks throughout the entire
computer:
organization or enterprise.
- booting
2. This is a software program that allows data NETWORK ARCHITECTURE
to be transmitted between the computer
There are many different variations in how
and a device that is connected to the
computer: networks are constructed, or what is referred to
- driver as their architecture, often depending on the
3. Computer peripheral is: purpose of the network. For a home network, a
- any external device, such as keyboard, peer-to-peer network in which each
monitor, or mouse, that allows input of data connected computer is a workstation is a
normal approach. In this scheme, each
into a computer and output of information
from computer computer can have a shared folder that is
accessible by the other computers. Often, the
Networks network is primarily for connecting to the
Internet or for sharing hardware such as a
A nurse encounters a patient with an unfamiliar printer.
disease. From an email message, the nurse
learns that a document on a computer in Another type of architecture, often seen in
another country has information about caring healthcare agencies, is client/server
for patients with this disease. Within 60 seconds architecture. The principles behind this model
of logging on to the Internet, the nurse prints vary, but for most healthcare applications they
out the document. This ability to exchange are similar to the "dumb terminal" model. A
information on a global scale is changing the client computer has software that allows it to
world. No longer do healthcare professionals request and receive information from the
have to wait for information to become server. The server has software that can
available in a journal in the country in which accept these requests, find the appropriate
they live. Nurses and other healthcare information, and transmit it back to the client
professionals can and do use computers to (Figure 5-1). The client views the information,
network with colleagues all over the world. enters data, and sends it back to the server for
processing. Under this model, the client
Healthcare depends on communication: computer does no processing. Beyond making
communication between the nurse and the the initial request, rarely is any of this process
patient, communication between healthcare visible to the user. Users sometimes have the
professionals, communication about misperception that the software and data
organizational issues, and communication with reside on the computer/terminal that they are
the general public. As you can see from the using, instead of the server.

NCM110A - PRELIM 43
rebroadcast the signal and on their
placement. The distance of a device from the
node will affect both the speed of transmission
and whether one can use the network.
Wireless transmission is less secure than hard-
wired transmission because the signal is
available for use for anyone in range. Security
depends on the network administrators who
follow procedures to secure the transmission.
Many wireless networks, including those at
home, use wired equivalent privacy (WEP), the
goal of which is to prevent disclosure or
modifications of messages in transit. When this
is employed, to connect to a network, a user
must have the WEP key to enter before being
allowed to use the network. In many cases,
There are other variations for networks. A once a WEP key is entered on a computer, the
computer in a healthcare facility may function computer remembers it and will automatically
as a client for the patient care information find it any time a user is in range of that
system, but may have application software network. Another newer, more secure form of
that allows users to do things like word protection is WPA (Wi-Fi Protected Access)
processing, in which case it acts like a regular (Webopedia, 2007). It features improved data
computer. This computer may also be encryption and better user authentication.
networked to another server that stores the files PROTOCOLS
created by the networked computer, or the
files may be stored on the computer that was For networks to function correctly, it is
used to create them. This computer may even necessary that there be agreements known as
be connected to the Internet through another protocols, which prescribe how data will be
server. Printers are usually connected to a exchanged between participating computers.
network so that more than one These protocols include standards for tasks
computer/client can use them. Managing such as how the system will check for
networks is an ongoing maintenance task transmission errors, whether to use data
performed by the network administrator. compression, and if so how, how the sending
machine will indicate that the message it has
CONNECTIONS sent is complete, and how the receiving
Networks are connected physically with a machine will indicate that it has received the
variety of materials such as twisted-wire cables, message.
phone lines, fiber optic lines, or radio waves.  Internet Protocol and Transmission Control
Computers that are wired together are said to Protocol - To ensure interoperable data
be hard wired. When you see the term "hard" transmission on the Internet, the Internet
with another item, this means that the item is Protocol (IP) and the Transmission Control
permanent, or that it physically exists. Most Protocol (TCP), sometimes referred to as
healthcare agency networks, even those that TCP/IP, were introduced in 1974 and are still
use wireless, are hard wired to some extent. in use, although consideration is being
Wireless transmissions are limited in distance, so given to moving beyond the capabilities of
they do not compete with other radio traffic. these two protocols. The IP enables
When a wireless system is installed, nodes are computers to find each other, and the TCP
placed at strategic locations throughout the controls the tasks associated with data
institution, locations that are determined after transmission. Although invisible to the user,
a thorough assessment of the building. A node messages sent on the Internet are not sent
in a wireless connection is a single point on the as a whole. Instead they are broken up into
network that consists of a tiny router with a few what are called packets. Each packet may
wireless cards and antennas. These nodes pick even take a different route to its
up the signals sent by a user and transmit them destination. For each packet, a device
to the central server, or even to another node called a router scans the routes available
for rebreed-cast, and transmit signals back to to the final destination, selects what is the
the user's computer. Successful wireless shortest and the least congested route at
communication depends on an adequate that moment, and then sends the packet
number of nodes or hardware that send or to another router that again makes a

NCM110A - PRELIM 44
decision about the best route at that processes to allow computers to talk with each
moment. This process continues for each other and to share information and programs.
packet until all the packets in a message The communication schemes are properly
reach their final destination. Under this called protocols. This is a standard method by
process, it is not uncommon for packets in a which the computers in a network to talk with
message to take different routes to their each other and pass information around. There
destination. are three main ways to connect computers in
 File Transfer Protocol - Another process used a network: star, ring, and bus configurations.
on the Internet is the file transfer protocol These are called network topologies and
(FTP). This is the method used to download represent different physical arrangements of
files (as opposed to retrieving a page from the computers. As with the physical
the Web) from another computer. Until the connecting medium, each topology has its
early 1990s, this was a manual process and strengths and weaknesses, which must be
users had to learn commands to do it. considered when a network is built.
Today, Web browsers have automated this
process for files that are retrieved from the Benefits of a Network
World Wide Web (WWW/W3). People who The important benefits of a network are shared
create pages for the WWW on their own information, shared programs, shared
computers use an FTP program to place equipment, and easier administration. It is
their files on the server. technically possible for any computer on a
Questions network to read and write information that
1. This is sometimes referred to as an enterprise another computer has in its storage (i.e., its
network because it connects all the hard disk). Whether that computer is allowed
computer networks throughout the entire to do so is an administrative matter. This means,
organization or enterprise: though, that information can be shared
- Wide area network (WAN) among the computers on the network.
2. most networks are physically connected by Programs can also be used by computers on
a variety of materials, including all of the the network, regardless of where those
following, except: programs are physically stored. It is also
possible (and usually desirable) for computers
- Electrical cables
3. This is a single point on a network that on a network to share equipment such as
consists of a tiny router which a few wireless printers.
card and antennas: Technically, any computer on the network can
- Node print its information on a printer that is
physically connected to another computer
Local Area Networks
somewhere else. By sharing expensive office
Definition equipment, an organization reduces its
expenses. Finally, administration of computers
A network is a way to connect computers so on a network is simplified because all the other
several benefits can be realized. Local Area computers can be examined, helped, and
Networks (LANs) connect computers that are maintained from one computer.
physically close together (i.e., in the same local
area). This means not only in the same room Questions
but also in the same building, or in several Local area networks need all of the following
buildings that are close together. LANs use to connect computers, except:
three things to connect computers: a physical - Mainframes
connection (e.g., wire), a network operating
this refers to a computer network that
system, and a communication scheme.
connects computers which are physically close
There are several ways to connect computers together:
physically. The most common method is to use - Local Area Networks (LAN)
category 5 cable and the latest way uses fiber
all of the following are common network
optic cable (light is used in place of electricity).
topologies: except:
The very latest methods are wireless; they use
- Square
either radio transmission or infrared light for the
connection. Each method is suited for different Wide Area Networks
situations and is part of the consideration when
a network is built. Wide Area Networks (WANs) are extensions of
Local Area Networks. There are two kinds of
There are several network operating systems WAN. The first one attaches or connects a
available today that provide the necessary

NCM110A - PRELIM 45
single computer to a preexisting LAN; this kind Client/Server Computing
is called "remote LAN attachment." The second
one connects, or "bridges," two or more As we have seen, computers come in a variety
preexisting LANs. Both WANs allow a computer of sizes and with various processing capacities.
to use information or equipment no matter Some computers are better suited than others
for different tasks. For example, personal
where they are located in the organization. An
interesting point about WANs is the options that computers, because of the physical size of
can be used to connect the LANs. Instead of their hard drives, have a limit to their storage
being limited by the length of cable that can capacity. On the other hand, the large,
be placed between computers, WANs can mainframe-type computer was designed to
communicate via satellite and earth stations. handle tremendous amounts of information
and therefore has large storage capacity.
This literally means that a person could be
using a computer in Africa and working with Where does it make more sense to store a
information that is on a computer in Iceland— large data set?
without knowing or caring about its origin. To This brings us to client/server computing. The
that person, the information appears to be on essence of "client/server computing" is to
his or her computer. assign to each computer the tasks for which it
is best qualified or, in other words, to use the
Open Systems
right tool for the job. Capitalize on the strengths
"Open systems" is the idea that it should be of one computer for task A and use a different
possible to do two things: run a particular computer more suited for task B. A personal
program on any brand of computer and computer works well with people; it is fast and
connect any collection of computers together has color and good graphics display
in a network. However, because of the capability. It could be the primary interface
development of computer technology, this is device for people and computer systems.
difficult to accomplish. Mainframe computers have huge storage
capacity, great speed, and large processing
Most computers were initially developed as power. This could be the place to store,
"closed" systems; that is, a manufacturer built
process, and retrieve information from the vast
the computer, wrote the operating system,
amount of data accumulated by a large
and wrote the application programs to run on organization. In a network, client/server
the computer. Each computer manufacturer
computing makes sense.
saw tremendous sales advantage from this
strategy. The result was several computers that Remote Access Computing
were similar in function but very different in
how those functions were executed. It was not Computers can be connected together in a
easy to buy an application program from a network; but, increasingly, mobile computing
requires that computers be able to access and
vendor and run it on two different brands of
computers. It was a torturous exercise to get connect to other computers from almost
anywhere. This is possible through the use of
any two computer brands to "talk" with each
other. telephone or cable systems and special
computer communication devices called
For people who simply want to buy and use modems. "Modem" is short for "modulate-
computer technology, "plug and play" is the demodulate." The computer that, at the
ideal mode. This means that a computer could moment, is sending information uses its modem
be purchased from vendor X, a second to "modulate" its electronic signal into a form
computer from vendor Y, a program from that can be carried over the telephone or
vendor Z, and a printer from vendor A, and all cable system; the computer receiving that
these parts could be connected and used with information uses its modem to "demodulate"
the same ease that people expect with stereo the signal. Information can be exchanged at
system components. The way to achieve this speeds that allow effective long-distance
ideal is through standards. Just as stereo computing.
components are built to use a standard
voltage, produce or use a standard type of Questions
signal, and connect with standard plugs and 1. Client/server computing is best described
cables, computers and application programs as:
need to use certain standards for - assigning to each computer the tasks it is
communication protocols and file access. This best qualified to do
"plug and play" mode is getting closer today 2. This refers to a computer network that
because of vendors and manufacturers' connects computers across a large
support and adoption of standards.

NCM110A - PRELIM 46
geographical area: to another site, document or format, all of the
- wide area network (wan) previous program's formatting will be stripped
3. Remote access computing is made out of it and will not confuse the new site or
possible with the use of a: document. In other words, you will transfer only
- modem content, not programming. You can then
easier re-format the text to fit the current
Short Cuts and Tips program you choose to use.
This is a small section of miscellaneous short Virus
cuts and computer navigation tips. They are in
no particular order, but will help you as you go When using email, use an email system that will
along in your computer learning. first scan your incoming attachments for
viruses. If you open an email attachment and it
JPEG Files contains a virus, then you will have to clean
If you scan a photo into a .jpg file or .jpeg file, your entire computer.
many times you will find that it is too large [too Secured internet pages - a.k.a. "Secured for
many pixels] to use on public sites [like financial transactions" pages
MySpace, eHarmony and others] where you
would want to use it. The quick way to solve The quickest way to tell if you are on a
this issue is to resize the .jpeg file using one of "secured" page is to look at the top of your
the online services such as Shrink Pictures. page for an "s" in the internet address line. The
Simply go to: http://www.shrinkpictures.com/ "s" should appear behind the "http" and before
and follow their directions. When you finish the colon. Example: The Pay Pal site is
shrinking and saving your new .jpeg file, their https://www.paypal.com. If there is no "s" in this
page gives you an option to delete the file location on the address line, then you are not
from their server which makes the entire on a secured page regardless of what the
practice fairly safe as far as services on the page states in its content. If you post your
internet. personal data to such a page, then you are a
sitting target for identity theft. This is another
Acrobat Reader common way online thieves phish for your
You will not be able to read an Adobe credit card information and personal identity;
Acrobat file without the current reader. Since they make an exact copy of the real website,
Acrobat is one of the more popular files used but they change the address by one or two
on the internet, this will prove to be an essential characters leading you to believe it is just
part of your computer system. Acrobat files are another page of the real site so you will
all the files you will ever see which have a file disclose your information. Look for the "s" in the
name extension [the part of the file name on address line behind the http.
the other side of the period] of .pdf. To Your Online Pseudonym
download the current Acrobat reader, go to:
http://www.adobe.com/products/acrobat/re It may be best to establish a pseudonym for
adstep2.html yourself, complete with an assumed date of
birth, mailing address and phone number. For
Reboot many folks this can be accomplished with a
If the computer is still on, the easy way to PO Box and a cell phone number. The point is
reboot is to quickly and sequentially press your that the fewer places you put your real
CTRL + ALT + Delete keys on your keyboard. This information, the more secure you are on the
is the most common reboot command to give net and less likely someone could use your
a personal computer. If the computer is not on, information for gaining false credit or
then reboot will occur when you turn it back purchases.
on. Questions
Text File 1. An easy way to reboot our filter is to:
- Sequentially press CTRL + ALT + Delete
If you copy text from something on the internet 2. the quickest way to check if you are on a
because you intend to post it in another place, secured page is to:
the best file to save it to is a .txt file. In the - Look for the ‘s’ in the address line behind
Windows programs, the .txt files can be the http
created in Notepad usually under the 3. if you copy text from the internet, it is best
Accessory panel under your Start button. The to save it as a:
reason.txt is the best file to save to is because - .txt file
when you go to copy and paste the content

NCM110A - PRELIM 47
File Saving Tip Questions
1. The file extension of an Adobe Acrobat
When you save any file in your hard drive, you document is:
want to be able to easily locate the file at a - .pdf
later date. You will eventually have files in your 2. The file extension of an Ms. Excel document
drive that are older, outdated or have limited
is:
current use for you. Over the years I have - .xls
created shortcuts for myself in the file name. 3. A notepad document is saved as a:
Some of those short cuts include: - .txt file
1. business acronym in file name;
Computer doesn’t start up
2. addressee's initials in file name;
3. version of the document in the file name; ICE - In Case of Emergency
and
4. date of the file's creation in the file name. This lesson is a small run down of how to handle
emergency issues which can occur. The ones
Example: listed here are those that are most likely to
create panic for new users. Techniques to solve
My business name is XYZ Corporation
each problem are offered; if they do not work
Person I am writing the document to is in your situation, then you will need to seek a
named John Smith local geek to help you.
This is the third version [or third edit] of Computer doesn't start up
the original document
Every computer has an OS disk to use for
Original document is saved/named as: reboot in cases where a crash happens.
Business Plan for John Smith Always insert your OS CD/DVD to reboot if your
computer doesn't start up as normal. If you are
Today's date is March 31, 2008 using a laptop or a PDA and are away from
For this example, I am saving a Word your disk source, then you will need to take
document other measures to reboot in cases of
emergency.
---------------------------------------------------------------------
 Windows - When you turn your computer
Here is how I would name/save the file: on, immediately begin pressing your F8 key
repeatedly until a screen pops up. When
XYZ.JS.v.3.Business Plan.033108.doc
the screen pops up it will give you several
At a glance in my file directory I can later tell options. You want to select Restart in Safe
the "who, what, when and document type" of Mode. This will allow the computer to
the file. This helps to later sort files according to reboot and start up [so you can find your
timing and relevancy without having to open document(s) on the spot]. You do not want
lots of files to find the most recent or most to create documents in Safe Mode, and
appropriate file. you do not want to perform any complex
tasks while on the blink. When you return
Common File Extensions home, or wherever you have your OS disk,
To help you quickly identify file types, this is a then you can use it to reinstall your OS if
small list of the most common types of file necessary.
extensions used in file names, and which  MAC - To reboot in Safe Mode on a Mac,
program they indicate has been used by the hold down the Shift key as you reboot, or
file creator: hold down the "S" key to reboot in Single
User Mode to look through your files and
 .doc - MS Word find your problem. If you are away from
 .pdf - Adobe Acrobat home, it is best to wait until you have
 .xls - MS Excel access to your OS disk before digging
 .rtf - [rich text file] - created most often in through the files to find the problem.
Word - keeps the document formatting
[such as fonts, sizes, layout, etc.] Questions
 .jpg - [a.k.a. jpeg] - created in a JPEG 1. If your computer doesn't start up and you
supported program are using Windows, you should:
 .txt - [text file] - created most often in - turn the computer on then press F8
Notepad or similar tool of Microsoft - strips repeatedly until a screen pops up
out the document formatting.

NCM110A - PRELIM 48
2. If your computer doesn't start up, the first bottom of the General Tab is the information
thing to do is: on your processor and RAM. Close out of these
- do you use the OS disk to boot up by clicking the X in the top right corner of each
3. To reboot in safe mode on a Mac: box. This process is for viewing only. Do not
- hold down the shift key as you reboot make any changes to anything when you
open this up to find it.
Computer takes too long to move/think
The good news about RAM is that it is fairly
If your computer sounds like it is grinding or inexpensive to purchase [about $60 per
thinking and it takes too long to move from 512MB]. The bad news is that unless and until
one point to another, then you have system you become fairly experienced with opening
problems. The specific problem referred to up your computer and making hardware
here will prevent you from opening a changes to it, you will need to pay a service
document, or it will take 15 minutes for the center to install the RAM so that you do not
system to boot up, or some similarly extreme inadvertently fry your motherboard or the RAM.
delay in achieving your decided command to This is one area where it is good to heed the
the computer. warning: If you do not know anything about
• You have contracted through the internet, or the insides of a computer, then do not attempt
through another person's file which you have to install the RAM.
opened, a virus, Trojan, worm or some other Questions
destructive tool and it has corrupted your 1. The best thing to do when you're OS has
computer's OS. In this instance, the virus or been infected by a virus or Trojan is to:
worm, etc. is achieving its goal. You will have - immediately I'll clean up program on your
to immediately run a clean up program on computer
your computer or risk it freezing up completely. 2. The amount of RAM the system can safely
Programs such as Ghost or Norton 360 provide hold is determined by the:
ways to regularly backup your work, so you - computers motherboard and processor
should already have your information secured 3. generate the minimum RAM requirement
and available for emergency retrieval. If you for home computers and small business
haven't installed a program to backup your computer use:
data, then you may lose your documents. The - 512 MB
first thing you should do is reboot in Safe Mode,
and then perform a virus scan in your system. Other Emergency Cases
Most of the antivirus and firewall products now
have a systematic way to isolate viruses in your Display screen turns sideways
system. Use this program tool and you should If your data or visual changes from vertical to
get back to normal. horizontal, then you most likely have given your
• You have installed a program or tool that computer conflicting commands. This can
requires more RAM than your system currently happen when trying to use the CTRL + ALT +
has on it. Large or complex programs use a lot Delete sequence for rebooting. If you
of RAM when your system is up and running, accidentally hit any other buttons, you may
and even more when the particular program is mess up your display screen. If you find you are
open and being used. Too little RAM will freeze reading your screen sideways, then use the
up your system. For today's home computers command CTRL + ALT + Up Arrow, and your
and small business computers, the very visuals should return to normal.
minimum RAM a system should have is 512MB. None of my programs will start
If you install between 2GB and 4GB of RAM on
your system, then you should be somewhat The first thing to do is try to reboot. If after
safe from RAM freezes. Keep in mind that the rebooting you still cannot get your programs to
amount of RAM your system can safely hold is come up, then you have most likely
determined by the computer's motherboard experienced a hard drive crash. The drive will
and processor. If you are running on say an either need repair or replacement. Either way,
older Pentium III processor, then the most your you will need a tech to help fix the problem
motherboard will operate with is 512MB of and to extract or recover your files. This is a
RAM. On the Windows system, you can find time to find your backup CDs.
your processor and RAM information by Exclamation sign in my internet signal/monitors
clicking through the Start button, and then the
following sequence of clicks: Settings/Control You are disconnected from your internet.
Panel/Administrative Tools/My Computer/View Usually this will happen from traffic in your
System Information/General Tab. At the computer area. People will tend to trip over

NCM110A - PRELIM 49
and disconnect your Ethernet connection. If Introduction
you have kids, it is especially good to tack up
your Ethernet wire out of the main traffic area; Internet Fundamentals
be sure not to use a staple gun on the Ethernet Introduction
cable as you could short out your internet
services. If you experience the no signal sign in "The Internet is a worldwide system of
your window often, then it could be because computer networks - a network of networks
you have a very long cable from your box to in which users at any one computer can, if
your computer or it could be that you have a they have permission, get information from
faulty Ethernet cable and it needs replacing. any other computer (and sometimes talk
directly to users at other computers)"
Questions
1. This command is used to flip your display Our world has changed dramatically as the
screen back to its original position: Internet has become more available to the
- CTRL + Shift +Esc majority of the citizens of Earth. As non-
2. The first thing to do when none of your technicians, what we were able to accomplish
programs will start is: at our desks a mere thirty years ago cannot
- Reboot your computer even compare with what we are capable of
3. An exclamation sign in the Internet monitor today. When we thought we were in the jet
means: age - using photocopiers in place of carbon
- You are disconnected from the internet sheets, and making long distance calls via
satellite we were only on the edge of the true
LESSON 4 : POST-QUIZ
age of information, and a technology that
1. Network topology refers to the would change absolutely everything.
communication scheme of computers in a
A result of certain advances in technology that
local area network:
were initially developed to connect smallish,
- FALSE
institutional networks to one another, the
2. When a PC is turned on and finishes
Internet became widely available for general
booting, the screen that appears is called
use in the United States in the 1980s. The
the:
concept, alone, is astonishing, and its actual
- Desktop
implementation even more incredible.
3. You can load as much RAM on your
computer as you can afford: It is tempting to try to describe this global
- FALSE phenomenon in material, tangible terms. For
4. If your display screen goes sideways, the instance, the ageing former Alaska senator,
quick solution is to press CTRL + ALT + Up Ted Stevens once described the Internet as a
Arrow: "series of tubes." For those without a basic
- TRUE understanding of the technology, the Internet
5. This refers to a network in which the is a mystery too deep to fathom. This course will
connected computer are physically close provide you with comfortable and user-friendly
to one another: information that will dissolve some of the
- local area network (LAN) mystery, and give you the ability to speak and
6. This most specifically controls the task think intelligently about the World Wide Web.
associated with data transmission:
- Transmission Control Protocol Before we address the ins and outs of using the
7. Local area networks connect computers Internet, it is very useful to first understand its
that are physically far from each other: inception and, in a basic way, how and why it
- FALSE functions. As we go along, different
8. This is a product that is useful in creating files terminology will be introduced to you, and will
in ASCII format that can be read by many also be incorporated at the end of each lesson
different programs: for reference.
- notepad This course is designed with the assumption
9. The taskbar in windows is by default that the user is already familiar with computers
located: and is seeking to gain a better knowledge and
- at the bottom of the screen grasp of the Internet and its workings.
10. The method used to download files from Therefore, general computer terminology and
another computer is called: instructions are not part of the course. If you
- file transfer protocol are seeking basic operating instruction, refer to
your computer's or Windows' tutorial.
LESSON 5 | INTERNET FUNDAMENTALS

NCM110A - PRELIM 50
Questions Stanford), University of California at Santa
1. This statement best describes the Internet: Barbara, and University of Utah.
- it is a worldwide system of computer
networks With the invention of the Ethernet in 1976,
2. important innovations in the Internet connecting Local Area Networks, or LANs
together became possible. A LAN is a network
generally make:
- the Internet is here to use and faster within in a location that connects its
3. the Internet first became widely available computers. For instance, your local hardware
for general use in the United states in the: store probably has a LAN a system that
connects its computers together. Later, of
- 1980s
course, Wide Area Networks, or WANS, which
History connected users over larger geographical
areas.
Our ancestors would be awestruck by our
ability to communicate almost instantly with In the early 1990's HTTP (Hypertext Transfer
people in every part of the globe without a Protocol) was developed. HTTP is a set of rules
telephone or telegraph, or even a wire at to that "...defines how messages are formatted
bridge the connection. We are able to look up and transmitted, and what actions Web servers
businesses in remote countries; the answer to and browsers should take in response to
almost any question we can think of is at our various commands. For example, when you
very fingertips. We can exchange money and enter a URL in your browser, this actually sends
products, and conduct business without ever an HTTP command to the Web server directing
leaving our desks; we can study and obtain a it to fetch and transmit the requested Web
degree in higher education, invest in the stock page".
market and trace our genealogy with the
In other words, http provides another set of
touch of a button. We play video games with
rules that served to make the Internet easier to
people on other continents and, sometimes,
use for the non- technological user.
find unprecedented wealth using this small
plastic-encased artificial brain, and its You can imagine that each technological
connections to the largest system of networks piece of the Internet puzzle was developed
in the world, which links us to others around the and implemented fairly rapidly, once the idea
globe. caught fire. We will look more closely at the
nuts and bolts of connections later in the
After the Soviet Union sent Sputnik to the moon,
course, but for now, it is enough to know that
the United States government, not to be left
each piece of the development puzzle served
behind, began to step up its efforts toward
to make the Internet more efficient and more
science and research in order to stay ahead of
accessible to people like us!
the game.
The Internet is certainly not a series of tubes,
But, the development of the Internet did not
however, it also is not simply a magical system
happen overnight. The idea of a "Galactic
of ethereal energy. Massive super-computers,
Network" was introduced back in 1962 by
connected with thousands of smaller networks,
J.C.R. Licklider, a head of the computer
in cooperation with one another, form an
science department at MIT who was involved
enormous worldwide network that allows us to
in the US government's Defense Advanced
interconnect globally.
Research Projects Agency (DARPA). He was
able to convince some of his colleagues of the Glossary
feasibility of his idea, but what began to A programmable machine
generate the reality of it was the development, that responds to a specific set
by Paul Barand, of packets of data that could of instructions
switch back and forth between networks. in a well-defined manner and
can execute a prerecorded
Initially, the objective of the research was to
list of
find a way to keep our communication systems
Computer instructions (a program).
intact in the event of an attack on us by a
Electronic and digital, the
nuclear weapon. The government wanted to
actual machinery --
be certain that there was a way to maintain
wires, transistors, and circuits --
control of our ability to strike back.
is called hardware; the
The first packet switching among networks in instructions
1968 connected four major institutions: and data are called software.
University of California at Los Angeles, SRI (in The most common local area
Ethernet
networking (LAN) standard

NCM110A - PRELIM 51
Hypertext Transfer Protocol - Web pages are what make up the World Wide
Rules that define the way web Web. These documents are written in HTML
HTTP browsers and web servers (hypertext markup language) and are
communicate with each translated by your Web browser. Please note
other that a Web page is not the same thing as a
Local Area Network - A Web site. A Web site is a collection of pages. A
network that connects Web page is an individual HTML document.
computers together in a This is a good distinction to know, as most
relatively small area using techies have little tolerance for people who
LAN
private owned mix up the two terms.
communication channels (not http://www.techterms.com/definition/webpag
public satellites or telephone e
lines)
A group of two or more The browser is a program like Internet Explorer
Network computer systems linked or Firefox. A web address, or URL, is the specific
together "location" of a website, and looks something
A piece of data broken down like this: http://www.yahoo.com. We will define
into pieces for transmitting a URL further below.
Packet
over the Internet or another Browsers and search engines, such as Google,
network can be seen as vehicles installed on your
-The application of science, computer which help you travel to the URL
especially to industrial or address on the Internet that you have
commercial objectives. specified - something like getting into a taxi
-The scientific method and and giving the driver an address.
material used to achieve a
Technology NOTE: We will use the word "Google"
commercial or industrial
objective. throughout this course, as we refer to searching
-Electronic or digital products for something. For example, we may suggest to
and systems considered as a "try Googling rabbit hutch,"or some other
group terminology. Because Google is such a popular
Uniform resource locator - An search engine, it is commonly used as both a
address on the Internet, such noun and verb!
URL as http://www.aznet.com, What is the difference between a search
which enables computers and engine and a browser? Sometimes the two are
other devices to visit it. used interchangeably and can be confusing.
Wide Area Network - a Here are Wikipedia's definitions of both
network that connects
WAN
networks over a large SEARCH ENGINE: A program that searches
geographic area documents for specified keywords and
A document on the World returns a list of the documents where the
Wide Web identified by a keywords were found. Although search
Web Page
unique URL(Uniform Resource engine is really a general class of programs,
Locator). the term is often used to specifically describe
systems like Google™, Alta Vista and Excite
Questions that enable users to search for documents
1. “Http” means: on the World Wide Web and USENET
- Hypertext transfer protocol newsgroups.
2. LAN stands for: Typically, a search engine works by sending
- local area network out a spider to fetch as many documents as
3. The set of rules that defines how many possible. Another program called an indexer
messages are formatted and transmitted then reads these documents and creates an
and what option web servers and browsers index based on the words contained in each
should take in response to various document. Each search engine uses a
commands is referred to as: proprietary algorithm to create its indices
- HTTP such that, ideally, only meaningful results are
returned for each query.
THE WORLD WIDE WEB BROWSER: Short for Web browser, a software
Introduction application used to locate and display Web
pages. The two most popular browsers are
Microsoft Internet Explorer and Firefox. Both

NCM110A - PRELIM 52
of these are graphical browsers, which
means that they can display graphics as well
as text. In addition, most modern browsers
can present multimedia information,
including sound and video, though they
require plug-ins for some formats.
www.Wikipedia.com
Once you have typed the keywords "dog food
Question coupon," into this field, Google's™ "spiders" will
1. A search engine can: look all over the web to choose web pages
- search for keywords and generate that make the most sense, and will then list
relevant links them for you. Here is what a typical search
2. Google is an example of a/an: result looks like when your search engine
- search engine (Google™) "finds" what you are searching for:
3. A URL is:
- the address of a website

Smart Spiders
Your browser has transported you to a search
engine. A search engine looks at your chosen See that the search engine was able to locate
keywords and sends out an electronic "spider" an entry that contains the exact same words
that crawls the internet, searching through as your keywords, and this entry is number one
thousands of databases to find the websites on the indexed list. In Google™, you could
that are most relevant to your keywords, and click your mouse on the dark blue hyperlink
then lists them in order of relevance to help that the search engine offers, and you would
you find the site that is closest as possible to be whisked off to the web address, or URL, that
what you are looking for. is displayed in red at the bottom of the entry. In
The address is where? You have seen the this case, the website Google™ has suggested
following rectangular box image at the top of is www.doggiecoupon.com.
your screen, and may be able to look at it right Questions
now. It is the field in your browser that accepts 1. A URL is a:
an "address" to travel to your destination on - website address
the Internet. URL stands for UNIFORM RESOURCE 2. WWW in the world of computers means:
LOCATOR. The "http" part refers to the - World Wide Web
"protocol," which we will discuss a bit later. The 3. URL stands for:
"www, of course," stands for the World Wide - uniform resource locator
Web.
Keywords & Hot Links
http://www.doggiecoupon.com
Is it a "hot" link? How can you tell if a word or
This box, or field displays the address of sentence or image is an active "link?" Links
wherever you currently are on the web. But usually show up in a royal blue color. Another
you can also simply type an address like the way to tell is when you place your mouse's
one above, or copy and paste it into the URL cursor over the text or image, the cursor
field, then press Enter, and you will magically symbol changes from an arrow to a hand. This
be flown to that "address" on the Internet. is your indication that clicking your cursor will
Remember that when you are typing in a URL, transport you to another spot.
it must be exact in order for the browser to find
the site. So, when someone asks you for a URL, What is spider?
you will know they simply want a website A spider is "software that gathers information
address! from the Web and places it into a large
database that it can be searched by search
To find Google™, you would type into your engines" (Gralla p. 395).
browser's URL field www.Google.com. When In other words, a spider is a shopper that
Google™ comes up on your screen, it offers picks out and sorts data that is most relevant
you a simple window wherein you will type to your keywords, and then turns it over to
your key words. your search engine. Easy!

Thinking of the best search terms, or keywords:

NCM110A - PRELIM 53
When you want to search for something on the 1. A hyperlink is:
Internet, try to think of the most basic specific - a word or sentence that takes you to the
words that describe the data you want. Search website when clicked
engines are smart, but they cannot read your 2. Surfing refers to:
mind. Be as succinct as possible, without going - the act of moving from place to place on
into great detail. For instance, "inflatable the Internet searching for topics of interest
beach ball" is better than "12-inch colored 3. This is a software that gathers information
blowup ball for playing at the beach," and far from the web and places it into a large
better than just "ball." If you experiment for a database that can be searched by search
while with key words, you will begin to see how engine:
the search engine takes your requests quite - Spider
literally. It's a good idea to "surf" the Internet in
the beginning, to get the feel of how it is set up Hubs & Routers
and how to find what you want. As we discussed earlier, when we create and
Glossary send data, or electronic information, on the
Short for Web browser, a software Internet, it is broken down into smaller packets
Browser application used to locate and to make it compatible with all the places it
display Web pages needs to travel in order to reach its target.
Hyper-text Markup Language - Packets can be imagined as chunks of data,
Short for Hypertext Markup each carry along signals which allow them to
Language, the authoring cross hubs, routers and other directional
HTML
language used to create hardware, as they quickly make their way to
documents on the World Wide their final destination. (We will discuss packets
Web in more depth later in the course.) The
A link on a web page that sends discovery of packet technology was really
Hyperlink you to another web page or what gave birth to the Internet as we know it.
resource The following excerpt from the Internet Society
Search words used for sorting and reflects the point at which a real Internet
Key Words locating information on the began to take form.
Internet
In hypertext systems, such as the "The objective was to develop communication
World Wide Web, a link is a protocols which would allow networked
reference to another document computers to communicate transparently
Link Links are sometimes called hot across multiple, linked packet networks. This
links because they take you to was called the Internetting project and the
other document when you click system of networks which emerged from the
on them. research was known as the 'Internet"
A website that allows you to (http://www.isoc.org/internet/history/cerf.shtml
Search ).
perform searches throughout the
engine
Internet
The set of scientific rules for the transport of
Software that gathers information
these packets are the Transmission Control
from the Web and puts it into a
Spider Protocol (TCP) and Internet Protocol (IP). You
large database that can be
can think of Protocols as simply the rules that
searched by search engines
govern the transportation of data.
To move from place to place on
Surfing the Internet searching for topics The set of scientific rules for the transport of
of interest these packets are the Transmission Control
A site (location) on the World Protocol (TCP) and Internet Protocol (IP). You
Wide Web that contains a home can think of Protocols as simply the rules that
page, which is the first document govern the transportation of data.
users see when they enter the
Website site, and may also contain Hubs and Routers are Hardware:
additional documents and files You have probably heard the term "hub" if you
Each site is owned and managed work in an office with inter-connected
by an individual, company or computers, or a LAN. The hub is simply a piece
organization of hardware that connects all the computers
to each other on one network. If one
Questions computer is not connected to the hub, it is off
the network and cannot communicate with

NCM110A - PRELIM 54
the others. A hub is generally just a central you who your ISP is, just tell them who it is that
board containing as many outlets as the you pay for Internet services.
network has nodes. The outlets look like a mass
of telephone line plug-ins. In an office, it is WORLD WIDE WEB
normally in a special room where the network's Do not be confused by the term World Wide
server resides. Web. It is not technically synonymous with the
word "Internet," and yet, it is part of the
A router, on the other hand, is most often used
Internet. The Web is a system of interlinked
to connect networks together. Routers are
"hypertext" documents that provide a format
smart. They examine data packets to
determine where they are headed. They then for Internet browsing. Wikipedia quotes a
take a look at the volume of activity that is description of the web as a ""web of nodes"
taking place on the Internet, and make the storing "hypertext pages" viewed by "browsers"
on a network." Simply put, the World Wide Web
decision to transfer the data to another router
closer to the packet's final destination. Routers is a format that allows us to easily view pages
are traffic cops of the Internet. They ensure with text, graphics, sound, video and all kinds
that all data gets sent to where it's supposed to of amazing things.
go via the most efficient route. (Gralla) Domain Name
What are Backbones? The National Science A domain name is part of a URL, and is a name
Foundation, where this packet technology was that is chosen by the owner of a web page or
developed, became one of the largest web site. Many domain names represent more
backbones (or vBNS - very high-speed than one IP address. What that means is that
Backbone Network Services) for the Internet. when a browser takes you to a domain name
Super-computers developed by colossal such as the one we have been looking at, it is
organizations, generally the government, often taking you just to the first page, or
academia, and the military, form the landing page, of a website. Each additional
"backbones" for thousands of internet service "page" within site is labeled differently.
providers (ISPs). While our personal computers
continue to shrink in size, make no mistake TLD Extensions, or Suffixes
these super-computers that form backbones of Let's look more closely at a URL and its
the internet take up the space of large rooms components. When you see a URL that looks
and consist of rows and rows of encased like this, you can assume that this is a business.
technology. Regional commercial internet
providers like American Online and Microsoft
and large utilities such as telephone
companies -- as well as smaller, regional
networks of private and public agencies form
a "loosely organized alliance," each one
funded under different circumstances and for
different consumption (Gralla).
Questions
1. These are sets of scientific rules used to Why? Your clue is the extension, or suffix, which
transport packets: in this case is ".com" or dot com. What.com
- TCP and IP means is that this is a "commercial "web page
2. These are often used to connect networks: and you can be sure that a commercial site is
- Routers in the business of selling something.
3. A pocket is a: If you see a web address that looks like this:
- Segment of data www.puppylove.org, you will know that the
ISP AND URL ".org" extension, or suffix, indicates this site is an
organization of some kind whose goal is not
INTERNET SERVICE PROVIDERS-ISPs profit-making. Likewise, a "gov" extension
indicates a government agency site, an ".edu"
The major internet service providers are folks
extension indicates an educational institution
whose names may be familiar to you. There
site, a ".net" extension indicates that the site
are providers like Yahoo, America Online (AOL)
accommodates a network. Here is a quick list
and telephone companies such as Verizon
of some of the more common extensions, or
and AT&T, who buy access, on a large scale. In
suffixes you may see in a URL:
turn, they often sell to smaller providers, like
local providers who provide connections to a .ca - Canada
region or city. So, the next time someone asks

NCM110A - PRELIM 55
.com - Commercial business Router Hardware that sends packets
to their proper destinations
.edu - Educational institution along the Internet.
.gov - Government agency Super- An extremely fast computer
Computer that can perform hundreds of
.mil - Military millions of instructions per
.net - Network organization second
TCP/IP Transmission Control
.org - Organization (nonprofit) Protocol/internet Protocol - The
communications that underlie
.th - Thailand
the Internet
These suffixes indicate which "top level TLD Top-Level Domain- refers to the
domain" or TLD an IP address belongs to, and Extension suffix attached to Internet
there are only a limited number of these top domain names, such as net,
level domains. com, org, etc
HTTP Questions
We briefly discussed HTTP in Lesson One, which 1. The suffix, or extension of a URL indicates:
means Hypertext Transfer Protocol. It has no - the top level domain of the web page
visible effect on your Internet activities, but you 2. A domain name is chosen by:
should remember that HTTP defines how a - the owner of the web page
message is transmitted and formatted - it is a 3. Petaflop refers to:
set of rules that gives a message to the web - the ability of a computer to perform one
server and tells it to transmit data. A complete quadrillion floating point operations per
URL often, then, looks like this: second

http://www.thepuppyshop.com Connecting to the Internet

Glossary Obviously, you have already connected to be


able to take this course. But connections are
vBNS or Some paid for by the federal an important part of Internet knowledge, and
Backbone government, large agencies, we will discuss them in this lesson. Whether you
such as the National Science are sitting at a computer that is connected to
Foundation, provide a LAN, or you are at your private computer at
infrastructure to connect home, there is a connection being made that
supercomputer centers is much more complex and fascinating than it
around the world might seem.
Data and Distinct pieces of information,
Programs usually formatted in a special Modem
way. All software is divided into Just because it is interesting to know, the word
two general categories, data modem came from the words "modulator" and
and programs. Programs are "demodulator," which gives you an idea of the
collections of instructions for modem's job. A modem enables your
manipulating data. Data can computer to transmit its data to telephone or
exist in a variety of forms -- as cable lines, which connect you to the Internet.
numbers or text on pieces of Why do we need a modem? It has to do with
paper, as bits and bytes stored storage of data.
in electronic memory, or as
facts stored in a person's mind Digital/Analog
Hub A device that connects
Your computer is only able to store its data as
several computers to one
digital information, while data that is
another on a network
transported over telephone and cable lines is
ISP A device that connects
done so in analog waves. The modem acts as
several computers to one
a mediator, changing your data's digital
another on a network
structure to allow it to travel in analog form. A
Petaflop A petaflop is the ability of a
clearly elegant explanation of the difference
computer to do one
between digital and analog is as follows:
quadrillion floating point
operations per second Computers are digital machines because at
their most basic level they can distinguish
between just two values, O and 1, or off and

NCM110A - PRELIM 56
on. There is no simple way to represent all the once you have a basic understanding of the
values in between, such as 0.25. All data that modem, it is easier to understand how data
a computer processes must be encoded travels on the Internet through different kinds of
digitally, as a series of zeroes and ones. connections.
Coaxial:
The opposite of digital is analog. A typical
analog device is a clock in which the hands The "coaxial" cable used by cable television
move continuously around the face. Such a companies provides a greater bandwidth than
clock is capable of indicating every possible telephone lines, thus allowing a much quicker
time of day. In contrast, a digital clock is connection to the Internet. Coaxial cable's
capable of representing only a finite number central wire is surrounded by insulation, as well
of times (every tenth of a second, for as by braided grounding wire. All that
example). insulation forms a shield which protects from
interference by other electromagnetic waves,
In general, humans experience the world and makes for a fast, efficient transmission. It is
analogically. Vision, for example, is an also the cable used for Ethernet connections.
analog experience because we perceive
infinitely smooth gradations of shapes and Cable Modem:
colors. Most analog events, however, can be Although not a true modem, cable internet is a
simulated digitally. very fast Internet connection and perhaps the
most popular, especially in cities and more
Photographs in newspapers, for instance, populated areas. Cable modem uses a
consist of an array of dots that are either network card inside your computer to connect
black or white. From afar, the viewer does to the cable line. At this time, Cable Modem is
not see the dots (the digital form), but only likely to be your best choice for a fast, efficient
lines and shading, which appear to be Internet connection.
continuous.
Satellite Connections:
Although digital representations are
You still need coaxial cable to get Satellite
approximations of analog events, they are
Internet service, but it needs only to stretch
useful because they are relatively easy to
between your computer location and the dish
store and manipulate electronically. The trick
that you have specially installed outside your
is in converting from analog to digital, and
home. Your satellite company will install the
back again. www.webopedia.com
dish and very meticulously "point" it at the
In other words, a digital format is a limited one proper location in the sky for optimum
that involves encoding with numbers, while reception. In some cases, a satellite television
company will provide Internet access on the
that same data in analog form becomes free
to travel electromagnetically over waves. same dish, but more often, a special satellite
When the data finally reaches its destination Internet company requires its own equipment
another computer, it is transformed by that and setup.
computer's modem demodulated -- back into Your Internet request travels to the satellite
the more mundane digital format. company's NOC, or Network Operations
Questions Station, which launches it up into the sky to its
satellite. The satellite hurls the info to the dish
1. The data is transported over telephone and
cable line via: outside your home, which transmits it over the
- Analog waves cable and attached modem, which forwards it
2. This enable a computer to transmit its data to a network card in your computer. Looking at
to telephone or cable lines, which connects it this way, it sounds like the process of using
it to the Internet: satellite Internet would involve a day's wait.
- Modem Not at all. You will be receiving data at 400
3. Computer save data as: Kbps rather than the typical 28.8Kbps.
- Digital information What is Kbps? Short for kilobits per second, this
is simply a measure of data transfer speed. For
Other Internet Connections
the purposes of this course, we will not delve
Broadband Connections: too deeply into transfer speeds, but it is good
to know that there are differences in speed,
A broadband connection is a very fast Internet depending upon your equipment and your
connection, such as cable modem or DSL. connection.
Although these terms may sound confusing,

NCM110A - PRELIM 57
The fax machine gave us an indication of how Ap Access Point for wireless
modems work. Everyone knows the somewhat connections
obnoxious sounds of a fax being sent. But the Analog A system of transmission that is
sounds mean something: When a modem first able to handle continuous,
sends a signal to another modem, there is a unlimited, changing,
steady signal that tells us the two modems are modulating data
"talking," and have connected. The warbling Bandwidth A measure of the amount of
tone that follows is called a "handshake" data that can be sent over an
between the two modems, which are, in a Internet connection within a
sense, making an agreement about how the unit of time.
information will be handled, at what speed, Broadband A very fast internet
and other factors. The sending modem then connection such as cable
transforms the digital information to analog modem of DSL
form and sends it; the receiving modem Cable A network card inside a
receives it and transforms it back to digital modem computer that is used to
form. Amazing!! connect to cable TV lines for
Internet access
World of Wireless: Coaxial Cable that is ideal for
Any computer network that has no physical cable television and high speed
wired connection between the sender and Internet connections via
receiver of data is called wireless. The network cable modem.
is, instead, connected by "radio waves and/or Dial-up Internet connection that is
microwaves". Although wireless technology made directly through
does not use copper or fiber optic lines, it is telephone lines.
nonetheless, reliant on a physical wired Digital Computers are digital
network, somewhere along the line. Wireless machines because at their
devices depend on Radio Frequency (RF) most basic level they can
waves that project a signal which is able to distinguish between just two
detect a wired network. values, 0 and 1, or off and on.
There is no simple way to
How can it find what it is looking for? Simply represent all the values in
put, when a radio frequency is applied to an between, such as 0 25 All
antenna, an electromagnetic field is created data that a computer
that is able to speed itself through space. The processes must be encoded
radio wave usually finds an Access Point (AP), digitally, as a series of zeroes
which sends out its own detectable signal, and and ones.
then re-directs the wave to a wired network DSL Digital Subscriber Line - Allows
somewhere. high-speed Internet access
If you have no other options, dial-up Internet through existing telephone
service is an easy way to connect to the lines
Internet. Your computer is connected directly Handshake The indication that two
to a telephone line, and makes its "call" to a modems are making an
local access number provided by your ISP, agreement about the terms of
using tones. Compared with other transfer of data
connections, dial-up can be painfully slow, Kbps Kilobits per second - a
and is not always able to handle the measure of data transfer
downloading of graphics, music and video. speed
Another disadvantage to dialup is that while NOC Network Operations Center -
the Internet is in use, you are not able to use a central location for satellite
your landline telephone. Further, in a less Internet companies
expensive package, your minutes on the Rf Radio frequency - waves used
Internet are counted and charged, rather than in wireless technology
allowing unlimited access. Dial-up was a great
way to access the Internet prior to DSL and Questions
cable, but is no longer a desirable connection 1. Coaxial cable is used in:
if it can be avoided. - ethernet connection
2. Data is converted from digital to analog by:
Glossary - a modem
3. Kbps is:
- a measure of data transfer speed

NCM110A - PRELIM 58
BLOGS, SOCIAL NETWORKS, AND EMAIL reference. Email is ideal for communicating
across time zones, particularly those where
EMAIL night and day are opposite, not only because
Sending and receiving email on the computer the sender and receiver can respond at times
is one of the primary uses of the Internet. Email that are most convenient for them, but also
offers many advantages to nurses and other because it saves postage and telephone
healthcare professionals. Before 1995, only expenses.
those who shared the same network
EMAIL ACCOUNTS
connection could exchange email. For
instance, those using CompuServe as their Access to the Internet is through an ISP, either
Internet service provider (ISP) could only email a private one at home or through a college,
others who also used CompuServe. Today, with work, or establishment that offers free Wi-Fi.
most computer networks being part of the There are many ways to create an email
Internet, the exchange of email is possible with account and get an email address. ISPs
anyone in the world who has an Internet email provide email accounts, usually two to five per
address. Being knowledgeable about how to account, for their customers. Colleges also
use and manage email makes you a more provide email accounts for their students, and
efficient professional communicator. many healthcare agencies create email
accounts for their employees. It is also possible
Email enhances communication with speed to get a free email account at Google,
and convenience. Most messages arrive at Microsoft, or Yahoo by visiting their home page
their destination only a few moments after they
and opening an account.
have been sent, even if the destination is
halfway around the globe. Email offers a way
to avoid "telephone tag" and to create a
written message that the receiver can read
several times, convert into voice with special
software, or save. To use email, you need email
software (called an email client) and an email
account.
EMAIL SOFTWARE
An email client is software used to access
email from an email server so it can be viewed
and read. An email server is simply a computer
that uses server software to receive and make
email available for those who have an
account on that server. Operating systems
come with email software such as Windows
Mail (formerly, Outlook Express). Other free
email clients usable by both personal
computers (PCs) and Macs can be found at
Eudora, or Mozilla's Thunderbird. There are
similarities in the menus for all of the email
clients. Figure 6-2 shows an example of the
Microsoft Outlook 2007 window. Email addresses

Email software can keep a copy of all Like postal mail, email requires sender and
messages that are sent and received, however receiver addresses. At first glance, an email
the default is to delete these messages when address may look forbidding, but a closer look
the email software is closed. Many people like at the address will reveal the formatting rules.
to be able to search and view these messages An email address has two parts separated by
after more than one session. To accommodate the @ sign. The first part, or the letters before
this, the default is easily set to keep the the @ sign, is called the user name (sometimes
messages. Because these folders can become called the login name) and identifies the
huge, if the default is reset to keep the sender. The part after the @ is the name of the
messages, one needs to open and delete the email server where the email is received. The
messages on a regular schedule, perhaps characters after the last dot in an email
every month. Email software also provides a address constitute the suffix that identifies the
way to create folders so that incoming mail domain or main subdivision of the Internet to
can be saved into a specific folder for future which the computer belongs (see Figure 6-3).

NCM110A - PRELIM 59
User Name to download mail from there by using the
account settings. Unless you are an expert, use
The computer name and domain suffix are only one outgoing server.
dependent on which email server you are
using; these are assigned by the ISP that hosts
the email account. Most institutions assign a
login name (user id), which includes at least
part of the user's name. If you create an
account for yourself, remember that the user
name reflects on you. Email messages can be
forwarded anywhere, and the email address of
the person who created it, as well as anyone CREATING AND SENDING EMAIL
who receives it, is also forwarded. For this When you activate the Write feature of your
reason, healthcare providers should always email client, your address will already be on
select a user name that conveys their the "From" line. Your first step is to enter the
profession appropriately; cutesy names are address(es) of the receiver(s) on the "To" line. If
never appropriate. you have put the recipient's name in your
Configuring an Email Client email client's address book, when you start to
enter the beginning of the name, the address
To configure an email client that is on your PC book will automatically finish it for you. After
to send and receive email, you need just five entering the recipient's name, enter a brief
pieces of information: the email account type, word or phrase about the message on the
the name of the incoming server, the name of subject line. Emails with no subject line may be
the outgoing server, your login user name, and classified as junk mail by the user's email server
your logon password. The account type and and not be received by the recipient. Finally,
name of the incoming and outgoing server are create your message and add a signature that
assigned by the ISP where you have your clearly identifies you.
account. The type of email account is usually
POP3 (Post Office Protocol), but may also be There may be times when you want to send
IMAP (Internet Mail Access Protocol). Outgoing the same message to more than one person.
servers use SMTP (Simple Mail Transfer Protocol). This is simple if the message is a reply to a
In private accounts such as one from your own message that was also addressed to others to
PC or one created with one of the free email whom you wish the reply to be sent; select
clients, you select your own login or user name "Reply All" to start your message instead of
and password when you open an account. "Reply." If you routinely send email to the same
The logon user name and password allow you group of people, such as to members of a
to retrieve your email from your account. To committee that you are on, you can use the
simplify this process, Outlook 2007 address book to create a group. With a group,
automatically configures the email accounts you then place the name of the group on the
using the email address and email server "To" line, instead of each name. Use Help to
password. learn how to create a group of recipients.
When sending a duplicate of a message to
PLANNING EMAIL ACCOUNTS others, you have the option of using "Cc" or
"Bcc." The acronym "Cc" is derived from earlier
Email users should consider having several
days of the typewriter carbon copy. The "Bcc"
email accounts, each with a different purpose.
indicates a blind copy where the receiver is
One email account should be used for official
unaware that others have also received a
communication with coworkers and
copy of the message. Blind carbon copies
colleagues. Students should use an account
should be used judiciously; the sender must
dedicated to official school communication
consider the ethics of secrecy when using the
with other students and faculty. A third email
function.
account, using free online email software or a
home ISP, should be used for personal Sometimes you want to forward a message
communication. In addition, a fourth email that you have received to someone else.
account might be used for online shopping to Before forwarding a message, give thoughtful
trap potential resulting spam. consideration to the sender and receiver. In
consideration to the sender, send a copy of
If you have more than one email address, you
the email to the original sender when
may want to configure your email client to
forwarding the email to others. When
download from more than one server. For
forwarding a message, edit the message to
example, if you create a free email account at
remove the email addresses of prior recipients.
Google or Yahoo, you can set your email client

NCM110A - PRELIM 60
Avoid passing on chain letters; most people do server or email provider service will be private.
not want them, and many agencies will A growing trend is for institutions to monitor
terminate your account if you do this. email to avoid potential litigation and
Messages warning about viruses or other dire investigations from government agencies
things that will happen to your computer if you (AMA/ePolicy Institute, 2008; Clearinghouse,
don't do something are generally hoaxes. 2006). There is still no definitive case law on
whether students or employees have the right
EMAIL SIGNATURE to privacy in email. This includes situations in
Email written by professionals should always which the institution has said that your email is
include a signature with the sender's name, private because if the message can be
title, company name, and geographical construed as damaging to the institution,
location. A signature is similar to the return privacy promises may be legally invalidated.
address on a postal letter; however, personal There are several court cases that have set
information such as street addresses and home precedence and ruled in favor of the
phone numbers should be avoided. Most employer (Bourke v. Nissan Motor Corporation
signatures are one to five lines; a signature may in the United States, 1993; Smyth v. The Pillsbury
be personalized by including a favorite Company, 1996 Sykes, 2000).
quotation. Questions
EMAIL FILE FORMATTING 1. This is a software used to access e-mail from
an e-mail server so it can be viewed and
There are three main file formats for creating read:
and sending messages: plain text (TXT), rich - Email client
text file (RTF), and hypertext markup language 2. This indicates a blind copy where the
(HTML). TXT files have no formatting, which receiver of an e-mail is unaware that others
makes them ideal for electronic mailing lists have also received a copy of the message:
because any email client can read them. RTF - Bcc
files allow for some formatting, but not the 3. This main file formats for creating and
robust features of a word processor. HTML files sending messages include all of the
use HTML tags to display formatting of text. Not following, except:
all email software can read HTML messages, - Extensible markup language (XML)
especially in less developed nations. For file
formats that are either rtf or html, you can use EMAIL ETIQUETTE
the formatting functions, such as bold, italics,
Email etiquette, like regular mail letter
and bullets in your email client.
etiquette, is essential for professional
THE DOS AND DO NOTS OF EMAIL CONTENT communication (Jones, 2006). The rules for
creating email are important. First of all, always
As convenient as email is, it must be used include a short pertinent subject line. When
appropriately. Care must be taken in deciding replying to email, make sure to include
what is included in a message that is sent via appropriate information from the prior
email; contents of email must always adhere to message in the reply. Email is a special form of
common decency. Email should never be used communication, not as interactive as the
to give bad news, such as a poor evaluation, telephone, but more interactive than written
work layoff, or pay decrease. A rule of thumb is communication. Because it often seems very
not to include anything in an email message personal and quick, there is a tendency to
that you wouldn't want to read on the front regard it as a verbal conversation and forget
page of the newspaper since it is very easy for that the recipient may have been involved in
a recipient to either accidentally or purposely many complicated matters since he or she last
forward your message to someone else. All sent you a message. For this reason, mailers
messages carry headers that can be traced to provide an option to include the prior message
the original sender. Even if the sender uses a with the original when you reply. To prevent
remailer, a service that strips the identifying messages that rapidly become too large and
header so that email can be sent uncommunicative, edit the prior message so
anonymously, sender information can be that only the parts pertinent to your reply are
traced by contacting the remailer service included. In general, email should be short and
(Freeman, 2007). to the point, but not too short. A message that
EMAIL PRIVACY ISSUES is too short may be misinterpreted by the
recipient, who may feel that the sender was
There is no guarantee that email that is sent being abrupt or curt.
using an educational facility or employer email

NCM110A - PRELIM 61
Use the appropriate font and case when include graphic emoticons. A classic graphic
writing email. According to email etiquette, emoticon is a round, yellow button with two
use of all uppercase letters (all caps) indicates dots for eyes and half circle for a smile. Use
that the user is shouting, so all caps should emoticons sparingly, if at all, in professional
never be used for sentence construction. Use business communication.
font colors thoughtfully. Depending on the
message, a red-colored font may be
interpreted as swearing (Cleary & Freeman,
2005). Finally, email should always be signed.
Professional email should include a signature,
title, and contact information, such as a
mailing address of the agency, phone number,
and home page URL. (see Box 6-1). ATTACHMENTS
There are some major differences between Many people use email to send files created
email and letters sent by postal mail. Postal with other software, such as a word processor
mail letters generally have the reader's full, or spreadsheet. When including attachments in
undivided attention. In contrast, because of your email, use the following guidelines. First,
the sheer volume of email, the reader may not always alert the receiver before sending an
read the message thoroughly, causing attachment and verify that the receiver has
misunderstandings resulting in problems in the software that can view the attachment.
relationships. If there is a chance for For example, if a file is created and saved with
disagreement, or email messages seem to be Publisher with the Publisher file extension ".pub,"
causing disagreements, use email to set up a the recipient will not be able to view the file
time for either a person-to-person meeting or a unless he or she has Publisher on their
telephone conversation. computer. Be sure that the recipient has the
appropriate version of the software that you
are using; many file formats from the same
vendor's program are not backwardly
compatible.
Attaching files to email messages increases the
size of the message, which in turn increases the
time required to both send and receive it. If the
attached file is large, consider "zipping" it.
Zipping a file involves using a piece of software
ACRONYMS AND EMOTICONS that compresses the file to make it smaller. In
general, text files can be compressed much
Email is devoid of the nonverbal commands of more than graphics files. Files may be zipped
face-to-face communication. Thus, expressions separately or as a group (archived). Before
of subtle meaning and tone are easily lost. With zipping a file, make sure that the recipient has
the informality of much email and the limited unzip software in his or her computer and that
typing skills of many who send email messages, the person's email server allows for zipped
it is only natural that common acronyms and attachments (some email servers remove
icons have developed. They are only valuable attachments with certain file formats, such as a
when the recipients understand them. zipped file, to prevent the spread of potentially
Acronyms use the first letter of words or word harmful viruses). Most of today's operating
parts to communicate a common phrase (see systems include some type of zip/unzip
Table 6-1). They are commonly used in informal software. Use the Help feature to learn to use it.
email and instant messaging. Acronyms are
not appropriate for professional An alternative for attaching a large file or
communication. zipped file is to use file transfer Internet Web
sites. Examples include YouSendit, SendThisFile,
To provide the appropriate body language and LogMein. The file transfer Web sites
tone, telecommunicators have devised icons provide free as well as fee- based services;
called emoticons (emotional icons), sometimes both require the user to register to receive a
called smileys, which can be created on the login and password. To send a file, go to the
keyboard. For example, one that is frequently Web site, log in, enter the recipient's email
used is :-). When tilting your head to the left, address and an email subject, browse (find in
which is the position for "reading" keyboard your folders) to the file, select it, click open on
character emoticons, you can see a smiling that window, and click Send It. The recipient
face (see Table 6-2). Some email clients

NCM110A - PRELIM 62
receives an email with a Web address (URL) to Spam (junk email) is not only a nuisance, it is
download the file. If you are in the habit of potentially harmful. As annoying as junk email
exchanging large files with someone whose can be, it is important to recognize it to
email account is limited in sending or receiving proactively limit or eliminate it. A first clue of
large files or if you are limited in this respect, junk is the sender's email address. If you don't
one or both of you may want to get a free know the sender, the email is probably junk. To
email account where the size of attachments is proactively limit or eliminate junk mail, learn
not as limited. how to develop email filters and rules. In
Windows Mail 2007, using the junk email
MANAGING EMAIL options on the Tools menu can be used to filter
Taking a few minutes to organize and manage spam to the junk folder to decide what to do
email can save you much time and energy with mail determined to be junk. In Gmail the
later (see Table 6-3). Whether you use a "Filters" window can be used to discard spam.
standalone or Web-based client, the email Some online email clients allow the user to
management processes are similar. All email report spam with the click of a button.
clients have Help menus to guide you through Spam is the electronic version of junk postal
the process of organizing email. You can use mail, except that it shifts the costs of
email alerts to assist in prioritizing email. Alerts advertising to the receiver; it exists because it is
include flags, stars, and font colors. Use email
a cheap way to advertise. It also fills the
filters to automatically file incoming email into Internet with unwanted messages. Usually,
designated folders and send you personal spam originates from a false address, so
alerts for email from certain senders. You can replying is a waste of time. If, however, you
also use filters to filter unwanted mail such as receive a spam message and you know from
spam (unsolicited commercial email) to the the email address that the ISP exists, such as
deleted items folder. one of the online services, you can forward it
OUT-OF-OFFICE REPLIES to postmaster online.service (substitute the
name of the service for online.service). Most
There are times when you will not be answering services and ISPs take a very dim view of
email, such as when out of town. This, however, spamming and terminate the account of
does not stop your email. When you do not anyone who sends junk email, or if someone's
answer, your correspondents may become identity has been illegally assumed, the ISP will
upset. To show consideration for them, it is look for ways to prevent this from happening
smart to have an automatic response sent to again.
them informing them that you are unable to
read and respond to their message and letting All email users must be knowledgeable about
them know when you will be able to do so. spamming practices and malware, such as
Most ISPs provide this service; to activate it go phishing and pharming. One of the best ways
to your account on their server and use Help to to avoid spam is to not give out an email
learn how to do this. If you are using Gmail, address to any Web site. An alternative is to
look for "Vacation Responder" in the Settings acquire a free mailbox site and use that email
menu. address when completing online forms, for
example, when shopping online. Records of
online shopping are then emailed to the free
designated account along with any
advertisements that they might send. When
visiting the free email account, legitimate
email can be forwarded to another address
and spam can be deleted. Users should never
open a known spam message! Finally, users
should never purchase a product or service
advertised from unsolicited email (Project,
2007).
RETRIEVING EMAIL FROM A REMOTE EMAIL
ACCOUNT
Perhaps you normally use a stand-alone email
client such as Outlook, Windows Mail, or Mozilla
Thunderbird to retrieve email, but you want to
SPAM check your email when you are not at the
computer that you usually use. Many ISPs will

NCM110A - PRELIM 63
allow you to retrieve your mail directly from the such tasks as subscribing a new member or
server. Or, you can configure a Web-based evoking the available options such as
client such as Gmail, Hotmail, or Yahoo to temporarily suspending mail from the group;
retrieve the email from your server when asked. and another address that is used only when
Web-based email clients may also offer one posts a message to the group. This
software designed for mobile devices. Mobile information is included in the information that is
email clients allow users to retrieve and sent to all new subscribers. It is important to
download remote email to handheld devices save this message because it not only provides
such as personal digital assistants (PDAs) and you with the administrative address but also
smartphones. tells you how to unsubscribe, find the names of
other participants, digest your mail (so that you
Questions
receive one message per day with all of that
1. All of the following are examples of a day's postings), and temporarily stop your mail
standalone e-mail clients, except: from the list (*very* important if you are not
- Yahoo mail able to check your mail for a while). The
2. Professional emails should include all of the
instructions for use of email lists vary. When
following, except: replying to a list message pay particular
- primary address
attention to whether you need to use reply or
3. These are words form from the 1st letter of Reply All. With some lists, the Reply feature will
words or word parts to communicate permit you to reply to all list participants; with
common phrase that is commonly used in other lists, you need to use "Reply All" to send
informal e-mail and instant messaging:
the reply to more than the person who wrote
- acronyms
the last message. Make sure that you sign the
4. All of the following are things to consider email posted to mailing lists with a standard
when using e-mail for business, except:
"signature" that includes at least your name
- Email should be checked at least 10 times and email address. Some lists "strip" the email
per day address of the participants in the header.
List Servs
Email Discussion Lists (Listservs)
An email discussion list, sometimes referred to
as a listserv (no "e" at the end) from the first
software that was used to create one, is made
up of a group of subscribers with a common
interest. The software allows subscribers to
receive discussion postings via email.
Subscribing, or joining, a list is generally free.
Instructions for subscribing are specific to a list
and are generally found on the Web site for
the list or as a click at a place where you find
information about the list. Once subscribed to
a group, copies of any message posted to the
group are sent to all members mailboxes (see
Figure 6-4). Members can reply to any of the
messages or send an entirely new message to
the group. The tasks of keeping track of FINDING A NURSING DISCUSSION LIST
subscribers and sending copies of messages
are accomplished by a software program. There are electronic mailing lists for just about
Other kinds of email list software include every nursing and other healthcare specialty
Majordomo, Mailbase, and Listproc. imaginable; finding the right one is not always
easy. Although you can search the Web using
Most lists are automated, that is, the software the term "nursing discussion lists" or "nursing
immediately sends out any messages posted listserv," staying up-to-date on what mailing lists
to the group's posting address; some groups are active is almost impossible. Examples of
are moderated, that is, the message is first popular nursing discussion lists are as follows:
vetted by the list owner before posting.
 Student nurse listserv
Most mailing list software offer many options for atlistserv.buffalo.edu/archives/snurse-l.html
subscribers beyond just sending messages. For  Nursing informatics listserv at
this reason, there are two addresses for each mailman.amia.org/mailman/listinfo/nrsing-1
group: one that manages the list, performing

NCM110A - PRELIM 64
 Nursing educator listserv at which is not happily received by the list owner
lists.uvic.ca/mailman/listinfo/nrsinged who must then take the time to manually
unsubscribe you. If you want to receive only
THREADED DISCUSSION LIST MESSAGES one message from a list a day, you can use the
Threaded messages are organized by the Web page or administrative address to set the
topic of the message. The first message for a mail to digest. If you receive messages in the
topic starts the thread followed by the other digest mode and use the reply function of your
messages about the topic. Often the number email to reply to a message, delete the subject
of other messages on the topic is noted in that is automatically on the subject line and
parentheses after the topic of the group. If you copy and paste the subject of the message to
receive list mail in the digest format, the which you wish to reply on that line prefaced
messages are often threaded. You can also by "Re:".
organize your personal email by topic to have
New list users may think that a list is a way to
threaded messages. avoid doing a needed literature search. Don't
Regular listserv messages are not threaded, but expect other list members to do this for you. If
if the group has an archives page, the you want information about a topic, when
messages are usually threaded on that page. asking for help indicate the sources you have
The threading concept works only when found. When a member indicates that he or
posters preserve the original subject, either by she has done homework and is willing to share,
using the Reply or Reply All function or by other members are very happy to provide
copying and pasting the original subject on more help. Do remember to sign your email
the subject line prefaced by "Re:". It breaks and use a contact signature, which includes
down when posters use the Reply function to your email address and the name and address
start a new topic without changing the subject of your affiliating organization.
line. In online courses, messages are also
FLAME WARS
threaded, so learning to use threaded
messages is an important skill. Messages sent to an electronic mailing list go
to many people whom the sender does not
DISCUSSION LIST ETIQUETTE know. The messages will be read under a
Listserv etiquette is similar to that used for variety of conditions, by people in different
standard email. It is extremely important to be moods. Given these circumstances, it is not
respectful of the other group members. surprising that occasionally a member takes
Discussion list members represent an invisible umbrage at what another says and posts an
number of individuals with a variety of overheated message. A message of this sort,
experiences who may live anywhere in the called a flame, can easily deteriorate into a
world. Thus, messages need to be flame war when others respond derogatorily
understandable to all. In messages avoid with other positions on the disputed topic. In
acronyms, which are often not understood most groups, this ends on a conciliatory note
even by people in your own area. Keep when cooler heads prevail. Flame wars can
messages on the topic of the list; information happen in any group, but tend to be more
about the allowable topics is provided in the common in groups with controversial topics.
welcoming message. Questions
Lists are maintained or "owned" by the person 1. In regard to listservs, when signing your e-
who is responsible for the list. It is a thankless mail, all of the following should be included
task for which there is no payment. For this in the contact signature, except:
reason, as well as consideration of the other - website of the organization
members, you should consider being a 2. All of the following are types of e-mail lists
member of a list, a privilege that conveys software, except:
responsibilities. Send nothing except messages - Mailerdaemon
to be posted to the group to the email address 3. All of the following why are things the ones
that is used to send you group messages. For either when using listservs, except:
all other requests, like unsubscribing, use the - use threaded messages
administrative address or Web page of the 4. In regard to listservs, if you are going to be
group; information about how to implement away for a while, is there unsubscribe from
these features is in the welcoming message. If the list or set the mail to no mail. This is
you are going to be away for a while, either important to prevent:
unsubscribe from the list or set the mail to no- - Full mailbox error
mail (called noack in some list software). This is
Blogs and Blogging
important to prevent a "full mailbox error,"

NCM110A - PRELIM 65
A rather awkward word, "blog" came from the expression of self, and especially, his friends!
term "weblog," which provides a clue as to its On your page, you can "link" with "friends" who
nature. A blog is a column or diary that is often also have their own pages. Those friends will
updated daily. There are blogs on almost every show up on other friends' pages, and perhaps,
subject and every aspect of every subject. those people will link up, as well. Thus, the
Blogs give people a chance to vent their ideas "network" concept. Wikipedia's description,
and opinions, as well as practice their writing although wordier, is, perhaps, more
skills, while entertaining those who read them. sophisticated:
Blogging has become so popular that many Social Networks can increase the feeling of
news reporters and editors use this format to community among people. An ISN is a
influence and inform the public. Blogging has closed/private community that consists of a
had an impressive impact on political elections group of people within a company,
and public opinion over the last few years, and association, society, education provider and
is now an accepted part of Internet organization or even an "invite only" group
participation. Blog topics range from very created by a user in an ESN. An ESN is
personal reflections to music, art, travel, open/public and available to all web users
fashion, education, and corporate life. to communicate and are designed to
attract advertisers. ESN's can be smaller
You can read and join blogs in virtually every
specialized communities (i.e.
area in which you are interested. But, you do
.TheSocialGolfer, ACountryLife.Com, Great
not need to go to each blog several times a
Cooks Community) or they can be large
day to see what has been updated or added.
generic social networking sites (eg.
Technology called RSS, which stands for "Really
MySpace, Facebook etc).
Simple Syndication," will feed to your computer
However, whether specialized or generic
the updates from the blogs you choose to
there is commonality across the general
subscribe to, every time there is an update.
approach of social networking sites. Users
Questions can upload pictures of themselves, create
1. RSS stands for: their 'profile' and can often be "friends" with
- really simple syndication other users. In most social networking
2. A blog is a: services, both users must confirm that they
- column or diary that is often updated are friends before they are linked. For
daily example, if Alice lists Bob as a friend, then
3. Blood came from the term: Bob would have to approve Alice's friend
- weblog request before they are listed as friends.
Some social networking sites have a
Social Networks "favorites" feature that does not need
approval from the other user. Social networks
Few people have not heard of Facebook or
usually have privacy controls that allow the
MySpace. Most of us know of these social sites
user to choose who can view their profile or
through word of mouth, the news media or
contact them.
other stories of relationships made, broken or
restarted through these incredible electronic
All you need to do to join one of these
hangout sites. They are certainly not just for
networks is to go to one on the Internet, and
kids; many business professionals and
sign up, using their format, a username and a
companies have their own page on Facebook
password. You can add as much or as little
or MySpace.
about yourself as you'd like. You may find the
On March 11, 2009, Reuters reported that practice addictive, as you see the things that
"Networking and blogging sites account for people "post" on your "wall," and the photos of
almost ten percent of time spent on the people you may or may not have heard of.
internet -- more than on email." The article
Questions
goes on to say, "The biggest growth in
1. All of the following statements about social
Facebook membership comes from the 35-49
networks are true, except:
year old set. Facebook has added twice as
- they often require a paid subscription
many 50-64 year old visitors as it has visitors
2. This is an example of social networking site:
under 18.
- Myspace
A social network provides the user with a 3. In regard to social networks, this is a
personal page, upon which he or she can post close/private community that consists of a
anything and everything about himself, his life, group of people within a company,
his likes, interests, his poetry or any other association, education provider or

NCM110A - PRELIM 66
organization: to go to the company's website, find the
- ISN model number of your new toy, and download
the driver for it.
Downloads
Downloads are prepared with instructions for
Downloading: Downloading is the process of installation; they generally pretty much take
copying files from a larger network to a smaller care of themselves, with a few simple clicks
system, like from the Internet to your PC. For the from you, and they know the best places to
most part, downloading has been made easy store themselves once they reach your
for the average user. We click a link, and wait computer.
for a file to load onto our local computers
without having to do much else. But there is a Some of the popular games at this time are
different system in operation for a download. World of Warcraft, Rock Star and Halo-3; many
Behind the scenes, the Internet's File Transfer games require a game console, such as X-box
Protocol (FTP) software is what allows us to or Play Station, and charge a monthly fee to
download, as well as upload, to the Internet. join the adventure.
FTP is simply another set of rules, or protocols,
Virtual Reality
which governs an Internet process. We will
discuss FTP again later when we learn about A virtual reality is an artificially created "world"
setting up a website. or "environment" that can be experienced on
a computer. To a certain degree, virtual reality
Most files are compressed in order to save time
is already available on the Internet, on sites
in the download process, and must be
that allow us to walk through virtual worlds.
opened, or unzipped, once they reach their
Preston Gralla tells us we can "walk through a
destination. Not to worry - it is a rare Internet
giant computer, explore bizarre art galleries,
site that demands we know all about FTP and
visit outer space, go to the sites of what seem
its workings. For now, just remember that some
like ancient ruins, explore inside the human
downloads can damage your computer if they
brain, and much more" (Gralla p. 275). Virtual
are infected with a virus. Also, consider the fact
reality, for the average Internet user, is still on
that your computer needs sufficient memory
the horizon. Loading entire worlds, as you can
and disk space to handle whatever you are
imagine, takes a lot of memory because of the
bringing from the Internet.
humungous graphics involved, but it is coming.
We can now easily download music, graphics, In the meantime, it is already being used in
text and video, following the instructions medicine and education, allowing scientists to
provided with the download link. learn about worlds we cannot see with the
human eye, and "territories," ranging from a
Patches, Service Packs and Drivers: As molecule to the cosmos. Currently, we can
developments in technology continuously hum experience virtual reality with special gloves,
along, software developers are constantly goggles and other gadgets that are usually
having to create adjustments, repairs and available in entertainment centers. Virtual
compatibility fixes, to take into account any reality is definitely the wave of the future.
problems their product may be causing its
users. The companies provide these in the form Glossary
of downloads, which can usually be easily A weblog in diary or column
Blog
found on their company websites. Sometimes format
the service packs and patches are simply A cyberspace location where
Chatroom
improvements to the product. These can all be people can converse
easily downloaded, and in the case of Files formatted to be smaller
Compress
Windows, should be downloaded, as they than usual for ease in
Data
come along. Do not hesitate to download transporting
updates from Microsoft for Windows, as well as A metaphor for describing the
any other major pieces of software that might Cyberspace non-physical environment
provide them. They will help your computer run created by the Internet
more smoothly, and are worth a few minutes. A website where one can find
compatible dating prospects,
A driver is software that controls a device, such
Dating Site and communicate
as a printer, a disk drive, a monitor or a mouse.
electronically before meeting
Most drivers are already installed when you get
in person
a new system. But, if you get a new piece of
Transfer information from the
hardware, or you want to install something on Download
Internet to your PC
your system that needs a driver, and you don't
have the software that comes with it, it is easy

NCM110A - PRELIM 67
A program that controls a people, groups, and
device Every device whether organizations on the Internet
Driver it be a printer, disk drive, or An artificial environment
keyboard, must have a driver created with computer
program hardware and software and
eBay™ ts an online presented to the user in such
marketplace that enable Virtual a way that it appears and
local, national and Reality feels like a real environment
international trade eBay™ The term is sometimes used
offers an online platform more generally to refer to any
where millions of items are virtual world represented in a
Ebay™
traded each day through computer.
Online Auction Formats, also A website that is created and
called auction-style listings, or Wiki edited by volunteers working
through immediate "Buy It together, such as "Wikipedia"
Now" Fixed Pnce and eBay™
Store listings Questions
Email Electronic mail 1. This refers to a website that is built as a
File Transfer Protocol - a way collaboration of contributors who volunteer
FTP of downloading files from the information:
Internet - wiki
A device that plugs into your 2. This is a software that control a device, such
Game as a printer, at disk drive, a monitor or a
computer for playing
Console mouse:
interactive games
A processing location, such as - driver
Nodes 3. This allows us to download from and upload
a computer
A virtual auction where buyers to the Internet:
Online - file transfer protocol
can bid and sellers can sell
Auction 4. This is a process of copying files from a
products over the Internet
Also called a service patch, a larger network to a smaller system, like from
fix to a program bug. Patches the Internet to your PC:
Patch - downloading
typically are available as
downloads over the Internet.
Introduction
Really Simple Syndication - a
technology that will alert a The Internet has given us inexpensive
RSS subscriber when new asynchronous discussions, synchronous instant
information is added to a fog communication, email, electronic mailing lists,
or web page and the library known as the World Wide Web
Immediately - events (WWW). Creative users, not content to have
simulated by a computer at the WWW as just a repository of information,
Real Time
the same speed that they have given us social networking, interactive
would occur in real life sites, instant news, and personal opinions not
An update lo a software regulated by traditional media.
version that fixes an existing
The networking thus provided allows us to
problem, such as a bug, or
communicate with colleagues worldwide and
provides enhancements to
to stay abreast of standards of care and
the product that will appear in
practice. History has taught us through recent
the next version of the
Service devastating disasters that electronic
product When the new
Pack networking can provide a means for
product version is released,
organizing and delivering healthcare provider
usually contains the fixes and
volunteer assistance, pharmaceuticals and
updates from the service
medical supplies, as well as a way to provide
pack Service packs can either
care to those in need. Nurses trapped within
be downloaded or ordered
the disasters have been able to connect to the
directly from the company
Internet and chronicle events using email and
A social structure of nodes
online blogs.
that are generally individuals
Social
or organizations Asocial Synchronous Internet Communication
Network
network represents
relationships and flows among

NCM110A - PRELIM 68
Synchronous Internet Communication refers to conferencing software feature the ability of
communication that is done in real time, just participants to mark up documents or images,
like a telephone or face-to-face conversation. as well as "chat" using a keyboard. Web
There are several different types: text-based conferencing is similar to an open telephone
instant messaging, telephony, and Web call, but with the added element of video. A
conferencing. Webcast is generally a one-way presentation,
usually with video, to an audience who may
TEXT-BASED INSTANT MESSAGING be present either in a room or in a different
Instant messaging (IM) is becoming a geographical location. Methods for the distant
transparent part of email and an optional audience to ask questions are usually provided
feature in most course learning management (Molay 2007). A Webinar, on the other hand, is
systems (LMSs). You can see "who else is online" more like a live seminar. Although there is a
and then send them a text message. IM has speaker, the audience can ask questions, and
been controversial in the classroom because the speaker can ask for feedback as the
students instant message each other in class information is delivered.
similar to the days when some of us passed Questions
paper notes. Text messaging (short message 1. This provides a mean to me a telephone
service [SMS]) and multimedia messaging call anywhere in the world with voice and
(MMS) are similar features that are standard on
video using the Internet:
mobile phones. - voice over the Internet Protocol (volp)
Chat is interactive email that has been around 2. This is generally a one-way presentation,
for a long time, but it has morphed into newer usually with video, to an audience who
types of instant communication. Chat is an may be present either in a room or in a
optional feature that is available in course difficult geographical location:
LMSs. In this milieu, the computer screen shows - webcast
a list of the participants as they enter the chat 3. Synchronous Internet communication refers
room. Chat users use their real names or a to:
"handle or alias," type their conversation, and - communication that is done in real time,
tap the Enter key to send the message. Others just like a telephone or face to face
in the chat room respond with their replies. conversation
4. Computer software and hardware that can
TELEPHONY perform function usually associated with a
Telephony refers to computer software and voice communication is known as:
hardware that can perform functions usually - telephony
associated with a telephone. Telephony Web 2.0
products are often referred to as voice over
the Internet protocol (VoIP). VoIP provides a In the quest to make the Web function in a
means to make a telephone call anywhere in more personal manner, a concept called Web
the world with voice and video using the 2.0 was born. It does not have strict boundaries
Internet, thereby bypassing the phone from the original Web but is about people
company. The free versions provide phone interacting, sharing, and collaborating. The
communication from computer to computer. term "Web 2.0" was first coined by O'Reilly and
All you need is a microphone, speakers, and a others to describe what online
sound card. If you have a video camera, you companies/services that survived the dot.com
can have video calls. Some VoIP software bubble burst in 2000 had in common (O'Reilly,
include conference and video calls. The 2005). Web 2.0 is more of a philosophy than a
connection, computer processor, and software technology and has many interpretations. It is
determine the number of people and quality based on a common vision of its user
of the connection. For a small fee, you can community. The objective of all Web 2.0
choose to call telephone numbers on mobile services is to mutually maximize the collective
phones and landlines using the Internet. intelligence of the participants and add value
for each participant by formalized and
TELECONFERENCING VIA THE INTERNET dynamic information sharing and creation
Conference calls using the telephone have (Hogg, Meckel, Stanoevska-Slabeva, &
become a way of life for those belonging to Martignoni, 2006).
committees whose members live in different Web 2.0 services are an interactive
geographical locations. In Web conferencing, development process (Hogg et al, 2006).
videos such as slideshows and other visuals can Information sharing can be video, data, text, or
be added to the meeting. Some Web metadata such as annotations of history. The

NCM110A - PRELIM 69
format is determined by the provider, with the repository, users must have the technical skills
basic idea being that information is created to upload and edit documents.
and shared among many users maximizing the
collective intelligence. The results can be Wikipedia is an example of a public Wiki. It is a
commonly accepted content or opinion. This popular, free, online encyclopedia, which
began in 2001. Within the first six months of
type of intelligence requires some type of
regulating, often from users of the site. User development, users had contributed 6000
recommendations on eBay are one example articles (Neus, 2001); as of November 2008,
as are reviews of various travel facilities by there were over two and a half million articles
written in English (Wikipedia, 2008). Wikipedia
those who have used them.
articles are collaboratively created and
Web 2.0 provides a rich medium to nurses and improved by users. To make any changes to
other healthcare professionals for interactive Wikipedia articles, users must register and then
networking. A professional networking Web site log in to the site. Tabs at the top of the article
is like a visit to one's colleague's office or home provide a means for collaborative discussion
where one can see personal pictures and on the topic, editing the topic, or viewing the
other decor that reflect his or her ideas and history of changes (an audit trail). All changes
personality. are recorded and can always be undone. The
strength of Wikipedia is that it provides
COLLECTIVE INTELLIGENCE TOOLS information on an ever-expanding number of
Collective intelligence is defined as knowledge topics. Critics are quick to point out that the
and understanding that emerges from large quality of the articles is inconsistent. For
groups of people (The Horizon Report, 2008). technical information, it is often one of the
Analysis of data that is collected over time will most up-to-date and best source.
allow new patterns to emerge and in turn will
Web 2.0 Office Suites
result in new knowledge. The notion of
collective intelligence has implications for With Web 2.0 have come many tools that allow
changes in the educational process and the groups of users to work together virtually. Many
nursing profession. Use of collective intelligence of the tools are free and very easy to use. The
applications in nursing education provides only requirement is the use of a computer with
opportunities for grassroots problem solving an Internet connection. Two examples of
and knowledge construction by students online office suites that allow group
worldwide. collaboration are Google Docs and Zoho
Office. Google Docs includes word processing,
Wikis spreadsheet, and presentation software. The
A Wiki is one example of a collective documents are usually created off-site and
intelligence application. A "Wiki" is a piece of then uploaded where they can be shared and
server software that allows users to freely edited by others. The documents can also be
create and edit a Web page's content using downloaded and saved. Zoho provides
any Web browser. Wiki supports hyperlinks and collaborative access to word processing,
has a simple text syntax for creating new spreadsheets, presentation tools, an online
pages and crosslinks between internal pages notebook, an online planner, a Wiki, Web
on the fly (What is Wiki, 2002). Wikis are Web conferencing, Web application creation, and
sites designed for sharing and collaborative chat. The Web site allows users to import files
work on documents. They are used for from other office applications. Joining either of
committee work, clubs, classrooms, and these is free; all one has to do is create an
knowledge management. Wikis can be private account.
or public, for example, a Wiki designed for
Sharing Media
committee work would be private. The Wiki
administrator identifies the membership using The Sketchcast tool allows a registered user to
email addresses, and the Wiki automatically draw and narrate an idea and then share it via
emails members with information on how to a Web page or blog. Slideshare allows users to
register for the Wikispace. embed a slideshow into a Web site or a blog,
synch audio to slides, and join groups who
The culture of the group is a factor that affects share the same interests. Presentations can be
the effectiveness of collaboration (Watson &
downloaded to the user's computer or shared
Harper, 2008). Users must be willing to share with others. The search terms "nursing" and
knowledge and exchange ideas. They must be "nursing research" at this site will find slideshows
open-minded and willing to seek new pertinent to the nursing profession. "Slide" at
knowledge. When Wikis are used as an
http://www.slide.com/ also allows you to
updatable knowledge management

NCM110A - PRELIM 70
create online slideshows including music videos Another type of mashup involves associating
as well as create a guest book for your site on videos or photos with the metadata about the
which friends can share their pictures. picture such as who took the picture and the
location where it was taken. There are also
Evolving Collective Intelligence Applications search and shopping mashups such as the
New collective intelligence applications are on comparative shopping tools that draw data
the horizon. Freebase is an open shared from various sources. News mashups are
knowledge database. The Web site provides another variety in which news from various
an introductory video designed to guide new sources is synthesized into personalized news.
users to efficiently search the database. To
GOOGLE GROUPS
contribute you must register and receive a
login and password. The Google Image Google Groups discussion forums, similar to
Labeler uses a gaming strategy to improve the Wikispaces, allow for sharing of documents as
quality of Google images search term results. well as a group discussion. Unlike Wikispaces,
Users are randomly paired with an online all Google Group users must have a Gmail
partner. The players are shown a set of images address. Google Groups can be private or
over a two minute period and asked to public, or serve as an electronic bulletin board.
describe the image with as many labels as Private Google Groups has a feature that alerts
possible. When the two players agree on a all the members when there is a change to the
label, the players receive points. workspace. Google Groups are also used for
collaborative work such as committee work,
RSS FEEDS classrooms, and clubs. Yahoo also provides the
Because blogs are updated, but generally not same service.
on a fixed schedule, you can subscribe to an
GRASS ROOTS MEDIA
RSS feed, which will notify you when there is
new information on a blog. RSS feed is an The ability to share photographs and videos is
acronym for both Real Simple Syndication and a rapidly growing trend! The term Grass Roots
Rich Site Summary (your choice). RSS feeds are Media refers to the widespread creation and
not confined to blogs. You can have RSS feeds posting to the Web of media such as videos,
of new items from Web sites including slides, and blogs by nonprofessionals. There are
electronic library searches, news, and blogs multiple ways to create digital photos or videos
sent to your personalized Web browser home that can be posted to the Web. Many cell
Web page, such as iGoogle or My Yahoo. The phones include both the ability to take photos
signal that a Web site is amenable to being and videos. Inexpensive but "good- enough"
subscribed to is the orange icon on the page digital camcorders are also available. One
itself, or in the location bar (see Figure 6-1). inexpensive digital video camera is even small
Since December 2005, this icon has become enough to fit inside a pocket (Pure Digital
the industry standard denoting RSS feed Technologies, n.d.). There are also disposable
availability. Using the Help menu in your Web camcorders that take up to 20 minutes of
browser or email application you can easily audio and video Money.com., 2005).
create an RSS feed for any site where you see
the icon. Online Photos

MASHUPS Web sites such as Flickr and Shutterfly are


specifically designed for photo sharing. They
A mashup is a Web application that takes data both allow photos to be shared privately and
from more than one source and combines it publically. Shared photos is an excellent way of
into a single, integrated tool (Merrill, 2006). sharing experiences from professional meetings
There are several varieties of mashups. One and conferences.
type involves mapping, in which data is
overlaid on a map. This type of mashup was Online Personal Videos
given a push with the advent of Google Maps, Video-on-demand Web sites, such as YouTube,
which, developers discovered, could be allow users to upload, view, and broadcast
overlaid with current data from various sources. videos to a worldwide audience at no charge.
This type of mashup could be used in To find and view a video from YouTube, enter
healthcare to place cases of infectious a search term in the search box. To upload a
diseases on a geographical area. In a smaller video, register for an account, complete a
example, overlaying data about infections on short form where you indicate your account
a unit over a blueprint of rooms would provide type, contact information, gender, and age,
more information than the data alone. and agree to the Web site terms of use.

NCM110A - PRELIM 71
Although free online videos vary in quality and Consider building your own website! You can
length, users are guided to useful resources have a family website that contains photos
such as the ratings of other users. Faculty and and information about your family, or a
healthcare professionals are using the video- business website that helps you sell the gadget
on-demand sites to deliver lecture material. you invented. You can establish a website that
When uploading video on healthcare topics, is focused on frogs or pears, or Aunt Mary's
users must adhere to all privacy guidelines to needlepoint -- just about anything that interests
protect patient confidentiality. you and that you want to share, sell, promote
or flaunt.
Podcasts and Vodcasts
If you Google™ the words "make a website"
Podcasts, or audio messages available online, you will be astonished by the number of
and vodcasts, video and audio online, allow companies that will help you build a site, host it
anyone with the appropriate hardware and
and give you a webpage and some for free!
software to create and publish audio and But, don't be confused about this - free only
video contents on the Web. Some developers goes so far. There are conditions in most cases,
publish these as a theme series on a specific and there is almost never a truly free website.
subject that are available as an RSS feed. They But, before you get started, it is a good idea to
can be identified by the orange icon with the know what is involved, and plan a little for the
word "POD." There are three ways through
creation of your very own web site and for
which you can listen to a podcast: using an
owning your own domain name.
MP3 player, listening on a computer with
special software such as the Windows Media HTML
Player, and with VoIP by dialing a number
Hypertext Markup Language (HTML) is the most
(Little, 2007).
commonly used authoring language for
Although podcasts and vodcasts are often creating websites. It is relatively easy to learn
referred to with only the term "podcast," they and far less complicated than learning other
are in different file formats. Many MP3 players programming languages. It is based on
play both. Podcasts, like blogs, are available at embedding tags and attributes within your
just about every news Web site. Educators are page. That may sound confusing, but it is
taking advantage of podcasting by recording basically quite simple.
their lectures and then uploading them as a
podcast to the iTunes store or other places. To Before a web-page becomes a web page, it is
put together just like a regular document,
subscribe to a podcast, open the command to
EXCEPT that it has certain codes embedded in
subscribe in podcatching software and then
copy and paste the URL for the podcast. it that tell the document how it is going to look
when it's online.
Questions
These codes, or tags, are enclosed in the
1. This is a web application that takes data
from more than one source and combines carrot-shaped angled brackets, (carrot-marks)
it into a single, integrated tool: that you can see on your keyboard that look
- mashup like < and >, usually the upper case characters
2. This refers to the widespread t creation and on your comma and period keys.
posting to the web of media such as Writing HTML can be fun. For example, if you
videos, slides, end blogs by non are about to write some text that you want to
professionals: appear online as bold, you would type in the
- grass roots media tag that looks like this: <bold>. and from that
3. This allows a registered user to draw and point on, the text will appear bold when it's
narrate an idea and then share it via web online. At the point where you want the bold
page or blog: formatting to end, you would simply type
- sketchcast </bold>.inserting a slash in the tag.
4. A piece of server software that allows user
to freely create and edit a web page's In this way you can create an entire web
content using any browser is a/an: page, using graphics, different colors and sizes
- Wiki of font, hyperlinks, and even animation. Of
course there are lots of tags to learn, and a
HTML range of colors and tools to choose from. If this
interests you, take an online course in HTML,
You On the Web
and learn how easy it is to create your own
Introduction web pages - when you know how.

NCM110A - PRELIM 72
If you own a copy of software such as colsanderskentuckyfriedblues.com, or any
Microsoft's "Frontpage™" you can easily create other domain name that would infringe on
professional, custom web pages with lots of someone else's copyright or trademark. Nor
help and instruction at your fingertips. can you use a double set of golden arches as
However, it is still quite helpful to know HTML your logo - you get the idea! (We will discuss
when using these packages. copyrights in more depth in the next lesson.)

Tip: If you want to see what a web page looks It is better not to use extras in your domain
like in its raw HTML form, go to your VIEW menu name, such as a hyphen, if you can avoid it.
and click on "SOURCE." This option lets you see Websites with URLs such as www.rubber-duck-
everything that went into making that web place.com are a little more difficult for people
page. to remember and type in, than
www.rubberducky.com. However, if you are
Questions forced to use a hyphen, don't panic. Your site
1. HTML is used to: will still be searchable on the web. Keep
- build a custom web page thinking and trying out domain names until you
2. HTML is: come up with one that is most suited to your
a programming language needs or products.
3. If you want to see what a web page look
like in its raw HTML form, you should: Remember that a website is made up of web
- go to your view menu and click on source pages, so technically, what you are creating is
web pages that each have a specific
Site builders purposes and are linked to one another by
hyperlinks.
If you are not particularly interested in learning
HTML, but still want to build a website, consider What kind of site do you want? Remember that
visiting a site that offers "site builder" tools. if your website is going to be a place to
These authoring tools allow you to type in purchase a product of any kind, you must
regular format, and create your website just choose a .com domain name. If you want to
like you would create any document, and it set up an organization, you might want to
embeds the tags for you, giving you choices of consider an.org or .net site.
all kinds. Obviously, this is a much simpler way
to build a website, and unless you are wanting Questions
to do something extremely fancy, these site 1. What pages of a website are linked to one
builders are the way to go. Just Google™ another by:
website builder, and see all the choices! - hyperlinks
2. All of the following are general
Obtaining a Domain Name consideration when obtaining a domain
name, except:
We discussed earlier in the course how domain
- be prepared to use site builder tools
names are issued through registrars, and have
3. You should choose a .com domain name if:
different TDLs, or extensions that coincide with
- your website sells products
the type of website you want. If the software
you have used to create your website does not Website Components
offer this service, search for "obtain domain
name," and you will find hundreds of sites Most websites have an email link so that
offering to establish and register a domain people can send you a message, an order or
name for you. other communication. Commercial sites often
include a "shopping cart" and/or "storefront"
You will be taken to a screen that allows you to that allow your visitors to feel like they are
try out your domain name to see if it has shopping for your products. It also allows them
already been claimed. Since there are millions an easy way to check out and pay you. Most
of websites now on the Internet, you may need pre-packaged site builders include these
to be very creative to find one that is original features, and nowadays often contain a
and not already spoken for! blogging feature and other conveniences that
Be prepared to pay a fee for the use of your will help you make the best use of your
domain name, and also be prepared to pay website.
each year to maintain it. Some cost less than When planning your website, consider the
others. Also, be aware that you cannot violate following components before you start:
copyright laws with your domain name. An
example is - you cannot use domain names  Domain name
like www.proctor&gamblegames.com, or  Logo

NCM110A - PRELIM 73
 Content - text and photos about your 3. All of the following should be considered
subject when planning a website, except:
 Colors-background and text - Internet service providers
 Design scheme - sketch out your pages
 Contact Us feature and Email capture Copyrights, Trademarks and Plagiarism
 About Us page As with any created material, the material is
 Testimonials about what you are selling, if owned by the person who created it, whether
applicable it is a piece of writing, a piece of art, or a toy. A
 Samples/photos piece of original writing assumes natural
 Copyright information copyrights to the person who thought and
 Links to other sites wrote those ideas. Therefore, when you use
 Secure purchasing function and someone else's writing verbatim without
shopping cart crediting them, or steal their ideas as your own,
 Any free links, information or tools you you are in violation of copyright laws and have
can provide relative to your subject plagiarized their material.

Shelley Lowery's article on www.twospots.com When you use another person's words, you
describes some basic considerations about must always provide the name of the owner of
choosing colors for your web pages: the material and where you got the
information. If you do not do this, you will be
 Use caution when selecting your considered to have plagiarized the work, and
background and text colors. Busy will be in violation of copyright laws, whether
backgrounds make text difficult to read the copyright has been registered by the
and draw the attention away from the text. creator or not. In the world of writing, there are
In addition, always be consistent with your different formats for doing this. For our purposes
background theme on each page of your here, just know that you MUST credit the
site. creator of the work, as you have seen
 Select your colors very carefully, as colors throughout this course.
affect your mood and will have an effect
on your visitors as well. When you use an image or term that has been
 Bright colors, such as yellow and orange, created by someone else, you may be
cause you to become more cheerful or infringing on trademark rights. Maybe you do
happy. Colors such as blue and purple not believe these rules apply to you, especially
have a calming effect. Dark colors, such as if you are just a regular person trying to set up a
brown and black, have a depressing modest website. However, think twice about
effect. this. You can be sued for infringing on others'
 A good rule of thumb is to use colors based rights, not to mention the fact that you can be
on the type of effect you're trying to forced to remove the offending material.
achieve. However, it's always best for your
There are certain texts, images and music that
text areas to have a white background with
are considered to be in the "public domain,"
black text. meaning that, due to age, familiarity or other
So, planning ahead for your website is circumstances, they simply belong to
essential. Use search engines, books and everyone.
instructional materials to make as many The following information, borrowed from
decisions as possible before you begin to build http://cyfair.lonestar.edu, will provide you with
your website. Look at sites that are similar to a basic reference to consult while you are
your subject areas and get ideas setting up a website and will help prevent you
(remembering to respect copyright and from breaking rules as you create your
plagiarism laws and rules). masterpiece:
Questions
1. All of the following are basic considerations
when choosing colors for web pages,
except:
- it's always best for your text areas to have
a black background with white text
2. All of the following should be considered
when planning your website, except:
- page numbers

NCM110A - PRELIM 74
respect, and behave appropriately in our use
of it.
In certain cases, national governments have
imposed certain restrictions on the content of
the Internet for cultural and political purposes,
but generally speaking, it is a free network
where freedom of speech and expression
reigns supreme.
There are many established organizations that
play a role in maintaining the integrity of the
Internet, both in terms of technology and the
guidelines and operating principles.
InterNic
The InterNIC, or Network Information Center, is
a group of registrars who maintain all the
domains that are registered on the Internet.
They are part of our country's department of
commerce, and they are responsible for all of
the domain names that are registered.
InterNIC is the head honcho when it comes to
filing complaints about domain name or
trademark theft, viruses or other problems. Of
course, these kinds of complaints should first be
made to your ISP, but ultimately, InterNIC is the
governing body for Internet problems.
ISOC
The Internet Society is a non-profit organization
dedicated to monitor, improve and keep tabs
on Internet Standards. Following is the
Questions organization's description of itself:
1. When you use someone's work, you should
most significantly cite: The Internet Society (ISOC) is a nonprofit
- the author's name organization founded in 1992 to provide
2. Public domain works belong to: leadership in Internet related standards,
- everyone education, and policy. With offices in
3. When you use an image or term that has Washington, USA, and Geneva, Switzerland, it is
been created by someone else, you may dedicated to ensuring the open development,
be infringing to: evolution and use of the Internet for the benefit
- trademark rights of people throughout the world.
4. This is a form of protection to the authors of
Again, this is not an agency that profits from or
original work of authorship, including
governs the Internet, but one that voluntarily
literary, dramatic, musical, artistic, inserting
oversees the general standards of how the
other intellectual works:
Internet is used. Groups that determine and
- copyright
advise on standards for the Internet's
WHO'S THE BOSS? infrastructure are members of this society.

Who is in charge of the Internet? ICANN

A fascinating fact about the Internet is that The Internet Corporation for Assigned Names
there is really no one in charge. There are and Numbers is an organization that accredits
"registrars," and an agency that is responsible Registrars who sell domain names to ISPs. It is
for general oversight, but the Internet is simply getting a little complicated now, but really, all
run on the basis of self-governing agreement it means is that there are organizational bodies
and cooperation. It is up to us, the users, to that have formed just to handle the numbers of
make sure that we treat the Internet with companies, organizations and people who

NCM110A - PRELIM 75
participate in the use and upkeep of the ICANN Internet Corporation for
Internet. Assigned Names and Numbers -
an organization that accredits
Registrars
Registrars who sell domain
Registrars are private companies who register names to ISPs.
Internet domain names. There is a limited WWC, or World Wide Web Consortium -
number of registrars, however, the list has WC3 develops specifications,
grown tremendously since the early 1990s. guidelines, software, and tools
ICANN keeps a current list of accredited to lead the Web to its full
registrars and TLDs on their web page. potential.

WWWC Questions
The World Wide Web Consortium, headed by 1. The Internet Society (ISOC) is:
Tim Berners-Lee, one of the web inventors, - a nonprofit organization
describes itself as follows: "The World Wide Web 2. The interNIC is responsible for:
Consortium (W3C) develops interoperable - maintaining all the domains that are
technologies (specifications, guidelines, registered on the Internet
software, and tools) to lead the Web to its full 3. This organization develops specifications,
potential. W3C is a forum for information, guidelines, software, and tools to lead the
commerce, communication, and collective web to its full potential:
understanding". In other words, this is a group - world wide web consortium
that tries to keep the Internet operating at its Malware
maximum potential technologically, as well as
monitoring and improving web standards. The Shady Side

The folks at www.Netcomm.com in Australia As with everything in the world, there is a dual
answer our question as follows: reality with the Internet. Dangers lurk on the
Internet that everyone needs to be aware of.
Who Manages the Internet? Some of them pose a threat to the technology,
The Internet has always been the result of some of them pose a threat to individuals.
collaborative effort. Although it was initially However, knowing how to recognize potential
sponsored by the US Department of Defense, problems and knowing how to deal with them
from the outset it has involved experts from before they become problems is key to being
many fields and many institutions, who have a responsible Internet user.
developed a unique collaborative model to
build this most dynamic of systems. Viruses and malicious software:
The ultimate answer to the question of who
"Malware," or malicious software, is any
runs the Internet is that there are hundreds,
software that uploaded to a network or
or thousands, or tens of thousands, of
Internet that disrupts, alters, steals, damages or
organizations involved in provisioning for,
changes the data stored on the computer or
and shaping, the Internet. These include
network. We often use the generic term "virus,"
commercial companies, universities,
however, there are different kinds of malicious
statutory bodies, government departments,
software that do different things.
Internet Service Providers, and many more.
In the early days of software programming,
viruses usually occurred as accidents or
So, who is really in charge? Ultimately, as we
continue to use the Internet with behaviors of mistakes in program code. A virus is able to
spread from one computer to another over a
integrity and respect, we all are.
network, and often causes inconvenience and
Vocabulary even damage to a computer's operating
InterNIC Internet Network Information system. A virus that is sent over the Internet,
Center - A department of such as by way of email, can spread to
commerce organization thousands of computers in a very short time.
consisting of registrars who
What is a worm? The difference between a
maintain all the domains that
generic virus and a worm virus is that a worm
are registered on the Internet
does not require anyone to press a key or send
ISOC Internet Society - a non-profit
an email. An email virus, for instance, will die
organization dedicated to
out if everyone deletes it and it is no longer
monitor, improve and keep
allowed to spread. However, a worm does not
tabs on Internet Standards.
depend upon any actions of a user, and can

NCM110A - PRELIM 76
infect thousands of systems simultaneously spread into your system unless you open
since it uses the internet to do its free- wheeling the email that has delivered them.
damage.
Questions
Trojan? Remember the Trojan horse? A Trojan 1. A good way to avoid viruses on your
virus is wrapped up in what appears to be a computer is to:
legitimate program and when it is installed, its - purchase and install antivirus software
damaging contents liberated into your 2. A trojan virus is different from others
computer system or network! because it:
- is disguise as legitimate program
For the purposes of this course, we will not go 3. Malware is best described as:
into depth about how many viruses are out
- any type of malicious software
there on the Internet and how many kinds exist.
Instead, you need to know that your computer Spyware, Adware
must be protected from the constant
onslaught of new viruses that can be "caught" Naturally, if something as effective as a virus
over the Internet! becomes common knowledge, someone is
going to figure out how to make money from
Paul Bocij tells us in his book, The Dark Side of the idea. Thus, we now have Adware and
the Internet, that people create viruses for Spyware invading our computer systems via
several reasons. Some virus writers actually feel the Internet.
they are helping educate those in the world of
technology, who are challenged to figure out Spyware has the capability of monitoring your
how to prevent the virus. Others simply enjoy activities, as well as obtaining data and
doing something that will cause many people information from your computer system.
harm or inconvenience. Still others are looking Spyware is often difficult to detect and
to elevate themselves as better virus writers eliminate. It can collect information about your
than others. Another common reason for the credit cards, bank account numbers and
creation of viruses has been to achieve some financial dealings, leaving you vulnerable to
political goal, such as spreading a belief identity theft. However, its primary purpose is to
system or propaganda by reaching thousands target specific advertising to you, based on
of people with a certain message. Finally, what it perceives to be your interests and
some people want revenge for one reason or habits.
another, and find that sending a virus Adware is similar to spyware, but the
accomplishes some sort of win (Bocij). information it gathers is used to target potential
Solutions: customers by monitoring your Internet
activities. It may detect which Internet pages
1. Purchase one of the most popular virus you have visited and determine what products
prevention software packages available. It you might be attracted to so that the
is best to go to Google™ and search for the appropriate ads will pop up on your system.
best anti-virus software, since there are new
companies with improved technology that Adware and spyware are often secretly
may be available by the time you take this attached to legitimate-seeming software that
course. These software packages not only you might purchase or download.
clean your system of viruses, but will also The main purpose of creating adware and
allow you to periodically download the spyware is the potential for money and free
repairs for new viruses as they appear on marketing research. How much adware and
the Internet. spyware is out there? Again, Paul Bocij gives a
2. Go to the security settings in the Tools great example to contemplate:
section of your Browser, and make sure your
browser does not automatically download "In 2005, [researchers] took a brand new
and install ActiveX components. Also, it is computer without any security software
important when on the Internet to be sure installed, connected it to the Internet, and then
you have a firewall in place, whether it is browsed a number of Web sites aimed at
through your security software or children. After just one hour, the machine was
Windows™. examined for malware, and it was reported
3. If you receive email that is not that a total of 359 pieces of adware were
automatically deposited into your SPAM found. Although unscientific, this experiment
folder, but which comes from an unfamiliar suggests that some adware producers are
sender, delete it! Some viruses cannot deliberately targeting young people" (Bocij).

NCM110A - PRELIM 77
Considering that this little experiment was Almost all email programs have spam filters
carried out in 2005, try to imagine the growth which help detect emails that have been sent
of this activity in the last few years! to a mailing list or newsgroup. When you
receive unwanted emails, send them to your
It is probable that every time you search the spam file, and the filter will catch it the next
Internet you are inadvertently picking up some
time an email comes from that spammer. Right
kind of adware or spyware. What should you now, there is no real way to avoid receiving
do? spam if you use the internet, so, although it is
There are too many varieties of web bugs to annoying, deleting it or letting your spam filter
describe them all, but you can prevent them catch it may be your only remedy.
from doing major harm to you or your system. Hackers or Crackers
Solutions Hackers are "individuals who gain unauthorized
Most anti-virus software now comes with anti- access to computer systems for the purpose of
spyware and anti-adware features. However, stealing and corrupting data. Hackers,
there are specific programs available for themselves, maintain that the proper term for
download from the Internet that can such individuals is cracker"
effectively keep your system clean and free (www.webopedia.com). Government and
from this garbage. However - beware - some military agencies have spent thousands of
of the products, especially free ones, may dollars recovering and repairing their networks
come with their own hidden adware and and security systems due to hacking. Large
spyware. Make sure that you search for a agencies are constantly on the lookout for
reputable product that has been tested by breaches to their computer systems due to
outside sources and has been proven not to hacking by people whose computer skills are
include these insidious freeloaders. outstanding, and whose intentions are not
good. Unless you are running a high-level
Cookies organization through your computer, hacking is
Cookies are chunks of data that a web server not necessarily a worry.
places on your computer's hard drive, for Should you be afraid to use the Internet?
several reasons. The cookies store information Absolutely not! But you should practice a great
about forms you fill out, sites that you have deal of care in protecting your computer's
"registered" on, and goods you have system and integrity by taking the precautions
purchased over the Internet. Cookies actually of installing protective software. The next lesson
have the effect of smoothing transactions that addresses personal safety issues.
you make on the web, and are not particularly
harmful. Glossary

Delete Your Temps and Cookies


When your search engine is open, there is a
menu option called Tools. At the bottom of
that menu is the choice of "Internet Options."
Opening that tab will show you how to delete
your temp files, as well as the "cookies" that
have been placed on your system by a web
server. You can also get to this menu through
your Windows Control Panel, choosing the
Internet option. You should do this occasionally
if, for no other reason, to keep your system
running smoothly.
Spam
If you have an email account, you will get
Spam. Spam is a slang term for unsolicited
emails, which are intended to either involve Questions
you in some kind of scheme or sell you 1. The primary purpose of adware is to:
something. Of course, it does not refer to all - gather information about your buying
unsolicited emails, but generally, it is simply habits
electronic junk mail advertising something. 2. A spam filter's function is to:
- remove spam to a separate file
Spam filter

NCM110A - PRELIM 78
3. A computer virus is best described as:  meet in the daytime for coffee only, and
- a small program that attempts to copy  do this several times before ever going
itself from one computer to another on a nighttime date.
4. Disarmed small files that are legitimately
saved to a user's hard disk when a website We all want to think that we can trust our
intuition regarding our judgment of others, but
is visited:
people who are ill or deviant can be extremely
- cookies
convincing. There are, of course, horror stories
The Dark Side- Predators, Scams, Hoaxes that do not need to be told here. Just be
smart!
We discussed the shady side of the Internet
involving threats to computer systems and Cyberstalking:
invasion of privacy through software programs
People sometimes use the Internet to harass or
and hackers. However, more serious threats to
terrorize others. In addition, social networks
Internet users involve scams, hoaxes, and
have been breeding grounds for what
predators who prey on our vulnerability,
resembles gang activities, ganging up on one
gullibility or youthfulness. This lesson deals with
vulnerable person and ridiculing the victim,
the truly dark side of our technological age.
even to the point of suicide. Cyberstalkers
Although it is not necessary to avoid the
have also been known to claim that their
Internet or be afraid of it, there are precautions
victim is harassing them as a way to avoid
to be taken, particularly with our children, to
prosecution. Never allow yourself to get too
make it a safe "place" to play.
involved with people you do not know,
Predators especially if you feel vulnerable. And, certainly,
always monitor your children's actions on the
When your children are playing for hours on web.
the Internet, it is important to know what they
are doing. and with whom they are "chatting." Clubs and Bad Apples:
Somewhat prevalent in chat rooms and social
There are sites and online groups on the
networks are predators who hope to get to
Internet that encourage and instruct people
know children through communicating with
on ways to commit suicide. There are those
them on the Internet. Once they establish a
who explain how to make a bomb, how to buy
friendship and gain the child's trust, if they are
a fake license or degree, how to make
truly a predator, they may arrange to meet
poisons, cheat, or commit the perfect crime.
with the child for perverted or dangerous
The dark side of freedom is that there is danger
reasons. Children who have met with Internet
for those who are not discerning. If your child is
friends have been kidnapped, molested,
depressed or angry, take special note of his
brainwashed and mistreated in other
Internet activities, just to be safe.
unspeakable ways. This is not to imply that
there is a predator around every corner, but it Parental Control Software:
is worth being very aware of what your
children are up to on the web. Most Internet Service Providers offer the option
to parents of blocking undesirable material,
Adolescents can be particularly vulnerable to including pornography, foul language and
the dark side of the Internet. Often feeling violence. However, it does not block
isolated and misunderstood, there are often everything, and does not preclude a watchful
cult members and rescuers who want to help eye over children using the Internet. Never
them overcome their unhappiness with assume that these things could not happen to
themselves or their home lives. Young women your child.
who put out the message that they are in
distress are often sought by recruiters in the sex Questions
trade. 1. Cyberstalkers used the Internet to:
- harass or terrorize others
Dating websites come with their share of 2. Parental control software is capable of:
hazards, as well. Never, ever agree to meet - blocking access to undesirable material
personally with someone you have just met on on the Internet
the Internet. In fact, unless and until you are 3. A predator can do harm to your child by:
completely positive that this person is for real, - gaining his / her trust
don't meet at all. If you do get to the point of
wanting to meet someone, make sure you HOAXES

 take along a friend, and tell someone Fraud


where you are going,

NCM110A - PRELIM 79
One of the Internet's most commonly known
hoaxes is called "419 fraud," and involves offers
of a large commission to the receiver in
exchange for your help in getting money out
of Nigeria or other African nations (Bocij p.
211). This scheme is so elaborate that the
perpetrators provide telephone numbers in the
Netherlands of their attorneys and photos of
wealthy "victims" in Africa who are somehow
being prevented from getting their money.
Email Hoax
One of the most detested email hoaxes
involves pleas for help for a dying child. These
can be quite convincing, and the perpetrators
are often able to collect thousands of dollars
Questions
from sympathetic users before they suddenly 1. This is an example of an email hoax:
disappear. - chain email
A milder, less destructive email hoax is the 2. Identity theft refers to:
chain email, which promises large sums of - therefore a user's personal information for
money only if you do not break the chain, criminal purposes
which requires you to forward the email on to 3. If you are threatened with bad luck as a
many others. Know that this is only a penalty for not forwarding an e-mail, you
convenient way of gathering information - should:
delete it! - delete it

An annoying email hoax is the sappy message Ethics and Netiquette


of kindness or good wishes that threaten to turn
It turns out that there are many people
your luck if you do not forward them to a
concerned about ethics when it comes to
certain number of people within a certain span
using the Internet. With a system so wide open
of time.
to every kind of culture and individual, it
Other hoaxes involve identity theft, where becomes important to come to some kind of
confidential financial information is sold to consensus about what considerate and ethical
those who steal credit and debit card account behavior on the Internet actually looks like. We
numbers and spend money that does not will address abuses of the Internet in the
belong to them. We discussed earlier the kinds following lesson, but for now, let's take a look at
of spyware that can gather information from the standards and ethics that have been at
your computer, as well. Always be cautious the core of discussions about the Internet.
when providing information over the Internet. It
Basic courtesies
is a good idea to have one credit card that
you use for Internet purchases; try to find one Respecting others' privacy on the Internet, or
that protects you from fraud, and limit its use to using "netiquette," is an important aspect of
the Internet. practicing ethics.
Scams For instance, do not stand behind someone
and watch them enter a password. This is
The recently prosecuted Ponzi scheme is one
called "shoulder surfing" and is frowned upon
that is carried out on the Internet every day. A
by most Internet users as an annoying invasion
Ponzi scheme is one that takes money from
of privacy.
new investors and uses to pay older investors at
high rates of interest. Beware of sites Do not post someone's photo on your social
encouraging you to invest. networking site without asking permission.
This is a short description of some of the darker Do not engage in gossip about others or use
aspects of the Internet. Fortunately, they can the Internet to do emotional harm.
all be avoided, and they don't stop millions of
people from using the Internet every day for Do report fraudulent sites, products and
constructive purposes. So, jump in, and enjoy behaviors.
the freedom to connect with the world. Choose unpredictable passwords that cannot
Vocabulary easily be guessed.

NCM110A - PRELIM 80
USE COMMON SENSE.
 If you see someone being harassed or
stalked on a social networking site, do not
participate in any way. If it becomes
serious, notify authorities.
 Never offer false information or bogus
products online.
 Never do anything intentionally to disrupt or
damage someone's computer system, their
emotions, or their lives.
 Do not use the Internet for any kind of
abuse of others, regardless of whether there
is potential money involved.
 If you know you have received a scam
email, delete it - do not bait the person and
lead them to believe you are falling for it.
 Do not illegally copy or download the
intellectual property of others' that you
know is copyrighted. Do not download
pirated music.
 Do not visit sites that have ill or destructive
intent.
Questions
1. Basic courtesies when using the Internet
include all of the following, except:
- blocking pop up advertisements
2. In regard to netiquette, shoulder surfing
refers to:
- standing behind someone and watching
them enter a password
3. All of the following should be practiced
when using the Internet, except:
- to maintain security, visit only large and
well known sites

LESSON 5 : POST-QUIZ
1. The Internet is a series of jobs:
- true
2. www.doggiecoupon.com is an example of
web address:
- true
3. Ted Stevens played a fundamental role in
developing the Internet:
- true
4. We can now play video games with people
in other continents because of the Internet:
- true
5. Ethernet provided a way to connect local
area networks:
- true

NCM110A - PRELIM 81

You might also like