2nd Edition

A project-based approach

David Grover Heather Knights Eamon Gormley

SSydney,ydney, MMelbourne,elbourne, BBrisbane,risbane, PPerth,erth, AAdelaidedelaide aandnd aassociatedssociated ccompaniesompanies aaroundround tthehe wworldorld Pearson Australia (a division of Pearson Australia Group Pty Ltd) 20 Thackray Road, Port Melbourne, Victoria 3207 PO Box 460, Port Melbourne, Victoria 3207 www.pearson.com.au

Sydney, Melbourne, Brisbane, Perth, Adelaide and associated companies around the world

Copyright © Pearson Australia 2011 (a division of Pearson Australia Group Pty Ltd) First published 2011 by Pearson Australia 2014 2013 2012 2011 10 9 8 7 6 5 4 3 2 1

Reproduction and communication for educational purposes The Australian Copyright Act 1968 (the Act) allows a maximum of one chapter or 10% of the pages of this work, whichever is the greater, to be reproduced and/or communicated by any educational institution for its educational purposes provided that that educational institution (or the body that administers it) has given a remuneration notice to Copyright Agency Limited (CAL) under the Act. For details of the CAL licence for educational institutions contact Copyright Agency Limited (www.copyright.com.au).

Reproduction and communication for other purposes Except as permitted under the Act (for example any fair dealing for the purposes of study, research, criticism or review), no part of this book may be reproduced, stored in a retrieval system, communicated or transmitted in any form or by any means without prior written permission. All enquiries should be made to the publisher at the address above.

This book is not to be treated as a blackline master; that is, any photocopying beyond fair dealing requires prior written permission.

Publisher: Penelope Naidoo Project Editor: Shivani Singh Editor: Brigid James Designer: Patrick Cannon Copyright & Pictures Editor: Julia Weaver Cover art: Glen McClay Illustrator: Wendy Gorton Printed in China by **

National Library of Australia Cataloguing-in-Publication entry Author: Grover, David. Title: Information and software technology / David Grover. Edition: 2nd ed. ISBN: 9781442539129 (pbk.) Notes: Includes index. Target Audience: For secondary school age. Subjects: Information technology--Study and teaching (Secondary) Dewey Number: 004

Pearson Australia Group Pty Ltd ABN 40 004 245 943

Disclaimer The selection of internet addresses (URLs) provided for this book was valid at the time of publication and was chosen as being appropriate for use as a secondary education research tool. However, due to the dynamic nature of the internet, some addresses may have changed, may have ceased to exist since publication, or may inadvertently link to sites with content that could be considered offensive or inappropriate. While the authors and publisher regret any inconvenience this may cause readers, no responsibility for any such changes or unforeseeable errors can be accepted by either the authors or the publisher.

Some of the images used in Information and Software Technology 2nd Edition might have associations with deceased Indigenous Australians. Please be aware that these images might cause sadness or distress in Aboriginal or Torres Strait Islander communities. Contents

About the book ...... viii How to use this book ...... x

Core

1 PROJECTS: DESIGN, PRODUCE, EVALUATE ...... 2 1.1 Defi ning and analysing the problem ...... 4 1.2 Designing possible solutions ...... 6 1.3 Producing and evaluating solutions ...... 8 1.4 Project management ...... 10

2 HARDWARE ...... 14 2.1 Hardware functions ...... 16 2.2 Hardware components ...... 18 2.3 Classifi cation of systems ...... 22 2.4 Hardware solutions ...... 24

3 SOFTWARE ...... 26 3.1 Software systems ...... 28 3.2 Types of application software ...... 30 3.3 Features of application software ...... 32 3.4 Interface design ...... 34 3.5 Features of a graphical user interface ...... 36 3.6 Operating system software ...... 38 3.7 Hardware requirements ...... 40

4 DATA HANDLING ...... 42 4.1 Data and information...... 44 4.2 Data forms ...... 46 4.3 Data types ...... 48 4.4 Data storage ...... 50 4.5 File types and data compression ...... 52 4.6 Data transmission and security ...... 54

iii 5 PAST, CURRENT AND EMERGING TECHNOLOGIES ...... 56 5.1 Past information and software technologies ...... 58 5.2 Current and emerging technologies ...... 60 5.3 Exploring current and emerging technologies for each option . . . . . 64 5.4 The impact of technology on the environment ...... 70

6 PEOPLE ...... 72 6.1 Roles and responsibilities ...... 74 6.2 Careers in information and software technology ...... 76

7 ISSUES ...... 78 7.1 Legal issues ...... 80 7.2 Ethical issues ...... 82 7.3 Social issues ...... 84

Options

8 , SIMULATION AND MODELLING . . . . 86 8.1 Artifi cial intelligence ...... 88 8.2 Areas of artifi cial intelligence ...... 90 8.3 Requirements of artifi cial intelligence ...... 96 8.4 Modelling and simulations ...... 98 8.5 Requirements of models and simulations ...... 100 8.6 Advantages and limitations ...... 102 8.7 Using modelling and simulation programs ...... 104 8.8 Project development and additional content ...... 108 iv Contents 9 AUTHORING AND MULTIMEDIA ...... 112 9.1 A digital revolution ...... 114 9.2 Types of multimedia products ...... 116 9.3 Multimedia data types ...... 122 9.4 Multimedia hardware ...... 128 9.5 Authoring software systems ...... 130 9.6 Developing a multimedia product ...... 136 9.7 Project development and additional content ...... 142

10 DATABASE DESIGN ...... 144 10.1 Database development ...... 146 10.2 Collecting, organising and storing data ...... 152 10.3 Processing and analysing data ...... 158 10.4 Presenting information ...... 164 10.5 Integration ...... 166 10.6 Project development and additional content ...... 168

11 DIGITAL MEDIA ...... 172 11.1 The purpose of digital media ...... 174 11.2 Types of digital media products ...... 178 11.3 Data types for digital media products ...... 188 11.4 Digitisation of data types ...... 194 11.5 Digital manipulation techniques ...... 200 11.6 Display and distribution ...... 208 11.7 Project development and additional content ...... 210

12 THE INTERNET AND WEBSITE DEVELOPMENT ...... 212 12.1 The internet ...... 214 12.2 A historical perspective on the internet ...... 216 12.3 Features and uses of the internet ...... 220 12.4 Accessing information using search engines ...... 228 12.5 Internet software ...... 232 12.6 Types of internet protocols ...... 236 12.7 The World Wide Web ...... 238 12.8 Control of access to information ...... 240 12.9 Website development ...... 244 12.10 Project development and additional content ...... 246

Contents v 13 NETWORKING SYSTEMS ...... 250 13.1 Communications networks ...... 252 13.2 Network protocols ...... 256 13.3 Data transmission modes ...... 258 13.4 Data transmission rates ...... 260 13.5 Data transmission media ...... 262 13.6 Types of networks ...... 264 13.7 Components of networks ...... 266 13.8 Security of information ...... 270 13.9 Network topology ...... 272 13.10 Network operating systems ...... 274 13.11 Choosing transmission media ...... 276 13.12 Project development and additional content ...... 278

14 AND AUTOMATED SYSTEMS ...... 280 14.1 Robotics ...... 282 14.2 Types of robots ...... 284 14.3 The purpose of robots ...... 288 14.4 The use of robots ...... 290 14.5 The function of robots ...... 294 14.6 Automated control ...... 298 14.7 Sensing devices ...... 302 14.8 Actuators and controlling devices ...... 306 14.9 Project development and additional content ...... 308

vi Contents 15 SOFTWARE DEVELOPMENT AND PROGRAMMING ...... 310 15.1 Basic programming concepts ...... 312 15.2 Data types ...... 318 15.3 Operators and assignment statements ...... 320 15.4 Functions ...... 322 15.5 Algorithms ...... 324 15.6 Program control structures ...... 328 15.7 Desk checking and subprograms ...... 336 15.8 GUI layout ...... 340 15.9 Programming languages ...... 342 15.10 Data structures ...... 344 15.11 Testing program code and detecting and correcting errors ...... 346 15.12 Correcting errors and program documentation ...... 348 15.13 Project development and additional content ...... 350

ACKNOWLEDGEMENTS ...... 354

INDEXES ...... 356

Contents vii Information and Software Technology: A project-based approach 2nd Edition

This new edition is completely redesigned in double page spreads and all the content has been updated.

Student book The text provides a clear project development focus in line with the spirit of the syllabus. It presents a precise coverage of the Core topics, which provide a ready reference as the Options are studied.

Key features • Clear design makes the book easy to navigate. 2nd Edition • Content is presented in double page spreads for ease of use. A project-based • Graded student activities appear at the end of approach each spread. • New content refl ects current computing technology advances. • New case studies present students with challenging material. • Each chapter opens with a list of syllabus outcomes and key terms. • ‘In Action’ sections present real-life applications of the theory.

David Grover Heather Knights Eamon Gormley • Infobits provide snippets of interesting information. • Engaging, hands-on group and individual tasks and projects are balanced with theory. Pearson Reader Don’t miss out on your Pearson Reader Starter Pack. Pearson Reader is an interactive, online version of your When you choose Information & Software Technology: student book with access to a range of online video, audio, A project-based approach 2nd Edition, you will get a Pearson interactive lessons, worksheets, case studies, weblinks and Reader Starter pack giving you full access to the teacher more that save teachers time and present content in the way and student interactive resources, as well as an interactive students like to learn. online chapter. If you like what you see, you can add on more chapters The Information and Software Technology Pearson or upgrade to the full course content. Visit the Pearson Reader includes: Reader home page at www.pearsonplaces.com.au/ pearsonreader. The Student version • Online version of the student book • Drag and drop technology interactives Training and Development • Activities using software or specially developed fi les Did you know that Pearson also off er teachers a diverse • Animations range of training and development programs? • Video clips Find out more at Pearson Professional Learning Place at The Teacher version www.pearsonplaces.com.au/professionallearning. • Everything contained in the Student version • Connection with other users through the ‘Add links’ functionality which allows teachers to share web links with their class, other teachers in the school, and teachers throughout Australia • Programming suggestions • A Core matrix showing the links between the Option chapters and Core content • Approaches to developing projects • Worksheets • Chapter tests • Answers to all worksheets and tests

We believe in learning. All kinds of learning for all kinds of people, delivered in a personal style. Because wherever learning fl ourishes, so do people. How to use this book There are 15 chapters in this book, each with the following features. Information and Software Technology: A project- based approach 2nd Edition addresses the Chapter opening pages outline the syllabus requirements of the New South Wales 7–10 Information outcomes and the key terms used in the chapter. and Software Technology syllabus. The chapter begins with an In Action section which presents a real-life application of the chapter content. The book is divided into two colour-coded sections, corresponding to the Core content and the Options. 237,21 The course should integrate the study of Core content  ,1$&7,21 Creating a 3-D world in Avatar James Cameron’s Avatar sparked new ways of thinking within the context of the Options delivered through about making movies. Artists used new digital tools to carry out the performance capture, animation and photorealistic rendering needed to create Avatar. Designing: Building James Cameron’s new world required projects. a visual tool. The art department and production designers 'LJLWDO used Photoshop to produce artwork to convince studio heads the project was possible. After Effects was used to place flowing camera moves and dissolves on the still artwork. PHGLD Artists used Photoshop for storyboarding and to create &25( very high resolution matte paintings and textures used for the 3-D computer graphics (CG) environments, vehicles and creatures. Thousands of digital images were taken as CHAPTER OUTCOMES KEY TERMSRMS lighting and texture references, and these were catalogued in databases.  Musical instrument digital a You will learn about: Analogue data A huge stage was created in where motion data with signalgnal size that interface (MIDI) digital media captured actors performed live while watching their Figure 11.2 • the purpose of can vary continuouslytinuously audio format made up of Avatar broke many box office records and won three products matchingdigital CGdescriptionsdescripti creaturesons of onscreen the in a virtual world. Academy awards. • types of digital media Animation 3URMHFWV Producing:instrument, Companies and duration, around the world created the • data types for digital media rapid displayy of a seriesseeries of movie’spitch visual and timing effects of shots each which were 75 per cent of the Even simple 2-D shots become extremely complicated in for digital data images, eachh one slslightlyightly • manipulation techniques movie.note After Effects was used to create 3-D stereo scenes stereo 3-D. When subtitling the stereo 3-D versions of the different fromm the oone • digitisation of data types for finished shots, motion graphics for the 3-D holographic film, the subtitles must sit at the bottom of the screen in 3-D before it, to create an Morphing screens seen in the control room and heads-up displays space to avoid interfering with the 3-D content. GHVLJQSURGXFH • file formats illusion of movementmovemenent transformationtransformation of one for theimage vehicles into ain second the film. In one scene, Jake Sully and an Adobe® Acrobat® • factors affecting file sizes Audio Connect™ teleconferencing software, officerdifferent switch imageto a three-dimensional hologram of the ‘Home was used for collaboration during production, allowing distribution of digital data digital data on a computercoomputer • display and Tree’, where the Na’vi people live (see Figure 11.2). Using artists to control someone else’s desktop through an representingg soundsounds,ds, Optical charactercharacter • development of digital media products a green screen across the top of a table, one company ordinary browser. including voice,ice, mumusic,usic, recognitionrecognition (OCR) HYDOXDWH issues involved in digital media modelled the imagined hardware inside the table and • people and software process involving Rendering: sound effectsts and added projected graphics of the terrain. These graphics Today’s audiences expect that visual special ethical and legal issues use of a scanner to convert effects will be loaded with detail. Weta’s character Gollum • social, background noiseses were designed in 2-D in Adobe a scanned graphic into ® Illustrator®, animated in for Lord of the Rings • current applications of digital media. CODEC After Effects and rendered in Autodesk was the most complex CG for that time, ASCII characterscharacters ® 3ds Max® but Avatar KEY TERMS algorithm too compcompresspress also designed the screens for aircraft in Illustrator, and. They has set another benchmark. These effects require You will learn to: large amounts of processing power and must be completed CHAPTER OUTCOMES and decompresspress a data animatedRendering them in After Effects. The artist concentrated on Evaluation digital media of lighting and before the next scene commences. Producing a movie in Analyse and • define file, usually audioo or video; animatingcreation for one eye and then 3-D images were generated You will learn about: comparison of the solution to a 3D stereoscopic 3-D makes files even larger. identify components and the • assess a range of digital media products compressionn mayy be either automatically,addition ofanimating textures theto aother 3D eye and creating the and analysing a problem between them original expectations sless image Servers and render farms for • defining relationship • recognise and select different digital media lossy or lossless correct depth. Avatar ran up to 24 hours IPO table a day as the deadline neared. These servers contained • designing possible solutions Collab oration data types Colour palettette Text input, output and processing of in a group to colours availableilable for data involving strings 40 000 processors and 104 terabytes of RAM and were • producing solutions working together a solution • describe the purpose of a digital media data needed for an imageimaage of printable characterscharacters cooled using water. Tens of thousands of dollars are saved share ideas and expertise product displaying • evaluation Project management separated by white space by changing temperature by just one degree. Communication Computer-generatedgeneneeereraraatted image • project management overseeing of a project to ensure it • explain and perform digitisation of a selected characterscharacters sharing of information with people (CGI) to time and on budget data type using appropriate hardware • communication techniques is done used to createate ththree-hree- Video Concept map file formats work. Prototype • select and use appropriate dimensionalal creacreaturesatures as separate frames of ? • collaboration and group graphic which shows how ideas Questions simple version of how the final • discuss and manipulate factors that affect characters inn moviesmovovies sequential bitmapped are related look graphics shown rapidly 1 List the software project might file size Digital mediaia named in the article. Tick each Criteria to create the illusion of application that you You will learn to: Resources • examine the display and distribution of T forms in whichch digital have used in your course. on elements that must be included movement • identify factors which impact time, finances and people needed digital media products data can existxist susuch as text, 2 What reasons are given in a project and the standards by for the large amount of work solutions a solution for audio, graphics,phics,s, animation Warping put into creating still it will be evaluated for • select and deliver digital media products images of the world of Avatar which manipulation of an image during • generate ideas using a range of Storyboard a targeted audience and video planning? Design, produce, evaluate methods simple sketches of screen design 3 Avatar was not the the three stages of successful first stereoscopic 3-D feature and navigation movie. Why do you • model possible solutions project work think Avatar was so successful, 172 Figure 11.1 The three-dimensional hologram of the ‘Home Tree’. breaking all box office records? • apply set criteria to choose an appropriate solution • establish evaluation criteria • communicate ideas and solutions 173 • collaborate in a group situation.

Case studies highlight relevant, real-life examples 2  237,21 of the theory. 5RERWLFVDQG

Sword of Damocles—suggesting an ever-present peril faced by those in positions of power! DXWRPDWHG It is hard to imagine the journey from those first The birth ofComputer–generated computer imagery is found onn televisiontelevisi innovations to the present. Most people you know and at the movies, and in newspapers, textext books and probably own their own computer, which is nearly advertising. Business professionals use imagesmagages forfo a million times more powerful and can be used to V\VWHPV graphics manipulate high-end graphics and moving images. Computer graphics now include 2D and 3DD imagery,imimage Computer–generatedboth imagerystill and animated. is Primaryfound and on high teschoolschhool ? students use graphics packages quite intuitivelytiveely whilew Questions CHAPTER OUTCOMES and at the movies, and in newspapers, text KEY TERMS enjoying commercial productions such as AvatarAvaatar and 1 Identify the ways in which you interact with Rango. computer generated images. You will learn about: advertising. Business professionals use ima Actuators But where did it all start? 2 How do the hardware components on the PDP-1 • the history Magnetic gripper of robots and robotics output devices, such as motors presentation and analysis of information. compare to today’s desktop PC? type of end effector used to pick In 1961, Ivan Sutherland created a computeruterer drawdrawing • different types of robots and end effectors, that convert up metallic objects program called Sketchpad that could be uusedseded to ddraw 3 Research other milestones in the history of • the energy and signals to motion purpose, use and function of Motion sensor Computer graphicssimple now shapes include on the computer 2D andscreen usiusing3Dng a liglight computer generated graphics. robots Automated control system automated control pen. The images could be saved and recalrecalledalled for group component • automated of elements that maintains both still and animated.further editing. Primary and high s control systems that detects sudden changes of a desired result by manipulating • input, output movement and processing the value of another students use graphicsThese packagesearly images used quite vector graphicsg raphicintuitiphics which arear devices variable in associated with automated the system Optical sensor composed of thin lines. They werewere quitequ light on control systems. automated control enjoying commercialmemory productions but they could not t suchcreateate realisticrealist asic A colourcolour tones Controller component that detects changes easily. Modern day graphicsphics are raster basedbased and use You will learn to: processes in light or in information from colour Rango. pixels to build up ann imageimage so thatthat • define and describe sensors and transmits appropriate robots, Robot high resolutionon softwareware can presentpresent robotics and automated commands to actuators in control automatically continuousntinuous gradigradientsadients of colour. systems automated systems guided machine But where did it all start? that is able to perform tasks on Also in 1961, SteveSteve RussellRussell createdcreated • examine and discuss Cyborgs the purpose its own the first video game, game Spacewar. Spacewar It It of robots and hardware humans who use mechanical devices or Robotics ran on the PDP-1, a minicomputer associated with robots electromechanical technology to science with nine kilobytes of main memory give them abilities of the use and study of • examine and discuss hardware they would not and a CPU speed of 200 KHz. This otherwise robots devices associated possess with automated Sensor was an instant success and has control systems Degrees of freedom been developed across the decades measure input device that accepts data • investigate robotic of robotic motion—one providing ongoing entertainment in and automated degree from the environment control systems. of freedom is equal to one video arcades. movement either back and Solenoid forth In 1966, Ivan Sutherland invented (linear movement) or around type of actuator that produces in a the first computer-controlled, head- circle (rotational) movement using a magnetic mounted display. It displayed two End current effector separate wireframe images, one Temperature mechanical device attached to the sensor for each eye. This allowed the automated end of a robotic arm that carries control component viewer to see the computer scene in Figure 3.25 The Spacewar game was the predecessor of many of today’s video games. that out a particular task measures temperature stereoscopic 3D. It was called the Unfortunately it could only be played on a mainframe computer!

1 What system hardware is installed in your computer— 4 Open a graphics package such as Photoshop. Look processor and RAM? under the help menu for system information. It should 280 2 Why does graphics software require more processing indicate here how much RAM it is using. power than other software? 3 Look on the Microsoft website to find the systems requirements for the latest version of the Office suite applications. Do all the programs contained in this package require the same hardware standards?

Chapter 3 Software 41

x Information and Software Technology Infobits People sections focus on profi ling people Traffic lights ,1)2%,7 Traffic lights use a range of sensors to control traffic Some early versions of traffic control inductance loops provide were not sensitive enough to pick up the presence of working with technology. and help keep people safe on the roads. Commonly, small vehicles such as motorcycles. Consequently it was traffic light systems use an inductance loop placed in not uncommon for a motorcyclist to be stranded until a the road. As a car goes over the loop, a small current car came along! snippets of is induced. This is fed to the processor controlling the system. The system then recognises that a car is present. Some traffic lights do not use sensors. At busy intersections, for example, traffic lights may simply Satellites orbiting interesting operate on timers in order to ensure that traffic moves the earth as smoothly and safely as possible. engineer information Navigation systems in cars engineerImahara Satellite navigation systems (sat navs) provide drivers Grant Imahara is an wiwithth ddirectionsirections as wellwell as traffictraffic andand estimatedestimated timetime of GPS receiver animatronics engineer arrival iinformation.nformatioformation. Sat navsnavs use ggloballobal positioninpositioningg to Grant Imahara to stimulatemulate in car who has worked on such helphelp drivers deterdeterminemineine wherwwheree thetheyy are at ananyy moment movies as The Lost World: in time.time. Earth Grant Imahara is an , : animatronics engineer Episode 1—The Phantom curiosity.ity. ,1)2%,7,1)2%,7 Menace, Terminator 3: MostMost late-model cars contain an astonishingastonishing array ofof Figure 14.41 Global positioning systems rely on a process who has worked on such Rise of the Machines and ssensorsensors to allowallow engines andand electronicelectronic systemsems to run at of triangulation whereby the location of a transmitter can be movies as The Lost World: Reloaded. ppeakeak efficiency.efficiency. determined by measuring either the distance or the direction of the received signal from three or more different points. Grant was one of Jurassic Park, Star Wars: those kids who would ,1)2%,7 Episode 1—The Phantom disassemble remote controls and take all Menace, Terminator 3: the wheels off toy cars. Some early versions of traffic control in Unlocking the GPS functionality of mobile phones opens up His life changed at the a whole new world of convenience but has also increased Rise of the Machines and age of four when he Figure 14.15 Grant Imaharaa is ana (LBS) are software applicationsapplications concerns around privacy and raised questions about the were not sensitive enough to pick up th . received his first LEGO animatronics and robotics expertexpeert Figure 14.16 In Star Wars Episode I: The Phantom Menace, Star wwhichhich provide users ooff mobile devices—particularly GPSGPS measures location-based service providers are implementing who is best known for his workrk set. It introduced him to Wars Episode II: Attack of the Clones, and Star Wars Episode III: eenablednabled smart pphones—withhones—with personalisedpersonalised services basedbased to protect users’ information. Not surprisingly, concerns on the American televisionion showshohow small vehicles such as motorcycles. Con Grant was one of robots and provided a Revenge of the Sith, R2-D2’s movements were controlled by Grant oonn their current location. There are applications (apps) forfor have been raised about the threats to privacy posed by LBS MythBusters. Imahara. eexample,xample, which notinotifyfy friendsfriends ofof your location in real time oro technology. those kids who would foundation for his interest not uncommon for a motorcyclist to be in engineering. After allow useruserss to locatelocate the nearestnearest automaticautomatic teller machine. Locational privacy refers to the ability of an individual to move ? disassemble remote graduating from college, he was asked to work for Lucasfilms OOtherther services allow businesses to direct advertisingadvertising at in public space with the expectation that their location will not where he worked in the special effects modeldel shshop. Questions car came along! ppeople—transmittingeople—transmitting digitaldigital coupons, for example, based ono be systematically and secretly recorded for later use. Location- controls and take all uusers’sers’ proximitproximityy to particular shops.shops. based services have the potential to strip away locational He made spaceships and miniatureure citieses aas well as rrobots.obots. He 1 Identify the event that changed Grant Imahara’s life. privacy, making it possible for individuals and organisations to the wheels off toy cars. was part of the R2-D2 developmentevelopmeent teamte fforor epepisodesisodes one, 2 Research and provide a job description of an harvest data on the movements of LBS subscribers. His life changed at the two and three of Star Wars. Then tthehe MMythBustersythBusters opportunitopportunityy animatronics engineer. Users must provide their consent before a service provider can cameFigure along anand 14d now 15 heGrant ggets ppaidaid Imahara to blblowow ththingsings is anupup.. GGrantrant 3 Research and explain the relationship between determine positioning data from their mobile phone. However, hhasas alalsoso wwrittenritten a book on building rrobotsobots cacalledlled KicKickin’kin’ BBotot animatronics and robotics. once consent is given, information may be quietly collected by andd hihis combatbt robot,bt DDeadblow, dbl was ftfeatured d on BBattleBots. ttl B t organisations—particularly advertisers—who may assemble profiles on users without their knowledge. Privacy activists say consumers may be surprised to learn companies monitor LBS users’ activity and profit from their data. ? Questions 1 Identify two advantages of location-based services. Identify Investigate 2 Provide a definition for the term ‘data harvesting’. 1 Outline the reasons why robots are used in 6 Apart from the Titanic discovery, describe another Figure 14.40 14 40 Tdi Trends in socialil media didth and the prevalencel off manufacturing. situation where underwater robots were used for smart phones with inbuilt satellite positioning have encouraged an 3 Outline the privacy concerns associated with dangerous tasks. increasing number of people to broadcast their whereabouts via location-based services. 2 List four areas of robotic use today, apart from the location-based services. manufacturing industry. 7 Underwater robots proved invaluable following the 3 List the reasons why robots are considered to be more 2010 Deepwater Horizon oil spill (also referred to as the reliable workers than humans. Gulf of Mexico oil spill). Research this environmental disaster, paying particular attention to: Chapter 14 Robotics and automated systems 303 Analyse • the reasons why robots were used to contain the oil leak 4 Imagine you could have a robot that would do any task you requested—a companion to do all the work • the difficulties encountered during the cleanup you find tedious or tiring. How do you think this might • the tasks performed by the robots. affect you as a person? 8 Investigate the ways in which robots are used to help 5 Describe the types of jobs which would not be suitable people with disabilities. for robots.

Chapter 14 Robotics and automated systems 289 Issues boxes Traffic lights ,1)2%,7 Traffic lights use a range of sensors to control traffic Some early versions of traffic control inductance loops and help keep people safe on the roads. Commonly, were not sensitive enough to pick up the presence of explore legal small vehicles such as motorcycles. Consequently it was traffic light systems use an inductance loop placed in not uncommon for a motorcyclist to be stranded until a the road. As a car goes over the loop, a small current car came along! is induced. This is fed to the processor controlling and social the system. The system then recognises that a car is present. Some traffic lights do not use sensors. At busy Activities at the end of each unit are broken down intersections, for example, traffic lights may simply Satellites orbiting operate on timers in order to ensure that traffic moves the earth concerns. as smoothly and safely as possible. under a selection of the following headings: Navigation systems in cars sensors to allow enginesSatellite and navigation electronic systems (satsystems navs) provide to drivedrivers with directionsections as well as traffic and estimated time of GPS receiver – Identify: comprehension and recall questions peak efficiency. arrival information.ion. Sat navsnavs use global positioning to in car Earth that check understanding ! Figure 14.41 Global positioning systems rely on a process of triangulation whereby the location of a transmitter can be determined by measuring either the distance or the direction of the – Analyse: extension questions where students are received signal from three or more different points. Location-based services required to apply their knowledge Location-based services Unlocking the GPS functionality of mobile phones opens up Location-based services a whole new world of convenience but has also increased Location-based (LBS) are services software (LBS) are software applicat applicationsatiotions concerns around privacy and raised questions about the which provide users of mobilewhich provide devices—particularly users of mobile devices—particularly GGPSPS measures location-based service providers are implementing – Investigate: enabled smart phones—with personalised servicesG basedbasesed to protect users’ information. Not surprisingly, concerns ! enabled smart phones—withon their personalised current location. There areservices applications (apps)baps) forf have been raised about the threats to privacy posed by LBS example, which notify friends of your location in realal timetim or technology. on their current location. Thereallow users areto locate applications the nearest automatic (apps teller macmachine.hhine Locational privacy refers to the ability of an individual to move higher Remote access Other services allow businesses to direct advertisingng atat in public space with the expectation that their location will not Today’s technology allows users to access information instantly, Large organisations may keep information on different people—transmitting digital coupons, for example,ple, basebbasedd on example, which notify friends of your location in real be systematically and secretly recorded for later use. Location- from anywhere in the world at any time of the day or night. computers around the world. An airline may keep all the users’ proximity to particular shops. based services have the potential to strip away locational Users can interact with data through terminals, viewing personal information about its employees in one city and allow users to locate the nearest automatic teller mac privacy, making it possible for individuals and organisations to order and changing values online in real time. We check our bank the flight schedules for the crews in another location. When harvest data on the movements of LBS subscribers. Other services allow businesses to direct advertising a balance, share prices and the weather. We shop, pay bills and compiling a roster for work schedules, it will need to access Users must provide their consent before a service provider can book holidays. All this is possible because we can access these several related databases. This idea of distributed databases is people—transmitting digital coupons, for example, ba determine positioning data from their mobile phone. However, activities databases, stored to remote servers, over the internet. Some often not visible to the user. With high-speed communications, once consent is given, information may be quietly collected by schools allow staff and students to access data files and e-mail we are often not aware that the information we are processing organisations—particularly advertisers—who may assemble users’ proximity to particular shops. accounts from home. is being accessed and stored on a distant computer. profiles on users without their knowledge. Privacy activists say consumers may be surprised to learn companies monitor LBS requiring users’ activity and profit from their data. ? Questions more ? Questions 1 Identify two advantages of location-based services. 1 We assume we can have free access to large volumes 2 Provide a definition for the term ‘data harvesting’. Figure 14.40 Trends in social media and the prevalence of critical of information over the internet. Who pays for the smart phones with inbuilt satellite positioning have encouraged an 3 Outline the privacy concerns associated with development and maintenance of the databases increasing number of people to broadcast their whereabouts via location-based services. which contain all this information? Give some location-based services. thinking. examples to illustrate your answers. 2 With such large amounts of information stored all over the world, it is easy to lose sight of who Chapter 14 Robotics and automated systems 303 actually knows our personal details. Discuss the idea of storage of information in the context of loss of privacprivacy.

Booking a holiday or a flight is easy to dod online.online.

IdentifyIdentify 8 WhyWhy arear backup procedures carried out so often in banks anandd llargea organisations? 1 Outline 1 List the the common reasons types of data why sources robots mentioned inare used Past, current the text. What type of data is collected and what sort of 9 Some backup systems need to be large, while others input device is used for each? neneed to be portable. Draw up a table to compare manufacturing. memethodmethods of backup and give examples of where they 2 What is the difference between validation and migmight be used. and emerging 2 List fourverification? areas of robotic use today, apart manufacturing 3 What is redundant data? industry. How is it eliminated? Investigateeseststtiiggga 4 What are some of the most common methods of storing 10 LookLoook at one of the websites that is used for purchasing technologies database files? itemsitemms online.o List the ways in which the amount of data 3 List the reasons why robots are considereto beb eentered is minimised, and other reliableAnalyse workers than humans. featuresfeaeature which work to ensure accuracy 5 Find an application form which is used to apply for of thethe data collected. look at the membership to a club or health fund. How would the 11 Th The AustralianAu Tax Office needs data be entered into the database? What chance is there tot checkche data that is submitted by Analyseof human error? taxpayerstaxpaye each year. It will use each individual’s tax file Gesture-based games numbernumbe (TFN) to do this. Employers are required to historical, 6 Compare the file sizes of some of your databases. What 4 Imagineeffect does you adding could graphics have to the data a orrobot headers havethat wourecord TFNs and banks strongly recommend it. Why is Gesture rerecognitionccogn technology allows users to thisthis necessary?nec Which other institutions ask for TFNs? Gesture recognition is an emerging technologyplay games without a controllercontroc or joystick. on the database file size? task 7 Whyyou is it requested—aimportant to eliminate redundant companion data fromm to do a the current computers to understand human body languag ? databases? turn up the volume in a game by making a thumbs-up sign or Questions you find tedious or tiring. How do you th generationinteract with it via spokenof games commands. allows users to intuitively p Nintendo popularised the idea of gesture-based gaming with 1 Identify the undeunderlyingnderlyi concept of gesture-based affect you as a person? gaming. and where withoutthe Wii console the which use allows of people controllers to swing remote controlsor head-sets. Ges and balance on boards to control their digital avatars. With the 2 List three examexamplesamples oof how a person may interact with 5 Describe the types of jobs which would n Chapter 10 Database design 157 videolatest gesture-recognition games use consoles, motion-sensing including Xbox 360 with technologya gesture-basede -basdeased gagamingm system. technology is Kinect, it’s not completely beyond the realms of possibility that 3 Researchrch thehe term ‘m‘motion-sensing technology’. List facialif the game expressions senses you lounging or about analyse on the couch posture for too andsome bodye of tthehhe otherm arareas where this technology can be long, it might just decide to ramp up the difficulty level from found.und. heading. Thecasual underlying to hard-core. concept is that people should be natural body actions and hand gestures,Thee abilityabiliab ratherty to automaticallyaut omatict correct spelling in a word DemonsD procprocessinprocessingg documentdocument is an example of a simple task buttonsDemonsDemonemons (or ror daemons) dragging are intelligent mouse processes pointers that run ccarriedacrossarried outout screby an agent.agent If the letters ‘yuo’ are typed, in the backgroundbackgrounckgr of computer programs and attendattendnd to fforor example,example, most word processing programs will mightvarious taskstplayasksks withoutwith soccer,out human for intervention.interven example,tion. The termter by kickingaautomaticallyutomatic yourally changechan ge themth to ‘you’. The user of the ccomesomes fromfrom Greek mythology,mythology, where daemonsda emons werewere pprogramrogram may not eveneven noticen that this has happened. guardian spirits. spirits Agents cancan learn whatwhat tot do for each individual user, sometimes without the user’s permission. Typical computer daemons include print spoolers and The PP icon indicates that an activity or extra email handlers. You have possibly noticed the words ‘mailer daemon’ in the header of an email message. If an email is incorrectly addressed, a mailer daemon can generate an automated message to the sender material is available for students online on the stating that the message was undeliverable. The demon performs this task without the user having to start the program. Pearson Places website. Agents Agents are similar to daemons but tend to perform tasks on behalf of a particular user, as opposed to initiating processes that operate system-wide. There are agents used by online shopping sites which retrieve information about a buyer’s spending habits. Also known as shopping bots, they display products or Figure 8.6 Web crawler software can be classified in the same services based on previous transactions. An online area of artificial intelligence as agents and demons. Developers book store, for example, may display a list of books by of search engines such as Google are constantly trying to find a particular author to a customer who has previously more efficient ways of using web crawlers to locate relevant purchased other titles by the same author. information on the World Wide Web.

Chapter 8 Artificial intelligence, simulation and modelling 91

How to use this book 1