Lesson 6
Lesson 6
SOFTWARE
SOFTWARE
the general term applied to the instructions that direct the computer`s hardware to
perform work.
TYPES OF SOFTWARE
UTILITY PROGRAMS - are programs that are used to help maintain the system,
clean up unwanted programs, protect the system against virus attacks, access the
World Wide Web(WWW), and the like.
SYSTEM SOFTWARE
- first level of system control that stored on a read only memory(ROM) chip on the
motherboard.
The software on the BIOS chip is the first part of the computer to function when
the system is turned on.
Given that the BIOS consists of a set of instructions permanently burned onto a
computer chip, it is truly a combination of hardware and software.
Programs on chips are often called “firmware,” because they straddle the line
between hardware and software.
Operating System(OS)
- Oss are actual software, loaded from the hard drive into RAM as soon as the
computer is turned on.
While the firmware cannot be upgraded without changing the hardware chip, the
OS can be upgraded or entirely changed through software.
The user simply deletes OS files from the hard drive and installs a new OS from a
CD-ROM or floppy diskettes or perhaps downloads it from the web or another
site.
Disk Operating System -were first designed for mainframe computers and
replicated the procedures programmers used under manual OSs.
Graphical User Interface -provided by Oss such as Microsoft Windows. This was
the “computer for everybody,” and the PC market exploded.
Although the GUI did not eliminate the need for users to spend time
learning new programs, it did bring closer to reality the ideal that computers
could become “self-teaching” device. People could begin to use computers
with minimal training, using built-in tutorials and online answers to
common questions.
A GUI OS supports use of graphic images called “icons” to represents commands
to the computer. Each icon image is designed to look like the physical
representation of the operation the user wishes to employ. GUI Oss also support
the operation of menus. Similar to menus in restaurants, the GUI menu provides a
narrative list of common commands, or operations that the computer can execute.
NESTED MENUS- are submenus and sub-submenus; that is, the user clicks on a
menu item, and instead of executing a command, the computer presents another
menu of choices.
APPLICATION SOFTWARE:
includes the various programs people use to do work, process data, play games,
communicate with us, or watch multimedia programs on a computer. Unlike
system and utility programs, they are written by or for system users.
UTILITY PROGRAMS
In addition to the operating system, there are a variety of other system programs
available to the user. Some are called utility programs, and are designed to
enhance the functions of the OS or perhaps to add facilities that the basic OS does
not offer.
These include programs that provide algorithms for efficiently sorting a large set
of numbers or character-based items, copying files or parts of files, security
programs, and the like.
People and computers do not speak the same language. At the same level,
computers only understand binary. Human beings do not speak binary.
Consequently, it is very difficult to write a program in the machine`s language.
Translation programs are needed to convert instructions written in an English-like
language.
The WWW is a sort of network system utility program for the internet. It provides
a protocol for document transfer across the internet.
A Web browser is a utility program that allows the user to access the Web and the
materials available through the Web.
The internet is a system of data and voice lines routed through dedicated servers to
create a network of networks; that is, it consists of linkages that allow users from
one computer network to access the documents and files available on one another
network.
PROGRAMMING LANGUAGES:
Actually, of course, the only language a CPU can understand is binary or machine
language
MACHINE LANGUAGE -is the true language of the computer. Any program
must be translated into machine language before the computer can execute it. The
machine language consists only of the binary numbers 1 and 0, representing the on
and off electrical impulses. All data—numbers, letters, and symbols—are
represented by combinations of binary digits.
ASSEMBLER LANGUAGE -is far more English-like, but it is still very close to
machine language. One command in machine language is a single instruction to
the processor. Assembler language instructions have a one-to-one correspondence
with a machine language instruction. -is still used a great deal by system
programmers and whenever application programmers wish to manipulate
functions at the machine level.
-or the third level languages are called natural language. In these types of
programs, the user tells the machine what to do in the user`s own natural language
or thoughts use of a set of very English-like commands.
True natural language recognition, in which any user could give understandable
commands to the computer in his or her own word style and accent is being
performed at the beginning of the twenty-first century.
The most common package sold with computers is a standard office package.
The standard office package includes a word-processing program, a spreadsheet, a
presentation graphics program, and some form of database management system.
The two most commonly used programs are e-mail systems and word processor.
Another very common product is a desktop publisher. Most of these common
programs have to be written in two versions: one for the IBM PC platform and one
for the Macintosh.
CHAT ROOMS -are like electronic conference calls. Multiple users can send and
receive messages at the same time. The strengths of chat room technology include
the ability of many people to “meet” without having to leave their homes. The
person the user is “chatting” with can be at another computer in the same room, or
halfway around the world.
LISTSERVS
The least powerful version of an electronic bulletin board is listserv. This program
functions more like an electronic mailing list than a true discussion board. When a
user posts a message to the board, it is merely e-mailed to all members of the
conference.
COMPUTER PROGRAMMING:
Computer Programming – refers to the process of writing a computer program,
which is a series of instructions written in proper sequence to solve a specific
problem. A program primarily encompasses the program instructions and is
generally written by a computer programmer
Once the problem/task is precisely specified, the process for solving the problem
must be designed. There two types of specifications involved in program creating.
The first is the set of functional specifications that identifies all the functions the
program is to perform. This include a narrative description of the functions of the
system and a graphical representation of the system`s process flow. The second set
of specifications (called “specs”) is thee design specifications. The design specs
are the instructions given to the programmer. Design specs may be highly
technical and are not typically viewed by the costumer.
PROGRAM PREPARATION
Program preparation, the actual writing (or coding) of the program, entails
translating the design specifications into the programming language to be used.
The program instructions (algorithms) must be coded in detail and in logical
sequence so that the program can process data correctly.
DOCUMENTATION
PROGRAM TESTING
Alpha testing Program testing occurs during and after coding. Two types of
testing are performed. First, the programming team and system analysts carefully
desk check the program in a process called “alpha testing”. This process is also
called “desk checking”. The purpose of alpha testing is to see if all the processes
appear to be functioning as specified in the flow charts, functional specifications,
and design specs.
Beta Testing The second level of testing is called “beta testing”. In beta testing,
the program is installed in the actual user environment, and further programming
of screen formats and other user interface functions is performed. Users begin the
final testing phase by entering real data and checking that the system products are
accurate and complete.
Lesson 7
INTRODUCTION:
• Conduct business
• Obtain information
• Manage life
Internet
• provides the ability for computes attached in some way to one of the wires or
cables on the system to send and receive information from computer networks
regardless of the location.
• 1957 Russian launch sputnik, the result was the creation of Advanced Research
Project Agency (ARPA) by President Eisenhower. Packet Switching- devised
system result of dividing message into smaller pieces, each individually addressed,
invented by Paul Barran
• 1962 Dr. J.C.R licklider lead the research to improve military use of computer
technology. This visionary moved ARPA work from the private sector to
universities.
• 1969 Dr. J.C.R put his brainchild into operation in the fall and named ARPANET,
after its DoD pentagon sponsor the ARPA. first node was installed at the
university of California, Los Angeles.
• 1973 The first step to this outcome were taken by Vint Cerf and Bob kahn -
leading to the creation of the Transmission Control Protocol and the internet
protocol (TCP/IP). This decentralized structure together with standard
communication methods made expansion easy.
• 1980’s many networks had adopted the standards, and internet became reality
• 1990’s Commercial networks such as CompuServe and Prodigy became part of
the internet; users of these networks could only communicate with those using the
same service.
• In principle, any computer or network that obeys the protocols, which are
technical, not social or political, can be an equal player.
ISOC ( www.isoc.org )
Protocols
• determined two devices how data will be transmitted between two devices.
• The main protocols on which the functioning of the internet is dependent are
referred to as TCP and IP.
• IP- the lower level protocol, responsible for making decisions about
packets.
• FTP- file transmission protocol, permits users to send all types of electronic
files over the internet.
THE DOMAIN NAME SYSTEM (DNS)
• The internet’s DNS permits us to give globally unique “names” to networks and
computers.
• BENEFITS:
• .COOP cooperative
• The internet had over 109 million hosts in 230 countries as released by the Internet
Software Consortium in March 15, 2001 from data collected during January 2001
• The growth rate of the internet is estimated to be between 46 and 67% annually.
• Net is growing worldwide at the amazing rate of 63 new hosts and 11 new
domains per minute.
• The first e-mail software appeared in 1972 today’s e-mail software allow users to
list, selectively read, file, forward, and respond to message.
• During the next decade, e-mail was the largest network application.
• The e-mail was made freely available to anyone who wanted it.
• Anyone connected to internet could use the FTP protocols to connect to the host
computer and download any of the available files.
• Archie sites - they pooled the information from their searchers and made it
available to users at other sites.
• The FTP was mentioned use to download and upload files from distant computers
and transferring data.
• This protocol is still in use today for exchange of data but most use is transparent
to the user.
• TELNET
• one of the protocols used in internet, a terminal emulation program that is part of
the TCP/IP protocols. allows a connecting computer to behave like a terminal for a
distant computer regardless of the type of computer that is target or originator of
the telnet session. used to control web servers remotely
• One of the most popular users for internet remains the ability to send and receive
e-mail. Many individual uses e-mail for different purposes.
• Mara.clara - username
• To accurate judge the mood of the sender the practice of typing characters
available on a standard keyboard to form a picture, these small icons is called
emoticons or smiley that use to denote a mood.
ABBREVIATIONS
Examples:
• This allows keeping “inbox” or mailbox area clear for messages that still have to
attend and keeps messages you want in future.
• Lawrence Lessing - law professor warns that the internet is having an impact on
the concept of privacy.
FILE ATTACHMENTS
• Plain text e-mails that can be read by all e-mail software and all word processors.
• Has a Proprietary files format that can only be read by the program that created it
• After creating file, you can directly attach file and send to the recipient.
MAILING LIST
• Eric Thomas - created the first software that automated many of the functions
necessary to maintain a list.
LIST FUNDAMENTALS
• 1. The address of the software that manages the list, used to subscribe to the list,
unsubscribe, or use some of the functions that the software makes available.
• 2. The one that subscribers use to post a message to the mailing list.
• WWW is not just some passing trend but an integral part of the world today.
• Tim Berners -lee - inventor of the WWW named as one of the top 20 thinkers of
20th century.
• Browser - is a client program that translates files to the image you see on the
screen
• First propose in 1989 by Tim Berners -lee while working with Robert Cailliau
First prototype appeared in 1990 but released in 1991.
• Browser was released in 1992 to the public as freeware and there were only 50
Web servers
FUNCTIONS OF WWW
• Has special software that allows receiving, interpreting, and sending to the client
computer the request file.
• Web’s use of HTTP enables the transmitting and interpretation of all types of files.
• Credibility - what is the source of the information, how current is it, useful and
relevant; what was the process for editorial review.
• Content - to help judge accuracy examines the hierarchy of evidence, presence of
original source.
• Disclosure - what is the purpose of the site; who is sponsoring it, and what will the
site owners will do with any information that they collect.
Introduction:
the length of time a mobile device runs before requiring recharging whether the
computer functions as stand-alone or as part of a network,
Physical Characteristics
In general, a desktop computer is too heavy to hand carry, has a larger display,
processing power measured in gigahertz (GHz), memory capacity up to
gigabytes(GB), storage capacity up to GB, and is not designed to run on internal
battery power.
A smart phone
A smart phone
weighs ounces,
Physical Characteristics
The tablet is lighter, has a slighter smaller display, and slightly less processing
power and storage capacity than a laptop.
The most important difference between a notebook/laptop and a tablet is that the
display allows use of a stylus for input on a tablet.
Keyboard and mouse input is possible but not necessary when using a tablet
since the user may employ a stylus for writing or drawing.
has many characteristics in common with the smartphone (a hybrid of PDA and
telephone), but tends to have a longer battery life since it need not support voice
communication.
Battery Life
The length of time a battery supports use of the device and the length of time for
the battery to recharge determine the usefulness of the device.
For mobile technology, the most common types are either some form of a:
LITHIUM BATTERY
ALKALINE BATTERY
The operating system for a computer determines many of the characteristics of the
computer because the operating system controls how the hardware and the
software work together.
The most two commonly used operating systems for PDAs are Palm OS or
Windows Mobile.
Mobile Devices
Any computer systems that can be hand carried or rolled around is a portable
device.
Computers that are small and light weight enough to be hand carried are mobile
devices.
A computer that can be held in the palm of one hand and used with the other hand
is a handheld device.
A desktop computer typically is connected to the world through a metal wire cable
(e.g., copper wire Ethernet following the IEEE 802.3 standard).
Wireless Devices
With the right card added to the computer and a wireless local area network
(WLAN), it is possible for a wirelessly enabled desktop computer to connect
through an over-the-air interface to a computer.
The most commonly standard used for this is IEEE 802.11 that governs how local
area networks (LANs) connect wirelessly using wireless fidelity (Wi-Fi).
Tablet computers typically are designed for both hardwire and two types of
wireless connectivity.
They often have an Ethernet port for metal cable connection to the LAN as well as
both infrared (Infrared Data Association), and Wi-Fi.
PDAs providing e-mail and Internet access typically do using Wi-Fi to connect to
a WLAN.
Bluetooth is an alternative standard, best used for connecting PDAs and cellular
telephones for short intervals.
It will allow a nurse to manage and organize time effectively and efficiently.
help nurses improve patient care by bringing information to the nurse at the point
of care at the moment that information is most needed.
1.) Address book- is an always-alphabetical list that has fields for name, address,
phone numbers, organization, e-mail, and other data.
4.) Memo pad- provides a place to compose memos, which can be synchronized
with another computer. One use is to produce and edit project outlines.
5.) Notepad -is useful in jotting quick notes. It allows the nurse to write directly on
the screen in digital ink. It is also useful for changes in patient conditions, changes
in orders that occur on rounds, and taking notes at Continuing Education offerings.
6.) to do list- allows the nurse to create multiple lists and keep track of tasks to be
done daily, weekly, or monthly. The advantages for healthcare providers using the
standard PDA functions include saving time through improved access to and
management of information.
Web browsers.
Document viewers, allow the nurse to download and read text files.
A graphics viewer for image viewing may be useful for individuals practicing in
specialties where images are a basic requirement.
PDA database programs are available to read data files and can be used to create
databases.
Web browser are another popular application for PDAs. These application may
function as off-line HTML document readers.
Clinical Applications by Functional Categories
There are applications that support clinical care (e.g., medications, treatment,
documentations, clinical decision- making), administrative functions (e.g.,
reporting), research, (e.g., data collecting), and education (e.g., presentation).
Clinicians utilize their PDAs to support their workflow by having ready access to
relevant information at the point of care.
The ability to quickly check on signs and symptoms that could indicate a medical
emergency,
Clinical reference
Patient tracking
journals,
pharmacologic references,
pharmacology resources,
Pharmacologic databases are probably the most frequently used PDA application.
All applications contain drug information for prescription drugs and some are
bundled with additional application that support clinical decision-making.
Several drug database programs to aid in the selection of antibiotics are available
and function as clinical decision support tools.
HIPAA Implications
This is typically done through encryption. The data exchanged is encrypted when
it leaves and is decrypted when it arrives at its destination.
Encryption and decryption take time, so system performance will be slower than
if the data were not encrypted.
Evaluation of Clinical Application
The software selected must be compatible with the operating system of the PDA.
Factors to consider include the amount of time and level of effort required to
install and successfully run the application.