...Trident University International ITM 433 Module 1 Case ITM 433 – Computer-Human Interaction Module 1: Why do we care about human-computer interaction? Case Assignment: Discuss the application of speech recognition as a tool for Human Computer Interaction Definitions Before getting too far into detail, here are some definitions this paper is based on. Human-Computer Interaction (HCI) is summarily, and loosly, defined as the interaction between people (users) and computers and can be referred to in several different manners. For instance; Computer-Human Interaction (CHI) or Human-Machine Interaction (HMI) are both virtually interchangeable with HCI. The phrase “speech recognition” is rarely, if ever, used outside the context of computer science. Speech recognition refers to the ability of computer-based software to convert spoken words into written (typed/digital) text. Together – HCI/CHI/HMI, etc., insert your acronym of choice but HCI will be used throughout this paper – HCI and speech recognition represent the present and rising future of end-user functionality. The next big thing will be the ability of computers or machines to read your mind instead of verbally instructing it to carry out your bidding… that is sarcasm, of course. However, this current reality of speech recognition software was not stumbled upon and did not happen by chance. A Short History The lever is widely regarded as the first “machine” “invented” and implemented by...
Words: 806 - Pages: 4
...ASSIGNMENT COVER SHEET COURSE : ITM 352; SOFTWARE PROJECT MANAGEMENT NAME OF LECTURER: CASMIR MAAZURE START DATE : 7TH NOV 2013 DUE DATE: 28TH NOV 2013 STUDENTS INDEX NO_: NAMES SIGNATURE 1. …………………….. 2. …………………….. 3. ……………………… 4. …………………….. 5. ……………………… Key Areas | Marks / Grade | | Excellent | Very Good | Satisfactory | Needs More Work | Understanding of task/ identification of problem | | | | | Appropriate Solution response | | | | | Logical development and argument | | | | | Evaluation and critical analysis | | | | | Research and fact finding | | | | | Style/ Referencing | | | | | NB: MAKE A CLEAN PHOTOCOPY OF THIS FOR YOUR COVER PAGE. USE PEN TO WRITE YOUR NAMES, INDEX NUMBERS AND SIGN. DO NOT REPRODUCE THIS COVER PAGE. VERY IMPORTANT ASSIGNMENT REQUIREMENTS In group of five, prepare a project plan and a report as a consultant for submission to the company. Make sure that you demonstrate the use of systematic analysis and project management methodology. You must adopt a standard framework/ format for your report. THE PROJECT CASE STUDY You have been appointed software Project Manager for the development for the new ITE Computer group Mobile Personal Communicator. Your job is to ensure that the software and associated documentation is delivered to the highest quality...
Words: 1130 - Pages: 5
...The Four Categories of Computers Anthony Johnson ITM 5000 Information Technology Management Ms. Brenda K. Britt 04 October 2011 The Four Categories of Computers Today computers are divided into four categories Super computers, Mainframe computers, Mini computers and Micro-computers more commonly known as a personal computer. Personal computer categories include desktop, network, laptop, and handheld. A super computer is the fastest computer mostly used by scientist and engineers who work with huge amounts of data usually on more than one central processing unit (CPU) working simultaneously. Supercomputers have the ability to store huge amounts of data and the capability to deliver very fast input/output of information. The military branches, Universities, and science research facilities use the super computers mostly. Scientific computing is the ability of a CPU to accomplish huge mathematical computations at an extremely fast rate this created the demand for the super computer. Extremely large mathematical computations are processes most needed in fields such as physics, mechanical engineering, meteorology, and aerodynamics. A common technique is to compute an approximate numerical solution to a set of partial differential equations which mathematically describe the physical process of interest but are too complex to be solved by formal mathematical methods. (McGraw-Hill, 2005) Personal computers have a single processor. The supercomputers have thousands of...
Words: 961 - Pages: 4
...data while analysis is done to obtain information. 2. Discuss how computer represents data and basic units of measuring information (up to GB): Computer represents data using binary numeral system: - bit= binary unit (to 256) - bute- 8 bits - kb= 1024 byrtes - mb= 1024 Kb - gb= 1024 mb 3. Compare ASCII, EBCDIC and Unicode: ASCII- American Standard Code for Information Interchange ASCII is a 7 digit (7- bit) code EBCDIC-Extended Binary- Coded Decimal Interchange Code (INM mainframes) EBCDIC- represents each character as a unique combination of 8 bits 8 bites=256 unique combinations Unicode- Universal International coding standard design to represent text based data. Unicode identifies each character using, 0s and 1s. It’s a larger code, consisting of 1 to 4 bytes 4. Discuss the difference between computers: Mainframe-used by large organizations (hospital, university, bank, government offices) -manages a large amount of fertilized data. - located in climate-controlled data centers and connect to the rest of the company computers .via computer network Supercomputer: -$2 mil -\220 million - 50 – 50000 times faster than PC. - A large number of processors interconnected by a network. Small (microcomputers or pc) -$500- $7000 - Desktop computers and work stations - Laptop Computers - Notebook Computers - Palmtop Computers • Server is a computer program running to serve the request of other programs • Workstation ...
Words: 2445 - Pages: 10
...their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. Richman Investments Computer users’ policy: Although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources...
Words: 1544 - Pages: 7
...Karen Barber ITM – 5600 – Information and Communications Security Assignment: Summary Report on a Malicious Code Attack Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a computer or system without the owner’s knowledge or consent. Upon entering the system, there are much exploitation of vulnerabilities, like viruses, worms, Trojan horses, spyware, adware, and rootkits. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious code can either activate itself or activate after a user perform an action, such as clicking on something or opening an email attachment. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content. The Spamhaus Project is a cyber attack that is described as the largest in history apparently starting over an argument over spam. The prolonged denial-of-service assault is targeting The Spamhaus Project; a nonprofit European filtering service that helps organizations to fight spam by weeding out unwanted emails has gone after CyberBunker, a Dutch data-storage company that offers hosting to any websites/content "except child porn and anything related to terrorism." On March 18, 2013, Spamhaus added CyberBunker (whose servers shows “cb3rob...
Words: 728 - Pages: 3
...| Disaster plan | | | | 6/6/2010 | | Abstract This is a disaster plan that I created for the IST Department of XYZ Computers company in order to prevent any future problems that may arise such as the situation they had over the weekend when a major water pipe broke and flooded the first floor, causing extensive damage to the servers. Included in the disaster plan I will address a few issues that will aid the company in protecting against such things as any natural disasters that may occur as well as any other occurrences that may deem necessary for such a disaster plan. I will detail my recommendations for using a RAID system for data protection in order to have a well placed back up plan with the most up to date information possible. In short I plan to properly detail a disaster plan the best possible way that I can in order to have a good disaster recovery plan in place rather than having to spend the time and money on extra recovery efforts. Hopefully having such a plan in place will keep from losing important data to unforeseen issues, such as natural disasters due to the geographical location among other issues that may arise at the most in opportune time possible. When creating a disaster plan the first thing to keep in mind is to do a complete risk assessment of the entire existing computer systems. In order to accomplish this task all the risks and probabilities will need to be noted such as any delays to system uptime and how close at hand these...
Words: 1273 - Pages: 6
...Term Paper Proposal To: Dr. Vijay Karan From: Ming-Tzu Chou Date: 13 February 2012 Subject: Management control system Proposed Research Topic: How a new strategy saved and created a bright future for IBM in 90s. Statement of problem: In the early 1990s, IBM suffered in dramatically declining in the revenue of the mainframe sales, and the stock price also dropped. During the period, the personal computer was the most popular products in Information Technology market, and the mainframe was already outdated. Last but not least, IBM could not reduce its cost according to its size and bureaucracy. As a result, many people believed that IBM could only fell or be divided to smaller companies. Louis V. Gerstner, Jr., who was the new CEO, saved IBM and implemented different strategies in the company. Objective & Method: The purpose of the study is to evaluate how a new strategy affected IBM. Except the abstract, the term project will be separated to four parts: problem statement, strategy formulation and strategy planning of solutions, the summary of results, and recommendations. The term project should reach the following goals through in the four sections. 1. Problem statement will describe IBM’s previous business situation and introduce how problems had generated before Gerstner arrived. 2. The solutions from Gerstner will be deeply analyzed according to the theories from strategy formulation and strategy planning in the textbook. 3. The summary of results will be presented...
Words: 319 - Pages: 2
... 2012). Bleeding technology is relatively, new technology. Bleeding technology is unreliable because it has not been tested and it has not proven its worthiness or authenticity. A user will be taking a huge risk to use the bleeding technology which would be more expensive than the leading technology. Bleeding edge technology could be very costly and it could turn into something that could be the beginning of a serious problem. The reason why bleeding edge technology could cause many problems is because it is new and might be quite risky because of the instability. Bleeding edge technology has not been thoroughly tested and has not proven itself to be reliable. As an example of bleeding technology would be an early development of a new computer product that is being develop for the very first time. When a consumer decides to purchase the product, the cost is not the only thing that the consumer faces when choosing to purchase the bleeding edge technology; it is possible that the customer might get stuck with...
Words: 1786 - Pages: 8
...1 Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Sara L. Dexter and Ronald E. Anderson University of Minnesota Henry Jay Becker University of California, Irvine This paper was published in the Journal of Research on Computing in Education. The citation for it is: Dexter, S., Anderson, R. E., & Becker, H. J. (1999). Teachers’ views of computers as catalysts for changes in their teaching practice. Journal of Research on Computing in Education, 31 (3), 221239. Abstract: In this study we examined the use of computers by teachers in their instructional practices and their perception of the impact of computers on changes they have made to their classroom practice. These data draw from 47 teachers from 20 K-12 schools across 3 states who each completed a questionnaire, participated in 3 semi-structured interviews, and allowed 3 observations of their classroom. The teachers who had adopted more progressive teaching practices over time felt computers helped them change but they did not acknowledge computers as the catalyst for change. Instead, they cited catalysts that included: reflection upon experience, classes taken, and the context or culture of the school. We conclude that in order for teachers to implement the use of educational technology in a constructivist manner, they must have opportunities to construct pedagogical knowledge in a supportive climate. Research funded by the program of Research on Education Policy and Practice at the National...
Words: 9206 - Pages: 37
...WBS Dictionary Team One Technologies Project Management | From start to finish lay out of the project | Scope / Requirements | Team One Technologies is determined to helping Greenway Bank develop an approach to examine their scale or level of risk management. | Design | The office will house a local LAN, create a revenue stream, a new inbound customer service call center | Headquarters and four branch locations | Four branches located in New York, Seattle, Orlando, and Los Angeles, corporate offices in St Louis | Budget breakdown / Materials | Total cost on parts, labor and time | Complete data network and communication to all locations | Networks connect large numbers of users to share information and resources | Physical Layout for Voice & Data | A building by building layout or diagram for the Physical layout for the voice and data network | Data storage and off site backups for all 5 locations | off-site data protection, or vaulting, is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.Example: Barracuda Networks | Network Configuration Plan | the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. | Documentation for business continuity | The activities performed by Team One Technologies to ensure that critical business functions will be available to customers, suppliers, regulators, and...
Words: 655 - Pages: 3
...1. what is e-classroom? 2. what is industrial robot? Explain that. 3. Describe about the process that Mubin told about his parents. 4. ICT used for doing many dangerous situation succesfully. Explain that. Answers: 1. main book. 2. Industrial robot is a robot that is used in many dangerous work. Now all the industrial work in industry are done by industrial robot. Human become tired,bored but robot never. Robot can do work for long time. In the big industry of the world now robot is uses as labor. 3. Mubin told his parents about the use of computer in operating phone. He also told about the drone system. Mubin works in air force thats why his parents always anxious for him.They think about the airplane accident. Then mubin told them about the latest technology that used in aircraft. Now all the airplane are opetated by computer. Now pilot dont have to do many things. So the posibility of the plane accident now become less. Now a days there is no pilot in the fighter plane. The drone system is used normally in war. 4. Besides the use in aircraft ICT also used in many dangerous sector for doing many dangerous work. Now most of the work in the big industry is done by robot bacuase robot dont get tired or bored like human. Now human just observe the work either its right or wrong. Now in transportation the use of ICT increased a lot. In future if car dmis driven by robot then the number of road accidents will definately less. So now ICT is used in many dangerous sector...
Words: 679 - Pages: 3
...LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market: Knowledge@Wharton ( http://knowledge.wharton.upenn.edu/article.cfm?articleid=2667) LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market Published : January 06, 2011 in Knowledge@Wharton In 2000, executives at South Korea-based LG Electronics set the goal of becoming a top-three player globally by the close of the decade. One year early, in 2009, the company achieved its goal. Meanwhile, revenue has jumped from $5.6 billion in 2004 to more than $13 billion in 2010. Michael Ahn guided the branding effort for LG Electronics North America before stepping down as regional president and CEO last year to become a senior adviser at LG Electronics USA. In a recent conversation with Knowledge@Wharton, Ahn -- who was visiting the University of Pennsylvania to make a speech as part of the Wharton Leadership Lecture series -- named patience, consumer-targeted marketing and achieving synergy among the firm's different divisions as the factors catapulting LG Electronics from a relatively obscure maker of commodity goods to a premium global brand. An edited version of the conversation appears below. This is a single/personal use copy of Knowledge@Wharton. For multiple copies, custom reprints, e-prints, posters or plaques, please contact PARS International: reprints@parsintl.com P. (212) 221-9595 x407. Knowledge@Wharton I would love to start by talking about the consumer electronics...
Words: 1692 - Pages: 7
...Theme: Horror/Suspense Setting: A typical boy’s room- dirty and messy. The only light source would be the computer. Most used part would be the computer table/desktop. Characters: Gio- The main character, a slouchy procrastinator student who was writing and cramming a paper. Stranger- No fact was known other than he is implied to be a ghost or spirit a hint of it’s appearance. • Page 1 Panel 1: Paneling- 1/3 of the page horizontally (most of computer screens are horizontally oriented) A close up shot of a computer monitor, Microsoft word is the open application with only his name on it and a title “A Horror Story” Panel 2: Paneling- 1/3 of the page horizontally Gio leaning on his palm looking bored/thinking (shot from monitor’s POV), with a gleam of the only light source which is the monitor on his face. Thought Bubble: Ahhh, damn. I’ve been doing this for two days now. Panel 3: Paneling- 1/3 of the page horizontally A zoom up shot of the computer clock with “11:11pm” on it. Thought Bubble(top right side): 11:11 do you work, please send me a spirit and have him type his story! • Page 2 Panel 1: Paneling- 1/3 horizontally, 2/3 of the first tier. Gio face palming, same shot from page 1, panel 2. Thought Bubble(bottom left part): Who am I kidding? Wake up kid! Panel 2: inset, remaining of the first tier Gio reaching to the right for the coffee mug in the study table, back shot with him on the center. Thought Bubble(left side of the...
Words: 541 - Pages: 3
...KB Corporation PROPOSAL For Inventory Management System Table of Contents 1 Overview 2 Problem Situations Proposed and Purpose 3 Record methods 3.1 Recommendation for the forms design principles are: 3.2 Computer assisted-retrieval system (CAR) 3.3 Data Retrieval methods by Information Technologies 3.4 Policies for record storage 4 Organizing the record and the classification system. 5 Implementation. 6 Conclusion: Strategically Managing Inventory for Future Growth 1. Overview As the company are expecting to establish another 20 shops in the next 2 years, we have realized how important for the document system for different department. And our products are almost imported from Europe and Asia. We cannot keep to using the manual record for the document record system. This document will explain the requirement for management, inventory, provisioning, customer support, sales support, and book-to-bank systems. Where possible recommendations are given to understand and plan for interconnection, correlation, and data warehousing requirements. Emphasis is given to ensuring all databases will have a capability to provide input to decision support systems needed by both senior management, as well as operational levels of the business. 2 . Problem Situations Our company current operation has shown that the inventory document record is obvious inefficiency. In the aspect of inventory control, more and more errors were found...
Words: 1430 - Pages: 6