27/11/11

learning objective chapter 1-5

chapter 1
1.   Describe several ways computers play a critical role in modern life.
Computers critical role in modern life is with their applications are commodity. Involved in our aspects daily life.
2.   Discuss the circumstances and ideas that led to the development of the modern computer.
Circumstances and ideas that led development of modern computer because people needs grew more and more various, based on what they want and what they need
3.   Describe several trends in the evolution of modern computers.
Trends in evolution of modern computers began with discovered first microprocessor by Intel engineers & PC revolutions in 
4.   Explain the relationship between hardware and software.
Relationship between hardware and software are computer’s versatility divide into 2 parts, hardware (physical part) & software (instructions tells hardware how to transform/ process input data into output. Without them or each one of them, computer is nothing
5.   Outline the five major types of computers in use today and describe their principal uses.
Five major types of computers today and their principal uses 
-PC’s (word processor, accounting, gaming, digital music & videos)
-Workstations (massive computing power used for high-end interactive applications)
-Portable Computers (no need desktop, easy handle & bring anywhere)
-Servers (provide software & other resources to other computers over network)
-Mainframes (big computing jobs, multiple communications at one time through process of time sharing)
-Supercomputers (fastest access, most powerful computers made)
6.   Describe how the explosive growth of the Internet is changing the way people use computers and information technology.
Explosive growth of internet changing way people use computers and IT because with internet, many people buy & use computers each day to access internet network
7.   Explain how today’s information age differs from other times in history and prehistory.
Today’s information age differs from other times in history and prehistory because back then in history of society we have had agricultural & industrial age. Now, peoples earn livings working with words, numbers & ideas
8.   Discuss the social and ethical impact of information technology on our society.
Social and ethical impact of IT on societythreat to personal privacy, hazard of high-tech crime, abuse informationemergence of bio-digital technology, dangers dependence on complex technology
chapter 2
1.   Explain in general terms how computers store and manipulate information.
Computers manipulate information by performing arithmetic/logical (decision-making) operations. Finally, the information being communicated the world outside. Inside computers, information can be move and store in memory
2.   Describe the basic structure and organization of a computer.
Basic structure and organization of computer are computers has four main components, there are input & output devices, Central Processing Unit (CPU), also memory & storage devices
          INPUT DEVICE (keyboard, pointing devices)-PROCESSOR (CPU)-OUTPUT DEVICES (printer, speakers)
3.   Discuss the functions and interactions of a computer system’s principal internal components.
Computer system’s principal internal components is Central Processor Unit (CPU), it functions are: interprets & executes instructions in each program, supervise arithmetic &logical data manipulations, communicates with other parts of computer system indirectly, extraordinarily complex collection of electronic circuits and housed along with other chips & electronic components
4.   Explain why a computer typically has different types of memory and storage devices
Computer typically has different types of memory and storage devices it happened because people’s need of it is full of variation

chapter 3
1.   List several examples of input devices and explain how they can make it easier to get different types of information into the computer.
-Pointing devices; mouse, touchpad, pointing stick, trackball, joystick, graphics tablet, touch screen, stylus
-Reading Tools; optical mark, magnetic-ink character, bar code, pen scanner, tablet PC, smart whiteboard, RFID
-Digitizer; scanner, digital camera, video digitizer, videoconference, audio digitizer, speech recognition software, sensors
2.   List several examples of output devices and the explain how they make computers more useful.
-Screen Output (monitor)
-Paper Output; impact and non-impact printer, multifunction printer, plotter
-Fax Machines and Fax Modems
-Audio Output; sound card, synthesizers
-Other Control Machines; robot arms, telephone switchboards, transportation devices, automated factory equipment, spacecraft, force feedback joystick
3.   Explain why a typical computer has different types of storage devices.
Computers begin more useful because it’s not just receives, stores & manipulates information but also provides & gives something that we need, in certain different forms

chapter 4
1.   Describe three fundamental categories of software and their relationship.
Fundamental categories of software are compiler/translator, software application software system
2.   Explain the relationship of algorithms to software.
Computer system’s hardware equipped to produce whatever output a user requests
3.   Discuss the factors that make a computer application a useful tool.
Factors make computer application a useful tool
-Replacing printed documentation with other forms
-Upgrade to adjust with new circumstances & software conditions
-Compatibility
-Disclaimers, software manufacturers not responsible with the software deformity after being installed & used
-Licenses, software can’t legally duplicated
-Distributed via direct sale, retail, mail order, website, website & copyrighted
4.   Describe the role of the operating system in a modern computer system.
Role of the operating system in modern computer system it is hardware-software connection. Envisioned to handle complex input our output operations by communicate with a variety of disk drive
5.   Describe how file systems are organized.
With logically by system folders
6.   Explain why unauthorized copying of software is against the law.
Unauthorized copying software against the law cause a loose of billion dollars each year in business sector

chapter 5
1.   Describe how word processing and desktop publishing software have revolutionized writing and publishing.
Word processors  revolutionized with processing handwritten words. Otherwise, desktop publishing revolutionized with saves money & time efficiently
2.   Describe the basic functions and applications of spreadsheets and other types of statistical and simulation programs.
Basic functions and applications of spreadsheets and other types of statistical & simulation programs is for money managers, automatic mathematics, statistics and data analysis, scientific visualization, computer modeling & simulations
3.   Explain how computers can be used to answer “What if?” questions.
Computers can be used to answer “What If?” questions, because with spreadsheets they can allow you to change numbers & instantly see the effect of those changer also equation solvers
4.   Explain how computers are used as tools for simulating mechanical, biological, and social systems.
Computers are used as tools for simulating mechanical, biological and social systems because it can create abstract models of objects, organisms, organizations & processes

learning objective chapter 6-10

chapter 6
·         Contrast types of computer graphics programs
-Painting: paints pixel on the screen with pointing device moves translated into lines and patterns on the screen
-Image Processing: manipulate photographs/other high resolution images
- Drawing: stores a picture as a collection of lines and shape
- CAD: create design on screen for products ranging from computer chips to public buildings
·         Computers changing way professionals and amateurs works with video, animation, audio and music because these programs makes people work in simply way
·         Relationship between hypermedia and multimedia is hypermedia refers to information linked in non-sequential ways not only combines text & numbers, but also all kinds of multimedia, like graphics, video, animation, etc
·         Present applications for multimedia technology is just like all the programs above. Otherwise for the future, there are Virtual Reality, Tele-immersion & Augmented Reality

chapter 7
·         Database is collection of information stored on computer disks.  consists of database program
·         Problems that can be solved with database software like storing large quantities of information, retrieving information with quickly & flexible, organize-reorganize information database printing output in variety ways
·         Kinds of database software, simple file manager Ã  complex relational database are batch processing, real-time computing and interactive processing
·         Database operations are: storing (entering records); sorting (rearrange records); updating (renewing record’s field); querying (find records that match specific criteria); and summarizing information (the conclusion we get from the record’s field)
·         Easily accessible databases makes lives safer/more convenient because there are many kinds of database software & we just have to choose what would likely we need. Then, database systems, can we use to save our personal information that we might forget if we don’t write it down somewhere
·         Ways databases threaten our privacy because database load personal information, which might be great value for someone. This information could be privacy that can maintain our dignity and freedom

chapter 8
·         Basic types of technology that make telecommunication possible is Geostationary Communications Satellites that match the Earth’s rotation, so they can hang in stationary position relative to the spinning planet below, relaying wireless transmissions between locations on the planet
·         Local Area Networks (LAN) computers are physically close to each other, usually in the same building or cluster of buildings. Each computer & peripheral is an individual node on the network. This node connected by cable
·         Uses of :
–E-mail: send and receive messages to others on network(with HTML)
-Mailing List: participate in e-mail discussion groups on special-interest topics
-Newsgroup: public discussion on a particular object
-Computer Telephony: messaging system that can store, organize and forward messages
·          How wireless network technology transforming ways people work and communicate  because it provides practical solutions. A lightning-fast network connection to desktop is of little use, when bandwidth is less important than mobility and portability 
·         Current trends in telecommunications and networking like video rentals, cable TV, newspapers, and magazines will be transformed or replaced by digital high-bandwidth interactive delivery systems of the future

chapter 9
·         Internet was created with the build of ARPANet (Advanced Research Projects Agency Network) in 1969 by team of visionary computer sciences developing request of the Department of Defense, because the world needs something that making connection or network easier and simple
·         Technology that is at heart at internet is Transmission Control Protocol/Internet Protocol (TCP/IP) that allows cross network communication
·         Technology that makes web work as a multimedia mass medium are some utility’s software that can connect to programs that we are working on it
·         Tools to build website is HTML (HyperText Markup Language) 
·         Important social and political issues raised by the growth of the internet: filtering software to combat inappropriate content, digital cash to make online transactions easier and safer, encryption software to prevent credit card theft, digital signature to prevent e-mail forgery, access & censorship, and digital divide

chapter 10
·         Types computer crime, possible crime prevention are theft by computer, software piracy, software sabotage, and hacking and electronic trespassing. How to prevent this crime: make all online purchases using (separated) credit card, make sure a secure web is managing the transaction, don’t disclose personal information over the phone & shred sensitive information
·          Security issues facing computer users, system administrators, law enforcement are security measures prevent crime, but can also post threats to personal privacy, and system administrators play a key role in security and back-up
·         Computer security relates to personal privacy issues with active badges, it can simultaneously improve security and threaten privacy
·         Security and computer reliability related because computer security involves more than protection from trespassing, sabotage & other crimes. Then, software errors and hardware glitches account for some of the most important security issues

learning objective chapter 11-15

chapter 11
·         Computer changed people work in factories, offices, home, and variety industries because computers have a big impact on it. Now there are automated factory that is more efficient but keep traditional factories running with workers on it. Also automated office, with its evolution: enterprise computing, workgroup computing, electronic commerce, electronic cottage & paperless office
·         Computer changed quality job, in positively way, computers have caused more problems solved than workers did. In negatively way, computers technology to track, record & evaluate employee’s performance can raise issues for the employee itself
·         Information age places new demands on our educational system because education provides technological familiarity, literacy, mathematics, culture, communication, and learning how-to-learn. This is for students in the information ages
·         Computer are used in classroom is program that usually computers have in classroom, like: Computer Aided, Programming, Productivity, Digital, and others

chapter 12
·         Business organization as system by using the value chain model is organization performs activities to provide products & services for customer
·         Business organization from the viewpoint value chain model divides activities of organization in 2 types: primary and support activities
·         Transaction processing system support business processes because it can keeps tracks of routine transactions by information system
·         Enterprise resource planning change the flow of information within & among business organization because it’s emphasis is to improve the free flow of information between different parts of a firm
·         Computers support the work of managers with technology that helped the manager everything about making decision and Executive Information System (EIS) to monitor important economic and social trends affecting the organization

chapter 13
·         Phases of company goes through using internet for business like Amazon.com that leveraged the internet’s unique ability to deliver huge amounts of information rapidly & efficiently
·         Forms of electronic commerce are business-to-business, business-to-consumer, and consumer-to-consumer
·         Design and use of public web sites for supporting business-customer transactions by it speed & secure transactions, up-to-date product selection, ease of use & after-sale features
·         Technical requirements of electronic commerce by web server and e-commerce software
·         Ethical issues of electronic commerce are clear & explicit statement of organization’s privacy policy; policy statement addressing situations in which a person’s permission must be secure before his/her ID, photo, ideas, or communications are used/transmitted; clear policy stating how company will inform customers of the intended uses of personal information gathered during an online transactions & how the company will secure permission from the customer for those uses; statement that address issues of ownership with respect to network postings and communications; and policy of how company monitors/tracks user behavior on web site

chapter 14
·         process of designing : identify requirements, develop working model of the system, use prototype, evaluate features of prototype, make any necessary changes to prototype, develop application.
Programming is a specialized form of problem solving. Problem solving typically involves four steps:Understand the problem, devise a plan for solving the problem, carry out the plan, evaluate the solution.
·         Because more and more software programs are build,so there are many different programming languages
·         More and more software programs, including operating systems, are designed with extensibility in mind
·         Investigation,analysis,design,development,implementation,maintenance,retirement
·         relationship between computer programming & computer science is the object of focuses on the process of computing
·         One of the most challenging problems facing computer science is the problem of software reliability.
·         Software companies provide only limited warranties for their products because the additional precautions needed to make the software work better would inflate the cost & extend the time needed for development and only large companies are able to sustain the pressure such scenario

chapter 15
a. Use computers to simulate human mental processes.
The best way to do something with a machine is often very different from the way people would do it.
b. A second approach to AI involved designing intelligent machines independent of the way people think.
Human intelligence is just one possible kind of intelligence. A machine’s method for solving a problem might be different from the human method, but no less intelligent
·         Most people have trouble knowing and describing how they do things. There are vast differences between the capabilities of the human brain and those of a computer. Even the most powerful supercomputers can’t approach the brain’s ability to perform parallel processing. The best way to do something with a machine.
·         Describe several practical applications of artificial intelligence.
Searching: Looking ahead to the possibilities generated by each potential move.
          The staggering number of decision points makes brute-force searching impractical. Searching is generally guided by a planned strategy and by rules known as heuristics.
Heuristics: Rule of thumb
          Heuristics guide us toward judgments that experience tells us are likely to be true. For example, in checkers, “Keep checkers in the king’s row as long as possible.”
Pattern recognition: identifying recurring patterns in input data.
          The goal of pattern recognition is understanding or categorizing that input. The best human chess and checkers players remember thousands of critical board patterns and know the best strategies for playing when those patterns or similar patterns appear. Game-playing programs recognize recurring patterns, too, but not nearly as well as people do.Computer game programs often have trouble identifying situations that are similar but not identical. Pattern recognition is probably the single biggest advantage a human game player has over a computer opponent.
Machine learning: learn from experience
          If a move pays off, a learning program is more likely to use that move (or similar moves) in future games.
·         A robot is a computer-controlled machine designed to perform specific manual tasks.
-Robots save labor costs.
-Robots can work 24 hours a day, 365 days a year, without vacations, strikes, sick leave, or coffee breaks.
-Robots can also improve quality and increase productivity.
-They’re especially effective at doing repetitive jobs.
-Robots are ideal for jobs that are dangerous, uncomfortable, or impossible for human workers

Baterai Isi Ulang Super Kecil

SALAH satu ciri dari inovasi teknologi adalah kemampuan menyederhanakan dimensi alat. Misalnya, penyimpan data yang di masa lalu dikenal sebagai disket yang berevolusi menjadi mini disket, berevolusi lagi menjadi chip hingga minichip. Gejala yang sama juga ditemukan dalam keberhasilan studi mengenai elemen kering penyimpan daya atau yang dikenal dengan nama baterai. Sebelumnya baterai tersedia dalam berbagai ukuran, evolusinya mulai ketika pemakainnya bisa diulang karena dayanya yang dapat diisi ulang.
Kini kabar teranyar mengenai baterai datang dari para peneliti di Universitas Rice. Mereka telah mempublikasikan secara rinci hasil penelitiannya berupa unit penyimpanan energi berbasis ion lithium yang dapat diisi ulang. Istimewanya karena unit penimpan daya ini berukuran sangat kecil.
Sehingga ia akan menjadi konsumsi utama di masa depan yang dapat dipasang pada alkes berukuran sangat kecil atau pada sensor. Baterai itu terdiri atas rangkaian kabel berukuran sangat kecil yakni dalam skala nanometer. Dengan lebar sekitar 150 nanometer, dan ketinggian tercatat sebesar 50 micron. Baterai yang diperlihatkan oleh tim peneliti, ternyata hanya berukuran sebesar diameter rambut manusia.
Secara teori dimensi dari baterai ini seperti yang sudah terpola dalam eksperimen ini. Tetapi dapat juga dibuat varian ukuran sehingga dapat dikatakan dibuat sesuai skala ukuran yang diibutuhkan. Para peneliti juga melihat daya tahan baterai hingga tak dapat berfungsi setelah mengalami siklus 20 kali proses pengisian ulang dayanya. Akan sangat menarik di masa depan untuk dapat melihat inovasi terbaik akan hadir dalam berbagai alat kesehatan yang dibutuhkan pasien untuk kesembuhannya.


sumber: http://www.majalah-farmacia.com/rubrik/one_news.asp?IDNews=2281

Kamera Mini Pemindai Operasi

Endoskopi telah menjadi kemajuan yang bermanfaat dalam tahun-tahun terakhir. Kamera berukuran mikro yang ditempatkan pada ujung alat endoskopi dapat menyuplai gambar dari dalam tubuh manusia dengan resolusi ketajaman yang tinggi. Kamera kadang memindai keberadaan tumor ataupun jenis keganasan lainnya. Meski demikian terdapat pula kekurangan dari prosedur endoskopi ini. Ongkosnya yang masih mahal karena rumitnya alat endoskopi serta prosedur pembersihan yang rumit, setiap kali sesudah digunakan.
Masalah ini mungkin dapat diatasi dengan kehadiran kamera mikro yang tengah dikembangkan oleh Fraunhofer Institute for Reliability and Microintegration (IZM) di Berlin, dan Awaiba GmbH. Salah seorang peneliti Fraunhofer Institute for Reliability and Microintegration, Martin Wilke menyatakan, "Kami dapat menghasikan kamera mikro yang tidak mahal dengan teknologi kami dan membuat dokter memakainya hanya sekali setelah digunakan pda pasien."
Sistem kamera digital umumnya terdiri dari dua komponen, yakni lensa dan sensor yang mengirimkan gambar menjadi sinyal elektrik. Kontak elektrik pada sensor membolehkan akses infomasi gambar. Kontak elektrik ini ditempatkan di antara sensor dan lensa. Sensor akan dibuat bersamaan dalam jumlah besar seperti chip computer.
Martin Wilke menyatakan, "Anda harus berpikir tentang buku yang penuh dengan perangko dimana kebanyakan ribuan perangko dicetak dalam satu langkah. Tetapi jika kamu akan menggunakannya maka akan dipisahkan satu sama lain. Demikian pula dengan selembar kertas dengan sensor gambar pada keping lingkaran silikon yang dikenal sebagai wafer. Sekitar 28 ribu sensor gambar dapat dimuat ke dalam satu wafer. Satu sama lainnya gambar dapat dipisahkan atau menyatu, terhubung dengan kabel dan dipasangkan pada lensa.
Para peneliti di Fraunhofer Institute for Reliability and Microintegration memberi perhatian pada proses ini dengan mengembangkan banyak cara untuk mengakses kontak elektrik. Kini proses penerusan info via kabel berlangsung lebih cepat dan pada sistem kamera yang lebih kecil. Trik-nya ada pada fakta bahwa info gambar tidak dapat mencapai kontak sensor gambar individual lewat sisi manapun kecuali bersamaan dengan semua sensor lewat sisi balik pada saat informasi data gambar masih terhubung sebagai wafer.
Artinya, data gambar akan terkoneksi melalui wafer sensor gambar sebagai lensa wafer. Kemudian timbunan wafer dipisahkan kepada kamera mikro individual. Fakta lainnya adalah gambar yang diperoleh lebih tajam meski dengan prosedur endoskopi yang kecil. Kini sistem kamera dibuat dengan membaginya berdasarkan ukuran, lensa ditempatkan pada ujung endoskopik dan sensor pada sisi lainnya dengan menggunakan serat fiber. Resolusi yang dimiliki kamera ini mencapai 62.500 piksel dan transmisi informasi gambar melalui kabel elektrik.
Aplikasi ini kabarnya bukan hanya akan digunakan pada dunia medik tapi juga di dunia otomotif. Kamera ini akan menggantikan fungsi kaca spion pada sisi kendaraan.


sumber: http://www.majalah-farmacia.com/rubrik/one_news.asp?IDNews=2088

Senyawa Pengikat Nikotin

SATU senyawa polimer baru untuk memerangkap molekul nikotin dan struktur analog telah didesain dan diproduksi oleh para peneliti dari Institute of Physical Chemistry of the Polish Academy of Sciences (IPC PAS)dan Department of Chemistry Wichita State University USA.
Polimer berisi struktur dari molekul penjepit yang didesain setahun lalu oleh para peeliti di Amerika. Kini, Polish-American collaboration telah menghasilkan fiksaasi dari material penjepit yang ada di dalam polimer tersebut. Substansi ini bersifat solid sehingga dapat digunakan untuk membangunchemosensors untuk menentukan kadar nikotin di suatu pabrik atau industri atau untuk keperluan biomedik.
Cara kerjanya pada inti polimer yang akan menangkap nikotin, unsur ini merupakan derivat dari metalloporphyrin. Pada molekulnya berisi ring (macrolide) dengan pusatnya pada atom zinc dan penjepit amida yang berada pada sisi ring. Nikotin kemudian terikat pada polimer dengan dua atom nitrogen satu ikatan dengan atom zink yang lainnya pada sisi lain. Nikotin terdeteksi oleh resonator piezoelectric bersalut electropolymerization dengan polimer film tebal submicrometer. Nikotin yang terperangkap dapat diketahui lewat peningkatan massa dari film yang menghasilkan penurunan frekuensi resonator sehingga mudah untuk diukur.
Tujuan di masa depan bagi pengembangan chemosensor meliputi, analisa nikotin dalam daun tembakau, dan penentuan metabolisme nikotin dalam cairan tubuh. Polimer juga dapat digunakan untuk bahan koyok nikotin sebagai bantuan menghentikan kebiasaan merokok. Yang mana akan memberi efek lebih panjang dan halus pelepasan nikotin. Akan sangat membantu bagi mereka yang secara bertahap ingin menghilangkan kebiasaan merokok. Para peneliti berencana untuk mengembangkan metode ini lebih jauh. Salah satunya, adalah untuk mengetahui kadar nikotin pada gas.


sumber: http://www.majalah-farmacia.com/rubrik/one_news.asp?IDNews=2282

Sensor Perjalanan Obat

PROTEUS Biomedical telah menerima persetujuan untuk izin pemasaran di kawasan Uni Eropa. Alat kesehatan keluaran Proteus Biomedical kali ini adalah sistem monitoring dan sensor obat yang dapat dicerna.
Ketika pasien menelan tablet, maka alat ini akan segera menandai. Sensornya bekerja langsung menyimpan data waktu pasien menelan obatnya dan sinyal penting lain yang terkirim dari tubuh pasien.
Sistem ini akan memungkinkan pengawasan dokter terhadap kepatuhan pasien dalam meminum obat, serta mengetahui respons pasien terhadap obat yang diminumnya. Sistem ini telah mendapat persetujuan dari FDA pada April lalu. Menurut satu pemberitaan di media Inggris, Otoritas obat dan makanan Inggris juga akan melakukan uji coba sekitar 4 bulan terhadap 40 pasiennya sebelum memberikan izin edar.
Alat monitoring bernama RaisinTM mampu melakukan pekerjaan berupa perekaman perjalanan obat mulai dari dikonsumsi sampai bereaksi dalam tubuh, dan efeknya misalnya pada detak jantung, aktivitas tubuh dan tinjauan organ lainnya dalam tubuh sebagai info individual pasien. Data Proses pencernaan dapat diteruskan melalui koneksi bluetooth ke komputer ataupun perangkat lainnya.
RaisinTM ini dikembangkan sebagai perangkat pintar terintegrasi. Akan sangat bermanfaat dalam upaya mendukung produk formulasi farmasi pada respons fisiologi individual dan hasil dari sistem pengobatan. Proteus dan mitra kerjanya telah mengembangkan patron serupa pada kondisi spesifik seperti diabetes, penyakit kardiovaskular, gangguan psikiatri, transplantasi organ dan penyakit infeksi.


sumber: http://www.majalah-farmacia.com/rubrik/one_news.asp?IDNews=2197