Chapter 6
Chapter 6
ICT Applications
Tr. Thu Thu
Outlines
1. Communication
2. Modelling applications:
▪ financial, civil engineering
▪ flood water management
3. Computer-controlled systems
6. Banking applications
7. Computers in medicine
Con’t
9. Expert systems
▪ QR codes
▪ OCR
2) Websites
3) Multimedia presentations
4) Media streaming
5) E-publications
Newsletters
◦ Posters are a good way of publicizing, for example, a sporting event or an advertisement
for a forthcoming movie.
◦ Anyone can produce them but there are highly skilled professionals who can produce
expert posters
Disadvantages
◦ When using media streaming there is no need to actually download and save the video or
audio files.
◦ Streaming is a continuous transmission of video or audio files from a remote server where
the files are stored.
E-publications
◦ Most material which is published on paper is also available in an electronic format. For
example:
» e-books
» digital magazines
» digital newspapers
» digital libraries.
◦ The publication can be downloaded to a device connected to the internet where it can
be read.
◦ Moving between pages is usually done by swiping a finger across the screen.
◦ E-publications also have the advantage that pages can be expanded in size and it is
possible to include media, which would be impossible with the more traditional paper-
based publications.
◦ Because no printing costs are incurred, e-publications are usually cheaper than their
paper-based counterparts.
6.1.2 Mobile communication
Mobile devices either use a SIM (subscriber identity module) card to allow it
to connect to the mobile phone cellular network, or they use wireless
internet connectivity.
2. Phone calls
4. Video calling
5. Internet access
SMS (text) messaging
◦ SMS or text messaging allows a very quick way of communicating with another person by
typing on a keyboard.
◦ Its advantage is that the other person does not need to be available, and can pick up the
message as and when they want.
◦ The most obvious use of a mobile phone is its ability to make a phone call on
the move.
◦ Using mobile phones to make phone calls has the following advantages:
» There is no need to look for an operational public telephone in an emergency.
» It is easier to keep in contact with co-workers at the office no matter where you are.
Voice over Internet Protocol (VoIP) and video calling
◦ One of the most common forms of internet telephony (that is, having a telephone
conversation via the internet) is Voice over Internet Protocol (VoIP).
◦ Voice over Internet Protocol (VoIP) is a method used to talk to people using the internet.
◦ The internet can be accessed via a mobile phone network or a broadband network and the
voice calls are sent over the internet using VoIP technology.
Advantages
◦ One of the big advantages is that phone calls themselves are free, no matter
where in the world the caller and receiver .
◦ One of the big advantages of using VoIP is that the device’s built-in cameras
and microphone can also be used so it is much cheaper .
Disadvantages
◦ The main problems are usually sound quality (echo and ‘weird sounds’ are
both common faults).
◦ Security is also a main concern with VoIP, as it is with other internet
technologies.
◦ The most prominent security issues over VoIP are identity theft, viruses and
malware, spamming (unwanted emails) and phishing attacks .
Internet access
◦ Access to the internet from a mobile device is another valuable feature.
◦ Any mobile device can connect to the internet either using a wireless broadband connection or via
the mobile phone network.
◦ less expensive (mobile phone company ‘data plans’ often have a cap on how much data can be
downloaded, and charge for exceeding this maximum)
◦ lower power consumption (Wi-Fi routers are usually much closer than the mobile phone towers; the
longer the range, the greater the power consumption)
◦ quality of service (Wi-Fi usually offers greater bandwidth than the mobile phone network giving the
possibility of downloading more data more quickly).
6.2 Modelling applications
◦ A simulation is the creation of a model of a real system in order to study the behaviour of the system.
Advantages:
1. Personal finance
4. Traffic management
5. Weather forecasting.
Personal finance
◦ Figure 6.6 uses a spreadsheet to model the sales of a tuck shop in a school.
◦ The main advantages of a computer-based system rather than build a manual flood defence system are
▪ Sensors could be used out in the bay area to monitor sea height and wave height
▪ Using a computer system is safer, since using humans to monitor conditions could potentially put them at
risk.
▪ Because of the faster response to changing conditions, city dwellers can be warned well in advance of any
flooding actually taking place.
▪ Data from the sensors could also be fed into the simulation modelling the flood area; this could lead to
further improvements as more data is gathered, which means the simulation becomes closer to reality.
Traffic management
◦ Sensors in the road gather data and count the number of vehicles at the junction.
◦ The gathered data is compared to data stored in the system (the stored data is based on
model/simulation predictions which were used to optimise the traffic flow).
◦ Signals are then sent out to the traffic lights to change their timing if necessary.
Weather forecasting
◦ Weather stations are set up to automatically gather data from the environment.
▪ Rainfall
▪ Temperature
▪ Wind speed
▪ Wind direction
▪ Humidity
◦ The data needs to be gathered every hour of every day of the week.
◦ This data can then be input into a model which simulates weather patterns.
◦ The foundation for weather models are complex mathematical equations that represent air movement and
how heat and moisture are exchanged in the atmosphere.
The data from the weather stations is input into the appropriate grid and the model is run forward in
time to make predictions.
◦ Data is input into the model and a prediction of the weather for the next few days is made.
◦ At the end of the weather forecast period, the model compares its weather forecast with the actual
weather that occurred.
◦ The model ‘learns’ from previous weather situations; improvements to how it predicts weather are
constantly made.
◦ The new data is then input into the model, and a weather forecast for the next few days is made.
◦ A very powerful computer is needed to run this model, since it has to ‘number crunch’ vast amounts of
data.
6.3.1 Computer controlled systems
Robotics in manufacturing
◦ They are less expensive in the long term (although expensive to buy initially, they do not need wages).
◦ They provide greater consistency (for example, every car coming off a production line is identical).
◦ They can do boring, repetitive tasks, leaving humans free to do other more skilled work (for example, quality control or
design work).
◦ They can carry out different tasks by fitting them with different end-effectors (attachments); for example, a spray gun, a
welding gun, and so on.
Disadvantages in using robots
◦ Robots find it difficult to do ‘unusual’ tasks (for example, one-off glassware for a chemical
company).
◦ Because robots do many of the tasks once done by humans, there is a real risk of certain
skills (such as welding) being lost.
◦ Because robots are independent of the skills base, factories can be moved anywhere in the
world (again causing unemployment).
◦ Biometrics: Every student’s fingerprint is stored on a database along with their personal
information, the students must put their finger on a fingerprint scanner to enter or leave
the school premises.
Computer-aided Learning
◦ Computer-aided learning (CAL) is the use of computer-based systems to support in the
academic teaching of students.
◦ They are designed to enhance, and not replace, traditional classroom teaching.
Advantages of using CAL to enhance the learning process
◦ Students can learn when they want to and at their own pace.
◦ It allows virtual reality (VR) learning to be used; with VR, the student is fully
◦ CAL makes use of various multimedia (for example, short video clips, animation, music
and interactive learning methods).
◦ CAL can make use of multiple-choice questions (MCQs) which can be marked
immediately by the computer system, giving instantaneous feedback to the student;
◦ Other assessment methods can be used, such as fill in the missing words, crossword
puzzles, linking correct terms to descriptions and gaming.
◦ It can deliver micro-learning; this is where a topic is broken down into small
modules which are easy to learn, and is when CAL is most effective.
Disadvantages of using CAL to enhance the learning process
◦ CAL cannot give students the experience of handling laboratory equipment; for
example, experiments shown in CAL are virtual in nature.
◦ It is expensive and time consuming to integrate CAL properly into the learning
environment.
◦ Students can easily be distracted while online; for example, going on to social media sites,
visiting websites or even playing online games.
◦ It can lead to the isolation of a student because they are spending their time on their
own in front of a computer screen; this needs to be carefully managed.
6.5 Booking systems
6.5.1 Online booking systems
◦ Online booking systems rely on the ability to update files immediately, thus preventing
double-booking, which could happen if the system response time was slow.
◦ They offer many banking services without the need to go into the bank –such as statements,
account balance and bill paying – which helps people to manage their money more easily.
◦ They are often in places where theft can take place at night.
◦ No actual money is transferred; the whole system relies on electronic transfer of money between accounts.
◦ When an EFT instruction is received, the computer system automatically transfers the specified amount
from one account to another.
Advantages of EFT
◦ It is a very secure payment method.
◦ It is a very quick payment method.
◦ It is less expensive than, for example, using cheques.
Disadvantages of EFT
◦ Once an amount has been transferred the bank cannot reverse a transaction (requires a
full dispute investigation).
◦ The customer needs to have funds available immediately (unlike when using a cheque).
◦ It cannot guarantee the recipient (someone with a fake ID could collect the money).
Paying for a meal example
◦ Waiter inserts card into chip and PIN reader
◦ Restaurant’s bank contact customer’s bank
◦ Card is checked to if valid
◦ If card is stolen or expired, then transaction is terminated
◦ Customer enters PIN using keypad
◦ PIN is read from chip on card and is compared to one just keyed in
◦ If they are the same, the transaction can proceed
◦ Check is then made on whether they have enough funds
◦ If there are not enough funds available, transaction is terminated.
◦ Otherwise, transaction is authorized
◦ Authorization code is sent to restaurant
◦ Price of meal is deducted from customer’s account
◦ Same amount of money is credited to restaurant’s bank account
◦ Receipt is produced as proof of purchase
Credit/debit Card Transactions
◦ Many credit/debit cards are equipped with a chip as well as a magnetic stripe the chip
contains key information such as the PIN.
◦ This system is designed to enhance security because it is better than relying only on a
signature.
◦ Paying for items using a chip and PIN card is a form of electronic funds transfer (EFT).
Cheques
◦ Cheques are one of the oldest ways of paying somebody for services or goods.
◦ Because it is a relatively expensive, slow and less secure way of making payments, cheques
are slowly being phased out.
Patient and pharmacy records
◦ Doctors and hospitals need to keep accurate records of all their patients.
◦ This is essential to ensure correct diagnosis and treatment.
◦ The sort of data which would be required on a patient database is as follows:
» a unique identification number
» name and address
» date of birth
» gender (male or female)
» medical history (for example, recent medicine/treatment)
» blood group
» any known allergies
» doctor
» any current treatment
» any current diagnosis
» important additional information such as X-rays, CT scans, and so on.
Use of 3D printers
◦ A 3D printer can then produce a three-dimensional representation of a patient’s internal
organs, blood vessels, major arteries, tumours and so on.
◦ Prosthetics: used to print out prosthetics (false arms, hands and legs).
◦ Tissue engineering
6.8 Expert systems
◦ Expert systems have been developed to mimic the expertise and knowledge
of an expert in a particular field. Examples include:
◦ » prospecting for oil and minerals
◦ » diagnostics (finding faults in a car engine, finding faults on a circuit board,
etc.)
◦ » medical diagnosis
◦ » strategy games (e.g. chess)
◦ » tax and financial planning
◦ » route scheduling for delivery vehicles
◦ » identification of plants, animals and chemical compounds.
Expert System Setup
◦ Experts in the field are interviewed to find out what is needed in the expert system
◦ The input screen and output format are also designed and created – this is known as the
user interface
◦ Experts are interviewed about how effective it is before the expert system goes out on
general release
Advantages of expert systems
◦ » They offer a high level of expertise.
◦ » They offer a very fast response time (much quicker than a human expert).
◦ » when determining the logic Using expert systems reduces the time taken to solve a
problem
◦ A less skilled worker force is needed, which gives the potential of saving money, but also
allows areas of the world access to expertise which they could not normally afford
Disadvantages of expert systems
◦ Users of the expert system need considerable training in its use to ensure the
system is being used correctly.
◦ They tend to lack common sense in some of the decision making processes.
◦ Errors in the knowledge base can lead to incorrect decisions being made
Computers in the Retail Industry
◦ Each barcode is associated with a stock file which contains details such as price, stock
levels, product description – the barcode will act as the primary key in the file.
◦ A customer takes their trolley/basket to the POS terminal once they have completed their
shopping.
◦ The barcode on each item is scanned at the POS – if the barcode cannot be read, then
the EPOS operator has to key in the number manually.
◦
◦ The barcode is searched for on the stock file until a match is found.
◦ Once the barcode has been found, the appropriate record is accessed.
◦ The price of the item is then found and sent back to the POS together with a product
description.
◦ The stock level for the item is found in the record and is reduced by one and the new
stock level is written back to the file
◦ If the number in stock of the item is less than or equal to the re-order/minimum number in
stock, the item is flagged on the file to indicate an order has been placed;
◦ When new goods arrive, the barcodes on the cartons will be used to update the stock
files; also any flags associated with these goods will be removed so that the stock checks
can start to be made again.
Electronic funds transfer at point-of-sale (EFTPOS)
» contactless cards
Advantages
◦ more secure system than magnetic stripe cards
◦ a quicker system than magnetic stripe cards
Disadvantages
◦ The risk of fraud when typing in the PIN
◦ Some countries do not accept chip and PIN cards.
contactless cards
◦ Contactless debit or credit cards allow customers to pay for items worth up to a certain
amount of money without entering their PIN.
◦ All contactless cards have a small chip that emits radio waves embedded in them.
◦ The card is held within a few centimetres of the payment terminal to pay for an item;
the terminal picks up the signal from the chip and allows the transaction to be
processed.
The steps taken are:
◦ Using OMR software, a template is created to map out the X-Y coordinates is then assigned to each lozenge.
◦ As each question is scanned, a light passes through the scanner which picks up the position of any lozenge which has
been filled in by pencil/ink.
◦ The position of the filled in lozenges is compared to the corresponding coordinates on the ‘answer sheet template’.
◦ If the position matches to the X-Y coordinates, then the answer is recorded as being correct.
◦ Because there is no typing, they are more accurate than keying in the data.
◦ There can be problems if they have not been filled in correctly, and sometimes have to be
manually checked before being read – this is both time consuming and expensive.
◦ Barcode readers are used to read information in the form of a bar code.
◦ Much faster than keying in data manually and fewer mistakes will be made.
◦ Another type of barcode is the quick response (QR) code. This is made up of a
matrix of filled-in dark squares on a light background.
◦ A QR code consists of a block of small squares (light and dark) known as pixels.
◦ Contain links to apps (for example, they can be found in app stores to enable the
appropriate apps to be quickly downloaded onto a user’s device).
◦ Wi-Fi authentication; QR codes can be used to store Wi-Fi network
authentication (proof of identity) details, including passwords and type of
◦ Encryption used – when the QR code is scanned using a smartphone/tablet, it will be able to
automatically join that network.
◦ QR codes can be used to deliver augmented reality (see Chapter 1)
experiences, by helping an AR system to determine the positions of objects in three-
dimensional space.
◦ QR codes have been used to establish virtual online stores, where a gallery of
product information and QR codes are presented to the customer, for example,
on a train station wall. The customers scan the QR codes, and the products
are automatically delivered to their homes.
Advantages of QR codes
◦ They can hold much more information than normal barcode.
◦ QR codes are easier to read; they do not need expensive laser or LED (light
emitting diode) scanners like barcodes – they can be read by the cameras used
◦ Because there are a large number of free apps available to a user for
◦ It is relatively easy to write malicious code and embed this within the QR code.
◦ When the code is scanned, it is possible the creator of the malicious code could gain access to everything on the
user’s smartphone/tablet (for example, photographs, address book, stored passwords, etc.).
◦ The user could also be sent to a fake website, or it is even possible for a virus to be downloaded.
Optical character recognition (OCR)
◦ Optical character recognition (OCR) is the name given to a device that converts the text on
hard copy documents into an electronic form.
Advantages of OCR
◦ Because there is no manual data entry, the number of errors is also reduced.
Disadvantages of OCR
◦ Cars usually refer to GPS as satellite navigation systems Satellites surrounding the Earth
transmit signals to the surface
◦ Computers installed in the mode of transport receive and interpret these signals
◦ Knowing their position on the Earth depends on very accurate timing – atomic clocks are
used in the satellites which are accurate to within a fraction of a second per day
◦ The computer on board the mode of transport calculates its exact position based on the
information from at least three satellites
Satellite Navigation
◦ Used to determine the exact location of a car.
◦ The computers onboard can be used to show directions to a destination.
Advantages of GPS and satnav
◦ The driver does not have to consult paper maps, so it is far safer.
◦ It removes errors (can warn drivers about one-way streets, street closures, etc.).
◦ It is also possible to program in the fastest route, route to avoid towns, etc.
◦ The system can also give useful information such as location of petrol stations.
Disadvantages of GPS and satnav
◦ If the maps are not kept up to date, they can give incorrect instructions.
◦ Unless the system is sophisticated, road closures due to accidents or roadworks, can cause
problems.
◦ If an incorrect start-point or end-point is keyed in the system will give incorrect information.
Geographic Information Systems (GIS)
◦ It is difficult to make GIS programs which are both fast and user-friendly;
GIS requires very complex command language interfaces to work
properly.
Media Communication Systems
◦ There are many types of media used to send and receive information (for
example, fibre optics, copper cable and Wi-Fi).
◦ Security in satellite transmission is very good due to the fact that data is
coded and the receiver requires decoding equipment to read the data.
Disadvantages of media communication
systems
◦ The signals received can be affected by bad weather (for example, heavy
rain or hailstones), obstructions (such as tree branches) and whether the
satellite dish has been correctly orientated.
◦ If they are not in a fixed position relative to the Earth then they need to be
monitored and controlled on a regular basis to ensure they remain in the
correct orbit.