To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Sub Topic 3. Emerging Technologies
Sub topic Objectives:
–explain the concept of emerging technologies (artificial intelligence, digital forensics, among others).
–explain how specific technologies are applied in problem-solving in society.
–explain advantages and disadvantages.
Emerging technologies
Definition: Emerging technologies are those that are currently being developed or will be developed in the next 5 to 10 years, and which will alter the business and social environment. ICT is always improving and changing and new technologies are being developed all of the time. Developments in technology will, by nature, impact on our everyday lives and these include:
Application areas and impacts of some emerging technologies
Artificial Intelligence (AI)
This is a computer science that is focused on creating computer systems that simulate human intelligence. The term was first used in 1956 by a computer scientist at the Massachusetts Institute of Technology (MIT) who was focused on trying to make computers behave like humans.
AI is being developed in the following application areas:
Impacts of AI on everyday life:
Digital forensics
Digital forensics, also called computer forensics, network forensics, or cyberforensics, is the discovery, collection, and analysis of evidence found on computers and networks. Digital forensics involves the examination of computer media, programs, data and log files on computers, servers, and networks.
Many areas use digital forensics, including
Impact of Digital Forensics on everyday life:
Forensics has led to increased legal use of digital evidence. Digital evidence is information found on a wide range of electronic devices that is useful in court because of its probative value.
Technology changes evidence. There is still a vigorous debate in the legal world over the usage and reliability of DNA evidence, for example. This is now being mirrored in more recent court challenges over the use of digital evidence.
Digital evidence tendered in court often fails to meet the same high standards expected of more established forensics practices, particularly in ensuring the evidence is what it purports to be. It is increasingly common for criminal trials to rely on digital evidence. And, regrettably, it is common for innocents to be convicted and guilty people acquitted because of digital evidence.
Biometrics
Impacts of Biometrics on everyday life:
Robotics
Robots are increasingly being used in manufacturing due to their proven increase in productivity. Think about it! Robots can work 24/7 and never need to take breaks. They also do not require wages like humans do. This means that robots can produce more at a lower cost. They are either automated (controlled by a computer chip) or manually controlled by a human.
Some more typical tasks that robots can be used for are described in the table below:
Impacts of Robotics on everyday life:
Quantum Cryptography
Impacts of Quantum Encryption on everyday life:
Computer Assisted Translation (CAT)
CAT is where a human translator uses computer software to help in the translation process. CAT software can reduce the amount of time that the translation takes. Current CAT tools are not always 100% accurate. They need a human to check for errors.
Examples of different types of CAT tools include:
Impacts of Computer Aided Translation on everyday life:
3D and Holographic Imaging (aka holograms)
Impacts of 3D imaging on everyday life:
Virtual Reality
Virtual reality is where computers are used to create an artificial environment that users can interact with as if it were real. Virtual reality is not really meant for gaming purposes. It is used for more serious purposes such as: Allowing architects to walk around a virtual version of their design (this gives a better idea of what the finished building will look like). Training soldiers in combat (flight simulation, battlefield simulation). Training surgeons (virtual patients can be operated on to provide experience to trainee surgeons).
As they walk around the virtual environment users will experience things in a similar way to the real world. For example:
Impacts of Virtual Reality on everyday life:
Sub Topic 4. ICT Industry
Sub-topic Objectives:
–explain the meaning of careers in the ICT industry.
–appreciate careers in the ICT industry.
–identify the potential of ICTs for earning.
Careers in the ICT industry
ICT industry: Information and communication technology (ICT) has created new job titles such as computer operators, computer technicians, system analyst, computer programmers, software engineer, information systems manager, data base administrator, computer trainer, web administrator, computer graphics designers, system administrators and network administrator.
Meaning of careers in the ICT industry
System analyst: This a person who is responsible for analyzing a company’s needs or problems then designs and develops a computer based information system.
Some of the responsibilities of a system analyst include:
A good system analyst is one who has at least the following attributes;
Computer operator: Some of the responsibilities of a computer operator include; Entering data into the computer for processing. Keeping up-to-date records (log files) of all information processing activities.
Computer technician: Given that computers require regular maintenance, upgrading as well as emergency repairs, demand for computer technicians continues to grow as more people computerize their workplaces and homes.
Some of the responsibilities of a computer technician are;
– Troubleshooting computer hardware and software related problems.
–Assembling and upgrading computers and their components.
–Ensuring that all computer related accessories such as printers modems, storage media devices are in good working condition.
Computer engineer: Computer and electronic engineers are coming up with new and more efficient technologies in information and communication technology almost daily. Since computers are electronic devices, hardware designers must be good in electronic engineering in order to be able to:
Computer programmer: Large organizations such as insurance companies, banks, manufacturing firms and government agents hire programmers to work together with system analysts in order to:
Web administrator/webmaster
A web administrator is responsible for:
Software engineers: Most Software engineers analyses user needs and create application software. Software engineers usually have experience in programming, but focus on the design and development of programs using the principles of mathematics and engineering.
Computer Trainers: Computer trainers typically teach new users how to use the computer software and hardware.
Network administrator: A network administrator is a specialist whose responsibilities are to:
Graphic designers: A graphic designer is a professional within the graphic design and graphic arts industry who assembles together images, typography, or motion graphics to create a piece of design.
System Administrators: A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.
Other responsibilities of an information system administrator include;
The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers he or she manages meet the needs of the users, without exceeding the budget.
A system administrator may acquire, install, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train or supervise staff; or offer technical support for projects.
ICT in SMEs
–Small and medium enterprises (SMEs) are independent firms and companies which tend to have fewer employees and lower sales volume compared to large firms and companies. Different definitions are given from different organizations and countries. For example, the Organisation for European Economic Cooperation (OECD) and European Union (EU) designate the upper limit of employees for SME as 200 employees.
–Researchers have increasingly focused on the adoption and use of ICT by small and medium enterprises (SMEs) as the economic development of a country is largely dependent on them. Following the success of ICT utilisation in SMEs in developed countries, many developing countries are looking to utilise the potential of the technology to develop SMEs
Role of ICT in SMEs
Policies regarding adoption of ICT in SMEs
Challenges of ICT adoption
Case Study: SMEs in Uganda
In Uganda SMEs account for a significant share of production and employment and are therefore directly connected to poverty alleviation. While in many respects the Ugandan economy is different to that of other countries in the continent, for the poor population in the rural areas SMEs are also very relevant for employment and as an income source. Especially in developing countries like Uganda, SMEs are challenged by the globalisation of production and the shift in the importance of the various determinants of competitiveness.
Why government encourages SME access to and use of ICTS:
The SME play a key role in national economic development strategies by facilitating flows of information, capital, ideas, people and products.
The problem at hand in Uganda
Most SMEs in Uganda, do not appreciate the importance of using ICTs and e-business in the performance of their businesses. There is therefore need to establish the factors that have led to this reluctance towards the application of ICTs in the business processes of SMEs in order to exploit the benefits of these modern technologies which can be easily implemented for improved performance, cost reduction, competitive advantage and many others.
Comparatively, medium-sized enterprises have made attempts to put ICT strategies in place. The medium-sized enterprises attach great value to information compared to small-sized enterprises perhaps because they have significant investments.
ICTs commonly used by SMEs in Uganda
The ICTs most commonly used by SMEs in Uganda include:
However, unlike SMEs in developed countries, those in Uganda are not fully exploiting the potential of ICT to compete effectively in the international markets. This is because of the following factors:
Sources of information used by SMEs
Means of disseminating information by SMEs
SMEs disseminate information through a combination of methods, such as:
Information sharing among SMEs
Some of the SMEs have LANs, suggesting that they recognise the importance of information sharing. However, most applications implemented on the LANs are basic, such as e-mail applications, small databases, Microsoft applications, and product information that are largely for in-house use.
Compliance by SMEs with information security procedures
Both small and medium-sized enterprises employ mainly antivirus programmes and regular backups to ensure the security of information. However, medium-sized enterprises in addition use sophisticated information security measures such as:
Barriers to adoption of ICTs by SMEs in Uganda
Most of the current and potential clients for SMES in Uganda are not connected to the internet, largely because of high costs and a lack of awareness.
The government has not put in place an e-commerce friendly environment, which would build consumer trust and business confidence.
Moreover, the ICT market is not yet mature and people are yet to develop confidence in using ICTs. For example some people still tend to prefer going to the teller in the bank instead of querying and accessing their accounts through internet or mobile banking.
Furthermore, telecommunication cost is high, quality sometimes poor and a barrier to transacting business on the web.
Other barriers include:
Potential of ICTS for earning
Past exam Qn: Mention ways in which you will use the subsidiary ICT knowledge and skills you’ve acquired to earn income during your S6 vacation. (5 mks)
Possible Answers:
Assignment
ASSIGNMENT : CS6: Assignment on System Security, ICT Ethical Issues and Emerging Technologies MARKS : 100 DURATION : 3 hours