ANALYSING
- it is the investigation of information that is not allowed.
-creating new information
- Face recognition- camera's scanning a crowd: the way it is used, for analysis.
- Google Maps- work out who is where etc....
- Privacy
- Genetic Screening- ( offered by insurance companies) to see if the person is going to get an diseases.
PROCESSING
- Processing is when data is updated, altered in any way shape or form to give it meaning.
- Changing original data.
- E.G.- Photoshop, Transaction processing, Thesaurus, spell check, file conversions, online translators and currency converters.
- Social Consequences for spell check: People may become reliant on this technology, and when it is not present they may not be able to compose sentences on the same standard.
- Social Benefits Its educating user. These tools are educating society, improving thier vocabulary.
- Accuracy of processing- Online language translator, translating sentence incorrectly, is it person who develops it or the person uses it.
- My School Website: Cotains imformation provided about a certain school academic level.
- Bias on website, only academic based, nothing is mentioned on say external curricular, like social justice environmental groups etc...
- Only about year 7 and 9
- It has its use but it must be weiged up, only a slice of information not whole picture.
- Spam Email: Some of these processes are contributing to unwanted technology such as spam.
DISPLAYING
- The process which output information system which is produced in hard copy or soft copy accoring to the needs of users.
- Depends on puspose of Information System and the type of data that the system allows.
- E.G.: Maps- Mobile
- E.G.- Led and 3D Glasses
- Hardwarres for displaying data, E.G. : Speakers.
- Surafce Computing: GUI elements replaced by everyday obejcts.
- Less type of people working, and you may need others to work for you, involved in certain fields.
- Taking place at table cusomters are sitting at.
- OLED- Uses much less power, better for the envrionment.
- Screen Magnification software.
- Screen Readers
STORING AND RETRIEVING
- Cloud Computing: Applications and data in the cloud
- IPP 4 ( law) concerning storage and security states that the info. must be stored securely to prevent loss.
- IPP 5-7 record types of info they hold and who they give info access to.
- Hacker could exploit data through phishing and fraud.
- Identification Cards- unlawful access and retrieval of sensitive data- enablign one to steal another's identity.
- Radio Frequency Identification- can be incorporated into a product, animal, person for identification and tracking.
- Can make barcodes obsolete.
- Hacker & analysts could disable a car's RFID anti theft feature, swap procut's price for lower price or even medical info.( COPY) from RFID chip.
-CDS, flash storage (USB), memory cards.
- Such devices can be stolen and the thief can alter or delete the information stored on the device.
COLLECTING
- Bias information.
- Corrupt data- can make things unworkable.
- Privacy of individuals, Privacy Act: Protects user from having their personal information collected.
- E.G. Facebook- notifies user which info is being collected or distributed
- Other forms in which user will notified if data is being collected include:
--> Surverys
- Body scanning.
- Web bots: E.G. Google, say type in a phrase from a newsletter of the school, it will come up.
- They build an index, Google doesnt store every page in the internet, it stores a table, a hugh table and every one row of that table will be the URL and by some means the keywords. So when typing a search into Google, it searches table, finds the URL and presents it to user.
TRANSMITTING AND RECEIVING
- Inscription of data, stops people from viewing information they're not supposed to.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment