StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Improvement of Computer Software - Essay Example

Cite this document
Summary
The paper "Improvement of Computer Software" highlights that varied groups have been formed due to the social networking tools that enable groups with common interests with others to interlink. Reduction in marketing costs because many individuals access product information online…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Improvement of Computer Software
Read Text Preview

Extract of sample "Improvement of Computer Software"

?Running head: COMPUTER SYSTEMS Computer systems Insert Insert Insert May 4 Computer systems Introduction Computers are electronic machines that are capable accepting input (instruction and data), and efficiently processing the input using specified instructions to produce the desired output (information and actions) at higher speeds. Computer systems consist of all the integrated components such as hardware (tangible components such as the monitor, keyboard), software (computer instructions and data), peripheral devices (external devices such as printers, scanners) that enhance the functionality of the machine and enable the machine to perform all the actions of accepting input, processing, storage, and the dissemination of output. Software enables the computer to perform the computing functionalities and performing numerous tasks. Computer software entails system software (the operating system and all utilities that enable computing functionalities), applications software (these are programs that assist the users to perform specific tasks such as word processors, spreadsheets, database management system).Computer systems handle the execution of instruction through selection, iteration and sequencing a set of instructions. They execute binary instructions; hence, any kind of instructions given to the computer must be first converted into binary form (number base 2) before any computing action takes place (Blundell, Khan, Lasebae, and Jabbar, 2007). The advancement of digital technology has enabled the development of complex computing systems in the recent decades to encounter the changing and dynamic needs of the processing and dissemination of information in various organizations. There has been an improvement in the functionality and processing powers of computing machines lately and this has enabled vast quantities of information processing and storage. Computer systems have evolved from the older mainframes, which were bigger in size with low processing speeds, to now personal computers, which are smaller, cheaper, efficient, and easily portable. The tasks performed by the humans have been taken by computer systems that have increased the speed and efficiency of performing various tasks within a short period due to their multitasking nature (computers can perform various tasks at the same time). The operating systems of computers have been designed in a way that allows numerous tasks to be accomplished, and individuals can switch between tasks without waiting for any of the tasks to be completed (Dhotre, 2009). Monitoring The medical field has employed computer-monitoring technology on the functionality of the human body. The human body produces heat because of the metabolic activities that take place in the living cells. Modern thermograph machines are used to detect heat changes in the body; they convert such pulses to thermo grams fed into the computers, which are used to give images of the body parts that are unusually hot and cold. The images are used to investigate such defects as arthritis, breast cancer. Medical imaging is a technique that is used by physicians to observe the internal organs and functioning of the body. Imaging enables detection of causes of illness; such techniques include X-rays, magnetic resonance imaging, ultrasound, and tomography. They send beams of waves into the body and later receive the reflections from the body. Computerized tomography uses extensive scans from different angles and sends to the computer, which arranges the images. Magnetic resonance imaging uses magnets and radio waves to form images. A computer analyzes the radio waves coming from the patient to produce a detailed image. Ultrasound scans pressed against the body, relay waves into the body and receive back the waves, sends them to the computer, which processes an image on the screen, is used especially on pregnant mothers to detect the position and the overall development of the baby in the womb. Electrocardiographs are used to record signals originating from the heart muscles and relay their signals to the computer, which processes the signals as electrocardiograms that are observed on the screen showing whether the heart is functioning normally. Medical sensors (automated electronic equipments) are used to record the bodily physiological functions such as the blood pressure. When the measurement is below normal level, they relay the signal to a monitor, which displays the digital signal. In the intensive care units of numerous hospitals, there are sophisticated computer systems that monitor the progress of patients who are in critical conditions (Cavendish, 2006). In airports, they have employed a computer system, which scans all the luggage of the passengers, the system also scans and shows pictures of individuals on screen. In America, they had proposed an airport system that would scan and produce images of the body structure (anatomy) that scanned inside the skin to show all the organs of the body to prevent individuals entering with harmful and illegal weapons, which were to be used to hijack the airbuses. In medical industry, the use of computerized monitoring systems has ensured detection of infections without necessarily involving surgery; however, the X-rays pose a danger to the health of humans, because the rays can affect other organs of the body. Complexity of computing devices Technology is changing at a fast pace because of the dynamic changes in information and communication technology, resulting into the introduction of cheaper, faster, and more powerful computing systems in the market. Various computing devices are on the market today and there has been a drastic adoption of such devices within the home setting of the majority of individuals. Personal computers-these include the desktops are being used most commonly at homes for processing various tasks and providing entertainment. Laptops, notebooks are also personal computers that have been acquired in homes for performing of computing tasks. The introduction of miniature computing devices into the market has made the availability of handheld portable electronic devices such as personal digital assistance (PDAs) which are pen-based computers. Most of the palm devices using the palm operating systems are present. Tablet computers and smart phones are being acquired by many people in the society, such devices are providing better functionality in terms of internet access, which is cheaper, faster, and more convenient than a person going to the office to either chat, or send e-mail messages as these services are instantly accessed at hand. The computing devices have enabled instant communication between different individuals from far away territories performance of online assignment and hence providing employment to individuals. There has been the adoption of wireless connection technologies such as Wimax, Wifi, and WLans, which provide faster broadband communication (Poslad, 2009). As people tend to prefer performing office tasks at home and especially those who work part-time, adoption of such devices has enabled the individuals to efficiently perform these tasks using the computing devices. Ipods and Ipads are the commonest handheld devices that provide massive storage of data and entertainment to the young generation. Most of the portable devices have been embedded with the global positioning system technology that enables access to information about any location in the world map. In addition, they aid security precaution such that when an item is stolen, it can be easily tracked down using the global positioning system. Such devices have an advantage of faster computing power which enable them to be efficient in providing services to the owners (Cork, Cohen, King, 2004). Balance of labor The introduction and adoption of the new technologies has resulted into a shift in the balance of labor between the machines and human beings. Since in the years back, there was the analogue technology of performing tasks, and more paperwork was involved, numerous individuals were required to perform such task. Many records were kept in manual file systems, cabinets in offices. Education-new technologies have revolutionalized and modernized the education system. Nowadays, the entire population can access education materials, assessments, course information, and majority of the information online. Most of the educational institutions have their information on the internet and they can be accessed from any part of the world without necessarily traveling, this has enabled a reduction in the congestion of most institutions as many individuals have enrolled in distant e-learning (electronically supported learning and teaching). In addition, most of the governmental services have adopted the e-service system of governance, which has increased the efficiency of services to the society. Modern technology has increased the production of more goods and services and hence a rise in the living standards. Adoption of Automated tellers machines in the banking sectors has enabled more efficient and faster methods for members of the community to access banking services and later introduction of mobile money transfer services has drastically shifted the balance of labor from humans to machines and resulted to adoption of skills to handle such services. Digital networks and data communication channels enable faster and efficient communication between different persons at different locations. There has also been the development of e-commerce where goods and services are ordered and delivered across the internet. Companies having online access to their product categories have reduced the cost of services and enhanced the efficiency of companies in terms of purchase of goods and services within the time required. Moreover, network technologies such as video conferencing, webcams, have enabled individuals to communicate globally with ease and convenience, shifting a balance of labor to the machines (computer systems) hence reducing the space and time requirements (Feenberg, 2004). The adoption of various information systems such as transaction processing, management information systems, decision support systems, and executive systems(provide extensive analytical skills to the top management) have enabled organizations to examine, analyze, and make decisions from large pulls of data through the process of data mining. Strategic information systems used in organizations have enabled them to strategize and be at a competitive advantage in terms of competitors. Such technologies have assisted the managers in making critical decisions more efficiently and determining future trends, reducing the human labor that would be required to perform the same task, and resulted into the development of new managerial and efficient decision-making skills. Security-new technologies such as the use of closed circuit television (CCTV), which combines video cameras, cabling and video monitors that transmit signals to computers at specific places have shifted the balance of labor to machines. Such machines have replaced human labor in organizations due to their accuracy in detection of malicious acts by software that monitor images and automatically detect security threats. Such surveillance systems analyze and make decisions on images viewed based on the preset protocols used and then relay such information to human operators (Harwood, 2007). Such technology is efficient in terms of space and time, and it has resulted into the adoption of new skills for those people who provide services to the machines such as installation and maintenance. In the medical field, most of the complicated procedures such as surgery (neurosurgery, heart) have employed computer technologies (robotic surgery) using artificial intelligence of expert systems called robots. A robot is a mechanical device programmed to perform specific tasks in a manner similar to humans’ .Such systems are operated at a given terminal by surgeons who control the working of the robots, which operate on patients. Robotic surgery has made doctors to acquire new advanced skills of operating the machines, while the technology in use has ensured the remote access of patients and the numerous attendances to patients with surgery problems, and reduced the pain incurred if manual surgery procedures were to be undertaken, hence partly replacing human labor (Faust, 2007). Technology change has enabled the development of new skills to adapt the usability and diversity of human expertise in terms of installation, maintenance, and upgrade of the various computer systems and the technology in use. Technology has also increased the quality of goods and services produced and enhanced efficiency. It has enabled batch processing of activities as compared to the human labor. However, in most cases this has resulted into the reduced demand of human labor as most machines have replaced humans in the society. The number of individuals that are required to perform particular tasks has now been reduced and replaced by machines that are faster, reliable, efficient, and durable. Digital footprints These refers to the traces or the routes that are left online when searching and retrieving any information from online databases, bibliographies, articles and communicating through social networking sites such as Face book, Meebo, My space, Google buzz, Buzznet, myYearbook and Ning . In addition, communication through cell phones, personal digital assistants (PDAs), Ipads, and smart phones form part of the digital footprints (Grayson, 2011). Such information is transmitted online through e-mails, attachments (files from other applications that are appended to emails), video and image uploads online forum registrations. Anything that is done on cyberspace leaves a trail, which is extremely difficult to be destroyed. The information can be passed from one party to another without permission. Digital footprints avail personal information to other people who have access to the internet. New technologies have created a social platform, which allows the interaction of different individuals through discussion forums, blog posts, instant messaging, product reviews, videos, and tags, all which enable our traces to be left on the web. People find each other, discover a variety of commonalities, and make digital connections because of the availability of the social networking tools, profiles and numerous search engines such as Google, yahoo, opera and others. Digital footprints has resulted into an increased proximity of the different communities in a virtual sense where there has been a boundary geographically, and access to a range of information about varied topics, personalities, cultures of different people in their different society settings. New communities have been developed using the technology that ensures efficient access to personal information and profiles of different people. Numerous avenues have made global discoveries of people, and different cultures in an extensive manner, data mining, and profiling of information. Digital footprints have enabled remote participation of individuals in the different web-based discussion forums hence facilitating learning through virtual presence. The varied groups have been formed due to the social networking tools that enable groups with common interests with others to interlink. Reduction in marketing costs because many individuals access product information online. However, the digital footprints have resulted into digital harassment by certain parties on the internet (cyber bullying), invasion into the privacy of ones’ information and used for malicious benefits by other parties, piracy of contents such as publications from different authors. Moral degradation of the younger generation within the community because of sites that are visited without restrictions hence no internet security guaranteed, there is a threat to ones’ organization due to clandestine and malicious software and virus attachment to certain blog messages that attack and crash machines hence leading to information loss (Wenger, White, Smith, 2010). Reference List Blundell, G, B., Khan, N., Lasebae, A., Jabbar, M., 2007. Computer Systems and Networks. London: Cengage Learning EMEA. Cavendish, M., 2006. Growing Up with Science. New York: Marshall Cavendish. Cork, L, D., Cohen, L, M. and King, F, B. 2004. Reengineering the 2010 census: risks and challenges. Washington: National Academies Press. Dhotre, I, A., 2009. Operating Systems. New Delhi: Technical Publications. Faust A, R., 2007. Robotics in surgery: history, current and future applications. New York: Nova Publishers Feenberg, A., 2004. Community in the digital age: philosophy and practice. NY: Rowman & Littlefield. Grayson, R., 2011. Managing Your Digital Footprint. New York: The Rosen Publishing Group. Harwood, E., 2007. Digital CCTV: A Security Professional's Guide. NY: Elsevier. Poslad, S., 2009. Ubiquitous computing: smart devices, environments, and interactions. London: John Wiley and Sons. Wenger, E., White, N., and Smit, D, J. (2010). Digital Habitats; Stewarding Technology for Communities. Portland: CPsquare. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer systems Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1421842-computer-systems
(Computer Systems Essay Example | Topics and Well Written Essays - 2250 Words)
https://studentshare.org/environmental-studies/1421842-computer-systems.
“Computer Systems Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/environmental-studies/1421842-computer-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Improvement of Computer Software

Major Push for the Use of 3Tesla in Clinical Settings

The essay "Major Push for the Use of 3Tesla in Clinical Settings" critically analyzes the major peculiarities of the last five years that have seen a major push for the use of 3Tesla in clinical settings.... nbsp;High strength magnetic field has become a prime topic of research in recent years....
8 Pages (2000 words) Essay

Computer Operating Systems

The operating system is the most crucial software which a computer needs to run itself.... nbsp;… It is a set of different software's which manages the hardware resources and different activities of the system.... “New programming frameworks such as OpenCL were created allowing software developers to use graphic cards in their applications” (Mac OS X Snow Leopard para.... This paper ''computer Operating Systems'' discusses that Operating system can be described as Heart of a computer....
11 Pages (2750 words) Research Paper

Computer Architecture: A Qualitative Approach by J.Hennesy, and D.Patterson

atterson" presents a summary of the fifth edition of computer Architecture: A Qualitative Approach.... he improvement in the cost and performance of computing devices over the past 65 years can be attributed to advances in information technology and innovations of computer design.... This book review "computer Architecture: A Qualitative Approach by J.... John Hennessy and David Patterson have vast experience in computer science and information technology....
23 Pages (5750 words) Book Report/Review

The Rate of Development of Computer Technology

The paper 'The Rate of Development of computer Technology' presents the rate of development of computer technology which is so fast that it becomes very difficult to keep pace with it.... It is therefore evident that computer processor technology has changed almost at a monthly frequency.... This rapid rate in development of technology applies to all other components of the computer including the display unit or the monitors, the Random Access Memory (RAM), the Hard Disk, the CD Writer, and the Video Card....
8 Pages (2000 words) Case Study

The using of 3Tesla in Clinical Settings

This paper ''The using of 3Tesla in Clinical Settings'' tells that High strength magnetic field has become a prime topic of research in recent years.... Current studies have shown that 3Tesla has captured almost the entire market of imaging.... Before this, 1.... T and below magnetic field strength were predominantly used....
8 Pages (2000 words) Essay

Challenges of Distributed Computing Environments

A network can be described as a system where hardware and software components are networked using different computers through which allows these computers to effectively communicate and communicate and coordinate their actions only by message passing(Bernard, Thalheim, JANOS,&Hans pp.... For the applications to effectively work well then it calls for various applications to be used among them lightweight software which is software that is normally installed to a number of client systems....
10 Pages (2500 words) Literature review

The Application of Hardware and Software for Business Improvement

This term paper "The Application of Hardware and software for Business Improvement" discusses current technology enhancement the world over.... For the problem of hardware and software, it has been recommended in this report that all the current IT hardware and software in Woodford Furniture Company will be upgraded from their current state to the latest ones available in the market to improve the efficiency and smooth workflow of the company activities....
13 Pages (3250 words) Term Paper

Computer-Composed Music

For a composer, the beauty of using computers in music composition and synthesis is not in recreating styles of music that are already known, but in creating new musical expressions that are a result of computer-related technological developments.... This essay "computer-Composed Music" investigates the various ways in which computers are utilized in the music industry.... computer composition is a complementary process to sound synthesis because the composition may lead to sound synthesis....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us