Free Essay

Information Technology

In: Computers and Technology

Submitted By TaferaelFolwer
Words 2817
Pages 12

(General Proficiency)

School Based Assessment



Description of Project
It takes 90 seconds or less for a car thief to take your vehicle. It is no longer enough to just roll-up your windows and lock your doors. Although few stolen vehicles are recovered within 48 -72 hours, the damage has already been done.
The Spartahouse City Council in collaboration with the Spartahouse Police Department is encouraging residents to protect their vehicles. This is due to the fact that Incidents of Grand Theft Auto in the city have spiked by over 35% over the last year. There is work to be done to educate citizens on how to protect their vehicles to reduce this particular crime even more. The council has been approached by the National Motor vehicle Theft Reduction Organization NMTRO and has planned to launch a campaign entitled “PROTECT YOUR VEHICLE". The program is specifically targeted at encouraging owners of high risk vehicles to install immobilizers and other antitheft devices.
NMTRO works with other stakeholders to develop and implement countermeasures that will impede the activities of organized criminals.
In the city and surrounding suburbs, any make or model of car is subject to theft. Toyota and Nissan models made between 2005 and 2012 and Honda products are the most vulnerable for being stolen.
The City has hired a team of specialist to analyze the car stealing situation in the city. They need to have an idea of the magnitude of the car stealing situation in order to provide preventative measures. In the past the City council distributed free immobilizers to owners of high risk vehicles after receiving a grant from the NMTRO. A repeat of this venture is being considered.
The insurance companies are also interested in these results since the recent trends is causing them to consider raising the premiums and introducing penalties based on the number of car owners who fail to install antitheft devices on their vehicles. They also require a program based on the study to assist their business in helping with the data collection and the necessary calculations with reference to premiums and payments.
At the end of this analysis, a report is to be presented to the Mayor and other relevant parties including NMTRO and the insurance companies.
A pamphlet on Tips to Avoid Auto Theft will be made available to the public as a part of the Operation Bounce Back Project. Candidates are required to utilized Word processing, Database, Spreadsheet and Programming packages to efficiently carry out the required activities.

You are required to:
1. Create a workbook based on the headings below: Statistical Analysis | FirstName | LastName | Gender | Year Manufactured | Model | Category | Insurance Company | Type Of Coverage | Anti Theft Device Installed | Value | Sasha | Moore | Female | 2000 | Accord | LCR-70 | BCC | TPO | FALSE | J$612,000.00 | Jermaine | Black | Male | 2005 | Charade | LCR-71 | Nationwide | FC | TRUE | J$2,617,881.00 | * The categories are as follows: * LCR-70 Motor vehicle theft, cars * LCR-71 Motor vehicle theft, SUV\van * LCR-72 Motor vehicle theft, truck or bus * LCR-73 Motor vehicle theft, other vehicles

* The type of coverage’s are as follows: * Third party only (TPO) or Fully Comprehensive (FC)

2. Insert columns and add the labels “Age of Vehicle” to the right of Year Manufactured” and “Premium" to the right of "Value" columns. Modify the spreadsheet as necessary using "M" for "Male" and "YES" for "Antitheft Device Installed"

Use the spreadsheet functions and/or formulae to perform the following calculations. a) The age of each vehicle based on the year it was manufactured. Hide the column labeled “Year Manufactured”. b) Total ALL appropriate columns and ensure that your worksheet is efficient. Also use formatting features to allow clarity of your worksheet (example bold, decimal places $-and % signs). c) Enter the regular premium for each vehicle in the worksheet based on the insurance company table below.

Insurance Company | Premium | STATEFARM | 1950.00 | BCC | 2700.00 | IWCI | 1675.00 | NATIONWIDE | 3500.00 |

FirstName | LastName | Gender | YearManufactured | Model | Category | Insurance Company | Type Of Coverage | Anti Theft Device Installed | Value | Tyrese | Witter | Male | 2000 | Eclipse | LCR-71 | State Farm | TPO | FALSE | J$1,210,000.00 |

3. Insert before the record number 8 the following data

4. Sort the data in the worksheet by Type of Coverage (Primary field) and Insurance Company (secondary field).

Present the data using bordered line style and centre and bold all column headings. Titles should be displayed evenly across the data provided.

Save as Task A
Print this worksheet. Include printouts showing ALL formulae.
TASK B 1. The insurance companies calculate the compensation packages for stolen vehicles based on the age of the vehicle and the insurance coverage. Incorporate the following information in your worksheet. If the vehicles were not insured FC, then the owner would receive 0% payment. Use additional columns as necessary.

Age of vehicle | Payment by Insurance Company | 1 year or less | 50% | 2-4 years | 40% | 5-7 years | 30% | 8-10 years | 20% | Over 10 year | 10% |

2. In another area of the worksheet, generate the following information from the table: * List of New cars (less than two years) with No antitheft devices installed * List of Female drivers * List of Vehicle comprehensively insured

. Save as Task B
Print this worksheet. Include printouts showing ALL formulae.


1. On a new sheet in the same work book, create a summary table which will contain the following:

Summary information for first quarter of 2014 | Number of vehicles stolen | | Number of cars less than 4 years old | | Average insurance payment made by insurance company | | Percentage of Female owners whose vehicles were stolen | | Maximum Vehicle cost | | Number of Vehicles Comprehensively insured | | % of owners who installed antitheft mechanisms | |

2. Create a pie chart to compare male and female victims. The chart should have a suitable heading and percentage for the data displayed.

3. Create a bar chart to compare the different categories of vehicles stolen over the 4 month period.

Save as Task C
Print this worksheet. Include printouts showing ALL formulae.

* Specific Guidelines for the Spreadsheet

* Enter records so that there is no less than 30 records and no more than 40 records. * Make sure you print ALL your formulas. * Print your gridlines or set borders for all your tables. * When printing your formulas, make sure you print the column and row labels as well. * Make sure you design your spreadsheet so as to make full use of the cell referencing capabilities. Your formulas must be very efficient. * All pages must be numbered. * All pages should include a header with your name and email address and a footer with your teacher’s name and school.

The analysts have received the statistics for the first quarter of 2014. The tables which contain the data have the following structures, import all necessary information.

INCIDENT Field Name | Type | Description | Incident Number | Auto Number | An automatic number assigned when a motor vehicle theft is reported | VIN | Text | Registration Number of Vehicle | Category | Text | LCR-70, LCR-71, LCR-72, LCR-73 | Date | Date\Time | Date of Incident | Time of day | Date\Time | Time Vehicle was Reported stolen | Occasion | Text | Holiday, Midweek, Weekend | Location | Text | Home, Car park, Other | Address | Text | Address of Incident |

VEHICLE Field Name | Type | Description | VIN | Text | Registration Number of Vehicle | Year | Number | Year Vehicle was manufactured | Vehicle Make | Text | Manufacturer of vehicle | Model | Text | Model of Vehicle | Vehicle Type | Text | Sedan\SUV\Truck etc | Transmission | Text | Manual\Standard | Engine Number | Text | Engine Number | Colour | Text | Colour of vehicle | Owner Number | Text | The TRN of owner | Proprietor Type | Text | Private, Company, Government | Anti Theft Installed | Logical | Yes or No | Value | Currency | The Value of vehicle at last assessment |

OWNER Field Name | Type | Description | IDNUMBER | Text | This reference to the owner number in the VEHICLE table | First Name | Text | | Last Name | Text | | Address | Text | | Gender | Text | Male\Female |

Notes: 1. Records are to be added for the first quarter of 2014. Data for each incident should be entered in the table INCIDENT and the corresponding data entered in the VEHICLE and OWNER tables. 2. It is possible for an owner or company to have more than one vehicle stolen for the duration. TASK A
You Will Need

1. Enter Records in the tables so that the INCIDENT table contains no more than 30 records.

2. Enter relevant data in the remaining tables so that they correspond to the records in the INCIDENT table.

3. Utilize formatting features e.g. list boxes and input mask and select the appropriate primary key for each table.

4. Create a table called INSURANCE. Export the registration numbers of the vehicles and import the corresponding insurance company and premium for each vehicle. Include a field that indicates the type of coverage i.e. Third party only (TPO) or Fully Comprehensive (FC). All Government vehicle and vehicles that are less ONE year old MUST be fully comprehensively insured.

5. Create a table called STAKEHOLDERS. This table will contain mailing information for all the companies\individuals that will be updated on the findings. These include:

(i) The Superintendent of the Spartahouse Police Department (ii) The Chief Technical Officer of NMTRO (iii) The Mayor of the Spartahouse City Council (iv) The Insurance Association of Spartahouse.

6. Perform the necessary association linkage between tables (relationship diagram).

You are required to submit: a) a printout of the description of each table structure (design view) b) a printout of the relationships (relationship diagram) c) a printout of the data contained in each table (datasheet view)

TASK B a. List the names of all victims sorted by last name. Display the make, model and type of vehicle owned, the insurance company insured with and the value of the vehicle. VICTIMS

b. Find the total number of motor vehicles stolen for each occasion. OCCASION

c. The owners of each vehicle that are comprehensively insured are required to pay 0.5% of the value of the vehicle as a part of their Annual fee to NMTRO. List the owner, vehicle number, Vehicle manufacturer, value and the amount contributed. NMTROCON

d. What is the vehicle with the highest value stolen? Display the name of owner, type of vehicle, location and occasion. MOSTVAL

e. How many Government Vehicles and Company owned Vehicles were stolen over the quarter? NOTPRIVATE

f. List all Owners that had some form of antitheft mechanism installed and their vehicles got stolen at home. Antitheft_StolenHome

g. An error was made in the incident table. All data on Incident 2 should be deleted. INCIDENTDELETE

h. ALL insurance companies value each vehicle at 2% more than the actual assessment value. Perform the necessary update. ASSESSUPDATE

You are required to submit: (a) a print out of the query results (b) a printout of the SQL statements/views (c) a printout of the design view


Create and print the following reports:

h. Group by Occasion then by Location, the names of owners that had their car stolen. Also include the type of vehicle stolen and the colour. Give the report the heading “Grand Theft Auto” in line one and “First Quarter 2014” in the line below. Ensure that the Owner’s names are sorted in alphabetical order.

i. Create a report using the fields Insurance Company, Date of Theft, Owner’s name, category and value. Group the report by Insurance Company then by Date. Include relevant summary data and provide total insured cost. Give this report the heading “Grand Theft Grouped by Insurance Company”. Sort the report by insurance company.

Word Processing
After analysis of the data using a DBMS and a Spreadsheet, the team is now ready to present a report based on the statistics for the quarter.

You are required to design and print.


Write a report based on the queries, charts, reports and insurance statistics derived from the database and spread sheet. Your report should have the following format: 1. Cover Page 2. Table of contents 3. Introduction stating the purpose of the investigation. (Be realistic in your introduction) 4. Tools used to obtain your statistics. (state programs and version) 5. The result of the investigation. This should be in point form and consist of no less than 5 points. Be sure to include results of the queries and or report that you created in the database section of your SBA. An example is as follows

The investigation revealed that: 1. 65% of vehicles that were stolen were government owned
<Produce proof of statistics e.g. charts or table.> 2. 20% of victims were females.
<Produce proof of statistics e.g. charts or table.> 3. ...

The investigation revealed that: 4. 65% of vehicles that were stolen were government owned
<Produce proof of statistics e.g. charts or table.> 5. 20% of victims were females.
<Produce proof of statistics e.g. charts or table.> 6. ...

6. Conclusion and recommendations. (Be realistic) 7. Appendix. Any additional information relevant to the SBA.
NOTE… The document should be well formatted by using the following features: * Bold\italics * 1.5 line spacing * varying font & font size * good use of bullets and numbering * Alignment

As a part of the “Operation Bounce Back” you are required to design a pamphlet that will be made available to the public. The aim of the pamphlet is to educate the public in the fight against motor vehicle theft. The Pamphlet should be entitled “PROTECT YOUR VEHICLE”
The pamphlet should include but not limited to the following information: * Some statistics (taken from your database and\or Spreadsheet) * Tips on how to avoid auto theft * Information on free and discounted antitheft devices that will be made available. (e.g. discounted immobilizers of free steering lock)
You are required to consider the following: (i) The Pamphlet should be tri-fold on letter size paper (ii) Include appropriate graphics that will enhance the presentation (iii) The document should be well formatted by using the following features: * Bold\italics * 1.5 line spacing * varying font & font size * good use of bullets and numbering * Alignment * Borders and Shading

Task C ONE COVER LETTER i Create a letter head for your company

ii Write a cover letter stating that the report and a brochure are enclosed and that a review meeting will be held on April 1, 2015. Include a table for an agenda for the review meeting and any other relevant details in the cover letter. Be sure to use your name as the team leader for the analysts.

iii Using the database table STAKEHOLDER, as the data source, use the necessary features to perform a merge, with the letter as the primary document.

Print the First and last letters after the merge.

Problem Solving and Programming

1. Insurance companies are interested in software that will better assist their customers based on the study carried out by the NMTRO. A trial run of the software should be implemented where up to 30 customers may be attended to per day.

You are required to write a pseudocode or draw a flowchart that will accept customer’s information (First Name, Last Name, Gender, Model of car, Category of car, Insurance Company, TOC, whether or not an Antitheft device has been installed, Premium and value of car). Calculate the compensation payment for each customer based on calculation criteria given in Task B of the spreadsheet section.

At the end you are to: a. Calculate the number of vehicles insured Fully Comprehensive b. Find the highest vehicle cost c. Calculate the percentage of owners who installed antitheft mechanism d. Prompt the user for a customer’s name and search for and display the customer’s information including the compensation payment to be made.

2. Design and implement a trace table that accepts data for 6 members (same data as the spreadsheet). The table should track the Value of car, TOC, Premium, antitheft installed and insurance payment. The total premium of all customers should be calculated.

Program Implementation

3. Using the programming language Pascal, write a program code to implement the algorithm in one (1) above, use the features available to you example: a. The use of font and background color. b. The use of arrays and control structures (eg. If, For, While and Repeat Until) where necessary. c. Your program should have the appropriate data types and variable naming. d. The program must be user friendly.

You are required to submit: a) the flowchart or pseudocode b) the trace table c) the program code (students may use notepad or the Pascal compiler program) * the pascal code should be personalized to each individual student with the following i. student full name ii. pool iii. subject iv. reason for the program
(The above must be written in the code either as part of the program or as comments) d) screen shots of the main screen for your actual program running

Similar Documents

Premium Essay

Information Technology

...Information & Communications Technology Research Proposal Name: Institution Affiliation: Background There has been developing awareness that the power information technology and computing. This must be, and can be, amplified past its customary client base to achieve individuals who up to this point have not had an entry to such innovation. Being digitally joined has gotten to be continually basic to economic, instructive, and social headway. The objective of this exploration subsidizing activity is to create new information that will help stretch the capacities of figuring engineering better to serve social and economic difficulties of underserved groups, both provincial and urban. The expression Data and Communication Technology for Development are likewise utilized as a part of the scholarly research group to depict this same objective. Information and Communication Technologies must be moderate, available, and important. Novel methodologies in figuring engineering have the potential for the extraordinary effect in a scope of regions, including instruction, human services, and economic improvement. The significance that exploration projects can have around there is noteworthy since there are troublesome mechanical issues to be unraveled to understand that vision. For example, work in last-mile organizing bases, making instinctive client interfaces, creating ease processing gadgets and making applicable applications in regions (Werthner, 2009). Research......

Words: 988 - Pages: 4

Premium Essay

Information Technology

...Information Technology (IT) Information Technology (IT) Information technology, in the first instance, brings to us the latest developments in science, technology and the arts in the advanced world. We can make use of the latest techniques and methods in the sciences and the arts within the four corners of our buildings. We can communicate with anyone anywhere in the world and send him messages in a jiffy. The e-mail has made it possible to send any amount of information to any place in a few seconds. The receiver of the information can at once send back the reply or his own information. Talk on programmes like hotmail messenger or yahoo messenger, along with the display of the talkers on the screen, gives a direct personal touch to the exchange of information and ideas. Information technology has, in effect, reduced distance completely between parties sitting in continents separated by the high seas and immeasurable skies. Computer technology can help us to bring about social, political and economic revolution in the country. We can make a complete study of the different social, political and economic systems in the most successful countries. The past, present and possible future of these countries and societies can be studied through computer records, films and Computer technology can be used to collect information about the different classes and groups of the people in the country. A thorough study of their educational, professional and......

Words: 461 - Pages: 2

Premium Essay

Information Technology

...Chapter 1 1. How can information technology support a company’s business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer. The term information technology refers to the various hardware, software, networking, and data management parts that are a necessity for the system to function (pg. 8). Businesses regularly utilize computer-based information systems in order to record customer purchases, keep track of inventory, pay employees, buy new merchandise, and evaluate sales trends. Without the support of information technology, businesses would ultimately fall apart. For example if a business did not choose to use computer-based information systems, they wouldn't be able to evaluate what items were selling better than others and ultimately lose valuable information for future success. Information technology can also aid in decision making for a business. Decisions are made based on analysis provided by computer-based information systems. For example a store manager may make the decision whether to discontinue an item for sale or keep it on the floor due to analysis of sales trends provided by computer-based systems. Lastly information technology helps business gain a competitive advantage. A competitive advantage is gained through computer-based information systems by applying innovative application of information technologies (pg. 9). For example a store manager installing touch screen kiosks throughout the......

Words: 1404 - Pages: 6

Premium Essay

Information Technology

...Information technology affects almost every aspect of the business world in today’s modern society. Within a matter of decades both internal and external processes have been transformed. For example, managers no longer handwrite reports for their office staff to type or use mail to correspond with clients or post flyers to communicate with employees. My department at Princeton University has experienced these types’of scenarios over the past five years. Five years ago, our procedures and computers systems were antiquated. The need for technology was essential to provide better communication and improve procedures, especially in a department that has over 200 employees who work in different locations throughout the University such as dorms, academic buildings, and athletic facilities. For instance, my department’s time-off request procedure and the process by which supervisors receive their daily work orders were lengthy, required several steps, and needed to be modernized. Realizing how outdated these procedures were, my department sought out several different types of technology to help improve its overall functionality. Technology acquired included, Sharepoint, Ipads, and EZ Maxmobile App. In just a short period of time, these products have significantly improved communication and procedures throughout the department and enhanced our customer service to our clients. The use of Sharepoint, a web-based intranet that streamlines the management of and access to data,...

Words: 416 - Pages: 2

Premium Essay

Role of Information Technology

...International Journal of Information Science and Technology THE ROLE AND EFFECT OF INFORMATION TECHNOLOGY IN THE CREATION AND MAINTENANCE OF SUSTAINABLE COMPETITIVE ADVANTAGE A. Talebnejad[1] Faculty of Management and Accounting Shahid Beheshti University Email: Abstract -By the appropriate use of information technology, organizations can achieve sustainable competitive advantages. This technology because of including some characteristics such as being up-to-date, fast and precise and having different geographic localities all the time, has improved organizational efficiency, effectiveness and performance. In this article, we intend to investigate the role and effect of information technology in the creation and maintenance of sustainable competitive advantages from two different approaches: market-based approach and the resource-based approach. In the Market-based approach, meeting customer's and creating values for them, using information technology and the issue of achieving the competitive advantage and position in the market by organizations are addressed. In the resource-based approach, compatibility of the organization's resources such as those of information technology and organizational skills, particularly managerial ones are investigated. Amongst different organizational skills and resources, only managerial skills of information technology can create a sustainable competitive advantage. Keywords: Information Technology, Sustainable......

Words: 4885 - Pages: 20

Free Essay

Policing Information Technology

...Policing Information Technology Bill Smith BIS/220 July 11, 2012 Alisha Johnson Abstract Policing Information Technology Over the past 30 years technology has advanced at an alarming rate. Since the inception of personal computers and the World Wide Web a need for individual protection occurred. Government reform was needed. In the 1980s two Acts of Congress were passed, the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986. Initially we will examine the advances in technology that caused each Act to be passed. Last we will determine what new ethical issues came about from this new technology. Although some may see these Acts as an invasion of one’s right to privacy, they are essential to protect stored information from being used in a negative way. “A survey by an ABA task force in 1984 estimated that businesses and government agencies lose as much as $730 million a year to computer crime” (Wolf, 1986). Two years after this survey was published the U.S. House of Representatives passed the Computer Fraud and Abuse Act of 1986. During this time computers are becoming widely used across the country. The major change is the type of information being stored. Financial institutions both in the private and government sectors are using computers to store valuable financial information. Computer hackers illegally could gain access to this information and sell it to individuals with the means to use it or vandalize the......

Words: 529 - Pages: 3

Premium Essay

Information Technology Tool

...partner in a new business, one of your roles is to review information technology tools available to assist you in a certain aspect of your business (e.g., marketing, accounting, sales, quality assurance). Select a technology that emerged within the last five years and consider its impact on your business. Make a decision on whether to adopt this technology. B. Information Technology Tools 1. How technology helps business grow * SBA. (December 13, 2010).New Technology Guide Helps Entrepreneurs Grow Their Small Businesses and Create Jobs. Retrieved April 10, 2012 from, * Smart Business Information Technology. (2012). Information technology aids in business growth. Retrieved April 10, 2012 from, * SBA. (2012). New technology guide helps entrepreneurs grow their small businesses and create jobs. Retrieved April 10, 2012 from, * Entrepreneurs’ Organization. (2012). How I leveraged technology to grow my business. Retreived April 10, 2012 from, 2. How technology lessens the geographical gap between countries * Net Industries. (2012). The international gap in technology. Retrieved April 10, 2012 from,......

Words: 2563 - Pages: 11

Free Essay

Information Technology Acts

...Information Technology Acts Chad T Lane BUS/220 30 June 2014 Mrs Colette Gardner Information technology is a dynamic and rapidly changing industry. Up until roughly two hundred years ago, all communication required walking, horseback, or some other form of manual labor. The telegraph was the first step down the path of information technology when Claude Chappe first invented it in 1794 (Bellis, ). The telegraph was the gateway to a plethora of other forms of communication that lead to social media, email, blogging, text messaging, etc. The internet is probably the biggest and most powerful breakthrough in information technology. With that, comes a lot of potential for people to do things they should not, say things they would not say in person, and target an audience that might have gone otherwise unreached. The Children’s Internet Protection Act of 2000 was passed in order to prevent children from exposure to pornographic material and things that are not age appropriate for young children in situations where schools or libraries receive internet at a discounted rate  (FCC,). Prior to the internet, someone wishing to purchase pornography or R-rated movies would be required to prove legal age to do so because these transactions largely took place in person. The internet has no hard and fast way of verifying age so keeping children away from things they should not see, requires use of filters and other resources to block certain material and websites. Many people......

Words: 467 - Pages: 2

Premium Essay

Communication and Information Technology

...Communication and Information Technology Latasha Wright HCS/320 June 18, 2012 Patricia Bird Communication and Information Technology Communication and information technology is frequently used as way to deliver effective communication messages. Many standard organizations such as hospitals and medical facilities continue to find ways to implement and improve communication channels. For these reasons, the use of e-mail communication in the hospital setting should be used as a way to enhance communication and information technology. First, I will explain how efficient and effective e-mail communication improves hospitals’ communication between personnel and patients. Because implementing new forms of technology comes with some advantages and disadvantages; I will discuss the incentives and drawbacks as well as its influences on consumers. Next I will explain the short and long-term financial impact that e-mail communication has on organizations. Then, I will provide technical improvements with e-mail communication in the future and why. Last, I will make necessary recommendations to improve e-mail communication in the hospital environment. My hope is that this essay will provide a better understanding about the use of e-mail communication and how organizations can benefit from its use. Efficient and Effective A popular form of communication, e-mail communication, is both efficient and effective for organizational use. E-mail communication is said......

Words: 1070 - Pages: 5

Free Essay

Information Technology Acts

...Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available. Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data information across the various environments for the users utilizing the systems (Wikipedia, 2014). From professional, academic and personal situations these systems are more than ever present in the daily routine. The increased demand and use of these systems does make daily tasks easier and quicker to complete, but even the most beneficial tools can come with a cost. The information systems we utilize improve efficiency and effectiveness, but open doors for dangerous, illegal, and unethical actions. In order to control or limit these technological woes, various laws and procedures have been put in place to protect the users and societies that wish to implement these systems features into their lives. In this paper we will examine two laws specifically what they entail, the ethical dilemmas...

Words: 1432 - Pages: 6

Premium Essay

Communication and Information Technology

...Communication and Information Technology HCS/320 January 28, 2012 Dr. B Communication and Information Technology Communication has been a key element in the health care field for many years. A patient communicates to the physician what is wrong with them, the physician communicates with the nurse what is to be done, and the information is entered into the patient file. The medical biller then bills the insurance or patient by sending an electronic claim, and the payer sends back a statement of payment. All this is considered communication. Over the years technology has advanced and the ways these communications have been used have changed. Now communication is done electronically, sent by email and even text message; there is even a way to teleconference over video phone with a patient or physician. After researching new technology I found Vocera, a communication system that makes communicating between team members faster and easier. The system uses a hand held device as well as a computer based program to communicate messages even alerts to get in touch with team members. The voice activated hand held device is the size of a cell phone and is typically hung around the neck. The hand held voice activated device can be used to call another team member, or can be used to access a paging system in case of emergency situations. Physicians can use the device to turn on their status, such as on call or on lunch break. When the computer based program is accessed by a nurse......

Words: 777 - Pages: 4

Free Essay

Information Technology Acts

...Information Technologies Acts Information Technologies Acts The two acts that have been chosen for this paper are the Do Not Call Act of 2003 and the Children’s Internet Protection Act of 2000. I chose these because these are two of the biggest issues plaguing society today. It is always an ongoing battle to find and implement ways to protect children from the ever expanding corruptness that this world is throwing at us daily. It is also a never ending battle to keep us safe from harassment. The Children’s Internet Protection Act was passed to help keep children’s use of the internet in libraries and school safe and free of information and images children should not be exposed to. As Information Technology continues to grow and comes up with new ways to get the information out and people are intelligent enough to link undesirable information such as pornographic materials, sexually explicit materials, Etc. We as a society needed to find ways to keep our children from getting corrupted by such vulgarity. Thus the Children’s Internet Protection Act was born. It helps to ensure that our children are not exposed to information and materials not appropriate for them. It requires libraries and schools to implement filters to block inappropriate material from being viewed by children. The Do Not Call Act of 2003 was implemented to provide a regulation from harassment by telemarketers if their phone number is on a do not call list. As technology has expanded, it has become......

Words: 556 - Pages: 3

Premium Essay

Information Technology in Business

...Riordan Manufacturing business chose to outsource their information technology (IT) systems and services for a variety of reasons. This choice carries with it some obvious benefits and some often not so obvious risks. Companies choosing to outsource IT must weigh the benefits and risks carefully, take measures to attenuate the associated risks and prepare their employees for the change by launching a campaign about the benefits of outsourcing. The risks involved with outsourcing mainly involve accessibility to service. According to Applegate (1995), if you rely on an outside contractor who generally has to come onsite to support your network, then [consider removing "then"] you live in a world where you simply hope critical services don’t [Contractions are inappropriate in academic writing--write it out] go down at a time when your ability to conduct business will be interrupted. Busy IT contractors may take days before they can come in to help, and this will likely be unacceptable if the problem is making it impossible for your staff to work. All the money saved by using a pay-as-you-go contractor can be lost with one serious issue within your network. With remote IT support such as managed services, some business owners are uncomfortable with having less personal touch and immediate feedback. When you have your own network administrator onsite, you can call them into your office and get a report or have questions answered. A remote based service will never be able to......

Words: 991 - Pages: 4

Premium Essay

Information Technology Agenda

...IT Agenda 1 IT Agenda and Organizational Strategies HCI 510 November 19, 2012 Mr. Lee Edwards IT Agenda 2 To achieve success in this information economy, IT is a critical facet of any organization. IT goals exists to help organizational leaders understand why IT goals must align with those of the business, how IT delivers value, and how its performance is measured, its resources properly allocated and its risks mitigated. In this paper, I will be discussing the relationship between the IT Department and organizational strategies, along with strategies that make an effective IT Department. Effective organizational strategies should be looked at like a wheel. It comprises five components: Leadership, Decision-making and structure, People, Work processes and systems and of course, culture. Leadership comprises a clear vision and priorities and a cohesive leadership team. The decision making portion makes up clear roles and accountabilities for decisions and an organizational structure that supports objectives. The people portion of the wheel includes organizational and individual talents necessary for success, and performance measures and incentives aligned with objectives. Work processes and systems encompass superior execution of pragmatic work processes and effective and efficient support processes and systems. And, finally the last portion is the organization culture. The culture covers high performance values and behaviors and a...

Words: 867 - Pages: 4

Free Essay

Information Technology Acts

...Information Technology Acts BIS/220 BSAH16ZDG6 Facilitator: Dr. Charles A. von Urff Week 1 Individual Assessment Due March 11, 2013 Submitted March 11, 2013 Executive Summary In today’s age and society, information technology is a growing necessity in the functioning of retrieving information from the internet. Thus access to the internet is available to everyone no matter the age. In order to protect all ages of internet users, the United States Congress has passed several Acts to protect users. With the advances in information technology the ethical issues of privacy and appropriate content in regards to children have lead to the United States Congress passing the Children’s Internet Protection Act of 2000 (CIPA) and Children’s Online Privacy Protection Act of 1998 (COPPA). Each Act has its own ethical issues as to it’s creation with the importance of children’s safety as the main concern. Introduction With the advancement of information technology in which all ages of users are being accommodated, everyone in today’s society has access to utilize all forms of information technology. The usage of information technology can include but is not limited to listening to music, watching movies/videos, playing games, communicating via email, social networks, or chat rooms, and getting help with school assignments. The researching of information via information......

Words: 994 - Pages: 4