`
` —Q—CJ
`
`INFORMATION
`
`SYSTEMS TECHNOLOGY 0
`
`Ross A. Malaga
`University of Maryland
`
`PEARSON
`
`Prentice
`Hall
`
`Upper Saddle River, NJ 07458
`
`
`
`Two Tap
`Exhibit 1007
`Page 001
`
`
`
`Executive Editor, MIS: David Alexander
`Executive Editor, MIS: Bob Horan
`Publisher: Natalie B. Anderson
`Project Manager (Editorial): Lori Cerreto
`Editorial Assistant: Robyn Goldenberg
`Director of Development: Stephen Deitmer
`Developmental Senior Editor: Audrey Regan
`Media Project Manager: loan Waxman
`Marketing Senior Manager: Sharon VI. Koch
`Marketing Assistant: Danielle Torio
`Managing Editor (Production): John Roberts
`Production Editor:
`Production Assistant: Joe DeProspero
`Permissions Supervisor:
`Manufacturing Buyer: Diane Peirano
`Design Manager: Maria Lange
`Interior Design: Dorothy Bungert
`Cover Design: Lorraine Castellano
`Cover Illustration: Beads from Art & Soul, New Canaan, CT
`Illustrator (Interior): Kenneth Batelman and ElectraGraphics, Inc.
`Photo Researcher:
`Image Permission Coordinator:
`Manager, Print Production: Christy Mahon
`Compositioannll-Serviec Project Management: PreMediaOne
`Printer/Binder:
`
`Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear
`on appropriate page within the text.
`
`Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the. U.S.A. and other countries.
`Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or
`endorsed by or affiliated with the Microsoft Corporation.
`
`Copyright © 2005 by Pearson Education, Inc, Upper Saddle River, New Jersey, 07458.
`Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by
`Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a
`retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or
`likewise. For information regarding permission(s), write to: Rights and Permissions Department.
`
`Pearson Prentice HallTM is a trademark of Pearson Education, Inc.
`Pearson® is a registered trademark of Pearson pic
`Prentice Hall® is a registered trademark of Pearson Education, Inc.
`
`Pearson Education LTD.
`Pearsrm Education Singapore, Ptc. Ltd
`Pearson Education, Canada, Ltd
`Pearson Education—Japan
`
`Pearson Education Australia PTY, Limited
`Pearson Education Nerth Asia Ltd
`Pearson Educacion de Mexico, SA. de CV.
`Pearson Education Malaysia, Pte. Ltd
`
`ISBN 071370497509; student
`
`Library of Congress Cataloging-in-Publication Data
`
`Malaga, Ross A.
`Information systems technology 1’ Ross A. Malaga.
`p. Cm.
`Includes bibliographical references and index.
`ISBN 0713704975079
`1. Information technology. I. Title.
`
`T58.5.M36 2004
`004—ch2
`
`2003021909 004
`
`10937654321
`ISBN 0—13—049750—9
`
`Two Tap
`Exhibit 1007
`Page 002
`
`PEARSON
`
`
`
`Prentice
`Hall
`
`
`
`CONTENTS ATII GLANCE
`
`Preface 00
`
`PART I
`
`UNDERSTANDING INFORMATION SYSTEMS TECHNOLOGY
`
`someone-I
`
`Introduction to Information Systems Technology 00
`Computer Hardware Technologies 00
`Software Technologies 00
`Database Technologies 00
`Networking Technologies 00
`Internet and World Wide Web Technologies 00
`
`Pam II
`
`USING INFORMATION SYSTEMS
`
`@Q‘I
`
`Using Information Systems for Electronic Business 00
`Using Information Systems for Decision Making 00
`Using Information Systems for Business Integration 00
`
`PART III BUILDING AND MANAGING INFORMATION SYSTEMS
`
`10
`11
`
`12
`
`Managing Information Systems for Strategic Advantage 00
`Managing the Development and Purchase of Information
`Systems 00
`Managing Security, Disaster Recovery, and Data Retention 00
`
`Appendix A
`Inside Your Computer
`Appendix B
`Working with Databases
`Glossary
`Name and Company Index
`Subject Index
`
`Two Tap
`Exhibit 1007
`Page 003
`
`
`
`. — i ————L —_.— — '— Q —‘-’.1
`
`C H A P T E R
`
`
`
`"
`
`“I think there is a world market for maybe five computers.”
`Thomas Watson, chairman of IBM (1943)
`
`a
`
`COMPUTER
`HARDWARE
`TECHNOLOGIES
`
`
`
`
`(I!
`
`
`.
`.
`.
`There 15 no reason anyone would want a computer in their home.
`Ken Olson, president, chairman, and founder of Digital Equipment Corp. (1977)
`
`
`)3
`
`
`
`
`BNING GOALS
`
`After completing this chapter you should be able to:
`
`2.1
`
`Identify the major components of modern personal computers.
`
`
`
`
`
`
`
`
`
`2.2 Describe input devices and how they operate.
`
`2.3 Describe output devices and how they operate.
`
`2.4 Describe multimedia and alternative input and output devices.
`
`2.5
`
`Explain the role of primary storage.
`
`2.6 Describe secondary storage devices and how they operate.
`
`2.7
`
`2.8
`
`Explain the role of the CPU and how it operates.
`
`Explain how all of the components of a computer work together.
`
`2.9 Describe the various types of computers.
`
`
`
`Two Tap
`Exhibit 1007
`Page 004
`
`
`
`3|]
`
`PART I
`
`O UNDERSTANDING INFORMATION SYSTEMS TECHNOLOGY
`
`BEAD BAR CONSULTANT WWW-o—Q—o—Q—o—Q—o—Q—O—O
`
`Computer Hardware
`
`Stan calls you into his office to review the work you have
`accomplished for the Bead Bar. First, yOu inform Stan that
`the result of the trademark search indicates that the name
`
`”Bead Bar” is already owned by the ArtZenCrafts com,
`pany, but ”Bead Bar on Board" is available.
`With your assistance, Julia has made a compelling case
`for telecommuting twice a week. Some of the key argu-
`ments for telecommuting in Julia’s case are (1) the ability as
`a knowledge worker, to do her job from almost anywhere,
`(2) a reduced rate of absenteeism, as Julia can work from
`home when her baby is sick or her day care provider is not
`available, and (3) the potential for increased productivity.
`In writing the BR] Consulting code of ethics, some ofthe
`key points are to (l) avoid harm to others, (2) be honest in
`all dealings, (3) not discriminate, (4) maintain the privacy
`and confidentiality of data obtained during the course of
`work, (5) perform high—quality work, and (6) maintain and
`improve knowledge in the field.
`Based on your conversations with Meredith, and the
`fact that Julia will now telecommute part—time, she wants
`to build an information technology infrastructure at her
`company. As a first step, she has asked for advice on what
`computer hardware to purchase. Stan explains that com-
`puter hardware choices are driven by the specific soft-
`ware the company needs to run. However, Stan agrees to
`proceed with hardware selection and modify the list
`when software is chosen. Your job is to produce a list of
`the hardware components for the company. Before begin:
`ning, Stan suggests that you talk with each of the senior
`managers to assess his or her needs and concerns.
`After speaking with each manager, you disc0ver the
`following:
`
`a Meredith (President) s ”We’ll certainly need
`computers for our managers at headquarters, but I’m not
`sure about computers at the studios.”
`n Suzanne (VP of Studios) ”A computer in each
`studio would help us track inventory, handle staff scheds
`ules, and schedule parties and special events. My main
`concern is how much space each computer will take up
`in each studio.”
`
`I Leda (VP of Franchises) ”I don’t like comput—
`ers and don’t think we need them.”
`
`— Mitch (VP of Bead Bar on Board) ”I need
`something lightweight and powerfulisomething i can
`take on cruise ships to help me organize my schedule,
`keep meeting notes, and develop proposals.”
`
`,
`Julia (Chief Financial Officer) "A computer
`would certainly help me handle the company’s finances.
`But I am concerned about the cost. We need to keep the
`total cost of computers under $20,000.”
`
`Miriam (VP of Marketing and Sales) ”If I had
`MKT
`I could develop marketing materials,
`like
`a computer,
`print, radio, and television ads, in-house instead of out-
`sourcing it. This could save us money.”
`— Rachel (VP of Operations and Purchasing)
`“I’m not sure computers can help my department. Our
`operations personnel, six people, work primarily in the
`warehouse and stores,
`receiving beads and fulfilling
`orders. Our purchasing person travels around the world to
`purchase beads and other supplies. We would need
`something highly mobile.”
`Jim (Director of Human Resources) ”Com—
` __.
`puters would help me do my job, but I am concerned
`about some of the problems, like repetitive stress injuries
`that occur when employees use computers.”
`
`CONSULTANT TASK LIST
`
`Working through the chapter will help you accomplish these
`tasks for the Bead Bar:
`1. Provide Meredith with a recommendation on the number
`
`and types of computers she should buy for the Bead Bar.
`2. Identify appropriate input devices for the Bead Bar.
`0.)
`. Identify appropriate output devices for the Bead Bar.
`4. Consider if the Bead Bar should use any multimedia
`devices.
`
`5. Determine the primary storage needs of the Bead Bar’s
`computers.
`6. Determine which secondary storage devices the Bead
`Bar should use.
`
`7. Recommend which and what speed CPU should be
`used in the Bead Bar’s computers.
`
`WDmD-O-OWO-Q—O-Q-O-M-O-G-O
`
`2.1
`
`AN OVERVIEW AND HISTORY OF COMPUTING
`
`A computer is an electronic device that can store, retrieve, and manipulate data. This definition
`means that within a computer there are systems that handle each of mese functions. In fact, every
`computer is made up of these core components (see Figure 2.1):
`
`Two Tap
`Exhibit 1007
`Page 005
`
`
`
`
`
`Primary” Sip
`
`Hard Drive
`
`
`
`
`Keyboard Secondary
`
`Floppyr Disk and
`Compact Disk
`
`
`
`Storage
`
`Input Devnces
`
`input device
`
`output device
`
`primary storage
`
`secondary storage
`
`central processing unit (CPU)
`busses
`
`00....
`
`Let’s consider each of these components in general terms. Later we will review each one in
`more detail.
`
`The Core Computer Components
`
`Input and output devices, such as keyboards and monitors, allow us to interact with computers.
`Primary storage is what holds the programs and data we are currently working on. It. will be
`erased when the computer is shutoff. Programs are instructions that tell the computer what to
`do. Data are raw facts that take the form of text, number, images, or sound. Secondary storage
`holds programs and data when the computer is turned off. The central processing unit (CPU),
`also called the microprocessor, handles all calculations and controls how data flows through the
`system It is the brains of the computer. A computer’s busses are pathways between components
`along which data flows.
`Input and output devices are probably the most important computer components to the end
`user. After all, input and output is how the end user experiences the computer. Selection of the
`proper input and output devices can dramatically improve the user’s experience. In addition, cer-
`tain input and output devices can help businesses achieve greater efficiency.
`
`The Development of Computers
`
`Historians trace the roots of computing to Charles Babbage. During the middle of the seven-
`teenth century (1822 to 1871), he conceived of a mechanical computing device called the
`Analytical Engine. The Analytical Engine would be a general-purpose calculating machine.
`Punch cards (paper cards on which holes are punched) would be used to hold the machine’s
`instructions. Unfortunately, the complex gears required for the Analytical Engine were beyond
`the manufacturing capabilities of the time.
`
`CHAPTER 2
`
`o COMPUTER HARDWARE TECHNOLOGIES
`
`31
`
`Output Device
`
`
`Figure 2.1
`
`Core Components of the
`Computer
`These are the core compo—
`nents of a computer. Input
`devices include the key-
`board and mouse. The
`
`monitor is the main output
`device. Primary storage and
`the CPU are located within
`
`the computer chassis.
`Secondary storage devices
`include the hard drive,
`floppy disks, and compact
`disks (CD). Busses are
`located within the chassis
`
`and tie the components
`together.
`
`Two Tap
`Exhibit 1007
`Page 006
`
`
`
`32
`
`PART |
`
`0 UNDERSTANDING INFORMATION SYSTEMS TECHNOLOGY
`
`Charles Babbage’s
`Analytical Engine
`
`
`
`Ada Byron, Countess of Lovelace (the daughter of the poet, Lord Byron), helped Babbage in
`his overall design of the Analytical Engine. In 1843 she showed Babbage her translation of a
`French article describing the Analytical Engine. Babbage suggested that she add her own com-
`mentary. In doing so, the Countess described future generations of the machine that might com-
`pose music and generate graphics. In her correspondence with Babbage, she described how the
`machine could be “programmed” to solve certain types of equations. Ada Byron is considered
`the first computer programmer, even though she never actually programmed a computer. The
`U .S. Department of Defense even named a computer progrannning language, Ada, after her.
`
`Societal Ilse of Computers By the late 18803, the US. Census Bureau realized it had a
`problem. It. took the bureau seven years to tabulate (by hand) the results of the 1880 census, and
`it estimated that it would take more than ten years to tabulale the 1890 census. So the bureau
`sponsored a competition to find a quicker approach. Herman Hollcrith, who worked at the U .8.
`Patent Office at the time, won the contest. His machine used punch cards to send electrical sig-
`nals to mechanical counters. Hollerith’s machine tabulated the 1890 census in only six weeks.
`Hollerith later founded the Tabulating Machines Company, which after a series of mergers,
`became Intemational Business Machines (IBM) in 1924.
`During World War II, the first digital computers (those that use electrical circuits) were devel-
`oped. In 1943 British code breakers developed a computer called Collosus. Collosus’s job was to
`help decipher what the Nazis considered their unbreakable code, the Enigma. Collosus—the British
`built '10 of them—was able to decrypt Enigma-encoded messages at a rate of about 5,000 characters
`per second. After the war, all 10 Collosus machines were destroyed as a security measure.
`To help fight the war, the US. military was developing new artillery at a rapid pace. However,
`each artillery piece required an extensive set of firing tables with settings for various elevations,
`distances, and weather conditions. A group of women, who were called “computers,” developed
`these tables at the University of Pennsylvania. To speed the development of the tables, the US.
`
`Two Tap
`Exhibit 1007
`Page 007
`
`
`
`CHAPTER 2 O COMPUTER HARDWARE TECHNOLOGIES
`
`33
`
`military provided funds for two University of Pennsylvania professors, J . Presper Eckert and John
`Mauchly, to build an electrical calculating machine. Their effort led, in November 1945 (after the
`war had ended), to ENIAC (Electronic Numerical Integrator and Computer). ENIAC, which histo-
`rians consider the world’s first completely digital computer, cost $500,000, was about 150 feet
`long, and contained approximately 18,000 vacuum tubes. These tubes, which resemble small light-
`bulbs, had a tendency to blow out in the middle of calculations. Though ENIAC was not completed
`until after the war, its inventors still considered it a success. It was able to calculate an artillery tra-
`jectory in about 30 seconds as opposed to the 20 hours a human “computer” would take.
`Darin g the 1950s and 1960s, computer scientists made a number of improvements to comput-
`ers. Most important, transistors replaced vacuum tubes. Transistors are smaller and lighter than
`vacuum tubes, and since they do not blow out, much more reliable. In the early 1970s, Intel
`Corporation developed the first microprocessor, the 4004. A microprocessor contains all of the
`circuitry required to run a computer on a single, postage—stamp-sized chip.
`
`The Rise of the P0 In December 1974 Popular Electronics magazine opened the informa-
`tion age with an article highlighting the first personal computer, the Altair 8800. The Altair used
`a second-generation Intel microprocessor (the 8080), sold for $397, and had to be assembled by
`the user. It had no keyboard, mouse, or monitor. Users programmed instructions into the Altair
`via switches and received output in the form of flashing lights. MITS, the company that made the
`Altair, received 200 orders on its first day of sale.
`Working out of a garage, Stephen Wozniak, with the help of Steve Jobs, developed the Apple 1
`computer in 1976. The computer used a MOStek 6502 microprocessor, a competitor to the Intel
`4004. The success of the Apple I convinced Jobs that there was a market for an easy-to—use per-
`sonal computer. Apple introduced the Apple II in 1.977. It came in a plastic case with a keyboard
`and displayed color graphics when connected to a color television.
`In 198] IBM released its first personal computer. The IBM PC came with a monochrome (one
`color) monitor and used a cassette tape for storage. It also came packaged with an operating sys-
`tem from Microsoft called PC-DOS.
`
`Apple released the Macintosh in January 1984. This computer came with a mouse, and the
`user manipulated the machine by clicking on icons, which gave it an interactive interface.
`Although the idea of an interactive interface based on icons was developed by researchers at
`Xerox’s Palo Alto Research Center (PARC) in the 19703, the Macintosh popularized it.
`Eventually, Microsoft used this type of interface in developing its Windows operating systems.
`See the Career Path feature that chronicles the professional life of Steve Iobs.
`Since the late 19805, computers have become smaller and more powerful, while dropping in
`price. This trend has led to an explosion in the use of personal computers. Today there are more
`than 625 million personal. computers in use worldwide as compared with only 1.48 million in 1992.
`
`
`
`ENIAC, the world’s first all
`electronic computer
`
`Two Tap
`Exhibit 1007
`Page 008
`
`
`
`34
`
`PART I
`
`0 UNDERSTANDING INFORMATION SYSTEMS TECHNOLOGY
`
`The Altair 8800 was the
`
`first personal computer.
`Switches were used to pro
`gram the computer and
`lights provided output.
`
`
`
`Although new specific technologies have been invented, all computers have the same basic
`core components. Let’s now examine the core components of the computer.
`
`2.2
`INPUT DEVICES
`
`Computer input devices, shown in Figure 2.2, are broken into two major categories, human input
`devices and machine-readable input devices. Human input devices include all mechanisms that
`allow a person to directly send data to the computer. The two most widely used human input
`devices are the keyboard and mouse (or other pointing device). Machine-readable input is data in
`a form that can be sent directly to the computer with minimal or no human involvement.
`Examples include bar codes, magnetic ink, and optical character recognition.
`
`
`VISIONARY STEVE 1035
`office. In addition, the studio has won
`In 1975 Stevelobs, a 21ryearrold college
`Apple introduced the Mac with great
`fanfare in its famous television commer-
`dropout who worked briefly as a com-
`Academy Awards for its animation.
`puter game designer, cofounded a com—
`In the late 19905, Apple’s manage—
`puter company with his friend Stephen
`ment broughtlobs back to the company,
`where he helped turn it around by intro-
`Wozniak. The new company was based
`in Jobs’s parents’ garage. While Wozniak
`ducing stylish computers, such as the
`handled much of the research and devel-
`iMac and iBook.
`
`cial that ran during the 1984 Super Bowl.
`The Mac’s computer mouse and graphi-
`cal interface made it far easier to use
`
`
`
`Steve Jobs co—founded Apple Computer
`and Pixar Animation Studios.
`
`Two Tap
`Exhibit 1007
`Page 009
`
`opment, Jobs found a market for the
`company’s first computer. The company
`was Apple Computer Corporation, and
`its first computer was the Apple I.
`Jobs’s major contributions to personal
`computing came after he visited Xerox’s
`Palo Alto Research Center (PARC) in the
`early 19805. PARC had developed a new
`way for users to interact with computers
`via a computer mouse and icons on the
`screen. However, it was Jobs who brought
`this new technology to a mass market.
`Jobs led a group at Apple that devel-
`oped the Macintosh (Mac) computer.
`
`than its major competitor, the IBM per—
`sonal computer.
`Shortly after the Mac launch, Apple’s
`board of directors forced Steve Jobs out
`of the company. He went on to found
`NextStep Corporation. Although
`NextStep’s computers proved too expen-
`sive for their market, the company did
`introduce a revolutionary operating sys-
`tem and its computers did contain many
`advanced components.
`During this time, Jobs cofounded
`Pixar Animation Studios. Pixar’s ani-
`
`mated feature films, which include Toy
`Story, Toy Story 2, and Monsters Inc,
`have been hugely successful at the box
`
`
`
`CHAPTER 2 O COMPUTER HARDWARE TECHNOLOGIES
`
`35
`
`Application
`Input Device
`Easy to learn for new typists,
`Dvorak keyboard
`increases productivity,
`
`and is designed with more
`common Word. pat-items
`
`_r,i 5“
`i
`
`
`Figure 2.2
`
`Input Devices
`The figure shows common
`input devices and their
`applications.
`
`Split keyboard
`
`Trackball
`
`Stylus
`
`
`
`Good alternative for people
`who get fatigue and pain
`from a standard keyboard
`
`digitize sketches
`
`Good for gaming
`and young children
`
`Used primarily by artists
`and draftspeople to
`
`Bar code reader
`
`Ch“
`K 9
`
`Scans bar codes
`
`Scanner
`
`MICR- Magnetic ink
`character
`recognition
`
`
`
`m...
`m
`sea
`“E1
`m M"
`
`
`
`
`
`Used for optical
`character recognition
`
`Used in banks for scanning
`the bank account numbers
`on the bottom of checks
`
`The Keyboard
`
`The keyboard is the most widely used input device. A keyboard provides an easy way to enter
`text, numbers, and even simple commands, such as delete. The layout of a computer keyboard
`follows the layout of the typewriter. In the early days of computers, many developers thought
`that keeping the same layout would make the transition from typewriter to computer easier.
`However, the QWERTY layout (named after the letters on the left of the top row of the key-
`board) was designed specifically to slow down typing. Early typewriters had moving parts that
`jammed when a person typed too fast. So typewriter makers created a keyboard whose ineffi-
`ciencies would slow the typist down. And this is the awkward setup that today’s computer key-
`board users have inherited. At the time, the other major selling point of the QWERTY layout was
`that all of the letters in “typewriter” are in the top row, making it easier for typewriter salespeo-
`ple to type the word.
`
`Repetitive Stress Injuries and Ergonomics
`
`The inefficient design of the keyboard has led to repetitive stress injuries (RSIs), such as carpal
`tunnel syndrome (CTS). Making the same hand motions continuously for hours each workday
`narrows the carpal tunnel in the wrist and constricts the median nerve that runs through it. CTS
`symptoms include wrist pain, numbness in the hands, hand weakness, and a loss of feeling in
`some fingers. If you suffer from some or all of these symptoms on a regular basis, seek medical
`advice.
`
`The US. Occupational Health and Safety Administration (OSHA) estimates that about 100
`million people in the United States suffer from RSIs (not all of these are caused by using com-
`puters). The Bureau of Labor Statistics estimates that RSls cost US. companies over $20 billion
`per year in lost productivity and medical expenses.
`Ergonomics is the study of how human beings interact with their work environment.
`Researchers studying ergonomics have learned what causes RS Is and other problems associated
`
`Two Tap
`Exhibit 1007
`Page 010
`
`
`
`36
`
`PARTI
`
`O UNDERSTANDINGINFORIVIATION SYSTEMSTECHNOLOGY
`
` r"
`v‘N.
`
`
`
`BEAD BAR {It
`gyro—if.-
`
`
`CONSULTANT Task 2.A
`
`
`
`
`Stan ”Split keyboards sound like they might ease
`Jim’s concerns. Visit Microsoft’s keyboard Web
`site at wwmmr‘crosoft.com/hardware/keyboard/
`
`
`howtobuyasp. Compare the benefits and cost of
`a standard keyboard, such as Microsoft’s Office
`
`
`Keyboard, to those of a split keyboard, such as
`
`
`Microsoft’s Natural Keyboard. Which keyboard
`
`
`would you recommend for the Bead Bar’s com-
`
`
`puters? Why?” (Wait to make your final recent-
`
`
`mendations until after determining all ofthe
`
`
`computer types to buy.)
`
`Qi-o-Q-o-t;
`
`with computer use, such as eye- and backstrain. For example, since
`there is no reason for a QWERTY keyboard on a computer, design-
`ers have experimented with alternative layouts, such as the Dvorak
`keyboard. Some keyboards solve the problem by using the
`QWERTY layout, but splitting the keyboard, so that the typist’s
`hands are in a more natural, comfortable position. A Dvorak and
`split keyboard are shown in Figure 2.2. These keyboards put less
`strain on the muscles around the carpal tunnel and help prevent CTS.
`The checklist feature and Figure 2.3 offer some ergonomic tips.
`
`The Mouse
`
`When we talk about the computer mouse, we are really talking
`about a number of input devices that fall under the general name of
`pointing device. In 1965 Douglas Englehart invented the computer
`mouse that we know today. The mouse is a device that controls the
`computer’s cursor by moving along a flat surface. It has one or
`more buttons that allow the user to manipulate items on the screen. A trackball is a mouse with a
`ball on top. Instead of moving the entire device, the user moves the ball to manipulate the pointer
`on the screen. The main advantage of a trackball is that it takes up less space than a mouse.
`There are other types of pointing devices that serve special purposes. A joystick and game pad
`are used primarily when playing computer games. A stylus looks like a pen and is the pointing
`device used on handheld computers.
`The problem that is common to all of the input devices discussed so far is that they rely on
`human input, and humans make errors. For industries and applications where perfect input is
`important, control of the input function has moved from human operators to machines.
`
`Bar Code Scanners
`
`The most conunon machine input device is the bar code scanner. The bar code scanner uses light
`to read bar codes, which are those series of stripes that you see on product labels. The width of the
`stripes and the distance between them signals various numbers and letters to a computer. Bar codes
`appear on almost every item sold in the United States as the product’s Universal Product Code
`(UPC). For more infoimation on the use of the UPC visit wwwadamsl.comi’pubtrussadamr'
`upccodehtml. The use of bar codes and bar code scanners has greatly helped the retail and grocery
`industries. They allow for faster, more precise checkout, accurate inventory tracking, and they
`allow businesses to quickly change prices if conditions in the economy demand.
`While bar codes have made their mark on the retail industry, they are also improving the
`logistics (shippingttrucking/warehousing) industry. Companies such as FedEx and UPS use bar
`
`
`
`a CH ECKLIST
`Ergonomic Tips
`
`You can reduce or avoid RSls and back-, neck—, and eyestrain by
`considering posture, lighting, and how you work.
`
`Posture
`
`Lighting
`
`6. Position the monitor to avoid glare.
`
`1. Feet should be flat on the floor or on a footrest.
`
`Working
`
`2. Areas should be at a 100 to 110 degree angle to the key-
`board. Shoulders should be relaxed.
`
`3. Wrists should be straight. Use a wrist rest if possible.
`
`4. The back needs a chair that provides good support.
`
`5. Eyes should look down slightly at the monitor.
`
`7. Take a 1 to '2 minute break every 15 to 20 minutes.
`
`3. Look up occasionally and focus on distant objects.
`
`Adapted from ergonomics.ucla.edu/Ergowebv2.0/articlesl
`offi.ce_fronl_page .htm
`
`Two Tap
`Exhibit 1007
`Page 01 1
`
`
`
`CHAPTERZ O COMPUTER HARDWARETECHNOLOGIES
`
`37
`
`
`
`29l|”30l|
`
`
`
`
`Figure 2.3
`
`Ergonomic Sitting
`The ideal position to sit in
`when typing at your com—
`puter is with your feet flat
`on the floor, back straight,
`wrists below your elbows,
`and your monitor below
`eye level. This position
`reduces the amount of
`
`stress placed on your spine
`and wrists and helps
`reduce eyestrain.
`Source: W.ergo.hunmn.
`comell. edu/AHTutorials/
`typingposmmhrml
`
`codes to track packages that are in their system, Every time a package goes through a main artery
`in the system, its bar code is scanned.
`Consider a package you want to ship from New York City to Los Angeles. Figure 2.4 shows
`the steps in the shipping process. When the delivery person comes to pick up the package, she
`scans the bar code on the shipping label that she puts on it. The package’s bar code is scanned
`again when it reaches the New York City sorting facility and again when the loader puts it on the
`plane at Kennedy Airport. When the plane lands in Los Angeles, an employee at the receiving
`facility scans the package when it’s loaded onto a shipping truck. This frequent scanning allows
`the company to determine exactly where the package is while in transit Both FedEx and UPS
`make tracking information available to their customers
`Before this technology, senders had little way to know whether their packages would arrive on
`time. or at all. The technology has reduced both shipping errors and lost packages It also reduces
`costs by allowing customers to track their own shipments on the company’s Web site.
`
`It
`
`Delivery person
`scans package
`
`6 flPackage scanned
`NYC at NYC shipping
`facility
`l
`Package scanned
`”( at loading dock@ at airport
`
`"\ Package scanned
`
`and received at LA.
`shipping facility
`
`
`Figure 2.4
`
`Tracking a Package With
`Bar Codes
`A package’s journey from
`New York City to Los
`Angeles is chronicled
`through the use of bar
`codes and bar code scan-
`
`ners so the shipping corn—
`pany and customer know
`its status at all times.
`
`Two Tap
`Exhibit 1007
`Page 012
`
`
`
`33
`
`PARTI
`
`O UNDERSTANDINGINFORMATION SYSTEMSTECHNOLOGY
`
`BEAD BAR flea—©0431
`CONSULTANT Task 2.3
`
`
`
`
`
`Rachel (VP of Operations and Purchasing) "is
`
`there some way we can use bar codes to track
`
`
`inventory as it comes into the warehouse and
`
`
`back out to our studios and customers?”
`Stan ”Visit wwwbarcadediscountersxom to
`
`
`determine how much bar code readers cost.
`
`
`Employees will use these devices in the ware-
`
`
`house, so look at the portable readers. How do
`
`
`they differ from basic readers in terms of func-
`
`
`tionality and price?”
`
`Q-o-Q-o-Ci
`
`In addition to retail and logistics, bar codes have become useful
`to industries in which accuracy is important. Take the University
`of Chicago Hospitals, for example. They wanted to ensure the pos-
`itive identification and accurate tracking of patient blood samples.
`In the old system, the phlebotomist (the person who draws the
`blood) manually recorded information on paper, and could intro-
`duce errors. So they implemented a system in which the phle-
`botomist scans the bar code on the patient’s wristband and then
`prints that same bar code and puts it on the label of the patient‘s
`blood specimen. This procedure has reduced phlebotomists’
`paperwork and the hospitals’ malpractice risk. [1]
`
`Optical Character Recognition (OCR)
`
`Optical character recognition (OCR), another machine-readable
`input device, is specialized software that works with a scanner to
`take text from a physical source, such as paper or packaging, and allows a computer to create an
`electronic file of that text. The process begins by scanning the text page. A scanner is a device
`that reads paper-based documents, such as text or images, and converts them into digital form. It
`works on the same principles as a photocopier. However, instead of making a paper copy, the
`scanner produces a digital image of the page. The OCR software then processes the digital
`image. The software is prograimned to recognize patterns, in this case text characters. The soft-
`ware lhen converts the image to a character the computer can understand and the user can manip-
`ulate. The end result is a computer file, such as a word processing document, the user can edit.
`Companies can use OCR as a component of a document management. system. Chase Manhattan
`Mortgage did so. The company is one of the largest mongage loan originators in the United States.
`With so much paperwork, data entry errors were common. So, Chase implemented a document
`management system based on scanning and OCR. The company now uses high-speed scanners to
`process over 2.5 million documents per month as compared to 750,000 per month previously. In
`addition, the new system reduced the cost of processing a page of text from 10¢ to 4c. [2]
`
`Magnetic Ink Character Recognition (MICR)
`
`Think about a large bank, such as Wachovia Corporation, which processes about 100 million
`checks per month. [3] In processing these checks, the bank must be both accurate and quick. So,
`the banking industry has developed its own character recognition technology based on magnetic
`ink, called magnetic ink character recognition (MICR). Special MICR machines read each
`check’s routing number (the line of numbers at the bottom of the check), which is printed in
`magnetic ink. In addition, when a customer deposits a check from another bank, the customer’s
`bank types the amount on the check using magnetic ink. This procedure allows banks to quickly
`and accurately process hundreds of millions of checks every month.
`
`
`
`2.3 OUTPUT