throbber
{7—0—0—0—9—0
`
` —Q—CJ
`
`INFORMATION
`
`SYSTEMS TECHNOLOGY 0
`
`Ross A. Malaga
`University of Maryland
`
`PEARSON
`
`Prentice
`Hall
`
`Upper Saddle River, NJ 07458
`
`
`
`Two Tap
`Exhibit 1007
`Page 001
`
`

`

`Executive Editor, MIS: David Alexander
`Executive Editor, MIS: Bob Horan
`Publisher: Natalie B. Anderson
`Project Manager (Editorial): Lori Cerreto
`Editorial Assistant: Robyn Goldenberg
`Director of Development: Stephen Deitmer
`Developmental Senior Editor: Audrey Regan
`Media Project Manager: loan Waxman
`Marketing Senior Manager: Sharon VI. Koch
`Marketing Assistant: Danielle Torio
`Managing Editor (Production): John Roberts
`Production Editor:
`Production Assistant: Joe DeProspero
`Permissions Supervisor:
`Manufacturing Buyer: Diane Peirano
`Design Manager: Maria Lange
`Interior Design: Dorothy Bungert
`Cover Design: Lorraine Castellano
`Cover Illustration: Beads from Art & Soul, New Canaan, CT
`Illustrator (Interior): Kenneth Batelman and ElectraGraphics, Inc.
`Photo Researcher:
`Image Permission Coordinator:
`Manager, Print Production: Christy Mahon
`Compositioannll-Serviec Project Management: PreMediaOne
`Printer/Binder:
`
`Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear
`on appropriate page within the text.
`
`Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the. U.S.A. and other countries.
`Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or
`endorsed by or affiliated with the Microsoft Corporation.
`
`Copyright © 2005 by Pearson Education, Inc, Upper Saddle River, New Jersey, 07458.
`Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by
`Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a
`retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or
`likewise. For information regarding permission(s), write to: Rights and Permissions Department.
`
`Pearson Prentice HallTM is a trademark of Pearson Education, Inc.
`Pearson® is a registered trademark of Pearson pic
`Prentice Hall® is a registered trademark of Pearson Education, Inc.
`
`Pearson Education LTD.
`Pearsrm Education Singapore, Ptc. Ltd
`Pearson Education, Canada, Ltd
`Pearson Education—Japan
`
`Pearson Education Australia PTY, Limited
`Pearson Education Nerth Asia Ltd
`Pearson Educacion de Mexico, SA. de CV.
`Pearson Education Malaysia, Pte. Ltd
`
`ISBN 071370497509; student
`
`Library of Congress Cataloging-in-Publication Data
`
`Malaga, Ross A.
`Information systems technology 1’ Ross A. Malaga.
`p. Cm.
`Includes bibliographical references and index.
`ISBN 0713704975079
`1. Information technology. I. Title.
`
`T58.5.M36 2004
`004—ch2
`
`2003021909 004
`
`10937654321
`ISBN 0—13—049750—9
`
`Two Tap
`Exhibit 1007
`Page 002
`
`PEARSON
`
`
`
`Prentice
`Hall
`
`

`

`CONTENTS ATII GLANCE
`
`Preface 00
`
`PART I
`
`UNDERSTANDING INFORMATION SYSTEMS TECHNOLOGY
`
`someone-I
`
`Introduction to Information Systems Technology 00
`Computer Hardware Technologies 00
`Software Technologies 00
`Database Technologies 00
`Networking Technologies 00
`Internet and World Wide Web Technologies 00
`
`Pam II
`
`USING INFORMATION SYSTEMS
`
`@Q‘I
`
`Using Information Systems for Electronic Business 00
`Using Information Systems for Decision Making 00
`Using Information Systems for Business Integration 00
`
`PART III BUILDING AND MANAGING INFORMATION SYSTEMS
`
`10
`11
`
`12
`
`Managing Information Systems for Strategic Advantage 00
`Managing the Development and Purchase of Information
`Systems 00
`Managing Security, Disaster Recovery, and Data Retention 00
`
`Appendix A
`Inside Your Computer
`Appendix B
`Working with Databases
`Glossary
`Name and Company Index
`Subject Index
`
`Two Tap
`Exhibit 1007
`Page 003
`
`

`

`. — i ————L —_.— — '— Q —‘-’.1
`
`C H A P T E R
`
`
`
`"
`
`“I think there is a world market for maybe five computers.”
`Thomas Watson, chairman of IBM (1943)
`
`a
`
`COMPUTER
`HARDWARE
`TECHNOLOGIES
`
`
`
`
`(I!
`
`
`.
`.
`.
`There 15 no reason anyone would want a computer in their home.
`Ken Olson, president, chairman, and founder of Digital Equipment Corp. (1977)
`
`
`)3
`
`
`
`
`BNING GOALS
`
`After completing this chapter you should be able to:
`
`2.1
`
`Identify the major components of modern personal computers.
`
`
`
`
`
`
`
`
`
`2.2 Describe input devices and how they operate.
`
`2.3 Describe output devices and how they operate.
`
`2.4 Describe multimedia and alternative input and output devices.
`
`2.5
`
`Explain the role of primary storage.
`
`2.6 Describe secondary storage devices and how they operate.
`
`2.7
`
`2.8
`
`Explain the role of the CPU and how it operates.
`
`Explain how all of the components of a computer work together.
`
`2.9 Describe the various types of computers.
`
`
`
`Two Tap
`Exhibit 1007
`Page 004
`
`

`

`3|]
`
`PART I
`
`O UNDERSTANDING INFORMATION SYSTEMS TECHNOLOGY
`
`BEAD BAR CONSULTANT WWW-o—Q—o—Q—o—Q—o—Q—O—O
`
`Computer Hardware
`
`Stan calls you into his office to review the work you have
`accomplished for the Bead Bar. First, yOu inform Stan that
`the result of the trademark search indicates that the name
`
`”Bead Bar” is already owned by the ArtZenCrafts com,
`pany, but ”Bead Bar on Board" is available.
`With your assistance, Julia has made a compelling case
`for telecommuting twice a week. Some of the key argu-
`ments for telecommuting in Julia’s case are (1) the ability as
`a knowledge worker, to do her job from almost anywhere,
`(2) a reduced rate of absenteeism, as Julia can work from
`home when her baby is sick or her day care provider is not
`available, and (3) the potential for increased productivity.
`In writing the BR] Consulting code of ethics, some ofthe
`key points are to (l) avoid harm to others, (2) be honest in
`all dealings, (3) not discriminate, (4) maintain the privacy
`and confidentiality of data obtained during the course of
`work, (5) perform high—quality work, and (6) maintain and
`improve knowledge in the field.
`Based on your conversations with Meredith, and the
`fact that Julia will now telecommute part—time, she wants
`to build an information technology infrastructure at her
`company. As a first step, she has asked for advice on what
`computer hardware to purchase. Stan explains that com-
`puter hardware choices are driven by the specific soft-
`ware the company needs to run. However, Stan agrees to
`proceed with hardware selection and modify the list
`when software is chosen. Your job is to produce a list of
`the hardware components for the company. Before begin:
`ning, Stan suggests that you talk with each of the senior
`managers to assess his or her needs and concerns.
`After speaking with each manager, you disc0ver the
`following:
`
`a Meredith (President) s ”We’ll certainly need
`computers for our managers at headquarters, but I’m not
`sure about computers at the studios.”
`n Suzanne (VP of Studios) ”A computer in each
`studio would help us track inventory, handle staff scheds
`ules, and schedule parties and special events. My main
`concern is how much space each computer will take up
`in each studio.”
`
`I Leda (VP of Franchises) ”I don’t like comput—
`ers and don’t think we need them.”
`
`— Mitch (VP of Bead Bar on Board) ”I need
`something lightweight and powerfulisomething i can
`take on cruise ships to help me organize my schedule,
`keep meeting notes, and develop proposals.”
`
`,
`Julia (Chief Financial Officer) "A computer
`would certainly help me handle the company’s finances.
`But I am concerned about the cost. We need to keep the
`total cost of computers under $20,000.”
`
`Miriam (VP of Marketing and Sales) ”If I had
`MKT
`I could develop marketing materials,
`like
`a computer,
`print, radio, and television ads, in-house instead of out-
`sourcing it. This could save us money.”
`— Rachel (VP of Operations and Purchasing)
`“I’m not sure computers can help my department. Our
`operations personnel, six people, work primarily in the
`warehouse and stores,
`receiving beads and fulfilling
`orders. Our purchasing person travels around the world to
`purchase beads and other supplies. We would need
`something highly mobile.”
`Jim (Director of Human Resources) ”Com—
` __.
`puters would help me do my job, but I am concerned
`about some of the problems, like repetitive stress injuries
`that occur when employees use computers.”
`
`CONSULTANT TASK LIST
`
`Working through the chapter will help you accomplish these
`tasks for the Bead Bar:
`1. Provide Meredith with a recommendation on the number
`
`and types of computers she should buy for the Bead Bar.
`2. Identify appropriate input devices for the Bead Bar.
`0.)
`. Identify appropriate output devices for the Bead Bar.
`4. Consider if the Bead Bar should use any multimedia
`devices.
`
`5. Determine the primary storage needs of the Bead Bar’s
`computers.
`6. Determine which secondary storage devices the Bead
`Bar should use.
`
`7. Recommend which and what speed CPU should be
`used in the Bead Bar’s computers.
`
`WDmD-O-OWO-Q—O-Q-O-M-O-G-O
`
`2.1
`
`AN OVERVIEW AND HISTORY OF COMPUTING
`
`A computer is an electronic device that can store, retrieve, and manipulate data. This definition
`means that within a computer there are systems that handle each of mese functions. In fact, every
`computer is made up of these core components (see Figure 2.1):
`
`Two Tap
`Exhibit 1007
`Page 005
`
`

`

`
`
`Primary” Sip
`
`Hard Drive
`
`
`
`
`Keyboard Secondary
`
`Floppyr Disk and
`Compact Disk
`
`
`
`Storage
`
`Input Devnces
`
`input device
`
`output device
`
`primary storage
`
`secondary storage
`
`central processing unit (CPU)
`busses
`
`00....
`
`Let’s consider each of these components in general terms. Later we will review each one in
`more detail.
`
`The Core Computer Components
`
`Input and output devices, such as keyboards and monitors, allow us to interact with computers.
`Primary storage is what holds the programs and data we are currently working on. It. will be
`erased when the computer is shutoff. Programs are instructions that tell the computer what to
`do. Data are raw facts that take the form of text, number, images, or sound. Secondary storage
`holds programs and data when the computer is turned off. The central processing unit (CPU),
`also called the microprocessor, handles all calculations and controls how data flows through the
`system It is the brains of the computer. A computer’s busses are pathways between components
`along which data flows.
`Input and output devices are probably the most important computer components to the end
`user. After all, input and output is how the end user experiences the computer. Selection of the
`proper input and output devices can dramatically improve the user’s experience. In addition, cer-
`tain input and output devices can help businesses achieve greater efficiency.
`
`The Development of Computers
`
`Historians trace the roots of computing to Charles Babbage. During the middle of the seven-
`teenth century (1822 to 1871), he conceived of a mechanical computing device called the
`Analytical Engine. The Analytical Engine would be a general-purpose calculating machine.
`Punch cards (paper cards on which holes are punched) would be used to hold the machine’s
`instructions. Unfortunately, the complex gears required for the Analytical Engine were beyond
`the manufacturing capabilities of the time.
`
`CHAPTER 2
`
`o COMPUTER HARDWARE TECHNOLOGIES
`
`31
`
`Output Device
`
`
`Figure 2.1
`
`Core Components of the
`Computer
`These are the core compo—
`nents of a computer. Input
`devices include the key-
`board and mouse. The
`
`monitor is the main output
`device. Primary storage and
`the CPU are located within
`
`the computer chassis.
`Secondary storage devices
`include the hard drive,
`floppy disks, and compact
`disks (CD). Busses are
`located within the chassis
`
`and tie the components
`together.
`
`Two Tap
`Exhibit 1007
`Page 006
`
`

`

`32
`
`PART |
`
`0 UNDERSTANDING INFORMATION SYSTEMS TECHNOLOGY
`
`Charles Babbage’s
`Analytical Engine
`
`
`
`Ada Byron, Countess of Lovelace (the daughter of the poet, Lord Byron), helped Babbage in
`his overall design of the Analytical Engine. In 1843 she showed Babbage her translation of a
`French article describing the Analytical Engine. Babbage suggested that she add her own com-
`mentary. In doing so, the Countess described future generations of the machine that might com-
`pose music and generate graphics. In her correspondence with Babbage, she described how the
`machine could be “programmed” to solve certain types of equations. Ada Byron is considered
`the first computer programmer, even though she never actually programmed a computer. The
`U .S. Department of Defense even named a computer progrannning language, Ada, after her.
`
`Societal Ilse of Computers By the late 18803, the US. Census Bureau realized it had a
`problem. It. took the bureau seven years to tabulate (by hand) the results of the 1880 census, and
`it estimated that it would take more than ten years to tabulale the 1890 census. So the bureau
`sponsored a competition to find a quicker approach. Herman Hollcrith, who worked at the U .8.
`Patent Office at the time, won the contest. His machine used punch cards to send electrical sig-
`nals to mechanical counters. Hollerith’s machine tabulated the 1890 census in only six weeks.
`Hollerith later founded the Tabulating Machines Company, which after a series of mergers,
`became Intemational Business Machines (IBM) in 1924.
`During World War II, the first digital computers (those that use electrical circuits) were devel-
`oped. In 1943 British code breakers developed a computer called Collosus. Collosus’s job was to
`help decipher what the Nazis considered their unbreakable code, the Enigma. Collosus—the British
`built '10 of them—was able to decrypt Enigma-encoded messages at a rate of about 5,000 characters
`per second. After the war, all 10 Collosus machines were destroyed as a security measure.
`To help fight the war, the US. military was developing new artillery at a rapid pace. However,
`each artillery piece required an extensive set of firing tables with settings for various elevations,
`distances, and weather conditions. A group of women, who were called “computers,” developed
`these tables at the University of Pennsylvania. To speed the development of the tables, the US.
`
`Two Tap
`Exhibit 1007
`Page 007
`
`

`

`CHAPTER 2 O COMPUTER HARDWARE TECHNOLOGIES
`
`33
`
`military provided funds for two University of Pennsylvania professors, J . Presper Eckert and John
`Mauchly, to build an electrical calculating machine. Their effort led, in November 1945 (after the
`war had ended), to ENIAC (Electronic Numerical Integrator and Computer). ENIAC, which histo-
`rians consider the world’s first completely digital computer, cost $500,000, was about 150 feet
`long, and contained approximately 18,000 vacuum tubes. These tubes, which resemble small light-
`bulbs, had a tendency to blow out in the middle of calculations. Though ENIAC was not completed
`until after the war, its inventors still considered it a success. It was able to calculate an artillery tra-
`jectory in about 30 seconds as opposed to the 20 hours a human “computer” would take.
`Darin g the 1950s and 1960s, computer scientists made a number of improvements to comput-
`ers. Most important, transistors replaced vacuum tubes. Transistors are smaller and lighter than
`vacuum tubes, and since they do not blow out, much more reliable. In the early 1970s, Intel
`Corporation developed the first microprocessor, the 4004. A microprocessor contains all of the
`circuitry required to run a computer on a single, postage—stamp-sized chip.
`
`The Rise of the P0 In December 1974 Popular Electronics magazine opened the informa-
`tion age with an article highlighting the first personal computer, the Altair 8800. The Altair used
`a second-generation Intel microprocessor (the 8080), sold for $397, and had to be assembled by
`the user. It had no keyboard, mouse, or monitor. Users programmed instructions into the Altair
`via switches and received output in the form of flashing lights. MITS, the company that made the
`Altair, received 200 orders on its first day of sale.
`Working out of a garage, Stephen Wozniak, with the help of Steve Jobs, developed the Apple 1
`computer in 1976. The computer used a MOStek 6502 microprocessor, a competitor to the Intel
`4004. The success of the Apple I convinced Jobs that there was a market for an easy-to—use per-
`sonal computer. Apple introduced the Apple II in 1.977. It came in a plastic case with a keyboard
`and displayed color graphics when connected to a color television.
`In 198] IBM released its first personal computer. The IBM PC came with a monochrome (one
`color) monitor and used a cassette tape for storage. It also came packaged with an operating sys-
`tem from Microsoft called PC-DOS.
`
`Apple released the Macintosh in January 1984. This computer came with a mouse, and the
`user manipulated the machine by clicking on icons, which gave it an interactive interface.
`Although the idea of an interactive interface based on icons was developed by researchers at
`Xerox’s Palo Alto Research Center (PARC) in the 19703, the Macintosh popularized it.
`Eventually, Microsoft used this type of interface in developing its Windows operating systems.
`See the Career Path feature that chronicles the professional life of Steve Iobs.
`Since the late 19805, computers have become smaller and more powerful, while dropping in
`price. This trend has led to an explosion in the use of personal computers. Today there are more
`than 625 million personal. computers in use worldwide as compared with only 1.48 million in 1992.
`
`
`
`ENIAC, the world’s first all
`electronic computer
`
`Two Tap
`Exhibit 1007
`Page 008
`
`

`

`34
`
`PART I
`
`0 UNDERSTANDING INFORMATION SYSTEMS TECHNOLOGY
`
`The Altair 8800 was the
`
`first personal computer.
`Switches were used to pro
`gram the computer and
`lights provided output.
`
`
`
`Although new specific technologies have been invented, all computers have the same basic
`core components. Let’s now examine the core components of the computer.
`
`2.2
`INPUT DEVICES
`
`Computer input devices, shown in Figure 2.2, are broken into two major categories, human input
`devices and machine-readable input devices. Human input devices include all mechanisms that
`allow a person to directly send data to the computer. The two most widely used human input
`devices are the keyboard and mouse (or other pointing device). Machine-readable input is data in
`a form that can be sent directly to the computer with minimal or no human involvement.
`Examples include bar codes, magnetic ink, and optical character recognition.
`
`
`VISIONARY STEVE 1035
`office. In addition, the studio has won
`In 1975 Stevelobs, a 21ryearrold college
`Apple introduced the Mac with great
`fanfare in its famous television commer-
`dropout who worked briefly as a com-
`Academy Awards for its animation.
`puter game designer, cofounded a com—
`In the late 19905, Apple’s manage—
`puter company with his friend Stephen
`ment broughtlobs back to the company,
`where he helped turn it around by intro-
`Wozniak. The new company was based
`in Jobs’s parents’ garage. While Wozniak
`ducing stylish computers, such as the
`handled much of the research and devel-
`iMac and iBook.
`
`cial that ran during the 1984 Super Bowl.
`The Mac’s computer mouse and graphi-
`cal interface made it far easier to use
`
`
`
`Steve Jobs co—founded Apple Computer
`and Pixar Animation Studios.
`
`Two Tap
`Exhibit 1007
`Page 009
`
`opment, Jobs found a market for the
`company’s first computer. The company
`was Apple Computer Corporation, and
`its first computer was the Apple I.
`Jobs’s major contributions to personal
`computing came after he visited Xerox’s
`Palo Alto Research Center (PARC) in the
`early 19805. PARC had developed a new
`way for users to interact with computers
`via a computer mouse and icons on the
`screen. However, it was Jobs who brought
`this new technology to a mass market.
`Jobs led a group at Apple that devel-
`oped the Macintosh (Mac) computer.
`
`than its major competitor, the IBM per—
`sonal computer.
`Shortly after the Mac launch, Apple’s
`board of directors forced Steve Jobs out
`of the company. He went on to found
`NextStep Corporation. Although
`NextStep’s computers proved too expen-
`sive for their market, the company did
`introduce a revolutionary operating sys-
`tem and its computers did contain many
`advanced components.
`During this time, Jobs cofounded
`Pixar Animation Studios. Pixar’s ani-
`
`mated feature films, which include Toy
`Story, Toy Story 2, and Monsters Inc,
`have been hugely successful at the box
`
`

`

`CHAPTER 2 O COMPUTER HARDWARE TECHNOLOGIES
`
`35
`
`Application
`Input Device
`Easy to learn for new typists,
`Dvorak keyboard
`increases productivity,
`
`and is designed with more
`common Word. pat-items
`
`_r,i 5“
`i
`
`
`Figure 2.2
`
`Input Devices
`The figure shows common
`input devices and their
`applications.
`
`Split keyboard
`
`Trackball
`
`Stylus
`
`
`
`Good alternative for people
`who get fatigue and pain
`from a standard keyboard
`
`digitize sketches
`
`Good for gaming
`and young children
`
`Used primarily by artists
`and draftspeople to
`
`Bar code reader
`
`Ch“
`K 9
`
`Scans bar codes
`
`Scanner
`
`MICR- Magnetic ink
`character
`recognition
`
`
`
`m...
`m
`sea
`“E1
`m M"
`
`
`
`
`
`Used for optical
`character recognition
`
`Used in banks for scanning
`the bank account numbers
`on the bottom of checks
`
`The Keyboard
`
`The keyboard is the most widely used input device. A keyboard provides an easy way to enter
`text, numbers, and even simple commands, such as delete. The layout of a computer keyboard
`follows the layout of the typewriter. In the early days of computers, many developers thought
`that keeping the same layout would make the transition from typewriter to computer easier.
`However, the QWERTY layout (named after the letters on the left of the top row of the key-
`board) was designed specifically to slow down typing. Early typewriters had moving parts that
`jammed when a person typed too fast. So typewriter makers created a keyboard whose ineffi-
`ciencies would slow the typist down. And this is the awkward setup that today’s computer key-
`board users have inherited. At the time, the other major selling point of the QWERTY layout was
`that all of the letters in “typewriter” are in the top row, making it easier for typewriter salespeo-
`ple to type the word.
`
`Repetitive Stress Injuries and Ergonomics
`
`The inefficient design of the keyboard has led to repetitive stress injuries (RSIs), such as carpal
`tunnel syndrome (CTS). Making the same hand motions continuously for hours each workday
`narrows the carpal tunnel in the wrist and constricts the median nerve that runs through it. CTS
`symptoms include wrist pain, numbness in the hands, hand weakness, and a loss of feeling in
`some fingers. If you suffer from some or all of these symptoms on a regular basis, seek medical
`advice.
`
`The US. Occupational Health and Safety Administration (OSHA) estimates that about 100
`million people in the United States suffer from RSIs (not all of these are caused by using com-
`puters). The Bureau of Labor Statistics estimates that RSls cost US. companies over $20 billion
`per year in lost productivity and medical expenses.
`Ergonomics is the study of how human beings interact with their work environment.
`Researchers studying ergonomics have learned what causes RS Is and other problems associated
`
`Two Tap
`Exhibit 1007
`Page 010
`
`

`

`36
`
`PARTI
`
`O UNDERSTANDINGINFORIVIATION SYSTEMSTECHNOLOGY
`
` r"
`v‘N.
`
`
`
`BEAD BAR {It
`gyro—if.-
`
`
`CONSULTANT Task 2.A
`
`
`
`
`Stan ”Split keyboards sound like they might ease
`Jim’s concerns. Visit Microsoft’s keyboard Web
`site at wwmmr‘crosoft.com/hardware/keyboard/
`
`
`howtobuyasp. Compare the benefits and cost of
`a standard keyboard, such as Microsoft’s Office
`
`
`Keyboard, to those of a split keyboard, such as
`
`
`Microsoft’s Natural Keyboard. Which keyboard
`
`
`would you recommend for the Bead Bar’s com-
`
`
`puters? Why?” (Wait to make your final recent-
`
`
`mendations until after determining all ofthe
`
`
`computer types to buy.)
`
`Qi-o-Q-o-t;
`
`with computer use, such as eye- and backstrain. For example, since
`there is no reason for a QWERTY keyboard on a computer, design-
`ers have experimented with alternative layouts, such as the Dvorak
`keyboard. Some keyboards solve the problem by using the
`QWERTY layout, but splitting the keyboard, so that the typist’s
`hands are in a more natural, comfortable position. A Dvorak and
`split keyboard are shown in Figure 2.2. These keyboards put less
`strain on the muscles around the carpal tunnel and help prevent CTS.
`The checklist feature and Figure 2.3 offer some ergonomic tips.
`
`The Mouse
`
`When we talk about the computer mouse, we are really talking
`about a number of input devices that fall under the general name of
`pointing device. In 1965 Douglas Englehart invented the computer
`mouse that we know today. The mouse is a device that controls the
`computer’s cursor by moving along a flat surface. It has one or
`more buttons that allow the user to manipulate items on the screen. A trackball is a mouse with a
`ball on top. Instead of moving the entire device, the user moves the ball to manipulate the pointer
`on the screen. The main advantage of a trackball is that it takes up less space than a mouse.
`There are other types of pointing devices that serve special purposes. A joystick and game pad
`are used primarily when playing computer games. A stylus looks like a pen and is the pointing
`device used on handheld computers.
`The problem that is common to all of the input devices discussed so far is that they rely on
`human input, and humans make errors. For industries and applications where perfect input is
`important, control of the input function has moved from human operators to machines.
`
`Bar Code Scanners
`
`The most conunon machine input device is the bar code scanner. The bar code scanner uses light
`to read bar codes, which are those series of stripes that you see on product labels. The width of the
`stripes and the distance between them signals various numbers and letters to a computer. Bar codes
`appear on almost every item sold in the United States as the product’s Universal Product Code
`(UPC). For more infoimation on the use of the UPC visit wwwadamsl.comi’pubtrussadamr'
`upccodehtml. The use of bar codes and bar code scanners has greatly helped the retail and grocery
`industries. They allow for faster, more precise checkout, accurate inventory tracking, and they
`allow businesses to quickly change prices if conditions in the economy demand.
`While bar codes have made their mark on the retail industry, they are also improving the
`logistics (shippingttrucking/warehousing) industry. Companies such as FedEx and UPS use bar
`
`
`
`a CH ECKLIST
`Ergonomic Tips
`
`You can reduce or avoid RSls and back-, neck—, and eyestrain by
`considering posture, lighting, and how you work.
`
`Posture
`
`Lighting
`
`6. Position the monitor to avoid glare.
`
`1. Feet should be flat on the floor or on a footrest.
`
`Working
`
`2. Areas should be at a 100 to 110 degree angle to the key-
`board. Shoulders should be relaxed.
`
`3. Wrists should be straight. Use a wrist rest if possible.
`
`4. The back needs a chair that provides good support.
`
`5. Eyes should look down slightly at the monitor.
`
`7. Take a 1 to '2 minute break every 15 to 20 minutes.
`
`3. Look up occasionally and focus on distant objects.
`
`Adapted from ergonomics.ucla.edu/Ergowebv2.0/articlesl
`offi.ce_fronl_page .htm
`
`Two Tap
`Exhibit 1007
`Page 01 1
`
`

`

`CHAPTERZ O COMPUTER HARDWARETECHNOLOGIES
`
`37
`
`
`
`29l|”30l|
`
`
`
`
`Figure 2.3
`
`Ergonomic Sitting
`The ideal position to sit in
`when typing at your com—
`puter is with your feet flat
`on the floor, back straight,
`wrists below your elbows,
`and your monitor below
`eye level. This position
`reduces the amount of
`
`stress placed on your spine
`and wrists and helps
`reduce eyestrain.
`Source: W.ergo.hunmn.
`comell. edu/AHTutorials/
`typingposmmhrml
`
`codes to track packages that are in their system, Every time a package goes through a main artery
`in the system, its bar code is scanned.
`Consider a package you want to ship from New York City to Los Angeles. Figure 2.4 shows
`the steps in the shipping process. When the delivery person comes to pick up the package, she
`scans the bar code on the shipping label that she puts on it. The package’s bar code is scanned
`again when it reaches the New York City sorting facility and again when the loader puts it on the
`plane at Kennedy Airport. When the plane lands in Los Angeles, an employee at the receiving
`facility scans the package when it’s loaded onto a shipping truck. This frequent scanning allows
`the company to determine exactly where the package is while in transit Both FedEx and UPS
`make tracking information available to their customers
`Before this technology, senders had little way to know whether their packages would arrive on
`time. or at all. The technology has reduced both shipping errors and lost packages It also reduces
`costs by allowing customers to track their own shipments on the company’s Web site.
`
`It
`
`Delivery person
`scans package
`
`6 flPackage scanned
`NYC at NYC shipping
`facility
`l
`Package scanned
`”( at loading dock@ at airport
`
`"\ Package scanned
`
`and received at LA.
`shipping facility
`
`
`Figure 2.4
`
`Tracking a Package With
`Bar Codes
`A package’s journey from
`New York City to Los
`Angeles is chronicled
`through the use of bar
`codes and bar code scan-
`
`ners so the shipping corn—
`pany and customer know
`its status at all times.
`
`Two Tap
`Exhibit 1007
`Page 012
`
`

`

`33
`
`PARTI
`
`O UNDERSTANDINGINFORMATION SYSTEMSTECHNOLOGY
`
`BEAD BAR flea—©0431
`CONSULTANT Task 2.3
`
`
`
`
`
`Rachel (VP of Operations and Purchasing) "is
`
`there some way we can use bar codes to track
`
`
`inventory as it comes into the warehouse and
`
`
`back out to our studios and customers?”
`Stan ”Visit wwwbarcadediscountersxom to
`
`
`determine how much bar code readers cost.
`
`
`Employees will use these devices in the ware-
`
`
`house, so look at the portable readers. How do
`
`
`they differ from basic readers in terms of func-
`
`
`tionality and price?”
`
`Q-o-Q-o-Ci
`
`In addition to retail and logistics, bar codes have become useful
`to industries in which accuracy is important. Take the University
`of Chicago Hospitals, for example. They wanted to ensure the pos-
`itive identification and accurate tracking of patient blood samples.
`In the old system, the phlebotomist (the person who draws the
`blood) manually recorded information on paper, and could intro-
`duce errors. So they implemented a system in which the phle-
`botomist scans the bar code on the patient’s wristband and then
`prints that same bar code and puts it on the label of the patient‘s
`blood specimen. This procedure has reduced phlebotomists’
`paperwork and the hospitals’ malpractice risk. [1]
`
`Optical Character Recognition (OCR)
`
`Optical character recognition (OCR), another machine-readable
`input device, is specialized software that works with a scanner to
`take text from a physical source, such as paper or packaging, and allows a computer to create an
`electronic file of that text. The process begins by scanning the text page. A scanner is a device
`that reads paper-based documents, such as text or images, and converts them into digital form. It
`works on the same principles as a photocopier. However, instead of making a paper copy, the
`scanner produces a digital image of the page. The OCR software then processes the digital
`image. The software is prograimned to recognize patterns, in this case text characters. The soft-
`ware lhen converts the image to a character the computer can understand and the user can manip-
`ulate. The end result is a computer file, such as a word processing document, the user can edit.
`Companies can use OCR as a component of a document management. system. Chase Manhattan
`Mortgage did so. The company is one of the largest mongage loan originators in the United States.
`With so much paperwork, data entry errors were common. So, Chase implemented a document
`management system based on scanning and OCR. The company now uses high-speed scanners to
`process over 2.5 million documents per month as compared to 750,000 per month previously. In
`addition, the new system reduced the cost of processing a page of text from 10¢ to 4c. [2]
`
`Magnetic Ink Character Recognition (MICR)
`
`Think about a large bank, such as Wachovia Corporation, which processes about 100 million
`checks per month. [3] In processing these checks, the bank must be both accurate and quick. So,
`the banking industry has developed its own character recognition technology based on magnetic
`ink, called magnetic ink character recognition (MICR). Special MICR machines read each
`check’s routing number (the line of numbers at the bottom of the check), which is printed in
`magnetic ink. In addition, when a customer deposits a check from another bank, the customer’s
`bank types the amount on the check using magnetic ink. This procedure allows banks to quickly
`and accurately process hundreds of millions of checks every month.
`
`
`
`2.3 OUTPUT

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket